default search action
Computer Communications, Volume 181
Volume 181, January 2022
- Pablo Barbecho Bautista, Luis Urquiza-Aguiar, Mónica Aguilar-Igartua:
How does the traffic behavior change by using SUMO traffic generation tools. 1-13
- Luca Chiaraviglio, Vinay Chamola, Biplab Sikdar, Guangjie Han:
Special issue on scalable and secure platforms for UAV networks. 14-16
- Christian Quadri, Vincenzo Mancuso, Marco Ajmone Marsan, Gian Paolo Rossi:
Edge-based platoon control. 17-31 - Victoria Manfredi, Cameron Donnay Hill:
Quantifying unlinkability in multi-hop wireless networks. 32-44
- Zhongliang Zhao, Pedro Cumino, Christian Esposito, Meng Xiao, Denis Rosário, Torsten Braun, Eduardo Cerqueira, Susana Sargento:
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations. 45-57
- Molly Zhang, Luca de Alfaro, J. J. Garcia-Luna-Aceves:
Making slotted ALOHA efficient and fair using reinforcement learning. 58-68
- Daya Sagar Gupta, Sangram Ray, Tajinder Singh, Madhu Kumari:
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security. 69-79
- Qin Zhang, Yutang Liu:
Reliability evaluation of Markov cyber-physical system oriented to cognition of equipment operating status. 80-89
- Weifeng Lu, Weiduo Wu, Jia Xu, Pengcheng Zhao, Dejun Yang, Lijie Xu:
Auction design for cross-edge task offloading in heterogeneous mobile edge clouds. 90-101
- Rémy Grünblatt, Isabelle Guérin Lassous, Olivier Simonin:
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs. 102-115
- Saddam Hussain, Syed Sajid Ullah, Ihsan Ali, Jiafeng Xie, Venkata N. Inukollu:
Certificateless signature schemes in Industrial Internet of Things: A comparative survey. 116-131
- Yu Lin, Hui Song, Feng Ke, Weizhao Yan, Zhikai Liu, Faming Cai:
Optimal caching scheme in D2D networks with multiple robot helpers. 132-142 - Fangfang Gou, Jia Wu:
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks. 143-155
- Tri Gia Nguyen, Trung V. Phan, Dinh Thai Hoang, Hai Hoang Nguyen, Duc Tran Le:
DeepPlace: Deep reinforcement learning for adaptive flow rule placement in Software-Defined IoT Networks. 156-163
- Qing Liu:
Human motion state recognition based on MEMS sensors and Zigbee network. 164-172 - Chao Niu, Lizhou Wang:
Big data-driven scheduling optimization algorithm for Cyber-Physical Systems based on a cloud platform. 173-181 - Hui Zeng, Jiaqi Luo:
Construction of multi-modal perception model of communicative robot in non-structural cyber physical system environment based on optimized BT-SVM model. 182-191
- Dolores García, Jesus Omar Lacruz, Damiano Badini, Danilo De Donno, Joerg Widmer:
Model-free machine learning of wireless SISO/MIMO communications. 192-202
- Kushan Sudheera Kalupahana Liyanage, Maode Ma, Peter Han Joo Chong:
Real-time cooperative data routing and scheduling in software defined vehicular networks. 203-214 - Sungwook Kim:
4G/5G coexistent dynamic spectrum sharing scheme based on dual bargaining game approach. 215-223
- Fayez Alqahtani, Mohammed Al-Maitah, Osama A. Elshakankiry:
A proactive caching and offloading technique using machine learning for mobile edge computing users. 224-235
- Himanshu Verma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi:
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted 'Internet of Healthcare Things' network. 236-256
- Lianzhen Chen, Hua Zhu:
Analysis of physical health risk dynamic evaluation system based on sports network technology. 257-266
- An Braeken:
Pairing free asymmetric group key agreement protocol. 267-273
- Sohaib A. Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band:
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. 274-283
- Karim Boutiba, Adlen Ksentini, Bouziane Brik, Yacine Challal, Amar Balla:
NRflex: Enforcing network slicing in 5G New Radio. 284-292
- Bakkiam David Deebak, Fadi Al-Turjman:
A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. 293-308
- Xin Li, Ruitao Liu, Zhenmin Qiao:
Privacy information verification of homomorphic algorithm for aggregated data based on fog layer structure. 309-319
- Ruomei Wang, Jianfeng Wang, Zhuo Su:
Learning compatibility knowledge for outfit recommendation with complementary clothing matching. 320-328 - Jiangjin Gao, Tao Yang:
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism. 329-337
- Enrico Corradini, Serena Nicolazzo, Antonino Nocera, Domenico Ursino, Luca Virgili:
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT. 338-356
- Linqi Li, Xiaoyin Wang, Xinhua Ma:
Design of a location-based opportunistic geographic routing protocol. 357-364
- Sandra M. Djosic, Igor Z. Stojanovic, Milica D. Jovanovic, Goran Lj. Djordjevic:
Multi-algorithm UWB-based localization method for mixed LOS/NLOS environments. 365-373
- ChienHsiang Wu, Chin-Feng Lai:
A survey on improving the wireless communication with adaptive antenna selection by intelligent method. 374-403
- Jie Hu, Sier Deng:
Rolling bearing fault diagnosis based on wireless sensor network data fusion. 404-411 - Sadia Jabeen Siddiqi, Faisal Naeem, Saud Khan, Komal Saifullah Khan, Muhammad Tariq:
Towards AI-enabled traffic management in multipath TCP: A survey. 412-427
- Anwar Khan, Muhammad Imran, Muhammad Shoaib, Atiq Ur Rahman, Najm Us Sama:
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks. 428-437
- Chunyang Zhang, Gaogang Xie:
Using XorOffsetTrie for high-performance IPv6 lookup in the backbone network. 438-445
- Xiuli Yu, Mingshuai Dong, Weimin Yin:
Time-optimal trajectory planning of manipulator with simultaneously searching the optimal path. 446-453
- Dan Tang, Xiyin Wang, Yudong Yan, Dongshuo Zhang, Huan Zhao:
ADMS: An online attack detection and mitigation system for LDoS attacks via SDN. 454-471
- Shaohua Wan, Remigiusz Wisniewski, George C. Alexandropoulos, Zonghua Gu, Pierluigi Siano:
Special Issue on Optimization of Cross-layer Collaborative Resource Allocation for Mobile Edge Computing, Caching and Communication. 472-473
- Varun G. Menon, Ali Kashif Bashir, Shahid Mumtaz, Syed Hassan Ahmed, Danda B. Rawat:
Special issue on Security and Privacy in Internet of Medical Things. 474-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.