


default search action
CCF Transactions on Networking, Volume 2
Volume 2, Number 1, June 2019
- Dan Wang, Fangming Liu, Wei Bao, Lin Wang, Jiangchuan Liu, Yuanyuan Yang, Weisong Shi:

Editorial of CCF transactions on networking: special issue on edge computing and networking. 1-3 - Xiaoyi Fan, Yutao Huang, Xiaoqiang Ma, Jiangchuan Liu, Victor C. M. Leung:

Exploiting the edge power: an edge deep learning framework. 4-11 - Hongzi Zhu

, Fan Wu, Siyuan Cao, Shan Chang, Li Lu:
Edge-empowered accurate urban vehicle localization with cellular-aware trajectories. 12-27 - Tong Liu, Yanmin Zhu, Yuanyuan Yang, Fan Ye, Jiadi Yu:

Online task dispatching and pricing for quality-of-service-aware sensing data collection for mobile edge clouds. 28-42 - Tong Li

, Kezhi Wang, Ke Xu, Kun Yang, Chathura M. Sarathchandra Magurawalage
, Haiyang Wang:
Communication and computation cooperation in cloud radio access network with mobile edge computing. 43-56 - Tingting Liu

, Jun Li, Feng Shu, Yu Du, Zhu Han:
Distributed resource allocation in caching-enabled heterogeneous cellular networks based on matching theory. 57-68 - Hongji Zhang, Wenzhong Li

, Sanglu Lu:
Asynchronous side information attack from the edge: an approach to identify participants from anonymous mobility traces. 69-82
Volume 2, Number 2, August 2019
- Shuai Zhang, Sheng Zhang

, Zhuzhong Qian, Xiaoda Zhang, Mingjun Xiao, Jie Wu, Jidong Ge, Xiaoliang Wang:
Efficient scheduling for multi-stage coflows. 83-97 - Naor Zohar:

Cost-adaptive load sharing for geographically distributed data center network. 98-110 - Degan Zhang, Xiao-huan Liu, Yu-ya Cui, Lu Chen, Ting Zhang:

A kind of novel RSAR protocol for mobile vehicular Ad hoc network. 111-125 - Xuyang Meng, Yabin Xu:

Research on sensitive content detection in social networks. 126-135 - (Withdrawn) RETRACTED ARTICLE: An offline space division multiplexing based elastic optical network model with modulation format adaptation and flexible spectrum and spatial assignment. 136

Volume 2, Numbers 3-4, December 2019
- Jinshu Su, Wen Wang

, Cong Liu:
A survey of control consistency in Software-Defined Networking. 137-152 - Xiaodong Zang

, Jian Gong, Siyi Huang, Xiaoyan Hu, Yun Yang:
IP backbone traffic behavior characteristic spectrum composing and role mining. 153-171 - Jian Wang, Xuewei Zhang, Xiaoliang Wang

, Sheng Zhang, Zhuzhong Qian, Sanglu Lu:
Joint virtual middlebox and application placement with bandwidth guarantees in multi-tenant datacenter. 172-187 - Qi Tan

, Yi Qu, Ke Xu, Haiyang Wang, Dan Wang, Meng Shen:
Interference-aware lifetime maximization with joint routing and charging in wireless sensor networks. 188-206 - Guang Cheng

, Chunsheng Guo, Yongning Tang:
dptCry: an approach to decrypting ransomware WannaCry based on API hooking. 207-216

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














