Peer-reviewed Articles - Computer sci

24 downloads
80 views

Error detection is a fundamental need in most computer networks and communication systems in order to combat the effect of noise. Error detection techniques have also been incorporated with lossless data compression algorithms for transmission across communication...

["Autonomous Systems","Computer Networks and Communications","Data Science","Mobile and Ubiquitous Computing","Software Engineering"]
doi:10.7717/peerj-cs.171
2 citations
642 downloads
3,982 views

We describe best practices for providing convenient, high-speed, secure access to large data via research data portals. We capture these best practices in a new design pattern, the Modern Research Data Portal, that disaggregates the traditional monolithic web-based...

["Computer Networks and Communications","Data Science","Distributed and Parallel Computing","Security and Privacy","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.144
10 citations
2,092 downloads
3,301 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.114
1 citation
1,808 downloads
5,864 views

The timely publication of scientific results is essential for dynamic advances in science. The ubiquitous availability of computers which are connected to a global network made the rapid and low-cost distribution of information through electronic channels possible....

["Computer Education","Computer Networks and Communications","Digital Libraries","Human-Computer Interaction","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.112
411 downloads
1,649 views

In this paper, we introduce a framework for implementing deep copy on top of MPI. The process is initiated by passing just the root object of the dynamic data structure. Our framework takes care of all pointer traversal, communication, copying and reconstruction...

["Computer Networks and Communications","Distributed and Parallel Computing","Programming Languages"]
doi:10.7717/peerj-cs.95
2 citations
545 downloads
2,443 views

In this paper we introduce SNF, a framework that synthesizes (S) network function (NF) service chains by eliminating redundant I/O and repeated elements, while consolidating stateful cross layer packet operations across the chain. SNF uses graph composition and...

["Computer Networks and Communications"]
doi:10.7717/peerj-cs.98
4 citations
273 downloads
1,435 views

Opportunistic data forwarding significantly increases the throughput in multi-hop wireless mesh networks by utilizing the broadcast nature of wireless transmissions and the fluctuation of link qualities. Network coding strengthens the robustness of data transmissions...

["Computer Networks and Communications","Network Science and Online Social Networks"]
doi:10.7717/peerj-cs.89
12 citations
518 downloads
3,474 views

Publication and archival of scientific results is still commonly considered the responsability of classical publishing companies. Classical forms of publishing, however, which center around printed narrative articles, no longer seem well-suited in the digital age....

["Bioinformatics","Computer Networks and Communications","Digital Libraries","World Wide Web and Web Science"]
doi:10.7717/peerj-cs.78
222 downloads
1,325 views

Hypertension or high blood pressure is a condition on the rise. Not only does it affect the elderly but is also increasingly spreading to younger sectors of the population. Treating it involves exhaustive monitoring of patients. A tool adapted to the particular...

["Computer Networks and Communications","Distributed and Parallel Computing"]
doi:10.7717/peerj-cs.69
6 citations
987 downloads
2,333 views

Managed Security Services (MSS) have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS), malware propagation, and anomalies. A proliferation of attacks...

["Computer Networks and Communications","Data Mining and Machine Learning","Security and Privacy"]
doi:10.7717/peerj-cs.25
2 citations
458 downloads
1,920 views

Vehicular data collection applications are emerging as an appealing technology to monitor urban areas, where a high concentration of connected vehicles with onboard sensors is a near future scenario. In this context, smartphones are, on one side, effective enablers...

["Computer Networks and Communications","Distributed and Parallel Computing","Mobile and Ubiquitous Computing"]
doi:10.7717/peerj-cs.15

Refine by manuscript type

Top subject areas - Articles

Top subject areas - People

View all subject areas