


default search action
Computer Networks, Volume 128
Volume 128, December 2017
- Ahmed E. Kamal, Muhammad Imran, Hsiao-Hwa Chen, Athanasios V. Vasilakos
:
Survivability strategies for emerging wireless networks. 1-4 - Muhammad Zeeshan Asghar
, Paavo Nieminen
, Seppo Hämäläinen, Tapani Ristaniemi, Muhammad Ali Imran
, Timo Hämäläinen
:
Towards proactive context-aware self-healing for 5G networks. 5-13 - Sonia Ben Rejeb
, Nidal Nasser
, Samer Mansour, Massa Boujlbane:
Centralized SON function for operator optimal strategies in heterogeneous networks. 14-27 - Lang Xie, Poul E. Heegaard
, Yuming Jiang
:
Survivability analysis of a two-tier infrastructure-based wireless network. 28-40 - Louai Al-Awami
, Hossam S. Hassanein
:
Robust decentralized data storage and retrieval for wireless networks. 41-50 - Bhaskar Das, Jalal Almhana:
A new cooperative communication algorithm for improving connectivity in the event of network failure in VANETs. 51-62 - Wassila Lalouani, Mohamed F. Younis
, Nadjib Badache:
Optimized repair of a partitioned network topology. 63-77 - Enver Ever
, Fadi M. Al-Turjman, Hadi Zahmatkesh, Mustafa Riza
:
Modelling green HetNets in dynamic ultra large-scale applications: A case-study for femtocells in smart-cities. 78-93 - Seif Eddine Hammami, Hossam Afifi:
Fault-tolerant dynamic planning for wireless mesh networks based on real load profiles. 94-107 - Sanaa Sharafeddine
, Karim Jahed, Omar Farhat, Zaher Dawy:
Failure recovery in wireless content distribution networks with device-to-device cooperation. 108-122 - Olga Galinina
, Sergey Andreev
, Mikhail M. Komarov
, Svetlana V. Maltseva
:
Leveraging heterogeneous device connectivity in a converged 5G-IoT ecosystem. 123-132 - Di Li, Xiaomin Li
, Jiafu Wan
:
A cloud-assisted handover optimization strategy for mobile nodes in industrial wireless networks. 133-141 - Ali Tahir
, Shahbaz Akhtar Abid, Nadir Shah:
Logical clusters in a DHT-Paradigm for scalable routing in MANETs. 142-153 - Debiao He, Sherali Zeadally, Libing Wu
, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. 154-163 - Caidan Zhao, Minmin Huang, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks. 164-171 - Prasenjit Bhavathankar, Subhadeep Sarkar
, Sudip Misra
:
Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks. 172-185 - Hossein Soleimani
, Thomas Begin, Azzedine Boukerche:
Safety message generation rate adaptation in LTE-based vehicular networks. 186-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.