Search

Your search keyword '"COMPUTER network protocols"' showing total 3,030 results
3,030 results on '"COMPUTER network protocols"'

Search Results

401. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols.

402. Secrecy Outage Capacity of Fading Channels.

403. Performance Analysis and Comparison of Bluetooth Low Energy with IEEE 802.15.4 and SimpliciTI.

404. Fuzzy Based Load and Stability Aware Routing for Mobile Ad Hoc Networks.

405. Performance Evaluation of Routing Protocols for WCDMA Network.

406. A Graph Route-Based Superframe Scheduling Scheme in WirelessHART Mesh Networks for High Robustness.

407. FreeMobility: dynamic location computing using GIS.

408. Strong roaming authentication technique for wireless and mobile networks.

409. A protocol for processing interfered data in facility sensor networks.

410. Large-scale access scheduling in wireless mesh networks using social centrality.

411. A Wireless Sensor Network Protocol for an Inertial Motion Tracking System.

412. Algebraic data retrieval algorithms for multi-channel wireless data broadcast.

413. Asymmetric radio resource allocation scheme for OFDMA wireless networks with collaborative relays.

414. On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains.

415. Wireless USB Cluster Tree based on Distributed Reservation Protocol for Mobility Support.

416. A Probability Problem Arising from the Security of the Temporal Key Hash of WPA.

417. Cross-Layer Enhancement to Support TCP-Based Traffics in WLANs.

418. Real-time wireless multi-hop protocol in underground voice communication.

419. An Efficient and Fair MAC Protocol Robust to Reactive Interference.

420. A New Metric Based Cluster Head Selection Technique for Prolonged Lifetime in Wireless Sensor Networks.

421. Performance Analysis of Amplify and Forward Cooperative Relaying Protocol in Wireless Communication System.

422. An Adaptive Cluster-Based Routing Mechanism for Energy Conservation in Mobile Ad Hoc Networks.

423. Signal-flow-based analysis of wireless security protocols.

424. Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models.

425. Maintaining Path Stability with Node Failure in Mobile Ad Hoc Networks.

426. Opportunistic data collection for disconnected wireless sensor networks by mobile mules.

427. Wireless local area network cards identification based on transient fingerprinting.

428. A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks.

429. UACAP: A Unified Auxiliary Channel Authentication Protocol.

430. Spatial Distribution and Channel Quality Adaptive Protocol for Multihop Wireless Broadcast Routing in VANET.

431. Collision Free Mobility Adaptive (CFMA) MAC for wireless sensor networks.

432. RP-MAC: A Passive MAC Protocol with Frame Reordering for Wireless Sensor Networks.

433. Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.

434. FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0

435. A Review and Comparison of Mobile Ad Hoc Networks (MANET).

436. RFID Mutual Authentication Protocols based on Gene Mutation and Transfer.

437. Surface-Level Path Loss Modeling for Sensor Networks in Flat and Irregular Terrain.

438. Cross-Layer Design of AODV Protocol for Multi-Hop Flow in Ad Hoc Network.

439. ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices.

440. Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems.

441. Design and analysis of an IEEE 802.21-based mobility management architecture: a context-aware approach.

442. Coordination problem in cognitive wireless mesh networks.

443. Model-Based Analysis of Wireless System Architectures for Real-Time Applications.

444. Multi-Radio Cooperative ARQ in wireless cellular networks: a MAC layer perspective.

445. A critical line based boundary surveillance strategy in wireless sensor networks.

446. Discovering Human Presence Activities with Smartphones Using Nonintrusive Wi-Fi Sniffer Sensors: The Big Data Prospective.

447. An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks.

448. Driving Path Predication Based Routing Protocol in Vehicular Ad hoc Networks.

449. Connectivity Analysis for Free-Flow Traffic in VANETs: A Statistical Approach.

450. Secrecy-Enhanced Data Dissemination Using Cooperative Relaying in Vehicular Networks.

Catalog

Books, media, physical & digital resources