Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             22 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A differential privacy-based classification system for edge computing in IoT Xue, Wanli

182 C p. 117-128
artikel
2 An improving approach to analyzing change impact of C programs Dai, Peng

182 C p. 60-71
artikel
3 A novel proactive controller deployment protocol for 5G-enabled software-defined Vehicular Networks Aljeri, Noura

182 C p. 88-97
artikel
4 Blockchain technology as a Fog computing security and privacy solution: An overview Alzoubi, Yehia Ibrahim

182 C p. 129-152
artikel
5 Bounded delay scheduling with packet dependencies Markovitch, Michael

182 C p. 98-109
artikel
6 Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota Shi, Zhan

182 C p. 110-116
artikel
7 Editorial Board
182 C p. ii-iii
artikel
8 Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks Khan, Sulaiman

182 C p. 31-40
artikel
9 Efficient failure recovery techniques for segment-routed networks Anbiah, Anix

182 C p. 1-12
artikel
10 Energy consumption model for data transfer in smartphone Ali, Jameel

182 C p. 13-21
artikel
11 Fast controlling of rumors with limited cost in social networks Yao, Xiaopeng

182 C p. 41-51
artikel
12 Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies Mowla, Md Munjure

182 C p. 223-237
artikel
13 LSTM-MFCN: A time series classifier based on multi-scale spatial–temporal features Zhao, Liang

182 C p. 52-59
artikel
14 Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN Shah, Sayed Qaiser Ali

182 C p. 198-211
artikel
15 On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting El Kamel, Ali

182 C p. 153-169
artikel
16 Protocol Reverse-Engineering Methods and Tools: A Survey Huang, Yuyao

182 C p. 238-254
artikel
17 Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service Lu, Yanrong

182 C p. 22-30
artikel
18 SAAS parallel task scheduling based on cloud service flow load algorithm Zhu, Jian

182 C p. 170-183
artikel
19 Socio-economic factor analysis for sustainable and smart precision agriculture: An ensemble learning approach Dash, Pandit Byomakesha

182 C p. 72-87
artikel
20 Two-phase sample average approximation for video distribution strategy of edge computing in heterogeneous network Lu, Jingfu

182 C p. 255-267
artikel
21 Unsatisfied today, satisfied tomorrow: A simulation framework for performance evaluation of crowdsourcing-based network monitoring Pimpinella, Andrea

182 C p. 184-197
artikel
22 ZM-CTC: Covert timing channel construction method based on zigzag matrix Zheng, Jiamin

182 C p. 212-222
artikel
                             22 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland