Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             18 results found
no title author magazine year volume issue page(s) type
1 Adaptive partitioning and efficient scheduling for distributed DNN training in heterogeneous IoT environment Huang, Binbin

215 C p. 169-179
article
2 AI-assisted secure data transmission techniques for next-generation HetNets: A review Sharma, Himanshu

215 C p. 74-90
article
3 A UAV-based coverage gap detection and resolution in cellular networks: A machine-learning approach Mostafa, Ahmed Fahim

215 C p. 41-50
article
4 Bandwidth abstraction and service rate instantiation for latency-bounded reliability provisioning in 5th generation wireless networks Liu, Wei

215 C p. 120-129
article
5 Class incremental learning via dynamic regeneration with task-adaptive distillation Yang, Hao

215 C p. 130-139
article
6 Contactless wheat foreign material monitoring and localization with passive RFID tag arrays Shen, Erbo

215 C p. 29-40
article
7 DCSP: A delay and cost-aware service placement and load distribution algorithm for IoT-based fog networks Azizi, Sadoon

215 C p. 9-20
article
8 Distributed cyber-physical intrusion detection using stacking learning for wide-area protection system Lu, Qiuyu

215 C p. 91-102
article
9 Downlink Spreading Factor selection in LoRaWAN Zorbas, Dimitrios

215 C p. 112-119
article
10 Editorial Board
215 C p. ii-iii
article
11 Effective networking: Enabling effective communications towards 6G Gelal Soyak, Ece

215 C p. 1-8
article
12 Energy optimization for full-duplex wireless-powered IoT networks using rotary-wing UAV with multiple antennas Fathollahi, Leyla

215 C p. 62-73
article
13 GLSFF: Global–local specific feature fusion for cross-modality pedestrian re-identification Xue, Chen

215 C p. 157-168
article
14 Key security measurement method of authentication based on mobile edge computing in urban rail transit communication network Wang, Yubian

215 C p. 140-149
article
15 Malicious traffic detection for cloud-edge-end networks: A deep learning approach Liu, Hanbing

215 C p. 150-156
article
16 Mobile-IRS assisted next generation UAV communication networks Shakhatreh, Hazim

215 C p. 51-61
article
17 Network security situation assessment and prediction method based on multimodal transformation in edge computing Xu, Meng

215 C p. 103-111
article
18 Towards heart infarction detection via image-based dataset and three-stream fusion framework Zhong, Chuyi

215 C p. 21-28
article
                             18 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands