default search action
Computer Networks, Volume 150
Volume 150, February 2019
- Siyao Cheng, Yingshu Li, Zhi Tian, Wei Cheng, Xiuzhen Cheng:
A model for integrating heterogeneous sensory data in IoT systems. 1-14
- You-Chiun Wang, Chien-Chun Huang:
Efficient management of interference and power by jointly configuring ABS and DRX in LTE-A HetNets. 15-27 - Puneet Kumar, Behnam Dezfouli:
Implementation and analysis of QUIC for MQTT. 28-45 - Jin B. Hong, Armstrong Nhlabatsi, Dong Seong Kim, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Systematic identification of threats in the cloud: A survey. 46-69 - Pedro Batista, Ivanes Araújo, Neiva Linder, Kim Laraqui, Aldebaro Klautau:
Testbed for ICN media distribution over LTE radio access networks. 70-80
- Sadia Din, Anand Paul, Abdul Rehman:
5G-enabled Hierarchical architecture for software-defined intelligent transportation system. 81-89
- Kaiyang Li, Ling Tian, Wei Li, Guangchun Luo, Zhipeng Cai:
Incorporating social interaction into three-party game towards privacy protection in IoT. 90-101
- Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur, Ramesh Babu Battula, Chhagan Lal:
SLDP: A secure and lightweight link discovery protocol for software defined networking. 102-116 - Niezi Mharsi, Makhlouf Hadji:
A mathematical programming approach for full coverage hole optimization in Cloud Radio Access Networks. 117-126
- Tiphaine Viard, Raphaël Fournier-S'niehotta:
Augmenting content-based rating prediction with link stream features. 127-133 - Ian F. Akyildiz, Ahan Kak:
The Internet of Space Things/CubeSats: A ubiquitous cyber-physical system for the connected world. 134-149
- Gongbing Hong, James Martin, James Westall:
Adaptive bandwidth binning for bandwidth management. 150-169 - Takayuki Hatanaka, Takuji Tachibana:
LE-MRC: Low-energy based multiple routing configurations for fast failure recovery. 170-178 - Aya Ayadi, Oussama Ghorbel, Mohammed Sulaiman BenSaleh, Mohamed Abid:
Kernelized technique for outliers detection to monitoring water pipeline based on WSNs. 179-189 - Sen Bai, Yunhao Liu, Zhenhua Li, Xin Bai:
Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures. 190-200 - Chuan-Gang Liu, I-Hsien Liu, Chang-De Lin, Jung-Shian Li:
A novel tag searching protocol with time efficiency and searching accuracy in RFID systems. 201-216 - Islam Tharwat Abdel-Halim, Hossam Mahmoud Ahmad Fahmy, Ayman M. Bahaa El-Din:
Mobility prediction-based efficient clustering scheme for connected and automated vehicles in VANETs. 217-233 - Enrico Cambiaso, Giovanni Chiola, Maurizio Aiello:
Introducing the SlowDrop Attack. 234-249 - Binbin Li, Yuan He, Wenyuan Liu, Lin Wang:
Towards time-efficient localized polling for large-scale RFID systems. 250-262
- Matthieu Latapy, Marco Fiore, Artur Ziviani:
Link streams: Methods and applications. 263-265 - Feng Li, Shibo He, Jun Luo, Mohan Gurusamy, Junshan Zhang:
Editorial: Green computing in Wireless Sensor Networks. 266-268
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.