nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A CPS based social distancing measuring model using Edge and Fog computing
|
Mondal, Manash Kumar |
|
|
194 |
C |
p. 378-386 |
artikel |
2 |
Advanced computing and communication technologies for Internet of Drones
|
Kumar, Neeraj |
|
|
194 |
C |
p. 329-332 |
artikel |
3 |
A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams
|
Jiang, Jun |
|
|
194 |
C |
p. 250-257 |
artikel |
4 |
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network
|
Jiang, Shanqing |
|
|
194 |
C |
p. 387-398 |
artikel |
5 |
A survey on the role of UAVs in the communication process: A technological perspective
|
Alsuhli, Ghada |
|
|
194 |
C |
p. 86-123 |
artikel |
6 |
Asymmetric Differential Routing for low orbit satellite constellations
|
Markovitz, Oren |
|
|
194 |
C |
p. 15-28 |
artikel |
7 |
Balanced multi-access edge computing offloading strategy in the Internet of things scenario
|
Ye, Dan |
|
|
194 |
C |
p. 399-410 |
artikel |
8 |
Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network
|
Li, Pengmiao |
|
|
194 |
C |
p. 301-310 |
artikel |
9 |
Controller robust placement with dynamic traffic in software-defined networking
|
Zhang, Zhen |
|
|
194 |
C |
p. 458-467 |
artikel |
10 |
Distributed hierarchical deep optimization for federated learning in mobile edge computing
|
Zheng, Xiao |
|
|
194 |
C |
p. 321-328 |
artikel |
11 |
Distributed relay switching in the presence of dynamic obstacles in millimeter wave D2D communication
|
Shukla, Ravi |
|
|
194 |
C |
p. 124-134 |
artikel |
12 |
Driver’s emotion and behavior classification system based on Internet of Things and deep learning for Advanced Driver Assistance System (ADAS)
|
Tauqeer, Mariya |
|
|
194 |
C |
p. 258-267 |
artikel |
13 |
Driving under influence: Robust controller migration for MEC-enabled platooning
|
Ayimba, Constantine |
|
|
194 |
C |
p. 135-147 |
artikel |
14 |
Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes
|
Caiazza, Chiara |
|
|
194 |
C |
p. 213-225 |
artikel |
15 |
Editorial Board
|
|
|
|
194 |
C |
p. ii-iii |
artikel |
16 |
Effective data management strategy and RDD weight cache replacement strategy in Spark
|
Jiang, Kun |
|
|
194 |
C |
p. 66-85 |
artikel |
17 |
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach
|
Lopes, Ivandro O. |
|
|
194 |
C |
p. 55-65 |
artikel |
18 |
Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement
|
Hu, Xiaoyan |
|
|
194 |
C |
p. 44-54 |
artikel |
19 |
End-to-end delay guaranteed Service Function Chain deployment: A multi-level mapping approach
|
Yaghoubpour, Fatemeh |
|
|
194 |
C |
p. 433-445 |
artikel |
20 |
Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan
|
Dressler, Falko |
|
|
194 |
C |
p. 280-281 |
artikel |
21 |
Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results
|
Zheng, Weiping |
|
|
194 |
C |
p. 348-360 |
artikel |
22 |
GLMLP-TRANS: A transportation mode detection model using lightweight sensors integrated in smartphones
|
Liu, Xuyang |
|
|
194 |
C |
p. 156-166 |
artikel |
23 |
Heterogeneous UAVs assisted mobile edge computing for energy consumption minimization of the edge side
|
Tang, Qiang |
|
|
194 |
C |
p. 268-279 |
artikel |
24 |
Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication
|
Hayes, David A. |
|
|
194 |
C |
p. 29-43 |
artikel |
25 |
Mobility-aware incentive mechanism for relaying D2D communications
|
Seifhashemi, Faegheh |
|
|
194 |
C |
p. 361-377 |
artikel |
26 |
Multi-agent reinforcement learning for long-term network resource allocation through auction: A V2X application
|
Tan, Jing |
|
|
194 |
C |
p. 333-347 |
artikel |
27 |
Optimized resource allocation and time partitioning for integrated communication, sensing, and edge computing network
|
Cheng, Kaijun |
|
|
194 |
C |
p. 240-249 |
artikel |
28 |
PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks
|
Serhane, Oussama |
|
|
194 |
C |
p. 311-320 |
artikel |
29 |
Performance analysis of Heterogeneous Cloud-Radio Access Networks: A user-centric approach with network scalability
|
Ayanampudi, Hareesh |
|
|
194 |
C |
p. 202-212 |
artikel |
30 |
Physical-layer security based mobile edge computing for emerging cyber physical systems
|
Chen, Lunyuan |
|
|
194 |
C |
p. 180-188 |
artikel |
31 |
Power and delay optimization based uplink resource allocation for wireless networks with device-to-device communications
|
Ferreira, Marcus V.G. |
|
|
194 |
C |
p. 226-239 |
artikel |
32 |
Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare
|
Soni, Mukesh |
|
|
194 |
C |
p. 292-300 |
artikel |
33 |
Sub-messages extraction for industrial control protocol reverse engineering
|
Liu, Yuhuan |
|
|
194 |
C |
p. 1-14 |
artikel |
34 |
Testing AGV mobility control method for MANET coverage optimization using procedural simulation
|
Sauer, Christian |
|
|
194 |
C |
p. 189-201 |
artikel |
35 |
Towards enhanced threat modelling and analysis using a Markov Decision Process
|
Malik, Saif U.R. |
|
|
194 |
C |
p. 282-291 |
artikel |
36 |
Traffic flow prediction using multi-view graph convolution and masked attention mechanism
|
Chen, Lingqiang |
|
|
194 |
C |
p. 446-457 |
artikel |
37 |
Tree sketch: An accurate and memory-efficient sketch for network-wide measurement
|
Liu, Lei |
|
|
194 |
C |
p. 148-155 |
artikel |
38 |
Trust management for service migration in Multi-access Edge Computing environments
|
Le, Van Thanh |
|
|
194 |
C |
p. 167-179 |
artikel |
39 |
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation
|
Righetti, Francesca |
|
|
194 |
C |
p. 411-432 |
artikel |