


default search action
26th ICCCN 2017: Vancouver, BC, Canada
- 26th International Conference on Computer Communication and Networks, ICCCN 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017. IEEE 2017, ISBN 978-1-5090-2991-4

- Ling Wang, Junjie Yang, Xiaojun Song:

A QoE-Driven Spectrum Decision Scheme for Multimedia Transmissions over Cognitive Radio Networks. 1-5 - Oluwaseyi Omotere, Lijun Qian, Riku Jäntti

, Miao Pan, Zhu Han:
Big RF Data Assisted Cognitive Radio Network Coexistence in 3.5GHz Band. 1-8 - Sayantan Chowdhury, Jianping Pan

:
Channel Assignment in Cognitive Radio Networks: A Joint Utility and Stable Matching Approach. 1-9 - Aklilu Assefa Gebremichail, Cory C. Beard:

Fade Duration Based Sleep Mode Activation in Dense Femtocell Cluster Networks. 1-6 - Hugues Smeets, Matteo Ceriotti

, Eduardo Ferrera
, Pedro José Marrón
:
Replacing Free-Ranging Robots with Alternative Mobile Nodes. 1-9 - Longfei Wu

, Xiaojiang Du, Jie Wu, Bin Song:
Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks. 1-9 - Hao Ruan, Xiao Fu, Xuanyu Liu, Xiaojiang Du, Bin Luo:

Analyzing Android Application in Real-Time at Kernel Level. 1-9 - Sangyup Han, Jaehyun Park, Haeun Kim, Jaehee Ha, Seungwon Shin, Sungwon Kang, Myungchul Kim:

Mobility of Everything (MoE): An Integrated and Distributed Mobility Management. 1-11 - Tri Minh Nguyen, Wessam Ajib, Chadi Assi:

Online Algorithm for Wireless Backhaul HetNets with Advanced Small Cell Buffering. 1-9 - Shichang Xuan

, Dapeng Man, Wei Wang, Jiangchuan Zhang, Wu Yang, Xiaojiang Du:
Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation. 1-7 - Suiming Guo, Liang Chen, Dah Ming Chiu:

An Incentive-Based Mixed QoE Framework for Content Delivery to Smart Homes. 1-9 - Cesar Ghali, Gene Tsudik, Ersin Uzun

, Christopher A. Wood:
Closing the Floodgate with Stateless Content-Centric Networking. 1-10 - Yujian Fang, Yuezhi Zhou, Xiaohong Jiang, Di Zhang, Yaoxue Zhang:

Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and Pricing. 1-9 - Wenjun Li, Xianfeng Li, Hui Li

:
MEET-IP: Memory and Energy Efficient TCAM-Based IP Lookup. 1-8 - Amitangshu Pal, Krishna Kant:

NACID: A Neighborhood Aware Caching and Interest Dissemination in Content Centric Networks. 1-9 - Teng Wang, Jiayin Wang, Son Nam Nguyen, Zhengyu Yang, Ningfang Mi, Bo Sheng

:
EA2S2: An Efficient Application-Aware Storage System for Big Data Processing in Heterogeneous Clusters. 1-9 - Shenghui Yan, Shihan Xiao, Yuchi Chen, Yong Cui, Jiangchuan Liu:

GreenWay: Joint VM Placement and Topology Adaption for Green Data Center Networking. 1-9 - Maotong Xu, Sultan Alamro

, Tian Lan, Suresh Subramaniam
:
LASER: A Deep Learning Approach for Speculative Execution and Replication of Deadline-Critical Jobs in Cloud. 1-8 - David E. Irwin, Prateek Sharma, Supreeth Shastri, Prashant J. Shenoy

:
The Financialization of Cloud Computing: Opportunities and Challenges. 1-11 - Xueshi Hou, Yao Lu, Sujit Dey:

Wireless VR/AR with Edge/Cloud Computing. 1-8 - Guanghui Wang, Jianping Pan

, Jianping He, Subin Shen:
An Efficient Privacy-Preserving Localization Algorithm for Pervasive Computing. 1-9 - Zhe Fu, Zhi Liu, Jun Li:

Efficient Parallelization of Regular Expression Matching for Deep Inspection. 1-9 - Yu Zhou, Yuan Zhang, Sheng Zhong:

Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity Limit. 1-9 - Myounggyu Won, Shaohu Zhang

, Sang Hyuk Son:
WiTraffic: Low-Cost and Non-Intrusive Traffic Monitoring System Using WiFi. 1-9 - Han Gao, Zhengyu Yang, Janki Bhimani, Teng Wang, Jiayin Wang, Bo Sheng

, Ningfang Mi:
AutoPath: Harnessing Parallel Execution Paths for Efficient Resource Allocation in Multi-Stage Big Data Frameworks. 1-9 - Baraa Saeed Ali, Kang Chen:

Fair Work-Conserving Bandwidth Guarantees in Datacenters Using MPTCP. 1-9 - Bochao Shen, Ravi Sundaram, Alexander Russell

, Srinivas Aiyar, Karan Gupta, Abhinay Nagpal, Aditya Ramesh, Himanshu Shukla:
High Availability for VM Placement and a Stochastic Model for Multiple Knapsack. 1-9 - Wanchun Jiang, Liyuan Fang, HaiMing Xie, Xiangqian Zhou, Jianxin Wang:

Tars: Timeliness-Aware Adaptive Replica Selection for Key-Value Stores. 1-9 - Zhen Hong, Zehua Wang, Wei Cai

, Victor C. M. Leung:
Connectivity-Aware Task Outsourcing and Scheduling in D2D Networks. 1-9 - Long Gong, Lanxi Huang, Paul Tune, Jinyoung Han, Chen-Nee Chuah

, Matthew Roughan
, Jun (Jim) Xu:
ForestStream: Accurate Measurement of Cascades in Online Social Networks. 1-9 - Benjamin D. Horne, Sibel Adali, Sujoy Sikdar

:
Identifying the Social Signals That Drive Online Discussions: A Case Study of Reddit Communities. 1-9 - Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:

On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks. 1-9 - Vidyasagar Sadhu, Dario Pompili, Saman A. Zonouz, Vincent Sritapan:

CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion. 1-9 - Joshua Joy, Mario Gerla:

Internet of Vehicles and Autonomous Connected Car - Privacy and Security Issues. 1-9 - Jingjing Wang

, Chunxiao Jiang, Zhu Han, Tony Q. S. Quek
, Yong Ren:
Private Information Diffusion Control in Cyber Physical Systems: A Game Theory Perspective. 1-10 - Zhiyuan Zheng, A. L. Narasimha Reddy:

Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic Analysis. 1-11 - Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha

, Fábio Borges
, Jie Liu:
The Computer for the 21st Century: Security & Privacy Challenges after 25 Years. 1-10 - Dingmin Wang, Qing Li

, Yong Jiang, Mingwei Xu, Guangwu Hu:
Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined Networks. 1-9 - Cheng Zhang, Jun Bi, Yu Zhou, Abdul Basit Dogar, Jianping Wu:

HyperV: A High Performance Hypervisor for Virtualization of the Programmable Data Plane. 1-9 - Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:

Optimize Routing in Hybrid SDN Network with Changing Traffic. 1-8 - Yu Xiong, Jin Shi, Yi Lv, George N. Rouskas:

Power-Aware Lightpath Management for SDN-Based Elastic Optical Networks. 1-9 - James Daly, Eric Torng:

TupleMerge: Building Online Packet Classifiers by Omitting Bits. 1-10 - Grenville Armitage, Russell Collom:

Benefits of FlowQueue-Based Active Queue Management for Interactive Online Games. 1-9 - Timothy Claeys, Franck Rousseau

, Bernard Tourancheau, Andrzej Duda
:
Clock Drift Prediction for Fast Rejoin in 802.15.4e TSCH Networks. 1-9 - Bo Wang, Xiaohui Luo, Ping Hu, Fengyuan Ren:

Improving Optimization-Based Rate Adaptation in DASH System. 1-9 - Jonathan Kua

, Grenville Armitage:
Optimising DASH over AQM-Enabled Gateways Using Intra-Chunk Parallel Retrieval (Chunklets). 1-9 - Filip Lemic

, Vlado Handziski, Mladen Miksa, Jan M. Rabaey, John Wawrzynek, Adam Wolisz:
Selection and Aggregation of Location Information Provisioning Services. 1-9 - Weichao Gao, James H. Nguyen, Yalong Wu, William G. Hatcher, Wei Yu

:
A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile Networks. 1-9 - Christian Meurisch, Julien Gedeon

, The An Binh Nguyen, Fabian Kaup, Max Mühlhäuser:
Decision Support for Computational Offloading by Probing Unknown Services. 1-9 - Poona Bahrebar, Azarakhsh Jalalvand, Dirk Stroobandt:

Dynamically Reconfigurable Architecture for Fault-Tolerant 2D Networks-on-Chip. 1-7 - Hiroki Watanabe, Takao Kondo

, Kunitake Kaneko, Fumio Teraoka:
Separating Communication Policies and Mechanisms to Make Protocol Layering Clearer. 1-9 - Taesik Gong, Jun Hyuk Chang, Joon-Gyum Kim, Soowon Kang, Donghwi Kim, Sung-Ju Lee:

Enjoy the Silence: Noise Control with Smartphones. 1-9 - Shiqi Jiang, Pengfei Zhou

, Zhenjiang Li, Mo Li
:
Memento: An Emotion Driven Lifelogging System with Wearables. 1-9 - Xuyu Wang

, Runze Huang, Shiwen Mao:
SonarBeat: Sonar Phase for Breathing Beat Monitoring with Smartphones. 1-8 - Santiago Gonzalez, Tracy Camp, Katia Jaffrès-Runser

:
The Sticking Heartbeat Aperture Resynchronization Protocol. 1-8 - Ali Akbari, Richard B. Dewey

, Roozbeh Jafari
:
Validation of a New Model-Free Signal Processing Method for Gait Feature Extraction Using Inertial Measurement Units to Diagnose and Quantify the Severity of Parkinson's Disease. 1-5 - Samet Tonyali

, Kemal Akkaya, Nico Saputro
, Xiuzhen Cheng:
An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI Networks. 1-9 - Ala Altaweel

, Radu Stoleru, Guofei Gu:
EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures. 1-11 - Pouya Ostovari, Jie Wu:

Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding. 1-9 - Robert Annessi, Joachim Fabini, Tanja Zseby:

It's about Time: Securing Broadcast Time Synchronization with Data Origin Authentication. 1-11 - Lang Liu, Yacong Gu, Qi Li, Purui Su:

RealDroid: Large-Scale Evasive Malware Detection on "Real Devices". 1-8 - Waltenegus Dargie

, David Schoeniger, László Szilágyi, Xin An
, Ronny Henker, Frank Ellinger:
A Highly Adaptive and Energy-Efficient Optical Interconnect for On-Board Server Communications. 1-8 - Hank H. Harvey, Ying Mao, Yantian Hou, Bo Sheng

:
EDOS: Edge Assisted Offloading System for Mobile Devices. 1-9 - Chien-An Chen, Radu Stoleru, Geoffrey G. Xie:

Energy-Efficient Load-Balanced Heterogeneous Mobile Cloud. 1-9 - Manar Alqarni, Alexander Ing, Bin Tang:

LB-MAP: Load-Balanced Middlebox Assignment in Policy-Driven Data Centers. 1-9 - Hiroaki Yamanaka, Eiji Kawai, Yuuichi Teranishi, Hiroaki Harai:

Proximity-Aware IaaS for Edge Computing Environment. 1-10 - Shuai Wang, Zhimeng Yin, Song Min Kim, Tian He:

Achieving Spectrum Efficient Communication under Cross-Technology Interference. 1-8 - Shahab Farazi, Andrew G. Klein

, D. Richard Brown:
Bounds on the Age of Information for Global Channel State Dissemination in Fully-Connected Networks. 1-7 - Sumit Roy, Kyeong Su Shin, A. Ashok, Mark McHenry, G. Vigil, Shyam Kannam, D. Aragon:

CityScape: A Metro-Area Spectrum Observatory. 1-9 - Danda B. Rawat

, Taylor White, Min Song, Chongqing Zhang:
Leveraging Wireless Virtualization for Network Capacity Optimization in HetNets. 1-6 - James Griffioen, Kenneth L. Calvert, Zongming Fei, P. Sergio Rivera, Jacob Chappell, Mami Hayashida, Charles Carpenter, Yongwook Song

, Hussamuddin Nasir:
VIP Lanes: High-Speed Custom Communication Paths for Authorized Flows. 1-9 - Hanxu Hou, Yunghsiang S. Han:

BASIC Codes for Distributed Storage Systems. 1-9 - Qun Yu, Taieb Znati:

Energy and Delay-Aware Traffic Control and Management in Large Scale Networks. 1-8 - Nageswara S. V. Rao, Qiang Liu, Satyabrata Sen

, Jesse Hanley
, Ian T. Foster, Rajkumar Kettimuthu, Chase Q. Wu, Daqing Yun, Don Towsley
, Gayane Vardoyan
:
Experiments and Analyses of Data Transfers over Wide-Area Dedicated Connections. 1-9 - Xueheng Hu, Aaron Striegel:

PASS: Content Pre-Staging through Provider Accessible Storage Service. 1-8 - James Edwards, Rebecca J. Passonneau, Taylor Cassidy, Thomas F. La Porta:

Resource Allocation for Pragmatically-Assisted Quality of Information-Aware Networking. 1-10 - Dylan Smyth, Seán McSweeney

, Donna O'Shea
, Victor Cionca
:
Detecting Link Fabrication Attacks in Software-Defined Networks. 1-8 - Chungsik Song, Younghee Park, Keyur Golani, Youngsoo Kim, Kalgi Bhatt, Kunal Goswami:

Machine-Learning Based Threat-Aware System in Software Defined Networks. 1-9 - Yongqiang Wang, Chase Q. Wu, Aiqin Hou:

Periodic Scheduling of Deadline-Constrained Variable Slot-Bandwidth Reservations for Scientific Collaboration. 1-9 - Venkatesh Ramaswamy:

Quantifying the Scalability of Software Defined Networks with Dynamic Topology. 1-7 - Mohammad J. Abdel-Rahman

, EmadelDin A. Mazied, Kory Teague, Allen B. MacKenzie
, Scott F. Midkiff:
Robust Controller Placement and Assignment in Software-Defined Cellular Networks. 1-9 - Huanyang Zheng, Jie Wu:

Friend Recommendation in Online Social Networks: Perspective of Social Influence Maximization. 1-9 - Ba-Dung Le

, Hung X. Nguyen, Hong Shen, Nickolas J. G. Falkner:
GLFR: A Generalized LFR Benchmark for Testing Community Detection Algorithms. 1-9 - Thomas Paul, Niklas Lochschmidt, Hani Salah, Anwitaman Datta

, Thorsten Strufe:
Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social Networks. 1-10 - Ken Goss, Riccardo Musmeci, Simone Silvestri:

Realistic Models for Characterizing the Performance of Unmanned Aerial Vehicles. 1-9 - Dennis E. Phillips, Mohammad-Mahdi Moazzami, Guoliang Xing, Jonathan M. Lees

:
A Sensor Network for Real-Time Volcano Tomography: System Design and Deployment. 1-9 - J. J. Garcia-Luna-Aceves, Spencer Sevilla:

A Simple Solution to Scale-Free Internet Host Mobility. 1-9 - Zafer Vatansever

, Maïté Brandt-Pearce
:
Hybrid Indoor Tracking Using Crowdsourced Measurements. 1-7 - Mohamed Ibrahim

, Marco Gruteser, Khaled A. Harras
, Moustafa Youssef:
Over-The-Air TV Detection Using Mobile Devices. 1-9 - Giuseppe Bianchi, Simone Di Domenico

, Mauro De Sanctis
, Laura Liberati, Valerio Perrotta, Ernestina Cianca:
Unveiling Access Point Signal Instability in WiFi-Based Passive Sensing. 1-9 - Zainul Din, Jaudelice de Oliveira:

Anomaly Free on Demand Stateful Software Defined Firewalling. 1-9 - Meghana Bande, Venugopal V. Veeravalli:

Design of a Heterogeneous Cellular Network with a Wireless Backhaul. 1-7 - Ali Cagatay Cirik, Naveen Mysore Balasubramanya, Lutz Lampe:

Downlink Channel Estimation in Massive MIMO FDD Systems Using Block-ADMM. 1-6 - Lianjie Cao

, Xiangyu Bu, Sonia Fahmy
, Siyuan Cao:
Towards High Fidelity Network Emulation. 1-11 - Yu Zhao, Tingting Yu:

Channel Quality Correlation Based Channel Probing in Multiple Channels. 1-9 - Changhua Pei, Youjian Zhao, Guo Chen, Yuan Meng, Yang Liu, Ya Su, Yaodong Zhang, Ruming Tang, Dan Pei

:
How Much Are Your Neighbors Interfering with Your WiFi Delay? 1-9 - Jun Zhang, Guangxing Zhang, Qinghua Wu, Lei Song, Gaogang Xie:

LazyAS: Client-Transparent Access Selection in Dual-Band WiFi. 1-9 - Roman Naumann, Stefan Dietzel, Laura Wartschinski, Ben Schumacher, Björn Scheuermann:

TANDEM: Prioritizing Wireless Communication for Robust Industrial Process Control. 1-9 - Victor Lira, Eduardo Tavares

, Meuse N. Oliveira Jr.:
An Approach for Reducing Energy Consumption in Dependable Virtual Network Embedding. 1-9 - Gil Einziger, Marcelo Caggiani Luizelli, Erez Waisbard:

Constant Time Weighted Frequency Estimation for Virtual Network Functionalities. 1-9 - Alexander Afanasyev

, Xiaoke Jiang, Yingdi Yu, Jiewen Tan, Yumin Xia, Allison Mankin, Lixia Zhang:
NDNS: A DNS-Like Name Service for NDN. 1-9 - Spyridon Mastorakis, Alexander Afanasyev

, Yingdi Yu, Lixia Zhang:
nTorrent: Peer-to-Peer File Sharing in Named Data Networking. 1-10 - Shireesh Bhat, George N. Rouskas:

Service-Concatenation Routing with Applications to Network Functions Virtualization. 1-9 - Kuo Zhang, Salem Alqahtani, Murat Demirbas:

A Comparison of Distributed Machine Learning Platforms. 1-9 - Samuel Fuller Dodge, Lina J. Karam

:
A Study and Comparison of Human and Deep Learning Recognition Performance under Visual Distortions. 1-7 - Sharath Chandrashekhara, Madhusudhan R. Kumar, Mahesh Venkataramaiah, Vipin Chaudhary

:
Cider: A Case for Block Level Variable Redundancy on a Distributed Flash Array. 1-9 - Fakhreddine Ghaffari, Ali Akoglu

, Bane Vasic, David Declercq:
Multi-Mode Low-Latency Software-Defined Error Correction for Data Centers. 1-8 - Shan Jiang

, Jiannong Cao, Jia Wang
, Milos Stojmenovic, Julien Bourgeois:
Uniform Circle Formation by Asynchronous Robots: A Fully-Distributed Approach. 1-9 - Jeff Burke:

Browsing an Augmented Reality with Named Data Networking. 1-9 - Yi Yang, Yeli Geng, Li Qiu, Wenjie Hu, Guohong Cao:

Context-Aware Task Offloading for Wearable Devices. 1-9 - Hatem Ibn-Khedher, Hossam Afifi, Ahmed E. Kamal:

Service Placement in Complex Active Networks. 1-9 - Haotian Deng, Qianru Li, Yuanjie Li, Songwu Lu, Chunyi Peng, Taqi Raza, Zhaowei Tan, Zengwen Yuan, Zhehui Zhang:

Towards Automated Intelligence in 5G Systems. 1-9 - Qiaozhi Xu, Junxing Zhang:

Building a Lightweight Testbed Using Devices in Personal Area Networks. 1-2 - Christian Meurisch, The An Binh Nguyen, Martin Kromm, Andrea Ortiz

, Ragnar Mogk, Max Mühlhäuser:
DisVis 2.0: Decision Support for Rescue Missions Using Predictive Disaster Simulations with Human-Centric Models. 1-2 - Justin P. Rohrer:

Effects of GPS Error on Geographic Routing. 1-2 - Shuo-Han Chen

, I-Ju Wang, Tseng-Yi Chen
, Hsin-Wen Wei, Tsan-sheng Hsu, Wei-Kuan Shih:
Enhancing Usability for the Wireless Charging Vehicle Simulator. 1-2 - Robinson Udechukwu, Rudra Dutta, Takaya Miyazawa, Hiroaki Harai:

Evaluating Different Pricing Algorithms for a Flexible Optical Choice-Based Network. 1-2 - Mijanur Rahaman Palash, Kang Chen:

Improving WiFi Network Performance under MPTCP Users. 1-2 - Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:

Joint Optimization of Task Placement and Routing in Minimizing Inter-DC Coflow Completion Time. 1-2 - Ho-Ting Wu, Kai-Wei Ke, Po-Hung Chen, Chun-Ting Lin, Ming-Che Chen:

Mean Holding Time in Sync of Lossy IEEE 802.15.4e TSCH Networks for Industrial IOT Applications. 1-2 - Aitizaz Uddin Syed, Mohsin Iftikhar, Ljiljana Trajkovic

:
Optimal PPDU Duration Algorithm for VHT MU-MIMO Systems. 1-2 - Inoussa Ns. Mouiche, Maher Bouidani:

Stability Analysis of Slotted Aloha Protocol for Cognitive Radio Users Using TUA. 1-2 - Christian Meurisch, The An Binh Nguyen, Julien Gedeon

, Florian Kohnhäuser, Milan Schmittner, Stefan Niemczyk, Stefan Wullkotte, Max Mühlhäuser:
Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication Bridge. 1-2 - Seilendria A. Hadiwardoyo

, Subhadeep Patra, Carlos T. Calafate
, Juan-Carlos Cano, Pietro Manzoni:
An Android ITS Driving Safety Application Based on Vehicle-to-Vehicle (V2V) Communications. 1-6 - Nour El Houda Bahloul, Saadi Boudjit, Marwen Abdennebi, Djallel Eddine Boubiche

:
Bio-Inspired on Demand Routing Protocol for Unmanned Aerial Vehicles. 1-6 - D. P. Tejas, Chinmaya Pancholi, Arobinda Gupta:

Disseminating Large Data in Vehicular Ad Hoc Networks. 1-6 - Julio A. Sanguesa, Johann Márquez-Barja

, Piedad Garrido, Francisco J. Martinez:
Dynamic Small Cell Management for Connected Cars Communications. 1-6 - Arun Adiththan, Kaliappa Ravindran:

QoS-Oriented Management of Automobile Cruise Control Processes. 1-6 - Jordi Castellà-Roca

, Macià Mut Puigserver, Magdalena Payeras-Capellà
, Alexandre Viejo
, Carles Angles-Tafalla
:
Secure and Anonymous Vehicle Access Control System to Traffic-Restricted Urban Areas. 1-7 - Jean Philippe Monteuuis, Badis Hammi, Eduardo Salles, Houda Labiod, Remi Blancher, Erwan Abalea, Brigitte Lonc:

Securing PKI Requests for C-ITS Systems. 1-8 - Zeeshan Ansar

, Waltenegus Dargie
:
Adaptive Burst Transmission Scheme for WSNs. 1-7 - Yang Zhang, Yu-Jung Chu, Thinh P. Nguyen:

Coverage Algorithms for WiFO: A Hybrid FSO-WiFi Femtocell Communication System. 1-6 - Md Raqibull Hasan

, Yanxiao Zhao, Guodong Wang, Yu Luo, Robb M. Winter:
Enhanced AODV: Detection and Avoidance of Black Hole Attack in Smart Meter Network. 1-6 - Meitian Huang, Weifa Liang

:
Incremental SDN-Enabled Switch Deployment for Hybrid Software-Defined Networks. 1-6 - Guodong Wang, Yanxiao Zhao, Jun Huang, Robb M. Winter:

On the Data Aggregation Point Placement in Smart Meter Networks. 1-6 - Omneya Issa, Ying Ge, Aizaz U. Chaudhry

, Bernard Doray:
User Association Algorithm for Throughput Improvement in High-Density Wireless Networks. 1-8 - Jiangmin Yu, Michael Farcasin, Eric Chan-Tin:

Wireless Interference Prediction for Embedded Health Devices. 1-6 - Mousa Alramadhan, Kewei Sha

:
An Overview of Access Control Mechanisms for Internet of Things. 1-6 - Hammad Iqbal, Jamie Ma, Qing Mu, Venkatesh Ramaswamy, Gabby Raymond, Daniel Vivanco, John Zuena:

Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position Paper. 1-6 - Kozo Okano, Satoshi Harauchi, Toshifusa Sekizawa, Shinpei Ogata

, Shin Nakajima:
Equivalence Checking of Java Methods: Toward Ensuring IoT Dependability. 1-6 - Muhammed Abdulazeez, Pawel Garncarek

, Prudence W. H. Wong:
Lightweight Framework for Reliable Job Scheduling in Heterogeneous Clouds. 1-6 - Sida Gao, Geethapriya Thamilarasu:

Machine-Learning Classifiers for Security in Connected Medical Devices. 1-5 - Yu-Hao Hsu, Fuchun Joseph Lin

:
Preventing Misuse of Duplicate Certificates in IoT/M2M Systems. 1-8 - Alper Yargic, Alper Bilge

:
Privacy Risks for Multi-Criteria Collaborative Filtering Systems. 1-6 - Linyuan Yao, Ping Dong, Xiaojiang Du, Hongke Zhang:

Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier Network. 1-6 - Henry M. Kim

, Marek Laskowski:
A Perspective on Blockchain Smart Contracts: Reducing Uncertainty and Complexity in Value Exchange. 1-6 - Robert Norvill, Beltran Borja Fiz Pontiveros

, Radu State, Irfan Awan, Andrea J. Cullen:
Automated Labeling of Unknown Contracts in Ethereum. 1-6 - Lei Xu

, Lin Chen
, Zhimin Gao, Yang Lu, Weidong Shi:
CoC: Secure Supply Chain Management System Based on Public Ledger. 1-6 - Darra L. Hofman

:
Legally Speaking: Smart Contracts, Archival Bonds, and Linked Data in the Blockchain. 1-4 - Masashi Sato, Shin'ichiro Matsuo:

Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography. 1-8 - Suporn Pongnumkul

, Chaiyaphum Siripanpornchana, Suttipong Thajchayapong
:
Performance Analysis of Private Blockchain Platforms in Varying Workloads. 1-6 - Jagdeep Sidhu:

Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-Business. 1-6 - Heng Hou:

The Application of Blockchain Technology in E-Government in China. 1-4 - Jinoh Kim, Alex Sim

:
A New Approach to Online, Multivariate Network Traffic Analysis. 1-6 - David Schwab, Li Yang, Katherine Winters, Matthew Jallouk, Emile Smith, Adam Claiborne:

A Secure Mobile Cloud Photo Storage System. 1-5 - Mir Mehedi A. Pritom, Chuqin Li, Bill Chu, Xi Niu:

A Study on Log Analysis Approaches Using Sandia Dataset. 1-6 - Angelo Sapello, Constantin Serban, Ritu Chadha, Rauf Izmailov

:
Application of Learning Using Privileged Information(LUPI): Botnet Detection. 1-8 - Hanene Ben Yedder

, Qingye Ding, Umme Zakia, Zhida Li, Soroush Haeri, Ljiljana Trajkovic
:
Comparison of Virtualization Algorithms and Topologies for Data Center Networks. 1-6 - Rahmira Rufus, Albert C. Esterline:

Concatenating Unprotected Internet of Things Network Event-Driven Data to Obtain End-User Information. 1-7 - Kai Qian, Yong Shi, Lixin Tao, Ying Qian:

Hands-On Learning for Computer Network Security with Mobile Devices. 1-6 - Md. Nazmus Sakib Miazi, Mir Mehedi A. Pritom, Mohamed Shehab

, Bill Chu, Jinpeng Wei:
The Design of Cyber Threat Hunting Games: A Case Study. 1-6 - Hiroaki Hata:

A Bridging VPN for Connecting Wireless Sensor Networks to Data Centers. 1-6 - Markus Hähnel

, Waltenegus Dargie
, Alexander Schill:
Analysis of the Scope of Dynamic Power Management in Emerging Server Architectures. 1-6 - Lav Gupta, Mohammed Samaka, Raj Jain

, Aiman Erbad
, Deval Bhamare, H. Anthony Chan:
Fault and Performance Management in Multi-Cloud Based NFV Using Shallow and Deep Predictive Structures. 1-8 - Udit Pareek, Daniel C. Lee:

Monotonic Optimization for Power Assignment in Two-Way Cognitive Radio Networks with Shared-Band Amplify-and-Forward Relays. 1-6 - Hajime Kanzaki, Kevin Schubert, Nicholas Bambos:

Video Streaming Schemes for Industrial IoT. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














