


default search action
Computer Communications, Volume 188
Volume 188, April 2022
- Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Gautam Srivastava
:
A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. 1-12
- Meng Wang
, Dian-Wu Yue, Si-Nian Jin:
Full-duplex cell-free mMIMO networks with coarse ADCs/DACs over Ricean fading for beyond 5G. 13-25 - Shengyu Zhang
, Kwan L. Yeung:
Scalable routing in low-Earth orbit satellite constellations: Architecture and algorithms. 26-38
- Natalia Yarkina
, Luís M. Correia, Dmitri Moltchanov
, Yuliya Gaidamaka
, Konstantin E. Samouylov
:
Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems. 39-51
- Preetam Amrit, Amit Kumar Singh
:
Survey on watermarking methods in the artificial intelligence domain and beyond. 52-65
- Yangbin Zhang, Lihua Liu, Mao Wang, Jibing Wu, Hongbin Huang:
An improved routing protocol for raw data collection in multihop wireless sensor networks. 66-80
- Senthil Murugan Nagarajan
, Ganesh Gopal Deverajan
, Ali Kashif Bashir
, Rajendra Prasad Mahapatra, Mohammed S. Al-Numay
:
IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems. 81-89
- Ting Xu
, Ming Zhao
, Xin Yao, Yusen Zhu:
An improved communication resource allocation strategy for wireless networks based on deep reinforcement learning. 90-98
- Marc Carrascosa
, Boris Bellalta
:
Cloud-gaming: Analysis of Google Stadia traffic. 99-116 - Shibao Li
, Quanyu Li, Jianhang Liu, Tingpei Huang, Xuerong Cui:
Resource allocation based on multi-grouping and frame expansion for NOMA backscatter communication network. 117-124 - Bin Wang
, Guoqing Duan
:
A reliable cardinality estimation for missing tags over a noisy channel. 125-132
- Ranjit Panigrahi
, Samarjeet Borah
, Moumita Pramanik
, Akash Kumar Bhoi
, Paolo Barsocchi
, Soumya Ranjan Nayak
, Waleed S. Alnumay
:
Intrusion detection in cyber-physical environment using hybrid Naïve Bayes - Decision table and multi-objective evolutionary feature selection. 133-144
- Jinquan Liu, Tongtong Zou:
Identifying the outlier in tunnel monitoring data: An integration model. 145-155
- Atefeh Khatiri, Ghasem Mirjalily
:
A cost-efficient, load-balanced and fragmentation-aware approach for deployment of VNF service chains in Elastic Optical Networks. 156-166
- Ahmadreza Jame, Marco Rapelli
, Claudio Casetti
:
Reducing pollutant emissions through Virtual Traffic Lights. 167-177

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.