Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cn/cn140.bht:"
@article{DBLP:journals/cn/BanerjeeKS18, author = {Bitan Banerjee and Adita Kulkarni and Anand Seetharam}, title = {Greedy Caching: An optimized content placement strategy for information-centric networks}, journal = {Comput. Networks}, volume = {140}, pages = {78--91}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.001}, doi = {10.1016/J.COMNET.2018.05.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BanerjeeKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BiswasS18, author = {Pratima Biswas and Ashok Singh Sairam}, title = {Modeling privacy approaches for location based services}, journal = {Comput. Networks}, volume = {140}, pages = {1--14}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.04.016}, doi = {10.1016/J.COMNET.2018.04.016}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BiswasS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChekkouriEP18, author = {Ahmed Salim Chekkouri and Abdellatif Ezzouhairi and Samuel Pierre}, title = {A new integrated {VANET-LTE-A} architecture for enhanced mobility in small cells HetNet using dynamic gateway and traffic forwarding}, journal = {Comput. Networks}, volume = {140}, pages = {15--27}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.04.013}, doi = {10.1016/J.COMNET.2018.04.013}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChekkouriEP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HashemiB18, author = {Seyyed Naser Seyyed Hashemi and Ali Bohlooli}, title = {Analytical modeling of multi-source content delivery in information-centric networks}, journal = {Comput. Networks}, volume = {140}, pages = {152--162}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.007}, doi = {10.1016/J.COMNET.2018.05.007}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HashemiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HeZWZ18, author = {Qian He and Ning Zhang and Yongzhuang Wei and Yan Zhang}, title = {Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems}, journal = {Comput. Networks}, volume = {140}, pages = {163--173}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.038}, doi = {10.1016/J.COMNET.2018.01.038}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/HeZWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/HuaZZLGZ18, author = {Jingyu Hua and Laiping Zhao and Suohao Zhang and Yangyang Liu and Xin Ge and Sheng Zhong}, title = {Topology-Preserving Traffic Engineering for Hierarchical Multi-Domain {SDN}}, journal = {Comput. Networks}, volume = {140}, pages = {62--77}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.04.011}, doi = {10.1016/J.COMNET.2018.04.011}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/HuaZZLGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JiaSLC18, author = {Adele Lu Jia and Siqi Shen and Dongsheng Li and Shengling Chen}, title = {Predicting the implicit and the explicit video popularity in a User Generated Content site with enhanced social features}, journal = {Comput. Networks}, volume = {140}, pages = {112--125}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.004}, doi = {10.1016/J.COMNET.2018.05.004}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JiaSLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KoufoudakisOGA18, author = {George Koufoudakis and Konstantinos Oikonomou and Konstantinos Giannakis and Sonia A{\"{\i}}ssa}, title = {Probabilistic flooding coverage analysis for efficient information dissemination in wireless networks}, journal = {Comput. Networks}, volume = {140}, pages = {51--61}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.005}, doi = {10.1016/J.COMNET.2018.05.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KoufoudakisOGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KoyaP18, author = {Aneesh M. Koya and Deepthi P. P.}, title = {Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network}, journal = {Comput. Networks}, volume = {140}, pages = {138--151}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.006}, doi = {10.1016/J.COMNET.2018.05.006}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KoyaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiZBLPWDJ18, author = {Guoquan Li and Ying Zhou and Tong Bai and Jinzhao Lin and Yu Pang and Wei Wu and Sadia Din and Gwanggil Jeon}, title = {Performance analysis for low-complexity detection of {MIMO} {V2V} communication systems}, journal = {Comput. Networks}, volume = {140}, pages = {92--100}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.009}, doi = {10.1016/J.COMNET.2018.05.009}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LiZBLPWDJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LyazidiAL18, author = {Mohammed Yazid Lyazidi and Nadjib Aitsaadi and Rami Langar}, title = {A dynamic resource allocation framework in {LTE} downlink for Cloud-Radio Access Network}, journal = {Comput. Networks}, volume = {140}, pages = {101--111}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.008}, doi = {10.1016/J.COMNET.2018.05.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LyazidiAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NasrallaRRM18, author = {Moustafa M. Nasralla and Manzoor Razaak and Ikram U. Rehman and Maria G. Martini}, title = {Content-aware packet scheduling strategy for medical ultrasound videos over {LTE} wireless networks}, journal = {Comput. Networks}, volume = {140}, pages = {126--137}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.05.014}, doi = {10.1016/J.COMNET.2018.05.014}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NasrallaRRM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PatelJ18, author = {Hasmukh Patel and Devesh C. Jinwala}, title = {{LPM:} {A} lightweight authenticated packet marking approach for {IP} traceback}, journal = {Comput. Networks}, volume = {140}, pages = {41--50}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.04.014}, doi = {10.1016/J.COMNET.2018.04.014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PatelJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PeresSSGVVL18, author = {Bruna Soares Peres and Bruno P. Santos and Ot{\'{a}}vio Augusto de Oliviera Souza and Olga Goussevskaia and Marcos Augusto M. Vieira and Luiz Filipe M. Vieira and Antonio A. F. Loureiro}, title = {Matrix: Multihop Address allocation and dynamic any-To-any Routing for 6LoWPAN}, journal = {Comput. Networks}, volume = {140}, pages = {28--40}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.04.017}, doi = {10.1016/J.COMNET.2018.04.017}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PeresSSGVVL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.