default search action
ICNC 2019: Honolulu, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2019, Honolulu, HI, USA, February 18-21, 2019. IEEE 2019, ISBN 978-1-5386-9223-3
- Sang-Yoon Chang, Younghee Park:
Silent Timestamping for Blockchain Mining Pool Security. 1-5 - Amer Al-Baidhani, H. Howard Fan:
Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading Channels. 6-10 - Anusha Prabakaran, Min Chen:
Product Review Credibility Analysis. 11-15 - Kensei Saito, Yasutaka Ogawa, Toshihiko Nishimura, Takeo Ohgane, Junichiro Hagiwara:
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDF†. 16-21 - Mingrui Xu, Chase Q. Wu, Aiqin Hou, Yongqiang Wang:
Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems. 22-28 - Yuya Suzuki, Toshihiko Nishimura, Takeo Ohgane, Yasutaka Ogawa, Junichiro Hagiwara:
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System. 29-33 - Sangjun Park, Seunghyun Lee, Wan Choi:
Markov Chain Analysis for Compressed Sensing based Random Access in Cellular Systems. 34-38 - Zhiqiang Xiao, Bingcheng Zhu, Yongjin Wang:
Outage Probability Bounds of EGC Over Correlated Lognormal Fading Channels. 39-45 - Nardine Basta, Amal El-Nahas, Hans Peter Großmann, Slim Abdennadher:
SMAP: A Map Extension Framework for Intelligent Travel Systems. 46-50 - Pan Wang, Yiqing Zhou, Feng Ye, Hao Yue:
Data Interpolation for Deep Learning based Encrypted Data Packet Classification. 51-55 - Claudio Calcaterra, Alessio Carmenini, Andrea Marotta, Dajana Cassioli:
Hadoop Performance Evaluation in Software Defined Data Center Networks. 56-61 - Zhiming Zhu, Bingcheng Zhu, Yongjin Wang, Zheng Shi, Yuan Jiang:
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array. 62-66 - Jaber Al-Khori, Galymzhan Nauryzbayev, Mohamed Abdallah, Mounir Hamdi:
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming. 67-72 - Cong Pu:
Spam DIS Attack Against Routing Protocol in the Internet of Things. 73-77 - Edoardo Biagioni:
Preventing UDP Flooding Amplification Attacks with Weak Authentication. 78-82 - Sachula Meng, Ying Wang, Wensheng Sun, Shan Guo, Kai Sun:
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors. 83-87 - Bowen Yang, Xiang Chen, Jinsen Xie, Sugang Li, Yanyong Zhang, Jian Yang:
Multicast Design for the MobilityFirst Future Internet Architecture. 88-93 - Qi Zhang, Xiaofeng Jiang, Shuangwu Chen, Jinsen Xie, Jian Yang, Ling Xing:
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking. 94-99 - Manuel Eugenio Morocho Cayamcela, Wansu Lim:
Fine-tuning a pre-trained Convolutional Neural Network Model to translate American Sign Language in Real-time. 100-104 - Weicheng Yu, Kai Zhang, Pingping Shang, Xue-Qin Jiang, Miaowen Wen, Jun Li, Han Hai:
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation. 105-109 - Lanlin Li, Yinglei Teng, Mei Yan, Mei Song, Lihong Song:
A Two-phase Transmission Protocol Design for Ultra-reliable Communications. 110-115 - Huan-Bang Li, Kenichi Takizawa, Toshinori Kagawa, Fumihide Kojima, Ryu Miura:
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver. 116-120 - Safiqul Islam, Michael Welzl, Stein Gjessing:
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters. 121-125 - Tina Gui, Feng Wang, Christopher Ma, Dawn E. Wilkins:
On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNs. 126-130 - Naveen Naik Sapavath, Dema Saad Alorini, Danda B. Rawat, Moses Garuba:
Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks. 131-135 - Yu Liu, Curtis R. Taylor, Craig A. Shue:
Authenticating Endpoints and Vetting Connections in Residential Networks. 136-140 - Lav Gupta, Tara Salman, Ria Das, Aiman Erbad, Raj Jain, Mohammed Samaka:
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for Virtual NEtwork Services over Multi-Cloud Systems. 141-147 - Yoshito Usuzaka, Norikazu Takahashi:
A Novel NMF Algorithm for Detecting Clusters in Directed Networks. 148-152 - Anwar Alyatama:
Multi-Resource Continuous Allocation Model for Cloud Services. 153-158 - Junggab Son, Euiseong Ko, Uday Bhaskar Boyanapalli, Donghyun Kim, Youngsoon Kim, Mingon Kang:
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*. 159-163 - Marcin Niemiec, Piotr Jaglarz, Marcin Jekot, Piotr Cholda, Piotr Borylo:
Risk Assessment Approach to Secure Northbound Interface of SDN Networks. 164-169 - Shu Sekigawa, Satoru Okamoto, Naoaki Yamanaka, Eiji Oki:
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction. 170-174 - Ching-Fang Hsu, Siou-Ci Sie, Hsuan-Fang Fu, Jin-Jun Zheng, Shi-Xuan Chen:
Design of an Efficient Resource Management Model in Elastic Optical Networks. 175-179 - Thattapon Surasak, Scott C.-H. Huang:
Enhancing VoIP Security and Efficiency using VPN. 180-184 - Dandan Wang, Gurudutt Hosangadi, Pantelis Monogioudis, Anil Rao:
Mobile Device Localization in 5G Wireless Networks. 185-190 - Oleg Surnin, Fatima Hussain, Rasheed Hussain, Svetlana Ostrovskaya, Andrey Polovinkin, Jooyoung Lee, Xavier N. Fernando:
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment. 191-196 - Seungwoon Lee, Jehad Ali, Byeong-Hee Roh:
Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET. 197-202 - Diogo Parracho, David Duarte, Iola Pinto, Pedro Vieira:
An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G System. 203-208 - Takuto Kamiura, Shohei Yamada, Naiwala P. Chandrasiri:
A System for Generating Background Colors for e-Books, Based on its Text. 209-213 - Raffaele Bolla, Alessandro Carrega, Matteo Repetto:
An abstraction layer for cybersecurity context. 214-218 - Yuya Aoki, Takeo Fujii:
Construction of Time-Space Radio Environment Database using HMM for Cooperative Sensing. 219-223 - Ziwei Wang, Xiuhua Jiang:
A QoE-Driven Rate Adaptation Approach for Dynamic Adaptive Streaming Over HTTP. 224-229 - Krittetash Pinyoanuntapong, Hyuck Kwon, Khanh D. Pham, James Lyke:
Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh Fading. 230-234 - Yoshitaka Nakamura, Tomohiro Kaneta, Osamu Takahashi:
A temporary communication system using DTN for improving power consumption of mobile terminals. 235-239 - Wenjie Zhang, Guanglin Zhang, Yifeng Zheng, Liwei Yang, Chai Kiat Yeo:
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces. 240-244 - Yan Li, Victor O. K. Li:
Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks. 245-249 - Stefano Iannucci, Andrea Montemaggio, Byron Williams:
Towards Self-Defense of Non-Stationary Systems. 250-254 - Ihtisham Khalid, Syed Asad Ullah, Sajid Saleem, Syed Ali Hassan:
A Method of Moments Estimator for Modulation Index of Continuous Phase Modulation. 255-259 - Meng Tang, Jie Zhu:
Text-To-Speech quality evaluation based on LSTM Recurrent Neural Networks. 260-264 - Sami Alesawi, Minh Nguyen, Hao Che, Akshit Singhal:
Tail Latency Prediction for Datacenter Applications in Consolidated Environments. 265-269 - Sami Alesawi, Sakher Ghanem:
Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction. 270-275 - Fadi Salo, MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Aleksander Essex:
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection. 276-281 - Ben Hughes, Shruti Bothe, Hasan Farooq, Ali Imran:
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks. 282-286 - Kenta Kawai, Kazuki Tanabe, Katsunori Yamaoka, Ken-ichi Baba:
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls. 287-291 - William Brockelsby, Rudra Dutta:
A Graded Approach to Network Forensics with Privacy Concerns. 292-297 - Rahul Arun Paropkari, Aklilu Assefa Gebremichail, Cory C. Beard:
Fractional Packet Duplication and Fade Duration Outage Probability Analysis for Handover Enhancement in 5G Cellular Networks. 298-302 - Peter Willis, Nirmala Shenoy:
A Meshed Tree Protocol for Loop Avoidance in Switched Networks. 303-307 - Hessam Mohammadmoradi, Milad Heydariaan, Omprakash Gnawali, Kyungki Kim:
UWB-Based Single-Anchor Indoor Localization Using Reflected Multipath Components. 308-312 - Madhuprana Goswami, Hyuck M. Kwon, Khanh D. Pham, James Lyke:
Satellite MIMO Digital Beam-forming under Nonlinear High-Power Amplifier and Keyhole. 313-317 - Wenlong Ni, Wei Li:
Optimal Admission Control For Secondary Users In Cognitive Radio Systems. 318-323 - Daidong Ying, Feng Ye:
D2D-Assisted Physical-Layer Security in Next-Generation Mobile Network. 324-328 - Alvaro Javier Ortega, Raimundo Sampaio Neto, Rodrigo Pereira David:
Hybrid precoded index modulation in downlink mmWave MU-MIMO systems. 329-333 - Saleh Almutairi, Ramesh K. Karne, Alexander L. Wijesinha:
A Bare PC Text Based Browser. 334-338 - Hasan Burhan Beytur, Elif Uysal-Biyikoglu:
Age Minimization of Multiple Flows using Reinforcement Learning. 339-343 - Marco Scarpa, Salvatore Serrano:
A full Secondary User model for Cognitive Radio in a GSM-900 scenario. 344-349 - Murtadha Arif Bin Sahbudin, Marco Scarpa, Salvatore Serrano:
MongoDB Clustering using K-means for Real-Time Song Recognition. 350-354 - Salvatore Gaglio, Giuseppe Lo Re, Gloria Martorella, Daniele Peri:
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices. 355-359 - Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen:
Countering Selfish Mining in Blockchains. 360-364 - Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, Bo Sheng, Kuan Zhang:
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis. 365-369 - Talal Halabi, Martine Bellaïche, Adel Abusitta:
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game. 370-374 - Ehab Zaghloul, Tongtong Li, Jian Ren:
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts. 375-379 - Yangyang Tao, Shucheng Yu:
kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint Oversubscription. 380-384 - Venkata Sukumar Gurugubelli, Hua Fang, Honggang Wang:
Neuro-Fuzzy classifier for longitudinal behavioral intervention data. 385-389 - Fenghua Li, Zhe Sun, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. 390-394 - Min Kyung An, Hyuk Cho, Bing Zhou, Lei Chen:
Minimum Latency Aggregation Scheduling in Internet of Things. 395-401 - Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan:
Clustering the Unknown - The Youtube Case. 402-407 - Amirshahram Hematian, Wei Yu, David W. Griffith, Nada Golmie:
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed. 408-412 - Weibin Ma, Lin Zhang, Zhiqiang Wu:
Location Information-Aided Load Balancing Design for Hybrid LiFi and WiFi Networks. 413-417 - Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. 418-424 - Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. 425-431 - Josh McGiff, William G. Hatcher, James H. Nguyen, Wei Yu, Erik Blasch, Chao Lu:
Towards Multimodal Learning for Android Malware Detection. 432-436 - Paolo Addesso, Michele Cirillo, Mario Di Mauro, Maurizio Longo, Vincenzo Matta:
Adversarial Detection of Concealed VoIP Traffic. 437-441 - Casey T. Deccio, Derek Argueta, Jonathan Demke:
A Quantitative Study of the Deployment of DNS Rate Limiting. 442-447 - Dema Alorini, Danda B. Rawat:
Automatic Spam Detection on Gulf Dialectical Arabic Tweets. 448-452 - Dongliang Xu, Bailing Wang, Xiaojiang Du, Xiaoyan Zhu, Zhitao Guan, Xiaoyan Yu, Jingyu Liu:
Verification Code Recognition Based on Active and Deep Learning. 453-456 - Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua:
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. 457-462 - Michael Berhane Asfaw, Xueqin Jiang, Meixiang Zhang, Jia Hou, Wei Duan:
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution. 463-467 - Md Shaad Mahmud, Honggang Wang, Yong Kim:
Accelerated Prediction of Bradycardia in Preterm Infants Using Time-Frequency Analysis. 468-472 - Tilman Wolf, Anna Nagurney, James Griffioen, Kenneth L. Calvert:
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points. 473-479 - Xiwen Liu, Xiaoming Tao, Li Wang, Yafeng Zhan, Jianhua Lu:
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals. 480-485 - Ankur Chowdhary, Dijiang Huang:
SDN based Network Function Parallelism in Cloud. 486-490 - Jie Tang, Yu Yu, Daniel K. C. So, Gaojie Chen, Xiu Yin Zhang, Mo Huang:
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems. 491-496 - Chuanji Zhang, Hemin Yang, George F. Riley, Douglas M. Blough:
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks. 497-502 - Joseph Reeves, Ming Li:
Context-Aware Analysis Scheduling in Wireless Body Area Networks. 503-508 - Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. 509-514 - Wenfan Chen, Chengming Li, Shimin Gong, Lin Gao, Jing Xu:
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks. 515-519 - Qi Zhao, Muhao Chen, Pengyuan Du, Tuan Le, Mario Gerla:
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN. 520-525 - Laxima Niure Kandel, Shucheng Yu:
Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges. 526-530 - Ai Enkoji, Ming Li, James Daniel Brisky, Ryan Melvin:
Dynamic EAP Based MAC Protocol for Wireless Body Area Networks. 531-536 - Falko Dressler, Gurjashan Singh Pannu, Florian Hagenauer, Mario Gerla, Takamasa Higuchi, Onur Altintas:
Virtual Edge Computing Using Vehicular Micro Clouds. 537-541 - Sethuraman Panchanathan, Troy McDaniel, Ramin Tadayon, Adric Rukkila, Hemanth Venkateswara:
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility. 542-546 - Xueyan Liu, Zhitao Guan, Xiaojiang Du, Liehuang Zhu, Zhengtao Yu, Yinglong Ma:
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data. 547-551 - Yan Zhang, PengFei Liu, JingTao Yao:
Three-way Email Spam Filtering with Game-theoretic Rough Sets. 552-556 - Zhouzhou Li, Hua Fang, Honggang Wang:
Integrated Node Authentication and Key Distribution Method for Body Area Network. 557-561 - Zupei Li, Chao Gao, Qinggang Yue, Xinwen Fu:
Toward Drone Privacy via Regulating Altitude and Payload. 562-566 - Pranavi Appana, Xiaoyan Sun, Yuan Cheng:
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance. 567-571 - Ankur Chowdhary, Adel Alshamrani, Dijiang Huang:
SUPC: SDN enabled Universal Policy Checking in Cloud Network. 572-576 - Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur:
Adaptive MTD Security using Markov Game Modeling. 577-581 - Roxana Abolfathi, Hoda Roodaki, Shervin Shirmohammadi:
A Novel Rate Control Method for Free-viewpoint Video in MV-HEVC. 582-587 - Joseph Khoury, Mahsa T. Pourazad, Panos Nasiopoulos:
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression. 588-591 - Han Sun, Jian Yang:
Domain-Specific Image Classification Using Ensemble Learning Utilizing Open-Domain Knowledge. 593-596 - Jounsup Park:
Video Streaming over the LWA Systems. 597-601 - Ching-Fang Hsu, Hao-Cheng Hu, Hsuan-Fang Fu, Jin-Jun Zheng, Shi-Xuan Chen:
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks. 602-606 - Nattapong Kitsuwan, Ryota Matsuura:
Performance of Elastic Optical Network with Spectrum Slicing for Fragmented Bandwidth Allocation. 607-611 - Michael Welzl, Safiqul Islam, Runa Barik, Stein Gjessing, Ahmed Elmokashfi:
Investigating the Delay Impact of the DiffServ Code Point (DSCP). 612-616 - Arman Pouraghily, Tilman Wolf:
A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices. 617-623 - Khondaker Musfakus Salehin, Roberto Rojas-Cessa, Ki-Won Kwon:
COMPRESS: A Self-Sufficient Scheme for Measuring Queueing Delay on the Internet Routers. 624-629 - Lijun Dong, Richard Li:
Distributed Mechanism for Computation Offloading Task Routing in Mobile Edge Cloud Network. 630-636 - Nchinda Nchinda, Agnes Cameron, Kallirroi Retzepi, Andrew Lippman:
MedRec: A Network for Personal Information Distribution. 637-641 - James H. Nguyen, Yalong Wu, Jin Zhang, Wei Yu, Chao Lu:
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things. 642-646 - Imad Ali, Ronald Y. Chang, Cheng-Hsin Hsu:
SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems. 647-652 - Meghana Bande, Venugopal V. Veeravalli:
Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access. 653-657 - Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal:
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined. 658-662 - Constantine Ayimba, Paolo Casari, Vincenzo Mancuso:
Adaptive Resource Provisioning based on Application State. 663-668 - Curtis R. Taylor, Julian P. Lanson:
Network-based Classification of Authentication Attempts using Machine Learning. 669-673 - Samer S. Hanna, Danijela Cabric:
Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity. 674-680 - Timothy J. O'Shea, Tamoghna Roy, Nathan E. West:
Approximating the Void: Learning Stochastic Channel Models from Observation with Variational Generative Adversarial Networks. 681-686 - Ming Feng, Hao Xu:
Game Theoretic Based Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment and Unknown Interference. 687-691 - Phuong Nguyen, Tarek Elgamal, Steven Konstanty, Todd Nicholson, Stuart Turner, Patrick Su, Klara Nahrstedt, Timothy Spila, Roy H. Campbell, John Dallesasse, Michael Chan, Kenton McHenry:
BRACELET: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments. 692-696 - Jarrett Booz, Wei Yu, Guobin Xu, David W. Griffith, Nada Golmie:
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis. 697-701 - Dapeng Wu, Jiaxing Wu, Ruyan Wang:
An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle Platooning. 702-707 - Ruonan Zhang, Qi Guo, Jiaxin Wang, Zhimeng Zhong, Chao Li:
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage. 708-713 - Babu R. Dawadi, Danda B. Rawat, Shashidhar R. Joshi, Martina M. Keitsch:
Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal. 714-718 - Jian Shen, Xinzhao Jiang, Dengzhi Liu, Tianqi Zhou:
Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus. 719-723 - Syed Qasim Gilani, Syed Ali Hassan, Haris Pervaiz, Syed Hassan Ahmed:
Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss Models. 724-728 - Andrew Ward, Zhengyuan Zhou, Nicholas Bambos:
Bidding-Based Dynamic Power Pricing Scheme in Smart Grids. 729-734 - Nadir H. Adam, Cristiano Tapparello, Wendi B. Heinzelman:
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis. 735-740 - Dongbiao He, Cédric Westphal, Jinlei Jiang, Guangwen Yang:
RankRoute: Efficient Interest Forwarding Using Nodes Ranking. 741-746 - Ivan Avramovic, Richards Dana S:
NP-completeness of Shortest Leaf-to-Leaf Distance in a Tree. 747-752 - Casey T. Deccio:
DNS Diagnostics through the Eye of the Beholder. 753-758 - James Mathewson, J. J. Garcia-Luna-Aceves:
Flexible Evaluation Caching Using FATE. 759-763 - Michal Rzepka, Piotr Borylo, Piotr A. Cholda, Artur Lason:
Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks. 764-770 - Bin Li, Hongxiang Li, Ruonan Zhang, Chunqiao Wei:
An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless Networks. 771-776 - Michael Lujan, Michael Baum, Dayuan Chen, Ziliang Zong:
Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering Server. 777-781 - Xiaobo Cai, Huihui Wang, Houbing Song, Yue Zhang, Ke Han, Zhiyong Cao:
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing. 782-786 - Guangxia Xu, Lijie He, Mengxiao Hu:
Document Context-Aware Social Recommendation Method. 787-791 - Haoran Mo, JooYoung Lee:
Spatial Community Search Using PageRank Vector. 792-796 - Yongxin Liu, Laurent L. Njilla, Jian Wang, Houbing Song:
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud. 797-801 - Abhishek Dwaraki, Richard G. Freedman, Shlomo Zilberstein, Tilman Wolf:
Using Natural Language Constructs and Concepts to Aid Network Management. 802-808 - Abdulazaz Ali Albalawi, J. J. Garcia-Luna-Aceves:
A Delay-Based Congestion-Control Protocol for Information-Centric Networks. 809-815 - Van Sy Mai, Stratis Ioannidis, Davide Pesavento, Lotfi Benmohamed:
Optimal Cache Allocation under Network-Wide Capacity Constraint. 816-820 - Xiaoyu Liang, Taieb Znati:
An empirical study of intelligent approaches to DDoS detection in large scale networks. 821-827 - Aytac Azgin, Ravishankar Ravindran:
Stateless Forwarding in ICN with Dynamic Non-Bloom Filters. 828-834 - Razvan Cristian Voicu, John A. Copeland, Yusun Chang:
Multiple Path Infrastructure-less Networks A Cooperative Approach. 835-841 - Nathaniel Hudson, Matthew Turner, Asare Nkansah, Hana Khamfroush:
On the Effectiveness of Standard Centrality Metrics for Interdependent Networks. 842-846 - Jonathan Crussell, Thomas M. Kroeger, Aaron Brown, Cynthia A. Phillips:
Virtually the Same: Comparing Physical and Virtual Testbeds. 847-853 - Chadi Kari, Sixia Chen, Sepehr Amir-Mohammadian, Vivek K. Pallipuram:
Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to Spare. 854-858 - Kory Teague, Mohammad J. Abdel-Rahman, Allen B. MacKenzie:
Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization Framework. 859-863 - Xiaoge Wu, Lin Zhang:
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel. 864-868 - Ana Belen Martinez, Maximilian Matthé, Marwa Chafii, Gerhard P. Fettweis:
Blind Carrier Frequency Offset Estimation in Generalized Frequency Division Multiplexing. 869-875 - Pablo Jiménez Mateo, Alejandro Blanco Pizarro, Norbert Ludant, Matteo Marugan Borelli, Amanda García-García, Adrian Loch, Zhenyu Shi, Yi Wang, Joerg Widmer:
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation. 876-882 - Susanna Mosleh, Hayder Almosa, Erik Perrins, Lingjia Liu:
Downlink Resource Allocation in Cell-Free Massive MIMO Systems. 883-887 - Tianchi Zhao, Ming Li, Gregory Ditzler:
Online Reconfigurable Antenna State Selection based on Thompson Sampling. 888-893 - Masafumi Moriyama, Kenichi Takizawa, Masayuki Oodo, Hayato Tezuka, Fumihide Kojima:
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity. 894-899 - Richard Gilles Engoulou, Martine Bellaïche, Talal Halabi, Samuel Pierre:
A Decentralized Reputation Management System for Securing the Internet of Vehicles. 900-904 - Anes Madani, Suman Kumar, Linh Ba Nguyen, Jiling Zhong:
A Robust Road Region of Interest Identification Scheme for Traffic-Video Data Mining. 905-910 - Katherine Russell, Robert Simon:
Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks. 911-917 - Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, Bo Sheng:
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices. 918-922 - Bogdan Antonescu, Miead Tehrani Moayyed, Stefano Basagni:
Diffuse Scattering Models for mmWave V2X Communications in Urban Scenarios. 923-929 - J. J. Garcia-Luna-Aceves:
Busy-Tone Multiple Access with Collision Avoidance and Detection for Ad-Hoc Networks. 930-935 - Ruonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, Chao Li:
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels. 936-942 - Riten Gupta, Han Yan, Danijela Cabric:
Joint Precoder and Combiner Design for MMSE Distributed Beamforming with Per-Antenna Power Constraints. 943-949 - Tugba Erpek, Sennur Ulukus, Yalin E. Sagduyu:
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA). 950-954 - Bhargav Gokalgandhi, Christina Segerholm, Nilanjan Paul, Ivan Seskar:
Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPU. 955-959 - Xiuyu Du, Lihua Li, Zejian Li, Guangyan Lu:
Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSIT. 960-964 - Ming Feng, Hao Xu:
Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment. 965-969 - Narayan Prasad, Xiao-Feng Qi, Alan Gatherer:
Optimizing Beams and Bits: A Novel Approach for Massive MIMO Base-Station Design. 970-976 - Cenk M. Yetis, Ronald Y. Chang:
Distributed Multi-Stream Beamforming in Multi-Relay Interference Networks with Multi-Antenna Nodes. 977-982 - Sebastian Birke, Dominik Auras, Tobias Piwczyk, Robin Mahlke, Nikolas Alberti, Rainer Leupers, Gerd Ascheid:
VLSI Architectures for ORVD Trellis based MIMO Detection. 983-989 - Yi Jiang, Yimeng Feng:
Blind Channel Subspace Estimation for Massive MIMO with Hybrid Beamforming. 990-994 - Christo Kurisummoottil Thomas, Dirk T. M. Slock:
Massive MISO IBC Reduced Order Zero Forcing Beamforming - a Multi-Antenna Stochastic Geometry Perspective. 995-999 - Pejman Ghasemzadeh, Subharthi Banerjee, Michael Hempel, Hamid Sharif:
Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation Detection. 1000-1004 - Zejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, Shuwen Liu:
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection. 1005-1010 - Riccardo Musmeci, Ken Goss, Simone Silvestri, Giuseppe Lo Re:
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles. 1011-1017 - Hyunsun Lee, Yi Zhu, Donald Wapenski, Xi Wang, Qiong Zhang, Paparao Palacharla, Tadashi Ikeuchi:
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks. 1018-1023 - Hendrik Lumbantoruan, Koichi Adachi:
Array Antenna for Power Saving of Sensor Nodes in UAV-BS enabled WSN. 1024-1028 - Sarthak Sharma, Hessam Mohammadmoradi, Milad Heydariaan, Omprakash Gnawali:
Device-Free Activity Recognition Using Ultra-Wideband Radios. 1029-1033 - Tim Strayer, Ram Ramanathan, Daniel Coffin, Samuel C. Nelson, Michael Atighetchi, Aaron Adler, Stephane Blais, Bishal Thapa, William N. Tetteh, Vladimir Shurbanov, Karen Zita Haigh, Regina Hain, Colleen T. Rock, Emily H. Do, Armando Caro, Daniel Ellard, Michael J. Beckerle, Stephen Lawrence, Scott Loos:
Mission-Centric Content Sharing Across Heterogeneous Networks. 1034-1038 - Tuan Le, Qi Zhao, Mario Gerla:
Fragmented Data Routing Based on Exponentially Distributed Contacts in Delay Tolerant Networks. 1039-1043
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.