


default search action
Computer Communications, Volume 213
Volume 213, January 2024
- Sagar Arora

, Adlen Ksentini
, Christian Bonnet:
Cloud native Lightweight Slice Orchestration (CLiSO) framework. 1-12
- Yakun Gao, Keren Ji, Tian Gao:

Route planning model based on multidimensional eigenvector processing in vehicular fog computing. 13-20
- Nur Fadhilah Mohd Shari, Amizah Malip:

Corrigendum to 'State-of-the-art solutions of blockchain technology for data dissemination in smart cities: A comprehensive review' [Comput. Commun. 189 (2022) 120-147]. 21
- Qi Li, Zhenyu Shi, Zhaoyu Xue, Zhihua Cui, Yubin Xu:

A many-objective evolutionary algorithm for solving computation offloading problems under uncertain communication conditions. 22-32
- Giovanni Nardini

, Giovanni Stea
:
Enabling simulation services for digital twins of 5G/B5G mobile networks. 33-48
- Yujie Wang

, Ying Wang
, Qingqing Liu, Yong Zhang
:
Dynamic WiFi indoor positioning based on the multi-scale metric learning. 49-60
- Euclides Carlos Pinto Neto, Sajjad Dadkhah

, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani:
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective. 61-77
- Bing Qian

, Hanlei Xie
, Wei Wu, Yan Yang:
Cellular fault prediction of graphical representation based on spatio-temporal graph convolutional networks. 78-87 - Zewu Li

, Chen Xu
, Zhanpeng Zhang, Runze Wu:
Deep reinforcement learning based trajectory design and resource allocation for task-aware multi-UAV enabled MEC networks. 88-98 - Zhongyu Ma

, Zijun Wang, Yajing Wang, Xianghong Lin, Qun Guo
, Yi Xie:
Coalitional game based sub-channel allocation for full-duplex-enabled mmWave IAB network in B5G. 99-110
- Duncan Deveaux, Takamasa Higuchi, Seyhan Uçar, Jérôme Härri, Onur Altintas:

Role of context in determining transfer of risk knowledge in roundabouts. 111-134
- Hussein Al Haj Hassan

, Sahar Jaber, Ali El-Amine, Abbass Nasser, Loutfi Nuaymi:
Reinforcement learning for radio resource management of hybrid energy cellular networks with battery constraints. 135-146 - Chaonong Xu, Yaqi Xie

, Fan Wu, Chao Li:
Complexity and algorithm of setting optimal location for data sink in real-time NOMA-based IIoTs. 147-157 - Xueqin Zhang

, Zhineng Wang, Gang Liu, Yan Wang:
Key node identification in social networks based on topological potential model. 158-168
- Choong Il Yeh

, Yong-Seouk Choi, Young-Jo Ko, Il-Gyu Kim:
Standardization and technology trends of artificial intelligence for mobile systems. 169-178
- Chao-Hsiang Li

, Alexander I-Chi Lai, Ruey-Beei Wu
:
Accuracy enhancement of Wi-Fi positioning by ranging in dense UWB networks. 179-187
- Zhaolin Ma

, Jiali You
, Haojiang Deng:
DINNRS: A Distributed In-Network Name Resolution System for information-centric networks. 188-198 - Abdullah Numani

, Ziaul Haq Abbas
, Ghulam Abbas
, Zaiwar Ali
:
Energy conserving cost selection for fine-grained computational offloading in mobile edge computing networks. 199-207
- Rajesh Kumar, Deepak Sinwar

, Vijander Singh:
QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G. 208-235
- Fahad Razaque Mughal

, Jingsha He
, Nafei Zhu
, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran
, Fayaz Ali Dharejo
:
Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning. 236-245 - Fateme Fathi, Mina Baghani

, Majid Bayat
:
Light-PerIChain: Using lightweight scalable blockchain based on node performance and improved consensus algorithm in IoT systems. 246-259 - Zongwang Li

, Zhuochen Xie
, Xiaohe He, Xuwen Liang:
Heterogeneous temporal graph powered DRL algorithm for channel allocation in Maritime IoT Systems. 260-270 - Ofek Bader, Adi Lichy, Amit Dvir

, Ran Dubin
, Chen Hajaj
:
OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification. 271-284 - Ting Yu

, Lihua Zhang, Hailin Liu, Hongbing Liu, Jiaojiao Wang
:
Service recommendation based on contrastive learning and multi-task learning. 285-295 - Pankaj Kumar

, Hari Om:
NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme. 296-308 - Suvrima Datta, Venkanna U.

:
PiGateway: Real-time granular analysis of smart home network traffic using P4. 309-319 - Eric Ossongo

, Moez Esseghir, Leïla Merghem-Boulahia:
A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices. 320-330 - Annisa Sarah

, Gianfranco Nencioni
:
Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario. 331-344 - Carlos Rubio Garcia

, Simon Rommel
, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley
, Philippe Nguyen, Idelfonso Tafur Monroy
:
Quantum-resistant Transport Layer Security. 345-358 - Shanchen Pang

, Lili Hou
, Haiyuan Gui, Xiao He
, Teng Wang
, Yawu Zhao:
Multi-mobile vehicles task offloading for vehicle-edge-cloud collaboration: A dependency-aware and deep reinforcement learning approach. 359-371
- Faisal Hawlader

, François Robinet, Raphaël Frank:
Leveraging the edge and cloud for V2X-based real-time object detection in autonomous driving. 372-381

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














