| Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks |
35 |
| Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks |
29 |
| Robustness Optimization Scheme With Multi-Population Co-Evolution for Scale-Free Wireless Sensor Networks |
29 |
| One More Tag Enables Fine-Grained RFID Localization and Tracking |
25 |
| Deploying Chains of Virtual Network Functions: On the Relation Between Link and Server Usage |
22 |
| Delay-Aware Grid-Based Geographic Routing in Urban VANETs: A Backbone Approach |
22 |
| Online Scaling of NFV Service Chains Across Geo-Distributed Datacenters |
21 |
| An Efficient Computation Offloading Management Scheme in the Densely Deployed Small Cell Networks With Mobile Edge Computing |
19 |
| On-Line Anomaly Detection With High Accuracy |
19 |
| Incentive Mechanism for Privacy-Aware Data Aggregation in Mobile Crowd Sensing Systems |
19 |
| Dynamic Service Migration in Mobile Edge Computing Based on Markov Decision Process |
18 |
| Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold |
17 |
| Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks |
17 |
| Stable Local Broadcast in Multihop Wireless Networks Under SINR |
17 |
| Fast RFID Sensory Data Collection: Trade-off Between Computation and Communication Costs |
14 |
| Efficient Range Queries for Large-Scale Sensor-Augmented RFID Systems |
14 |
| Charging Utility Maximization in Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously |
14 |
| VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks |
14 |
| Radiation Constrained Scheduling of Wireless Charging Tasks |
13 |
| Probability Prediction-Based Reliable and Efficient Opportunistic Routing Algorithm for VANETs |
13 |
| Optimal Network Service Chain Provisioning |
13 |
| Low-Complexity Distributed Radio Access Network Slicing: Algorithms and Experimental Results |
12 |
| Decentralized Algorithm for Randomized Task Allocation in Fog Computing Systems |
12 |
| On Efficient Tree-Based Tag Search in Large-Scale RFID Systems |
11 |
| Joint Resource Allocation for Software-Defined Networking, Caching, and Computing |
11 |
| On the Network-Layer Modeling and Configuration of Programmable Wireless Environments |
11 |
| Accurate Recovery of Internet Traffic Data Under Variable Rate Measurements |
11 |
| Accurate Recovery of Internet Traffic Data: A Sequential Tensor Completion Approach |
10 |
| A Distributed Computation Offloading Strategy in Small-Cell Networks Integrated With Mobile Edge Computing |
9 |
| Wireless Charger Placement for Directional Charging |
9 |
| Multi-Tier Caching Analysis in CDN-Based Over-the-Top Video Streaming Systems |
9 |
| An Online Context-Aware Machine Learning Algorithm for 5G mmWave Vehicular Communications |
9 |
| P-3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization |
9 |
| Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints |
9 |
| RL-NSB: Reinforcement Learning-Based 5G Network Slice Broker |
9 |
| Delving Into Internet DDoS Attacks by Botnets: Characterization and Analysis |
8 |
| LBP: Robust Rate Adaptation Algorithm for SVC Video Streaming |
8 |
| Sponsoring Mobile Data: Analyzing the Impact on Internet Stakeholders |
8 |
| Low-Latency Scheduling in MPTCP |
8 |
| Achieving High Scalability Through Hybrid Switching in Software-Defined Networking |
8 |
| A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems |
7 |
| TipTop: (Almost) Exact Solutions for Influence Maximization in Billion-Scale Networks |
7 |
| Efficient Loop-Free Rerouting of Multiple SDN Flows |
7 |
| Approximation Algorithms for Sweep Coverage Problem With Multiple Mobile Sensors |
7 |
| RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries |
7 |
| Statistical Multiplexing and Traffic Shaping Games for Network Slicing |
7 |
| Breach-Free Sleep-Wakeup Scheduling for Barrier Coverage With Heterogeneous Wireless Sensors |
7 |
| Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic |
7 |
| Security Policy Violations in SDN Data Plane |
7 |
| Multi-Touch in the Air: Concurrent Micromovement Recognition Using RF Signals |
7 |