Explore our comprehensive collection of books, articles, digital media, and more
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Quality of service routing for multimedia multicast over Ad Hoc networks \
Network routing : algorithms, protocols, and architectures /
Routing in today's internetworks : the routing protocols of IP, DECnet, Netware, and AppleTalk /
Cognitive radio technology applications for wireless and mobile ad hoc networks
Efficient Mac protocols for Next-Generation Wireless Lan /
Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \
Collaborative Caching for Efficient and Robust Certificate Authority Services in Mobile Ad-Hoc Networks /
Enhancement of IEEE 802.11 maclayer handoff process and protocol \
Energy Aware Routing Protocol for Wireless Sensor Networks / By Hajer Saleh supervised by Mostafa E. A. Ibrahim
Smart phone and next generation mobile computing /
Network protocol handbook /
Fundamentals of wireless networking /
Wireless communications and networking /
Quality of Service Routing in Communication Networks : Algorithm and Partitioning Thechniques /
Optimizing wireless communication systems /
A threshold secret sharing scheme for self-securing noisy mobile ad hoc networks \
Mobile communications/
Introduction to wireless and mobile systems /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
A Mobile Application for Technical Fault Reporting at Imam University /
The Impact of using smart phones on improving EFL Saudi students' reading and writing skills/
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Mobile computing /
Wireless and mobile network architectures /
3G evolution : HSPA and LTE for mobile broadband /
Encyclopedia of mobile computing and commerce /
Building mobile library applications /
A distributed artificial intelligent scheme for channels allocation in cellular communication networks \
Data communication principles : for fixed and wireless networks /
An adaptive bit-level text compression scheme based on the HCDC algorithm \
Development and performance evaluation of a bit-level text compression scheme based on the adaptive character wordlength algorithm /