Academic literature on the topic 'Dropped messages'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Dropped messages.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Dropped messages"
Kumar, Saptaparni, and Jennifer L. Welch. "Implementing ♢P with Bounded Messages on a Network of ADD Channels." Parallel Processing Letters 29, no. 01 (2019): 1950002. http://dx.doi.org/10.1142/s0129626419500026.
Full textBranch, Philip, Binghao Li, and Kai Zhao. "A LoRa-Based Linear Sensor Network for Location Data in Underground Mining." Telecom 1, no. 2 (2020): 68–79. http://dx.doi.org/10.3390/telecom1020006.
Full textGIANNELLA, CHRIS, RANSOM WINDER, and STACY PETERSEN. "Dropped personal pronoun recovery in Chinese SMS." Natural Language Engineering 23, no. 6 (2017): 905–27. http://dx.doi.org/10.1017/s1351324917000158.
Full textIntisar, Al-Mejibli1 Martin Colley2 and Salah Al-Majeed3. "NETWORKS UTILIZATION IMPROVEMENTS FOR SERVICE DISCOVERY PERFORMANCE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 1, November (2018): 01–17. https://doi.org/10.5281/zenodo.1451182.
Full textKluss, Benedikt, Samaneh Rashidibajgan, and Thomas Hupperich. "Blossom: Cluster-Based Routing for Preserving Privacy in Opportunistic Networks." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 75. http://dx.doi.org/10.3390/jsan11040075.
Full textAhmad, Farhan, Asma Adnane, Virginia Franqueira, Fatih Kurugollu, and Lu Liu. "Man-In-The-Middle Attacks in Vehicular Ad-Hoc Networks: Evaluating the Impact of Attackers’ Strategies." Sensors 18, no. 11 (2018): 4040. http://dx.doi.org/10.3390/s18114040.
Full textPatil, Anand N., and Sujata V. Mallapur. "Novel machine learning based authentication technique in VANET system for secure data transmission." Journal of Autonomous Intelligence 6, no. 2 (2023): 828. http://dx.doi.org/10.32629/jai.v6i2.828.
Full textКолмогорова, С. С., та И. В. Захаров. "Реализация технологии «издатель/подписчик» для организации взаимодействия движущихся и стационарных объектов". Vestnik of Volga State University of Technology. Series Radio Engineering and Infocommunication Systems, № 3(63) (14 листопада 2024): 43–52. https://doi.org/10.25686/2306-2819.2024.3.43.
Full textShahariar, Rezvi, and Abu Naser. "Reducing Packet Losses in Mobile Ad Hoc Network Using the Warning Message Generated from a Routing Node." Dhaka University Journal of Science 62, no. 2 (2015): 141–45. http://dx.doi.org/10.3329/dujs.v62i2.21979.
Full textStark, Elisabeth, and Aurélia Robert-Tissot. "Subject drop in Swiss French text messages." Linguistic Variation 17, no. 2 (2017): 251–71. http://dx.doi.org/10.1075/lv.14020.sta.
Full textBooks on the topic "Dropped messages"
Auckland, R. G. Messages from the sky over Britain: The fascinating story of the publicity and propaganda leaflets disseminated over Great Britain by airship, aeroplane, balloon and rocket, in peacetime and in war. Psywar Society, 1998.
Find full textBook chapters on the topic "Dropped messages"
Cohen, Jeffrey Jerome, and Allan Mitchell. "Oceanic Dispatches." In Oceanic New York. punctum books, 2015. https://doi.org/10.21983/p3.0112.1.20.
Full text"Biblical Research, Critical Thinking, and 18 Pillars of Christianity." In Advances in Religious and Cultural Studies. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-5452-4.ch002.
Full text"Ferreting Out Silences and Invisibilities in Electronic Hive Minds." In Advances in Social Networking and Online Communities. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-9369-0.ch002.
Full textChantrapornchai, Chantana, and Jitdumrong Preechasuk. "Exploring Image and Video Steganography Based on DCT and Wavelet Transform." In Advanced Image Processing Techniques and Applications. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2053-5.ch003.
Full textCopeland, Jack. "Introduction." In Colossus. Oxford University Press, 2006. http://dx.doi.org/10.1093/oso/9780192840554.003.0006.
Full textRoberts, Jerry. "The Testery: breaking Hitler’s most secret code." In The Turing Guide. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198747826.003.0024.
Full textDaniel, Larry J. "Cleburne, Blacks, and the Politics of Race." In Conquered. University of North Carolina Press, 2019. http://dx.doi.org/10.5149/northcarolina/9781469649504.003.0019.
Full textConference papers on the topic "Dropped messages"
Yang, Yaqin, Yalin Liu, and Nianwen Xue. "Recovering dropped pronouns from Chinese text messages." In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 2: Short Papers). Association for Computational Linguistics, 2015. http://dx.doi.org/10.3115/v1/p15-2051.
Full textGuo, Yun, Yuki Ishiwatari, Satoshi Ikejiri, and Yoshiaki Oka. "Parallel Computation for Particle-Grid Hybrid Method." In ASME 2010 3rd Joint US-European Fluids Engineering Summer Meeting collocated with 8th International Conference on Nanochannels, Microchannels, and Minichannels. ASMEDC, 2010. http://dx.doi.org/10.1115/fedsm-icnmm2010-30117.
Full text