![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Mohammad Arif
, Wooseong Kim:
Clustered jamming in U-V2X communications with 3D antenna beam-width fluctuations. Comput. Commun. 216: 209-228 (2024) - Jie Bai, Jingchuan Sun, Zhigang Wang, Xunwei Zhao, Aijun Wen, Chunling Zhang, Jianguo Zhang:
An adaptive intelligent routing algorithm based on deep reinforcement learning. Comput. Commun. 216: 195-208 (2024) - Songyan Chen, Junjie Chen
, Hongjun Li:
Joint optimization of UPF placement and traffic routing for 5G core network user plane. Comput. Commun. 216: 86-94 (2024) - Dayrene Frometa Fonseca
, Muhammad Sarmad Mir, Sergio Iglesias de Frutos, Borja Genovés Guzmán, Domenico Giustiniano:
Modulating LiFi for dual operation in the visible and infrared spectra. Comput. Commun. 216: 251-259 (2024) - Hyder Ali Hingoliwala
, Naween Kumar
, Anand Nayyar, Gandharba Swain
:
Energy-efficient Neuro-fuzzy-based Multi-node Charging Model for WRSNs using Multiple Mobile Charging Vehicles. Comput. Commun. 216: 356-373 (2024) - Tran Manh Hoang, Ba Cao Nguyen
, Huu Minh Nguyen, Phuong T. Tran
:
Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers. Comput. Commun. 216: 238-250 (2024) - Xinyu Hong
, Na Lv, Ying Pan
:
Integrated sensing and communication-assisted beam rendezvous in airborne networks. Comput. Commun. 216: 274-282 (2024) - Zakaria Abou El Houda, Bouziane Brik, Adlen Ksentini:
Securing IIoT applications in 6G and beyond using adaptive ensemble learning and zero-touch multi-resource provisioning. Comput. Commun. 216: 260-273 (2024) - Tingpei Huang, Shiyu Guo, Tiantian Zhang, Bairen Zhang, Jianhang Liu:
Node clustering scheme supporting mobility in NOMA-enabled backscatter communication networks. Comput. Commun. 216: 346-355 (2024) - Manuel Jiménez-Lázaro, Javier Berrocal
, Jaime Galán-Jiménez
:
Flow-based Service Time optimization in software-defined networks using Deep Reinforcement Learning. Comput. Commun. 216: 54-67 (2024) - Prabhakar Krishnan, Kurunandan Jain, Shivananda R. Poojara
, Satish Narayana Srirama, Tulika Pandey, Rajkumar Buyya:
eSIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks. Comput. Commun. 216: 324-345 (2024) - Rakhee Kulshrestha
, Ajay Singh:
Transient analysis of energy-saving strategy for cognitive radio networks using G-queue with heterogeneity. Comput. Commun. 216: 295-306 (2024) - Sanjeev Kumar
, B. Janet, Subramanian Neelakantan
:
IMCNN:Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network. Comput. Commun. 216: 16-33 (2024) - Sen Li, Hui Jin, Yingke Gao, Ying Wang, Shuhong Dai, Yongjun Xu, Long Cheng
:
Approximate data mapping in refresh-free DRAM for energy-efficient computing in modern mobile systems. Comput. Commun. 216: 151-158 (2024) - Tasiu Muazu
, Yingchi Mao, Abdullahi Uwaisu Muhammad, Muhammad Ibrahim
, Umar Muhammad Mustapha Kumshe, Omaji Samuel:
A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing. Comput. Commun. 216: 168-182 (2024) - Ali Nauman
, Mashael S. Maashi, Hend Khalid Alkahtani, Fahd N. Al-Wesabi, Nojood O. Aljehane, Mohammed Assiri, Sara Saadeldeen Ibrahim, Wali Ullah Khan:
Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms. Comput. Commun. 216: 374-386 (2024) - Viet Hung Nguyen, Duy Tien Bui, Thanh Lam Tran, Truong Cong Thang, Thu Huong Truong
:
Scalable and resilient 360-degree-video adaptive streaming over HTTP/2 against sudden network drops. Comput. Commun. 216: 1-15 (2024) - Zhiyuan Ning
, Zile Wang, Yang Liu, Jing Liu
, Liang Song
:
Memory-enhanced appearance-motion consistency framework for video anomaly detection. Comput. Commun. 216: 159-167 (2024) - Leonan T. Oliveira
, Luiz F. Bittencourt, Thiago A. L. Genez, Eyal de Lara, Maycon L. M. Peixoto
:
Enhancing modular application placement in a hierarchical fog computing: A latency and communication cost-sensitive approach. Comput. Commun. 216: 95-111 (2024) - Jiby J. Puthiyidam
, Shelbi Joseph, Bharat Bhushan
:
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication. Comput. Commun. 216: 307-323 (2024) - Yuxi Qin
, Stephan Sigg
, Su Pan
, Zibo Li:
Direction-agnostic gesture recognition system using commercial WiFi devices. Comput. Commun. 216: 34-44 (2024) - Vaishali A. Shirsath
, Madhav Chandane, Chhagan Lal, Mauro Conti
:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. Comput. Commun. 216: 283-294 (2024) - Géza Szabó
, József Peto:
Intelligent wireless resource management in industrial camera systems: Reinforcement Learning-based AI-extension for efficient network utilization. Comput. Commun. 216: 68-85 (2024) - Kun Wang, Yu Fu, Xueyuan Duan, Taotao Liu, Jianqiao Xu:
Abnormal traffic detection system in SDN based on deep learning hybrid models. Comput. Commun. 216: 183-194 (2024) - Lili Wu
, Majid Khan Majahar Ali, Ying Tian:
Supervision and early warning of abnormal data in Internet of Things based on unsupervised attention learning. Comput. Commun. 216: 229-237 (2024) - Shaoqi Yan
, Yan Wang, Xinji Mai, Qing Zhao, Wei Song, Jun Huang, Zeng Tao, Haoran Wang, Shuyong Gao, Wenqiang Zhang:
Empower smart cities with sampling-wise dynamic facial expression recognition via frame-sequence contrastive learning. Comput. Commun. 216: 130-139 (2024) - Haoran Zhang, Shan Jiang, Shichang Xuan:
Decentralized federated learning based on blockchain: concepts, framework, and challenges. Comput. Commun. 216: 140-150 (2024) - Jiale Zhao, Chaoshuo Deng, Huanhuan Yu, Hansheng Fei, Deshun Li:
Path planning of unmanned vehicles based on adaptive particle swarm optimization algorithm. Comput. Commun. 216: 112-129 (2024) - Qing Zhao
, Yan Wang, Yuxuan Lin, Shaoqi Yan, Wei Song, Boyang Wang, Jun Huang, Yang Chang, Lizhe Qi, Wenqiang Zhang:
Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries. Comput. Commun. 216: 45-53 (2024)
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-11 04:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint