


default search action
Computer Communications, Volume 217
Volume 217, 2024
- Xiangdang Huang, Chao Chen

, Nuo Chen, Pengcheng Li, Rongxin Zhu, Qiuling Yang:
A robust and machine learning-driven identification scheme for malicious nodes in UASNs. 1-11 - Erik Daniel

, Florian Tschorsch:
Exploring the design space of privacy-enhanced content discovery for bitswap. 12-24 - Margherita Gambini

, Serena Tardelli
, Maurizio Tesconi:
The anatomy of conspiracy theorists: Unveiling traits using a comprehensive Twitter dataset. 25-40 - Suranjan Daw

, Anwesha Kar, Venkatarami Reddy Chintapalli, Bheemarjuna Reddy Tamma, C. Siva Ram Murthy:
LAMP: A latency-aware MAC protocol for joint scheduling of CAM and DENM traffic over 5G-NR sidelink. 41-56 - Konrad-Felix Krentz

, Thiemo Voigt
:
Secure opportunistic routing in 2-hop IEEE 802.15.4 networks with SMOR. 57-69 - Francesco Raviglione

, Carlos Mateo Risma Carletti
, Marco Malinverno
, Claudio Casetti
, Carla-Fabiana Chiasserini
:
ms-van3t: An integrated multi-stack framework for virtual validation of V2X communication and services. 70-86 - Li Yang, Huitao Zhang, Yaowen Qi

, Qilong Huang:
Available energy routing algorithm considering QoS requirements for LEO satellite network. 87-96 - Peiyan Jia, Chen Chen, Delong Zhang, Yulong Sang, Lei Zhang

:
Semantic segmentation of deep learning remote sensing images based on band combination principle: Application in urban planning and land use. 97-106 - Masoud Narimani Zaman Abadi

, Amir Jalaly Bidgoly
, Yaghoub Farjami
:
ASSOCIATE: A simulator for assessing soft security in the Cognitive Internet of Things. 107-125 - Mian Muaz Razaq

, Huanhuan Song, Limei Peng, Pin-Han Ho:
Optimizing Secrecy Energy Efficiency in RIS-assisted MISO systems using Deep Reinforcement Learning. 126-133 - Asmaa Amer

, Sahar Hoteit, Jalel Ben-Othman
:
Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications. 134-151 - Jiaqi Fan, Jiankui Yang

, Dacheng Yao:
Activate or sleep? An optimal two-threshold policy for transmission service. 152-165 - Yaser Azimi

, Saleh Yousefi
, Hashem Kalbkhani, Thomas Kunz:
Mobility aware and energy-efficient federated deep reinforcement learning assisted resource allocation for 5G-RAN slicing. 166-182 - Branka Mikavica

, Aleksandra Kostic-Ljubisavljevic:
A truthful double auction framework for security-driven and deadline-aware task offloading in fog-cloud environment. 183-199 - Awnish Kumar, Ngangbam Herojit Singh, Suyel Namasudra, Rubén González Crespo

, Nageswara Rao Moparthi
:
Traffic matrix estimation using matrix-CUR decomposition. 200-207 - Weiwei Jiang

, Haoyu Han, Miao He, Weixi Gu:
When game theory meets satellite communication networks: A survey. 208-229 - Miguel García-Torres

, Diego P. Pinto-Roa, Carlos Nunez Castillo, Brenda Quiñonez
, Gabriela Vázquez, Mauricio Allegretti, María E. García-Díaz
:
Feature selection applied to QoS/QoE modeling on video and web-based mobile data services: An ordinal approach. 230-245 - Weihang Ding, Yuxin Luo, Yifeng Lin

, Yuer Yang
, Siwei Lian:
VeriBypasser: An automatic image verification code recognition system based on CNN. 246-258 - Hui Xie

, Jun Zheng, Shengjun Wei, Changzhen Hu:
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture. 259-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














