Journal articles on the topic 'Simple Object Access Protocol (Computer network protocol)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 journal articles for your research on the topic 'Simple Object Access Protocol (Computer network protocol).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.
Full textHONG, PENGYU, SHENG ZHONG, and WING H. WONG. "UBIC2 — TOWARDS UBIQUITOUS BIO-INFORMATION COMPUTING: DATA PROTOCOLS, MIDDLEWARE, AND WEB SERVICES FOR HETEROGENEOUS BIOLOGICAL INFORMATION INTEGRATION AND RETRIEVAL." International Journal of Software Engineering and Knowledge Engineering 15, no. 03 (June 2005): 475–85. http://dx.doi.org/10.1142/s0218194005001951.
Full textAl-Musawi, Nawras A., and Dhiah Al-Shammary. "Static Hilbert convex set clustering for web services aggregation." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 1 (October 1, 2023): 372. http://dx.doi.org/10.11591/ijeecs.v32.i1.pp372-380.
Full textAl-Musawi, Nawras A., and Dhiah Al-Shammary. "Dynamic Hilbert clustering based on convex set for web services aggregation." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 6 (December 1, 2023): 6654. http://dx.doi.org/10.11591/ijece.v13i6.pp6654-6662.
Full textSelvan, Satiaseelan, and Manmeet Mahinderjit Singh. "Adaptive Contextual Risk-Based Model to Tackle Confidentiality-Based Attacks in Fog-IoT Paradigm." Computers 11, no. 2 (January 24, 2022): 16. http://dx.doi.org/10.3390/computers11020016.
Full textPolgar, Jana. "Using WSRP 2.0 with JSR 168 and 286 Portlets." International Journal of Web Portals 2, no. 1 (January 2010): 45–57. http://dx.doi.org/10.4018/jwp.2010010105.
Full textMitts, H�kan, and Harri Hans�n. "A simple and efficient routing protocol for the UMTSA Access network." Mobile Networks and Applications 1, no. 2 (June 1996): 167–81. http://dx.doi.org/10.1007/bf01193335.
Full textZientarski, Tomasz, Marek Miłosz, Marek Kamiński, and Maciej Kołodziej. "APPLICABILITY ANALYSIS OF REST AND SOAP WEB SERVICES." Informatics Control Measurement in Economy and Environment Protection 7, no. 4 (December 21, 2017): 28–31. http://dx.doi.org/10.5604/01.3001.0010.7249.
Full textGe, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 347-350 (August 2013): 2071–76. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2071.
Full textGe, Jian Xia, and Wen Ya Xiao. "Network Layer Network Topology Discovery Algorithm Research." Applied Mechanics and Materials 380-384 (August 2013): 1327–32. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1327.
Full textDatsenko, Serhii, and Heorhii Kuchuk. "BIOMETRIC AUTHENTICATION UTILIZING CONVOLUTIONAL NEURAL NETWORKS." Advanced Information Systems 7, no. 2 (June 12, 2023): 87–91. http://dx.doi.org/10.20998/2522-9052.2023.2.12.
Full textSong, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.
Full textTan, Wenken, and Jianmin Hu. "Design of the Wireless Network Hierarchy System of Intelligent City Industrial Data Management Based on SDN Network Architecture." Security and Communication Networks 2021 (November 10, 2021): 1–12. http://dx.doi.org/10.1155/2021/5732300.
Full textHalili, Festim, and Erenis Ramadani. "Web Services: A Comparison of Soap and Rest Services." Modern Applied Science 12, no. 3 (February 28, 2018): 175. http://dx.doi.org/10.5539/mas.v12n3p175.
Full textZhang, Xiao. "Intranet Web System, a Simple Solution to Companywide Information-on-demand." Proceedings, annual meeting, Electron Microscopy Society of America 54 (August 11, 1996): 404–5. http://dx.doi.org/10.1017/s0424820100164489.
Full textLertsutthiwong, Monchai, Thinh Nguyen, and Alan Fern. "Scalable Video Streaming for Single-Hop Wireless Networks Using a Contention-Based Access MAC Protocol." Advances in Multimedia 2008 (2008): 1–21. http://dx.doi.org/10.1155/2008/928521.
Full textChang, Chee Er, Azhar Kassim Mustapha, and Faisal Mohd-Yasin. "FPGA Prototyping of Web Service Using REST and SOAP Packages." Chips 1, no. 3 (December 5, 2022): 210–17. http://dx.doi.org/10.3390/chips1030014.
Full textComeau, Donald C., Chih-Hsuan Wei, Rezarta Islamaj Doğan, and Zhiyong Lu. "PMC text mining subset in BioC: about three million full-text articles and growing." Bioinformatics 35, no. 18 (January 31, 2019): 3533–35. http://dx.doi.org/10.1093/bioinformatics/btz070.
Full textAl-Dailami, Abdulrahman, Chang Ruan, Zhihong Bao, and Tao Zhang. "QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation." Security and Communication Networks 2019 (December 28, 2019): 1–16. http://dx.doi.org/10.1155/2019/3107543.
Full textZulkarnain, Hafid, Joseph Dedy Irawan, and Renaldi Primaswara Prasetya. "DESIGN OF A TRAFFIC RATE PRIORITY NETWORK CONNECTION MANAGEMENT SYSTEM ON A COMPUTER NETWORK." International Journal of Computer Science and Information Technology 1, no. 1 (January 18, 2024): 28–34. http://dx.doi.org/10.36040/ijcomit.v1i1.6720.
Full textAlasri, Abbas, and Rossilawati Sulaiman. "Protection of XML-Based Denail-of-Service and Httpflooding Attacks in Web Services Using the Middleware Tool." International Journal of Engineering & Technology 7, no. 4.7 (September 27, 2018): 322. http://dx.doi.org/10.14419/ijet.v7i4.7.20570.
Full textCao, Jin, Hui Li, Maode Ma, and Fenghua Li. "UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/6854612.
Full textShukla, Samiksha, D. K. Mishra, and Kapil Tiwari. "Performance Enhancement of Soap Via Multi Level Caching." Mapana - Journal of Sciences 9, no. 2 (November 30, 2010): 47–52. http://dx.doi.org/10.12723/mjs.17.6.
Full textYulianto, Budi. "Analisis Korelasi Faktor Perilaku Konsumen terhadap Keputusan Penggunaan Teknologi Komunikasi Voip." ComTech: Computer, Mathematics and Engineering Applications 5, no. 1 (June 30, 2014): 236. http://dx.doi.org/10.21512/comtech.v5i1.2619.
Full textAl-Mashadani, Abdulrahman Khalid Abdullah, and Muhammad Ilyas. "Distributed Denial of Service Attack Alleviated and Detected by Using Mininet and Software Defined Network." Webology 19, no. 1 (January 20, 2022): 4129–44. http://dx.doi.org/10.14704/web/v19i1/web19272.
Full textBartlett, H., and R. Wong. "Modelling and Simulation of the Operational and Information Processing Functions of a Computer-Integrated Manufacturing Cell." Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 209, no. 4 (August 1995): 245–59. http://dx.doi.org/10.1243/pime_proc_1995_209_081_02.
Full textBujari, Armir, and Claudio Enrico Palazzi. "AirCache: A Crowd-Based Solution for Geoanchored Floating Data." Mobile Information Systems 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/3247903.
Full textDjibo, Moumouni, Wend Yam Serge Boris Ouedraogo, Ali Doumounia, Serge Roland Sanou, Moumouni Sawadogo, Idrissa Guira, Nicolas Koné, Christian Chwala, Harald Kunstmann, and François Zougmoré. "Towards Innovative Solutions for Monitoring Precipitation in Poorly Instrumented Regions: Real-Time System for Collecting Power Levels of Microwave Links of Mobile Phone Operators for Rainfall Quantification in Burkina Faso." Applied System Innovation 6, no. 1 (December 27, 2022): 4. http://dx.doi.org/10.3390/asi6010004.
Full textRouissat, Mehdi, Mohammed Belkheir, Ibrahim S. Alsukayti, and Allel Mokaddem. "A Lightweight Mitigation Approach against a New Inundation Attack in RPL-Based IoT Networks." Applied Sciences 13, no. 18 (September 16, 2023): 10366. http://dx.doi.org/10.3390/app131810366.
Full textZhang, Liujing, Jin Li, Wenyang Guan, and Xiaoqin Lian. "Optimization of User Service Rate with Image Compression in Edge Computing-Based Vehicular Networks." Mathematics 12, no. 4 (February 12, 2024): 558. http://dx.doi.org/10.3390/math12040558.
Full textKhudair Madhloom, Jamal, Hussein Najm Abd Ali, Haifaa Ahmed Hasan, Oday Ali Hassen, and Saad Mohamed Darwish. "A Quantum-Inspired Ant Colony Optimization Approach for Exploring Routing Gateways in Mobile Ad Hoc Networks." Electronics 12, no. 5 (February 28, 2023): 1171. http://dx.doi.org/10.3390/electronics12051171.
Full textBristola, Glenn Arwin M. "Integrating of voice recognition email application system for visually impaired person using linear regression algorithm." South Asian Journal of Engineering and Technology 12, no. 1 (March 31, 2022): 74–83. http://dx.doi.org/10.26524/sajet.2022.12.12.
Full textBristol, Glenn Arwin M. "Integrating of Voice Recognition Email Application System for Visually Impaired Person using Linear Regression Algorithm." Proceedings of The International Halal Science and Technology Conference 14, no. 1 (March 10, 2022): 56–66. http://dx.doi.org/10.31098/ihsatec.v14i1.486.
Full textGlenn Arwin M Bristola and Joevilzon C Calderon. "Integrating of voice recognition email application system for visually impaired person using linear regression algorithm." South Asian Journal of Engineering and Technology 12, no. 1 (March 31, 2022): 74–83. http://dx.doi.org/10.26524/sajet.2022.12.012.
Full textBezprozvannych, G. V., and O. A. Pushkar. "Ensuring standardized parameters for the transmission of digital signals by twisted pairs at the technological stage of manufacturing cables for industrial operating technologies." Electrical Engineering & Electromechanics, no. 4 (June 27, 2023): 57–64. http://dx.doi.org/10.20998/2074-272x.2023.4.09.
Full textAbraham, Ajith, Sung-Bae Cho, Thomas Hite, and Sang-Yong Han. "Special Issue on Web Services Practices." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 5 (September 20, 2006): 703–4. http://dx.doi.org/10.20965/jaciii.2006.p0703.
Full textNayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.
Full textAbisa, Michael. "Meaningful Use and Electronic Laboratory Reporting: Challenges Health Information Technology Vendors Face in Kentucky." Online Journal of Public Health Informatics 9, no. 3 (December 30, 2017). http://dx.doi.org/10.5210/ojphi.v9i3.7491.
Full text"Safety Measures and Auto Detection against SQL Injection Attacks." International Journal of Recent Technology and Engineering 8, no. 4 (December 30, 2019): 2827–33. http://dx.doi.org/10.35940/ijeat.b3316.129219.
Full textSoni, Gulshan, and Kandasamy Selvaradjou. "Rational Allocation of Guaranteed Time Slots to support real-time traffic in Wireless Body Area Networks." International Journal of Sensors, Wireless Communications and Control 11 (March 8, 2021). http://dx.doi.org/10.2174/2210327911666210308155147.
Full textVieira Junior, Ivanilson França, Jorge Granjal, and Marilia Curado. "RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments." Journal of Network and Systems Management 32, no. 1 (January 3, 2024). http://dx.doi.org/10.1007/s10922-023-09796-3.
Full textPeters, Andreas J., and Daniel C. van der Ster. "Evaluating CephFS Performance vs. Cost on High-Density Commodity Disk Servers." Computing and Software for Big Science 5, no. 1 (November 9, 2021). http://dx.doi.org/10.1007/s41781-021-00071-1.
Full textDieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.
Full textMackenzie, Adrian. "Making Data Flow." M/C Journal 5, no. 4 (August 1, 2002). http://dx.doi.org/10.5204/mcj.1975.
Full textHinner, Kajetan. "Statistics of Major IRC Networks." M/C Journal 3, no. 4 (August 1, 2000). http://dx.doi.org/10.5204/mcj.1867.
Full textDeck, Andy. "Treadmill Culture." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2157.
Full textGoggin, Gerard. "‘mobile text’." M/C Journal 7, no. 1 (January 1, 2004). http://dx.doi.org/10.5204/mcj.2312.
Full text