Search

Your search keyword '"COMPUTER network protocols"' showing total 5,865 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
5,865 results on '"COMPUTER network protocols"'

Search Results

1. Output consensus robustness and performance of first‐order agents.

2. Distributed convex optimization of higher order nonlinear uncertain multi-agent systems with switched parameters and topologies.

3. SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency.

4. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks.

5. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile.

6. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

7. Correlation-based advanced feature analysis for wireless sensor networks.

8. Multiple-Junction-Based Traffic-Aware Routing Protocol Using ACO Algorithm in Urban Vehicular Networks.

9. A multi-objective optimized OLSR routing protocol.

10. Resilient consensus tracking of a nonlinear multi‐agent system with distributed event‐triggered mechanism.

11. Assessing the content quality of essays in content and language integrated learning: Exploring the construct from subject specialists' perspectives.

12. Comparison of psychological interventions for anxiety, depression, fatigue and quality of life in colorectal cancer survivors: A systematic review and network meta-analysis protocol.

13. Impact of noise on data routing in flying Ad hoc networks.

14. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

15. A formal security analysis of the fast authentication procedure based on the security context in 5G networks.

16. Examination of Traditional Botnet Detection on IoT-Based Bots.

17. A Dynamic Framework for Internet-Based Network Time Protocol.

18. Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.

19. An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices.

20. Effect of non-invasive neuromodulation techniques on vascular cognitive impairment: A Bayesian network meta-analysis protocol.

21. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

22. Is It Possible to Eliminate Postoperative Shunt Infections?: Results of a Modified Hydrocephalus Clinical Research Network Protocol.

23. GCM Variants with Robust Initialization Vectors.

24. A Neural Network-Based Random Access Protocol for Crowded Massive MIMO Systems.

25. An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

26. Changes in activity impairment and work productivity after treatment for vitreous hemorrhage due to proliferative diabetic retinopathy: Secondary outcomes from a randomized controlled trial (DRCR Retina Network Protocol AB).

27. Efficacy of pharmacological and non-pharmacological therapy on pain intensity and disability of older people with chronic nonspecific low back pain: a protocol for a network meta-analysis.

28. Smart Healthcare System Using IoT, Cloud and AI/ML.

29. Quantum networks based on color centers in diamond.

30. Discovering golden ratio in the world's first five-agent network in ancient China.

31. Integer codes correcting single errors and double adjacent errors.

32. Biopolymer‐Polysiloxane Double Network Aerogels.

33. Biopolymer‐Polysiloxane Double Network Aerogels.

34. EQRSRL: an energy-aware and QoS-based routing schema using reinforcement learning in IoMT.

35. Time-Sensitive Networking to Improve the Performance of Distributed Functional Safety Systems Implemented over Wi-Fi.

36. Experimental Study of Uncertainty in Comparing Time Scales of National Standards of Kazakhstan and Russia on the Internet Using NTP Servers.

37. Privacy-preserving routing using jointly established protocol in IoT network environment.

38. A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks.

39. An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.

40. Observer-based state estimation for discrete-time semi-Markovian jump neural networks with round-robin protocol against cyber attacks.

41. Design of an enhanced threshold sensitive distributed energy efficient clustering routing protocol for WSN-based IoT.

42. LDES: detector design for version number attack detection using linear temporal logic based on discrete event system.

43. Programmable Data Plane Applications in 5G and Beyond Architectures: A Systematic Review.

44. Study and Design of Privacy-Preserving Range Query Protocol in Sensor Networks Based on the Integration Reversal 0-1 Encoding with Bloom Filter.

45. Machine learning‐based clustering protocols for Internet of Things networks: An overview.

46. HOTD: A holistic cross-layer time-delay attack detection framework for unmanned aerial vehicle networks.

47. Improving Smart Irrigation Systems through Energy Efficient Cluster-Head Selection in Heterogeneous WSNs.

48. TCP-RLLD: TCP with reinforcement learning based loss differentiation for mobile adhoc networks.

49. Weight-Based PA-GPSR Protocol Improvement Method in VANET.

50. Context-Aware Statistical Dead Reckoning for Localization in IoT Scenarios.

Catalog

Books, media, physical & digital resources