Search

Your search keyword '"COMPUTER network protocols"' showing total 156 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Topic computer networks Remove constraint Topic: computer networks Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
156 results on '"COMPUTER network protocols"'

Search Results

1. Serviceability of large-Scale systems.

2. A kernel-space POF virtual switch.

3. Congestion control algorithms in wireless sensor networks: Trends and opportunities.

4. Scheduling analysis of tasks constrained by TDMA: Application to software radio protocols.

5. A MAC Protocol for Full Duplex Cellular Networks.

6. Edge-independent spanning trees in augmented cubes.

7. Modelling and Verification of CoAP over Routing Layer Using SPIN Model Checker.

8. Achieving Energy Saving through Proxying Applications on behalf of Idle Devices.

9. LU-MAC: Licensed and Unlicensed MAC Protocol for Cognitive WiFi Network with Jamming-resistant.

10. A performance evaluation of an efficient traffic congestion detection protocol (ECODE) for intelligent transportation systems.

11. Proactive versus reactive routing in low power and lossy networks: Performance analysis and scalability improvements.

12. Hybrid TDMA with heuristic traffic shaping: An efficient bandwidth allocation approach for heavy loaded LANs

13. Multi-consensus of multi-agent systems with various intelligences using switched impulsive protocols.

14. A Link Quality Prediction Metric for Location based Routing Protocols under Shadowing and Fading Effects in Vehicular Ad Hoc Networks.

15. ECDC: An energy and coverage-aware distributed clustering protocol for wireless sensor networks.

16. A collaborative protocol for anonymous reporting in vehicular ad hoc networks.

17. Improving scalability in vehicular communication using one-way hash chain method.

18. Photonics-oriented data transmission network for the KM3NeT prototype detector.

19. Stable pairwise time synchronization in the application layer for capillary machine-to-machine networks.

20. Optimizing Paxos with batching and pipelining.

21. Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA.

22. A Negotiation Protocol for Meeting Scheduling Agent.

23. MHC-MAC: Cognitive MAC with asynchronous-assembly line mode for improving spectrum utilization and network capacity.

24. Towards a Distributed Plan Execution Monitoring Framework.

25. Alleviating contention-induced spurious timeouts in QoS-aware MANETs.

26. Efficient Dir0B Cache Coherency for Many-Core CMPs.

27. Extending the Eclipse Parallel Tools Platform Debugger with Scalable Parallel Debugging Library.

28. Notes on “Authentication protocol using an identifier in an ad hoc network environment”

29. Re-attack on a three-party password-based authenticated key exchange protocol

30. The costs and benefits of combining different IP mobility standards

31. Enhancing DSR maintenance with power awareness

32. How to improve the peer review method: Free-selection vs assigned-pair protocol evaluated in a computer networking course

33. Wireless Sensor Networks Energy-Efficient MAC Protocol.

34. Maintaining distributed logic programs incrementally

35. Optimisation of control parameters for genetic algorithms to test computer networks under realistic traffic loads.

36. Energy efficient network design tool for green IP/Ethernet networks.

37. Optimization of transport protocols in complex networks

38. A survey of MAC layer solutions to the hidden node problem in ad-hoc networks.

39. ECC Based IKE Protocol Design for Internet Applications.

40. Modelling and analysing congestion in KNXnet/IP

41. A Novel Multi-Channel MAC Protocol for Cluster Based Wireless Multimedia Sensor Networks.

42. A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment

43. Construct the Secure Shell Transport Model and Analyze Its Security Performance.

44. Cluster-based Security Protocol with Node Mobility and Pre-Distribution in MANET.

45. A Multi-Channel Assignment and Switching Based Routing Protocol for Mobile Internet.

46. Fast prototyping of network protocols through ns-3 simulation model reuse

47. Characteristic usage of Turkish internet users in office environment.

48. Distributed audio sensing with homeostasis-inspired autonomous communication.

49. Mediated population protocols

50. Capacity and delay in mobile cognitive networks with random way-point mobility model

Catalog

Books, media, physical & digital resources