


default search action
Computer Communications, Volume 182
Volume 182, January 2022
- Anix Anbiah

, Krishna M. Sivalingam
:
Efficient failure recovery techniques for segment-routed networks. 1-12 - Jameel Ali

, Majid Altamimi
:
Energy consumption model for data transfer in smartphone. 13-21
- Yanrong Lu

, Dawei Zhao
:
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. 22-30
- Sulaiman Khan

, Anwar Hussain
, Shah Nazir
, Fazlullah Khan
, Ammar Oad
, Mohammad Dahman Alshehri
:
Efficient and reliable hybrid deep learning-enabled model for congestion control in 5G/6G networks. 31-40
- Xiaopeng Yao

, Yue Gu, Chonglin Gu, Hejiao Huang
:
Fast controlling of rumors with limited cost in social networks. 41-51
- Liang Zhao, Chunyang Mo

, Jiajun Ma
, Zhikui Chen, Chenhui Yao
:
LSTM-MFCN: A time series classifier based on multi-scale spatial-temporal features. 52-59
- Peng Dai

, Yawen Wang, Dahai Jin, Yunzhan Gong, Wenjin Yang:
An improving approach to analyzing change impact of C programs. 60-71
- Pandit Byomakesha Dash

, Bighnaraj Naik, Janmenjoy Nayak
, S. Vimal
:
Socio-economic factor analysis for sustainable and smart precision agriculture: An ensemble learning approach. 72-87
- Noura Aljeri

, Azzedine Boukerche:
A novel proactive controller deployment protocol for 5G-enabled software-defined Vehicular Networks. 88-97
- Michael Markovitch, Gabriel Scalosub:

Bounded delay scheduling with packet dependencies. 98-109
- Zhan Shi, Huina Wei, Jian Zhu:

Edge computing-empowered task offloading in PLC-wireless integrated network based on matching with quota. 110-116
- Wanli Xue, Yiran Shen, Chengwen Luo, Weitao Xu

, Wen Hu
, Aruna Seneviratne:
A differential privacy-based classification system for edge computing in IoT. 117-128
- Yehia Ibrahim Alzoubi

, Ahmad Salah Al-Ahmad
, Hasan Kahtan
:
Blockchain technology as a Fog computing security and privacy solution: An overview. 129-152
- Ali El Kamel

, Hamdi Eltaief
, Habib Youssef:
On-the-fly (D)DoS attack mitigation in SDN using Deep Neural Network-based rate limiting. 153-169
- Jian Zhu, Qian Li, Shi Ying

:
SAAS parallel task scheduling based on cloud service flow load algorithm. 170-183
- Andrea Pimpinella

, Marianna Repossi, Alessandro E. C. Redondi
:
Unsatisfied today, satisfied tomorrow: A simulation framework for performance evaluation of crowdsourcing-based network monitoring. 184-197
- Sayed Qaiser Ali Shah, Farrukh Zeeshan Khan, Muneer Ahmad

:
Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. 198-211
- Jiamin Zheng, Shupan Li, Shengang Hao, Yuanzhang Li, Yu Zhang:

ZM-CTC: Covert timing channel construction method based on zigzag matrix. 212-222
- Md. Munjure Mowla

, Iftekhar Ahmad
, Daryoush Habibi
, Quoc Viet Phung, M. Ishtiaque Aziz Zahed:
Green traffic backhauling in next generation wireless communication networks incorporating FSO/mmWave technologies. 223-237
- Yuyao Huang

, Hui Shu, Fei Kang, Yan Guang:
Protocol Reverse-Engineering Methods and Tools: A Survey. 238-254 - Jingfu Lu, Jiuling Li:

Two-phase sample average approximation for video distribution strategy of edge computing in heterogeneous network. 255-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














