default search action
Computer Communications, Volume 151
Volume 151, February 2020
- Jungwon Lee, Ha Young Byun, Hyesook Lim:
Dual-load Bloom filter: Application for name lookup. 1-9
- Hao Wang:
Improvement and implementation of Wireless Network Topology System based on SNMP protocol for router equipment. 10-18
- Qiang Tang, Lu Chang, Kun Yang, Kezhi Wang, Jin Wang, Pradip Kumar Sharma:
Task number maximization offloading strategy seamlessly adapted to UAV scenario. 19-30
- Wei Chen:
Intelligent manufacturing production line data monitoring system for industrial internet of things. 31-41
- Dawei Fang, Xin Guan, Lin Lin, Yu Peng, Di Sun, Mohammad Mehedi Hassan:
Edge intelligence based Economic Dispatch for Virtual Power Plant in 5G Internet of Energy. 42-50
- Bohan Li, Renjun Ye, Gao Gu, Ruochen Liang, Wei Liu, Ken Cai:
A detection mechanism on malicious nodes in IoT. 51-59
- Rajeesh Kumar N. V., Mohan Kumar P.:
Application of SDN for secure communication in IoT environment. 60-65
- Geetanjali Rathee, Ashutosh Sharma, Rajiv Kumar, Farhan Ahmad, Razi Iqbal:
A trust management scheme to secure mobile information centric networks. 66-75
- Liyong Yin, Chao Zhang, Zhijie Cui:
Experimental research on real-time acquisition and monitoring of wearable EEG based on TGAM module. 76-85 - Jiajie He, Dunbo Liu, Xiaoyang Chen:
Wearable exercise electrocardiograph signal quality assessment based on fuzzy comprehensive evaluation algorithm. 86-97
- (Withdrawn) An assessment of software defined networking approach in surveillance using sparse optimization algorithm. 98-110
- P. Suresh, R. Sukumar, S. Ayyasamy:
Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS). 111-118
- Antonio Arena, Pericle Perazzo, Carlo Vallati, Gianluca Dini, Giuseppe Anastasi:
Evaluating and improving the scalability of RPL security in the Internet of Things. 119-132
- Hisham A. Kholidy:
An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs. 133-144
- Lijuan Shi, Liquan Chen:
Hazard recognition and reliability analysis of CTCS-3 on-board subsystem. 145-153
- Sangeetha U., A. V. Babu:
Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates. 154-164
- Zhiou Xu, Juan Zhao, Yi Yu, Haijun Zeng:
Improved 1D-CNNs for behavior recognition using wearable sensor network. 165-171
- Gokulraj J., J. Senthilkumar, Y. Suresh, V. Mohanraj:
Data consistency matrix based data processing model for efficient data storage in wireless sensor networks. 172-182 - M. Lavanya, B. Shanthi, S. Saravanan:
Multi objective task scheduling algorithm based on SLA and processing time suitable for cloud environment. 183-195 - Balaji Vuppala, Swarnalatha P.:
Software defined network using enhanced workflow scheduling in surveillance. 196-201 - Khadir Kumar N., Bharathi A.:
Real time energy efficient data aggregation and scheduling scheme for WSN using ATL. 202-207
- Qifei Zhang, Xiaomo Yu:
GrowingNet: An end-to-end growing network for semi-supervised learning. 208-215
- Luca Baldesi, Leonardo Maccari, Renato Lo Cigno:
Infective flooding in low-duty-cycle networks, properties and bounds. 216-226
- Sumathi M., S. Sangeetha, Anu Thomas:
Corrigendum to "Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud" [Comput. Commun. 150 (2020) 569-580]. 227
- Jing Yang Koh, Gareth W. Peters, Ido Nevat, Derek Leong:
Probabilistic routing in wireless networks with privacy guarantees. 228-237
- Mohammed Amoon, Torki A. Altameem, Ayman Altameem:
RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms. 238-246
- Koki Inoue, Shin'ichi Arakawa, Masayuki Murata:
Network resource planning for evolvability in software-defined infrastructure. 247-256
- Hassan Fouad, Nourelhoda M. Mahmoud, Mohammed Sayed El Issawi, Haytham Al-Feel:
Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system. 257-265 - Pooja S. B., R. V. Siva Balan, Anisha M., M. S. Muthukumaran, Jothikumar R.:
Techniques Tanimoto correlated feature selection system and hybridization of clustering and boosting ensemble classification of remote sensed big data for weather forecasting. 266-274
- Anirudh Paranjothi, Mohammad S. Khan, Rizwan Patan, Reza M. Parizi, Mohammed Atiquzzaman:
VANETomo: A congestion identification and control scheme in connected vehicles using network tomography. 275-289 - Weimin Liu, Guan Huang, Aiyun Zheng, Jiaxin Liu:
Research on the optimization of IIoT data processing latency. 290-298
- Xin Liu:
Research on intelligent visual image feature region acquisition algorithm in Internet of Things framework. 299-305
- Ademar Takeo Akabane, Roger Immich, Luiz F. Bittencourt, Edmundo R. M. Madeira, Leandro A. Villas:
Towards a distributed and infrastructure-less vehicular traffic management system. 306-319
- Wei Xu, Zhipeng Zhang, Hongxun Wang, Yang Yi, Yanpeng Zhang:
Optimization of monitoring network system for Eco safety on Internet of Things platform and environmental food supply chain. 320-330
- I. Gethzi Ahila Poornima, B. Paramasivan:
Anomaly detection in wireless sensor network using machine learning algorithm. 331-337 - Mostafa Rezazad, Y. C. Tay:
Decoupling NDN caches via CCndnS: Design, analysis, and application. 338-354
- S. Vimal, Manju Khari, Nilanjan Dey, Rubén González Crespo, Yesudhas Harold Robinson:
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT. 355-364
- Zbigniew Duliñski, Grzegorz Rzym, Piotr Cholda:
MPLS-based reduction of flow table entries in SDN switches supporting multipath transmission. 365-385
- Karthik Sekaran, Sudha M.:
Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive-Compulsive Disorder affected cases. 386-394
- Arzoo Miglani, Neeraj Kumar, Vinay Chamola, Sherali Zeadally:
Blockchain for Internet of Energy management: Review, solutions, and challenges. 395-418
- Kokila S., Ramesh S.:
Intelligent software defined network based digital video stabilization system using frame transparency threshold pattern stabilization method. 419-427
- Torki A. Altameem, Ayman Altameem:
Hybridized interference bounded intuitive splitting for smart wearable system using cognitive assisted Internet of Things. 428-436
- Si Liu, Degan Zhang, Xiaohuan Liu, Ting Zhang, Hao Wu:
Adaptive repair algorithm for TORA routing protocol based on flood control strategy. 437-448 - Chuangchuang Zhang, Xingwei Wang, Anwei Dong, Yong Zhao, Qiang He, Min Huang:
Energy efficient network service deployment across multiple SDN domains. 449-462
- N. Nagarani, P. Venkatakrishnan, N. Balaji:
Unmanned Aerial vehicle's runway landing system with efficient target detection by using morphological fusion for military surveillance system. 463-472
- Jonathan Hasenburg, David Bermbach:
GeoBroker: Leveraging geo-contexts for IoT data distribution. 473-484
- Miaojiang Chen, Tian Wang, Kaoru Ota, Mianxiong Dong, Ming Zhao, Anfeng Liu:
Intelligent resource allocation management for vehicles network: An A3C learning approach. 485-494
- Mohamed Ahzam Amanullah, Riyaz Ahamed Ariyaluran Habeeb, Fariza Hanum Nasaruddin, Abdullah Gani, Ejaz Ahmed, Abdul Salam Mohamed Nainar, Nazihah Md. Akim, Muhammad Imran:
Deep learning and big data technologies for IoT security. 495-517
- Parimal Mehta, Rajesh Gupta, Sudeep Tanwar:
Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. 518-538
- Suyel Namasudra, Debashree Devi, Seifedine Nimer Kadry, Revathi Sundarasekar, A. Shanthini:
Towards DNA based data security in the cloud computing environment. 539-547 - Chunmei Wang, Fang Qin, R. Dinesh Jackson Samuel:
Cloud assisted big data information retrieval system for critical data supervision in disaster regions. 548-555
- Congfeng Jiang, Tiantian Fan, Honghao Gao, Weisong Shi, Liangkai Liu, Christophe Cérin, Jian Wan:
Energy aware edge computing: A survey. 556-580
- Hong Xu, Yuan He, Xiang Sun, Jia He, Qiongmei Xu:
Prediction of thermal energy inside smart homes using IoT and classifier ensemble techniques. 581-589
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.