default search action
27th CAMAD 2022: Paris, France
- 27th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2022, Paris, France, November 2-3, 2022. IEEE 2022, ISBN 978-1-6654-6129-0
- Yutong Song, Wei Wang, Kazem Sohraby:
Uberization of NOMA Wireless Network Resource Sharing: A Driver-Passenger Game-Theoretic Approach. 1-6 - Amel Tibhirt, Dirk Slock, Yi Yuan-Wu:
Interference Mitigation in Dynamic TDD MIMO Interference Channels. 7-12 - Alessandro Brighenti, Matteo Drago, Tommaso Zugno, Michele Zorzi, Paolo Casari:
Performance Evaluation of Contention-based Channel Access for mmWave Sidelink Communications. 13-18 - Felix Klement, Henrich C. Pöhls, Stefan Katzenbeisser:
Change Your Car's Filters: Efficient Concurrent and Multi-Stage Firewall for OBD-II Network Traffic. 19-25 - Sreelakshmi Vattaparambil Sudarsan, Olov Schelén, Ulf Bodin, Nicklas Nyström:
Device Onboarding in Eclipse Arrowhead Using Power of Attorney Based Authorization. 26-32 - Kalpit Dilip Ballal, Radheshyam Singh, Stanley Chukwuebuka Nwabuona, Lars Dittmann, Sarah Ruepp:
Implementation of Failure Recovery in Emergency IoT Applications Using D2D in LoRa/LoRaWAN. 41-46 - Quang-Duy Nguyen, Saadia Dhouib, Patrick Bellot:
A Unified Method to Design Bridges for OPC UA PubSub Networks in the Industrial IoT. 47-52 - Katherine McLeod, Petros Spachos:
Towards an IoT Framework for Wellness Assessment. 53-58 - Caio B. Bezerra De Souza, Jussif J. Abularach Arnez, Tarcisio Fernandes, Cassio A. Tavares Alves, Janislley Oliveira de Sousa:
Analysis of Power Consumption in 4G VoLTE and 5G VoNR Over IMS Network. 59-64 - Jhenifer de O. Melo, Francisco Rafael Marques Lima:
Hybrid SIC with Residual Error Factor in Wireless Powered Communications. 65-70 - Rakpong Kaewpuang, Minrui Xu, Dusit Niyato, Han Yu, Zehui Xiong:
Resource Allocation in Quantum Key Distribution (QKD) for Space-Air-Ground Integrated Networks. 71-76 - Irene P. Keramidi, Dimitris Uzunidis, Marinos Vlasakis, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios:
Exploiting Machine Learning for the Performance Analysis of a Mobile Hotspot with a Call Admission Control Mechanism. 77-82 - Mahzabeen Emu, Salimur Choudhury, Kai Salomaa:
Resource Optimization of SFC Embedding for IoT Networks Using Quantum Computing. 83-88 - Neda Ahmadi, Iosif Mporas, Anastasios K. Papazafeiropoulos, Pandelis Kourtessis, John M. Senior:
Power Control in massive MIMO Networks Using Transfer Learning with Deep Neural Networks. 89-93 - Ioannis Zenginis, John S. Vardakas, Kostas Ramantas, Christos V. Verikoukis:
Smart home's energy management applying the deep deterministic policy gradient and clustering. 94-99 - Mohamed Lamine Bouknia, Rami Zegadi, Djamel Sayad, Chemseddine Zebiri, Issa T. E. Elfergani, Jonathan Rodriguez, Ifiok E. Otung, Raed Abd-Alhameed:
A compact simple circular disk printed monopole Antenna for multiple applications. 100-103 - Rami Zegadi, Mohamed Lamine Bouknia, Djamel Sayad, Chemseddine Zebiri, Issa T. E. Elfergani, Jonathan Rodriguez, Zoran Vujicic, Raed Abd-Alhameed:
Enhanced Mid-Infrared Gas Absorption Spectroscopic Detection Using Multilayer Optical Structures. 104-107 - Farhad Rezazadeh, Nikolaos G. Bartzoudis:
A Federated DRL Approach for Smart Micro-Grid Energy Control with Distributed Energy Resources. 108-114 - Omer Melih Gul, Michel Kulhandjian, Burak Kantarci, Azzedine Touazi, Cliff Ellement, Claude D'Amours:
Fine-grained Augmentation for RF Fingerprinting under Impaired Channels. 115-120 - Gonzalo García-Valle, Silvia Colodrero, Victor Cuadrat, Guillermo Gutiérrez, Sirio Beneitez, Sergio Martínez-Navas:
Design of a Smart Metering Device with Edge Computing for Monitoring Silicon Photovoltaic Panels. 121-127 - Siham Bouchelaghem, Hakim Boudjelaba, Mawloud Omar, Mourad Amad:
User Mobility Dataset for 5G Networks Based on GPS Geolocation. 128-133 - Maria Papaioannou, Georgios Zachos, Georgios Mantas, Aliyah Essop, Abdulkareem Karasuwa, Jonathan Rodriguez:
Generating Datasets Based on the HuMIdb Dataset for Risk-based User Authentication on Smartphones. 134-139 - Rohan Desai, T. G. Venkatesh:
Robust Network Intrusion Detection Systems for Outlier Detection. 140-146 - Wali Ullah Khan, Eva Lagunas, Asad Mahmood, Zain Ali, Symeon Chatzinotas, Björn E. Ottersten, Octavia A. Dobre:
Integration of Backscatter Communication with Multi-cell NOMA: A Spectral Efficiency Optimization under Imperfect SIC. 147-152 - Houda Hafi, Wahabou Abdou:
A Beacon Rate Adjustment Scheme based on Autonomic Computing for 5G-V2X. 153-158 - Areen Shiyahin, Stefan Schwarz, Markus Rupp:
Quality of Service Aware Scheduling in Mixed Traffic Wireless Networks. 159-165 - Eric Gyamfi, Anca Jurcut:
M-TADS: A Multi-Trust DoS Attack Detection System for MEC-enabled Industrial loT. 166-172 - Maria Papaioannou, Georgios Mantas, Aliyah Essop, Victor Sucasas, Najwa Aaraj, Jonathan Rodriguez:
Risk Estimation for a Secure & Usable User Authentication Mechanism for Mobile Passenger ID Devices. 173-178 - Georgios Zachos, Georgios Mantas, Ismael Essop, Kyriakos Porfyrakis, José Carlos Ribeiro, Jonathan Rodriguez:
Prototyping an Anomaly-Based Intrusion Detection System for Internet of Medical Things Networks. 179-183 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis, George Mastorakis, Evangelos Pallis:
Secure Two-Way Communications Between UAVs and Control Center in IoV 5G Communication. 184-189 - Davide Adami, Stefano Giordano, Michele Pagano:
Elastic Load Balancing in Software Defined Satellite Networks. 207-212 - Giannis Savva, Konstantinos Manousakis, Vasilis Sourlas, Georgios Ellinas:
Joint Content Placement and Secure Lightpath Provisioning in EONs Supporting Anycast Traffic. 213-218 - Ezechiel Tape, Samir Medjiah, Christophe Chassot:
A Pragmatic and Realistic Approach for Providing Adapted Transport Services for All Applications. 219-225 - Aparna Behara, T. G. Venkatesh:
Performance Study of High-Efficiency IEEE 802.11ax WLAN Standard Using NS-3 Simulator. 226-231 - Djamila Zamouche, Sofiane Aissani, Kahina Zizi, Lina Bourkeb, Khaled Hamouid, Mawloud Omar:
A Behavioral Modeling-based Driver Authentication Approach for Smart Cars Self-Surveillance. 232-237 - Lili He, Defeng Du, Hongtao Bai, Kai Wang:
Lightweight YOLOV4 algorithm for underwater whale detection. 927-934 - Kyle C. Watters, Edward J. Coyle:
Achieving Low Probability of Interference in Spread Spectrum Cognitive Radio Networks. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.