default search action
Internet Technology Letters, Volume 3
Volume 3, Number 1, January 2020
- Luigi Alfredo Grieco:
Editorial of the Founder EiC "The first two years of Internet Technology Letters". - Sulav Malla, Ken Christensen:
HPC in the cloud: Performance comparison of function as a service (FaaS) vs infrastructure as a service (IaaS). - Chiara Caiazza, Valerio Luconi, Alessio Vecchio:
TCP-based traceroute: An evaluation of different probing methods. - Anirudh Paranjothi, Mohammed Atiquzzaman, Mohammad S. Khan:
PMCD: Platoon - Merging approach for cooperative driving. - Cristian H. Martins de Souza, Marcilio O. O. Lemos, Felipe Sampaio Dantas da Silva, Robinson L. Souza Alves:
On detecting and mitigating phishing attacks through featureless machine learning techniques. - Amitangshu Pal:
Modeling wireless interference in presence of dependent interferers. - Pranav Kumar Singh, Roshan Singh, Sunit Kumar Nandi, Kayhan Zrar Ghafoor, Danda B. Rawat, Sukumar Nandi:
An efficient blockchain-based approach for cooperative decision making in swarm robotics. - Mohammed Shabbir Ali, Jun Zhang, Houda Labiod:
How relative mobility affects the aggregate throughput of VANET cluster? - Leandros Maglaras, Tiago Cruz, Mohamed Amine Ferrag, Helge Janicke:
Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.
Volume 3, Number 2, March 2020
- Georgios Z. Papadopoulos, Xenofon Fafoutis, Pascal Thubert:
Multi-Source Time Synchronization in IEEE Std 802.15.4-2015 TSCH Networks. - Rolando Herrero:
6LoWPAN fragmentation in the context of IoT based media real time communication. - Shreshth Tuli, Shikhar Tuli, Gurleen Wander, Praneet Wander, Sukhpal Singh Gill, Schahram Dustdar, Rizos Sakellariou, Omer F. Rana:
Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions. - Gang Zhao, Bingbing Di, Hui He, Wenjuan Zhu:
Digital education transaction object authentication service based on blockchain technology. - Henry E. Baidoo-Williams, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi:
Channel impulse response-based source localization in a diffusion-based molecular communication system. - Radion Bikmukhamedov, Adel Nadeev, Guido Maione, Domenico Striccoli:
Comparison of HMM and RNN models for network traffic modeling. - Hao Wu:
Hard decision of the zero a posteriori LLR in 5G NR.
- Giulia Tresca, Francesco Vista, Pietro Boccadoro:
Experimenting LoRa-compliant solutions in Real-World Scenarios.
Volume 3, Number 3, May 2020
- João Batista da Silva, Felipe Sampaio Dantas da Silva, Emidio P. Neto, Marcilio O. O. Lemos, Augusto Neto:
Benchmarking of mainstream SDN controllers over open off-the-shelf software-switches. - Seyed Mohsen Hosseini, Raffaele Carli, Graziana Cavone, Mariagrazia Dotoli:
Distributed control of electric vehicle fleets considering grid congestion and battery degradation. - Kashish Bansal, Kashish Mittal, Gautam Ahuja, Ashima Singh, Sukhpal Singh Gill:
DeepBus: Machine learning based real time pothole detection system for smart transportation using IoT. - David A. Schmidt, Mohammad S. Khan, Brian T. Bennett:
Spline-based intrusion detection for VANET utilizing knot flow classification. - Jacques Bou Abdo, Rayane El Sibai, Krishna Kambhampaty, Jacques Demerjian:
Permissionless reputation-based consensus algorithm for blockchain. - Notom Ajaykumar, Mrinal Sarvagya, Parag Parandkar:
A novel security algorithm ECC-L for wireless sensor network. - Moinak Maiti, Yaroslav Vyklyuk, Darko Vukovic:
Cryptocurrencies chaotic co-movement forecasting with neural networks.
- Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Smart certification: protecting the originality of the product in the eyewear sector.
Volume 3, Number 4, July 2020
Editorial
- Georgios Z. Papadopoulos, Fabrice Theoleyre, Xavier Vilajosana:
Industrial Internet of Things: Specificities and challenges.
- Moufida Maimour:
Impact of interference aware metrics on iterative multipath routing for industrial WSN. - Yasuyuki Tanaka, Keoma Brun-Laguna, Thomas Watteyne:
Trace-based simulation for 6TiSCH. - Georgios Z. Papadopoulos, Fabrice Theoleyre, Pascal Thubert:
Operations, administration and maintenance (OAM ) features for reliable and available wireless (RAW ) networks. - Martin Haubro, Charalampos Orfanidis, George Oikonomou, Xenofon Fafoutis:
TSCH-over-LoRA : long range and reliable IPv6 multi-hop networks for the internet of things. - Tengfei Chang, Malisa Vucinic, Xavier Vilajosana-Guillen, Diego Dujovne, Thomas Watteyne:
6TiSCH minimal scheduling function: Performance evaluation.
Volume 3, Number 5, September 2020
- Ana Flávia dos Reis, Glauber Brante, Rafaela de Paula Parisotto, Richard D. Souza, Paulo H. V. Klaine, João Pedro Battistella Nadas, Muhammad Ali Imran:
Energy efficiency analysis of Drone Small Cells positioning based on reinforcement learning. - Giuseppe Ribezzo, Luca De Cicco, Vittorio Palmisano, Saverio Mascolo:
A DASH 360° immersive video streaming control system. - Shreshth Tuli, Sukhpal Singh Gill, Giuliano Casale, Nicholas R. Jennings:
iThermoFog: IoT-Fog based automatic thermal profile creation for cloud data centers using artificial intelligence techniques. - Priyatosh Mandal:
On the analysis of policy control function of 4G LTE-A. - Angelo Coluccia:
On the probabilistic modeling of fake news (hoax) persistency in online social networks and the role of debunking and filtering. - Rayane El Sibai, Jacques Bou Abdo, Chady Abou Jaoude, Jacques Demerjian, Joseph Assaker, Abdallah Makhoul:
Efficient anomaly detection on sampled data streams with contaminated phase I data. - Arash Ostovar:
Cooperative spectrum sensing optimal threshold selection in cognitive radio networks. - Poonam Yadav, Rajesh Kumar, Sandeep Kumar:
Effective capacity analysis over generalized lognormal shadowed composite fading channels.
- Matteo Bogo, Jacopo Soldani, Davide Neri, Antonio Brogi:
Fine-grained management of cloud-native applications, based on TOSCA. - Shishir Muralidhara, Niharika Hegde:
Air quality monitoring and gas leakage detection with automatic shut-off using wireless sensor-actuator networks.
Volume 3, Number 6, November 2020
Editorial
- Daniel Corujo, Augusto Neto, Seil Jeon:
Internet technology letters special section on mobility support in slice-based network control for heterogeneous environment 2019.
- Akshatha Nayak Manjeshwar, Pranav Jha, Abhay Karandikar, Prasanna Chaporkar:
Enhanced UE slice availability and mobility through multi-connectivity in 5G multi-RAT networks. - Vitor A. Cunha, Daniel Corujo, João Paulo Barraca, Rui L. Aguiar:
MTD to set network slice security as a KPI. - Kiril Antevski, Carlos J. Bernardos:
Federation of 5G services using distributed ledger technologies†. - Flávio Meneses, Daniel Corujo, Rui L. Aguiar:
Virtualization of customer equipment: Challenges and opportunities. - João Aires, Paulo Duarte, Bruno Parreira, Sérgio Figueiredo:
An orchestrated 5G-enabled deep vCDN system. - Kay Hänsge, Dirk Trossen, Sebastian Robitzsch, Michael J. Boniface, Stephen C. Phillips:
5G service delivery platform: 360 VR vertical as an example.
- Moayad Aloqaily, Thar Baker, Ammar Rayes, Yaser Jararweh, Ismaeel Al Ridhawi:
Editorial.
- Ammar Muthanna, Regina Shamilova, Abdelhamied A. Ateya, Alexander Paramonov, Mohammad Hammoudeh:
A mobile edge computing/software-defined networking-enabled architecture for vehicular networks. - Muhammad Zeeshan Khan, Muhammad Usman Ghani Khan, Omer Irshad, Razi Iqbal:
Deep learning and blockchain fusion for detecting driver's behavior in smart vehicles. - Noura Aljeri, Azzedine Boukerche:
Fog-enabled vehicular networks: A new challenge for mobility management. - Binod Vaidya, Hussein T. Mouftah:
Dynamic wireless charging for CAEV taxi fleet in urban environment. - Michele Bonanni, Francesco Chiti, Romano Fantacci:
Mobile Mist Computing for the Internet of Vehicles†.
- Corrigendum: Peer-assisted content delivery network by vehicular clouds: Algorithm and evaluation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.