Listar IMDEA Networks por título
Mostrando ítems 1096-1115 de 1925
-
Modeling Multimode D2D Communications in LTE
(2014-06-20)conference object -
Modeling resource allocation in cellular networks
(2018-03-07)conference object -
Modeling the Evolution of Political Ideologies
(2017-07-10)conference object -
Modeling the Impact of Start-Up Times on the Performance of Resource-on-Demand Schemes in 802.11 WLANs
(2015-04-14)conference object -
Modeling the Throughput of 1-persistent CSMA in Underwater Networks
(2015-05-18)conference object -
Modelling and Real-Trace-Based Evaluation of Static and Dynamic Coalescing for Energy Efficient Ethernet
(2013-05-22)conference object -
Modelling D2D communications in cellular access networks via Coupled Processors
(2015-01-06)conference object -
Modelling D2D Communications in Cellular Access Networks via Coupled Processors
(2015-01-06)conference object -
Modelling Throughput Prediction Errors as Gaussian Random Walks
(2014-09-29)conference object -
Models for the detection of emotions in the Khan Academy Platform
(Springer Verlag, 2014-10-24)journal article -
A Modular, Flexible and Virtualizable Framework for IEEE 802.11
(2012-07-04)conference object -
Modulating LiFi for dual operation in the visible and infrared spectra
(Elsevier, 2024-02-15)journal article -
Monitoring 5G Core Networks Vulnerabilities with eBPF
(IEEE, 2025-06)journal article -
A Monitoring Framework for Multi-Site 5G Platforms
(2020-06-15)conference object -
Monitoring in fog computing: state-of-the-art and research challenges
(2021-02-18)journal article -
Monitoring Platform Evolution towards Serverless Computing for 5G and Beyond Systems
(IEEE, 2022-02-10)journal article -
MONROE: Measuring Mobile Broadband Networks in Europe
(2015-08)conference object -
MONROE: Measuring Mobile Broadband Networks in Europe
(River Publishers, 2017-06)book part -
MonTrees: Automated Detection and Classification of Networking Anomalies in Cellular Networks
(Arxiv, 2021-07)technical report -
MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-Preserving Byzantine-Robust Clustering
(2025-06-09)conference object