Search
Now showing items 101-110 of 111
Location privacy preservation for mobile users in location-based services
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Because location-based cyber services are increasingly found in mobile applications (e.g., social networking and maps), user location privacy preservation is essential and remains one of the several ongoing research ...
Resource allocation in information-centric wireless networking with D2D-enabled MEC: A deep reinforcement learning approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Recently, information-centric wireless networks (ICWNs) have become a promising Internet architecture of the next generation, which allows network nodes to have computing and caching capabilities and adapt to the growing ...
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Influence blocking maximization (IBM) is a key problem for viral marketing in competitive social networks. Although the IBM problem has been extensively studied, existing works neglect the fact that the location information ...
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ...
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Article)
With the development of Internet applications, anonymous communication technology plays a very significant role in protecting personal privacy. As one of the most popular anonymous communication systems, I2P provides strong ...
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ...
A distributed gateway selection algorithm for UAV networks
(
IEEE Computer Society
, 2015 , Article)
In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although ...
Trust management techniques for the internet of things: A survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be ...
PUC: Packet Update Caching for energy efficient IoT-based Information-Centric Networking
(
Elsevier B.V.
, 2019 , Article)
The future Internet, known as Information-Centric Networking (ICN), is a realistic solution to content delivery between the content request generators (subscribers) and the server (publisher) in the Internet of Things (IoT) ...
A framework for topological based map building: A solution to autonomous robot navigation in smart cities
(
Elsevier B.V.
, 2019 , Article)
Advancement in the Information and Communications Technology (ICT) has transformed urban environments into modern smart cities by connecting physical devices or sensors to communicate via the Internet of things (IoT) ...