807 results on '"Assi, Chadi"'
Search Results
102. Joint optimal AF relay assignment and power allocation in wireless cooperative networks
103. Investigation of Power-Aware IEEE 802. 11 Performance in Multi-hop Ad Hoc Networks
104. A Study on the Binary Exponential Backoff in Noisy and Heterogeneous Environment
105. Interlayer Attacks in Mobile Ad Hoc Networks
106. A systematic approach for detecting and clustering distributed cyber scanning
107. Impact of Resource Sharability on Dual Failure Restorability in Optical Mesh Networks
108. Centralized Versus Distributed Re-provisioning in Optical Mesh Networks
109. Real-Time Status Updates in Wireless HARQ With Imperfect Feedback Channel
110. EVOLIoT
111. Optimizing Information Freshness in RIS-Assisted Cooperative Autonomous Driving
112. NOMA-Aided UAV Data Collection from Time-Constrained IoT Devices
113. Leveraging Reconfigurable Intelligent Surface to Minimize Age of Information in Wireless Networks
114. Latency and Reliability Aware Edge Computation Offloading in IRS-aided Networks
115. Reconfigurable Intelligent Surface Enabled Full-Duplex/Half-Duplex Cooperative Non-Orthogonal Multiple Access
116. Joint Clustering and Power Allocation in Coordinated Multipoint Assisted C-NOMA Cellular Networks
117. RIS-Assisted Joint Transmission in a Two-Cell Downlink NOMA Cellular System
118. Dynamic Wavelength Provisioning in DWDM-Based Optical Network
119. Enabling URLLC Applications Through Reconfigurable Intelligent Surfaces: Challenges and Potential
120. On Ransomware Family Attribution Using Pre-Attack Paranoia Activities
121. Reconfigurable Intelligent Surface Enabled Vehicular Communication: Joint User Scheduling and Passive Beamforming
122. Joint Resource Allocation and Phase Shift Optimization for RIS-Aided eMBB/URLLC Traffic Multiplexing
123. Inferring and Investigating IoT-Generated Scanning Campaigns Targeting a Large Network Telescope
124. Edge-Based Detection and Localization of Adversarial Oscillatory Load Attacks Orchestrated by Compromised Ev Charging Stations
125. A Data Mining/ANFIS and Adaptive Control for Detection and Mitigation of Attacks on DC MGs
126. An efficient routing protocol for connecting vehicular networks to the Internet
127. Cross-layer optimization for wireless mesh networks with smart antennas
128. A Downlink Puncturing Scheme for Simultaneous Transmission of URLLC and eMBB Traffic by Exploiting Data Similarity
129. Latency and Reliability Aware Edge Computation Offloading via an Intelligent Reflecting Surface
130. Joint Routing and Scheduling of Mobile Charging Infrastructure for V2V Energy Transfer
131. A Cyber Attack Mitigation Scheme for Series Compensated DFIG-Based Wind Parks
132. UAV-Aided Ultra-Reliable Low-Latency Computation Offloading in Future IoT Networks
133. A Two-Stage Protection Method for Detection and Mitigation of Coordinated EVSE Switching Attacks
134. Invoking Deep Learning for Joint Estimation of Indoor LiFi User Position and Orientation
135. Guest Editors’ Introduction: Special Section on Design and Management of Reliable Communication Networks
136. Leveraging UAVs for Coverage in Cell-Free Vehicular Networks: A Deep Reinforcement Learning Approach
137. A Strings-Based Similarity Analysis Approach for Characterizing IoT Malware and Inferring Their Underlying Relationships
138. UAV-Assisted Content Delivery in Intelligent Transportation Systems-Joint Trajectory Planning and Cache Management
139. Multihop V2U Path Availability Analysis in UAV-Assisted Vehicular Networks
140. Joint Scheduling of eMBB and URLLC Services in RIS-Aided Downlink Cellular Networks
141. Scheduling of Low Latency Services in Softwarized Networks
142. A Data Mining/ANFIS and Adaptive Control for Detection and Mitigation of Attacks on DC MGs
143. Online Altitude Control and Scheduling Policy for Minimizing AoI in UAV-Assisted IoT Wireless Networks.
144. A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution
145. Cascaded Artificial Neural Networks for Proactive Power Allocation in Indoor LiFi Systems
146. Joint Resource and Power Allocation for URLLC-eMBB Traffics Multiplexing in 6G Wireless Networks
147. Autonomous UAV Trajectory for Localizing Ground Objects: A Reinforcement Learning Approach
148. Optimizing Age of Information Through Aerial Reconfigurable Intelligent Surfaces: A Deep Reinforcement Learning Approach
149. Intelligent wireless mesh path selection algorithm using fuzzy decision making
150. Game theoretic models for detecting network intrusions
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.