default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn150.bht:"
@article{DBLP:journals/cn/Abdel-HalimFE19, author = {Islam Tharwat Abdel{-}Halim and Hossam Mahmoud Ahmad Fahmy and Ayman M. Bahaa El{-}Din}, title = {Mobility prediction-based efficient clustering scheme for connected and automated vehicles in VANETs}, journal = {Comput. Networks}, volume = {150}, pages = {217--233}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.016}, doi = {10.1016/J.COMNET.2018.12.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Abdel-HalimFE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AkyildizK19, author = {Ian F. Akyildiz and Ahan Kak}, title = {The Internet of Space Things/CubeSats: {A} ubiquitous cyber-physical system for the connected world}, journal = {Comput. Networks}, volume = {150}, pages = {134--149}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.017}, doi = {10.1016/J.COMNET.2018.12.017}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AkyildizK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AyadiGBA19, author = {Aya Ayadi and Oussama Ghorbel and Mohammed Sulaiman BenSaleh and Mohamed Abid}, title = {Kernelized technique for outliers detection to monitoring water pipeline based on WSNs}, journal = {Comput. Networks}, volume = {150}, pages = {179--189}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.004}, doi = {10.1016/J.COMNET.2019.01.004}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AyadiGBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BaiLLB19, author = {Sen Bai and Yunhao Liu and Zhenhua Li and Xin Bai}, title = {Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures}, journal = {Comput. Networks}, volume = {150}, pages = {190--200}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.008}, doi = {10.1016/J.COMNET.2019.01.008}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BaiLLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BatistaALLK19, author = {Pedro Batista and Ivanes Ara{\'{u}}jo and Neiva Linder and Kim Laraqui and Aldebaro Klautau}, title = {Testbed for {ICN} media distribution over {LTE} radio access networks}, journal = {Comput. Networks}, volume = {150}, pages = {70--80}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.013}, doi = {10.1016/J.COMNET.2018.12.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BatistaALLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CambiasoCA19, author = {Enrico Cambiaso and Giovanni Chiola and Maurizio Aiello}, title = {Introducing the SlowDrop Attack}, journal = {Comput. Networks}, volume = {150}, pages = {234--249}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.007}, doi = {10.1016/J.COMNET.2019.01.007}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/CambiasoCA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChengLTCC19, author = {Siyao Cheng and Yingshu Li and Zhi Tian and Wei Cheng and Xiuzhen Cheng}, title = {A model for integrating heterogeneous sensory data in IoT systems}, journal = {Comput. Networks}, volume = {150}, pages = {1--14}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.032}, doi = {10.1016/J.COMNET.2018.11.032}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChengLTCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DinPR19, author = {Sadia Din and Anand Paul and Abdul Rehman}, title = {5G-enabled Hierarchical architecture for software-defined intelligent transportation system}, journal = {Comput. Networks}, volume = {150}, pages = {81--89}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.035}, doi = {10.1016/J.COMNET.2018.11.035}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DinPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HatanakaT19, author = {Takayuki Hatanaka and Takuji Tachibana}, title = {{LE-MRC:} Low-energy based multiple routing configurations for fast failure recovery}, journal = {Comput. Networks}, volume = {150}, pages = {170--178}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.005}, doi = {10.1016/J.COMNET.2019.01.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HatanakaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HongMW19, author = {Gongbing Hong and James Martin and James Westall}, title = {Adaptive bandwidth binning for bandwidth management}, journal = {Comput. Networks}, volume = {150}, pages = {150--169}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.019}, doi = {10.1016/J.COMNET.2018.12.019}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HongMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HongNKHFK19, author = {Jin B. Hong and Armstrong Nhlabatsi and Dong Seong Kim and Alaa Hussein and Noora Fetais and Khaled M. Khan}, title = {Systematic identification of threats in the cloud: {A} survey}, journal = {Comput. Networks}, volume = {150}, pages = {46--69}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.009}, doi = {10.1016/J.COMNET.2018.12.009}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HongNKHFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KumarD19, author = {Puneet Kumar and Behnam Dezfouli}, title = {Implementation and analysis of {QUIC} for {MQTT}}, journal = {Comput. Networks}, volume = {150}, pages = {28--45}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.012}, doi = {10.1016/J.COMNET.2018.12.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KumarD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LatapyFZ19, author = {Matthieu Latapy and Marco Fiore and Artur Ziviani}, title = {Link streams: Methods and applications}, journal = {Comput. Networks}, volume = {150}, pages = {263--265}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.010}, doi = {10.1016/J.COMNET.2018.12.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LatapyFZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiHLGZ19, author = {Feng Li and Shibo He and Jun Luo and Mohan Gurusamy and Junshan Zhang}, title = {Editorial: Green computing in Wireless Sensor Networks}, journal = {Comput. Networks}, volume = {150}, pages = {266--268}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.007}, doi = {10.1016/J.COMNET.2018.11.007}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiHLGZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiHLW19, author = {Binbin Li and Yuan He and Wenyuan Liu and Lin Wang}, title = {Towards time-efficient localized polling for large-scale {RFID} systems}, journal = {Comput. Networks}, volume = {150}, pages = {250--262}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.012}, doi = {10.1016/J.COMNET.2019.01.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiHLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiTLLC19, author = {Kaiyang Li and Ling Tian and Wei Li and Guangchun Luo and Zhipeng Cai}, title = {Incorporating social interaction into three-party game towards privacy protection in IoT}, journal = {Comput. Networks}, volume = {150}, pages = {90--101}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.11.036}, doi = {10.1016/J.COMNET.2018.11.036}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiTLLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiuLLL19, author = {Chuan{-}Gang Liu and I{-}Hsien Liu and Chang{-}De Lin and Jung{-}Shian Li}, title = {A novel tag searching protocol with time efficiency and searching accuracy in {RFID} systems}, journal = {Comput. Networks}, volume = {150}, pages = {201--216}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.01.011}, doi = {10.1016/J.COMNET.2019.01.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiuLLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MharsiH19, author = {Niezi Mharsi and Makhlouf Hadji}, title = {A mathematical programming approach for full coverage hole optimization in Cloud Radio Access Networks}, journal = {Comput. Networks}, volume = {150}, pages = {117--126}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.015}, doi = {10.1016/J.COMNET.2018.12.015}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/MharsiH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NehraTGBL19, author = {Ajay Nehra and Meenakshi Tripathi and Manoj Singh Gaur and Ramesh Babu Battula and Chhagan Lal}, title = {{SLDP:} {A} secure and lightweight link discovery protocol for software defined networking}, journal = {Comput. Networks}, volume = {150}, pages = {102--116}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.014}, doi = {10.1016/J.COMNET.2018.12.014}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/NehraTGBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ViardF19, author = {Tiphaine Viard and Rapha{\"{e}}l Fournier{-}S'niehotta}, title = {Augmenting content-based rating prediction with link stream features}, journal = {Comput. Networks}, volume = {150}, pages = {127--133}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.002}, doi = {10.1016/J.COMNET.2018.12.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ViardF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangH19, author = {You{-}Chiun Wang and Chien{-}Chun Huang}, title = {Efficient management of interference and power by jointly configuring {ABS} and {DRX} in {LTE-A} HetNets}, journal = {Comput. Networks}, volume = {150}, pages = {15--27}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2018.12.011}, doi = {10.1016/J.COMNET.2018.12.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.