Search alternatives:
_ user » _ use (Expand Search)
i e » i el (Expand Search)
decrease » increase (Expand Search)
_ user » _ use (Expand Search)
i e » i el (Expand Search)
decrease » increase (Expand Search)
-
1
-
2
-
3
-
4
The downsides of information systems security policy compliance efforts
Published 2016Get full text
Get full text
Get full text
masterThesis -
5
Cooperative Caching Policy in Fog Computing for Connected Vehicles
Published 2023Get full text
Get full text
Get full text
masterThesis -
6
-
7
Secrecy Performance of a RIS-Assisted Wireless Network: A Comprehensive Analysis Under Outdated CSI
Published 2025“…The obtained results demonstrate that the adopted system can achieve an acceptable SOP level even with 10% outdated CSI (i.e., <i>ρ</i>=0.9 ). This resilience indicates that the system can reduce channel estimation frequency to reconfigure the RIS, thus decreasing overall system overhead and complexity and improving energy efficiency. …”
-
8
-
9
New media and new practices of exploitation
Published 2015Get full text
Get full text
Get full text
article