


default search action
Computer Communications, Volume 197
Volume 197, January 2023
- Mohammed A. Hathibelagal
, Rosario Giuseppe Garroppo
, Gianfranco Nencioni
:
Experimental comparison of migration strategies for MEC-assisted 5G-V2X applications. 1-11 - Girish Sharma
, Jyoti Grover
, Abhishek Verma
:
Performance evaluation of mobile RPL-based IoT networks under version number attack. 12-22 - Liqing Shan
, Songtao Gao, Shuaishuai Chen, Mingkai Xu, Fenghui Zhang, Xuecai Bao, Ming Chen:
Energy-efficient resource allocation in NOMA-integrated V2X networks. 23-33
- Deepanshi, Ishan Budhiraja
, Deepak Garg
, Neeraj Kumar, Rohit Sharma:
A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues. 34-51
- Suhong Wang, Hongqing Wang, Shufeng She, Yanping Zhang, Qingju Qiu, Zhifeng Xiao
:
Swin-T-NFC CRFs: An encoder-decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation. 52-60
- Majid Abiri, Mehri Mehrjoo
, Mehdi Rezaei:
Femtocell deployment for scalable video transmission in 5G networks. 61-70 - Jiuyuan Huo, Shubin Lu
, Jiguang Yang
, Lei Wang
, Hamzah Murad Mohammed Al-Neshmi
:
An area autonomous routing protocol based on multi-objective optimization methods for field observation instrument network. 71-86 - Yong Zhang
, Yuqing Yin
, Yujie Wang
, Jiaqiu Ai
, Dingchao Wu
:
CSI-based location-independent Human Activity Recognition with parallel convolutional networks. 87-95 - Rajasekhar Chaganti, Bharat Bhushan, Vinayakumar Ravi
:
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions. 96-112 - Xiangjun Zhang
, Weiguo Wu
, Song Liu, Jinyu Wang:
An efficient computation offloading and resource allocation algorithm in RIS empowered MEC. 113-123 - Sanjeev Kumar Dwivedi
, Ruhul Amin
, Satyanarayana Vollala:
Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability. 124-140 - Usman Haider
, Muhammad Waqas
, Muhammad Hanif
, Hisham Alasmary
, Saeed Mian Qaisar
:
Network load prediction and anomaly detection using ensemble learning in 5G cellular networks. 141-150
- Agon Memedi
, Falko Dressler:
A Location-Aware RF-Assisted MAC Protocol for Sectorized Vehicular Visible Light Communications. 151-158
- Ravi Yadav
, Gaurav Baranwal
:
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes. 159-172
- Ankush Mitra, Basudeb Bera
, Ashok Kumar Das, Sajjad Shaukat Jamal, Ilsun You
:
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment. 173-185
- Rui Xu
, Xiaoqiang Di
, Jing Chen
, Haowei Wang, Hao Luo
, Hui Qi, Xiongwen He, Wenping Lei, Shiwei Zhang:
A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness. 186-198
- Qamar Abbas
, Syed Ali Hassan, Hassaan Khaliq Qureshi, Kapal Dev
, Haejoon Jung
:
A comprehensive survey on age of information in massive IoT networks. 199-213
- Yuanyuan Yang
, Jin Cao, Xiongpeng Ren
, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. 214-229 - Tham Nguyen, Naveen Karunanayake
, Sicong Wang, Suranga Seneviratne
, Peizhao Hu:
Privacy-preserving spam filtering using homomorphic and functional encryption. 230-241 - Gururaj S. Kori
, Mahabaleshwar S. Kakkasageri
:
Classification And Regression Tree (CART) based resource allocation scheme for Wireless Sensor Networks. 242-254
- Amir Javadpour, Arun Kumar Sangaiah
, Pedro Pinto
, Forough Ja'fari, Weizhe Zhang, Ali Majed Hossein Abadi, Hamidreza Ahmadi:
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers. 255-266 - Yuan Cheng, Baojiang Cui, Chen Chen, Thar Baker
, Tao Qi:
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network. 267-275
- Hui Ma
, Kai Yang, Man-On Pun
:
Cellular traffic prediction via deep state space models with attention mechanism. 276-283 - Vicente Mayor
, Rafael Estepa
, Antonio Jose Estepa
:
CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks. 284-293 - Ba Cao Nguyen
, Le The Dung, Tran Manh Hoang
, Nguyen Van Vinh
, Gia Thien Luu
:
On performance of multi-RIS assisted multi-user nonorthogonal multiple access system over Nakagami-m fading channels. 294-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.