default search action
Journal of Network and Computer Applications, Volume 103
Volume 103, February 2018
- Marcos Dias de Assunção, Alexandre Da Silva Veith, Rajkumar Buyya:
Distributed data stream processing and edge computing: A survey on resource elasticity and future directions. 1-17 - Furui Zhan, Nianmin Yao, Zhenguo Gao, Haitao Yu:
Efficient key generation leveraging wireless channel reciprocity for MANETs. 18-28 - Haneet Kour, Rakesh Kumar Jha, Sanjeev Jain:
A comprehensive survey on spectrum sharing: Architecture, energy efficiency and security issues. 29-57 - Sadip Midya, Asmita Roy, Koushik Majumder, Santanu Phadikar:
Multi-objective optimization technique for resource allocation and task scheduling in vehicular cloud architecture: A hybrid adaptive nature inspired approach. 58-84 - Veerabhadra Rao Chandakanna:
REHDFS: A random read/write enhanced HDFS. 85-100 - Yuan Zhang, Lin Cui, Wei Wang, Yuxiang Zhang:
A survey on software defined networking with multiple controllers. 101-118 - Laizhong Cui, Huaixiong Hu, Shui Yu, Qiao Yan, Zhong Ming, Zhenkun Wen, Nan Lu:
DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. 119-130 - Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri, Antonio Pescapè:
Multi-classification approaches for classifying mobile app traffic. 131-145 - Yan Huang, Zhipeng Cai, Anu G. Bourgeois:
Search locations safely and accurately: A location privacy protection algorithm with accurate service. 146-156 - Sameh Zakhary, Abderrahim Benslimane:
On location-privacy in opportunistic mobile networks, a survey. 157-170 - Jungang Lou, Yunliang Jiang, Qing Shen, Ruiqin Wang:
Failure prediction by relevance vector regression with improved quantum-inspired gravitational search. 171-177 - Lu Zhou, Quanlong Wang, Xin Sun, Piotr Kulicki, Arcangelo Castiglione:
Quantum technique for access control in cloud computing II: Encryption and key distribution. 178-184 - Changsong Yang, Xiaofeng Chen, Yang Xiang:
Blockchain-based publicly verifiable data deletion scheme for cloud storage. 185-193 - Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. 194-204 - Guangjie Han, Wenhui Que, Gangyong Jia, Wenbo Zhang:
Resource-utilization-aware energy efficient server consolidation algorithm for green computing in IIOT. 205-214 - Qin-ying Lin, Houbing Song, Xiaolin Gui, Xiaoping Wang, Saiyu Su:
A shortest path routing algorithm for unmanned aerial systems based on grid position. 215-224 - Bin Cao, Jianwei Zhao, Zhihan Lv, Xin Liu, Xinyuan Kang, Shan Yang:
Deployment optimization for 3D industrial wireless sensor networks based on particle swarm optimizers with distributed parallelism. 225-238 - Weishan Zhang, Gaowa Wulan, Jia Zhai, Liang Xu, Dehai Zhao, Xin Liu, Su Yang, Jiehan Zhou:
An intelligent power distribution service architecture using cloud computing and deep learning techniques. 239-248 - Muzzamil Noor, Haider Abbas, Waleed Bin Shahid:
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis. 249-261 - Keke Gai, Meikang Qiu, Xiaotong Sun:
A survey on FinTech. 262-273 - Deze Zeng, Shiyan Zhang, Lin Gu, Shui Yu, Zhangjie Fu:
Quality-of-sensing aware budget constrained contaminant detection sensor deployment in water distribution system. 274-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.