1013 | -- | 1027 | Xianfu Meng, Yu Deng. A time-aware resource search strategy with the ant colony optimization in MANETs |
1028 | -- | 1040 | Tongrang Fan, Shixun Xiong, Wenbin Zhao, Tao Yu. Information spread link prediction through multi-layer of social network based on trusted central nodes |
1041 | -- | 1060 | Chao Sha, Lian-hua Zhong, Yao Bian, Dandan Song, Chunhui Ren. A type of energy-efficient target tracking approach based on grids in sensor networks |
1061 | -- | 1075 | Yesudhas Harold Robinson, Eanoch Golden Julie, Raghvendra Kumar, Le Hoang Son. Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks |
1076 | -- | 1096 | A. R. Rajeswari, Kanagasabai Kulothungan, Sannasi Ganapathy, Arputharaj Kannan. A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks |
1097 | -- | 1109 | Jian Wang, Yanli Wang, Guosheng Zhao, Zhong-Nan Zhao. Location protection method for mobile crowd sensing based on local differential privacy preference |
1110 | -- | 1136 | Sandeep Verma, Neetu Sood, Ajay Kumar Sharma. A novelistic approach for energy efficient routing using single and multiple data sinks in heterogeneous wireless sensor network |
1137 | -- | 1155 | Khaled Hamouid, Kamel Adi. Secure and reliable certification management scheme for large-scale MANETs based on a distributed anonymous authority |
1156 | -- | 1177 | Balu L. Parne, Shubham Gupta, Narendra S. Chaudhari. PSE-AKA: Performance and security enhanced authentication key agreement protocol for IoT enabled LTE/LTE-A networks |
1178 | -- | 1193 | Hui Li, Lishuang Pei, Dan Liao, Gang Sun, Du Xu. Blockchain Meets VANET: An Architecture for Identity and Location Privacy Protection in VANET |
1194 | -- | 1213 | D. Dhanya, D. Arivudainambi. Dolphin partner optimization based secure and qualified virtual machine for resource allocation with streamline security analysis |
1214 | -- | 1215 | Ki-Il Kim, Sana Ullah, Christos V. Verikoukis, Han-Chieh Chao. Editorial on "Special issue on fog computing for healthcare" |
1216 | -- | 1224 | Yannis Nikoloudakis, Evangelos Pallis, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis. Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case |
1225 | -- | 1235 | Iván García-Magariño, José Varela Aldás, Guillermo Palacios Navarro, Jaime Lloret. Fog computing for assisting and tracking elder patients with neurodegenerative diseases |
1236 | -- | 1262 | Rida Zojaj Naeem, Saman Bashir, Muhammad Faisal Amjad, Haider Abbas, Hammad Afzal. Fog computing in internet of things: Practical applications and future directions |
1263 | -- | 1276 | Fouzia Jabeen, Muazzam Maqsood, Mustansar Ali Ghazanfar, Farhan Aadil, Salabat Khan, Muhammad Fahad Khan, Irfan Mehmood. An IoT based efficient hybrid recommender system for cardiovascular disease |
1277 | -- | 1288 | Shiyuan Tong, Yun Liu, Hsin-Hung Cho, Hua-Pei Chiang, Zhenjiang Zhang. Joint radio resource allocation in fog radio access network for healthcare |
1289 | -- | 1307 | Thaier Hayajneh, Kristen N. Griggs, Muhammad Imran 0001, Bassam Jamil Mohd. Secure and efficient data delivery for fog-assisted wireless body area networks |
1308 | -- | 1310 | Jiming Chen, Kaoru Ota, Lu Wang 0002, Jianping He. Big data and smart computing in network systems |
1311 | -- | 1322 | Wenbin Yu 0001, Cailian Chen, Zhe Liu, Bo Yang 0006, Xinping Guan. DSESP: Dual sparsity estimation subspace pursuit for the compressive sensing based close-loop ecg monitoring structure |
1323 | -- | 1335 | Alberto Aguilar, Camilo Lozoya, Luis Orona. A hamming distance and fuzzy logic-based algorithm for P2P content distribution in enterprise networks |
1336 | -- | 1345 | Abdulrhman M. Alshareef, Mohammed F. Alhamid, Abdulmotaleb El-Saddik. Toward citation recommender systems considering the article impact in the extended nearby citation network |
1346 | -- | 1357 | Huajun Zhang, Erdong Deng, Haojin Zhu, Zhenfu Cao. Smart contract for secure billing in ride-hailing service via blockchain |
1358 | -- | 1368 | Zhun Li, ByungSoo Ko, Ho-Jin Choi. Naive semi-supervised deep learning using pseudo-label |
1369 | -- | 1384 | Yazhou Yuan, Yuefeng Li, Zhixin Liu, Kit Yan Chan, Shanying Zhu, Xinping Guan. A three dimensional tracking scheme for underwater non-cooperative objects in mixed LOS and NLOS environment |
1385 | -- | 1402 | Xinyang Jiang, Qiang Li 0008, Zhen Ma, Mianxiong Dong, Jun Wu 0001, Dong Guo 0002. QuickSquad: A new single-machine graph computing framework for detecting fake accounts in large-scale social networks |
1403 | -- | 1417 | Lei Shi, Junping Du, MeiYu Liang, Feifei Kou. Dynamic topic modeling via self-aggregation for short text streams |
1418 | -- | 1432 | Minghui Zhao, Wei Wang 0021, Yitu Wang, Zhaoyang Zhang 0001. Load scheduling for distributed edge computing: A communication-computation tradeoff |
1433 | -- | 1444 | Danfeng Yan, Xuan Zhao, Rongheng Lin, Demeng Bai. PPQAR: Parallel PSO for quantitative association rule mining |
1445 | -- | 1453 | Bo Qiao, Hao Yin. A data-driven and the deep learning based CDN recommendation framework for ICPs |
1454 | -- | 1465 | Guangsheng Feng, Haibin Lv, Bingyang Li, Chengbo Wang, Hongwu Lv, Huiqiang Wang. A near-optimal cloud offloading under multi-user multi-radio environments |
1466 | -- | 1475 | Masoud Tahmasebi, Mohammad-Reza Khayyambashi. An efficient model for vehicular cloud computing with prioritizing computing resources |