
Mobile Networks and Applications, Volume 24
Volume 24, Number 1, February 2019
- Shuai Liu
, Zhaojun Li, Yudong Zhang, Xiaochun Cheng
:
Introduction of Key Problems in Long-Distance Learning and Training. 1-4 - Shuai Liu
, Gaocheng Liu, Huiyu Zhou
:
A Robust Parallel Object Tracking Method for Illumination Variations. 5-17 - Yun Lin
, Sen Wang, Qidi Wu, Lei Chen
:
Key Technologies and Solutions of Remote Distributed Virtual Laboratory for E-Learning and E-Education. 18-24 - Bing Jia, Lifei Hao
, Chuxuan Zhang, Huili Zhao, Muhammad Khan:
An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints. 25-33 - Hao Zhang, Tao Huang, Zhihan Lv, Sanya Liu, Heng Yang:
MOOCRC: A Highly Accurate Resource Recommendation Model for Use in MOOC Environments. 34-46 - Umar Ali, Amjad Mehmood
, Muhammad Faran Majeed
, Siraj Muhammad, Muhammad Kamal Khan, Houbing Song
, Khalid Mahmood Malik
:
Innovative Citizen's Services through Public Cloud in Pakistan: User's Privacy Concerns and Impacts on Adoption. 47-68 - Xiao Ma, Yin Zhang
, Jiangfeng Zeng:
Newly Published Scientific Papers Recommendation in Heterogeneous Information Networks. 69-79 - Phan Cong Vinh:
Context-Aware Systems and Applications (ICCASA 2018) and Nature of Computation and Communication (ICTCC 2018). 80-81 - Abdur Rakib
, Ijaz Uddin:
An Efficient Rule-Based Distributed Reasoning Framework for Resource-bounded Systems. 82-99 - Shuangqing Xiang, Xi Wu, Huibiao Zhu, Wanling Xie, Lili Xiao, Phan Cong Vinh
:
Modeling and Verifying Basic Modules of Floodlight. 100-114 - Phuong Luu Vo, Tuan-Anh Le
, Nguyen H. Tran
:
mFAST: A Multipath Congestion Control Protocol for High Bandwidth-Delay Connection. 115-123 - Hong Anh Le, Anh Tu Bui, Ninh-Thuan Truong:
An Approach to Modeling and Estimating Power Consumption of Mobile Applications. 124-133 - Wanling Xie, Huibiao Zhu, Xi Wu, Phan Cong Vinh
:
Formal Verification of mCWQ Using Extended Hoare Logic. 134-144 - Attasit Patanasiri
, Donyaprueth Krairit:
A Comparative Study of Consumers' Purchase Intention on Different Internet Platforms. 145-159 - Cheonshik Kim, Byung-Gyu Kim, Joel J. P. C. Rodrigues:
Editorial: Recent Advances in Mining Intelligence and Context-Awareness on IoT-Based Platforms. 160-162 - Haein Kim, Geunho Yang, Hosang Jung, Sang Ho Lee, Jae Joon Ahn:
An Intelligent Product Recommendation Model to Reflect the Recent Purchasing Patterns of Customers. 163-170 - Haibo Ye
, Kai Dong, Tao Gu, Zhiqiu Huang:
SMinder: Detect a Left-behind Phone using Sensor-based Context Awareness. 171-183 - Duhoe Kim, Dongil Shin, Dongkyoo Shin, Yong-Hyun Kim:
Attack Detection Application with Attack Tree for Mobile System using Log Analysis. 184-192 - Vishnu Vidyadhara Raju Vegesna, Krishna Gurugubelli
, Anil Kumar Vuppala:
Application of Emotion Recognition and Modification for Emotional Telugu Speech Recognition. 193-201 - Sanjay Chatterji
:
Recommending the Best Merchant from Previous Transactions. 202-207 - Jong-Hyeok Lee, Gwang-Soo Hong, Young-Woon Lee
, Chang-Ki Kim, Noik Park, Byung-Gyu Kim:
Design of Efficient Key Video Frame Protection Scheme for Multimedia Internet of Things (IoT) in Converged 5G Network. 208-220 - Anandakumar Haldorai
, Arulmurugan Ramu
, Chee-Onn Chow:
Editorial: Big Data Innovation for Sustainable Cognitive Computing. 221-223 - R. M. Bommi
, S. Selvakumar Raja:
High Performance Reversible Direct Data Synthesizer for Radio Frequency Applications. 224-233 - Geetha S.
, Deepalakshmi P.:
Enhanced Energy in Sensors by Avoiding Voids and Saving Sensitive Data on Cloud Using B+ Tree Index with Retrieval of Query Predicates. 234-247 - Muhammad Asim Saleem
, Zhou Shijie, Abida Sharif:
Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion. 248-258 - S. Nithya, C. Gomathy:
Smaclad: Secure Mobile Agent Based Cross Layer Attack Detection and Mitigation in Wireless Network. 259-270 - D. Shanthi, S. Vengataasalam:
Dominance Lagrange Optimized Rule Generation for Decision Table Evaluation. 271-281 - T. Prasanth
, M. Gunasekaran:
Effective Big Data Retrieval Using Deep Learning Modified Neural Networks. 282-294
Volume 24, Number 2, April 2019
- Pasumpon Pandian, Joy Iong-Zong Chen, Zubair A. Baig
:
Editorial: Sustainable Mobile Networks and its Applications. 295-297 - J. Reshma, T. Satish Kumar
, B. A. Vani, S. Sakthivel:
Big Data Oriented Energy Aware Routing for Wireless Sensor Networks. 298-306 - P. Tamil Selvi, C. Suresh GhanaDhas:
A Novel Algorithm for Enhancement of Energy Efficient Zone Based Routing Protocol for MANET. 307-317 - M. Padmavathi
, R. M. Suresh:
Secure P2P Intelligent Network Transaction using Litecoin. 318-326 - Giri Prasad Raman
, Venkatesan Perumal:
Group Based Multi-Channel Synchronized Spectrum Sensing in Cognitive Radio Network with 5G. 327-339 - C. Murugesan, C. N. Marimuthu:
Cost optimization of PV-Diesel Systems in Nanogrid Using L J Cuckoo Search and its Application in Mobile Towers. 340-349 - M. Sabrigiriraj, K. Manoharan
:
Wavelength Allotment for All-to-All Broadcast in WDM Optical Modified Linear Array for Reliable Communication. 350-356 - P. Supraja, R. Pitchai, Raja
:
Spectrum Prediction in Cognitive Radio with Hybrid Optimized Neural Network. 357-364 - Haijun Liu, Xiaobing Liu:
A Novel Research on the Influence of Enterprise Culture on Internal Control in big Data and Internet of Things. 365-374 - C. Nallusamy, A. Sabari:
Particle Swarm Based Resource Optimized Geographic Routing for Improved Network Lifetime in MANET. 375-385 - G. Arulkumaran, R. K. Gnanamurthy:
Fuzzy Trust Approach for Detecting Black Hole Attack in Mobile Adhoc Network. 386-393 - Subramanian Balaji
, Eanoch Golden Julie, Yesudhas Harold Robinson
:
Development of Fuzzy based Energy Efficient Cluster Routing Protocol to Increase the Lifetime of Wireless Sensor Networks. 394-406 - T. Ramraj, R. Prabhakar:
Influence of Krylov subspace in Graph Isomorphism for Mobile Networks. 407-419 - Nandhakumar Ramachandran, Varalakshmi Perumal:
Target Aucourant Data Dissemination by Collaboratory Sensing in IOT Environment. 420-433 - Navuri Prema Kumar:
Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE). 434-442 - Trung Quang Duong, Nguyen-Son Vo:
Editorial: Wireless Communications and Networks for 5G and Beyond. 443-446 - Hassan N. Noura
, Reem Melki, Ali Chehab, Mohammad M. Mansour:
A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach. 447-463 - Quoc-Tuan Vien
, Tuan Anh Le, Huan Xuan Nguyen
, Tho Le-Ngoc:
A Physical Layer Network Coding Based Modify-and-Forward with Opportunistic Secure Cooperative Transmission Protocol. 464-479 - Cheng Yin
, Emiliano Garcia-Palacios:
Performance Analysis for Secure Cooperative Systems Under Unreliable Backhaul Over Nakagami-m Channels. 480-490 - Yan Lei
, Gang Zhu, Chao Shen, Yanqing Xu, Xiaozhou Zhang:
Delay-Aware User Association and Power Control for 5G Heterogeneous Network. 491-503 - Truong-Xuan Do, Younghan Kim
:
State Management Function Placement for Service-Based 5G Mobile Core Architecture. 504-516 - Ahmed M. Nor
, Ehab Mahmoud Mohamed
:
Li-Fi Positioning for Efficient Millimeter Wave Beamforming Training in Indoor Environment. 517-531 - Hua Qu, Gongye Ren
, Ji-hong Zhao, Youwei Shi, Zhenjie Tan:
Performance Analysis of the Content Dissemination Mechanism with Proactive Content Fetching and Full-Duplex D2D Communication: an Evolutionary Perspective. 532-555 - Ishtiaq Ahmad, Zeeshan Kaleem
, R. Narmeen, Long D. Nguyen, Dac-Binh Ha:
Quality-of-Service Aware Game Theory-Based Uplink Power Control for 5G Heterogeneous Networks. 556-563 - Sebastián Rodríguez, Antonio Jurado-Navas
, Juan Jose Vegas Olmos, Idelfonso Tafur Monroy
:
Analytical and Experimental Performance Evaluation of Antenna Misalignment in Ka-band Wireless Links. 564-577 - Alaa A. R. Alsaeedy
, Edwin K. P. Chong:
Tracking Area Update and Paging in 5G Networks: a Survey of Problems and Solutions. 578-595 - Dac-Binh Ha, Sang Quang Nguyen
, Huy T. Nguyen:
Cooperative Cognitive Non-Orthgonal Multiple Access Under Unreliable Backhaul Connections. 596-617 - Shahira H. Amin
, Ahmed Hesham Mehana, Yasmine A. Fahmy, Samy S. Soliman
:
Maximizing the Number of Users in Clustered MIMO-NOMA Systems Under Rate Constraints. 618-629 - Tran Manh Hoang, Xuan Nam Tran
, Nguyen Thanh, Le The Dung
:
Performance Analysis of MIMO SWIPT Relay Network with Imperfect CSI. 630-642 - Jaewon Ahn, Joohyung Lee
, Sangdon Park, Hong-Shik Park:
Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment. 643-652 - Jaime Lloret, Sandra Sendra, Elsa María Macías López:
Editorial: Advances in Green Communications and Networking. 653-656 - Alberto Huertas Celdrán
, Manuel Gil Pérez
, Félix J. García Clemente, Gregorio Martínez Pérez:
Policy-Based Management for Green Mobile Networks Through Software-Defined Networking. 657-666 - José Miguel Jiménez, Oscar Romero, Jaime Lloret, Juan R. Diaz:
Energy Savings Consumption on Public Wireless Networks by SDN Management. 667-677 - Sandra Sendra
, Jaime Lloret, Raquel Lacuesta
, José Miguel Jiménez
:
Energy Efficiency in Cooperative Wireless Sensor Networks. 678-687 - Domingo Marrero
, Elsa M. Macías, Álvaro Suárez Sarmiento, Jose Aurelio Santana
, Vicente E. Mena
:
A Method for Power Saving in Dense WiFi Networks. 688-699 - Domingo Marrero
, Elsa M. Macías, Álvaro Suárez Sarmiento, Jose Aurelio Santana
, Vicente E. Mena
:
Energy Saving in Smart City Wireless Backbone Network for Environment Sensors. 700-711 - Juan F. Valenzuela-Valdés
, Francisco Luna
, Pablo Padilla, José Luis Padilla, Rafael Marcos Luque
, Juan Enrique Agudo:
Securing and Greening Wireless Sensor Networks with Beamforming. 712-720
Volume 24, Number 3, June 2019
- Der-Jiunn Deng, Ai-Chun Pang, Lajos Hanzo:
Editorial: Recent Advances in IoT as a Service (IoTaas 2017). 721-723 - Chung-Yun Hsiao
, Chih-Chieh Huang, Yi-Bing Lin, Yun-Wei Lin:
Flower Sermon: An Interactive Visual Design Using IoTtalk. 724-735 - Tzong-Shyan Lin, Pei-Yu Liu, Chun-Cheng Lin
:
Home Healthcare Matching Service System Using the Internet of Things. 736-747 - Bingxian Lu, Lei Wang, Jialin Liu, Wei Zhou, Linlin Guo, Myeong-Hun Jeong, Shaowen Wang, Guangjie Han:
LaSa: Location Aware Wireless Security Access Control for IoT Systems. 748-760 - Fekher Khelifi
, Abbas Bradai, Abderrahim Benslimane, Priyanka Rawat, Mohamed Atri
:
A Survey of Localization Systems in Internet of Things. 761-785 - Lun-Ping Hung, Yuan-Hung Chao
, Chien-Liang Chen
:
A Hybrid Key Item Locating Method to Assist Elderly Daily Life Using Internet of Things. 786-795 - Mahda Noura
, Mohammed Atiquzzaman, Martin Gaedke:
Interoperability in Internet of Things: Taxonomies and Open Challenges. 796-809 - Ming-Fong Tsai, Thanh Nam Pham, Fu-Hsiang Ching, Le-Hung Chen:
Evaluation of the Effect of Variations in Vehicle Velocity and Channel Bandwidth on an Image-Streaming System in Vehicular Networks. 810-828 - Hai-Cheng Chu, Chun-Hsien Sung, Hui-Lin Lee:
The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect. 829-838 - Hsing-Chung Chen
:
Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application. 839-852 - Fang-Chang Kuo
:
Assessment of LTE Wireless Accessing for Managing Traffic Flow of IoT Services. 853-863 - Kuo-Chang Ting, WenYen Lin, Chiapin Wang:
Loading Aware Green Power Control (LAGPC) for the Mitigation of Co-Tier Downlink Interference for Femtocell in the Future 5G Networks. 864-877 - José María de Fuentes
, Lorena González-Manzano, Javier López, Pedro Peris-Lopez
, Kim-Kwang Raymond Choo
:
Editorial: Security and Privacy in Internet of Things. 878-880 - Ana Nieto
, Antonio Acien, Gerardo Fernandez:
Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation. 881-889 - Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li
:
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity. 890-902 - Maryam Zarezadeh, Hamid Mala:
Determining Honesty of Accuser Nodes in Key Revocation Procedure for MANETs. 903-912 - Pradip Kumar Sharma
, Jin Ho Park, Young-Sik Jeong, Jong Hyuk Park
:
SHSec: SDN based Secure Smart Home Network Architecture for Internet of Things. 913-924 - Sebastian Pape
, Kai Rannenberg:
Applying Privacy Patterns to the Internet of Things' (IoT) Architecture. 925-933 - Bei Liang
, Aikaterini Mitrokotsa:
Decentralised Functional Signatures. 934-946 - Yan Zhang, Mithun Mukherjee, Celimuge Wu
, Ming-Tuo Zhou:
Editorial: Advanced Industrial Networks with IoT and Big Data. 947-949 - Wenhui Zhou, Jie Wu, Weifeng Zhong
, Haochuan Zhang, Lei Shu
, Rong Yu:
Optimal and Elastic Energy Trading for Green Microgrids: a two-Layer Game Approach. 950-961 - Song Guo, Deze Zeng, Lin Gu, Jiangtao Luo:
When Green Energy Meets Cloud Radio Access Network: Joint Optimization Towards Brown Energy Minimization. 962-970 - Li Liu, Guangjie Han
, Jiawei Shen, Wenbo Zhang, Yuxin Liu:
Diffusion Distance-Based Predictive Tracking for Continuous Objects in Industrial Wireless Sensor Networks. 971-982 - Xiaolin Jiang, Hossein Shokri Ghadikolaei, Carlo Fischione, Zhibo Pang
:
A Simplified Interference Model for Outdoor Millimeter-wave Networks. 983-990 - Zhi Liu, Toshitaka Tsuda, Hiroshi Watanabe, Satoko Ryuo, Nagateru Iwasawa:
Data Driven Cyber-Physical System for Landslide Detection. 991-1002 - Ke Zhang, Yuming Mao, Supeng Leng, Sabita Maharjan, Alexey V. Vinel, Yan Zhang:
Contract-theoretic Approach for Delay Constrained Offloading in Vehicular Edge Computing Networks. 1003-1014 - Vijayakumar Varadarajan
, Neelanarayanan Venkataraman
, Ron Doyle, Imad Fakhri Alshaikhli, Sven Groppe:
Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks. 1015-1017 - Logesh Ravi, V. Subramaniyaswamy
, Vijayakumar Varadharajan
, Xiong Li
:
Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users. 1018-1033 - Vijayakumar Varadharajan
, Priyan Malarvizhi Kumar, Gandhi Ushadevi, R. Varatharajan, Gunasekaran Manogaran, Prathamesh Vijay Tarare:
E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption. 1034-1045 - Marimuthu Karuppiah
, Ashok Kumar Das, Xiong Li
, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry
, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. 1046-1062 - Avinab Marahatta, Youshi Wang, Fa Zhang, Arun Kumar Sangaiah
, Sumarga Kumar Sah Tyagi
, Zhiyong Liu:
Energy-Aware Fault-Tolerant Dynamic Task Scheduling Scheme for Virtualized Cloud Data Centers. 1063-1077 - Khalim Amjad Meerja
, Praveen V. Naidu
, Sri Rama Krishna Kalva:
Price Versus Performance of Big Data Analysis for Cloud Based Internet of Things Networks. 1078-1094 - Idris Winarno
, Yoshiteru Ishida, Takeshi Okamoto:
A Performance Evaluation of Resilient Server with a Self-Repair Network Model. 1095-1103 - K. Anitha Kumari
, G. Sudha Sadasivam:
Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties. 1104-1119 - Ahmed Ben Said
, Abdelkarim Erradi, Azadeh Ghari Neiat, Athman Bouguettaya
:
A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services. 1120-1133 - Bing Jia, Lifei Hao, Chuxuan Zhang, Huili Zhao, Muhammad Khan:
Correction to: An IoT Service Aggregation Method Based on Dynamic Planning for QoE Restraints. 1134
Volume 24, Number 4, August 2019
- Vijayakumar Varadarajan, Neelanarayanan Venkataraman, Ron Doyle, Imad Fakhri Alshaikhli, Sven Groppe:
Editorial: Mobile Networks in the Era of Big Data. 1135-1138 - G. Ananthachari Preethi
, P. Gauthamarayathirumal, C. Chandrasekar:
Vertical Handover Analysis Using Modified MADM Method in LTE. 1139-1151 - S. Lavanya, N. M. Saravana Kumar, V. Vijayakumar, S. Thilagam:
Secured Key Management Scheme for Multicast Network Using Graphical Password. 1152-1159 - M. Surya Prabha, B. Sarojini:
Online Healthcare Information Adoption Assessment Using Text Mining Techniques. 1160-1165 - S. Rajkumar
, G. Malathi
:
Impact of Image Artifact and Solution to the Image Quality Issues in Real Time SAR Images. 1166-1173 - Bharathiraja S
, B. Rajesh Kanna:
Anti-Forensics Contrast Enhancement Detection (AFCED) Technique in Images Based on Laplace Derivative Histogram. 1174-1180 - Abdul Quadir Muhammed
, Vijayakumar Varadarajan, Karan Mandal:
Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services. 1181-1197 - Abdul Quadir Muhammed
, Vijayakumar Varadarajan, Karan Mandal:
Correction to: Efficient Algorithm for Identification and Cache Based Discovery of Cloud Services. 1198 - Joshua Christy Jackson
, Duraisamy Rekha, Vijayakumar Varadarajan:
A Reputation based Weighted Clustering Protocol in VANET: A Multi-objective Firefly Approach. 1199-1209 - Nikolas Klug, Alok Chauhan, V. Vijayakumar, Ramesh Ragala
:
k-RNN: Extending NN-heuristics for the TSP. 1210-1213 - Prassanna Jayachandran
, Neelanarayanan Venkataraman
:
Threshold Based Multi-Objective Memetic Optimized Round Robin Scheduling for Resource Efficient Load Balancing in Cloud. 1214-1225 - Logesh Ravi, V. Subramaniyaswamy
, Varadarajan Vijayakumar, Siguang Chen, A. Karmel, Malathi Devarajan:
Hybrid Location-based Recommender System for Mobility and Travel Planning. 1226-1239 - Linda Joseph
, Rajeswari Mukesh:
Securing and Self recovery of Virtual Machines in cloud with an Autonomic Approach using Snapshots. 1240-1248 - Ajay D. M.
, E. Umamaheswari:
Packet Encryption for Securing Real-Time Mobile Cloud Applications. 1249-1254 - Mohammed N. M. Ali, M. M. Hafizur Rahman, Rizal Bin Mohd. Nor, Dhiren Kumar Behera
, Tengku Mohd Tengku Sembok, Yasuyuki Miura, Yasushi Inoguchi:
SCCN: A Time-Effective Hierarchical Interconnection Network for Network-On-Chip. 1255-1264 - Muhammad Alam, Ting Wu, Fazl Ullah, Yuanfang Chen:
Editorial: Securing Internet of Things Through Big Data Analytics. 1265-1268 - Lingyan Fan, Wuyi Sun, Guorui Feng:
Image Steganalysis via Random Subspace Fisher Linear Discriminant Vector Functional Link Network and Feature Mapping. 1269-1278 - Jia Liu, Mingchu Li, Muhammad Alam, Yuanfang Chen, Ting Wu:
A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism. 1279-1294 - Syed Rooh Ullah Jan, Mian Ahmad Jan
, Rahim Khan
, Hakeem Ullah, Muhammad Alam, Muhammad Usman
:
An Energy-Efficient and Congestion Control Data-Driven Approach for Cluster-Based Sensor Network. 1295-1305 - Haroon Khan, Mian Ahmad Jan, Muhammad Alam, Wael Dghais:
A Channel Borrowing Approach for Cluster-based Hierarchical Wireless Sensor Networks. 1306-1316 - Weitong Hu, Ye Yao, Di Zhou, Qiuhua Zheng, Kim-Kwang Raymond Choo
:
A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method. 1317-1335 - Guangpei Cong, Duhui Lu, Yunrong Lv, Yi He:
A Novel Industrial Safety IoTs Architecture for External Corrosion Perception Based on Infrared. 1336-1345 - Song Guo, Zhen Liu, Peng Li:
Editorial: Big Data and Cyber-Physical-Social Computing. 1346-1347 - J. V. Bibal Benifa
, Dejey Dharma:
RLPAS: Reinforcement Learning-based Proactive Auto-Scaler for Resource Provisioning in Cloud Environment. 1348-1363 - Rachad Atat, Lingjia Liu
, Jinsong Wu
, Jonathan D. Ashdown, Yang Yi:
Green Massive Traffic Offloading for Cyber-Physical Systems over Heterogeneous Cellular Networks. 1364-1372 - Xiaoping Fan, Zhijie Chen, Fei Cai, Jinsong Wu
, Shengzong Liu, Zhining Liao, Zhifang Liao
:
Local Core Members Aided Community Structure Detection. 1373-1381 - Zhifang Liao, Benhong Zhao, Shengzong Liu, Haozhi Jin, Dayu He, Liu Yang, Yan Zhang, Jinsong Wu
:
A Prediction Model of the Project Life-Span in Open Source Software Ecosystem. 1382-1391 - Munish Bhatia
, Sandeep K. Sood:
Exploring Temporal Analytics in Fog-Cloud Architecture for Smart Office HealthCare. 1392-1410
Volume 24, Number 5, October 2019
- Bo Li, Song Xiao, Yong Li:
Editorial: Networking and Communications for the Next Generation IoT. 1411-1413 - Gunasekaran Raja, Anil Thomas
:
SAFER: Crowdsourcing Based Disaster Monitoring System Using Software Defined Fog Computing. 1414-1424