


default search action
Computer Communications, Volume 179
Volume 179, November 2021
- Tadej Murovic

, Andrej Trost:
Genetically optimized massively parallel binary neural networks for intrusion detection systems. 1-10 - Luis Rodrigues, Joel Guerreiro

, Noélia Correia
:
Resource design in federated sensor networks using RELOAD/CoAP overlay architectures. 11-21 - Subhankar Ghosal

, Sasthi C. Ghosh:
A randomized algorithm for joint power and channel allocation in 5G D2D communication. 22-34 - Emine Es Yurek

, Huseyin Cenk Özmutlu
:
Traveling salesman problem with drone under recharging policy. 35-49 - Mingzhi Sha, Azzedine Boukerche:

A novel visibility semantic feature-aided pedestrian detection scheme for autonomous vehicles. 50-61 - Fu-Hau Hsu, Jyun-Shao Wu, Chih-Wen Ou

, Tzu-Chi Liu, Yung-Yu Zhuang
:
IoTD: An approach to identify E-mails sent by IoT devices. 62-72 - Sabina Szymoniak

:
Amelia - A new security protocol for protection against false links. 73-81 - Juan Sun, Shubin Zhang

, Kaikai Chi:
Resources optimization for secure transmission in wireless powered communication networks. 82-91 - Fang Shi, Lisheng Fan, Xiazhi Lai, Yuehong Chen, Weiwei Lin:

A hierarchical caching strategy in content delivery network. 92-101 - Mohammed Anis Benblidia, Bouziane Brik

, Moez Esseghir
, Leïla Merghem-Boulahia:
A renewable energy-aware power allocation for cloud data centers: A game theory approach. 102-111 - Wengang Ma

, Yadong Zhang, Jin Guo, Kehong Li:
Unbalanced abnormal traffic detection based on improved Res-BIGRU and integrated dynamic ELM optimization. 112-130 - Rodrigo Moreira

, Pedro Frosi Rosa
, Rui Luis Andrade Aguiar
, Flávio de Oliveira Silva
:
NASOR: A network slicing approach for multiple Autonomous Systems. 131-144
- Donghua Wang

, Li Dong
, Rangding Wang, Diqun Yan
:
Fast speech adversarial example generation for keyword spotting system with conditional GAN. 145-156
- Arturo Basaure

, Benjamin Finley, Heikki Hämmäinen:
Spectrum assignment for connected vehicles: Local licensing versus coopetition. 157-165
- Maurizio Mongelli:

Design of countermeasure to packet falsification in vehicle platooning by explainable artificial intelligence. 166-174
- Keji Mao, Jinyu Xu, Runhui Jin, Yuxiang Wang, Kai Fang

:
A fast calibration algorithm for Non-Dispersive Infrared single channel carbon dioxide sensor based on deep learning. 175-182 - Ning Zhang, Chenfei Zhang, Dengpan Wu:

Construction of a smart management system for physical health based on IoT and cloud computing with big data. 183-194
- Ibnu Febry Kurniawan

, A. Taufiq Asyhari
, Fei He
, Ye Liu
:
Mobile computing and communications-driven fog-assisted disaster evacuation techniques for context-aware guidance support: A survey. 195-216
- Fran Casino

, Nikolaos Lykousas
, Vasilios Katos
, Constantinos Patsakis
:
Unearthing malicious campaigns and actors from the blockchain DNS ecosystem. 217-230
- Dian Meng

, Yang Xiao, Zhiwei Guo
, Alireza Jolfaei
, Lanxia Qin, Xinting Lu, Qiao Xiang:
A data-driven intelligent planning model for UAVs routing networks in mobile Internet of Things. 231-241
- Chunyue Wu, Ruifeng Liang, Feng Xu, Feng Ke:

UAV path planning for backscatter communication with phase cancellation. 242-250 - Rajendra Prasad Sirigina

, A. S. Madhukumar, Mark D. J. Bowyer:
Transceiver design for high altitude pseudo satellite aided dual satellite systems. 251-259
- Abdullah Yousafzai

, Priyan Malarvizhi Kumar
, Choong Seon Hong:
CROWD-CDN: A cryptocurrency incentivized crowdsourced peer-to-peer content delivery framework. 260-271
- Róza Goscien:

On the efficient design of network resilient to electro-magnetic pulse attack - elastic optical network case study. 272-284
- José Ramón Saura

, Daniel Palacios-Marqués, Domingo Ribeiro-Soriano
:
Using data mining techniques to explore security issues in smart living environments in Twitter. 285-295
- Zheng Chen, Wenli Zhou, Shuo Wu, Li Cheng:

An on demand load balancing multi-path routing protocol for differentiated services in MWSN. 296-306
- Mei Zhang, Huihui Su, Jinghua Wen:

Classification of flower image based on attention mechanism and multi-loss attention network. 307-317

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














