Search

Your search keyword '"C.2.0"' showing total 113 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0" Language english Remove constraint Language: english
113 results on '"C.2.0"'

Search Results

1. A Blockchain-based Electronic Voting System: EtherVote

2. Information Leakage from Optical Emanations

3. Exploring Fully Offloaded GPU Stream-Aware Message Passing

4. Descriptive complexity for distributed computing with circuits

5. ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss

6. Hawkeye: Hectometer-range Subcentimeter Localization for Large-scale mmWave Backscatter

7. Techno-Economic Assessment in Communications: New Challenges

8. Blockchain Technology to Secure Bluetooth

9. Attention-based model and deep reinforcement learning for distribution of event processing tasks

10. Anomaly Detection in Intra-Vehicle Networks

11. An Energy Aware Clustering Scheme for 5G-enabled Edge Computing based IoMT Framework

12. Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

13. Cycle multiplicity of some total graphs.

14. The Swapped Dragonfly

15. A User Centric Blockage Model for Wireless Networks

16. Content placement in networks of similarity caches

17. NSF Broadband Research 2020 Report

18. Scheduling Algorithms for Age of Information Differentiation with Random Arrivals

19. Worst-case Delay Bounds in Time-Sensitive Networks with Packet Replication and Elimination

20. Decentralized Collaborative Video Caching in 5G Small-Cell Base Station Cellular Networks

21. Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks

22. Large Scale Measurement on the Adoption of Encrypted DNS

23. Cyber Security in Cloud: Risk Assessment Models

24. InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

25. Performance Characteristics of the BlueField-2 SmartNIC

26. Arraymetrics: Authentication Through Chaotic Antenna Array Geometries

27. THRD: Threshold-based hierarchical resource discovery for Grid environments.

28. TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems

29. On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice

30. New approach to MPI program execution time prediction

31. Optimised allgatherv, reduce_scatter and allreduce communication in message-passing systems

32. Testing Compilers for Programmable Switches Through Switch Hardware Simulation

33. Towards Federated Learning With Byzantine-Robust Client Weighting

34. A Proposed IoT Smart Trap using Computer Vision for Sustainable Pest Control in Coffee Culture

35. On Time Synchronization Issues in Time-Sensitive Networks with Regulators and Nonideal Clocks

36. Waveform-domain NOMA: The future of multiple access

37. Extensionless Adaptive Transmitter and Receiver Windowing of Beyond 5G Frames

38. The rupture degree of trees.

39. Vertex-neighbour-integrity of composition graphs of paths and cycles.

40. Comparative Bandwidth Analysis of Low-Power Wireless IoT-Switches

41. Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

42. Hiding data inside images using orthogonal moments

43. Secure Distribution of Protected Content in Information-Centric Networking

44. Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless Networks

45. Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio

46. Low-Cost Spectrum Analyzers for Channel Allocation in Wireless Networks 2.4 GHz Range

47. Internet of Things Security Problems

48. Impact of LTE’s Periodic Interference on Heterogeneous Wi-Fi Transmissions

49. Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic

50. JADE - A Platform for Research on Cooperation of Physical and Virtual Agents

Catalog

Books, media, physical & digital resources