default search action
ITNAC 2017: Melbourne, Australia
- 27th International Telecommunication Networks and Applications Conference, ITNAC 2017, Melbourne, Australia, November 22-24, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6796-1
- Sung-Yeon Kim, Xavier De Foy, Alex Reznik:
Practical service allocation in mobile edge computing systems. 1-6 - Franciscus X. A. Wibowo, Mark A. Gregory:
Updating guaranteed bandwidth in multi-domain software defined networks. 1-6 - Bahaa Al-Musawi, Philip Branch, Grenville Armitage:
Recurrence behaviour of BGP traffic. 1-7 - Wojtek Burakowski, Maciek Sosnowski:
On cycle based schedulers with time alternating priorities. 1-6 - Jerzy Konorski:
Fake VIP attacks and their mitigation via double-blind reputation. 1-8 - Takoua Ghariani, Badii Jouaber:
Green topological potential-based optimization for power and spectral efficiency tradeoff in LTE HetNets. 1-6 - Xipei Luo, Jing Wang, Qiwei Shen, Jingyu Wang, Qi Qi:
User behavior analysis based on user interest by web log mining. 1-5 - Yuki Arikawa, Takeshi Sakamoto, Shunji Kimura:
Hardware accelerator for coordinated radioresource scheduling in 5G ultra-high-density distributed antenna systems. 1-6 - Ryota Kimoto, Yusuke Kozawa, Yohtaro Umeda, Hiromasa Habuchi:
Inverse pulse position modulation schemes for simultaneous visible light wireless information and power transfer. 1-6 - Rashmi Munjal, William Liu, Xue Jun Li, Jairo A. Gutiérrez, Marija Furdek:
Sustainable massive data dissemination by using software defined connectivity approach. 1-6 - Ash Bellett, Gayathri Kongara:
Optimisation of relay-assisted wireless systems in quasi-static environments using ray tracing. 1-6 - Frank T. H. den Hartog, Alessandro Raschellà, Faycal Bouhafs, Pia Kempker, Bert Boltjes, Mir Seyedebrahimi:
A pathway to solving the Wi-Fi tragedy of the commons in apartment blocks. 1-6 - María E. Villapol, William Liu, Jairo A. Gutiérrez, Luca Chiaraviglio, Arjuna Sathiaseelan, Jinsong Wu, Antoine B. Bagula, Junaid Qadir, Jian Song, Wenjun Zhang, Mark A. Gregory, Ji Wu:
Connecting the unconnected 10% of New Zealanders by 2025: Is a MahiTahi approach possible? 1-7 - Tomohiro Nishida, Masahiro Sasabe, Shoji Kasahara:
Maximizing communication opportunity for collaborative spectrum sensing in cognitive radio networks. 1-6 - Ting Ma, Feng Hu, Maode Ma:
Fast and efficient physical layer authentication for 5G HetNet handover. 1-3 - Thavamaran Kanesan, H. M. Hizan, S. K. Sadon, Gee-Kung Chang:
Experimental investigation of cascaded SMF-MMF-dithering technique for nonlinear compensation in fiber-wireless system. 1-3 - Khalid Hasan, Nazmus S. Nafi, Khandakar Ahmed, Mark A. Gregory, Edward Mutafungwa:
Use of coordinated multipoint transmission /reception for enhanced backhauling in nomadic relay. 1-6 - Rajan Kadel, Khandakar Ahmed, Anuj Nepal:
Adaptive error control code implementation framework for software defined wireless sensor network (SDWSN). 1-6 - Da-Ren Chen, Ping-Feng Wang, Wei-Min Chiu:
On the study of interference mitigation and QoS protocol for wireless body area networks using real-time scheduling. 1-6 - Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Evaluating network intrusion detection systems for high-speed networks. 1-6 - Oscar Felipe Saenz de Miera Berglind:
Competition, regulation and institutional framework in telecommunications, implications for NGN in Mexico. 1-6 - Xiaojie Liu, Ulrich Speidel:
Can observed entropy detect congestion in Ad-Hoc networks? 1-6 - Kodai Satake, Tatsuya Otoshi, Yuichi Ohsita, Masayuki Murata:
Traffic engineering cooperating with traffic monitoring for the case with incomplete information. 1-7 - Asmaa Elsaeidy, Ibrahim Elgendi, Kumudu S. Munasinghe, Dharmendra Sharma, Abbas Jamalipour:
A smart city cyber security platform for narrowband networks. 1-6 - Khandakar Tanvir Ahmed, Md. Nabid Hasan, Md. Farhad Hossain, Kumudu S. Munasinghe, Abbas Jamalipour:
Demand management using utility based real time pricing for smart grid with a new cost function. 1-6 - Soo-Yeon Lee, Sa-rang Wi, Eunil Seo, Jun-Kwon Jung, Tai-Myoung Chung:
ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach. 1-6 - Abdullah Omar Arafat, Nazmus S. Nafi, Mark A. Gregory:
Priority based resource allocation for LTE-A femtocell networks. 1-6 - Mohammad Reza Nosouhi, Youyang Qu, Shui Yu, Yong Xiang, Damien Manuel:
Distance-based location privacy protection in social networks. 1-6 - Andrew Curtis-Black, Matthias Galster, Andreas Willig:
High-level concepts for northbound APIs: An interview study. 1-8 - Ziwei Wang, Xiuhua Jiang:
A QoE-driven optimization strategy for dynamic adaptive streaming over HTTP. 1-7 - Mehdi Malboubi:
Optimal-coherent and adaptive software defined inference of network traffics (OCcASION). 1-7 - Thi Minh Chau Nguyen, Doan B. Hoang, Thanh Dat Dang:
Toward a programmable software-defined IoT architecture for sensor service provision on demand. 1-6 - Ammar Moufak Dukhan, Dhammika Jayalath, Bouchra Senadji, Jasmine Banks:
A multi-level hybrid chaotic system with a novel damping approach to achieve variable rates. 1-6 - Nusrat Fatema, Yong Xiang, Iynkaran Natgunanathan:
Analysis of a semi blind pilot decontamination method in massive MIMO. 1-6 - Talal Alharbi, Siamak Layeghy, Marius Portmann:
Experimental evaluation of the impact of DoS attacks in SDN. 1-6 - Takashi Tokunaga, Hiromasa Habuchi, Yusuke Kozawa, Ran Sun:
SCDMA capability of high-density code-shift keying using dual MPOMs in optical-wireless channel. 1-6 - Mohammad Javad Shamani, Saeid Rezaei, Guillaume Jourjon, Aruna Seneviratne:
MPTCP energy enhancement paradox: A Q-learning approach. 1-4 - Lincy Elizebeth Jim, Mark A. Gregory:
Pain modelling in an artificial immune system based MANET. 1-6 - David Airehrour, Jairo A. Gutiérrez, Sayan Kumar Ray:
A testbed implementation of a trust-aware RPL routing protocol. 1-6 - Kaori Iwata, Yoshihiro Ito:
Proposal and development of TCP multi-pathization method with SDN by IoT devices. 1-6 - Ran Sun, Hiromasa Habuchi, Yusuke Kozawa:
Proposal of optical wireless turbo coded APPM system. 1-5 - Kin-Ping Hui, Damien Phillips, Asanka Kekirigoda:
Beyond line-of-sight range extension in contested environments with OPAL using autonomous unmanned aerial vehicles. 1-5 - H. Joe Steinhauer, Tove Helldin, Alexander Karlsson, Gunnar Mathiason:
Topic modeling for situation understanding in telecommunication networks. 1-6 - Xiaoyu Ma, Xiuhua Jiang:
PA VIF: A passive aggressive visual information fidelity for full reference image quality assessment. 1-6 - Amirhossein Moravejosharieh, Kourosh Ahmadi:
Experimental evaluation of mutual interference in co-located IEEE 802.15.4-based wireless body sensor networks. 1-6 - Kwan-Wu Chin:
On energy and data delivery in wireless local area networks with RF charging nodes. 1-7 - D. Battulga, J. Ankhzaya, B. Ankhbayar, U. Ganbayar, S. H. Sodbileg:
Handover management for distributed mobility management in SDN-based mobile networks. 1-6 - Mohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan:
Towards optimal sensitivity-based anonymization for big data. 1-6 - Luca Chiaraviglio, William Liu, Jairo A. Gutiérrez, Nicola Blefari-Melazzi:
Optimal pricing strategy for 5G in rural areas with unmanned aerial vehicles and large cells. 1-7 - Salman Naseer, William Liu, Nurul I. Sarkar, Peter Han Joo Chong, Edmund M.-K. Lai, Rangarao Venkatesha Prasad:
A sustainable vehicular based energy efficient data dissemination approach. 1-8 - M. T. A. Rana, Rein Vesilo, Ahsan Saadat:
Antenna selection for massive MIMO Kronecker channel models using non-central principal component analysis. 1-7 - Craig Walker, Adnan Al-Anbuky:
LED-WSN: Light weight edge computed dynamic wireless sensor network routing protocol. 1-8 - Waleed Ejaz, Muhammad Naeem, Muhammad Rashid Ramzan, Farkhund Iqbal, Alagan Anpalagan:
Charging infrastructure placement for electric vehicles: An optimization prospective. 1-6 - Phillip Smith, Robert A. Hunjet, Aldeida Aleti, Jan Carlo Barca:
Adaptive data transfer methods via policy evolution for UAV swarms. 1-8 - Chung-Ming Huang, Duy-Tuan Dao, Ping-Yi Lu:
A credit-aware clustering scheme for the proximate sharing of geo data downloading. 1-6 - Yusuke Ito, Kouji Ohuchi:
Performance of multilevel differential polarization shift keying with estimation of inclined polarization axes over atmospheric turbulence channel. 1-6 - Tyler Nicholas Edward Steane, Peter J. Radcliffe:
A universal iot joining protocol for DIY applications. 1-3 - Yinjun Tu, Yudong Lei, Hanxuan Li, Yifu Wang, Yifeng Chen:
An augmented smart home system based on the internet of people concept. 1-3 - Samiru Gayan, Rajitha Senanayake, Jamie S. Evans:
On the symbol error probability for QPSK with quantized observations. 1-6 - Kubra Uludag, Ömer Korçak:
Energy and rate modeling of data download over LTE with respect to received signal characteristics. 1-6 - Ming Xiang, William Liu, Quan Bai, Adnan Al-Anbuky, Jinsong Wu, Arjuna Sathiaseelan:
NTaaS: Network trustworthiness as a service. 1-6 - Ying-Dar Lin:
Keynote topic: Network cloudification: SDN-NFV and 5G-MEC with edge and fog computing. 1-8 - Anees Al-Najjar, Samuel Teed, Jadwiga Indulska, Marius Portmann:
Flow-based load balancing of web traffic using OpenFlow. 1-6 - Md. Rajib Hasan, Hamid Gholamhosseini, Nurul I. Sarkar:
A new ensemble classifier for multivariate medical data. 1-6 - Qin Xin, Yan Xia:
Latency optimal broadcasting in noisy wireless mesh networks. 1-7 - Ali Rafiei, Mehran Abolhasan, Daniel Robert Franklin, Farzad Safaei, Stephen Smith, Wei Ni:
Effect of the number of participating nodes on recovery of WSN coverage holes. 1-8 - Elie Inaty, Robert Raad:
A CDMA-based dynamic power and bandwidth allocation (DPBA) scheme for multiclass EPON. 1-8 - Linchen Xiao, Arash Behboodi, Rudolf Mathar:
A deep learning approach to fingerprinting indoor localization solutions. 1-7 - Johannes Göbel, Anthony E. Krzesinski:
Increased block size and Bitcoin blockchain dynamics. 1-6 - Sujatha Sivabalan, Peter J. Radcliffe:
Detecting IoT zombie attacks on web servers. 1-3 - Ewa Niewiadomska-Szynkiewicz, Filip Nabrdalik:
Secure low energy AODV protocol for wireless sensor networks. 1-6 - Fan Wu, Christoph Rüdiger, Mehmet Rasit Yuce:
Design and field test of an autonomous IoT WSN platform for environmental monitoring. 1-6 - Xu Yang, Yue Liu, Ka Seng Chou, Laurie G. Cuthbert:
A game-theoretic approach to network slicing. 1-4 - Paula Raymond Lutui, Osai Tete'imoana, George Maeakafa:
An analysis of personal wireless network security in Tonga: A study of Nuku'alofa. 1-4 - Asanka Kekirigoda, Kin-Ping Hui:
Tactical line-of-sight MIMO communication system for contested networks. 1-6 - Khandakar Ahmed, Nazmus S. Nafi, Jan Olaf Blech, Mark A. Gregory, Heinrich-Wilhelm Schmidt:
Software defined industry automation networks. 1-3 - YeJi Kang, Doyeon Jung, Inshil Doh:
Automated parking lot management system using embedded robot type smart car based on wireless sensors. 1-6 - Ye Feng, Chamil Jayasundara, Ampalavanapillai Nirmalathas, Elaine Wong:
IEEE 802.11 HCCA for tactile applications. 1-3 - Muhammad Ammad uddin, Ali Mansour, Denis Le Jeune, El-Hadi M. Aggoune:
Agriculture internet of things: AG-IoT. 1-6 - James Jin Kang, Iryna Khodasevych, Sasan Adibi:
A disaster recovery system for location identification-based low power wide area networks (LPWAN). 1-6 - Sharon Ezekiel, Dinil Mon Divakaran, Mohan Gurusamy:
Dynamic attack mitigation using SDN. 1-6 - Bob Warfield:
Extrapolation of customer demand, and implications for broadband access network design. 1-5 - Suman Sankar Bhunia, Mohan Gurusamy:
Dynamic attack detection and mitigation in IoT using SDN. 1-6 - Akbar Hossain, Farhaan Mirza, M. Asif Naeem, Jairo A. Gutiérrez:
A crowd sourced framework for neighbour assisted medical emergency system. 1-6 - Kaixing Huang, Chunjie Zhou, Yu-Chu Tian, Weixun Tu, Yuan Peng:
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks. 1-6 - Jianhua Li, Tiehua Zhang, Jiong Jin, Yingying Yang, Dong Yuan, Longxiang Gao:
Latency estimation for fog-based internet of things. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.