


default search action
Digital Communications and Networks, Volume 3
Volume 3, Number 1, February 2017
- Yu Wang, Shiwen Mao:

On distributed power control in full duplex wireless networks. 1-10 - Nogbou Georges Anoh

, Michel Babri, Ahmed D. Kora
, Roger M. Faye
, Boko Aka, Claude Lishou:
An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks. 11-18 - Anuradha Pughat

, Vidushi Sharma
:
Performance analysis of an improved dynamic power management model in wireless sensor node. 19-29 - Wajiya Zafar, Bilal Muhammad Khan:

A reliable, delay bounded and less complex communication protocol for multicluster FANETs. 30-38 - Niemah Izzeldin Osman:

Will video caching remain energy efficient in future core optical networks? 39-46 - Rami Halloush

, Hang Liu, Lijun Dong, Mingquan Wu, Hayder Radha:
Hop-by-hop Content Distribution with Network Coding in Multihop Wireless Networks. 47-54 - Debashis De

, Anwesha Mukherjee
:
Group handoff management in low power microcell-femtocell network. 55-65
Volume 3, Number 2, May 2017
- In Keun Son, Shiwen Mao:

A survey of free space optical networks. 67-77 - Latif Ullah Khan

:
Visible light communication: Applications, architecture, standardization and research challenges. 78-88 - Xinxin Mei, Qiang Wang

, Xiaowen Chu
:
A survey and measurement study of GPU DVFS on energy conservation. 89-100 - Qiang Duan:

Cloud service performance evaluation: status, challenges, and opportunities - a survey from the system modeling perspective. 101-111 - Dipesh Shah

, Axay J. Mehta:
Fractional delay compensated discrete-time SMC for networked control system. 112-117 - Rafiullah Khan, Sarmad Ullah Khan:

Design and implementation of Ad-Hoc collaborative proxying scheme for reducing network energy waste. 118-128 - Babatunde S. Awoyemi

, Bodhaswar T. Maharaj
, Attahiru Sule Alfa:
Optimal resource allocation solutions for heterogeneous cognitive radio networks. 129-139
Volume 3, Number 3, August 2017
- Martin Damrath

, Peter Adam Hoeher, Gilbert J. M. Forkel:
Symbol detection based on Voronoi surfaces with emphasis on superposition modulation. 141-149 - Syed Rehan Afzal, Sander Stuijk

, Majid Nabi, Twan Basten
:
Effective link quality estimation as a means to improved end-to-end packet delivery in high traffic mobile ad hoc networks☆. 150-163 - Krishan Kumar, Arun Prakash

, Rajeev Tripathi
:
Spectrum handoff scheme with multiple attributes decision making for optimal network selection in cognitive radio networks. 164-175 - Md. Noor-A-Rahim

, Nan Zhang, Md. Rabiul Islam, Yong Liang Guan:
Bilayer expurgated LDPC codes with uncoded relaying. 176-179 - Khattab M. Ali Alheeti

, Anna Gruebler, Klaus D. McDonald-Maier
:
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles. 180-187 - Maqbool Ali, Hafiz Syed Muhammad Bilal, Muhammad Asif Razzaq

, Jawad Khan, Sungyoung Lee, Muhammad Idris
, Mohammad Aazam
, Taebong Choi, Soyeon Caren Han, Byeong Ho Kang:
IoTFLiP: IoT-based flipped learning platform for medical education. 188-194 - Abdul Hanan Abdullah, Mohammad Yazid Bin Idris, Omprakash Kaiwartya, Mukesh Prasad

, Rajiv Ratn Shah
:
Real traffic-data based evaluation of vehicular traffic environment and state-of-the-art with future issues in location-centric data dissemination for VANETs. 195-210
Volume 3, Number 4, November 2017
- Shui Yu

, Peter Mueller, Albert Y. Zomaya
:
Editorial: special issue on "big data security and privacy". 211-212 - T. K. Ashwin Kumar, Hong Liu, Johnson P. Thomas, Xiaofeh Hou:

Content sensitivity based access control framework for Hadoop. 213-225 - Ruidong Li

, Hitoshi Asaeda
, Jie Li
, Xiaoming Fu
:
A distributed authentication and authorization scheme for in-network big data sharing. 226-235 - Shuai Li, Longxia Huang, Anmin Fu

, John Yearwood:
CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. 236-241 - Zhitao Guan, Guanlin Si:

Achieving privacy-preserving big data aggregation with fault tolerance in smart grid. 242-249 - Zichan Ruan, Yuantian Miao, Lei Pan

, Nicholas Charles Patterson
, Jun Zhang
:
Visualization of big data security: a case study on the KDD99 cup data set. 250-259 - Mohd Usama

, Mengchen Liu, Min Chen
:
Job schedulers for Big data processing in Hadoop environment: testing real-life schedulers using benchmark programs. 260-273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














