Linked e-resources

Details

Intro
Preface
Organization
Contents
Internet of Things and Wireless Communications
Physical-Layer Network Coding in 6G Enabled Marine Internet of Things
1 Introduction
2 Asymmetric Shallow Seawater Acoustic Channel Model
2.1 Point-To-Point Ray Model
2.2 Asymmetric Two-Way Relay Underwater Acoustic Channel Model
3 Existing Physical Layer Network Coding Scheme
3.1 Physical Layer Network Coding Scheme
3.2 Bi-orthogonal Physical Layer Network Coding Scheme
4 Underwater Asymmetric Physical Layer Network Coding Scheme
4.1 Channel Compensation Preprocessing

4.2 Asymmetric Physical Layer Network Coding Scheme
5 Simulation and Analysis
6 Conclusion
References
A New Load Balance Scheme for Heterogeneous Entities in Cloud Network Convergence
1 Introduction
1.1 Related Works
2 Contributions
2.1 Organization
3 The Model and Requirements of Load Balance for Heterogeneous Entities
3.1 Entities Model
3.2 Load Balance Requirements
4 Design of Load Balance System Architecture
4.1 Service Request Learner
4.2 Local Resource Monitor
4.3 Global Resource Scheduler
4.4 Physical Machine

5 Load Balance Scheme in Cloud Network Convergence
5.1 From Idle State to Normal State
5.2 From Normal State to Busy State
5.3 From Busy State to Normal State or Form Normal State to Idle State
6 Result and Discussion
7 Conclusion
References
Enhancing Wi-Fi Device Authentication Protocol Leveraging Channel State Information
1 Introduction
2 Framework Overview
2.1 Authentication in Access Phase
2.2 Authentication in Association Phase
3 Authentication Leveraging CSI Fingerprint
3.1 Basic Idea
3.2 Algorithm Description
4 CSI Fingerprint Update

4.1 CSI Fingerprint Update in Access Phase
4.2 CSI Fingerprint Update in Association Phase
5 The CSI-based Authentication Protocol
5.1 The Authentication Procedure in Access Phase
5.2 The Continuous Authentication in Association Phase
6 Performance Evaluation
7 Conclusion
References
Reverse Analysis Method of Unknown Protocol Syntax in Mobile Multimedia Communications
1 Introduction
2 Related Work
3 Protocol Feature Extraction Algorithm
3.1 Algorithm Flow
3.2 Algorithm Flow
3.3 Algorithm Evaluation
4 Experimental Results and Analysis
5 Conclusion

Browse Subjects

Show more subjects...

Statistics

from
to
Export