


default search action
Computer Communications, Volume 202
Volume 202, March 2023
- Ziyu Peng, Gaocai Wang, Wang Nong, Yu Qiu, Shuqiang Huang:

Task offloading in Multiple-Services Mobile Edge Computing: A deep reinforcement learning algorithm. 1-12
- Hafsa Maryam, Tania Panayiotou

, Georgios Ellinas:
Uncertainty quantification and consideration in ML-aided traffic-driven service provisioning. 13-22
- Yue Tian

, Baiyun Xiao
, Xianling Wang
, Yau Hee Kho
, Chen Zhu, Wenda Li
, Qinying Li, Xuejie Hu:
Opportunistic RIS-assisted rate splitting transmission in coordinated multiple points networks. 23-32 - Shiguo Wang

, Xuewen Fu, Rukhsana Ruby, Zhetao Li:
Pilot spoofing detection for massive MIMO mmWave communication systems with a cooperative relay. 33-41
- Pierluigi Locatelli

, Massimo Perri, Daniel Mauricio Jimenez Gutierrez
, Andrea Lacava
, Francesca Cuomo:
Device discovery and tracing in the Bluetooth Low Energy domain. 42-56
- Hua Wu

, Weina Li, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang
:
Batch classifier with adaptive update for backbone traffic classification. 57-72 - Hrishikesh Dutta

, Amit Kumar Bhuyan, Subir Biswas:
Reinforcement learning based flow and energy management in resource-constrained wireless networks. 73-86 - Wei Sun, Lei Zhang, Qiushuo Lv

, Zhi Liu, Weitao Li, Qiyue Li
:
Dynamic collaborative optimization of end-to-end delay and power consumption in wireless sensor networks for smart distribution grids. 87-96 - Zhaohui Huang, Vasilis Friderikos:

Optimal service decomposition for mobile augmented reality with edge cloud support. 97-109
- S. Saibharath, Sudeepta Mishra, Chittaranjan Hota:

Joint QoS and energy-efficient resource allocation and scheduling in 5G Network Slicing. 110-123
- Zheng Yao, Huaiyu Wu, Yang Chen:

Multi-objective cooperative computation offloading for MEC in UAVs hybrid networks via integrated optimization framework. 124-134
- Eric Rigall

, Xianglong Wang, Shu Zhang
, Junyu Dong
:
A fast and accurate RFID tag positioning method based on AoA hologram and hashtables. 135-144 - K. G. Maheswari

, C. Siva, G. NaliniPriya:
Optimal cluster based feature selection for intrusion detection system in web and cloud computing environment using hybrid teacher learning optimization enables deep recurrent neural network. 145-153
- Guoquan Wu

, Bing Zhang, Ya Li
:
Intelligent and survivable resource slicing for 6G-oriented UAV-assisted edge computing networks. 154-165
- Ramamoorthi S.

, B. Muthu Kumar, Ahilan Appathurai:
Energy aware Clustered blockchain data for IoT: An end-to-end lightweight secure & Enroute filtering approach. 166-182 - Fenglei Li

, Jiayuan Zhang, Zhixin Liu
, Kit Yan Chan, Yi Yang, Yuan-Ai Xie:
Sum-rate maximization for cognitive relay NOMA Systems with channel uncertainty. 183-190 - Llorenç Cerdà-Alabern

, Gabriel Iuhasz
, Gabriele Gemmi
:
Anomaly detection for fault detection in wireless community networks using machine learning. 191-203

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














