


default search action
Computer Communications, Volume 178
Volume 178, October 2021
- Yosra Ben Slimen, Joanna Balcerzak, Albert Pagès
, Fernando Agraz
, Salvatore Spadaro, Konstantinos Koutsopoulos, Mustafa Al-Bado, Thuy Truong, Pietro G. Giardina, Giacomo Bernini
:
Quality of perception prediction in 5G slices for e-Health services using user-perceived QoS. 1-13
- Peng Liu, Shuran Lyu
, Shuqi Ma, Wanqing Wang:
Optimization algorithm of wireless surveillance data transmission task based on edge computing. 14-25
- Shengchen Wu, Haotong Cao, Haitao Zhao, Yue Hu, Longxiang Yang, Hao Yin, Hongbo Zhu:
A softwarized resource allocation framework for security and location guaranteed services in B5G networks. 26-36 - Arzoo Miglani, Neeraj Kumar
:
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review. 37-63
- Linkun Fan
, Xuchuan Li, Congshuai Guo, Bingshuo Jia:
Path control of panoramic visual recognition for intelligent robots based-edge computing. 64-73 - Le Qin
, Yuanlong Cao
, Xun Shao
, Yong Luo, Xinping Rao
, Yugen Yi
, Gang Lei:
A deep heterogeneous optimization framework for Bayesian compressive sensing. 74-82
- Daqing Wang, Haoli Xu, Yue Shi, Zhibin Ding, Zhengdong Deng, Zhixin Liu
, Xingang Xu, Zhao Lu, Guangyuan Wang, Zijian Cheng, Xiaoning Zhao:
The groundwater potential assessment system based on cloud computing: A case study in islands region. 83-97
- Mohamed Said Frikha
, Sonia Mettali Gammar
, Abdelkader Lahmadi
, Laurent Andrey:
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey. 98-113
- Bowen Shen
, Xiaolong Xu
, Lianyong Qi, Xuyun Zhang
, Gautam Srivastava
:
Dynamic server placement in edge computing toward Internet of Vehicles. 114-123
- Mingshuai Dong, Shimin Wei, Xiuli Yu, Jianqin Yin:
MASK-GD segmentation based robotic grasp detection. 124-130
- Huaping Jia, Jun Liu, Min Zhang, Xiaohu He, Weixi Sun:
Network intrusion detection based on IE-DBN model. 131-140
- Xisheng Xiao, Jin Sun, Jinxin Yang:
Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach. 141-152
- Ye Chen, Hongchun Shu, Wenjiao Xu, Zhengyu Yang, Zhihu Hong, Mingshuai Dong
:
Transformer text recognition with deep learning algorithm. 153-160
- Suchi Kumari
, Rajesh Kumar, Seifedine Nimer Kadry, Suyel Namasudra, David Taniar
:
Maintainable stochastic communication network reliability within tolerable packet error rate. 161-168 - Avinash Swaminathan
, Mridul Chaba, Deepak Kumar Sharma
, Uttam Ghosh
:
GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks. 169-182
- Hongzhi Cui:
Handoff control strategy of cyber physical systems under dynamic data attack. 183-190
- Zikang Wei, Yunqing Liu:
Construction of super-resolution model of remote sensing image based on deep convolutional neural network. 191-200
- Jian Wang, Yulan Hu, Yining Wang, Qingshan Zhao:
Anomaly detection method of packet loss node location in heterogeneous hash networks. 201-211
- Shasha Zhao, Gan Yu:
Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system. 212-220
- Jalal Al-Muhtadi
, Rawan A. Alamri, Farrukh Aslam Khan
, Kashif Saleem
:
Subjective logic-based trust model for fog computing. 221-233 - Yanna Wang, Xinyue Zhou, Jian Sun, Xiaoye Li, Junping Zhang:
Optimization of network sensor node location based on edge coverage control. 234-244
- Yu Liu, Junxin Chen
, Nan Bao
, Brij B. Gupta
, Zhihan Lv
:
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things. 245-258
- Faezeh Sharifi, Soroush Akhlaghi:
Maximizing the minimum secrecy rate of two-way relay networks. 259-270 - Xin Li, Liang Liu, Lisong Wang, Jie Xi, Jianfei Peng, Jingwen Meng:
Trajectory-aware spatio-temporal range query processing for unmanned aerial vehicle networks. 271-285
- Jie Mu, Xianchao Zhang, Yuangang Li, Jun Guo
:
Deep neural network for text anomaly detection in SIoT. 286-296
- Sandeep Kumar Sood, Keshav Singh Rawat
:
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations. 297-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.