


default search action
CCF Transactions on Networking, Volume 3
Volume 3, Number 1, September 2020
- Wei Peng, Yi Wang, Tao Huang, Hai Wan, David Dai, Jianping Wang:

Editorial of special issue on time-sensitive networking. 1-3 - Chuwen Zhang, Yi Wang, Ruyi Yao, Boyang Zhou, Liang Cheng, Yang Xu, Xiaoguang Li, Jian Cheng, Bin Liu:

Packet-size aware scheduling algorithms in guard band for time sensitive networking. 4-20 - Zonghui Li

, Hai Wan, Yangdong Deng, Ke Xiong, Xiaoyu Song:
A resource-efficient priority scheduler for time-sensitive networking switches. 21-34 - Soheil Abbasloo

, H. Jonathan Chao:
SharpEdge: an asynchronous and core-agnostic solution to guarantee bounded-delays. 35-50 - Wei Quan

, Wenwen Fu, Jinli Yan, Zhigang Sun:
OpenTSN: an open-source project for time-sensitive networking system development. 51-65 - Qiushi Gong

:
A weakly secure multiple description coding scheme in lossy multipath channels for fine-grained SVC streaming. 66-80 - Bhupendra Gupta, Jyoti Pandey:

Resilient and secure wireless sensor network under non-full visibility. 81-92
Volume 3, Number 2, October 2020
- Elisa Bertino:

Security of cellular networks position paper. 93-96 - Xingliang Yuan

, Chengjun Cai
, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. 97-111 - Suryadipta Majumdar

:
A multi-level proactive security auditing framework for clouds through automated dependency building. 112-127 - Baicheng Chen

, Kun Woo Cho
, Chenhan Xu, Zhengxiong Li, Feng Lin, Zhanpeng Jin, Wenyao Xu:
A stimulus-response based EEG biometric using mallows distance. 128-139 - Zhiqi Chen, Sheng Zhang

, Zhuzhong Qian, Can Wang, Mingjun Xiao, Jie Wu, Sanglu Lu:
Sum of squares: a new metric for NFV service chain placement in edge computing environments and efficient heuristic algorithms. 140-153
Volume 3, Numbers 3-4, December 2020
- Ju Ren, Hongbo Jiang, Xuemin Shen, John C. S. Lui, Arun K. Lyengar:

Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing. 155-157 - Jingrong Wang

, Kaiyang Liu, George Tzanetakis, Jianping Pan:
Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems. 158-170 - Xueshuo Xie, Yaozheng Fang, Zhaolong Jian, Ye Lu, Tao Li

, Guiling Wang:
Blockchain-driven anomaly detection framework on edge intelligence. 171-192 - Xiaoyi Pang, Dengfeng Guo, Zhibo Wang, Peng Sun, Liqiang Zhang:

Towards fair and efficient task allocation in blockchain-based crowdsourcing. 193-204 - Zhiguang Qin, Yuedi Li, Xin Ye, Jin Zhou, Minsheng Cao, Dajiang Chen

:
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks. 205-217 - Yichuan Wang, Yuying Tian, Xinyue Yin, Xinhong Hei

:
A trusted recommendation scheme for privacy protection based on federated learning. 218-228 - Sultan Alasmari, Weichao Wang

, Tuanfa Qin, Yu Wang
:
Proof of outsourced encryption: cross verification of security service level agreement. 229-244 - Koffka Khan

, Wayne Goodridge:
QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols. 245-260 - Majd Latah

, Levent Toker:
An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks. 261-271 - Urmila Bhanja, Chinmayee Panda:

Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication. 272-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














