default search action
7th SDS 2020: Paris, France
- 2020 Seventh International Conference on Software Defined Systems, SDS 2020, Paris, France, April 20-23, 2020. IEEE 2020, ISBN 978-1-7281-7219-4
- Hamzeh Mohammadnia, Slimane Ben Slimane:
IoT-NETZ: Practical Spoofing Attack Mitigation Approach in SDWN Network. 5-13 - Oscar Enrique Llerena Castro:
Network GPRS Prototype based on SDR and OpenBTS, as an IoT-lab Testbed. 14-19 - Angelos Mimidis Kentis, José Soler, Adam Broadbent, Paul Veitch:
Accelerating Platform Deployments in the Cloud: A Qualitative Assessment Based on CORD. 20-23 - Haythem Bany Salameh, Haneen Khasawneh:
Spectrum-time Availability-aware Routing Mechanism for Software-Defined Networks with Out-of-band Full-Duplex Capabilities. 24-28 - Alexander Kern, Reiner Anderl:
Using Digital Twin Data for the Attribute-Based Usage Control of Value-Added Networks. 29-36 - Mohammed Bawatna, Oliver Knodel, Rainer G. Spallek:
Possibilities and Challenges for Reconfigurable Hardware and Cloud Architectures in Data-Intensive Scientific Applications. 37-42 - Thomas Rauber, Gudula Rünger:
A Parameter Selection Process by Data Analysis for Tuning Multi-threaded Time-Stepping Algorithms. 43-50 - Daniel Merling, Steffen Lindner, Michael Menth:
Comparison of Fast-Reroute Mechanisms for BIER-Based IP Multicast. 51-58 - Melaku Girma, Nuno M. Garcia, Eftim Zdravevski, Mesfin Kifle, Nuno Pombo, Vladimir Trajkovik:
Analysis of trends in scientific publications by an NLP toolkit: A case study in Software Development Methods for Enhanced Living Environment. 59-66 - Mohamed Saleh Al Breiki, Suiping Zhou, Yuan Roger Luo:
Development of OpenFlow Native Capabilities to optimize QoS. 67-74 - Behailu Getachew Wolde, Abiot Sinamo Boltana:
Behavior-Driven Re-engineering for Testing the Cloud. 75-82 - Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
Network Obfuscation for Net Worth Security. 83-88 - Muder Almiani, Abdul Razaque, Shen Ziqi, Ge Yaqin, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh:
Android CompCache based on Graphics Processing Unit. 89-94 - Abdul Razaque, Kalkamanova Kamila Myrzabekovna, Spanova Yerkezhan Magbatkyzy, Muder Almiani, Baktygulova Aray Doszhanovna, Awny Alnusair:
Secure Password-Driven Fingerprint Biometrics Authentication. 95-99 - Razan AlZoman, Mohammed J. F. Alenazi:
Exploiting SDN to Improve QoS of Smart City Networks Against Link Failures. 100-106 - Mario Baldi, Diego Crupnicoff, Silvano Gai:
Programmable Dataplane Architecture for Distributed Services at the Network Edge. 107-114 - Pradeeban Kathiravelu, Peter Van Roy, Luís Veiga, Elhadj Benkhelifa:
Latency-Sensitive Web Service Workflows: A Case for a Software-Defined Internet. 115-122 - Steve Mann, Phillip V. Do, Zhao Lu, Jacky K. K. Lau:
Sequential Wave Imprinting Machine (SWIM) Implementation using SDR (Software-Defined Radio). 123-130 - Rahaf Al-hamouri, Heba Al-Jarrah, Ziad A. Al-Sharif, Yaser Jararweh:
Measuring the Impacts of Virtualization on the Performance of Thread-Based Applications. 131-138 - Malni Kumarathunga:
Improving Farmers' Participation in Agri Supply Chains with Blockchain and Smart Contracts. 139-144 - Gökay Saldamli, Vamshi Reddy, Krishna S. Bojja, Manjunatha K. Gururaja, Yashaswi Doddaveerappa, Lo'ai Tawalbeh:
Health Care Insurance Fraud Detection Using Blockchain. 145-152 - Gökay Saldamli, Kavitha Karunakaran, Vidya K. Vijaykumar, Weiyang Pan, Siddesh Puttarevaiah, Levent Ertaul:
Securing Car Data and Analytics using Blockchain. 153-159 - Panayiotis Christodoulou, Klitos Christodoulou:
A Decentralized Voting Mechanism: Engaging ERC-20 token holders in decision-making. 160-164 - Miguel Pincheira, Massimo Vecchio, Raffaele Giaffreda:
Rationale and Practical Assessment of a Fully Distributed Blockchain-based Marketplace of Fog/Edge Computing Resources. 165-170 - Anang Hudaya Muhamad Amin, Nabih Abdelmajid, Fred N. Kiwanuka:
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network. 171-176 - Mayank Raikwar, Danilo Gligoroski, Goran Velinov:
Trends in Development of Databases and Blockchain. 177-182 - Federico Carlini, Roberto Carlini, Stefano Dalla Palma, Remo Pareschi, Federico Zappone, Daniele Albanese:
The Genesy Model for a Blockchain-based Fair Ecosystem of Genomic Data. 183-189 - Martin Martinez, Arvin Hekmati, Bhaskar Krishnamachari, Seokgu Yun:
Mobile Encounter-based Social Sybil Control. 190-195 - Aman Framewala, Sarvesh Harale, Shreya Khatal, Dhiren R. Patel, Yann Busnel, Muttukrishnan Rajarajan:
Blockchain Analysis Tool For Monitoring Coin Flow. 196-201 - Ulrich Gallersdörfer, Florian Matthes:
Towards Valid Use Cases: Requirements and Supporting Characteristics of Proper Blockchain Applications. 202-207 - Pavel Kostyuk, Sergey Kudryashov, Yash Madhwal, Ivan Maslov, Vladislav Tkachenko, Yury Yanovich:
Blockchain-Based Solution to Prevent Plastic Pipes Fraud. 208-213 - Jash Rathod, Ashutosh Gupta, Dhiren Patel:
Using Blockchain Technology for Continuing Medical Education Credits System. 214-219 - Bilal Hawashin, Shadi AlZu'bi, Ala Mughaid, Farshad Fotouhi, Ahmad Abusukhon:
An Efficient Cold Start Solution for Recommender Systems Based on Machine Learning and User Interests. 220-225 - Abdul Razaque, Fathi H. Amsaad, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf M. Ganda, Majdi Rawashdeh, Amer Al-Rahayfeh:
Efficient Context-aware File System Approach. 226-230 - Abdul Razaque, Fathi H. Amsaad, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahamed, Ayman Al-Dmour, Meer Jaro Khan, Raouf M. Ganda:
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data. 231-234 - Ahmad Abusukhon, Shadi AlZu'bi:
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value. 235-239 - Ahmad A. A. Alkhatib, Thaer Sawalha, Shadi AlZu'bi:
Load Balancing Techniques in Software-Defined Cloud Computing: an overview. 240-244 - Mohammed Lafi, Bilal Hawashin, Shadi AlZu'bi:
Maintenance Requests Labeling Using Machine Learning Classification. 245-249 - Boris Ramos, Álvaro Bustamante, Maricela Freire:
Power Measurement System in a Microwave Link using SDR for Rain Rate Estimation. 250-255 - Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Kok-Keng Loo:
Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol. 256-261 - Haorui Peng, Emma Fitzgerald, William Tärneberg, Maria Kihl:
5G Radio Access Network Slicing in Massive MIMO Systems for Industrial Applications. 262-267 - Kiran Nahida, Chunyu Pan, Changchuan Yin:
Reinforcement Learning for Task Offloading in Mobile Edge Computing for SDN based Wireless Networks. 268-273 - Santiago Bentancur, Martín Fernández Bon, Gabriel Gómez Sena, Claudina Rattaro, Ignacio Brugnoli:
Flow-based QoS forwarding strategy: a practical implementation and evaluation. 274-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.