default search action
Computer Communications, Volume 193
Volume 193, September 2022
- Ninni Singh, Vinit Kumar Gunjan, Gopal Chaudhary, Rajesh Kaluri, Nancy Victor, Kuruva Lakshmanna:
IoT enabled HELMET to safeguard the health of mine workers. 1-9
- Hangyun Tang, Yanan Qiao, Fan Yang, Bowen Cai, Ruiquan Gao:
dMOBAs: A data marketplace on blockchain with arbitration using side-contracts mechanism. 10-22
- Makarand Mohan Jadhav, Vivek Deshpande, Divya Midhunchakkaravarthy, Dattatray S. Waghole:
Improving 5G network performance for OFDM-IDMA system resource management optimization using bio-inspired algorithm with RSM. 23-37
- Rajesh Kumar Shrivastava, Simar Preet Singh, Mohammad Kamrul Hasan, Gagandeep, Shayla Islam, Salwani Abdullah, Azana Hafizah Mohd Aman:
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming. 38-46
- Claudio Fiandrino, Giulia Attanasio, Marco Fiore, Joerg Widmer:
Toward native explainable and robust AI in 6G networks: Current state, challenges and road ahead. 47-52
- Mohammed M. Alani:
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning. 53-62 - Mohammad Shahjalal, Nusrat Farhana, Palash Roy, Md. Abdur Razzaque, Kuljeet Kaur, Mohammad Mehedi Hassan:
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud. 63-74
- Matthias Van Onsem, Dieter De Paepe, Sander Vanden Hautte, Pieter Bonte, Veerle Ledoux, Annelies Lejon, Femke Ongenae, Dennis Dreesen, Sofie Van Hoecke:
Hierarchical pattern matching for anomaly detection in time series. 75-81
- Renato Lo Cigno, Michele Segata:
Cooperative driving: A comprehensive perspective, the role of communications, and its potential development. 82-93
- Vicente Mayor, Rafael Estepa, Antonio Jose Estepa Alonso, Germán Madinabeitia:
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS. 94-108
- Sabir Ali Changazi, Asim Dilawar Bakhshi, Muhammad Yousaf, Muhammad Hasan Islam, Syed Muhammad Mohsin, Shahab S. Band, Abdulmajeed Alsufyani, Sami Bourouis:
GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things. 109-117
- Zied Ben-Houidi, Dario Rossi:
Neural language models for network configuration: Opportunities and reality check. 118-125
- Jian Wang, Guanghui Liu, Guosheng Zhao:
Two-attribute privacy protection method of MCS based on blockchain smart contract. 126-135 - Wenbin Pan, Yi Liu, Chao Yang:
Adaptive task offloading of rechargeable UAV edge computing network based on double decision value iteration. 136-145 - Anna Triantafyllou, Dimitrios Zorbas, Panagiotis G. Sarigiannidis:
Time-slotted LoRa MAC with variable payload support. 146-154 - Muhammad Ateeq, Muhammad Khalil Afzal, Sheraz Anjum, Byung-Seo Kim:
Cognitive quality of service predictions in multi-node wireless sensor networks. 155-167
- Alessandro Cornacchia, Giuseppe Bianchi, Andrea Bianco, Paolo Giaccone:
Staggered HLL: Near-continuous-time cardinality estimation with no overhead. 168-175
- Szymon Szott, Katarzyna Kosek-Szott, Alice Lo Valvo, Ilenia Tinnirello:
Using self-deferral to achieve fairness between Wi-Fi and NR-U in downlink and uplink scenarios. 176-188
- Serge Fdida, Nikos Makris, Thanasis Korakis, Raffaele Bruno, Andrea Passarella, Panayiotis Andreou, Bartosz Belter, Cedric Crettaz, Walid Dabbous, Yuri Demchenko, Raymond Knopp:
SLICES, a scientific instrument for the networking community. 189-203
- Yantao Cai, Huayi Xiong, Min Chen, Xing Zhou:
A path characteristics based adaptive subflow switching algorithm for dynamic heterogeneous MPTCP network. 204-213 - Luís Leira, Miguel Luís, Susana Sargento:
Context-based caching in mobile information-centric networks. 214-223
- Mateus Mattos, António Rodrigues, Rui Meireles, Ana Aguiar:
Geolocation-based sector selection for Vehicle-to-Infrastructure 802.11ad communication. 224-233
- Bernhard Häfner, Josef Jiru, Henning F. Schepker, Georg Albrecht Schmitt, Jörg Ott:
Preventing failures of cooperative maneuvers among connected and automated vehicles. 234-245
- Souvik Saha, Rajeev Arya:
ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier. 246-265
- Mahnoor Anjum, Muhammad Abdullah Khan, Syed Ali Hassan, Haejoon Jung, Kapal Dev:
Analysis of time-weighted LoRa-based positioning using machine learning. 266-278
- Anthony Bardou, Thomas Begin, Anthony Busson:
Analysis of a Multi-Armed Bandit solution to improve the spatial reuse of next-generation WLANs. 279-292
- Bing Jia, Jingbin Liu, Tao Feng, Baoqi Huang, Thar Baker, Hissam Tawfik:
TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI. 293-301
- Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh, Kayhan Zrar Ghafoor:
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope. 302-331
- Xueshu Hong, Xingkong Ma, Shaoyong Li, Houjie Qiu, Bo Liu:
A Website Fingerprint defense technology with low delay and controllable bandwidth. 332-345 - Peifa Sun, Mengda Lyu, Hui Li, Bo Yang, Lizhi Peng:
An early stage convolutional feature extracting method using for mining traffic detection. 346-354
- Shu Yang, Qingzhen Dong, Laizhong Cui, Xun Chen, Siyu Lei, Yulei Wu, Chengwen Luo:
EC-MASS: Towards an efficient edge computing-based multi-video scheduling system. 355-364
- Sahar Parkouk, Mohammad Torabi, Saeed Shokrollahi:
Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer. 365-377 - Wen Liang, Fei Yan, Abdullah M. Iliyasu, Ahmed S. Salama, Kaoru Hirota:
A Hadamard walk model and its application in identification of important edges in complex networks. 378-387
- Nabeil Eltayieb, Rashad Elhabob, Muhammad Umar Aftab, Ramil Kuleev, Manuel Mazzara, Muhammad Ahmad:
Secure aggregate signature scheme for smart city applications. 388-395
- Dominik S. Buse, Georg Echterling, Falko Dressler:
Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems. 396-409
- Kedar Nath Singh, Om Prakash Singh, Amit Kumar Singh:
ECiS: Encryption prior to compression for digital image security with reduced memory. 410-417
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.