


default search action
Computer Communications, Volume 194
Volume 194, October 2022
- Yuhuan Liu

, Fengyun Zhang
, Yulong Ding
, Jie Jiang
, Shuang-Hua Yang
:
Sub-messages extraction for industrial control protocol reverse engineering. 1-14 - Oren Markovitz, Michael Segal

:
Asymmetric Differential Routing for low orbit satellite constellations. 15-28
- David A. Hayes

, David Ros
, Özgü Alay
, Peyman Teymoori
, Tine Margretha Vister
:
Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication. 29-43
- Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong:

Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement. 44-54
- Ivandro Ortet Lopes

, Deqing Zou, Ihsan H. Abdulqadder
, Francis A. Ruambo
, Bin Yuan
, Hai Jin:
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach. 55-65 - Kun Jiang

, Shaofeng Du, Fu Zhao, Yong Huang, Chunlin Li, Youlong Luo:
Effective data management strategy and RDD weight cache replacement strategy in Spark. 66-85
- Ghada Alsuhli

, Ahmed Fahim
, Yasser Gadallah:
A survey on the role of UAVs in the communication process: A technological perspective. 86-123
- Ravi Shukla, Sasthi C. Ghosh

:
Distributed relay switching in the presence of dynamic obstacles in millimeter wave D2D communication. 124-134
- Constantine Ayimba

, Michele Segata
, Paolo Casari
, Vincenzo Mancuso
:
Driving under influence: Robust controller migration for MEC-enabled platooning. 135-147
- Lei Liu

, Tong Ding
, Hui Feng, Zhongmin Yan, Xudong Lu:
Tree sketch: An accurate and memory-efficient sketch for network-wide measurement. 148-155 - Xuyang Liu

:
GLMLP-TRANS: A transportation mode detection model using lightweight sensors integrated in smartphones. 156-166
- Van Thanh Le

, Nabil El Ioini
, Hamid R. Barzegar
, Claus Pahl
:
Trust management for service migration in Multi-access Edge Computing environments. 167-179
- Lunyuan Chen, Shunpu Tang

, Venki Balasubramanian
, Junjuan Xia, Fasheng Zhou, Lisheng Fan:
Physical-layer security based mobile edge computing for emerging cyber physical systems. 180-188
- Christian Sauer

, Eike Lyczkowski
, Marco Schmidt
, Andreas Nüchter
, Tobias Hoßfeld
:
Testing AGV mobility control method for MANET coverage optimization using procedural simulation. 189-201
- Hareesh Ayanampudi

, Ravindra Dhuli:
Performance analysis of Heterogeneous Cloud-Radio Access Networks: A user-centric approach with network scalability. 202-212 - Chiara Caiazza

, Silvia Giordano, Valerio Luconi
, Alessio Vecchio
:
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes. 213-225 - Marcus V. G. Ferreira

, Flávio H. T. Vieira
, Álisson A. Cardoso
:
Power and delay optimization based uplink resource allocation for wireless networks with device-to-device communications. 226-239
- Kaijun Cheng

, Xuming Fang
, Xianbin Wang
:
Optimized resource allocation and time partitioning for integrated communication, sensing, and edge computing network. 240-249
- Jun Jiang

, Fagui Liu, Yongheng Liu, Quan Tang, Bin Wang, Guoxiang Zhong, Weizheng Wang:
A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams. 250-257 - Mariya Tauqeer

, Saddaf Rubab, Muhammad Attique Khan, Rizwan Ali Naqvi
, Kashif Javed
, Abdullah Alqahtani
, Shtwai Alsubai
, Adel Binbusayyis:
Driver's emotion and behavior classification system based on Internet of Things and deep learning for Advanced Driver Assistance System (ADAS). 258-267
- Qiang Tang

, Linjiang Li, Caiyan Jin, Lixin Liu, Jin Wang, Zhuofan Liao, Yuansheng Luo:
Heterogeneous UAVs assisted mobile edge computing for energy consumption minimization of the edge side. 268-279
- Falko Dressler, Carla-Fabiana Chiasserini:

Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan. 280-281
- Saif Ur Rehman Malik

, Adeel Anjum, Syed Atif Moqurrab
, Gautam Srivastava
:
Towards enhanced threat modelling and analysis using a Markov Decision Process. 282-291 - Mukesh Soni

, Dileep Kumar Singh
:
Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare. 292-300
- Pengmiao Li

, Yuchao Zhang
, Wendong Wang, Weiliang Meng, Yi Zheng, Ke Xu, Zhili Zhang:
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network. 301-310
- Oussama Serhane

, Khadidja Yahyaoui
, Boubakr Nour
, Rasheed Hussain
, Syed Muhammad Ahsan Kazmi, Hassine Moungla:
PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks. 311-320
- Xiao Zheng

, Syed Bilal Hussain Shah, Ali Kashif Bashir, Raheel Nawaz
, Omer F. Rana
:
Distributed hierarchical deep optimization for federated learning in mobile edge computing. 321-328
- Neeraj Kumar, Gagangeet Singh Aujla, Mohammad S. Obaidat, Rongxing Lu, Song Guo:

Advanced computing and communication technologies for Internet of Drones. 329-332
- Jing Tan

, Ramin Khalili, Holger Karl, Artur Hecker:
Multi-agent reinforcement learning for long-term network resource allocation through auction: A V2X application. 333-347
- Weiping Zheng, Yiyong Li, Minli Hong, Xiaomao Fan, Gansen Zhao:

Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results. 348-360 - Faegheh Seifhashemi

, Behrouz Shahgholi Ghahfarokhi
, Neda Moghim
:
Mobility-aware incentive mechanism for relaying D2D communications. 361-377
- Manash Kumar Mondal

, Riman Mandal
, Sourav Banerjee
, Utpal Biswas, Pushpita Chatterjee, Waleed S. Alnumay
:
A CPS based social distancing measuring model using Edge and Fog computing. 378-386
- Shanqing Jiang

, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou:
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network. 387-398
- Dan Ye

, Xiaogang Wang, Jin Hou:
Balanced multi-access edge computing offloading strategy in the Internet of things scenario. 399-410
- Francesca Righetti

, Carlo Vallati, Marco Tiloca
, Giuseppe Anastasi:
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. 411-432 - Fatemeh Yaghoubpour

, Bahador Bakhshi, Fateme Seifi
:
End-to-end delay guaranteed Service Function Chain deployment: A multi-level mapping approach. 433-445 - Lingqiang Chen

, Pei Shi, Guanghui Li, Tao Qi:
Traffic flow prediction using multi-view graph convolution and masked attention mechanism. 446-457 - Zhen Zhang

, Jie Lu
, Hongchang Chen:
Controller robust placement with dynamic traffic in software-defined networking. 458-467

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














