callback( { "result":{ "query":":facetid:toc:\"db/journals/comcom/comcom127.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"185.71" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"16", "@dc":"16", "@oc":"16", "@id":"43430017", "text":":facetid:toc:db/journals/comcom/comcom127.bht" } }, "hits":{ "@total":"16", "@computed":"16", "@sent":"16", "@first":"0", "hit":[{ "@score":"1", "@id":"2389605", "info":{"authors":{"author":[{"@pid":"35/10586","text":"Deval Bhamare"},{"@pid":"41/1019","text":"Aiman Erbad"},{"@pid":"j/RajJain","text":"Raj Jain"},{"@pid":"205/1779","text":"Maede Zolanvari"},{"@pid":"29/2622","text":"Mohammed Samaka"}]},"title":"Efficient virtual network function placement strategies for Cloud Radio Access Networks.","venue":"Comput. Commun.","volume":"127","pages":"50-60","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/BhamareEJZS18","doi":"10.1016/J.COMCOM.2018.05.004","ee":"https://doi.org/10.1016/j.comcom.2018.05.004","url":"https://dblp.org/rec/journals/comcom/BhamareEJZS18"}, "url":"URL#2389605" }, { "@score":"1", "@id":"2389614", "info":{"authors":{"author":[{"@pid":"224/2894","text":"JanFizza Bukhari"},{"@pid":"15/8018","text":"Junhyuk Park"},{"@pid":"48/6485","text":"Wonyong Yoon"}]},"title":"Providing multicast services over SDN-evolved LTE network: Architecture, procedures and performance analysis.","venue":"Comput. Commun.","volume":"127","pages":"131-145","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/BukhariPY18","doi":"10.1016/J.COMCOM.2018.06.007","ee":"https://doi.org/10.1016/j.comcom.2018.06.007","url":"https://dblp.org/rec/journals/comcom/BukhariPY18"}, "url":"URL#2389614" }, { "@score":"1", "@id":"2389633", "info":{"authors":{"author":[{"@pid":"204/6386","text":"Ana Custura"},{"@pid":"06/6829","text":"Raffaello Secchi"},{"@pid":"14/5220","text":"Gorry Fairhurst"}]},"title":"Exploring DSCP modification pathologies in the Internet.","venue":"Comput. Commun.","volume":"127","pages":"86-94","year":"2018","type":"Journal Articles","access":"open","key":"journals/comcom/CusturaSF18","doi":"10.1016/J.COMCOM.2018.05.016","ee":"https://doi.org/10.1016/j.comcom.2018.05.016","url":"https://dblp.org/rec/journals/comcom/CusturaSF18"}, "url":"URL#2389633" }, { "@score":"1", "@id":"2389643", "info":{"authors":{"author":[{"@pid":"64/4044","text":"Xiaobo Fan"},{"@pid":"45/1423","text":"Xingming Li"},{"@pid":"94/1861","text":"Jiankang Zhang"}]},"title":"Compressed sensing based loss tomography using weighted ℓ1 minimization.","venue":"Comput. Commun.","volume":"127","pages":"122-130","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/FanLZ18","doi":"10.1016/J.COMCOM.2018.06.004","ee":"https://doi.org/10.1016/j.comcom.2018.06.004","url":"https://dblp.org/rec/journals/comcom/FanLZ18"}, "url":"URL#2389643" }, { "@score":"1", "@id":"2389657", "info":{"authors":{"author":[{"@pid":"02/929","text":"Li Guo"},{"@pid":"55/1401-1","text":"Zhiliang Zhu 0001"},{"@pid":"l/FrancisChungMingLau","text":"Francis C. M. Lau 0002"},{"@pid":"60/11503","text":"Yuli Zhao"},{"@pid":"22/4635-1","text":"Hai Yu 0001"}]},"title":"SSCSMA-based random relay selection scheme for large-scale relay networks.","venue":"Comput. Commun.","volume":"127","pages":"13-19","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/GuoZLZY18","doi":"10.1016/J.COMCOM.2018.05.006","ee":"https://doi.org/10.1016/j.comcom.2018.05.006","url":"https://dblp.org/rec/journals/comcom/GuoZLZY18"}, "url":"URL#2389657" }, { "@score":"1", "@id":"2389669", "info":{"authors":{"author":[{"@pid":"149/9215","text":"Syed Mohammad Irteza"},{"@pid":"206/9143","text":"Hafiz Mohsin Bashir"},{"@pid":"206/9105","text":"Talal Anwar"},{"@pid":"98/776","text":"Ihsan Ayyub Qazi"},{"@pid":"d/FahadRafiqueDogar","text":"Fahad Rafique Dogar"}]},"title":"Efficient load balancing over asymmetric datacenter topologies.","venue":"Comput. Commun.","volume":"127","pages":"1-12","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/IrtezaBAQD18","doi":"10.1016/J.COMCOM.2018.05.010","ee":"https://doi.org/10.1016/j.comcom.2018.05.010","url":"https://dblp.org/rec/journals/comcom/IrtezaBAQD18"}, "url":"URL#2389669" }, { "@score":"1", "@id":"2389693", "info":{"authors":{"author":[{"@pid":"97/5081","text":"Gábor Lencse"},{"@pid":"16/354","text":"Youki Kadobayashi"}]},"title":"Benchmarking DNS64 implementations: Theory and practice.","venue":"Comput. Commun.","volume":"127","pages":"61-74","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/LencseK18","doi":"10.1016/J.COMCOM.2018.05.005","ee":"https://doi.org/10.1016/j.comcom.2018.05.005","url":"https://dblp.org/rec/journals/comcom/LencseK18"}, "url":"URL#2389693" }, { "@score":"1", "@id":"2389695", "info":{"authors":{"author":[{"@pid":"28/7846","text":"Yujie Li"},{"@pid":"71/7672","text":"Zhibin Gao"},{"@pid":"85/7556","text":"Lianfen Huang"},{"@pid":"22/5535","text":"Xiaojiang Du"},{"@pid":"15/1123","text":"Mohsen Guizani"}]},"title":"Energy-aware interference management for ultra-dense multi-tier HetNets: Architecture and technologies.","venue":"Comput. Commun.","volume":"127","pages":"30-35","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/LiGHDG18","doi":"10.1016/J.COMCOM.2018.05.012","ee":"https://doi.org/10.1016/j.comcom.2018.05.012","url":"https://dblp.org/rec/journals/comcom/LiGHDG18"}, "url":"URL#2389695" }, { "@score":"1", "@id":"2389696", "info":{"authors":{"author":[{"@pid":"116/1627","text":"Xiuhua Li"},{"@pid":"58/6576-1","text":"Xiaofei Wang 0001"},{"@pid":"55/3503","text":"Zhengguo Sheng"},{"@pid":"78/6138-2","text":"Huan Zhou 0002"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Resource allocation for cache-enabled cloud-based small cell networks.","venue":"Comput. Commun.","volume":"127","pages":"20-29","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/LiWSZL18","doi":"10.1016/J.COMCOM.2018.05.007","ee":"https://doi.org/10.1016/j.comcom.2018.05.007","url":"https://dblp.org/rec/journals/comcom/LiWSZL18"}, "url":"URL#2389696" }, { "@score":"1", "@id":"2389708", "info":{"authors":{"author":[{"@pid":"216/6584","text":"Eduardo Miravalls-Sierra"},{"@pid":"146/1866","text":"David Muelas"},{"@pid":"173/3061","text":"Javier Ramos 0002"},{"@pid":"80/1535","text":"Jorge E. López de Vergara"},{"@pid":"60/6342","text":"Daniel Morató"},{"@pid":"13/6476","text":"Javier Aracil 0001"}]},"title":"Online detection of pathological TCP flows with retransmissions in high-speed networks.","venue":"Comput. Commun.","volume":"127","pages":"95-104","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/Miravalls-Sierra18","doi":"10.1016/J.COMCOM.2018.06.002","ee":"https://doi.org/10.1016/j.comcom.2018.06.002","url":"https://dblp.org/rec/journals/comcom/Miravalls-Sierra18"}, "url":"URL#2389708" }, { "@score":"1", "@id":"2389729", "info":{"authors":{"author":[{"@pid":"224/2862","text":"Nasir Rahim"},{"@pid":"03/103","text":"Jamil Ahmad"},{"@pid":"159/2187","text":"Khan Muhammad 0001"},{"@pid":"150/1679","text":"Arun Kumar Sangaiah"},{"@pid":"b/SungWookBaik","text":"Sung Wook Baik"}]},"title":"Privacy-preserving image retrieval for mobile devices with deep features on the cloud.","venue":"Comput. Commun.","volume":"127","pages":"75-85","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/RahimAMSB18","doi":"10.1016/J.COMCOM.2018.06.001","ee":"https://doi.org/10.1016/j.comcom.2018.06.001","url":"https://dblp.org/rec/journals/comcom/RahimAMSB18"}, "url":"URL#2389729" }, { "@score":"1", "@id":"2389730", "info":{"authors":{"author":[{"@pid":"183/6827","text":"Aydin Rajaei"},{"@pid":"08/1578","text":"Dan Chalmers"},{"@pid":"w/IanWakeman","text":"Ian Wakeman"},{"@pid":"12/4999","text":"George Parisis"}]},"title":"Efficient Geocasting in Opportunistic Networks.","venue":"Comput. Commun.","volume":"127","pages":"105-121","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/RajaeiCWP18","doi":"10.1016/J.COMCOM.2018.05.014","ee":"https://doi.org/10.1016/j.comcom.2018.05.014","url":"https://dblp.org/rec/journals/comcom/RajaeiCWP18"}, "url":"URL#2389730" }, { "@score":"1", "@id":"2389731", "info":{"authors":{"author":[{"@pid":"215/4215","text":"M. N. Upama Rajan"},{"@pid":"27/5557","text":"A. V. Babu 0001"}]},"title":"Improving the performance of hybrid multiple access scheme in millimeter wave wireless personal area networks.","venue":"Comput. Commun.","volume":"127","pages":"158-171","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/RajanB18","doi":"10.1016/J.COMCOM.2018.06.003","ee":"https://doi.org/10.1016/j.comcom.2018.06.003","url":"https://dblp.org/rec/journals/comcom/RajanB18"}, "url":"URL#2389731" }, { "@score":"1", "@id":"2389737", "info":{"authors":{"author":[{"@pid":"212/1289","text":"Probidita Roychoudhury"},{"@pid":"91/2016","text":"Basav Roychoudhury"},{"@pid":"199/9184","text":"Dilip Kumar Saikia"}]},"title":"Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial.","venue":"Comput. Commun.","volume":"127","pages":"146-157","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/RoychoudhuryRS18","doi":"10.1016/J.COMCOM.2018.06.005","ee":"https://doi.org/10.1016/j.comcom.2018.06.005","url":"https://dblp.org/rec/journals/comcom/RoychoudhuryRS18"}, "url":"URL#2389737" }, { "@score":"1", "@id":"2389751", "info":{"authors":{"author":[{"@pid":"195/0149","text":"Ali Shahini"},{"@pid":"a/NirwanAnsari","text":"Nirwan Ansari"}]},"title":"Joint spectrum allocation and energy harvesting optimization in green powered heterogeneous cognitive radio networks.","venue":"Comput. Commun.","volume":"127","pages":"36-49","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/ShahiniA18","doi":"10.1016/J.COMCOM.2018.05.011","ee":"https://doi.org/10.1016/j.comcom.2018.05.011","url":"https://dblp.org/rec/journals/comcom/ShahiniA18"}, "url":"URL#2389751" }, { "@score":"1", "@id":"2389767", "info":{"authors":{"author":[{"@pid":"128/5337","text":"Samil Temel"},{"@pid":"48/5870","text":"Mehmet C. Vuran"},{"@pid":"205/9464","text":"Mohammad M. R. Lunar"},{"@pid":"40/9951-2","text":"Zhongyuan Zhao 0002"},{"@pid":"156/7990","text":"Abdul Salam"},{"@pid":"194/3267","text":"Ronald K. Faller"},{"@pid":"194/3335","text":"Cody Stolle"}]},"title":"Vehicle-to-barrier communication during real-world vehicle crash tests.","venue":"Comput. Commun.","volume":"127","pages":"172-186","year":"2018","type":"Journal Articles","access":"closed","key":"journals/comcom/TemelVLZSFS18","doi":"10.1016/J.COMCOM.2018.05.009","ee":"https://doi.org/10.1016/j.comcom.2018.05.009","url":"https://dblp.org/rec/journals/comcom/TemelVLZSFS18"}, "url":"URL#2389767" } ] } } } )