Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles Liu, Ziming

8 6 p. 976-983
artikel
2 A blockchain-enabled wiki framework based on participatory design Xu, Zheng

8 6 p. 995-1004
artikel
3 Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework Khan, Wali Ullah

8 6 p. 1005-1013
artikel
4 An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm Nikzad, Mortaza

8 6 p. 1085-1093
artikel
5 An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT Mekala, M.S.

8 6 p. 900-910
artikel
6 An efficient resource optimization scheme for D2D communication Zafar, Mohammad Haseeb

8 6 p. 1122-1129
artikel
7 A notary group-based cross-chain mechanism Xiong, Anping

8 6 p. 1059-1067
artikel
8 A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment Long, Tingyan

8 6 p. 911-922
artikel
9 Applying blockchain-based method to smart contract classification for CPS applications Jiang, Zigui

8 6 p. 964-975
artikel
10 A robust beam tracking scheme for millimeter wave HetNets Xue, Qing

8 6 p. 1115-1121
artikel
11 A survey on communication protocols and performance evaluations for Internet of Things Bayılmış, Cüneyt

8 6 p. 1094-1104
artikel
12 Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment Yang, Xiaoxian

8 6 p. 984-994
artikel
13 Design and analysis of intrusion detection systems for wireless mesh networks Al-Anzi, Fawaz S.

8 6 p. 1068-1076
artikel
14 DroidEnemy: Battling adversarial example attacks for Android malware detection Bala, Neha

8 6 p. 1040-1047
artikel
15 Editorial Board
8 6 p. ii-iii
artikel
16 Effective short text classification via the fusion of hybrid features for IoT social data Luo, Xiong

8 6 p. 942-954
artikel
17 Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications Mahenge, Michael Pendo John

8 6 p. 1048-1058
artikel
18 Enhancing the robustness of object detection via 6G vehicular edge computing Chen, Chen

8 6 p. 923-931
artikel
19 Guest Editorial
8 6 p. 865-867
artikel
20 Location privacy protection of maritime mobile terminals Su, Xin

8 6 p. 932-941
artikel
21 Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment Hu, Hexuan

8 6 p. 868-876
artikel
22 Protecting the trust and credibility of data by tracking forgery trace based on GANs Xiao, Shuai

8 6 p. 877-884
artikel
23 Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation Li, Guoquan

8 6 p. 1077-1084
artikel
24 Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments Zhang, Shouli

8 6 p. 1014-1026
artikel
25 Sum-rate maximization for UAV-enabled two-way relay systems Lu, Keju

8 6 p. 1105-1114
artikel
26 Temporal pattern mining from user-generated content Ali, Adnan

8 6 p. 1027-1039
artikel
27 Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage Tao, Liping

8 6 p. 885-899
artikel
28 Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing Wang, Mingzhi

8 6 p. 955-963
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland