


default search action
Computer Communications, Volume 178
Volume 178, October 2021
- Yosra Ben Slimen, Joanna Balcerzak, Albert Pagès

, Fernando Agraz
, Salvatore Spadaro, Konstantinos Koutsopoulos, Mustafa Al-Bado, Thuy Truong, Pietro G. Giardina, Giacomo Bernini
:
Quality of perception prediction in 5G slices for e-Health services using user-perceived QoS. 1-13
- Peng Liu, Shuran Lyu

, Shuqi Ma, Wanqing Wang:
Optimization algorithm of wireless surveillance data transmission task based on edge computing. 14-25
- Shengchen Wu, Haotong Cao, Haitao Zhao, Yue Hu, Longxiang Yang, Hao Yin, Hongbo Zhu:

A softwarized resource allocation framework for security and location guaranteed services in B5G networks. 26-36 - Arzoo Miglani, Neeraj Kumar

:
Blockchain management and machine learning adaptation for IoT environment in 5G and beyond networks: A systematic review. 37-63
- Linkun Fan

, Xuchuan Li, Congshuai Guo, Bingshuo Jia:
Path control of panoramic visual recognition for intelligent robots based-edge computing. 64-73 - Le Qin

, Yuanlong Cao
, Xun Shao
, Yong Luo, Xinping Rao
, Yugen Yi
, Gang Lei:
A deep heterogeneous optimization framework for Bayesian compressive sensing. 74-82
- Daqing Wang, Haoli Xu, Yue Shi, Zhibin Ding, Zhengdong Deng, Zhixin Liu

, Xingang Xu, Zhao Lu, Guangyuan Wang, Zijian Cheng, Xiaoning Zhao:
The groundwater potential assessment system based on cloud computing: A case study in islands region. 83-97
- Mohamed Said Frikha

, Sonia Mettali Gammar
, Abdelkader Lahmadi
, Laurent Andrey:
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey. 98-113
- Bowen Shen

, Xiaolong Xu
, Lianyong Qi, Xuyun Zhang
, Gautam Srivastava
:
Dynamic server placement in edge computing toward Internet of Vehicles. 114-123
- Mingshuai Dong, Shimin Wei, Xiuli Yu, Jianqin Yin:

MASK-GD segmentation based robotic grasp detection. 124-130
- Huaping Jia, Jun Liu, Min Zhang, Xiaohu He, Weixi Sun:

Network intrusion detection based on IE-DBN model. 131-140
- Xisheng Xiao, Jin Sun, Jinxin Yang:

Operation and maintenance(O&M) for data center: An intelligent anomaly detection approach. 141-152
- Ye Chen, Hongchun Shu, Wenjiao Xu, Zhengyu Yang, Zhihu Hong, Mingshuai Dong

:
Transformer text recognition with deep learning algorithm. 153-160
- Suchi Kumari

, Rajesh Kumar, Seifedine Nimer Kadry, Suyel Namasudra, David Taniar
:
Maintainable stochastic communication network reliability within tolerable packet error rate. 161-168 - Avinash Swaminathan

, Mridul Chaba, Deepak Kumar Sharma
, Uttam Ghosh
:
GraphNET: Graph Neural Networks for routing optimization in Software Defined Networks. 169-182
- Hongzhi Cui:

Handoff control strategy of cyber physical systems under dynamic data attack. 183-190
- Zikang Wei, Yunqing Liu:

Construction of super-resolution model of remote sensing image based on deep convolutional neural network. 191-200
- Jian Wang, Yulan Hu, Yining Wang, Qingshan Zhao:

Anomaly detection method of packet loss node location in heterogeneous hash networks. 201-211
- Shasha Zhao, Gan Yu:

Channel allocation optimization algorithm for hybrid wireless mesh networks for information physical fusion system. 212-220
- Jalal Al-Muhtadi

, Rawan A. Alamri, Farrukh Aslam Khan
, Kashif Saleem
:
Subjective logic-based trust model for fog computing. 221-233 - Yanna Wang, Xinyue Zhou, Jian Sun, Xiaoye Li, Junping Zhang:

Optimization of network sensor node location based on edge coverage control. 234-244
- Yu Liu, Junxin Chen

, Nan Bao
, Brij B. Gupta
, Zhihan Lv
:
Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things. 245-258
- Faezeh Sharifi, Soroush Akhlaghi:

Maximizing the minimum secrecy rate of two-way relay networks. 259-270 - Xin Li, Liang Liu, Lisong Wang, Jie Xi, Jianfei Peng, Jingwen Meng:

Trajectory-aware spatio-temporal range query processing for unmanned aerial vehicle networks. 271-285
- Jie Mu, Xianchao Zhang, Yuangang Li, Jun Guo

:
Deep neural network for text anomaly detection in SIoT. 286-296
- Sandeep Kumar Sood, Keshav Singh Rawat

:
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations. 297-306

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














