Tags
networking
p2p grids
unstructured p2p networks
p2p search
wireless ad-hoc network
computerscience engineering
computer science
structured p2p systems
wireless sensor network
peer to peer
peer-to-peer networks
peer clustering
information technology
ad hoc and sensor networks
social networking
computer networks
unstructured p2p
social networks
• social networks
query routing
live streaming
trust
peer –to-peer information sharing
semantic search
peer to peer (p2p)
bloom filters
network theory
network robustness
• ad hoc and sensor networks
mobile p2p
iot
p2p information retrieval
cloud computing
local reconfiguration
retaliation rule
internet of things
• mobile p2p
wireless sensor network (wsn)
p2p economics
commercial applications
node movement
load balancing
replication
p2p
local monitoring
misrouting
colluding collision
identity delegation
dialog systems
discourse
leach cc
ontology
elliptic curve cryptography
social network
peerfactsim
dht
pastry
kademlia
reputation and fairness
performance evaluation.
static failure
fault-tolerance
adhoc and sensor networks
routing
• p2p information retrieval
information security
adhoc sensor netwoks
peer-to-peer
cluster head selection
network life time
network
distributed computing
ad hoc networks
leach c
congestion control
leach
peer selection
sensor networks
ip
route record
• p2p economics
• p2p grids
timestamp
high speed networks
network applications
mobile and wireless networks
machine learning
security
complete binary tree
topology awareness
distributed algorithm
p2p applications and services
region –based key agreement
ad-hoc networks
delay-tolerant p2p systems
blockchain privacy
mutual exclusion
• security in p2p systems
text mining
nlp
information retrieval
critical resource.
permission
p2p networks
can
chord
amr
security in p2p systems
p2p computing
arduino
touch screen.
dynamic tariff
p2p and wireless convergence
energy monitoring
iot-based medical deviceand applications.
big data
dsdv
ex-dsr and ns2.34
aodv
mobility models
residual energy.
access policy.
video streaming
attribute based encryption
push-pull
mesh structure
chunking/shallow parsing
information
internet and web applications
data mining.
inscription
epigraphy
paleography
iot security and privacy
support vector machine (svm)
real time systems
optical character recognition (ocr)
bandwidth allocation
scalable monitoring
attacks
fpga based systems
embedded
information processing
video processing
speech processing
image processing
signal processing
networks
physical
peer
adaptive mesh
tracking
peer-to-peer streaming
wireless
computer
multi-streaming
simulation
polygon approximation.
software engineering
software testing
inormation technology
mesh-pull approach
mobile networks
blockchain
defensive mechanism
blockchain foundations
detection
real time application
encryption
robotics
protocols and services
speech recognition
spoken language processing
ai
lexical semantics
information extraction
permission based algorithm
token based algorithm
lazy replication
protocols
eager replication
dynamic primary copy
fault tolerance
data replication
ubiquitous computing
distributed database
reputation and fairness in p2p systems
p2p technology and sensors
advances in theoretical foundations of p2p
peer-to-peer networking
internet of things (iot)
linguistic resources
parsing/grammatical formalisms
advances in theoretical founda
artificial intelligence
cps
5g/6g cellular systems
artificial intelligence (ai)
autonomous networking
redundancy
and network traffic
access latency
decentralized
fault tolerance.
data mining
cryptography
replica placement
overlay architectures
higher-level query support in
peer-to-peer network
distributed computing network
bioinformatics
overlay multicasting
network services and applications
mobile computing
block chain issues and trends
security and privacy for iot
connectivity
block chain
elgamal
tree and mesh topology.
human-notion of trust
insider
outsider
digital signature
k-means algorithm
lambda architecture
schnorr
overlay multicast
video on demand (vod)
data security
real time intrusion system
social network analysis
educational data mining (edm)
signcryption
decision tree
academic performance
network operation and management
discrete algorithms and discrete modeling
communication network protocols
communication network architectures and design
• network applications
• mobile and wireless networks
future internet architecture
• future internet architecture
• emerging technologies for next generation networ
• discrete algorithms and discrete modeling
• communication network protocols
emerging technologies for next generation network
social networks & web 2.0 trust management
• communication network architectures and design
policy of trust in e-leaning systems
network security and privacy
ubiquitous networks & cloud computing
residual energy
• network operation and management
• mobile and wireless networks • network applicati
p2p workload characterization and simulation
cooperation and collaboration in p2p systems
and cloud computing
telematics wireless systems
agile
ai for supporting software a
artifacts
software validat
automata theory
devops models
practices
chal
intelligent software systems
agile and devops
iot software engineering
machine translation
paraphrasing/entailment/genera
cooperation and collaboration
biomass
distribution power system
eco-design
electricity storage
energy harvesting
semantic processing
paraphrasing
modeling for tracking
locating mobile users
architectures
algorithms
wireless computing
mobile applications
os
broadband
multimedia systems
applications
wireless & mobile networks
reputation
workload
mobile communications
telematics
mobile network management
f mobile communications
mobile business enterprise
green technology
phishing
e-mail fraud
programming languages
hardware-based attacks
wireless convergence
p2p workload
blockchain attacks on existing
cybercrime
knowledge discovery
digital convergence
electronic commerce
intelligent robotics
hardware and software design
peer to peer network
heterogeneous networks
big data/cloud computing and n
cyber-physical system
heterogeneous wireless network
measurement & performance anal
5g/6g cellular systems
hydroelectric power
renewable energy for electroni
sea power
smart grid
wind energy
nformation extraction
question answering
applied cryptography
machine learning for security
distributed systems
blockchain technology
cryptocurrencies
cyber security
cloud
fog
cognitive security
database
system security
e-mail security
spam
cyber-physical system (cps
multimedia
network protocol
epidemic based update protocols
consistency
timestamps
• p2p technology and sensors
software development
sotware engineer
internet
• p2p systems over mobile networks
• protocols and algorithms
blockchain new design
iot applications and services
blockchain scalability
iot connectivity and networking
switching and addressing techniques
wireless internet
mobile & broadband
wireless communications
ubiquitous networks
mobile ad hoc network
train-the-teacher
best practices
pre-service technology training
technology integration
traditional licensure training
• quantum physics
• spectroscopy
• plasma physics
• applied & fiber optics
5g/6g cellular systems and heterogeneous networks
networks and communications
hybrid reputation
compatibility coefficient
group splitting
schema
p2p system
adhoc networks
chord.
software
mobile ad hoc
grid computing
networking and architectures
optical computing
software systems
theory of parallel
wireless networks
iot-enabled innovation
entrepreneurship
iot applications
iot services
experimental results
deployment scenarios
electronics
signal processing for iot
network security
wireless multimedia systems
5g and networks for big data
big data analytics
big data management
deep learning
data allocation
switching
visualization
security and privacy
electronics and signal processing
social media
satellite communications
linguistic
phonology
morphology
pos tagging
computing
protocols and algorithms
case studies and theories
parallel processing
cloud computing architecture
cloud storage and file systems
nosql data stores
virtualization on platforms in
algorithms and applications
connectivity and networking
See more
Documents
(158)Tags
networking
p2p grids
unstructured p2p networks
p2p search
wireless ad-hoc network
computerscience engineering
computer science
structured p2p systems
wireless sensor network
peer to peer
peer-to-peer networks
peer clustering
information technology
ad hoc and sensor networks
social networking
computer networks
unstructured p2p
social networks
• social networks
query routing
live streaming
trust
peer –to-peer information sharing
semantic search
peer to peer (p2p)
bloom filters
network theory
network robustness
• ad hoc and sensor networks
mobile p2p
iot
p2p information retrieval
cloud computing
local reconfiguration
retaliation rule
internet of things
• mobile p2p
wireless sensor network (wsn)
p2p economics
commercial applications
node movement
load balancing
replication
p2p
local monitoring
misrouting
colluding collision
identity delegation
dialog systems
discourse
leach cc
ontology
elliptic curve cryptography
social network
peerfactsim
dht
pastry
kademlia
reputation and fairness
performance evaluation.
static failure
fault-tolerance
adhoc and sensor networks
routing
• p2p information retrieval
information security
adhoc sensor netwoks
peer-to-peer
cluster head selection
network life time
network
distributed computing
ad hoc networks
leach c
congestion control
leach
peer selection
sensor networks
ip
route record
• p2p economics
• p2p grids
timestamp
high speed networks
network applications
mobile and wireless networks
machine learning
security
complete binary tree
topology awareness
distributed algorithm
p2p applications and services
region –based key agreement
ad-hoc networks
delay-tolerant p2p systems
blockchain privacy
mutual exclusion
• security in p2p systems
text mining
nlp
information retrieval
critical resource.
permission
p2p networks
can
chord
amr
security in p2p systems
p2p computing
arduino
touch screen.
dynamic tariff
p2p and wireless convergence
energy monitoring
iot-based medical deviceand applications.
big data
dsdv
ex-dsr and ns2.34
aodv
mobility models
residual energy.
access policy.
video streaming
attribute based encryption
push-pull
mesh structure
chunking/shallow parsing
information
internet and web applications
data mining.
inscription
epigraphy
paleography
iot security and privacy
support vector machine (svm)
real time systems
optical character recognition (ocr)
bandwidth allocation
scalable monitoring
attacks
fpga based systems
embedded
information processing
video processing
speech processing
image processing
signal processing
networks
physical
peer
adaptive mesh
tracking
peer-to-peer streaming
wireless
computer
multi-streaming
simulation
polygon approximation.
software engineering
software testing
inormation technology
mesh-pull approach
mobile networks
blockchain
defensive mechanism
blockchain foundations
detection
real time application
encryption
robotics
protocols and services
speech recognition
spoken language processing
ai
lexical semantics
information extraction
permission based algorithm
token based algorithm
lazy replication
protocols
eager replication
dynamic primary copy
fault tolerance
data replication
ubiquitous computing
distributed database
reputation and fairness in p2p systems
p2p technology and sensors
advances in theoretical foundations of p2p
peer-to-peer networking
internet of things (iot)
linguistic resources
parsing/grammatical formalisms
advances in theoretical founda
artificial intelligence
cps
5g/6g cellular systems
artificial intelligence (ai)
autonomous networking
redundancy
and network traffic
access latency
decentralized
fault tolerance.
data mining
cryptography
replica placement
overlay architectures
higher-level query support in
peer-to-peer network
distributed computing network
bioinformatics
overlay multicasting
network services and applications
mobile computing
block chain issues and trends
security and privacy for iot
connectivity
block chain
elgamal
tree and mesh topology.
human-notion of trust
insider
outsider
digital signature
k-means algorithm
lambda architecture
schnorr
overlay multicast
video on demand (vod)
data security
real time intrusion system
social network analysis
educational data mining (edm)
signcryption
decision tree
academic performance
network operation and management
discrete algorithms and discrete modeling
communication network protocols
communication network architectures and design
• network applications
• mobile and wireless networks
future internet architecture
• future internet architecture
• emerging technologies for next generation networ
• discrete algorithms and discrete modeling
• communication network protocols
emerging technologies for next generation network
social networks & web 2.0 trust management
• communication network architectures and design
policy of trust in e-leaning systems
network security and privacy
ubiquitous networks & cloud computing
residual energy
• network operation and management
• mobile and wireless networks • network applicati
p2p workload characterization and simulation
cooperation and collaboration in p2p systems
and cloud computing
telematics wireless systems
agile
ai for supporting software a
artifacts
software validat
automata theory
devops models
practices
chal
intelligent software systems
agile and devops
iot software engineering
machine translation
paraphrasing/entailment/genera
cooperation and collaboration
biomass
distribution power system
eco-design
electricity storage
energy harvesting
semantic processing
paraphrasing
modeling for tracking
locating mobile users
architectures
algorithms
wireless computing
mobile applications
os
broadband
multimedia systems
applications
wireless & mobile networks
reputation
workload
mobile communications
telematics
mobile network management
f mobile communications
mobile business enterprise
green technology
phishing
e-mail fraud
programming languages
hardware-based attacks
wireless convergence
p2p workload
blockchain attacks on existing
cybercrime
knowledge discovery
digital convergence
electronic commerce
intelligent robotics
hardware and software design
peer to peer network
heterogeneous networks
big data/cloud computing and n
cyber-physical system
heterogeneous wireless network
measurement & performance anal
5g/6g cellular systems
hydroelectric power
renewable energy for electroni
sea power
smart grid
wind energy
nformation extraction
question answering
applied cryptography
machine learning for security
distributed systems
blockchain technology
cryptocurrencies
cyber security
cloud
fog
cognitive security
database
system security
e-mail security
spam
cyber-physical system (cps
multimedia
network protocol
epidemic based update protocols
consistency
timestamps
• p2p technology and sensors
software development
sotware engineer
internet
• p2p systems over mobile networks
• protocols and algorithms
blockchain new design
iot applications and services
blockchain scalability
iot connectivity and networking
switching and addressing techniques
wireless internet
mobile & broadband
wireless communications
ubiquitous networks
mobile ad hoc network
train-the-teacher
best practices
pre-service technology training
technology integration
traditional licensure training
• quantum physics
• spectroscopy
• plasma physics
• applied & fiber optics
5g/6g cellular systems and heterogeneous networks
networks and communications
hybrid reputation
compatibility coefficient
group splitting
schema
p2p system
adhoc networks
chord.
software
mobile ad hoc
grid computing
networking and architectures
optical computing
software systems
theory of parallel
wireless networks
iot-enabled innovation
entrepreneurship
iot applications
iot services
experimental results
deployment scenarios
electronics
signal processing for iot
network security
wireless multimedia systems
5g and networks for big data
big data analytics
big data management
deep learning
data allocation
switching
visualization
security and privacy
electronics and signal processing
social media
satellite communications
linguistic
phonology
morphology
pos tagging
computing
protocols and algorithms
case studies and theories
parallel processing
cloud computing architecture
cloud storage and file systems
nosql data stores
virtualization on platforms in
algorithms and applications
connectivity and networking
See more