


default search action
Computer Communications, Volume 148
Volume 148, December 2019
- Arash Ahmadfard, Ali Jamshidi:

A channel hopping based defense method against primary user emulation attack in cognitive radio networks. 1-8 - Abdulaziz Alarifi, Ahmad Ali AlZubi

, Mohammed Al-Maitah, Basil Al-Kasasbeh
:
An optimal sensor placement algorithm (O-SPA) for improving tracking precision of human activity in real-world healthcare systems. 9-16 - Claudio Fiandrino

, Alejandro Blanco Pizarro
, Pablo Jiménez Mateo, Carlos Andrés Ramiro, Norbert Ludant, Joerg Widmer
:
openLEON: An end-to-end emulation platform from the edge data center to the mobile user. 17-26 - Veeraruna Kavitha, Nandyala Hemachandra, Mayur Zambre:

Opportunistic schedulers and asymptotic price for fairness. 27-41 - B. Ramesh

, J. Senthilkumar, Y. Suresh
, V. Mohanraj:
Constrained pattern extension algorithm based peak power reduction techniques for MIMO-OFDM applications. 42-47 - Dagnachew Azene Temesgene, Marco Miozzo, Paolo Dini

:
Dynamic control of functional splits for energy harvesting virtual small cells: A distributed reinforcement learning approach. 48-61 - Dezhi Feng

, Saptarshi Das, Faezeh Hajiaghajani, Yan Shi
, Subir Biswas:
Pulse Position Coded Medium Access in energy-starved networks. 62-73 - Reyhane Attarian

, Lida Abdi, Sattar Hashemi:
AdaWFPA: Adaptive Online Website Fingerprinting Attack for Tor Anonymous Network: A Stream-wise Paradigm. 74-85 - Saniya Zafar

, Sobia Jangsher
, Ouns Bouachir
, Moayad Aloqaily
, Jalel Ben-Othman
:
QoS enhancement with deep learning-based interference prediction in mobile IoT. 86-97 - (Withdrawn) REMOVED: Equipping recurrent neural network with CNN-style attention mechanisms for sentiment analysis of network reviews. 98

- R. M. Rani

, M. Pushpalatha:
Generation of Frequent sensor epochs using efficient Parallel Distributed mining algorithm in large IOT. 107-114 - Amit Sharma

, Pradeep Kumar Singh
, Ashutosh Sharma
, Rajiv Kumar:
An efficient architecture for the accurate detection and monitoring of an event through the sky. 115-128 - N. Rajendran, P. K. Jawahar

, R. Priyadarshini:
Cross centric intrusion detection system for secure routing over black hole attacks in MANETs. 129-135 - Rodrigo C. Tavares, Marcos Carvalho, Eduardo P. M. Câmara Júnior, Erik de Britto e Silva

, Marcos Augusto M. Vieira, Luiz Filipe M. Vieira, Bhaskar Krishnamachari:
FWB: Funneling Wider Bandwidth algorithm for high performance data collection in Wireless Sensor Networks. 136-151 - Der-Rong Din:

Spectrum Expansion/Contraction and Survivable Routing and Spectrum Assignment problems on EONs with time-varying traffic. 152-164 - Juan Aranda

, Diego Mendez
, Henry Carrillo, Mario Schölzel:
M2-DaGNoS: A data gathering and node scheduling mechanism for Multimodal Wireless Sensor Networks. 165-175 - Sajith Vellappally, Abdulaziz A. Al Kheraif, Darshan Devang Divakar, Santhosh Basavarajappa, Sukumaran Anil

, Hassan Fouad
:
Tooth implant prosthesis using ultra low power and low cost crystalline carbon bio-tooth sensor with hybridized data acquisition algorithm. 176-184
- Josip Lorincz

, Ivana Ramljak, Dinko Begusic:
A review of the noise uncertainty impact on energy detection with different OFDM system designs. 185-207
- Zhihan Lv

:
The security of Internet of drones. 208-214 - Prabhakar Krishnan

, Subhasri Duttagupta, Krishnashree Achuthan:
VARMAN: Multi-plane security framework for software defined networks. 215-239 - Anatoly Konev

, Rezeda Khaydarova, Maxim Lapaev, Luanye Feng, Long Hu, Min Chen
, Igor Bondarenko:
CHPC: A complex semantic-based secured approach to heritage preservation and secure IoT-based museum processes. 240-249 - Mohd Usama

, Belal Ahmad, Jun Yang, Saqib Qamar, Parvez Ahmad
, Yu Zhang, Jing Lv, Joze Guna
:
Removal notice to "Equipping recurrent neural network with CNN-style attention mechanisms for sentiment analysis of network reviews" [Comput. Commun. (2019) 98-106]. 250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














