Works matching DE "END-to-End Negotiation Protocol (Computer network protocol)"
Results: 14
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 421, doi. 10.1007/s11277-017-4176-5
- By:
- Publication type:
- Article
A Tiered Control Plane Model for Service Function Chaining Isolation.
- Published in:
- Future Internet, 2018, v. 10, n. 6, p. 46, doi. 10.3390/fi10060046
- By:
- Publication type:
- Article
Information systems frontiers editorial December 2012.
- Published in:
- 2012
- By:
- Publication type:
- Editorial
End-to-end reliability of service oriented applications.
- Published in:
- Information Systems Frontiers, 2012, v. 14, n. 5, p. 971, doi. 10.1007/s10796-011-9308-y
- By:
- Publication type:
- Article
A Review on Cloud and Fog Computing Integration for IoT: Platforms Perspective.
- Published in:
- EAI Endorsed Transactions on Internet of Things, 2018, v. 4, n. 14, p. 1, doi. 10.4108/eai.20-12-2018.156084
- By:
- Publication type:
- Article
Performance analysis of signalling overhead in Host Identity Protocol-based secure mobile networks: Ultra Flat Architecture or end-to-end signalling?
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 2, p. 531, doi. 10.1007/s11276-014-0797-8
- By:
- Publication type:
- Article
Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 193
- By:
- Publication type:
- Article
Analysis of end-to-end multi-domain management and orchestration frameworks for software defined infrastructures: an architectural survey.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 4, p. n/a, doi. 10.1002/ett.3103
- By:
- Publication type:
- Article
Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2016, v. 27, n. 9, p. 1233, doi. 10.1002/ett.3072
- By:
- Publication type:
- Article
T-DLRP: Detection of Fast Retransmission Losses Using TCP Timestamp for Improving the End-to-End Performance of TCP over Wireless Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/592502
- By:
- Publication type:
- Article
Development of a Secure, Energy Efficient and Reliable Routing Protocol for Mobile Wireless Sensor Networks.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 3, p. 487
- By:
- Publication type:
- Article
Nine steps to improved critical event management.
- Published in:
- Journal of Business Continuity & Emergency Planning, 2019, v. 12, n. 3, p. 253, doi. 10.69554/dgcv7577
- By:
- Publication type:
- Article
Hierarchical convolutional features for end-to-end representation-based visual tracking.
- Published in:
- Machine Vision & Applications, 2018, v. 29, n. 6, p. 955, doi. 10.1007/s00138-018-0947-6
- By:
- Publication type:
- Article
Routing Protocols in Opportunistic Networks - A Survey.
- Published in:
- IETE Technical Review, 2018, v. 35, n. 4, p. 369, doi. 10.1080/02564602.2017.1304834
- By:
- Publication type:
- Article