default search action
Computer Networks, Volume 151
Volume 151, March 2019
- Renan Fischer e Silva
, Paul M. Carpenter:
TCP proactive congestion control for east-west traffic: The marking threshold. 1-11
- Ilhem Souissi
, Nadia Ben Azzouna, Lamjed Ben Said
:
A multi-level study of information trust models in WSN-assisted IoT. 12-30 - Abdul Salam
, Mehmet C. Vuran
, Suat Irmak:
Di-Sense: In situ real-time permittivity estimation and soil moisture sensing using wireless underground communications. 31-41 - Yu He, Lin Ma, Ruiting Zhou, Chuanhe Huang, Zongpeng Li:
Online task allocation in mobile cloud computing with budget constraints. 42-51 - Aljawharah Alnasser, Hongjian Sun
, Jing Jiang
:
Cyber security challenges and solutions for V2X communications: A survey. 52-67 - B. Asvija, Eswari Rajagopal, M. B. Bijoy
:
Security in hardware assisted virtualization for cloud computing - State of the art issues and challenges. 68-92 - Edmundo de Souza e Silva, Rosa M. M. Leão, Daniel S. Menasché, Don Towsley
:
On the scalability of P2P swarming systems. 93-113
- Xiaocui Li, Zhangbing Zhou, Junqi Guo, Shangguang Wang
, Junsheng Zhang:
Aggregated multi-attribute query processing in edge computing for industrial IoT applications. 114-123 - V. R. Kavitha
, M. Moorthi
:
A quality of service load balanced connected dominating set-stochastic diffusion search (CDS-SDS) network backbone for MANET. 124-131 - Mohammadhasan Miri
, Kamal Mohamedpour, Yousef Darmani
, Mahasweta Sarkar, R. Lal Tummala:
An efficient resource allocation algorithm based on vertex coloring to mitigate interference among coexisting WBANs. 132-146 - Kelton A. P. da Costa, João P. Papa
, Celso O. Lisboa, Roberto Muñoz
, Victor Hugo C. de Albuquerque
:
Internet of Things: A survey on machine learning-based intrusion detection approaches. 147-157 - Maicon Kist, Juliano Araujo Wickboldt
, Lisandro Zambenedetti Granville
, Juergen Rochol, Luiz A. DaSilva, Cristiano Bonato Both
:
Flexible fine-grained baseband processing with network functions virtualization: Benefits and impacts. 158-165 - Junqi Guo, Lan Yang, Rongfang Bie, Jiguo Yu
, Yuan Gao
, Yan Shen, Anton Kos
:
An XGBoost-based physical fitness evaluation model using advanced feature selection and Bayesian hyper-parameter optimization for wearable running monitoring. 166-180 - Balasubramanian Prabhu Kavin
, Sannasi Ganapathy
:
A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications. 181-190 - R. Dinesh Jackson Samuel
, Edwin Fenil
, Gunasekaran Manogaran, Vivekananda G. N.
, Thanjaivadivel T
, Jeeva Selvaraj
, A. Ahilan:
Real time violence detection framework for football stadium comprising of big data analysis and deep learning through bidirectional LSTM. 191-200 - Sivakumar Krishnan, S. Lokesh, M. Ramya Devi:
An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system. 201-210 - Thangaramya Kalidoss, Kanagasabai Kulothungan
, Logambigai Rajasekaran
, Munuswamy Selvi, Sannasi Ganapathy
, Arputharaj Kannan
:
Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT. 211-223 - Osama Alfarraj
, Amr Tolba
, Salem Alkhalaf
, Ahmad Ali AlZubi
:
Neighbor predictive adaptive handoff algorithm for improving mobility management in VANETs. 224-231 - Kan Yu, Yinglong Wang, Jiguo Yu
, Dongxiao Yu, Xiuzhen Cheng, Zhiguang Shan:
Localized and distributed link scheduling algorithms in IoT under rayleigh fading. 232-244 - Aziza Ben Mosbah
, Seif Eddine Hammami, Hassine Moungla
, Hossam Afifi, Ahmed E. Kamal
:
Enhancing Device-to-Device direct discovery based on predicted user density patterns. 245-259
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.