Search
Now showing items 41-50 of 68
Machine learning aided load balance routing scheme considering queue utilization
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Due to the rapid development of network techniques, packet-switched systems experience high-speed growth of traffic, which imposes a heavy and unbalanced burden on the routers. Hence, efficient routing schemes are required ...
A Communication Framework with Unified Efficiency and Secrecy
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Future wireless networks are confronted with the pressure to meet the requirements of network efficiency and communication secrecy, which require a new communication framework to unify and jointly optimize efficiency and ...
An incentive mechanism design for socially aware crowdsensing services with incomplete information
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Traditional crowdsensing platforms rely on sensory information collected from a group of independent users or sensors. Recently, socially aware crowdsensing services have been introduced as the integration of social networks ...
ECC-based Secure and Lightweight Authentication Protocol for Mobile Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Due to recent advances in wireless communication, the availability of mobile services has increased significantly. However, due to the open nature of wireless channels, vulnerabilities exploiting these services have increased ...
A promising non-orthogonal multiple access based networking architecture: Motivation, conception, and evolution
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Since it can offer higher spectral efficiency by granting the served data to share the same spectrum resource synchronously, NOMA is considered as a bright multiple access technique for future wireless networks. Accommodating ...
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
(
Inderscience Publishers
, 2019 , Article)
To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
Bringing Deep Learning at the Edge of Information-Centric Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Various Internet solutions take their power processing and analysis from cloud computing services. Internet of Things (IoT) applications started discovering the benefits of computing, processing, and analysis on the device ...
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ...
Online parallelized service function chain orchestration in data center networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, much attention has been focused on deploying service function chains (SFCs), each of which is composed of a set of virtual network functions (VNFs) in a specified order. This is a promising approach for ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...