default search action
20th APNOMS 2019: Matsue, Japan
- 20th Asia-Pacific Network Operations and Management Symposium, APNOMS 2019, Matsue, Japan, September 18-20, 2019. IEEE 2019, ISBN 978-4-88552-320-5
- Asif Mehmood, Talha Ahmed Khan, Javier Jose Diaz Rivera, Wang-Cheol Song:
Dynamic Auto-scaling of VNFs based on Task Execution Patterns. 1-4 - Ui-Jun Baek, Se-Hyun Ji, Jee-Tae Park, Min-Seob Lee, Jun-Sang Park, Myung-Sup Kim:
DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning. 1-4 - Hiroya Matsumoto, Bo Gu, Osamu Mizuno:
A V2X Task Offloading Method Considering Automobiles' Behavior in Urban Area. 1-4 - Yueh-Hsien Lin, Chien-Wen Yang, Ting-Che Chuang, Min Liu, Min-Chia Chang:
An Integrated Network Monitoring System for SDN VPN. 1-4 - Yuji Saitoh, Tetsuya Uchiumi, Yukihiro Watanabe:
IT Resource Trend Analysis by Component Decomposition Based on Non-negative Matrix Factorization. 1-6 - Umer Majeed, Choong Seon Hong:
FLchain: Federated Learning via MEC-enabled Blockchain Network. 1-4 - Kosuke Sakata, Motomu Nakajima, Aiko Oi, Yuichi Suto, Yuji Soejima:
Evaluaion of assurance closed loop PoC for achieving scheduled maintenance in telecommunication carrier networks. 1-4 - Sheikh Salman Hassan, Seok Won Kang, Choong Seon Hong:
Unmanned Aerial Vehicle Waypoint Guidance with Energy Efficient Path Planning in Smart Factory. 1-4 - Shota Ono, Taku Yamazaki, Takumi Miyoshi, Kaoru Sezaki:
Location-based Flooding Area Restriction for Mobile-assisted Ad Hoc Networks. 1-4 - Yen-Wen Chen, Chih-Hong Chang:
Effective Uplink Data Transmission Scheme for MTCDs in LTE-A Networks. 1-4 - Tsu-Kuang Lee, Tong-Wen Wang, Wen-Xuan Wu, Yu-Chiao Kuo, Shih-Hsuan Huang, Guan-Sheng Wang, Chih-Yu Lin, Jen-Jee Chen, Yu-Chee Tseng:
Building a V2X Simulation Framework for Future Autonomous Driving. 1-6 - Kitae Kim, Choong Seon Hong:
Optimal Task-UAV-Edge Matching for Computation Offloading in UAV Assisted Mobile Edge Computing. 1-4 - Hung-Huan Liu, Wei-Chien Chen, Pin-Chun Hsu:
Comparison of NVA and RLOWESS Algorithms in Indoor Positioning System. 1-4 - Yang Qin, Junjie Wei, Weihong Yang:
Deep Learning Based Anomaly Detection Scheme in Software-Defined Networking. 1-4 - Sandy H. Hsiao, Hong-Rong Chang, Yu-Han Lu, Chi-Yu Li:
Mobility Support for Networks on Trains Using Commercial Off-the-shelf Routers. 1-4 - Woojin Seok, Jeonghoon Moon, Wontaek Hong, JaiSeung Kwak, Manhee Lee:
Store-and-Forward Data Transfer using Optimized Intermediate Node. 1-4 - Kensuke Takahashi, Ryota Katayanagi, Nobuo Onai, Miwaka Ohtani:
Support Method to Generate Catalogs for Orchestrator using Catalog Definition Templates. 1-4 - Yin-Hsin Liu, Yao-Chung Tu, Chang-Yu Hsu, Hsin-Chieh Chao:
Predicting malfunction of mobile network base station using machine learning approach. 1-4 - Se-Hyun Ji, Ui-Jun Baek, Mu-Gon Shin, Young-Hoon Goo, Jun-Sang Park, Myung-Sup Kim:
Best Feature Selection using Correlation Analysis for Prediction of Bitcoin Transaction Count. 1-6 - Tetsuya Uchiumi, Yuji Saitoh, Yukihiro Watanabe:
Automatic parameter tuning framework for performance diagnosis report. 1-6 - Po-Ruey Lei, Pei-Rong Yu, Wen-Chih Peng:
A Framework for Maritime Anti-Collision Pattern Discovery from AIS Network. 1-4 - Shao-Peng Lu, Min-Te Sun:
Detecting Road Conditions in Front of The Vehicle Using Off-The-Shelf Camera. 1-4 - Sabrina I. Soraya, Shao-Ping Chuang, Yu-Chee Tseng, Tsì-Uí Ik, Yu-Tai Ching:
A Comprehensive Multisensor Dataset Employing RGBD Camera, Inertial Sensor and Web Camera. 1-4 - Qi Li, Xing Wang, Tao Zhao, Ying Wang, Zifan Li, Lanlan Rui:
An Improved Genetic Algorithm for the Scheduling of Virtual Network Functions. 1-4 - Yan-Wei Chen, Li-Hsing Yen, Wei-Cheng Wang, Cheng-An Chuang, Yu-Shen Liu, Chien-Chao Tseng:
P4-Enabled Bandwidth Management. 1-5 - Gangsong Dong, Yi Jin, Shiwen Wang, Wencui Li, Zhuo Tao, Shaoyong Guo:
DB-Kmeans: An Intrusion Detection Algorithm Based on DBSCAN and K-means. 1-4 - Chen-Hsiang Chen, Yu-An Lin, Wei-Te Wu, Yao-Te Huang, Cha-Chin Chu:
Design and Implementation of IPv4 and IPv6 Provisioning Technologies for VPC Architecture. 1-4 - Chin-Lin Hu, Chao-Yu Hsu, Sod-Erdene Khuukhenbaatar, Yamkhin Dashdorj, Yongqiang Dong:
Path Selection with Joint Latency and Packet Loss for Edge Computing in SDN. 1-4 - Pai-Hui Wang, Tse-Han Wang, Shih-Ting Lin, Pei-Wen Chen, Chien-Chao Tseng, Jiun-Long Huang:
A Content-Centric Platform for Home Networks. 1-4 - Takayuki Warabino, Yusuke Suzuki, Masanori Miyazawa:
ROS-based Robot Development Toward Fully Automated Network Management. 1-4 - Min-Cheol Kim, Young-Tak Kim:
Smart Control for Energy Efficient Networking of IEEE 802.11ah-based IoT. 1-6 - Yi Han, Yao Zhang, Huilin Liu, Hecun Yuan, Lanlan Rui, Ying Wang:
A QoS-based Opportunistic Routing Mechanism in Social Internet of Vehicle. 1-4 - Madyan Alsenwi, Yan Kyaw Tun, Shashi Raj Pandey, Choong Seon Hong:
A Hopfield Neural Networks Based Mechanism for Coexistence of LTE-U and WiFi Networks in Unlicensed Spectrum. 1-6 - Nguyen Minh Tri, Syunya Nagata, Masato Tsuru:
Locating Delay Fluctuation-Prone Links by Packet Arrival Intervals in OpenFlow Networks. 1-6 - Aunas Manzoor, DoHyeon Kim, Choong Seon Hong:
Energy Efficient Resource Allocation in UAV-based Heterogeneous Networks. 1-4 - Mu-Gon Shin, Ui-Jun Baek, Kyu-Seok Shim, Jee-Tae Park, Sung-Ho Yoon, Myung-Sup Kim:
Block Analysis in Bitcoin System Using Clustering with Dimension Reduction. 1-4 - Faruk Açan, Gürkan Gür, Fatih Alagöz:
Reactive Controller Assignment for Failure Resilience in Software Defined Networks. 1-6 - Hye-Yeong Shin, DaeYong Kim, Soo Hoon Maeng, Kiyoung Lee, Hongtaek Ju:
Web Server for Analysis and Visualization of Bitcoin Data. 1-3 - Sumiyo Okada, Chunghan Lee, Hitoshi Ueno, Tomohiro Ishihara:
Detecting Wireless LAN Bottlenecks Using TCP Connection Measurement at Traffic Aggregation Point. 1-6 - Meryam Essaid, DaeYong Kim, Soo Hoon Maeng, Sejin Park, Hongtaek Ju:
A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM. 1-6 - Koji Hayashi, Rina Ooka, Takumi Miyoshi, Taku Yamazaki:
P2PTV Traffic Classification and Its Characteristic Analysis Using Machine Learning. 1-6 - Shinichi Kikuchi, Masaki Aida:
Method for Estimating the Damping Coefficient of Oscillation Dynamics in Networks. 1-4 - Wei Kuang Lai, Chia-Yu Hsu, Yu-Po Kuo:
QoS-guaranteed User Association and Resource Allocation with CoMP JT in Ultra-Dense Networks. 1-6 - Mengnan Cai, Siye Wang, Qinxuan Wu, Yijia Jin, Xinling Shen:
DTCluster: A CFSFDP Improved Algorithm for RFID Trajectory Clustering Under Digital-twin Driven. 1-6 - Aiko Oi, Motomu Nakajima, Yuji Soejima, Mitsuho Tahara:
Reliable Design Method for Service Function Chaining. 1-4 - Yu Min Park, Minkyung Lee, Choong Seon Hong:
Multi-UAVs Collaboration System based on Machine Learning for Throughput Maximization. 1-4 - Wei-Chiao Huang, Lo-Yao Yeh, Jiun-Long Huang:
A Monitorable Peer-to-Peer File Sharing Mechanism. 1-4 - Jiwon Bang, Mi-Jung Choi:
Design and Implementation of Storage System for Real-time Blockchain Network Monitoring System. 1-4 - Yuji Kojima, Kodo Ran, Yasuhiko Aoki, Takeshi Nishiyama:
Network design system recommending similar configurations characterized by manual knowledges. 1-4 - Atsushi Takada, Naoyuki Tanji, Toshihiko Seki, Kyoko Yamagoe, Yuji Soejima, Mitsuho Tahara:
SLA Driven Operation - optimizing telecom operation based on SLA -. 1-4 - Ashis Talukder, Choong Seon Hong:
Susceptible-Infection-based Cost-effective Seed Mining in Social Networks. 1-6 - Yan Kyaw Tun, Madyan Alsenwi, Shashi Raj Pandey, Chit Wutyee Zaw, Choong Seon Hong:
Energy Efficient Multi-Tenant Resource Slicing in Virtualized Multi-Access Edge Computing. 1-4 - Lishan Li, Ying Liu, Jianping Wu, Gang Ren:
NFVMP: An Architecture for NFV Applications from Multiple Providers. 1-6 - Ming Yang, Ping Du, Noriaki Kamiyama, Akihiro Nakao:
Evaluation of the Zero Rating System for MVNO in the New Mobile Network Era. 1-4 - Md. Shirajum Munir, Sarder Fakhrul Abedin, Choong Seon Hong:
Artificial Intelligence-based Service Aggregation for Mobile-Agent in Edge Computing. 1-6 - Yida Xu, Qi Wang, Jianmin Liu, Chentao He, Boyu Diao, Yongjun Xu:
PDMAC-SIC: Priority-based Distributed Low Delay MAC with Successive Interference Cancellation for Industrial Wireless Networks. 1-6 - Hao-Yu Kao, Yan-Yih Wang, Chih-Meng Huang, Chang-Ping Hsu:
Heterogeneous Data Ensemble Learning in End-to-End Diagnosis for IPTV. 1-6 - Yonghua Huo, Yu Yan, Dan Du, Zhihao Wang, Yixin Zhang, Yang Yang:
Long-Term Span Traffic Prediction Model Based on STL Decomposition and LSTM. 1-4 - Chen-Yell Yang, Gar-De Tsai, Der-Wen Perng:
A practical approach with big data analysis for customer-driven network optimization. 1-3 - Soohyun Kim, Hyunsu Mun, Youngseok Lee:
A Data-Over-Sound Application: Attendance Book. 1-4 - Sejin Kim, Jisun Oh, Yoonhee Kim:
Data Provenance for Experiment Management of Scientific Applications on GPU. 1-4 - Yoga Andrian, Meryam Essaid, Kim Daeyong, Soo Hoon Maeng, Hongtaek Ju:
Space Weather Data Management System and Monitoring in Decentralized Storage Environment. 1-4 - Chunju Tsai, Wen-Yueh Shih, Yi-Shu Lu, Jiun-Long Huang, Lo-Yao Yeh:
Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT Environments. 1-4 - Mao-Jung Chiang, Li-Hsing Yen:
Distributed Approach to Adaptive VNF Manager Placement Problem. 1-6 - Hsu-Chien Wang, Chien Chen, Ssu-Hsuan Lu:
An SDN-based NAT Traversal Mechanism for End-to-end IoT Networking. 1-4 - Masataka Sato, Shingo Horiuchi:
Flexible Network Resource-Allocation Architecture Using Specification Injection. 1-5 - Kexin Zhou, Jian Wang:
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT. 1-6 - Chi-Chang Huang, Chi-Yang Kuo, Jen-Hao Chen, Chao-Wen Huang:
A Low-cost Enterprise Application Integration Architecture for Large-scale Environment. 1-4 - Yuki Urabe, Sayaka Yagi, Kimio Tsuchikawa, Takeshi Masuda:
Visualizing User Action Data to Discover Business Process. 1-4 - Teerapat Sanguankotchakorn, Shiva Kumar Arugonda:
Hybrid Controller for Securing SDN from Switched DDoS and ARP Poisoning Attacks. 1-6 - Jiun-Yu Tu, Chih-Lin Hu, Han Hu:
A Search Approach Based on Query Similarity in Content-Centric Networks. 1-4 - Jeong Min Jeon, Choong Seon Hong:
A Study on Utilization of Hybrid Blockchain for Energy Sharing in Micro-Grid. 1-4 - Yu-Chuan Chang, Ting-Wei Huang, Nen-Fu Huang:
A Machine Learning Based Smart Irrigation System with LoRa P2P Networks. 1-4 - Seyeon Jeong, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong:
Machine Learning based Link State Aware Service Function Chaining. 1-4 - Min-Seob Lee, Young-Hoon Goo, Kyu-Seok Shim, Sung-Ho Yoon, Se-Hyun Ji, Myung-Sup Kim:
A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis. 1-6 - Tzu-Han Hsu, Chih-Chuan Wang, Yuan-Hsiang Lin, Ching-Hsuan Chen, Nyan Ping Ju, Tsì-Uí Ik, Wen-Chih Peng, Yu-Shuen Wang, Yu-Chee Tseng, Jiun-Long Huang, Yu-Tai Ching:
CoachAI: A Project for Microscopic Badminton Match Data Collection and Tactical Analysis. 1-4 - Yung-Sheng Lu, Kate Ching-Ju Lin:
Enabling Inference Inside Software Switches. 1-4 - Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong:
eVNF - Hybrid Virtual Network Functions with Linux eXpress Data Path. 1-6 - Taku Yamazaki, Shinnosuke Iwagami, Takumi Miyoshi:
Ant-inspired Backoff-based Opportunistic Routing for Ad Hoc Networks. 1-4 - Ping Du, Akihiro Nakao:
Understanding Intelligent RAN Slicing for Future Mobile Networks Through Field Test. 1-6 - Minh N. H. Nguyen, Chit Wutyee Zaw, Kitae Kim, Choong Seon Hong:
Joint User Association and Server Scaling in Multi-access Edge Computing. 1-4 - Dong-Hak Kim, Rehmat Ullah, Byung-Seo Kim:
RSP Consensus Algorithm for Blockchain. 1-4 - Haruo Oishi, Kyoko Yamori, Cheng Zhang, Yoshiaki Tanaka:
Auction Based Resource Trading Using Relation Between Telecommunication Network Failure Rate and Users' Utility. 1-4 - Takumi Iseki, Masahiro Hayashi:
Improved Secure Computation over Real Numbers and Its Application to Reliability Engineering. 1-4 - Stanislav Lange, Heegon Kim, Seyeon Jeong, Heeyoul Choi, Jae-Hyung Yoo, James Won-Ki Hong:
Machine Learning-based Prediction of VNF Deployment Decisions in Dynamic Networks. 1-6 - Seiki Kotachi, Takehiro Sato, Ryoichi Shinkuma, Eiji Oki:
Multicast Routing Model to Minimize Number of Flow Entries in Software-Defined Network. 1-6 - Qichao Wang, Zeqi Liu, Jae-Oh Lee:
An Architecture for Managing IoT Device Object in Information Gateway. 1-4 - Yan-Yih Wang, Chang-Ping Hsu, Chih-Meng Huang, Hao-Yu Kao:
Fault Location Prediction Based on Customer Complaint Amount. 1-4 - Xiaojuan Zhang, Xiangyu Bai:
Research On Routing Incentive Strategy Based On Virtual Credit In VANET. 1-4 - Arata Koike, Yoshiko Sueda:
Contents Delivery for Autonomous Driving Cars in Conjunction with Car Navigation System. 1-4 - Motoyuki Ohmori:
A Case Study of Captive-Portal Detection for Web Authentication on Wired LAN in a Campus Network. 1-4 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Asif Mehmood, Wang-Cheol Song:
Network Slice Selection Function for Data Plane Slicing in a Mobile Network. 1-4 - Yang Qin, Weihong Yang, Lei Peng:
Inter-Session Network Coding with Clustering Routing in Wireless Delay Tolerant Networks. 1-4 - Tsukasa Kitamura, Noriaki Kamiyama, Miki Yamamoto:
Cache-Decision Policy using User Tastes. 1-5 - Terence Ching Yang Lam, Sherlyn Shi Ling Yew, Sye Loong Keoh:
Bluetooth Mesh Networking: An Enabler of Smart Factory Connectivity and Management. 1-6 - Hiroshi Yamashita, Masahiro Hayashi:
Survival Traffic Ratio Analysis for Cascading Failure in Interdependent Networks. 1-4 - Abdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri:
A New Lossless Compression Scheme for WSNs Using RLE Algorithm. 1-6 - Li Shang, Wei Zhao, Jiaju Zhang, Qiang Fu, Qian Zhao, Yang Yang:
Network Security Situation Prediction Based on Long Short-Term Memory Network. 1-4 - Kai-Min Liao, Guan-Yi Chen, Yu-Jia Chen:
Artificial Intelligence based Edge Caching in Vehicular Mobile Networks: Architecture, Opportunities, and Research Issues. 1-6 - Hecun Yuan, Biyao Li, Huilin Liu, Yi Han, Lanlan Rui, Ying Wang:
The Design and Simulation of Service Recovery Strategy Based on Recovery Node in Clustering Network. 1-4 - Xilin Ji, Xiao Liang, Yun Zhou, Yonghua Huo, Xiaodan Shi, Yang Yang:
A Fault Prediction Method Based on Load-capacity Model in the Communication Network. 1-4 - Takuto Koizumi, Masahiro Hayashi:
BDD Method for Evaluating Reliability of Traffic-Path-Based Network Model. 1-4 - Yuh-Jiuh Cheng, Bor-Tauo Chen, Yu-Yun Lee:
Design and Performance Evaluation of Very Large-scale Optical Frame Switching Networks based on WSS for Future Data Centers. 1-4 - You Jun Kim, Choong Seon Hong:
Blockchain-based Node-aware Dynamic Weighting Methods for Improving Federated Learning Performance. 1-4 - Talha Ahmed Khan, Asif Mehmood, Javier Jose Diaz Rivera, Wang-Cheol Song:
Machine Learning Approach for Automatic Configuration and Management of 5G Platforms. 1-6 - Zhenzhen Li, Jiangpan Hou, Hai Wang, Chencheng Wang, Cuicui Kang, Peipei Fu:
Ethereum Behavior Analysis with NetFlow Data. 1-6 - Yung-Chang Lai, Jhih-Dao Jhan, Wen-Che Yang, Fei-Hua Kuo, Tai-Chueh Shih:
Quality of Service Measurement Mechanism of Cloud-Based Network Architecture. 1-4 - Yuki Fujita, Atsuo Inomata, Hiroki Kashiwazaki:
Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB. 1-4 - Shize Zhang, Hui Zhang, Jiahai Yang, Guanglei Song, Jianping Wu:
Measurement and Analysis of Adult Websites in IPv6 Networks. 1-6 - Tse-Han Wang, Yen-Cheng Chen, Yu-Tang Huang, Chen-Min Hsu, Kai-Sheng Hsu, Chung-Hua Hu:
IPDAC: An Integrated IP Address Management Framework for Telecommunication Management Networks. 1-4 - Jibum Hong, Woojoong Kim, Jae-Hyoung Yoo, James Won-Ki Hong:
Design and Implementation of Container-based M-CORD Monitoring System. 1-4 - Zeqi Liu, Qichao Wang, Jae-Oh Lee:
A SDN Controller Enabled Architecture for the IMS. 1-4 - Jean Jimmy Julien, Fuchun Joseph Lin, Chia-Hsuan Yu, Wan-Hsun Hu:
Charging Factors for Enabling SDN/NFV Accounting Management. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.