Nome |
# |
A reinforcement learning-based link quality estimation strategy for RPL and its impact on topology management, file e0d6c92c-5f2d-fcf8-e053-d805fe0aa794
|
537
|
pCoCoA: A precise congestion control algorithm for CoAP, file e0d6c930-7c8e-fcf8-e053-d805fe0aa794
|
397
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c92e-3465-fcf8-e053-d805fe0aa794
|
301
|
Improving network formation in IEEE 802.15.4e DSME, file e0d6c92a-7e3c-fcf8-e053-d805fe0aa794
|
290
|
Mobile-Edge Computing Come Home! Connecting things in future smart homes using LTE device-to-device communications, file e0d6c92c-ad5f-fcf8-e053-d805fe0aa794
|
244
|
null, file e0d6c929-6a3a-fcf8-e053-d805fe0aa794
|
194
|
Edge-centric Distributed Discovery and Access in the Internet of Things, file e0d6c92c-5c5a-fcf8-e053-d805fe0aa794
|
194
|
Container migration in the fog: A performance evaluation, file e0d6c92d-8edb-fcf8-e053-d805fe0aa794
|
114
|
null, file e0d6c92b-209c-fcf8-e053-d805fe0aa794
|
108
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-a769-fcf8-e053-d805fe0aa794
|
105
|
D2D Communications for Large-Scale Fog Platforms: Enabling Direct M2M Interactions, file e0d6c92c-6cfc-fcf8-e053-d805fe0aa794
|
87
|
Improving network formation in 6TiSCH networks, file e0d6c92c-c901-fcf8-e053-d805fe0aa794
|
82
|
BETaaS platform – a Things as a Service Environment for future M2M marketplaces, file e0d6c92e-abcc-fcf8-e053-d805fe0aa794
|
67
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-962a-fcf8-e053-d805fe0aa794
|
57
|
null, file 812c6db4-a786-4949-bbe5-f71ca0a4c2a5
|
53
|
Efficient handoff based on link quality prediction for video streaming in urban transport systems, file e0d6c927-e979-fcf8-e053-d805fe0aa794
|
38
|
A Fog-based Distributed Look-up Service for Intelligent Transportation Systems, file e0d6c92f-da86-fcf8-e053-d805fe0aa794
|
35
|
Exploiting LTE D2D communications in M2M Fog platforms: Deployment and practical issues, file e0d6c92c-7b8b-fcf8-e053-d805fe0aa794
|
34
|
BRUSCHETTA: An IoT blockchain-based framework for certifying extra virgin olive oil supply chain, file e0d6c930-a38d-fcf8-e053-d805fe0aa794
|
32
|
BETaaS: A Platform for Development and Execution of Machine-to-Machine Applications in the Internet of Things, file e0d6c930-b628-fcf8-e053-d805fe0aa794
|
22
|
An implementation and evaluation of the security features of RPL, file e0d6c931-0a80-fcf8-e053-d805fe0aa794
|
21
|
Automating Large-Scale Simulation and Data Analysis with OMNeT++: Lession Learned and Future Perspectives, file e0d6c927-f69a-fcf8-e053-d805fe0aa794
|
14
|
Performance evaluation of Attribute-Based Encryption on constrained IoT devices, file e0d6c930-732e-fcf8-e053-d805fe0aa794
|
13
|
D2D Communications for Large-Scale Fog Platforms: Enabling Direct M2M Interactions, file e0d6c92a-8aae-fcf8-e053-d805fe0aa794
|
10
|
A technological demonstrator for cloud-based performance monitoring and assessment of industrial plants: present architecture and future developments, file e0d6c92f-897b-fcf8-e053-d805fe0aa794
|
10
|
Mobile-Edge Computing Come Home! Connecting things in future smart homes using LTE device-to-device communications, file e0d6c92c-7d44-fcf8-e053-d805fe0aa794
|
9
|
An Experimental Evaluation of the 6Top Protocol for Industrial IoT Applications, file e0d6c92e-6b74-fcf8-e053-d805fe0aa794
|
9
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-c01a-fcf8-e053-d805fe0aa794
|
9
|
Design and Evaluation of a Rate-Based Congestion Control Mechanism in CoAP for IoT Applications, file e0d6c92c-c8f8-fcf8-e053-d805fe0aa794
|
7
|
Analysis and Improvement of the On-The-Fly Bandwidth Reservation Algorithm for 6TiSCH, file e0d6c92c-8d87-fcf8-e053-d805fe0aa794
|
6
|
An implementation and evaluation of the security features of RPL, file e0d6c930-6adf-fcf8-e053-d805fe0aa794
|
6
|
Design of Fault Tolerant Distributed Cyber-Physical Systems for Smart Environments, file e0d6c931-6749-fcf8-e053-d805fe0aa794
|
6
|
Improving network formation in 6TiSCH networks, file e0d6c930-7ce0-fcf8-e053-d805fe0aa794
|
5
|
Ensuring Quality of Service in the Internet of Things, file e0d6c929-6ab9-fcf8-e053-d805fe0aa794
|
4
|
BETaaS: A Platform for Development and Execution of Machine-to-Machine Applications in the Internet of Things, file e0d6c930-b627-fcf8-e053-d805fe0aa794
|
4
|
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation, file 2d5c69d4-e755-4421-9566-160b0ee34cf3
|
3
|
pCoCoA: A precise congestion control algorithm for CoAP, file e0d6c930-750d-fcf8-e053-d805fe0aa794
|
3
|
Edge-centric Distributed Discovery and Access in the Internet of Things, file e0d6c930-a06b-fcf8-e053-d805fe0aa794
|
3
|
Performance Evaluation of Adaptive Autonomous Scheduling Functions for 6TiSCH Networks, file e0d6c932-1014-fcf8-e053-d805fe0aa794
|
3
|
ePhysio: A Wearables-Enabled Platform for the Remote Management of Musculoskeletal Diseases, file 99a6dfa1-c3ce-47a9-ab49-1b5543facbea
|
2
|
Latency-Energy Tradeoffs in Federated Learning on Resource Constrained Edge Computing Systems, file b64f223e-c5f4-4816-8151-524c9e6f26f5
|
2
|
A Framework for Large-scale Simulations and Output Result Analysis with ns-2, file e0d6c926-0d79-fcf8-e053-d805fe0aa794
|
2
|
Exploiting LTE D2D communications in M2M Fog platforms: Deployment and practical issues, file e0d6c927-9b1f-fcf8-e053-d805fe0aa794
|
2
|
null, file e0d6c929-5ce3-fcf8-e053-d805fe0aa794
|
2
|
Efficient Proxying of CoAP Observe with Quality of Service Support, file e0d6c92c-88bf-fcf8-e053-d805fe0aa794
|
2
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c92f-fa48-fcf8-e053-d805fe0aa794
|
2
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c930-bb63-fcf8-e053-d805fe0aa794
|
2
|
Optimized energy and air quality management of shared smart buildings in the covid-19 scenario, file e0d6c931-9610-fcf8-e053-d805fe0aa794
|
2
|
Ns2Voip++, an enhanced module for VoIP simulations, file e0d6c926-06a4-fcf8-e053-d805fe0aa794
|
1
|
The experimental work vs. simulation in the study of mobile ad hoc networks, file e0d6c927-ec48-fcf8-e053-d805fe0aa794
|
1
|
A reinforcement learning-based link quality estimation strategy for RPL and its impact on topology management, file e0d6c930-9290-fcf8-e053-d805fe0aa794
|
1
|
Improving network formation in IEEE 802.15.4e DSME, file e0d6c930-9665-fcf8-e053-d805fe0aa794
|
1
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c930-a684-fcf8-e053-d805fe0aa794
|
1
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-a97f-fcf8-e053-d805fe0aa794
|
1
|
Totale |
3.160 |