استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
A threshold secret sharing scheme for self-securing noisy mobile ad hoc networks \
Cognitive radio technology applications for wireless and mobile ad hoc networks
Quality of service routing for multimedia multicast over Ad Hoc networks \
Collaborative Caching for Efficient and Robust Certificate Authority Services in Mobile Ad-Hoc Networks /
New leader election algorithms in hypercube networks \
Wireless ad hoc and sensor networks : a cross-layer design perspective /
Introduction to the design & analysis of algorithms /
Network routing : algorithms, protocols, and architectures /
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
The design and analysis of algorithms /
Algorithms /
An Energy Efficient Routing Algorithm Using Chaotic Grey Wolf with Mobile Sink-Based Path Optimization for Wireless Sensor Networks /
Proposed method of factorization analysis to break the RSA algorithm \
Introduction to algorithms /
Computer vision : algorithms and applications /
Data structures and algorithms : with object-oriented design patterns in C++ /
An introduction to data structures and algorithms /
Computers and intractability : a guide to the theory of NP-completeness /
Algorithms in C++ /
Data structures and algorithms in Java /
Constraint-handling in evolutionary optimization /
Data structures and algorithm analysis in Java /
Algorithms and computation : 17th international symposium, ISAAC 2006, Kolkata, India, December 18-20, 2006 ; proceedings /
Operating systems theory
Data structures and an introduction to algorithms : lab manual /
Data structures and algorithms in C++ /
An introduction to computer science : an algorithmic approach /
Arabic Handwritten Character Segmentation Using Graph Theory Algorithm /
ARMA model orders and parameters estimation using evolutionary algorithm= تقدير درجة ومعاملات متسلسلات المتوسط المتحرك التدريجي الذاتي باستخدام الخوارزميات المتطورة /
Advanced data mining and applications : second international conference, ADMA 2006, Xi'an, China, August 14-16, 2006 : proceedings /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /