default search action
26th ICCCN 2017: Vancouver, BC, Canada
- 26th International Conference on Computer Communication and Networks, ICCCN 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017. IEEE 2017, ISBN 978-1-5090-2991-4
- Ling Wang, Junjie Yang, Xiaojun Song:
A QoE-Driven Spectrum Decision Scheme for Multimedia Transmissions over Cognitive Radio Networks. 1-5 - Oluwaseyi Omotere, Lijun Qian, Riku Jäntti, Miao Pan, Zhu Han:
Big RF Data Assisted Cognitive Radio Network Coexistence in 3.5GHz Band. 1-8 - Sayantan Chowdhury, Jianping Pan:
Channel Assignment in Cognitive Radio Networks: A Joint Utility and Stable Matching Approach. 1-9 - Aklilu Assefa Gebremichail, Cory C. Beard:
Fade Duration Based Sleep Mode Activation in Dense Femtocell Cluster Networks. 1-6 - Hugues Smeets, Matteo Ceriotti, Eduardo Ferrera, Pedro José Marrón:
Replacing Free-Ranging Robots with Alternative Mobile Nodes. 1-9 - Longfei Wu, Xiaojiang Du, Jie Wu, Bin Song:
Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks. 1-9 - Hao Ruan, Xiao Fu, Xuanyu Liu, Xiaojiang Du, Bin Luo:
Analyzing Android Application in Real-Time at Kernel Level. 1-9 - Sangyup Han, Jaehyun Park, Haeun Kim, Jaehee Ha, Seungwon Shin, Sungwon Kang, Myungchul Kim:
Mobility of Everything (MoE): An Integrated and Distributed Mobility Management. 1-11 - Tri Minh Nguyen, Wessam Ajib, Chadi Assi:
Online Algorithm for Wireless Backhaul HetNets with Advanced Small Cell Buffering. 1-9 - Shichang Xuan, Dapeng Man, Wei Wang, Jiangchuan Zhang, Wu Yang, Xiaojiang Du:
Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation. 1-7 - Suiming Guo, Liang Chen, Dah Ming Chiu:
An Incentive-Based Mixed QoE Framework for Content Delivery to Smart Homes. 1-9 - Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Closing the Floodgate with Stateless Content-Centric Networking. 1-10 - Yujian Fang, Yuezhi Zhou, Xiaohong Jiang, Di Zhang, Yaoxue Zhang:
Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and Pricing. 1-9 - Wenjun Li, Xianfeng Li, Hui Li:
MEET-IP: Memory and Energy Efficient TCAM-Based IP Lookup. 1-8 - Amitangshu Pal, Krishna Kant:
NACID: A Neighborhood Aware Caching and Interest Dissemination in Content Centric Networks. 1-9 - Teng Wang, Jiayin Wang, Son Nam Nguyen, Zhengyu Yang, Ningfang Mi, Bo Sheng:
EA2S2: An Efficient Application-Aware Storage System for Big Data Processing in Heterogeneous Clusters. 1-9 - Shenghui Yan, Shihan Xiao, Yuchi Chen, Yong Cui, Jiangchuan Liu:
GreenWay: Joint VM Placement and Topology Adaption for Green Data Center Networking. 1-9 - Maotong Xu, Sultan Alamro, Tian Lan, Suresh Subramaniam:
LASER: A Deep Learning Approach for Speculative Execution and Replication of Deadline-Critical Jobs in Cloud. 1-8 - David E. Irwin, Prateek Sharma, Supreeth Shastri, Prashant J. Shenoy:
The Financialization of Cloud Computing: Opportunities and Challenges. 1-11 - Xueshi Hou, Yao Lu, Sujit Dey:
Wireless VR/AR with Edge/Cloud Computing. 1-8 - Guanghui Wang, Jianping Pan, Jianping He, Subin Shen:
An Efficient Privacy-Preserving Localization Algorithm for Pervasive Computing. 1-9 - Zhe Fu, Zhi Liu, Jun Li:
Efficient Parallelization of Regular Expression Matching for Deep Inspection. 1-9 - Yu Zhou, Yuan Zhang, Sheng Zhong:
Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit. 1-9 - Myounggyu Won, Shaohu Zhang, Sang Hyuk Son:
WiTraffic: Low-Cost and Non-Intrusive Traffic Monitoring System Using WiFi. 1-9 - Han Gao, Zhengyu Yang, Janki Bhimani, Teng Wang, Jiayin Wang, Bo Sheng, Ningfang Mi:
AutoPath: Harnessing Parallel Execution Paths for Efficient Resource Allocation in Multi-Stage Big Data Frameworks. 1-9 - Baraa Saeed Ali, Kang Chen:
Fair Work-Conserving Bandwidth Guarantees in Datacenters Using MPTCP. 1-9 - Bochao Shen, Ravi Sundaram, Alexander Russell, Srinivas Aiyar, Karan Gupta, Abhinay Nagpal, Aditya Ramesh, Himanshu Shukla:
High Availability for VM Placement and a Stochastic Model for Multiple Knapsack. 1-9 - Wanchun Jiang, Liyuan Fang, HaiMing Xie, Xiangqian Zhou, Jianxin Wang:
Tars: Timeliness-Aware Adaptive Replica Selection for Key-Value Stores. 1-9 - Zhen Hong, Zehua Wang, Wei Cai, Victor C. M. Leung:
Connectivity-Aware Task Outsourcing and Scheduling in D2D Networks. 1-9 - Long Gong, Lanxi Huang, Paul Tune, Jinyoung Han, Chen-Nee Chuah, Matthew Roughan, Jun (Jim) Xu:
ForestStream: Accurate Measurement of Cascades in Online Social Networks. 1-9 - Benjamin D. Horne, Sibel Adali, Sujoy Sikdar:
Identifying the Social Signals That Drive Online Discussions: A Case Study of Reddit Communities. 1-9 - Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:
On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks. 1-9 - Vidyasagar Sadhu, Dario Pompili, Saman A. Zonouz, Vincent Sritapan:
CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion. 1-9 - Joshua Joy, Mario Gerla:
Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues. 1-9 - Jingjing Wang, Chunxiao Jiang, Zhu Han, Tony Q. S. Quek, Yong Ren:
Private Information Diffusion Control in Cyber Physical Systems: A Game Theory Perspective. 1-10 - Zhiyuan Zheng, A. L. Narasimha Reddy:
Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis. 1-11 - Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Jie Liu:
The Computer for the 21st Century: Security & Privacy Challenges after 25 Years. 1-10 - Dingmin Wang, Qing Li, Yong Jiang, Mingwei Xu, Guangwu Hu:
Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined Networks. 1-9 - Cheng Zhang, Jun Bi, Yu Zhou, Abdul Basit Dogar, Jianping Wu:
HyperV: A High Performance Hypervisor for Virtualization of the Programmable Data Plane. 1-9 - Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Optimize Routing in Hybrid SDN Network with Changing Traffic. 1-8 - Yu Xiong, Jin Shi, Yi Lv, George N. Rouskas:
Power-Aware Lightpath Management for SDN-Based Elastic Optical Networks. 1-9 - James Daly, Eric Torng:
TupleMerge: Building Online Packet Classifiers by Omitting Bits. 1-10 - Grenville Armitage, Russell Collom:
Benefits of FlowQueue-Based Active Queue Management for Interactive Online Games. 1-9 - Timothy Claeys, Franck Rousseau, Bernard Tourancheau, Andrzej Duda:
Clock Drift Prediction for Fast Rejoin in 802.15.4e TSCH Networks. 1-9 - Bo Wang, Xiaohui Luo, Ping Hu, Fengyuan Ren:
Improving Optimization-Based Rate Adaptation in DASH System. 1-9 - Jonathan Kua, Grenville Armitage:
Optimising DASH over AQM-Enabled Gateways Using Intra-Chunk Parallel Retrieval (Chunklets). 1-9 - Filip Lemic, Vlado Handziski, Mladen Miksa, Jan M. Rabaey, John Wawrzynek, Adam Wolisz:
Selection and Aggregation of Location Information Provisioning Services. 1-9 - Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu:
A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile Networks. 1-9 - Christian Meurisch, Julien Gedeon, The An Binh Nguyen, Fabian Kaup, Max Mühlhäuser:
Decision Support for Computational Offloading by Probing Unknown Services. 1-9 - Poona Bahrebar, Azarakhsh Jalalvand, Dirk Stroobandt:
Dynamically Reconfigurable Architecture for Fault-Tolerant 2D Networks-on-Chip. 1-7 - Hiroki Watanabe, Takao Kondo, Kunitake Kaneko, Fumio Teraoka:
Separating Communication Policies and Mechanisms to Make Protocol Layering Clearer. 1-9 - Taesik Gong, Jun Hyuk Chang, Joon-Gyum Kim, Soowon Kang, Donghwi Kim, Sung-Ju Lee:
Enjoy the Silence: Noise Control with Smartphones. 1-9 - Shiqi Jiang, Pengfei Zhou, Zhenjiang Li, Mo Li:
Memento: An Emotion Driven Lifelogging System with Wearables. 1-9 - Xuyu Wang, Runze Huang, Shiwen Mao:
SonarBeat: Sonar Phase for Breathing Beat Monitoring with Smartphones. 1-8 - Santiago Gonzalez, Tracy Camp, Katia Jaffrès-Runser:
The Sticking Heartbeat Aperture Resynchronization Protocol. 1-8 - Ali Akbari, Richard B. Dewey, Roozbeh Jafari:
Validation of a New Model-Free Signal Processing Method for Gait Feature Extraction Using Inertial Measurement Units to Diagnose and Quantify the Severity of Parkinson's Disease. 1-5 - Samet Tonyali, Kemal Akkaya, Nico Saputro, Xiuzhen Cheng:
An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks. 1-9 - Ala Altaweel, Radu Stoleru, Guofei Gu:
EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures. 1-11 - Pouya Ostovari, Jie Wu:
Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding. 1-9 - Robert Annessi, Joachim Fabini, Tanja Zseby:
It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication. 1-11 - Lang Liu, Yacong Gu, Qi Li, Purui Su:
RealDroid: Large-Scale Evasive Malware Detection on "Real Devices". 1-8 - Waltenegus Dargie, David Schoeniger, László Szilágyi, Xin An, Ronny Henker, Frank Ellinger:
A Highly Adaptive and Energy-Efficient Optical Interconnect for On-Board Server Communications. 1-8 - Hank H. Harvey, Ying Mao, Yantian Hou, Bo Sheng:
EDOS: Edge Assisted Offloading System for Mobile Devices. 1-9 - Chien-An Chen, Radu Stoleru, Geoffrey G. Xie:
Energy-Efficient Load-Balanced Heterogeneous Mobile Cloud. 1-9 - Manar Alqarni, Alexander Ing, Bin Tang:
LB-MAP: Load-Balanced Middlebox Assignment in Policy-Driven Data Centers. 1-9 - Hiroaki Yamanaka, Eiji Kawai, Yuuichi Teranishi, Hiroaki Harai:
Proximity-Aware IaaS for Edge Computing Environment. 1-10 - Shuai Wang, Zhimeng Yin, Song Min Kim, Tian He:
Achieving Spectrum Efficient Communication under Cross-Technology Interference. 1-8 - Shahab Farazi, Andrew G. Klein, D. Richard Brown:
Bounds on the Age of Information for Global Channel State Dissemination in Fully-Connected Networks. 1-7 - Sumit Roy, Kyeong Su Shin, A. Ashok, Mark McHenry, G. Vigil, Shyam Kannam, D. Aragon:
CityScape: A Metro-Area Spectrum Observatory. 1-9 - Danda B. Rawat, Taylor White, Min Song, Chongqing Zhang:
Leveraging Wireless Virtualization for Network Capacity Optimization in HetNets. 1-6 - James Griffioen, Kenneth L. Calvert, Zongming Fei, P. Sergio Rivera, Jacob Chappell, Mami Hayashida, Charles Carpenter, Yongwook Song, Hussamuddin Nasir:
VIP Lanes: High-Speed Custom Communication Paths for Authorized Flows. 1-9 - Hanxu Hou, Yunghsiang S. Han:
BASIC Codes for Distributed Storage Systems. 1-9 - Qun Yu, Taieb Znati:
Energy and Delay-Aware Traffic Control and Management in Large Scale Networks. 1-8 - Nageswara S. V. Rao, Qiang Liu, Satyabrata Sen, Jesse Hanley, Ian T. Foster, Rajkumar Kettimuthu, Chase Q. Wu, Daqing Yun, Don Towsley, Gayane Vardoyan:
Experiments and Analyses of Data Transfers over Wide-Area Dedicated Connections. 1-9 - Xueheng Hu, Aaron Striegel:
PASS: Content Pre-Staging through Provider Accessible Storage Service. 1-8 - James Edwards, Rebecca J. Passonneau, Taylor Cassidy, Thomas F. La Porta:
Resource Allocation for Pragmatically-Assisted Quality of Information-Aware Networking. 1-10 - Dylan Smyth, Seán McSweeney, Donna O'Shea, Victor Cionca:
Detecting Link Fabrication Attacks in Software-Defined Networks. 1-8 - Chungsik Song, Younghee Park, Keyur Golani, Youngsoo Kim, Kalgi Bhatt, Kunal Goswami:
Machine-Learning Based Threat-Aware System in Software Defined Networks. 1-9 - Yongqiang Wang, Chase Q. Wu, Aiqin Hou:
Periodic Scheduling of Deadline-Constrained Variable Slot-Bandwidth Reservations for Scientific Collaboration. 1-9 - Venkatesh Ramaswamy:
Quantifying the Scalability of Software Defined Networks with Dynamic Topology. 1-7 - Mohammad J. Abdel-Rahman, EmadelDin A. Mazied, Kory Teague, Allen B. MacKenzie, Scott F. Midkiff:
Robust Controller Placement and Assignment in Software-Defined Cellular Networks. 1-9 - Huanyang Zheng, Jie Wu:
Friend Recommendation in Online Social Networks: Perspective of Social Influence Maximization. 1-9 - Ba-Dung Le, Hung X. Nguyen, Hong Shen, Nickolas J. G. Falkner:
GLFR: A Generalized LFR Benchmark for Testing Community Detection Algorithms. 1-9 - Thomas Paul, Niklas Lochschmidt, Hani Salah, Anwitaman Datta, Thorsten Strufe:
Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks. 1-10 - Ken Goss, Riccardo Musmeci, Simone Silvestri:
Realistic Models for Characterizing the Performance of Unmanned Aerial Vehicles. 1-9 - Dennis E. Phillips, Mohammad-Mahdi Moazzami, Guoliang Xing, Jonathan M. Lees:
A Sensor Network for Real-Time Volcano Tomography: System Design and Deployment. 1-9 - J. J. Garcia-Luna-Aceves, Spencer Sevilla:
A Simple Solution to Scale-Free Internet Host Mobility. 1-9 - Zafer Vatansever, Maïté Brandt-Pearce:
Hybrid Indoor Tracking Using Crowdsourced Measurements. 1-7 - Mohamed Ibrahim, Marco Gruteser, Khaled A. Harras, Moustafa Youssef:
Over-The-Air TV Detection Using Mobile Devices. 1-9 - Giuseppe Bianchi, Simone Di Domenico, Mauro De Sanctis, Laura Liberati, Valerio Perrotta, Ernestina Cianca:
Unveiling Access Point Signal Instability in WiFi-Based Passive Sensing. 1-9 - Zainul Din, Jaudelice de Oliveira:
Anomaly Free on Demand Stateful Software Defined Firewalling. 1-9 - Meghana Bande, Venugopal V. Veeravalli:
Design of a Heterogeneous Cellular Network with a Wireless Backhaul. 1-7 - Ali Cagatay Cirik, Naveen Mysore Balasubramanya, Lutz Lampe:
Downlink Channel Estimation in Massive MIMO FDD Systems Using Block-ADMM. 1-6 - Lianjie Cao, Xiangyu Bu, Sonia Fahmy, Siyuan Cao:
Towards High Fidelity Network Emulation. 1-11 - Yu Zhao, Tingting Yu:
Channel Quality Correlation Based Channel Probing in Multiple Channels. 1-9 - Changhua Pei, Youjian Zhao, Guo Chen, Yuan Meng, Yang Liu, Ya Su, Yaodong Zhang, Ruming Tang, Dan Pei:
How Much Are Your Neighbors Interfering with Your WiFi Delay? 1-9 - Jun Zhang, Guangxing Zhang, Qinghua Wu, Lei Song, Gaogang Xie:
LazyAS: Client-Transparent Access Selection in Dual-Band WiFi. 1-9 - Roman Naumann, Stefan Dietzel, Laura Wartschinski, Ben Schumacher, Björn Scheuermann:
TANDEM: Prioritizing Wireless Communication for Robust Industrial Process Control. 1-9 - Victor Lira, Eduardo Tavares, Meuse N. Oliveira Jr.:
An Approach for Reducing Energy Consumption in Dependable Virtual Network Embedding. 1-9 - Gil Einziger, Marcelo Caggiani Luizelli, Erez Waisbard:
Constant Time Weighted Frequency Estimation for Virtual Network Functionalities. 1-9 - Alexander Afanasyev, Xiaoke Jiang, Yingdi Yu, Jiewen Tan, Yumin Xia, Allison Mankin, Lixia Zhang:
NDNS: A DNS-Like Name Service for NDN. 1-9 - Spyridon Mastorakis, Alexander Afanasyev, Yingdi Yu, Lixia Zhang:
nTorrent: Peer-to-Peer File Sharing in Named Data Networking. 1-10 - Shireesh Bhat, George N. Rouskas:
Service-Concatenation Routing with Applications to Network Functions Virtualization. 1-9 - Kuo Zhang, Salem Alqahtani, Murat Demirbas:
A Comparison of Distributed Machine Learning Platforms. 1-9 - Samuel Fuller Dodge, Lina J. Karam:
A Study and Comparison of Human and Deep Learning Recognition Performance under Visual Distortions. 1-7 - Sharath Chandrashekhara, Madhusudhan R. Kumar, Mahesh Venkataramaiah, Vipin Chaudhary:
Cider: A Case for Block Level Variable Redundancy on a Distributed Flash Array. 1-9 - Fakhreddine Ghaffari, Ali Akoglu, Bane Vasic, David Declercq:
Multi-Mode Low-Latency Software-Defined Error Correction for Data Centers. 1-8 - Shan Jiang, Jiannong Cao, Jia Wang, Milos Stojmenovic, Julien Bourgeois:
Uniform Circle Formation by Asynchronous Robots: A Fully-Distributed Approach. 1-9 - Jeff Burke:
Browsing an Augmented Reality with Named Data Networking. 1-9 - Yi Yang, Yeli Geng, Li Qiu, Wenjie Hu, Guohong Cao:
Context-Aware Task Offloading for Wearable Devices. 1-9 - Hatem Ibn-Khedher, Hossam Afifi, Ahmed E. Kamal:
Service Placement in Complex Active Networks. 1-9 - Haotian Deng, Qianru Li, Yuanjie Li, Songwu Lu, Chunyi Peng, Taqi Raza, Zhaowei Tan, Zengwen Yuan, Zhehui Zhang:
Towards Automated Intelligence in 5G Systems. 1-9 - Qiaozhi Xu, Junxing Zhang:
Building a Lightweight Testbed Using Devices in Personal Area Networks. 1-2 - Christian Meurisch, The An Binh Nguyen, Martin Kromm, Andrea Ortiz, Ragnar Mogk, Max Mühlhäuser:
DisVis 2.0: Decision Support for Rescue Missions Using Predictive Disaster Simulations with Human-Centric Models. 1-2 - Justin P. Rohrer:
Effects of GPS Error on Geographic Routing. 1-2 - Shuo-Han Chen, I-Ju Wang, Tseng-Yi Chen, Hsin-Wen Wei, Tsan-sheng Hsu, Wei-Kuan Shih:
Enhancing Usability for the Wireless Charging Vehicle Simulator. 1-2 - Robinson Udechukwu, Rudra Dutta, Takaya Miyazawa, Hiroaki Harai:
Evaluating Different Pricing Algorithms for a Flexible Optical Choice-Based Network. 1-2 - Mijanur Rahaman Palash, Kang Chen:
Improving WiFi Network Performance under MPTCP Users. 1-2 - Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
Joint Optimization of Task Placement and Routing in Minimizing Inter-DC Coflow Completion Time. 1-2 - Ho-Ting Wu, Kai-Wei Ke, Po-Hung Chen, Chun-Ting Lin, Ming-Che Chen:
Mean Holding Time in Sync of Lossy IEEE 802.15.4e TSCH Networks for Industrial IOT Applications. 1-2 - Aitizaz Uddin Syed, Mohsin Iftikhar, Ljiljana Trajkovic:
Optimal PPDU Duration Algorithm for VHT MU-MIMO Systems. 1-2 - Inoussa Ns. Mouiche, Maher Bouidani:
Stability Analysis of Slotted Aloha Protocol for Cognitive Radio Users Using TUA. 1-2 - Christian Meurisch, The An Binh Nguyen, Julien Gedeon, Florian Kohnhäuser, Milan Schmittner, Stefan Niemczyk, Stefan Wullkotte, Max Mühlhäuser:
Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge. 1-2 - Seilendria A. Hadiwardoyo, Subhadeep Patra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni:
An Android ITS Driving Safety Application Based on Vehicle-to-Vehicle (V2V) Communications. 1-6 - Nour El Houda Bahloul, Saadi Boudjit, Marwen Abdennebi, Djallel Eddine Boubiche:
Bio-Inspired on Demand Routing Protocol for Unmanned Aerial Vehicles. 1-6 - D. P. Tejas, Chinmaya Pancholi, Arobinda Gupta:
Disseminating Large Data in Vehicular Ad Hoc Networks. 1-6 - Julio A. Sanguesa, Johann Márquez-Barja, Piedad Garrido, Francisco J. Martinez:
Dynamic Small Cell Management for Connected Cars Communications. 1-6 - Arun Adiththan, Kaliappa Ravindran:
QoS-Oriented Management of Automobile Cruise Control Processes. 1-6 - Jordi Castellà-Roca, Macià Mut Puigserver, Magdalena Payeras-Capellà, Alexandre Viejo, Carles Angles-Tafalla:
Secure and Anonymous Vehicle Access Control System to Traffic-Restricted Urban Areas. 1-7 - Jean Philippe Monteuuis, Badis Hammi, Eduardo Salles, Houda Labiod, Remi Blancher, Erwan Abalea, Brigitte Lonc:
Securing PKI Requests for C-ITS Systems. 1-8 - Zeeshan Ansar, Waltenegus Dargie:
Adaptive Burst Transmission Scheme for WSNs. 1-7 - Yang Zhang, Yu-Jung Chu, Thinh P. Nguyen:
Coverage Algorithms for WiFO: A Hybrid FSO-WiFi Femtocell Communication System. 1-6 - Md Raqibull Hasan, Yanxiao Zhao, Guodong Wang, Yu Luo, Robb M. Winter:
Enhanced AODV: Detection and Avoidance of Black Hole Attack in Smart Meter Network. 1-6 - Meitian Huang, Weifa Liang:
Incremental SDN-Enabled Switch Deployment for Hybrid Software-Defined Networks. 1-6 - Guodong Wang, Yanxiao Zhao, Jun Huang, Robb M. Winter:
On the Data Aggregation Point Placement in Smart Meter Networks. 1-6 - Omneya Issa, Ying Ge, Aizaz U. Chaudhry, Bernard Doray:
User Association Algorithm for Throughput Improvement in High-Density Wireless Networks. 1-8 - Jiangmin Yu, Michael Farcasin, Eric Chan-Tin:
Wireless Interference Prediction for Embedded Health Devices. 1-6 - Mousa Alramadhan, Kewei Sha:
An Overview of Access Control Mechanisms for Internet of Things. 1-6 - Hammad Iqbal, Jamie Ma, Qing Mu, Venkatesh Ramaswamy, Gabby Raymond, Daniel Vivanco, John Zuena:
Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper. 1-6 - Kozo Okano, Satoshi Harauchi, Toshifusa Sekizawa, Shinpei Ogata, Shin Nakajima:
Equivalence Checking of Java Methods: Toward Ensuring IoT Dependability. 1-6 - Muhammed Abdulazeez, Pawel Garncarek, Prudence W. H. Wong:
Lightweight Framework for Reliable Job Scheduling in Heterogeneous Clouds. 1-6 - Sida Gao, Geethapriya Thamilarasu:
Machine-Learning Classifiers for Security in Connected Medical Devices. 1-5 - Yu-Hao Hsu, Fuchun Joseph Lin:
Preventing Misuse of Duplicate Certificates in IoT/M2M Systems. 1-8 - Alper Yargic, Alper Bilge:
Privacy Risks for Multi-Criteria Collaborative Filtering Systems. 1-6 - Linyuan Yao, Ping Dong, Xiaojiang Du, Hongke Zhang:
Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier Network. 1-6 - Henry M. Kim, Marek Laskowski:
A Perspective on Blockchain Smart Contracts: Reducing Uncertainty and Complexity in Value Exchange. 1-6 - Robert Norvill, Beltran Borja Fiz Pontiveros, Radu State, Irfan Awan, Andrea J. Cullen:
Automated Labeling of Unknown Contracts in Ethereum. 1-6 - Lei Xu, Lin Chen, Zhimin Gao, Yang Lu, Weidong Shi:
CoC: Secure Supply Chain Management System Based on Public Ledger. 1-6 - Darra L. Hofman:
Legally Speaking: Smart Contracts, Archival Bonds, and Linked Data in the Blockchain. 1-4 - Masashi Sato, Shin'ichiro Matsuo:
Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography. 1-8 - Suporn Pongnumkul, Chaiyaphum Siripanpornchana, Suttipong Thajchayapong:
Performance Analysis of Private Blockchain Platforms in Varying Workloads. 1-6 - Jagdeep Sidhu:
Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business. 1-6 - Heng Hou:
The Application of Blockchain Technology in E-Government in China. 1-4 - Jinoh Kim, Alex Sim:
A New Approach to Online, Multivariate Network Traffic Analysis. 1-6 - David Schwab, Li Yang, Katherine Winters, Matthew Jallouk, Emile Smith, Adam Claiborne:
A Secure Mobile Cloud Photo Storage System. 1-5 - Mir Mehedi A. Pritom, Chuqin Li, Bill Chu, Xi Niu:
A Study on Log Analysis Approaches Using Sandia Dataset. 1-6 - Angelo Sapello, Constantin Serban, Ritu Chadha, Rauf Izmailov:
Application of Learning Using Privileged Information(LUPI): Botnet Detection. 1-8 - Hanene Ben Yedder, Qingye Ding, Umme Zakia, Zhida Li, Soroush Haeri, Ljiljana Trajkovic:
Comparison of Virtualization Algorithms and Topologies for Data Center Networks. 1-6 - Rahmira Rufus, Albert C. Esterline:
Concatenating Unprotected Internet of Things Network Event-Driven Data to Obtain End-User Information. 1-7 - Kai Qian, Yong Shi, Lixin Tao, Ying Qian:
Hands-On Learning for Computer Network Security with Mobile Devices. 1-6 - Md. Nazmus Sakib Miazi, Mir Mehedi A. Pritom, Mohamed Shehab, Bill Chu, Jinpeng Wei:
The Design of Cyber Threat Hunting Games: A Case Study. 1-6 - Hiroaki Hata:
A Bridging VPN for Connecting Wireless Sensor Networks to Data Centers. 1-6 - Markus Hähnel, Waltenegus Dargie, Alexander Schill:
Analysis of the Scope of Dynamic Power Management in Emerging Server Architectures. 1-6 - Lav Gupta, Mohammed Samaka, Raj Jain, Aiman Erbad, Deval Bhamare, H. Anthony Chan:
Fault and Performance Management in Multi-Cloud Based NFV Using Shallow and Deep Predictive Structures. 1-8 - Udit Pareek, Daniel C. Lee:
Monotonic Optimization for Power Assignment in Two-Way Cognitive Radio Networks with Shared-Band Amplify-and-Forward Relays. 1-6 - Hajime Kanzaki, Kevin Schubert, Nicholas Bambos:
Video Streaming Schemes for Industrial IoT. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.