Results 131 to 140 of about 14,385 (306)

A Study and Evaluation of Network Security by Employing Decision‐Making Approach Based on Bipolar Complex Fuzzy Yager Aggregation Operators

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The evaluation and assessment of network security is a decision‐making (DM) problem that occurs in an environment with multiple criteria, which have uncertainty, bipolarity, and extra‐related information. The traditional approaches fail to address the need to acquire a wide range of information for the assessment, especially in situations ...
Walid Emam   +3 more
wiley   +1 more source

IconoNET: a tool for automated bandwidth allocation planning

open access: green, 2002
Christian Frei   +3 more
openalex   +2 more sources

Exploration of High and Low Frequency Options for Subperception Spinal Cord Stimulation Using Neural Dosing Parameter Relationships: The HALO Study

open access: yesNeuromodulation: Technology at the Neural Interface, EarlyView., 2021
Abstract Objectives Subperception spinal cord stimulation (SCS) is described mostly utilizing waveforms that require high energy. However, the necessity of these waveforms for effective subperception has not been established. We aimed to explore whether effective subperception pain relief can be achieved using frequencies below 1 kHz.
José Paz‐Solís   +5 more
wiley   +1 more source

A robust adaptive effective bandwidth allocation scheme [PDF]

open access: green, 2005
Houjin Li   +3 more
openalex   +1 more source

Justice: Flexible and Enforceable Per-Source Bandwidth Allocation [PDF]

open access: bronze, 2005
Jakob Eriksson   +2 more
openalex   +1 more source

On fair and efficient bandwidth allocation by the multiple target approach [PDF]

open access: green, 2006
Włodzimierz Ogryczak   +2 more
openalex   +1 more source

Home - About - Disclaimer - Privacy