Search

Your search keyword '"C.2"' showing total 521 results

Search Constraints

Start Over You searched for: Descriptor "C.2" Remove constraint Descriptor: "C.2"
521 results on '"C.2"'

Search Results

1. Reliability-considered Multi-platoon's Groupcasting using the Resource Sharing Method

2. Meta-Learning Guided Label Noise Distillation for Robust Signal Modulation Classification

3. On the Use of Immersive Digital Technologies for Designing and Operating UAVs

4. An Overview of Integration of the Virtualization of Network Functions in the Context of Information Centric Networks

5. Koopman based trajectory model and computation offloading for high mobility paradigm in ISAC enabled IoT system

6. Multiplexed Quantum Communication with Surface and Hypergraph Product Codes

7. Content Provider Contributions to Capacity Expansion of a Neutral ISP: Effect of Private Option

8. An Improved Robust Total Logistic Distance Metric algorithm for Generalized Gaussian Noise and Noisy Input

9. Age of Information Minimization using Multi-agent UAVs based on AI-Enhanced Mean Field Resource Allocation

10. On the Benefits of Traffic 'Reprofiling' -- The Multiple Hops Case -- Part I

11. A Survey on Efficient Federated Learning Methods for Foundation Model Training

12. Efficient Interference Graph Estimation via Concurrent Flooding

13. Real-Time Performance of Industrial IoT Communication Technologies: A Review

14. Active Admission Control in a P2P Distributed Environment for Capacity Efficient Livestreaming in Mobile Wireless Networks

15. On the Fidelity Distribution of Link-level Entanglements under Purification

16. Bandwidth Efficient Livestreaming in Mobile Wireless Networks: A Peer-to-Peer ACIDE Solution

17. A survey of trends and motivations regarding Communication Service Providers' metro area network implementations

18. Statement: The Metaverse as an Information-Centric Network

19. DarkDiff: Explainable web page similarity of TOR onion sites

20. mmHawkeye: Passive UAV Detection with a COTS mmWave Radar

21. A Survey of mmWave-based Human Sensing: Technology, Platform and Applications

22. 6LoRa: Full Stack IPv6 Networking with DSME-LoRa on Low Power IoT Nodes

23. Evaluating FAIR Digital Object and Linked Data as distributed object systems

24. Big Data and Large Numbers. Interpreting Zipf's Law

25. Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity

26. SoK: Scalability Techniques for BFT Consensus

27. Dynamic realization of miscellaneous profile services in elastic optical networks using spectrum partitioning

28. On Modeling Network Slicing Communication Resources with SARSA Optimization

29. Blockchain Network Analysis: A Comparative Study of Decentralized Banks

30. Noise in the Clouds: Influence of Network Performance Variability on Application Scalability

31. Remembering Netizens: An interview with Ronda Hauben, co-author of Netizens: On the history and impact of Usenet and the Internet (1997)

32. Still Unsolved High-Performance Computing Challenges for up to Pre-Petascale Homogeneous Supercomputers

33. Coalitional Game-Theoretical Approach to Coinvestment with Application to Edge Computing

34. CDBB West Cambridge Digital Twin: Lessons Learned

35. Optimizing Resource Allocation with High-Reliability Constraint for Multicasting Automotive Messages in 5G NR C-V2X Networks

36. Experimental demonstration of the criterion for the prepare-and-measure nonclassicality

37. OpenDSU: Digital Sovereignty in PharmaLedger

38. Energy Efficient Deployment and Orchestration of Computing Resources at the Network Edge: a Survey on Algorithms, Trends and Open Challenges

39. Dialogue Policies for Confusion Mitigation in Situated HRI

40. Deployment of AGRI-BOT in Greenhouse Administration

41. A Throughput Optimal Scheduling Policy for a Quantum Switch

42. Detecting Interlocutor Confusion in Situated Human-Avatar Dialogue: A Pilot Study

43. Cluster-Head Rotation Approaches in Sensor Networks: A Review

44. Multibit Tries Packet Classification with Deep Reinforcement Learning

45. Many Field Packet Classification with Decomposition and Reinforcement Learning

46. Improved Network Calculus Delay Bounds in Time-Sensitive Networks

47. Towards Security-Optimized Placement of ADS-B Sensors

48. Postcertificates for Revocation Transparency

49. RiskNet: Neural Risk Assessment in Networks of Unreliable Resources

50. A Review of Augmented Reality Apps for an AR-Based STEM Education Framework

Catalog

Books, media, physical & digital resources