Journal articles on the topic 'Jabber (Computer network protocol)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Jabber (Computer network protocol).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Al-Saadoon, Ghossoon M. W. "A Platform to Develop a Secure Instant Messaging Using Jabber Protocol." Journal of Computer Science 5, no. 9 (September 1, 2009): 661–65. http://dx.doi.org/10.3844/jcssp.2009.661.665.
Full textKumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.
Full textRadia, Perlman. "Network protocol folklore." ACM SIGCOMM Computer Communication Review 49, no. 5 (November 8, 2019): 48–53. http://dx.doi.org/10.1145/3371934.3371953.
Full textNeville-Neil, George V. "The network protocol battle." Communications of the ACM 55, no. 4 (April 2012): 27–28. http://dx.doi.org/10.1145/2133806.2133816.
Full textNeville-Neil, George V. "The Network Protocol Battle." Queue 10, no. 1 (January 2012): 10–12. http://dx.doi.org/10.1145/2090147.2090149.
Full textStenn, Harlan. "Securing network time protocol." Communications of the ACM 58, no. 2 (January 28, 2015): 48–51. http://dx.doi.org/10.1145/2697397.
Full textStenn, Harlan. "Securing the Network Time Protocol." Queue 13, no. 1 (December 31, 2014): 20–25. http://dx.doi.org/10.1145/2716276.2717320.
Full textMason, Ian A., and Carolyn L. Talcott. "Simple Network Protocol Simulation within Maude." Electronic Notes in Theoretical Computer Science 36 (2000): 274–91. http://dx.doi.org/10.1016/s1571-0661(05)80139-2.
Full textTu-Chih Tsai. "NETWORK PROTOCOL HANDBOOK [Book Reviews]." IEEE Communications Magazine 34, no. 1 (January 1996): 10. http://dx.doi.org/10.1109/mcom.1996.482238.
Full textEdmond, W., K. Leib, and C. Topolcic. "The DARPA wideband network protocol." ACM SIGCOMM Computer Communication Review 20, no. 4 (August 1990): 79–89. http://dx.doi.org/10.1145/99517.99539.
Full textHüni, Hermann, Ralph Johnson, and Robert Engel. "A framework for network protocol software." ACM SIGPLAN Notices 30, no. 10 (October 17, 1995): 358–69. http://dx.doi.org/10.1145/217839.217875.
Full textLye, KM, L. Chan, and KC Chua. "Performance of a network protocol processor." Computer Communications 17, no. 11 (November 1994): 771–76. http://dx.doi.org/10.1016/0140-3664(94)90061-2.
Full textAyyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.
Full textRestivo, Ken. "Managing the Multi-protocol, Multi-media Network." International Journal of Network Management 2, no. 2 (June 1992): 68–76. http://dx.doi.org/10.1002/nem.4560020204.
Full textCerf, Vinton G., and Robert E. Icahn. "A protocol for packet network intercommunication." ACM SIGCOMM Computer Communication Review 35, no. 2 (April 2005): 71–82. http://dx.doi.org/10.1145/1064413.1064423.
Full textHess, David K., David R. Safford, and Udo W. Pooch. "A Unix network protocol security study." ACM SIGCOMM Computer Communication Review 22, no. 5 (October 2, 1992): 24–28. http://dx.doi.org/10.1145/141809.141811.
Full textNeufeld, Michael, Ashish Jain, and Dirk Grunwald. "Network Protocol Development with nsclick." Wireless Networks 10, no. 5 (September 2004): 569–81. http://dx.doi.org/10.1023/b:wine.0000036459.40982.ba.
Full textOhta, Hiroji, Yuzuru Johgo, Satoshi Takahashi, Tetsuo Tsuneizumi, Kyoma Suda, Kiyoshi Kubo, Katsuyuki Kawamoto, and Naotaka Miyamura. "Development of a Computer Network Protocol for SCADA Systems." IEEJ Transactions on Power and Energy 115, no. 6 (1995): 638–47. http://dx.doi.org/10.1541/ieejpes1990.115.6_638.
Full textChen, Zhi, Chunmiao Yuan, and Na Sun. "Learning Computer Network by Writing Your Own Protocol Analyzer." International Journal of Education and Management Engineering 2, no. 10 (October 29, 2012): 1–8. http://dx.doi.org/10.5815/ijeme.2012.10.01.
Full textZhang, Yujun. "Transport Mechanism Applied to Computer Network Protocol Conformance Testing." Journal of Computer Research and Development 42, no. 1 (2005): 102. http://dx.doi.org/10.1360/crad20050114.
Full textDrzymała, Michał, Krzysztof Szczypiorski, and Marek Łukasz Urbański. "Network Steganography in the DNS Protocol." International Journal of Electronics and Telecommunications 62, no. 4 (December 1, 2016): 343–46. http://dx.doi.org/10.1515/eletel-2016-0047.
Full textZemrane, Hamza, Youssef Baddi, and Abderrahim Hasbi. "Routing Communication Inside Ad Hoc Drones Network." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 17 (September 6, 2021): 192. http://dx.doi.org/10.3991/ijim.v15i17.19179.
Full textWang, Chunxia. "Routing Protocol of Cognitive Ad Hoc Network." International Journal of Future Generation Communication and Networking 8, no. 5 (October 31, 2015): 259–72. http://dx.doi.org/10.14257/ijfgcn.2015.8.5.26.
Full textKeller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.
Full textYang, Shenghao, and Raymond W. Yeung. "Network Communication Protocol Design from the Perspective of Batched Network Coding." IEEE Communications Magazine 60, no. 1 (January 2022): 89–93. http://dx.doi.org/10.1109/mcom.001.21828.
Full textLili Yan, Yan Chang, and Honggang Lin. "Security Analysis of Sensor Network Encryption Protocol." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 10 (May 31, 2013): 1026–32. http://dx.doi.org/10.4156/aiss.vol5.issue10.120.
Full textCimet, I. A., and P. R. Srikanta Kumar. "A resilient distributed protocol for network synchronization." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 358–67. http://dx.doi.org/10.1145/1013812.18212.
Full textMai, Dinh Loc, and Myung Kyun Kim. "Multi-Hop LoRa Network Protocol with Minimized Latency." Energies 13, no. 6 (March 15, 2020): 1368. http://dx.doi.org/10.3390/en13061368.
Full textWumei, Zhang. "Research of Improved Wireless Sensor Network Routing Protocol." International Journal of Multimedia and Ubiquitous Engineering 10, no. 11 (November 30, 2015): 85–94. http://dx.doi.org/10.14257/ijmue.2015.10.11.08.
Full textYang, Zengyin, Hewu Li, Qian Wu, and Jianping Wu. "NPVT: Network Protocol Validation Testbed for Integrated Space-Terrestrial Network." IEEE Access 7 (2019): 46831–45. http://dx.doi.org/10.1109/access.2019.2906397.
Full textAhmed, Lubaid, and Abdolreza Abhari. "A multi-agent-based simulator for a transmission control protocol/internet protocol network." SIMULATION 90, no. 5 (April 9, 2014): 511–21. http://dx.doi.org/10.1177/0037549714528268.
Full textJain, Neha, Ashish Payal, and Aarti Jain. "Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks." International Journal of Pervasive Computing and Communications 17, no. 4 (September 10, 2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.
Full textLuo, Junzhou, and Guanqun Gu. "CIMS network protocol and its net models." Journal of Computer Science and Technology 12, no. 5 (September 1997): 476–80. http://dx.doi.org/10.1007/bf02943179.
Full textSun, Geng Xin, Feng Jing Shao, and Sheng Bin. "A Inter-Subsystem Private Data Transfer Protocol Based on a New High Secure Computer Architecture." Advanced Materials Research 255-260 (May 2011): 2188–91. http://dx.doi.org/10.4028/www.scientific.net/amr.255-260.2188.
Full textDas, Ayan Kumar, Rituparna Chaki, and Kashi Nath Dey. "Secure energy efficient routing protocol for wireless sensor network." Foundations of Computing and Decision Sciences 41, no. 1 (March 1, 2016): 3–27. http://dx.doi.org/10.1515/fcds-2016-0001.
Full textEnokido, Tomoya, and Makoto Takizawa. "Autonomic Group Communication Protocol." Journal of Interconnection Networks 04, no. 03 (September 2003): 309–28. http://dx.doi.org/10.1142/s0219265903000891.
Full textLi, Yizhi. "Research on Data Confidentiality and Security Protocol in Computer Network." Journal of Physics: Conference Series 1648 (October 2020): 032180. http://dx.doi.org/10.1088/1742-6596/1648/3/032180.
Full textde Cola, Tomaso, Alberto Ginesi, Giovanni Giambene, George C. Polyzos, Vasilios A. Siris, Nikos Fotiou, and Yiannis Thomas. "Network and Protocol Architectures for Future Satellite Systems." Foundations and Trends® in Networking 12, no. 1-2 (2017): 1–161. http://dx.doi.org/10.1561/1300000046.
Full textHuang, Scott C. H., Maggie X. Cheng, and Ding-Zhu Du. "GeoSENS: geo-based sensor network secure communication protocol." Computer Communications 29, no. 4 (February 2006): 456–61. http://dx.doi.org/10.1016/j.comcom.2004.12.030.
Full textPark, Hyung-Soo, Hyung-Woo Lee, Dong Hoon Lee, and Hong-Ki Ko. "Multi-protocol authentication for SIP/SS7 mobile network." Computer Communications 31, no. 11 (July 2008): 2755–63. http://dx.doi.org/10.1016/j.comcom.2008.02.031.
Full textWu, Shengyao, Xiaojun Wang, Mingming Wang, Zhiguo Qu, and Zhexi Zhang. "Continuous-variable quantum network coding protocol based on butterfly network model." International Journal of Sensor Networks 32, no. 2 (2020): 69. http://dx.doi.org/10.1504/ijsnet.2020.10026660.
Full textQu, Zhiguo, Zhexi Zhang, Mingming Wang, Shengyao Wu, and Xiaojun Wang. "Continuous-variable quantum network coding protocol based on butterfly network model." International Journal of Sensor Networks 32, no. 2 (2020): 69. http://dx.doi.org/10.1504/ijsnet.2020.104922.
Full textLi, Fulin. "Application of Artificial Intelligence Technology in Computer Network Security Communication." Journal of Control Science and Engineering 2022 (July 21, 2022): 1–6. http://dx.doi.org/10.1155/2022/9785880.
Full textQuan-Hai Wang, Quan-Hai Wang, Shao-Feng Lan Quan-Hai Wang, Jing Feng Shao-Feng Lan, Yi-Qun Wang Jing Feng, and Wen-Bai Chen Yi-Qun Wang. "Improvement and Optimization of a Mobile Multi-agent AODV Routing Protocol." 電腦學刊 33, no. 4 (August 2022): 205–13. http://dx.doi.org/10.53106/199115992022083304017.
Full textHusieen, Naseer Ali, Suhaidi Hassan, Osman Ghazali, and Lelyzar Siregar. "The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET." International Journal of Mobile Computing and Multimedia Communications 5, no. 2 (April 2013): 46–57. http://dx.doi.org/10.4018/jmcmc.2013040104.
Full textYu, Yingchao, Zuoning Chen, Shuitao Gan, and Xiaofeng Wang. "SGPFuzzer: A State-Driven Smart Graybox Protocol Fuzzer for Network Protocol Implementations." IEEE Access 8 (2020): 198668–78. http://dx.doi.org/10.1109/access.2020.3025037.
Full textGao, Yuefei, Shin Kawai, and Hajime Nobuhara. "Scalable Blockchain Protocol Based on Proof of Stake and Sharding." Journal of Advanced Computational Intelligence and Intelligent Informatics 23, no. 5 (September 20, 2019): 856–63. http://dx.doi.org/10.20965/jaciii.2019.p0856.
Full textChaoyi Zhang, Jingfang Su, and Muqing Wu. "Fixed Relay Random Access Protocol for Cooperative Network." International Journal of Digital Content Technology and its Applications 5, no. 5 (May 31, 2011): 157–65. http://dx.doi.org/10.4156/jdcta.vol5.issue5.17.
Full textWu Boqiao, Liu Xuefei, Tan Aiping, and Weniee Evelyn. "Network Management Scheme Based on TCP/IP Protocol." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 937–45. http://dx.doi.org/10.4156/jdcta.vol7.issue6.106.
Full textHonda, Michio, Felipe Huici, Costin Raiciu, Joao Araujo, and Luigi Rizzo. "Rekindling network protocol innovation with user-level stacks." ACM SIGCOMM Computer Communication Review 44, no. 2 (April 8, 2014): 52–58. http://dx.doi.org/10.1145/2602204.2602212.
Full text