default search action
36th AINA 2022: Sydney, NSW, Australia
- Leonard Barolli, Farookh Hussain, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Sydney, NSW, Australia, 13-15 April 2022, Volume 1. Lecture Notes in Networks and Systems 449, Springer 2022, ISBN 978-3-030-99583-6 - Zakaria Maamar, Fatma Masmoudi, Ejub Kajan:
An Approach for Mitigating Disruptions on Resources' Consumption Cycles. 1-12 - Imene Ouali, Mohamed Ben Halima, Ali Wali:
Text Detection and Recognition Using Augmented Reality and Deep Learning. 13-23 - Dilawaer Duolikun, Tomoya Enokido, Leonard Barolli, Makoto Takizawa:
An Energy Consumption Model of Servers to Make Virtual Machines Migrate. 24-36 - Hamza Salem, Manuel Mazzara, Hadi M. Saleh, Rami Husami, Siham Maher Hattab:
Development of a Blockchain-Based Ad Listing Application. 37-45 - Carlo Blundo, Giuseppe Fenza, Graziano Fuccio, Vincenzo Loia, Francesco Orciuoli:
Sequential Three-Way Decisions for Reducing Uncertainty in Dropout Prediction for Online Courses. 46-55 - Razvan Bocu, Maksim Iavich:
Enhanced Autonomous Driving Through Improved 3D Objects Detection. 56-66 - Mayssa Ghribi, Aref Meddeb:
Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel. 67-78 - Mayssa Ghribi, Aref Meddeb:
CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks. 79-90 - Joseph Assaker, Abdallah Makhoul, Julien Bourgeois, Benoît Piranda, Jacques Demerjian:
A Dynamic ID Assignment Approach for Modular Robots. 91-104 - Apostolos Lazidis, Euripides G. M. Petrakis, Spyridon Chouliaras, Stelios Sotiriadis:
Open-Source Publish-Subscribe Systems: A Comparative Study. 105-115 - Razvan Bocu, Dorin Bocu:
Conceptual Foundations of Code Rationalization Through a Case Study in Haskell. 116-128 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
Energy-Efficient Concurrency Control by Omitting Meaningless Write Methods in Object-Based Systems. 129-139 - Farzad Nourmohammadzadeh Motlagh, Anne V. D. M. Kayem, Christoph Meinel:
A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media. 140-151 - Bader Alwasel:
Efficient Restoration of Structural Controllability Under Malicious Edge Attacks for Complex Networks. 152-166 - Ryu Watanabe, Ayumu Kubota, Jun Kurihara:
Resource Authorization Methods for Edge Computing. 167-179 - Vanice Canuto Cunha, Damien Magoni, Pedro R. M. Inácio, Mário M. Freire:
Impact of Self C Parameter on SVM-based Classification of Encrypted Multimedia Peer-to-Peer Traffic. 180-193 - Khaled Abid, Hicham Lakhlef, Abdelmadjid Bouabdallah:
Machine Learning-Based Communication Collision Prediction and Avoidance for Mobile Networks. 194-204 - Kotono Iwata, Kazumasa Omote:
Automatic Monitoring System for Security Using IoT Devices and Smart Contracts. 205-216 - Minh Duc Nguyen, Masaya Azuma, Shota Uchimura, Makoto Ikeda, Leonard Barolli:
A Hybrid Recovery Method for Vehicular DTN Considering Dynamic Timer and Anti-packet. 217-225 - Susmita Mandal, S. S. Sravan, Lakshmi Ramesh:
Chaotic-Maps Based Access Authentication Protocol for Remote Communication Using Space Information Networks. 226-237 - Wael Doghri, Ahlem Saddoud, Lamia Chaari Fourati:
Sensor Placement Strategy for SHM: Application of the Great Mosque of Sfax. 238-248 - Moroni N. Vieira, Luciana P. Oliveira, Leonardo Carneiro:
A Comparative Analysis of Machine Learning Algorithms for Distributed Intrusion Detection in IoT Networks. 249-258 - Koichiro Sugihara, Naohiro Hayashibara:
Message Delivery of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant Networks. 259-270 - Ronaldo Canofre, Ariel Góes de Castro, Arthur Francisco Lorenzon, Fábio Diniz Rossi, Marcelo Caggiani Luizelli:
Towards Efficient Selective In-Band Network Telemetry Report Using SmartNICs. 271-284 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Energy Consumption of the Information Flow Control in the IoT: Simulation Evaluation. 285-296 - Fadhila Tlili, Samiha Ayed, Lamia Chaari, Bassem Ouni:
Artificial Intelligence Based Approach for Fault and Anomaly Detection Within UAVs. 297-308 - Fotios Bouraimis, Nikolaos Mainas, Euripides G. M. Petrakis:
Composition and Polymorphism Support in the OpenAPI Ontology. 309-320 - Yoshitaka Shibata, Akira Sakuraba, Yoshikazu Arai, Yoshiya Saito:
Improved Road State Sensing System and Its Data Analysis for Snow Country. 321-329 - Amar Nath, Rajdeep Niyogi, Tajinder Singh, Virendra Kumar:
Multi-agent Q-learning Based Navigation in an Unknown Environment. 330-340 - Fillipe Almeida Paz, Filipe Nascimento Almeida, Rúbens de Souza Matos Júnior, Itauan Silva Eduão Ferreira, Ricardo Jose Paiva de Britto Salgueiro:
Improving Urban Mobility with Vehicular Routing: A Parallel Approach. 341-352 - Amal Mateur, Nesrine Khabou, Ismael Bouassida Rodriguez:
How to Automatically Prove a Time Series Convergence to the Gumbel Distribution? 353-363 - Chiu-Han Hsiao, Po-Chun Yu, Chia-Ying Hsieh, Bing-Zi Zhong, Yu-Ling Tsai, Hao-Min Cheng, Wei-Lun Chang, Frank Yeong-Sung Lin, Yennun Huang:
A Machine Learning-Based Model for Predicting the Risk of Cardiovascular Disease. 364-374 - Chiu-Han Hsiao, Tsung-Yu Peng, Wei-Chieh Huang, Hsin-I Teng, Tse-Min Lu, Frank Yeong-Sung Lin, Yennun Huang:
A Federated Learning-Based Precision Prediction Model for External Elastic Membrane and Lumen Boundary Segmentation in Intravascular Ultrasound Images. 375-386 - Arunima Sharma, Dhwani Agrawal, Nandini Roy, Sunita Bhichar, Ramesh Babu Battula:
POTENT - Decentralized Platoon Management with Heapify for Future Vehicular Networks. 387-398 - Sahithi Tummalapalli, Lov Kumar, Lalita Bhanu Murthy Neti:
Web Service Anti-patterns Prediction Using LSTM with Varying Embedding Sizes. 399-410 - Achref Haddaji, Samiha Ayed, Lamia Chaari:
Federated Learning with Blockchain Approach for Trust Management in IoV. 411-423 - Shail Saharan, Vishal Gupta, Nisarg Vora, Mohul Maheshwari:
Detection of Distributed Denial of Service Attacks Using Entropy on Sliding Window with Dynamic Threshold. 424-434 - Abdelhak Hidouri, Haifa Touati, Mohamed Hadded, Nasreddine Hajlaoui, Paul Muhlethaler:
A Detection Mechanism for Cache Pollution Attack in Named Data Network Architecture. 435-446 - Vishal Gupta, Shail Saharan, Sreetam Parida:
Prevention of DDoS Attacks with Reliable-Dynamic Path Identifiers. 447-458 - Aman Sharma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Bitcoin's Blockchain Data Analytics: A Graph Theoretic Perspective. 459-470 - Aymen Ben Saada, Sofiane Ben Mbarek, Fethi Choubani:
Whole-Body Exposure to Far-Field Using Infinite Cylindrical Model for 5G FR1 Frequencies. 471-478 - Joao Henrique Faes Battisti, Guilherme P. Koslovski, Maurício A. Pillon, Charles Christian Miers, Nelson M. Gonzalez:
Analysis of an Ethereum Private Blockchain Network Hosted by Virtual Machines Against Internal DoS Attacks. 479-490 - Emna Ben Abdallah, Rima Grati, Malek Fredj, Khouloud Boukadi:
A Machine Learning Approach for a Robust Irrigation Prediction via Regression and Feature Selection. 491-502 - Hasna Fourati, Rihab Maaloul, Lamia Chaari, Mohamed Jmaiel:
An Energy Efficient Scheme Using Heuristic Algorithms for 5G H-CRAN. 503-515 - Wafaa Mebrek, Amel Bouzeghoub:
A Multi-agent Based Framework for RDF Stream Processing. 516-528 - Rodrigo Moreira, Hugo Gustavo Valin Oliveira da Cunha, Larissa Ferreira Rodrigues Moreira, Flávio de Oliveira Silva:
VINEVI: A Virtualized Network Vision Architecture for Smart Monitoring of Heterogeneous Applications and Infrastructures. 529-541 - Kais Jallouli, Azer Hasnaoui, Jean-Philippe Diguet, Alireza Monemi, Salem Hasnaoui:
Parallel IFFT/FFT for MIMO-OFDM LTE on NoC-Based FPGA. 542-553 - Shuraia Khan, Farookh Khadeer Hussain:
Software-Defined Overlay Network Implementation and Its Use for Interoperable Mission Network in Military Communications. 554-565 - Khaleda Akther Papry, Ashikur Rahman:
Fault Tolerant Multiple Dominating Set Constructions for Wireless Ad-hoc Networks. 566-578 - Roxane Elias Mallouhy, Christophe Guyeux, Chady Abou Jaoude, Abdallah Makhoul:
Forecasting the Number of Firemen Interventions Using Exponential Smoothing Methods: A Case Study. 579-589 - Maria Camila Lijó, Luciana Pereira Oliveira:
Mechanisms to Avoid the Unavailability of Points of Presence: A Systematic Review. 590-601 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Anh-Duy Tran:
A Provably Secure User Authentication Scheme Over Unreliable Networks. 602-613 - Imen Zidi, Abir Ben Ali, Farouk Kamoun:
Event-Triggered Based Distributed Agreement Algorithm to Ensure the Cohort Stability. 614-626 - Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Game Theory-Based Energy Efficient Routing in Opportunistic Networks. 627-639 - Kaouther Mansour, Issam Jabri:
Accurate Modelling of A-MPDU Aggregation Technique with Markovian Techniques and M/M/1/k Queues. 640-650 - Phudit Ampririt, Ermioni Qafzezi, Kevin Bylykbashi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based Scheme for Slice Priority Assessment in 5G Wireless Networks. 651-661 - Christos John Bouras, Evangelos Michos, Ioannis Prokopiou:
Applying Machine Learning and Dynamic Resource Allocation Techniques in Fifth Generation Networks. 662-673 - Admir Barolli, Kevin Bylykbashi, Shinji Sakamoto, Elis Kulla, Leonard Barolli:
Mesh Routers Placement by WMN-PSODGA Simulation System: Effect of Number of Mesh Routers Considering Stadium Distribution and RDVM Method. 674-685
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.