Search

Your search keyword '"COMPUTER network protocols"' showing total 422 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic wireless communications Remove constraint Topic: wireless communications
422 results on '"COMPUTER network protocols"'

Search Results

1. A Neural Network-Based Random Access Protocol for Crowded Massive MIMO Systems.

2. Over-the-Air Firmware Updates for Constrained NB-IoT Devices.

3. Application-aware adaptive parameter control for LoRaWAN.

4. THE PERFORMANCE ANALYSES OF IEEE 802.15.4G SUN LOW-POWER WIRELESS NETWORKS AND THEIR APPLICATION.

5. Network Communication Protocol Design from the Perspective of Batched Network Coding.

6. Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services.

7. Performance analysis of power splitting SWIPT‐enabled full duplex cooperative NOMA system with direct link.

8. Underwater Wireless Sensor Networks: A New Challenge for Topology Control-Based Systems.

9. Multi-Variant Scheduling of Critical Time-Triggered Communication in Incremental Development Process: Application to FlexRay.

10. In-Vehicle Networking: Protocols, Challenges, and Solutions.

11. Concurrent Transmission Aware Routing in Wireless Networks.

12. Measurement Framework for Assessing Reliable Real-Time Capabilities of Wireless Networks.

13. Context-Aware Smallworld Routing for Wireless Ad-Hoc Networks.

14. Orchestration of Microservices for IoT Using Docker and Edge Computing.

15. Wireless big data in cellular networks: the cornerstone of smart cities.

16. Accumulate Then Transmit: Toward Secure Wireless Powered Communication Networks.

17. Self-adaptive risk-aware routing in opportunistic network.

18. Leveraging high-order statistics and classification in frame timing estimation for reliable vehicle-to-vehicle communications.

19. A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks.

20. On the Design of Power Splitting Relays With Interference Alignment.

21. Cooperative Wireless Powered Communication Networks With Interference Harvesting.

22. SS-MAC: A Novel Time Slot-Sharing MAC for Safety Messages Broadcasting in VANETs.

23. WPKI Certificate Verification Scheme Based on Certificate Digest Signature-Online Certificate Status Protocol.

24. SSDNet: Small-World Super-Dense Device-to-Device Wireless Networks.

25. A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks.

26. Secrecy Rate of MISO Optical Wireless Scattering Communications.

27. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.

28. Pinpointing Anomaly RFID Tags: Situation and Opportunities.

29. In-Band Full-Duplex Communications for Underwater Acoustic Networks.

30. A secure cross-layer AODV routing method to detect and isolate (SCLARDI) black hole attacks for MANET.

31. A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks.

32. RBCP-WSN: The Reliable Biderectional Control Protocol for Wireless Sensor Networks.

33. ERP: An efficient reactive routing protocol for dense vehicular ad hoc networks.

34. Adaptive couple-resolution blocking protocol for repeated tag identification in RFID systems.

35. On the design of green protocols for underwater sensor networks.

36. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations.

37. A time-domain control signal detection technique for OFDM.

38. Characterizing the Topology of an Urban Wireless Sensor Network for Road Traffic Management.

39. Buffer sizing in wireless networks: challenges, solutions, and opportunities.

40. Game theoretical analysis of rate adaptation protocols conciliating QoS and QoE.

41. Three-dimensional geographic routing in wireless mobile ad hoc and sensor networks.

42. End-to-end coding for TCP.

43. A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash.

44. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms.

45. Energy-efficient medium access control for energy harvesting communications.

46. When ICN meets C-RAN for HetNets: an SDN approach.

47. Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime.

48. The Study on Media Access Control Protocol for Wireless Network in Library.

49. Hardware Design of Marine Buoy Data Communication Terminal Based on the 1st Generation Beidou Navigation Positioning System.

50. Energy-Aware Sink Node Localization Algorithm for Wireless Sensor Networks.

Catalog

Books, media, physical & digital resources