Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
181 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2 - COMPUTER-COMMUNICATION NETWORKS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
A Novel LSB Steganography Technique Using Image Segmentation
Yasir Yakup Demircan
,
Serhat Ozekes
10.3897/jucs.105702
28-03-2024
Unique: 45 | Total: 47
| Access Period:
308-332
HTML
XML
PDF
Research Article
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication
Shanshan Jia
,
Gaukhar A. Kamalova
,
Dmytro Mykhalevskiy
10.3897/jucs.108446
28-02-2024
Unique: 228 | Total: 317
| Access Period:
204-220
HTML
XML
PDF
Research Article
diffReplication - An Energy-Aware Fault Tolerance Model for Silent Error Detection and Mitigation in Heterogeneous Extreme-scale Computing Environment
Longhao Li
,
Taieb Znati
,
Rami Melhem
10.3897/jucs.94462
28-08-2023
Unique: 499 | Total: 681
| Access Period:
892-910
HTML
XML
PDF
Research Article
Big Data Provenance Using Blockchain for Qualitative Analytics via Machine Learning
Kashif Mehboob Khan
,
Warda Haider
,
Najeed Ahmed Khan
,
Darakhshan Saleem
10.3897/jucs.93533
28-05-2023
Unique: 896 | Total: 1203
| Access Period:
446-469
HTML
XML
PDF
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 1150 | Total: 1753
| Access Period:
1330-1346
HTML
XML
PDF
Research Article
Traffic Optimization with Software-Defined Network Controller on a New User Interface
Derya Yiltas-Kaplan
10.3897/jucs.80625
28-06-2022
Unique: 1371 | Total: 2148
| Access Period:
648-669
HTML
XML
PDF
Research Article
A Spark Parallel Betweenness Centrality Computation and its Application to Community Detection Problems
Daniel Gomez González
,
Luis Llana Díaz
,
Cristóbal Pareja
10.3897/jucs.80688
28-02-2022
Unique: 1080 | Total: 1840
| Access Period:
160-180
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 1261 | Total: 2210
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices
Mathieu Briland
,
Fabrice Bouquet
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70326
28-07-2021
Unique: 1319 | Total: 2427
| Access Period:
774-792
HTML
XML
PDF
Research Article
Weather Station IoT Educational Model Using Cloud Services
Ján Molnár
,
Simona Kirešová
,
Tibor Vince
,
Dobroslav Kováč
,
Patrik Jacko
,
Matej Bereš
,
Peter Hrabovský
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.079
28-11-2020
Unique: 914 | Total: 1506
| Access Period:
1495-1512
HTML
XML
PDF
Research Article
Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices
Lelio Campanile
,
Mauro Iacono
,
Fiammetta Marulli
,
Michele Mastroianni
,
Nicola Mazzocca
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.077
28-11-2020
Unique: 907 | Total: 1391
| Access Period:
1455-1474
HTML
XML
PDF
Research Article
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
Łukasz Apiecionek
,
Matusz Biedziak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.076
28-11-2020
Unique: 669 | Total: 1138
| Access Period:
1435-1454
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK