default search action
Peer-to-Peer Networking and Applications, Volume 13
Volume 13, Number 1, January 2020
- Libo Jiao, Hao Yin, Dongchao Guo, Haojun Huang, Qin Gao:
Resource allocation in two-tier small-cell networks with energy consumption constraints. 1-15 - Cong Zhang, Hsin-Hung Cho, Chi-Yuan Chen:
Emergency-level-based healthcare information offloading over fog network. 16-26 - Luis Rodrigues, Joel Guerreiro, Noélia Correia:
RELOAD/CoAP architecture for the federation of wireless sensor networks. 27-37 - Fei Gu, Jianwei Niu, Xin Jin, Shui Yu:
FDFA: A fog computing assisted distributed analytics and detecting system for family activities. 38-52 - Hong Wang, Jianhua Li, Chengzhe Lai, Zhe Wang:
A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks. 53-63 - Weimin Li, Bin Wang, Jinfang Sheng, Xiangyu Hou, Lin Chen, Jiaguang Liu:
A software defined caching framework based on user access behavior analysis for transparent computing server. 64-81 - R. Madhusudhan, Shashidhara:
Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. 82-103 - Dadmehr Rahbari, Mohsen Nickray:
Task offloading in mobile fog computing by classification and regression tree. 104-122 - Jie Wang, Fei Dai, Jie Yang, Guan Gui:
Efficient combination policies for diffusion adaptive networks. 123-136 - Michal Boron, Jerzy Brzezinski, Anna Kobusinska:
P2P matchmaking solution for online games. 137-150 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Performance Modeling of Linux Network System with Open vSwitch. 151-162 - Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning:
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. 163-174 - Xianfu Meng, Ge Zhang:
TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks. 175-189 - Shilpa Budhkar, Venkatesh Tamarapalli:
An overlay management strategy to improve QoS in CDN-P2P live streaming systems. 190-206 - Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki:
Multi-keyword ranked searchable encryption scheme with access control for cloud storage. 207-218 - Muhammad Salman Raheel, Raad Raad:
Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE. 219-242 - Masahiro Sasabe:
Topological influence on optimality of Tit-for-Tat based P2P content distribution. 243-254 - Jian Wu, Zhigang Chen, Jia Wu, Xiao Liu, Genghua Yu, Yedong Zhao:
An energy efficient data transmission approach for low-duty-cycle wireless sensor networks. 255-268 - Peng Zheng, Hongxiao Fei, Yeqing Yan:
An effective positive transmission routing algorithm based on social relationships in opportunistic social networks. 269-286 - Dongchao Ma, Guangxing Han, Hongchao Li, Li Ma, Chengan Zhao:
A parallel optimization for energy and robustness of file distribution services. 287-303 - B. Guru Prakash, C. Balasubramanian, R. Sukumar:
An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN. 304-319 - Amr Elsaadany, Khalid Khalil:
Assessment of coverage quality of sensor networks for IoT applications. 320-332 - Monali Mavani, Krishna Asawa:
Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. 333-347 - Gaurav Srivastava, Richa Agrawal, Kunwar Singh, Rajeev Tripathi, Kshirasagar Naik:
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography. 348-367 - Xiaogang Qi, Min Qiang, Lifang Liu:
A balanced strategy to improve data invulnerability in structured P2P system. 368-387 - Sneha Kanchan, Garima Singh, Narendra S. Chaudhari:
EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups. 388-411 - Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner:
Achieve privacy-preserving simplicial depth query over collaborative cloud servers. 412-423
Volume 13, Number 2, March 2020
- Editor's note: Special issue on internet of things system technologies based on quality of experience. 425
- Cheng-Ta Huang:
A scheme of flexible and reversible information-hiding in SMVQ mechanism. 426-438 - Fatma Merabet, Amina Cherif, Malika Belkadi, Olivier Blazy, Emmanuel Conchon, Damien Sauveron:
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. 439-474 - Dongsik Son, Seungpyo Huh, Taejin Lee, Jin Kwak:
Internet of things system technologies based on quality of experience. 475-488 - Hangi Kim, Myungseo Park, Jaehyung Cho, Jihun Kim, Jongsung Kim:
Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes. 489-513 - Chi-Yao Weng:
DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images. 514-523 - Jun Woo Kim, Soo Kyun Kim:
Interactive job sequencing system for small make-to-order manufacturers under smart manufacturing environment. 524-531 - Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid, Fasee Ullah, Awais Ahmad, Fakhri Alam Khan:
Optimized clustering in vehicular ad hoc networks based on honey bee and genetic algorithm for internet of things. 532-547 - Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen:
Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture. 548-563 - Serim Kang, Soram Kim, Jongsung Kim:
Forensic analysis for IoT fitness trackers and its application. 564-573 - Editor's Note: Special issue on P2P Computing for Intelligence of Things. 574
- Sunmoon Jo, Jieun Lee, Jungsoo Han, Supratip Ghose:
P2P computing for intelligence of things. 575-578 - Sunghyuck Hong:
P2P networking based internet of things (IoT) sensor node authentication by Blockchain. 579-589 - N. Noor Alleema, D. Siva Kumar:
Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs. 590-600 - Dae-Young Kim, Ahyoung Lee, Seokhoon Kim:
P2P computing for trusted networking of personalized IoT services. 601-609 - Kyungyong Chung, Roy C. Park:
P2P-based open health cloud for medicine management. 610-622 - Doohee Han, Myeongyun Cho:
Selective switching dual-transmission scheme in multi-LED Hybrid VLC-P2P networking system. 623-634 - Jungpil Shin, Md. Rashedul Islam, Md. Abdur Rahim, Hyung-Jin Mun:
Arm movement activity based user authentication in P2P systems. 635-646 - P. Uma Maheswari, T. R. Ganeshbabu:
Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network. 647-658 - Yong-Young Kim, Yong-Ki Kim, Dae-Sik Kim, Mi-Hye Kim:
Implementation of hybrid P2P networking distributed web crawler using AWS for smart work news big data. 659-670 - YongJoo Lee, Keon Myung Lee, Sang Ho Lee:
Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. 671-683 - Sun Park, ByungRea Cha, Kyungyong Chung, JongWon Kim:
Mobile IoT device summarizer using P2P web search engine and inherent characteristic of contents. 684-693 - Kyungyong Chung, Hyun Yoo:
Edge computing health model using P2P-based deep neural networks. 694-703 - Manh Tien, Yoon Young Park, Kang-Hee Jung, Se-Yeob Kim, Joong-Eup Kye:
Performance evaluation on the accuracy of the semantic map of an autonomous robot equipped with P2P communication module. 704-716 - B. Priya, T. Gnanasekaran:
To optimize load of hybrid P2P cloud data-center using efficient load optimization and resource minimization algorithm. 717-728
Volume 13, Number 3, May 2020
- Songai Xuan, DoHyeun Kim:
Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking. 729-741 - Pavan Kumar C., Selvakumar R.:
Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. 742-751 - C. Umarani, S. Kannan:
Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. 752-761 - Garima Singh, Deepti D. Shrimankar:
Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks. 762-779 - Hassan Harb, Chady Abou Jaoude, Abdallah Makhoul:
An energy-efficient data prediction and processing approach for the internet of things and sensing based applications. 780-795 - Walid Osamy, Ahmed El-Sawy, Ahmed M. Khedr:
Effective TDMA scheduling for tree-based data collection using genetic algorithm in wireless sensor networks. 796-815 - Seyed Farhad Aghili, Hamid Mala:
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol. 816-824 - Elahe Khatibi, Mohsen Sharifi, Seyedeh Leili Mirtaheri:
DPAS: A dynamic popularity-aware search mechanism for unstructured P2P systems. 825-849 - Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Performance of low level protocols in high traffic wireless body sensor networks. 850-871 - Saeed Saeedvand, Hadi S. Aghdasi, Leili Mohammad Khanli:
Novel Distributed Dynamic Backbone-based Flooding in Unstructured Networks. 872-889 - Ganesan Sangeetha, Muthuswamy Vijayalakshmi, Sannasi Ganapathy, Arputharaj Kannan:
An improved congestion-aware routing mechanism in sensor networks using fuzzy rule sets. 890-904 - Ashika R. Naik, Bettahally N. Keshavamurthy:
Next level peer-to-peer overlay networks under high churns: a survey. 905-931 - UmaMaheswari Gurusamy, K. Hariharan, M. S. K. Manikandan:
Path optimization of box-covering based routing to minimize average packet delay in software defined network. 932-939 - Jia Wu, Zhigang Chen, Ming Zhao:
Community recombination and duplication node traverse algorithm in opportunistic social networks. 940-947 - Naserali Noorani, Seyed-Amin Hosseini-Seno:
SDN- and fog computing-based switchable routing using path stability estimation for vehicular ad hoc networks. 948-964 - A. Samson Arun Raj, Yogesh Palanichamy:
An aerial intelligent relay-road side unit (AIR-RSU) framework for modern intelligent transportation system. 965-986 - Ayyasamy Ayyanar, Eanoch Golden Julie, Yesudhas Harold Robinson, Subramanian Balaji, Raghvendra Kumar, Le Hoang Son, Pham Huy Thong, Ishaani Priyadarshini:
AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks. 987-1001 - Peng Hu, Yongli Wang, Bei Gong, Yongjian Wang, Yanchao Li, Ruxin Zhao, Hao Li, Bo Li:
A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. 1002-1013 - Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena V. Misic, Vojislav B. Misic:
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. 1014-1025 - Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen, Songling Chen:
A P2P network based edge computing smart grid model for efficient resources coordination. 1026-1037 - Sandosh S., Govindasamy V., Akila G.:
Enhanced intrusion detection system via agent clustering and classification based on outlier detection. 1038-1045 - Maha S. Abdelhaq, Raed A. Alsaqour, Abeer Algarni, Maali Alabdulhafith, Mahmoud A. Alawi, Aqeel Taha, Baraa T. Sharef, Mustafa Tariq:
Human immune-based model for intrusion detection in mobile ad hoc networks. 1046-1068 - Jia Xu, Wei Lu, Lijie Xu, Dejun Yang, Tao Li:
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship. 1069 - Chunguang Zhang, Guangping Zeng, Hongbo Wang, Xuyan Tu:
Correction to: Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things. 1070
Volume 13, Number 4, July 2020
- S. Famila, A. Jawahar, Sariga Arjunan, K. Shankar:
Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments. 1071-1079 - (Withdrawn) Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks. 1080-1090
- (Withdrawn) Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. 1091-1101
- P. K. Poonguzhali, N. P. Ananthamoorthy:
Improved energy efficient WSN using ACO based HSA for optimal cluster head selection. 1102-1108 - A. Arokiaraj Jovith, S. V. Kasmir Raja, A. Razia Sulthana:
Interference mitigation and optimal hop distance measurement in distributed homogenous nodes over wireless sensor network. 1109-1119 - (Withdrawn) Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network. 1120-1130
- Lithungo Murry, Rajagopal Kumar, Themrichon Tuithung, P. Mohamed Shakeel:
A local decision making technique for reliable service discovery using D2D communications in disaster recovery networks. 1131-1141 - Brindha Palanisamy, Senthilkumar Athappan:
Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks. 1142-1151 - Sivadi Balakrishna, M. Thirumaran, R. Padmanaban, Vijender Kumar Solanki:
An efficient incremental clustering based improved K-Medoids for IoT multivariate data cluster analysis. 1152-1175 - Mingchuan Zhang, Xin Wang, Tingting Liu, Junlong Zhu, Qingtao Wu:
AFSndn: A novel adaptive forwarding strategy in named data networking based on Q-learning. 1176-1184 - Nagendranath M. V. S. S, A. Ramesh Babu:
An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks. 1185-1192 - Sulin Pang, Junkun Yang:
Social reputation loss model and application to lost-linking borrowers in a internet financial platform. 1193-1203 - V. Rama Krishna, R. Subhashini:
Mimicking attack by botnet and detection at gateway. 1204-1214 - Fengzhen Jiang, Jie Zhang, Xu Zhao:
Research on the influence mechanism of resettlers participation in migrant work in the context of relationship network. 1215-1224 - Rui Hou, Huan Liu, Yang Hu, YunHao Zhao:
Research on secure transmission and storage of energy IoT information based on Blockchain. 1225-1235 - Lin Chang, Songhao Piao, Xiaokun Leng, Yunqiang Hu, Wende Ke:
Study on falling backward of humanoid robot based on dynamic multi objective optimization. 1236-1247 - S. Suseela, Eswari Rajagopal, S. Nickolas, M. Saravanan:
QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks. 1248-1259 - Sheng Jin, Yu Gao, Liang Chen:
Improved Deep Distance Learning for Visual Loop Closure Detection in Smart City. 1260-1271 - Ping Xie, Jianghui Liu, Gaoyuan Zhang, Ling Xing, Honghai Wu:
Opportunistic TPSR cooperative spectrum sharing protocol with secondary user selection for 5G wireless network. 1272-1283 - Haibo Liang, Xin Qin, Jianchong Gao, Muhammad Junaid Khan:
Research on detector signal receiving network layout optimization model. 1284-1296
Volume 13, Number 5, September 2020
- Maryam Zare, Seyed Hossein Khasteh, Saeid Ghafouri:
Automatic ICA detection in online social networks with PageRank. 1297-1311 - Baowen Xie, Guosheng Zhao, Mianxing Chao, Jian Wang:
A prediction model of cloud security situation based on evolutionary functional network. 1312-1326 - Zhixin Liu, Xiaopin Li, Yazhou Yuan, Xinping Guan:
Power control of D2D communication based on quality of service assurance under imperfect channel information. 1327-1339 - SungJin Yu, KiSung Park, YoHan Park, HyungPyo Kim, YoungHo Park:
A lightweight three-factor authentication protocol for digital rights management system. 1340-1356 - Samayveer Singh:
An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs. 1357-1374 - Ankita Srivastava, Arun Prakash, Rajeev Tripathi:
An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET. 1375-1393 - Ilker Ünal:
Integration of ZigBee based GPS receiver to CAN network for precision farming applications. 1394-1405 - Ahmad Karami, Nahideh Derakhshanfard:
RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network. 1406-1422 - Amir Hassani Karbasi, Siyamak Shahpasand:
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks. 1423-1441 - Yunhai Guo, Rui Lv, Zhengxiang Li:
A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN. 1442-1456 - Rui Wang, Faezeh Hajiaghajani, Subir Biswas:
Device-to-device streaming video caching for cellular download cost reduction. 1457-1473 - Zibin Ren, Ting Lu, Xin Wang, Wenjing Guo, Guohua Liu, Shan Chang:
Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture. 1474-1485 - Yuqi Fan, JingLin Zou, Siyu Liu, Qiran Yin, Xin Guan, Xiaohui Yuan, Weili Wu, Ding-Zhu Du:
A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach. 1486-1504 - Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze:
PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks. 1505-1525 - Farooque Hassan Kumbhar, Navrati Saxena, Abhishek Roy:
Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks. 1526-1538 - Zainab Hassan Ali, Mahmoud Mohammed Badawy, Hesham A. Ali:
A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance. 1539-1566 - Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li, Jinguo Li:
Toward efficient and effective bullying detection in online social network. 1567-1576 - Micael Pedrosa, André Zúquete, Carlos Costa:
RAIAP: renewable authentication on isolated anonymous profiles. 1577-1599 - Shibin Wang, Kele Mao, Furui Zhan, Dong Liu:
Hybrid conditional privacy-preserving authentication scheme for VANETs. 1600-1615 - Mahdi Tahavori, Farokhlagha Moazami:
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. 1616-1628 - Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring communities for sharing human digital memories in a social P2P network. 1629-1642 - Hui Zheng, Jun Shao, Guiyi Wei:
Attribute-based encryption with outsourced decryption in blockchain. 1643-1655 - Kamlesh Kumar Rana, Sachin Tripathi, Ram Shringar Raw:
Link reliability-based multi-hop directional location routing in vehicular ad hoc network. 1656-1671 - Oluwafolake Ojo, Cyril O. Iyadi, Ayodeji Oluwatope, Adio T. Akinwale:
AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network. 1672-1687 - Yohei Nishi, Masahiro Sasabe, Shoji Kasahara:
Optimality analysis of locality-aware tit-for-tat-based P2P file distribution. 1688-1703 - Deyu Zhang, Mianxiong Dong, Geyong Min:
Editorial: Emerging Trends on Data Analytics at the Network Edge. 1704-1705 - Jian Li, Daqian Shi, Piyaporn Tumnark, Hao Xu:
A system for real-time intervention in negative emotional contagion in a smart classroom deployed under edge computing service infrastructure. 1706-1719 - Haojun Teng, Kaoru Ota, Anfeng Liu, Tian Wang, Shaobo Zhang:
Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems. 1720-1743 - Xiaoheng Deng, Jin Liu, Leilei Wang, Zhihui Zhao:
A trust evaluation system based on reputation data in Mobile edge computing network. 1744-1755 - Ying Chen, Shuang Chen, Xin Chen:
Efficient caching strategy in wireless networks with mobile edge computing. 1756-1766 - Hongran Li, Weiwei Xu, Heng Zhang, Jian Zhang, Yi Liu:
Polynomial regressors based data-driven control for autonomous underwater vehicles. 1767-1775 - Jiwei Huang, Songyuan Li, Ying Chen:
Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing. 1776-1787 - Jiajia Xie, Jun Luo, Yan Peng, Shaorong Xie, Huayan Pu, Xiaomao Li, Zhou Su, Yuan Liu, Rui Zhou:
Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles. 1788-1798 - Guangsheng Feng, Yue Wang, Bingyang Li, Yafei Li, Hongwu Lv, Chengbo Wang, Zihan Gao, Huiqiang Wang:
A near-optimal content placement in D2D underlaid cellular networks. 1799-1813 - Zhufang Kuang, Gongqiang Li, Libang Zhang, Huibin Zhou, Changyun Li, Anfeng Liu:
Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks. 1814-1829 - Yanjun Peng, Peng Liu, Tingting Fu:
Performance analysis of edge-PLCs enabled industrial Internet of things. 1830-1838 - Genghua Yu, Jia Wu:
Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks. 1839-1852
Volume 13, Number 6, November 2020
- G. S. Binu, B. Shajimohan:
A novel heuristic based energy efficient routing strategy in wireless sensor network. 1853-1871 - Balamurugan N, J. Raja, R. Pitchai:
Multicriteria dragonfly graph theory based resource optimized virtual network mapping technique for home medical care service provisioning in cloud. 1872-1885 - Ali Seyfollahi, Ali Ghaffari:
Reliable data dissemination for the Internet of Things using Harris hawks optimization. 1886-1902 - Ali Seyfollahi, Ali Ghaffari:
Correction to: Reliable data dissemination for the internet of things using Harris hawks optimization. 1903-1904 - Aruchamy Prasanth, S. Jayachitra:
A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications. 1905-1920 - A. G. Sreedevi, T. Rama Rao:
SINR based association algorithm for indoor device-to-device communication networks. 1921-1930 - Saeideh Gholamrezazadeh Motlagh, Jelena V. Misic, Vojislav B. Misic:
An analytical model for churn process in Bitcoin network with ordinary and relay nodes. 1931-1942 - R. Shashidhara, Sriramulu Bojjagani, Anup Kumar Maurya, Saru Kumari, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. 1943-1966 - Nikita Bhagatkar, Kapil Dolas, Ratan K. Ghosh, Sajal K. Das:
An integrated P2P framework for E-learning. 1967-1989 - K. Karthika Lekshmi, M. Vigilson Prem:
Multi-keyword score threshold and B+ tree indexing based top-K query retrieval in cloud. 1990-2000 - K. Sumathi, Perumal Pandiaraja:
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks. 2001-2010 - S. K. Sathya Lakshmi Preetha, R. Dhanalakshmi, P. Mohamed Shakeel:
An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks. 2011-2022 - (Withdrawn) Machine learning based multi scale parallel K-means++ clustering for cloud assisted internet of things. 2023-2035
- L. Maria Michael Visuwasam, D. Paul Raj:
A distributed intelligent mobile application for analyzing travel big data analytics. 2036-2052 - (Withdrawn) RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network. 2053-2064
- C. Ajitha, Thirasamma Jaya:
Cognitive radio technology with reduced PAPR and complexity for IoT-based OFDM networks. 2065-2077 - Hongzhuo Qi:
Fuzzy logic hybridized artificial intelligence for computing and networking on internet of things platform. 2078-2088 - R. P. Premanand, A. Rajaram:
Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET. 2089-2098 - R. Elavarasan, K. Chitra:
An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN. 2099-2111 - Tamizharasi Thirugnanam, Muhammad Rukunuddin Ghalib:
A reward based connectivity-aware IoV neighbor selection for improving reliability in healthcare information exchange. 2112-2122 - BalaAnand Muthu, C. B. Sivaparthipan, Gunasekaran Manogaran, Revathi Sundarasekar, Seifedine Nimer Kadry, A. Shanthini, A. Antony Dasel:
IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. 2123-2134 - B. Satheesh Monikandan, A. Sivasubramanian, S. P. K. Babu, G. K. D. Prasanna Venkatesan, C. Arunachalaperumal:
Channel aware optimized proportional fair scheduler for LTE downlink. 2135-2144 - G. B. Santhi, Divakaran Sheela:
Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm. 2145-2154 - (Withdrawn) Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography. 2155-2165
- Bo Wang, Tianyu Fan, Xiangtian Nie:
Advanced delay assured numerical heuristic modelling for peer to peer project management in cloud assisted internet of things platform. 2166-2176 - Jabash Samuel G. K, J. Jasper:
MANFIS based SMART home energy management system to support SMART grid. 2177-2188 - A. S. Anshad, R. Radhakrishnan:
Improved network lifetime to identify unexploited PATH using series cornerstone PATH algorithm in wireless sensor networks. 2189-2200 - Xiang Wu, Huanhuan Wang, Wei Tan, Dashun Wei, Minyu Shi:
Dynamic allocation strategy of VM resources with fuzzy transfer learning method. 2201-2213 - Zhou Zhou, Hongmin Wang, Huailing Shao, Lifeng Dong, Junyang Yu:
A high-performance scheduling algorithm using greedy strategy toward quality of service in the cloud environments. 2214-2223 - Zhou Zhou, Zhuopeng Xiao, Weihong Deng:
Improved community structure discovery algorithm based on combined clique percolation method and K-means algorithm. 2224-2233 - Hongwei Li, Rongxing Lu, Mohamed M. E. A. Mahmoud:
Security and privacy of machine learning assisted P2P networks. 2234-2236 - Yi Zhang, Hequn Xian, Aimin Yu:
CSNN: Password guessing method based on Chinese syllables and neural network. 2237-2250 - Guangkai Ma, Chunpeng Ge, Lu Zhou:
Achieving reliable timestamp in the bitcoin platform. 2251-2259 - Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma:
Efficient distributed privacy-preserving collaborative outlier detection. 2260-2271 - Youwen Zhu, Xingxin Li:
Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks. 2272-2284 - Qian Wang, Zhipeng Gao, Zifan Li, Xiaojiang Du, Mohsen Guizani:
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning. 2285-2299 - Yingying Ren, Zhiwen Zeng, Tian Wang, Shaobo Zhang, Guoming Zhi:
A trust-based minimum cost and quality aware data collection scheme in P2P network. 2300-2323 - Huijuan Lian, Weidong Qiu, Di Yan, Zheng Huang, Peng Tang:
Efficient and secure k-nearest neighbor query on outsourced data. 2324-2333 - Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. 2334-2341 - Haoyang Wang, Kai Fan, Hui Li, Yintang Yang:
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. 2342-2355 - Xiaoyuan Liu, Hongwei Li, Guowen Xu, Rongxing Lu, Miao He:
Adaptive privacy-preserving federated learning. 2356-2366
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.