Search

Your search keyword '"COMPUTER network protocols"' showing total 142 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Journal procedia computer science Remove constraint Journal: procedia computer science Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
142 results on '"COMPUTER network protocols"'

Search Results

1. Dynamic Defense Model against Eclipse Attacks in Proof-of-Work Blockchain Systems.

2. Enhancing the Security of WPA2/PSK Authentication Protocol in Wi-Fi Networks.

3. Towards Secure and Interoperable Underwater Acoustic Communications: Current Activities in NATO IST-174 Research Task Group.

4. Monitoring for Analytes through LoRa and LoRaWAN Technology.

5. GeoAKOM: A Smart Geocasting Protocol for Vehicular Networks.

6. An edge node monitoring method for power line and wireless integration.

7. An energy-efficient gossiping protocol for wireless sensor networks using Chebyshev distance.

8. Performance Analysis of RPL Protocol for Data Gathering Applications in Wireless Sensor Networks.

9. A High Quality Health-Care System For Mobile-Health Services Based on Priority Considerations Strategy.

10. An energy-efficient gossiping protocol for wireless sensor networks using Chebyshev distance.

11. Performance Analysis of RPL Protocol for Data Gathering Applications in Wireless Sensor Networks.

12. An Empirical study on MAC layer in IEEE 802.11p/WAVE based Vehicular Ad hoc Networks.

13. Energy Consumption Reduction in S-MAC Protocol for Wireless Sensor Network.

14. Performance Evaluation of MANET Using Multi-Channel MAC Framework.

15. Comparison and Analysis on Artificial Intelligence Based Data Aggregation Techniques in Wireless Sensor Networks.

16. Strengthening Clustering Through Relay Nodes in Sensor Networks.

17. An Analysis of IoT Congestion Control Policies.

18. Dynamic bridge generation for IoT data exchange via the MQTT protocol.

19. Industrial Communication based on Modbus and Node-RED.

20. Impacts of Temperature and Humidity variations on RSSI in indoor Wireless Sensor Networks.

21. Performance Analysis of Time Synchronization Protocols on Different Commercial Mote Platforms.

22. Statistical analysis of CIDDS-001 dataset for Network Intrusion Detection Systems using Distance-based Machine Learning.

23. An Investigation of Two Phase Multi-Relay S-DF Cooperative Wireless Network Over Time-Variant Fading Channels With Incorrect CSI.

24. IDRC: A Distributed Real-Time Commit Protocol.

25. Audit expert system of communication security assessment.

26. A QoS-aware routing in SDN hybrid networks.

27. Analysis of CoAP Implementations for Industrial Internet of Things: A Survey.

28. A MAC Protocol for Full Duplex Cellular Networks.

29. DBSMA Approach for Congestion Mitigation in VANETs.

30. Integration and Combined Use of Distributed Computing Resources with Everest.

31. Prognosis of Dementia Employing Machine Learning and Microsimulation Techniques: A Systematic Literature Review.

32. Triadic Motifs in the Partitioned World Trade Web.

33. Mobility and Direction Aware Ad-hoc on Demand Distance Vector Routing Protocol.

34. Modelling and Verification of CoAP over Routing Layer Using SPIN Model Checker.

35. Implementation of Node Authentication for WSN Using Hash Chains.

36. Implementation of Protocol Stack for Three-Dimensional Wireless Sensor Network.

37. A Perspective on Collaboration with Interconnects & Routing in Network on Chip Architectures.

38. Mutual Entity Authentication Protocol Based on ECDSA for WSN.

39. Cognitive Radio Assisted OLSR Routing for Vehicular Sensor Networks.

40. Analysis and Design of Triple Band Compact Microstrip Patch Antenna with Fractal Elements for Wireless Applications.

41. A Proactive Trickle-based Mechanism for Discovering CoRE Resource Directories.

42. Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks.

43. A Lightweight Security Protocol for NFC-based Mobile Payments.

44. Achieving Energy Saving through Proxying Applications on behalf of Idle Devices.

45. Formal Analysis of an Energy-aware Collision Resolution Protocol for Wireless Sensor Networks.

46. Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack.

47. A Survey on Opportunistic Routing Protocols for Wireless Sensor Networks.

48. Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT.

49. Controlled Broadcast Protocol for Location Privacy in Mobile Applications.

50. Multilevel Secure RFID Based Object Tracking System.

Catalog

Books, media, physical & digital resources