


default search action
Computer Networks, Volume 133
Volume 133, March 2018
- Abhishek Gupta  , M. Farhan Habib, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore , M. Farhan Habib, Uttam Mandal, Pulak Chowdhury, Massimo Tornatore , Biswanath Mukherjee: , Biswanath Mukherjee:
 On service-chaining strategies using Virtual Network Functions in operator networks. 1-16
- Javier Carmona-Murillo  , Vasilis Friderikos , Vasilis Friderikos , José Luis González Sánchez: , José Luis González Sánchez:
 A hybrid DMM solution and trade-off analysis for future wireless networks. 17-32
- Wei Li  , Changxin Huang, Chao Xiao, Songchen Han: , Changxin Huang, Chao Xiao, Songchen Han:
 A heading adjustment method in wireless directional sensor networks. 33-41
- Abbas Arghavani, Mahdi Arghavani, Mahmood Ahmadi  , Paul Crane , Paul Crane : :
 Attacker-Manager Game Tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager. 42-58
- Yiran Shen  , Chengwen Luo, Dan Yin, Hongkai Wen , Chengwen Luo, Dan Yin, Hongkai Wen , Daniela Rus, Wen Hu: , Daniela Rus, Wen Hu:
 Privacy-preserving sparse representation classification in cloud-enabled mobile applications. 59-72
- Piotr Borylo  , Jerzy Domzal , Jerzy Domzal , Robert Wójcik , Robert Wójcik : :
 Survivable automatic hidden bypasses in Software-Defined Networks. 73-89
- Ibrahim Ayad, Youngbin Im  , Eric Keller, Sangtae Ha: , Eric Keller, Sangtae Ha:
 A Practical Evaluation of Rate Adaptation Algorithms in HTTP-based Adaptive Streaming. 90-103
- Jun Xu  , Chengcheng Guo, Hao Zhang: , Chengcheng Guo, Hao Zhang:
 Joint channel allocation and power control based on PSO for cellular networks with D2D communications. 104-119
- Chaonong Xu  , Kaichi Ma, Yongjun Xu: , Kaichi Ma, Yongjun Xu:
 Complexity of minimum uplink scheduling in backbone-assisted successive interference cancellation-based wireless networks. 120-129
- Tian Wang  , Jiandian Zeng, Md. Zakirul Alam Bhuiyan , Jiandian Zeng, Md. Zakirul Alam Bhuiyan , Yonghong Chen, Yiqiao Cai, Hui Tian , Yonghong Chen, Yiqiao Cai, Hui Tian , Mande Xie: , Mande Xie:
 Energy-efficient relay tracking with multiple mobile camera sensors. 130-140
- Sana Belguith  , Nesrine Kaaniche , Nesrine Kaaniche , Maryline Laurent , Maryline Laurent , Abderrazak Jemai , Abderrazak Jemai , Rabah Attia: , Rabah Attia:
 PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. 141-156
- Hui Cui  , Robert H. Deng , Robert H. Deng , Junzuo Lai, Xun Yi, Surya Nepal , Junzuo Lai, Xun Yi, Surya Nepal : :
 An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited. 157-165
- Huan Chen, Xiong Wang  , Yangming Zhao, Tongyu Song, Yang Wang, Shizhong Xu, Lemin Li: , Yangming Zhao, Tongyu Song, Yang Wang, Shizhong Xu, Lemin Li:
 MOSC: a method to assign the outsourcing of service function chain across multiple clouds. 166-182
- Jessie Hui Wang, Changqing An  : :
 A study on geographic properties of internet routing. 183-194
- Shadi Moazzeni, Mohammad Reza Khayyambashi, Naser Movahhedinia, Franco Callegati  : :
 On reliability improvement of Software-Defined Networks. 195-211
- Bo Yi  , Xingwei Wang, Keqin Li, Sajal K. Das , Xingwei Wang, Keqin Li, Sajal K. Das , Min Huang: , Min Huang:
 A comprehensive survey of Network Function Virtualization. 212-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














