Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud Shahjalal, Mohammad

193 C p. 63-74
artikel
2 Adaptive task offloading of rechargeable UAV edge computing network based on double decision value iteration Pan, Wenbin

193 C p. 136-145
artikel
3 A Hadamard walk model and its application in identification of important edges in complex networks Liang, Wen

193 C p. 378-387
artikel
4 Analysis of a Multi-Armed Bandit solution to improve the spatial reuse of next-generation WLANs Bardou, Anthony

193 C p. 279-292
artikel
5 Analysis of time-weighted LoRa-based positioning using machine learning Anjum, Mahnoor

193 C p. 266-278
artikel
6 An early stage convolutional feature extracting method using for mining traffic detection Sun, Peifa

193 C p. 346-354
artikel
7 A path characteristics based adaptive subflow switching algorithm for dynamic heterogeneous MPTCP network Cai, Yantao

193 C p. 204-213
artikel
8 ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier Saha, Souvik

193 C p. 246-265
artikel
9 Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems Buse, Dominik S.

193 C p. 396-409
artikel
10 A Website Fingerprint defense technology with low delay and controllable bandwidth Hong, Xueshu

193 C p. 332-345
artikel
11 BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning Alani, Mohammed M.

193 C p. 53-62
artikel
12 Cognitive quality of service predictions in multi-node wireless sensor networks Ateeq, Muhammad

193 C p. 155-167
artikel
13 Context-based caching in mobile information-centric networks Leira, Luís

193 C p. 214-223
artikel
14 Cooperative driving: A comprehensive perspective, the role of communications, and its potential development Lo Cigno, Renato

193 C p. 82-93
artikel
15 Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS Mayor, Vicente

193 C p. 94-108
artikel
16 dMOBAs: A data marketplace on blockchain with arbitration using side-contracts mechanism Tang, Hangyun

193 C p. 10-22
artikel
17 ECiS: Encryption prior to compression for digital image security with reduced memory Singh, Kedar Nath

193 C p. 410-417
artikel
18 EC-MASS: Towards an efficient edge computing-based multi-video scheduling system Yang, Shu

193 C p. 355-364
artikel
19 Editorial Board
193 C p. ii-iii
artikel
20 GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things Changazi, Sabir Ali

193 C p. 109-117
artikel
21 Geolocation-based sector selection for Vehicle-to-Infrastructure 802.11ad communication Mattos, Mateus

193 C p. 224-233
artikel
22 Hierarchical pattern matching for anomaly detection in time series Van Onsem, M.

193 C p. 75-81
artikel
23 Improving 5G network performance for OFDM-IDMA system resource management optimization using bio-inspired algorithm with RSM Jadhav, Makarand

193 C p. 23-37
artikel
24 Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope Sheikh, Zakir Ahmad

193 C p. 302-331
artikel
25 IoT enabled HELMET to safeguard the health of mine workers Singh, Ninni

193 C p. 1-9
artikel
26 Neural language models for network configuration: Opportunities and reality check Ben Houidi, Zied

193 C p. 118-125
artikel
27 Preventing failures of cooperative maneuvers among connected and automated vehicles Häfner, Bernhard

193 C p. 234-245
artikel
28 Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer Parkouk, Sahar

193 C p. 365-377
artikel
29 Secure aggregate signature scheme for smart city applications Eltayieb, Nabeil

193 C p. 388-395
artikel
30 Securing Internet of Things devices against code tampering attacks using Return Oriented Programming Shrivastava, Rajesh Kumar

193 C p. 38-46
artikel
31 SLICES, a scientific instrument for the networking community Fdida, Serge

193 C p. 189-203
artikel
32 Staggered HLL: Near-continuous-time cardinality estimation with no overhead Cornacchia, Alessandro

193 C p. 168-175
artikel
33 Time-slotted LoRa MAC with variable payload support Triantafyllou, Anna

193 C p. 146-154
artikel
34 Toward native explainable and robust AI in 6G networks: Current state, challenges and road ahead Fiandrino, Claudio

193 C p. 47-52
artikel
35 TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI Jia, Bing

193 C p. 293-301
artikel
36 Two-attribute privacy protection method of MCS based on blockchain smart contract Wang, Jian

193 C p. 126-135
artikel
37 Using self-deferral to achieve fairness between Wi-Fi and NR-U in downlink and uplink scenarios Szott, Szymon

193 C p. 176-188
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland