Works matching DE "INTERNET exchange points"
Results: 185
CSK hopping pattern model for visible light communication networks.
- Published in:
- Optical & Quantum Electronics, 2019, v. 51, n. 4, p. N.PAG, doi. 10.1007/s11082-019-1830-z
- By:
- Publication type:
- Article
Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 5, p. 5870, doi. 10.1007/s11227-023-05685-3
- By:
- Publication type:
- Article
On design and performance analysis of improved shuffle exchange gamma interconnection network layouts.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 11, p. 11611, doi. 10.1007/s11227-022-04735-6
- By:
- Publication type:
- Article
Publisher Correction to: On design and performance analysis of improved shuffle exchange gamma interconnection network layouts.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 6, p. 6730, doi. 10.1007/s11227-022-04919-0
- By:
- Publication type:
- Article
Publisher Correction: On design and performance analysis of improved shuffle exchange gamma interconnection network layouts.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Service placement strategy for joint network selection and resource scheduling in edge computing.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 12, p. 14504, doi. 10.1007/s11227-022-04458-8
- By:
- Publication type:
- Article
Containerized deployment of micro-services in fog devices: a reinforcement learning-based approach.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 5, p. 6817, doi. 10.1007/s11227-021-04135-2
- By:
- Publication type:
- Article
Governing Virtual Bodies and Intimacies: Cybermarriage industries between the United States and Latin America.
- Published in:
- Cadernos PAGU, 2015, n. 44, p. 115, doi. 10.1590/1809-4449201500440115
- By:
- Publication type:
- Article
VICTIMIZACIÓN SEXUAL ONLINE EN LAS ADOLESCENTES DURANTE LA CRISIS SANITARIA POR COVID-19.
- Published in:
- Revista Electrónica de Estudios Penales y de la Seguridad, 2022, v. 10, n. 1, p. 1
- By:
- Publication type:
- Article
Germany ∙ The Regulation of VDSL2 Vectoring Technique: Local-Loop Unbundling between Competition and High-Speed Broadband Networks.
- Published in:
- 2020
- By:
- Publication type:
- Report
IoT based Automatic Irrigation System with Soil Nutrients N, P, and K Measurement using Arduino.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2019, v. 5, p. 59
- By:
- Publication type:
- Article
Networking in the absence of congestion control.
- Published in:
- Stochastic Models, 2020, v. 36, n. 3, p. 401, doi. 10.1080/15326349.2020.1742160
- By:
- Publication type:
- Article
A New Design and Analysis of Power Saving for IoT Gateway.
- Published in:
- IETE Technical Review, 2022, v. 39, n. 3, p. 577, doi. 10.1080/02564602.2021.1880343
- By:
- Publication type:
- Article
e-Democracy is increasing political ignorance.
- Published in:
- Annals of Philosophy, Social & Human Disciplines, 2022, v. 2, p. 19
- By:
- Publication type:
- Article
An efficient lightweight key exchange algorithm for internet of things applications.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2022, v. 12, n. 5, p. 5609, doi. 10.11591/ijece.v12i5.pp5609-5618
- By:
- Publication type:
- Article
An insight into internet sector in Iraq.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 6, p. 5137, doi. 10.11591/ijece.v11i6.pp5137-5143
- By:
- Publication type:
- Article
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 4, p. 2239, doi. 10.11591/ijece.v8i4.pp2239-2246
- By:
- Publication type:
- Article
Innovation Intermediaries: Why Internet Marketplaces for Technology Have Not Yet Met the Expectations.
- Published in:
- Creativity & Innovation Management, 2008, v. 17, n. 1, p. 14, doi. 10.1111/j.1467-8691.2007.00461.x
- By:
- Publication type:
- Article
Enhanced Mechanism for Link Failure Rerouting in Software-Defined Exchange Point Networks.
- Published in:
- Computers, Materials & Continua, 2024, v. 80, n. 3, p. 4361, doi. 10.32604/cmc.2024.054215
- By:
- Publication type:
- Article
A Machine Learning-Based Distributed Denial of Service Detection Approach for Early Warning in Internet Exchange Points.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 2, p. 2235, doi. 10.32604/cmc.2023.038003
- By:
- Publication type:
- Article
A Machine Learning-Based Distributed Denial of Service Detection Approach for Early Warning in Internet Exchange Points.
- Published in:
- Computers, Materials & Continua, 2023, v. 76, n. 2, p. 2235, doi. 10.32604/cmc.2023.038003
- By:
- Publication type:
- Article
An Improved Hybrid Indoor Positioning Algorithm via QPSO and MLP Signal Weighting.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 379, doi. 10.32604/cmc.2023.023824
- By:
- Publication type:
- Article
An Improved Hybrid Indoor Positioning Algorithm via QPSO and MLP Signal Weighting.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 379, doi. 10.32604/cmc.2023.023824
- By:
- Publication type:
- Article
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique.
- Published in:
- Computers, Materials & Continua, 2021, v. 68, n. 1, p. 77, doi. 10.32604/cmc.2021.015770
- By:
- Publication type:
- Article
Entropy-Based Watermarking Approach for Sensitive Tamper Detection of Arabic Text.
- Published in:
- Computers, Materials & Continua, 2021, v. 67, n. 3, p. 3635, doi. 10.32604/cmc.2021.015865
- By:
- Publication type:
- Article
Interplay of ICP and IXP over the Internet with power-law features.
- Published in:
- International Journal of Modern Physics C: Computational Physics & Physical Computation, 2018, v. 29, n. 1, p. -1, doi. 10.1142/S0129183118500018
- By:
- Publication type:
- Article
Performance Evaluation of CNN and Pre-trained Models for Malware Classification.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2023, v. 48, n. 8, p. 10355, doi. 10.1007/s13369-023-07608-z
- By:
- Publication type:
- Article
Survey on 3D Content Encryption.
- Published in:
- International Journal of Interactive Mobile Technologies, 2021, v. 15, n. 15, p. 115, doi. 10.3991/ijim.v15i15.24179
- By:
- Publication type:
- Article
3D Polygon Mesh Encryption Based on 3D Lorenz Chaotic Map.
- Published in:
- International Journal of Interactive Mobile Technologies, 2021, v. 15, n. 15, p. 103, doi. 10.3991/ijim.v15i15.24177
- By:
- Publication type:
- Article
Dynamic simulation and conflict identification analysis of production–living–ecological space in Wuhan, Central China.
- Published in:
- Integrated Environmental Assessment & Management, 2022, v. 18, n. 6, p. 1578, doi. 10.1002/ieam.4574
- By:
- Publication type:
- Article
Commercial Market.
- Published in:
- Microwave Journal, 2012, v. 55, n. 8, p. 49
- By:
- Publication type:
- Article
Zebroid: using IPTV data to support STB-assisted VoD content delivery.
- Published in:
- Multimedia Systems, 2010, v. 16, n. 3, p. 199, doi. 10.1007/s00530-010-0184-y
- By:
- Publication type:
- Article
IMGTXT: Image to Text Encryption Based on Encoding Pixel Contrasts.
- Published in:
- Mathematical Modelling of Engineering Problems, 2022, v. 9, n. 2, p. 539, doi. 10.18280/mmep.090233
- By:
- Publication type:
- Article
MKELM: Mixed Kernel Extreme Learning Machine using BMDA optimization for web services based heart disease prediction in smart healthcare.
- Published in:
- Computer Methods in Biomechanics & Biomedical Engineering, 2022, v. 25, n. 10, p. 1180, doi. 10.1080/10255842.2022.2034795
- By:
- Publication type:
- Article
Enhancing Information Exchange in Ship Maintenance through Digital Twins and IoT: A Comprehensive Framework.
- Published in:
- Computers (2073-431X), 2024, v. 13, n. 10, p. 261, doi. 10.3390/computers13100261
- By:
- Publication type:
- Article
Information services for novelty mining.
- Published in:
- Knowledge Engineering Review, 2014, v. 29, n. 2, p. 234, doi. 10.1017/S026988891400006X
- By:
- Publication type:
- Article
FAC-V: An FPGA-Based AES Coprocessor for RISC-V.
- Published in:
- Journal of Low Power Electronics & Applications, 2022, v. 12, n. 4, p. 50, doi. 10.3390/jlpea12040050
- By:
- Publication type:
- Article
Performance Improvement of Data Offloading using Multi-rate IEEE 802.11 WLAN.
- Published in:
- Majlesi Journal of Electrical Engineering, 2019, v. 13, n. 1, p. 121
- By:
- Publication type:
- Article
Cracking of WPA & WPA2 Using GPUs and Rule-based Method.
- Published in:
- Intelligent Automation & Soft Computing, 2019, v. 25, n. 1, p. 183
- By:
- Publication type:
- Article
THE CASE STUDY OF SYSTEM ARCHITECTURE IN WIRELESS SENSOR NETWORKS: THE KINDERGARTEN SAFETY SYSTEM (KSS).
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 4, p. 507, doi. 10.1080/10798587.2010.10643097
- By:
- Publication type:
- Article
Migrating Web Services in Mobile and Wireless Environments.
- Published in:
- International Journal of Web Services Research, 2009, v. 6, n. 2, p. 1, doi. 10.4018/jwsr.2009092101
- By:
- Publication type:
- Article
An information security behavioural model for the bring-your-own-device trend.
- Published in:
- South African Journal of Information Management, 2018, v. 20, n. 1, p. 1, doi. 10.4102/sajim.v20i1.980
- By:
- Publication type:
- Article
HEVC based tampered video database development for forensic investigation.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 25493, doi. 10.1007/s11042-022-14303-y
- By:
- Publication type:
- Article
Towards an optimized security approach to IoT devices with confidential healthcare data exchange.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 20, p. 31435, doi. 10.1007/s11042-021-10827-x
- By:
- Publication type:
- Article
Blockchain-based reward point exchange systems.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 15/16, p. 9785, doi. 10.1007/s11042-019-08341-2
- By:
- Publication type:
- Article
Edge based image steganography with variable threshold.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 12, p. 16363, doi. 10.1007/s11042-018-6975-4
- By:
- Publication type:
- Article
Access point selection in the network of Internet of things (IoT) considering the strategic behavior of the things and users.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 12, p. 14207, doi. 10.1007/s11227-021-03788-3
- By:
- Publication type:
- Article
Facing Reciprocity: How Photos and Avatars Promote Interaction in Micro-communities.
- Published in:
- Group Decision & Negotiation, 2023, v. 32, n. 2, p. 435, doi. 10.1007/s10726-023-09814-4
- By:
- Publication type:
- Article
Assessing the Heterogeneity of Complaints Related to Tinnitus and Hyperacusis from an Unsupervised Machine Learning Approach: An Exploratory Study.
- Published in:
- 2020
- By:
- Publication type:
- journal article