


default search action
23rd HPSR 2022: Taicang, Jiangsu, China
- 23rd IEEE International Conference on High Performance Switching and Routing, HPSR 2022, Taicang, Jiangsu, China, June 6-8, 2022. IEEE 2022, ISBN 978-1-6654-0607-9

- Lijun Dong, Hesham Elbakoury, Richard Li

:
Support Green Internet Via New IP. 1-8 - Bhaskar Kataria, Rohit M. P, Leslie Monis, Mohit P. Tahiliani, Kiran Makhijani

:
Programmable Data Plane for New IP using eXpress Data Path (XDP) in Linux. 9-16 - Stuart Clayman, Müge Sayit:

The Effects of Packet Wash on SVC Video in Limited Bandwidth Environments. 17-22 - Rui Meng, Junjie Wan, Bing Xu, Fengkai Li, Wanhong Wang, Zhongwei Li, Chuang Wang:

CGM2: Carrier-Grade Minimalism Multicast with Stateless Explicit Path. 23-28 - Yuan Liu, Lin Cai, Junhao Hu, Xiaohong Shen, Haiyan Wang:

LRP: Long-lifetime and Reliable Percolation Routing for Underwater Sensor Networks. 29-34 - Xini Xiang, Bo Fan, Minghui Dai, Yuan Wu, Cheng-Zhong Xu:

V2X Communication Aided Emergency Message Dissemination in Intelligent Transportation Systems. 35-40 - Ruirui Ning, Xiaokang Zhang

, Weiyang Feng, Ning Zhang, Siyu Lin:
Performance Analysis of Vehicle Platoon Communication in C-V2X Autonomous Mode. 41-46 - Jianfan Zhu, Xilong Liu:

Wireless Charging Energy-Relay Scheme for Wireless Sensor Networks. 47-52 - Xinqiao Li, Mingyuan Liu, Nan Cheng, Kang Liu, Wei Quan, Liang Guo

, Yajuan Qin:
RPQ: Resilient-Priority Queue Scheduling for Delay-Sensitive Applications. 53-58 - Jing Jiang, Peizhe Xin, Yudong Wang, Yi Zhang:

A Priority-based Online Container Placement Strategy for 5G MEC Cloud enabled Smart Grid. 59-64 - Zhijuan Liu, Li Zhang, Xuangou Wu, Wei Zhao:

Test Case Filtering based on Generative Adversarial Networks. 65-69 - Chuan-Hua Zhou, Li-Chun Cao, Wei Zhao, Zi-Han Zhou, Tai-Jiao Ren, Lan Luo:

Multi-channel Fusion Graph Convolution based Critical Node Identification in Temporal Networks. 70-75 - Gang Lei, Junyi Wu

, Keyang Gu, Lejun Ji, Yuanlong Cao
, Xun Shao:
An QUIC Traffic Anomaly Detection Model Based on Empirical Mode Decomposition. 76-80 - Rongfei Fan, Xiang Li, Zhi Liu, Cheng Zhan, Han Hu:

Optimal Task Offloading for Deep Neural Network Driven Application in Space-Air-Ground Integrated Network. 81-88 - Yajie Zhu, Shangwei Zhang:

Modeling and Analysis of Multi-UAV Networks Using Matérn Hard-Core Point Process. 89-94 - Jing Tao, Shidong Liu, Chuan Liu:

A Traffic Scheduling Scheme for Load Balancing in SDN-Based Space-Air-Ground Integrated Networks. 95-100 - Jingyi Li, Jiadai Wang:

Joint Optimization in UAV-ground Communications Empowered by Multiple Aerial RISs. 101-106 - Zhengqiang Wang, Hao Zhang, Yang Liu, Xiaoyu Wan, Zifu Fan:

Robust Placement and Power Control for NOMA-UAV Networks. 107-112 - Dezhi Zhang, Yuanqiu Luo, Jialiang Jin:

Highspeed 50 Gb/s Passive Optical Network (50G-PON) Applications in Industrial Networks. 113-118 - Joy Halder, Eiji Oki, Bijoy Chand Chatterjee:

Regenerator-Aware Inter-Core and Inter-Mode Crosstalk-Avoided Resource Allocation for Spectrally-Spatially Elastic Optical Networks. 119-124 - Vinay Kumar

, Joy Halder, Abhijit Mitra, Eiji Oki, Bijoy Chand Chatterjee:
Inter-Core and Inter-Mode Crosstalk-Avoided Virtual Network Embedding in Spectrally-Spatially Elastic Optical Networks. 125-130 - Xiaoxue Yang, Bing Hu:

A Non-blocking Network Design for Terabit Capacity Optical Interconnects. 131-136 - Farhad Arpanaei, José Alberto Hernández

, Gonzalo Martínez Ruiz de Arcaute, David Larrabeiti:
A Comparison Study on Different Data sets for Span-level QoT Regression in EONs. 137-142 - Sean Choi:

Riley: An Inside-Out Network. 143-150 - Ying Wang, Shashank Jere, Soumya Banerjee, Lingjia Liu, Sachin Shetty

, Shehadi Dayekh:
Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis. 151-156 - Shie-Yuan Wang, Yu-Hsun Yuan:

Enhancing the Security of a Private Network by Using A Multi-level Hierarchical NAT Scheme. 157-162 - Xun Tong, Shuaiying Kong, Guanqun Shen, Shubin Zhang, Kaikai Chi:

Resource Allocation for Secure Transmission in Wireless Powered Communication Networks. 163-168 - Zixu Huang, Xuanbo Huang, Jian Li, Kaiping Xue

, Qibin Sun, Jun Lu:
LLDM: Low-Latency DoS Attack Detection and Mitigation in SDN. 169-174 - Mohammad Nassar, Ori Rottenstreich, Ariel Orda:

Communication-aware Fairness in Blockchain Transaction Ordering. 175-182 - Alejandro Molina-Galan

, Baldomero Coll-Perales, Luca Lusvarghi, Javier Gozálvez, Maria Luisa Merani:
How does 5G NR V2X Mode 2 Handle Aperiodic Packets and Variable Packet Sizes? 183-188 - Tianchi Li, Yueping Cai:

Joint Routing and Scheduling for Deterministic Networking: A Segment Routing Approach. 189-194 - Yingya Guo, Jianshan Chen, Kai Huang, Jianping Wu:

A Deep Reinforcement Learning Approach for Deploying SDN Switches in ISP Networks from the Perspective of Traffic Engineering. 195-200 - Weiwei Jin, Liang Huang

, Kaikai Chi:
Age of Information Minimization in Wireless Powered NOMA Communication Networks. 201-205 - Shen Wang, Yijie Xun, Jie Zhao, Yuanyuan Sun:

A Novel Personnel Counting Method Based on WiFi Perception. 206-211 - Jinyuan Zhang, Xuanbo Huang, Jian Li, Kaiping Xue

, Qibin Sun, Jun Lu:
A Dynamic Flow Table Management Method Based on Real-time Traffic Monitoring. 212-217 - Emilio Paolini, Federico Civerchia, Lorenzo De Marinis

, Luca Valcarenghi, Luca Maggiani, Nicola Andriolli
:
Photonic-aware Neural Networks for Packet Classification in URLLC scenarios. 218-223 - Fang Hao, Murali S. Kodialam, Sarit Mukherjee, T. V. Lakshman:

A Data Analytics Based Approach to Cloud Resource Auto-Scaling. 224-231 - Simeng He, Shangwei Zhang:

Trajectory Planning in UAV-Assisted Wireless Networks via Reinforcement Learning. 232-237 - Xiao Lin, Shuo Ji, Shengnan Yue, Jun Li, Feng Chen:

Storage-Enabled Adaptive Multi-Path Scheduling Method for Data Transfers in Task Offloading. 238-244 - Ming Zhao, Yixiang Li, Sohaib Asif

, Yusen Zhu, Fengxiao Tang
:
C-LSTM: CNN and LSTM Based Offloading Prediction Model in Mobile Edge Computing (MEC). 245-251 - Pengcheng Tan, Yang Li, Minghui Dai, Yuan Wu:

Dynamic Task Division and Allocation in Mobile Edge Computing Systems: A Latency Oriented Approach via Deep Q-Learning Network. 252-259 - Kai Fang

, Tingting Wang, Penglai Guo, Xiaoling Peng, Yuanyuan Pan, Xun Yuan, Jianqing Li
:
A Non-Intrusive Security Estimation Method based on Common Attribute of IIoT Systems. 260-264 - Wei Guo, Junman Qin, Yijie Xun:

Incremental Learning Assisted Dynamic Driver Identification: A New Perspective. 265-270 - Yuanzhuo Wu, Shubin Zhang, Guanqun Shen, Gang Chen:

Deep Reinforcement Learning for Online VRC Deployment in Mobile Edge Computing. 271-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














