default search action
Computer Communications, Volume 215
Volume 215, 2024
- Ece Gelal Soyak, Özgür Erçetin:
Effective networking: Enabling effective communications towards 6G. 1-8 - Sadoon Azizi, Mohammad Shojafar, Pedram Farzin, Javad Dogani:
DCSP: A delay and cost-aware service placement and load distribution algorithm for IoT-based fog networks. 9-20 - Chuyi Zhong, Dingkang Yang, Shunli Wang, Lihua Zhang:
Towards heart infarction detection via image-based dataset and three-stream fusion framework. 21-28 - Erbo Shen, Weidong Yang, Xuyu Wang, Shiwen Mao:
Contactless wheat foreign material monitoring and localization with passive RFID tag arrays. 29-40 - Ahmed Fahim Mostafa, Mohamed Abdel-Kader, Yasser Gadallah:
A UAV-based coverage gap detection and resolution in cellular networks: A machine-learning approach. 41-50 - Hazim Shakhatreh, Ahmad Sawalmeh, Ali Hamdan Alenezi, Sharief Abdel-Razeq, Ala I. Al-Fuqaha:
Mobile-IRS assisted next generation UAV communication networks. 51-61 - Leyla Fathollahi, Mahmood Mohassel Feghhi, Mahmoud Atashbar:
Energy optimization for full-duplex wireless-powered IoT networks using rotary-wing UAV with multiple antennas. 62-73 - Himanshu Sharma, Gitika Sharma, Neeraj Kumar:
AI-assisted secure data transmission techniques for next-generation HetNets: A review. 74-90 - Qiuyu Lu, Qize Gao, June Li, Xuanxuan Xie, Wenrui Guo, Jin Wang:
Distributed cyber-physical intrusion detection using stacking learning for wide-area protection system. 91-102 - Meng Xu, Shenghan Liu, Xuewu Li:
Network security situation assessment and prediction method based on multimodal transformation in edge computing. 103-111 - Dimitrios Zorbas:
Downlink Spreading Factor selection in LoRaWAN. 112-119 - Wei Liu, Baozhu Yu, Xiangyu Liu, Xuefen Chi, Jinyi Zhang:
Bandwidth abstraction and service rate instantiation for latency-bounded reliability provisioning in 5th generation wireless networks. 120-129 - Hao Yang, Wei He, Zhenyu Shan, Xiaoxin Fang, Xiong Chen:
Class incremental learning via dynamic regeneration with task-adaptive distillation. 130-139 - Yubian Wang, Zhongsheng Wang, Xiang Liu:
Key security measurement method of authentication based on mobile edge computing in urban rail transit communication network. 140-149 - Hanbing Liu, Fang Han, Yajuan Zhang:
Malicious traffic detection for cloud-edge-end networks: A deep learning approach. 150-156 - Chen Xue, Zhongliang Deng, Shuo Wang, Enwen Hu, Yao Zhang, Wangwang Yang, Yiming Wang:
GLSFF: Global-local specific feature fusion for cross-modality pedestrian re-identification. 157-168 - Binbin Huang, Xunqing Huang, Xiao Liu, Chuntao Ding, Yuyu Yin, Shuiguang Deng:
Adaptive partitioning and efficient scheduling for distributed DNN training in heterogeneous IoT environment. 169-179
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.