


default search action
Computer Communications, Volume 190
Volume 190, June 2022
- Alireza R. Erfanian

, Farzad Tashtarian, Christian Timmerer
, Hermann Hellwagner:
QoCoVi: QoE- and cost-aware adaptive video streaming for the Internet of Vehicles. 1-9 - Andrey Samuylov

, Dmitri Moltchanov
, Roman Kovalchukov
, Anna Gaydamaka
, Alexander Pyattaev, Yevgeni Koucheryavy
:
GAR: Gradient assisted routing for topology self-organization in dynamic mesh networks. 10-23
- Himanshu Mittal, Ashish Kumar Tripathi, Avinash Chandra Pandey, Mohammad Dahman Alshehri, Mukesh Saraswat, Raju Pal

:
A new intrusion detection method for cyber-physical system in emerging industrial IoT. 24-35
- Raphaël Frank, Michele Segata, Uichin Lee:

Special Issue on the 16th Wireless On-demand Network systems and Services Conference. 36
- G. Hemanth Kumar

, Ramesh G. P.:
Node localization algorithm for detecting malicious nodes to prevent connection failures and improve end-to-end delay. 37-47 - R. Yesodha, T. Amudha:

A bio-inspired approach: Firefly algorithm for Multi-Depot Vehicle Routing Problem with Time Windows. 48-56
- Josep Domingo-Ferrer, Sergio Martínez, David Sánchez:

Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat. 57-68
- K. A. Apoorva, S. Sangeetha:

Analysis of uniform resource locator using boosting algorithms for forensic purpose. 69-77
- Nouman Bashir, Saadi Boudjit, Sherali Zeadally:

A closed-loop control architecture of UAV and WSN for traffic surveillance on highways. 78-86
- Susovan Chanda, Ashish Kumar Luhach

, Waleed S. Alnumay
, Indranil SenGupta, Diptendu Sinha Roy
:
A lightweight device-level Public Key Infrastructure with DRAM based Physical Unclonable Function (PUF) for secure cyber physical systems. 87-98
- Xue Xue

, Wei Sun
, Jianping Wang, Qiyue Li
, Haiyan Zhang, Daoming Mu:
Lower boundary based nonlinear model predictive control of transmission power for smart grid WSNs. 99-109 - Thankgod Obasi, M. Omair Shafiq

:
CARD-B: A stacked ensemble learning technique for classification of encrypted network traffic. 110-125 - Ali Mohsenzadeh

, Amir Jalaly Bidgoly
, Yaghoub Farjami:
A novel reputation-based consensus framework (RCF) in distributed ledger technology. 126-144
- Haibo Yi

:
Fast asymmetric encryption and decryption of SimpleMatrix scheme for Internet of Things. 145-153
- Faris A. Almalki, Marios C. Angelides

:
Autonomous flying IoT: A synergy of machine learning, digital elevation, and 3D structure change detection. 154-165 - Yu Liang

, Sheng Zhang
, Jidong Ge:
Joint optimization of collaborative interactive charging and charging lane placement for cyclic electric vehicles. 166-177 - Asad Mahmood

, Ashfaq Ahmed
, Muhammad Naeem
, Muhammad Rizwan Amirzada
, Arafat Al-Dweik
:
Weighted utility aware computational overhead minimization of wireless power mobile edge cloud. 178-189 - Yakup Tarik Kranda

, Ruya Samli
:
A novel clustering based algorithm to mitigate the demand of forecasting errors for newly deployed LTE cells with insufficient historical data. 190-200 - Tina Samizadeh Nikoui

, Amir Masoud Rahmani
, Ali Balador, Hamid Haj Seyyed Javadi
:
Analytical model for task offloading in a fog computing system with batch-size-dependent service. 201-215
- Chetna Singhal

, Deepak Kumar Jain, Alberto Tarable, Anand Nayyar:
Special Issue on Smart Green Computing for Wireless Sensor Networks. 216-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














