|
1D octal pattern (1) | 37A30 (2) | 3D point clouds (1) |
3G (1) | 46E27 (2) | 46N30 (1) |
4G (1) | 4th order multivariate cumulants (1) | 60B10 (1) |
60J25 (2) | absolute continuity (1) | accelerometer (1) |
Active–passive cavity (1) | activity recognition (1) | Adaptive Networked Systems (1) |
Adaptive Non-Deterministic Transmission Policy (ANTP) (1) | advanced metering infrastructure (1) | advanced metering infrastructure network topologies (1) |
albumin (1) | Alcoholism detection (1) | ALS-class algorithm (1) |
amalgam fillings (1) | AMI (1) | AMI network topologies (1) |
Amino Acid (1) | an inertial sensor (1) | analiza płynna (1) |
analiza stanów nieustalonych (1) | Analytical models (3) | Anomalous diffusion (1) |
Anomaly detection (1) | App Malfunctions (1) | application leval checkpoints (1) |
AQM (1) | Archimedean copulas (1) | Arrhythmia (1) |
Arrhythmia classification (1) | Artificial Intelligence (3) | Artificial Intelligence (AI) (2) |
artificial neural network (1) | Artificial Neural Network (ANN) (3) | asymptotic coupling (3) |
asymptotic stability (2) | atomic force microscopy (AFM) (1) | Attack Detection (1) |
attack detection and prevention (1) | Attack Mitigation (1) | authentication (2) |
Auto associative neural networks (1) | Auto-Associative Deep Random Neural Network (1) | Auto-Associative Dense Random Neural Networks (1) |
autoassociative deep random neural network (1) | Autoencoders (2) | Automation and robotics (1) |
Base stations (2) | Bid evaluation (1) | biometrics (4) |
BLE (1) | BLE beacon (1) | blood detection (2) |
Boson (1) | Botnet attacks (1) | botnets (1) |
Brain modeling (1) | Brute Force (1) | building heating Hurst exponent LPG distribution (1) |
Buildings (1) | C-ITS (1) | CAD (1) |
Cancelable (1) | Cancer (1) | Capacity (1) |
cave networks (1) | Celestial bodies (1) | Celestial objects (1) |
central limit theorem (2) | CFS (1) | Cities and towns (1) |
Class noise detection (1) | Classical correlations (1) | Classification (6) |
Classification algorithms (1) | Classification rules (1) | classifiers (1) |
clock synchronization (1) | Cloud computing (4) | cloud infrastructure (1) |
Clustering (1) | CNN (1) | CoAP (1) |
Cognitive Packet Network (3) | Cognitive packet routing (1) | Cognitive Routing (1) |
communication architecture (1) | Complex networks (1) | composite fillings (1) |
Compression (1) | compromised device identification (1) | computer architecture (2) |
computer network management (1) | Computer networks (2) | Computer-aided arrhythmia classification (CAAC) (1) |
conformation of protein (1) | conformational entropy (1) | Congestion control (1) |
Construction components storage areas planning (1) | continuous dependence (1) | contract theory (1) |
Control systems (1) | controllability (3) | convolutional neural network (1) |
Convolutional neural network (CNN) (1) | convolutional neural networks (2) | Copula functions (1) |
copulas (1) | Coronary artery disease (2) | coronary artery disease (CAD) (1) |
correlation (1) | Correlations (1) | coupling (1) |
COVID-19 (1) | Credit scoring (1) | critical infrastructure (1) |
Critical review (1) | cross-correlation of extreme returns (1) | CUDA (1) |
Cumulant tensors (2) | cumulants (1) | Cybersecurity (2) |
CYBHi (1) | D-Wave (1) | D-Wave annealer (1) |
daily sport activity recognition (1) | Data Warehouse (1) | data analysis (1) |
data centre WAN (1) | data exchange (1) | Data Exfiltration (1) |
Data generation (1) | Data Loss Prevention (1) | Data mining (4) |
Data models (3) | data streaming (1) | database attacks (1) |
Deep learning (6) | Deep Learning Clusters (1) | deep neural networks (1) |
Deep Transfer Learning (1) | delayed control systems (1) | Delays (1) |
demand response (1) | Dense random neural networks (1) | dental restorations (1) |
Dependability (1) | Detection (2) | Detrended fluctuation analysis (1) |
Detrendedf luctuations analysis (1) | Detrendet fluctuation analysis (1) | Development Toolkit (1) |
Diffusion Approximation (6) | diffusion approximation; transient states; SDN; priority queues (1) | Diffusion Approximations (1) |
dihedral angles (1) | Dimension reduction (1) | Dimensionality reduction (1) |
dimensioning (1) | discrete event simulation (1) | Discrete wavelet transform (1) |
Discretization (1) | Distributed quantum circuit (1) | DLP (1) |
DNA (1) | DNN (1) | Dropping packets (1) |
Dynamic networks (1) | E-Health Systems (1) | e-learning (1) |
Early fusion (1) | early pregnancy (1) | Early setup (1) |
ECG (3) | ECG signal recognition (2) | ECG-ID (1) |
Econophysics (2) | ELECTRE III (1) | Electrocardiogram (ECG) (2) |
electrocardiogram signal (1) | Electroencephalogram (1) | Electroencephalogram signals (1) |
electronic data interchange (1) | electrospinning (1) | embedded dimension (1) |
emergency management (1) | EMG activity (1) | Empirical mode decomposition (1) |
encoder-decoder attention module (1) | encrypted traffic (1) | End-to-end (1) |
Endmember estimation (1) | end‐to‐end structure (1) | Energy consumption (1) |
Energy harvesting (1) | Energy saving (1) | energy spectrum (1) |
Energy states (1) | energy-aware networks (1) | energy-awareness (1) |
energy-efficient (2) | Engagement detection (1) | Engines (1) |
Ensemble learning (3) | Ensemble method (1) | ensemble residual network (1) |
Entanglement (1) | Epilepsy (1) | ergodic measure (1) |
evacuation wayfinding (1) | Evolutionary computation (1) | Evolutionary systems (1) |
Exchange bias; Rotational anisotropy; Nanostructures; Simulation; Magnetization reversal; Patterned structures; MOKE; Lithography (1) | exponential ergodicity (3) | exponential rate of convergence (2) |
Face recognition (1) | Fast and slow light (1) | Feature extraction (2) |
Feature extraction and selection (1) | Feature selection (6) | Features extraction (1) |
features selection (2) | Financial crisis detection (1) | Financial data analysis (2) |
finite dimensional systems (1) | Fire detection (1) | Fisher’s test (1) |
Fleet management (1) | Flory–De Gennes exponent (1) | fluid flow approximation (1) |
fluid-flow approximation (2) | Fog Computing (2) | fog computing architecture (1) |
Fog computing; software-defined networks (SDNs); green computing (1) | Fokker Planck equation (1) | Forecasting (8) |
Forensic investigation (1) | Forensic scene documentation (1) | forensic science (1) |
Fortet–Mourier distance (1) | FOS: Computer and information sciences (2) | FOS: Mathematics (2) |
FOS: Physical sciences (3) | FPGA (1) | Fractional Calculus (1) |
fractional order systems (1) | Frequency distribution (2) | Fusion model (1) |
Fuzzy Bayesian networks (1) | G-Networks (1) | GA (1) |
Gelenbe-Networks (G-Networks) (1) | gender identification (1) | gene expression (3) |
generalization (1) | Generators (1) | Genetic algorithm (3) |
Genetic algorithms (2) | Genetic optimization (1) | geographical coordinates (1) |
Global Internet (1) | GPS (2) | GPU (1) |
GPU programming (1) | graph convolutional network (1) | Graph Neural Nets (1) |
Graphs (1) | Gunshot residues (1) | gypsum caves (1) |
gyroscope (1) | HCC (1) | Healthcare (1) |
Heart disease (1) | Heavenly bodies (1) | Hepatocellular carcinoma (2) |
Heterogeneous networks (1) | heterogeneous ultra-dense networks (HetUDNs) (1) | High agreement voting filtering (1) |
High order cumulants (2) | High-rise building construction (1) | Higher order correlations (1) |
higher order cumulant tensors (1) | Higher order multivariate cumulants (1) | higher-order binary optimization (1) |
Histograms (1) | HSI (1) | HTTP performance (1) |
hubbard model (1) | Human dynamics (1) | Human reasoning logic pattern (1) |
human serum albumin (1) | human sitting behaviors (1) | Hurst exponent (1) |
Hurst exponent (5) | hyaluronan (1) | hybrid particle swarm optimization (1) |
hyperspectral classification (1) | hyperspectral data (1) | Hyperspectral imaging (4) |
Hyperspectral unmixing (2) | Imaging technology (1) | improved complete ensemble empirical mode decomposition (1) |
Incremental learning (1) | indoor (1) | indoor positioning (4) |
inernet traffc control (1) | informatics (1) | information extraction (1) |
Insider Threat (1) | Inter-event time distribution (1) | inter-patient scheme (1) |
Interference (1) | Internet (1) | Internet of Things (1) |
Internet models (1) | Internet of Things (3) | Internet of Things (IoT) (14) |
Internet of Things; Security; Sensor Networks; Traffic Policing; Distributed Denial of Service; Packet Filtering; Firewall; Software-Defined Networking (1) | Internet rzeczy (1) | Internet Traffic (2) |
invariant measure (6) | invariant measures (1) | IoT (4) |
IoT Gateway congestion (1) | IoT Gateways (1) | IoT Networks (1) |
IoT Security (1) | IP packets length distribution (1) | IP transmission control (1) |
IPS (1) | Ising model (2) | Ising solver (1) |
Jitter (1) | joint forecasting-scheduling (1) | Joint Skewness Band Selection (1) |
jump rate (1) | Keldysh framework (1) | knowledge-based systems (1) |
Kullback–Leibler divergence (1) | Labeling (1) | law of the iterated logarithm (3) |
Level-crossing sampling (1) | Light fields (1) | linear convex combination (1) |
linear systems (1) | lipschitz condition (1) | Load Balancing (1) |
localization (1) | location aggregation (1) | Logistic regression (1) |
long distance entanglement (1) | LoRa (4) | LP WAN (2) |
M2M communication (1) | Machine learning (27) | machine learning (ML) (2) |
Machine-to-Machine (M2M) communication (1) | Magnetic fields (1) | magnetometer (1) |
Malware (2) | Market review (1) | Markov chain (2) |
Markov operators (3) | Markov process (2) | Markov queuing models (1) |
Massive Access Problem (1) | massive access (3) | Massive Access Problem (4) |
Matched Filter (1) | Mathematical model (2) | Measurement (1) |
measurements (1) | Medical image (1) | Medical image classification (1) |
Medium Access Control (MAC) layer (1) | Medium Access Control (MAC) protocol (1) | Metaheuristic optimization (1) |
metering networks (1) | Metro construction (1) | Microscopic medical images (1) |
Mirai (2) | Mirai Botnet Attacks (1) | mitigation (1) |
Mobile communication (1) | Mobile computing (1) | Mobile Networks (1) |
mobile networks (4G/5G) (1) | Mobility modelling (1) | mobility prediction (1) |
modele kolejkowe (1) | modelowanie ruchu w Internecie (1) | modelowanie systemów transportowych (1) |
molecular docking numerical experiment. (1) | Monitoring (2) | Monte Carlo dropout (1) |
Multi-attribute group decision making (1) | Multi-Layer Perceptron (MLP) (1) | multi-sensor (1) |
multi-task training (1) | multihop wireless networks (1) | multilateration (2) |
Multiple Attack Detection (1) | Multirate processing (1) | multivariate modeling (1) |
Mutual information (1) | myelectrical activity (1) | myometrium (1) |
nanofi brous mat (1) | Near miss (1) | neighborhood component analysis (1) |
NETCONF (1) | Network Attacks (2) | network management protocols (1) |
Network reinitialisation (1) | Network rewiring (1) | Network Routers (1) |
network topologies (1) | Network topology (1) | network topology generator (1) |
network traffic (1) | neural network (1) | Neural networks (1) |
Neurons (2) | Next Generation of Routers for Energy Efficiency Networks (N-GREEN) (1) | Non fermentative bacilli (1) |
non-gaussian chain (1) | non-Gaussian distributions (1) | Non-integer order controller (1) |
non-isothermal characteristics (1) | non-normally distributed data (2) | nonlinear features (1) |
nonlinear finite-dimensional control systems (1) | NSGA-III (1) | numerical algorithms (1) |
obliczenia kwantowe (1) | ocena efektywności (1) | OMIT (1) |
OpenNCP (1) | optical backbone/metro networks (1) | Optical fields (1) |
Optical Metro Networks (1) | Optimization (2) | optimum checkpoints (1) |
Optomechanics (1) | Packet Aggregation (2) | Packet loss (1) |
Parallel computing (1) | Parity (1) | Parrondo’s paradox (1) |
pattern recognition (3) | Pay&Require (1) | Perceptual hash (1) |
Performance (1) | Performance Analysis (1) | Performance evaluation (6) |
Performance Management (1) | person re-identification (1) | physics simulations (1) |
piecewise deterministic Markov process (1) | piecewise-deterministic Markov process (3) | pig (1) |
Pigment identification (1) | policy based framework (1) | polyacrylonitrile (PAN) (1) |
Position finding (1) | positioning (1) | positioning system (1) |
Power-law (1) | predictability (1) | predictive network (2) |
prevention (1) | privacy (1) | Probability (math.PR) (2) |
process control (1) | program loops (1) | Protocols (3) |
proximity detection (1) | PSO (1) | PTB (1) |
publiczny transport zbiorowy (1) | QoS (2) | QoS optimization (1) |
QoS (1) | QRS selection (1) | Quadratic optomechanical coupling (1) |
Quadratic Unconstrained Binary Optimization (QUBO) (1) | Quality of Service (1) | quality assessment (1) |
Quality of service (3) | quality of service (QoS) (1) | Quality of Service (QoS) (2) |
Quantum annealing (4) | Quantum circuit (1) | Quantum coherence (1) |
quantum computing (1) | Quantum Correlations (1) | Quantum discord (1) |
Quantum information processing (1) | quantum mechanics (1) | Quantum Phase transitions (2) |
Quantum Physics (quant-ph) (3) | Quantum Spin Chains (1) | quantum teleportation (1) |
quantum-classical hybrid procedure (1) | Quasi Deterministic Transmission Policy (QDTP) (1) | Quasi-Deterministic Transmission Policy (2) |
Quasi-Deterministic Transmission Policy (QDTP) (1) | Qubit (1) | Queue-size distribution (1) |
Queueing Analysis (1) | queueing model (1) | queueing models (2) |
Queueing Networks with Negative and Positive Customers (1) | Queueing Theory (2) | Quintet triple binary pattern (1) |
Rabi (1) | Radiation pressure (1) | radio interferences (1) |
radio networks (1) | radio planing (1) | Radio Resource Control (1) |
Railway dispatching problem (1) | railway rerouting (1) | railway rescheduling (1) |
random dynamical system (4) | Random Neural Network (5) | Random Neural Networks (3) |
random walk (2) | Random walk Hurst exponent Statistical analysis Image analysis Shannon entropy Textile materials (1) | Real-Time over CPN (1) |
Real-time spatial recognition (1) | recurrence plots (1) | recurrent neural network (1) |
recurrent neural networks (1) | Rehandling (1) | Reinforcement Learning (2) |
Relabeling (1) | Removing (1) | reproductive tract (1) |
Requirements Engineering (1) | ResNet (1) | ResNext (1) |
resource allocation (1) | Resource management (2) | resource sharing (1) |
risk assessment (1) | roll-back recovery (1) | Routing (3) |
rozgłaszanie w sieciach bezprzewodowych (1) | RSSI (1) | rule discovery (2) |
rule-based systems (1) | safety risk analysis (1) | Salehi2022 (1) |
sampling (1) | scheduling (5) | Scientometric review (1) |
SDN (2) | SDN switch (1) | Second order difference plots (1) |
Secure communications (1) | Security (2) | Self-similarity (1) |
semi-supervised classifciation (1) | semilinear control systems (1) | semisupervised learning (1) |
Sensitive Data (1) | sensor fusion (1) | sensor signals (1) |
Sensors (1) | SerIoT system (1) | Servers (1) |
Shannon entropy (1) | Sieci bezprzewodowe (1) | Signal processing (1) |
signal propagation (1) | signal variability (1) | Signaling Storms (1) |
Signalling Overload (1) | simulation (3) | singularity (1) |
Smart Meters (1) | Smart Cities (1) | smart city (1) |
Smart Intercontinental Networks (1) | Smart intersection (1) | smart meters (1) |
smart networks (1) | Smart phones (1) | smartphone (1) |
SNMP (1) | Software (1) | Software Defined Networks (2) |
software defined wireless networks (SDWNs) (1) | Software Engineering (cs.SE) (2) | Software quality (1) |
software reliability (1) | Software Security (1) | sow (1) |
Spatial databases (1) | Spectral unmixing (1) | Spin chains (1) |
SQL injection (1) | Stacking learning (1) | state transition table (1) |
Static Analysis (1) | statistical properties (1) | Statistical research (2) |
statistical testing (1) | Stochastic processes (1) | Stock exchange (1) |
Storm tides (1) | subspace training (1) | Support vector machines (1) |
SVM (1) | switching semiflows (2) | Symmetry (1) |
synovial fluid interactions (1) | systemic review (1) | t-Student copula (1) |
Target detection (1) | TCP/IP (1) | telecommunication network topology (1) |
Telecommunication traffic (1) | Teleportation cost (1) | Template Protection (1) |
tensor analysis (1) | Terms—Internet of Things (IoT) (1) | Ternary chess pattern (2) |
terrestrial scanners (1) | terrorism (1) | the strong law of large numbers (2) |
Threshold policy (1) | Time series (2) | time skew (1) |
time-series statistics (1) | topological properties (1) | Topology (1) |
Trace driven simulations (1) | Tracking-Learning-Detection (1) | Traffic Shaping (1) |
Traffic offloading (1) | Traffic shaping at IoT devices (1) | Training (1) |
Training stability (1) | trajectory controllability (1) | Transfer learning (2) |
Transient state (1) | Transients (1) | trend prediction (1) |
trilateration (2) | triplet attention module (1) | triplet loss (1) |
True-range Multilaterartion (1) | tunnel construction (1) | Two-stage aggregation paradigm (1) |
U-net (1) | Ultrawideband (UWB) (1) | UMTS Networks (1) |
Uncertainty (1) | Uncertainty quantification (1) | uniform random topologies (1) |
Unsafe behavior (1) | UofTDB (1) | UPnP performance (1) |
Variational mode decomposition (1) | Virtual Private Network (1) | voting (1) |
Vulnerability Prediction (1) | Warsaw Stock Exchange (2) | Wavelet decomposition (1) |
Wavelet mesh tree (2) | Web-application attacks (1) | WiFi (1) |
Wigner function (1) | wireless (1) | Wireless communication (1) |
Wireless fidelity (1) | Wireless networks (1) | Wireless sensor networks (1) |
World-Wide Experiments (1) | | |