-
1
-
-
85008018493
-
Multi-constrained QoS Routing: A norm approach
-
G. Xue and S. K. Makki, "Multi-Constrained QoS Routing: A Norm Approach," IEEE Trans. Computers, vol. 56, no. 6, 2007, pp. 859-63.
-
(2007)
IEEE Trans. Computers
, vol.56
, Issue.6
, pp. 859-863
-
-
Xue, G.1
Makki, S.K.2
-
2
-
-
79551627452
-
QoS routing in smart grid
-
H. Li and W. Zhang, "QoS Routing in Smart Grid," Proc. GLOBECOM, 2010, pp. 1-6.
-
(2010)
Proc. GLOBECOM
, pp. 1-6
-
-
Li, H.1
Zhang, W.2
-
3
-
-
84860861879
-
QoEDriven power scheduling in smart grid: Architecture, strategy, and methodology
-
May
-
L. Zhou, J. J. P. C. Rodrigues, and L. M. Oliveira, "QoEDriven Power Scheduling in Smart Grid: Architecture, Strategy, and Methodology," IEEE Commun. Mag., May 2012.
-
(2012)
IEEE Commun. Mag.
-
-
Zhou, L.1
Rodrigues, J.J.P.C.2
Oliveira, L.M.3
-
4
-
-
13144301659
-
Electricity theft: A comparative analysis
-
DOI 10.1016/S0301-4215(03)00182-4, PII S0301421503001824
-
T. B. Smith, "Electricity Theft: A Comparative Analysis," Energy Policy, Elsevier, vol. 32, 2004, pp. 2067-76. (Pubitemid 40180697)
-
(2004)
Energy Policy
, vol.32
, Issue.18
, pp. 2067-2076
-
-
Smith, T.B.1
-
7
-
-
79955395650
-
Adaptive wireless networks using learning automata
-
Apr.
-
P. Nicopolitidis et al., "Adaptive Wireless Networks Using Learning Automata," IEEE Wireless Commun., vol. 18, no. 2, Apr. 2011, pp. 75-81.
-
(2011)
IEEE Wireless Commun
, vol.18
, Issue.2
, pp. 75-81
-
-
Nicopolitidis, P.1
-
8
-
-
77952135318
-
Cybernetics and learning automata
-
Ch. 12, S. Nof, Ed., Springer
-
B. J. Oommen and S. Misra, "Cybernetics and Learning Automata," Handbook of Automation, Ch. 12, S. Nof, Ed., Springer, 2009
-
(2009)
Handbook of Automation
-
-
Oommen, B.J.1
Misra, S.2
-
9
-
-
84857620276
-
An adaptive multi-agent-based approach to smart grids control and optimization
-
M. Carvalho, C. Perez, and A. Granados,"An Adaptive Multi-Agent-Based Approach to Smart Grids Control and Optimization" Energy Systems, vol. 3, no. 1, 2012, pp. 61-76.
-
(2012)
Energy Systems
, vol.3
, Issue.1
, pp. 61-76
-
-
Carvalho, M.1
Perez, C.2
Granados, A.3
-
11
-
-
63049100877
-
Detection of abnormalities and electricity theft using genetic support vector machines
-
19-21 Nov doi: 10.1109/TENCON.2008.4766403
-
J. Nagi et al., "Detection of Abnormalities and Electricity Theft Using Genetic Support Vector Machines," Proc. 2008 IEEE Region 10 Conference, 19-21 Nov. 2008,doi: 10.1109/TENCON.2008.4766403, pp. 1-6.
-
(2008)
Proc 2008 IEEE Region 10 Conference
, pp. 1-6
-
-
Nagi, J.1
-
12
-
-
39149134290
-
A role-based access in hierarchical sensor network architecture to provide multilevel security
-
B. Panja, S. K. Madria, and B. Bhargava, "A Role-Based Access in Hierarchical Sensor Network Architecture to Provide Multilevel Security," Computer Commun., vol. 31, no. 4, 2008, pp. 793-806.
-
(2008)
Computer Commun
, vol.31
, Issue.4
, pp. 793-806
-
-
Panja, B.1
Madria, S.K.2
Bhargava, B.3
-
13
-
-
78751643529
-
Reputation-based role assignment for role-based access control in wireless sensor networks
-
S. Misra and A. Vaish, "Reputation-Based Role Assignment for Role-Based Access Control in Wireless Sensor Networks," Computer Commun., vol. 34, no. 3, 2011, pp: 281-94.
-
(2011)
Computer Commun
, vol.34
, Issue.3
, pp. 281-294
-
-
Misra, S.1
Vaish, A.2
|