Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Adaptive vulnerability-based risk identification software with virtualization functions for dynamic management Pérez, Alberto García

219 C p.
article
2 An end-to-end sensor scheduling method based on D3QN for underwater passive tracking in UWSNs Zheng, Linyao

219 C p.
article
3 Autonomous valet parking optimization with two-step reservation and pricing strategy Hu, Ziyi

219 C p.
article
4 Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions Mahbub, Mobasshir

219 C p.
article
5 Editorial Board
219 C p.
article
6 Efficient application mapping approach based on grey wolf optimization for network on chip Amin, Waqar

219 C p.
article
7 Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain Sunku Mohan, Vamshi

219 C p.
article
8 MADDPG-empowered slice reconfiguration approach for 5G multi-tier system Tian, Chenjing

219 C p.
article
9 Mobility-aware fog computing in dynamic networks with mobile nodes: A survey Ostrowski, Krzysztof

219 C p.
article
10 One-shot models for local core network placement and traffic optimization in self deployable networks Bechkit, Asma

219 C p.
article
11 Robust COVID-19 vaccination control in a multi-city dynamic transmission network: A novel reinforcement learning-based approach Song, Bolin

219 C p.
article
12 USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method Wang, Kaixi

219 C p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands