Loading…
Loading…
Type-2 fuzzy ontology–aided recommendation systems for IoT–based healthcare
Ali, Farman, Islam, S.M. Riazul, Kwak, Daehan, Khan, Pervez, Ullah, Niamat, Yoo, Sang-jo, Kwak, K.S.
Published in Computer communications (01.04.2018)
Published in Computer communications (01.04.2018)
Get full text
Journal Article
Loading…
Loading…
Joint routing and scheduling for large-scale deterministic IP networks
Krolikowski, Jonatan, Martin, Sébastien, Medagliani, Paolo, Leguay, Jérémie, Chen, Shuang, Chang, Xiaodong, Geng, Xuesong
Published in Computer communications (01.01.2021)
Published in Computer communications (01.01.2021)
Get full text
Journal Article
Loading…
Intelligent resource allocation management for vehicles network: An A3C learning approach
Chen, Miaojiang, Wang, Tian, Ota, Kaoru, Dong, Mianxiong, Zhao, Ming, Liu, Anfeng
Published in Computer communications (01.02.2020)
Published in Computer communications (01.02.2020)
Get full text
Journal Article
Loading…
A taxonomy of AI techniques for 6G communication networks
Sheth, Karan, Patel, Keyur, Shah, Het, Tanwar, Sudeep, Gupta, Rajesh, Kumar, Neeraj
Published in Computer communications (01.09.2020)
Published in Computer communications (01.09.2020)
Get full text
Journal Article
Loading…
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things
Jahromi, Amir Namavar, Karimipour, Hadis, Dehghantanha, Ali
Published in Computer communications (15.01.2023)
Published in Computer communications (15.01.2023)
Get full text
Journal Article
Loading…
Loading…
VANET security surveys
Engoulou, Richard Gilles, Bellaïche, Martine, Pierre, Samuel, Quintero, Alejandro
Published in Computer communications (15.05.2014)
Published in Computer communications (15.05.2014)
Get full text
Journal Article
Loading…
Reinforcement and deep reinforcement learning for wireless Internet of Things: A survey
Frikha, Mohamed Said, Gammar, Sonia Mettali, Lahmadi, Abdelkader, Andrey, Laurent
Published in Computer communications (01.10.2021)
Published in Computer communications (01.10.2021)
Get full text
Journal Article
Loading…
Geo-distributed efficient deployment of containers with Kubernetes
Rossi, Fabiana, Cardellini, Valeria, Lo Presti, Francesco, Nardelli, Matteo
Published in Computer communications (01.06.2020)
Published in Computer communications (01.06.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
A Novel Edge Computing Architecture Based on Adaptive Stratified Sampling
Zhang, De-gan, Ni, Chen-hao, Zhang, Jie, Zhang, Ting, Yang, Peng, Wang, Jia-xu, Yan, Hao-ran
Published in Computer communications (01.02.2022)
Published in Computer communications (01.02.2022)
Get full text
Journal Article
Loading…
Loading…
Three-factor authentication protocol using physical unclonable function for IoV
Jiang, Qi, Zhang, Xin, Zhang, Ning, Tian, Youliang, Ma, Xindi, Ma, Jianfeng
Published in Computer communications (01.05.2021)
Published in Computer communications (01.05.2021)
Get full text
Journal Article
Loading…
Blockchain technology as a Fog computing security and privacy solution: An overview
Alzoubi, Yehia Ibrahim, Al-Ahmad, Ahmad, Kahtan, Hasan
Published in Computer communications (15.01.2022)
Published in Computer communications (15.01.2022)
Get full text
Journal Article