Search

Your search keyword '"COMPUTER network protocols"' showing total 156 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic data transmission systems Remove constraint Topic: data transmission systems Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
156 results on '"COMPUTER network protocols"'

Search Results

1. A Secure Protocol Authentication Method Based on the Strand Space Model for Blockchain-Based Industrial Internet of Things.

2. HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security †.

3. A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks.

4. Weight-Based PA-GPSR Protocol Improvement Method in VANET.

5. A Survey on Time-Sensitive Networking Standards and Applications for Intelligent Driving.

6. A Multipath Transmission System for Information-Centric Networking Based on Standalone Name Resolution.

7. An On-Demand Scheduling-Based MAC Protocol for UW-WiFi Networks.

8. Design and Performance Analysis of an In-Band Full-Duplex MAC Protocol for Ad Hoc Networks.

9. EMS: Efficient Monitoring System to Detect Non-Cooperative Nodes in IoT-Based Vehicular Delay Tolerant Networks (VDTNs).

10. Energy-Efficient Network Protocols and Resilient Data Transmission Schemes for Wireless Sensor Networks—An Experimental Survey.

11. Mechanical Vibration Test Based on the Wireless Vibration Monitoring System.

12. Light Gradient Boosting Machine-Based Link Quality Prediction for Wireless Sensor Networks.

13. Development of Wireless Transmission System for Microseismicity in Complex Mountainous Area.

14. An Analytical Framework for Disruption of Licklider Transmission Protocol in Mars Communications.

15. Robust filtered Smith predictors for networked control systems with packet-based data transmission.

16. 矿井随钻测量数据处理软件开发与应用.

17. Blockchain Network Propagation Mechanism Based on P4P Architecture.

18. Modified QUIC protocol with congestion control for improved network performance.

19. A new adaptive XOR, hashing and encryption-based authentication protocol for secure transmission of the medical data in Internet of Things (IoT).

20. An edge node monitoring method for power line and wireless integration.

21. Low-Cost Datacenter Load Balancing With Multipath Transport and Top-of-Rack Switches.

22. On-Chip Embedded Debugging System Based on Leach Algorithm Parameter on Detection of Wireless Sensor Networks.

23. A Hybrid Link-TDMA MAC Protocol for Conventional and Radio over Fiber WLANs.

24. Hierarchical Protocol Based on Recursive Clusters for Smart Parking Applications Using Internet of Things (IOT).

25. Simulations of the MAC Layer in the LoRaWAN Networks.

26. EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends.

27. Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management.

28. Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids.

29. 基于链路效能社会DTN网络的路由算法.

30. A COLLISION AWARE PRIORITY LEVEL MEDIUM ACCESS CONTROL PROTOCOL FOR UNDERWATER ACOUSTIC SENSOR NETWORKS.

31. Improvement strategy of S-MAC protocol for wireless sensors in IoT based on data and energy priorities.

32. Optimization by Genetic Algorithm in Wireless Sensor Networks Utilizing Multiple Sinks.

33. Harmonizing Clinical Sequencing and Interpretation for the eMERGE III Network.

34. LILAC: computable capabilities based high performance protocol for CRFID.

35. Distributed resilient filtering for time-varying systems over sensor networks subject to Round-Robin/stochastic protocol.

36. V2V Routing in a VANET Based on the Autoregressive Integrated Moving Average Model.

37. Daugialypių mobiliųjų paslaugų teikimo galimybės autotransporto komunikacijos tinkluose.

38. ANALYTICAL MODEL OF RANDOM MULTIPLE ACCESS PROTOCOL PREDICTIVE P-PERSISTENT CSMA.

39. Computational Intelligence Inspired Data Delivery for Vehicle-to-Roadside Communications.

40. A Multi Criterion Fuzzy based Energy Efficient Routing Protocol for Ad hoc Networks.

41. Informatics External Quality Assurance (IEQA) Down Under: evaluation of a pilot implementation.

42. A Failure Recovery Protocol for Software-Defined Real-Time Networks.

43. Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO).

44. Prolonging the lifetime of large-scale wireless sensor networks using distributed cooperative transmissions.

45. DS-Harmonizer: A Harmonization Service on Spatiotemporal Data Stream in Edge Computing Environment.

46. On Multichannel Random Access for Correlated Sources.

47. Introduction to the special issue on runtime verification.

48. Self-adaptive risk-aware routing in opportunistic network.

49. Cooperative Wireless Powered Communication Networks With Interference Harvesting.

50. LEEF: Latency and energy efficient federation of disjoint wireless sensor segments.

Catalog

Books, media, physical & digital resources