期刊: COMPUTER NETWORKS, 2021; 193 ()
Device to device (D2D) communication, as a proximity communication technique that leverages the spatial- temporal locality of mobile data usage to ach......
期刊: COMPUTER NETWORKS, 2021; 195 ()
Convergence of Augmented Reality (AR) and Next Generation Internet-of-Things (NG-IoT) can create new opportunities in many emerging areas, where the r......
期刊: COMPUTER NETWORKS, 2021; 190 ()
In the Industrial Internet of Things (IIoT) in the 5G era, the growth of smart devices will generate a large amount of data traffic, bringing a huge c......
期刊: COMPUTER NETWORKS, 2021; 190 ()
With the advance of the ubiquity of GPS-equipped smartphones, mobile advertising has become more prevalent and location-aware. In mobile advertising s......
期刊: COMPUTER NETWORKS, 2021; 194 ()
SDN improves the flexibility and programmability of the network. However, malicious attacks caused by potential vulnerabilities and backdoors can easi......
期刊: COMPUTER NETWORKS, 2021; 195 ()
In this paper, we study the optimal design for simultaneous wireless information and power transfer (SWIPT) in cognitive radio networks (CRNs), where ......
期刊: COMPUTER NETWORKS, 2021; 197 ()
The purpose is to explore the application effects and limitations of Unmanned Aerial Vehicle (UAV) in 5G/B5G (Beyond 5G) mobile and wireless communica......
期刊: COMPUTER NETWORKS, 2021; 197 ()
In this paper, secure beamforming design in cooperative cognitive radio networks for Internet of Things (IoT) is investigated, where we maximize the s......
期刊: COMPUTER NETWORKS, 2021; 186 ()
With the development of software-defined network and programmable data-plane technology, in-band network telemetry has emerged. In-band network teleme......
期刊: COMPUTER NETWORKS, 2021; 191 ()
Streaming 360-degree videos over today's Internet is challenging due to its high bandwidth and low Motion to-Photon latency requirements. Viewport ada......
期刊: COMPUTER NETWORKS, 2021; 195 ()
Modern mobile wireless networks have been demonstrated to be high-speed but lossy, while mobile applications have more strict requirements including r......
期刊: COMPUTER NETWORKS, 2021; 195 ()
In device-to-device (D2D) networks, multiple resource-limited mobile devices cooperate with one another to execute computation tasks. As the battery c......
期刊: COMPUTER NETWORKS, 2021; 195 ()
Fog computing is a revolutionary technology for the next generation to bridge the gap between cloud data centers and end-users. Fog computing is not a......
期刊: COMPUTER NETWORKS, 2021; 195 ()
With the rapid development of cloud computing, cloud storage has been accepted as a convenient service by an increasing number of organizations and in......
期刊: COMPUTER NETWORKS, 2021; 198 ()
Group authentication enables a set of users to mutually authenticate each other without the help of a coordinating manager, which has proven effective......