Search

Your search keyword '"Computer Communication Networks standards"' showing total 367 results

Search Constraints

Start Over You searched for: Descriptor "Computer Communication Networks standards" Remove constraint Descriptor: "Computer Communication Networks standards" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
367 results on '"Computer Communication Networks standards"'

Search Results

1. Improvement of DBR routing protocol in underwater wireless sensor networks using fuzzy logic and bloom filter.

2. Research on medical system based on blockchain technology.

3. Predictive topology refinements in distributed stream processing system.

4. Starviewer and its comparison with other open-source DICOM viewers using a novel hierarchical evaluation framework.

5. Using and improving distributed data networks to generate actionable evidence: the case of real-world outcomes in the Food and Drug Administration's Sentinel system.

6. Developing an Intranet-Based Lymphedema Dashboard for Breast Cancer Multidisciplinary Teams: Design Research Study.

8. A Primer on Cybersecurity for Physicians.

9. A federated EHR network data completeness tracking system.

10. Designing a Distributed Ledger Technology System for Interoperable and General Data Protection Regulation-Compliant Health Data Exchange: A Use Case in Blood Glucose Data.

11. Adoption of international privacy standards in New Zealand health information research.

12. 'Fit-for-purpose?' - challenges and opportunities for applications of blockchain technology in the future of healthcare.

13. Enhancing the robustness of recommender systems against spammers.

14. Self-Organizing Peer-To-Peer Middleware for Healthcare Monitoring in Real-Time.

15. Protection of Location Privacy Based on Distributed Collaborative Recommendations.

16. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

17. Supporting Regularized Logistic Regression Privately and Efficiently.

18. A Platform-Independent Plugin for Navigating Online Radiology Cases.

19. Measuring the effects of computer downtime on hospital pathology processes.

20. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

21. RDML-Ninja and RDMLdb for standardized exchange of qPCR data.

22. Analyzing comprehensive QoS with security constraints for services composition applications in wireless sensor networks.

23. Exchanging care records using HL7 V3 care provision messages.

24. Dynamic quality of service model for improving performance of multimedia real-time transmission in industrial networks.

25. Evaluation of self-contained PACS viewers on CD-ROM.

26. Congestion prediction modeling for quality of service improvement in wireless sensor networks.

27. Hybrid single-packet IP traceback with low storage and high accuracy.

28. QoS-oriented high dynamic resource allocation in vehicular communication networks.

29. Secure cooperative spectrum sensing for the cognitive radio network using nonuniform reliability.

30. Controlled bidirectional quantum secure direct communication.

31. Merits of usability testing for PACS selection.

32. Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.

33. Visual quality assessment after network transmission incorporating NS2 and Evalvid.

34. Describing the access network by means of router buffer modelling: a new methodology.

35. Adaptive low-power listening MAC protocol based on transmission rates.

36. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

37. On the security of a simple three-party key exchange protocol without server's public keys.

38. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

39. A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants.

40. Analysis and simulation of the dynamic spectrum allocation based on parallel immune optimization in cognitive wireless networks.

41. Network anomaly detection system with optimized DS evidence theory.

42. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks.

43. SPONGY (SPam ONtoloGY): email classification using two-level dynamic ontology.

44. Patient informed governance of distributed research networks: results and discussion from six patient focus groups.

45. Low-cost ultrasonic distance sensor arrays with networked error correction.

46. Health information exchange: are we at an inflection point? As health information exchange evolves forward, industry leaders and experts debate what to do about some of the continuing obstacles to granular-level data exchange. Should federal officials intervene?

47. Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves.

48. Advancement of the artificial pancreas through the development of interoperability standards.

49. Validation of statistical channel models for 60 GHz radio systems in hospital environments.

Catalog

Books, media, physical & digital resources