Search

Your search keyword '"ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"' showing total 230,303 results

Search Constraints

Start Over You searched for: Descriptor "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS" Remove constraint Descriptor: "ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"
230,303 results on '"ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS"'

Search Results

1. Jamming of LoRa PHY and Countermeasure

2. Joint Access Point Placement and Power-Channel-Resource-Unit Assignment for IEEE 802.11ax-Based Dense WiFi Network With QoS Requirements

3. Energy Optimization of a Laser-Powered Hovering-UAV Relay in Optical Wireless Backhaul

4. Embracing Channel Estimation in Multi-Packet Reception of ZigBee

5. THE REVERSE MATHEMATICS OF CAC FOR TREES

6. A Fast, Reliable, Opportunistic Broadcast Scheme With Mitigation of Internal Interference in VANETs

7. Two-Hop Connectivity to the Roadside in a VANET Under the Random Connection Model

8. Latency Aware Transmission Scheduling for Steerable Free Space Optics

9. Low Latency Allcast Over Broadcast Erasure Channels

10. How to Design Autonomous Service Level Agreements for 6G

11. New Products [New Products]

12. Distributed Transmit Beamforming: Design and Demonstration From the Lab to UAVs

13. Effects of Jamming Attacks on Wireless Networked Control Systems Under Disturbance

14. IMRecoNet: Learn to Detect in Index Modulation Aided MIMO Systems With Complex Valued Neural Networks

15. Efficient method to identify hidden node collision and improving Quality-of-Service (QoS) in wireless sensor networks

16. Gradient monitoring: Study of a powerful communication system

17. An overview of evolution of 3GPP networks

18. On the Ergodic Rate of Cognitive Radio Inspired Uplink Multiple Access

19. Destination source correlation algorithm to monitor local networks: A worm detection technique

20. RadiOrchestra: Proactive Management of Millimeter-Wave Self-Backhauled Small Cells via Joint Optimization of Beamforming, User Association, Rate Selection, and Admission Control

21. Exploration on enhanced Quality of Services for MANET through modified Lumer and Fai-eta algorithm with modified AODV and DSR protocol

22. ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers

23. Spatio-Temporal vehicle traffic flow prediction using multivariate CNN and LSTM model

24. Energy-Efficient Multi-Access Mobile Edge Computing With Secrecy Provisioning

25. A novel traffic controlling model for enhancing routing in mobile Ad-Hoc network

26. Fronthaul Compression for Uplink Massive MIMO Using Matrix Decomposition

27. Optimization technique for fault recovery and fast data transmission in MANET

28. Trust based efficient routing (TER) protocol for MANETS

29. NOMA for Integrating Sensing and Communications towards 6G: A Multiple Access Perspective

30. DynaQ: Enabling Protocol-Independent Service Queue Isolation in Cloud Data Centers

31. An approach to on-stream DDoS blitz detection using machine learning algorithms

32. Implementation of Short-Packet Physical-Layer Network Coding

33. Cellular Networks Pollution Reduction

34. A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques

35. Deep Learning Based Antenna-Time Domain Channel Extrapolation for Hybrid Mmwave Massive MIMO

36. Introduction to Time-Sensitive Networking

37. Interference alignment with receive antenna partitioning for SWIPT-enabled fog RANs

38. Intelligent Reflecting Surface Assisted Wireless Information and Power Transfer With X-Duplex for 6G Networks

39. Machine learning-based adaptive CSI feedback interval

40. Decentralized Resilient Output-Feedback Control Design for Networked Control Systems Under Denial-of-Service

41. PCube: Scaling LoRa Concurrent Transmissions with Reception Diversities

42. Joint Analog and Digital Transceiver Design for Wideband Full Duplex MIMO Systems

43. Performance Evaluation for Secure Communications in Mobile Internet of Vehicles With Joint Reactive Jamming and Eavesdropping Attacks

44. RL-Shield: Mitigating Target Link-Flooding Attacks Using SDN and Deep Reinforcement Learning Routing Algorithm

45. Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network

46. BIIoVT: Blockchain-Based Secure Storage Architecture for Intelligent Internet of Vehicular Things

47. 'A systematic literature review on IoT gateways'

48. On the Performance of Multihop THz Wireless System Over Mixed Channel Fading With Shadowing and Antenna Misalignment

49. IS-WARS: Intelligent and Stealthy Adversarial Attack to Wi-Fi-Based Human Activity Recognition Systems

50. Enabling Cell-Free Massive MIMO Systems With Wireless Millimeter Wave Fronthaul

Catalog

Books, media, physical & digital resources