Search

Your search keyword '"COMPUTER network protocols"' showing total 29 results
29 results on '"COMPUTER network protocols"'

Search Results

1. A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks.

2. A personal connected health system for the Internet of Things based on the Constrained Application Protocol.

3. Algebraic data retrieval algorithms for multi-channel wireless data broadcast.

4. KCI-resilient anonymous wireless link-layer authentication protocols

5. Estimating the performance of intelligent transport systems wireless services for multimodal logistics applications

6. A three-tier middleware architecture supporting bidirectional location tracking of numerous mobile nodes under legacy WSN environment

7. Observations on non-silent self-stabilizing algorithms in sensor networks with probabilistically intermittent link failures

8. ComboCoding: Combined intra-/inter-flow network coding for TCP over disruptive MANETs

9. A novel solution approach and protocol design for bio-telemetry applications

10. Feasibility analysis of hybrid control networks based on common industrial protocol

11. QoS guaranteed integration methodology for a WLAN–WiMAX heterogeneous network

12. A novel group key agreement protocol for wireless mesh network

13. Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard

14. An operational semantics for a calculus for wireless systems

15. A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas

16. Robust self-stabilizing weight-based clustering algorithm

17. Dependability assessment of by-wire control systems using fault injection

18. USIM-based EAP-TLS authentication protocol for wireless local area networks

19. Games to induce specified equilibria

20. Efficient, anonymous, and authenticated conference key setup in cellular wireless networks

21. Feedback QoS control scheme for wireless network applications

22. A framework for security analysis of mobile wireless networks

23. Study and performance analysis of transport layer mechanisms applied in military radio environment

24. Providing integrated service in CDMA wireless networks

25. Complete mobile email management

26. User acceptance of WAP services: test of competing theories

27. An efficient password authenticated key exchange protocol for imbalanced wireless networks

28. An efficient user identification scheme based on ID-based cryptosystem

29. Communication protocol for monitoring a large number of remotely distributed hazardous material detection devices

Catalog

Books, media, physical & digital resources