default search action
Computer Communications, Volume 178
Volume 178, October 2021
- Yosra Ben Slimen, Joanna Balcerzak, Albert Pagès, Fernando Agraz, Salvatore Spadaro, Konstantinos Koutsopoulos, Mustafa Al-Bado, Thuy Truong, Pietro G. Giardina, Giacomo Bernini:
Quality of perception prediction in 5G slices for e-Health services using user-perceived QoS. 1-13
- Peng Liu, Shuran Lyu, Shuqi Ma, Wanqing Wang:
Optimization algorithm of wireless surveillance data transmission task based on edge computing. 14-25
- Shengchen Wu, Haotong Cao, Haitao Zhao, Yue Hu, Longxiang Yang, Hao Yin, Hongbo Zhu:
A softwarized resource allocation framework for security and location guaranteed services in B5G networks. 26-36 - Arzoo Miglani, Neeraj Kumar:
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review. 37-63
- Linkun Fan, Xuchuan Li, Congshuai Guo, Bingshuo Jia:
Path control of panoramic visual recognition for intelligent robots based-edge computing. 64-73 - Le Qin, Yuanlong Cao, Xun Shao, Yong Luo, Xinping Rao, Yugen Yi, Gang Lei:
A deep heterogeneous optimization framework for Bayesian compressive sensing. 74-82
- Daqing Wang, Haoli Xu, Yue Shi, Zhibin Ding, Zhengdong Deng, Zhixin Liu, Xingang Xu, Zhao Lu, Guangyuan Wang, Zijian Cheng, Xiaoning Zhao:
The groundwater potential assessment system based on cloud computing: A case study in islands region. 83-97
- Mohamed Said Frikha, Sonia Mettali Gammar, Abdelkader Lahmadi, Laurent Andrey:
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey. 98-113
- Bowen Shen, Xiaolong Xu, Lianyong Qi, Xuyun Zhang, Gautam Srivastava:
Dynamic server placement in edge computing toward Internet of Vehicles. 114-123
- Mingshuai Dong, Shimin Wei, Xiuli Yu, Jianqin Yin:
MASK-GD segmentation based robotic grasp detection. 124-130
- Huaping Jia, Jun Liu, Min Zhang, Xiaohu He, Weixi Sun:
Network intrusion detection based on IE-DBN model. 131-140
- Xisheng Xiao, Jin Sun, Jinxin Yang:
Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach. 141-152
- Ye Chen, Hongchun Shu, Wenjiao Xu, Zhengyu Yang, Zhihu Hong, Mingshuai Dong:
Transformer text recognition with deep learning algorithm. 153-160
- Suchi Kumari, Rajesh Kumar, Seifedine Nimer Kadry, Suyel Namasudra, David Taniar:
Maintainable stochastic communication network reliability within tolerable packet error rate. 161-168 - Avinash Swaminathan, Mridul Chaba, Deepak Kumar Sharma, Uttam Ghosh:
GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks. 169-182
- Hongzhi Cui:
Handoff control strategy of cyber physical systems under dynamic data attack. 183-190
- Zikang Wei, Yunqing Liu:
Construction of super-resolution model of remote sensing image based on deep convolutional neural network. 191-200
- Jian Wang, Yulan Hu, Yining Wang, Qingshan Zhao:
Anomaly detection method of packet loss node location in heterogeneous hash networks. 201-211
- Shasha Zhao, Gan Yu:
Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system. 212-220
- Jalal Al-Muhtadi, Rawan A. Alamri, Farrukh Aslam Khan, Kashif Saleem:
Subjective logic-based trust model for fog computing. 221-233 - Yanna Wang, Xinyue Zhou, Jian Sun, Xiaoye Li, Junping Zhang:
Optimization of network sensor node location based on edge coverage control. 234-244
- Yu Liu, Junxin Chen, Nan Bao, Brij B. Gupta, Zhihan Lv:
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things. 245-258
- Faezeh Sharifi, Soroush Akhlaghi:
Maximizing the minimum secrecy rate of two-way relay networks. 259-270 - Xin Li, Liang Liu, Lisong Wang, Jie Xi, Jianfei Peng, Jingwen Meng:
Trajectory-aware spatio-temporal range query processing for unmanned aerial vehicle networks. 271-285
- Jie Mu, Xianchao Zhang, Yuangang Li, Jun Guo:
Deep neural network for text anomaly detection in SIoT. 286-296
- Sandeep Kumar Sood, Keshav Singh Rawat:
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations. 297-306
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.