11   Artículos

 
en línea
Zhijun Wu, Rong Li, Panpan Yin and Changliang Li    
Steganalysis is used for preventing the illegal use of steganography to ensure the security of network communication through detecting whether or not secret information is hidden in the carrier. This paper presents an approach to detect the quantization ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohammad Tariq Meeran, Paul Annus, Muhammad Mahtab Alam and Yannick Le Moullec    
The main focus of this research article is the evaluation of selected voice over Internet protocol (VoIP) solutions in wireless mesh network (WMN) scenarios. While WMNs have self-healing, self-forming, and dynamic topology features, they still pose chall... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jesús Manuel Paternina, Octavio Salcedo     Pág. 18 - 28
ResumenDescargasReferenciasCómo citar
Revista: Redes de IngenierÍ­a    Formato: Electrónico

 
en línea
Bader Methqal AlFawwaz     Pág. pp. 30 - 42
Cloud computing is a new paradigm in E-learning environment. It offers a wide range of facilities to students and teachers, especially in the universities to ease out their problem in terms of documents sharing, course material distribution and handling,... ver más

 
en línea
Dominik Kovac,Pavel Masek,Jirí Ho?ek,Mariya Pavlova,Ondrej Krajsa     Pág. 122 - 128
Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP... ver más

 
en línea
Surya Hendra Putra,Oris Krianto Sulaiman     Pág. 186 - 190
The use of communication media as a tool for activities and work at this time is very necessary, as for the technology used to support communication are PSTN (Public Switched Telephone Network), VoIP (Voice Over Internet Protocol) and so on. The Islamic ... ver más

« Anterior     Página: 1 de 1     Siguiente »