Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Activate or sleep? An optimal two-threshold policy for transmission service Fan, Jiaqi

217 C p. 152-165
artikel
2 A robust and machine learning-driven identification scheme for malicious nodes in UASNs Huang, Xiangdang

217 C p. 1-11
artikel
3 ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things Narimani Zaman Abadi, Masoud

217 C p. 107-125
artikel
4 A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment Mikavica, Branka

217 C p. 183-199
artikel
5 Available energy routing algorithm considering QoS requirements for LEO satellite network Yang, Li

217 C p. 87-96
artikel
6 Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture Xie, Hui

217 C p. 259-267
artikel
7 Editorial Board
217 C p. ii-iii
artikel
8 Exploring the design space of privacy-enhanced content discovery for bitswap Daniel, Erik

217 C p. 12-24
artikel
9 Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach GarcĂ­a-Torres, Miguel

217 C p. 230-245
artikel
10 LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink Daw, Suranjan

217 C p. 41-56
artikel
11 Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing Azimi, Yaser

217 C p. 166-182
artikel
12 ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services Raviglione, F.

217 C p. 70-86
artikel
13 Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning Razaq, Mian Muaz

217 C p. 126-133
artikel
14 Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR Krentz, Konrad-Felix

217 C p. 57-69
artikel
15 Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use Jia, Peiyan

217 C p. 97-106
artikel
16 The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset Gambini, Margherita

217 C p. 25-40
artikel
17 Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications Amer, Asmaa

217 C p. 134-151
artikel
18 Traffic matrix estimation using matrix-CUR decomposition Kumar, Awnish

217 C p. 200-207
artikel
19 VeriBypasser: An automatic image verification code recognition system based on CNN Ding, Weihang

217 C p. 246-258
artikel
20 When game theory meets satellite communication networks: A survey Jiang, Weiwei

217 C p. 208-229
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland