-
1by Mukherjee, Anway“... of the battery associated with the system. We exploit the gap in research on performance and power trade-off...”
Published 2019
Get full text
Others -
2
-
3by Semiari, Omid“... and opportunities for wireless resource management. On the one hand, resource management can exploit user...”
Published 2018
Get full text
Others -
4by Hadjichristofi, George CostaSubjects: “...Key Management...”
Published 2014
Get full text
Get full text
Others -
5
-
6by Saad Ibrahim, Mohamed MohamedSubjects: “...Contention Management...”
Published 2014
Get full text
Get full text
Others -
7by Schlake, FarimehrSubjects: “...Performance...”
Published 2017
Get full text
Get full text
Others -
8by Zeng, Huacheng“... management techniques in the literature, most of them are limited to signal processing at the physical (PHY...”
Published 2016
Get full text
Others -
9by Li, PengSubjects: “...performance assurance...”
Published 2011
Get full text
Get full text
Others -
10by Gadgil, Kalyani SurendraSubjects: “...software performance...”
Published 2020
Get full text
Others -
11
-
12by Zhang, WeiSubjects: “...Net-zero energy and Energy Management...”
Published 2015
Get full text
Others -
13by Bhandari, Tapan“... applications such as law enforcement, disaster management, battlefield operations, vehicular communication...”
Published 2017
Get full text
Others -
14by Refaei, Mohamed TamerSubjects: “...reputation management...”
Published 2014
Get full text
Get full text
Others -
15by Tavaragiri, AbhaySubjects: “...FPGA Management Technique...”
Published 2014
Get full text
Get full text
Others -
16by Marikar, Shakheela H.Subjects: “...resource management...”
Published 2014
Get full text
Get full text
Others -
17by Robert, Pablo Maximiliano“... methods have been presented in the literature for managing interference between these two devices...”
Published 2014
Get full text
Get full text
Others -
18by Phanse, Kaustubh SuhasSubjects: “...Policy-Based Network Management...”
Published 2014
Get full text
Get full text
Others -
19by Mahar, Anthony J.“... and implementation of a fast, flexible Encryption Management Unit (EMU) for Virginia Tech Secure Software...”
Published 2014
Get full text
Get full text
Others -
20by Shatila, Hazem Sarwat“... conditions, but anomalies rise among these rules, causing degradation in the CRâ s performance...”
Published 2014
Get full text
Get full text
Others