default search action
Computer Networks, Volume 133
Volume 133, March 2018
- Abhishek Gupta, M. Farhan Habib, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore, Biswanath Mukherjee:
On service-chaining strategies using Virtual Network Functions in operator networks. 1-16 - Javier Carmona-Murillo, Vasilis Friderikos, José Luis González Sánchez:
A hybrid DMM solution and trade-off analysis for future wireless networks. 17-32 - Wei Li, Changxin Huang, Chao Xiao, Songchen Han:
A heading adjustment method in wireless directional sensor networks. 33-41 - Abbas Arghavani, Mahdi Arghavani, Mahmood Ahmadi, Paul Crane:
Attacker-Manager Game Tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager. 42-58 - Yiran Shen, Chengwen Luo, Dan Yin, Hongkai Wen, Daniela Rus, Wen Hu:
Privacy-preserving sparse representation classification in cloud-enabled mobile applications. 59-72 - Piotr Borylo, Jerzy Domzal, Robert Wójcik:
Survivable automatic hidden bypasses in Software-Defined Networks. 73-89 - Ibrahim Ayad, Youngbin Im, Eric Keller, Sangtae Ha:
A Practical Evaluation of Rate Adaptation Algorithms in HTTP-based Adaptive Streaming. 90-103 - Jun Xu, Chengcheng Guo, Hao Zhang:
Joint channel allocation and power control based on PSO for cellular networks with D2D communications. 104-119 - Chaonong Xu, Kaichi Ma, Yongjun Xu:
Complexity of minimum uplink scheduling in backbone-assisted successive interference cancellation-based wireless networks. 120-129 - Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Yonghong Chen, Yiqiao Cai, Hui Tian, Mande Xie:
Energy-efficient relay tracking with multiple mobile camera sensors. 130-140 - Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia:
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. 141-156 - Hui Cui, Robert H. Deng, Junzuo Lai, Xun Yi, Surya Nepal:
An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. 157-165 - Huan Chen, Xiong Wang, Yangming Zhao, Tongyu Song, Yang Wang, Shizhong Xu, Lemin Li:
MOSC: a method to assign the outsourcing of service function chain across multiple clouds. 166-182 - Jessie Hui Wang, Changqing An:
A study on geographic properties of internet routing. 183-194 - Shadi Moazzeni, Mohammad Reza Khayyambashi, Naser Movahhedinia, Franco Callegati:
On reliability improvement of Software-Defined Networks. 195-211
- Bo Yi, Xingwei Wang, Keqin Li, Sajal K. Das, Min Huang:
A comprehensive survey of Network Function Virtualization. 212-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.