


default search action
Computer Communications, Volume 150
Volume 150, January 2020
- Gines Garcia-Aviles, Marco Gramaglia, Pablo Serrano, Francesco Gringoli, Sergio Fuente-Pascual, Ignacio Labrador Pavón:

Experimenting with open source tools to deploy a multi-service and multi-slice mobile network. 1-12
- Rajanpreet Kaur Chahal

, Neeraj Kumar
, Shalini Batra:
Trust management in social Internet of Things: A taxonomy, open issues, and challenges. 13-46
- Stefano Cresci

, Roberto Di Pietro
, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi:
Emergent properties, models, and laws of behavioral similarities within groups of twitter users. 47-61
- Xiaoxiang Zhou:

Wearable health monitoring system based on human motion state recognition. 62-71
- Rodolfo W. L. Coutinho

, Azzedine Boukerche, Antonio A. F. Loureiro:
A novel opportunistic power controlled routing protocol for internet of underwater things. 72-82
- Quang-Huy Nguyen, Michel Morold, Klaus David, Falko Dressler

:
Car-to-Pedestrian communication with MEC-support for adaptive safety of Vulnerable Road Users. 83-93
- B. Nivedetha, Ila Vennila:

FFBKS: Fuzzy Fingerprint Biometric Key Based Security Schema for Wireless Sensor Networks. 94-102
- Boubakr Nour, Kashif Sharif

, Fan Li, Hassine Moungla, Yang Liu:
A unified hybrid information-centric naming scheme for IoT applications. 103-114
- Christophe Guyeux

, Mohammed Haddad, Mourad Hakem, Matthieu Lagacherie:
Efficient distributed average consensus in wireless sensor networks. 115-121
- Xiang Wu, Huanhuan Wang, Dashun Wei, Minyu Shi:

ANFIS with natural language processing and gray relational analysis based cloud computing framework for real time energy efficient resource allocation. 122-130 - Fahim Niaz

, Muhammad Khalid
, Zahid Ullah, Nauman Aslam, Mohsin Raza
, Priyan Malarvizhi Kumar
:
A bonded channel in cognitive wireless body area network based on IEEE 802.15.6 and internet of things. 131-143
- V. Deeban Chakravarthy

, B. Amutha:
Software-defined network assisted packet scheduling method for load balancing in mobile user concentrated cloud. 144-149
- M. Anbarasan

, BalaAnand Muthu
, C. B. Sivaparthipan
, Revathi Sundarasekar
, Seifedine Nimer Kadry, Sujatha Krishnamoorthy, R. Dinesh Jackson Samuel
, A. Antony Dasel:
Detection of flood disaster system based on IoT, big data and convolutional deep neural network. 150-157
- Dingfu Jiang:

The construction of smart city information system based on the Internet of Things and cloud computing. 158-166
- Yanping Jiang:

Combination of wearable sensors and internet of things and its application in sports rehabilitation. 167-176
- Jun Ma, Hongzhi Yu, Yan Xu, Kaiying Deng:

CDAM: Conservative data analytical model for dynamic climate information evaluation using intelligent IoT environment - An application perspective. 177-184
- V. Punitha, C. Mala:

Traffic classification for connectionless services with incremental learning. 185-199
- S. Jayanthi, C. Vennila

:
Performance improvement in satellite image classification using adaptive supervised multi-resolution approach. 200-208 - Thiyagarajan Paramasivan, S. SenthilKumar:

Power efficient Memetic Optimized and Adjacent Exponentially Distributed Routing in Mobile Ad Hoc Networks. 209-215
- Fayez Alqahtani, Zafer Al-Makhadmeh, Amr Tolba

, Omar Said
:
TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications. 216-225 - R. P. Meenaakshi Sundhari, K. Jaikumar

:
IoT assisted Hierarchical Computation Strategic Making (HCSM) and Dynamic Stochastic Optimization Technique (DSOT) for energy optimization in wireless sensor networks for smart city monitoring. 226-234
- Gifty R., Bharathi R.:

Weibull Cumulative Distribution based real-time response and performance capacity modeling of Cyber-Physical Systems through software defined networking. 235-244 - Yalan Wu

, Jigang Wu, Long Chen, Jiaquan Yan, Yuchong Luo:
Efficient task scheduling for servers with dynamic states in vehicular edge computing. 245-253
- Zhao Qian, Fengbin Zhang:

An reactive void handling algorithm in sensor networks and IoT emergency management. 254-261
- Gifty R., Bharathi R., Krishnakumar P.:

Faulty-data detection and data quality measure in cyber-physical systems through Weibull distribution. 262-268
- Song Liu, Runlan Zhang, Yongheng Shi:

Design of coverage algorithm for mobile sensor networks based on virtual molecular force. 269-277
- Mohamed Hashem, Abdulaziz A. Al Kheraif, Hassan Fouad

:
Design and development of wireless wearable bio-tooth sensor for monitoring of tooth fracture and its bio metabolic components. 278-285
- Irfan Simsek

:
Blind Packet Forwarding in a Hierarchical Level-based Locator/Identifier Split. 286-303
- Jianmin Liu, Qi Wang, Chentao He, Katia Jaffrès-Runser

, Yida Xu, Zhenyu Li, Yongjun Xu:
QMR: Q-learning based Multi-objective optimization Routing protocol for Flying Ad Hoc Networks. 304-316
- M. Jamunarani

, C. Vasanthanayaki:
Network condition based multi-level image compression and transmission in WSN. 317-324
- Kun Liu, Yunrui Bi, Di Liu:

Internet of Things based acquisition system of industrial intelligent bar code for smart city applications. 325-333
- Akbar Majidi

, Nazila Jahanbakhsh, Xiaofeng Gao, Jiaqi Zheng, Guihai Chen:
DC-ECN: A machine-learning based dynamic threshold control scheme for ECN marking in DCN. 334-345
- Yan Liu

, Wei Zhang, Shuwen Pan, Yanjun Li, Yangting Chen:
Analyzing the robotic behavior in a smart city with deep enforcement and imitation learning using IoRT. 346-356
- Hua Huang

, Shan Lin:
WiDet: Wi-Fi based device-free passive person detection with deep convolutional neural networks. 357-366
- Palash Roy

, Anika Tahsin, Sujan Sarker, Tamal Adhikary, Md. Abdur Razzaque, Mohammad Mehedi Hassan:
User mobility and Quality-of-Experience aware placement of Virtual Network Functions in 5G. 367-377
- Muhammad Awais Khan

, Sherif Adeshina Busari
, Kazi Mohammed Saidul Huq
, Shahid Mumtaz
, Saba Al-Rubaye
, Jonathan Rodriguez, Anwer Al-Dulaimi
:
A novel mapping technique for ray tracer to system-level simulation. 378-383
- Zhigang Deng, Longjiang Wang, Weijian Liu, Zhenwei Wang, Qiule E.:

Mathematical modeling and fuzzy approach for disaster analysis on geo-spatial rock mass in open-pit mining. 384-392
- Alvaro Bernal, Matias Richart, Marc Ruiz

, Alberto Castro
, Luis Velasco:
Near real-time estimation of end-to-end performance in converged fixed-mobile networks. 393-404
- Ahmad Ali AlZubi

, Abdulaziz Alarifi, Mohammed Al-Maitah, Omar A. Albasheer
:
Location assisted delay-less service discovery method for IoT environments. 405-412
- Ke Wang:

Migration strategy of cloud collaborative computing for delay-sensitive industrial IoT applications in the context of intelligent manufacturing. 413-420 - Xianming Huang

:
Intelligent remote monitoring and manufacturing system of production line based on industrial Internet of Things. 421-428
- Ranran Wang

, Xiao Ma, Chi Jiang, Yi Ye, Yin Zhang
:
Heterogeneous information network-based music recommendation system in mobile networks. 429-437 - Sareena Karapoola, Prasanna Karthik Vairam

, Shankar Raman, Veezhinathan Kamakoti:
Net-Police: A network patrolling service for effective mitigation of volumetric DDoS attacks. 438-454
- Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:

Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. 455-462
- S. Kalaivani, C. Tharini:

Analysis and implementation of novel Rice Golomb coding algorithm for wireless sensor networks. 463-471 - Suganya P., CH Pradeep Reddy

:
LNR-PP: Leaf Node Count and RSSI Based Parent Prediction Scheme to Support QoS in Presence of Mobility in 6LoWPAN. 472-487
- Jingjing Zhao, Qingyue Hu, Gaoyang Liu, Xiaoqiang Ma, Fei Chen, Mohammad Mehedi Hassan:

AFA: Adversarial fingerprinting authentication for deep neural networks. 488-497
- Rashid Ali

, Byung-Seo Kim
, Sung Won Kim
, Hyung Seok Kim, Farruh Ishmanov:
(ReLBT): A Reinforcement learning-enabled listen before talk mechanism for LTE-LAA and Wi-Fi coexistence in IoT. 498-505
- Brahim Djellabi, Mohamed F. Younis

, Mourad Amad:
Effective peer-to-peer design for supporting range query in Internet of Things applications. 506-518
- Fadi Al-Turjman, Mohammad Abujubbeh

, Arman Malekloo
, Leonardo Mostarda:
UAVs assessment in software-defined IoT networks: An overview. 519-536
- T. Murugeswari, S. Rathi:

Priority and interference aware multipath routing based communications for extreme surveillance systems. 537-546
- Tao Zhang:

Advanced Wavelet Sampling Algorithm for IoT based environmental monitoring and management. 547-555
- Gaoxiang Wu, Yiming Miao, Yu Zhang, Ahmed Barnawi:

Energy efficient for UAV-enabled mobile edge computing networks: Intelligent task prediction and offloading. 556-562
- M. Ramalingam, R. Thangarajan:

Mutated k-means algorithm for dynamic clustering to perform effective and intelligent broadcasting in medical surveillance using selective reliable broadcast protocol in VANET. 563-568
- Sumathi M.

, S. Sangeetha, Anu Thomas
:
Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud. 569-580
- Vesna Gersak, Helena Smrtnik Vitulic, Simona Prosen, Gregor Starc, Iztok Humar, Gregor Gersak:

Use of wearable devices to study activity of children in classroom; Case study - Learning geometry using movement. 581-588
- Vicente Mayor, Rafael Estepa, Antonio Jose Estepa, Germán Madinabeitia

:
Unified call admission control in corporate domains. 589-602
- Sandeep Saharan

, Seema Bawa, Neeraj Kumar
:
Dynamic pricing techniques for Intelligent Transportation System in smart cities: A systematic review. 603-625
- Zhenzhen Huang, Qiang Niu, Shuo Xiao, Tianxu Li:

Energy harvesting algorithm considering max flow problem in wireless sensor networks. 626-633
- Chandrasegar Thirumalai

, Senthilkumar Mohan
, Gautam Srivastava:
An efficient public key secure scheme for cloud and IoT security. 634-643
- Fadi Al-Turjman, Muhammad Hassan Nawaz, Umit Deniz Ulusar:

Intelligence in the Internet of Medical Things era: A systematic review of current and future trends. 644-660
- Bing Bai

, Yong Cao, Xiaozheng Li:
DTMM: Evacuation oriented optimized scheduling model for disaster management. 661-671
- Renan Cerqueira Afonso Alves, Cíntia Borges Margi

, Fernando A. Kuipers:
Know when to listen: SDN-based protocols for directed IoT networks. 672-686
- Tongqian Peng:

A novel motion detecting strategy for rehabilitation in smart home. 687-695
- Tao Han, Jefferson S. Almeida, Suane Pires P. da Silva, Paulo Honório Filho, Antonio Wendell De Oliveira Rodrigues, Victor Hugo C. de Albuquerque, Pedro Pedrosa Rebouças Filho:

An effective approach to unmanned aerial vehicle navigation using visual topological map in outdoor and indoor environments. 696-702
- Amitesh Singh Rajput, Balasubramanian Raman:

A privacy-preserving protocol for efficient nighttime haze removal using cloud based automatic reference image selection and color transfer as a service. 703-718
- Amr Tolba

, Zafer Al-Makhadmeh:
A recursive learning technique for improving information processing through message classification in IoT-cloud storage. 719-728 - Zhuang Wu

, Shanshan Jiang, Xiaolei Zhou, Yuanyuan Wang, Yuanyuan Zuo, Zhewei Wu, Lei Liang, Qi Liu:
Application of image retrieval based on convolutional neural networks and Hu invariant moment algorithm in computer telecommunications. 729-738
- R. Suguna, Vimalathithan Rathinasabapathy:

A novel high speed Low Latency Column Bit Compressed MAC architecture for Wireless Sensor Network applications. 739-746
- Lanyong Zhang, Lei Liu, Lei Zhang:

Research on position correction method for AUV large depth navigation based on ranging positioning. 747-756
- Yi Lyu, Peng Yin:

Internet of Things transmission and network reliability in complex environment. 757-763 - P. Srinivasa Ragavan, K. Ramasamy

:
Software defined networking approach based efficient routing in multihop and relay surveillance using Lion Optimization algorithm. 764-770 - N. Mohan:

Spread Spectrum Hop Count analyzing technique based code-division multiple access for data frequencies examining in wireless network. 771-776 - Palanivelu Rajmohan, P. S. S. Srinivasan:

Safety and security measurement in industrial environment based on smart IOT technology based augmented data recognizing scheme. 777-787
- Yang Hao, Yu Wu

, P. G. Ranjith, Kai Zhang, Houquan Zhang, Yanlong Chen, Ming Li, Pan Li:
New insights on ground control in intelligent mining with Internet of Things. 788-798
- Deevi Radha Rani, G. Geethakumari:

Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN. 799-810
- Qiang Liu, Miao Li, Jun Yang, Jing Lv, Kai Hwang, M. Shamim Hossain, Ghulam Muhammad

:
Joint power and time allocation in energy harvesting of UAV operating system. 811-817
- Fengmei Cui:

Deployment and integration of smart sensors with IoT devices detecting fire disasters in huge forest environment. 818-827
- Sania Khadim, Faisal Riaz, Sohail Jabbar

, Shehzad Khalid, Moayad Aloqaily
:
A non-cooperative rear-end collision avoidance scheme for non-connected and heterogeneous environment. 828-840
- Kaushik Roy Chowdhury

, Marco Di Felice, Ibrahim Matta, Bo Sheng
:
Special Issue on Wired/Wireless Internet Communications conference (IFIP WWIC 2017). 841-842

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














