Works matching DE "ACCESS control of computer networks"
Results: 197
Zebroid: using IPTV data to support STB-assisted VoD content delivery.
- Published in:
- Multimedia Systems, 2010, v. 16, n. 3, p. 199, doi. 10.1007/s00530-010-0184-y
- By:
- Publication type:
- Article
Pan European Phenological database (PEP725): a single point of access for European data.
- Published in:
- International Journal of Biometeorology, 2018, v. 62, n. 6, p. 1109, doi. 10.1007/s00484-018-1512-8
- By:
- Publication type:
- Article
A Framework for the Automation of LTE Physical Layer Tests.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 293, doi. 10.1007/s11277-018-5840-0
- By:
- Publication type:
- Article
An Energy-Efficient and Collision-Avoidance MAC Protocol with Pre-scheduling for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2018, v. 102, n. 1, p. 61, doi. 10.1007/s11277-018-5825-z
- By:
- Publication type:
- Article
Network Neutrality Impact on Human Bond Communications.
- Published in:
- Wireless Personal Communications, 2016, v. 88, n. 1, p. 97, doi. 10.1007/s11277-016-3245-5
- By:
- Publication type:
- Article
A Novel Multi-channel MAC Protocol for Directional Antennas in Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 3, p. 1095, doi. 10.1007/s11277-014-2074-7
- By:
- Publication type:
- Article
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1489, doi. 10.1007/s11277-013-1594-x
- By:
- Publication type:
- Article
Analyzing the Mobile WiMAX System Resource Exploitation of the Downlink Direction.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1117, doi. 10.1007/s11277-013-1557-2
- By:
- Publication type:
- Article
Accountability and Q-Accountable Logging in Wireless Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 75, n. 3, p. 1715, doi. 10.1007/s11277-014-1604-7
- By:
- Publication type:
- Article
Packet Delay in UAV Wireless Networks Under Non-saturated Traffic and Channel Fading Conditions.
- Published in:
- Wireless Personal Communications, 2013, v. 72, n. 2, p. 1105, doi. 10.1007/s11277-013-1057-4
- By:
- Publication type:
- Article
Wireless LAN Access Point Placement Based on User Mobility.
- Published in:
- Wireless Personal Communications, 2011, v. 60, n. 3, p. 431, doi. 10.1007/s11277-011-0300-0
- By:
- Publication type:
- Article
Net Neutrality, Broadband Market Coverage, and Innovation at the Edge.
- Published in:
- Decision Sciences, 2012, v. 43, n. 1, p. 141, doi. 10.1111/j.1540-5915.2011.00338.x
- By:
- Publication type:
- Article
Fine-grained data access control for distributed sensor networks.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1235, doi. 10.1007/s11276-011-0345-8
- By:
- Publication type:
- Article
Fair round robin binary countdown to achieve QoS guarantee and fairness in WLANs.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1259, doi. 10.1007/s11276-011-0347-6
- By:
- Publication type:
- Article
Seeker: A bandwidth-based association control framework for wireless mesh networks.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1287, doi. 10.1007/s11276-011-0349-4
- By:
- Publication type:
- Article
On the reliability and performance of real-time one-hop broadcast MANETs.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 5, p. 1323, doi. 10.1007/s11276-011-0351-x
- By:
- Publication type:
- Article
Percolation theory based connectivity and latency analysis of cognitive radio ad hoc networks.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 3, p. 659, doi. 10.1007/s11276-010-0304-9
- By:
- Publication type:
- Article
Key Management Schemes for Multilayer and Multiple Simultaneous Secure Group Communication.
- Published in:
- ISRN Communications & Networking, 2012, p. 1, doi. 10.5402/2012/383218
- By:
- Publication type:
- Article
ADAPTIVNO UPRAVLJANJE PRIHVATANJEM ZAHTEVA U WCDMA MREŽI.
- Published in:
- Military Technical Courier / Vojnotehnicki Glasnik, 2013, v. 61, n. 3, p. 72, doi. 10.5937/vojtehg61-2191
- By:
- Publication type:
- Article
An analysis on the revoking mechanisms for JSONWeb Tokens.
- Published in:
- International Journal of Distributed Sensor Networks, 2018, v. 14, n. 9, p. 1, doi. 10.1177/1550147718801535
- By:
- Publication type:
- Article
Security mechanisms and data access protocols in innovative wireless networks.
- Published in:
- 2018
- By:
- Publication type:
- Editorial
Advanced secure multimedia services for digital homes.
- Published in:
- Information Systems Frontiers, 2012, v. 14, n. 3, p. 527, doi. 10.1007/s10796-010-9258-9
- By:
- Publication type:
- Article
REGULATED CONDITION-EVENT MATRICES FOR CLOUD ENVIRONMENTS.
- Published in:
- Scalable Computing: Practice & Experience, 2014, v. 15, n. 2, p. 169, doi. 10.12694/scpe.v15i2.982
- By:
- Publication type:
- Article
SOFTWARE MODERNIZATION AND CLOUDIFICATION USING THE ARTIST MIGRATION METHODOLOGY AND FRAMEWORK.
- Published in:
- Scalable Computing: Practice & Experience, 2014, v. 15, n. 2, p. 131, doi. 10.12694/scpe.v15i2.980
- By:
- Publication type:
- Article
Topology properties of a weighted multi-local-world evolving network.
- Published in:
- Canadian Journal of Physics, 2015, v. 93, n. 3, p. 353, doi. 10.1139/cjp-2014-0112
- By:
- Publication type:
- Article
BACK TO BENEVOLENCE: THE CASE FOR INTERNET ACCESS IN NEVADA'S JUVENILE DETENTION CENTERS.
- Published in:
- Nevada Law Journal, 2017, v. 17, n. 2, p. 493
- By:
- Publication type:
- Article
I Am Not a Scientist, I Am a Number.
- Published in:
- 2008
- By:
- Publication type:
- Opinion
Correction: Priority Based Energy Efficient MAC Protocol by Varying Data Rate For Wireless Body Area Network.
- Published in:
- 2024
- Publication type:
- Correction Notice
Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 42, n. 3, p. 935, doi. 10.32604/csse.2022.021816
- By:
- Publication type:
- Article
Pinning event-triggered control for stochastic discrete-time complex networks with timevarying delay.
- Published in:
- IET Control Theory & Applications (Wiley-Blackwell), 2019, v. 13, n. 14, p. 2207, doi. 10.1049/iet-cta.2018.5560
- By:
- Publication type:
- Article
Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things.
- Published in:
- Electronics / Elektronika (1450-5843), 2017, v. 21, n. 2, p. 66, doi. 10.7251/ELS1721066S
- By:
- Publication type:
- Article
Network Neutrality: Lessons from Transportation.
- Published in:
- Review of Network Economics, 2009, v. 8, n. 1, p. 13, doi. 10.2202/1446-9022.1167
- By:
- Publication type:
- Article
Authentication encryption scheme based on lattice.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2788, doi. 10.3969/j.issn.1001-3695.2013.09.057
- By:
- Publication type:
- Article
Decentralised Functional Signatures.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 934, doi. 10.1007/s11036-018-1149-1
- By:
- Publication type:
- Article
A Practical Approach to Energy Efficient Communications in Mobile Wireless Networks.
- Published in:
- Mobile Networks & Applications, 2012, v. 17, n. 2, p. 267, doi. 10.1007/s11036-011-0337-z
- By:
- Publication type:
- Article
Optimum Selection of Access Networks Within Heterogeneous Wireless Environments Based on Linear Programming Techniques.
- Published in:
- Mobile Networks & Applications, 2011, v. 16, n. 4, p. 412, doi. 10.1007/s11036-011-0318-2
- By:
- Publication type:
- Article
Automated Development of Cooperative MAC Protocols.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 6, p. 769, doi. 10.1007/s11036-009-0210-5
- By:
- Publication type:
- Article
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 2, p. 267, doi. 10.1007/s11036-009-0180-7
- By:
- Publication type:
- Article
Automatic Multi-Interface Management Through Profile Handling.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 1, p. 4, doi. 10.1007/s11036-008-0117-6
- By:
- Publication type:
- Article
Auction-Stackelberg game framework for access permission in femtocell networks with multiple network operators.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 5, p. 1525, doi. 10.1007/s11276-016-1406-9
- By:
- Publication type:
- Article
Range extension cooperative MAC to attack energy hole in duty-cycled multi-hop WSNs.
- Published in:
- Wireless Networks (10220038), 2018, v. 24, n. 5, p. 1419, doi. 10.1007/s11276-016-1408-7
- By:
- Publication type:
- Article
An overlay and distributed approach to node mobility in multi-access wireless networks.
- Published in:
- Wireless Networks (10220038), 2014, v. 20, n. 6, p. 1275, doi. 10.1007/s11276-013-0675-9
- By:
- Publication type:
- Article
On Markov-Krein characterization of the mean waiting time in M/ G/ K and other queueing systems.
- Published in:
- Queueing Systems, 2011, v. 68, n. 3/4, p. 339, doi. 10.1007/s11134-011-9248-8
- By:
- Publication type:
- Article
MEMORABILITY OF ALTERNATIVE PASSWORD SYSTEMS.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2009, v. 23, n. 5, p. 987, doi. 10.1142/S0218001409007429
- By:
- Publication type:
- Article
Roles, stacks, histories: A triple for Hoare.
- Published in:
- Journal of Functional Programming, 2011, v. 21, n. 2, p. 159, doi. 10.1017/S0956796810000134
- By:
- Publication type:
- Article
WARSHAK: A TEST CASE FOR THE INTERSECTION OF LAW ENFORCEMENT AND CYBER SECURITY.
- Published in:
- Journal of Law, Technology & Policy, 2010, v. 2010, n. 2, p. 345
- By:
- Publication type:
- Article
THE DIFFICULTY WITH REGULATING NETWORK NEUTRALITY.
- Published in:
- Cardozo Arts & Entertainment Law Journal, 2011, v. 29, n. 2, p. 459
- By:
- Publication type:
- Article
Stradin: A Strategic Dynamic and Interactive Decision-Making Process.
- Published in:
- Group Decision & Negotiation, 1997, v. 6, n. 1, p. 61, doi. 10.1023/A:1008688508836
- By:
- Publication type:
- Article
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks.
- Published in:
- Journal of Sensor & Actuator Networks, 2014, v. 3, n. 3, p. 224, doi. 10.3390/jsan3030224
- By:
- Publication type:
- Article
An adaptive control mechanism for access control in large-scale distributed systems.
- Published in:
- Transactions of the Institute of Measurement & Control, 2014, v. 36, n. 1, p. 26, doi. 10.1177/0142331213488903
- By:
- Publication type:
- Article