


default search action
Ad Hoc Networks, Volume 98
Volume 98, March 2020
- Mauro Conti
, Pallavi Kaliyar, Md Masoom Rabbani
, Silvio Ranise:
Attestation-enabled secure and scalable routing protocol for IoT networks. - Ming Zeng
, Viktoria Fodor
:
Energy minimization for delay constrained mobile edge computing with orthogonal and non-orthogonal multiple access. - Surender Redhu, Rajesh M. Hegde:
Optimal relay node selection in time-varying IoT networks using apriori contact pattern information. - Baha Eddine Youcef Belmekki
, Abdelkrim Hamza
, Benoît Escrig
:
Performance analysis of cooperative NOMA at intersections for vehicular communications in the presence of interference. - Chuanwen Luo, Yi Hong, Deying Li, Yongcai Wang
, Wenping Chen, Qian Hu:
Maximizing network lifetime using coverage sets scheduling in wireless sensor networks. - Xin Tan, Zhi Sun, Pu Wang
, Yanjing Sun:
Environment-aware localization for wireless sensor networks using magnetic induction. - Wenfeng Li, Wuli Song, Qiang Lu, Chao Yue:
Reliable congestion control mechanism for safety applications in urban VANETs. - Xuening Liao, Yuanyu Zhang, Zhenqiang Wu, Xiaohong Jiang:
Buffer-aided relay selection for secure two-hop wireless networks with decode-and-forward relays and a diversity-combining eavesdropper. - Moubachir Madani Fadoul
:
Rate and coverage analysis in multi-tier heterogeneous network using stochastic geometry approach. - Ricardo S. Alonso, Inés Sittón-Candanedo, Óscar García, Javier Prieto
, Sara Rodríguez-González:
An intelligent Edge-IoT platform for monitoring livestock and crops in a dairy farming scenario. - Belal Ali Al-Maytami
, Pingzhi Fan, Abir Jaafar Hussain, Thar Baker
, Panos Liatsis:
An efficient queries processing model based on Multi Broadcast Searchable Keywords Encryption (MBSKE). - Haythem Bany Salameh
, Safa Otoum
, Moayad Aloqaily
, Rawan Derbas, Ismaeel Al Ridhawi, Yaser Jararweh:
Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks. - Hassan N. Noura, Ola Salman, Ali Chehab
, Raphaël Couturier:
DistLog: A distributed logging scheme for IoT forensics. - Zhenyu Na, Jun Wang, Chungang Liu, Mingxiang Guan, Zihe Gao:
Join trajectory optimization and communication design for UAV-enabled OFDM networks. - Steven Y. M. Chen:
Multiagent approach for consensus control in the energy internet network. - Xin Liu, Hua Ding, Xueyan Zhang, Panpan Li, Celimuge Wu:
Rate satisfaction-based power allocation for NOMA-based cognitive Internet of Things. - Bo Zhang, Wei Liu
, Yang Li, Xiaonan Zhao, Cheng Wang
:
Directional modulation design under maximum and minimum magnitude constraints for weight coefficients. - Wei Wang, Li Zhang, Mengjun Zhang, Zhixiong Wang:
Few shot learning for multi-class classification based on nested ensemble DSVM. - Shamim Yousefi
, Farnaz Derakhshan, Hadis Karimipour, Hadi S. Aghdasi:
An efficient route planning model for mobile agents on the internet of things using Markov decision process. - Zhenyu Na, Mengshu Zhang, Jun Wang, Zihe Gao:
UAV-assisted wireless powered Internet of Things: Joint trajectory optimization and resource allocation. - Hicham Lakhlef, Julien Bourgeois, Saad Harous
, Tarek A. El-Ghazawi:
Communication and security in communicating things networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.