Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,152 papers from all fields of science
Search
Sign In
Create Free Account
Reliability (computer networking)
Known as:
Assurance (computer networking)
, Reliability properties
, Assurance
Expand
In computer networking, a reliable protocol provides reliability properties with respect to the delivery of data to the intended recipient(s), as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
43 relations
ATM Adaptation Layer 5
Appia framework
Atomicity (database systems)
Avionics
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Smart mobility management for D2D communications in 5G networks
Osman N. C. Yilmaz
,
Zexian Li
,
+4 authors
C. Wijting
IEEE Wireless Communications and Networking…
2014
Corpus ID: 7847035
Direct device-to-device (D2D) communications is regarded as a promising technology to provide low-power, high-data rate and low…
Expand
2013
2013
Residual generator fuzzy identification for automotive diesel engine fault diagnosis
S. Simani
International Journal of Applied Mathematics and…
2013
Corpus ID: 10636541
Safety in dynamic processes is a concern of rising importance, especially if people would be endangered by serious system failure…
Expand
2010
2010
Low-SNR Capacity of Multiple-Antenna Systems With Statistical Channel-State Information
Shi Jin
,
M. Mckay
,
Kai‐Kit Wong
,
Xiao Li
IEEE Transactions on Vehicular Technology
2010
Corpus ID: 36958000
This paper investigates the capacity of double-scattering and Rician fading multiple-input-multiple-output (MIMO) channels in the…
Expand
2010
2010
Mobility & routing control in networks of robots
M. Zavlanos
,
Alejandro Ribeiro
,
George Pappas
IEEE Conference on Decision and Control
2010
Corpus ID: 9743665
Most coordinated tasks performed by teams of mobile robots, require reliable communications between the members of the team…
Expand
2010
2010
Security analysis of reliable transport layer protocols for wireless sensor networks
L. Buttyán
,
L. Csik
8th IEEE International Conference on Pervasive…
2010
Corpus ID: 15607313
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this…
Expand
Highly Cited
2006
Highly Cited
2006
Reliable channel regions for good binary codes transmitted over parallel channels
Ruoheng Liu
,
P. Spasojevic
,
E. Soljanin
IEEE Transactions on Information Theory
2006
Corpus ID: 18331520
We study the average error probability performance of binary linear code ensembles when each codeword is divided into J…
Expand
2005
2005
Metal-insulator-metal RF bypass capacitor using niobium oxide (Nb/sub 2/O/sub 5/) with HfO/sub 2//Al/sub 2/O/sub 3/ barriers
Sun Jung Kim
,
B. Cho
,
+6 authors
D. Kwong
IEEE Electron Device Letters
2005
Corpus ID: 40959704
A high capacitance density (C/sub density/) metal-insulator-metal (MIM) capacitor with niobium pentoxide (Nb/sub 2/O/sub 5…
Expand
2003
2003
Visible encryption: using paper as a secure channel
Norberto Degara
,
F. Pérez-González
IS&T/SPIE Electronic Imaging
2003
Corpus ID: 15280018
A novel technique allowing secure transmission/storage of electronic documents in printed form is described. First, given a…
Expand
Highly Cited
1995
Highly Cited
1995
CATV return path characterization for reliable communications
C. Eldering
,
N. Himayat
,
F. Gardner
IEEE Communications Magazine
1995
Corpus ID: 62367851
The authors have examined the basic characteristics of hybrid-fiber coax (HFC) return systems to evaluate their ability to…
Expand
1993
1993
MOS characteristics of NH/sub 3/-nitrided N/sub 2/O-grown oxides
G. Yoon
,
A. Joshi
,
J. Kim
,
D. Kwong
IEEE Electron Device Letters
1993
Corpus ID: 33247354
The technique of NH/sub 3/ nitridation of N/sub 2/O oxides is proposed and demonstrated for increasing nitrogen concentration in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required