Study Resource
Explore Categories
Arts & Humanities
Business
Engineering & Technology
Foreign Language
History
Math
Science
Social Science
Top subcategories
Advanced Math
Algebra
Basic Math
Calculus
Geometry
Linear Algebra
Pre-Algebra
Pre-Calculus
Statistics And Probability
Trigonometry
other →
Top subcategories
Astronomy
Astrophysics
Biology
Chemistry
Earth Science
Environmental Science
Health Science
Physics
other →
Top subcategories
Anthropology
Law
Political Science
Psychology
Sociology
other →
Top subcategories
Accounting
Economics
Finance
Management
other →
Top subcategories
Aerospace Engineering
Bioengineering
Chemical Engineering
Civil Engineering
Computer Science
Electrical Engineering
Industrial Engineering
Mechanical Engineering
Web Design
other →
Top subcategories
Architecture
Communications
English
Gender Studies
Music
Performing Arts
Philosophy
Religious Studies
Writing
other →
Top subcategories
Ancient History
European History
US History
World History
other →
Top subcategories
Croatian
Czech
Finnish
Greek
Hindi
Japanese
Korean
Persian
Swedish
Turkish
other →
Profile
Documents
Logout
Upload
Engineering & Technology
Computer Science
Computer Networks
Engineering & Technology
Computer Science
Computer Networks
A Simple and Efficient MAC-Routing Integrated Algorithm for Sensor
A Silent SMS Denial of Service (DoS) Attack
A Signal Analysis of Network Traffic Anomalies
A Shared Infrastructure for Overlay Applications
A Shared Global Event Propagation System to Enable Next Generation
a set of sensor nodes in the same locality
A Service-Oriented Approach to Application Development
A Server-mediated Peer-to-peer System
a sequence preserving efficient packet scheduler using
A Semantic-based Middleware for Multimedia Collaborative
a security survey of authenticated routing protocol (aran)
A Security Primer and Overview of Network Security Protocols
A Security Pattern for a Virtual Private Network
A Security Model for VoIP Steganography
A Security Model for VoIP Steganography
A Security Analysis of the Gnutella Peer-to
A secure routing protocol for ad hoc networks
A Secure Intrusion - Detection System for Vulnerable Attacks in
A Secure Distributed Hash Table - PDOS-MIT
A Scheme for a Guaranteed Minimum Throughput Service
A Schema-Associative Model of Memory
<
1
...
570
571
572
573
574
575
576
577
578
...
1178
>