SAM: A semantic-aware multi-tiered source de-duplication framework for cloud backup

Y Tan, H Jiang, D Feng, L Tian, Z Yan… - … on Parallel Processing, 2010 - ieeexplore.ieee.org
Existing de-duplication solutions in cloud backup environment either obtain high
compression ratios at the cost of heavy de-duplication overheads in terms of increased …

Enabling computational intelligence for green Internet of Things: Data-driven adaptation in LPWA networking

C Zhang, M Dong, K Ota - IEEE Computational Intelligence …, 2020 - ieeexplore.ieee.org
With the exponential expansion of the number of Internet of Things (IoT) devices, many state-
of-the-art communication technologies are being developed to use the lowerpower but …

On performance modeling for MANETs under general limited buffer constraint

J Liu, Y Xu, Y Shen, X Jiang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Understanding the real achievable performance of mobile ad hoc networks (MANETs) under
practical network constraints is of great importance for their applications in future highly …

Exact secrecy throughput capacity study in mobile ad hoc networks

X Li, Y Zhang, S Zhao, Y Shen, X Jiang - Ad Hoc Networks, 2018 - Elsevier
The secrecy throughput capacity (STC) performance study of mobile ad hoc networks
(MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite …

Non-asymptotic capacity study in multicast mobile ad hoc networks

B Yang, Z Wu, Y Fan, X Jiang, S Shen - IEEE Access, 2019 - ieeexplore.ieee.org
Extensive efforts on capacity studies for the mobile ad hoc networks (MANETs) mainly focus
on either the unicast traffic or the asymptotic results under multicast traffic. However, the …

Deadline-constrained connection request scheduling in mobile relay-assisted LTE networks

MJ Khabbaz, HA Artail - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
Connection and service request scheduling affects the performance of a mobile relay node
(MRN) in a relay-assisted long-term evolution network in terms of crucial quality-of-service …

Modified device key generation algorithm and A* algorithm to optimize the security measures based on trust value in device-to-device communications

VM Gayathri, P Supraja, AR Sulthana, P Mukunthan - Soft Computing, 2022 - Springer
Security plays a vital role in communication networks. Since the nodes are mobile in mobile
ad hoc networks (MANET), they are vulnerable to different types of attacks. Because of its …

On throughput capacity of large-scale ad hoc networks with realistic buffer constraint

Y Xu, J Liu, Y Shen, X Li, X Jiang - Wireless Networks, 2017 - Springer
The problem of determining the throughput capacity of an ad hoc network is addressed.
Previous studies mainly focused on the infinite buffer scenario, however, in this paper we …

Deadline-aware ue service scheduling in mobile-relay-augmented cellular networks

M Khabbaz, H Artail - 2019 IEEE Wireless Communications …, 2019 - ieeexplore.ieee.org
Connection and Service Request (CSR) scheduling affects the performance of a Mobile
Relay Node (MRN) in relay-assisted LTE network in terms of crucial Quality-of-Service (QoS) …

Resource allocation for throughput optimization in buffer-limited mobile ad hoc networks

J Liu, Y Xu, R Ando, H Takakura… - … on Networking and …, 2017 - ieeexplore.ieee.org
This paper studies the throughput optimization for buffer-limited mobile ad hoc networks
(MANETs) based on resource allocation policies. Specifically, we consider a practical …