default search action
Computer Communications, Volume 161
Volume 161, September 2020
- Tanveer Ahmed, Rishav Singh, Anil K. Pandey, Sanjay Kumar Singh:
A cognitive model to predict human interest in smart environments. 1-9
- Qizhong Li, Yizheng Yue, Zhongqi Wang:
Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For IIOT secured transmission in cloud computing. 10-18
- Zhihan Lv, Liang Qiao:
Optimization of collaborative resource allocation for mobile edge computing. 19-27
- Yue Wang, Jiguo Yu, Biwei Yan, Guijuan Wang, Zhiguang Shan:
BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme. 28-40
- Chaonong Xu, Jianxiong Wu, Chao Li:
Reliable uplink transmissions for NOMA-based Industrial Wireless Networks with guaranteed real-time performance. 41-49
- Akshay Jain, Elena López-Aguilera, Ilker Demirkol:
Are mobility management solutions ready for 5G and beyond? 50-75
- Salih Safa Bacanli, Damla Turgut:
Energy-efficient unmanned aerial vehicle scanning approach with node clustering in opportunistic networks. 76-85
- Girma M. Yilma, Faqir Zarrar Yousaf, Vincenzo Sciancalepore, Xavier Pérez Costa:
Benchmarking open source NFV MANO systems: OSM and ONAP. 86-98 - Wallas Froes, Lucas Santos, Leobino N. Sampaio, Magnos Martinello, Alextian B. Liberato, Rodolfo da Silva Villaça:
ProgLab: Programmable labels for QoS provisioning on software defined networks. 99-108 - Masoumeh Etemadi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
Resource provisioning for IoT services in the fog computing environment: An autonomic approach. 109-131
- Linhui Cheng, Luo Zhong, Xiao Zhang, Jiaxu Xing:
A staged adaptive firefly algorithm for UAV charging planning in wireless sensor networks. 132-141
- Xin Niu, Jiazhong Lu:
Moving target defense controller of mobile system based on Openflow sensor security scheme. 142-149
- Prince Abudu, Andrew Markham:
Learning distributed communication and computation in the IoT. 150-159
- Celestine Iwendi, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava:
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. 160-171
- Jin Yang, Tao Li, Gang Liang, Yunpeng Wang, Tianyu Gao, Fangdong Zhu:
Spam transaction attack detection model based on GRU and WGAN-div. 172-182
- Ying Sai, Dong-zhu Fan, Meng-yang Fan:
Cooperative and efficient content caching and distribution mechanism in 5G network. 183-190
- Antonio Franco, Björn Landfeldt, Ulf Körner:
Extended analysis of Age of Information threshold violations. 191-201
- Zhengjun Jing, Chunsheng Gu, Yong Li, Mengshi Zhang, Guangquan Xu, Alireza Jolfaei, Peizhong Shi, Chenkai Tan, James Xi Zheng:
Security analysis of indistinguishable obfuscation for internet of medical things applications. 202-211
- Elie F. Kfoury, Jose Gomez, Jorge Crichigno, Elias Bou-Harb:
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband. 212-224
- Federico Montori, Luca Bedogni, Claudio Fiandrino, Andrea Capponi, Luciano Bononi:
Performance evaluation of hybrid crowdsensing systems with stateful CrowdSenSim 2.0 simulator. 225-237
- Morteza Kheirkhah, Myungjin Lee:
A solution to MPTCP's inefficiencies under the incast problem for Data Center Networks. 238-247
- Gunasekaran Manogaran, Bharat S. Rawal, Vijayalakshmi Saravanan, Priyan Malarvizhi Kumar, Oscar Sanjuán Martínez, Rubén González Crespo, Carlos Enrique Montenegro-Marín, Sujatha Krishnamoorthy:
Blockchain based integrated security measure for reliable service delegation in 6G communication environment. 248-256
- Jian Hu, Junjie Wang, Hangqi Xie:
Wearable bracelets with variable sampling frequency for measuring multiple physiological parameter of human. 257-265
- Katty Rohoden, Rebeca Estrada, Hadi Otrok, Zbigniew Dziong:
Evolutionary game theoretical model for stable femtocells' clusters formation in HetNets. 266-278
- Karan Sheth, Keyur Patel, Het Shah, Sudeep Tanwar, Rajesh Gupta, Neeraj Kumar:
A taxonomy of AI techniques for 6G communication networks. 279-303
- Aparna Kumari, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar:
A taxonomy of blockchain-enabled softwarization for secure UAV network. 304-323
- Qingqing Ren, Liang Zhou, Zhijun Xu, Yujun Zhang, Lei Zhang:
PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing. 324-333 - Zhixin Liu, Heng Zhu, Yazhou Yuan, Yi Yang, Kit Yan Chan:
Optimization of base station density and user transmission power in multi-tier heterogeneous cellular systems. 334-343 - Miroslaw Klinkowski:
Optimization of latency-aware flow allocation in NGFI networks. 344-359
- Yu Peng, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang, Luyu Zhang, Pengwei Wang, Chengwu Ming, Xiaobo Mi:
Sensing network security prevention measures of BIM smart operation and maintenance system. 360-367
- Haoran Mei, Limei Peng:
Flexible functional split for cost-efficient C-RAN. 368-374
- Yuxin Liu, Tian Wang, Shaobo Zhang, Xuxun Liu, Xiao Liu:
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing. 375-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.