Abstract is missing.
- Dynamic Hierarchical Neural Network Offloading in IoT Edge NetworksWassim Seifeddine, Cédric Adjih, Nadjib Achir. 1-6 [doi]
- Blockchain based OAuth for IoTImen Riabi, Hella Kaffel Ben Ayed, Bilel Zaghdoudi, Laurent George 0001. 1-7 [doi]
- Deep-IRSA: A Deep Reinforcement Learning Approach to Irregular Repetition Slotted ALOHAIbrahim Ayoub, Iman Hmedoush, Cédric Adjih, Kinda Khawam, Samer Lahoud. 1-6 [doi]
- Experimental Performance Evaluation of Cellular IoT networks in Deep-Indoor ScenarioKalpit Dilip Ballal, Lars Dittmann, Sarah Ruepp. 1-6 [doi]
- An Efficient Convolution Method to Compute the Stationary Transition Probabilities of the G/M/c Model and its VariantsMuhammad El-Taha. 1-6 [doi]
- Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised RewardMohamed Said Frikha, Sonia Mettali Gammar, Abdelkader Lahmadi. 1-6 [doi]
- ANGELA: HTTP Adaptive Streaming and Edge Computing SimulatorJesús Aguilar Armijo, Christian Timmerer, Hermann Hellwagner. 1-6 [doi]
- Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc NetworksTayssir Ismail, Haifa Touati, Nasreddine Hajlaoui, Mohamed Hadded, Paul Muhlethaler, Samia Bouzefrane 0001, Leïla Azouz Saïdane. 1-6 [doi]
- A new Taxonomy of Physical-Layer Network Coding techniques in Two Way Relay Channel model with single antennaMohammed Aissaoui, Chiraz Houaidia, Adrien van den Bossche, Thierry Val, Leïla Azouz Saïdane. 1-6 [doi]
- Surveying and Analyzing Privacy Issues in Contact tracing appsRihab Boussada, Balkis Hamdane, Farouk Kamoun, Leïla Azouz Saïdane. 1-5 [doi]
- An Analytical Model for a Class of Receiver-Initiated MAC Protocols for Energy Harvesting Wireless Sensor NetworksChris Blondia. 1-7 [doi]