×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of ijcnc
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS
353 views
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
801 views
8The Affects of Different Queuing Algorithms within the Router on QoS VoIP application Using OPNET
572 views
PREDICTING COMMUNICATION DELAY AND ENERGY CONSUMPTION FOR IEEE 802.15.4/ZIGBEE WIRELESS SENSOR NETWORKS
611 views
Improving Quality of Service and Reducing Power Consumption with WAN accelerator in Cloud Computing Environments
360 views
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
395 views
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
734 views
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
851 views
Finite horizon adaptive optimal distributed Power Allocation for Enhanced Cognitive Radio Network in the presence of Channel Uncertainties
247 views
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FUNCTION TECHNIQUES FOR ERROR PROBABILITY ANALYSIS IN FADING CHANNELS
578 views
A New Improved Storage Model of Wireless Devices using the Cloud
614 views