default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2020
- Soheil Abbasloo, H. Jonathan Chao:
SharpEdge: an asynchronous and core-agnostic solution to guarantee bounded-delays. CCF Trans. Netw. 3(1): 35-50 (2020) - Sultan Alasmari, Weichao Wang, Tuanfa Qin, Yu Wang:
Proof of outsourced encryption: cross verification of security service level agreement. CCF Trans. Netw. 3(3-4): 229-244 (2020) - Elisa Bertino:
Security of cellular networks position paper. CCF Trans. Netw. 3(2): 93-96 (2020) - Urmila Bhanja, Chinmayee Panda:
Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication. CCF Trans. Netw. 3(3-4): 272-285 (2020) - Baicheng Chen, Kun Woo Cho, Chenhan Xu, Zhengxiong Li, Feng Lin, Zhanpeng Jin, Wenyao Xu:
A stimulus-response based EEG biometric using mallows distance. CCF Trans. Netw. 3(2): 128-139 (2020) - Zhiqi Chen, Sheng Zhang, Zhuzhong Qian, Can Wang, Mingjun Xiao, Jie Wu, Sanglu Lu:
Sum of squares: a new metric for NFV service chain placement in edge computing environments and efficient heuristic algorithms. CCF Trans. Netw. 3(2): 140-153 (2020) - Qiushi Gong:
A weakly secure multiple description coding scheme in lossy multipath channels for fine-grained SVC streaming. CCF Trans. Netw. 3(1): 66-80 (2020) - Bhupendra Gupta, Jyoti Pandey:
Resilient and secure wireless sensor network under non-full visibility. CCF Trans. Netw. 3(1): 81-92 (2020) - Koffka Khan, Wayne Goodridge:
QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols. CCF Trans. Netw. 3(3-4): 245-260 (2020) - Majd Latah, Levent Toker:
An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks. CCF Trans. Netw. 3(3-4): 261-271 (2020) - Zonghui Li, Hai Wan, Yangdong Deng, Ke Xiong, Xiaoyu Song:
A resource-efficient priority scheduler for time-sensitive networking switches. CCF Trans. Netw. 3(1): 21-34 (2020) - Suryadipta Majumdar:
A multi-level proactive security auditing framework for clouds through automated dependency building. CCF Trans. Netw. 3(2): 112-127 (2020) - Xiaoyi Pang, Dengfeng Guo, Zhibo Wang, Peng Sun, Liqiang Zhang:
Towards fair and efficient task allocation in blockchain-based crowdsourcing. CCF Trans. Netw. 3(3-4): 193-204 (2020) - Wei Peng, Yi Wang, Tao Huang, Hai Wan, David Dai, Jianping Wang:
Editorial of special issue on time-sensitive networking. CCF Trans. Netw. 3(1): 1-3 (2020) - Zhiguang Qin, Yuedi Li, Xin Ye, Jin Zhou, Minsheng Cao, Dajiang Chen:
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks. CCF Trans. Netw. 3(3-4): 205-217 (2020) - Wei Quan, Wenwen Fu, Jinli Yan, Zhigang Sun:
OpenTSN: an open-source project for time-sensitive networking system development. CCF Trans. Netw. 3(1): 51-65 (2020) - Ju Ren, Hongbo Jiang, Xuemin Shen, John C. S. Lui, Arun K. Lyengar:
Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing. CCF Trans. Netw. 3(3-4): 155-157 (2020) - Jingrong Wang, Kaiyang Liu, George Tzanetakis, Jianping Pan:
Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems. CCF Trans. Netw. 3(3-4): 158-170 (2020) - Yichuan Wang, Yuying Tian, Xinyue Yin, Xinhong Hei:
A trusted recommendation scheme for privacy protection based on federated learning. CCF Trans. Netw. 3(3-4): 218-228 (2020) - Xueshuo Xie, Yaozheng Fang, Zhaolong Jian, Ye Lu, Tao Li, Guiling Wang:
Blockchain-driven anomaly detection framework on edge intelligence. CCF Trans. Netw. 3(3-4): 171-192 (2020) - Xingliang Yuan, Chengjun Cai, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. CCF Trans. Netw. 3(2): 97-111 (2020) - Chuwen Zhang, Yi Wang, Ruyi Yao, Boyang Zhou, Liang Cheng, Yang Xu, Xiaoguang Li, Jian Cheng, Bin Liu:
Packet-size aware scheduling algorithms in guard band for time sensitive networking. CCF Trans. Netw. 3(1): 4-20 (2020) - 2019
- Guang Cheng, Chunsheng Guo, Yongning Tang:
dptCry: an approach to decrypting ransomware WannaCry based on API hooking. CCF Trans. Netw. 2(3-4): 207-216 (2019) - Yang Cheng, Jinkun Geng, Yanshu Wang, Junfeng Li, Dan Li, Jianping Wu:
Bridging machine learning and computer network research: a survey. CCF Trans. Netw. 1(1-4): 1-15 (2019) - Xiaoyi Fan, Yutao Huang, Xiaoqiang Ma, Jiangchuan Liu, Victor C. M. Leung:
Exploiting the edge power: an edge deep learning framework. CCF Trans. Netw. 2(1): 4-11 (2019) - Fan He, Haiping Huang, Ruchuan Wang, Lingyun Jiang:
Data fusion-oriented cluster routing protocol for multimedia sensor networks based on the degree of image difference. CCF Trans. Netw. 1(1-4): 65-77 (2019) - Linghe Kong, Fan Wu, Xiaofeng Gao, Min-You Wu, Guihai Chen:
Enhancing data delivery in vehicular networks using dual-radio architecture. CCF Trans. Netw. 1(1-4): 52-64 (2019) - Tong Li, Kezhi Wang, Ke Xu, Kun Yang, Chathura M. Sarathchandra Magurawalage, Haiyang Wang:
Communication and computation cooperation in cloud radio access network with mobile edge computing. CCF Trans. Netw. 2(1): 43-56 (2019) - Tingting Liu, Jun Li, Feng Shu, Yu Du, Zhu Han:
Distributed resource allocation in caching-enabled heterogeneous cellular networks based on matching theory. CCF Trans. Netw. 2(1): 57-68 (2019) - Tong Liu, Yanmin Zhu, Yuanyuan Yang, Fan Ye, Jiadi Yu:
Online task dispatching and pricing for quality-of-service-aware sensing data collection for mobile edge clouds. CCF Trans. Netw. 2(1): 28-42 (2019)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-12 00:24 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint