Search

Your search keyword '"COMPUTER network protocols"' showing total 305 results
305 results on '"COMPUTER network protocols"'

Search Results

1. Successive observation oriented scheduling and task planning of heterogeneous constellation.

2. Dynamic Defense Model against Eclipse Attacks in Proof-of-Work Blockchain Systems.

3. Detecting contradictions from IoT protocol specification documents based on neural generated knowledge graph.

4. On the variable structure control approach with sliding modes to robust finite-time consensus problems: A methodological overview based on nonsmooth analysis.

5. Enhancing the Security of WPA2/PSK Authentication Protocol in Wi-Fi Networks.

6. Active suspension control with consensus strategy for dynamic posture tracking of wheel-legged robotic systems on uneven surfaces.

7. The art of time-bending: Data augmentation and early prediction for efficient traffic classification.

8. Depth based stable election routing protocol for heterogeneous internet of underwater things (IoUT) energy efficiency.

9. Cognitive network management with optimization using network protocol and machine learning model.

10. A review of IoT network management: Current status and perspectives.

11. Secure Internet Voting Protocol (SIVP): A secure option for electoral processes.

12. Towards Secure and Interoperable Underwater Acoustic Communications: Current Activities in NATO IST-174 Research Task Group.

13. Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime.

14. Impact of repetitive mouse clicking on forearm muscle fatigue and mouse aiming performance.

15. TortoiseBFT: An asynchronous consensus algorithm for IoT system.

16. Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks.

17. Robust filtered Smith predictors for networked control systems with packet-based data transmission.

18. Onboard coordination and scheduling of multiple autonomous satellites in an uncertain environment.

19. Application of network protocol improvement and image content search in mathematical calculus 3D modeling video analysis.

20. Fingerprinting Industrial IoT devices based on multi-branch neural network.

21. Monitoring for Analytes through LoRa and LoRaWAN Technology.

22. GeoAKOM: A Smart Geocasting Protocol for Vehicular Networks.

23. An edge node monitoring method for power line and wireless integration.

24. Performance analysis of access class barring for next generation IoT devices.

25. Optimization and modeling of modified unslotted CSMA/CA for wireless sensor networks.

26. An energy-efficient gossiping protocol for wireless sensor networks using Chebyshev distance.

27. Performance Analysis of RPL Protocol for Data Gathering Applications in Wireless Sensor Networks.

28. Data collection in population protocols with non-uniformly random scheduler.

29. A novel event-triggered communication strategy for second-order multiagent systems.

30. TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment.

31. A survey on unequal clustering protocols in Wireless Sensor Networks.

32. A High Quality Health-Care System For Mobile-Health Services Based on Priority Considerations Strategy.

33. Distributed resilient filtering for time-varying systems over sensor networks subject to Round-Robin/stochastic protocol.

34. Adaptive beacon broadcast in opportunistic routing for VANETs.

35. Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones.

36. Portability, compatibility and reuse of MAC protocols across different IoT radio platforms.

37. An energy-efficient gossiping protocol for wireless sensor networks using Chebyshev distance.

38. Performance Analysis of RPL Protocol for Data Gathering Applications in Wireless Sensor Networks.

39. Performance evaluation of industrial Ethernet protocols for networked control application.

40. On the performance of non-orthogonal multiple access in the finite blocklength regime.

41. Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure.

42. How to obfuscate execution of protocols in an ad hoc radio network?

43. Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit.

44. Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods.

45. Mobility-aware application protocols.

46. Proving properties of the Chord protocol using the ASM formalism.

47. A light-weight bit commitment protocol based on unpredictable channel noise.

48. AMGRP: AHP-based Multimetric Geographical Routing Protocol for Urban environment of VANETs.

49. On the impact of the physical layer model on the performance of D2D-offloading in vehicular environments.

50. MT-CHR: A modified threshold-based cluster head replacement protocol for wireless sensor networks.

Catalog

Books, media, physical & digital resources