no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A data-driven and the deep learning based CDN recommendation framework for ICPs
|
Qiao, Bo |
|
2018 |
12 |
5 |
p. 1445-1453 |
article |
2 |
A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks
|
Aguilar, Alberto |
|
2019 |
12 |
5 |
p. 1323-1335 |
article |
3 |
A near-optimal cloud offloading under multi-user multi-radio environments
|
Feng, Guangsheng |
|
2018 |
12 |
5 |
p. 1454-1465 |
article |
4 |
An efficient model for vehicular cloud computing with prioritizing computing resources
|
Tahmasebi, Masoud |
|
2018 |
12 |
5 |
p. 1466-1475 |
article |
5 |
An IoT based efficient hybrid recommender system for cardiovascular disease
|
Jabeen, Fouzia |
|
2019 |
12 |
5 |
p. 1263-1276 |
article |
6 |
A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network
|
Verma, Sandeep |
|
2019 |
12 |
5 |
p. 1110-1136 |
article |
7 |
A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment
|
Yuan, Yazhou |
|
2018 |
12 |
5 |
p. 1369-1384 |
article |
8 |
A time-aware resource search strategy with the ant colony optimization in MANETs
|
Meng, Xianfu |
|
2019 |
12 |
5 |
p. 1013-1027 |
article |
9 |
A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks
|
Rajeswari, A. R. |
|
2019 |
12 |
5 |
p. 1076-1096 |
article |
10 |
A type of energy-efficient target tracking approach based on grids in sensor networks
|
Sha, Chao |
|
2019 |
12 |
5 |
p. 1041-1060 |
article |
11 |
Big data and smart computing in network systems
|
Chen, Jiming |
|
2019 |
12 |
5 |
p. 1308-1310 |
article |
12 |
Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET
|
Li, Hui |
|
2019 |
12 |
5 |
p. 1178-1193 |
article |
13 |
Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis
|
Dhanya, D. |
|
2019 |
12 |
5 |
p. 1194-1213 |
article |
14 |
DSESP: Dual sparsity estimation subspace pursuit for the compressive sensing based close-loop ecg monitoring structure
|
Yu, Wenbin |
|
2019 |
12 |
5 |
p. 1311-1322 |
article |
15 |
Dynamic topic modeling via self-aggregation for short text streams
|
Shi, Lei |
|
2018 |
12 |
5 |
p. 1403-1417 |
article |
16 |
Editorial on “Special issue on fog computing for healthcare”
|
Kim, Ki-Il |
|
2019 |
12 |
5 |
p. 1214-1215 |
article |
17 |
Fog computing for assisting and tracking elder patients with neurodegenerative diseases
|
García-Magariño, Iván |
|
2019 |
12 |
5 |
p. 1225-1235 |
article |
18 |
Fog computing in internet of things: Practical applications and future directions
|
Naeem, Rida Zojaj |
|
2019 |
12 |
5 |
p. 1236-1262 |
article |
19 |
Information spread link prediction through multi-layer of social network based on trusted central nodes
|
Fan, Tongrang |
|
2019 |
12 |
5 |
p. 1028-1040 |
article |
20 |
Joint radio resource allocation in fog radio access network for healthcare
|
Tong, Shiyuan |
|
2018 |
12 |
5 |
p. 1277-1288 |
article |
21 |
Load scheduling for distributed edge computing: A communication-computation tradeoff
|
Zhao, Minghui |
|
2018 |
12 |
5 |
p. 1418-1432 |
article |
22 |
Location protection method for mobile crowd sensing based on local differential privacy preference
|
Wang, Jian |
|
2019 |
12 |
5 |
p. 1097-1109 |
article |
23 |
Naive semi-supervised deep learning using pseudo-label
|
Li, Zhun |
|
2018 |
12 |
5 |
p. 1358-1368 |
article |
24 |
PPQAR: Parallel PSO for quantitative association rule mining
|
Yan, Danfeng |
|
2019 |
12 |
5 |
p. 1433-1444 |
article |
25 |
Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks
|
Robinson, Y. Harold |
|
2019 |
12 |
5 |
p. 1061-1075 |
article |
26 |
PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks
|
Parne, Balu L. |
|
2019 |
12 |
5 |
p. 1156-1177 |
article |
27 |
QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks
|
Jiang, Xinyang |
|
2018 |
12 |
5 |
p. 1385-1402 |
article |
28 |
Secure and efficient data delivery for fog-assisted wireless body area networks
|
Hayajneh, Thaier |
|
2019 |
12 |
5 |
p. 1289-1307 |
article |
29 |
Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority
|
Hamouid, Khaled |
|
2019 |
12 |
5 |
p. 1137-1155 |
article |
30 |
Smart contract for secure billing in ride-hailing service via blockchain
|
Zhang, Huajun |
|
2018 |
12 |
5 |
p. 1346-1357 |
article |
31 |
Toward citation recommender systems considering the article impact in the extended nearby citation network
|
Alshareef, Abdulrhman M. |
|
2018 |
12 |
5 |
p. 1336-1345 |
article |
32 |
Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case
|
Nikoloudakis, Yannis |
|
2019 |
12 |
5 |
p. 1216-1224 |
article |