default search action
Computer Networks, Volume 129
Volumes 129, Part 1, December 2017
- Sanaa Sharafeddine, Karim Jahed, Marwan Fawaz:
Optimized device centric aggregation mechanisms for mobile devices with multiple wireless interfaces. 1-16 - Yi-Ting Peng, Sok-Ian Sou, Meng-Hsun Tsai, Chuan-Sheng Lin:
Multipath mobile data offloading of deadline assurance with policy and charging control in cellular/WiFi networks. 17-27 - Erfaneh Vahedi, Majid Bayat, Mohammad Reza Pakravan, Mohammad Reza Aref:
A secure ECC-based privacy preserving data aggregation scheme for smart grids. 28-36 - Jian Zhang, Yang Yang, Yanjiao Chen, Jing Chen, Qian Zhang:
A general framework to design secure cloud storage protocol using homomorphic encryption scheme. 37-50 - Haojun Huang, Junbao Zhang, Xu Zhang, Benshun Yi, Qilin Fan, Feng Li:
EMGR: Energy-efficient multicast geographic routing in wireless sensor networks. 51-63 - Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. 64-78 - Soojeon Lee, Dongman Lee, Myungjin Lee, Hyungsoo Jung, Byoung-Sun Lee:
Randomizing TCP payload size for TCP fairness in data center networks. 79-92 - Mehdi Malboubi, Yanlei Gong, Zijun Yang, Xiong Wang, Chen-Nee Chuah, Puneet Sharma:
Software defined network inference with evolutionary optimal observation matrices. 93-104 - Amin Ghalami Osgouei, Amir Khorsandi Koohanestani, Hossein Saidi, Ali Fanian:
Online assignment of non-SDN virtual network nodes to a physical SDN. 105-116 - Bruno P. Santos, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira:
CGR: Centrality-based green routing for Low-power and Lossy Networks. 117-128 - Sara El Alaoui, Byrav Ramamurthy:
EAODR: A novel routing algorithm based on the Modified Temporal Graph network model for DTN-based Interplanetary Networks. 129-141 - Kostas Katsalis, Bijan Rahimzadeh Rofoee, Giada Landi, Jordi Ferrer Riera, Kostas Kousias, Markos P. Anastasopoulos, L. Kiraly, Anna Tzanakaki, Thanasis Korakis:
Implementation experience in multi-domain SDN: Challenges, consolidation and future directions. 142-158 - Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan:
A key agreement protocol with partial backward confidentiality. 159-177 - Lei Ding, Jun Liu, Tao Qin, Haifei Li:
Internet traffic classification based on expanding vector of flow. 178-192 - Jianwei Niu, Shihao Wang, Wei Niu, Mohammed Atiquzzaman:
User-aware partitioning algorithm for mobile cloud computing based on maximum graph cuts. 193-206 - Gabriel Scalosub:
Towards optimal buffer management for streams with packet dependencies. 207-214 - Ying Qu, Bryan Ng, Michael Homer:
Optimising channel assignment to prevent flow starvation and improve fairness for planning single radio WMNs in built environments. 215-231 - Phi-Le Nguyen, Yusheng Ji, Zhi Liu, Huy Vu, Khanh-Van Nguyen:
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing. 232-250 - Ji Qi, Fei Hu, Xin Li, A. M. Koushik, Sunil Kumar:
3-ent (resilient, intelligent, and efficient) medium access control for full-duplex, jamming-aware, directional airborne networks. 251-260 - João Marcelo Ceron, Cíntia Borges Margi, Lisandro Zambenedetti Granville:
MARS: From traffic containment to network reconfiguration in malware-analysis systems. 261-272 - Rahul Thakur, Vijeth J. Kotagi, C. Siva Ram Murthy:
Resource allocation and cell selection framework for LTE-Unlicensed femtocell networks. 273-283 - Hyunjoong Lee, Sangkyu Park, Saewoong Bahk:
An opportunistic scheduling algorithm using aged CSI in massive MIMO systems. 284-296 - Jia Wu, Zhigang Chen, Ming Zhao:
Effective information transmission based on socialization nodes in opportunistic networks. 297-305 - Yue Qiu, Maode Ma, Shuo Chen:
An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems. 306-318 - Aya Ayadi, Oussama Ghorbel, Abdulfattah Mohammad Obeid, Mohamed Abid:
Outlier detection approaches for wireless sensor networks: A survey. 319-333
Volumes 129, Part 2, December 2017
- Harry Rudin:
Change at the Helm Welcome, Farewell, Advice, Thanks Special Issues. iii - Joel J. P. C. Rodrigues, Sherali Zeadally, Neeraj Kumar, Guangjie Han:
Special Issue on 5G Wireless Networks for IoT and Body Sensors. 335-339 - Jaime Lloret, Lorena Parra, Miran Taha, Jesús Tomás:
An architecture and protocol for smart continuous eHealth monitoring using 5G. 340-351 - Radu-Corneliu Marin, Radu-Ioan Ciobanu, Ciprian Dobre, Constandinos X. Mavromoustakis, George Mastorakis:
A context-aware collaborative model for smartphone energy efficiency over 5G wireless networks. 352-362 - Ilsun You, Jong-Hyouk Lee:
SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. 363-372 - Carolina Fortuna, Adnan Bekan, Tomaz Javornik, Gregor Cerar, Mihael Mohorcic:
Software interfaces for control, optimization and update of 5G machine type communication networks. 373-383 - Shuai Han, Cheng Guo, Weixiao Meng, Cheng Li:
A flexible resource scheduling scheme for an adaptive SCMA system. 384-391 - Yujie Li, Zhibin Gao, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
Resource management for future mobile networks: Architecture and technologies. 392-398 - Yang Liu, Changqiao Xu, Yufeng Zhan, Zhixin Liu, Jianfeng Guan, Hongke Zhang:
Incentive mechanism for computation offloading using edge computing: A Stackelberg game approach. 399-409 - Lijun Yang, Chao Ding, Meng Wu, Kun Wang:
Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance. 410-428 - Xiong Li, Maged Hamada Ibrahim, Saru Kumari, Arun Kumar Sangaiah, Vidushi Gupta, Kim-Kwang Raymond Choo:
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. 429-443 - Ibrar Yaqoob, Ejaz Ahmed, Muhammad Habib Ur Rehman, Abdelmuttlib Ibrahim Abdallaahmed, Mohammed Ali Al-garadi, Muhammad Imran, Mohsen Guizani:
The rise of ransomware and emerging security challenges in the Internet of Things. 444-458 - Ejaz Ahmed, Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Majid Iqbal Khan, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Imran, Athanasios V. Vasilakos:
The role of big data analytics in Internet of Things. 459-471 - Chi-Yuan Chen, Hsin-Min Wu, Lei Wang, Chia-Mu Yu:
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems. 472-480 - Tie Qiu, Xize Liu, Min Han, Mingchu Li, Yushuang Zhang:
SRTS : A Self-Recoverable Time Synchronization for sensor networks of healthcare IoT. 481-492 - Zhenyu Zhou, Junhao Feng, Yunjian Jia, Shahid Mumtaz, Kazi Mohammed Saidul Huq, Jonathan Rodriguez, Di Zhang:
Energy-efficient game-theoretical random access for M2M communications in overlapped cellular networks. 493-501 - Long Zhao, Kan Zheng, Periklis Chatzimisios:
Hybrid information and energy transfer in ultra-dense HetNets. 502-509 - Jacopo De Benedetto, Paolo Bellavista, Luca Foschini:
Proximity discovery and data dissemination for mobile crowd sensing using LTE direct. 510-521 - Bang Wang, Qiang Yang, Laurence T. Yang, Chunsheng Zhu:
On minimizing energy consumption cost in green heterogeneous wireless networks. 522-535 - Chun-Cheng Lin, Ching-Tsorng Tsai, Der-Jiunn Deng, I-Hsin Tsai, Shun-Yu Jhong:
Minimizing electromagnetic pollution and power consumption in green heterogeneous small cell network deployment. 536-547 - Ahmed Harbouche, Noureddine Djedi, Mohammed Erradi, Jalel Ben-Othman, Abdellatif Kobbane:
Model driven flexible design of a wireless body sensor network for health monitoring. 548-571 - Satya Jyoti Borah, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar:
A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario. 572-584
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.