Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             33 results found
no title author magazine year volume issue page(s) type
1 A cognitive model to predict human interest in smart environments Ahmed, Tanveer

161 C p. 1-9
article
2 An emulation-based evaluation of TCP BBRv2 Alpha for wired broadband Kfoury, Elie F.

161 C p. 212-224
article
3 Are mobility management solutions ready for 5G and beyond? Jain, Akshay

161 C p. 50-75
article
4 Artificial intelligence aware and security-enhanced traceback technique in mobile edge computing Liu, Yuxin

161 C p. 375-386
article
5 A solution to MPTCP’s inefficiencies under the incast problem for Data Center Networks Kheirkhah, Morteza

161 C p. 238-247
article
6 A staged adaptive firefly algorithm for UAV charging planning in wireless sensor networks Cheng, Linhui

161 C p. 132-141
article
7 A taxonomy of AI techniques for 6G communication networks Sheth, Karan

161 C p. 279-303
article
8 A taxonomy of blockchain-enabled softwarization for secure UAV network Kumari, Aparna

161 C p. 304-323
article
9 Benchmarking open source NFV MANO systems: OSM and ONAP Yilma, Girma M.

161 C p. 86-98
article
10 Blockchain based integrated security measure for reliable service delegation in 6G communication environment Manogaran, Gunasekaran

161 C p. 248-256
article
11 BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme Wang, Yue

161 C p. 28-40
article
12 Cooperative and efficient content caching and distribution mechanism in 5G network Sai, Ying

161 C p. 183-190
article
13 Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For IIOT secured transmission in cloud computing Li, Qizhong

161 C p. 10-18
article
14 Editorial Board
161 C p. ii-iii
article
15 Energy-efficient unmanned aerial vehicle scanning approach with node clustering in opportunistic networks Bacanli, Salih Safa

161 C p. 76-85
article
16 Evolutionary game theoretical model for stable femtocells’ clusters formation in HetNets Rohoden, Katty

161 C p. 266-278
article
17 Extended analysis of Age of Information threshold violations Franco, Antonio

161 C p. 191-201
article
18 Flexible functional split for cost-efficient C-RAN Mei, Haoran

161 C p. 368-374
article
19 Learning distributed communication and computation in the IoT Abudu, Prince

161 C p. 150-159
article
20 Moving target defense controller of mobile system based on Openflow sensor security scheme Niu, Xin

161 C p. 142-149
article
21 N-Sanitization: A semantic privacy-preserving framework for unstructured medical datasets Iwendi, Celestine

161 C p. 160-171
article
22 Optimization of base station density and user transmission power in multi-tier heterogeneous cellular systems Liu, Zhixin

161 C p. 334-343
article
23 Optimization of collaborative resource allocation for mobile edge computing Lv, Zhihan

161 C p. 19-27
article
24 Optimization of latency-aware flow allocation in NGFI networks Klinkowski, Mirosław

161 C p. 344-359
article
25 PacketUsher: Exploiting DPDK to accelerate compute-intensive packet processing Ren, Qingqing

161 C p. 324-333
article
26 Performance evaluation of hybrid crowdsensing systems with stateful CrowdSenSim 2.0 simulator Montori, Federico

161 C p. 225-237
article
27 ProgLab: Programmable labels for QoS provisioning on software defined networks Froes, Wallas

161 C p. 99-108
article
28 Reliable uplink transmissions for NOMA-based Industrial Wireless Networks with guaranteed real-time performance Xu, Chaonong

161 C p. 41-49
article
29 Resource provisioning for IoT services in the fog computing environment: An autonomic approach Etemadi, Masoumeh

161 C p. 109-131
article
30 Security analysis of indistinguishable obfuscation for internet of medical things applications Jing, Zhengjun

161 C p. 202-211
article
31 Sensing network security prevention measures of BIM smart operation and maintenance system Peng, Yu

161 C p. 360-367
article
32 Spam transaction attack detection model based on GRU and WGAN-div Yang, Jin

161 C p. 172-182
article
33 Wearable bracelets with variable sampling frequency for measuring multiple physiological parameter of human Hu, Jian

161 C p. 257-265
article
                             33 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands