Nome |
# |
null, file e0d6c927-1a7a-fcf8-e053-d805fe0aa794
|
632
|
null, file e0d6c927-cd2f-fcf8-e053-d805fe0aa794
|
356
|
Improving network formation in IEEE 802.15.4e DSME, file e0d6c92a-7e3c-fcf8-e053-d805fe0aa794
|
236
|
Air pollution: a study of citizen's attitudes and behaviors using different information sources, file e0d6c929-669e-fcf8-e053-d805fe0aa794
|
145
|
JAMMY: a Distributed and Dynamic Solution against Selective Jamming Attack in TDMA WSNs, file e0d6c926-fe0e-fcf8-e053-d805fe0aa794
|
132
|
null, file e0d6c926-aac9-fcf8-e053-d805fe0aa794
|
130
|
A Low-cost Sensing System for Cooperative Air Quality Monitoring in Urban Areas, file e0d6c926-a26d-fcf8-e053-d805fe0aa794
|
118
|
null, file e0d6c926-aac6-fcf8-e053-d805fe0aa794
|
100
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c92e-3465-fcf8-e053-d805fe0aa794
|
93
|
Accurate and Efficient Modelling of IEEE 802.15.4 unslotted CSMA/CA through Event Chains Computation, file e0d6c927-24a3-fcf8-e053-d805fe0aa794
|
90
|
Improving network formation in 6TiSCH networks, file e0d6c92c-c901-fcf8-e053-d805fe0aa794
|
66
|
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks, file e0d6c930-9fe2-fcf8-e053-d805fe0aa794
|
42
|
Exploiting mm-wave communications to boost the performance of industrial wireless networks, file e0d6c92c-65ac-fcf8-e053-d805fe0aa794
|
40
|
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation, file 812c6db4-a786-4949-bbe5-f71ca0a4c2a5
|
38
|
An implementation and evaluation of the security features of RPL, file e0d6c931-0a80-fcf8-e053-d805fe0aa794
|
15
|
A Survey on Energy Efficiency in P2P Systems: File Distribution, Content Streaming and Epidemics, file e0d6c927-24a6-fcf8-e053-d805fe0aa794
|
11
|
null, file e0d6c930-886e-fcf8-e053-d805fe0aa794
|
10
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-962a-fcf8-e053-d805fe0aa794
|
9
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-a769-fcf8-e053-d805fe0aa794
|
9
|
DIO Suppression Attack Against Routing in the Internet of Things, file e0d6c930-c01a-fcf8-e053-d805fe0aa794
|
9
|
JAMMY: a Distributed and Dynamic Solution against Selective Jamming Attack in TDMA WSNs, file e0d6c930-c942-fcf8-e053-d805fe0aa794
|
9
|
A technological demonstrator for cloud-based performance monitoring and assessment of industrial plants: present architecture and future developments, file e0d6c92f-897b-fcf8-e053-d805fe0aa794
|
8
|
Exploiting mm-wave communications to boost the performance of industrial wireless networks, file e0d6c929-798f-fcf8-e053-d805fe0aa794
|
7
|
A Model-based Beacon Scheduling Algorithm for IEEE 802.15.4e TSCH Networks, file e0d6c928-60bb-fcf8-e053-d805fe0aa794
|
6
|
Green Proxy-based Approaches for BitTorrent, file e0d6c928-61cf-fcf8-e053-d805fe0aa794
|
6
|
A Sensor-based Power Management System for Sustainable Computing in Large Environments, file e0d6c928-6728-fcf8-e053-d805fe0aa794
|
6
|
Analysis and Improvement of the On-The-Fly Bandwidth Reservation Algorithm for 6TiSCH, file e0d6c92c-8d87-fcf8-e053-d805fe0aa794
|
6
|
An implementation and evaluation of the security features of RPL, file e0d6c930-6adf-fcf8-e053-d805fe0aa794
|
6
|
DISH: DIstributed SHuffling against selective jamming attack in IEEE 802.15.4e TSCH networks, file e0d6c930-938b-fcf8-e053-d805fe0aa794
|
6
|
E-Net-Manager: a Power Management System for Networked PCs based on Soft Sensors, file e0d6c928-61d1-fcf8-e053-d805fe0aa794
|
5
|
A Performance Analysis of the Network Formation Process in IEEE 802.15.4e TSCH Wireless Sensor/Actuator Networks, file e0d6c928-6722-fcf8-e053-d805fe0aa794
|
5
|
On Evaluating the Performance Impact of the IEEE 802.15.4 Security Sub-layer, file e0d6c92a-2469-fcf8-e053-d805fe0aa794
|
5
|
Improving network formation in 6TiSCH networks, file e0d6c930-7ce0-fcf8-e053-d805fe0aa794
|
5
|
Detection of Points of Interest in a Smart Campus, file e0d6c92e-6597-fcf8-e053-d805fe0aa794
|
4
|
An Experimental Evaluation of the 6Top Protocol for Industrial IoT Applications, file e0d6c92e-6b74-fcf8-e053-d805fe0aa794
|
4
|
IEEE 802.15.4e: a Survey, file e0d6c930-a176-fcf8-e053-d805fe0aa794
|
4
|
From IEEE 802.15.4 to IEEE 802.15.4e: A Step Towards the Internet of ThingsAdvances onto the Internet of Things, file e0d6c927-1a7c-fcf8-e053-d805fe0aa794
|
3
|
A Learning-based Algorithm for Optimal MAC Parameters Setting in IEEE 802.15.4 Wireless Sensor Networks, file e0d6c928-61da-fcf8-e053-d805fe0aa794
|
3
|
A Localized Slot Allocation Algorithm for Wireless Sensor Networks, file e0d6c928-6788-fcf8-e053-d805fe0aa794
|
3
|
Strategies for Optimal MAC Parameter Setting in IEEE 802.15.4 Wireless Sensor Networks: a Performance Comparison, file e0d6c928-678a-fcf8-e053-d805fe0aa794
|
3
|
null, file e0d6c927-1d7c-fcf8-e053-d805fe0aa794
|
2
|
null, file e0d6c927-26f2-fcf8-e053-d805fe0aa794
|
2
|
Sensor Networks for Energy Sustainability in BuildingsSensor Networks for Sustainable Development, file e0d6c927-26f6-fcf8-e053-d805fe0aa794
|
2
|
null, file e0d6c928-6360-fcf8-e053-d805fe0aa794
|
2
|
Large Scale Analysis of BitTorrent Proxy for Green Internet File Sharing, file e0d6c928-68c2-fcf8-e053-d805fe0aa794
|
2
|
null, file e0d6c929-5ce3-fcf8-e053-d805fe0aa794
|
2
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c92f-fa48-fcf8-e053-d805fe0aa794
|
2
|
Implementation of a wormhole attack against a RPL network: Challenges and effects, file e0d6c930-bb63-fcf8-e053-d805fe0aa794
|
2
|
Performance Evaluation of Adaptive Autonomous Scheduling Functions for 6TiSCH Networks, file e0d6c932-1014-fcf8-e053-d805fe0aa794
|
2
|
Analysis and Optimization of a Protocol for Mobile Element Discovery in Sensor Networks, file e0d6c926-44a4-fcf8-e053-d805fe0aa794
|
1
|
U-Sense’, A Cooperative Sensing System for Monitoring Air Quality in Urban Areas, file e0d6c926-44c2-fcf8-e053-d805fe0aa794
|
1
|
Energy efficient and reliable data delivery in urban sensing applications: A performance analysis, file e0d6c926-463a-fcf8-e053-d805fe0aa794
|
1
|
null, file e0d6c930-626a-fcf8-e053-d805fe0aa794
|
1
|
Accurate and Efficient Modelling of IEEE 802.15.4 unslotted CSMA/CA through Event Chains Computation, file e0d6c930-82c4-fcf8-e053-d805fe0aa794
|
1
|
Improving network formation in IEEE 802.15.4e DSME, file e0d6c930-9665-fcf8-e053-d805fe0aa794
|
1
|
null, file e0d6c930-9b02-fcf8-e053-d805fe0aa794
|
1
|
On the feasibility of attribute-based encryption on constrained iot devices for smart systems, file e0d6c930-a684-fcf8-e053-d805fe0aa794
|
1
|
Evaluating and improving the scalability of RPL security in the Internet of Things, file e0d6c930-a97f-fcf8-e053-d805fe0aa794
|
1
|
Optimized energy and air quality management of shared smart buildings in the covid-19 scenario, file e0d6c931-9610-fcf8-e053-d805fe0aa794
|
1
|
Totale |
2413 |