Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 Activate or sleep? An optimal two-threshold policy for transmission service Fan, Jiaqi

217 C p. 152-165
article
2 A robust and machine learning-driven identification scheme for malicious nodes in UASNs Huang, Xiangdang

217 C p. 1-11
article
3 ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things Narimani Zaman Abadi, Masoud

217 C p. 107-125
article
4 A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment Mikavica, Branka

217 C p. 183-199
article
5 Available energy routing algorithm considering QoS requirements for LEO satellite network Yang, Li

217 C p. 87-96
article
6 Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture Xie, Hui

217 C p. 259-267
article
7 Editorial Board
217 C p. ii-iii
article
8 Exploring the design space of privacy-enhanced content discovery for bitswap Daniel, Erik

217 C p. 12-24
article
9 Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach GarcĂ­a-Torres, Miguel

217 C p. 230-245
article
10 LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink Daw, Suranjan

217 C p. 41-56
article
11 Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing Azimi, Yaser

217 C p. 166-182
article
12 ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services Raviglione, F.

217 C p. 70-86
article
13 Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning Razaq, Mian Muaz

217 C p. 126-133
article
14 Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR Krentz, Konrad-Felix

217 C p. 57-69
article
15 Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use Jia, Peiyan

217 C p. 97-106
article
16 The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset Gambini, Margherita

217 C p. 25-40
article
17 Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications Amer, Asmaa

217 C p. 134-151
article
18 Traffic matrix estimation using matrix-CUR decomposition Kumar, Awnish

217 C p. 200-207
article
19 VeriBypasser: An automatic image verification code recognition system based on CNN Ding, Weihang

217 C p. 246-258
article
20 When game theory meets satellite communication networks: A survey Jiang, Weiwei

217 C p. 208-229
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands