Computer Communications最新文献

筛选
英文 中文
Energy efficient LEO satellite communications: Traffic-aware payload switch-off techniques 高能效低地轨道卫星通信:流量感知有效载荷开关技术
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-12 DOI: 10.1016/j.comcom.2025.108122
Vaibhav Kumar Gupta , Hayder Al-Hraishawi , Eva Lagunas , Symeon Chatzinotas
{"title":"Energy efficient LEO satellite communications: Traffic-aware payload switch-off techniques","authors":"Vaibhav Kumar Gupta ,&nbsp;Hayder Al-Hraishawi ,&nbsp;Eva Lagunas ,&nbsp;Symeon Chatzinotas","doi":"10.1016/j.comcom.2025.108122","DOIUrl":"10.1016/j.comcom.2025.108122","url":null,"abstract":"<div><div>Low Earth orbit (LEO) satellite constellations have a pivotal role in shaping the future of communication networks by providing extensive global coverage. However, ensuring the long-term viability of LEO constellations relies on addressing significant challenges, particularly in the domains of energy efficiency and maximizing the lifespan of satellites. This paper introduces a novel approach that considers user traffic demands to optimize power consumption. By implementing a traffic-aware strategy, redundant satellites can be intelligently switched-off, resulting in significant power savings within the LEO constellation. To accomplish this objective, we formulate the problem of joint satellite beam assignment and beam power allocation as a mixed binary integer optimization problem while carefully considering the constraints imposed by satellite-user visibility and the need to fulfill the data traffic requirements of all ground users. To tackle the formulated problem, we employ a framework called the Difference of Convex Programming and Multiplier Penalty (DCMP) based convexification approach, which ensures convergence to a local optimum. The reformulated convex problem is solved using the low-complexity iterative algorithm, Successive Convex Approximation (SCA). Additionally, we propose a heuristic algorithm based on slant distance, which offers a simplified and efficient solution to the joint problem. To corroborate the effectiveness and validity of the proposed techniques, we assess and compare their performance via simulations, considering practical constellation patterns and realistic user traffic distribution. It has been shown that approximately 43% of the satellite nodes can be switched-off for energy saving, and thus, extending the constellation lifetime and reducing the aggregated interference from multi-beam satellites.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108122"},"PeriodicalIF":4.5,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143620518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Powered Resilience: A Dual-Approach for Outage Management in Dense Cellular Networks 人工智能支持的弹性:密集蜂窝网络中中断管理的双重方法
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-12 DOI: 10.1016/j.comcom.2025.108129
Waseem Raza , Muhammad Umar Bin Farooq , Aneeqa Ijaz , Marvin Manalastas , Ali Imran
{"title":"AI-Powered Resilience: A Dual-Approach for Outage Management in Dense Cellular Networks","authors":"Waseem Raza ,&nbsp;Muhammad Umar Bin Farooq ,&nbsp;Aneeqa Ijaz ,&nbsp;Marvin Manalastas ,&nbsp;Ali Imran","doi":"10.1016/j.comcom.2025.108129","DOIUrl":"10.1016/j.comcom.2025.108129","url":null,"abstract":"<div><div>As 5G evolves to 6G, network management faces growing challenges with increasing base station density, leading to more frequent outages. To address this, we introduce a robust, automated two-tier framework for outage management. The first tier involves an artificial intelligence-based outage detection scheme using an enhanced XGBoost model (Impv-XGBoost), which incorporates autoencoder outputs for hyperparameter tuning. The analysis shows Impv-XGBoost’s superior performance in high shadowing conditions and with sparse data, outperforming existing methods. The second tier adopts an actor–critic reinforcement learning strategy for outage compensation by adjusting the tilt of the neighboring base station and power. To prevent service declines to connected user equipment, our compensation scheme accounts for both outage-affected users and those connected to compensating base stations. We design a reward scheme that combines Jain’s fairness index and the geometric mean of the reference signal received power to ensure fairness and enhance convergence. Performance evaluations for single and multiple base station failures show coverage improvements for outage-affected users without compromising the coverage of the users in compensating base stations.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108129"},"PeriodicalIF":4.5,"publicationDate":"2025-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143642705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT edge network interoperability 物联网边缘网络互操作性
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-11 DOI: 10.1016/j.comcom.2025.108125
Tanzima Azad , M.A. Hakim Newton , Jarrod Trevathan , Abdul Sattar
{"title":"IoT edge network interoperability","authors":"Tanzima Azad ,&nbsp;M.A. Hakim Newton ,&nbsp;Jarrod Trevathan ,&nbsp;Abdul Sattar","doi":"10.1016/j.comcom.2025.108125","DOIUrl":"10.1016/j.comcom.2025.108125","url":null,"abstract":"<div><div>Network interoperability is crucial for achieving seamless communication across Internet of Things (IoT) environments. IoT comprises heterogeneous devices and systems supporting diverse technologies, protocols, and manufacturers. Enabling devices to communicate and exchange data effectively, regardless of underlying protocols, is key to building cohesive and integrated IoT networks. IoT has transformed multiple sectors ranging from home automation to healthcare—by harnessing a vast array of sensors and actuators that communicate through cloud, fog, and edge layers. However, the variety in device manufacturing and communication standards demands interoperable interfaces, and most current solutions depend on cloud-based centralised architectures. These architectures introduce latency and scalability challenges, particularly for resource-constrained IoT devices that often struggle to communicate with the cloud due to limited resources. This paper addresses network interoperability at the IoT edge level, focusing on resource-efficient communication by integrating Wi-Fi and Bluetooth, two commonly used protocols in IoT ecosystems. We have implemented a network edge interoperability solution that supports effective data exchange between devices operating on these distinct protocols, enhancing the overall efficiency, flexibility, and scalability of IoT systems. Our approach allows devices interoperate by addressing network latency and bandwidth limitations, incorporating an integrated controller to facilitate broader applications and enhance performance across IoT networks. Our findings illustrate how bridging protocol differences can foster more resilient and adaptable IoT solutions, advancing the deployment of IoT applications across various domains and use cases.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108125"},"PeriodicalIF":4.5,"publicationDate":"2025-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143611557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stochastic analysis of the Gasper protocol Gasper协议的随机分析
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-10 DOI: 10.1016/j.comcom.2025.108123
Cosimo Laneve , Adele Veschetti
{"title":"A stochastic analysis of the Gasper protocol","authors":"Cosimo Laneve ,&nbsp;Adele Veschetti","doi":"10.1016/j.comcom.2025.108123","DOIUrl":"10.1016/j.comcom.2025.108123","url":null,"abstract":"<div><div>Ethereum has recently switched to a Proof of Stake consensus protocol called Gasper. We analyze Gasper using <span>PRISM+</span>, an extension of the probabilistic model checker <span>PRISM</span> with primitives for modeling blockchain data types. <span>PRISM+</span> is therefore used to rapidly and automatically analyze the robustness of Gasper when tuning, up or down, several basic parameters of the protocol, such as network latencies and number of validators. We also study the effectiveness of Gasper in updating stakes and its resilience to three attacks: the balance, bouncing and time attacks.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108123"},"PeriodicalIF":4.5,"publicationDate":"2025-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143683859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resiliency focused proactive lifecycle management for stateful microservices in multi-cluster containerized environments 针对多集群容器化环境中有状态微服务的弹性主动式生命周期管理
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-08 DOI: 10.1016/j.comcom.2025.108111
Abd Elghani Meliani, Mohamed Mekki, Adlen Ksentini
{"title":"Resiliency focused proactive lifecycle management for stateful microservices in multi-cluster containerized environments","authors":"Abd Elghani Meliani,&nbsp;Mohamed Mekki,&nbsp;Adlen Ksentini","doi":"10.1016/j.comcom.2025.108111","DOIUrl":"10.1016/j.comcom.2025.108111","url":null,"abstract":"<div><div>Containerization has become fundamental to deploying cloud-native applications, allowing for the packaging and independent execution of applications. This approach speeds up deployment processes and facilitates the creation of various environments for feature testing. However, the ephemeral nature of containers poses a significant challenge to data persistence, especially during container restarts or migrations across different hosts. This paper proposes a proactive zero-touch management solution for stateful microservices applications, ensuring seamless application lifecycle management. Our solution integrates seamlessly with container platforms such as Kubernetes and supports multi-cluster environments, enhancing fault tolerance and data persistence in stateful applications. The solution has been thoroughly tested on different hardware configurations in the public cloud and with our on-premises servers.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108111"},"PeriodicalIF":4.5,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143592455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A defense mechanism for federated learning in AIoT through critical gradient dimension extraction 基于临界梯度维数提取的AIoT联合学习防御机制
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-05 DOI: 10.1016/j.comcom.2025.108114
Jian Xu , Bing Guo , Fei Chen , Yan Shen , Shengxin Dai , Cheng Dai , Yuchuan Hu
{"title":"A defense mechanism for federated learning in AIoT through critical gradient dimension extraction","authors":"Jian Xu ,&nbsp;Bing Guo ,&nbsp;Fei Chen ,&nbsp;Yan Shen ,&nbsp;Shengxin Dai ,&nbsp;Cheng Dai ,&nbsp;Yuchuan Hu","doi":"10.1016/j.comcom.2025.108114","DOIUrl":"10.1016/j.comcom.2025.108114","url":null,"abstract":"<div><div>Leveraging the distributed nature of the Internet of Things (IoT), Federated Learning (FL) facilitates knowledge transfer among heterogeneous IoT devices, enhancing the capabilities of Artificial Intelligence of Things (AIoT) while preserving data privacy. However, FL is susceptible to poisoning attacks such as label flipping, Gaussian, and backdoor attacks. Most existing defense strategies rely on robust aggregation algorithms that use the statistical properties of gradient vectors to counteract poisoning attacks, however, they often overlook the non-independent and identically distributed (non-iid) nature of client data, limiting their effectiveness in the IoT. We propose a method that combines cross-node Top-k gradient vector compression and Principal Component Analysis (PCA) dimensionality reduction to extract critical gradient dimensions. By clustering these essential dimensions and performing filtering, our approach effectively distinguishes malicious from benign clients in non-iid data scenarios. Additionally, we introduce a client trust-score assessment mechanism that continuously monitors client behavior and applies secondary filtering, further improving the identification of malicious clients. Experimental results on the CIFAR-10, MNIST, DomainNet, and Flowers102 datasets demonstrate that our method achieves higher model accuracy and robustness in non-iid data settings compared to existing defense strategies.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108114"},"PeriodicalIF":4.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143611555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SQID: A deep learning and network design synergy for next-generation IoT resource allocation management SQID:用于下一代物联网资源分配管理的深度学习和网络设计协同
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-05 DOI: 10.1016/j.comcom.2025.108128
Ali. M.A. Ibrahim , Zhigang Chen , Yijie Wang , Hala A. Eljailany
{"title":"SQID: A deep learning and network design synergy for next-generation IoT resource allocation management","authors":"Ali. M.A. Ibrahim ,&nbsp;Zhigang Chen ,&nbsp;Yijie Wang ,&nbsp;Hala A. Eljailany","doi":"10.1016/j.comcom.2025.108128","DOIUrl":"10.1016/j.comcom.2025.108128","url":null,"abstract":"<div><div>The exponential growth of mobile broadband and Internet of Things (IoT) devices has pushed traditional IoT models to their operational limits, necessitating more efficient data management strategies. This research introduces the SQID framework, a solution that integrates advanced techniques, including Sierpinski triangle design (STD) for network optimization, quantum density peak clustering (QDPC) for intelligent device clustering, and improved deep deterministic policy gradient (IDDPG) for deep learning-driven traffic prediction. By utilizing STD to optimize device communication, the framework applies the QDPC algorithm to efficiently cluster devices, ensuring balanced packet distribution and minimizing latency. Additionally, IDDPG enhances network performance by enabling accurate traffic prediction and resource allocation, optimizing data transmission. Extensive simulations reveal that SQID outperforms existing methods in critical metrics such as time efficiency, latency reduction, throughput maximization, and packet loss. These results indicate that SQID has the potential to significantly improve data management in IoT networks, paving the way for next-generation IoT advancements.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108128"},"PeriodicalIF":4.5,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143611556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting an entity by hiding its role in anonymity networks 通过在匿名网络中隐藏其角色来保护实体
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-04 DOI: 10.1016/j.comcom.2025.108109
Reza Mirzaei, Nasser Yazdani, Mohammad Sayad Haghighi
{"title":"Protecting an entity by hiding its role in anonymity networks","authors":"Reza Mirzaei,&nbsp;Nasser Yazdani,&nbsp;Mohammad Sayad Haghighi","doi":"10.1016/j.comcom.2025.108109","DOIUrl":"10.1016/j.comcom.2025.108109","url":null,"abstract":"<div><div>Knowing the role of entities in a network undermines anonymity and facilitates the identification of their behavioral patterns. In many existing low-latency anonymity network structures, the creation and use of tunnels for packet transmission allow adversaries to discern the roles of entities. This paper explores the impact of identifying these tunnels, specifically how such identification can expose an entity’s role in relation to a particular message, potentially reducing the level of anonymity in the network. To explore this, we first discuss two key aspects of anonymity networks: the distribution of information and the homogeneity of roles. We then analyze several low-latency anonymity structures to assess vulnerabilities related to tunnel identification, evaluating their strengths and weaknesses based on the aforementioned aspects. In addition, we propose a novel network structure that addresses these vulnerabilities by eliminating the conventional tunnel mechanism, which typically requires a tunnel establishment message. This change prevents adversaries from identifying an entity’s role. In the proposed structure, the sender and intermediate relays work together to select distinct routes for each packet, removing the need for the sender to establish a dedicated data tunnel. To provide a deeper analysis, we will describe in detail the information an attacker can obtain by tracing tunneling messages and how this compromises anonymity by exposing the roles of entities. We will also evaluate how these changes affect the degree of anonymity based on the attacker’s knowledge. Our evaluation shows that the proposed technique effectively eliminates traffic patterns that would normally reveal the roles of entities, thus neutralizing the attacker’s ability to compromise anonymity. As a result, the average level of anonymity is significantly improved compared to previous structures. Overall, our findings suggest that the proposed approach offers a more effective strategy for concealing the roles of entities compared to earlier methods.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"237 ","pages":"Article 108109"},"PeriodicalIF":4.5,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143704274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing UAV delivery for pervasive systems through blockchain integration and adversarial machine learning 通过区块链集成和对抗性机器学习优化普及系统的无人机交付
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-03 DOI: 10.1016/j.comcom.2025.108113
Chengzu Dong , Shantanu Pal , Aiting Yao , Frank Jiang , Shiping Chen , Xiao Liu
{"title":"Optimizing UAV delivery for pervasive systems through blockchain integration and adversarial machine learning","authors":"Chengzu Dong ,&nbsp;Shantanu Pal ,&nbsp;Aiting Yao ,&nbsp;Frank Jiang ,&nbsp;Shiping Chen ,&nbsp;Xiao Liu","doi":"10.1016/j.comcom.2025.108113","DOIUrl":"10.1016/j.comcom.2025.108113","url":null,"abstract":"<div><div>Unmanned Aerial Vehicles (UAVs), play a significant role in the advancement of pervasive systems by providing efficient, scalable, and innovative solutions in various sectors, such as smart cities or location-based services. However, the current UAV delivery scenario presents various challenges for recipients, including lengthy identity verification processes, privacy concerns, and risks of fraud and theft. In response to these issues, this paper proposes an innovative system that leverages Blockchain technology and Adversarial Machine Learning (AML) to tackle these problems effectively. The proposed system streamlines the verification process, enhances privacy safeguards, and reduces fraud risks. The integration of AML is crucial as it enables users to have greater control over their personal data, boosting privacy and security. AML also plays a critical role in this system by creating test scenarios that reinforce the machine learning model against adversarial threats, ensuring its precision and dependability in the face of malicious manipulations. The paper also provides details on the practical implementation and evaluation of this system in real-life adversarial situations. The evaluation results demonstrate superior performance on selected metrics, highlighting the potential of this system as an effective solution for verifying recipients in UAV delivery.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108113"},"PeriodicalIF":4.5,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143580334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards green networking: Efficient dynamic radio resource management in Open-RAN slicing using deep reinforcement learning and transfer learning 迈向绿色网络:使用深度强化学习和迁移学习的Open-RAN切片中高效动态无线电资源管理
IF 4.5 3区 计算机科学
Computer Communications Pub Date : 2025-03-01 DOI: 10.1016/j.comcom.2025.108126
Heba Sherif, Eman Ahmed, Amira M. Kotb
{"title":"Towards green networking: Efficient dynamic radio resource management in Open-RAN slicing using deep reinforcement learning and transfer learning","authors":"Heba Sherif,&nbsp;Eman Ahmed,&nbsp;Amira M. Kotb","doi":"10.1016/j.comcom.2025.108126","DOIUrl":"10.1016/j.comcom.2025.108126","url":null,"abstract":"<div><div>Next Generation Wireless Networks (NGWNs) are characterized by agility and flexibility. It introduces new technologies such as network slicing (NS) and Open Radio Access Network (O-RAN). NS supports multiple services with different requirements whereas O-RAN supports different network suppliers and provides Mobile Network Operators (MNOs) more intelligent control. Deep Reinforcement Learning (DRL) techniques have been presented to address resource management and other problems in NGWNs in recent years. However, instability and lateness in convergence are the main obstacles against their adoption in live networks. Moreover, deep learning models consume lots of energy and emit significant amounts of carbon dioxide which badly impacts climate. This paper addresses solving the dynamic radio resource management (RRM) problem in O-RAN slicing with DRL and Transfer Learning (TL), focusing on proposing a green model that minimizes power and energy consumption, decreasing the carbon footprint. A new latency-and-reliability-based reward function is designed. Then, a variable threshold action filtration mechanism is proposed, and a policy TL approach is proposed to accelerate the performance in commercial networks. Compared with the state-of-the-art, this work significantly improved exploration stability, convergence speed, Quality of Service (QoS) satisfaction, power and energy consumption, and emitted carbon footprint.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"236 ","pages":"Article 108126"},"PeriodicalIF":4.5,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143628923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信