Search

Your search keyword '"COMPUTER network protocols"' showing total 32,065 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols"
32,065 results on '"COMPUTER network protocols"'

Search Results

1. Device Onboarding Using FDO and the Untrusted Installer Model.

2. Committee-Based Blockchains as Games between Opportunistic Players and Adversaries.

3. Network performance analysis in wireless sensor network using modified LEACH protocols using network simulator 2.

4. Verification server for the assembly model of a block 3D-constractions on prolog.

5. A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers.

6. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

7. Correlation-based advanced feature analysis for wireless sensor networks.

8. A multi-objective optimized OLSR routing protocol.

9. Resilient consensus tracking of a nonlinear multi‐agent system with distributed event‐triggered mechanism.

10. Comparison of psychological interventions for anxiety, depression, fatigue and quality of life in colorectal cancer survivors: A systematic review and network meta-analysis protocol.

11. Assessing the content quality of essays in content and language integrated learning: Exploring the construct from subject specialists' perspectives.

12. Impact of noise on data routing in flying Ad hoc networks.

13. On the security of a novel privacy‐preserving authentication scheme for V2G networks.

14. A comparison study of TCP/IP and named data networking protocol.

15. Enhancing the lifespan of wireless sensor networks by PDBAC-LEACH protocol using clustering approach as an implementation strategy.

16. Examination of Traditional Botnet Detection on IoT-Based Bots.

17. A formal security analysis of the fast authentication procedure based on the security context in 5G networks.

18. A Dynamic Framework for Internet-Based Network Time Protocol.

19. Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.

20. An Energy-Saving and Environment-Friendly Networked Intelligent Door Lock System for Offices.

21. Effect of non-invasive neuromodulation techniques on vascular cognitive impairment: A Bayesian network meta-analysis protocol.

22. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

23. Is It Possible to Eliminate Postoperative Shunt Infections?: Results of a Modified Hydrocephalus Clinical Research Network Protocol.

24. Standards to Secure the Sensors That Power IoT: Existing security standards do not always offer sufficient protection to secure the Internet of Things.

25. GCM Variants with Robust Initialization Vectors.

26. A Neural Network-Based Random Access Protocol for Crowded Massive MIMO Systems.

27. An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.

28. Real-Time Defect Detection in Electronic Components during Assembly through Deep Learning.

29. A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks.

30. Enhanced Clustering MAC Protocol Based on Learning Automata for UV Networks.

31. A Torpor-based Enhanced Security Model for CSMA/CA Protocol in Wireless Networks.

32. Strengthening data integrity in academic document recording with blockchain and InterPlanetary file system.

33. Digital Twin Technology-Based Networking Solution in Low Earth Orbit Satellite Constellations.

34. Enhancing Security and Trust in Internet of Things through Meshtastic Protocol Utilising Low-Range Technology.

35. On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods.

36. An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application.

37. uw -WiFi: Small-Scale Data Collection Network-Based Underwater Internet of Things.

38. Intelligent High-Awareness and Channel-Efficient Adaptive Beaconing Based on Density and Distribution for Vehicular Networks.

39. Analysis of routing protocols in VANET.

40. In-network storage management in large scale wireless sensor networks - A survey.

41. Network management system (NMS) to monitoring base transceiver station (BTS) in remote area with embedded system.

42. Vision Marine files patent for advanced system communication encryption

43. JOB: Product Validation & Certification Engineer At Siemens In Goa

44. Everlytic demystifies new email authentication protocols

45. Changes in activity impairment and work productivity after treatment for vitreous hemorrhage due to proliferative diabetic retinopathy: Secondary outcomes from a randomized controlled trial (DRCR Retina Network Protocol AB).

46. Efficacy of pharmacological and non-pharmacological therapy on pain intensity and disability of older people with chronic nonspecific low back pain: a protocol for a network meta-analysis.

47. Smart Healthcare System Using IoT, Cloud and AI/ML.

48. Discovering golden ratio in the world's first five-agent network in ancient China.

49. Integer codes correcting single errors and double adjacent errors.

50. Biopolymer‐Polysiloxane Double Network Aerogels.

Catalog

Books, media, physical & digital resources