default search action
33rd ICOIN 2019: Kuala Lumpur, Malaysia
- 33rd International Conference on Information Networking, ICOIN 2019, Kuala Lumpur, Malaysia, January 9-11, 2019. IEEE 2019, ISBN 978-1-5386-8350-7
- Yuan Zhuang, Qiaoyue Pang, Min Wei:
Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network. 1-6 - Joong-Hwa Jung, Dong-Kyu Choi, Ji-In Kim, Seok Joo Koh:
Mobility Management for Healthcare Services in CoAP-Based IoT Networks. 7-12 - Masaki Ueno, Go Hasegawa, Masayuki Murata:
Experimental Evaluation of Mobile Core Networks on Simultaneous Access from M2M/IoT Terminals. 13-18 - Yuki Takei, Zhi Liu, Hiroaki Sawano, Susumu Ishihara:
Accurate Position Estimation of a Drifting Wireless LAN Communication Device in a 200mm-Diameter Small Sewer Pipe. 19-24 - Preeti Jain, Sunil K. Surve:
Resource Centric Characterization and Classification of Applications Using KMeans for Multicores. 25-30 - Robert Basomingera, Young-June Choi:
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks. 31-36 - Phuylai Oeung, Fuke Shen:
Imbalanced Internet Traffic Classification Using Ensemble Framework. 37-42 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System. 43-48 - Anselme Ndikumana, Choong Seon Hong:
Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching. 49-54 - Adamu Muhammad Noma, Abdullah Muhammad:
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness. 55-59 - Muhammad I. H. Sukmana, Kennedy A. Torkura, Hendrik Graupner, Feng Cheng, Christoph Meinel:
Unified Cloud Access Control Model for Cloud Storage Broker. 60-65 - Varun Amrutiya, Siddhant Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia:
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains. 66-71 - Harsha Vasudev, Debasis Das:
A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing. 72-77 - Madhur Poddar, Swathi Ganta, K. R. Swaraj, Debasis Das:
Privacy in the Internet of Vehicles: Models, Algorithms, and Applications. 78-83 - Myungwhan Choi, Areeya Rubenecia, Hyo Hyun Choi:
Reservation-Based Intersection Crossing Scheme for Autonomous Vehicles Traveling in a Speed Range. 84-87 - Dong-Kyu Choi, Joong-Hwa Jung, Seok Joo Koh, Ji-In Kim, Juyoung Park:
In-Vehicle Infotainment Management System in Internet-of-Things Networks. 88-92 - Nway Nway Ei, Chit Wutyee Zaw, Min Kyung Lee, Choong Seon Hong:
Cell Association in Energy-Constrained Unmanned Aerial Vehicle Communications Under Altitude Consideration. 93-97 - Hayato Ishikawa, Eiji Okamoto, Shouhei Okamoto, Hiraku Okada, Satoshi Makido:
Performance Analysis of Uplink V2I Cooperative Transmission Scheme in Practical Road Environments. 98-102 - Ryo Hasegawa, Eiji Okamoto, Hiroyuki Tsuji, Amane Miura:
Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters. 103-107 - Madyan Alsenwi, Shashi Raj Pandey, Yan Kyaw Tun, Ki Tae Kim, Choong Seon Hong:
A Chance Constrained Based Formulation for Dynamic Multiplexing of eMBB-URLLC Traffics in 5G New Radio. 108-113 - Zhipeng Cheng, Yuliang Tang, Haijie Wu:
Joint Task Offloading and Flexible Functional Split in 5G Radio Access Network. 114-119 - Hiroki Utatsu, Kai Osawa, Jun Mashino, Satoshi Suyama, Hiroyuki Otsuka:
Throughput Performance of Relay Backhaul Enhancement Using 3D Beamforming. 120-124 - Teerapat Sanguankotchakorn, Chintala Aravind Kumar:
Optimizing Power by Combining Small Cells with a Massive MIMO for Maximum Energy Efficiency Under Two Path Loss Models. 125-130 - Md. Kamruzzaman, Nurul I. Sarkar, Jairo A. Gutiérrez, Sayan Kumar Ray:
A Mode Selection Algorithm for Mitigating Interference in D2D Enabled Next-Generation Heterogeneous Cellular Networks. 131-135 - Yoshihiro Masuda, Eiji Okamoto, Keita Ito, Tetsuya Yamamoto:
An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation. 136-140 - Ashis Talukder, DoHyeon Kim, Choong Seon Hong:
A Heuristic Mixed Model for Viral Marketing Cost Minimization in Social Networks. 141-146 - Takehiro Nagato, Takumi Tsutano, Tomio Kamada, Yumi Takaki, Chikara Ohta:
Distributed Key-Value Storage for Edge Computing and its Explicit Data Distribution Method. 147-152 - Hanen Brahmi:
Post-Mining of Generalized Association Rules from Data Cubes. 153-158 - Hanen Brahmi:
Ontology Enhanced Mining of Multidimensional Association Rules from Data Cubes. 159-164 - W. A. Shanaka P. Abeysiriwardhana, Janaka Wijekoon, Hiroaki Nishi:
Optimized Service Function Path Selection for IoT Devices Using Virtual Network Function Performance Data. 165-170 - Huali Cui, Qindong Sun, Beibei Zhang, Xingjun Zhang, Weiguo Wu:
Video-Aware Multipath Network Coding over Multi-Hop Wireless Networks. 171-175 - Sangwook Han, Yunmin Go, Hyunmin Noh, Hwangjun Song:
Cooperative Server-Client HTTP Adaptive Streaming System for Live Video Streaming. 176-180 - Yuki Maehara, Toshiro Nunome:
WebRTC-Based Multi-View Video and Audio Transmission and its QoE. 181-186 - Heekwang Kim, Kwangsue Chung:
Collective Segment Request Policy of HTTP Adaptive Streaming in Multipath Environments. 187-192 - Meihua Jin, Ji-Young Jung, Dara Ron, Sengly Muy, Jung-Ryun Lee:
Energy-Efficient Sleep Mode Adjustment Considering GoP Structure. 193-197 - Masaaki Ohnishi, Kazuyuki Shudo:
Distributed ID/Locator Resolution System for Inter Mesh Networks. 198-203 - Nor Aida Mahiddin, Nurul I. Sarkar:
An Efficient Gateway Routing Scheme for Disaster Recovery Scenario. 204-209 - Toshiki Nonaka, Takeo Fujii, Osamu Takyu, Mai Ohta:
Network MIMO with Interference Cancellation for Cloud-Cooperated Wireless Sensor Networks. 210-215 - Nurul I Sarkar, Sonia Gul, Bowen Anderton:
Gigabit Ethernet with Wireless Extension: OPNET Modelling and Performance Study. 216-221 - Sai Wang, Yoan Shin:
3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks. 222-226 - Avinash Subramaniam, Hwee-Xian Tan, Hwee-Pink Tan:
BLE-Enabled Medication Events Monitoring System (MEMS) for Community Dwelling Seniors. 227-232 - Heesang Jin, Gyeongsik Yang, Bong-yeol Yu, Chuck Yoo:
TALON: Tenant Throughput Allocation Through Traffic Load-Balancing in Virtualized Software-Defined Networks. 233-238 - Tri-Hai Nguyen, Jaejin Lee, Myungsik Yoo:
A Practical Model for Optimal Placement of Virtual Network Functions. 239-241 - Bong-yeol Yu, Gyeongsik Yang, Heesang Jin, Chuck Yoo:
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor. 242-247 - Melchizedek I. Alipio, Alex Gyran A. Co, Melinda Faye C. Hilario, Christian Miguel C. Pama:
SDN-Enabled Value-Based Traffic Management Mechanism in Resource-Constrained Sensor Devices. 248-253 - Samir Kumar Tarai, Samar Shailendra:
Optimal and Secure Controller Placement in SDN Based Smart City Network. 254-261 - Keita Ito, Yoshihiro Masuda, Eiji Okamoto:
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding. 262-267 - Aunas Manzoor, Seok Won Kang, Choong Seon Hong:
Chance-Constrained Spectrum Allocation for Fair LTE-U/Wi-Fi Coexistence. 268-273 - Keita Onose, Koya Sato, Kei Inage, Takeo Fujii:
Experimental Verification of Frequency-Correlation in Radio Propagation Characteristics for Radio Environment Recognition. 274-278 - Yoonkyung Jang, Ahreum Shin, Myeongseung Han, Intae Ryoo:
3-D GM-MAC with Fixed Sensor Nodes for Stability Improvement. 279-283 - Yan Kyaw Tun, Shashi Raj Pandey, Madyan Alsenwi, Chit Wutyee Zaw, Choong Seon Hong:
Weighted Proportional Allocation Based Power Allocation in Wireless Network Virtualization for Future Wireless Networks. 284-289 - Jinhyeok Park, Hoki Baek, Jaesung Lim:
A Dynamic TDMA Scheme for UAV Based Relay in Combat Net Radio Networks. 290-295 - Mee Hong Ling, Kok-Lim Alvin Yau:
Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks. 296-300 - Natasa Zivic, Christoph Ruland, Jochen Sassmannshausen:
Distributed Ledger Technologies for M2M Communications. 301-306 - Chih-Min Chao, Chia-Tsun Chen, Sin-Jhong Huang:
An Adjustable Channel Hopping Algorithm Based on Channel Usage Ratio for Multi-Radio CRNs. 307-309 - Johannes Goltz, Thomas Mundt, Simeon Wiedenmann:
Risk Analysis in Fieldbus Networks Using the Example of KNX. 310-315 - Azusa Iikubo, Shou-Chih Lo:
Design of Power Saving Schemes for the IoT. 316-319 - Wentao Zhou, Yoan Shin:
Application of OFDM in Underwater Magnetic Induction Communication. 320-323 - Keitaro Terada, Hiroaki Mukai, Tetsuya Yokotani:
Enhancement of MAC Protocol for Power Reduction in LoRa WAn. 324-326 - Daiki Takemura, Atsusuke Murata, Kensei Miyakoshi, Tetsuya Yokotani, Yasunori Kobayashi, Yasuhiro Kobayashi:
System Designing and Plototyping on IoT for a Factory. 327-329 - Shota Uchiyama, Yutaro Yanagida, Masahiro Murakami, Osamu Mizuno:
The Urban-Area Mitigation System for Providing Information and its Generalization. 330-335 - Keigo Kimura, Kandai Mochizuki, Masafumi Koike, Osamu Mizuno:
Data Transfer Methods for Information-Centric Networking-Based Wireless Sensor Network Platform. 336-341 - Bum Il Hong, Intae Ryoo, Gon Khang:
On a Posteriori Error Bounds of Trapezoidal Rule. 342-344 - Jeongmin Moon, Mukoe Cheong, Ikjun Yeom, Honguk Woo:
Deep Reinforcement Learning Based Sensor Data Management for Vehicles. 345-349 - Krisada Sangsanit, Chian Techapanupreeda:
NodeMCU Choreography Automation by CoAP. 350-353 - Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai:
MQTT over VLAN for Reduction of Overhead on Information Discovery. 354-356 - Chung-Ming Huang, Zhong-You Wu, Shih Yang Lin:
The Mobile Edge Computing (MEC)-Based VANET Data Offloading Using the Staying-Time-Oriented k-Hop Away Offloading Agent. 357-362 - Yoshiki Kuwabara, Yudai Matsuno, Kan Akutsu, Hiroaki Mukai, Tetsuya Yokotani:
Evaluation of Multiplexing on the Characteristics of Surveillance Camera Data Traffic. 363-365 - Youngpin Kim, Sungwon Ahn, Nguyen Canh Thang, DongHo Choi, Minho Park:
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks. 366-371 - Dohyun Kwon, Joongheon Kim:
Optimal Trajectory Learning for UAV-BS Video Provisioning System: A Deep Reinforcement Learning Approach. 372-374 - Tuan V. Ha, Doan B. Hoang:
Toward an Active Aging Society: An IT Model to Engage the Aging Population. 375-380 - Jin Qiang Goh, Hwee-Pink Tan, Hwee-Xian Tan:
Quantifying Activity Levels of Community-Dwelling Seniors Through Beacon Monitoring. 381-386 - Ryota Kurokawa, Go Hasegawa, Masayuki Murata:
Biochemical-Inspired Autonomous Control of Virtualized Network Functions. 387-392 - Muhammad Hanif, Hyeongdeok Yoon, Choonhwa Lee:
Benchmarking Tool for Modern Distributed Stream Processing Engines. 393-395 - Akashah Arshad, Zurina Mohd Hanapi, Shamala K. Subramaniam, Rohaya Latip:
Performance Evaluation of the Geographic Routing Protocols Scalability. 396-398 - Jiwon Min, Youngseok Lee:
An Experimental View on Fairness between HTTP/1.1 and HTTP/2. 399-401 - Ahreum Shin, Myeongseung Han, Yoonkyung Jang, Intae Ryoo:
Anchor-Based Group Relay MAC. 402-407 - Yuya Kumai, Koki Hongyo, Tomotaka Kimura, Kouji Hirata:
Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling. 408-410 - Taketo Fukushima, Masamitsu Iio, Kouji Hirata, Miki Yamamoto:
Popularity-Based Content Cache Management for in-Network Caching. 411-413 - Tomotaka Kimura, Chinthaka Premachandra:
Aggressive Recovery Scheme for Multicast Communication in Intermittently Connected Mobile Ad-Hoc Networks. 414-416 - Tetsuya Noguchi, Osamu Takyu, Takeo Fujii, Tomoaki Ohtsuki:
Performance Evaluation of Information-Sharing Scheme Among Multiple Destinations with Mirroring Null Steering in Single Antenna Networks. 417-420 - Shuhei Yamasaki, Osamu Takyu, Keiichiro Shirai, Takeo Fujii, Mai Ohta, Fumihito Sasamori, Shiro Handa:
Data Separation Considering Smoothness of Sensing Data in Physical Wireless Parameter Conversion Sensor Networks. 421-423 - Kenji Fukui, Koji Tsubouchi, Shigeru Iwashina:
A Comparative Study on Anchorless Routing in 5G System. 424-426 - Moonjoong Kang, Jun-Sik Shin, JongWon Kim:
Protected Coordination of Service Mesh for Container-Based 3-Tier Service Traffic. 427-429 - Atsuko Yokotani, Satoshi Ohzahata, Ryo Yamamoto, Toshihiko Kato:
A Dynamic Cache Size Assignment Method with Bandwidth Reservation for CCN. 430-435 - JinCheol Kwon, Namgon Lucas Kim, Moonjoong Kang, Jong WonKim:
Design and Prototyping of Container-Enabled Cluster for High Performance Data Analytics. 436-438 - Junhyun Park, Youngjune Oh, HyungHo Byun, Chong-kwon Kim:
Low Cost Fine-Grained Air Quality Monitoring System Using LoRa WAN. 439-441 - Sinan Emre Tasçi, Ömer Korçak:
On Fair and Efficient Bandwidth Sharing in User Provided Networks. 442-447 - Kitae Kim, Jared Lynskey, Seok Won Kang, Choong Seon Hong:
Prediction Based Sub-Task Offloading in Mobile Edge Computing. 448-452 - Kyoungjae Sun, Younghan Kim:
PMIP-Based Distributed Session Mobility Management for 5G Mobile Network. 453-456 - Myeongseung Han, Eunsung Cho, Jun-Hyuk Lee, Intae Ryoo:
A Study on Fault Tolerance Technique for AGR-MAC Protocol Based Sensor Networks. 457-460 - Woojin Shim, Keecheon Kim:
A Study on Communication Optimization in Multi-SDN Controller. 461-464 - Yena Jeong, DongYeop Hwang, Ki-Hyung Kim:
Blockchain-Based Management of Video Surveillance Systems. 465-468 - JaeSik Cho, DongYeop Hwang, Ki-Hyung Kim:
Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment. 469-472 - Tong-Sheng Wong, Gaik-Yee Chan, Fang-Fang Chua:
Adaptive Preventive and Remedial Measures in Resolving Cloud Quality of Service Violation. 473-479 - Ali Gohar, Ali Raza, Sanghwan Lee:
Dynamic Adaptive Streaming Over HTTP Using Scalable Video Coding with Multipath TCP in SDN. 480-484 - Sang Il Kim, Hwa Sung Kim:
Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment. 485-488 - Yongseon Ji, Suhwan Bae, Yongtae Shin:
A Personal Information Management Using BlockChain. 489-493
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.