首页 > 最新文献

Computer Communications最新文献

英文 中文
Making TCP IoT-friendly towards the 6G era 面向6G时代,使TCP物联网友好
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-12-27 DOI: 10.1016/j.comcom.2025.108406
Carles Gomez , Jon Crowcroft
Traditionally, Internet of Things (IoT) communication technologies have been designed to offer low bit rates (from ∼102 to ∼106 bit/s). However, recent IoT-intended technologies like 5G Reduced Capability (RedCap) support significantly greater bit rates (up to ∼108 bit/s), enabling emerging IoT use cases that demand greater capacity. Thus, the spectrum of IoT scenarios and corresponding requirements is expanding, a trend which is expected to continue with 6G networks. In this context, support, configuration and performance of a crucial upper-layer protocol like TCP become challenging. In this paper, based on our IETF standardization work, we describe how TCP can run suitably on a wide variety of IoT environments (from highly constrained scenarios to resource-rich ones). Furthermore, we present and study the novel TCP option called TCP Acknowledgment Rate Request (TARR), designed for further TCP adaptability, which is particularly useful for current and future IoT networks.
传统上,物联网(IoT)通信技术被设计为提供低比特率(从~ 102到~ 106比特/秒)。然而,最近的物联网技术,如5G低容量(RedCap),支持更高的比特率(高达~ 108比特/秒),使新兴的物联网用例需要更大的容量。因此,物联网场景的范围和相应的需求正在扩大,预计6G网络将继续这一趋势。在这种情况下,像TCP这样重要的上层协议的支持、配置和性能变得具有挑战性。在本文中,基于我们的IETF标准化工作,我们描述了TCP如何在各种物联网环境(从高度受限的场景到资源丰富的场景)上适当地运行。此外,我们提出并研究了一种新的TCP选项,称为TCP确认率请求(TARR),旨在进一步提高TCP的适应性,这对当前和未来的物联网网络特别有用。
{"title":"Making TCP IoT-friendly towards the 6G era","authors":"Carles Gomez ,&nbsp;Jon Crowcroft","doi":"10.1016/j.comcom.2025.108406","DOIUrl":"10.1016/j.comcom.2025.108406","url":null,"abstract":"<div><div>Traditionally, Internet of Things (IoT) communication technologies have been designed to offer low bit rates (from ∼10<sup>2</sup> to ∼10<sup>6</sup> bit/s). However, recent IoT-intended technologies like 5G Reduced Capability (RedCap) support significantly greater bit rates (up to ∼10<sup>8</sup> bit/s), enabling emerging IoT use cases that demand greater capacity. Thus, the spectrum of IoT scenarios and corresponding requirements is expanding, a trend which is expected to continue with 6G networks. In this context, support, configuration and performance of a crucial upper-layer protocol like TCP become challenging. In this paper, based on our IETF standardization work, we describe how TCP can run suitably on a wide variety of IoT environments (from highly constrained scenarios to resource-rich ones). Furthermore, we present and study the novel TCP option called TCP Acknowledgment Rate Request (TARR), designed for further TCP adaptability, which is particularly useful for current and future IoT networks.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108406"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing the performance of classification models through conformal correlation matrices 用共形相关矩阵来表征分类模型的性能
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-12-04 DOI: 10.1016/j.comcom.2025.108398
Alessandro Perlo , Carla Fabiana Chiasserini , Gustavo De Veciana , Francesco Malandrino
In classification tasks, it is critical to accurately distinguish between specific classes, as misclassifications can undermine system reliability and user trust. In this paper, we study how client selection in both centralized and federated learning environments affects the performance of classification models trained on heterogeneous data. When training datasets across clients are statistically diverse, careful client selection becomes crucial to improve the ability of the model to discriminate between classes, while preserving privacy. In particular, we introduce a novel metric based on conformal prediction outcomes – the conformal correlation matrix – which captures the likelihood of class pairs co-occurring within conformal prediction sets. Unlike the traditional confusion matrix, which quantifies actual misclassifications, our metric characterizes potential ambiguities between classes, thus offering a complementary perspective on model performance and uncertainty. Through a series of examples, we demonstrate how our proposed metric can guide informed client selection and enhance model performance in both centralized and federated training settings. Our results highlight the potential of conformal-based metrics to improve classification reliability while safeguarding sensitive information about individual client data.
在分类任务中,准确区分特定的类是至关重要的,因为错误的分类会破坏系统可靠性和用户信任。在本文中,我们研究了集中式和联邦学习环境中的客户端选择如何影响在异构数据上训练的分类模型的性能。当跨客户端的训练数据集具有统计多样性时,谨慎的客户选择对于提高模型区分类别的能力,同时保护隐私至关重要。特别是,我们引入了一种基于共形预测结果的新度量-共形相关矩阵-它捕获了类对在共形预测集中共同出现的可能性。与量化实际错误分类的传统混淆矩阵不同,我们的度量描述了类之间潜在的模糊性,从而提供了模型性能和不确定性的互补视角。通过一系列示例,我们演示了我们提出的度量如何在集中式和联合式训练设置中指导明智的客户选择并增强模型性能。我们的研究结果强调了基于一致性的度量在保护个人客户数据敏感信息的同时提高分类可靠性的潜力。
{"title":"Characterizing the performance of classification models through conformal correlation matrices","authors":"Alessandro Perlo ,&nbsp;Carla Fabiana Chiasserini ,&nbsp;Gustavo De Veciana ,&nbsp;Francesco Malandrino","doi":"10.1016/j.comcom.2025.108398","DOIUrl":"10.1016/j.comcom.2025.108398","url":null,"abstract":"<div><div>In classification tasks, it is critical to accurately distinguish between specific classes, as misclassifications can undermine system reliability and user trust. In this paper, we study how client selection in both centralized and federated learning environments affects the performance of classification models trained on heterogeneous data. When training datasets across clients are statistically diverse, careful client selection becomes crucial to improve the ability of the model to discriminate between classes, while preserving privacy. In particular, we introduce a novel metric based on conformal prediction outcomes – the conformal correlation matrix – which captures the likelihood of class pairs co-occurring within conformal prediction sets. Unlike the traditional confusion matrix, which quantifies actual misclassifications, our metric characterizes potential ambiguities between classes, thus offering a complementary perspective on model performance and uncertainty. Through a series of examples, we demonstrate how our proposed metric can guide informed client selection and enhance model performance in both centralized and federated training settings. Our results highlight the potential of conformal-based metrics to improve classification reliability while safeguarding sensitive information about individual client data.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108398"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145685748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cache-assisted task offloading in Vehicular Edge Computing: A spatio-temporal deep reinforcement learning approach 车辆边缘计算中的缓存辅助任务卸载:一种时空深度强化学习方法
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-11-05 DOI: 10.1016/j.comcom.2025.108351
Xiguang Li , Junlong Li , Yunhe Sun , Ammar Muthanna , Ammar Hawbani , Liang Zhao
Vehicular Edge Computing (VEC) faces significant challenges in jointly managing caching and task offloading due to dynamic network conditions and resource constraints. This paper proposes a novel framework that addresses these challenges through a synergistic three-stage process. The innovation lies in the tight integration of our modules: first, a Spatio-Temporal Fast Graph Convolutional Network (ST-FGCN) accurately forecasts task demands by capturing complex spatio-temporal correlations. Second, these predictions guide a Prediction-Informed Edge Collaborative Caching (PIECC) algorithm to proactively optimize resource placement across edge servers. Finally, a Genetic Asynchronous Advantage Actor–Critic (GA3C) strategy performs robust task offloading within this optimized environment. Unlike traditional reinforcement learning methods that often struggle with the large state–action spaces in VEC and converge to local optima, our framework simplifies the decision process via predictive caching and enhances exploration with the GA-infused GA3C algorithm. Simulation results demonstrate that our proposed framework significantly reduces long-term system cost, outperforms baseline methods in both latency and energy efficiency, and offers a more adaptive solution for dynamic VEC systems.
由于动态网络条件和资源限制,车辆边缘计算(VEC)在联合管理缓存和任务卸载方面面临重大挑战。本文提出了一个新的框架,通过一个协同的三阶段过程来解决这些挑战。创新在于我们模块的紧密集成:首先,时空快速图卷积网络(ST-FGCN)通过捕获复杂的时空相关性来准确预测任务需求。其次,这些预测指导预测通知边缘协作缓存(PIECC)算法主动优化跨边缘服务器的资源放置。最后,遗传异步优势参与者-评论家(GA3C)策略在此优化环境中执行稳健的任务卸载。与传统的强化学习方法不同,我们的框架通过预测缓存简化了决策过程,并通过注入ga的GA3C算法增强了探索。传统的强化学习方法经常与VEC中的大型状态-动作空间作斗争并收敛到局部最优。仿真结果表明,我们提出的框架显著降低了长期系统成本,在延迟和能源效率方面优于基线方法,并为动态VEC系统提供了更具适应性的解决方案。
{"title":"Cache-assisted task offloading in Vehicular Edge Computing: A spatio-temporal deep reinforcement learning approach","authors":"Xiguang Li ,&nbsp;Junlong Li ,&nbsp;Yunhe Sun ,&nbsp;Ammar Muthanna ,&nbsp;Ammar Hawbani ,&nbsp;Liang Zhao","doi":"10.1016/j.comcom.2025.108351","DOIUrl":"10.1016/j.comcom.2025.108351","url":null,"abstract":"<div><div>Vehicular Edge Computing (VEC) faces significant challenges in jointly managing caching and task offloading due to dynamic network conditions and resource constraints. This paper proposes a novel framework that addresses these challenges through a synergistic three-stage process. The innovation lies in the tight integration of our modules: first, a Spatio-Temporal Fast Graph Convolutional Network (ST-FGCN) accurately forecasts task demands by capturing complex spatio-temporal correlations. Second, these predictions guide a Prediction-Informed Edge Collaborative Caching (PIECC) algorithm to proactively optimize resource placement across edge servers. Finally, a Genetic Asynchronous Advantage Actor–Critic (GA3C) strategy performs robust task offloading within this optimized environment. Unlike traditional reinforcement learning methods that often struggle with the large state–action spaces in VEC and converge to local optima, our framework simplifies the decision process via predictive caching and enhances exploration with the GA-infused GA3C algorithm. Simulation results demonstrate that our proposed framework significantly reduces long-term system cost, outperforms baseline methods in both latency and energy efficiency, and offers a more adaptive solution for dynamic VEC systems.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"246 ","pages":"Article 108351"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5GCID: Dataset of 5GC intrusion detection system 5GCID: 5GC入侵检测系统数据集
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-11-29 DOI: 10.1016/j.comcom.2025.108375
Yangliu Hu , Qian Sun , Tianbin Dang , Guangzhi Wu , Lin Tian
The widespread application of fifth-generation (5G) networks brings great convenience but also poses security threats to the 5G core networks (5GC). To effectively detect and prevent these attacks, deep learning (DL)-based anomaly detection methods are crucial. Existing DL-based methods need anomalous data to train the models. Those open-source anomalous datasets of wired networks cannot accurately represent the characteristics of the 5G protocol, such as sequence and fields, resulting in poor detection performance. To address this issue, this paper constructs a dataset for the 5GC intrusion detection system (5GCID), which consolidates the security vulnerabilities of the radio access network (RAN) domain and the 5GC user domain. These threats are analyzed, guiding the design of illustrative threat scenarios and the bespoke tools. Utilizing our 5G network security experimental platform, we gather protocol data to compile the 5GCID dataset as tools are executed on the platform. Furthermore, it provides two preprocessing methods for the 5GCID dataset, focusing on traffic characteristics and control signal structures, respectively. Additionally, we design an intrusion protection method for 5GC, underpinned by explainable artificial intelligence (XAI), referred to as X-5GCIPS. The proposed X-5GCIPS can be viewed as an application of the 5GCID dataset, promising to advance the field of intelligent cybersecurity measures in next-generation networks.
5G(第五代)网络的广泛应用给5G核心网(5GC)带来了极大的便利,但也带来了安全威胁。为了有效地检测和预防这些攻击,基于深度学习(DL)的异常检测方法至关重要。现有的基于dl的方法需要异常数据来训练模型。这些开源的有线网络异常数据集无法准确表征5G协议的序列、字段等特征,导致检测性能较差。针对这一问题,本文构建了5GC入侵检测系统(5GCID)数据集,该数据集整合了无线接入网(RAN)域和5GC用户域的安全漏洞。对这些威胁进行了分析,指导设计说明性威胁场景和定制工具。利用我们的5G网络安全实验平台,我们收集协议数据来编译5G cid数据集,并在平台上执行工具。并针对5GCID数据集提供了两种预处理方法,分别针对交通特征和控制信号结构进行预处理。此外,我们设计了一种基于可解释人工智能(XAI)的5GC入侵保护方法,称为X-5GCIPS。拟议的X-5GCIPS可以被视为5GCID数据集的应用,有望推进下一代网络中的智能网络安全措施领域。
{"title":"5GCID: Dataset of 5GC intrusion detection system","authors":"Yangliu Hu ,&nbsp;Qian Sun ,&nbsp;Tianbin Dang ,&nbsp;Guangzhi Wu ,&nbsp;Lin Tian","doi":"10.1016/j.comcom.2025.108375","DOIUrl":"10.1016/j.comcom.2025.108375","url":null,"abstract":"<div><div>The widespread application of fifth-generation (5G) networks brings great convenience but also poses security threats to the 5G core networks (5GC). To effectively detect and prevent these attacks, deep learning (DL)-based anomaly detection methods are crucial. Existing DL-based methods need anomalous data to train the models. Those open-source anomalous datasets of wired networks cannot accurately represent the characteristics of the 5G protocol, such as sequence and fields, resulting in poor detection performance. To address this issue, this paper constructs a dataset for the 5GC intrusion detection system (5GCID), which consolidates the security vulnerabilities of the radio access network (RAN) domain and the 5GC user domain. These threats are analyzed, guiding the design of illustrative threat scenarios and the bespoke tools. Utilizing our 5G network security experimental platform, we gather protocol data to compile the 5GCID dataset as tools are executed on the platform. Furthermore, it provides two preprocessing methods for the 5GCID dataset, focusing on traffic characteristics and control signal structures, respectively. Additionally, we design an intrusion protection method for 5GC, underpinned by explainable artificial intelligence (XAI), referred to as X-5GCIPS. The proposed X-5GCIPS can be viewed as an application of the 5GCID dataset, promising to advance the field of intelligent cybersecurity measures in next-generation networks.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108375"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service placement in the continuum: A systematic literature review 连续体中的服务安置:系统的文献回顾
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-11-19 DOI: 10.1016/j.comcom.2025.108370
Waseem Sajjad, Montse Farreras, Jordi Garcia, Xavi Masip-Bruin
Cloud computing plays a crucial role in the Industry 4.0 era, particularly with the rise of Internet of Things (IoT) applications that support domains such as education, healthcare, business, and manufacturing. These applications consist of multiple services with diverse quality of service (QoS) requirements, making their development and deployment complex. While traditional cloud environments provide scalability, they often fail to support latency-sensitive and resource-intensive applications. To overcome these limitations, alternative paradigms such as Cloud–Fog–Edge (CFE), Cloud–Fog (CF), Cloud–Edge (CE), Fog–Edge (FE), and Mobile Edge Computing (MEC) have emerged. These models push computation, storage, and networking closer to end devices, reducing latency and bandwidth usage. However, the heterogeneity, mobility, and dynamic nature of these environments make service placement (a known NP-hard problem) a central challenge.
This article presents a systematic literature review of service placement approaches across the compute continuum. Following established SLR methodology, we identified and analyzed 124 peer-reviewed studies published between 2018 and 2024, classifying them by (i) deployment environment, (ii) service placement strategies and algorithms, (iii) adaptability of the solution, (iv) optimization objectives, (v) virtualization/orchestration technologies, (vi) evaluation methodologies, including workloads, testbeds, and simulation tools and (vii) use cases or application types.
The novelty of this work lies in providing not only a detailed taxonomy of placement approaches but also this is the first survey that takes all seven aspects into consideration and establishes correlations between them. Our findings reveal that most existing works target smart health applications and favor heuristic-based placement in complex CFE scenarios, while research on scientific and compute-intensive workloads remains limited. We also identify Kubernetes as the most widely used orchestration technology and latency as the dominant optimization metric. Despite significant progress, the field is still maturing, with gaps in real-world validation and adaptive, ML-based placement strategies.
By consolidating technical approaches, evaluation practices, and open challenges, this survey offers both researchers and practitioners a structured overview of the state of the art and guidance for advancing service placement in the compute continuum.
云计算在工业4.0时代发挥着至关重要的作用,特别是随着支持教育、医疗保健、商业和制造等领域的物联网(IoT)应用程序的兴起。这些应用程序由具有不同服务质量(QoS)需求的多个服务组成,使其开发和部署变得复杂。虽然传统的云环境提供可伸缩性,但它们通常无法支持对延迟敏感和资源密集型的应用程序。为了克服这些限制,出现了云-雾边缘(CFE)、云-雾(CF)、云-边缘(CE)、雾边缘(FE)和移动边缘计算(MEC)等替代范例。这些模型使计算、存储和网络更接近终端设备,从而减少了延迟和带宽使用。然而,这些环境的异质性、移动性和动态性使得服务放置(一个已知的np难题)成为一个核心挑战。本文对跨计算连续体的服务放置方法进行了系统的文献回顾。根据既定的SLR方法,我们确定并分析了2018年至2024年间发表的124项同行评审研究,并根据(i)部署环境、(ii)服务放置策略和算法、(iii)解决方案的适应性、(iv)优化目标、(v)虚拟化/编排技术、(vi)评估方法(包括工作负载、测试平台和仿真工具)和(vii)用例或应用程序类型对其进行了分类。这项工作的新颖之处在于不仅提供了安置方法的详细分类,而且这是第一次考虑到所有七个方面并建立它们之间的相关性的调查。我们的研究结果表明,大多数现有工作针对智能健康应用,并倾向于在复杂的CFE场景中基于启发式的放置,而对科学和计算密集型工作负载的研究仍然有限。我们还确定Kubernetes是使用最广泛的编排技术,延迟是主要的优化指标。尽管取得了重大进展,但该领域仍处于成熟阶段,在现实验证和自适应的基于ml的放置策略方面存在差距。通过整合技术方法、评估实践和开放的挑战,本调查为研究人员和从业者提供了技术现状的结构化概述,并为在计算连续体中推进服务放置提供了指导。
{"title":"Service placement in the continuum: A systematic literature review","authors":"Waseem Sajjad,&nbsp;Montse Farreras,&nbsp;Jordi Garcia,&nbsp;Xavi Masip-Bruin","doi":"10.1016/j.comcom.2025.108370","DOIUrl":"10.1016/j.comcom.2025.108370","url":null,"abstract":"<div><div>Cloud computing plays a crucial role in the Industry 4.0 era, particularly with the rise of Internet of Things (IoT) applications that support domains such as education, healthcare, business, and manufacturing. These applications consist of multiple services with diverse quality of service (QoS) requirements, making their development and deployment complex. While traditional cloud environments provide scalability, they often fail to support latency-sensitive and resource-intensive applications. To overcome these limitations, alternative paradigms such as Cloud–Fog–Edge (CFE), Cloud–Fog (CF), Cloud–Edge (CE), Fog–Edge (FE), and Mobile Edge Computing (MEC) have emerged. These models push computation, storage, and networking closer to end devices, reducing latency and bandwidth usage. However, the heterogeneity, mobility, and dynamic nature of these environments make service placement (a known NP-hard problem) a central challenge.</div><div>This article presents a systematic literature review of service placement approaches across the compute continuum. Following established SLR methodology, we identified and analyzed 124 peer-reviewed studies published between 2018 and 2024, classifying them by (i) deployment environment, (ii) service placement strategies and algorithms, (iii) adaptability of the solution, (iv) optimization objectives, (v) virtualization/orchestration technologies, (vi) evaluation methodologies, including workloads, testbeds, and simulation tools and (vii) use cases or application types.</div><div>The novelty of this work lies in providing not only a detailed taxonomy of placement approaches but also this is the first survey that takes all seven aspects into consideration and establishes correlations between them. Our findings reveal that most existing works target smart health applications and favor heuristic-based placement in complex CFE scenarios, while research on scientific and compute-intensive workloads remains limited. We also identify Kubernetes as the most widely used orchestration technology and latency as the dominant optimization metric. Despite significant progress, the field is still maturing, with gaps in real-world validation and adaptive, ML-based placement strategies.</div><div>By consolidating technical approaches, evaluation practices, and open challenges, this survey offers both researchers and practitioners a structured overview of the state of the art and guidance for advancing service placement in the compute continuum.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"246 ","pages":"Article 108370"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145555380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active IRS-aided NOMA with full-duplex energy harvesting wire-tapper: Performance evaluation 具有全双工能量收集窃听器的主动irs辅助NOMA:性能评估
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-11-24 DOI: 10.1016/j.comcom.2025.108372
Toi Le-Thanh , Cuong Tran-Minh , Khuong Ho-Van
Wireless communication is quickly degraded due to obstacles in signal propagation. These obstacles can be remedied with intelligent reflecting surface (IRS), which purposely changes propagation conditions. However, security is a big concern in wireless communication, where active eavesdroppers are capable of energy harvesting (EH) and interfere with authorized users. This work analyzes a system model in which a full-duplex (FD) source scavenges energy from the power station and broadcasts a non-orthogonal multiple access (NOMA) signal to a close user and a distant user with the aid of active IRS (mainly reducing double loss due to double reflection) subject to a FD wire-tapper with ability of EH and interfering licensed users. By security analysis, the proposed system (active IRS-aided NOMA with FD EH wire-tapper) is demonstrated better than its counterpart (active IRS-aided orthogonal multiple access with FD EH wire-tapper).
由于信号传播中的障碍,无线通信性能下降很快。这些障碍可以通过智能反射面(IRS)来弥补,它有目的地改变传播条件。然而,在无线通信中,安全是一个大问题,主动窃听者能够收集能量(EH)并干扰授权用户。本工作分析了一个系统模型,其中全双工(FD)源从电站清除能量,并借助有源IRS(主要是减少双反射造成的双损耗)向近用户和远用户广播非正交多址(NOMA)信号,该信号受到具有EH能力的FD线窃听器和干扰许可用户的影响。通过安全性分析,所提出的系统(带有FD EH窃听器的有源irs辅助NOMA)优于其对应系统(带有FD EH窃听器的有源irs辅助正交多址)。
{"title":"Active IRS-aided NOMA with full-duplex energy harvesting wire-tapper: Performance evaluation","authors":"Toi Le-Thanh ,&nbsp;Cuong Tran-Minh ,&nbsp;Khuong Ho-Van","doi":"10.1016/j.comcom.2025.108372","DOIUrl":"10.1016/j.comcom.2025.108372","url":null,"abstract":"<div><div>Wireless communication is quickly degraded due to obstacles in signal propagation. These obstacles can be remedied with intelligent reflecting surface (IRS), which purposely changes propagation conditions. However, security is a big concern in wireless communication, where active eavesdroppers are capable of energy harvesting (EH) and interfere with authorized users. This work analyzes a system model in which a full-duplex (FD) source scavenges energy from the power station and broadcasts a non-orthogonal multiple access (NOMA) signal to a close user and a distant user with the aid of active IRS (mainly reducing double loss due to double reflection) subject to a FD wire-tapper with ability of EH and interfering licensed users. By security analysis, the proposed system (active IRS-aided NOMA with FD EH wire-tapper) is demonstrated better than its counterpart (active IRS-aided orthogonal multiple access with FD EH wire-tapper).</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"246 ","pages":"Article 108372"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145618717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent routing optimization with deep reinforcement learning and Betweenness Centrality Theory in software-defined networks 基于深度强化学习和中间性理论的软件定义网络智能路由优化
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-12-16 DOI: 10.1016/j.comcom.2025.108401
Zongming Wu , Qiang Tang , Jijun Cao , Sihao Wen , Bao Li
For highly dynamic and complex communication networks, existing DRL-based routing optimization solutions suffer from inefficient training, leading to degraded network performance. In this paper, we propose an Intelligent Routing Optimization method with Deep Reinforcement Learning and Betweenness Centrality Theory (IROD-BC). This SDN routing solution based on distributed proximal policy optimization can achieve fast convergence of training and improve the overall performance of the network. First, before training, we select a set of controlled nodes in the network based on the Betweenness Centrality Theory. Second, during training, we adjust the weights of the links in the weighted shortest path algorithm based on this set of controlled nodes to improve the convergence efficiency of distributed proximal policy optimization. The learning agent modifies the weights of the links in the controlled nodes links based on the network traffic state information of this set of controlled nodes to reduce the agent’s dependence on the network topology. We utilize SDN controller to collect network traffic state information including packet loss and latency. Ultimately, the IROD-BC proposed in this paper can learn to make better routing control decisions from its own experience by interacting with the network environment until the learning agent converges and obtains the optimal routing paths. We conducted extensive experiments on three real network topologies to evaluate the performance of IROD-BC. The experimental results show that IROD-BC outperforms existing DRL-based routing solutions and OSPF algorithm in terms of latency, link throughput, and packet loss.
对于高动态、复杂的通信网络,现有基于drl的路由优化方案存在训练效率低下的问题,导致网络性能下降。本文提出了一种基于深度强化学习和中间性理论(IROD-BC)的智能路由优化方法。这种基于分布式近端策略优化的SDN路由解决方案可以实现训练的快速收敛,提高网络的整体性能。首先,在训练前,我们根据中间性中心性理论在网络中选择一组受控节点。其次,在训练过程中,基于该控制节点集调整加权最短路径算法中链路的权值,提高分布式近端策略优化的收敛效率。学习智能体根据这组被控制节点的网络流量状态信息来修改被控制节点链路中链路的权重,以减少智能体对网络拓扑的依赖。我们利用SDN控制器来收集网络流量状态信息,包括丢包和延迟。最终,本文提出的IROD-BC可以通过与网络环境的交互,从自身的经验中学习做出更好的路由控制决策,直到学习代理收敛并获得最优路由路径。我们在三种真实网络拓扑上进行了大量的实验来评估IROD-BC的性能。实验结果表明,IROD-BC在时延、链路吞吐量和丢包方面都优于现有基于drl的路由解决方案和OSPF算法。
{"title":"Intelligent routing optimization with deep reinforcement learning and Betweenness Centrality Theory in software-defined networks","authors":"Zongming Wu ,&nbsp;Qiang Tang ,&nbsp;Jijun Cao ,&nbsp;Sihao Wen ,&nbsp;Bao Li","doi":"10.1016/j.comcom.2025.108401","DOIUrl":"10.1016/j.comcom.2025.108401","url":null,"abstract":"<div><div>For highly dynamic and complex communication networks, existing DRL-based routing optimization solutions suffer from inefficient training, leading to degraded network performance. In this paper, we propose an Intelligent Routing Optimization method with Deep Reinforcement Learning and Betweenness Centrality Theory (IROD-BC). This SDN routing solution based on distributed proximal policy optimization can achieve fast convergence of training and improve the overall performance of the network. First, before training, we select a set of controlled nodes in the network based on the Betweenness Centrality Theory. Second, during training, we adjust the weights of the links in the weighted shortest path algorithm based on this set of controlled nodes to improve the convergence efficiency of distributed proximal policy optimization. The learning agent modifies the weights of the links in the controlled nodes links based on the network traffic state information of this set of controlled nodes to reduce the agent’s dependence on the network topology. We utilize SDN controller to collect network traffic state information including packet loss and latency. Ultimately, the IROD-BC proposed in this paper can learn to make better routing control decisions from its own experience by interacting with the network environment until the learning agent converges and obtains the optimal routing paths. We conducted extensive experiments on three real network topologies to evaluate the performance of IROD-BC. The experimental results show that IROD-BC outperforms existing DRL-based routing solutions and OSPF algorithm in terms of latency, link throughput, and packet loss.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108401"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indoor positioning with Wi-Fi Location: A survey of IEEE 802.11mc/az/bk fine timing measurement research 基于Wi-Fi定位的室内定位:IEEE 802.11mc/az/bk精细定时测量研究综述
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-12-12 DOI: 10.1016/j.comcom.2025.108400
Katarzyna Kosek-Szott , Szymon Szott , Wojciech Ciezobka , Maksymilian Wojnar , Krzysztof Rusek , Jonathan Segev
Indoor positioning is an enabling technology for home, office, and industrial network users because it provides numerous information and communication technology (ICT) and Internet of things (IoT) functionalities such as indoor navigation, smart meter localization, asset tracking, support for emergency services, and detection of hazardous situations. The IEEE 802.11mc fine timing measurement (FTM) protocol (commercially known as Wi-Fi Location) has great potential to enable indoor positioning in future generation devices, primarily because of the high availability of Wi-Fi networks, FTM’s high accuracy and device support. Furthermore, new FTM enhancements are available in the released (802.11az) and recently completed (802.11bk) amendments. Despite the multitude of literature reviews on indoor positioning, a survey dedicated to FTM and its recent enhancements has so far been lacking. We fill this gap by classifying and reviewing over 180 research papers related to the practical accuracy achieved with FTM, methods for improving its accuracy (also with machine learning), combining FTM with other indoor positioning systems, FTM-based applications, and security issues. Based on the conducted survey, we summarize the most important research achievements and formulate open areas for further research.
室内定位是一项适用于家庭、办公室和工业网络用户的使能技术,因为它提供了许多信息和通信技术(ICT)和物联网(IoT)功能,如室内导航、智能电表定位、资产跟踪、紧急服务支持和危险情况检测。IEEE 802.11mc精细定时测量(FTM)协议(商业上称为Wi-Fi定位)在下一代设备中具有实现室内定位的巨大潜力,主要是因为Wi-Fi网络的高可用性,FTM的高精度和设备支持。此外,在已发布的(802.11az)和最近完成的(802.11bk)修订中提供了新的FTM增强功能。尽管有大量关于室内定位的文献综述,但迄今为止还缺乏专门针对FTM及其近期增强功能的调查。我们通过分类和审查180多篇研究论文来填补这一空白,这些论文涉及FTM实现的实际精度、提高其精度的方法(也包括机器学习)、FTM与其他室内定位系统的结合、基于FTM的应用以及安全问题。在调查的基础上,我们总结了最重要的研究成果,并提出了进一步研究的开放领域。
{"title":"Indoor positioning with Wi-Fi Location: A survey of IEEE 802.11mc/az/bk fine timing measurement research","authors":"Katarzyna Kosek-Szott ,&nbsp;Szymon Szott ,&nbsp;Wojciech Ciezobka ,&nbsp;Maksymilian Wojnar ,&nbsp;Krzysztof Rusek ,&nbsp;Jonathan Segev","doi":"10.1016/j.comcom.2025.108400","DOIUrl":"10.1016/j.comcom.2025.108400","url":null,"abstract":"<div><div>Indoor positioning is an enabling technology for home, office, and industrial network users because it provides numerous information and communication technology (ICT) and Internet of things (IoT) functionalities such as indoor navigation, smart meter localization, asset tracking, support for emergency services, and detection of hazardous situations. The IEEE 802.11mc fine timing measurement (FTM) protocol (commercially known as Wi-Fi Location) has great potential to enable indoor positioning in future generation devices, primarily because of the high availability of Wi-Fi networks, FTM’s high accuracy and device support. Furthermore, new FTM enhancements are available in the released (802.11az) and recently completed (802.11bk) amendments. Despite the multitude of literature reviews on indoor positioning, a survey dedicated to FTM and its recent enhancements has so far been lacking. We fill this gap by classifying and reviewing over 180 research papers related to the practical accuracy achieved with FTM, methods for improving its accuracy (also with machine learning), combining FTM with other indoor positioning systems, FTM-based applications, and security issues. Based on the conducted survey, we summarize the most important research achievements and formulate open areas for further research.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108400"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of distributed multiparty online gaming over edge computing platforms 基于边缘计算平台的分布式多方在线游戏性能研究
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-11-28 DOI: 10.1016/j.comcom.2025.108378
D. Olliaro , V. Mancuso , P. Castagno , M. Sereno , M. Ajmone Marsan
We study the performance of online games played over a platform that implements gaming as a service (GaaS) in a mobile network slice that hosts concatenated virtual network functions (VNFs) at the edge. The distributed gaming architecture is based on edge computing facilities, whose utilization must be carefully planned and managed, so as to satisfy the stringent performance requirements of game applications. The game manager must consider the latency between players and edge server VNFs, the capacity and load of edge servers, and the latency between edge servers used by interacting players. This calls for a careful choice about the allocation of players to edge server VNFs, aiming at extremely low latency in interactions resulting from player’s commands. We develop an analytical model, which we validate with experiments in the wild, and show that, under several combinations of system parameters, deploying gaming VNFs at the edge can deliver better performance with respect to cloud gaming, in spite of the complexities arising from the distribution of gaming VNFs over edge servers. Our analytical model provides a useful tool for edge gaming systems performance prediction, thus supporting the management of GaaS applications.
我们研究了在移动网络切片中实现游戏即服务(GaaS)的平台上玩在线游戏的性能,该移动网络切片在边缘托管连接的虚拟网络功能(VNFs)。分布式游戏架构基于边缘计算设施,必须对边缘计算设施的使用进行精心规划和管理,以满足游戏应用对性能的严格要求。游戏管理器必须考虑玩家和边缘服务器VNFs之间的延迟、边缘服务器的容量和负载,以及交互玩家使用的边缘服务器之间的延迟。这需要仔细选择将玩家分配到边缘服务器VNFs,以实现玩家命令导致的交互的极低延迟为目标。我们开发了一个分析模型,并在野外进行了实验验证,结果表明,在系统参数的几种组合下,在边缘部署游戏VNFs可以提供更好的性能,尽管在边缘服务器上分布游戏VNFs会带来复杂性。我们的分析模型为边缘游戏系统性能预测提供了一个有用的工具,从而支持GaaS应用程序的管理。
{"title":"Performance of distributed multiparty online gaming over edge computing platforms","authors":"D. Olliaro ,&nbsp;V. Mancuso ,&nbsp;P. Castagno ,&nbsp;M. Sereno ,&nbsp;M. Ajmone Marsan","doi":"10.1016/j.comcom.2025.108378","DOIUrl":"10.1016/j.comcom.2025.108378","url":null,"abstract":"<div><div>We study the performance of online games played over a platform that implements gaming as a service (GaaS) in a mobile network slice that hosts concatenated virtual network functions (VNFs) at the edge. The distributed gaming architecture is based on edge computing facilities, whose utilization must be carefully planned and managed, so as to satisfy the stringent performance requirements of game applications. The game manager must consider the latency between players and edge server VNFs, the capacity and load of edge servers, and the latency between edge servers used by interacting players. This calls for a careful choice about the allocation of players to edge server VNFs, aiming at extremely low latency in interactions resulting from player’s commands. We develop an analytical model, which we validate with experiments in the wild, and show that, under several combinations of system parameters, deploying gaming VNFs at the edge can deliver better performance with respect to cloud gaming, in spite of the complexities arising from the distribution of gaming VNFs over edge servers. Our analytical model provides a useful tool for edge gaming systems performance prediction, thus supporting the management of GaaS applications.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"246 ","pages":"Article 108378"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145684900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing cellular-enabled collaborative robots planning through GNSS data for SAR scenarios 通过GNSS数据为SAR场景增强蜂窝支持的协作机器人规划
IF 4.3 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-02-01 Epub Date: 2025-12-04 DOI: 10.1016/j.comcom.2025.108376
Arnau Romero , Carmen Delgado , Jana Baguer , Raúl Suárez , Xavier Costa-Pérez
Cellular-enabled collaborative robots are becoming paramount in Search-and-Rescue (SAR) and emergency response. Crucially dependent on resilient mobile network connectivity, they serve as invaluable assets for tasks like rapid victim localization and the exploration of hazardous, otherwise unreachable areas. However, their reliance on battery power and the need for persistent, low-latency communication limit operational time and mobility. To address this, and considering the evolving capabilities of 5G/6G networks, we propose a novel SAR framework that includes Mission Planning and Mission Execution phases and that optimizes robot deployment. By considering parameters such as the exploration area size, terrain elevation, robot fleet size, communication-influenced energy profiles, desired exploration rate, and target response time, our framework determines the minimum number of robots required and their optimal paths to ensure effective coverage and timely data backhaul over mobile networks. Our results demonstrate the trade-offs between number of robots, explored area, and response time for wheeled and quadruped robots. Further, we quantify the impact of terrain elevation data on mission time and energy consumption, showing the benefits of incorporating real-world environmental factors that might also affect mobile signal propagation and connectivity into SAR planning. This framework provides critical insights for leveraging next-generation mobile networks to enhance autonomous SAR operations.
支持蜂窝的协作机器人在搜索与救援(SAR)和应急响应中变得至关重要。它们主要依赖于弹性的移动网络连接,对于快速定位受害者和探索危险的、否则无法到达的地区等任务来说,它们是无价的资产。然而,它们对电池动力的依赖以及对持久、低延迟通信的需求限制了操作时间和移动性。为了解决这个问题,并考虑到5G/6G网络不断发展的能力,我们提出了一个新的SAR框架,包括任务规划和任务执行阶段,并优化机器人部署。通过考虑勘探区域大小、地形高程、机器人队伍规模、通信影响的能量分布、期望的勘探率和目标响应时间等参数,我们的框架确定了所需机器人的最小数量及其最佳路径,以确保移动网络的有效覆盖和及时的数据回程。我们的研究结果展示了轮式和四足机器人在机器人数量、探索区域和响应时间之间的权衡。此外,我们量化了地形高程数据对任务时间和能耗的影响,显示了将可能影响移动信号传播和连接的现实环境因素纳入SAR规划的好处。该框架为利用下一代移动网络增强自主SAR操作提供了关键见解。
{"title":"Enhancing cellular-enabled collaborative robots planning through GNSS data for SAR scenarios","authors":"Arnau Romero ,&nbsp;Carmen Delgado ,&nbsp;Jana Baguer ,&nbsp;Raúl Suárez ,&nbsp;Xavier Costa-Pérez","doi":"10.1016/j.comcom.2025.108376","DOIUrl":"10.1016/j.comcom.2025.108376","url":null,"abstract":"<div><div>Cellular-enabled collaborative robots are becoming paramount in Search-and-Rescue (SAR) and emergency response. Crucially dependent on resilient mobile network connectivity, they serve as invaluable assets for tasks like rapid victim localization and the exploration of hazardous, otherwise unreachable areas. However, their reliance on battery power and the need for persistent, low-latency communication limit operational time and mobility. To address this, and considering the evolving capabilities of 5G/6G networks, we propose a novel SAR framework that includes Mission Planning and Mission Execution phases and that optimizes robot deployment. By considering parameters such as the exploration area size, terrain elevation, robot fleet size, communication-influenced energy profiles, desired exploration rate, and target response time, our framework determines the minimum number of robots required and their optimal paths to ensure effective coverage and timely data backhaul over mobile networks. Our results demonstrate the trade-offs between number of robots, explored area, and response time for wheeled and quadruped robots. Further, we quantify the impact of terrain elevation data on mission time and energy consumption, showing the benefits of incorporating real-world environmental factors that might also affect mobile signal propagation and connectivity into SAR planning. This framework provides critical insights for leveraging next-generation mobile networks to enhance autonomous SAR operations.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"247 ","pages":"Article 108376"},"PeriodicalIF":4.3,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145738577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1