Computer Communications
IF
3.17
Papers
8,055
Papers 7,650
1 page of 765 pages (7,650 results)
Newest
Abstract null null Internet of things (IoT) is one of the most emerging technologies nowadays and it is one of the key enablers of industrial cyber physical system (CPSs). It has started to participate in almost every aspect of our social life, ranging from financial transactions to the healthcare system, communication to national security, battlefield to smart homes, and so on. However, the wide deployment of IoT suffers certain issues as well, such as interoperability, compatibility, heterogen...
Source
Abstract null null With the rapid development of computing, communication, and control technologies, cyber–physical systems that integrate physical space, information space, and social space have emerged and are widely used in various important infrastructures. This article introduces the composition and basic algorithm of the hidden Markov model, and gives the mathematical description of the hidden Markov model. Since the hidden Markov model can deduce the hidden state of the observation object...
Source
#1Chao Niu (CCNU: Central China Normal University)
#2Lizhou Wang (TUT: Taiyuan University of Technology)
Abstract null null In this paper, we study big data-driven Cyber–Physical Systems (CPS) through cloud platforms and design scheduling optimization algorithms to improve the efficiency of the system. A task scheduling scheme for large-scale factory access under cloud–edge collaborative computing architecture is proposed. The method firstly merges the directed acyclic graphs on cloud-side servers and edge-side servers; secondly, divide the tasks using a critical path-based partitioning strategy to...
Source
#1Zhongliang Zhao (Beihang University)H-Index: 11
#2Pedro Cumino (University of Aveiro)
Last. Susana Sargento (University of Aveiro)H-Index: 26
view all 8 authors...
Abstract null null Future mobile communication networks need Unmanned Aerial Vehicles as Base Stations (UAVasBSs) with the fast-moving and long-term hovering capabilities to guarantee consistent network performance. UAVasBSs help 5G/B5G mobile communication systems to rapidly recover from emergency situations and handle the instant traffic of the flash crowd. In this context, multiple UAVs might form a flying ad-hoc network to establish a flying access network to enhance the network connectivity...
Source
#1Tri Gia Nguyen (FPT University)H-Index: 1
#2Trung V. Phan (Chemnitz University of Technology)H-Index: 6
Last. Duc Tran Le (University of Da Nang)H-Index: 2
view all 5 authors...
Abstract null null In this paper, we propose a novel and adaptive flow rule placement system based on deep reinforcement learning, namely DeepPlace, in Software-Defined Internet of Things (SDIoT) networks. DeepPlace can provide a fine-grained traffic analysis capability while assuring QoS of traffic flows and proactively avoiding the flow-table overflow issue in the data plane. Specifically, we first investigate the traffic forwarding process in an SDIoT network, i.e., routing and flow rule plac...
Source
#1Weifeng Lu (NUPT: Nanjing University of Posts and Telecommunications)H-Index: 3
#2Wu Weiduo (NUPT: Nanjing University of Posts and Telecommunications)
Last. Lijie Xu (NUPT: Nanjing University of Posts and Telecommunications)H-Index: 12
view all 6 authors...
Abstract null null Task offloading is a promising technology to exploit the available resources in edge cloud efficiently. Many incentive mechanisms for offloading systems have been proposed. However, most of existing works study the centralized incentive mechanisms under the assumption that all mobile edge infrastructures are operated by a central cloud. In this paper, we aim to design the auction-based truthful incentive mechanisms for heavily loaded task offloading system in heterogeneous MEC...
Source
#1Yanrong Lu (Tianjin University of Technology)
#2Dawei Zhao (Qilu University of Technology)
Abstract null null Mobile cloud computing (MCC) is an emerging computing model with the growing demands of mobile devices by services diversity using mobile cloud technology. Authentication plays a fundamental role between the smart portable devices located in different places and the mobile cloud computing service providers in MCC. Several authors presented many authentication schemes using different cryptographic approaches for MCC in the past years. However, those schemes have not solved the ...
Source
#1ChienHsiang Wu (NCKU: National Cheng Kung University)
#2Chin-Feng Lai (NCKU: National Cheng Kung University)H-Index: 30
Abstract null null Transmission applications in wireless networks have brought unprecedented demands. The demand for high-performance wireless transmission is increasing day by day. Antenna technology is an indispensable part of the development of wireless communication. One potential solution is to resort t intelligent learning techniques to help breakthroughs in the limited antenna technical field. It is based on an adaptive antenna using intelligent learning. It has laid the foundation for si...
Source
#1Fayez Hussain Alqahtani (KSU: King Saud University)H-Index: 6
#2Mohammed Al-Maitah (KSU: King Saud University)H-Index: 6
Last. Osama A. Elshakankiry (Taif University)H-Index: 5
view all 3 authors...
Abstract null null The mobile edge computing (MEC) paradigm provides cloud and application services at the “edge” of user networks for providing ubiquitous access to resources. The heterogeneous services cause varying network traffic that sometimes increases delay. In edge-based services, concurrency in data distribution requires caching and offloading features. This article introduces a proactive caching technique with offloading (PCTO) ability by considering the need for parallel user services...
Source
#1Dolores Garcia (Charles III University of Madrid)H-Index: 2
#2Jesus Omar Lacruz (IMDEA)H-Index: 7
Last. Joerg Widmer (IMDEA)H-Index: 27
view all 5 authors...
Abstract null null Machine learning is a highly promising tool to design the physical layer of wireless communication systems, but the training usually requires an explicit model of the signal distortion as it undergoes transmission over a wireless channel. As data rates, number of MIMO streams and carrier frequencies increase to satisfy the demand for wireless capacity, it becomes difficult to design hardware with few imperfections and to model the imperfections that there are. New machine lear...
Source
12345678910
Top fields of study
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.