Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             25 results found
no title author magazine year volume issue page(s) type
1 A delay-constrained node-disjoint multipath routing in software-defined vehicular networks MalekiTabar, Mahsa

15 3 p. 1452-1472
article
2 A localization and deployment model for wireless sensor networks using arithmetic optimization algorithm Bhat, Soumya J

15 3 p. 1473-1485
article
3 An authentication and key agreement scheme for smart grid Safkhani, Masoumeh

15 3 p. 1595-1616
article
4 An effective LS-SVM/AKF aided SINS/DVL integrated navigation system for underwater vehicles Sun, Jin

15 3 p. 1437-1451
article
5 An optimal deployment scheme for extremely fast charging stations Zhong, Ping

15 3 p. 1486-1504
article
6 A novel manufacturing service model transformation method based on product lifecycle Ding, Tao

15 3 p. 1638-1652
article
7 A privacy-preserving and efficient byzantine consensus through multi-signature with ring Wu, Xiaohua

15 3 p. 1669-1684
article
8 BCAV: Blockchain-based certificateless authentication system for vehicular network Tomar, Ashish

15 3 p. 1733-1756
article
9 Bitrans: A bidirectional and trusted data transaction protocol based on the blockchain system Huang, Gen

15 3 p. 1311-1327
article
10 Blockchain-based access control for dynamic device management in microgrid Zhang, Kai

15 3 p. 1653-1668
article
11 EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET Ren, Jin

15 3 p. 1385-1397
article
12 Efficient broadcast scheduling at mobile cloud edges for supporting news-broadcast-on-demand over P2P streaming Tong, Sheau-Ru

15 3 p. 1345-1356
article
13 Fault-Tolerant indoor localization based on speed conscious recurrent neural network using Kullback–Leibler divergence Varma, Pothuri Surendra

15 3 p. 1370-1384
article
14 GE-IDS: an intrusion detection system based on grayscale and entropy Liao, Dan

15 3 p. 1521-1534
article
15 HeadSee: Device-free head gesture recognition with commodity RFID Chen, Kai

15 3 p. 1357-1369
article
16 Information transmission mode and IoT community reconstruction based on user influence in opportunistic s ocial networks Wu, Jia

15 3 p. 1398-1416
article
17 Interference-Free Source Deployment for Coverage in Underwater Acoustic Backscatter Networks Bereketli, Alper

15 3 p. 1577-1594
article
18 Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks Das, Rahul

15 3 p. 1505-1520
article
19 Multi-metric optimization with a new metaheuristic approach developed for 3D deployment of multiple drone-BSs Ozdag, Recep

15 3 p. 1535-1561
article
20 Particle swarm optimization based sleep scheduling and clustering protocol in wireless sensor network Rawat, Piyush

15 3 p. 1417-1436
article
21 QoS-aware resource allocation in mobile edge computing networks: Using intelligent offloading and caching strategy Jalilvand Aghdam Bonab, Mohammad

15 3 p. 1328-1344
article
22 Reinforcement-Learning based energy efficient optimized routing protocol for WSN Keerthika, A.

15 3 p. 1685-1704
article
23 Resource allocation and optimization in D2D communication with PDRAPC framework Babu, Alapaka Nagur

15 3 p. 1617-1637
article
24 RFDCS: A reactive fault detection and classification scheme for clustered wsns Choudhary, Ankur

15 3 p. 1705-1732
article
25 Secure medical data sharing scheme based on traceable ring signature and blockchain Lai, Chengzhe

15 3 p. 1562-1576
article
                             25 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands