Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List no author result Created with Sketch.
Loading Scinapse...
IF
1.98
Papers
2582
Papers 2548
1 page of 255 pages (2,548 results)
Newest
2019 in Wireless NetworksIF: 1.98
Sutanu Ghosh1
Estimated H-index: 1
,
Tamaghna Acharya7
Estimated H-index: 7
,
Santi P. Maity17
Estimated H-index: 17
Source Cite
2019 in Wireless NetworksIF: 1.98
XiaoMing Li (Tianjin University), Qiang Tian (Tianjin University)+ 2 AuthorsXiaoxian Yang
With the fast development of mobile Internet, people’s social exchange media has transformed from the traditional social network to mobile network. With the explosion of massive information, it has become an interesting topic to detect network user groups with close correlation in the mobile social network. These groups are hidden in the continuously changing relations of social network, and it is very difficult to obtain the information of entire social network. In addition, these social relati...
1 Citations Source Cite
2019 in Wireless NetworksIF: 1.98
Sandhya Aneja5
Estimated H-index: 5
,
Preeti Nagrath3
Estimated H-index: 3
,
G. N. Purohit1
Estimated H-index: 1
Source Cite
2019 in Wireless NetworksIF: 1.98
Chunyu Pan1
Estimated H-index: 1
,
Changchuan Yin11
Estimated H-index: 11
+ 1 AuthorsJian Yu1
Estimated H-index: 1
Source Cite
2019 in Wireless NetworksIF: 1.98
Mohamed Elsherief (Menoufia University), Mohamed Elwekeil2
Estimated H-index: 2
(Menoufia University),
Mohammed Abd-Elnaby3
Estimated H-index: 3
(Menoufia University)
This paper presents a novel resource and power allocation scheme for device-to-device (D2D) communications overlaying cellular networks. The proposed scheme is implemented in two consecutive steps. The first step depends on implementing a vital algorithm that guarantees fairness in resource allocation among different D2D pairs by allocating the best subcarriers for every user such that every link’s data rate requirements can be satisfied. The second step utilizes the water-filling algorithm for ...
Source Cite
2019 in Wireless NetworksIF: 1.98
Adeniyi Onasanya1
Estimated H-index: 1
,
Sari Lakkis1
Estimated H-index: 1
,
Maher Elshakankiri1
Estimated H-index: 1
Source Cite
2019 in Wireless NetworksIF: 1.98
Adeniyi Onasanya1
Estimated H-index: 1
,
Maher Elshakankiri1
Estimated H-index: 1
Source Cite
2019 in Wireless NetworksIF: 1.98
A. Dhanapal (VIT University), P. Nithyanandam (VIT University)
The cloud computing has inherent challenges to detect the Hyper Text Transfer Protocol (HTTP) flooding Distributed Denial of Service (DDoS) attack due to its natural characteristics like virtualization, elasticity and multi-tenancy. The usage of cloud computing is user-friendly, but the implementation of the cloud infrastructure such as compute node, networking, cloud storage is very complex in order to achieve its various characteristics. Similarly, detecting the HTTP flooding attack in the clo...
Source Cite
2019 in Wireless NetworksIF: 1.98
Haina Tang (Chinese Academy of Sciences), Xiangpeng Zhao (Chinese Academy of Sciences), Yongmao Ren (Chinese Academy of Sciences)
Geolocation is important for many emerging applications such as disaster management and recommendation system. In this paper, we propose a multilayer recognition model (MRM) to predict the city-level location for social network users, solely based on the user’s tweet content. Through a series of optimizations such as entity selection, spatial clustering and outlier filtering, suitable features are extracted to model the geographic coordinates of tweet users. Then, the Multinomial Naive Bayes is ...
Source Cite
12345678910