default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 41 matches
- 2022
- Mehran Pourmohammad Abdollahi, Javad Musevi Niya
, Mahdi Nangir
:
Optimizing the operator's economy in multi-tier cellular networks with underlaid D2D communications. Comput. Networks 217: 109322 (2022) - Waseem Akram
, Khalid Mahmood, Xiong Li
, Mazhar Sadiq, Zhihan Lv
, Shehzad Ashraf Chaudhry:
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing. Comput. Networks 217: 109335 (2022) - Subhi Alrubei
, Edward A. Ball
, Jonathan Michael Rigelsford:
HDPoA: Honesty-based distributed proof of authority via scalable work consensus protocol for IoT-blockchain applications. Comput. Networks 217: 109337 (2022) - Sokratis Barmpounakis
, Nikolaos Maroulis, Nikolaos Koursioumpas, Apostolos Kousaridas
, Angeliki Kalamari, Panagiotis Kontopoulos, Nancy Alonistioti:
AI-driven, QoS prediction for V2X communications in beyond 5G systems. Comput. Networks 217: 109341 (2022) - Francesco Buccafurri
, Vincenzo De Angelis
, Gianluca Lax:
An integrity-preserving technique for range queries over data streams in two-tier sensor networks. Comput. Networks 217: 109316 (2022) - Mustafa Can Çavdar
, Ibrahim Korpeoglu
, Özgür Ulusoy
:
Application placement with shared monitoring points in multi-purpose IoT wireless sensor networks. Comput. Networks 217: 109302 (2022) - Kimchheang Chhea
, Jung-Ryun Lee
:
Energy-efficient full-duplex D2D for SWIPT-empowered underlay cellular networks using a deep neural network. Comput. Networks 217: 109324 (2022) - Tho Minh Duong
, Sungoh Kwon
:
A frame work of handover analysis for randomly deployed heterogeneous networks. Comput. Networks 217: 109351 (2022) - Miquel Ferriol Galmés
, José Suárez-Varela
, Jordi Paillisse
, Xiang Shi
, Shihan Xiao, Xiangle Cheng
, Pere Barlet-Ros, Albert Cabellos-Aparicio:
Building a Digital Twin for network optimization using Graph Neural Networks. Comput. Networks 217: 109329 (2022) - Tianhao Hou
, Hongyan Xing, Xinyi Liang, Xin Su, Zenghui Wang:
Network intrusion detection based on DNA spatial information. Comput. Networks 217: 109318 (2022) - Minghao Jiang, Zhen Li, Peipei Fu, Wei Cai, Mingxin Cui, Gang Xiong
, Gaopeng Gou:
Accurate mobile-app fingerprinting using flow-level relationship with graph neural networks. Comput. Networks 217: 109309 (2022) - Rui Kang
, Fujun He, Eiji Oki
:
Fault-tolerant resource allocation model for service function chains with joint diversity and redundancy. Comput. Networks 217: 109287 (2022) - Karamjeet Kaur
, Veenu Mangat
, Krishan Kumar:
A review on Virtualized Infrastructure Managers with management and orchestration features in NFV architecture. Comput. Networks 217: 109281 (2022) - Burak Kolukisa
, Veli Can Yildirim, Bahadir Elmas
, Cem Ayyildiz
, Vehbi Cagri Gungor
:
Deep learning approaches for vehicle type classification with 3-D magnetic sensor. Comput. Networks 217: 109326 (2022) - Ye Kuang, Dandan Li, Xiaohong Huang, Mo Zhou, Weidu Wang:
PoiEvent: An approach to extract the persistent and destructive routing events. Comput. Networks 217: 109313 (2022) - Swati Kumari, Maninder Singh, Raman Singh
, Hitesh Tewari:
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices. Comput. Networks 217: 109327 (2022) - Yupeng Li, Mengjia Xia, Jingpu Duan
, Yang Chen:
Pricing-based resource allocation in three-tier edge computing for social welfare maximization. Comput. Networks 217: 109311 (2022) - Tingting Lu
, Junfeng Wang:
F2DC: Android malware classification based on raw traffic and neural networks. Comput. Networks 217: 109320 (2022) - Michele Luglio, Simon Pietro Romano
, Cesare Roseti, Francesco Zampognaro
:
Satellite multi-beam multicast support for an efficient community-based CDN. Comput. Networks 217: 109352 (2022) - Shyama M, Anju S. Pillai
, Alagan Anpalagan:
Self-healing and optimal fault tolerant routing in wireless sensor networks using genetical swarm optimization. Comput. Networks 217: 109359 (2022) - Yosef Masoudi-Sobhanzadeh
, Shabnam Emami-Moghaddam:
A real-time IoT-based botnet detection method using a novel two-step feature selection technique and the support vector machine classifier. Comput. Networks 217: 109365 (2022) - Younes Ben Mazziane
, Sara Alouf
, Giovanni Neglia:
Analyzing Count Min Sketch with Conservative Updates. Comput. Networks 217: 109315 (2022) - Agapi Mesodiakaki
, Enrica Zola, Andreas Kassler:
Robust and energy-efficient user association and traffic routing in B5G HetNets. Comput. Networks 217: 109305 (2022) - Ghizlane Mountaser
, Enric Pardo
, Toktam Mahmoodi
:
Graphical Modelling and Optimization of RAN function split deployed through UAVs. Comput. Networks 217: 109266 (2022) - Arcangela Rago
, Sergio Martiradonna, Giuseppe Piro
, Andrea Abrardo, Gennaro Boggia:
A tenant-driven slicing enforcement scheme based on Pervasive Intelligence in the Radio Access Network. Comput. Networks 217: 109285 (2022) - Keyvan Ramezanpour, Jithin Jagannath
:
Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN. Comput. Networks 217: 109358 (2022) - Junyu Ren
, Tuanfa Qin:
A novel multidimensional trust evaluation and fusion mechanism in fog-based Internet of Things. Comput. Networks 217: 109354 (2022) - Muhammad Saad, Afsah Anwar, Ashar Ahmad, Hisham Alasmary
, Murat Yuksel, David Mohaisen
:
RouteChain: Towards Blockchain-based secure and efficient BGP routing. Comput. Networks 217: 109362 (2022) - Mohamed Y. Selim
, Ahmed E. Kamal
:
Self-backhauling failure mitigation using 5G new radio. Comput. Networks 217: 109355 (2022) - P. V. Shalini
, V. Radha, Sriram G. Sanjeevi:
DOCUS-DDoS detection in SDN using modified CUSUM with flash traffic discrimination and mitigation. Comput. Networks 217: 109361 (2022)
skipping 11 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-17 10:41 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint