Search Results - Algorithm/Protocol Design and Analysis~
-
1
Authors: et al.
Source: Diagnostics, Vol 15, Iss 23, p 2994 (2025)
Subject Terms: fluid mechanics, retrograde pressure wave, water hammer, recirculating flow, coronary acoustic map, Medicine (General), R5-920
File Description: electronic resource
-
2
Authors:
Source: IEEE Transactions on Mobile Computing
Subject Terms: FP7, Routing protocols, distributed applications, algorithm/protocol design and analysis, dynamic programming, wireless sensor networks, EC, Computer Networks and Communications, SP1-Cooperation, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Information and Communication Technologies, Electrical and Electronic Engineering, European Commission, Software
Access URL: https://www.openaccessrepository.it/record/21696/files/fulltext.pdf
https://www.computer.org/csdl/journal/tm/2009/03/ttm2009030322/13rRUxYrbMR
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000004586376
https://dblp.uni-trier.de/db/journals/tmc/tmc8.html#RossiBZ09
http://www.dei.unipd.it/~rossi/papers/CCMR-TMC09.pdf
https://www.infona.pl/resource/bwmeta1.element.ieee-art-000004586376
https://ieeexplore.ieee.org/document/4586376/
https://www.openaccessrepository.it/record/21696
http://ieeexplore.ieee.org/document/4586376/
https://hdl.handle.net/11577/2456838
https://doi.org/10.1109/TMC.2008.111 -
3
Authors: et al.
Contributors: et al.
Source: Wireless Networks. 30:4773-4795
Subject Terms: Cryptographic Controls, 0202 electrical engineering, electronic engineering, information engineering, Computer science and engineering [Engineering], Algorithm/Protocol Design and Analysis, 02 engineering and technology, 3. Good health
File Description: application/pdf
Access URL: https://hdl.handle.net/10356/168440
-
4
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Dependable and Secure Computing. 16:969-983
Subject Terms: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.gverification, C.2.2.c protocol verification, D.4.6.b authentication, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, C.2.2 network protocols
File Description: application/pdf
-
5
Authors: et al.
Contributors: et al.
Source: IEEE Internet of Things Journal. (2018).
Subject Terms: Computer science [C05] [Engineering, computing & technology], Routing Protocols, Fault Tolerance, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Wireless Sensor Networks, Sciences informatiques [C05] [Ingénierie, informatique & technologie], Algorithm/protocol design and analysis, 7. Clean energy
Access URL: https://orbilu.uni.lu/bitstream/10993/38282/1/Byzantine%20Resilient%20Protocol%20for%20the%20IoT.pdf
https://orbilu.uni.lu/handle/10993/38282
https://dblp.uni-trier.de/db/journals/iotj/iotj6.html#FrohlichSKV19
https://ieeexplore.ieee.org/document/8468005/
https://orbilu.uni.lu/bitstream/10993/38282/1/Byzantine%20Resilient%20Protocol%20for%20the%20IoT.pdf
https://jglobal.jst.go.jp/en/detail?JGLOBAL_ID=201902219929785373
http://orbilu.uni.lu/handle/10993/38282 -
6
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Dependable and Secure Computing
Subject Terms: FOS: Computer and information sciences, Query processing, HF, Computer Science - Cryptography and Security, Privacy, Security, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Integrity and protection, Data encryption, Algorithm/protocol design and analysis, Cryptography and Security (cs.CR), QA76
File Description: application/pdf
Access URL: http://repository.bilkent.edu.tr/bitstream/11693/49286/1/Privacy_preserving_aggregate_queries_for_optimal_location_selection.pdf
http://arxiv.org/abs/1801.02069
http://wrap.warwick.ac.uk/92829/13/WRAP-privacy-preserving-aggregate-queries-Ferhatosmanoglu-2017.pdf
http://ui.adsabs.harvard.edu/abs/2018arXiv180102069Y/abstract
https://arxiv.org/abs/1801.02069
https://ieeexplore.ieee.org/document/7898510/
http://ieeexplore.ieee.org/document/7898510/
http://wrap.warwick.ac.uk/92829/
https://www.computer.org/csdl/journal/tq/2019/02/07898510/13rRUyYjKbL
https://arxiv.org/abs/1801.02069
https://arxiv.org/pdf/1801.02069v1
https://hdl.handle.net/11693/49286 -
7
Authors:
Source: IEEE transactions on mobile computing 1536 (2013). doi:10.1109/TMC.2013.20
info:cnr-pdr/source/autori:Gianpiero Costantino, Fabio Martinelli, Paolo Santi/titolo:Investigating the Privacy vs. Forwarding Accuracy Tradeoff in Opportunistic Interest-Casting/doi:10.1109%2FTMC.2013.20/rivista:IEEE transactions on mobile computing/anno:2013/pagina_da:/pagina_a:/intervallo_pagine:/volume:1536
IEEE transactions on mobile computing 13 (2014): 824–833. doi:10.1109/TMC.2013.20
info:cnr-pdr/source/autori:Gianpiero Costantino, Fabio Martinelli, Paolo Santi/titolo:Investigating the Privacy vs. Forwarding Accuracy Tradeoff in Opportunistic Interest-Casting/doi:10.1109%2FTMC.2013.20/rivista:IEEE transactions on mobile computing/anno:2014/pagina_da:824/pagina_a:833/intervallo_pagine:824–833/volume:13
IEEE Transactions on Mobile ComputingSubject Terms: Computer Systems Organization, Algorithm/protocol design and, 13. Climate action, Operating Systems, Software/Software Engineering, Communication/Networking and Information Technology, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, Security and Privacy Protection, 02 engineering and technology, 16. Peace & justice, Algorithm/protocol design and analysis, Mobile Computing
-
8
Authors:
Source: Advanced Materials Research. :2795-2798
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Access URL: https://www.scientific.net/AMR.926-930.2795
-
9
Authors: et al.
Source: IEEE Transactions on Parallel and Distributed Systems. 19:1297-1309
Subject Terms: Location-dependent and sensitive, Routing protocols, Engineering, Network-level security and protection, Medicine and Health Sciences, Physical Sciences and Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Life Sciences, 02 engineering and technology, Algorithm/protocol design and analysis
-
10
Authors: et al.
Source: IEEE transactions on mobile computing 6 (2007): 790–802.
info:cnr-pdr/source/autori:D. Dardari; A. Conti; C. Buratti; R. Verdone/titolo:Mathematical evaluation of environmental monitoring estimation error through energy-efficient wireless sensor networks/doi:/rivista:IEEE transactions on mobile computing/anno:2007/pagina_da:790/pagina_a:802/intervallo_pagine:790–802/volume:6Subject Terms: algorithm/protocol design and analysis, Wireless sensor networks, energy efficiency, environmental monitoring, modeling techniques, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, wireless sensor networks, distributed estimation, Poisson point process, random sampling, 7. Clean energy
Access URL: http://www.cnr.it/prodotto/i/20593
https://publications.cnr.it/doc/20593
https://doi.ieeecomputersociety.org/10.1109/TMC.2007.1041
https://www.computer.org/csdl/journal/tm/2007/07/h0790/13rRUwInvJV
https://ieeexplore.ieee.org/document/4212093/
https://iris.unife.it/handle/11392/470233
https://dblp.uni-trier.de/db/journals/tmc/tmc6.html#DardariCBV07
http://ieeexplore.ieee.org/document/4212093/
https://hdl.handle.net/20.500.14243/49258
https://hdl.handle.net/11392/470233
https://doi.org/10.1109/TMC.2007.1041
https://hdl.handle.net/11585/48408
https://doi.org/10.1109/TMC.2007.1041 -
11
Authors: et al.
Contributors: et al.
Source: IEEE Transactions on Mobile Computing. 13:1076-1089
Subject Terms: 0203 mechanical engineering, Wireless, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Mobile communication systems, 16. Peace & justice, Algorithm/protocol design and analysis
Access URL: https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/23252
https://ieeexplore.ieee.org/document/6576744/
http://dblp.uni-trier.de/db/journals/tmc/tmc13.html#NamA14
https://dblp.uni-trier.de/db/journals/tmc/tmc13.html#NamA14
https://www.computer.org/csdl/trans/tm/2014/05/06576744.html
http://ieeexplore.ieee.org/document/6576744/ -
12
Authors: et al.
Source: IEEE Transactions on Mobile Computing. 13:1145-1158
-
13
Authors: et al.
Source: IEEE Transactions on Mobile Computing. 6:606-620
Subject Terms: Probability and statistics, Mobile computing, Computer systems organization, Communication/networking and information technology, 11. Sustainability, Mobile environments, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Algorithm/protocol design and analysis, Mathematics of computing, 7. Clean energy
Access URL: https://www.infona.pl/resource/bwmeta1.element.ieee-art-000004161914
http://realitycommons.media.mit.edu/pdfs/Chaintreau.pdf
https://www.computer.org/csdl/trans/tm/2007/06/h0606.html
https://doi.org/10.1109/TMC.2007.1060
https://dl.acm.org/doi/10.1109/TMC.2007.1060
https://dblp.uni-trier.de/db/journals/tmc/tmc6.html#ChaintreauHCDGS07 -
14
Authors:
Source: IEEE Transactions on Computers. 60:1431-1444
Subject Terms: information storage and, 0202 electrical engineering, electronic engineering, information engineering, network problems, 02 engineering and technology, Algorithm/protocol design and analysis, retrieval, web, location
Access URL: http://doi.ieeecomputersociety.org/10.1109/TC.2010.231
https://scholar.nycu.edu.tw/en/publications/optimal-storage-placement-for-tree-structured-networks-with-heter
https://www.infona.pl/resource/bwmeta1.element.ieee-art-000005661768
http://ieeexplore.ieee.org/document/5661768/
https://www.computer.org/csdl/journal/tc/2011/10/ttc2011101431/13rRUwjGoFe
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005661768 -
15
Authors: et al.
Contributors: et al.
Source: MODELS-C 2023: ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion ; https://hal.science/hal-04245594 ; MODELS-C 2023: ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion, Oct 2023, Västerås, Sweden. ⟨10.1109/MODELS-C59198.2023.00066⟩
Subject Terms: Programming Languages and Software, Algorithm/protocol design and analysis, Testing and Debugging, Document and Text Editing, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]
-
16
Authors: et al.
Source: IEEE Transactions on Mobile Computing. 5:1663-1678
Subject Terms: Communication/networking and IT, Grounded graphs, Computation theory, Mobile computing, Problem solving, 0209 industrial biotechnology, Network localization, Computer systems organization, Nonnumerical algorithms and problems, Analysis of algorithms and problem complexity, Architectures, 02 engineering and technology, Computer systems, Keywords: Computer systems organization, Computational complexity, Graph theory, Sensor data fusion Algorithm/protocol design and analysis, 0202 electrical engineering, electronic engineering, information engineering, Network protocols, Computer architecture, Algorithms, Theory of computation
Access URL: http://www.cs.ucsb.edu/~suri/Spr05/locC.pdf
-
17
Authors: BERALDI, ROBERTO
Source: IEEE Transactions on Mobile Computing. 8:500-513
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, algorithm/protocol design and analysis, random walks, search algorithms, mobile ad hoc networks
File Description: application/pdf
-
18
Authors:
Source: IEEE Transactions on Parallel and Distributed Systems. 16:362-373
Subject Terms: Mobile communication system, Multihop ad hoc network, Wireless communication, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Algorithm/protocol design and analysis, Routing protocol
-
19
Subject Terms: C.2.8.a algorithm/protocol design and analysis D.4.6 security and privacy protection, D.4.6.gverification, C.2.2.c protocol verification, D.4.6.b authentication, C.2.2 network protocols
-
20
Full Text Finder
Nájsť tento článok vo Web of Science