default search action
Digital Communications and Networks, Volume 3
Volume 3, Number 1, February 2017
- Yu Wang, Shiwen Mao:
On distributed power control in full duplex wireless networks. 1-10 - Nogbou Georges Anoh, Michel Babri, Ahmed D. Kora, Roger M. Faye, Boko Aka, Claude Lishou:
An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks. 11-18 - Anuradha Pughat, Vidushi Sharma:
Performance analysis of an improved dynamic power management model in wireless sensor node. 19-29 - Wajiya Zafar, Bilal Muhammad Khan:
A reliable, delay bounded and less complex communication protocol for multicluster FANETs. 30-38 - Niemah Izzeldin Osman:
Will video caching remain energy efficient in future core optical networks? 39-46 - Rami Halloush, Hang Liu, Lijun Dong, Mingquan Wu, Hayder Radha:
Hop-by-hop Content Distribution with Network Coding in Multihop Wireless Networks. 47-54 - Debashis De, Anwesha Mukherjee:
Group handoff management in low power microcell-femtocell network. 55-65
Volume 3, Number 2, May 2017
- In Keun Son, Shiwen Mao:
A survey of free space optical networks. 67-77 - Latif Ullah Khan:
Visible light communication: Applications, architecture, standardization and research challenges. 78-88 - Xinxin Mei, Qiang Wang, Xiaowen Chu:
A survey and measurement study of GPU DVFS on energy conservation. 89-100 - Qiang Duan:
Cloud service performance evaluation: status, challenges, and opportunities - a survey from the system modeling perspective. 101-111 - Dipesh Shah, Axay J. Mehta:
Fractional delay compensated discrete-time SMC for networked control system. 112-117 - Rafiullah Khan, Sarmad Ullah Khan:
Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste. 118-128 - Babatunde S. Awoyemi, Bodhaswar T. Maharaj, Attahiru Sule Alfa:
Optimal resource allocation solutions for heterogeneous cognitive radio networks. 129-139
Volume 3, Number 3, August 2017
- Martin Damrath, Peter Adam Hoeher, Gilbert J. M. Forkel:
Symbol detection based on Voronoi surfaces with emphasis on superposition modulation. 141-149 - Syed Rehan Afzal, Sander Stuijk, Majid Nabi, Twan Basten:
Effective link quality estimation as a means to improved end-to-end packet delivery in high traffic mobile ad hoc networks☆. 150-163 - Krishan Kumar, Arun Prakash, Rajeev Tripathi:
Spectrum handoff scheme with multiple attributes decision making for optimal network selection in cognitive radio networks. 164-175 - Md. Noor-A-Rahim, Nan Zhang, Md. Rabiul Islam, Yong Liang Guan:
Bilayer expurgated LDPC codes with uncoded relaying. 176-179 - Khattab M. Ali Alheeti, Anna Gruebler, Klaus D. McDonald-Maier:
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. 180-187 - Maqbool Ali, Hafiz Syed Muhammad Bilal, Muhammad Asif Razzaq, Jawad Khan, Sungyoung Lee, Muhammad Idris, Mohammad Aazam, Taebong Choi, Soyeon Caren Han, Byeong Ho Kang:
IoTFLiP: IoT-based flipped learning platform for medical education. 188-194 - Abdul Hanan Abdullah, Mohammad Yazid Bin Idris, Omprakash Kaiwartya, Mukesh Prasad, Rajiv Ratn Shah:
Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. 195-210
Volume 3, Number 4, November 2017
- Shui Yu, Peter Mueller, Albert Y. Zomaya:
Editorial: special issue on "big data security and privacy". 211-212 - T. K. Ashwin Kumar, Hong Liu, Johnson P. Thomas, Xiaofeh Hou:
Content sensitivity based access control framework for Hadoop. 213-225 - Ruidong Li, Hitoshi Asaeda, Jie Li, Xiaoming Fu:
A distributed authentication and authorization scheme for in-network big data sharing. 226-235 - Shuai Li, Longxia Huang, Anmin Fu, John Yearwood:
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. 236-241 - Zhitao Guan, Guanlin Si:
Achieving privacy-preserving big data aggregation with fault tolerance in smart grid. 242-249 - Zichan Ruan, Yuantian Miao, Lei Pan, Nicholas Charles Patterson, Jun Zhang:
Visualization of big data security: a case study on the KDD99 cup data set. 250-259 - Mohd Usama, Mengchen Liu, Min Chen:
Job schedulers for Big data processing in Hadoop environment: testing real-life schedulers using benchmark programs. 260-273
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.