Search

Your search keyword '"COMPUTER network protocols"' showing total 237 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Journal ad hoc networks Remove constraint Journal: ad hoc networks Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
237 results on '"COMPUTER network protocols"'

Search Results

1. RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks.

2. Adaptive beacon broadcast in opportunistic routing for VANETs.

3. Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones.

4. Portability, compatibility and reuse of MAC protocols across different IoT radio platforms.

5. On the performance of non-orthogonal multiple access in the finite blocklength regime.

6. Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure.

7. How to obfuscate execution of protocols in an ad hoc radio network?

8. Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit.

9. Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods.

10. Mobility-aware application protocols.

11. On the impact of the physical layer model on the performance of D2D-offloading in vehicular environments.

12. Continuous leakage-resilient access control for wireless sensor networks.

13. Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan.

14. Mobile Matrix: Routing under mobility in IoT, IoMT, and Social IoT.

15. Use ’em or lose ’em: On unidirectional links in reactive routing protocols.

16. Performance evaluation of IEEE 802.15.4 with real time queueing analysis.

17. A very fast tags polling protocol for single and multiple readers RFID systems, and its applications.

18. LEEF: Latency and energy efficient federation of disjoint wireless sensor segments.

19. An enhanced authentication scheme in mobile RFID system.

20. A distributed multichannel MAC protocol for rendezvous establishment in cognitive radio ad hoc networks.

21. Directional MAC protocol for IEEE 802.11ad based wireless local area networks.

22. Heterogeneous fault diagnosis for wireless sensor networks.

23. QSec-RPL: Detection of version number attacks in RPL based mobile IoT using Q-Learning.

24. Implementation and analysis of Wireless Flexible Time-Triggered protocol.

25. Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT).

26. Efficient clock synchronization for clustered wireless sensor networks.

27. Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks.

28. Cost-efficient traffic-aware data collection protocol in VANET.

29. Softwarecast: A code-based delivery Manycast scheme in heterogeneous and Opportunistic Ad Hoc Networks.

30. BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks.

31. DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.

32. New approaches for characterizing inter-contact times in opportunistic networks.

33. An efficient medium access control protocol for WSN-UAV.

34. Experimental evaluation of congestion control for CoAP communications without end-to-end reliability.

35. Mitigation of packet duplication in VANET unicast protocols.

36. Mobile RFID tag reading with non-overlapping tandem readers on a conveyor belt.

37. Data communication in VANETs: Protocols, applications and challenges.

38. An efficient multi-channel MAC protocol for wireless ad hoc networks.

39. Trust threshold based public key management in mobile ad hoc networks.

40. Wireless mobile DTN routing with the extended minimum estimated expected delay protocol.

41. Autonomous management of a recursive area hierarchy for large scale wireless sensor networks using multiple parents.

42. Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks.

43. GTS size adaptation algorithm for IEEE 802.15.4 wireless networks.

44. GITAR: Generic extension for Internet-of-Things ARchitectures enabling dynamic updates of network and application modules.

45. Software-defined underwater acoustic networking platform and its applications.

46. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks.

47. Design and evaluation of a low-cost, DIY-inspired, underwater platform to promote experimental research in UWSN.

48. An RTS–CTS based medium access control protocol for full-duplex wireless local area networks.

49. Survey on secure communication protocols for the Internet of Things.

50. Performance of polling disciplines for the receiver-initiated binary exponential backoff MAC protocol.

Catalog

Books, media, physical & digital resources