Search

Showing total 11,759 results

Search Constraints

Start Over You searched for: Topic computer network Remove constraint Topic: computer network Language undetermined Remove constraint Language: undetermined Publisher elsevier bv Remove constraint Publisher: elsevier bv
11,759 results

Search Results

1. A review paper on wireless sensor network techniques in Internet of Things (IoT)

2. Zero-forcing dirty paper coding aided physical-layer network coding for MIMO two-way relaying channels with multiple users

3. Spectral Efficiency Improving Techniques in Mobile Femtocell Network: Survey Paper

4. Survey Paper: Mobility Management in Heterogeneous Wireless Networks

5. Selected papers from the First Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt’2003)

6. Special Issue: Modeling and Optimization in Mobile, Ad hoc, and Wireless Networks: selected papers from WiOpt 2010

8. Call for papers

9. An efficient WBAN aggregator switched-beam technique for isolated and quarantined patients

10. Traffic conditioner: upper bound for the spacer overflow probability

11. Achievable rates for two interfering broadcast channels with a cognitive transmitter

12. Industrial wireless sensor networks with real time data access

13. Trust based efficient routing (TER) protocol for MANETS

14. A prioritized traffic scheduling with load balancing in wireless body area networks

15. LoRa and server-based home automation using the internet of things (IoT)

16. Data privacy preservation in MAC aware Internet of things with optimized key generation

17. The AODV routing protocol with built-in security to counter blackhole attack in MANET

18. Impact of Ad-hoc on-demand distance vector on TCP traffic simulation using network simulator

19. Wireless Sensor Networks: Active and Passive attacks - Vulnerabilities and Countermeasures

20. Research on AI security enhanced encryption algorithm of autonomous IoT systems

21. Joint design of control policy and network scheduling policy for wireless networked control systems: Theory and application

22. Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network

23. Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system

24. Sampled-data-based event-triggered secure bipartite tracking consensus of linear multi-agent systems under DoS attacks

25. A distributed algorithm to maintain a proximity communication network among mobile agents using the Delaunay triangulation

26. D2D communication channel allocation and resource optimization in 5G network based on game theory

27. Transfer learning based intrusion detection scheme for Internet of vehicles

28. 5G mobile communication convergence protocol architecture and key technologies in satellite internet of things system

29. Mobility and marginal gain based content caching and placement for cooperative edge-cloud computing

30. Optimal routing methodology to enhance the life time of sensor network

31. Lightweight blockchain assisted secure routing of swarm UAS networking

32. Intelligent dynamic service pricing strategy for multi-user vehicle-aided MEC networks

33. Possibilities of increasing the throughput of ports

34. Optimized link state routing protocol performance in flying ad-hoc networks for various data rates of Un manned aerial network

35. Visual-based data exchange system for internal and external networks in physical isolation

36. Diversity Schemes in Multi-hop Visible Light Communications for 6G Networks

37. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

38. An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband

39. A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks

40. A blockchain based decentralized data security mechanism for the Internet of Things

41. Recent advances in mobile edge computing and content caching

42. Presentation and interaction of Internet of Things data based on augmented reality

43. Rumor spreading with bounded in-degree

44. Smart city-based e-commerce security technology with improvement of SET network protocol

45. Construction of U2S communications system based on edge fog computing

46. The method of Internet of Things access and network communication based on MQTT

47. Code Domain Non- Orthogonal Multiple Access Schemes for 5G and Beyond Communication Networks: A Review

48. Resource allocation and admission control algorithm based on non-cooperation game in wireless mesh networks

49. Decoupling NDN caches via CCndnS: Design, analysis, and application

50. An intelligent resource dynamic allocation method for UAV wireless mobile network which supports QoS