Search

Your search keyword '"COMPUTER network protocols"' showing total 315 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
315 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. Network performance analysis in wireless sensor network using modified LEACH protocols using network simulator 2.

3. A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers.

4. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

5. Multiple-Junction-Based Traffic-Aware Routing Protocol Using ACO Algorithm in Urban Vehicular Networks.

6. Correlation-based advanced feature analysis for wireless sensor networks.

7. A multi-objective optimized OLSR routing protocol.

8. Resilient consensus tracking of a nonlinear multi‐agent system with distributed event‐triggered mechanism.

9. Comparison of psychological interventions for anxiety, depression, fatigue and quality of life in colorectal cancer survivors: A systematic review and network meta-analysis protocol.

10. Assessing the content quality of essays in content and language integrated learning: Exploring the construct from subject specialists' perspectives.

11. Impact of noise on data routing in flying Ad hoc networks.

12. Verification server for the assembly model of a block 3D-constractions on prolog.

13. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

14. Examination of Traditional Botnet Detection on IoT-Based Bots.

15. A formal security analysis of the fast authentication procedure based on the security context in 5G networks.

16. A Dynamic Framework for Internet-Based Network Time Protocol.

17. Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.

18. An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices.

19. Effect of non-invasive neuromodulation techniques on vascular cognitive impairment: A Bayesian network meta-analysis protocol.

20. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

21. Is It Possible to Eliminate Postoperative Shunt Infections?: Results of a Modified Hydrocephalus Clinical Research Network Protocol.

22. A comparison study of TCP/IP and named data networking protocol.

23. Enhancing the lifespan of wireless sensor networks by PDBAC-LEACH protocol using clustering approach as an implementation strategy.

24. Analysis of routing protocols in VANET.

25. In-network storage management in large scale wireless sensor networks - A survey.

26. Standards to Secure the Sensors That Power IoT: Existing security standards do not always offer sufficient protection to secure the Internet of Things.

27. GCM Variants with Robust Initialization Vectors.

28. A Neural Network-Based Random Access Protocol for Crowded Massive MIMO Systems.

29. An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

30. Changes in activity impairment and work productivity after treatment for vitreous hemorrhage due to proliferative diabetic retinopathy: Secondary outcomes from a randomized controlled trial (DRCR Retina Network Protocol AB).

31. Efficacy of pharmacological and non-pharmacological therapy on pain intensity and disability of older people with chronic nonspecific low back pain: a protocol for a network meta-analysis.

32. Smart Healthcare System Using IoT, Cloud and AI/ML.

33. Discovering golden ratio in the world's first five-agent network in ancient China.

34. Integer codes correcting single errors and double adjacent errors.

35. Biopolymer‐Polysiloxane Double Network Aerogels.

36. Biopolymer‐Polysiloxane Double Network Aerogels.

37. EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.

38. Network management system (NMS) to monitoring base transceiver station (BTS) in remote area with embedded system.

39. A survey: Energy efficient routing protocols in Internet of Things (IoT).

40. Quantum networks based on color centers in diamond.

41. Time-Sensitive Networking to Improve the Performance of Distributed Functional Safety Systems Implemented over Wi-Fi.

42. Experimental Study of Uncertainty in Comparing Time Scales of National Standards of Kazakhstan and Russia on the Internet Using NTP Servers.

43. Privacy-preserving routing using jointly established protocol in IoT network environment.

44. A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks.

45. Design of an enhanced threshold sensitive distributed energy efficient clustering routing protocol for WSN-based IoT.

46. Programmable Data Plane Applications in 5G and Beyond Architectures: A Systematic Review.

47. Observer-based state estimation for discrete-time semi-Markovian jump neural networks with round-robin protocol against cyber attacks.

48. An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.

49. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system.

50. Study and Design of Privacy-Preserving Range Query Protocol in Sensor Networks Based on the Integration Reversal 0-1 Encoding with Bloom Filter.

Catalog

Books, media, physical & digital resources