筛选条件 共查询到472条结果
排序方式
Game based robust power allocation strategy with QoS guarantee in D2D communication network

期刊: COMPUTER NETWORKS, 2021; 193 ()

Device to device (D2D) communication, as a proximity communication technique that leverages the spatial- temporal locality of mobile data usage to ach......

Edge intelligence computing for mobile augmented reality with deep reinforcement learning approach

期刊: COMPUTER NETWORKS, 2021; 195 ()

Convergence of Augmented Reality (AR) and Next Generation Internet-of-Things (NG-IoT) can create new opportunities in many emerging areas, where the r......

TSCRNN: A novel classification scheme of encrypted traffic based on flow spatiotemporal features for efficient management of IIoT

期刊: COMPUTER NETWORKS, 2021; 190 ()

In the Industrial Internet of Things (IIoT) in the 5G era, the growth of smart devices will generate a large amount of data traffic, bringing a huge c......

D-AdFeed: A diversity-aware utility-maximizing advertising framework for mobile users

期刊: COMPUTER NETWORKS, 2021; 190 ()

With the advance of the ubiquity of GPS-equipped smartphones, mobile advertising has become more prevalent and location-aware. In mobile advertising s......

Multipath resilient routing for endogenous secure software defined networks

期刊: COMPUTER NETWORKS, 2021; 194 ()

SDN improves the flexibility and programmability of the network. However, malicious attacks caused by potential vulnerabilities and backdoors can easi......

Robust energy efficient maximization in wireless powered CRNs based on power splitting

期刊: COMPUTER NETWORKS, 2021; 195 ()

In this paper, we study the optimal design for simultaneous wireless information and power transfer (SWIPT) in cognitive radio networks (CRNs), where ......

Beyond 5G for digital twins of UAVs

期刊: COMPUTER NETWORKS, 2021; 197 ()

The purpose is to explore the application effects and limitations of Unmanned Aerial Vehicle (UAV) in 5G/B5G (Beyond 5G) mobile and wireless communica......

Secure beamforming with nonorthogonal multiple access transmission in cooperative CR networks for Internet of Things

期刊: COMPUTER NETWORKS, 2021; 197 ()

In this paper, secure beamforming design in cooperative cognitive radio networks for Internet of Things (IoT) is investigated, where we maximize the s......

In-band Network Telemetry: A Survey

期刊: COMPUTER NETWORKS, 2021; 186 ()

With the development of software-defined network and programmable data-plane technology, in-band network telemetry has emerged. In-band network teleme......

Exploiting layer and spatial correlations to enhance SVC and tile based 360-degree video streaming

期刊: COMPUTER NETWORKS, 2021; 191 ()

Streaming 360-degree videos over today's Internet is challenging due to its high bandwidth and low Motion to-Photon latency requirements. Viewport ada......

Sphinx: A transport protocol for high-speed and lossy mobile networks

期刊: COMPUTER NETWORKS, 2021; 195 ()

Modern mobile wireless networks have been demonstrated to be high-speed but lossy, while mobile applications have more strict requirements including r......

Multi-agent reinforcement learning for cost-aware collaborative task execution in energy-harvesting D2D networks

期刊: COMPUTER NETWORKS, 2021; 195 ()

In device-to-device (D2D) networks, multiple resource-limited mobile devices cooperate with one another to execute computation tasks. As the battery c......

A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing

期刊: COMPUTER NETWORKS, 2021; 195 ()

Fog computing is a revolutionary technology for the next generation to bridge the gap between cloud data centers and end-users. Fog computing is not a......

A provably secure and public auditing protocol based on the bell triangle for cloud data

期刊: COMPUTER NETWORKS, 2021; 195 ()

With the rapid development of cloud computing, cloud storage has been accepted as a convenient service by an increasing number of organizations and in......

Group authentication for cloud-to-things computing: Review and improvement

期刊: COMPUTER NETWORKS, 2021; 198 ()

Group authentication enables a set of users to mutually authenticate each other without the help of a coordinating manager, which has proven effective......

共472条页码: 1/32页15条/页