Search

Your search keyword '"C.2.0"' showing total 735 results

Search Constraints

Start Over You searched for: Descriptor "C.2.0" Remove constraint Descriptor: "C.2.0"
735 results on '"C.2.0"'

Search Results

251. On Propagating Updates in a Byzantine Environment

252. Secure Execution of Java Applets using a Remote Playground

253. ODP channel objects that provide services transparently for distributing processing systems

254. Transport Level Security: a proof using the Gong-Needham-Yahalom Logic

255. Proceedings from Critical Infrastructure: The Path Ahead (XIWT Symposium on Cross-Industry Activities for Information Infrastructure Robustness)

256. Security Policy Specification Using a Graphical Approach

257. Security amplification by composition: The case of doubly-iterated, ideal ciphers

258. On-Line File Caching

259. Information Leakage from Optical Emanations

260. Multi-Perspective Content Delivery Networks Security Framework Using Optimized Unsupervised Anomaly Detection

261. Thek-server dual and loose competitiveness for paging

262. The k-server dual and loose competitiveness for paging

263. MTH-IDS: A Multitiered Hybrid Intrusion Detection System for Internet of Vehicles

264. Attention-based model and deep reinforcement learning for distribution of event processing tasks

265. Application-Based Coexistence of Different Waveforms on Non-Orthogonal Multiple Access

266. Survey of Network Intrusion Detection Methods From the Perspective of the Knowledge Discovery in Databases Process

267. Reducing Precoder/Channel Mismatch and Enhancing Secrecy in Practical MIMO Systems Using Artificial Signals

268. A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles

269. Levels of Anonymity

272. Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

273. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems

274. A User Centric Blockage Model for Wireless Networks

275. Content placement in networks of similarity caches

276. Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic

277. Cycle multiplicity of some total graphs.

278. Worst-case Delay Bounds in Time-Sensitive Networks with Packet Replication and Elimination

279. Decentralized Collaborative Video Caching in 5G Small-Cell Base Station Cellular Networks

280. Large Scale Measurement on the Adoption of Encrypted DNS

281. THRD: Threshold-based hierarchical resource discovery for Grid environments.

282. InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices

283. Arraymetrics: Authentication Through Chaotic Antenna Array Geometries

284. TAPInspector: Safety and Liveness Verification of Concurrent Trigger-Action IoT Systems

285. Techno-Economic Assessment Models for 5G

286. Global Systems Performance Analysis For Mobile Communications (GSM) using Cellular Network CODECS

287. PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams

288. mmWall: A Reconfigurable Metamaterial Surface for mmWave Networks

289. Multi-functional Coexistence of Radar-Sensing and Communication Waveforms

290. On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice

291. New approach to MPI program execution time prediction

292. Optimised allgatherv, reduce_scatter and allreduce communication in message-passing systems

293. Testing Compilers for Programmable Switches Through Switch Hardware Simulation

294. IMPLEMENTATION OF XTEA ENCRYPTION PROTOCOL BASED ON IEEE 802.15.4 WIRELESS SYSTEMS

295. Towards Federated Learning With Byzantine-Robust Client Weighting

296. A Proposed IoT Smart Trap using Computer Vision for Sustainable Pest Control in Coffee Culture

297. On Hyperparameter Optimization of Machine Learning Algorithms: Theory and Practice

298. Downlink channel access performance of NR-U: Impact of numerology and mini-slots on coexistence with Wi-Fi in the 5 GHz band

299. Techno-Economic Assessment in Communications: Models for Access Network Technologies

300. A Distributed Trust Framework for Privacy-Preserving Machine Learning

Catalog

Books, media, physical & digital resources