


default search action
Peer-to-Peer Networking and Applications, Volume 13
Volume 13, Number 1, January 2020
- Libo Jiao, Hao Yin, Dongchao Guo

, Haojun Huang, Qin Gao:
Resource allocation in two-tier small-cell networks with energy consumption constraints. 1-15 - Cong Zhang, Hsin-Hung Cho

, Chi-Yuan Chen:
Emergency-level-based healthcare information offloading over fog network. 16-26 - Luis Rodrigues, Joel Guerreiro

, Noélia Correia
:
RELOAD/CoAP architecture for the federation of wireless sensor networks. 27-37 - Fei Gu, Jianwei Niu

, Xin Jin, Shui Yu
:
FDFA: A fog computing assisted distributed analytics and detecting system for family activities. 38-52 - Hong Wang, Jianhua Li, Chengzhe Lai

, Zhe Wang:
A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks. 53-63 - Weimin Li, Bin Wang, Jinfang Sheng

, Xiangyu Hou, Lin Chen, Jiaguang Liu:
A software defined caching framework based on user access behavior analysis for transparent computing server. 64-81 - R. Madhusudhan, Shashidhara

:
Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. 82-103 - Dadmehr Rahbari

, Mohsen Nickray:
Task offloading in mobile fog computing by classification and regression tree. 104-122 - Jie Wang, Fei Dai, Jie Yang, Guan Gui

:
Efficient combination policies for diffusion adaptive networks. 123-136 - Michal Boron

, Jerzy Brzezinski
, Anna Kobusinska
:
P2P matchmaking solution for online games. 137-150 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic

:
Performance Modeling of Linux Network System with Open vSwitch. 151-162 - Ata Ullah

, Ghawar Said, Muhammad Sher
, Huansheng Ning
:
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. 163-174 - Xianfu Meng

, Ge Zhang:
TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks. 175-189 - Shilpa Budhkar

, Venkatesh Tamarapalli
:
An overlay management strategy to improve QoS in CDN-P2P live streaming systems. 190-206 - Maryam Zarezadeh, Hamid Mala

, Maede Ashouri-Talouki
:
Multi-keyword ranked searchable encryption scheme with access control for cloud storage. 207-218 - Muhammad Salman Raheel

, Raad Raad:
Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE. 219-242 - Masahiro Sasabe

:
Topological influence on optimality of Tit-for-Tat based P2P content distribution. 243-254 - Jian Wu

, Zhigang Chen, Jia Wu, Xiao Liu, Genghua Yu, Yedong Zhao:
An energy efficient data transmission approach for low-duty-cycle wireless sensor networks. 255-268 - Peng Zheng

, Hongxiao Fei, Yeqing Yan:
An effective positive transmission routing algorithm based on social relationships in opportunistic social networks. 269-286 - Dongchao Ma, Guangxing Han, Hongchao Li, Li Ma, Chengan Zhao

:
A parallel optimization for energy and robustness of file distribution services. 287-303 - B. Guru Prakash

, C. Balasubramanian
, R. Sukumar:
An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN. 304-319 - Amr Elsaadany

, Khalid Khalil:
Assessment of coverage quality of sensor networks for IoT applications. 320-332 - Monali Mavani

, Krishna Asawa:
Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. 333-347 - Gaurav Srivastava

, Richa Agrawal, Kunwar Singh, Rajeev Tripathi
, Kshirasagar Naik:
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography. 348-367 - Xiaogang Qi, Min Qiang

, Lifang Liu:
A balanced strategy to improve data invulnerability in structured P2P system. 368-387 - Sneha Kanchan

, Garima Singh
, Narendra S. Chaudhari:
EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups. 388-411 - Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu

, David Bremner:
Achieve privacy-preserving simplicial depth query over collaborative cloud servers. 412-423
Volume 13, Number 2, March 2020
- Editor's note: Special issue on internet of things system technologies based on quality of experience. 425

- Cheng-Ta Huang

:
A scheme of flexible and reversible information-hiding in SMVQ mechanism. 426-438 - Fatma Merabet, Amina Cherif, Malika Belkadi, Olivier Blazy, Emmanuel Conchon, Damien Sauveron

:
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. 439-474 - Dongsik Son, Seungpyo Huh, Taejin Lee, Jin Kwak

:
Internet of things system technologies based on quality of experience. 475-488 - Hangi Kim, Myungseo Park, Jaehyung Cho, Jihun Kim, Jongsung Kim:

Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes. 489-513 - Chi-Yao Weng

:
DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images. 514-523 - Jun Woo Kim, Soo Kyun Kim

:
Interactive job sequencing system for small make-to-order manufacturers under smart manufacturing environment. 524-531 - Masood Ahmad

, Ataul Aziz Ikram, Ishtiaq Wahid, Fasee Ullah
, Awais Ahmad, Fakhri Alam Khan
:
Optimized clustering in vehicular ad hoc networks based on honey bee and genetic algorithm for internet of things. 532-547 - Huaiying Sun

, Huiqun Yu, Guisheng Fan, Liqiong Chen:
Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture. 548-563 - Serim Kang, Soram Kim, Jongsung Kim:

Forensic analysis for IoT fitness trackers and its application. 564-573 - Editor's Note: Special issue on P2P Computing for Intelligence of Things. 574

- Sunmoon Jo, Jieun Lee, Jungsoo Han, Supratip Ghose:

P2P computing for intelligence of things. 575-578 - Sunghyuck Hong

:
P2P networking based internet of things (IoT) sensor node authentication by Blockchain. 579-589 - N. Noor Alleema

, D. Siva Kumar:
Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs. 590-600 - Dae-Young Kim

, Ahyoung Lee, Seokhoon Kim
:
P2P computing for trusted networking of personalized IoT services. 601-609 - Kyungyong Chung, Roy C. Park:

P2P-based open health cloud for medicine management. 610-622 - Doohee Han, Myeongyun Cho:

Selective switching dual-transmission scheme in multi-LED Hybrid VLC-P2P networking system. 623-634 - Jungpil Shin, Md. Rashedul Islam

, Md. Abdur Rahim
, Hyung-Jin Mun
:
Arm movement activity based user authentication in P2P systems. 635-646 - P. Uma Maheswari

, T. R. Ganeshbabu:
Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network. 647-658 - Yong-Young Kim, Yong-Ki Kim

, Dae-Sik Kim, Mi-Hye Kim:
Implementation of hybrid P2P networking distributed web crawler using AWS for smart work news big data. 659-670 - YongJoo Lee, Keon Myung Lee, Sang Ho Lee:

Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. 671-683 - Sun Park

, ByungRea Cha, Kyungyong Chung, JongWon Kim:
Mobile IoT device summarizer using P2P web search engine and inherent characteristic of contents. 684-693 - Kyungyong Chung, Hyun Yoo:

Edge computing health model using P2P-based deep neural networks. 694-703 - Manh Tien, Yoon Young Park

, Kang-Hee Jung, Se-Yeob Kim, Joong-Eup Kye:
Performance evaluation on the accuracy of the semantic map of an autonomous robot equipped with P2P communication module. 704-716 - B. Priya

, T. Gnanasekaran
:
To optimize load of hybrid P2P cloud data-center using efficient load optimization and resource minimization algorithm. 717-728
Volume 13, Number 3, May 2020
- Songai Xuan, DoHyeun Kim:

Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking. 729-741 - Pavan Kumar C.

, Selvakumar R.
:
Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. 742-751 - C. Umarani

, S. Kannan:
Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. 752-761 - Garima Singh

, Deepti D. Shrimankar:
Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks. 762-779 - Hassan Harb

, Chady Abou Jaoude, Abdallah Makhoul:
An energy-efficient data prediction and processing approach for the internet of things and sensing based applications. 780-795 - Walid Osamy

, Ahmed El-Sawy, Ahmed M. Khedr:
Effective TDMA scheduling for tree-based data collection using genetic algorithm in wireless sensor networks. 796-815 - Seyed Farhad Aghili

, Hamid Mala:
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol. 816-824 - Elahe Khatibi, Mohsen Sharifi

, Seyedeh Leili Mirtaheri:
DPAS: A dynamic popularity-aware search mechanism for unstructured P2P systems. 825-849 - Nadine Boudargham, Jacques Bou Abdo

, Jacques Demerjian
, Christophe Guyeux
, Abdallah Makhoul:
Performance of low level protocols in high traffic wireless body sensor networks. 850-871 - Saeed Saeedvand

, Hadi S. Aghdasi
, Leili Mohammad Khanli:
Novel Distributed Dynamic Backbone-based Flooding in Unstructured Networks. 872-889 - Ganesan Sangeetha

, Muthuswamy Vijayalakshmi
, Sannasi Ganapathy
, Arputharaj Kannan
:
An improved congestion-aware routing mechanism in sensor networks using fuzzy rule sets. 890-904 - Ashika R. Naik

, Bettahally N. Keshavamurthy:
Next level peer-to-peer overlay networks under high churns: a survey. 905-931 - UmaMaheswari Gurusamy

, K. Hariharan
, M. S. K. Manikandan:
Path optimization of box-covering based routing to minimize average packet delay in software defined network. 932-939 - Jia Wu, Zhigang Chen, Ming Zhao:

Community recombination and duplication node traverse algorithm in opportunistic social networks. 940-947 - Naserali Noorani, Seyed Amin Hosseini Seno

:
SDN- and fog computing-based switchable routing using path stability estimation for vehicular ad hoc networks. 948-964 - A. Samson Arun Raj

, Yogesh Palanichamy:
An aerial intelligent relay-road side unit (AIR-RSU) framework for modern intelligent transportation system. 965-986 - Ayyasamy Ayyanar, Eanoch Golden Julie, Yesudhas Harold Robinson

, Subramanian Balaji, Raghvendra Kumar, Le Hoang Son, Pham Huy Thong, Ishaani Priyadarshini:
AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks. 987-1001 - Peng Hu, Yongli Wang

, Bei Gong, Yongjian Wang, Yanchao Li, Ruxin Zhao, Hao Li, Bo Li:
A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. 1002-1013 - Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena V. Misic, Vojislav B. Misic

:
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. 1014-1025 - Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen

, Songling Chen:
A P2P network based edge computing smart grid model for efficient resources coordination. 1026-1037 - Sandosh S.

, Govindasamy V., Akila G.
:
Enhanced intrusion detection system via agent clustering and classification based on outlier detection. 1038-1045 - Maha S. Abdelhaq

, Raed A. Alsaqour, Abeer Algarni, Maali Alabdulhafith, Mahmoud A. Alawi
, Aqeel Taha, Baraa T. Sharef
, Mustafa Tariq:
Human immune-based model for intrusion detection in mobile ad hoc networks. 1046-1068 - Jia Xu, Wei Lu, Lijie Xu, Dejun Yang

, Tao Li:
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship. 1069 - Chunguang Zhang, Guangping Zeng

, Hongbo Wang, Xuyan Tu:
Correction to: Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things. 1070
Volume 13, Number 4, July 2020
- S. Famila, A. Jawahar, Sariga Arjunan, K. Shankar

:
Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments. 1071-1079 - (Withdrawn) Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks. 1080-1090

- (Withdrawn) Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. 1091-1101

- P. K. Poonguzhali, N. P. Ananthamoorthy

:
Improved energy efficient WSN using ACO based HSA for optimal cluster head selection. 1102-1108 - A. Arokiaraj Jovith, S. V. Kasmir Raja, A. Razia Sulthana

:
Interference mitigation and optimal hop distance measurement in distributed homogenous nodes over wireless sensor network. 1109-1119 - (Withdrawn) Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network. 1120-1130

- Lithungo Murry, Rajagopal Kumar

, Themrichon Tuithung, P. Mohamed Shakeel:
A local decision making technique for reliable service discovery using D2D communications in disaster recovery networks. 1131-1141 - Brindha Palanisamy, Senthilkumar Athappan

:
Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks. 1142-1151 - Sivadi Balakrishna

, M. Thirumaran, R. Padmanaban, Vijender Kumar Solanki
:
An efficient incremental clustering based improved K-Medoids for IoT multivariate data cluster analysis. 1152-1175 - Mingchuan Zhang

, Xin Wang, Tingting Liu, Junlong Zhu, Qingtao Wu:
AFSndn: A novel adaptive forwarding strategy in named data networking based on Q-learning. 1176-1184 - Nagendranath M. V. S. S, A. Ramesh Babu

:
An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks. 1185-1192 - Sulin Pang, Junkun Yang:

Social reputation loss model and application to lost-linking borrowers in a internet financial platform. 1193-1203 - V. Rama Krishna

, R. Subhashini
:
Mimicking attack by botnet and detection at gateway. 1204-1214 - Fengzhen Jiang, Jie Zhang, Xu Zhao

:
Research on the influence mechanism of resettlers participation in migrant work in the context of relationship network. 1215-1224 - Rui Hou, Huan Liu, Yang Hu, YunHao Zhao:

Research on secure transmission and storage of energy IoT information based on Blockchain. 1225-1235 - Lin Chang, Songhao Piao, Xiaokun Leng, Yunqiang Hu, Wende Ke:

Study on falling backward of humanoid robot based on dynamic multi objective optimization. 1236-1247 - S. Suseela, Eswari Rajagopal, S. Nickolas, M. Saravanan

:
QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks. 1248-1259 - Sheng Jin

, Yu Gao
, Liang Chen:
Improved Deep Distance Learning for Visual Loop Closure Detection in Smart City. 1260-1271 - Ping Xie, Jianghui Liu, Gaoyuan Zhang, Ling Xing, Honghai Wu:

Opportunistic TPSR cooperative spectrum sharing protocol with secondary user selection for 5G wireless network. 1272-1283 - Haibo Liang

, Xin Qin, Jianchong Gao, Muhammad Junaid Khan:
Research on detector signal receiving network layout optimization model. 1284-1296
Volume 13, Number 5, September 2020
- Maryam Zare, Seyed Hossein Khasteh

, Saeid Ghafouri:
Automatic ICA detection in online social networks with PageRank. 1297-1311 - Baowen Xie

, Guosheng Zhao, Mianxing Chao, Jian Wang:
A prediction model of cloud security situation based on evolutionary functional network. 1312-1326 - Zhixin Liu, Xiaopin Li, Yazhou Yuan, Xinping Guan:

Power control of D2D communication based on quality of service assurance under imperfect channel information. 1327-1339 - SungJin Yu

, KiSung Park
, YoHan Park, HyungPyo Kim, YoungHo Park
:
A lightweight three-factor authentication protocol for digital rights management system. 1340-1356 - Samayveer Singh:

An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs. 1357-1374 - Ankita Srivastava

, Arun Prakash
, Rajeev Tripathi
:
An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET. 1375-1393 - Ilker Ünal

:
Integration of ZigBee based GPS receiver to CAN network for precision farming applications. 1394-1405 - Ahmad Karami, Nahideh Derakhshanfard

:
RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network. 1406-1422 - Amir Hassani Karbasi

, Siyamak Shahpasand
:
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks. 1423-1441 - Yunhai Guo, Rui Lv, Zhengxiang Li:

A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN. 1442-1456 - Rui Wang, Faezeh Hajiaghajani, Subir Biswas:

Device-to-device streaming video caching for cellular download cost reduction. 1457-1473 - Zibin Ren, Ting Lu, Xin Wang, Wenjing Guo, Guohua Liu, Shan Chang:

Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture. 1474-1485 - Yuqi Fan, JingLin Zou, Siyu Liu, Qiran Yin, Xin Guan, Xiaohui Yuan

, Weili Wu, Ding-Zhu Du:
A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach. 1486-1504 - Henry Nunoo-Mensah

, Kwame Osei Boateng, James Dzisi Gadze
:
PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks. 1505-1525 - Farooque Hassan Kumbhar

, Navrati Saxena, Abhishek Roy:
Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks. 1526-1538 - Zainab Hassan Ali

, Mahmoud Mohammed Badawy
, Hesham A. Ali:
A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance. 1539-1566 - Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li

, Jinguo Li:
Toward efficient and effective bullying detection in online social network. 1567-1576 - Micael Pedrosa

, André Zúquete, Carlos Costa
:
RAIAP: renewable authentication on isolated anonymous profiles. 1577-1599 - Shibin Wang, Kele Mao, Furui Zhan, Dong Liu:

Hybrid conditional privacy-preserving authentication scheme for VANETs. 1600-1615 - Mahdi Tahavori

, Farokhlagha Moazami:
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. 1616-1628 - Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani

:
Structuring communities for sharing human digital memories in a social P2P network. 1629-1642 - Hui Zheng, Jun Shao, Guiyi Wei:

Attribute-based encryption with outsourced decryption in blockchain. 1643-1655 - Kamlesh Kumar Rana

, Sachin Tripathi, Ram Shringar Raw
:
Link reliability-based multi-hop directional location routing in vehicular ad hoc network. 1656-1671 - Oluwafolake Ojo, Cyril O. Iyadi, Ayodeji Oluwatope

, Adio T. Akinwale:
AyoPeer: The adapted ayo-game for minimizing free riding in peer-assisted network. 1672-1687 - Yohei Nishi, Masahiro Sasabe

, Shoji Kasahara:
Optimality analysis of locality-aware tit-for-tat-based P2P file distribution. 1688-1703 - Deyu Zhang, Mianxiong Dong, Geyong Min:

Editorial: Emerging Trends on Data Analytics at the Network Edge. 1704-1705 - Jian Li

, Daqian Shi, Piyaporn Tumnark
, Hao Xu:
A system for real-time intervention in negative emotional contagion in a smart classroom deployed under edge computing service infrastructure. 1706-1719 - Haojun Teng, Kaoru Ota

, Anfeng Liu
, Tian Wang
, Shaobo Zhang
:
Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems. 1720-1743 - Xiaoheng Deng, Jin Liu, Leilei Wang, Zhihui Zhao:

A trust evaluation system based on reputation data in Mobile edge computing network. 1744-1755 - Ying Chen

, Shuang Chen, Xin Chen:
Efficient caching strategy in wireless networks with mobile edge computing. 1756-1766 - Hongran Li, Weiwei Xu, Heng Zhang

, Jian Zhang
, Yi Liu:
Polynomial regressors based data-driven control for autonomous underwater vehicles. 1767-1775 - Jiwei Huang

, Songyuan Li
, Ying Chen:
Revenue-optimal task scheduling and resource management for IoT batch jobs in mobile edge computing. 1776-1787 - Jiajia Xie, Jun Luo, Yan Peng, Shaorong Xie, Huayan Pu, Xiaomao Li, Zhou Su, Yuan Liu, Rui Zhou:

Data driven hybrid edge computing-based hierarchical task guidance for efficient maritime escorting with multiple unmanned surface vehicles. 1788-1798 - Guangsheng Feng

, Yue Wang, Bingyang Li, Yafei Li, Hongwu Lv, Chengbo Wang, Zihan Gao, Huiqiang Wang:
A near-optimal content placement in D2D underlaid cellular networks. 1799-1813 - Zhufang Kuang, Gongqiang Li, Libang Zhang, Huibin Zhou, Changyun Li

, Anfeng Liu:
Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks. 1814-1829 - Yanjun Peng, Peng Liu

, Tingting Fu:
Performance analysis of edge-PLCs enabled industrial Internet of things. 1830-1838 - Genghua Yu

, Jia Wu:
Content caching based on mobility prediction and joint user Prefetch in Mobile edge networks. 1839-1852
Volume 13, Number 6, November 2020
- G. S. Binu

, B. Shajimohan:
A novel heuristic based energy efficient routing strategy in wireless sensor network. 1853-1871 - Balamurugan N, J. Raja, R. Pitchai:

Multicriteria dragonfly graph theory based resource optimized virtual network mapping technique for home medical care service provisioning in cloud. 1872-1885 - Ali Seyfollahi

, Ali Ghaffari
:
Reliable data dissemination for the Internet of Things using Harris hawks optimization. 1886-1902 - Ali Seyfollahi

, Ali Ghaffari
:
Correction to: Reliable data dissemination for the internet of things using Harris hawks optimization. 1903-1904 - Aruchamy Prasanth

, S. Jayachitra:
A novel multi-objective optimization strategy for enhancing quality of service in IoT-enabled WSN applications. 1905-1920 - A. G. Sreedevi

, T. Rama Rao
:
SINR based association algorithm for indoor device-to-device communication networks. 1921-1930 - Saeideh Gholamrezazadeh Motlagh

, Jelena V. Misic, Vojislav B. Misic
:
An analytical model for churn process in Bitcoin network with ordinary and relay nodes. 1931-1942 - R. Shashidhara

, Sriramulu Bojjagani
, Anup Kumar Maurya, Saru Kumari
, Hu Xiong:
A Robust user authentication protocol with privacy-preserving for roaming service in mobility environments. 1943-1966 - Nikita Bhagatkar, Kapil Dolas, Ratan K. Ghosh, Sajal K. Das:

An integrated P2P framework for E-learning. 1967-1989 - K. Karthika Lekshmi, M. Vigilson Prem

:
Multi-keyword score threshold and B+ tree indexing based top-K query retrieval in cloud. 1990-2000 - K. Sumathi, Perumal Pandiaraja

:
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks. 2001-2010 - S. K. Sathya Lakshmi Preetha, R. Dhanalakshmi, P. Mohamed Shakeel:

An intelligent approach for energy efficient trajectory design for mobile sink based IoT supported wireless sensor networks. 2011-2022 - (Withdrawn) Machine learning based multi scale parallel K-means++ clustering for cloud assisted internet of things. 2023-2035

- L. Maria Michael Visuwasam

, D. Paul Raj:
A distributed intelligent mobile application for analyzing travel big data analytics. 2036-2052 - (Withdrawn) RFDCAR: Robust failure node detection and dynamic congestion aware routing with network coding technique for wireless sensor network. 2053-2064

- C. Ajitha, Thirasamma Jaya:

Cognitive radio technology with reduced PAPR and complexity for IoT-based OFDM networks. 2065-2077 - Hongzhuo Qi:

Fuzzy logic hybridized artificial intelligence for computing and networking on internet of things platform. 2078-2088 - R. P. Premanand

, A. Rajaram
:
Enhanced data accuracy based PATH discovery using backing route selection algorithm in MANET. 2089-2098 - R. Elavarasan

, K. Chitra:
An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN. 2099-2111 - Tamizharasi Thirugnanam

, Muhammad Rukunuddin Ghalib
:
A reward based connectivity-aware IoV neighbor selection for improving reliability in healthcare information exchange. 2112-2122 - BalaAnand Muthu

, C. B. Sivaparthipan
, Gunasekaran Manogaran, Revathi Sundarasekar
, Seifedine Nimer Kadry, A. Shanthini, A. Antony Dasel:
IOT based wearable sensor for diseases prediction and symptom analysis in healthcare sector. 2123-2134 - B. Satheesh Monikandan, A. Sivasubramanian, S. P. K. Babu, G. K. D. Prasanna Venkatesan

, C. Arunachalaperumal
:
Channel aware optimized proportional fair scheduler for LTE downlink. 2135-2144 - G. B. Santhi

, Divakaran Sheela:
Reliability refinement in VANET with hybrid jamming attacks using novel index based voting algorithm. 2145-2154 - (Withdrawn) Defense model for preserving the wind turbine Records in Cloud Using fog Computing with coupling based cryptography. 2155-2165

- Bo Wang, Tianyu Fan, Xiangtian Nie:

Advanced delay assured numerical heuristic modelling for peer to peer project management in cloud assisted internet of things platform. 2166-2176 - Jabash Samuel G. K, J. Jasper

:
MANFIS based SMART home energy management system to support SMART grid. 2177-2188 - A. S. Anshad

, R. Radhakrishnan:
Improved network lifetime to identify unexploited PATH using series cornerstone PATH algorithm in wireless sensor networks. 2189-2200 - Xiang Wu

, Huanhuan Wang, Wei Tan, Dashun Wei, Minyu Shi:
Dynamic allocation strategy of VM resources with fuzzy transfer learning method. 2201-2213 - Zhou Zhou

, Hongmin Wang, Huailing Shao, Lifeng Dong, Junyang Yu:
A high-performance scheduling algorithm using greedy strategy toward quality of service in the cloud environments. 2214-2223 - Zhou Zhou

, Zhuopeng Xiao, Weihong Deng
:
Improved community structure discovery algorithm based on combined clique percolation method and K-means algorithm. 2224-2233 - Hongwei Li, Rongxing Lu, Mohamed M. E. A. Mahmoud:

Security and privacy of machine learning assisted P2P networks. 2234-2236 - Yi Zhang, Hequn Xian

, Aimin Yu:
CSNN: Password guessing method based on Chinese syllables and neural network. 2237-2250 - Guangkai Ma, Chunpeng Ge, Lu Zhou:

Achieving reliable timestamp in the bitcoin platform. 2251-2259 - Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma:

Efficient distributed privacy-preserving collaborative outlier detection. 2260-2271 - Youwen Zhu, Xingxin Li

:
Privacy-preserving k-means clustering with local synchronization in peer-to-peer networks. 2272-2284 - Qian Wang, Zhipeng Gao, Zifan Li, Xiaojiang Du, Mohsen Guizani

:
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning. 2285-2299 - Yingying Ren, Zhiwen Zeng, Tian Wang

, Shaobo Zhang
, Guoming Zhi:
A trust-based minimum cost and quality aware data collection scheme in P2P network. 2300-2323 - Huijuan Lian, Weidong Qiu, Di Yan

, Zheng Huang, Peng Tang:
Efficient and secure k-nearest neighbor query on outsourced data. 2324-2333 - Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:

Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. 2334-2341 - Haoyang Wang, Kai Fan, Hui Li, Yintang Yang:

A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment. 2342-2355 - Xiaoyuan Liu, Hongwei Li, Guowen Xu

, Rongxing Lu, Miao He:
Adaptive privacy-preserving federated learning. 2356-2366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














