


default search action
21st APNOMS 2020: Daegu, South Korea
- 21st Asia-Pacific Network Operations and Management Symposium, APNOMS 2020, Daegu, South Korea, September 22-25, 2020. IEEE 2020, ISBN 978-89-950043-8-8

- Aiko Oi, Ryosuke Sato, Yuichi Suto, Kosuke Sakata, Motomu Nakajima, Tsuyoshi Furukawa:

A Study on Automation of Network Maintenance in Telecom Carriers for Zero-Touch Operations. 1-6 - DongNyeong Heo, Stanislav Lange, Heegon Kim, Heeyoul Choi:

Graph Neural Network based Service Function Chaining for Automatic Network Control. 7-12 - Heegon Kim, Suhyun Park, Stanislav Lange, Doyoung Lee, DongNyeong Heo, Heeyoul Choi, Jae-Hyoung Yoo, James Won-Ki Hong:

Graph Neural Network-based Virtual Network Function Management. 13-18 - Khizar Abbas

, Muhammad Afaq
, Talha Ahmed Khan, Asif Mehmood
, Wang-Cheol Song:
IBNSlicing: Intent-Based Network Slicing Framework for 5G Networks using Deep Learning. 19-24 - Muhammad Saqib, Asif Mehmood

, Adeel Rafiq, Muhammad Afaq
, Wang-Cheol Song:
Distributed SDN Based Network State Aware Architecture for Flying Ad-hoc Network. 25-30 - Jiacong Li, Bo Lei, Ni Li, Hang Lv:

A Load Balancing Approach for Distributed SDN Architecture Based on Sharing Data Store. 31-36 - Yasunobu Toyota, Osamu Nakamura:

Dynamic Control Method of Explicit Address Mapping Table in IPv6 Single-Stack Network. 37-42 - Young-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Jee-Tae Park, Mu-Gon Shin, Myung-Sup Kim:

An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model. 43-48 - Talha Ahmed Khan, Khizar Abbas, Adeel Rafique, Muhammad Afaq

, Wang-Cheol Song:
Generic Intent-based Networking Platform for E2E Network Slice Orchestration & Lifecycle Management. 49-54 - Xu Zhang, Ziqi Lin, Beichen Ding, Bo Gu

, Yu Han:
Deep Multi-Agent Reinforcement Learning for Resource Allocation in D2D Communication Underlaying Cellular Networks. 55-60 - Yukihiro Goto, Shigehiro Matsuda, Masaki Waki, Hiroyuki Oshida:

Structural deterioration determination system for improving the efficiency of utility pole inspection. 61-66 - Suhyun Park, Heegon Kim, Jibum Hong, Stanislav Lange, Jae-Hyoung Yoo, James Won-Ki Hong:

Machine Learning-based Optimal VNF Deployment. 67-72 - Hung Nguyen-An

, Thomas Silverston, Taku Yamazaki, Takumi Miyoshi:
Entropy-based IoT Devices Identification. 73-78 - You-Chiun Wang, Bo-Chun Pan:

Event-aware Hierarchical Routing with Differential Compression to Extend WSN Lifetime. 79-84 - Tomoya Tanaka

, Tomio Kamada
, Chikara Ohta:
Topic-based Allocation of Distributed Message Processors on Edge-Servers for Real-time Notification Service. 85-90 - Chenyiming Wen, Bingqian Zhu, Yinan Zhu:

JBRC: Jointly Balanced Routing and Charging Scheme for RF Energy Harvesting Wireless Sensor Networks. 91-95 - Kazuhiko Kinoshita

, Kazuki Ginnan, Keita Kawano, Hiroki Nakayama
, Tsunemasa Hayashi, Takashi Watanabe:
Channel Assignment and Access System Selection in Heterogeneous Wireless Network with Unlicensed Bands. 96-101 - Yu Min Park, Yan Kyaw Tun

, Choong Seon Hong
:
Optimized Deployment of Multi-UAV based on Machine Learning in UAV-HST Networking. 102-107 - Pyae Sone Aung, Yan Kyaw Tun

, Nway Nway Ei, Choong Seon Hong
:
Energy-Efficient Offloading and User Association in UAV-assisted Vehicular Ad Hoc Network. 108-113 - Ting-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, Meng-Hsun Tsai

:
Mitigating SYN flooding Attack and ARP Spoofing in SDN Data Plane. 114-119 - Daichi Ono, Satoru Izumi, Toru Abe, Takuo Suganuma:

A Design of Port Scan Detection Method Based on the Characteristics of Packet-In Messages in OpenFlow Networks. 120-125 - Yun-Zhan Cai, Chih-Hao Lai, Yu-Ting Wang, Meng-Hsun Tsai:

Improving Scanner Data Collection in P4-based SDN. 126-131 - Pengfei Yue, Ru Li, Bin Pang:

A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDN. 132-137 - Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong:

Real-time Monitoring of Packet Processing Time for Virtual Network Functions. 138-143 - Kei Takeshita, Yuji Soejima:

An Evaluation of Network Service Monitoring Method Using User Traffic Information. 144-149 - You Jun Kim, Choong Seon Hong

:
Optimized Quantization for Convolutional Deep Neural Networks in Federated Learning. 150-154 - Masaru Sakai, Kensuke Takahashi, Satoshi Kondoh:

A Self-Adaptive Measurement Rate Control Method for an Agent-based Service Monitoring System. 155-160 - Takashi Shiraishi, Masaaki Noro, Reiko Kondo, Yosuke Takano, Naoki Oguchi:

Real-time Monitoring System for Container Networks in the Era of Microservices. 161-166 - Yonghua Huo, Jing Dong, Zhongdi Ge, Ping Xie, Na An, Yang Yang:

IWApriori: An Association Rule Mining and Self-updating Method Based on Weighted Increment. 167-172 - Sejin Kim, Yoonhee Kim:

Exploiting Interference-aware GPU Container Concurrency Learning from Resource Usage of Application Execution. 173-178 - Weiwei Zheng, Yanli Shen, Taoshun Xiao:

Asocial: Adaptive Task Re-Allocation in Distributed Computing Systems with Node Failures. 179-184 - Hong-Chuan Chi, Muhammad Atif Sarwar, Yousef-Awwad Daraghmi, Kuan-Wen Liu, Tsì-Uí Ik

, Yih-Lang Li:
Smart Self-Checkout Carts Based on Deep Learning for Shopping Activity Recognition. 185-190 - Tzung-Shi Chen, Song-Wei Syu:

Friend Recommendation Based on Mobile Crowdsensing in Social Networks. 191-196 - Kalyanee Devi, Rohit Tripathi

:
Information Diffusion Within a Limited Budget Using Node Centralities and Community Detection. 197-202 - Soo Hoon Maeng, Meryam Essaid, Hongtaek Ju:

Analysis of Ethereum Network Properties and Behavior of Influential Nodes. 203-207 - Yi Chia Chen, Li-Hsing Yen:

Distributed Profitable Deployment of Network Services to Geo-distributed Edge Systems. 208-213 - Xihao Zhou, Sye Loong Keoh:

Deployment of Facial Recognition Models at the Edge: A Feasibility Study. 214-219 - Suman Pandey, James Won-Ki Hong, Jae-Hyoung Yoo:

Q-Learning based SFC deployment on Edge Computing Environment. 220-226 - Chao-Yu Hsu, Chin-Lin Hu, Kun-Sheng Huang, Yung-Hui Chen, Jiun-Long Huang:

Event-Triggered Media Stream Bandwidth Adjustment in IoT-Based Home Networks. 227-230 - Chengshang Hou, Gaopeng Gou, Gang Xiong

, Zhen Li:
Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical Study. 231-234 - Hartanto Kumiawan, JungYeon Kim, Hongtaek Ju:

Utilization of the Blockchain Network in The Public Community Health Center Medicine Supply Chain. 235-238 - Sungwoong Yeom, Kyungbaek Kim

:
Improving Performance of Collaborative Source-Side DDoS Attack Detection. 239-242 - Jing Li, Yuyao Guan, Pengpeng Ding, Shiwei Wang:

TCP-PPCC: Online-Learning Proximal Policy for Congestion Control. 243-246 - Chenhang Jiao, Yun Wang, Jinbin Tu

:
Task Scheduling System Based on Consensus Algorithm in P2P Network. 247-250 - Yun-Wei Lin, Lin-Hang Kao, Chun-Ting Yeh:

FingerTalk: Real-time Fingertip Trajectories Tracking Service based on IoTtalk. 251-254 - Kwanwoong Ryu, Joon-Young Jung, Ran-Jae Im:

Co-Channel Interference Cancellation in OFDMA System. 255-258 - Jung-Won Lee, Sejin Park:

A Study On Performance Improvement Of Hyperledger Fabric Through Batched Chaincode Message. 259-262 - Chia-Wei Tseng, Li-Fan Wu, Shih-Chun Hsu, Sheng-Wang Yu:

IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment. 263-266 - Ui-Jun Baek, Mu-Gon Shin, Min-Seong Lee, Boseon Kim, Jee-Tae Park, Myung-Sup Kim:

Comparison of Distance Measurement in Time Series Clustering for Predicting Bitcoin Prices. 267-270 - Hong-Nam Quach, Chulwoong Choi, Kyungbaek Kim

:
Dynamic Network Provisioning with AI-enabled Path Planning. 271-274 - Sho Kanemaru, Tomoki Ikegaya, Kensuke Takahashi, Tsuyoshi Toyoshima:

Design and Implementation of Comprehensive Test Automation Method for API Adapter in C-Plane and U-Plane. 275-278 - Doyoung Lee, Jae-Hyoung Yoo, James Won-Ki Hong:

Q-learning based Service Function Chaining using VNF Resource-aware Reward Model. 279-282 - Atsushi Takada, Naoki Hayashi, Mizuto Nakamura, Naoyuki Tanji, Toshihiko Seki, Kyoko Yamagoe:

Topology Discovery for Telecommunications-carrier Networks using Equipment Alarms. 283-286 - Dae-Yong Kim, Meryam Essaid, Hongtaek Ju:

Examining Bitcoin mempools Resemblance Using Jaccard Similarity Index. 287-290 - Haneul Ko, Jaewook Lee, Hongrok Cho, Sangheon Pack:

Hierarchical Identifier (HID)-based 5G Architecture with Backup Slice. 291-293 - Yang Bai, Guixin Guo, Yong Wang, Kangyou Zhong, Jiang Li, Yunfei Du

:
Dynamic reverse proxy chain generation for networks in data centers. 294-297 - Yue Han, Harry G. Perros, Mingwu Yao:

VM Allocation in Data Center Subject to CPU Percentile Constraints. 298-301 - Tzu-Kuang Lee, Jen-Jee Chen, Yu-Chee Tseng, Cheng-Kuan Lin:

Effect of Packet Loss and Delay on V2X Data Fusion. 302-305 - Che-Chun Teng, Mei-Chun Chen, Min-Han Hung, Hong-Jie Chen:

End-to-end Service Assurance in 5G Crosshaul Networks. 306-309 - Yuh-Jiuh Cheng, Bor-Tauo Chen, Wen-Lin Cheng:

Design and Performance Evaluation of Hexagonal Topology Networks with Novel Routing Algorithms. 310-313 - Joon-Young Jung, Dong-Joon Choi, Ran-Jae Im:

Switched Digital Video Using Convergence Transmission of Broadcasting and Communication on Cable TV Network. 314-317 - Kyungchan Ko, Changhoon Kang, Youngbok Park, Jongsoo Woo, James Won-Ki Hong:

Towards Blockchain-based Stainless Steel Tracking. 318-321 - Jiwon Bang, Mi-Jung Choi:

Docker environment based Apache Storm and Spark Benchmark Test. 322-325 - Jiyoon Lim, Sukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong:

Load Balancing Algorithm with Programmable Switch. 326-329 - Jungsu Han, Jongsoo Woo, James Won-Ki Hong:

Oversampling Techniques for Detecting Bitcoin Illegal Transactions. 330-333 - Tri Thong Tran, Yu-Chen Zhang, Wei-Tung Liao, Yu-Jen Lin, Ming-Chia Li, Huai-Sheng Huang:

An autonomous Mobile Robot System based on Serverless Computing and Edge Computing. 334-337 - Ting-Che Chuang, Min Liu, Yueh-Hsien Lin, Yong-Zen Haung, Chien-Wen Yang:

An Integrated Monitoring System for 5G Crosshaul Network. 338-340 - Hye-Yeong Shin, Meryam Essaid, Hongtaek Ju:

Estimating wallets and bitcoins owned by Satoshi using Hash-rate and Transactions analysis. 341-344 - Junghan Yoon, Jian Li, Sangho Shin:

A Measurement Study on Evaluating Container Network Performance for Edge Computing. 345-348 - Huilin Liu, Yucheng Ma, Xushan Chen, Meng Zhou, Shiyou Chen:

Reliability Evaluation and Optimization Method in Power Communication Network Based on Environmental Factors and Controlled Hybrid Stochastic Petri Net. 349-352 - Rong Xie:

Mobile agents' dynamic small-world network based on attention mechanism. 353-356 - Yuejia Dou, Huilin Liu, Liangkang Wei, Shiyou Chen:

Design and simulation of self-organizing network routing algorithm based on Q-learning. 357-360 - Min-Cheol Kim, Young-Tak Kim:

Design and Implementation of IEEE 802.11ah (HaLow) Dongle for IoT Wireless Networking. 361-364 - Soohyun Kim, Hyunsu Mun, Youngseok Lee:

Automatic Mobile App Speed Measurement with Robot. 365-368 - Sevendi Eldrige Rifki Poluan

, Yan-Ann Chen
:
A Framework for a Multisensory IoT System Based on Service-oriented Architecture. 369-372 - Adeel Rafiq, Muhammad Afaq

, Wang-Cheol Song:
Mobility Performance Enhancement in Small Cells Cluster of 5G Network: A Handover Overhead Reduction Approach. 373-376 - Jong-Wouk Kim, Juhong Namgung, Yang-Sae Moon, Mi-Jung Choi:

Experimental Comparison of Machine Learning Models in Malware Packing Detection. 377-380 - Kouichi Genda, Mitsuru Abe, Shohei Kamamura:

Video Communication Optimization Using Distributed Edge Computing. 381-384 - Zhenguo Cui, Steven Y. Rim:

G-PFC: A Packet-Priority Aware PFC Scheme for the Datacenter. 385-388 - Umer Majeed

, Latif U. Khan
, Choong Seon Hong
:
Cross-Silo Horizontal Federated Learning for Flow-based Time-related-Features Oriented Traffic Classification. 389-392 - Minkyung Lee, Choong Seon Hong

:
Service Chaining Offloading Decision in the EdgeAI: A Deep Reinforcement Learning Approach. 393-396 - Chien-Chi Kao, Yung-Chang Lai, Jung Pei, Chih-Wei Chang, Fei-Hua Kuo, Jin-Yuan Shun:

Intelligent Management System: Deep Convolutional Neural Networks for Automatic Attribute Recognition in IP Surveillance Networks. 397-400 - Chia-Wei Liao, Fuchun Joseph Lin

, Yoichi Sato:
Evaluating NFV-enabled Network Slicing for 5G Core. 401-404 - Latif U. Khan

, Umer Majeed
, Choong Seon Hong
:
Federated Learning for Cellular Networks: Joint User Association and Resource Allocation. 405-408 - Huilin Liu, Xushan Chen, Guoxin Xia, Hui Guo:

Double-Lead Content Search Scheme for Producer Mobility in Named Data Networking. 409-412 - Yuqing Chen, Zhaohui Zheng:

Joint Deployment and Task Computation of UAVs in UAV-assisted Edge Computing Network. 413-416 - Pang-Chen Liu, Shun-Kai Yang, Lung-Chin Huang, Huai-En Tseng, Fei-Hua Kuo, Tai-Chueh Shih:

Prequalification of VDSL2 copper customers for G.fast services with artificial intelligence technology. 417-420 - Chun-Yu Chan, Guey-Yun Chang:

A beam-based eICIC algorithm. 421-427

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














