


default search action
Computer Communications, Volume 209
Volume 209, September 2023
- T. Benil, J. Jasper

:
Blockchain based secure medical data outsourcing with data deduplication in cloud environment. 1-13
- Arun Kumar Sangaiah

, Amir Javadpour
, Pedro Pinto
, Samira Rezaei, Weizhe Zhang
:
Enhanced resource allocation in distributed cloud using fuzzy meta-heuristics optimization. 14-25
- Ruidong Zhang

, Jiadong Zhang
, Wenxiao Shi
:
Partial offloading in device-to-device-assisted MEC network: A utility optimization approach. 26-37
- Jianbo Du

, Wenjie Cheng, Shulei Li:
Joint task offloading and resource allocation in mixed edge/cloud computing and blockchain empowered device-free sensing systems. 38-46
- Uddalak Chatterjee

, Sangram Ray
, Sharmistha Adhikari, Muhammad Khurram Khan
, Mou Dasgupta:
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC. 47-62
- Mohammad Abdussami

, Ruhul Amin
, P. Saravanan
, Satyanarayana Vollala:
BSAPM: BlockChain based secured authentication protocol for large scale WSN with FPGA implementation. 63-77 - Tiantian Tang, Chao Li

, Fagui Liu:
Collaborative cloud-edge-end task offloading with task dependency based on deep reinforcement learning. 78-90 - Kamalesh Acharya

, Amit Kumar Singh
, Sourav Mukhopadhyay:
Constructions of broadcast encryption with personalized messages from bilinear map. 91-101
- Nicolai Kröger

, Fidan Mehmeti, Hasanin Harkous, Wolfgang Kellerer:
Performance analysis of general P4 forwarding devices with controller feedback: Single- and multi-data plane cases. 102-119
- Javad Dogani

, Reza Namvar
, Farshad Khunjush
:
Auto-scaling techniques in container-based cloud and edge/fog computing: Taxonomy and survey. 120-150
- Fengrui Liu

, Yang Wang, Zhenyu Li, Hongtao Guan, Gaogang Xie:
AD2S: Adaptive anomaly detection on sporadic data streams. 151-162 - Fan Zhang, Yazhe Tang, Xun Li

, Chengchen Hu:
PROSE: Multi-round fair coflow scheduling without prior knowledge. 163-177 - Thijs Havinga

, Xianjun Jiao
, Muhammad Aslam
, Wei Liu
, Ingrid Moerman
:
Improved TDD operation on Software-Defined Radio platforms towards future wireless standards. 178-187 - Pratyashi Satapathy, Judhistir Mahapatro

:
An adaptive context-aware vertical handover decision algorithm for heterogeneous networks. 188-202
- Julian Heinovski

, Jorge Torres Gómez
, Falko Dressler:
Focusing on information context for ITS using a spatial age of information model. 203-216
- Tayyab Ali Khan, Karan Singh, Mohd Shariq

, Khaleel Ahmad, K. S. Savita, Ali Ahmadian
, Soheil Salahshour, Mauro Conti
:
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. 217-229
- Shan Liu, Qi Zhang, Lingling Huang:

Graphic image classification method based on an attention mechanism and fusion of multilevel and multiscale deep features. 230-238
- Sichun Lv, Haowen Tan, Wenying Zheng, Tao Zhang

, Menglei Wang:
A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing. 239-248 - Gulshan Kumar

, Rahul Saha, Mauro Conti
, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues
:
COUNT: Blockchain framework for resource accountability in e-healthcare. 249-259
- Sara Narteni

, Marco Muselli, Fabrizio Dabbene, Maurizio Mongelli:
Trustworthy artificial intelligence classification-based equivalent bandwidth control. 260-272
- Sebastian Boehm, Hartmut König:

Real-Time-Shift: Pseudo-Real-Time Event Scheduling for the Split-Protocol-Stack Radio-in-the-Loop Emulation. 273-282
- Zhenhua Wang

, Yan Guo, Ning Li, Hao Yuan, Shiguang Hu, Binghan Lei, Jianyu Wei:
Autonomous confrontation strategy learning evolution mechanism of unmanned system group under actual combat in the loop. 283-301
- Hosein Azarhava

, Javad Musevi Niya
, Mohammad Ali Tinati
:
NOMA-based energy efficient resource allocation in wireless energy harvesting sensor networks. 302-308
- Bernard Tamba Sandouno, Yamen Alsaba, Chadi Barakat

, Walid Dabbous, Thierry Turletti:
A novel approach for ray tracing optimization in wireless communication. 309-319
- Mohammad Kamrul Hasan, Shayla Islam, Thippa Reddy Gadekallu

, Ahmad Fadzil Ismail
, Sanaz Amanlou
, Siti Norul Huda Sheikh Abdullah:
Novel EBBDSA based Resource Allocation Technique for Interference Mitigation in 5G Heterogeneous Network. 320-330
- Yan Tu, Linqi Cheng

, Liyi Liu, Zongmin Li, Benjamin Lev
:
How to improve the rumor-confutation ability of official rumor-refuting account on social media: A Chinese case study. 331-348
- Somreeta Pramanik

, Adlen Ksentini, Carla-Fabiana Chiasserini:
Cost-efficient slicing in virtual Radio Access Networks. 349-358
- Muhammad Sangeen, Naveed Anwar Bhatti, Kashif Kifayat

, Abeer Abdullah Alsadhan, Haoda Wang:
Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks. 359-367
- Mahla Mohammadi, Seyed Mehdi Hosseini Andargoli

:
Throughput maximization for downlink DF MIMO relay based SWIPT cognitive radio networks. 368-377
- Zepu Wang, Peng Sun

, Yulin Hu
, Azzedine Boukerche:
A novel hybrid method for achieving accurate and timeliness vehicular traffic flow prediction in road networks. 378-386 - Zhiwei Bao

, Yulin Hu
, Peng Sun, Azzedine Boukerche, Anke Schmeink:
Average age upon decisions with truncated HARQ and optimization in the finite blocklength regime. 387-401
- Yongjing Zhang, Guannan Li, Wangchen Dai

, Chengxin Hong, Jin Qian, Zhaoyang Han:
IoT-based generalized multi-granulation sequential three-way decisions. 402-414
- Yifei Lu

, Zhengzhi Xu, Xu Ma:
FAMG: A flow-aware and mixed granularity method for load-balancing in data center networks. 415-428 - Mohamed Khadmaoui-Bichouna

, José M. Alcaraz-Calero
, Qi Wang
:
Empirical evaluation of 5G and Wi-Fi mesh interworking for Integrated Access and Backhaul networking paradigm. 429-443
- Xiangjie Wang, Yifeng Lin

, Yuer Yang
, Hui Xu, Zhenpeng Luo:
A secure physical health test data sharing scheme based on token distribution and programmable blockchains. 444-454
- Yongxin Zhang

, Zijian Bao, Qinghao Wang
, Ning Lu
, Wenbo Shi
, Bangdao Chen
, Hong Lei:
OWL: A data sharing scheme with controllable anonymity and integrity for group users. 455-468
- Gaurav Baranwal

, Dinesh Kumar
, Deo Prakash Vidyarthi
:
Blockchain based resource allocation in cloud and distributed edge computing: A survey. 469-498
- Claudio Fiandrino

, David Juárez Martínez-Villanueva, Joerg Widmer:
A study on 5G performance and fast conditional handover for public transit systems. 499-512
- Syed Muhammad Waqas

, Yazhe Tang, Lisu Yu, Fakhar Abbas
:
A joint cluster-based RRM and Low-latency framework using the full-duplex mechanism for NR-V2X networks. 513-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














