Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Energy Efficiency
profile
David Etherington
Automotive
Real-Time Coordination
autonomous driver
autonomous vehicles
connected
connected highways
connected vehicles
Energy Efficiency
energy efficient routing technique
Real-Time Traffic Control
traffic control
Traffic Management
traffic signal
Oregon
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
Trust-based QoS routing algorithm for Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
packet transmission
WSN
wireless sensor networks
trust-based QoS routing algorithm
Trust Routing
telecommunication power management
telecommunication network routing
telecommunication control
routing algorithms
Routing
quality of service
QoS
Protocols
power control
Algorithm design and analysis
Packet loss
node clusting
LEACH protocol
LEACH
information transmission
energy efficient
Energy Efficiency
energy control
energy conservation
delays
Data Transmission
data communication
cluster head selection
biblio
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:54am
modified credit strategy
tokens renewal
Token
telecommunication security
security
Routing protocols
Routing
Q-factor
Protocols
network layer security protocol
network layer attacks
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
Energy Efficiency
E2-SCAN protocol
CSCAN
credit-based strategy
conditional SCAN
AODV
biblio
Energy Efficient Network Deployment With Cell DTX
Submitted by BrandonB on Tue, 05/05/2015 - 9:58am
maximum achievable energy saving
Vectors
traffic variation
traffic profile
telecommunication power management
sleep mode operations
quality of service
Power demand
Planning
network deployment
base station
Load modeling
Interference
energy efficient network deployment
Energy Efficiency
energy consumption
cellular radio
cell load
cell DTX
cell discontinuous transmission
biblio
Spatial Modulation for Generalized MIMO: Challenges, Opportunities, and Implementation
Submitted by BrandonB on Tue, 05/05/2015 - 9:57am
single-radio-frequency large-scale MIMO communications
network-coded cooperative wireless networks
next generation networks
next-generation cellular networks
optical wireless communications
power-efficient communications
relay-aided communications
relay-aided wireless communications
single-radio-frequency (RF) multiantenna systems
multiantenna wireless systems
SM-MIMO research
spatial modulation
Spatial resolution
testbed implementation
Tutorials
wireless network
wireless system design
heterogenous cellular networks
beneficial transmission paradigm
cellular radio
cooperative communications
energy conservation
Energy Efficiency
generalized MIMO
generalized multiple-input-multiple-output technologies
Green and sustainable wireless communications
area spectral efficiency
large-scale multiantenna systems
MIMO
MIMO communication
MIMO system
mobile communication research
mobile data traffic
modulation
biblio
A New Intelligent Neuro #x2013;Fuzzy Paradigm for Energy-Efficient Homes
Submitted by BrandonB on Tue, 05/05/2015 - 9:15am
Home appliances
Table lookup
smart house
Smart Grids
Smart Grid
Pricing
power engineering computing
Neurons
Neural networks
neural nets
intelligent neuro-fuzzy paradigm
intelligent lookup table
intelligent EMS
iEMS
home automation
associative neural network
fuzzy subsystem
fuzzy set theory
fuzzy rules
Fuzzy logic
energy-efficient homes
energy management systems
energy management
Energy Efficiency
energy consumption
DR
Demand response (DR)
demand response
automated energy management systems
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Energy efficient techniques in Wireless Mesh Network
Submitted by BrandonB on Fri, 05/01/2015 - 9:45am
Logic gates
WMN
wireless network architecture
wireless mesh networks
wireless mesh network
Wireless communication
Throughput
smart devices
Routing
bandwidth hungry applications
IEEE 802.11 Standards
Evolution
energy efficient techniques
energy efficient network
Energy Efficiency
energy conservation
energy aware techniques
biblio
Security analysis of secure data aggregation protocols in wireless sensor networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:29am
Protocols
WSN lifetime
WSN
wireless sensor networks
wireless sensor network lifetime
telecommunication security
SRDA protocol
SRDA
secure reference-based data aggregation protocol
secure data aggregation protocol
authentication
Peer-to-peer computing
ESPDA protocol
ESPDA
energy-efficient and secure pattern-based data aggregation protocol
Energy Efficiency
deep security analysis
Data aggregation protocol
Cryptography
cluster-based WSN
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »