nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cognitive model to predict human interest in smart environments
|
Ahmed, Tanveer |
|
|
161 |
C |
p. 1-9 |
artikel |
2 |
An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband
|
Kfoury, Elie F. |
|
|
161 |
C |
p. 212-224 |
artikel |
3 |
Are mobility management solutions ready for 5G and beyond?
|
Jain, Akshay |
|
|
161 |
C |
p. 50-75 |
artikel |
4 |
Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing
|
Liu, Yuxin |
|
|
161 |
C |
p. 375-386 |
artikel |
5 |
A solution to MPTCP’s inefficiencies under the incast problem for Data Center Networks
|
Kheirkhah, Morteza |
|
|
161 |
C |
p. 238-247 |
artikel |
6 |
A staged adaptive firefly algorithm for UAV charging planning in wireless sensor networks
|
Cheng, Linhui |
|
|
161 |
C |
p. 132-141 |
artikel |
7 |
A taxonomy of AI techniques for 6G communication networks
|
Sheth, Karan |
|
|
161 |
C |
p. 279-303 |
artikel |
8 |
A taxonomy of blockchain-enabled softwarization for secure UAV network
|
Kumari, Aparna |
|
|
161 |
C |
p. 304-323 |
artikel |
9 |
Benchmarking open source NFV MANO systems: OSM and ONAP
|
Yilma, Girma M. |
|
|
161 |
C |
p. 86-98 |
artikel |
10 |
Blockchain based integrated security measure for reliable service delegation in 6G communication environment
|
Manogaran, Gunasekaran |
|
|
161 |
C |
p. 248-256 |
artikel |
11 |
BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme
|
Wang, Yue |
|
|
161 |
C |
p. 28-40 |
artikel |
12 |
Cooperative and efficient content caching and distribution mechanism in 5G network
|
Sai, Ying |
|
|
161 |
C |
p. 183-190 |
artikel |
13 |
Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For IIOT secured transmission in cloud computing
|
Li, Qizhong |
|
|
161 |
C |
p. 10-18 |
artikel |
14 |
Editorial Board
|
|
|
|
161 |
C |
p. ii-iii |
artikel |
15 |
Energy-efficient unmanned aerial vehicle scanning approach with node clustering in opportunistic networks
|
Bacanli, Salih Safa |
|
|
161 |
C |
p. 76-85 |
artikel |
16 |
Evolutionary game theoretical model for stable femtocells’ clusters formation in HetNets
|
Rohoden, Katty |
|
|
161 |
C |
p. 266-278 |
artikel |
17 |
Extended analysis of Age of Information threshold violations
|
Franco, Antonio |
|
|
161 |
C |
p. 191-201 |
artikel |
18 |
Flexible functional split for cost-efficient C-RAN
|
Mei, Haoran |
|
|
161 |
C |
p. 368-374 |
artikel |
19 |
Learning distributed communication and computation in the IoT
|
Abudu, Prince |
|
|
161 |
C |
p. 150-159 |
artikel |
20 |
Moving target defense controller of mobile system based on Openflow sensor security scheme
|
Niu, Xin |
|
|
161 |
C |
p. 142-149 |
artikel |
21 |
N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets
|
Iwendi, Celestine |
|
|
161 |
C |
p. 160-171 |
artikel |
22 |
Optimization of base station density and user transmission power in multi-tier heterogeneous cellular systems
|
Liu, Zhixin |
|
|
161 |
C |
p. 334-343 |
artikel |
23 |
Optimization of collaborative resource allocation for mobile edge computing
|
Lv, Zhihan |
|
|
161 |
C |
p. 19-27 |
artikel |
24 |
Optimization of latency-aware flow allocation in NGFI networks
|
Klinkowski, Mirosław |
|
|
161 |
C |
p. 344-359 |
artikel |
25 |
PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing
|
Ren, Qingqing |
|
|
161 |
C |
p. 324-333 |
artikel |
26 |
Performance evaluation of hybrid crowdsensing systems with stateful CrowdSenSim 2.0 simulator
|
Montori, Federico |
|
|
161 |
C |
p. 225-237 |
artikel |
27 |
ProgLab: Programmable labels for QoS provisioning on software defined networks
|
Froes, Wallas |
|
|
161 |
C |
p. 99-108 |
artikel |
28 |
Reliable uplink transmissions for NOMA-based Industrial Wireless Networks with guaranteed real-time performance
|
Xu, Chaonong |
|
|
161 |
C |
p. 41-49 |
artikel |
29 |
Resource provisioning for IoT services in the fog computing environment: An autonomic approach
|
Etemadi, Masoumeh |
|
|
161 |
C |
p. 109-131 |
artikel |
30 |
Security analysis of indistinguishable obfuscation for internet of medical things applications
|
Jing, Zhengjun |
|
|
161 |
C |
p. 202-211 |
artikel |
31 |
Sensing network security prevention measures of BIM smart operation and maintenance system
|
Peng, Yu |
|
|
161 |
C |
p. 360-367 |
artikel |
32 |
Spam transaction attack detection model based on GRU and WGAN-div
|
Yang, Jin |
|
|
161 |
C |
p. 172-182 |
artikel |
33 |
Wearable bracelets with variable sampling frequency for measuring multiple physiological parameter of human
|
Hu, Jian |
|
|
161 |
C |
p. 257-265 |
artikel |