default search action
Computer Communications, Volume 203
Volume 203, April 2023
- Zhenyu Wang, Ding Deng, Shen Hou, Yang Guo, Shaoqing Li:
Design of three-factor secure and efficient authentication and key-sharing protocol for IoT devices. 1-14 - Aditi Zear, Virender Ranga, Kriti Bhushan:
Coordinated network partition detection and bi-connected inter-partition topology creation in damaged sensor networks using multiple UAVs. 15-29 - Christian Quadri, Alberto Ceselli, Gian Paolo Rossi:
Multi-user edge service orchestration based on Deep Reinforcement Learning. 30-47
- Shipu Diao, Yong Yang, Guanqun Cui, Yubing Chen:
Complex parts machining path planning through cross-source point cloud processing. 48-59
- Renato Caminha Juaçaba-Neto, Pascal Mérindol, Fabrice Theoleyre:
Enabling privacy by anonymization in the collection of similar data in multi-domain IoT. 60-76 - Tianle Shan, Yang Wang, Chuanxin Zhao, Yingchun Li, Guanghai Zhang, Qiangjun Zhu:
Multi-UAV WRSN charging path planning based on improved heed and IA-DRL. 77-88 - Hsin-Tsung Lin, Pi-Chung Wang:
TCAM-based packet classification for many-field rules of SDNs. 89-98 - Jagnyashini Debadarshini, Sudipta Saha:
Fine-grained frequencies meet synchronous transmission. 99-118 - Zhao Yang, Qingshuang Sun:
Joint think locally and globally: Communication-efficient federated learning with feature-aligned filter selection. 119-128
- Esther Guérin, Thomas Begin, Isabelle Guérin Lassous:
An overview of MAC energy-saving mechanisms in Wi-Fi. 129-145
- Fabian Wölk, Tingting Yuan, Krisztina Kis-Katos, Xiaoming Fu:
A temporal-spatial analysis on the socioeconomic development of rural villages in Thailand and Vietnam based on satellite image data. 146-162
- Yanwei Zheng, Liangxu Zhang, Shuzhen Chen, Xiao Zhang, Zhipeng Cai, Xiuzhen Cheng:
Robust decentralized stochastic gradient descent over unstable networks. 163-179
- Francescomaria Faticanti, Marco Savi, Francesco De Pellegrini, Domenico Siracusa:
Locality-aware deployment of application microservices for multi-domain fog computing. 180-191
- Youcef Djenouri, Asma Belhadi, Gautam Srivastava, Jerry Chun-Wei Lin, Anis Yazidi:
Interpretable intrusion detection for next generation of Internet of Things. 192-198
- Andrea De Salve, Paolo Mori, Laura Ricci, Roberto Di Pietro:
Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directions. 199-225
- Anan Zhou, Nanhao Zhou, Benshun Yi, Chao Zhu:
A cost-efficient hybrid redundancy coding scheme for wireless storage systems. 226-237
- Yun Wu, Liangshun Wu, Hengjin Cai:
Reinforced practical Byzantine fault tolerance consensus protocol for cyber physical systems. 238-247
- Abednego Acheampong, Yiwen Zhang, Xiaolong Xu:
A parallel computing based model for online binary computation offloading in mobile edge computing. 248-261
- Ingrid Huso, Daniele Sparapano, Giuseppe Piro, Gennaro Boggia:
Privacy-preserving data dissemination scheme based on Searchable Encryption, publish-subscribe model, and edge computing. 262-275
- Zhu Wen, Limei Guo, Sipei Meng, Xiaoli Rong, Yehui Shi:
IoT-assisted feature learning for surface settlement prediction caused by shield tunnelling. 276-288
- Alberto Zancanaro, Giulia Cisotto, Leonardo Badia:
Modeling Value of Information in remote sensing from correlated sources. 289-297
- Richard Etengu, Saw Chin Tan, Teong Chee Chuah, Ying Loong Lee, Jaime Galán-Jiménez:
AI-assisted traffic matrix prediction using GA-enabled deep ensemble learning for hybrid SDN. 298-311 - Bangfu Zuo, Yu Xu, Dingcheng Yang, Lin Xiao, Tiankui Zhang:
Joint resource optimization and trajectory design for energy minimization in UAV-assisted mobile-edge computing systems. 312-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.