default search action
Computer Communications, Volume 212
Volume 212, December 2023
- Chung-Ming Huang, Han-I Wang:
Fuzzy-rule-decided small cell offloading for rate-adaptive SVC-DASH video streaming over the vehicle environment. 1-20 - Shlomi Dolev, Daniel Khankin:
Random spanning trees for expanders, sparsifiers, and virtual network security. 21-34
- Maurizio Palmieri, Christian Quadri, Adriano Fagiolini, Cinzia Bernardeschi:
Co-simulated digital twin on the network edge: A vehicle platoon. 35-47
- Ashish Tomar, Sachin Tripathi:
BCSoM: Blockchain-based certificateless aggregate signcryption scheme for Internet of Medical Things. 48-62 - Kaitao Huo, Yongqiang Wang, Chen Ji, Chen Yue, Chase Q. Wu, Michelle M. Zhu:
On multi-path bandwidth scheduling for multiple fixed-slot reservations in high-performance networks. 63-77
- Haiping Huang, Lingjun Zhao, Yisheng Wu:
An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation. 78-89
- Lars Wischhof, Maximilian Kilian, Stefan Schuhbäck, Matthias Rupp, Gerta Köster:
Mobility in pedestrian communication simulations: Impact of microscopic models and solutions for integration. 90-103
- Qiang Tang, Chen Dai, Zhiqiang Yu, Dun Cao, Jin Wang:
An UAV and EV based mobile edge computing system for total delay minimization. 104-115 - Masoud Zarifneshat, Li Xiao:
Beam adaptation using out-of-band signals for robust millimeter-wave communications. 116-128
- Ivan Palamà, Alessandro Amici, Gabriele Bellicini, Francesco Gringoli, Fabio Pedretti, Giuseppe Bianchi:
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. 129-140
- Chen Wang, Jin Zhao:
Network approaches in blockchain-based systems: Applications, challenges, and future directions. 141-150
- K. Hemant Kumar Reddy, Rajat Subhra Goswami, Diptendu Sinha Roy:
A futuristic green service computing approach for smart city: A fog layered intelligent service management model for smart transport system. 151-160 - Gabriel de Carvalho Ferreira, Priscila Solís Barreto, Marcos F. Caetano, Eduardo Alchieri, Daniel Costa Araújo, Francisco Rodrigo P. Cavalcanti, Diego Aguiar Sousa:
5G-RCOLAB: A system level simulator for 5G and beyond in rural areas. 161-181 - Phuong N. H. Pham, Canh V. Pham, Hieu V. Duong, Václav Snásel, Trung Thanh Nguyen:
Minimizing cost for influencing target groups in social network: A model and algorithmic approach. 182-197 - An Zhang, Baichuan Zhang, Wenhao Bi, Zhanjun Huang, Mi Yang:
Multi-UAV task allocation based on GCN-inspired binary stochastic L-BFGS. 198-211 - Egide Nkurunziza, Tandoh Lawrence, Issameldeen Elfadul, Mwitende Gervais:
AP-HBSG: Authentication protocol for heterogeneous blockchain-based smart grid environment. 212-226
- Deepanshi, Ishan Budhiraja, Deepak Garg, Neeraj Kumar:
Choquet integral based deep learning model for COVID-19 diagnosis using eXplainable AI for NG-IoT models. 227-238
- Novella Bartolini, Andrea Coletta, Flavio Giorgi, Gaia Maselli, Matteo Prata, Domenicomichele Silvestri:
Stop & Offload: Periodic data offloading in UAV networks. 239-250
- Jesús Pérez-Valero, Jaime García-Reinoso, Albert Banchs, Pablo Serrano, Jorge Ortín, Xavier Costa-Pérez:
Performance trade-offs of auto scaling schemes for NFV with reliability requirements. 251-261 - Chenxi Lai, Shaoshuai Gao, Guofang Tu:
Unequal Error Protection-based Rate-Splitting precoding for VLC systems: BER analysis. 262-274 - Abdellatif Chagdali, Salah-Eddine Elayoubi, Antonia Maria Masucci, Alain Simonian:
On the design and performance of scheduling policies exploiting spatial diversity for URLLC. 275-283 - Panchami V, Rubell Marion Lincy G., Mahima Mary Mathews, Sharon Justine:
A Provably Secure,Privacy-Preserving Lightweight Authentication Scheme for Peer-to-Peer Communication in Healthcare Systems based on Internet of Medical Things. 284-297 - Balaprakasa Rao Killi, Rakesh Tripathi, Venkatarami Reddy Chintapalli:
Sequential game theory based multi criterion network partitioning for controller placement in software defined wide area networks. 298-312
- Yu Xia, Tian Liang, Weihuan Min, Li Kuang, Honghao Gao:
Enhancing intelligent IoT services development by integrated multi-token code completion. 313-323
- Joe Saad, Kinda Khawam, Mohamad Yassin, Salvatore Costanzo:
A three-level slicing algorithm in a multi-slice multi-numerology context. 324-341 - Sangita Dhara, Akbar Majidi, Siobhán Clarke:
Revving up VNDN: Efficient caching and forwarding by expanding content popularity perspective and mobility. 342-352 - Ljupcho Milosheski, Gregor Cerar, Blaz Bertalanic, Carolina Fortuna, Mihael Mohorcic:
Self-supervised learning for clustering of wireless spectrum activity. 353-365
- Yuheng Gu, Yu Yang, Yu Yan, Fang Shen, Minna Gao:
Learning-based intrusion detection for high-dimensional imbalanced traffic. 366-376
- Ghanshyam Prasad Dubey, Shalini Stalin, Omar Alqahtani, Areej Alasiry, Madhu Sharma, Aliya Aleryani, Piyush Kumar Shukla, Monia Turki-Hadj Alouane:
Optimal path selection using reinforcement learning based ant colony optimization algorithm in IoT-Based wireless sensor networks with 5G technology. 377-389
- Delia Rico, María-del-Mar Gallardo, Pedro Merino:
Verification of a multi-connectivity protocol for Tactile Internet applications. 390-406
- Anand Muni Mishra, Yogesh Ramdas Shahare, Piyush Kumar Shukla, Akhtar Husain, Santar Pal Singh, Sultan Alyami, Abdullah Alghamdi, Tariq Ahamed Ahanger:
Driving a key generation strategy with training-based optimization to provide safe and effective authentication using data sharing approach in IoT healthcare. 407-419
- Meejoung Kim:
Analysis of feasible region in network slicing: Markov chain approach. 420-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.