


default search action
Computer Communications, Volume 134
Volume 134, January 2019
- Yang Zhang, Huiyu Zhou
, Jun-Liang Chen:
Cross-layer access control in publish/subscribe middleware over software-defined networks. 1-13 - Carla-Fabiana Chiasserini
:
A Message from the New Editor-in-Chief. 1 - Savio Sciancalepore
, Gabriele Oligeri, Giuseppe Piro
, Gennaro Boggia
, Roberto Di Pietro
:
EXCHANge: Securing IoT via channel anonymity. 14-29 - Katty Rohoden
, Rebeca Estrada
, Hadi Otrok
, Zbigniew Dziong
:
Stable femtocells cluster formation and resource allocation based on cooperative game theory. 30-41 - Tifenn Rault:
Avoiding radiation of on-demand multi-node energy charging with multiple mobile chargers. 42-51 - Mohammad Sadegh Yousefpoor
, Hamid Barati
:
Dynamic key management algorithms in wireless sensor networks: A survey. 52-69 - Hengliang Tang, Chunlin Li, Jingpan Bai, Jianhang Tang, Youlong Luo:
Dynamic resource allocation strategy for latency-critical and computation-intensive applications in cloud-edge environment. 70-82 - Jingxiu Su, Zhenyu Li, Stéphane Grumbach, Muhammad Ikram
, Kavé Salamatian
, Gaogang Xie:
A Cartography of Web Tracking using DNS Records. 83-95 - Suman Bhattacharjee
, Siuli Roy, Sipra Das Bit
:
Post-disaster map builder: Crowdsensed digital pedestrian map construction of the disaster affected areas through smartphone based DTN. 96-113 - Jung-Woong Sung, Seung-Jae Han:
Data-bundling proxy to aggregate transmissions for energy-constrained devices. 114-125 - Hui-Tang Lin
, Ying-You Lin, Wei-Shun Yan, Jie-Yuan Wu:
Reputation auction games for cooperative communications over green wireless networks. 126-137 - Vidushi Vashishth, Anshuman Chhabra
, Deepak Kumar Sharma
:
GMMR: A Gaussian mixture model based unsupervised machine learning approach for optimal routing in opportunistic IoT networks. 138-148 - Ekaterina Evdokimova, Koen De Turck, Sabine Wittevrongel
, Dieter Fiems:
Queueing analysis of opportunistic scheduling with spatially correlated channels. 149-162 - Abdullah Alhumaidi Alotaibi, Marios C. Angelides:
A serious gaming approach to managing interference in ad hoc femtocell wireless networks. 163-184 - Retraction notice to "Hybrid Layered Architecture forDetection and Analysis of Network Based Zero-day Attack"[COMCOM 106 (2017) 100-106]. 185

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.