Found: 16
Select item for more details and to access through your institution.
Cooperative NOMA with full‐duplex amplify‐and‐forward relaying.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3421
- By:
- Publication type:
- Article
A unified performance analysis of decode‐and‐forward dual‐hop relaying‐based wireless energy harvesting with space modulation.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3419
- By:
- Publication type:
- Article
Hierarchical decision model for throughput maximization in D2D‐enabled LTE‐WiFi HetNets.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3422
- By:
- Publication type:
- Article
MABO‐TSCH: Multihop and blacklist‐based optimized time synchronized channel hopping.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3223
- By:
- Publication type:
- Article
Mode selection considering fairness in D2D‐enabled cellular networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3428
- By:
- Publication type:
- Article
A distributed density optimized scheduling function for IEEE 802.15.4e TSCH networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3420
- By:
- Publication type:
- Article
An overview of outdoor visible light communications.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3448
- By:
- Publication type:
- Article
RTEthernet: Real‐time communication for manufacturing cyberphysical systems.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3433
- By:
- Publication type:
- Article
Reactive security for SDN/NFV‐enabled industrial networks leveraging service function chaining.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3269
- By:
- Publication type:
- Article
Adaptive control‐theoretic detection of integrity attacks against cyber‐physical industrial systems.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3209
- By:
- Publication type:
- Article
Combining distributed queuing with energy harvesting to enable perpetual distributed data collection applications.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3195
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3481
- By:
- Publication type:
- Article
SDN/NFV‐enabled performance estimation framework for SFC optimization.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3441
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2018, v. 29, n. 7, p. 1, doi. 10.1002/ett.3243
- Publication type:
- Article
Erratum.
- Published in:
- 2018
- Publication type:
- Correction Notice
Erratum.
- Published in:
- 2018
- Publication type:
- Correction Notice