networking p2p grids unstructured p2p networks p2p search wireless ad-hoc network computerscience engineering computer science structured p2p systems wireless sensor network peer to peer peer-to-peer networks peer clustering information technology ad hoc and sensor networks social networking computer networks unstructured p2p social networks • social networks query routing live streaming trust peer –to-peer information sharing semantic search peer to peer (p2p) bloom filters network theory network robustness • ad hoc and sensor networks mobile p2p iot p2p information retrieval cloud computing local reconfiguration retaliation rule internet of things • mobile p2p wireless sensor network (wsn) p2p economics commercial applications node movement load balancing replication p2p local monitoring misrouting colluding collision identity delegation dialog systems discourse leach cc ontology elliptic curve cryptography social network peerfactsim dht pastry kademlia reputation and fairness performance evaluation. static failure fault-tolerance adhoc and sensor networks routing • p2p information retrieval information security adhoc sensor netwoks peer-to-peer cluster head selection network life time network distributed computing ad hoc networks leach c congestion control leach peer selection sensor networks ip route record • p2p economics • p2p grids timestamp high speed networks network applications mobile and wireless networks machine learning security complete binary tree topology awareness distributed algorithm p2p applications and services region –based key agreement ad-hoc networks delay-tolerant p2p systems blockchain privacy mutual exclusion • security in p2p systems text mining nlp information retrieval critical resource. permission p2p networks can chord amr security in p2p systems p2p computing arduino touch screen. dynamic tariff p2p and wireless convergence energy monitoring iot-based medical deviceand applications. big data dsdv ex-dsr and ns2.34 aodv mobility models residual energy. access policy. video streaming attribute based encryption push-pull mesh structure chunking/shallow parsing information internet and web applications data mining. inscription epigraphy paleography iot security and privacy support vector machine (svm) real time systems optical character recognition (ocr) bandwidth allocation scalable monitoring attacks fpga based systems embedded information processing video processing speech processing image processing signal processing networks physical peer adaptive mesh tracking peer-to-peer streaming wireless computer multi-streaming simulation polygon approximation. software engineering software testing inormation technology mesh-pull approach mobile networks blockchain defensive mechanism blockchain foundations detection real time application encryption robotics protocols and services speech recognition spoken language processing ai lexical semantics information extraction permission based algorithm token based algorithm lazy replication protocols eager replication dynamic primary copy fault tolerance data replication ubiquitous computing distributed database reputation and fairness in p2p systems p2p technology and sensors advances in theoretical foundations of p2p peer-to-peer networking internet of things (iot) linguistic resources parsing/grammatical formalisms advances in theoretical founda artificial intelligence cps 5g/6g cellular systems artificial intelligence (ai) autonomous networking redundancy and network traffic access latency decentralized fault tolerance. data mining cryptography replica placement overlay architectures higher-level query support in peer-to-peer network distributed computing network bioinformatics overlay multicasting network services and applications mobile computing block chain issues and trends security and privacy for iot connectivity block chain elgamal tree and mesh topology. human-notion of trust insider outsider digital signature k-means algorithm lambda architecture schnorr overlay multicast video on demand (vod) data security real time intrusion system social network analysis educational data mining (edm) signcryption decision tree academic performance network operation and management discrete algorithms and discrete modeling communication network protocols communication network architectures and design • network applications • mobile and wireless networks future internet architecture • future internet architecture • emerging technologies for next generation networ • discrete algorithms and discrete modeling • communication network protocols emerging technologies for next generation network social networks & web 2.0 trust management • communication network architectures and design policy of trust in e-leaning systems network security and privacy ubiquitous networks & cloud computing residual energy • network operation and management • mobile and wireless networks • network applicati p2p workload characterization and simulation cooperation and collaboration in p2p systems and cloud computing telematics wireless systems agile  ai for supporting software a  artifacts software validat  automata theory devops models practices chal intelligent software systems agile and devops iot software engineering machine translation paraphrasing/entailment/genera cooperation and collaboration biomass distribution power system eco-design electricity storage energy harvesting semantic processing paraphrasing modeling for tracking locating mobile users architectures algorithms wireless computing mobile applications os broadband multimedia systems applications wireless & mobile networks reputation workload mobile communications telematics mobile network management f mobile communications mobile business enterprise green technology phishing e-mail fraud programming languages hardware-based attacks wireless convergence p2p workload blockchain attacks on existing cybercrime knowledge discovery digital convergence electronic commerce intelligent robotics hardware and software design peer to peer network heterogeneous networks big data/cloud computing and n cyber-physical system heterogeneous wireless network measurement & performance anal  5g/6g cellular systems hydroelectric power renewable energy for electroni sea power smart grid wind energy nformation extraction question answering applied cryptography machine learning for security distributed systems blockchain technology cryptocurrencies cyber security cloud fog cognitive security database system security e-mail security spam cyber-physical system (cps multimedia network protocol epidemic based update protocols consistency timestamps • p2p technology and sensors software development sotware engineer internet • p2p systems over mobile networks • protocols and algorithms blockchain new design iot applications and services blockchain scalability iot connectivity and networking switching and addressing techniques wireless internet mobile & broadband wireless communications ubiquitous networks mobile ad hoc network train-the-teacher best practices pre-service technology training technology integration traditional licensure training • quantum physics • spectroscopy • plasma physics • applied & fiber optics 5g/6g cellular systems and heterogeneous networks networks and communications hybrid reputation compatibility coefficient group splitting schema p2p system adhoc networks chord. software mobile ad hoc grid computing networking and architectures optical computing software systems theory of parallel wireless networks iot-enabled innovation entrepreneurship iot applications iot services experimental results deployment scenarios electronics signal processing for iot network security wireless multimedia systems 5g and networks for big data big data analytics big data management deep learning data allocation switching visualization security and privacy electronics and signal processing social media satellite communications linguistic phonology morphology  pos tagging computing protocols and algorithms case studies and theories parallel processing cloud computing architecture cloud storage and file systems nosql data stores virtualization on platforms in algorithms and applications connectivity and networking
See more