Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             33 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cognitive model to predict human interest in smart environments Ahmed, Tanveer

161 C p. 1-9
artikel
2 An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband Kfoury, Elie F.

161 C p. 212-224
artikel
3 Are mobility management solutions ready for 5G and beyond? Jain, Akshay

161 C p. 50-75
artikel
4 Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing Liu, Yuxin

161 C p. 375-386
artikel
5 A solution to MPTCP’s inefficiencies under the incast problem for Data Center Networks Kheirkhah, Morteza

161 C p. 238-247
artikel
6 A staged adaptive firefly algorithm for UAV charging planning in wireless sensor networks Cheng, Linhui

161 C p. 132-141
artikel
7 A taxonomy of AI techniques for 6G communication networks Sheth, Karan

161 C p. 279-303
artikel
8 A taxonomy of blockchain-enabled softwarization for secure UAV network Kumari, Aparna

161 C p. 304-323
artikel
9 Benchmarking open source NFV MANO systems: OSM and ONAP Yilma, Girma M.

161 C p. 86-98
artikel
10 Blockchain based integrated security measure for reliable service delegation in 6G communication environment Manogaran, Gunasekaran

161 C p. 248-256
artikel
11 BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme Wang, Yue

161 C p. 28-40
artikel
12 Cooperative and efficient content caching and distribution mechanism in 5G network Sai, Ying

161 C p. 183-190
artikel
13 Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For IIOT secured transmission in cloud computing Li, Qizhong

161 C p. 10-18
artikel
14 Editorial Board
161 C p. ii-iii
artikel
15 Energy-efficient unmanned aerial vehicle scanning approach with node clustering in opportunistic networks Bacanli, Salih Safa

161 C p. 76-85
artikel
16 Evolutionary game theoretical model for stable femtocells’ clusters formation in HetNets Rohoden, Katty

161 C p. 266-278
artikel
17 Extended analysis of Age of Information threshold violations Franco, Antonio

161 C p. 191-201
artikel
18 Flexible functional split for cost-efficient C-RAN Mei, Haoran

161 C p. 368-374
artikel
19 Learning distributed communication and computation in the IoT Abudu, Prince

161 C p. 150-159
artikel
20 Moving target defense controller of mobile system based on Openflow sensor security scheme Niu, Xin

161 C p. 142-149
artikel
21 N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets Iwendi, Celestine

161 C p. 160-171
artikel
22 Optimization of base station density and user transmission power in multi-tier heterogeneous cellular systems Liu, Zhixin

161 C p. 334-343
artikel
23 Optimization of collaborative resource allocation for mobile edge computing Lv, Zhihan

161 C p. 19-27
artikel
24 Optimization of latency-aware flow allocation in NGFI networks Klinkowski, Mirosław

161 C p. 344-359
artikel
25 PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing Ren, Qingqing

161 C p. 324-333
artikel
26 Performance evaluation of hybrid crowdsensing systems with stateful CrowdSenSim 2.0 simulator Montori, Federico

161 C p. 225-237
artikel
27 ProgLab: Programmable labels for QoS provisioning on software defined networks Froes, Wallas

161 C p. 99-108
artikel
28 Reliable uplink transmissions for NOMA-based Industrial Wireless Networks with guaranteed real-time performance Xu, Chaonong

161 C p. 41-49
artikel
29 Resource provisioning for IoT services in the fog computing environment: An autonomic approach Etemadi, Masoumeh

161 C p. 109-131
artikel
30 Security analysis of indistinguishable obfuscation for internet of medical things applications Jing, Zhengjun

161 C p. 202-211
artikel
31 Sensing network security prevention measures of BIM smart operation and maintenance system Peng, Yu

161 C p. 360-367
artikel
32 Spam transaction attack detection model based on GRU and WGAN-div Yang, Jin

161 C p. 172-182
artikel
33 Wearable bracelets with variable sampling frequency for measuring multiple physiological parameter of human Hu, Jian

161 C p. 257-265
artikel
                             33 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland