Search

Your search keyword '"COMPUTER network protocols"' showing total 5,903 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
5,903 results on '"COMPUTER network protocols"'

Search Results

1. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

2. Multiple-Junction-Based Traffic-Aware Routing Protocol Using ACO Algorithm in Urban Vehicular Networks.

3. Correlation-based advanced feature analysis for wireless sensor networks.

4. A multi-objective optimized OLSR routing protocol.

5. Resilient consensus tracking of a nonlinear multi‐agent system with distributed event‐triggered mechanism.

6. Comparison of psychological interventions for anxiety, depression, fatigue and quality of life in colorectal cancer survivors: A systematic review and network meta-analysis protocol.

7. Assessing the content quality of essays in content and language integrated learning: Exploring the construct from subject specialists' perspectives.

8. Impact of noise on data routing in flying Ad hoc networks.

9. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

10. Examination of Traditional Botnet Detection on IoT-Based Bots.

11. A formal security analysis of the fast authentication procedure based on the security context in 5G networks.

12. A Dynamic Framework for Internet-Based Network Time Protocol.

13. Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.

14. An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices.

15. Effect of non-invasive neuromodulation techniques on vascular cognitive impairment: A Bayesian network meta-analysis protocol.

16. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

17. Is It Possible to Eliminate Postoperative Shunt Infections?: Results of a Modified Hydrocephalus Clinical Research Network Protocol.

18. GCM Variants with Robust Initialization Vectors.

19. A Neural Network-Based Random Access Protocol for Crowded Massive MIMO Systems.

20. An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

21. Changes in activity impairment and work productivity after treatment for vitreous hemorrhage due to proliferative diabetic retinopathy: Secondary outcomes from a randomized controlled trial (DRCR Retina Network Protocol AB).

22. Efficacy of pharmacological and non-pharmacological therapy on pain intensity and disability of older people with chronic nonspecific low back pain: a protocol for a network meta-analysis.

23. Smart Healthcare System Using IoT, Cloud and AI/ML.

24. Discovering golden ratio in the world's first five-agent network in ancient China.

25. Integer codes correcting single errors and double adjacent errors.

26. Biopolymer‐Polysiloxane Double Network Aerogels.

27. Biopolymer‐Polysiloxane Double Network Aerogels.

28. EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.

29. Quantum networks based on color centers in diamond.

30. Time-Sensitive Networking to Improve the Performance of Distributed Functional Safety Systems Implemented over Wi-Fi.

31. Experimental Study of Uncertainty in Comparing Time Scales of National Standards of Kazakhstan and Russia on the Internet Using NTP Servers.

32. Privacy-preserving routing using jointly established protocol in IoT network environment.

33. A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks.

34. Design of an enhanced threshold sensitive distributed energy efficient clustering routing protocol for WSN-based IoT.

35. Programmable Data Plane Applications in 5G and Beyond Architectures: A Systematic Review.

36. Observer-based state estimation for discrete-time semi-Markovian jump neural networks with round-robin protocol against cyber attacks.

37. An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.

38. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system.

39. Study and Design of Privacy-Preserving Range Query Protocol in Sensor Networks Based on the Integration Reversal 0-1 Encoding with Bloom Filter.

40. Machine learning‐based clustering protocols for Internet of Things networks: An overview.

41. Improving Smart Irrigation Systems through Energy Efficient Cluster-Head Selection in Heterogeneous WSNs.

42. Weight-Based PA-GPSR Protocol Improvement Method in VANET.

43. Context-Aware Statistical Dead Reckoning for Localization in IoT Scenarios.

44. TCP-RLLD: TCP with reinforcement learning based loss differentiation for mobile adhoc networks.

45. HOTD: A holistic cross-layer time-delay attack detection framework for unmanned aerial vehicle networks.

46. Risk-Aware Distributionally Robust Optimization for Mobile Edge Computation Task Offloading in the Space–Air–Ground Integrated Network.

47. Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things' Devices Security.

48. Multi-BSS Multi-User Full Duplex MAC Protocol based on AP Cooperation for the Next Generation WLAN.

49. BUG BOUNTY HUNTING: A CASE STUDY OF SUCCESSFUL VULNERABILITY DISCOVERY AND DISCLOSURE.

50. Data monitoring for indirect metering terminal of membrane gas measure device based on sensor network.

Catalog

Books, media, physical & digital resources