Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             40 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AD 2 S: Adaptive anomaly detection on sporadic data streams Liu, Fengrui

209 C p. 151-162
artikel
2 A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing Lv, Sichun

209 C p. 239-248
artikel
3 A joint cluster-based RRM and Low-latency framework using the full-duplex mechanism for NR-V2X networks Waqas, Syed Muhammad

209 C p. 513-525
artikel
4 An adaptive context-aware vertical handover decision algorithm for heterogeneous networks Satapathy, Pratyashi

209 C p. 188-202
artikel
5 An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach Khan, Tayyab

209 C p. 217-229
artikel
6 An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC Chatterjee, Uddalak

209 C p. 47-62
artikel
7 A novel approach for ray tracing optimization in wireless communication Sandouno, Bernard Tamba

209 C p. 309-319
artikel
8 A novel hybrid method for achieving accurate and timeliness vehicular traffic flow prediction in road networks Wang, Zepu

209 C p. 378-386
artikel
9 A secure physical health test data sharing scheme based on token distribution and programmable blockchains Wang, Xiangjie

209 C p. 444-454
artikel
10 A study on 5G performance and fast conditional handover for public transit systems Fiandrino, Claudio

209 C p. 499-512
artikel
11 Autonomous confrontation strategy learning evolution mechanism of unmanned system group under actual combat in the loop Wang, Zhenhua

209 C p. 283-301
artikel
12 Auto-scaling techniques in container-based cloud and edge/fog computing: Taxonomy and survey Dogani, Javad

209 C p. 120-150
artikel
13 Average age upon decisions with truncated HARQ and optimization in the finite blocklength regime Bao, Zhiwei

209 C p. 387-401
artikel
14 Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks Sangeen, Muhammad

209 C p. 359-367
artikel
15 Blockchain based resource allocation in cloud and distributed edge computing: A survey Baranwal, Gaurav

209 C p. 469-498
artikel
16 Blockchain based secure medical data outsourcing with data deduplication in cloud environment Benil, T.

209 C p. 1-13
artikel
17 BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation Abdussami, Mohammad

209 C p. 63-77
artikel
18 Collaborative cloud-edge-end task offloading with task dependency based on deep reinforcement learning Tang, Tiantian

209 C p. 78-90
artikel
19 Constructions of broadcast encryption with personalized messages from bilinear map Acharya, Kamalesh

209 C p. 91-101
artikel
20 Cost-efficient slicing in virtual Radio Access Networks Pramanik, Somreeta

209 C p. 349-358
artikel
21 COUNT: Blockchain framework for resource accountability in e-healthcare Kumar, Gulshan

209 C p. 249-259
artikel
22 Editorial Board
209 C p. ii-iii
artikel
23 Empirical evaluation of 5G and Wi-Fi mesh interworking for Integrated Access and Backhaul networking paradigm Khadmaoui-Bichouna, Mohamed

209 C p. 429-443
artikel
24 Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization Sangaiah, Arun Kumar

209 C p. 14-25
artikel
25 FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks Lu, Yifei

209 C p. 415-428
artikel
26 Focusing on information context for ITS using a spatial age of information model Heinovski, Julian

209 C p. 203-216
artikel
27 Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features Liu, Shan

209 C p. 230-238
artikel
28 How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study Tu, Yan

209 C p. 331-348
artikel
29 Improved TDD operation on Software-Defined Radio platforms towards future wireless standards Havinga, Thijs

209 C p. 178-187
artikel
30 IoT-based generalized multi-granulation sequential three-way decisions Zhang, Yongjing

209 C p. 402-414
artikel
31 Joint task offloading and resource allocation in mixed edge/cloud computing and blockchain empowered device-free sensing systems Du, Jianbo

209 C p. 38-46
artikel
32 NOMA-based energy efficient resource allocation in wireless energy harvesting sensor networks Azarhava, Hosein

209 C p. 302-308
artikel
33 Novel EBBDSA based Resource Allocation Technique for Interference Mitigation in 5G Heterogeneous Network Hasan, Mohammad Kamrul

209 C p. 320-330
artikel
34 OWL: A data sharing scheme with controllable anonymity and integrity for group users Zhang, Yongxin

209 C p. 455-468
artikel
35 Partial offloading in device-to-device-assisted MEC network: A utility optimization approach Zhang, Ruidong

209 C p. 26-37
artikel
36 Performance analysis of general P4 forwarding devices with controller feedback: Single- and multi-data plane cases Kröger, Nicolai

209 C p. 102-119
artikel
37 PROSE: Multi-round fair coflow scheduling without prior knowledge Zhang, Fan

209 C p. 163-177
artikel
38 Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation Böhm, Sebastian

209 C p. 273-282
artikel
39 Throughput maximization for downlink DF MIMO relay based SWIPT cognitive radio networks Mohammadi, Mahla

209 C p. 368-377
artikel
40 Trustworthy artificial intelligence classification-based equivalent bandwidth control Narteni, Sara

209 C p. 260-272
artikel
                             40 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland