


default search action
Computer Communications, Volume 188
Volume 188, April 2022
- Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Gautam Srivastava

:
A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems. 1-12
- Meng Wang

, Dian-Wu Yue, Si-Nian Jin:
Full-duplex cell-free mMIMO networks with coarse ADCs/DACs over Ricean fading for beyond 5G. 13-25 - Shengyu Zhang

, Kwan L. Yeung:
Scalable routing in low-Earth orbit satellite constellations: Architecture and algorithms. 26-38
- Natalia Yarkina

, Luís M. Correia, Dmitri Moltchanov
, Yuliya Gaidamaka
, Konstantin E. Samouylov
:
Multi-tenant resource sharing with equitable-priority-based performance isolation of slices for 5G cellular systems. 39-51
- Preetam Amrit, Amit Kumar Singh

:
Survey on watermarking methods in the artificial intelligence domain and beyond. 52-65
- Yangbin Zhang, Lihua Liu, Mao Wang

, Jibing Wu, Hongbin Huang:
An improved routing protocol for raw data collection in multihop wireless sensor networks. 66-80
- Senthil Murugan Nagarajan

, Ganesh Gopal Deverajan
, Ali Kashif Bashir
, Rajendra Prasad Mahapatra, Mohammed S. Al-Numay
:
IADF-CPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems. 81-89
- Ting Xu

, Ming Zhao
, Xin Yao, Yusen Zhu:
An improved communication resource allocation strategy for wireless networks based on deep reinforcement learning. 90-98
- Marc Carrascosa

, Boris Bellalta
:
Cloud-gaming: Analysis of Google Stadia traffic. 99-116 - Shibao Li

, Quanyu Li, Jianhang Liu, Tingpei Huang, Xuerong Cui:
Resource allocation based on multi-grouping and frame expansion for NOMA backscatter communication network. 117-124 - Bin Wang

, Guoqing Duan
:
A reliable cardinality estimation for missing tags over a noisy channel. 125-132
- Ranjit Panigrahi

, Samarjeet Borah
, Moumita Pramanik
, Akash Kumar Bhoi
, Paolo Barsocchi
, Soumya Ranjan Nayak
, Waleed S. Alnumay
:
Intrusion detection in cyber-physical environment using hybrid Naïve Bayes - Decision table and multi-objective evolutionary feature selection. 133-144
- Jinquan Liu, Tongtong Zou:

Identifying the outlier in tunnel monitoring data: An integration model. 145-155
- Atefeh Khatiri, Ghasem Mirjalily

:
A cost-efficient, load-balanced and fragmentation-aware approach for deployment of VNF service chains in Elastic Optical Networks. 156-166
- Ahmadreza Jame, Marco Rapelli

, Claudio Casetti
:
Reducing pollutant emissions through Virtual Traffic Lights. 167-177

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














