Search

Your search keyword '"C.2.0"' showing total 237 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
237 results on '"C.2.0"'

Search Results

1. Learning on JPEG-LDPC Compressed Images: Classifying with Syndromes

2. Evaluation of EAP Usage for Authenticating Eduroam Users in 5G Networks

3. HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design

4. STAC: Leveraging Spatio-Temporal Data Associations For Efficient Cross-Camera Streaming and Analytics

5. Graded modal logic and counting message passing automata

6. Are We Up to the Challenge? An analysis of the FCC Broadband Data Collection Fixed Internet Availability Challenges

7. Descriptive complexity for distributed computing with circuits

8. ASTrack: Automatic Detection and Removal of Web Tracking Code with Minimal Functionality Loss

9. The Effect of Length on Key Fingerprint Verification Security and Usability

10. Techno-Economic Assessment in Communications: New Challenges

11. Application of genetic algorithm to load balancing in networks with a homogeneous traffic flow

12. Multicarrier Rate-Splitting Multiple Access: Superiority of OFDM-RSMA over OFDMA and OFDM-NOMA

13. On the Burstiness of Distributed Machine Learning Traffic

14. Zero-Touch Networks: Towards Next-Generation Network Automation

15. CO-ASnet :A Smart Contract Architecture Design based on Blockchain Technology with Active Sensor Networks

16. OFDM-RSMA: Robust Transmission under Inter-Carrier Interference

17. Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era

18. Forensic Data Analytics for Anomaly Detection in Evolving Networks

19. Descriptive complexity for neural networks via Boolean networks

20. A Blockchain-based Electronic Voting System: EtherVote

21. Information Leakage from Optical Emanations

22. Exploring Fully Offloaded GPU Stream-Aware Message Passing

23. Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

24. Blockchain Technology to Secure Bluetooth

25. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems

26. IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective

27. Four Algorithms on the Swapped Dragonfly

28. F-802.11P: A Fuzzy Enhancement for ieee 802.11P in Vehicle-TO-Everything Communications

29. Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

30. Exploring GPU Stream-Aware Message Passing using Triggered Operations

31. LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

32. Anomaly Detection in Intra-Vehicle Networks

33. An Energy Aware Clustering Scheme for 5G-enabled Edge Computing based IoMT Framework

34. Six Insights into 6G: Orientation and Input for Developing Your Strategic 6G Research Plan

35. Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

36. Prepare your video for streaming with Segue

37. The Swapped Dragonfly

38. A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles

39. Six Questions about 6G

40. Attention-Based Model and Deep Reinforcement Learning for Distribution of Event Processing Tasks

41. A User Centric Blockage Model for Wireless Networks

42. NSF Broadband Research 2020 Report

43. Centralization is about Control, not Protocols (Position Paper)

44. Scheduling Algorithms for Age of Information Differentiation with Random Arrivals

45. Worst-case Delay Bounds in Time-Sensitive Networks with Packet Replication and Elimination

46. RFID Exploitation and Countermeasures

47. An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

48. PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams

49. Decentralized Collaborative Video Caching in 5G Small-Cell Base Station Cellular Networks

50. Suspicious ARP Activity Detection and Clustering Based on Autoencoder Neural Networks

Catalog

Books, media, physical & digital resources