default search action
Annales des Télécommunications, Volume 78
Volume 78, Number 1-2, February 2023
- Dorabella Santos, Lúcia Martins, Teresa Gomes:
A biobjective availability optimization problem with nonlinear constraints. 1-12 - Jaime Galán-Jiménez, Marco Polverini, Francesco Giacinto Lavacca, Juan Luis Herrera, Javier Berrocal:
Joint energy efficiency and load balancing optimization in hybrid IP/SDN networks. 13-31 - Michael Braun, Alexander Wiesmaier, Nouri Alnahawi:
Efficient practical Byzantine consensus using random linear network coding. 33-51 - Kohei Shiomoto, Tatsuya Otoshi, Masayuki Murata:
A novel network traffic prediction method based on a Bayesian network model for establishing the relationship between traffic and population. 53-70 - Narendra Kumar, Siddhartha Siddhiprada Bhoi, Ruchir Gupta, Abhay Kumar Singh:
Sliding window symbol-pair constrained codes for energy harvesting. 71-77 - Amit Kumar Singh, Kamalesh Acharya, Ratna Dutta:
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles. 79-90 - Basil K. Jeemon, T. K. Shahana:
PAPR reduction using constrained convex optimization for vector OFDM. 91-99 - C. Srikamu, K. G. Sujanth Narayan, S. Karthikeyan, R. Jayabharathy:
Performance analysis of NOMA in a MIMO system over Rayleigh channels under imperfect SIC. 101-113 - Pedro Victor Borges Caldas da Silva, Chantal Taconet, Sophie Chabridon, Denis Conan, Everton Cavalcante, Thaís Batista:
Energy awareness and energy efficiency in internet of things middleware: a systematic literature review. 115-131
Volume 78, Number 3-4, April 2023
- Ahmad Samer Wazan, Frédéric Cuppens:
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures. 133-134 - Zhaosen Shi, Xuyang Ding, Fagen Li, Yingni Chen, Canran Li:
Mitigation of a poisoning attack in federated learning by using historical distance detection. 135-147 - Raphaël M. J. I. Larsen, Marc-Oliver Pahl, Gouenou Coatrieux:
Multipath neural networks for anomaly detection in cyber-physical systems. 149-167 - David Cordova Morales, Pedro B. Velloso, Alexandre Laubé, Thi Mai Trang Nguyen, Guy Pujolle:
A performance evaluation of C4M consensus algorithm. 169-182 - Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Liaqat Ali Khan, Babar Shah:
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications. 183-208 - Kai Lehniger, Abdelaziz Saad, Peter Langendörfer:
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices. 209-220 - Anushree Belel, Ratna Dutta, Sourav Mukhopadhyay:
Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography. 221-233 - Gang Zhang, Ping He, Lifang He:
Multi-carrier multi-level DCSK communication system based on time-reversal. 235-247
Volume 78, Number 5-6, June 2023
- Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas Machuca, Vinod Sharma, Anna Tzanakaki:
Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact. 249-251 - Publisher Correction: Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact. 253
- Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel:
Towards greener digital infrastructures for ICT and vertical markets. 255-275 - Tilman Santarius, Jan C. T. Bieser, Vivian Frick, Mattias Höjer, Maike Gossen, Lorenz M. Hilty, Eva Kern, Johanna Pohl, Friederike Rohde, Steffen Lange:
Digital sufficiency: conceptual considerations for ICTs on a finite planet. 277-295 - Memedhe Ibrahimi, Omran Ayoub, Aryanaz Attarpour, Francesco Musumeci, Andrea Castoldi, Mario Ragni, Massimo Tornatore:
Minimizing equipment and energy cost in mixed 10G and 100G/200G filterless horseshoe networks with hierarchical OTN boards. 297-311 - Louis Golard, Jérôme Louveaux, David Bol:
Evaluation and projection of 4G and 5G RAN energy footprints: the case of Belgium for 2020-2025. 313-327 - Kishalay Bairagi, Sulata Mitra, Uma Bhattacharya:
Efficient approaches to optimize energy consumption in 3D wireless video sensor network under the coverage and connectivity constraints. 329-346 - Ali Kadhum Idrees, Lina Waleed Jawad:
Energy-efficient Data Processing Protocol in edge-based IoT networks. 347-362 - Bartlomiej Blaszczyszyn, Philippe Jacquet, Bernard Mans, Dalia Popescu:
Energy and delay trade-offs of end-to-end vehicular communications using a hyperfractal urban modelling. 363-381
Volume 78, Number 7-8, August 2023
- Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens:
Foreword of the special issue on « FPS 2021» symposium. 383 - Hazel Murray, David Malone:
Adaptive password guessing: learning language, nationality and dataset source. 385-400 - João Vitorino, Isabel Praça, Eva Maia:
Towards adversarial realism and robust learning for IoT intrusion detection and classification. 401-412 - Dylan Paulin, Raphaël Joud, Christine Hennebert, Pierre-Alain Moëllic, Thibault Franco-Rondisson, Romain Jayles:
HistoTrust: tracing AI behavior with secure hardware and blockchain technology. 413-427 - Rania Taleb, Sylvain Hallé, Raphaël Khoury:
A modular pipeline for enforcement of security properties at runtime. 429-457 - Jemimah J. P. P, S. Miruna Joe Amali:
Secure and low PAPR OFDM system using TCCM. 459-474 - Tapan Kumar Mohanta, Dushmanta Kumar Das:
A three-dimensional wireless sensor network with an improved localization algorithm based on orthogonal learning class topper optimization. 475-489 - Mohammad Akhondi Darzikolaei, Mohammad Ali Alirezapouri:
A modified ZF algorithm for signal detection in an underwater MIMO STBC-OFDM acoustic communication system. 491-507 - Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li:
Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain. 509-524
Volume 78, Number 9-10, October 2023
- Fatima Salahdine, Tao Han, Ning Zhang:
5G, 6G, and Beyond: Recent advances and future challenges. 525-549 - Dennis Krummacker, Benedikt Veith, Daniel Lindenschmitt, Hans D. Schotten:
DLT architectures for trust anchors in 6G. 551-560 - Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak:
Backscatter communication system efficiency with diffusing surfaces. 561-576 - Pinakpani Mukherjee, Santu Sarkar, Nikhil R. Das:
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk. 577-584 - T. Nathezhtha, Sangeetha Dhamodaran, Vaidehi V.:
Social network malicious insider detection using time-based trust evaluation. 585-597 - Rim Jouini, Chiraz Houaidia, Leïla Azouz Saïdane:
Hidden Markov Model for early prediction of the elderly's dependency evolution in ambient assisted living. 599-615 - Mohamed Hamidi, Ouissam Zealouk, Hassan Satori:
Telephony speech system performance based on the codec effect. 617-625 - Chongrui Pan, Guanding Yu:
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity. 627-639 - Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba:
Robust adaptive beamforming algorithm for coherent signals based on virtual array. 641-651
Volume 78, Number 11-12, November 2023
- Mohamed Lahby, Rachid Saadane, Sérgio D. Correia:
Integration of IoT with cloud computing for next generation wireless technology. 653-654 - Tarek Moulahi, Salim El Khediri, Durre Nayab, Mushira Freihat, Rehan Ullah Khan:
Effects of dataset attacks on machine learning models in e-health. 655-665 - Preechai Mekbungwan, Adisorn Lertsinsrubtavee, Sukumal Kitisin, Giovanni Pau, Kanchana Kanchanasut:
Towards programmable IoT with ActiveNDN. 667-684 - Publisher Correction: Towards programmable IoT with ActiveNDN. 685
- Sevda Özge Bursa, Özlem Durmaz Incel, Gülfem Isiklar Alptekin:
Building Lightweight Deep learning Models with TensorFlow Lite for Human Activity Recognition on Mobile Devices. 687-702 - Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi:
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework. 703-715 - Sara Yassmine Brahimi, Fatna Mouffak, Fatima Zohra Bousbaa, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas:
Cloud service selection in IoFT-enabled Multi-access Edge Computing: a Game Theoretic approach. 717-728 - Nahid Eddermoug, Abdeljebar Mansour, Mohamed Sadik, Essaid Sabir, Mohamed Azmi:
klm-PPSA v. 1.1: machine learning-augmented profiling and preventing security attacks in cloud environments. 729-755
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.