Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
CATFSID: A few-shot human identification system based on cross-domain adversarial training
Computer Communications (COMS), Volume 224, Issue CPages 275–284https://doi.org/10.1016/j.comcom.2024.06.014AbstractWith the advancement of wireless sensing technology, human identification based on WiFi sensing has garnered significant attention in the fields of human–computer interaction and home security. Despite the initial success of WiFi sensing based ...
- review-articleSeptember 2024
Wireless sensing applications with Wi-Fi Channel State Information, preprocessing techniques, and detection algorithms: A survey
Computer Communications (COMS), Volume 224, Issue CPages 254–274https://doi.org/10.1016/j.comcom.2024.06.011AbstractRecently, using Wi-Fi devices as sensing technology has garnered significant attention and found numerous applications. This trend has given birth to what is known as Wi-Fi sensing. This innovative approach has been made possible by analyzing the ...
- research-articleSeptember 2024
Supporting VoIP communication in IEEE 802.11ax networks: A new admission control and scheduling resource allocation scheme
Computer Communications (COMS), Volume 224, Issue CPages 225–241https://doi.org/10.1016/j.comcom.2024.06.010AbstractThe current IEEE 802.11ax standard enhances Wi-Fi networks with a series of new features, such as multi-user (MU) transmission, an Orthogonal Frequency Division Multiple Access (OFDMA) scheme and the ability to multiplex traffic from different ...
- research-articleSeptember 2024
An adaptive simulated annealing-based computational offloading scheme in UAV-assisted MEC networks
Computer Communications (COMS), Volume 224, Issue CPages 118–124https://doi.org/10.1016/j.comcom.2024.06.008AbstractMobile edge computing (MEC) is an advanced technology that enables fifth-generation (5G) applications. It uses a mechanism to offload computation from mobile devices (MDs) to edge servers at the access point (AP) to improve the quality of ...
- research-articleSeptember 2024
COSIER: A comprehensive lightweight blockchain system for IoT networks
Computer Communications (COMS), Volume 224, Issue CPages 125–144https://doi.org/10.1016/j.comcom.2024.06.007AbstractInternet of Things (IoT) networks have spread to many important fields and applications. The security of these networks remains a big challenge due to their unique characteristics and delicate operations. The blockchain has recently been proposed ...
-
- research-articleSeptember 2024
BBR-based and fairness-guaranteed congestion control and packet scheduling for MPQUIC over heterogeneous networks
Computer Communications (COMS), Volume 224, Issue CPages 213–224https://doi.org/10.1016/j.comcom.2024.06.006AbstractMultipath QUIC (MPQUIC) enables concurrent transmission over multiple paths, making it attractive to enhance the delivery performance of smartphones with multiple interfaces. Nevertheless, several issues in the current MPQUIC specification remain ...
- research-articleSeptember 2024
Towards a quantum-safe 5G: Quantum Key Distribution in core networks
Computer Communications (COMS), Volume 224, Issue CPages 145–158https://doi.org/10.1016/j.comcom.2024.06.005AbstractThe Service-Based Architecture (SBA) of the fifth generation (5G) of cellular networks introduced great advancements in flexibility, efficiency, and performance of modern networks, thanks to the distribution and softwarization of core network ...
- research-articleSeptember 2024
VSFL: Trajectory prediction framework based on validity-aware semi-asynchronous federated learning in internet of vehicles
Computer Communications (COMS), Volume 224, Issue CPages 106–117https://doi.org/10.1016/j.comcom.2024.06.003AbstractAccurate prediction of vehicle trajectories on the Internet of Vehicles is crucial for improving traffic safety. Federated learning has been proposed to address the issue of islands in shared data. Traditional synchronous federated learning ...
- research-articleSeptember 2024
An interference-conscious reduced routing overhead protocol for Device-to-Device (D2D) Networks
Computer Communications (COMS), Volume 224, Issue CPages 169–191https://doi.org/10.1016/j.comcom.2024.06.001AbstractThe Device-to-Device (D2D) communication has attracted much popularity in the recent years. D2D communication requires a multi-hop route to establish the communication between D2D users which are not in the communication range of each other. D2D ...
- research-articleSeptember 2024
Optimized provisioning technique of future services with different QoS requirements in multi-access edge computing
Computer Communications (COMS), Volume 224, Issue CPages 42–59https://doi.org/10.1016/j.comcom.2024.05.023AbstractWith the present trend towards the use of microservices instead of monolithic software, future applications with diverse computational and delay-sensitive requirements, such as virtual reality (VR) or holographic communications (HC), will be ...
- research-articleSeptember 2024
IoT video analytics for surveillance-based systems in smart cities
Computer Communications (COMS), Volume 224, Issue CPages 95–105https://doi.org/10.1016/j.comcom.2024.05.021AbstractSmart city applications are revolutionizing the way people interact with diverse systems in city-wide applications. Internet of Things (IoT) and machine learning are two enabling technologies for smart cities. IoT sensors are deployed for data ...
- research-articleSeptember 2024
Dynamic task offloading and service caching based on game theory in vehicular edge computing networks
Computer Communications (COMS), Volume 224, Issue CPages 29–41https://doi.org/10.1016/j.comcom.2024.05.020AbstractVehicular edge computing (VEC) enables task offloading from vehicle to edge servers deployed on Road Side Units (RSUs) and to vehicle with idle resources, which is considered as a promising vehicle network architecture. However, efficient task ...
- research-articleSeptember 2024
Multi-objective optimization of SFC deployment using service aggregation and computing offload
Computer Communications (COMS), Volume 224, Issue CPages 60–71https://doi.org/10.1016/j.comcom.2024.05.017AbstractNew technologies such as virtualization and Software Defined Networking (SDN) have given traditional networks unprecedented flexibility. A Service Function Chain (SFC) formed by concatenating multiple Virtual Network Functions (VNFs) expands ...
- research-articleFebruary 2024
PiGateway: Real-time granular analysis of smart home network traffic using P4
Computer Communications (COMS), Volume 213, Issue CPages 309–319https://doi.org/10.1016/j.comcom.2023.11.019AbstractThe Internet of Things (IoT) makes the home smarter by real-time sensing of the situation and transmission of data to the cloud. As IoT devices continue to expand rapidly, a critical need arises for effective device-type identification methods. ...
- research-articleFebruary 2024
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario
Computer Communications (COMS), Volume 213, Issue CPages 331–344https://doi.org/10.1016/j.comcom.2023.11.016AbstractThe fifth generation (5G) of mobile networks may offer a custom logical and virtualized network called network slicing. This virtualization opens a new opportunity to share infrastructure resources and encourage cooperation between several ...
Highlights- Motivation: SB needs to minimize cost & fulfill service requirements.
- Contribution: Problem formulation of NS & config assignment to minimize the SB cost.
- Method: IBM CPLEX used for deriving optimal solutions.
- Finding 1: ...
- research-articleFebruary 2024
A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices
Computer Communications (COMS), Volume 213, Issue CPages 320–330https://doi.org/10.1016/j.comcom.2023.11.015AbstractThe innovations heralded through the implementation of next-generation 5G (Fifth-Generation) networks provide an opportunity for the efficient coexistence of heterogeneous services distributed by a single physical virtualized infrastructure. ...
- research-articleFebruary 2024
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme
Computer Communications (COMS), Volume 213, Issue CPages 296–308https://doi.org/10.1016/j.comcom.2023.11.014AbstractSecuring end-to-end communication in Vehicular Ad-hoc Networks (VANET) is crucial due to zero trust between the communicating entities. Additionally, the underlying communication needs to be lightweight in many cases, especially when vehicles are ...
Highlights- Mutual authentication and key agreement in Vehicle-to-Infrastructure (V2I) communication.
- Secure message exchange in Vehicle-to-Vehicle (V2V) communication.
- Re-authentication of pre-authenticated vehicle user without support of ...
- research-articleFebruary 2024
Multi-mobile vehicles task offloading for vehicle-edge-cloud collaboration: A dependency-aware and deep reinforcement learning approach
Computer Communications (COMS), Volume 213, Issue CPages 359–371https://doi.org/10.1016/j.comcom.2023.11.013AbstractThe wide application of edge cloud computing in the Internet of Vehicles (IoV) provides lower latency, more efficient computing power, and more reliable data transmission services for vehicle applications. Realistic vehicle applications ...
- research-articleFebruary 2024
Energy conserving cost selection for fine-grained computational offloading in mobile edge computing networks
Computer Communications (COMS), Volume 213, Issue CPages 199–207https://doi.org/10.1016/j.comcom.2023.11.012AbstractIn mobile edge computing networks, total or partial computational offloading of delay sensitive and compute intensive applications to the nearby edge servers is a promising solution to reduce transmission delay and energy consumption of mobile ...
- research-articleFebruary 2024
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems
Computer Communications (COMS), Volume 213, Issue CPages 246–259https://doi.org/10.1016/j.comcom.2023.11.011AbstractWith the development of the industry and the increase of smart devices in recent years, the Internet of Things has expanded as one of the solutions to meet human needs in smart societies. However, this emerging technology suffers from security ...