


default search action
Computer Communications, Volume 157
Volume 157, May 2020
- Piotr Borylo

, Massimo Tornatore
, Piotr Jaglarz, Nashid Shahriar
, Piotr Cholda
, Raouf Boutaba:
Latency and energy-aware provisioning of network slices in cloud networks. 1-19
- Chong Tian, Xiqiu Hu:

Mathematical modeling of security impact analysis of communication network based on Monte Carlo algorithm. 20-27
- Chao Wang, Jilian Guo, Anwei Shen:

Sensitivity analysis of censoring data from component failure analysis and reliability evaluation for the aviation internet of things. 28-37
- Fan Wu

, Xiong Li
, Lili Xu, Saru Kumari
:
A privacy-preserving scheme with identity traceable property for smart grid. 38-44
- Qunying Chen:

Wireless network signal monitoring based on LAN packet capture and protocol analysis on grid programming. 45-52
- Shihong Hu, Guanghui Li:

TMSE: A topology modification strategy to enhance the robustness of scale-free wireless sensor networks. 53-63
- G. Thippa Reddy

, R. M. Swarna Priya
, Parimala M., Chiranji Lal Chowdhary, M. Praveen Kumar Reddy
, Saqib Hakak, Wazir Zada Khan
:
A deep neural networks based model for uninterrupted marine environment monitoring. 64-75
- Lei Yu, Babar Nazir

, Yinling Wang:
Intelligent power monitoring of building equipment based on Internet of Things technology. 76-84
- Xuesong Zhang:

Automatic underground space security monitoring based on BIM. 85-91
- Robson D. A. Timoteo, Daniel C. Cunha:

A scalable fingerprint-based angle-of-arrival machine learning approach for cellular mobile radio localization. 92-101
- Fazeel Abid, Chen Li, Muhammad Alam:

Multi-source social media data sentiment analysis using bidirectional recurrent convolutional neural networks. 102-115
- Weiyi Zhong, Xiaochun Yin, Xuyun Zhang

, Shancang Li, Wanchun Dou, Ruili Wang, Lianyong Qi:
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment. 116-123
- Mingzhe Wang, Qiuliang Zhang:

Optimized data storage algorithm of IoT based on cloud computing in distributed system. 124-131
- Dimitri Belli

, Stefano Chessa, Antonio Corradi
, Luca Foschini
, Michele Girolami:
Optimization strategies for the selection of mobile edges in hybrid crowdsensing architectures. 132-142
- Shiwen Liu, Kan Zheng

, Long Zhao, Pingzhi Fan:
A driving intention prediction method based on hidden Markov model for autonomous driving. 143-149
- Hanxin Chen, Yongting Chen, Liu Yang:

Intelligent early structural health prognosis with nonlinear system identification for RFID signal analysis. 150-161
- Leonardo Chancay-Garcia, Enrique Hernández-Orallo, Pietro Manzoni, Anna Maria Vegni

, Valeria Loscrí
, Juan-Carlos Cano, Carlos T. Calafate:
Optimising message broadcasting in opportunistic networks. 162-178
- Ranran Liu, Hongxiang Xu, Enxing Zheng, Yifeng Jiang, Shan Chang:

Quality estimation of CPS network link based on non-uniformly sampling period. 179-186
- Sharmistha Adhikari, Sangram Ray

, Mohammad S. Obaidat, G. P. Biswas:
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure. 187-203
- Jindong Zhao

, Xingzuo Yue:
Condition monitoring of power transmission and transformation equipment based on industrial internet of things technology. 204-212
- Kai Li, Wei Sun:

Presentation and interaction of Internet of Things data based on augmented reality. 213-220
- Zhe Yao, Kun Gao:

User recommendation method based on joint probability matrix decomposition in CPS networks. 221-231
- Steve Chukwuebuka Arum, David Grace, Paul Daniel Mitchell:

A review of wireless communication using high-altitude platforms for extended coverage and capacity. 232-256 - Divya Pandey, Vandana Kushwaha:

An exploratory study of congestion control techniques in Wireless Sensor Networks. 257-283 - Jiacheng Wang

, Zengshan Tian, Xiaolong Yang, Mu Zhou:
TWPalo: Through-the-wall passive localization of moving human with Wi-Fi. 284-297 - Shi-Cho Cha, Kuo-Hui Yeh, Zijia Huang:

bleRPC: A plug-and-play RPC framework over BLE. 298-307
- Teemu Leppänen, Claudio Savaglio

, Giancarlo Fortino:
Service modeling for opportunistic edge computing systems with feature engineering. 308-319
- Md. Arafatur Rahman, A. Taufiq Asyhari

, Ibnu Febry Kurniawan
, Md Jahan Ali, Mahbubur Rahman, Mahima Karim:
A scalable hybrid MAC strategy for traffic-differentiated IoT-enabled intra-vehicular networks. 320-328
- Abdul Rehman

, Anand Paul
, Awais Ahmad, Gwanggil Jeon:
A novel class based searching algorithm in small world internet of drone network. 329-335
- Hechuang Wang:

Research on real-time reliability evaluation of CPS system based on machine learning. 336-342
- Jie Ren, Fuyu Guan, Ming Pang, Shuangling Li:

Monitoring of human body running training with wireless sensor based wearable devices. 343-350
- Zhihua Lin, Guang Li, Jianqing Li

:
Cross-layer energy optimization in cooperative MISO wireless sensor networks. 351-360
- Qi Wu:

Applications and theoretical challenges in environmental emergency issues alerting system on IoT intelligence. 361-368
- Sumana Maiti

, Sudip Misra
:
GROSE: Optimal group size estimation for broadcast proxy re-encryption. 369-380
- Zhiyong Sun, Junyong Ye

, Tongqing Wang, Shijian Huang, Jin Luo:
Behavioral feature recognition of multi-task compressed sensing with fusion relevance in the Internet of Things environment. 381-393
- Zhouping Yin, Keming Yu

, Yuanzhi Wang:
Robust control algorithm and simulation of networked control systems. 394-401
- Jianhua Peng, Ken Cai, Xiaojing Jin:

High concurrency massive data collection algorithm for IoMT applications. 402-409
- Quan Liu, Bei Gong, Zhenhu Ning:

Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment. 410-416 - Meiyu Sun:

A method for determining parameter weight early warning model based on reinforcement learning. 417-422
- Mahdi Khosravy

, Neeraj Gupta
, Nilesh Patel, Nilanjan Dey, Naoko Nitta, Noboru Babaguchi:
Probabilistic Stone's Blind Source Separation with application to channel estimation and multi-node identification in MIMO IoT green communication and multimedia systems. 423-433
- Navid Ali Khan

, N. Z. Jhanjhi
, Sarfraz Nawaz Brohi
, Raja Sher Afgun Usmani
, Anand Nayyar:
Smart traffic monitoring system using Unmanned Aerial Vehicles (UAVs). 434-443
- Shulei Wu, Huandong Chen:

Smart city oriented remote sensing image fusion methods based on convolution sampling and spatial transformation. 444-450
- Fangfang Xue, Jumin Zhao, Dengao Li:

Precise localization of RFID tags using hyperbolic and hologram composite localization algorithm. 451-460

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














