Index file section C for tiot.bib
Last update: Wed May 1 02:04:37 MDT 2024
Return to index directory
C
-
Cache, 2(3)18--18
-
cafeterias, 3(2)13--13
-
called, 1(1)4--4, 2(2)14--14
-
camera, 1(1)3--3, 1(3)14--14, 1(4)25--25, 4(1)2--2, 4(4)26--26
-
campus/city, 3(4)28--28
-
campuses, 3(4)28--28
-
cannot, 1(2)12--12, 1(4)24--24, 2(2)14--14
-
Cao, Guohong, 1(3)14--14
-
Cao, Guohong, see Khazbak, Youssef
-
Cao, Jiannong, 4(4)26--26
-
Cao, Jiannong, see Juncen, Zhu
-
capability, 1(1)5--5, 1(3)15--15, 3(3)17--17
-
capacitor, 1(1)2--2
-
Capacitor-based, 1(1)2--2
-
Capsule, 3(1)2--2
-
capture, 3(1)3--3, 3(4)31--31
-
captured, 3(4)28--28
-
capturing, data-, 3(1)3--3
-
care, 1(2)8--8
-
carried, 4(2)11--11
-
carried, Human-, 4(2)11--11
-
carry, 1(1)3--3
-
Case, 2(1)1--1, 4(3)19--19
-
Cassano, Luca, 3(3)17--17
-
Cassano, Luca, see Miele, Antonio
-
cause, 4(4)28--28, 5(1)3--3
-
Celik, Z. Berkay, 3(3)22--22, 3(4)27--27
-
Celik, Z. Berkay, see Norris, Michael,
see Sikder, Amit Kumar
-
cells, 1(4)23--23
-
cellular, 2(3)18--18
-
certain, 3(4)31--31
-
CH-MAC, 4(4)24--24
-
Chakraborty, Sandip, 4(1)1--1
-
Chakraborty, Sandip, see Mandal, Ratna
-
challenge, 1(2)9--9, 1(3)15--15, 2(2)9--9, 2(3)16--16, 3(1)1--1,
3(4)26--26, 4(1)7--7, 4(2)9--9, 4(3)18--18
-
challenge-response, 1(4)24--24
-
challenging, 1(3)18--18, 1(4)25--25, 4(2)14--14
-
Chang, Xiangmao, 3(2)13--13
-
Chang, Xiangmao, see Yang, Deliang
-
change, mode-, 2(2)14--14
-
changing, 3(2)12--12
-
Channel, 1(4)24--24, 2(1)3--3, 3(2)11--11, 3(3)24--24
-
Channel-aware, 4(2)12--12
-
channels, 1(4)24--24
-
characteristic, 3(2)12--12, 4(2)10--10, 5(1)3--3
-
Characterization, 4(1)1--1
-
characterize, 2(4)25--25
-
characterized, 1(2)9--9
-
charging, 1(1)2--2, 2(2)8--8, 3(2)13--13
-
Chart, 3(2)14--14
-
Chatterjee, Soumyajit, 4(1)1--1
-
Chatterjee, Soumyajit, see Mandal, Ratna
-
Chau, Sid Chi-Kin, 1(3)20--20, 3(4)31--31
-
Chau, Sid Chi-Kin, see Aftab, Muhammad,
see Zhu, Hanwei
-
Chen, Ciyuan, 4(4)24--24
-
Chen, Ciyuan, see Luo, Junzhou
-
Chen, Hai-Bao, 2(4)23--23
-
Chen, Hai-Bao, see Zhen, Peining
-
Chen, Honghong, 5(1)3--3
-
Chen, Shengxin, 4(4)25--25
-
Chen, Shengxin, see Zhu, Biaokai
-
Chen, Ying-Jun, 2(3)20--20
-
Chen, Ying-Jun, see Wu, Fang-jing
-
Chen, Yingying, 2(2)13--13
-
Chen, Yingying, see Shi, Cong
-
Chen:2024:NCM, 5(1)3--3
-
Cheng, Yuan, 2(4)23--23
-
Cheng, Yuan, see Zhen, Peining
-
Chetty, Marshini, 3(4)25--25
-
Chetty, Marshini, see Apthorpe, Noah
-
Chief, Editor-in-, 4(4)20--20
-
child, 1(3)14--14
-
Chimera, 2(2)10--10
-
Chiumento, Alessandro, 1(4)27--27
-
Chiumento, Alessandro, see Murillo, Yuri
-
chords, 1(3)15--15
-
Chowdhary, Ankur, 3(4)28--28
-
Chowdhary, Ankur, see Myneni, Sowmya
-
Chowdhury, Morshed, 2(4)26--26
-
Chowdhury, Sujan, 2(4)26--26
-
Chowdhury, Sujan, see Chowdhury, Morshed
-
Chowdhury:2021:NIA, 2(4)26--26
-
Chrysanthis, Panos K., 3(4)29--29
-
Chrysanthis, Panos K., see Constantinou, Soteris
-
city, 1(2)8--8, 2(2)13--13, 3(4)28--28, 3(4)31--31, 4(1)1--1, 4(1)2--2,
4(3)19--19
-
city, Smart-, 3(4)28--28
-
City-bus, 4(1)1--1
-
citywide, 4(1)1--1
-
class, 1(2)10--10, 1(3)15--15, 3(3)23--23
-
classification, 1(2)10--10, 1(2)12--12, 1(3)20--20, 3(3)23--23,
3(4)32--32, 5(1)5--5
-
clearly, 2(2)14--14
-
Closed-loop, 4(1)4--4
-
closer, 2(3)18--18
-
cloud, 1(2)11--11, 2(3)15--15, 2(3)18--18, 3(2)9--9, 3(2)10--10,
3(2)14--14, 3(4)28--28, 3(4)32--32, 4(1)8--8, 5(1)6--6
-
cloud-computing, 1(3)15--15
-
Cloud-smart, 1(3)15--15
-
Clouds, Micro-, 4(2)9--9
-
coach, 1(2)12--12
-
CoAP, 3(3)19--19
-
CoCo, 2(3)20--20
-
Coding, 4(4)24--24
-
coexistence, 2(2)14--14
-
Coil, Multi-, 3(2)13--13
-
Coletta, Andrea, 2(2)14--14
-
Coletta, Andrea, see Piva, Mauro
-
collaborative, 1(4)26--26, 2(2)11--11, 3(2)10--10
-
collected, 2(3)20--20, 3(1)8--8, 3(4)32--32, 4(1)4--4
-
collecting, 5(1)6--6
-
collection, 1(3)15--15, 2(1)5--5
-
collision, 5(1)2--2
-
combined, 4(2)9--9
-
combines, 1(1)5--5, 1(4)27--27, 3(2)14--14
-
Combining, 2(2)14--14
-
common, 3(4)28--28, 4(4)25--25
-
Commons, 1(3)15--15
-
communicate, 1(2)8--8, 4(2)10--10
-
communication, 1(4)22--22, 1(4)23--23, 1(4)24--24, 1(4)26--26,
2(2)14--14, 2(4)22--22, 3(3)19--19, 3(3)24--24, 4(2)9--9, 4(2)10--10,
4(4)24--24, 5(1)7--7
-
communications, 1(4)24--24, 3(3)20--20
-
commuters, 4(1)1--1
-
companion, 4(4)23--23
-
comparison, 4(3)16--16
-
competitive, 4(1)5--5
-
complete, 3(3)22--22
-
complex, 1(4)25--25, 3(1)4--4, 4(1)6--6
-
complexity-accuracy-delay, 3(1)4--4
-
complicated, 2(1)6--6
-
component, 1(1)2--2, 1(2)10--10, 2(3)18--18, 4(1)6--6, 4(4)21--21
-
composition, 1(3)15--15
-
Comprehensive, 4(3)16--16
-
Compressed, Tensor-, 2(4)23--23
-
compressed, tensor-, 2(4)23--23
-
comprising, 4(1)6--6
-
Compromised, 3(3)18--18
-
computation, 2(1)2--2, 2(2)14--14, 2(4)23--23
-
computational, 2(2)10--10, 3(2)14--14, 3(3)22--22
-
computational-power, low-, 1(4)27--27
-
computationally, 1(4)24--24
-
computer, 3(2)15--15, 4(1)2--2
-
computing, 1(1)4--4, 2(1)1--1, 2(1)2--2, 3(1)4--4, 3(1)6--6, 3(2)9--9,
3(2)10--10, 3(2)14--14, 3(3)17--17, 4(1)7--7, 4(2)9--9, 4(2)13--13
-
computing, cloud-, 1(3)15--15
-
computing, edge-, 1(3)15--15
-
concept, 1(1)5--5, 2(2)13--13
-
concerns, 2(2)13--13, 3(1)8--8
-
conclusions, 3(4)32--32
-
Concurrent, 2(4)22--22
-
condition, 1(3)18--18, 2(4)27--27, 4(2)15--15
-
conduct, 3(4)25--25
-
conducted, 2(2)14--14
-
confidence, High-, 2(3)21--21
-
connected, 1(4)25--25, 3(4)26--26, 4(3)17--17
-
connected, Internet-, 1(3)19--19, 3(4)25--25
-
connected, Internet-, 3(4)25--25
-
connectivity, 1(3)15--15, 2(4)26--26
-
Conquer-based, Divide-and-, 1(2)10--10
-
consensus, 3(3)21--21
-
consequence, 4(3)17--17
-
conservation, 2(1)5--5
-
consider, 1(4)25--25, 2(2)11--11, 3(4)27--27
-
consideration, 2(1)7--7
-
considered, 5(1)3--3
-
Constantinou, Soteris, 3(4)29--29
-
Constantinou:2022:GPI, 3(4)29--29
-
constitute, 1(4)22--22
-
constrain, 4(1)7--7
-
constrained, 1(1)6--6, 3(3)19--19
-
constrained, battery-, 1(4)27--27
-
Constrained, Resource-, 3(4)32--32
-
constrained, Resource-, 1(3)20--20
-
constrained, resource-, 1(4)24--24
-
constraint, 1(4)25--25, 3(2)10--10, 4(1)2--2
-
consumer, 3(1)1--1, 3(3)20--20, 3(4)25--25
-
consuming, time-, 3(2)16--16
-
consumption, 1(2)13--13, 2(1)7--7
-
consumption, self-, 3(4)29--29
-
contact, 4(4)27--27, 4(4)28--28, 5(1)2--2
-
contact, Non-, 5(1)3--3
-
contact, non-, 4(2)15--15
-
Contact-based, 4(4)27--27
-
containers, 2(3)18--18
-
Contemporary, 3(1)3--3
-
content, 1(3)15--15
-
context, 1(4)21--21, 2(4)29--29, 4(3)18--18
-
Context-based, 3(2)11--11
-
Contextual, 4(1)1--1
-
Contextual-Bandit, 3(1)4--4
-
Contextualizing, 2(2)8--8
-
Continual, 2(2)9--9
-
continuous, 1(2)7--7, 1(4)21--21, 2(3)16--16, 4(2)15--15
-
continuously, 1(3)18--18
-
control, 2(1)1--1, 2(1)5--5, 3(1)5--5, 3(2)14--14, 3(4)27--27, 4(1)8--8,
4(3)18--18
-
controlled, 2(2)14--14
-
Controlling, 3(4)27--27
-
conveniently, 4(4)28--28
-
conventional, 1(1)2--2, 1(3)15--15
-
conventionally, 4(1)6--6
-
Cooperative, 4(2)13--13
-
copresence, 3(2)11--11
-
copy, 4(1)8--8, 4(4)27--27
-
Coraddu, Andrea, 3(1)6--6
-
Coraddu, Andrea, see Michala, Anna Lito
-
core, 4(1)1--1, 4(1)2--2
-
corporate, 2(2)13--13
-
Correct, 3(1)1--1
-
correctly, 4(1)6--6
-
correlations, 2(3)20--20
-
cost, 1(4)24--24, 2(3)21--21, 4(1)5--5
-
Cost, Low-, 4(2)9--9
-
cost, Low-, 1(4)21--21
-
cost, low-, 1(3)19--19, 5(1)6--6
-
cost-effective, 4(3)18--18
-
could, 1(2)12--12, 2(4)27--27, 4(1)6--6
-
coupled, 1(3)15--15
-
coupling, 3(4)30--30
-
Coverage, 1(4)25--25
-
covering, 4(2)9--9
-
CPS, 1(3)18--18
-
Craddock, Ian, 1(2)9--9
-
Craddock, Ian, see Elsts, Atis
-
Creative, 1(3)15--15
-
crime, 1(3)14--14
-
Crispo, Bruno, 1(3)19--19
-
Crispo, Bruno, see Ammar, Mahmoud
-
criteria, 1(3)15--15
-
criteria-based, Multi-, 2(1)2--2
-
critical, 2(2)13--13, 3(1)7--7, 3(2)10--10, 3(2)14--14, 4(3)17--17,
5(1)2--2, 5(1)4--4
-
critical, mission-, 2(3)19--19
-
critical, privacy-, 1(3)19--19, 2(1)4--4
-
critical, safety-, 1(2)8--8
-
critical, security-, 3(2)9--9
-
crop, 1(4)21--21
-
cross-domain, 3(2)15--15
-
cross-manufacturer, 3(4)30--30
-
Crowd-sourced, 1(2)11--11
-
Crowd-sourcing, 5(1)6--6
-
Crowdsensing, 3(4)31--31
-
crowdsourced, 1(3)14--14
-
crucial, 1(2)8--8, 1(4)21--21, 2(2)8--8, 5(1)2--2, 5(1)6--6
-
Cryptocurrency, 4(1)4--4
-
Cryptography, 5(1)7--7
-
Cryptosystem-based, 4(2)14--14
-
CSI, 2(1)3--3
-
Cube, 4(2)14--14
-
cuff, 4(4)28--28
-
curious, 2(2)11--11
-
current, 2(2)14--14, 3(2)16--16
-
currently, 1(4)23--23
-
customized, 1(1)5--5
-
cyber, 1(3)18--18, 1(4)25--25
-
cyber-attacks, 3(2)14--14
-
cycle, 2(1)4--4