default search action
Computer Communications, Volume 217
Volume 217, 2024
- Xiangdang Huang, Chao Chen, Nuo Chen, Pengcheng Li, Rongxin Zhu, Qiuling Yang:
A robust and machine learning-driven identification scheme for malicious nodes in UASNs. 1-11 - Erik Daniel, Florian Tschorsch:
Exploring the design space of privacy-enhanced content discovery for bitswap. 12-24 - Margherita Gambini, Serena Tardelli, Maurizio Tesconi:
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset. 25-40 - Suranjan Daw, Anwesha Kar, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma, C. Siva Ram Murthy:
LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink. 41-56 - Konrad-Felix Krentz, Thiemo Voigt:
Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR. 57-69 - Francesco Raviglione, Carlos Mateo Risma Carletti, Marco Malinverno, Claudio Casetti, Carla-Fabiana Chiasserini:
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services. 70-86 - Li Yang, Huitao Zhang, Yaowen Qi, Qilong Huang:
Available energy routing algorithm considering QoS requirements for LEO satellite network. 87-96 - Peiyan Jia, Chen Chen, Delong Zhang, Yulong Sang, Lei Zhang:
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use. 97-106 - Masoud Narimani Zaman Abadi, Amir Jalaly Bidgoly, Yaghoub Farjami:
ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things. 107-125 - Mian Muaz Razaq, Huanhuan Song, Limei Peng, Pin-Han Ho:
Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning. 126-133 - Asmaa Amer, Sahar Hoteit, Jalel Ben-Othman:
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications. 134-151 - Jiaqi Fan, Jiankui Yang, Dacheng Yao:
Activate or sleep? An optimal two-threshold policy for transmission service. 152-165 - Yaser Azimi, Saleh Yousefi, Hashem Kalbkhani, Thomas Kunz:
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing. 166-182 - Branka Mikavica, Aleksandra Kostic-Ljubisavljevic:
A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment. 183-199 - Awnish Kumar, Ngangbam Herojit Singh, Suyel Namasudra, Rubén González Crespo, Nageswara Rao Moparthi:
Traffic matrix estimation using matrix-CUR decomposition. 200-207 - Weiwei Jiang, Haoyu Han, Miao He, Weixi Gu:
When game theory meets satellite communication networks: A survey. 208-229 - Miguel García-Torres, Diego P. Pinto-Roa, Carlos Nunez Castillo, Brenda Quiñonez, Gabriela Vázquez, Mauricio Allegretti, María E. García-Díaz:
Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach. 230-245 - Weihang Ding, Yuxin Luo, Yifeng Lin, Yuer Yang, Siwei Lian:
VeriBypasser: An automatic image verification code recognition system based on CNN. 246-258 - Hui Xie, Jun Zheng, Shengjun Wei, Changzhen Hu:
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture. 259-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.