dblp: Computer Networks, Volume 129 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



- > Home > Journals > Computer Networks
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volumes 129, Part 1, December 2017
Research Articles

Sanaa Sharafeddine
, Karim Jahed, Marwan Fawaz:
Optimized device centric aggregation mechanisms for mobile devices with multiple wireless interfaces. 1-16

Yi-Ting Peng, Sok-Ian Sou, Meng-Hsun Tsai
, Chuan-Sheng Lin
:
Multipath mobile data offloading of deadline assurance with policy and charging control in cellular/WiFi networks. 17-27

Erfaneh Vahedi, Majid Bayat
, Mohammad Reza Pakravan, Mohammad Reza Aref:
A secure ECC-based privacy preserving data aggregation scheme for smart grids. 28-36

Jian Zhang, Yang Yang, Yanjiao Chen
, Jing Chen, Qian Zhang
:
A general framework to design secure cloud storage protocol using homomorphic encryption scheme. 37-50

Haojun Huang, Junbao Zhang, Xu Zhang, Benshun Yi, Qilin Fan, Feng Li:
EMGR: Energy-efficient multicast geographic routing in wireless sensor networks. 51-63

Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. 64-78

Soojeon Lee, Dongman Lee, Myungjin Lee, Hyungsoo Jung, Byoung-Sun Lee:
Randomizing TCP payload size for TCP fairness in data center networks. 79-92

Mehdi Malboubi, Yanlei Gong, Zijun Yang, Xiong Wang, Chen-Nee Chuah
, Puneet Sharma:
Software defined network inference with evolutionary optimal observation matrices. 93-104

Amin Ghalami Osgouei, Amir Khorsandi Koohanestani
, Hossein Saidi
, Ali Fanian:
Online assignment of non-SDN virtual network nodes to a physical SDN. 105-116

Bruno P. Santos
, Luiz Filipe M. Vieira, Marcos Augusto M. Vieira:
CGR: Centrality-based green routing for Low-power and Lossy Networks. 117-128

Sara El Alaoui, Byrav Ramamurthy:
EAODR: A novel routing algorithm based on the Modified Temporal Graph network model for DTN-based Interplanetary Networks. 129-141

Kostas Katsalis, Bijan Rahimzadeh Rofoee, Giada Landi, Jordi Ferrer Riera, Kostas Kousias, Markos P. Anastasopoulos, L. Kiraly, Anna Tzanakaki
, Thanasis Korakis:
Implementation experience in multi-domain SDN: Challenges, consolidation and future directions. 142-158

Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan:
A key agreement protocol with partial backward confidentiality. 159-177

Jianwei Niu
, Shihao Wang, Wei Niu, Mohammed Atiquzzaman
:
User-aware partitioning algorithm for mobile cloud computing based on maximum graph cuts. 193-206

Gabriel Scalosub:
Towards optimal buffer management for streams with packet dependencies. 207-214

Ying Qu, Bryan C. K. Ng, Michael Homer:
Optimising channel assignment to prevent flow starvation and improve fairness for planning single radio WMNs in built environments. 215-231

Phi-Le Nguyen
, Yusheng Ji, Zhi Liu
, Huy Vu, Khanh-Van Nguyen
:
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing. 232-250

Ji Qi, Fei Hu, Xin Li, A. M. Koushik, Sunil Kumar:
3-ent (resilient, intelligent, and efficient) medium access control for full-duplex, jamming-aware, directional airborne networks. 251-260

João Marcelo Ceron, Cíntia Borges Margi
, Lisandro Zambenedetti Granville
:
MARS: From traffic containment to network reconfiguration in malware-analysis systems. 261-272

Rahul Thakur, Vijeth J. Kotagi
, C. Siva Ram Murthy:
Resource allocation and cell selection framework for LTE-Unlicensed femtocell networks. 273-283

Hyunjoong Lee, Sangkyu Park, Saewoong Bahk:
An opportunistic scheduling algorithm using aged CSI in massive MIMO systems. 284-296

Jia Wu
, Zhigang Chen, Ming Zhao:
Effective information transmission based on socialization nodes in opportunistic networks. 297-305

Aya Ayadi
, Oussama Ghorbel
, Abdulfattah Mohammad Obeid, Mohamed Abid:
Outlier detection approaches for wireless sensor networks: A survey. 319-333
Volumes 129, Part 2, December 2017

Harry Rudin:
Change at the Helm Welcome, Farewell, Advice, Thanks Special Issues. iii

Joel J. P. C. Rodrigues, Sherali Zeadally, Neeraj Kumar
, Guangjie Han:
Special Issue on 5G Wireless Networks for IoT and Body Sensors. 335-339

Jaime Lloret, Lorena Parra
, Miran Taha
, Jesús Tomás:
An architecture and protocol for smart continuous eHealth monitoring using 5G. 340-351

Radu-Corneliu Marin, Radu-Ioan Ciobanu
, Ciprian Dobre
, Constandinos X. Mavromoustakis, George Mastorakis
:
A context-aware collaborative model for smartphone energy efficiency over 5G wireless networks. 352-362

Ilsun You, Jong-Hyouk Lee:
SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks. 363-372

Carolina Fortuna, Adnan Bekan, Tomaz Javornik, Gregor Cerar, Mihael Mohorcic
:
Software interfaces for control, optimization and update of 5G machine type communication networks. 373-383

Shuai Han, Cheng Guo, Weixiao Meng, Cheng Li
:
A flexible resource scheduling scheme for an adaptive SCMA system. 384-391

Yujie Li, Zhibin Gao, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:
Resource management for future mobile networks: Architecture and technologies. 392-398

Yang Liu, Changqiao Xu, Yufeng Zhan, Zhixin Liu, Jianfeng Guan
, Hongke Zhang:
Incentive mechanism for computation offloading using edge computing: A Stackelberg game approach. 399-409

Lijun Yang, Chao Ding, Meng Wu, Kun Wang:
Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance. 410-428

Xiong Li
, Maged Hamada Ibrahim, Saru Kumari
, Arun Kumar Sangaiah
, Vidushi Gupta, Kim-Kwang Raymond Choo
:
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. 429-443

Ibrar Yaqoob
, Ejaz Ahmed, Muhammad Habib Ur Rehman
, Abdelmuttlib Ibrahim Abdallaahmed
, Mohammed Ali Al-garadi
, Muhammad Imran, Mohsen Guizani:
The rise of ransomware and emerging security challenges in the Internet of Things. 444-458

Ejaz Ahmed, Ibrar Yaqoob
, Ibrahim Abaker Targio Hashem
, Majid Iqbal Khan, Abdelmuttlib Ibrahim Abdallaahmed
, Muhammad Imran, Athanasios V. Vasilakos
:
The role of big data analytics in Internet of Things. 459-471

Chi-Yuan Chen, Hsin-Min Wu, Lei Wang, Chia-Mu Yu:
Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems. 472-480

Tie Qiu, Xize Liu, Min Han, Mingchu Li, Yushuang Zhang:
SRTS : A Self-Recoverable Time Synchronization for sensor networks of healthcare IoT. 481-492

Zhenyu Zhou, Junhao Feng, Yunjian Jia, Shahid Mumtaz
, Kazi Mohammed Saidul Huq
, Jonathan Rodriguez, Di Zhang:
Energy-efficient game-theoretical random access for M2M communications in overlapped cellular networks. 493-501

Long Zhao, Kan Zheng
, Periklis Chatzimisios
:
Hybrid information and energy transfer in ultra-dense HetNets. 502-509

Jacopo De Benedetto, Paolo Bellavista
, Luca Foschini
:
Proximity discovery and data dissemination for mobile crowd sensing using LTE direct. 510-521

Bang Wang, Qiang Yang, Laurence T. Yang, Chunsheng Zhu:
On minimizing energy consumption cost in green heterogeneous wireless networks. 522-535

Chun-Cheng Lin, Ching-Tsorng Tsai, Der-Jiunn Deng, I-Hsin Tsai, Shun-Yu Jhong:
Minimizing electromagnetic pollution and power consumption in green heterogeneous small cell network deployment. 536-547

Ahmed Harbouche, Noureddine Djedi, Mohammed Erradi, Jalel Ben-Othman
, Abdellatif Kobbane
:
Model driven flexible design of a wireless body sensor network for health monitoring. 548-571

Satya Jyoti Borah, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar
:
A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario. 572-584

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






