1 | -- | 0 | Jie Yang 0042, Ziyu Pan, Lihong Guo. Coverage and Energy Efficiency Analysis for Two-Tier Heterogeneous Cellular Networks Based on Matérn Hard-Core Process |
2 | -- | 0 | Wen An, Jun Jie Ma, Hong Yang Zhou, Hong Shan Chen, Xu Jun, Xu Jian. An Adaptive Differential Protection and Fast Auto-Closing System for 10 kV Distribution Networks Based on 4G LTE Wireless Communication |
3 | -- | 0 | Jianjun Lei, Ying Wang, Hong Yun. Decoupling-Based Channel Access Mechanism for Improving Throughput and Fairness in Dense Multi-Rate WLANs |
4 | -- | 0 | Samuel Yankson, Mahdi Ghamkhari. Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems |
5 | -- | 0 | Apostolos Kousaridas, Andreas Schimpe, Sebastian Euler, Xavier Vilajosana, Mikael Fallgren, Giada Landi, Francesca Moscatelli, Sokratis Barmpounakis, Francisco Vazquez Gallego, Roshan Sedar, Rodrigo Silva, Laurent Dizambourg, Stefan Wendt, Maciej Mühleisen, Kurt Eckert, Jérôme Härri, Jesus Alonso-Zarate. 5G Cross-Border Operation for Connected and Automated Mobility: Challenges and Solutions |
6 | -- | 0 | Andreas A. Veglis, Dimitrios Giomelakis. Search Engine Optimization |
7 | -- | 0 | Symeon Papavassiliou. Software Defined Networking (SDN) and Network Function Virtualization (NFV) |
8 | -- | 0 | Jingpu Wang, Xin Song, Yatao Ma. A Novel Resource Allocation Scheme in NOMA-Based Cellular Network with D2D Communications |
9 | -- | 0 | Jiajia Wang, Guangming Li. Study on Bridge Displacement Monitoring Algorithms Based on Multi-Targets Tracking |
10 | -- | 0 | Rafael Páez, Manuel Pérez, Gustavo Ramírez, Juan Montes, Lucas Bouvarel. An Architecture for Biometric Electronic Identification Document System Based on Blockchain † |
11 | -- | 0 | Asfund Ausaf, Mohammad Zubair Khan, Muhammad Awais Javed, Ali Kashif Bashir. WLAN Aware Cognitive Medium Access Control Protocol for IoT Applications |
12 | -- | 0 | You Guo, Hector Marco-Gisbert, Paul Keir. Mitigating Webshell Attacks through Machine Learning Techniques |
13 | -- | 0 | Brandon Foubert, Nathalie Mitton. Long-Range Wireless Radio Technologies: A Survey |
14 | -- | 0 | Keisuke Utsu, Mariko Abe, Shuji Nishikawa, Osamu Uchida. Twitter-Based Safety Confirmation System for Disaster Situations |
15 | -- | 0 | Zhijun Wu, Yun Zhang, Enzhong Xu. Multi-Authority Revocable Access Control Method Based on CP-ABE in NDN |
16 | -- | 0 | Emilio Matricciani. Geocentric Spherical Surfaces Emulating the Geostationary Orbit at Any Latitude with Zenith Links |
17 | -- | 0 | Zhijun Wu, Rong Li, Panpan Yin, Changliang Li. Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec |
18 | -- | 0 | . Acknowledgement to Reviewers of Future Internet in 2019 |