Search

Your search keyword '"COMPUTER network protocols"' showing total 990 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic wireless communications Remove constraint Topic: wireless communications
990 results on '"COMPUTER network protocols"'

Search Results

51. Directional MAC protocol for IEEE 802.11ad based wireless local area networks.

52. A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks.

53. Secrecy Rate of MISO Optical Wireless Scattering Communications.

54. An Investigation of Two Phase Multi-Relay S-DF Cooperative Wireless Network Over Time-Variant Fading Channels With Incorrect CSI.

55. CONTENTION-BASED VS. SCHEDULED-BASED WIRELESS SENSOR NETWORK.

56. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.

57. Pinpointing Anomaly RFID Tags: Situation and Opportunities.

58. In-Band Full-Duplex Communications for Underwater Acoustic Networks.

59. A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET.

60. A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks.

61. A Novel Ancient Coin-Like Fractal Multiband Antenna for Wireless Applications.

62. ERP: An efficient reactive routing protocol for dense vehicular ad hoc networks.

63. RBCP-WSN: The Reliable Biderectional Control Protocol for Wireless Sensor Networks.

64. A MAC Protocol for Full Duplex Cellular Networks.

65. Implementation and analysis of Wireless Flexible Time-Triggered protocol.

66. An Adaptive-Harvest-Then-Transmit Protocol for Wireless Powered Communications: Multiple Antennas System and Performance Analysis.

67. Exploiting hybrid time switching-based and power splitting-based relaying protocol in wireless powered communication networks with outdated channel state information.

68. Delay Tolerance in Underwater Wireless Communications: A Routing Perspective.

69. Adaptive couple-resolution blocking protocol for repeated tag identification in RFID systems.

70. TeenySec: a new data link layer security protocol for WSNs.

71. On the design of green protocols for underwater sensor networks.

72. NOTIFICATION METHODS IN WIRELESS SYSTEMS.

73. Mobility and Direction Aware Ad-hoc on Demand Distance Vector Routing Protocol.

74. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations.

75. Disjoint Key Establishment Protocol for Wireless Sensor and Actor Networks.

76. A time-domain control signal detection technique for OFDM.

77. Characterizing the Topology of an Urban Wireless Sensor Network for Road Traffic Management.

78. Data communication in VANETs: Protocols, applications and challenges.

79. Wireless mobile DTN routing with the extended minimum estimated expected delay protocol.

80. Analysis and Design of Triple Band Compact Microstrip Patch Antenna with Fractal Elements for Wireless Applications.

81. Buffer sizing in wireless networks: challenges, solutions, and opportunities.

82. Game theoretical analysis of rate adaptation protocols conciliating QoS and QoE.

83. Three-dimensional geographic routing in wireless mobile ad hoc and sensor networks.

84. End-to-end coding for TCP.

85. Merging sub-networks in self-managed vehicular ad-hoc networks.

86. A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash.

87. GTS size adaptation algorithm for IEEE 802.15.4 wireless networks.

88. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.

89. Key Vulnerabilities of Industrial Automation and Control Systems and Recommendations to Prevent Cyber-Attacks.

90. Selective Address Allocator Configuration Protocol (SAACP) for Resource Constrained MANETs.

91. OPWUM: Opportunistic MAC Protocol Leveraging Wake-Up Receivers in WSNs.

92. Cognitive Network Framework for Heterogeneous Wireless Networks.

93. When ICN meets C-RAN for HetNets: an SDN approach.

94. Energy-efficient medium access control for energy harvesting communications.

95. Ad Hoc Cloud as a Service: A Protocol for Setting up an Ad hoc Cloud over MANETs.

96. Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime.

97. Adaptive Probe-based Congestion-aware Handover Procedure Using SIP Protocol.

98. Case Study for Ship Ad-hoc Networks under a Maritime Channel Model in Coastline Areas.

99. Power Switching Protocol for Two-way Relaying Network under Hardware Impairments.

100. The Study on Media Access Control Protocol for Wireless Network in Library.

Catalog

Books, media, physical & digital resources