


default search action
Computer Communications, Volume 197
Volume 197, January 2023
- Mohammed A. Hathibelagal

, Rosario Giuseppe Garroppo
, Gianfranco Nencioni
:
Experimental comparison of migration strategies for MEC-assisted 5G-V2X applications. 1-11 - Girish Sharma

, Jyoti Grover
, Abhishek Verma
:
Performance evaluation of mobile RPL-based IoT networks under version number attack. 12-22 - Liqing Shan

, Songtao Gao, Shuaishuai Chen, Mingkai Xu, Fenghui Zhang, Xuecai Bao, Ming Chen:
Energy-efficient resource allocation in NOMA-integrated V2X networks. 23-33
- Deepanshi

, Ishan Budhiraja
, Deepak Garg
, Neeraj Kumar, Rohit Sharma:
A comprehensive review on variants of SARS-CoVs-2: Challenges, solutions and open issues. 34-51
- Suhong Wang, Hongqing Wang, Shufeng She, Yanping Zhang, Qingju Qiu, Zhifeng Xiao

:
Swin-T-NFC CRFs: An encoder-decoder neural model for high-precision UAV positioning via point cloud super resolution and image semantic segmentation. 52-60
- Majid Abiri, Mehri Mehrjoo

, Mehdi Rezaei:
Femtocell deployment for scalable video transmission in 5G networks. 61-70 - Jiuyuan Huo, Shubin Lu

, Jiguang Yang
, Lei Wang
, Hamzah Murad Mohammed Al-Neshmi
:
An area autonomous routing protocol based on multi-objective optimization methods for field observation instrument network. 71-86 - Yong Zhang

, Yuqing Yin
, Yujie Wang
, Jiaqiu Ai
, Dingchao Wu
:
CSI-based location-independent Human Activity Recognition with parallel convolutional networks. 87-95 - Rajasekhar Chaganti, Bharat Bhushan, Vinayakumar Ravi

:
A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions. 96-112 - Xiangjun Zhang

, Weiguo Wu
, Song Liu, Jinyu Wang:
An efficient computation offloading and resource allocation algorithm in RIS empowered MEC. 113-123 - Sanjeev Kumar Dwivedi

, Ruhul Amin
, Satyanarayana Vollala:
Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability. 124-140 - Usman Haider

, Muhammad Waqas
, Muhammad Hanif
, Hisham Alasmary
, Saeed Mian Qaisar
:
Network load prediction and anomaly detection using ensemble learning in 5G cellular networks. 141-150
- Agon Memedi

, Falko Dressler:
A Location-Aware RF-Assisted MAC Protocol for Sectorized Vehicular Visible Light Communications. 151-158
- Ravi Yadav

, Gaurav Baranwal
:
ReTREM: A responsibility based trust revision model for determining trustworthiness of fog nodes. 159-172
- Ankush Mitra, Basudeb Bera

, Ashok Kumar Das, Sajjad Shaukat Jamal, Ilsun You
:
Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment. 173-185
- Rui Xu

, Xiaoqiang Di
, Jing Chen
, Haowei Wang, Hao Luo
, Hui Qi, Xiongwen He, Wenping Lei, Shiwei Zhang:
A hybrid caching strategy for information-centric satellite networks based on node classification and popular content awareness. 186-198
- Qamar Abbas

, Syed Ali Hassan, Hassaan Khaliq Qureshi, Kapal Dev
, Haejoon Jung
:
A comprehensive survey on age of information in massive IoT networks. 199-213
- Yuanyuan Yang

, Jin Cao, Xiongpeng Ren
, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. 214-229 - Tham Nguyen, Naveen Karunanayake

, Sicong Wang, Suranga Seneviratne
, Peizhao Hu:
Privacy-preserving spam filtering using homomorphic and functional encryption. 230-241 - Gururaj S. Kori

, Mahabaleshwar S. Kakkasageri
:
Classification And Regression Tree (CART) based resource allocation scheme for Wireless Sensor Networks. 242-254
- Amir Javadpour, Arun Kumar Sangaiah

, Pedro Pinto
, Forough Ja'fari, Weizhe Zhang, Ali Majed Hossein Abadi, Hamidreza Ahmadi:
An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers. 255-266 - Yuan Cheng, Baojiang Cui, Chen Chen, Thar Baker

, Tao Qi:
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network. 267-275
- Hui Ma

, Kai Yang, Man-On Pun
:
Cellular traffic prediction via deep state space models with attention mechanism. 276-283 - Vicente Mayor

, Rafael Estepa
, Antonio Jose Estepa
:
CO-CAC: A new approach to Call Admission Control for VoIP in 5G/WiFi UAV-based relay networks. 284-293 - Ba Cao Nguyen

, Le The Dung
, Tran Manh Hoang
, Nguyen Van Vinh
, Gia Thien Luu
:
On performance of multi-RIS assisted multi-user nonorthogonal multiple access system over Nakagami-m fading channels. 294-305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














