default search action
ICDCN 2025: Hyderabad, India
- Amos Korman, Sandip Chakraborty, Sathya Peri, Chiara Boldrini, Peter Robinson:
Proceedings of the 26th International Conference on Distributed Computing and Networking, ICDCN 2025, Hyderabad, India, January 4-7, 2025. ACM 2025, ISBN 979-8-4007-1062-9 - Shameem Raj Nadaf, Sai Bhavadeesh Yarlagadda, Hemant Kumar Rath, Garima Mishra:
A Cognitive Resource Aware Orchestration of Network Services for 5G and beyond. 1-10 - Aviroop Ghosh, Saleh Yousefi, Thomas Kunz:
Multi-Stream TSN Gate Control Scheduling in the Presence of Clock Synchronization. 11-20 - Rohit Kumar, Joy Chandra Mukherjee:
On-demand Multi-Node Partial Charging Scheme using Multiple Wireless Charging Vehicles in WRSN. 21-30 - Preetham N, Sourav Kanti Addya, Keerthan Kumar T. G., Saumya Hegde:
LitE: Load Balanced Virtual Data Center Embedding for Energy Efficiency in Data Centers. 31-35 - Yaqiao Li, Mahtab Masoori, Lata Narayanan, Denis Pankratov:
Renting Servers for Multi-Parameter Jobs in the Cloud. 36-45 - Arindam Khanda, Anurag Satpathy, Anusha Vangala, Sajal K. Das:
SMEVCA: Stable Matching-based EV Charging Assignment in Subscription-Based Models. 46-55 - Elisabeth Permatasari, Abusayeed Saifullah, Haibo Zhang:
Jamming-Resilient Channel Hopping for WirelessHART Networks. 56-65 - Ali Nadim Alhaj, Wilson Naik Bhukya, Rajendra Prasad Lal:
Advanced Method for Flow Frequency Estimation and Top-k Heavy Hitters Detection in SDN Leveraging Programmable Switch. 66-72 - Agrima Khanna, Fangqi Liu, Samir Gupta, Sophie Pavia, Ayan Mukhopadhyay, Abhishek Dubey:
PDPTW-DB: MILP-Based Offline Route Planning for PDPTW with Driver Breaks. 73-83 - Anoop Kumar Pandey, Bheemarjuna Reddy Tamma, M. V. Panduranga Rao:
Mixing Entanglement Swapping and Hop-by-Hop Transmission On Heterogeneous Quantum Networks. 84-93 - Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti:
Transformer-based GAN-augmented Defender for Adversarial USB Keystroke Injection Attacks. 94-103 - Kevin Kostage, Rohan Adepu, Jenaya Monroe, Trevontae Haughton, Juan Mogollon, Saketh Poduvu, Kannappan Palaniappan, Chengyi Qu, Prasad Calyam, Reshmi Mitra:
Federated Learning-enabled Network Incident Anomaly Detection Optimization for Drone Swarms. 104-114 - Subhash Bhagat, Andrzej Pelc:
Deterministic Collision-Free Exploration of Unknown Anonymous Graphs. 115-124 - Easwar Kilari, Sriram Kailasam:
Distributed Computation of Skyline Probability over Uncertain Preferences. 125-133 - John Augustine, Mohit Daga:
Distributed Small Cuts using Semigroups. 134-143 - Hongyan Ji, Shreyas Pai, Sriram V. Pemmaraju, Joshua Z. Sobel:
Faster Set Cover in the MPC Model. 144-151 - Hongyan Ji, Kishore Kothapalli, Sriram V. Pemmaraju, Ajitanshu Singh:
Fast Deterministic Massively Parallel Ruling Sets Algorithms. 152-160 - Sajal K. Das, Amit Kumar Dhar, Barun Gorain, Madhuri Mahawar:
Collision-free Exploration by Mobile Agents Using Pebbles. 161-170 - Ashish Saxena, Kaushik Mondal:
Path Connected Dynamic Graphs with a Study of Efficient Dispersion. 171-180 - Ahmad Hossein Yazdani, Arnab K. Paul, Ahmad Maroof Karimi, Feiyi Wang, Ali Raza Butt:
User-based I/O Profiling for Leadership Scale HPC Workloads. 181-190 - Ravi Kishore:
Perfectly Secure Message Transmission Tolerating Omission Faults - Possibility Feasibility, and Optimality. 191-200 - Vincent Kowalski, Achour Mostéfaoui, Matthieu Perrin, Sinchan Sengupta:
Byzantine-Tolerant Privacy-Preserving Atomic Register. 201-210 - Kalash, Bishakh Chandra Ghosh, Sourav Kanti Addya:
Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication Approach. 211-220 - Tanvir Kaur, Ashish Saxena, Partha Sarathi Mandal, Kaushik Mondal:
Black Hole Search in Dynamic Graphs. 221-230 - Avisek Sharma, Pritam Goswami, Buddhadeb Sau:
Computational Power of Mobile Robots: Discrete Version. 231-238 - Ajay D. Kshemkalyani, Manaswini Piduguralla, Sathya Peri, Anshuman Misra:
On Constructing a Byzantine Linearizable SWMR Atomic Register from SWSR Atomic Registers. 239-243 - Bhargavi Sriram, John Augustine:
Fair and Representative Jury Selection for Decentralized Justice. 244-248 - Raja Das, Pritam Goswami, Brati Mondal, Buddhadeb Sau:
Rectangle Enclosed Triangular Grid Exploration with Myopic Luminous Robots. 249-253 - Rik Banerjee, Manish Kumar, Anisur Rahaman Molla:
Optimal Fault-Tolerant Dispersion on Oriented Grids. 254-258 - Brati Mondal, Pritam Goswami, Buddhadeb Sau:
Time Optimal Distance-k-Dispersion on Dynamic Ring. 259-263 - Raja Das, Buddhadeb Sau:
Exploration of Infinite Triangular Grid by Myopic Robots without Chirality. 264-268 - Ashish Saxena, Tanvir Kaur, Kaushik Mondal:
Dispersion on Time Varying Graphs. 269-273 - Amit Garu, Arya Tanmay Gupta, Duong Ngoc Nguyen, Sandeep S. Kulkarni:
Quantitative characterization of consistency violating faults at individual distributed computing processes. 274-275 - Priyanka Ashok Birajdar, Harsha V, Anurag Satpathy, Sourav Kanti Addya:
Adaptive Workload Management for Enhanced Function Performance in Serverless Computing. 276-277 - Irshad Ali, Basant Subba:
PhishURLDetect: A parameter efficient fine-tuning of LLMs using LoRA for detection of phishing URLs. 278-279 - Raaghav Ravishankar, Sandeep S. Kulkarni, Sathya Peri, Gokarna Sharma:
Distributing Context-Aware Shared Memory Data Structures: A Case Study on Singly-Linked Lists. 280-281 - Nasit S. Sony, Xianzhong Ding:
A Committee Based Optimal Asynchronous Byzantine Agreement Protocol W.P. 1. 282-283 - Aruna Devi B, Karthik N:
Postprandial Blood Glucose Level Prediction through combined Machine Learning, Meta-Learning and XAI. 284-286 - Subhajit Pramanick, Partha Sarathi Mandal:
MIS Filling and Mutual Visibility with Luminous Robot Swarm. 287-288 - Arnab Majumder, Shahnaz Warsi, Junaid Alam, Soumyadev Maity:
Algebraic Signature based Trusted Execution Environment for Remote Computation. 289-294 - Prasad D. Devkar, Nalini Ajwani, Sudarshan Malla, Aasttha Bhatt, Mahiman Dave, Neha Sharma, Mrityunjoy Panday, Chittaranjan S. Yajnik:
Topological Analysis of Dermatoglyphic Patterns using Synthetic and Real Data. 295-301 - Amritanjali, Ragav Gupta:
Federated Learning for Privacy Preserving Intelligent Healthcare Application to Breast Cancer Detection. 302-306 - Saikat Chandra Bakshi, Gopal Chandra Roy, Eravelli Saicharan, E. Parvathi:
On Underground Mine Communication Systems. 307-312 - Isha Ganguli, Meet Nakum, Bhashwatee Das, Nancy Kshetrimayum:
Comprehensive Analysis of Air Quality Trends in India Using Machine Learning and Deep Learning Models. 313-318 - Aqsa Ashraf Makhdomi, Iqra Altaf Gillani:
Decentralized Ridesharing: Overcoming Scalability Issues with Layer 2 Solution. 319-324 - Sagar Gupta, Aman Gupta:
Advancing Carbon-Efficient Software Development: A Sustainable Path Forward. 325-330 - Jay Barach:
Towards Zero Trust Security in SDN: A Multi-Layered Defense Strategy. 331-339 - Sai Venkata Jaswant Kolupuri, Ananya Paul, Rajat Subhra Bhowmick, Isha Ganguli:
Scams and Frauds in the Digital Age: ML-Based Detection and Prevention Strategies. 340-345 - Mitali Sinha, Padmalochan Bera, Manoranjan Satpathy:
SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDN. 346-351 - Saikat Chandra Bakshi, Ankita Pramanik, Gopal Chandra Roy, Eravelli Saicharan:
On IoT based Underground Mine Environment Monitoring Systems. 352-357 - Amritesh Kumar, Nitin Bhatia, Debasis Das:
Grouping nodes based PBFT for Preventing Fake Educational Certificates Verification. 358-363 - Arnab Mallick, Rajesh P. Barnwal:
A Scalable Framework for Multi-cloud IoT Data Synchronization. 364-369 - Rangin Lahiri, Saikat Chakrabarti, Subrata Saha:
Non-Fungible Tokens (NFTs): A Systematic Study of Trust Criteria. 370-376 - Alekhya Gorrela, Nikumani Choudhury:
Faster Convergence of Adaptive Data Rate in Dynamic LoRa-based IoT Network Applications. 377-382 - Yash Ganar, Vinay Kumar, Shraddha Dulera, Ram Narayan Yadav:
Optimizing Autonomous Intersection Control Using Single Agent Reinforcement Learning. 383-389 - Kasturi Routray, Padmalochan Bera:
Secure and Expressive Authorized Keyword Search in Cloud-Assisted Cyber-Physical Systems. 390-395 - Ankit Dixit, Ravi Bhandari, Pallab Maji:
RoadEye: A Framework For Detecting Traffic Rule Violations. 396-401 - Prianshu Jha, Gurpreet Singh, Amit Kumar, Dewesh Agrawal, Yashwant Singh Patel, Javad Forough:
NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy. 402-407 - Babli Kumari, Renu Dhir, Siddhartha Chatterjee, Suchi Jain:
Automated Identification of Traffic Accidents in Images and Videos Employing Advanced Deep Learning Methods. 408-413 - Pushpak Shukla, Shailendra Shukla:
Unmanned Aerial Vehicle (UAV) Based Disaster Detection and Crowd Sensing Using Deep Learning Models. 414-419 - Suman Das, Pankaj Kumar Keserwani, Mahesh Chandra Govil:
Detecting Adversarial Samples using Kernel Density Feature Extractor in Medical Image. 420-425 - Koteswararao Kondepu, Bheemarjuna Reddy Tamma, Venkateswarlu Gudepu:
O-RIDE: Open-RAN Innovation and Deployments Exploration. 426-429 - Bapi Chatterjee, Sathya Peri:
Concurrent and Learned Data Structures. 430-434
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.