default search action
17th NCA 2018: Cambridge, MA, USA
- 17th IEEE International Symposium on Network Computing and Applications, NCA 2018, Cambridge, MA, USA, November 1-3, 2018. IEEE 2018, ISBN 978-1-5386-7659-2
- Emmanuelle Anceaume, Antoine Guellier, Romaric Ludinard, Bruno Sericola:
Sycomore: A Permissionless Distributed Ledger that Self-Adapts to Transactions Demand. 1-8 - Walaa Alayed, Lewis M. Mackenzie, Dimitrios Pezaros:
Analytical Hierarchy Process Multi-Metric Objective Function for RPL. 1-5 - Inès El Korbi, Yacine Ghamri-Doudane, Leïla Azouz Saïdane:
LoRaWAN Analysis Under Unsaturated Traffic, Orthogonal and Non-Orthogonal Spreading Factor Conditions. 1-9 - Tyler Crain, Vincent Gramoli, Mikel Larrea, Michel Raynal:
DBFT: Efficient Leaderless Byzantine Consensus and its Application to Blockchains. 1-8 - Thierry Arrabal, Dominique Dhoutaut, Eugen Dedu:
Efficient Multi-Hop Broadcasting in Dense Nanonetworks. 1-9 - Duarte M. G. Raposo, André Rodrigues, Soraya Sinche, Jorge Sá Silva, Fernando Boavida:
Securing WirelessHART: Monitoring, Exploring and Detecting New Vulnerabilities. 1-9 - Jaime Correia, Fabio Ribeiro, Ricardo Filipe, Filipe Araújo, Jorge Cardoso:
Response Time Characterization of Microservice-Based Systems. 1-5 - Truong Thao Nguyen, Hiroki Matsutani, Michihiro Koibuchi:
Low-Reliable Low-Latency Networks Optimized for HPC Parallel Applications. 1-10 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Øivind Kure:
Recurrent Neural Network-Based Prediction of TCP Transmission States from Passive Measurements. 1-10 - Rashid Tahir, Ali Raza, Fareed Zaffar, Faizan Ul Ghani, Mubeen Zulfiqar:
Using SGX-Based Virtual Clones for IoT Security. 1-4 - Pedro Fouto, João Leitão, Nuno M. Preguiça:
Practical and Fast Causal Consistent Partial Geo-Replication. 1-10 - Ashish Rauniyar, Paal Engelstad, Olav N. Østerbø:
RF Energy Harvesting and Information Transmission Based on Power Splitting and NOMA for IoT Relay Systems. 1-8 - Jon Patman, Peter Lovett, Andrew Banning, Annie Barnert, Dmitrii Chemodanov, Prasad Calyam:
Data-Driven Edge Computing Resource Scheduling for Protest Crowds Incident Management. 1-8 - Harish Sukhwani, Nan Wang, Kishor S. Trivedi, Andy J. Rindos:
Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network). 1-8 - Sudarshan S. Chawathe:
Analysis of Burst Header Packets in Optical Burst Switching Networks. 1-5 - Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. 1-5 - Max Willian Soares Lima, Horacio A. B. Fernandes de Oliveira, Eulanda Miranda dos Santos, Edleno Silva de Moura, Rafael Kohler Costa, Marco Levorato:
Efficient and Robust WiFi Indoor Positioning Using Hierarchical Navigable Small World Graphs. 1-5 - Gudi Siva Leela Krishna Chand, Suman Ojha, Benjamin Johnston, Jesse Clark, Mary-Anne Williams:
Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction. 1-5 - Diogo Calado, Miguel L. Pardal:
Tamper-Proof Incentive Scheme for Mobile Crowdsensing Systems. 1-8 - Emmanuelle Anceaume, Yann Busnel, Vasile Cazacu:
On the Fly Detection of the Top-K Items in the Distributed Sliding Window Model. 1-8 - Yaoqing Liu, Garegin Grigoryan:
Toward Incremental FIB Aggregation with Quick Selections (FAQS). 1-8 - Garegin Grigoryan, Yaoqing Liu:
LAMP: Prompt Layer 7 Attack Mitigation with Programmable Data Planes. 1-4 - Deafallah Alsadie, Eidah J. Alzahrani, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya:
DTFA: A Dynamic Threshold-Based Fuzzy Approach for Power-Efficient VM Consolidation. 1-9 - Siddhant Goenka, Sisi Duan, Haibin Zhang:
A Formal Treatment of Efficient Byzantine Routing Against Fully Byzantine Adversary. 1-10 - Joseph Sobchuk, Sean R. O'Melia, Daniil M. Utin, Roger Khazan:
Leveraging Intel SGX Technology to Protect Security-Sensitive Applications. 1-5 - Huaiwen He, Hong Shen:
Online Workload Scheduling for Green Cloud Data Center with Delay Guarantee in Smart Grid. 1-8 - Erick Petersen, Marco Antonio To, Stephane Maag, Thierry Yamga:
An Unsupervised Rule Generation Approach for Online Complex Event Processing. 1-8 - João Ferreira, Miguel L. Pardal:
Witness-Based Location Proofs for Mobile Devices. 1-4 - Luis Zabala, Ruben Solozabal, Armando Ferro, Bego Blanco:
Model of a Virtual Firewall Based on Stochastic Petri Nets. 1-4 - Antonio Deusany de Carvalho Junior, Victor Seiji Hariki, Alfredo Goldman:
Sensing Trees in Smart Cities with Open-Design Hardware. 1-4 - James Phung, Young Choon Lee, Albert Y. Zomaya:
Modeling System-Level Power Consumption Profiles Using RAPL. 1-4 - Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre:
RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach. 1-8 - Fabio Pina, Jaime Correia, Ricardo Filipe, Filipe Araújo, Jorge Cardroom:
Nonintrusive Monitoring of Microservice-Based Systems. 1-8 - Oluwatobi Fajana, Gareth Owenson, Mihaela Cocea:
TorBot Stalker: Detecting Tor Botnets Through Intelligent Circuit Data Analysis. 1-8 - Francisco D. Vaca, Quamar Niyaz:
An Ensemble Learning Based Wi-Fi Network Intrusion Detection System (WNIDS). 1-5 - Diego Fernández, Laura Vigoya, Fidel Cacheda, Francisco Javier Nóvoa, Manuel F. López-Vizcaíno, Victor Carneiro:
A Practical Application of a Dataset Analysis in an Intrusion Detection System. 1-5 - Ying Li, Yi Huang, Richard Yi Da Xu, Suranga Seneviratne, Kanchana Thilakarathna, Adriel Cheng, Darren Webb, Guillaume Jourjon:
Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic. 1-8 - Lars Møller Mikkelsen, Hans-Peter Schwefel, Tatiana K. Madsen:
Sensing Quality and Estimation of Public Transport Occupancy During Live Operation. 1-4 - Andrea Tundis, Gaurav Bhatia, Archit Jain, Max Mühlhäuser:
Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media. 1-10 - Sidra Malik, Salil S. Kanhere, Raja Jurdak:
ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains. 1-10 - Juvencio Arnaldo Manjate, Markus Hidell, Peter Sjödin:
Energy-Efficient Data Center Networks. 1-8 - Enrico Russo, Gabriele Costa, Alessandro Armando:
Scenario Design and Validation for Next Generation Cyber Ranges. 1-4 - Jarilyn M. Hernández Jiménez, Katerina Goseva-Popstojanova:
The Effect on Network Flows-Based Features and Training Set Size on Malware Detection. 1-9 - João Ferreira, Gustavo Callou, Albert Josua, Paulo R. M. Maciel:
Estimating the Environmental Impact of Data Centers. 1-4 - Giovanni Apruzzese, Michele Colajanni:
Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples. 1-8 - Alejandro Mazuera-Rozo, Sandra Rueda:
Device and User Management for Smart Homes. 1-4 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Tim Strauss, Hendrik Graupner, Feng Cheng, Christoph Meinel:
CSBAuditor: Proactive Security Risk Analysis for Cloud Storage Broker Systems. 1-10 - Sudarshan S. Chawathe:
Monitoring IoT Networks for Botnet Activity. 1-8 - Cleber Jorge Lira de Santana, Brenno de Mello Alencar, Cássio V. S. Prazeres:
Microservices: A Mapping Study for Internet of Things Solutions. 1-4 - Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal:
A Hybrid Approach to Detect DDoS Attacks Using KOAD and the Mahalanobis Distance. 1-5 - Paulo Pinto, Amineh Mazandarani, Pedro Amaral, Luís Bernardo:
Towards a Low Latency Network-Slice Resistant to Unresponsive Traffic. 1-5 - Ricardo Filipe, Jaime Correia, Filipe Araújo, Jorge Cardoso:
On Black-Box Monitoring Techniques for Multi-Component Services. 1-5 - Reem Alshahrani, Hassan Peyravi:
Cluster Load Estimation for Stateless Schedulers in Datacenters. 1-4 - Fernando Vano-Garcia, Hector Marco-Gisbert:
How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems. 1-4 - Klaus-Tycho Foerster:
On the Consistent Migration of Splittable Flows: Latency-Awareness and Complexities. 1-4 - Ernando Batista, Leandro José Silva Andrade, Ramon Dias Costa, Andressa Andrade, Gustavo Bittencourt Figueiredo, Cássio V. S. Prazeres:
Characterization and Modeling of IoT Data Traffic in the Fog of Things Paradigm. 1-8 - Omar Houidi, Oussama Soualah, Wajdi Louati, Djamal Zeghlache, Farouk Kamoun:
Virtualized Network Services Extension Algorithms. 1-5 - Guillaume Averlant, Eric Alata, Mohamad Kaâniche, Vincent Nicomette, Yuxiao Mao:
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture. 1-5 - Yves Mocquard, Bruno Sericola, Emmanuelle Anceaume:
Population Protocols with Convergence Detection. 1-8 - Dimitris Sakavalas, Lewis Tseng:
Delivery Delay and Mobile Faults. 1-8 - Fernando H. L. Buzato, Alfredo Goldman, Daniel M. Batista:
Efficient Resources Utilization by Different Microservices Deployment Models. 1-4 - Lev B. Levitin, Yelena Rykalova:
Critical Phenomena in Interconnection Networks with Heterogeneous Activity. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.