بحث بسيط
السجلات المعروضة 21 -- 30 من 167
Protecting Your Shopping Preference with Differential Privacy
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Online banks may disclose consumers' shopping preferences due to various attacks. With differential privacy, each consumer can disturb his consumption amount locally before sending it to online banks. However, directly ...
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
Scratch-Rec: a novel Scratch recommendation approach adapting user preference and programming skill for enhancing learning to program
(
Springer
, 2022 , Article)
Among teenagers, online programming learning platforms, such as Scratch, have obtained promising achievements for guiding beginners. However, with the ever-growing number of users, there is an urgent issue that learners ...
Time-Dependent Pricing for Bandwidth Slicing under Information Asymmetry and Price Discrimination
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Due to the bursty nature of Internet traffic, network service providers (NSPs) are forced to expand their network capacity in order to meet the ever-increasing peak-time traffic demand, which is however costly and inefficient. ...
An optimal uplink traffic offloading algorithm via opportunistic communications based on machine learning
(
Springer
, 2020 , Article)
Opportunistic communications as an efficient traffic offloading method can be used to offload uplink traffic of cellular networks to Wi-Fi networks. However, because of its contact pattern (contact frequency and contact ...
An SDN Architecture for AUV-Based Underwater Wireless Networks to Enable Cooperative Underwater Search
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the emergence of new underwater ICTs, UWNs based on AUV have become the mainstream technology for underwater search tasks. These advanced underwater searching technologies are leading to smart perceptual ocean ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
DAGIoV: A Framework for Vehicle to Vehicle Communication Using Directed Acyclic Graph and Game Theory
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Data sharing and content offloading among vehicles is an imperative part of the Internet of Vehicles (IoV). A peer-to-peer connection among vehicles in a distributed manner is a highly promising solution for fast communication ...
A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks
(
Academic Press
, 2021 , Article)
To address time unfairness access problems in the dynamic channel, an underwater adaptive contention window (CW) adjustment backoff algorithm (QL-UACW) based on Q-learning is presented in this paper. That algorithm employs ...