


default search action
Computer Communications, Volume 181
Volume 181, January 2022
- Pablo A. Barbecho Bautista

, Luis Urquiza-Aguiar, Mónica Aguilar-Igartua:
How does the traffic behavior change by using SUMO traffic generation tools. 1-13
- Luca Chiaraviglio, Vinay Chamola

, Biplab Sikdar, Guangjie Han:
Special issue on scalable and secure platforms for UAV networks. 14-16
- Christian Quadri

, Vincenzo Mancuso
, Marco Ajmone Marsan, Gian Paolo Rossi:
Edge-based platoon control. 17-31 - Victoria Manfredi

, Cameron Donnay Hill:
Quantifying unlinkability in multi-hop wireless networks. 32-44
- Zhongliang Zhao, Pedro Cumino

, Christian Esposito
, Meng Xiao
, Denis Rosário, Torsten Braun
, Eduardo Cerqueira, Susana Sargento
:
Smart Unmanned Aerial Vehicles as base stations placement to improve the mobile network operations. 45-57
- Molly Zhang

, Luca de Alfaro
, J. J. Garcia-Luna-Aceves:
Making slotted ALOHA efficient and fair using reinforcement learning. 58-68
- Daya Sagar Gupta

, Sangram Ray
, Tajinder Singh
, Madhu Kumari:
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security. 69-79
- Qin Zhang, Yutang Liu:

Reliability evaluation of Markov cyber-physical system oriented to cognition of equipment operating status. 80-89
- Weifeng Lu, Weiduo Wu, Jia Xu, Pengcheng Zhao, Dejun Yang, Lijie Xu:

Auction design for cross-edge task offloading in heterogeneous mobile edge clouds. 90-101
- Rémy Grünblatt

, Isabelle Guérin Lassous, Olivier Simonin
:
A distributed antenna orientation solution for optimizing communications in a fleet of UAVs. 102-115
- Saddam Hussain

, Syed Sajid Ullah
, Ihsan Ali
, Jiafeng Xie, Venkata N. Inukollu:
Certificateless signature schemes in Industrial Internet of Things: A comparative survey. 116-131
- Yu Lin, Hui Song, Feng Ke, Weizhao Yan, Zhikai Liu, Faming Cai:

Optimal caching scheme in D2D networks with multiple robot helpers. 132-142 - Fangfang Gou, Jia Wu

:
Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks. 143-155
- Tri Gia Nguyen

, Trung V. Phan, Dinh Thai Hoang
, Hai Hoang Nguyen, Duc Tran Le
:
DeepPlace: Deep reinforcement learning for adaptive flow rule placement in Software-Defined IoT Networks. 156-163
- Qing Liu:

Human motion state recognition based on MEMS sensors and Zigbee network. 164-172 - Chao Niu, Lizhou Wang:

Big data-driven scheduling optimization algorithm for Cyber-Physical Systems based on a cloud platform. 173-181 - Hui Zeng, Jiaqi Luo:

Construction of multi-modal perception model of communicative robot in non-structural cyber physical system environment based on optimized BT-SVM model. 182-191
- Dolores García

, Jesus Omar Lacruz
, Damiano Badini
, Danilo De Donno
, Joerg Widmer
:
Model-free machine learning of wireless SISO/MIMO communications. 192-202
- Kushan Sudheera Kalupahana Liyanage

, Maode Ma, Peter Han Joo Chong:
Real-time cooperative data routing and scheduling in software defined vehicular networks. 203-214 - Sungwook Kim

:
4G/5G coexistent dynamic spectrum sharing scheme based on dual bargaining game approach. 215-223
- Fayez Alqahtani, Mohammed Al-Maitah, Osama A. Elshakankiry:

A proactive caching and offloading technique using machine learning for mobile edge computing users. 224-235
- Himanshu Verma

, Naveen Chauhan
, Narottam Chand
, Lalit Kumar Awasthi
:
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted 'Internet of Healthcare Things' network. 236-256
- Lianzhen Chen, Hua Zhu:

Analysis of physical health risk dynamic evaluation system based on sports network technology. 257-266
- An Braeken

:
Pairing free asymmetric group key agreement protocol. 267-273
- Sohaib A. Latif

, Fang B. Xian Wen, Celestine Iwendi
, Li-li F. Wang, Syed Muhammad Mohsin
, Zhaoyang Han, Shahab S. Band:
AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. 274-283
- Karim Boutiba

, Adlen Ksentini, Bouziane Brik
, Yacine Challal
, Amar Balla:
NRflex: Enforcing network slicing in 5G New Radio. 284-292
- Bakkiam David Deebak

, Fadi Al-Turjman
:
A robust and distributed architecture for 5G-enabled networks in the smart blockchain era. 293-308
- Xin Li, Ruitao Liu, Zhenmin Qiao

:
Privacy information verification of homomorphic algorithm for aggregated data based on fog layer structure. 309-319
- Ruomei Wang

, Jianfeng Wang, Zhuo Su
:
Learning compatibility knowledge for outfit recommendation with complementary clothing matching. 320-328 - Jiangjin Gao, Tao Yang

:
Face detection algorithm based on improved TinyYOLOv3 and attention mechanism. 329-337
- Enrico Corradini

, Serena Nicolazzo, Antonino Nocera
, Domenico Ursino, Luca Virgili
:
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT. 338-356
- Linqi Li, Xiaoyin Wang, Xinhua Ma:

Design of a location-based opportunistic geographic routing protocol. 357-364
- Sandra M. Djosic

, Igor Z. Stojanovic
, Milica D. Jovanovic
, Goran Lj. Djordjevic
:
Multi-algorithm UWB-based localization method for mixed LOS/NLOS environments. 365-373
- ChienHsiang Wu, Chin-Feng Lai

:
A survey on improving the wireless communication with adaptive antenna selection by intelligent method. 374-403
- Jie Hu, Sier Deng:

Rolling bearing fault diagnosis based on wireless sensor network data fusion. 404-411 - Sadia Jabeen Siddiqi

, Faisal Naeem, Saud Khan
, Komal Saifullah Khan
, Muhammad Tariq
:
Towards AI-enabled traffic management in multipath TCP: A survey. 412-427
- Anwar Khan, Muhammad Imran, Muhammad Shoaib

, Atiq Ur Rahman
, Najm Us Sama
:
Link and stability-aware adaptive cooperative routing with restricted packets transmission and void-avoidance for underwater acoustic wireless sensor networks. 428-437
- Chunyang Zhang

, Gaogang Xie
:
Using XorOffsetTrie for high-performance IPv6 lookup in the backbone network. 438-445
- Xiuli Yu, Mingshuai Dong, Weimin Yin:

Time-optimal trajectory planning of manipulator with simultaneously searching the optimal path. 446-453
- Dan Tang, Xiyin Wang, Yudong Yan, Dongshuo Zhang, Huan Zhao:

ADMS: An online attack detection and mitigation system for LDoS attacks via SDN. 454-471
- Shaohua Wan, Remigiusz Wisniewski, George C. Alexandropoulos, Zonghua Gu, Pierluigi Siano

:
Special Issue on Optimization of Cross-layer Collaborative Resource Allocation for Mobile Edge Computing, Caching and Communication. 472-473
- Varun G. Menon

, Ali Kashif Bashir, Shahid Mumtaz, Syed Hassan Ahmed
, Danda B. Rawat
:
Special issue on Security and Privacy in Internet of Medical Things. 474-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














