


default search action
Computer Communications, Volume 151
Volume 151, February 2020
- Jungwon Lee

, Ha Young Byun
, Hyesook Lim
:
Dual-load Bloom filter: Application for name lookup. 1-9
- Hao Wang:

Improvement and implementation of Wireless Network Topology System based on SNMP protocol for router equipment. 10-18
- Qiang Tang, Lu Chang, Kun Yang, Kezhi Wang, Jin Wang, Pradip Kumar Sharma:

Task number maximization offloading strategy seamlessly adapted to UAV scenario. 19-30
- Wei Chen:

Intelligent manufacturing production line data monitoring system for industrial internet of things. 31-41
- Dawei Fang, Xin Guan, Lin Lin, Yu Peng, Di Sun, Mohammad Mehedi Hassan:

Edge intelligence based Economic Dispatch for Virtual Power Plant in 5G Internet of Energy. 42-50
- Bohan Li, Renjun Ye, Gao Gu, Ruochen Liang, Wei Liu, Ken Cai:

A detection mechanism on malicious nodes in IoT. 51-59
- Rajeesh Kumar N. V.

, Mohan Kumar P.:
Application of SDN for secure communication in IoT environment. 60-65
- Geetanjali Rathee, Ashutosh Sharma

, Rajiv Kumar, Farhan Ahmad, Razi Iqbal:
A trust management scheme to secure mobile information centric networks. 66-75
- Liyong Yin, Chao Zhang, Zhijie Cui:

Experimental research on real-time acquisition and monitoring of wearable EEG based on TGAM module. 76-85 - Jiajie He, Dunbo Liu, Xiaoyang Chen:

Wearable exercise electrocardiograph signal quality assessment based on fuzzy comprehensive evaluation algorithm. 86-97
- (Withdrawn) An assessment of software defined networking approach in surveillance using sparse optimization algorithm. 98-110

- P. Suresh, R. Sukumar, S. Ayyasamy

:
Efficient pattern matching algorithm for security and Binary Search Tree (BST) based memory system in Wireless Intrusion Detection System (WIDS). 111-118
- Antonio Arena

, Pericle Perazzo
, Carlo Vallati, Gianluca Dini, Giuseppe Anastasi:
Evaluating and improving the scalability of RPL security in the Internet of Things. 119-132
- Hisham A. Kholidy:

An Intelligent Swarm Based Prediction Approach For Predicting Cloud Computing User Resource Needs. 133-144
- Lijuan Shi, Liquan Chen:

Hazard recognition and reliability analysis of CTCS-3 on-board subsystem. 145-153
- Sangeetha U., A. V. Babu:

Fair and efficient resource allocation in IEEE 802.11ah WLAN with heterogeneous data rates. 154-164
- Zhiou Xu, Juan Zhao, Yi Yu, Haijun Zeng:

Improved 1D-CNNs for behavior recognition using wearable sensor network. 165-171
- Gokulraj J.

, J. Senthilkumar, Y. Suresh
, V. Mohanraj:
Data consistency matrix based data processing model for efficient data storage in wireless sensor networks. 172-182 - M. Lavanya

, B. Shanthi, S. Saravanan
:
Multi objective task scheduling algorithm based on SLA and processing time suitable for cloud environment. 183-195 - Balaji Vuppala

, Swarnalatha P.:
Software defined network using enhanced workflow scheduling in surveillance. 196-201 - Khadir Kumar N., Bharathi A.

:
Real time energy efficient data aggregation and scheduling scheme for WSN using ATL. 202-207
- Qifei Zhang, Xiaomo Yu:

GrowingNet: An end-to-end growing network for semi-supervised learning. 208-215
- Luca Baldesi, Leonardo Maccari

, Renato Lo Cigno
:
Infective flooding in low-duty-cycle networks, properties and bounds. 216-226
- Sumathi M.

, S. Sangeetha, Anu Thomas
:
Corrigendum to "Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud" [Comput. Commun. 150 (2020) 569-580]. 227
- Jing Yang Koh, Gareth W. Peters

, Ido Nevat, Derek Leong:
Probabilistic routing in wireless networks with privacy guarantees. 228-237
- Mohammed Amoon

, Torki A. Altameem, Ayman Altameem:
RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms. 238-246
- Koki Inoue, Shin'ichi Arakawa, Masayuki Murata:

Network resource planning for evolvability in software-defined infrastructure. 247-256
- Hassan Fouad

, Nourelhoda M. Mahmoud
, Mohammed Sayed El Issawi, Haytham Al-Feel:
Distributed and scalable computing framework for improving request processing of wearable IoT assisted medical sensors on pervasive computing system. 257-265 - Pooja S. B.

, R. V. Siva Balan, Anisha M.
, M. S. Muthukumaran, Jothikumar R.
:
Techniques Tanimoto correlated feature selection system and hybridization of clustering and boosting ensemble classification of remote sensed big data for weather forecasting. 266-274
- Anirudh Paranjothi

, Mohammad S. Khan
, Rizwan Patan, Reza M. Parizi, Mohammed Atiquzzaman
:
VANETomo: A congestion identification and control scheme in connected vehicles using network tomography. 275-289 - Weimin Liu, Guan Huang, Aiyun Zheng, Jiaxin Liu

:
Research on the optimization of IIoT data processing latency. 290-298
- Xin Liu:

Research on intelligent visual image feature region acquisition algorithm in Internet of Things framework. 299-305
- Ademar Takeo Akabane

, Roger Immich
, Luiz F. Bittencourt, Edmundo R. M. Madeira
, Leandro A. Villas
:
Towards a distributed and infrastructure-less vehicular traffic management system. 306-319
- Wei Xu, Zhipeng Zhang, Hongxun Wang, Yang Yi, Yanpeng Zhang:

Optimization of monitoring network system for Eco safety on Internet of Things platform and environmental food supply chain. 320-330
- I. Gethzi Ahila Poornima, B. Paramasivan:

Anomaly detection in wireless sensor network using machine learning algorithm. 331-337 - Mostafa Rezazad, Y. C. Tay:

Decoupling NDN caches via CCndnS: Design, analysis, and application. 338-354
- S. Vimal

, Manju Khari
, Nilanjan Dey
, Rubén González Crespo
, Yesudhas Harold Robinson
:
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT. 355-364
- Zbigniew Duliñski, Grzegorz Rzym

, Piotr Cholda
:
MPLS-based reduction of flow table entries in SDN switches supporting multipath transmission. 365-385
- Karthik Sekaran

, Sudha M.:
Predicting drug responsiveness with deep learning from the effects on gene expression of Obsessive-Compulsive Disorder affected cases. 386-394
- Arzoo Miglani, Neeraj Kumar

, Vinay Chamola
, Sherali Zeadally:
Blockchain for Internet of Energy management: Review, solutions, and challenges. 395-418
- Kokila S., Ramesh S.:

Intelligent software defined network based digital video stabilization system using frame transparency threshold pattern stabilization method. 419-427
- Torki A. Altameem, Ayman Altameem:

Hybridized interference bounded intuitive splitting for smart wearable system using cognitive assisted Internet of Things. 428-436
- Si Liu, Degan Zhang, Xiaohuan Liu, Ting Zhang, Hao Wu:

Adaptive repair algorithm for TORA routing protocol based on flood control strategy. 437-448 - Chuangchuang Zhang, Xingwei Wang, Anwei Dong, Yong Zhao, Qiang He, Min Huang:

Energy efficient network service deployment across multiple SDN domains. 449-462
- N. Nagarani

, P. Venkatakrishnan
, N. Balaji:
Unmanned Aerial vehicle's runway landing system with efficient target detection by using morphological fusion for military surveillance system. 463-472
- Jonathan Hasenburg

, David Bermbach:
GeoBroker: Leveraging geo-contexts for IoT data distribution. 473-484
- Miaojiang Chen, Tian Wang

, Kaoru Ota
, Mianxiong Dong, Ming Zhao, Anfeng Liu:
Intelligent resource allocation management for vehicles network: An A3C learning approach. 485-494
- Mohamed Ahzam Amanullah

, Riyaz Ahamed Ariyaluran Habeeb
, Fariza Hanum Nasaruddin, Abdullah Gani
, Ejaz Ahmed
, Abdul Salam Mohamed Nainar, Nazihah Md. Akim, Muhammad Imran:
Deep learning and big data technologies for IoT security. 495-517
- Parimal Mehta

, Rajesh Gupta
, Sudeep Tanwar
:
Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. 518-538
- Suyel Namasudra

, Debashree Devi, Seifedine Nimer Kadry, Revathi Sundarasekar
, A. Shanthini:
Towards DNA based data security in the cloud computing environment. 539-547 - Chunmei Wang, Fang Qin, R. Dinesh Jackson Samuel:

Cloud assisted big data information retrieval system for critical data supervision in disaster regions. 548-555
- Congfeng Jiang, Tiantian Fan, Honghao Gao, Weisong Shi

, Liangkai Liu, Christophe Cérin, Jian Wan:
Energy aware edge computing: A survey. 556-580
- Hong Xu, Yuan He, Xiang Sun, Jia He, Qiongmei Xu:

Prediction of thermal energy inside smart homes using IoT and classifier ensemble techniques. 581-589

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














