


default search action
CCF Transactions on Networking, Volume 3
Volume 3, Number 1, September 2020
- Wei Peng, Yi Wang, Tao Huang, Hai Wan, David Dai, Jianping Wang:
Editorial of special issue on time-sensitive networking. 1-3 - Chuwen Zhang, Yi Wang, Ruyi Yao, Boyang Zhou, Liang Cheng, Yang Xu, Xiaoguang Li, Jian Cheng, Bin Liu:
Packet-size aware scheduling algorithms in guard band for time sensitive networking. 4-20 - Zonghui Li
, Hai Wan, Yangdong Deng, Ke Xiong, Xiaoyu Song:
A resource-efficient priority scheduler for time-sensitive networking switches. 21-34 - Soheil Abbasloo
, H. Jonathan Chao:
SharpEdge: an asynchronous and core-agnostic solution to guarantee bounded-delays. 35-50 - Wei Quan
, Wenwen Fu, Jinli Yan, Zhigang Sun:
OpenTSN: an open-source project for time-sensitive networking system development. 51-65 - Qiushi Gong
:
A weakly secure multiple description coding scheme in lossy multipath channels for fine-grained SVC streaming. 66-80 - Bhupendra Gupta, Jyoti Pandey:
Resilient and secure wireless sensor network under non-full visibility. 81-92
Volume 3, Number 2, October 2020
- Elisa Bertino:
Security of cellular networks position paper. 93-96 - Xingliang Yuan
, Chengjun Cai
, Cong Wang, Qian Wang:
A scalable ledger-assisted architecture for secure query processing over distributed IoT data. 97-111 - Suryadipta Majumdar
:
A multi-level proactive security auditing framework for clouds through automated dependency building. 112-127 - Baicheng Chen
, Kun Woo Cho
, Chenhan Xu, Zhengxiong Li, Feng Lin, Zhanpeng Jin, Wenyao Xu:
A stimulus-response based EEG biometric using mallows distance. 128-139 - Zhiqi Chen, Sheng Zhang
, Zhuzhong Qian, Can Wang, Mingjun Xiao, Jie Wu, Sanglu Lu:
Sum of squares: a new metric for NFV service chain placement in edge computing environments and efficient heuristic algorithms. 140-153
Volume 3, Numbers 3-4, December 2020
- Ju Ren, Hongbo Jiang, Xuemin Shen, John C. S. Lui, Arun K. Lyengar:
Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing. 155-157 - Jingrong Wang
, Kaiyang Liu, George Tzanetakis, Jianping Pan:
Cooperative abnormal sound event detection in end-edge-cloud orchestrated systems. 158-170 - Xueshuo Xie, Yaozheng Fang, Zhaolong Jian, Ye Lu, Tao Li
, Guiling Wang:
Blockchain-driven anomaly detection framework on edge intelligence. 171-192 - Xiaoyi Pang, Dengfeng Guo, Zhibo Wang, Peng Sun, Liqiang Zhang:
Towards fair and efficient task allocation in blockchain-based crowdsourcing. 193-204 - Zhiguang Qin, Yuedi Li, Xin Ye, Jin Zhou, Minsheng Cao, Dajiang Chen
:
ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks. 205-217 - Yichuan Wang, Yuying Tian, Xinyue Yin, Xinhong Hei
:
A trusted recommendation scheme for privacy protection based on federated learning. 218-228 - Sultan Alasmari, Weichao Wang
, Tuanfa Qin, Yu Wang
:
Proof of outsourced encryption: cross verification of security service level agreement. 229-244 - Koffka Khan
, Wayne Goodridge:
QoE evaluation of dynamic adaptive streaming over HTTP (DASH) with promising transport layer protocols. 245-260 - Majd Latah
, Levent Toker:
An efficient flow-based multi-level hybrid intrusion detection system for software-defined networks. 261-271 - Urmila Bhanja, Chinmayee Panda:
Performance analysis of hybrid SAC-OCDMA-OFDM model over free space optical communication. 272-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.