default search action
Computer Communications, Volume 211
Volume 211, November 2023
- Donald J. P, Linda Joseph:
Information centric wireless communication for variation detection and Mitigation Model in industrial internet of Things. 1-10
- Prithi Samuel, Arumugham Vinothini, Jayashree Kanniappan:
POLSTM: Poplar optimization-based long short term memory model for resource allocation in cloud environment. 11-23 - Gustavo P. Bittencourt, João Paulo P. G. Marques, Daniel C. Cunha:
Generation of irregular grid maps for fingerprinting-based mobile radio localization using farthest-first traversal and low-discrepancy sequences. 24-36
- R. Mahaveerakannan, Cuddapah Anitha, Aby K. Thomas, Sanju Rajan, T. Muthukumar, G. Govinda Rajulu:
An IoT based forest fire detection system using integration of cat swarm with LSTM model. 37-45 - Hayder Sabah Salih, Mustafa Musa Jaber, Mohammed Hasan Ali, Sura Khalil Abd, Ahmed Alkhayyat, Rami Qays Malik:
Application of edge computing-based information-centric networking in smart cities. 46-58
- Chuangchuang Zhang, Yanming Liu, Shuning Zhang, Hongyong Yang, Fuliang Li, Xingwei Wang:
SFC-based multi-domain service customization and deployment. 59-72 - Yin Wang, Kang'an Gui:
MSEC-D based energy consumption optimization strategy in satellite communication systems. 73-82
- Chen Qiu, Haoda Wang, Qinglin Yang, Chunhua Su, Huawei Huang:
A coordinates-based hierarchical computing framework towards spatial data processing. 83-92
- Juanjuan Wang, Jun Zeng, Hao Wen, Zhiyi Hu:
Designing mobile operator's tariff package pricing scheme based on user's internet behavior. 93-103
- Huimin Gao, Bo Jiang, Hong Xu, Siji Chen:
The low latency networking method for task-driven MEC-enabled UAV swarm. 104-118
- Zengpeng Li, Huiqun Yu, Guisheng Fan, Qifeng Tang, Jiayin Zhang, Liqiong Chen:
Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing. 119-133 - Yijie Wang, Ziping Yu, Zhongliang Zhao, Xianbin Cao:
AOR: Adaptive opportunistic routing based on reinforcement learning for planetary surface exploration. 134-146
- Sicong Zhou, Huawei Huang, Ruixin Li, Jialiang Liu, Zibin Zheng:
ComAvg: Robust decentralized federated learning with random committees. 147-156
- Venkata Bhikshapathi Chenam, Syed Taqi Ali:
A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage. 157-177 - Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter:
Privacy-friendly statistical counting for pedestrian dynamics. 178-192 - Assis T. de Oliveira Filho, Eduardo Freitas, Pedro Rafael X. do Carmo, Djamel Fawzi Hadj Sadok, Judith Kelner:
Measuring the impact of SR-IOV and virtualization on packet round-trip time. 193-215 - Wenlan Diao, Jianping An, Tong Li, Chao Zhu, Yu Zhang, Xiaotian Wang, Zhoujie Liu:
Low delay fragment forwarding in LEO satellite networks based on named data networking. 216-228 - José María Jorquera Valero, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning. 229-238 - Mohamed A. El-Zawawy, Pallavi Kaliyar, Mauro Conti, Sokratis K. Katsikas:
Honey-list based authentication protocol for industrial IoT swarms. 239-253
- Jian Song:
Data conversion control of virtual network devices in cloud computing: A deep reinforcement learning approach. 254-262
- Weijia Wang, Chao Zhou, Da Lin, Yuan-Gen Wang:
FeConDefense: Reversing adversarial attacks via feature consistency loss. 263-270
- Garima Thakur, Pankaj Kumar, Chien-Ming Chen, Athanasios V. Vasilakos, Anchna, Sunil Prajapat:
A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment. 271-285 - Mohammad Mahdi Modiri, Mahmoud Salmasizadeh, Javad Mohajeri, Babak Hossein Khalaj:
Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks. 286-301
- Ziwei Xia, Benying Tan, Haoli Zhao, Shuxue Ding, Yujie Li:
A new device-free localization method for RSS data with considering correlations. 302-310
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.