Found: 13
Select item for more details and to access through your institution.
Privacy‐preserving collision detection of moving objects.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3484
- By:
- Publication type:
- Article
Deep‐DRX: A framework for deep learning–based discontinuous reception in 5G wireless networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3579
- By:
- Publication type:
- Article
Power‐efficient D2D relaying cellular network access.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3576
- By:
- Publication type:
- Article
On the wireless virtualization with QoE constraints.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3573
- By:
- Publication type:
- Article
Service disruption index (SDI): A novel user perspective reliability indicator for modern virtual service networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3492
- By:
- Publication type:
- Article
Modeling equipment hierarchy and costs for ICT solutions.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3583
- By:
- Publication type:
- Article
A comprehensive survey on handover management for vehicular ad hoc network based on 5G mobile networks technology.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3546
- By:
- Publication type:
- Article
Computational habitual privacy.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3509
- By:
- Publication type:
- Article
A novel solution for real‐time wireless networks: Telehealth psychological services in rural area.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3550
- By:
- Publication type:
- Article
Simulating 6TiSCH networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3494
- By:
- Publication type:
- Article
Optimal routing approaches for IEEE 802.15.4 TSCH networks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3538
- By:
- Publication type:
- Article
An empirical investigation of botnet as a service for cyberattacks.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3537
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2019, v. 30, n. 3, p. N.PAG, doi. 10.1002/ett.3465
- Publication type:
- Article