Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             15 results found
no title author magazine year volume issue page(s) type
1 AntiSense: Standard-compliant CSI obfuscation against unauthorized Wi-Fi sensing Cominelli, Marco

185 C p. 92-103
article
2 Attention-based federated incremental learning for traffic classification in the Internet of Things Zhu, Meng-yuan

185 C p. 168-175
article
3 Combinatorial double auction for resource allocation with differential privacy in edge computing Jiang, Xutong

185 C p. 13-22
article
4 Computationally efficient topology optimization of scale-free IoT networks Khan, Muhammad Awais

185 C p. 1-12
article
5 CSTRM: Contrastive Self-Supervised Trajectory Representation Model for trajectory similarity computation Liu, Xiang

185 C p. 159-167
article
6 Duplicated zigzag decodable fountain codes with the unequal error protection property Zhao, Yuli

185 C p. 66-78
article
7 Editorial Board
185 C p. ii-iii
article
8 FakeNewsIndia: A benchmark dataset of fake news incidents in India, collection methodology and impact assessment in social media Dhawan, Apoorva

185 C p. 130-141
article
9 Graph-based deep learning for communication networks: A survey Jiang, Weiwei

185 C p. 40-54
article
10 K e y C l a s s : Efficient keyword matching for network traffic classification Hubballi, Neminath

185 C p. 79-91
article
11 Lightweight network-coded ARQ: An approach for Ultra-Reliable Low Latency Communication Karetsi, Foteini

185 C p. 118-129
article
12 Multi-objective optimization of data deployment and scheduling based on the minimum cost in geo-distributed cloud Xie, Tianxing

185 C p. 142-158
article
13 RFMonitor: Monitoring smoking behavior of minors using COTS RFID devices Zhu, Biaokai

185 C p. 55-65
article
14 Route recommendation for evacuation networks using M M P P / M / 1 / N queueing models Sun, Ting

185 C p. 23-39
article
15 Survival backup strategy for controller placement problem in Software Defined Networking Alowa, Abdunasser

185 C p. 104-117
article
                             15 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands