


default search action
Computer Networks, Volume 128
Volume 128, December 2017
- Ahmed E. Kamal, Muhammad Imran, Hsiao-Hwa Chen, Athanasios V. Vasilakos

:
Survivability strategies for emerging wireless networks. 1-4 - Muhammad Zeeshan Asghar

, Paavo Nieminen
, Seppo Hämäläinen, Tapani Ristaniemi, Muhammad Ali Imran
, Timo Hämäläinen
:
Towards proactive context-aware self-healing for 5G networks. 5-13 - Sonia Ben Rejeb

, Nidal Nasser
, Samer Mansour, Massa Boujlbane:
Centralized SON function for operator optimal strategies in heterogeneous networks. 14-27 - Lang Xie, Poul E. Heegaard

, Yuming Jiang
:
Survivability analysis of a two-tier infrastructure-based wireless network. 28-40 - Louai Al-Awami

, Hossam S. Hassanein
:
Robust decentralized data storage and retrieval for wireless networks. 41-50 - Bhaskar Das, Jalal Almhana:

A new cooperative communication algorithm for improving connectivity in the event of network failure in VANETs. 51-62 - Wassila Lalouani, Mohamed F. Younis

, Nadjib Badache:
Optimized repair of a partitioned network topology. 63-77 - Enver Ever

, Fadi M. Al-Turjman, Hadi Zahmatkesh, Mustafa Riza
:
Modelling green HetNets in dynamic ultra large-scale applications: A case-study for femtocells in smart-cities. 78-93 - Seif Eddine Hammami, Hossam Afifi:

Fault-tolerant dynamic planning for wireless mesh networks based on real load profiles. 94-107 - Sanaa Sharafeddine

, Karim Jahed, Omar Farhat, Zaher Dawy:
Failure recovery in wireless content distribution networks with device-to-device cooperation. 108-122 - Olga Galinina

, Sergey Andreev
, Mikhail M. Komarov
, Svetlana V. Maltseva
:
Leveraging heterogeneous device connectivity in a converged 5G-IoT ecosystem. 123-132 - Di Li, Xiaomin Li

, Jiafu Wan
:
A cloud-assisted handover optimization strategy for mobile nodes in industrial wireless networks. 133-141 - Ali Tahir

, Shahbaz Akhtar Abid, Nadir Shah:
Logical clusters in a DHT-Paradigm for scalable routing in MANETs. 142-153 - Debiao He, Sherali Zeadally, Libing Wu

, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. 154-163 - Caidan Zhao, Minmin Huang, Lianfen Huang, Xiaojiang Du, Mohsen Guizani:

A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks. 164-171 - Prasenjit Bhavathankar, Subhadeep Sarkar

, Sudip Misra
:
Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks. 172-185 - Hossein Soleimani

, Thomas Begin, Azzedine Boukerche:
Safety message generation rate adaptation in LTE-based vehicular networks. 186-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














