best papers in computer network




As computer systems and networks have evolved and grown more complex, the role of the IT department in most companies has transformed primarily to ensuring that they continue to operate without disruption. IT spending, as reported by a variety of studies, shows the trend

Reversal of methotrexate binding to dihydrofolate reductase by dihydrofolate. Studies with pure enzyme and computer modeling using network thermodynamics
free download

The folate analog, methotrexate, binds very tightly to dihydrofolate reductase. However, free intracellular methotrexate in excess of the enzyme-binding capacity is needed to suppress cellular dihydrofolate reduction, and the effects of methotrexate are rapidly reversible if

Digital computer solution of power flow problems
free download

The same method can, of course, be organized for other types of computers. The method has been pre- pared for the Purdue computer in a general program which will accept any network of a size up to 50 busses and 200 branches. Network Connections and Impedances Fig

Distributed loop network with minimum transmission delay
free download

Distributed loop networks are networks with at least one ring structure. They are widely used in the design of local area networks, multimodule memory organizations, data alignments in parallel memory systems, and supercomputer architecture. In this paper, we give a

A review on taxonomies of attacks and vulnerability in computer and network system
free download

In order to gain trusted system detection and remediation of vulnerability is crucial. In computer network to solve the problem of security vulnerability, study of vulnerability is essential to know cause of vulnerability. By considering the characteristics and behavior of

Network security: History, importance, and future
free download

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology

Network and multidimensional representations of the declarative knowledge of human- computer interface design experts
free download

A two-part experiment investigated human computer interface (HCI) experts organization of declarative knowledge about the HCI. In Part two groups of experts in HCI design-human factors experts and software development expertsand a control group of non-experts sorted

Educating computer scientists: Linking the social and the technical
free download

into our professional lives. Imagine an individual who spends most evenings logged on to a computer network , engaged in written conversation with other like-minded individuals across the globe. Such activity well bring A network computer , or netcomputer,1 consists of a large number of hosts embedded in a network of interconnected broad- cast buses. It has no global clock or shared memory 8. JF Shoch et al., Evolution of the Ethernet Local Com- puter Network , Computer , Vol. 1 No

Communication architecture for underwater wireless sensor network
free download

Investigations in hydrologic sciences are bounded because most of existing water surveillance methods are manual. Such systems are incapable to gather information at spatial and temporal level due to location constraints. In this paper, we present a new

Computer immunology
free download

Other events of interests include those that violate a predefined security policy, such as attempts to affect the confidentiality, integrity or availability of a computer network . Page 9. 2 It is commonly believed that to secure a computer network , a firewall is most suited for the task

Combating imbalance in network intrusion datasets.
free download

Index Terms Computer Network Security, Imbalanced Datasets, Classification, ROC Curves I. INTRODUCTION Network intrusion detection refers to the set of techniques used to isolate attacks against computers and networksA back-end storage network , or BSN, is the collec- tion of interconnected equipment that provides shared storage services to a set of general-purpose host computers. It is a logical subnetwork func- tion-not necessarily aphysically separate hardware subnetwork-within a

A proposed optimized and efficient intrusion detection system for wireless sensor network
free download

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion detection system (IDS)

E-Talk: Computer -assisted classroom discussion-attitudes and motivation
free download

However, they almost never did this while on the computer network . Did you also notice this If so, why do you think this happens 2. What effect, if any, do you think the computer network had on the students discussion Did students tend to talk more or less on the computer

Location Prediction of Mobility Management Using Soft Computing Techniques in Cellular Network
free download

This work describes the neural network technique to solve location management problem. A multilayer neural model is designed to predict the future prediction of the subscriber based on the past predicted information of the subscriber. In this research work, a prediction based

Communities on-line: community-based computer networks
free download

ABSTRACT A community network is a network of computers and modems that are interconnected via telephone lines to a central computer . The system provides local information and a means for community residents to communicate electronically

Wireless network security
free download

All the vulnerabilities that exist in a conventional wired network apply to wireless technologies. + Malicious entities gain unauthorized access to an agencys computer network through wireless connections, bypassing any firewall protectionsA distri- buted computer system is basically an interconnection of processing elements, each having certain capabilities, communicating with other elements througha network , and working on a set of related or unrelated jobs

Detection of covert channel encoding in network packet delays
free download

Categories and Subject Descriptors C.2.0 [ Computer -Communication Network ]: General Data communications; D.4.6 [Software]: Security and Pro- tection Information flow controls, Security and protection; K.6.5 [Management of Computing and Information Systems]: Security CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER

IEEE PAPER UNITED STATES