当前期刊: Computer Networks Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • SAIDE: Efficient Application Interference Detection and Elimination in SDN
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-18
    Tao Hu; Peng Yi; Yuxiang Hu; Julong Lan; Zhen Zhang; Ziyong Li

    The ease of programmability in Software-Defined Networking has greatly facilitated SDN application development and deployment. Applications run simultaneously in the controller and generate policies to serve the network together. However, multiple applications may cause unintentionally harmful interferences even if each SDN application is properly programmed. Unfortunately, the existing SDN verification

    更新日期:2020-10-19
  • Satisfaction-based Dynamic Bandwidth Reallocation for multipath mobile data offloading
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-17
    Nuntanut Bhooanusas; Sok-Ian Sou; Kai-Chun Cheng

    Mobile data offloading is a key solution to mitigate heavy traffic load through cellular networks to the WiFi networks. To motivate the mobile users to transmit data over the cellular/WiFi networks under the control of the operator smartly, many incentive pricing frameworks have been proposed with the execution of dynamic bandwidth reallocation schemes to improve network efficiency. In this paper,

    更新日期:2020-10-19
  • Handover scheme for 5G small cell networks with non-orthogonal multiple access
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-13
    Ali Çalhan; Murtaza Cicioğlu

    The enormous developments in new generation networks reveal the high bandwidth requirements of mobile users. Therefore, wireless communications technologies move higher frequencies with a small coverage area. The small cell concept exposes these advancements for 5G network framework. The small cell issue is a part of 5G networks with non-orthogonal multiple access, millimeter-wave communications, massive

    更新日期:2020-10-17
  • A regression framework for predicting user’s next location using Call Detail Records
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-15
    Mohammad Saleh Mahdizadeh; Behnam Bahrak

    With the growth of using cell phones and the increase in the diversity of smart mobile devices, a massive volume of data is generated continuously in the process of using these devices. Among these data, Call Detail Records, CDR, is highly remarkable. Since CDR contains both temporal and spatial labels, mobility analysis of CDR is one of the favorite subjects of study among the researchers. The user

    更新日期:2020-10-17
  • Joint Access and Backhaul Resource Allocation for D2D-Assisted Dense mmWave Cellular Networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-17
    Xiangwen Dai; Jinsong Gui

    Device-to-Device (D2D) communication technology is a promising solution to solve the problem that millimeter-wave (mmWave) signal propagation is vulnerable to blockage and thus rapidly weakened. However, after introducing in-band D2D communication to dense mmWave cellular networks, we must consider how to reasonably share resources and effectively control interference between more types of communication

    更新日期:2020-10-17
  • Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-17
    Faiz Zaki; Abdullah Gani; Hamid Tahaei; Steven Furnell; Nor Badrul Anuar

    Modern network traffic classification puts much attention toward producing a granular classification of the traffic, such as at the application service level. However, the classification process is often impaired by the lack of granular network traffic ground truth. Granular network traffic ground truth is critical to provide a benchmark for a fair evaluation of modern network traffic classification

    更新日期:2020-10-17
  • A new provable hierarchical anonymous certificateless authentication protocol with aggregate verification in ADS-B systems
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-16
    Amirhossein Asari; Mahdi R. Alagheband; Majid Bayat; Maryam Rajabzadeh Asaar

    Automatic Dependent Surveillance-Broadcast (ADS-B) technology is a new solution for communication among aircraft and ground controller stations. In this new surveillance technology, critical messages (e.g., location of aircraft) are achieved by navigation satellites, and then an on-board equipment multicasts the unencrypted messages twice per second to the others. The previous ADS-B protocols suffer

    更新日期:2020-10-17
  • A personalized event participant arrangement framework based on user interests in social network
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-16
    Heli Sun; Shan Zhang; Jianbin Huang; Liang He; Xiaolong Jiang; Zhangtian Duan

    In recent years, online event-based social networks (EBSNs), such as Meetup and Whova, which offer platforms for users to plan, publish and arrange events, have gained popularity and rapid development. A fundamental task of managing EBSNs is to recommend a personalized and suitable sequence of events for potential users. However, none of the existing approaches consider both personalized recommendation

    更新日期:2020-10-17
  • TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-12
    Zhaofeng Ma; Weizhe Zhao; Shoushan Luo; Lingyun Wang

    With the development of computing technology, the security and credibility of data is becoming more and more important. However, the security and trust of traditional centralized system is insufficient and data tampering is easy to occur, which leads to data distrustful. The characteristics of blockchain, such as traceable and tamper-proof, can solve the issue of data trust. However, the access threshold

    更新日期:2020-10-16
  • Outage-aware matching game approach for cell selection in LTE/WLAN multi-rat HetNets
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-10
    Ahmed I. Abdulshakoor; M.G. Anany; Mahmoud M. Elmesalawy

    Heterogeneous networks (HetNets) which are consisting of multiple radio access technologies (Multi-RATs), offer a promising architecture for enhancing the mobile network capacity and improving the users’ quality of experience (QoE). However, the main challenge in such network architecture is the development of an efficient cell selection solution. In this paper, a distributed algorithm for the cell

    更新日期:2020-10-15
  • A spam worker detection approach based on heterogeneous network embedding in crowdsourcing platforms
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-08
    Li Kuang; Huan Zhang; Ruyi Shi; Zhifang Liao; Xiaoxian Yang

    Due to the popularity of crowdsourcing, more crowds are participating in crowdsourcing tasks. However, the proportion of spam workers is continuously increasing due to the openness of crowdsourcing platforms and their incentive mechanisms. To defend against threats from spam workers, researchers have proposed reputation-based and verification-based detection methods, but they either cannot address

    更新日期:2020-10-15
  • Social-aware spectrum sharing for D2D communication by artificial bee colony optimization
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-06
    Yarisley Peña Llerena; Paulo R.L. Gondim

    Next-generation cellular networks must handle an increasing demand for data transmission resources, which requires the study of new technologies, such as Device-to-Device (D2D) communications. D2D expands the use of resources from a location perspective, and takes advantage of the geographical proximity of users to perform data transmission at high rates and low propagation delays. On the other hand

    更新日期:2020-10-15
  • ILP Formulations for Monitoring-Cycle Design based on Segment Routing
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-14
    Xiaoqian Li; Kwan L. Yeung

    The minimum cycle cover problem in segment routing is to find a set of monitoring cycles such that (a) they originate from the same vantage point, (b) cover every directed link in the network, (c) each cycle can be encoded by a segment list smaller than a given maximum size, and (d) the total length of all cycles is minimized. To solve the problem using Integer Linear Programming (ILP), the key challenge

    更新日期:2020-10-15
  • A stakeholder-oriented security analysis in virtualized 5G cellular networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-13
    Chiara Suraci; Giuseppe Araniti; Andrea Abrardo; Giuseppe Bianchi; Antonio Iera

    Besides significantly outperforming past generations in terms of capacity and throughput, 5G networks and systems will provide an infrastructure for the support of highly diversified services and “verticals”. Indeed, the major paradigm shift with respect to previous cellular network generations, specifically oriented to one class of terminals (namely, people’s cell phones), is the largely heterogeneous

    更新日期:2020-10-13
  • Size-based scheduling for TCP flows: Implementation and performance evaluation
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-30
    Andrea Marin; Sabina Rossi; Carlo Zen

    In many theoretical works, the benefits of size-based scheduling disciplines have been proved. The Foreground–Background discipline (or Least Attained Service (LAS)) and the multi-level processor sharing discipline are two examples of scheduling algorithms that provide an improvement of the expected flow completion time for heavily-tailed TCP flows with respect to the widely adopted Processor Sharing

    更新日期:2020-10-13
  • PriDPM: Privacy-preserving dynamic pricing mechanism for robust crowdsensing
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-30
    Yuxian Liu; Fagui Liu; Hao-Tian Wu; Xinglin Zhang; Bowen Zhao; Xingfu Yan

    Providing appropriate monetary incentives for participants is vital for crowdsensing to encourage their participation. Among all outstanding incentive mechanisms, posted pricing has been widely adopted because it is easy to implement and naturally achieves truthfulness and fairness. However, existing schemes either lack of privacy protection for the sensing data of participants, or fail to consider

    更新日期:2020-10-11
  • Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-07
    Shunliang Zhang; Dali Zhu

    6G is expected to support the unprecedented Internet of everything scenarios with extremely diverse and challenging requirements. To fulfill such diverse requirements efficiently, 6G is envisioned to be space-aerial-terrestrial-ocean integrated three-dimension networks with different types of slices enabled by new technologies and paradigms to make the system more intelligent and flexible. As 6G networks

    更新日期:2020-10-11
  • Architectures, standardisation, and procedures for 5G Satellite Communications: A survey
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-07
    A. Guidotti; S. Cioni; G. Colavolpe; M. Conti; T. Foggi; A. Mengali; G. Montorsi; A. Piemontese; A. Vanelli-Coralli

    The 5G ecosystem is radically shifting Information and Communication Technologies (ICT) towards a system directly tailored and optimised to support vertical markets and services. In order to design and implement the ambitious 5G network, Satellite Communications (SatCom) have been recognised as a promising solution to extend and complement terrestrial networks in unserved or under-served areas, as

    更新日期:2020-10-11
  • Performance comparison of high-capacity software routers
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-10
    Hasan Redžović; Aleksandra Smiljanić; Mihailo Vesović

    Software routers are flexible low-cost platforms for implementation of network functionalities on general-purpose CPUs and NICs. General-purpose hardware is constantly improving, and, currently, it deploys high frequency CPUs and NICs that can support multiple 10/40/100 Gbps network interfaces. General-purpose hardware allows implementation of flexible network functions that can be modified on demand

    更新日期:2020-10-11
  • A survey on stateful data plane in software defined networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-10
    Xiaoquan Zhang; Lin Cui; Kaimin Wei; Fung Po Tso; Yangyang Ji; Weijia Jia

    Software Defined Networking (SDN), which decouples control plane and data plane, normally stores states on controllers to provide flexible programmability and convenient management. However, recent studies have shown that such configuration may cause frequent and unnecessary interactions between data plane and controllers in some cases. For example, a DDoS detection installed on a controller needs

    更新日期:2020-10-11
  • Layer Based Security in Narrow Band Internet of Things (NB-IoT)
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-09
    Rakesh Kumar Jha; Puja; Research Scholar Haneet Kour; Manoj Kumar; Masters student Shubha Jain

    In the recent years, the growth of technology and the resulting transformation is happening at a rapid pace. In this junction, IoT has provided a great platform and bridge between these technologies. A lot of research regarding the application of IoT Systems has been done in the recent years but one area that lacks research is security issues in Narrowband Internet of Things (NB-IoT).It is noticed

    更新日期:2020-10-11
  • HTTP-level e-commerce data based on server access logs for an online store
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-07
    Grzegorz Chodak; Grażyna Suchacka; Yash Chawla

    Web server logs have been extensively used as a source of data on the characteristics of Web traffic and users’ navigational patterns. In particular, Web bot detection and online purchase prediction using methods from artificial intelligence (AI) are currently key areas of research. However, in reality, it is hard to obtain logs from actual online stores and there is no common dataset that can be used

    更新日期:2020-10-07
  • SHAPARAK: Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-Agreement
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-07
    R. Hajian; S. ZakeriKia; S.H. Erfani; M. Mirabi

    Security in wearable sensor networks and telecare medical information systems (TMIS) has turned to an issue of scholarly interest in recent years. Adequate security to agree on a temporary session key is essential for establishing a secure connection on various layers of the protocol stack in the Internet of Things (IoT) environments. Recently, Gupta et al. proposed a lightweight authentication and

    更新日期:2020-10-07
  • Offspeeding: Optimal energy-efficient flight speed scheduling for UAV-assisted edge computing
    Comput. Netw. (IF 3.111) Pub Date : 2020-10-05
    Weidu Ye; Junzhou Luo; Feng Shan; Wenjia Wu; Ming Yang

    Millions of Internet of Thing (IoT) devices have been widely deployed to support applications such as smart city, industrial Internet, smart transportation. These IoT devices periodically upload their collected data and reconfigure themselves to adapt the dynamic environment. Both operations are resource consuming for low-end IoT devices. An edge computing enabled unmanned aerial vehicle (UAV) is proposed

    更新日期:2020-10-05
  • TAMBUS: A novel authentication method through covert channels for securing industrial networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-30
    Giuseppe Bernieri; Stefano Cecconello; Mauro Conti; Gianluca Lain

    Nowadays, many companies still use old and insecure protocols in Industrial Control Systems (ICSs). An example of such protocols is Modbus, one of the most employed industrial protocols. Also, companies are moving to Modbus/TCP when there are TCP devices involved in the facility. While remaining insecure, this migration also disrupts the assumption of air-gapped industrial networks, opening more attack

    更新日期:2020-10-04
  • Optimal auction for delay and energy constrained task offloading in mobile edge computing
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-18
    Farshad Mashhadi; Sergio A. Salinas Monroy; Arash Bozorgchenani; Daniele Tarchi

    Mobile edge computing has emerged as a promising paradigm to complement the computing and energy resources of mobile devices. In this computing paradigm, mobile devices offload their computing tasks to nearby edge servers, which can potentially reduce their energy consumption and task completion delay. In exchange for processing the computing tasks, edge servers expect to receive a payment that covers

    更新日期:2020-10-04
  • Customized Federated Learning for accelerated edge computing with heterogeneous task targets
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-21
    Hui Jiang; Min Liu; Bo Yang; Qingxiang Liu; Jizhong Li; Xiaobing Guo

    As a dominant edge intelligence technique, Federated Learning (FL) can reduce the data transmission volume, shorten the communication latency and improve the collaboration efficiency among end-devices and edge servers. Existing works on FL-based edge computing only take device- and resource-heterogeneity into consideration under a fixed loss-minimization objective. As heterogeneous end-devices are

    更新日期:2020-10-02
  • AI-enabled mobile multimedia service instance placement scheme in mobile edge computing
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-29
    Palash Roy; Sujan Sarker; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Salman A. AlQahtani; Gianluca Aloi; Giancarlo Fortino

    Leveraging cloud infrastructure to the mobile edge computing helps the mobile users to get real time multimedia services in Fifth Generation (5G) network system. To ensure higher Quality-of-Experience (QoE), faster migration of mobile multimedia service instances is required to cope up with user mobility. By deploying the mobile multimedia service instances proactively in multiple edge nodes (ENs)

    更新日期:2020-09-29
  • Efficient Flow Migration for NFV with Graph-aware Deep Reinforcement Learning
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-26
    Penghao Sun; Julong Lan; Junfei Li; Zehua Guo; Yuxiang Hu; Tao Hu

    Network Function Virtualization (NFV) enables flexible deployment of network services as applications. However, it is a big challenge to guarantee the Quality of Service (QoS) under unpredictable network traffic while minimizing the processing resources. One typical solution is to realize NF scale-out, scale-in and load balancing by elastically migrating the related traffic flows. However, it is difficult

    更新日期:2020-09-26
  • A massive scale I/Q datasets for WiFi radio fingerprinting
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-23
    Amani Alshawabka; Francesco Restuccia; Salvatore D’Oro; Tommaso Melodia

    Recent research has proved the effectiveness of neural networks (NNs) in “fingerprinting” (i.e., identifying) wireless radios, by determining the hardware impairments emitted from the transmitter during the waveform transmission process. The artificial neurons of the NN layers are employed to identify and track the radios’ unique impairments by training a large amount of raw data released from these

    更新日期:2020-09-23
  • Latency-energy optimization for joint WiFi and cellular offloading in mobile edge computing networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-22
    Wenhao Fan; Junting Han; Le Yao; Fan Wu; Yuan’an Liu

    Mobile terminals (MTs) within the coverage of both the WiFi and cellular network can offload computation tasks via the WiFi access point to efficiently release the cellular network congestion and reduce the load on base stations. In this paper, a novel scheme of joint WiFi and cellular offloading is proposed to optimally reduce the latency and energy consumption of MTs in task processing. Based on

    更新日期:2020-09-22
  • Group-based delivery of critical traffic in cellular IoT networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-19
    Olga Vikhrova; Sara Pizzi; Antonella Molinaro; Antonio Iera; Konstantin Samuylov; Giuseppe Araniti

    Fifth generation (5G) networks are expected to connect a huge number of Internet of Things (IoT) devices in many usage scenarios. The challenges of typical massive IoT applications with sporadic and short packet uplink transmissions are well studied, while not enough attention is given to the delivery of content of common interest, such as software/firmware updates and remote control, towards IoT devices

    更新日期:2020-09-20
  • A multi-objective bi-level location problem for heterogeneous sensor networks with hub-spoke topology
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-19
    Mumtaz Karatas

    An heterogeneous sensor network (hSN) consists of different types of sensor nodes with varying coverage capability, range, and sensing quality. hSNs are used by military and other defense organizations for a number of purposes such as monitoring critical facilities, surveilling an area of interest, tracking enemies, or protecting borders. Therefore, the deployment problem of such networks to form an

    更新日期:2020-09-20
  • Reliability provision in software defined power substations communication networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-18
    Alexánder Leal; Mario Durán; Juan Felipe Botero

    In past years, the growing complexity of the electrical system and the rise in the number of Intelligent Electronic Devices (IEDs) have increased the data network management complexity in power substations. A pressing need to improve the reliability of such environments has pushed energy companies to increase the investment in the operation of their communication networks. This paper proposes to use

    更新日期:2020-09-20
  • IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-17
    Masoumeh Safkhani; Samad Rostampour; Ygal Bendavid; Nasour Bagheri

    Nowadays the sharing of trade in counterfeit and pirated goods is constantly growing and fake products are found in a large number of industries–particularly pharmaceuticals, food, and medical equipment– that can pose serious health and safety risks. With the intention of avoiding any loss of client confidence and any disclosure of sensitive information, Internet of Things (IoT) solutions are increasingly

    更新日期:2020-09-18
  • NFMI: Near Field Magnetic Induction based communication
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-16
    Amitangshu Pal; Krishna Kant

    Near Field Magnetic Induction (NFMI) based communication is an emerging technology that promises several advantages over the traditional radio frequency (RF) communication including low energy use, ability to work reliably in a variety of difficult propagation media (e.g., water, non-ferromagnetic metals, underground, tissue media of fresh produce & meats, etc.), and low leakage possibility because

    更新日期:2020-09-17
  • Evaluating architecture-level optimization in packet processing caches
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-12
    Kyosuke Tanaka; Hayato Yamaki; Shinobu Miwa; Hiroki Honda

    The next-generation internet routers need ultra high speed such as 1 Tbps to process increased internet traffic. Efficient table lookup is key to realize high-speed packet processing and Packet Processing Cache (PPC) was proposed for this purpose. However, PPC has not been well optimized in the view of architecture and its ability to improve table lookup has therefore been underestimated so far. In

    更新日期:2020-09-12
  • Online classification of user activities using machine learning on network traffic
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-12
    Víctor Labayen; Eduardo Magaña; Daniel Morató; Mikel Izal

    The daily deployment of new applications, along with the exponential increase in network traffic, entails a growth in the complexity of network analysis and monitoring. Conversely, the increasing availability and decreasing cost of computational capacity have increased the popularity and usability of machine learning algorithms. In this paper, a system for classifying user activities from network traffic

    更新日期:2020-09-12
  • Common non-wildcard portion-based partitioning approach to SDN many-field packet classification
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-10
    Hamed Alimohammadi; Mahmood Ahmadi

    Many-field packet classification is a challenging function of the devices in software-defined networking. In this paper, we propose a new algorithm, which partitions a ruleset in a simple way based on non-wildcard portions of the rules. A portion can be a field or a sub-field. The algorithm uses hash tables as the base data structure. In a partition, all the members have a common non-wildcard portion

    更新日期:2020-09-10
  • Utilization-aware VB migration strategy for inter-BBU load balancing in 5G cloud radio access networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-10
    Byomakesh Mahapatra; Ashok Kumar Turuk; Sanket Kumar Panda; Sarat Kumar Patra

    The battle between traffic demand and resource availability limits the efficiency of the existing cellular network. To overcome these limitations, the 5G needs to be scalable and flexible to allow multiple radio access technology. The next-generation base station architecture also aims to maximize physical resource utilization and minimize its associated cost. In this paper, we proposed a framework

    更新日期:2020-09-10
  • A proactive auto-scaling scheme with latency guarantees for multi-tenant NFV cloud
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-08
    Guangwu Hu; Qing Li; Shuo Ai; Tan Chen; Jingpu Duan; Yu Wu

    Network Functions Virtualization (NFV) is a promising technology to provide packet processing services. However, dynamic capacity provisioning to meet different tenants’ time-varying demands under service-level agreements is still a challenge for NFV service providers. The existing works generally perform the scaling-in/out actions for separate service chains and cannot promise a guarantee for the

    更新日期:2020-09-09
  • Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-28
    Om-Kolsoom Shahryari; Hossein Pedram; Vahid Khajehvand; Mehdi Dehghan TakhtFooladi

    Cooperation between the cloud and the fog in the Internet of Things (IoT) system can enhance the efficiency of limited-power and computationally-constrained IoT devices in terms of delay and energy consumption by offloading delay-sensitive and computation-intensive tasks to nearby fog nodes. The purpose of computation offloading is to minimize the energy consumption of IoT devices, meanwhile assuring

    更新日期:2020-09-08
  • On solving the capacitated routing and spectrum allocation problem for flexgrid optical networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-07
    Carlos M. Araújo; João Marcos P. Silva; Anand Subramanian; Iguatemi E. Fonseca

    The elastic optical networks, a.k.a., flexgrid networks, have flexible spectrum allocation. Such flexibility is possible due to the division of the spectrum into narrow frequency slots and the use of bandwidth-variable transponders. This enables the demand, in terms of band request, to be contiguously allocated starting from any available slot of the spectrum. In this context, the RSA (Routing and

    更新日期:2020-09-08
  • Open, Programmable, and Virtualized 5G Networks: State-of-the-Art and the Road Ahead
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-29
    Leonardo Bonati; Michele Polese; Salvatore D’Oro; Stefano Basagni; Tommaso Melodia

    Fifth generation (5G) cellular networks will serve a wide variety of heterogeneous use cases, including mobile broadband users, ultra-low latency services and massively dense connectivity scenarios. The resulting diverse communication requirements will demand networking with unprecedented flexibility, not currently provided by the monolithic black-box approach of 4G cellular networks. The research

    更新日期:2020-09-07
  • Delay Aware Energy-Efficient Opportunistic Node Selection in Restricted Routing
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-06
    Junaid Anees; Hao-Chun Zhang; Bachirou Guene Lougou; Sobia Baig; Yabibal Getahun Dessie

    Mobile sink can implicitly provide uniform energy consumption across sensor networks and load-balanced data delivery by alleviating the sensor data disruptions and hotspot problems. Advertisement of mobile sink's current position in ring routing introduces control packet overhead in terms of energy consumption and leads to shorter network lifetime. In order to minimize this overhead, we have exploited

    更新日期:2020-09-07
  • Application of Non-Orthogonal Multiple Access for machine type communication in sub-terahertz band
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-27
    Saifur Rahman Sabuj; A.M. Musa Shakib Khan; Masanori Hamamura

    There is a compelling need to address the problem of accommodating the rapidly growing number of machine type devices engaging in communication within the scarce radio spectrum, in current and forthcoming generations of wireless networks. The coming decades will also witness various novel applications, demanding wireless communication at very high data rate and energy efficiency, which currently favored

    更新日期:2020-09-03
  • Realtime mobile bandwidth prediction using LSTM neural network and Bayesian fusion
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-28
    Lifan Mei; Runchen Hu; Houwei Cao; Yong Liu; Zifan Han; Feng Li; Jin Li

    With the increasing popularity of mobile Internet and the higher bandwidth requirement of mobile applications, user Quality of Experience (QoE) is particularly important. For applications requiring high bandwidth and low delay, such as video streaming, video conferencing, and online gaming, etc., if the future bandwidth can be estimated in advance, applications can leverage the estimation to adjust

    更新日期:2020-09-03
  • Finding needles in a hay stream: On persistent item lookup in data streams
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-03
    Lin Chen; Haipeng Dai; Lei Meng; Jihong Yu

    In a data stream composed of an ordered sequence of data items, persistent items refer to those persisting to occur over a long timespan. Compared with ordinary items, persistent ones, though not necessarily occurring more frequently, typically convey more valuable information. Persistent item lookup, the functionality to identify all persistent items, emerges as a pivotal building block in many computing

    更新日期:2020-09-03
  • On-Demand Fragmentation-Aware Spectrum Allocation in Space Division Multiplexed Elastic Optical Networks with Minimized Crosstalk and Multipath Routing
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-03
    Mohammad Jafari-Beyrami; Akbar Ghaffarpour Rahbar; Soheil Hosseini

    Elastic optical networks are extremely effective networks for high speed optical communication owing to excessive data rate requirements in future years. Applying the space division multiplexing (SDM) technology with multi-core fibers (MCFs) provides possibility to increase the network capacity and data transmission rate as a consequence. One of the main issues in these types of networks is bandwidth

    更新日期:2020-09-03
  • Machine Learning-based traffic prediction models for Intelligent Transportation Systems
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-03
    Azzedine Boukerche; Jiahao Wang

    Intelligent Transportation Systems (ITS) have attracted an increasing amount of attention in recent years. Thanks to the fast development of vehicular computing hardware, vehicular sensors and citywide infrastructures, many impressive applications have been proposed under the topic of ITS, such as Vehicular Cloud (VC), intelligent traffic controls, etc. These applications can bring us a safer, more

    更新日期:2020-09-03
  • Adaptive algorithm for spreading factor selection in LoRaWAN networks with multiple gateways
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-22
    Ali Loubany; Samer Lahoud; Rida El Chall

    Recently, LoRaWAN has been considered a promising technology for large-scale IoT applications owing to its ability to achieve low power and long range communications. However, LoRaWAN is limited using Aloha random access scheme. When in dense scenarios, such scheme leads to a high number of collisions, thus severely impacts the reliability and scalability of LoRaWAN. In this paper, we investigate the

    更新日期:2020-09-02
  • Evaluation of a zone encryption scheme for vehicular networks
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-01
    Jorge Gallego-Madrid; Ramon Sanchez-Iborra; Jose Santa; Antonio Skarmeta

    Vehicular communications are bringing a new wave of applications under the umbrella of the Cooperative Intelligent Transportation Systems (C-ITS). To this end, on-board units are expected to send messages periodically or upon the appearance of a relevant event, to feed an awareness ecosystem that enables safety or traffic efficiency services. This is the case of Cooperative Awareness Messages (CAMs)

    更新日期:2020-09-02
  • Characterizing task completion latencies in multi-point multi-quality fog computing systems
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-01
    Maria Gorlatova; Hazer Inaltekin; Mung Chiang

    Fog computing, which distributes computing resources to multiple locations between the Internet of Things (IoT) devices and the cloud, is attracting considerable attention from academia and industry. Yet, despite the excitement about the potential of fog computing, few comprehensive studies quantitatively characterizing the properties of fog computing architectures have been conducted. In this paper

    更新日期:2020-09-01
  • Traffic Modeling and Optimization in Datacenters with Graph Neural Network
    Comput. Netw. (IF 3.111) Pub Date : 2020-09-01
    Junfei Li; Penghao Sun; Yuxiang Hu

    Traffic Optimization (TO) is a well-known and established topic in datacenters with the fundamental goal of operating networks efficiently. Traditional TO heuristics may suffer from performance penalty as it mismatches actual traffic, while Artificial Intelligence (AI) which has undergone a renaissance recently is gradually being applied to the network optimization and has shown excellent advantages

    更新日期:2020-09-01
  • A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-22
    Ali Shakarami; Mostafa Ghobaei-Arani; Ali Shahidinejad

    With the rapid developments in emerging mobile technologies, utilizing resource-hungry mobile applications such as media processing, online Gaming, Augmented Reality (AR), and Virtual Reality (VR) play an essential role in both businesses and entertainments. To soften the burden of such complexities incurred by fast developments of such serving technologies, distributed Mobile Edge Computing (MEC)

    更新日期:2020-08-31
  • Mathematical Evaluation of Spectrum Sharing in Cognitive Radio Networks for 5G Systems Using Markov Processes
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-31
    Arturo Briones-Reyes; Luis Alberto Vásquez-Toledo; Alfonso Prieto-Guerrero; Rafael Aguilar-Gonzalez

    Nowadays, efficient spectrum usage is one of the most important design principles to take into account in wireless communications due to the exponential growth of mobile devices. In that sense, solutions such as non-orthogonal multiple access (NOMA) and cognitive radio (CR), investigated separately, have been proposed to overcome the spectrum scarcity issue. However, it is important to quantify the

    更新日期:2020-08-31
  • Multi-Sensor Based MK/HyperK/1/M Queuing Model for Heterogeneous Traffic
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-29
    Hamida Qumber; Sayeed Ghani

    Integration of wireless sensor networks (WSNs) with Internet of Things (IoT) has given rise to applications such as Smart Home Networks, Vehicular Ad hoc Sensor Networks and Health and Wellness Wireless Sensor Networks among others. These applications tend to use multi-sensor nodes that have multiple sensors mounted on a single radio board and may require handling heterogeneous traffic. Modern WSNs

    更新日期:2020-08-29
  • Impact of the COVID-19 pandemic on the Internet latency: A large-scale study
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-20
    Massimo Candela; Valerio Luconi; Alessio Vecchio

    The COVID-19 pandemic dramatically changed the way of living of billions of people in a very short time frame. In this paper, we evaluate the impact on the Internet latency caused by the increased amount of human activities that are carried out on-line. The study focuses on Italy, which experienced significant restrictions imposed by local authorities, but results about Spain, France, Germany, Sweden

    更新日期:2020-08-28
  • UAVs joint optimization problems and machine learning to improve the 5G and Beyond communication
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-17
    Zaib Ullah; Fadi Al-Turjman; Uzair Moatasim; Leonardo Mostarda; Roberto Gagliardi

    Recently, unmanned aerial vehicles (UAVs) have gained notable interest in various applications such as wireless coverage, aerial surveillance, precision agriculture, construction, power lines monitoring and blood delivery, etc. The UAVs implicit attributes e.g., rapid deployment, quick mobility, increase in flight duration, improvements in payload capacities, etc. , place it as an effective candidate

    更新日期:2020-08-28
  • AdaptaBLE: Adaptive control of data rate, transmission power, and connection interval in bluetooth low energy
    Comput. Netw. (IF 3.111) Pub Date : 2020-08-28
    Eunjeong Park; Myung-Sup Lee; Hyung-Sin Kim; Saewoong Bahk

    This work investigates run-time parameter control for Bluetooth Low Energy (BLE), based on the latest Bluetooth specification 5 released in 2016. Compared to the previous version, Bluetooth specification 5 provides more options for data rate and transmission power and gives room for adaptive parameter control to improve BLE performance in time-varying wireless environments. To the best of our knowledge

    更新日期:2020-08-28
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
spring&清华大学出版社
城市可持续发展前沿研究专辑
Springer 纳米技术权威期刊征稿
全球视野覆盖
施普林格·自然新
chemistry
3分钟学术视频演讲大赛
物理学研究前沿热点精选期刊推荐
自然职位线上招聘会
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
ACS ES&T Engineering
ACS ES&T Water
屿渡论文,编辑服务
ACS Publications填问卷
阿拉丁试剂right
麻省大学
西北大学
湖南大学
华东师范大学
陆海华
化学所
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
胡眆昊
杨财广
廖矿标
试剂库存
down
wechat
bug