Search dblp for Publications

export results for "toc:db/journals/comcom/comcom163.bht:"

 download as .bib file

@article{DBLP:journals/comcom/Al-NajiZ20,
  author       = {Fatimah Hussain Al{-}Naji and
                  Rachid Zagrouba},
  title        = {A survey on continuous authentication methods in Internet of Things
                  environment},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {109--133},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.006},
  doi          = {10.1016/J.COMCOM.2020.09.006},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Al-NajiZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChenLGWZS20,
  author       = {Yanming Chen and
                  Chao Li and
                  Luqi Gong and
                  Xiang Wen and
                  Yiwen Zhang and
                  Weisong Shi},
  title        = {A deep neural network compression algorithm based on knowledge transfer
                  for edge devices},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {186--194},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.016},
  doi          = {10.1016/J.COMCOM.2020.09.016},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ChenLGWZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChowdhuryD20,
  author       = {Aparajita Chowdhury and
                  Debashis De},
  title        = {{FIS-RGSO:} Dynamic Fuzzy Inference System Based Reverse Glowworm
                  Swarm Optimization of energy and coverage in green mobile wireless
                  sensor networks},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {12--34},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.002},
  doi          = {10.1016/J.COMCOM.2020.09.002},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChowdhuryD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FanWY20,
  author       = {Yuqi Fan and
                  Lunfei Wang and
                  Xiaohui Yuan},
  title        = {Controller placements for latency minimization of both primary and
                  backup paths in SDNs},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {35--50},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.001},
  doi          = {10.1016/J.COMCOM.2020.09.001},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FanWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Gonzalez-Manzano20,
  author       = {Lorena Gonz{\'{a}}lez{-}Manzano and
                  Upal Mahbub and
                  Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Rama Chellappa},
  title        = {Impact of injection attacks on sensor-based continuous authentication
                  for smartphones},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {150--161},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.022},
  doi          = {10.1016/J.COMCOM.2020.08.022},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Gonzalez-Manzano20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/GullPM20,
  author       = {Solihah Gull and
                  Shabir A. Parah and
                  Khan Muhammad},
  title        = {Reversible data hiding exploiting Huffman encoding with dual images
                  for IoMT based healthcare},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {134--149},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.023},
  doi          = {10.1016/J.COMCOM.2020.08.023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/GullPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HauweeleQ20,
  author       = {David Hauweele and
                  Bruno Quoitin},
  title        = {Toward accurate clock drift modeling in Wireless Sensor Networks simulation},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {1--11},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.025},
  doi          = {10.1016/J.COMCOM.2020.08.025},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/HauweeleQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LuanB20,
  author       = {Gan Luan and
                  Norman C. Beaulieu},
  title        = {Accurate mathematical modeling and solution of {TCP} congestion window
                  size distribution},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {195--201},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.010},
  doi          = {10.1016/J.COMCOM.2020.09.010},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/LuanB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RehmanPA20,
  author       = {Abdul Rehman and
                  Anand Paul and
                  Awais Ahmad},
  title        = {A Query based Information search in an Individual's Small World of
                  Social Internet of Things},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {176--185},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.027},
  doi          = {10.1016/J.COMCOM.2020.08.027},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/RehmanPA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShenHYW20,
  author       = {Yanyan Shen and
                  Xiaoxia Huang and
                  Bo Yang and
                  Shuqiang Wang},
  title        = {Low complexity resource allocation algorithms for chunk based {OFDMA}
                  multi-user networks with max-min fairness},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {51--64},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.003},
  doi          = {10.1016/J.COMCOM.2020.09.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ShenHYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SinghSK20,
  author       = {Simar Preet Singh and
                  Anju Sharma and
                  Rajesh Kumar},
  title        = {Designing of fog based {FBCMI2E} Model using machine learning approaches
                  for intelligent communication systems},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {65--83},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.005},
  doi          = {10.1016/J.COMCOM.2020.09.005},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/SinghSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SrinivasM20,
  author       = {T. Aditya Sai Srinivas and
                  S. S. Manivannan},
  title        = {Prevention of Hello Flood Attack in IoT using combination of Deep
                  Learning with Improved Rider Optimization Algorithm},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {162--175},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.03.031},
  doi          = {10.1016/J.COMCOM.2020.03.031},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SrinivasM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Torkamani-AzarJ20,
  author       = {Sahand Torkamani{-}Azar and
                  Mohsen Jahanshahi},
  title        = {A new {GSO} based method for {SDN} controller placement},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {91--108},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.09.004},
  doi          = {10.1016/J.COMCOM.2020.09.004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/Torkamani-AzarJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhengLC20,
  author       = {Qun Zheng and
                  Yaofeng Li and
                  Jie Cao},
  title        = {Application of data mining technology in alarm analysis of communication
                  network},
  journal      = {Comput. Commun.},
  volume       = {163},
  pages        = {84--90},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.012},
  doi          = {10.1016/J.COMCOM.2020.08.012},
  timestamp    = {Wed, 28 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhengLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics