


default search action
Computer Communications, Volume 216
Volume 216, 2024
- Viet Hung Nguyen, Duy Tien Bui, Thanh Lam Tran, Truong Cong Thang, Thu Huong Truong
:
Scalable and resilient 360-degree-video adaptive streaming over HTTP/2 against sudden network drops. 1-15 - Sanjeev Kumar
, B. Janet, Subramanian Neelakantan
:
IMCNN:Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network. 16-33 - Yuxi Qin
, Stephan Sigg
, Su Pan
, Zibo Li:
Direction-agnostic gesture recognition system using commercial WiFi devices. 34-44 - Qing Zhao
, Yan Wang, Yuxuan Lin, Shaoqi Yan, Wei Song, Boyang Wang, Jun Huang, Yang Chang, Lizhe Qi, Wenqiang Zhang:
Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries. 45-53 - Manuel Jiménez-Lázaro, Javier Berrocal
, Jaime Galán-Jiménez
:
Flow-based Service Time optimization in software-defined networks using Deep Reinforcement Learning. 54-67 - Géza Szabó
, József Peto:
Intelligent wireless resource management in industrial camera systems: Reinforcement Learning-based AI-extension for efficient network utilization. 68-85 - Songyan Chen, Junjie Chen
, Hongjun Li:
Joint optimization of UPF placement and traffic routing for 5G core network user plane. 86-94 - Leonan T. Oliveira
, Luiz F. Bittencourt, Thiago A. L. Genez, Eyal de Lara, Maycon L. M. Peixoto
:
Enhancing modular application placement in a hierarchical fog computing: A latency and communication cost-sensitive approach. 95-111 - Jiale Zhao, Chaoshuo Deng, Huanhuan Yu, Hansheng Fei, Deshun Li:
Path planning of unmanned vehicles based on adaptive particle swarm optimization algorithm. 112-129 - Shaoqi Yan
, Yan Wang, Xinji Mai, Qing Zhao, Wei Song, Jun Huang, Zeng Tao, Haoran Wang, Shuyong Gao, Wenqiang Zhang:
Empower smart cities with sampling-wise dynamic facial expression recognition via frame-sequence contrastive learning. 130-139 - Haoran Zhang, Shan Jiang, Shichang Xuan:
Decentralized federated learning based on blockchain: concepts, framework, and challenges. 140-150 - Sen Li, Hui Jin, Yingke Gao, Ying Wang, Shuhong Dai
, Yongjun Xu, Long Cheng
:
Approximate data mapping in refresh-free DRAM for energy-efficient computing in modern mobile systems. 151-158 - Zhiyuan Ning
, Zile Wang, Yang Liu, Jing Liu
, Liang Song
:
Memory-enhanced appearance-motion consistency framework for video anomaly detection. 159-167 - Tasiu Muazu
, Yingchi Mao, Abdullahi Uwaisu Muhammad, Muhammad Ibrahim
, Umar Muhammad Mustapha Kumshe
, Omaji Samuel:
A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing. 168-182 - Kun Wang, Yu Fu, Xueyuan Duan, Taotao Liu, Jianqiao Xu:
Abnormal traffic detection system in SDN based on deep learning hybrid models. 183-194 - Jie Bai
, Jingchuan Sun, Zhigang Wang, Xunwei Zhao, Aijun Wen, Chunling Zhang, Jianguo Zhang:
An adaptive intelligent routing algorithm based on deep reinforcement learning. 195-208 - Mohammad Arif
, Wooseong Kim
:
Clustered jamming in U-V2X communications with 3D antenna beam-width fluctuations. 209-228 - Lili Wu
, Majid Khan Majahar Ali, Ying Tian:
Supervision and early warning of abnormal data in Internet of Things based on unsupervised attention learning. 229-237 - Tran Manh Hoang
, Ba Cao Nguyen
, Huu Minh Nguyen, Phuong T. Tran
:
Secrecy outage performance of NOMA relay networks using partial relay selection in the presence of multiple colluding eavesdroppers. 238-250 - Dayrene Frometa Fonseca
, Muhammad Sarmad Mir, Sergio Iglesias de Frutos, Borja Genovés Guzmán
, Domenico Giustiniano:
Modulating LiFi for dual operation in the visible and infrared spectra. 251-259 - Zakaria Abou El Houda
, Bouziane Brik, Adlen Ksentini:
Securing IIoT applications in 6G and beyond using adaptive ensemble learning and zero-touch multi-resource provisioning. 260-273 - Xinyu Hong
, Na Lv, Ying Pan
:
Integrated sensing and communication-assisted beam rendezvous in airborne networks. 274-282 - Vaishali A. Shirsath
, Madhav Chandane, Chhagan Lal, Mauro Conti
:
SPARQ: SYN Protection using Acyclic Redundancy check and Quartile range on P4 switches. 283-294 - Rakhee Kulshrestha
, Ajay Singh:
Transient analysis of energy-saving strategy for cognitive radio networks using G-queue with heterogeneity. 295-306 - Jiby J. Puthiyidam
, Shelbi Joseph, Bharat Bhushan
:
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication. 307-323 - Prabhakar Krishnan, Kurunandan Jain, Shivananda R. Poojara
, Satish Narayana Srirama, Tulika Pandey, Rajkumar Buyya:
eSIM and blockchain integrated secure zero-touch provisioning for autonomous cellular-IoTs in 5G networks. 324-345 - Tingpei Huang, Shiyu Guo, Tiantian Zhang, Bairen Zhang, Jianhang Liu:
Node clustering scheme supporting mobility in NOMA-enabled backscatter communication networks. 346-355 - Hyder Ali Hingoliwala
, Naween Kumar
, Anand Nayyar, Gandharba Swain
:
Energy-efficient Neuro-fuzzy-based Multi-node Charging Model for WRSNs using Multiple Mobile Charging Vehicles. 356-373 - Ali Nauman
, Mashael S. Maashi
, Hend Khalid Alkahtani, Fahd N. Al-Wesabi, Nojood O. Aljehane, Mohammed Assiri
, Sara Saadeldeen Ibrahim, Wali Ullah Khan
:
Efficient resource allocation and user association in NOMA-enabled vehicular-aided HetNets with high altitude platforms. 374-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.