


default search action
Computer Communications, Volume 193
Volume 193, September 2022
- Ninni Singh, Vinit Kumar Gunjan, Gopal Chaudhary

, Rajesh Kaluri, Nancy Victor, Kuruva Lakshmanna
:
IoT enabled HELMET to safeguard the health of mine workers. 1-9
- Hangyun Tang

, Yanan Qiao, Fan Yang, Bowen Cai, Ruiquan Gao:
dMOBAs: A data marketplace on blockchain with arbitration using side-contracts mechanism. 10-22
- Makarand Mohan Jadhav

, Vivek Deshpande
, Divya Midhunchakkaravarthy, Dattatray S. Waghole:
Improving 5G network performance for OFDM-IDMA system resource management optimization using bio-inspired algorithm with RSM. 23-37
- Rajesh Kumar Shrivastava, Simar Preet Singh

, Mohammad Kamrul Hasan, Gagandeep
, Shayla Islam, Salwani Abdullah, Azana Hafizah Mohd Aman
:
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming. 38-46
- Claudio Fiandrino

, Giulia Attanasio, Marco Fiore, Joerg Widmer:
Toward native explainable and robust AI in 6G networks: Current state, challenges and road ahead. 47-52
- Mohammed M. Alani

:
BotStop : Packet-based efficient and explainable IoT botnet detection using machine learning. 53-62 - Mohammad Shahjalal, Nusrat Farhana, Palash Roy

, Md. Abdur Razzaque, Kuljeet Kaur, Mohammad Mehedi Hassan:
A Binary Gray Wolf Optimization algorithm for deployment of Virtual Network Functions in 5G hybrid cloud. 63-74
- Matthias Van Onsem

, Dieter De Paepe, Sander Vanden Hautte
, Pieter Bonte, Veerle Ledoux, Annelies Lejon, Femke Ongenae
, Dennis Dreesen, Sofie Van Hoecke
:
Hierarchical pattern matching for anomaly detection in time series. 75-81
- Renato Lo Cigno

, Michele Segata
:
Cooperative driving: A comprehensive perspective, the role of communications, and its potential development. 82-93
- Vicente Mayor, Rafael Estepa, Antonio Jose Estepa Alonso, Germán Madinabeitia

:
Deployment of UAV-mounted Access Points for VoWiFi Service with guaranteed QoS. 94-108
- Sabir Ali Changazi

, Asim Dilawar Bakhshi
, Muhammad Yousaf
, Muhammad Hasan Islam, Syed Muhammad Mohsin
, Shahab S. Band, Abdulmajeed Alsufyani
, Sami Bourouis
:
GA-based geometrically optimized topology robustness to improve ambient intelligence for future internet of things. 109-117
- Zied Ben-Houidi

, Dario Rossi
:
Neural language models for network configuration: Opportunities and reality check. 118-125
- Jian Wang

, Guanghui Liu, Guosheng Zhao:
Two-attribute privacy protection method of MCS based on blockchain smart contract. 126-135 - Wenbin Pan, Yi Liu

, Chao Yang:
Adaptive task offloading of rechargeable UAV edge computing network based on double decision value iteration. 136-145 - Anna Triantafyllou

, Dimitrios Zorbas
, Panagiotis G. Sarigiannidis:
Time-slotted LoRa MAC with variable payload support. 146-154 - Muhammad Ateeq, Muhammad Khalil Afzal, Sheraz Anjum, Byung-Seo Kim:

Cognitive quality of service predictions in multi-node wireless sensor networks. 155-167
- Alessandro Cornacchia, Giuseppe Bianchi, Andrea Bianco, Paolo Giaccone:

Staggered HLL: Near-continuous-time cardinality estimation with no overhead. 168-175
- Szymon Szott, Katarzyna Kosek-Szott, Alice Lo Valvo, Ilenia Tinnirello:

Using self-deferral to achieve fairness between Wi-Fi and NR-U in downlink and uplink scenarios. 176-188
- Serge Fdida, Nikos Makris

, Thanasis Korakis, Raffaele Bruno
, Andrea Passarella, Panayiotis Andreou
, Bartosz Belter, Cedric Crettaz
, Walid Dabbous, Yuri Demchenko, Raymond Knopp:
SLICES, a scientific instrument for the networking community. 189-203
- Yantao Cai, Huayi Xiong, Min Chen

, Xing Zhou:
A path characteristics based adaptive subflow switching algorithm for dynamic heterogeneous MPTCP network. 204-213 - Luís Leira

, Miguel Luís
, Susana Sargento
:
Context-based caching in mobile information-centric networks. 214-223
- Mateus Mattos, António Rodrigues, Rui Meireles, Ana Aguiar

:
Geolocation-based sector selection for Vehicle-to-Infrastructure 802.11ad communication. 224-233
- Bernhard Häfner

, Josef Jiru, Henning F. Schepker, Georg Albrecht Schmitt, Jörg Ott:
Preventing failures of cooperative maneuvers among connected and automated vehicles. 234-245
- Souvik Saha, Rajeev Arya

:
ARCMT: Anchor node-based range free cooperative multi trusted secure underwater localization using fuzzifier. 246-265
- Mahnoor Anjum

, Muhammad Abdullah Khan, Syed Ali Hassan
, Haejoon Jung
, Kapal Dev
:
Analysis of time-weighted LoRa-based positioning using machine learning. 266-278
- Anthony Bardou

, Thomas Begin, Anthony Busson:
Analysis of a Multi-Armed Bandit solution to improve the spatial reuse of next-generation WLANs. 279-292
- Bing Jia, Jingbin Liu, Tao Feng, Baoqi Huang, Thar Baker

, Hissam Tawfik:
TTSL: An indoor localization method based on Temporal Convolutional Network using time-series RSSI. 293-301
- Zakir Ahmad Sheikh

, Yashwant Singh
, Pradeep Kumar Singh
, Kayhan Zrar Ghafoor
:
Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope. 302-331
- Xueshu Hong, Xingkong Ma, Shaoyong Li

, Houjie Qiu
, Bo Liu:
A Website Fingerprint defense technology with low delay and controllable bandwidth. 332-345 - Peifa Sun

, Mengda Lyu, Hui Li, Bo Yang, Lizhi Peng:
An early stage convolutional feature extracting method using for mining traffic detection. 346-354
- Shu Yang, Qingzhen Dong

, Laizhong Cui, Xun Chen, Siyu Lei, Yulei Wu, Chengwen Luo:
EC-MASS: Towards an efficient edge computing-based multi-video scheduling system. 355-364
- Sahar Parkouk, Mohammad Torabi

, Saeed Shokrollahi
:
Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer. 365-377 - Wen Liang

, Fei Yan
, Abdullah M. Iliyasu
, Ahmed S. Salama
, Kaoru Hirota:
A Hadamard walk model and its application in identification of important edges in complex networks. 378-387
- Nabeil Eltayieb

, Rashad Elhabob
, Muhammad Umar Aftab
, Ramil Kuleev, Manuel Mazzara
, Muhammad Ahmad
:
Secure aggregate signature scheme for smart city applications. 388-395
- Dominik S. Buse

, Georg Echterling, Falko Dressler:
Asynchronous Background Processing for accelerated simulation of wireless communication on multi-core systems. 396-409
- Kedar Nath Singh, Om Prakash Singh

, Amit Kumar Singh
:
ECiS: Encryption prior to compression for digital image security with reduced memory. 410-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














