default search action
29th ICCCN 2020: Honolulu, HI, USA
- 29th International Conference on Computer Communications and Networks, ICCCN 2020, Honolulu, HI, USA, August 3-6, 2020. IEEE 2020, ISBN 978-1-7281-6607-0
- Kazuki Ikeda, Yua Imai, Hiroyuki Yomo, Yoshihisa Kondo, Hiroyuki Yokoyama:
Data Transmissions From a Drone Using Multi-AP Wireless LAN: A Field Trial. 1-2 - Shuai Liu, Fei Yang, Dandan Li, Marcelo Bagnulo, Bingyang Liu, Xiaohong Huang:
The Trusted and Decentralized Network Resource Management. 1-7 - Zhiqing Tang, Jiong Lou, Fuming Zhang, Weijia Jia:
Dependent Task Offloading for Multiple Jobs in Edge Computing. 1-9 - Omer F. Ozarslan, Kamil Saraç:
ZIDX: A Generic Framework for Random Access to BGP Records in Compressed MRT Datasets. 1-8 - Joshua Lampkins, Tiffany Hyun-Jin Kim:
Bidirectional Blockchain. 1-8 - Mohammad Al Olaimat, Dongeun Lee, Youngsoo Kim, Jonghyun Kim, Jinoh Kim:
A Learning-based Data Augmentation for Network Anomaly Detection. 1-10 - Mohammad Jahanian, Jiachen Chen, K. K. Ramakrishnan:
Managing the Evolution to Future Internet Architectures and Seamless Interoperation. 1-11 - Wenling Li, Jianen Yan, Zhaoxin Zhang:
Relational Database Watermarking Based on Chinese Word Segmentation and Word Embedding. 1-6 - Shaohua Cao, Zhihao Wang, Yizhi Chen, Dingde Jiang, Yang Yan, Hui Chen:
Research on Design and Application of Mobile Edge Computing Model Based on SDN. 1-6 - Dong Li, Xiao Zhou, Ao Xue:
Open source threat intelligence discovery based on topic detection. 1-4 - Ci-Hung Ciou, Pi-Chung Wang:
Efficient Multicast Labelling for OpenFlow-Based Switches. 1-2 - Zhuang Liu, Juhua Pu, Nana Zhan, Xingwu Liu:
Predict the Next Attack Location via An Attention-based Fused-SpatialTemporal LSTM. 1-6 - Anton Gulenko, Alexander Acker, Odej Kao, Feng Liu:
AI-Governance and Levels of Automation for AIOps-supported System Administration. 1-6 - John N. Daigle, George Humphrey, Henry C. Lena, Avijit Sarker:
Optimizing Scan Times of BLE Scanning Systems. 1-8 - Prasad Prakash Netalkar, Sumit Maheshwari, Dipankar Raychaudhuri:
Evaluation of Network Assisted Handoffs in Heterogeneous Networks. 1-9 - Huajie Shao, Shuochao Yao, Andong Jing, Shengzhong Liu, Dongxin Liu, Tianshi Wang, Jinyang Li, Chaoqi Yang, Ruijie Wang, Tarek F. Abdelzaher:
Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social Networks. 1-11 - Haoran Hu, Wei Chang:
On the Mitigation of Controllable Event Triggering Attack in WSNs. 1-6 - Michael Nekrasov, Maxton Ginier, Ryan Allen, Irina Artamonova, Elizabeth M. Belding:
Impact of 802.15.4 Radio Antenna Orientation on UAS Aerial Data Collection. 1-9 - Min Lei, Peng Liu, Qingshan Wang, Qi Wang:
Precise Identification of Rehabilitation Actions using AI based Strategy. 1-7 - Mengyu Chen, Weifa Liang, Yuchen Li:
Data Collection Maximization for UAV-Enabled Wireless Sensor Networks. 1-9 - Haodi Ping, Yongcai Wang, Deying Li:
HGO: Hierarchical Graph Optimization for Accurate, Efficient, and Robust Network Localization. 1-9 - Huang Huang, Jingjing Li:
Distributed Energy-Aware Reliable Routing and TDMA Link Scheduling in Wireless Sensor Networks. 1-10 - Anirudh Ganji, Anand Singh, Muhammad Shahzad:
Choosing TCP Variants for Cloud Tenants - A Measurement based Approach. 1-9 - Kerry Veenstra, Katia Obraczka:
Grid Partition: an Efficient Greedy Approach for Outdoor Camera IoT Deployments in 2.5D Terrain. 1-9 - Yilian Li, Yiyu Yang, Xiao Yu, Ting Yang, Lihua Dong, Wengjie Wang:
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform. 1-5 - Zhenzhe Lin, Yucheng Xie, Xiaonan Guo, Yanzhi Ren, Yingying Chen, Chen Wang:
WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals. 1-9 - Ting-Yi Wu, Yunghsiang S. Han:
ML Soft-decision Decoding for Binary Linear Block Codes Based on Trellises of Their Supercodes. 1-9 - Hang Yang, Qingshan Wang, Qi Wang, Peng Liu, Wei Huang:
Facial Micro-Expression Recognition Using Quaternion-Based Sparse Representation. 1-9 - Meng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen, Yunxi Dong:
Minor Privacy Protection Through Real-time Video Processing at the Edge. 1-6 - John Byabazaire, Gregory M. P. O'Hare, Declan T. Delaney:
Using Trust as a Measure to Derive Data Quality in Data Shared IoT Deployments. 1-9 - Jamie Wubben, Izan Catalán, Manel Lurbe, Francisco Fabra, Francisco J. Martinez, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni:
Providing resilience to UAV swarms following planned missions. 1-6 - Anu Jagannath, Jithin Jagannath, Andrew L. Drozd:
High Rate-Reliability Beamformer Design for 2×2 Mimo-OFDM System Under Hostile Jamming. 1-9 - Nina Slamnik-Krijestorac, Michaël Peeters, Steven Latré, Johann M. Márquez-Barja:
Analyzing the impact of VIM systems over the MEC management and orchestration in vehicular communications. 1-6 - Min Long, Sai Long, Guo-lou Ping, Fei Peng:
A Facial Privacy Protection Framework Based on Component Difference and Template Morphing. 1-9 - Qingxiu Liu, Wenfei Wu, Qingsong Liu, Qun Huang:
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness. 1-11 - Paul J. Pritz, Daniel Perez, Kin K. Leung:
Fast-Fourier-Forecasting Resource Utilisation in Distributed Systems. 1-9 - Nan Geng, Mingwei Xu, Yuan Yang, Enhuan Dong, Chenyi Liu:
Adaptive and Low-cost Traffic Engineering based on Traffic Matrix Classification. 1-9 - Weiguo Wang, Jinming Li, Meng Jin, Yuan He:
ChordMics: Acoustic Signal Purification with Distributed Microphones. 1-9 - Felix Lorenz, Lauritz Thamsen, Andreas Wilke, Ilja Behnke, Jens Waldmüller-Littke, Ilya Komarov, Odej Kao, Manfred Paeschke:
Fingerprinting Analog IoT Sensors for Secret-Free Authentication. 1-6 - Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Baoliu Ye, Sanglu Lu:
RF-Detector: 3D Structure Detection of Tiny Objects via RFID Systems. 1-9 - Liuwang Kang, Haiying Shen:
Attack Detection and Mitigation for Sensor and CAN Bus Attacks in Vehicle Anti-lock Braking Systems. 1-9 - Yongkai Fan, Guanqun Zhao, Wenqian Shang, Jingtao Shang, Weiguo Lin, Zhen Wang:
A Preliminary Design for Authenticity of IoT Big Data in Cloud Computing. 1-2 - Jeanette M. Sperhac, Robert L. DeLeon, Joseph P. White, Matthew D. Jones, Andrew E. Bruno, Renette L. Jones-Ivey, Thomas R. Furlani, Jonathan E. Bard, Vipin Chaudhary:
Towards Performant Workflows, Monitoring and Measuring. 1-9 - Shravan Garlapati:
Trade-offs in the Design of Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications. 1-7 - Haoran Niu, Jiangnan Li, Yu Zhao:
SmartBullets: A Cloud-Assisted Bullet Screen Filter based on Deep Learning. 1-2 - Taku Noguchi, Yu-Cheng Ting, Masami Yoshida, Alberto Gallegos Ramonet:
Real-time Cooperative Vehicle Tracking in VANETs. 1-6 - Yang Zhang, Dongzheng Jia, Shijie Jia, Limin Liu, Jingqiang Lin:
Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. 1-11 - Shahbaz Rezaei, Xin Liu:
Multitask Learning for Network Traffic Classification. 1-9 - Adeel A. Malik, Deepak K. Tosh:
Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. 1-6 - Christian Meurisch, Bekir Bayrak, Florian Giger, Max Mühlhäuser:
PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI Services. 1-2 - Xiaoyuan Yu, Brandon Haakenson, Tyler Phillips, Xukai Zou:
User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models. 1-9 - Daniel Y. Karasek, Jeehyeong Kim, Victor Youdom Kemmoe, Md. Zakirul Alam Bhuiyan, Sunghyun Cho, Junggab Son:
SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns. 1-9 - Junfeng Tian, Yongqing Tian:
A Model Based on Program Slice and Deep Learning for Software Defect Prediction. 1-6 - Shahryar Afzal, Jiasi Chen, K. K. Ramakrishnan:
Viewing the 360° Future: Trade-Off Between User Field-of-View Prediction, Network Bandwidth, and Delay. 1-11 - Massimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa:
Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations. 1-9 - Léo Mendiboure, Mohamed Aymen Chalouf, Francine Krief:
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks. 1-11 - Xiaomei Zhang:
PeerCould: Enhancing Mobile Cloud with Social-Aware Device-to-Device Offloading. 1-7 - Artur Hlobaz:
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function. 1-6 - Haipeng Dai, Xiaoyu Wang, Lijie Xu, Chao Dong, Qian Liu, Lei Meng, Guihai Chen:
Area Charging for Wireless Rechargeable Sensors. 1-9 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:
Joint Optimization Of Routing and Flexible Ethernet Assignment In Multi-layer Multi-domain Networks. 1-9 - Vineet Naique Dhaimodker, Rahul Desai, S. Mini, Deepak K. Tosh:
Quality-driven Energy Optimization in Internet of Things. 1-8 - Dolly Sapra, Andy D. Pimentel:
Deep Learning Model Reuse and Composition in Knowledge Centric Networking. 1-11 - Joaquin Chung, Mainak Adhikari, Satish Narayana Srirama, Eun-Sung Jung, Rajkumar Kettimuthu:
Resource Management for Processing Wide Area Data Streams on Supercomputers. 1-6 - Youssef Khazbak, Tianxiang Tan, Guohong Cao:
MLGuard: Mitigating Poisoning Attacks in Privacy Preserving Distributed Collaborative Learning. 1-9 - Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling DoS Attacks & Interoperability in the Smart Grid. 1-6 - Bingyi Liu, Chunli Yu, Weizhen Han, Dongyao Jia, Jianping Wang, Enshu Wang, Kejie Lu:
Towards Reliable Message Dissemination for Multiple Cooperative Drivings: A Hybrid Approach. 1-9 - Zhuo Li, Jiannong Cao, Xiulong Liu, Jiuwu Zhang, Haoyuan Hu, Didi Yao:
A Self-Adaptive Bluetooth Indoor Localization System using LSTM-based Distance Estimator. 1-9 - Shangyue Zhu, Alamin Mohammed, Aaron Striegel:
A Frame-Aggregation-Based Approach for Link Congestion Prediction in WiFi Video Streaming. 1-8 - Christopher Gonzalez, Bin Tang:
FT-VMP: Fault-Tolerant Virtual Machine Placement in Cloud Data Centers. 1-9 - Morihiko Tamai, Akio Hasegawa, Hiroyuki Yokoyama:
Comprehensive Visualization of Physical and MAC Layer Data for Wireless Network Monitoring. 1-2 - Rahil Gandotra, Levi Perigo:
Comparing Energy Efficiencies of SDN Hardware Based on Forwarding Configurations. 1-7 - Wei Liu, Eun Kyo Park, Udo R. Krieger, S. S. Zhu:
Smart e-Health Security and Safety Monitoring with Machine Learning Services. 1-6 - Pradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof, Marcos Augusto M. Vieira, Kevin Chan, Ramesh Govindan, Gaurav S. Sukhatme, Paulo Tabuada, Gunjan Verma:
Rapid Top-Down Synthesis of Large-Scale IoT Networks. 1-9 - Weibin Meng, Ying Liu, Federico Zaiter, Shenglin Zhang, Yihao Chen, Yuzhe Zhang, Yichen Zhu, En Wang, Ruizhi Zhang, Shimin Tao, Dian Yang, Rong Zhou, Dan Pei:
LogParse: Making Log Parsing Adaptive through Word Classification. 1-9 - Xiang Shi, Lin Wang, Fa Zhang, Biyu Zhou, Zhiyong Liu:
PStream: Priority-Based Stream Scheduling for Heterogeneous Paths in Multipath-QUIC. 1-8 - Faheed A. F. Alenezi, Sejun Song, Baek-Young Choi, Haymanot Gebre-Amlak:
TaDPole: Traffic-aware Discovery Protocol for Software-Defined Wireless and Mobile Networks. 1-9 - Shuhui Yang, Xuefeng Xi, Wei Li:
QoS Aware Task Management Strategies for Mobile Crowdsensing Applications. 1-9 - Oluwamayowa Ade Adeleke, Nicholas Bastin, Deniz Gurkan:
Network Testing Using a Novel Framework for Traffic Modeling and Generation*. 1-2 - Zengyang Gong, Bo Du, Zhidan Liu, Wei Zeng, Pascal Perez, Kaishun Wu:
SD-seq2seq : A Deep Learning Model for Bus Bunching Prediction Based on Smart Card Data. 1-9 - Wenjun Fan, Sang-Yoon Chang, Shawn Emery, Xiaobo Zhou:
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing. 1-9 - Alem Fitwi, Yu Chen:
Privacy-Preserving Selective Video Surveillance. 1-10 - Yunqi Guo, Zhaowei Tan, Songwu Lu:
Towards Model-Centric Security for IoT Systems. 1-6 - Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma:
A Preliminary Analysis of Password Guessing Algorithm. 1-9 - Dapeng Qu, Shijun Qu, Yue Yang, Haiying Shen:
An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDNs. 1-9 - Alexander Gerasimov, Vitaly A. Antonenko:
Slicenomics: How to Provide Cost-Based Intra and Inter Slice Resource Management? 1-6 - Desta Haileselassie Hagos, Martin Løland, Anis Yazidi, Øivind Kure, Paal E. Engelstad:
Advanced Passive Operating System Fingerprinting Using Machine Learning and Deep Learning. 1-11 - Liang Dong, Jingao Xu, Guoxuan Chi, Danyang Li, Xinglin Zhang, Jianbo Li, Qiang Ma, Zheng Yang:
Enabling Surveillance Cameras to Navigate. 1-10 - Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yucheng Xie, Jian Liu:
Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors. 1-9 - Huijie Li, Xin Li, Youyou Lu, Xiaolin Qin:
An Experimental Study on Data Recovery Performance Improvement for HDFS with NVM. 1-9 - Zhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen:
An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm. 1-9 - Huanle Zhang, Bo Han, Prasant Mohapatra:
Toward Mobile 3D Vision. 1-8 - Rahil Gandotra, Levi Perigo:
NFEH: An SDN Framework for Containerized Network Function-enabled End Hosts. 1-6 - Hao Cai, Tilman Wolf:
Implementation of Network Source Authentication and Path Validation Using Orthogonal Sequences. 1-7 - Pandey Pandey, Piyush Tiwary, Sudhir Kumar, Sajal K. Das:
Residual Neural Networks for Heterogeneous Smart Device Localization in IoT Networks. 1-9 - Yao Wang, Zhaowei Wang, Zejun Xie, Nengwen Zhao, Junjie Chen, Wenchi Zhang, Kaixin Sui, Dan Pei:
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning. 1-9 - Dongxiao Deng, Wenbi Rao, Bingyi Liu, Dongyao Jia, Yang Sheng, Jianping Wang, Shengwu Xiong:
TA-MAC: A Traffic-Aware TDMA MAC Protocol for Safety Message Dissemination in MEC-assisted VANETs. 1-9 - Weibin Meng, Ying Liu, Yuheng Huang, Shenglin Zhang, Federico Zaiter, Bingjin Chen, Dan Pei:
A Semantic-aware Representation Framework for Online Log Analysis. 1-7 - Floriano De Rango, Salvatore Amelio:
Geographic and Energy aware Epidemic Strategy for Mobile Opportunistic DTN. 1-8 - Moh Sabbir Saadat, Sanjib Sur, Srihari Nelakuditi, Parmesh Ramanathan:
MilliCam: Hand-held Millimeter-Wave Imaging. 1-9 - Hai Liu, Wai Kit Wong, Shujin Ye, Chris Yu-Tak Ma:
Joint Energy Optimization of Cooling Systems and Virtual Machine Consolidation in Data Centers. 1-8 - Yan Wang, Tianming Zhao, Fatemeh Tahmasbi, Jerry Cheng, Yingying Chen, Jiadi Yu:
Driver Identification Leveraging Single-turn Behaviors via Mobile Devices. 1-9 - Wuji Liu, Chase Q. Wu, Qianwen Ye, Aiqin Hou, Wei Shen:
Performance Modeling and Prediction of Big Data Workflows: An Exploratory Analysis. 1-10 - Qian Li, Jiao Zhang, Tian Pan, Tao Huang, Yunjie Liu:
Data-driven Routing Optimization based on Programmable Data Plane. 1-9 - Yuan Zhuang, Xiaohui Wei, Hongliang Li, Mingkai Hou, Yundi Wang:
Reducing Fault-tolerant Overhead for Distributed Stream Processing with Approximate Backup. 1-9 - Maria Riaz, Juha-Matti Tilli, Raimo Kantola:
Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks. 1-11 - Wenxin Li, Ness B. Shroff:
On the Asymptotic Optimality of Work-Conserving Disciplines in Completion Time Minimization. 1-9 - Nuno Afonso, Manuel Bravo, Luís Rodrigues:
Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge. 1-11 - Yue Xu, Jingwen Zhang, Hao Zhou, Xiaoyan Wang, Zhi Liu, Yusheng Ji:
ecUWB: A Energy-Centric Communication Scheme for Unstable WiFi Based Backscatter Systems : (Invited Paper). 1-9 - Ning Wang, Bo Wang, Taoying Liu, Wei Li, Shuhui Yang:
A Middleware Approach to Synchronize Transaction Data to Blockchain. 1-8 - Weihe Li, Jiawei Huang, Shaojun Zou, Zhuoran Liu, Qichen Su, Xuxing Chen, Jianxin Wang:
Pipeline-Based Chunk Scheduling to Improve ABR Performance in DASH System. 1-9 - Ce Chi, Kaixuan Ji, Avinab Marahatta, Fa Zhang, Youshi Wang, Zhiyong Liu:
An Energy Saving-Oriented Incentive Mechanism in Colocation Data Centers. 1-6 - Ruike Li, Shichong Tan, Chensi Wu, Xudong Cao, Haitao He, Wenjie Wang:
IFVD: Design of Intelligent Fusion Framework for Vulnerability Data Based on Text Measures. 1-6 - Anatolij Zubow, Suzan Bayhan, Piotr Gawlowicz, Falko Dressler:
DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced Spectrum Sensing. 1-8 - Jonathan Takeshita, Ryan Karl, Taeho Jung:
Secure Single-Server Nearly-Identical Image Deduplication. 1-6 - Jiechao Gao, Haoyu Wang, Haiying Shen:
Machine Learning Based Workload Prediction in Cloud Computing. 1-9 - Dingjie Sheng, Mingjun Xiao, An Liu, Xiang Zou, Baoyi An, Sheng Zhang:
CPchain: A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain. 1-9 - Shouxu Lin, Weifa Liang, Jing Li:
Reliability-Aware Service Function Chain Provisioning in Mobile Edge-Cloud Networks. 1-9 - Hongliang Li, Zhewen Xu, Fangyu Tang, Xiaohui Wei, Zhaohui Ding:
CPSA: A Coordinated Process Scheduling Algorithm for Coupled Earth System Model. 1-9 - Yifan Zhang, Xinglin Zhang:
BundleSense: A Task-Bundling-Based Incentive Mechanism for Mobile Crowd Sensings. 1-9 - Pedro Pablo Garrido Abenza, Manuel P. Malumbres, Pablo Piñol Peral, Otoniel López Granado:
Evaluating the Use of QoS for Video Delivery in Vehicular Networks. 1-9 - Dheeraj Kotagiri, Koichi Nihei, Tansheng Li:
Multi-User Distributed Spectrum Access Method for 802.11ax Stations. 1-2 - Kai Jiang, Huan Zhou, Dawei Li, Xuxun Liu, Shouzhi Xu:
A Q-learning based Method for Energy-Efficient Computation Offloading in Mobile Edge Computing. 1-7 - Hongpeng Guo, Tianyuan Liu, King-Shan Lui, Claudiu Danilov, Klara Nahrstedt:
Secure Broadcast Protocol for Unmanned Aerial Vehicle Swarms. 1-9 - Yoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama:
A Low Latency Transmission Control for Multi-link WLAN. 1-6 - Jingsheng Gao, Shaojing Fu, Yuchuan Luo, Tao Xie:
Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing. 1-9 - Jiale Chen, Jiale Zhang, Yanchao Zhao, Hao Han, Kun Zhu, Bing Chen:
Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning. 1-9 - Benjamin Campbell:
Asynchronous Distributed Topology Control for Signature Management in Mobile Networks. 1-8 - Christian Meurisch, Dennis Werner, Florian Giger, Bekir Bayrak, Max Mühlhäuser:
PDSProxy++: Proactive Proxy Deployment for Confidential Ad-hoc Personalization of AI Services. 1-9 - P. Sergio Rivera, Zongming Fei, James Griffioen:
POLANCO: Enforcing Natural Language Network Policies. 1-9 - Yull Kyu Han, Young Bok Choi:
Human Action Recognition for Disaster Detection. 1-2 - Lei Zhang, Kewei Zhu, Junchen Pan, Hang Shi, Yong Jiang, Yong Cui:
Reinforcement Learning Based Congestion Control in a Real Environment. 1-9 - Yu-Yun Tseng, Po-Min Hsu, Jen-Jee Chen, Yu-Chee Tseng:
Computer Vision-Assisted Instant Alerts in 5G. 1-9 - Dawei Li, Chigozie Asikaburu, Boxiang Dong, Huan Zhou, Sadoon Azizi:
Towards Optimal System Deployment for Edge Computing: A Preliminary Study. 1-6 - Nitin Shivaraman, Saravanan Ramanathan, Shanker Shreejith, Arvind Easwaran, Sebastian Steinhorst:
DeCoRIC: Decentralized Connected Resilient IoT Clustering. 1-10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.