Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             28 results found
no title author magazine year volume issue page(s) type
1 A blockchain-based trustworthy collaborative power trading scheme for 5G-enabled social internet of vehicles Liu, Ziming

8 6 p. 976-983
article
2 A blockchain-enabled wiki framework based on participatory design Xu, Zheng

8 6 p. 995-1004
article
3 Ambient BackCom in beyond 5G NOMA networks: A multi-cell resource allocation framework Khan, Wali Ullah

8 6 p. 1005-1013
article
4 An accurate retransmission timeout estimator for content-centric networking based on the Jacobson algorithm Nikzad, Mortaza

8 6 p. 1085-1093
article
5 An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT Mekala, M.S.

8 6 p. 900-910
article
6 An efficient resource optimization scheme for D2D communication Zafar, Mohammad Haseeb

8 6 p. 1122-1129
article
7 A notary group-based cross-chain mechanism Xiong, Anping

8 6 p. 1059-1067
article
8 A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment Long, Tingyan

8 6 p. 911-922
article
9 Applying blockchain-based method to smart contract classification for CPS applications Jiang, Zigui

8 6 p. 964-975
article
10 A robust beam tracking scheme for millimeter wave HetNets Xue, Qing

8 6 p. 1115-1121
article
11 A survey on communication protocols and performance evaluations for Internet of Things Bayılmış, Cüneyt

8 6 p. 1094-1104
article
12 Demand-aware mobile bike-sharing service using collaborative computing and information fusion in 5G IoT environment Yang, Xiaoxian

8 6 p. 984-994
article
13 Design and analysis of intrusion detection systems for wireless mesh networks Al-Anzi, Fawaz S.

8 6 p. 1068-1076
article
14 DroidEnemy: Battling adversarial example attacks for Android malware detection Bala, Neha

8 6 p. 1040-1047
article
15 Editorial Board
8 6 p. ii-iii
article
16 Effective short text classification via the fusion of hybrid features for IoT social data Luo, Xiong

8 6 p. 942-954
article
17 Energy-efficient task offloading strategy in mobile edge computing for resource-intensive mobile applications Mahenge, Michael Pendo John

8 6 p. 1048-1058
article
18 Enhancing the robustness of object detection via 6G vehicular edge computing Chen, Chen

8 6 p. 923-931
article
19 Guest Editorial
8 6 p. 865-867
article
20 Location privacy protection of maritime mobile terminals Su, Xin

8 6 p. 932-941
article
21 Potential friendship discovery in social networks based on hybrid ensemble multiple collaborative filtering models in a 5G network environment Hu, Hexuan

8 6 p. 868-876
article
22 Protecting the trust and credibility of data by tracking forgery trace based on GANs Xiao, Shuai

8 6 p. 877-884
article
23 Resource allocation for sum-rate maximization in NOMA-based generalized spatial modulation Li, Guoquan

8 6 p. 1077-1084
article
24 Runtime reconfiguration of data services for dealing with out-of-range stream fluctuation in cloud-edge environments Zhang, Shouli

8 6 p. 1014-1026
article
25 Sum-rate maximization for UAV-enabled two-way relay systems Lu, Keju

8 6 p. 1105-1114
article
26 Temporal pattern mining from user-generated content Ali, Adnan

8 6 p. 1027-1039
article
27 Throughput-oriented associated transaction assignment in sharding blockchains for IoT social data storage Tao, Liping

8 6 p. 885-899
article
28 Users' experience matter: Delay sensitivity-aware computation offloading in mobile edge computing Wang, Mingzhi

8 6 p. 955-963
article
                             28 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands