


default search action
Computer Communications, Volume 161
Volume 161, September 2020
- Tanveer Ahmed, Rishav Singh

, Anil K. Pandey, Sanjay Kumar Singh
:
A cognitive model to predict human interest in smart environments. 1-9
- Qizhong Li, Yizheng Yue, Zhongqi Wang:

Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For IIOT secured transmission in cloud computing. 10-18
- Zhihan Lv

, Liang Qiao
:
Optimization of collaborative resource allocation for mobile edge computing. 19-27
- Yue Wang

, Jiguo Yu, Biwei Yan, Guijuan Wang, Zhiguang Shan:
BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme. 28-40
- Chaonong Xu, Jianxiong Wu, Chao Li:

Reliable uplink transmissions for NOMA-based Industrial Wireless Networks with guaranteed real-time performance. 41-49
- Akshay Jain

, Elena López-Aguilera, Ilker Demirkol
:
Are mobility management solutions ready for 5G and beyond? 50-75
- Salih Safa Bacanli, Damla Turgut:

Energy-efficient unmanned aerial vehicle scanning approach with node clustering in opportunistic networks. 76-85
- Girma M. Yilma

, Faqir Zarrar Yousaf, Vincenzo Sciancalepore
, Xavier Pérez Costa
:
Benchmarking open source NFV MANO systems: OSM and ONAP. 86-98 - Wallas Froes, Lucas Santos, Leobino N. Sampaio, Magnos Martinello, Alextian B. Liberato

, Rodolfo da Silva Villaça:
ProgLab: Programmable labels for QoS provisioning on software defined networks. 99-108 - Masoumeh Etemadi, Mostafa Ghobaei-Arani

, Ali Shahidinejad
:
Resource provisioning for IoT services in the fog computing environment: An autonomic approach. 109-131
- Linhui Cheng, Luo Zhong, Xiao Zhang

, Jiaxu Xing:
A staged adaptive firefly algorithm for UAV charging planning in wireless sensor networks. 132-141
- Xin Niu

, Jiazhong Lu:
Moving target defense controller of mobile system based on Openflow sensor security scheme. 142-149
- Prince Abudu, Andrew Markham:

Learning distributed communication and computation in the IoT. 150-159
- Celestine Iwendi

, Syed Atif Moqurrab, Adeel Anjum, Sangeen Khan, Senthilkumar Mohan, Gautam Srivastava
:
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets. 160-171
- Jin Yang, Tao Li, Gang Liang, Yunpeng Wang, Tianyu Gao, Fangdong Zhu:

Spam transaction attack detection model based on GRU and WGAN-div. 172-182
- Ying Sai

, Dong-zhu Fan, Meng-yang Fan:
Cooperative and efficient content caching and distribution mechanism in 5G network. 183-190
- Antonio Franco

, Björn Landfeldt, Ulf Körner:
Extended analysis of Age of Information threshold violations. 191-201
- Zhengjun Jing

, Chunsheng Gu, Yong Li, Mengshi Zhang, Guangquan Xu, Alireza Jolfaei
, Peizhong Shi, Chenkai Tan
, James Xi Zheng
:
Security analysis of indistinguishable obfuscation for internet of medical things applications. 202-211
- Elie F. Kfoury

, Jose Gomez, Jorge Crichigno
, Elias Bou-Harb:
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband. 212-224
- Federico Montori

, Luca Bedogni, Claudio Fiandrino
, Andrea Capponi
, Luciano Bononi
:
Performance evaluation of hybrid crowdsensing systems with stateful CrowdSenSim 2.0 simulator. 225-237
- Morteza Kheirkhah

, Myungjin Lee:
A solution to MPTCP's inefficiencies under the incast problem for Data Center Networks. 238-247
- Gunasekaran Manogaran, Bharat S. Rawal, Vijayalakshmi Saravanan, Priyan Malarvizhi Kumar

, Oscar Sanjuán Martínez, Rubén González Crespo
, Carlos Enrique Montenegro-Marín
, Sujatha Krishnamoorthy:
Blockchain based integrated security measure for reliable service delegation in 6G communication environment. 248-256
- Jian Hu, Junjie Wang, Hangqi Xie:

Wearable bracelets with variable sampling frequency for measuring multiple physiological parameter of human. 257-265
- Katty Rohoden, Rebeca Estrada

, Hadi Otrok, Zbigniew Dziong:
Evolutionary game theoretical model for stable femtocells' clusters formation in HetNets. 266-278
- Karan Sheth

, Keyur Patel
, Het Shah, Sudeep Tanwar
, Rajesh Gupta
, Neeraj Kumar
:
A taxonomy of AI techniques for 6G communication networks. 279-303
- Aparna Kumari, Rajesh Gupta

, Sudeep Tanwar
, Neeraj Kumar
:
A taxonomy of blockchain-enabled softwarization for secure UAV network. 304-323
- Qingqing Ren, Liang Zhou, Zhijun Xu, Yujun Zhang, Lei Zhang:

PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing. 324-333 - Zhixin Liu, Heng Zhu, Yazhou Yuan, Yi Yang, Kit Yan Chan:

Optimization of base station density and user transmission power in multi-tier heterogeneous cellular systems. 334-343 - Miroslaw Klinkowski

:
Optimization of latency-aware flow allocation in NGFI networks. 344-359
- Yu Peng, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang, Luyu Zhang, Pengwei Wang, Chengwu Ming, Xiaobo Mi:

Sensing network security prevention measures of BIM smart operation and maintenance system. 360-367
- Haoran Mei, Limei Peng:

Flexible functional split for cost-efficient C-RAN. 368-374
- Yuxin Liu

, Tian Wang
, Shaobo Zhang
, Xuxun Liu, Xiao Liu:
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing. 375-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














