


default search action
Computer Communications, Volume 211
Volume 211, November 2023
- Donald J. P, Linda Joseph:
Information centric wireless communication for variation detection and Mitigation Model in industrial internet of Things. 1-10
- Prithi Samuel
, Arumugham Vinothini
, Jayashree Kanniappan:
POLSTM: Poplar optimization-based long short term memory model for resource allocation in cloud environment. 11-23 - Gustavo P. Bittencourt
, João Paulo P. G. Marques
, Daniel C. Cunha
:
Generation of irregular grid maps for fingerprinting-based mobile radio localization using farthest-first traversal and low-discrepancy sequences. 24-36
- R. Mahaveerakannan
, Cuddapah Anitha, Aby K. Thomas
, Sanju Rajan, T. Muthukumar, G. Govinda Rajulu:
An IoT based forest fire detection system using integration of cat swarm with LSTM model. 37-45 - Hayder Sabah Salih, Mustafa Musa Jaber, Mohammed Hasan Ali, Sura Khalil Abd, Ahmed Alkhayyat, Rami Qays Malik:
Application of edge computing-based information-centric networking in smart cities. 46-58
- Chuangchuang Zhang
, Yanming Liu, Shuning Zhang, Hongyong Yang, Fuliang Li, Xingwei Wang:
SFC-based multi-domain service customization and deployment. 59-72 - Yin Wang
, Kang'an Gui:
MSEC-D based energy consumption optimization strategy in satellite communication systems. 73-82
- Chen Qiu
, Haoda Wang, Qinglin Yang
, Chunhua Su, Huawei Huang:
A coordinates-based hierarchical computing framework towards spatial data processing. 83-92
- Juanjuan Wang, Jun Zeng, Hao Wen
, Zhiyi Hu:
Designing mobile operator's tariff package pricing scheme based on user's internet behavior. 93-103
- Huimin Gao, Bo Jiang, Hong Xu, Siji Chen:
The low latency networking method for task-driven MEC-enabled UAV swarm. 104-118
- Zengpeng Li
, Huiqun Yu
, Guisheng Fan, Qifeng Tang, Jiayin Zhang
, Liqiong Chen:
Cost-efficient security-aware scheduling for dependent tasks with endpoint contention in edge computing. 119-133 - Yijie Wang
, Ziping Yu
, Zhongliang Zhao
, Xianbin Cao:
AOR: Adaptive opportunistic routing based on reinforcement learning for planetary surface exploration. 134-146
- Sicong Zhou, Huawei Huang
, Ruixin Li, Jialiang Liu, Zibin Zheng:
ComAvg: Robust decentralized federated learning with random committees. 147-156
- Venkata Bhikshapathi Chenam
, Syed Taqi Ali
:
A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage. 157-177 - Valeriu-Daniel Stanciu, Maarten van Steen, Ciprian Dobre, Andreas Peter
:
Privacy-friendly statistical counting for pedestrian dynamics. 178-192 - Assis T. de Oliveira Filho
, Eduardo Freitas
, Pedro Rafael X. do Carmo
, Djamel Fawzi Hadj Sadok
, Judith Kelner
:
Measuring the impact of SR-IOV and virtualization on packet round-trip time. 193-215 - Wenlan Diao
, Jianping An, Tong Li
, Chao Zhu
, Yu Zhang
, Xiaotian Wang, Zhoujie Liu:
Low delay fragment forwarding in LEO satellite networks based on named data networking. 216-228 - José María Jorquera Valero
, Pedro Miguel Sánchez Sánchez, Manuel Gil Pérez
, Alberto Huertas Celdrán
, Gregorio Martínez Pérez:
Trust-as-a-Service: A reputation-enabled trust framework for 5G network resource provisioning. 229-238 - Mohamed A. El-Zawawy
, Pallavi Kaliyar, Mauro Conti
, Sokratis K. Katsikas
:
Honey-list based authentication protocol for industrial IoT swarms. 239-253
- Jian Song
:
Data conversion control of virtual network devices in cloud computing: A deep reinforcement learning approach. 254-262
- Weijia Wang, Chao Zhou
, Da Lin, Yuan-Gen Wang
:
FeConDefense: Reversing adversarial attacks via feature consistency loss. 263-270
- Garima Thakur, Pankaj Kumar
, Chien-Ming Chen
, Athanasios V. Vasilakos, Anchna, Sunil Prajapat
:
A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment. 271-285 - Mohammad Mahdi Modiri, Mahmoud Salmasizadeh, Javad Mohajeri, Babak Hossein Khalaj
:
Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks. 286-301
- Ziwei Xia, Benying Tan
, Haoli Zhao, Shuxue Ding, Yujie Li:
A new device-free localization method for RSS data with considering correlations. 302-310

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.