Abstract is missing.
- Search Planning and Analysis for Mobile Targets with RobotsShujin Ye, Wai Kit Wong, Hai Liu 0001. 3-21 [doi]
- Stability of Positive Systems in WSN Gateway for IoT&IIoTJolanta Mizera-Pietraszko, Jolanta Tancula. 22-37 [doi]
- Utility-Aware Participant Selection with Budget Constraints for Mobile Crowd SensingShanila Azhar, Shan Chang, Ye Liu, Yuting Tao, Guohua Liu, Donghong Sun. 38-49 [doi]
- Toward Optimal Resource Allocation for Task Offloading in Mobile Edge ComputingWenzao Li, Yuwen Pan, Fangxin Wang, Lei Zhang, Jiangchuan Liu. 50-62 [doi]
- Goldilocks: Learning Pattern-Based Task Assignment in Mobile CrowdsensingJinghan Jiang, Yiqin Dai, Kui Wu 0001, Rong Zheng. 63-83 [doi]
- A Reinforcement Learning Based Placement Strategy in Datacenter NetworksWeihong Yang, Yang Qin, ZhaoZheng Yang. 87-101 [doi]
- Scheduling Virtual Machine Migration During Datacenter Upgrades with Reinforcement LearningChen Ying, Baochun Li, Xiaodi Ke, Lei Guo. 102-117 [doi]
- Batch Auction Design for Cloud Container ServicesYu He, Lin Ma, Ruiting Zhou, Chuanhe Huang. 118-137 [doi]
- A-GNN: Anchors-Aware Graph Neural Networks for Node EmbeddingChao Liu, Xinchuan Li, Dongyang Zhao, Shaolong Guo, Xiaojun Kang, Lijun Dong, Hong Yao. 141-153 [doi]
- Accelerating Face Detection Algorithm on the FPGA Using SDAccelJie Wang, Wei Leng. 154-165 [doi]
- Hybrid NOMA/OMA with Buffer-Aided Relaying for Cooperative Uplink SystemJianping Quan, Peng Xu 0002, Yunwu Wang, Zheng Yang 0003. 169-183 [doi]
- UltraComm: High-Speed and Inaudible Acoustic CommunicationGuoming Zhang, Xiaoyu Ji, Xinyan Zhou, Dong-lian Qi, Wenyuan Xu. 184-204 [doi]
- A New Coordinated Multi-points Transmission Scheme for 5G Millimeter-Wave Cellular NetworkXiaoya Zuo, Rugui Yao, Xu Zhang, Jiahong Li, Pan Liu. 205-216 [doi]
- Divide and Conquer: Efficient Multi-path Validation with ProMPVAnxiao He, Yubai Xie, Wensen Mao, Tienpei Yeh. 219-234 [doi]
- AHV-RPL: Jamming-Resilient Backup Nodes Selection for RPL-Based Routing in Smart Grid AMI NetworksTaimin Zhang, Xiaoyu Ji, Wenyuan Xu. 235-251 [doi]
- Privacy Protection Routing and a Self-organized Key Management Scheme in Opportunistic NetworksYang Qin, Tiantian Zhang, Mengya Li. 252-268 [doi]