X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
algorithms (6) 6
trustee (6) 6
computer simulation (5) 5
direct trust (5) 5
indirect trust (5) 5
security (5) 5
trustor (5) 5
aodv (4) 4
computational modeling (4) 4
computer science (4) 4
index medicus (4) 4
monitoring (4) 4
analysis (3) 3
context (3) 3
databases (3) 3
networks (3) 3
rubber (3) 3
availability (2) 2
bioinformatics (2) 2
chemical properties (2) 2
chemistry, physical (2) 2
composite materials (2) 2
computational biology (2) 2
computer information security (2) 2
computer science, interdisciplinary applications (2) 2
computer science, theory & methods (2) 2
computers (2) 2
content delivery network interconnection (2) 2
content management (2) 2
data mining (2) 2
dielectric-relaxation (2) 2
engineering, biomedical (2) 2
fibers (2) 2
fundus oculi (2) 2
glucose (2) 2
hierarchical cdni architecture (2) 2
humans (2) 2
intrusion detection (2) 2
manet (2) 2
mathematical models (2) 2
medical informatics (2) 2
mobile ad hoc networks (2) 2
multiple sequence alignment (2) 2
openflow (2) 2
optic disk - diagnostic imaging (2) 2
polar solvation (2) 2
policies (2) 2
reduct (2) 2
rough set (2) 2
routing protocols (2) 2
scanning electron microscopy (2) 2
sdn (2) 2
servers (2) 2
silver (2) 2
solvation (2) 2
surface (2) 2
surgery (2) 2
trust (2) 2
wireless communication (2) 2
access control (1) 1
acrylonitrile-co-butadiene rubber (1) 1
ad hoc networks (1) 1
additives (1) 1
adhesion (1) 1
adhoc (1) 1
ageing (1) 1
agent based ids (1) 1
agriculture (1) 1
agriculture, soil science (1) 1
algorithm design and analysis (1) 1
analytical models (1) 1
anchor boxes (1) 1
and cancer therapy (1) 1
antibody (1) 1
antigens (1) 1
aprotic-solvents (1) 1
architecture (1) 1
aromatic polyamide (1) 1
arrays (1) 1
artifacts (1) 1
auslösezeit (1) 1
authentifizierung (1) 1
authorization (1) 1
base station (1) 1
base stations (1) 1
batch normalization (1) 1
big data (1) 1
biofertilizers (1) 1
bioinformatik (1) 1
biological cells (1) 1
biological water (1) 1
biologie (1) 1
blackhole attack (1) 1
body regions (1) 1
borohydrides - chemistry (1) 1
breadth-first search (1) 1
breast-cancer (1) 1
bridges (1) 1
brittleness (1) 1
business (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2019, Volume 897, pp. 3 - 14
Conference Proceeding
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 710, pp. 625 - 635
Conference Proceeding
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2018, Volume 710, pp. 583 - 592
Conference Proceeding
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2014, Volume 327, pp. 421 - 428
Conference Proceeding
Advances in Intelligent Systems and Computing, ISSN 2194-5357, 2012, Volume 176, Issue 1, pp. 777 - 788
Conference Proceeding
Innovations in Systems and Software Engineering, ISSN 1614-5046, 9/2016, Volume 12, Issue 3, pp. 239 - 248
Content management system (CMS) is an infrastructure for efficient distribution, organization, and delivery of digital content. It is desirable that the... 
Web server replica placement | Computer Applications | Content delivery network interconnection | Software Engineering | Computer Science | Computing Methodologies | Hierarchical CDNI architecture | Content caching | Computer science | Legislators | Models | Algorithms | Web site management software | Analysis
Journal Article
Communications in Computer and Information Science, ISSN 1865-0929, 2017, Volume 776, pp. 440 - 450
Conference Proceeding
International Journal of Computer Applications, ISSN 0975-8887, 01/2011, Volume 12, Issue 11
  Trust management now-a-days provides a promising approach for supporting access control in open environments. Trust transfer is a common technique employed... 
Access control | Databases | Computer simulation | Management systems | Negotiations | Mathematical models | Management
Journal Article
Smart Innovation, Systems and Technologies, ISSN 2190-3018, 2016, Volume 44, pp. 337 - 345
Conference Proceeding
2012, 2012, Lecture Notes in Electrical Engineering, ISBN 9789400745155, Volume 164, Issue 1
This research aims to develop an enhanced version of AODV including trust and reputation that will ensure the transmission of messages in a secure way avoiding... 
Engineering | Communications Engineering, Networks | Computer Systems Organization and Communication Networks | Information Systems Applications (incl. Internet) | Multimedia Information Systems | Computational Science and Engineering | Trustor | Wormhole attack | Trustee | Direct trust | Indirect trust | AODV
Book Chapter
Smart Innovation, Systems and Technologies, ISSN 2190-3018, 2016, Volume 44, pp. 71 - 82
Conference Proceeding
Smart Innovation, Systems and Technologies, ISSN 2190-3018, 2014, Volume 28, Issue 2, pp. 59 - 66
Conference Proceeding
2016 5th International Conference on Computer Science and Network Technology (ICCSNT), 12/2016, pp. 497 - 501
Software Defined Network (SDN), a very new idea in networking domain, promises to dramatically simplify network management and enable innovation through... 
Computer science | Handheld computers | SDN | Computer crime | Denial of Service attack | OpenFlow
Conference Proceeding
2016 5th International Conference on Computer Science and Network Technology (ICCSNT), 12/2016, pp. 240 - 246
Extraction of knowledge and predictive analysis are the new challenges for the rapidly growing large volume of data to make the right decision at right time.... 
Degree of Dependency | Rough sets | Big Data | Programming | Tools | Rough Set | Data mining | Positive region | Reduct | MapReduce
Conference Proceeding
2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), 12/2016, pp. 155 - 160
Social network can be viewed as a relationship between the set of connected entities, represented by a large graph consisting of vertices and edges. Dynamicity... 
Computer science | Greedy algorithms | degree centrality | Social network services | Computational modeling | edge contribution factor | Clustering algorithms | clustering co-efficient | influential node | Mathematical model | Time complexity | Clustering co-efficient | Edge contribution factor | Degree centrality | Influential node
Conference Proceeding
Proceedings of 2013 3rd International Conference on Computer Science and Network Technology, 10/2013, pp. 929 - 935
Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly... 
Context | DSR | MANET | Intrusion detection | Cooperative systems | IDS | Routing protocols | ADHOC | Monitoring | Cooperative IDS | Mobile ad hoc networks
Conference Proceeding
8th International Conference on Electrical and Computer Engineering, 12/2014, pp. 437 - 440
Content Management System (CMS) is one of the recent upcoming concepts due to its efficient and explicit use in the real world applications. The demand for... 
Multichannel Publishing | Data Analytics(DA) | Natural Language Processing(NLP) | Content management | Security | Data mining | Language Management | Next generation networking | Fragmentation Management | Garbage Collection | Natural language processing | Internet | Copyright Management
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.