Stop the war!
Остановите войну!
for scientists:
default search action
Computer Communications, Volume 166
Volume 166, January 2021
- Ayman Ibaida, Alsharif Abuadbba, Naveen K. Chilamkurti:
Privacy-preserving compression model for efficient IoMT ECG sharing. 1-8
- Leonardo Maccari, Valeria Cagno:
Do we need a contact tracing app? 9-18
- Prosanta Gope, Owen Millwood, Neetesh Saxena:
A provably secure authentication scheme for RFID-enabled UAV applications. 19-25
- Yunpei Chen, Qi Zhu, Chunyan Feng, Xiaohui Li:
Analysis of backlog and delay in downlink power-domain non-orthogonal multiple access wireless networks. 26-39 - Dariusz Marek, Adam Domanski, Joanna Domanska, Tadeusz Czachórski, Jerzy Klamka, Jakub Szygula:
Combined diffusion approximation-simulation model of AQM's transient behavior. 40-48
- Zheng Wang, Guangfu Li, Jia Ren:
Dynamic path planning for unmanned surface vehicle in complex offshore areas based on hybrid algorithm. 49-56
- Zan Gao, Yuchan Yang, Mohammad Reza Khosravi, Shaohua Wan:
Class consistent and joint group sparse representation model for image classification in Internet of Medical Things. 57-65
- Long Chen, Jigang Wu, Jun Zhang:
Long-term optimization for MEC-enabled HetNets with device-edge-cloud collaboration. 66-80 - Zhixin Liu, Yongkang Wang, Yazhou Yuan, Kit Yan Chan:
Pricing-based interference management scheme in LTE-V2V communication with imperfect channel state information. 81-90
- Basudeb Bera, Ashok Kumar Das, Anil Kumar Sutrala:
Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment. 91-109
- Prabhat Kumar, Govind P. Gupta, Rakesh Tripathi:
An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks. 110-124
- Praveen Kumar Malik, Rohit Sharma, Rajesh Singh, Anita Gehlot, Suresh Chandra Satapathy, Waleed S. Alnumay, Danilo Pelusi, Uttam Ghosh, Janmenjoy Nayak:
Industrial Internet of Things and its Applications in Industry 4.0: State of The Art. 125-139
- K. Rajesh Rao, Ashalatha Nayak, Indranil Ghosh Ray, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan:
Role recommender-RBAC: Optimizing user-role assignments in RBAC. 140-153
- Pankaj Kumar, Lokesh Chouhan:
A privacy and session key based authentication scheme for medical IoT networks. 154-164
- Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. 165-173
- Samuel Dayo Okegbile, Bodhaswar T. Maharaj, Attahiru Sule Alfa:
Stochastic geometry approach towards interference management and control in cognitive radio network: A survey. 174-195 - Suat Mercan, Enes Erdin, Kemal Akkaya:
Improving transaction success rate in cryptocurrency payment channel networks. 196-207
- Gaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Wei (Lisa) Li:
Edge computing assisted privacy-preserving data computation for IoT devices. 208-215
- Lucas de Melo Guimarães, Jacir Luiz Bordim:
A full-duplex MAC technique to improve spectrum-efficiency on 5G mobile wireless networks. 216-225
- Christian Grasso, Karthik Eswar K. N., Prabagarane Nagaradjane, Mridhula Ramesh, Giovanni Schembra:
Designing the Tactile Support Engine to assist time-critical applications at the edge of a 5G network. 226-233
- Peng Feng, Yuebin Bai, Yuhao Gu, Jun Huang, Xiaolin Wang, Chang Liu:
A rapid coarse-grained blind wideband spectrum sensing method for cognitive radio networks. 234-243 - Xiaohui Gu, Guoan Zhang:
Energy-efficient computation offloading for vehicular edge computing networks. 244-253
- Xiaoheng Deng, Yajun Liu, Congxu Zhu, Honggang Zhang:
Air-Ground Surveillance Sensor Network based on edge computing for target tracking. 254-261 - Zhiping Jin, Zhibiao Liang, Yu Wang, Weizhi Meng:
Mobile network traffic pattern classification with incomplete a priori information. 262-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.