Search
Now showing items 31-40 of 205
Exploiting 4G mobile user cooperation for energy conservation: Challenges and opportunities
(2013 , Article)
Recent years have witnessed tremendous success and popularity of mobile applications and services, resulting in an explosive growth in the number of mobile devices, as well as in the range and types of things these devices ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
Compress or Interfere?
(
IEEE Computer Society
, 2019 , Conference Paper)
Rapid evolution of wireless medical devices and network technologies has fostered the growth of remote monitoring systems. Such new technologies enable monitoring patients' medical records anytime and anywhere without ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Solving security problems in MEC systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
We propose an algorithm for constructing efficient security strategies in the mobile edge computing (MEC), where the protected targets are nodes connected to the MEC and the mobile users (MUs) are agents capable of preventing ...
Relay selection schemes to minimise outage in wireless powered communication networks
(
Institution of Engineering and Technology
, 2016 , Article)
In this study, the authors discuss relay selection schemes with the objective to minimise outage probability for a network consisting of a single source, multiple relays and a single destination. The relays are powered by ...
A bio-inspired framework to mitigate dos attacks in software defined networking
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
A distributed gateway selection algorithm for UAV networks
(
IEEE Computer Society
, 2015 , Article)
In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although ...
Spammer Detection and Fake User Identification on Social Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily ...