


default search action
Computer Communications, Volume 192
Volume 192, August 2022
- Rajni Gupta, Juhi Gupta

:
Future generation communications with game strategies: A comprehensive survey. 1-32
- Shufen Niu

, Mi Song
, Lizhi Fang
, Fei Yu
, Song Han
, Caifen Wang
:
Keyword search over encrypted cloud data based on blockchain in smart medical applications. 33-47
- M. Poongodi

, Sami Bourouis
, Ahmed Najat Ahmed, Vijayaragavan M.
, Venkatesan K. G. S., Wajdi Alhakami, Mounir Hamdi:
A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework. 48-56
- Luca Leonardi

, Lucia Lo Bello
, Gaetano Patti
:
LoRa support for long-range real-time inter-cluster communications over Bluetooth Low Energy industrial networks. 57-65 - Alessio Ferone

, Antonio Della Porta:
A blockchain-based infection tracing and notification system by non-fungible tokens. 66-74 - Gábor Lencse

:
Design and implementation of a software tester for benchmarking stateful NATxy gateways: Theory and practice of extending siitperf for stateful tests. 75-88
- Francesco Spinelli

, Antonio Bazco Nogueras, Vincenzo Mancuso
:
Edge Gaming: A Greening Perspective. 89-105
- Rafael Lima Costa

, Aline Carneiro Viana
, Artur Ziviani, Leobino N. Sampaio
:
On building human-aware opportunistic communication strategies for cost-effective content delivery. 106-118
- Branislav Kveton, Muhammad Jehangir Amjad, Christophe Diot

, Dimitris Konomis, Augustin Soule, Xiaolong Yang:
Optimal probing with statistical guarantees for network monitoring at scale. 119-131 - Alberto Attilio Brincat, Fabio Busacca

, Laura Galluccio, Joannes Sam Mertens, A. Musumeci, Sergio Palazzo
, Andrea Panebianco
:
An integrated acoustic/LoRa system for transmission of multimedia sensor data over an Internet of Underwater Things. 132-142
- Alex X. Liu, Ali Munir, Jacek Rak

, Steve Uhlig, Jordi Domingo-Pascual:
Special Issue on IFIP Networking 2019. 143
- Shivani Gaba, Ishan Budhiraja

, Vimal Kumar
, Sahil Garg, Georges Kaddoum
, Mohammad Mehedi Hassan:
A federated calibration scheme for convolutional neural networks: Models, applications and challenges. 144-162
- Kalkidan Gebru, Marco Rapelli

, Riccardo Rusca
, Claudio Casetti
, Carla-Fabiana Chiasserini
, Paolo Giaccone
:
Edge-based passive crowd monitoring through WiFi Beacons. 163-170
- Gaia Maselli

, Laura Galluccio, Imen Grida Ben Yahia, Noura Limam:
Editorial for Special Issue on Machine Learning approaches in IoT scenarios. 171-172
- Debashisha Mishra

, Angelo Trotta, Emiliano Traversi, Marco Di Felice, Enrico Natalizio
:
Cooperative Cellular UAV-to-Everything (C-U2X) communication based on 5G sidelink for UAV swarms. 173-184
- Peshal Nayak

, Edward W. Knightly:
Virtual speed test: An AP tool for passive analysis of wireless LANs. 185-196
- Adir Solomon

, Bracha Shapira
, Lior Rokach:
Predicting application usage based on latent contextual information. 197-209 - Yuhao Wang, Jiaxun Xiao, Changgeng Li:

An adaptive regional model spectrum sensing algorithm based on TD-LTE system. 210-222 - Jernej Hribar

, Luiz A. DaSilva, Sheng Zhou, Zhiyuan Jiang, Ivana Dusparic:
Timely and sustainable: Utilising correlation in status updates of battery-powered and energy-harvesting sensors using Deep Reinforcement Learning. 223-233
- Zhipeng Cheng

, Minghui Liwang, Ning Chen, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
Deep reinforcement learning-based joint task and energy offloading in UAV-aided 6G intelligent edge networks. 234-244
- Maryam Nooraei Abadeh

, Mansooreh Mirzaie:
Resiliency-aware analysis of complex IoT process chains. 245-255 - Yuexin Sun, Xuefen Chi, Baozhu Yu, Shuang Zhao, Shuai Li, Qinglu Meng:

Hop-by-hop bandwidth allocation and deployment for SFC with end-to-end delay QoS guarantees. 256-267
- Rakesh Kumar, Shashi Shekhar, Hitendra Garg

, Mukesh Kumar
, Bhisham Sharma
, Sanjay Kumar
:
EESR: Energy efficient sector-based routing protocol for reliable data communication in UWSNs. 268-278
- Seyed Hosein Mousavi

, Jafar Pourrostam
, Mahdi Nangir
:
Low computational complexity joint iterative detection and decoding without ARQ in massive MIMO systems with UAVs. 279-288 - Wenyan Liu, Xiangyang Luo, Guo Wei, Huaixing Liu:

Node localization algorithm for wireless sensor networks based on static anchor node location selection strategy. 289-298
- Aliya Tabassum

, Aiman Erbad
, Wadha Lebda, Amr Mohamed, Mohsen Guizani:
FEDGAN-IDS: Privacy-preserving IDS using GAN and Federated Learning. 299-310
- Karima Velasquez

, David Perez Abreu
, Marília Curado
, Edmundo Monteiro:
Resource orchestration in 5G and beyond: Challenges and opportunities. 311-315
- Jaskaran Singh

, Mohammad Wazid, Ashok Kumar Das, Vinay Chamola
, Mohsen Guizani:
Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey. 316-331
- Enning Zhang, Gang Wang

, Yun Feng, Runnian Ma:
Mathematical analysis and design of PMTD strategies for an SIRO model of OS virus propagation. 332-342 - Mohamed Jarraya

, Sonda Elloumi
:
Load balancing scheduling algorithms for virtual computing laboratories in a Desktop-As-A-Service Cloud Computing Services. 343-354
- Antonio A. F. Loureiro, Carlo Giannelli:

Editorial of ACM MSWiM 2020 Special Issue. 355-356
- Himun Jyoti Nath

, Hiten Choudhury
:
A privacy-preserving mutual authentication scheme for group communication in VANET. 357-372
- Mohammad Saidur Rahman, Abdulatif Alabdulatif

, Ibrahim Khalil
:
Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge. 373-381
- Yin Zhang, Iztok Humar, Jeungeun Song, Jiafu Wan:

Special Issue on Prediction-based Caching and Computing in Cognitive Communications. 382-383
- Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua:

Formal verification of persistence and liveness in the trust-based blockchain crowdsourcing consensus protocol. 384-401
- Moutaz Alazab

:
A discrete time-varying greywolf IoT botnet detection system. 405-416
- Javad Hajipour

:
Stochastic buffer-and-server-aided relay-assisted mobile edge computing in time-slotted systems. 417-429

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














