Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             39 results found
no title author magazine year volume issue page(s) type
1 A CPS based social distancing measuring model using Edge and Fog computing Mondal, Manash Kumar

194 C p. 378-386
article
2 Advanced computing and communication technologies for Internet of Drones Kumar, Neeraj

194 C p. 329-332
article
3 A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams Jiang, Jun

194 C p. 250-257
article
4 A quantitative framework for network resilience evaluation using Dynamic Bayesian Network Jiang, Shanqing

194 C p. 387-398
article
5 A survey on the role of UAVs in the communication process: A technological perspective Alsuhli, Ghada

194 C p. 86-123
article
6 Asymmetric Differential Routing for low orbit satellite constellations Markovitz, Oren

194 C p. 15-28
article
7 Balanced multi-access edge computing offloading strategy in the Internet of things scenario Ye, Dan

194 C p. 399-410
article
8 Chameleon: A Self-adaptive cache strategy under the ever-changing access frequency in edge network Li, Pengmiao

194 C p. 301-310
article
9 Controller robust placement with dynamic traffic in software-defined networking Zhang, Zhen

194 C p. 458-467
article
10 Distributed hierarchical deep optimization for federated learning in mobile edge computing Zheng, Xiao

194 C p. 321-328
article
11 Distributed relay switching in the presence of dynamic obstacles in millimeter wave D2D communication Shukla, Ravi

194 C p. 124-134
article
12 Driver’s emotion and behavior classification system based on Internet of Things and deep learning for Advanced Driver Assistance System (ADAS) Tauqeer, Mariya

194 C p. 258-267
article
13 Driving under influence: Robust controller migration for MEC-enabled platooning Ayimba, Constantine

194 C p. 135-147
article
14 Edge computing vs centralized cloud: Impact of communication latency on the energy consumption of LTE terminal nodes Caiazza, Chiara

194 C p. 213-225
article
15 Editorial Board
194 C p. ii-iii
article
16 Effective data management strategy and RDD weight cache replacement strategy in Spark Jiang, Kun

194 C p. 66-85
article
17 Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach Lopes, Ivandro O.

194 C p. 55-65
article
18 Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement Hu, Xiaoyan

194 C p. 44-54
article
19 End-to-end delay guaranteed Service Function Chain deployment: A multi-level mapping approach Yaghoubpour, Fatemeh

194 C p. 433-445
article
20 Festschrift to honor the lifetime achievements of Prof. Marco Ajmone Marsan Dressler, Falko

194 C p. 280-281
article
21 Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results Zheng, Weiping

194 C p. 348-360
article
22 GLMLP-TRANS: A transportation mode detection model using lightweight sensors integrated in smartphones Liu, Xuyang

194 C p. 156-166
article
23 Heterogeneous UAVs assisted mobile edge computing for energy consumption minimization of the edge side Tang, Qiang

194 C p. 268-279
article
24 Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication Hayes, David A.

194 C p. 29-43
article
25 Mobility-aware incentive mechanism for relaying D2D communications Seifhashemi, Faegheh

194 C p. 361-377
article
26 Multi-agent reinforcement learning for long-term network resource allocation through auction: A V2X application Tan, Jing

194 C p. 333-347
article
27 Optimized resource allocation and time partitioning for integrated communication, sensing, and edge computing network Cheng, Kaijun

194 C p. 240-249
article
28 PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks Serhane, Oussama

194 C p. 311-320
article
29 Performance analysis of Heterogeneous Cloud-Radio Access Networks: A user-centric approach with network scalability Ayanampudi, Hareesh

194 C p. 202-212
article
30 Physical-layer security based mobile edge computing for emerging cyber physical systems Chen, Lunyuan

194 C p. 180-188
article
31 Power and delay optimization based uplink resource allocation for wireless networks with device-to-device communications Ferreira, Marcus V.G.

194 C p. 226-239
article
32 Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare Soni, Mukesh

194 C p. 292-300
article
33 Sub-messages extraction for industrial control protocol reverse engineering Liu, Yuhuan

194 C p. 1-14
article
34 Testing AGV mobility control method for MANET coverage optimization using procedural simulation Sauer, Christian

194 C p. 189-201
article
35 Towards enhanced threat modelling and analysis using a Markov Decision Process Malik, Saif U.R.

194 C p. 282-291
article
36 Traffic flow prediction using multi-view graph convolution and masked attention mechanism Chen, Lingqiang

194 C p. 446-457
article
37 Tree sketch: An accurate and memory-efficient sketch for network-wide measurement Liu, Lei

194 C p. 148-155
article
38 Trust management for service migration in Multi-access Edge Computing environments Le, Van Thanh

194 C p. 167-179
article
39 Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation Righetti, Francesca

194 C p. 411-432
article
                             39 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands