Search

Your search keyword '"COMPUTER network protocols"' showing total 352 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Publisher wiley-blackwell Remove constraint Publisher: wiley-blackwell
352 results on '"COMPUTER network protocols"'

Search Results

1. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

2. Resilient consensus tracking of a nonlinear multi‐agent system with distributed event‐triggered mechanism.

3. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

4. Integer codes correcting single errors and double adjacent errors.

5. Biopolymer‐Polysiloxane Double Network Aerogels.

6. Biopolymer‐Polysiloxane Double Network Aerogels.

7. An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.

8. Machine learning‐based clustering protocols for Internet of Things networks: An overview.

9. An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing.

10. L‐RUBI: An efficient load‐based resource utilization algorithm for bi‐partite scatternet in wireless personal area networks.

11. An efficient self‐deployment methodology for maximized coverage of mobile underwater sensor networks.

12. Exploiting trust, influence, and physical proximity for improving routing performance in vehicular ad hoc networks: The SCALE protocol.

13. Survey on energy efficient dynamic sink optimum routing for wireless sensor network and communication technologies.

14. QoS‐aware IoT networks and protocols: A comprehensive survey.

15. Embedding and classifying test execution traces using neural networks.

16. Energy efficient and effective node deployment for wireless sensor network.

17. Modeling and reliability verification of industrial control network protocol based on time state transition matrix.

18. Reporting of Cochrane systematic review protocols with network meta‐analyses—A scoping review.

19. An SDN‐based technique for reducing handoff times in WiFi networks.

20. Modified QUIC protocol with congestion control for improved network performance.

21. Performance analysis of power splitting SWIPT‐enabled full duplex cooperative NOMA system with direct link.

22. A computing method‐based rearrangement of network protocols to improvise quality factors of FACTS devices and sensors using Newton‐Raphson technique.

23. RPCP‐MAC: Receiver preambling with channel polling MAC protocol for underwater wireless sensor networks.

24. Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks.

25. Energy efficiency of five broadcast-based ARQ protocols in multi-hop wireless sensor networks.

26. Disciplined oscillators for traceable frequency and time in metrology and financial sectors.

27. LILAC: computable capabilities based high performance protocol for CRFID.

28. Semantic network management for next‐generation networks.

29. EIMAC: a multi-channel MAC protocol towards energy efficiency and low interference for WBANs.

30. Wireless big data in cellular networks: the cornerstone of smart cities.

31. Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol.

32. Label-QoS switching protocol for quality of service assurance in dynamic swarm robot local network.

33. An intelligent and knowledge-based overlapping clustering protocol for wireless sensor networks.

34. Leveraging high-order statistics and classification in frame timing estimation for reliable vehicle-to-vehicle communications.

35. ACMHS: Efficient access control for mobile health care system.

36. A novel cross‐layer communication protocol for vehicular sensor networks.

37. A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks.

38. A novel and efficient lattice-based authenticated key exchange protocol in C-K model.

39. Cryptanalysis of an identity-based authenticated key exchange protocol.

40. Formal verification of a radio network random access protocol.

41. An ECC-based authenticated group key exchange protocol in IBE framework.

42. Beacon-based routing protocols for underwater acoustic sensor networks.

43. Secure wireless powered relaying networks: Energy harvesting policies and performance analysis.

44. An efficient EAP-based proxy signature handover authentication scheme for WRANs over TV white space.

45. Time-assisted authentication protocol.

46. Bayesian response-adaptive designs for basket trials.

47. A robust ElGamal-based password-authentication protocol using smart card for client-server communication.

48. Improved multicast routing in MANETs using link stability and route stability.

49. Efficient medium access protocol for Internet of things applications.

50. Study cautions that third parties may share mental health app information.

Catalog

Books, media, physical & digital resources