Journal: Computing

Volume 104, Issue 8

1721 -- 1738Yongfeng Kong, Zhenhui Huang, Wanjie Xiong. Parallelism of the finite-time dynamics method based on GPU
1739 -- 1751Jianghui Liu, Shengxiang Wang. All-dummy k-anonymous privacy protection algorithm based on location offset
1753 -- 1774Taha Shojarazavi, Hamid Barati, Ali Barati. A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments
1775 -- 1837Salim el Khediri. Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols
1839 -- 1865Mohamed A. El-Zawawy, Parvez Faruki, Mauro Conti. Formal model for inter-component communication and its security in android
1867 -- 1889LaƩrcio Pioli, Carina F. Dorneles, Douglas D. J. de Macedo, Mario A. R. Dantas. An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature
1891 -- 1922Lynda Alkama, Louiza Bouallouche-Medjkoune, Mouloud Atmani, Lina Bachiri. Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions
1923 -- 1947Somayeh Bahramnejad, Naser Movahhedinia. A reliability estimation framework for cognitive radio V2V communications and an ANN-based model for automating estimations