Sfoglia per Titolo
Exploiting convexity in array antenna synthesis problems Bucci, O.M.; D'Urso, M.; Isernia
2008-01-01 Bucci, Om; D'Urso, M; Isernia, Tommaso
Exploiting D2D Communications at the Network Edge for Mission-Critical IoT Applications
2017-01-01 Orsino, A; Farris, I; Militano, L; Araniti, Giuseppe; Andreev, S; Gudkova, I; Koucheryavy, Y; Iera, A
Exploiting Diffserv And Intserv Models In Terrestrial IP Networks With Satellite Access
2001-01-01 Iera, A.; Sollazzo, G.; Malaspina, S.; Molinaro, Antonella
Exploiting digital identity for mobility in fog computing
2019-01-01 Buccafurri, Francesco; Lax, Gianluca; Russo, Antonia
Exploiting European GNSS and Ethereum in location proof systems
2022-01-01 Lax, G.; Russo, Antonia
Exploiting Frequency-Selectivity in Real-Time Multicast Services over LTE Networks
2013-01-01 Condoluci, M; Molinaro, Antonella; Iera, A; Araniti, Giuseppe
Exploiting Hierarchical Terrestrial-Satellite Architectures to Handle Voice, Symmetric Data, and Asymmetric Data Connections
2002-01-01 Iera, A.; Molinaro, A.; Araniti, G.
Exploiting Inverse Scattering Methodologies to Design Artificial Materials
2018-01-01 Palmeri, R; Bevacqua, M; Morabito, Andrea Francesco; Isernia, T
Exploiting Markov random fields and an extended range linear approximation for 2D inverse scattering problems
2009-01-01 Autieri, R; D'Urso, M; Isernia, Tommaso; Pascazio, V
Exploiting Multicast Subgrouping for Multi-Layer Video Services in 5G Satellite Networks
2018-01-01 Araniti, Giuseppe; Iera, A; Rinaldi, F; Scopelliti, P; Molinaro, Antonella
Exploiting RFID technology for indoor positioning
2021-01-01 Merenda, M.; Catarinucci, L.; Colella, R.; Della Corte, F. G.; Carotenuto, R.
Exploiting Social Ties at the Edge through Named Data Networking
2018-01-01 Ruggeri, G; Amadeo, M; Campolo, C; Iera, A; Molinaro, Antonella
Exploiting Social Ties at the Mobile Edge through Named Data Networking
2018-01-01 Ruggeri, Giuseppe; Amadeo, M.; Campolo, C; Iera, A.; Molinaro, A.
Exploiting social-interest interactions on user clustering and content dissemination in device-to-device communications
2015-01-01 Wu, Z; Wang, L; Araniti, Giuseppe; Han, Z
Exploiting Sparsity and Field Conditioning in Subsurface Microwave Imaging of non-weak Buried Targets
2016-01-01 Bevacqua, M.; Crocco, L.; Di Donato, L.; Isernia, Tommaso; Palmeri, R
Exploiting the aperture antennas theory in the assessment of orbital angular momentum antennas limitations in far-field links
2018-01-01 Morabito, Andrea Francesco; Isernia, T
Exploiting the condensation reactions of acetophenone to engineer carbon-encapsulated Nb2O5 nanocrystals for high performance Li and Na energy storage systems
2019-01-01 X., Han; P. A., Russo; N., Goubard-Bretesché; S., Patanè; Santangelo, Saveria; R., Zhang; N., Pinna
Exploiting the NIE model for the inverse obstacle scattering problem in case of strong or metallic scatterers
2022-01-01 Bevacqua, Martina; Isernia, Tommaso
Exploiting the orthogonality sampling method to design virtual scattering experiments
2018-01-01 Bevacqua, M; Palmeri, R; Isernia, T; Crocco, L
Exploiting User Speed Estimation to Improve the Teletraffic Performance in Environments with Multi-tier Coverage and Highly Variable Mobility Profile
1998-01-01 Iera, A.; Marano, S.; Molinaro, Antonella
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile