


default search action
Computer Networks, Volume 137
Volume 137, June 2018
- Yu-Ting Lin

, Thomas Bonald, Salah-Eddine Elayoubi:
Flow-level traffic model for adaptive streaming services in mobile networks. 1-16
- Ryoichi Shinkuma

, Yusuke Tanaka, Yoshinobu Yamada, Eiji Takahashi, Takeo Onishi:
User instruction mechanism for temporal traffic smoothing in mobile networks. 17-26
- Muhammad Awais Javed

, Sherali Zeadally, Zara Hamid
:
Trust-based security adaptation mechanism for Vehicular Sensor Networks. 27-36 - Sabrina Sicari, Alessandra Rizzardi, Daniele Miorandi, Alberto Coen-Porisini:

REATO: REActing TO Denial of Service attacks in the Internet of Things. 37-48 - Chunsheng Xin, Sharif Ullah

, Min Song, Zhao Wu, Qiong Gu, Huanqing Cui:
Throughput oriented lightweight near-optimal rendezvous algorithm for cognitive radio networks. 49-60 - Zhengyu Zhu

, Zhongyong Wang, Zheng Chu, Di Zhang, Byonghyo Shim
:
Robust energy harvest balancing optimization with V2X-SWIPT over MISO secrecy channel. 61-68
- Mahdi Zareei

, Cesar Vargas-Rosales
, Rafaela Villalpando Hernandez
, Leyre Azpilicueta
, Mohammad Hossein Anisi
, Mubashir Husain Rehmani
:
The effects of an Adaptive and Distributed Transmission Power Control on the performance of energy harvesting sensor networks. 69-82 - Suman Bhunia

, Paulo Alexandre Regis
, Shamik Sengupta:
Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks. 83-97
- Danda B. Rawat

, Reham Alsabet
, Chandra Bajracharya, Min Song:
On the performance of cognitive internet-of-vehicles with unlicensed user-mobility and licensed user-activity. 98-106
- N. Anand

, Sarath Babu
, B. S. Manoj
:
On detecting compromised controller in software defined networks. 107-118 - Sungjin Kim

, Jinkook Kim, Seokwoo Nam, Dohoon Kim:
WebMon: ML- and YARA-based malicious webpage detection. 119-131 - Yunchong Guan

, Weimin Lei, Wei Zhang, Shaowei Liu, Hao Li:
Scalable orchestration of software defined service overlay network for multipath transmission. 132-146
- Ali Safa Sadiq

, Suleman Khan
, Kayhan Zrar Ghafoor
, Mohsen Guizani, Seyedali Mirjalili
:
Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information. 147-159 - Wei Guo

, Mahendran Veeramani
, Sridhar Radhakrishnan
:
Join and spilt TCP for SDN networks: Architecture, implementation, and evaluation. 160-172 - Mohammed Amer, Anthony Busson, Isabelle Guérin Lassous:

Association optimization based on access fairness for Wi-Fi networks. 173-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














