Journal of Network and Computer Applications
Papers 3165
1 page of 317 pages (3,165 results)
#1Sen Liu (Fudan University)
#2Jiawei Huang (CSU: Central South University)H-Index: 15
Last. Jianxin Wang (CSU: Central South University)H-Index: 49
view all 4 authors...
Abstract null null Modern industrial and data center networks adopt multipath TCP (MPTCP) to achieve low communication latency. To make full use of multiple paths, MPTCP divides one TCP connection into multiple subflows. Due to the connection-level ACK blocking, however, MPTCP suffers from the traffic burstiness, which leads to large queueing delay, frequent packet drops, and even TCP timeout. To mitigate the traffic burstiness caused by ACK blocking, we propose MPTCP-RB (Multipath TCP with Redu...
#1Ahmed Yaser Fahad Alsahlani (University of Technology, Iraq)
#2Alexandru Popa (UB: University of Bucharest)H-Index: 10
Abstract null null Internet of Things (IoT) is a network of interconnected smart devices which provides tremendous benefits and can be applied in various fields including, but not limited to, healthcare, monitoring, and transportation. Since late of 2019, the world faces coronavirus (COVID-19) which has harmful consequences in humans’ life and economy. Reducing human interaction is the most important health measure to avoid the spread of the infection. In this context, leveraging IoT and cloud-b...
#1Jannatun Noor (BUET: Bangladesh University of Engineering and Technology)H-Index: 1
#2Saiful Islam Salim (BUET: Bangladesh University of Engineering and Technology)H-Index: 1
Last. A. B. M. Alim Al Islam (BUET: Bangladesh University of Engineering and Technology)H-Index: 11
view all 3 authors...
#1Shwet Ketu (BHU: Banaras Hindu University)H-Index: 2
#2Pramod Kumar Mishra (BHU: Banaras Hindu University)H-Index: 11
Abstract null null Internet of Things (IoT) is one of the emerging technologies, which is expanding its wings day by day. Smart objects in the IoT system are the ultimate building blocks used in the development process of IoT-based smart pervasive frameworks. Healthcare is one of the essential and well-known application domains of IoT technology. IoT is giving a new shape to the modern healthcare system, which is defined as the Internet of Healthcare Things (IoHT) with proficient technological, ...
#1Longbiao Chen (Ha Tai: Xiamen University)H-Index: 10
#2Zhihan Jiang (Ha Tai: Xiamen University)H-Index: 1
Last. Thi-Mai-Trang Nguyen (University of Paris)H-Index: 5
view all 5 authors...
Abstract null null The surging data traffic and dynamic user mobility in 5G networks have posed significant demands for mobile operators to increase data processing capacity and ensure user handover quality. Specifically, a cost-effective and quality-aware radio access network (RAN) is in great necessity. With the emergence of fog-computing-based RAN architecture (Fog-RAN), the data processing units (BBUs) can be separated from base stations (RRHs) and hosted in distributed fog servers, where ea...
#1Anand M. Baswade (IITs: Indian Institutes of Technology)
#2Mohith Reddy (IIT: Indian Institute of Technology (BHU) Varanasi)
Last. Vanlin Sathya (U of C: University of Chicago)H-Index: 10
view all 5 authors...
Abstract null null To access an unlicensed channel, Wi-Fi follows the Listen Before Talk (LBT) mechanism, whereas LTE-U (and future New Radio in Unlicensed (NR-U) Patriciello et al., 0000; Lagen et al., 2019) adopts the ON-OFF duty-cycled mechanism to fairly share the channel with Wi-Fi. These different mechanisms result in quite different performance for Wi-Fi and LTE-U/NR-U based on their relative deployment and density in the environment. In this work, we present an analytical model for the c...
#1Ahmad Zairi Zaidi (Monash University Malaysia Campus)
#2Chun Yong Chong (Monash University Malaysia Campus)H-Index: 8
Last. Ali Safaa Sadiq (University of Wolverhampton)H-Index: 10
view all 5 authors...
Abstract null null The advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs. The increasing usage of this device has led to the need for a secure and efficient authentication mechanism. For securing mobile devices, password, PIN, and swipe patterns are commonly used for user authentication. Entry-point face and fingerprint recognition have also gained traction in the past years. H...
#1Mahmoud Said Elsayed (UCD: University College Dublin)H-Index: 4
#2Nhien-An Le-Khac (UCD: University College Dublin)H-Index: 17
Last. Anca Delia Jurcut (UCD: University College Dublin)H-Index: 9
view all 4 authors...
Abstract null null Software-defined networking (SDN) is a new networking paradigm that separates the controller from the network devices i.e. routers and switches. The centralised architecture of the SDN facilitates the overall network management and addresses the requirement of current data centres. While there are high benefits offered by the SDN architecture, the risk of new attacks is a critical problem and can prevent the wide adoption of SDNs. The SDN controller is a crucial element, and i...
#1Yan Huang (KSU: Kennesaw State University)H-Index: 2
#2Wei Li (GSU: Georgia State University)
Last. Anu G. Bourgeois (GSU: Georgia State University)H-Index: 16
view all 5 authors...
Abstract null null The popularity of context-aware services is improving the quality of life, while raising serious privacy issues. In order for users to receive quality service, they are at risk of leaking private information by adversaries that are possibly eavesdropping on the data and/or by the untrusted service platform selling off its data to adversaries. Game theory has been utilized as a powerful tool to achieve privacy preservation by strategically balancing the trade-off between profit...
#1Quoc-Viet Pham (PNU: Pusan National University)H-Index: 18
#2Dinh C. Nguyen (Deakin University)H-Index: 11
Last. Won-Joo Hwang (UTS: University of Technology, Sydney)H-Index: 1
view all 7 authors...
Abstract null null In next-generation networks (NGN), a very large number of devices and applications are emerged, along with the heterogeneity of technologies, architectures, mobile data, etc., and optimizing such a network is of utmost importance. Besides convex optimization and game theory, swarm intelligence (SI) has recently appeared as a promising optimization tool for wireless networks. As a new subdivision of artificial intelligence, SI is inspired by the collective behaviors of societie...
1 CitationsSource
Top fields of study
Distributed computing
Wireless sensor network
Computer network
Computer security
Computer science
Real-time computing
Cloud computing