|
|
|
Xin Liao and Khoi D. Hoang
Distributed Constraint Optimization Problems (DCOPs) are an efficient framework widely used in multi-agent collaborative modeling. The traditional DCOP framework assumes that variables are discrete and constraint utilities are represented in tabular form...
ver más
|
|
|
|
|
|
|
Yumei Cao, Peng Li, Tianmian Liang, Xiaojun Wu, Xiaoming Wang and Yuanru Cui
Opportunities networks? message transmission is significantly impacted by routing prediction, which has been a focus of opportunity network research. The network of student nodes with smart devices is a particular type of opportunity network in the campu...
ver más
|
|
|
|
|
|
|
Libin Xue and Chunjie Cao
When marine animals and underwater acoustic sensor networks (UASNs) share spectrum resources, problems such as serious harm caused to marine animals by underwater acoustic systems and scarcity of underwater spectrum resources are encountered. To address ...
ver más
|
|
|
|
|
|
|
Nida Zamir, Bakhtiar Ali, Muhammad Fasih Uddin Butt, Muhammad Awais Javed, Byung Moo Lee and Soon Xin Ng
In this contribution, we investigate the performance of an untrusted relaying system when Cooperative Jammers (CJs) are available. We propose two scenarios, Untrusted Relaying-aided Multiple Cooperative-Jammers-based Simultaneous Transmission (UR-MCJST) ...
ver más
|
|
|
|
|
|
|
Mazen Alowish, Yoshiaki Shiraishi, Masami Mohri and Masakatu Morii
The Internet of connected vehicles (IoCV) has made people more comfortable and safer while driving vehicles. This technology has made it possible to reduce road casualties; however, increased traffic and uncertainties in environments seem to be limitatio...
ver más
|
|
|
|
|
|
|
Yixin He, Daosen Zhai, Dawei Wang, Xiao Tang and Ruonan Zhang
In this paper, we investigate the relay selection problem for the unmanned aerial vehicle (UAV)-assisted vehicular ad-hoc networks (VANETs). For the considered network, we first model and analyze the link quality of service (LQoS) from the source node (S...
ver más
|
|
|
|
|
|
|
Qingfeng Jiang, Kun Deng, Lei Zhang and Chun Liu
In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility. The privacy information of encounter time and freq...
ver más
|
|
|
|
|
|
|
Qiuming Liu, Shumin Liu, Chunshui Zeng, Xiaohong Qiu and He Xiao
We consider wireless multi-hop networks in which each node aims to securely transmit a message. To guarantee the secure transmission, we employ an independent randomization encoding strategy to encode the confidential message. We aim to maximize the netw...
ver más
|
|
|
|
|
|
|
Peiyan Yuan and Hai Yu
Nodes in Mobile Opportunistic Network (MON) have to cache packets to deal with the intermittent connection. The buffer management strategy obviously impacts the performance of MON, and it attracts more attention recently. Due to the limited storage capac...
ver más
|
|
|
|