default search action
Computer Communications, Volume 194
Volume 194, October 2022
- Yuhuan Liu, Fengyun Zhang, Yulong Ding, Jie Jiang, Shuang-Hua Yang:
Sub-messages extraction for industrial control protocol reverse engineering. 1-14 - Oren Markovitz, Michael Segal:
Asymmetric Differential Routing for low orbit satellite constellations. 15-28
- David A. Hayes, David Ros, Özgü Alay, Peyman Teymoori, Tine Margretha Vister:
Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication. 29-43
- Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong:
Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement. 44-54
- Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, Francis A. Ruambo, Bin Yuan, Hai Jin:
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach. 55-65 - Kun Jiang, Shaofeng Du, Fu Zhao, Yong Huang, Chunlin Li, Youlong Luo:
Effective data management strategy and RDD weight cache replacement strategy in Spark. 66-85
- Ghada Alsuhli, Ahmed Fahim, Yasser Gadallah:
A survey on the role of UAVs in the communication process: A technological perspective. 86-123
- Ravi Shukla, Sasthi C. Ghosh:
Distributed relay switching in the presence of dynamic obstacles in millimeter wave D2D communication. 124-134
- Constantine Ayimba, Michele Segata, Paolo Casari, Vincenzo Mancuso:
Driving under influence: Robust controller migration for MEC-enabled platooning. 135-147
- Lei Liu, Tong Ding, Hui Feng, Zhongmin Yan, Xudong Lu:
Tree sketch: An accurate and memory-efficient sketch for network-wide measurement. 148-155 - Xuyang Liu:
GLMLP-TRANS: A transportation mode detection model using lightweight sensors integrated in smartphones. 156-166
- Van Thanh Le, Nabil El Ioini, Hamid R. Barzegar, Claus Pahl:
Trust management for service migration in Multi-access Edge Computing environments. 167-179
- Lunyuan Chen, Shunpu Tang, Venki Balasubramanian, Junjuan Xia, Fasheng Zhou, Lisheng Fan:
Physical-layer security based mobile edge computing for emerging cyber physical systems. 180-188
- Christian Sauer, Eike Lyczkowski, Marco Schmidt, Andreas Nüchter, Tobias Hoßfeld:
Testing AGV mobility control method for MANET coverage optimization using procedural simulation. 189-201
- Hareesh Ayanampudi, Ravindra Dhuli:
Performance analysis of Heterogeneous Cloud-Radio Access Networks: A user-centric approach with network scalability. 202-212 - Chiara Caiazza, Silvia Giordano, Valerio Luconi, Alessio Vecchio:
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes. 213-225 - Marcus V. G. Ferreira, Flávio H. T. Vieira, Álisson A. Cardoso:
Power and delay optimization based uplink resource allocation for wireless networks with device-to-device communications. 226-239
- Kaijun Cheng, Xuming Fang, Xianbin Wang:
Optimized resource allocation and time partitioning for integrated communication, sensing, and edge computing network. 240-249
- Jun Jiang, Fagui Liu, Yongheng Liu, Quan Tang, Bin Wang, Guoxiang Zhong, Weizheng Wang:
A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams. 250-257 - Mariya Tauqeer, Saddaf Rubab, Muhammad Attique Khan, Rizwan Ali Naqvi, Kashif Javed, Abdullah Alqahtani, Shtwai Alsubai, Adel Binbusayyis:
Driver's emotion and behavior classification system based on Internet of Things and deep learning for Advanced Driver Assistance System (ADAS). 258-267
- Qiang Tang, Linjiang Li, Caiyan Jin, Lixin Liu, Jin Wang, Zhuofan Liao, Yuansheng Luo:
Heterogeneous UAVs assisted mobile edge computing for energy consumption minimization of the edge side. 268-279
- Falko Dressler, Carla-Fabiana Chiasserini:
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan. 280-281
- Saif Ur Rehman Malik, Adeel Anjum, Syed Atif Moqurrab, Gautam Srivastava:
Towards enhanced threat modelling and analysis using a Markov Decision Process. 282-291 - Mukesh Soni, Dileep Kumar Singh:
Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare. 292-300
- Pengmiao Li, Yuchao Zhang, Wendong Wang, Weiliang Meng, Yi Zheng, Ke Xu, Zhili Zhang:
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network. 301-310
- Oussama Serhane, Khadidja Yahyaoui, Boubakr Nour, Rasheed Hussain, Syed Muhammad Ahsan Kazmi, Hassine Moungla:
PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks. 311-320
- Xiao Zheng, Syed Bilal Hussain Shah, Ali Kashif Bashir, Raheel Nawaz, Omer F. Rana:
Distributed hierarchical deep optimization for federated learning in mobile edge computing. 321-328
- Neeraj Kumar, Gagangeet Singh Aujla, Mohammad S. Obaidat, Rongxing Lu, Song Guo:
Advanced computing and communication technologies for Internet of Drones. 329-332
- Jing Tan, Ramin Khalili, Holger Karl, Artur Hecker:
Multi-agent reinforcement learning for long-term network resource allocation through auction: A V2X application. 333-347
- Weiping Zheng, Yiyong Li, Minli Hong, Xiaomao Fan, Gansen Zhao:
Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results. 348-360 - Faegheh Seifhashemi, Behrouz Shahgholi Ghahfarokhi, Neda Moghim:
Mobility-aware incentive mechanism for relaying D2D communications. 361-377
- Manash Kumar Mondal, Riman Mandal, Sourav Banerjee, Utpal Biswas, Pushpita Chatterjee, Waleed S. Alnumay:
A CPS based social distancing measuring model using Edge and Fog computing. 378-386
- Shanqing Jiang, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou:
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network. 387-398
- Dan Ye, Xiaogang Wang, Jin Hou:
Balanced multi-access edge computing offloading strategy in the Internet of things scenario. 399-410
- Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi:
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. 411-432 - Fatemeh Yaghoubpour, Bahador Bakhshi, Fateme Seifi:
End-to-end delay guaranteed Service Function Chain deployment: A multi-level mapping approach. 433-445 - Lingqiang Chen, Pei Shi, Guanghui Li, Tao Qi:
Traffic flow prediction using multi-view graph convolution and masked attention mechanism. 446-457 - Zhen Zhang, Jie Lu, Hongchang Chen:
Controller robust placement with dynamic traffic in software-defined networking. 458-467
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.