Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach Fan, Yuqi

13 5 p. 1486-1504
artikel
2 A lightweight three-factor authentication protocol for digital rights management system Yu, SungJin

13 5 p. 1340-1356
artikel
3 An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET Srivastava, Ankita

13 5 p. 1375-1393
artikel
4 A near-optimal content placement in D2D underlaid cellular networks Feng, Guangsheng

13 5 p. 1799-1813
artikel
5 An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs Singh, Samayveer

13 5 p. 1357-1374
artikel
6 A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance Ali, Zainab H.

13 5 p. 1539-1566
artikel
7 A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks Karbasi, Amir Hassani

13 5 p. 1423-1441
artikel
8 A prediction model of cloud security situation based on evolutionary functional network Xie, Baowen

13 5 p. 1312-1326
artikel
9 A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN Guo, Yunhai

13 5 p. 1442-1456
artikel
10 A system for real-time intervention in negative emotional contagion in a smart classroom deployed under edge computing service infrastructure Li, Jian

13 5 p. 1706-1719
artikel
11 A trust evaluation system based on reputation data in Mobile edge computing network Deng, Xiaoheng

13 5 p. 1744-1755
artikel
12 Attribute-based encryption with outsourced decryption in blockchain Zheng, Hui

13 5 p. 1643-1655
artikel
13 Automatic ICA detection in online social networks with PageRank Zare, Maryam

13 5 p. 1297-1311
artikel
14 AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network Ojo, Oluwafolake E.

13 5 p. 1672-1687
artikel
15 Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks Yu, Genghua

13 5 p. 1839-1852
artikel
16 Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles Xie, Jiajia

13 5 p. 1788-1798
artikel
17 Device-to-device streaming video caching for cellular download cost reduction Wang, Rui

13 5 p. 1457-1473
artikel
18 Editorial: Emerging Trends on Data Analytics at the Network Edge Zhang, Deyu

13 5 p. 1704-1705
artikel
19 Efficient caching strategy in wireless networks with mobile edge computing Chen, Ying

13 5 p. 1756-1766
artikel
20 Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks Kuang, Zhufang

13 5 p. 1814-1829
artikel
21 Hybrid conditional privacy-preserving authentication scheme for VANETs Wang, Shibin

13 5 p. 1600-1615
artikel
22 Integration of ZigBee based GPS receiver to CAN network for precision farming applications Ünal, İlker

13 5 p. 1394-1405
artikel
23 Lightweight and secure PUF-based authenticated key agreement scheme for smart grid Tahavori, Mahdi

13 5 p. 1616-1628
artikel
24 Link reliability-based multi-hop directional location routing in vehicular ad hoc network Rana, Kamlesh Kumar

13 5 p. 1656-1671
artikel
25 Optimality analysis of locality-aware tit-for-tat-based P2P file distribution Nishi, Yohei

13 5 p. 1688-1703
artikel
26 Performance analysis of edge-PLCs enabled industrial Internet of things Peng, Yanjun

13 5 p. 1830-1838
artikel
27 Polynomial regressors based data-driven control for autonomous underwater vehicles Li, Hongran

13 5 p. 1767-1775
artikel
28 Power control of D2D communication based on quality of service assurance under imperfect channel information Liu, Zhixin

13 5 p. 1327-1339
artikel
29 PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks Nunoo-Mensah, Henry

13 5 p. 1505-1525
artikel
30 RAIAP: renewable authentication on isolated anonymous profiles Pedrosa, Micael

13 5 p. 1577-1599
artikel
31 Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture Ren, Zibin

13 5 p. 1474-1485
artikel
32 Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing Huang, Jiwei

13 5 p. 1776-1787
artikel
33 RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network Karami, Ahmad

13 5 p. 1406-1422
artikel
34 Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks Kumbhar, Farooque Hassan

13 5 p. 1526-1538
artikel
35 Structuring communities for sharing human digital memories in a social P2P network Rahman, Haseeb Ur

13 5 p. 1629-1642
artikel
36 Toward efficient and effective bullying detection in online social network Wu, Jiale

13 5 p. 1567-1576
artikel
37 Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems Teng, Haojun

13 5 p. 1720-1743
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland