default search action
20th ICIN 2017: Paris, France
- Noël Crespi, Antonio Manzalini, Stefano Secci:
20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017, Paris, France, March 7-9, 2017. IEEE 2017, ISBN 978-1-5090-3672-1 - Cristina Perfecto, Javier Del Ser, Mehdi Bennis:
On the interplay between scheduling interval and beamwidth selection for low-latency and reliable V2V mmWave communications. 1-8 - Smail Ghoul, Weijia Jia:
Techno-economic analysis and prediction for the deployment of 5G mobile network. 9-16 - Rupesh Singh:
Sub-channel assignment and resource scheduling for non-orthogonal multiple access (NOMA) in downlink coordinated multi-point systems. 17-22 - Mohsin Khalil, Junaid Qadir, Oluwakayode Onireti, Muhammad Ali Imran, Shahzad Younis:
Feasibility, architecture and cost considerations of using TVWS for rural Internet access in 5G. 23-30 - Wojciech Kmiecik, Krzysztof Walkowiak:
Dynamic overlay multicasting for deadline-driven requests provisioning in elastic optical networks. 31-35 - Charalampos Gavriil Kominos, Nicolas Seyvet, Konstantinos Vandikas:
Bare-metal, virtual machines and containers in OpenStack. 36-43 - Federico Rizzo, Giovanni Luca Spoto, Paolo Brizzi, Dario Bonino, Giuseppe Di Bella, Pino Castrogiovanni:
Beekup: A distributed and safe P2P storage framework for IoE applications. 44-51 - Pedro Martinez-Julia, Ved P. Kafle, Hiroaki Harai:
Achieving the autonomic adaptation of resources in virtualized network environments. 52-59 - Valentin Rakovic, Aleksandar Ichkov, Nina Grosheva, Vladimir Atanasovski, Liljana Gavrilovska:
Analysis of virtual resource allocation for cloud-RAN based systems. 60-64 - Khaled Salah, Tarek Rahil Sheltami:
Performance modeling of cloud apps using message queueing as a service (MaaS). 65-71 - Nam H. Do, Tien Van Do, Xuan Thi Tran, Lóránt Farkas, Csaba Rotter:
A scalable routing mechanism for stateful microservices. 72-78 - Ian Oliver, Silke Holtmanns:
Providing for privacy in a network infrastructure protection context. 79-86 - Sowmya Ravidas, Shankar Lal, Ian Oliver, Leo Hippelainen:
Incorporating trust in NFV: Addressing the challenges. 87-91 - Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache:
Scalable and cost-efficient algorithms for VNF chaining and placement problem. 92-99 - Ruoqiao Li, Xi Xie, Pu Wang, Cong Jin:
Cloud-based moving object detection for mobile devices. 100-102 - Ludovic Noirie, Michel Le Pallec, Nesrine Ammar:
Towards automated IoT service recommendation. 103-106 - Christos Bouras, Anastasia Kollia, Andreas Papazois:
SDN & NFV in 5G: Advancements and challenges. 107-111 - Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". 112-116 - Hassan Bostani, Jean-Charles Grégoire:
Usable authentication systems for real time web-based audio/video communications. 117-121 - Said El Kafhali, Khaled Salah:
Stochastic modelling and analysis of cloud computing data center. 122-126 - Jaafar Bendriss, Imen Grida Ben Yahia, Djamal Zeghlache:
Forecasting and anticipating SLO breaches in programmable networks. 127-134 - Joe Mambretti, Jim Hao Chen, Fei Yeh, Robert L. Grossman, Piers Nash, Alison Heath, Renuka Arya, Stuti Agrawal, Zhenyu Zhang:
Designing and deploying a bioinformatics software-defined network exchange (SDX): Architecture, services, capabilities, and foundation technologies. 135-142 - Olivier Dugeon, Rabah Guedrez, Samer Lahoud, Géraldine Texier:
Demonstration of Segment Routing with SDN based label stack optimization. 143-145 - Reinhard Behrens, Ali Ahmed:
Internet of Things: An end-to-end security layer. 146-149 - Fariborz Derakhshan, Horst Roessler, Peter Schefczik, Sabine Randriamasy:
On prediction of resource consumption of service requests in cloud environments. 169-176 - Antoine Auger, Ernesto Exposito, Emmanuel Lochin:
Sensor observation streams within cloud-based IoT platforms: Challenges and directions. 177-184 - Tasneem Salah, Mohamed Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Performance comparison between container-based and VM-based services. 185-190 - Xiaofeng Qiu, Fangyuan Cheng, Weijia Wang, Gang Zhang, Yangjun Qiu:
A security controller-based software defined security architecture. 191-195 - Rebecca Copeland, Michael Copeland:
Independently Verifiable Identity Scheme (IVIS). 196-198 - Jonathan Vestin, Andreas Kassler:
SDN enabled resiliency in LTE assisted small cell mmWave backhaul networks. 199-202 - Amina Boubendir, Emmanuel Bertin, Noëmie Simoni:
A VNF-as-a-service design through micro-services disassembling the IMS. 203-210 - Camille Jaggernauth, Douglas Gubbe:
An extended SNMP based IoT context-aware model for dynamic adaptability of embedded systems software. 211-213 - Csaba Rotter, Janos Illes, Gabor Nyiri, Lóránt Farkas, Gergely Csatári, Gergo Huszty:
Telecom strategies for service discovery in microservice environments. 214-218 - Bruno Chatras, Steve Tsang Kwong U, Nicolas Bihannic:
NFV enabling network slicing for 5G. 219-225 - Sirisilp Kongsilp, Matthew N. Dailey:
Communication portals: Immersive communication for everyday life. 226-228 - Ahmed Khalid, Jason J. Quinlan, Cormac J. Sreenan:
MiniNAM: A network animator for visualizing real-time packet flows in Mininet. 229-231 - Luigi Atzori, Roberto Girau, Salvatore Martis, Virginia Pilloni, Marco Uras:
A SIoT-aware approach to the resource management issue in mobile crowdsensing. 232-237 - Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov:
Stimulus-based sandbox for learning resource dependencies in virtualized distributed applications. 238-245 - Imen Grida Ben Yahia, Jaafar Bendriss, Alassane Samba, Philippe Dooze:
CogNitive 5G networks: Comprehensive operator use cases with machine learning for management operations. 252-259 - Andrey Tolstikhin, Zeljko Zilic:
Concealed regression for aggregation in low power wireless networks. 260-267 - Ali Saeed Dayem Alfoudi, Mohammed Dighriri, Gyu Myoung Lee, Rubem Pereira, Fung Po Tso:
Traffic management in LTE-WiFi slicing networks. 268-273 - Jean-Charles Grégoire:
Mediation-based communications. 274-278 - Osamah L. Barakat, David Koll, Xiaoming Fu:
Gavel: Software-defined network control with graph databases. 279-286 - David Perez Abreu, Karima Velasquez, Alexandre Miguel Pinto, Marília Curado, Edmundo Monteiro:
Describing the Internet of Things with an ontology: The SusCity project case study. 294-299 - Matteo Mallus, Giuseppe Colistra, Luigi Atzori, Maurizio Murroni, Virginia Pilloni:
A persuasive real-time carpooling service in a smart city: A case-study to measure the advantages in urban area. 300-307 - Sameer G. Kulkarni, Mayutan Arumaithurai, K. K. Ramakrishnan, Xiaoming Fu:
Neo-NSH: Towards scalable and efficient dynamic service function chaining of elastic network functions. 308-312 - Shohreh Ahvar, Gabriel Santos, Nouredine Tamani, Bernard Istasse, Isabel Praça, Paul-Emmanuel Brun, Yacine Ghamri-Doudane, Noël Crespi:
Ontology-based model for trusted critical site supervision in FUSE-IT. 313-315 - Jean-Charles Grégoire, Song Nhi Nguyen:
Tell me again, why should i talk to strangers? 316-318 - Cigdem Sengul:
Privacy, consent and authorization in IoT. 319-321 - Federico Fernandez, Álvaro Alonso, Lourdes Marco, Joaquín Salvachúa:
A model to enable application-scoped access control as a service for IoT using OAuth 2.0. 322-324 - Michele Nitti, Roberto Girau, Luigi Atzori, Virginia Pilloni:
Trustworthiness management in the IoT: The importance of the feedback. 325-327 - Dina Hussein, Emmanuel Bertin, Vincent Frey:
Access control in IoT: From requirements to a candidate vision. 328-330 - Paridhika Kayal, Harry G. Perros:
A comparison of IoT application layer protocols through a smart parking implementation. 331-336 - Lei Miao:
Calibration-free wireless indoor localization (CAFLOC). 337-342 - Hitomi Fuji, Kazuya Tsukamoto, Akira Nagata, Katsuichi Nakamura:
Effective data collection scheme for real-spatial group communication among mobile nodes. 343-348 - Daniel Kümper, Ralf Tönjes, Elke Pulvermüller:
An infrastructure-based interpolation and propagation approach for IoT data analytics. 349-354 - Dan Puiu, Stefan Bischof, Bogdan Serbanescu, Septimiu Nechifor, Josiane Xavier Parreira, Herwig Schreiner:
A public transportation journey planner enabled by IoT data analytics. 355-359 - Thu-Le Pham, Stefano Germano, Alessandra Mileo, Daniel Kümper, Muhammad Intizar Ali:
Automatic configuration of smart city applications for user-centric decision support. 360-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.