default search action
Computer Communications, Volume 213
Volume 213, January 2024
- Sagar Arora, Adlen Ksentini, Christian Bonnet:
Cloud native Lightweight Slice Orchestration (CLiSO) framework. 1-12
- Yakun Gao, Keren Ji, Tian Gao:
Route planning model based on multidimensional eigenvector processing in vehicular fog computing. 13-20
- Nur Fadhilah Mohd Shari, Amizah Malip:
Corrigendum to 'State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review' [Comput. Commun. 189 (2022) 120-147]. 21
- Qi Li, Zhenyu Shi, Zhaoyu Xue, Zhihua Cui, Yubin Xu:
A many-objective evolutionary algorithm for solving computation offloading problems under uncertain communication conditions. 22-32
- Giovanni Nardini, Giovanni Stea:
Enabling simulation services for digital twins of 5G/B5G mobile networks. 33-48
- Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang:
Dynamic WiFi indoor positioning based on the multi-scale metric learning. 49-60
- Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani:
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective. 61-77
- Bing Qian, Hanlei Xie, Wei Wu, Yan Yang:
Cellular fault prediction of graphical representation based on spatio-temporal graph convolutional networks. 78-87 - Zewu Li, Chen Xu, Zhanpeng Zhang, Runze Wu:
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks. 88-98 - Zhongyu Ma, Zijun Wang, Yajing Wang, Xianghong Lin, Qun Guo, Yi Xie:
Coalitional game based sub-channel allocation for full-duplex-enabled mmWave IAB network in B5G. 99-110
- Duncan Deveaux, Takamasa Higuchi, Seyhan Uçar, Jérôme Härri, Onur Altintas:
Role of context in determining transfer of risk knowledge in roundabouts. 111-134
- Hussein Al Haj Hassan, Sahar Jaber, Ali El-Amine, Abbass Nasser, Loutfi Nuaymi:
Reinforcement learning for radio resource management of hybrid energy cellular networks with battery constraints. 135-146 - Chaonong Xu, Yaqi Xie, Fan Wu, Chao Li:
Complexity and algorithm of setting optimal location for data sink in real-time NOMA-based IIoTs. 147-157 - Xueqin Zhang, Zhineng Wang, Gang Liu, Yan Wang:
Key node identification in social networks based on topological potential model. 158-168
- Choong Il Yeh, Yong-Seouk Choi, Young-Jo Ko, Il-Gyu Kim:
Standardization and technology trends of artificial intelligence for mobile systems. 169-178
- Chao-Hsiang Li, Alexander I-Chi Lai, Ruey-Beei Wu:
Accuracy enhancement of Wi-Fi positioning by ranging in dense UWB networks. 179-187
- Zhaolin Ma, Jiali You, Haojiang Deng:
DINNRS: A Distributed In-Network Name Resolution System for information-centric networks. 188-198 - Abdullah Numani, Ziaul Haq Abbas, Ghulam Abbas, Zaiwar Ali:
Energy conserving cost selection for fine-grained computational offloading in mobile edge computing networks. 199-207
- Rajesh Kumar, Deepak Sinwar, Vijander Singh:
QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G. 208-235
- Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo:
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning. 236-245 - Fateme Fathi, Mina Baghani, Majid Bayat:
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems. 246-259 - Zongwang Li, Zhuochen Xie, Xiaohe He, Xuwen Liang:
Heterogeneous temporal graph powered DRL algorithm for channel allocation in Maritime IoT Systems. 260-270 - Ofek Bader, Adi Lichy, Amit Dvir, Ran Dubin, Chen Hajaj:
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification. 271-284 - Ting Yu, Lihua Zhang, Hailin Liu, Hongbing Liu, Jiaojiao Wang:
Service recommendation based on contrastive learning and multi-task learning. 285-295 - Pankaj Kumar, Hari Om:
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme. 296-308 - Suvrima Datta, Venkanna U.:
PiGateway: Real-time granular analysis of smart home network traffic using P4. 309-319 - Eric Ossongo, Moez Esseghir, Leïla Merghem-Boulahia:
A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices. 320-330 - Annisa Sarah, Gianfranco Nencioni:
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario. 331-344 - Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy:
Quantum-resistant Transport Layer Security. 345-358 - Shanchen Pang, Lili Hou, Haiyuan Gui, Xiao He, Teng Wang, Yawu Zhao:
Multi-mobile vehicles task offloading for vehicle-edge-cloud collaboration: A dependency-aware and deep reinforcement learning approach. 359-371
- Faisal Hawlader, François Robinet, Raphaël Frank:
Leveraging the edge and cloud for V2X-based real-time object detection in autonomous driving. 372-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.