Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   19  
      YogaDancingExercise therapyMuscle strength
External ventricular drains (EVDs) are commonly used to facilitate removal of cerebrospinal fluid in patients with neurologic dysfunction. Despite a high risk for infection (upward of 45%), many hospitals lack strict protocols for EVD... more
    • by 
    •   5  
      NeuroscienceHealth SciencesHealth PromotionQuality Management
Diplomatic Protocol & Etiquette
Basics
    • by 
    •   17  
      Diplomatic HistoryPublic DiplomacyDress and identityCultural Diplomacy
    • by 
    •   6  
      Eye Movement Desensitization and Reprocessing (EMDR)Posttraumatic Stress Disorder (PTSD)ProtocolsTraumatherapy EMDR
    • by 
    •   11  
      Computer ScienceDistributed SystemMiddlewareDistributed Processing
    • by 
    •   17  
      Computer ScienceComputer ArchitectureSoftware EngineeringCommunication
    • by 
    •   3  
      ProtocolsData PrivacyInternet
    • by 
    •   7  
      Automatic ControlControl SystemsIntrusion DetectionProtocols
    • by 
    •   6  
      AdvertisingRoutingProtocolsComputer Languages
    • by 
    •   20  
      Computer ScienceSignal ProcessingCongestion ControlQueueing theory
    • by 
    •   8  
      Air traffic controlProtocolsBroadband NetworksFrequency
    • by 
    •   12  
      XMLUser InterfaceMobile ComputingIp Telephony
Mobile IPv6 is the protocol defined by the Internet Engineering Task Force (IETF) to enable nodes to roam between IP subnets. Its specification requires the mobile node to be configured with at least a Home prefix to discover a home agent... more
    • by 
    •   9  
      Computer ScienceMobile ComputingProtocolsMobile service
    • by 
    •   16  
      Computer ScienceChemistryWireless Sensor NetworksInteroperability
    • by 
    •   10  
      Fuzzy LogicComputer NetworksSoft ComputingNeural Networks
    • by 
    •   3  
      ProtocolsReviewsMedical and Health Sciences
    • by 
    •   7  
      DoS AttackCryptographyProtocolsInternet
We introduce models for cooperative mitigating response strategies to suppress large scale Internet worm attack. In our models, cooperating members communicate with oth- ers using a "friend protocol" that spreads attack reports... more
    • by 
    •   9  
      Knowledge ManagementPerformanceAutomatic ControlSimulation
    • by 
    •   3  
      OptimizationProtocolsLogic Gates
    • by 
    •   11  
      Computer ScienceIntelligent ControlWireless Sensor NetworksMobile Robots
In this paper different optimization of Ad-hoc routing algorithm is surveyed and a new method using training based optimization algorithm for reducing the complexity of routing algorithms is suggested. A binary matrix is assigned to each... more
    • by 
    •   6  
      AlgorithmsAlgorithmAd Hoc NetworksProtocols
    • by 
    •   8  
      Computer ScienceMobile ComputingProtocolsInfrared
    • by 
    •   6  
      Information TechnologyWireless Sensor NetworksProtocolsWireless Sensor
    • by 
    •   11  
      Cognitive ScienceComputer GraphicsComputer Aided ManufacturingMemory Management
    • by 
    •   9  
      Database SystemsConflict ResolutionDistributed ProcessingProtocols
    • by 
    •   16  
      Software EngineeringMulti Agent SystemSocial StructureUML
    • by  and +1
    •   7  
      OPERATING SYSTEMDistributed ProcessingProtocolsProduct Life Cycle
    • by 
    •   50  
      Network SecurityComputer NetworksWireless Sensor NetworksEnergy Consumption
    • by 
    •   71  
      PharmacologyBiochemistryBioinformaticsEndocrinology
    • by 
    •   20  
      Computer ScienceSecuritySpaceSafety
    • by 
    •   2  
      MedicineProtocols
    • by 
    •   19  
      BioinformaticsComputer ArchitectureVirtual MemoryPower
The key issue of the localization study is that how we can minimize the energy consumption of devices with guaranteeing high degree of accuracy. In this paper, we show that the collaboration among proxy devices with short range... more
    • by 
    •   8  
      Computer ScienceTopologyGlobal Positioning SystemOptimization
    • by 
    •   20  
      Computer ScienceDistributed ComputingComputer NetworksSystem Management
    • by 
    •   11  
      CommunicationOptimization techniquesMedical HistoryeHealth
    • by 
    •   11  
      Computer ScienceNetwork SecurityAgent BasedInternet Routing Protocol
    • by 
    •   17  
      Distributed ComputingQueueing theoryPacket SwitchingFlow Control
    • by 
    • Protocols
    • by 
    •   16  
      MathematicsLife StyleAdolescentExecutive Function
    • by 
    •   9  
      Control SystemsMultimedia CommunicationVideoconferenceProtocols
    • by 
    •   5  
      Computer ArchitectureProtocolsQuality of ServiceClient Server
    • by 
    •   6  
      FPGAProtocolsLocal Area NetworksRedundancy
    • by  and +1
    •   12  
      Distributed ComputingWireless CommunicationsPerformance EvaluationWireless Network
    • by 
    •   18  
      Ubiquitous ComputingWireless networksInstant MessagingWireless Network
    • by 
    •   14  
      Wireless Sensor NetworksPower ManagementOPERATING SYSTEMProtocols
    • by 
    •   8  
      Decision MakingProtocolsQuality of ServiceIP networks
    • by 
    •   19  
      Computer ScienceDistributed ComputingParallel ProgrammingComputer Networks
The video game market is currently the fastest growing form of E-entertainment. Today's players want more from their experience, like massively multiplayer online games and the ability to play anytime/anywhere using cell phones,... more
    • by 
    •   2  
      Information TechnologyProtocols
    • by 
    •   10  
      Computer ScienceAntennasWireless Sensor NetworksProtocols