


default search action
28th ICCCN 2019: Valencia, Spain
- 28th International Conference on Computer Communication and Networks, ICCCN 2019, Valencia, Spain, July 29 - August 1, 2019. IEEE 2019, ISBN 978-1-7281-1856-7

Invited Session 1: Internet of Things
- Shichang Ding, Hong Huang, Tao Zhao, Xiaoming Fu

:
Estimating Socioeconomic Status via Temporal-Spatial Mobility Analysis - A Case Study of Smart Card Data. 1-9 - Daniel Zhang, Nathan Vance

, Dong Wang:
When Social Sensing Meets Edge Computing: Vision and Challenges. 1-9 - Yiran Zhao, Shuochao Yao, Dongxin Liu, Huajie Shao, Shengzhong Liu, Tarek F. Abdelzaher:

Simulation Evaluation of Fuel-Saving Systems in the City of Chicago. 1-9 - Li Yan, Shohaib Mahmud, Haiying Shen, Natasha Zhang Foutz, Donald E. Brown, Wie Yusuf

, Derek Loftis, Lucas Lyons, Jonathan L. Goodall
, Joshua Anton:
MobiAmbulance: Optimal Scheduling of Emergency Vehicles in Catastrophic Situations. 1-9 - Vinicius Galvao Guimaraes, Renato Mariz de Moraes

, Katia Obraczka, Adolfo Bauchspiess
:
A Novel IoT Protocol Architecture: Efficiency through Data and Functionality Sharing across Layers. 1-9
Invited Session 2: Software Controlled Networks: SDN & NFV
- Pinyi Shi, P. Sergio Rivera, Lowell Pike, Zongming Fei, James Griffioen, Kenneth L. Calvert:

Enabling Shared Control and Trust in Hybrid SDN/Legacy Networks. 1-9 - Yuanlong Tan, Shuoshuo Chen, Steve Emmerson, Yizhe Zhang

, Malathi Veeraraghavan:
Advances in Reliable File-Stream Multicasting over Multi-Domain Software Defined Networks (SDN). 1-11 - Shafaq Chaudhry

, Eyuphan Bulut, Murat Yuksel:
A Distributed SDN Application for Cross-Institution Data Access. 1-9 - Sidharth Sharma, Aniruddha Kushwaha, Arun K. Somani, Ashwin Gumaste:

Designing Highly-Available Service Provider Networks with NFV Components. 1-9 - Zhenjie Yang, Yong Cui, Baochun Li, Yadong Liu, Yi Xu:

Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and Opportunities. 1-9
Invited Session 3: Sensor Networks
- Wentao Shang, Ashlesh Gawande, Minsheng Zhang, Alexander Afanasyev

, Jeffrey A. Burke, Lan Wang, Lixia Zhang:
Publish-Subscribe Communication in Building Management Systems over Named Data Networking. 1-10 - Jinhwan Jung, Kien Pham, Joohyun Kang, Junehwa Song, Sung-Ju Lee, Yung Yi:

Hierarchical Duty-Cycling of Wireless Sensors. 1-9 - Amitangshu Pal, Rajpreet Kaur Gulati, Krishna Kant:

Towards Building Low Power Magnetic Communication Protocols for Challenging Environments. 1-9 - Rachael Purta, Aaron Striegel:

Predicting Friendship Pairs from BLE Beacons Using Dining Hall Visits. 1-9 - Ala'eddin Masadeh

, Zhengdao Wang, Ahmed E. Kamal:
An Actor-Critic Reinforcement Learning Approach for Energy Harvesting Communications Systems. 1-6
Invited Session 4: Network Control
- Fidan Mehmeti, Thomas F. La Porta:

Optimizing 5G Performance by Reallocating Unused Resources. 1-9 - Hanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee

:
Binary MDS Array Codes with Asymptotically Optimal Repair for All Columns. 1-9 - J. J. Garcia-Luna-Aceves, Ehsan Hemmati:

ODVR: A Unifying Approach to On-Demand and Proactive Loop-Free Routing in Ad-Hoc Networks. 1-11 - Vivek Adarsh, Paul Schmitt, Elizabeth M. Belding:

MPTCP Performance over Heterogenous Subpaths. 1-9
Invited Session 5: Network Science
- James Flamino, Boleslaw K. Szymanski

:
A Reaction-Based Approach to Information Cascade Analysis. 1-9 - Peter Gusev, Jeff Thompson, Jeff Burke:

Data-Centric Video for Mixed Reality. 1-11 - Jordi Garcia

, Xavi Masip-Bruin
, Yunsong Lu:
The Progressive Mapping System Architecture for Global Resources Management. 1-8 - David E. Irwin, Prashant J. Shenoy

, Pradeep Ambati, Prateek Sharma, Supreeth Shastri, Ahmed Ali-Eldin:
The Price Is (Not) Right: Reflections on Pricing for Transient Cloud Servers. 1-9
Invited Session 6: Security & Safety
- Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa:

Generating Client Side Policies for Cyber-Physical Safety. 1-8 - Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:

CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. 1-8 - Suhan Jiang, Yubin Duan, Jie Wu:

A Client-Biased Cooperative Search Scheme in Blockchain-Based Data Markets. 1-9 - Hanqing Wu, Jiannong Cao, Yanni Yang, Cheung Leong Tung, Shan Jiang

, Bin Tang, Yang Liu, Xiaoqing Wang, Yuming Deng:
Data Management in Supply Chain Using Blockchain: Challenges and a Case Study. 1-8
Session 1: SDN & Network Virtualization
- Mingzheng Li, Xiaodong Wang, Haojie Tong, Tong Liu, Ye Tian

:
SPARC: Towards a Scalable Distributed Control Plane Architecture for Protocol-Oblivious SDN Networks. 1-9 - Raphael Durner, Christian Sieber, Wolfgang Kellerer

:
Towards Reducing Last-Level-Cache Interference of Co-Located Virtual Network Functions. 1-9 - Andreas Fischer, Deval Bhamare, Andreas Kassler:

On the Construction of Optimal Embedding Problems for Delay-Sensitive Service Function Chains. 1-10 - Alejandro Llorens-Carrodeguas

, Cristina Cervello-Pastor, Irian Leyva-Pupo:
A Data Distribution Service in a Hierarchical SDN Architecture: Implementation and Evaluation. 1-9 - Estefanía Coronado

, Roberto Riggio
:
Flow-Based Network Slicing: Mapping the Future Mobile Radio Access Networks. 1-9
Session 2: Social Networks & Computing
- Md. Tahmid Rashid

, Daniel Zhang, Zhiyu Liu, Hai Lin, Dong Wang:
CollabDrone: A Collaborative Spatiotemporal-Aware Drone Sensing System Driven by Social Sensing Signals. 1-9 - Wenlong Zhu, Wu Yang, Shichang Xuan, Dapeng Man, Wei Wang, Jiguang Lv:

Location-Aware Targeted Influence Blocking Maximization in Social Networks. 1-9 - Andrea Tundis

, Archit Jain, Gaurav Bhatia, Max Mühlhäuser:
Similarity Analysis of Criminals on Social Networks: An Example on Twitter. 1-9 - Enrique Hernández-Orallo, Leonardo Chancay-Garcia, Pietro Manzoni, Carlos Miguel Tavares Calafate

, Juan-Carlos Cano:
Assessing Social Aspects of Urban Vehicular Scenarios for Improving Message Diffusion. 1-9
Session 3: Wireless LAN, Ad Hoc and Mesh Networks
- Jiang Xiao, Huichuwu Li, Yuxiang Liu:

WiWrite: Wi-Fi Based Handwriting Recognition like Playing Lego. 1-9 - Ding Zhang, Panneer Selvam Santhalingam, Parth H. Pathak, Zizhan Zheng

:
Characterizing Interference Mitigation Techniques in Dense 60 GHz mmWave WLANs. 1-9 - Xingjian Ding, Guodong Sun, Yongcai Wang

, Chuanwen Luo, Deying Li, Wenping Chen, Qian Hu:
Cost-Minimum Charger Placement for Wireless Power Transfer. 1-9 - Anirudh Ganji, Griffin Page, Muhammad Shahzad:

Characterizing the Performance of WiFi in Dense IoT Deployments. 1-9
Session 4: Network Optimization I
- Shuai Wu, Xianfeng Liu, Quan Chen, Jianming Guo, Lei Yang, Yong Zhao, Chengguang Fan:

Update Method for Controller Placement Problem in Software-Defined Satellite Networking. 1-7 - Xun Shao, Go Hasegawa, Noriaki Kamiyama, Zhi Liu

, Hiroshi Masui, Yusheng Ji:
Joint Optimization of Computing Resources and Data Allocation for Mobile Edge Computing (MEC): An Online Approach. 1-9 - Quynh Vo, Duc A. Tran

:
Probabilistic Partitioning for Edge Server Assignment with Time-Varying Workload. 1-8 - Pufang Ma, Jinlin Wang

, Jiali You:
An Improved Maximum Flow Routing Algorithm for Multi-Homing in Information-Centric Networking. 1-8
Session 5: Network Optimization II
- Julio A. Sanguesa, Samuel Salvatella, Francisco J. Martinez, Johann M. Márquez-Barja

, Manuel P. Ricardo
:
Enhancing the NS-3 Simulator by Introducing Electric Vehicles Features. 1-7 - Xiujun Wang, Zhi Liu

, Yangzhao Yang, Xun Shao, Yu Gu, Susumu Ishihara:
Approximate Range Emptiness in Constant Time for IoT Data Streams over Sliding Windows. 1-10 - Yifei Lu, Yan Li:

TS-TCP: Two-Stage Congestion Control Algorithm for High Concurrency TCPs in Data Center Networks. 1-9 - Rashid Mijumbi, Abhaya Asthana, Carlos Bernal, Manuel Castejón:

MAYOR: Machine Learning and Analytics for Automated Operations and Recovery. 1-9
Session 6: Data Centers and Edge/Cloud Computing
- Yi Wang, Yanan Jiang, Qiufang Ma, Chen Tian, Bo Bai, Gong Zhang:

RDMA Load Balancing via Data Partition. 1-8 - Nazim Umut Ekici, Klaus Werner Schmidt, Alper Yazar

, Ece Guran Schmidt
:
Resource Allocation for Minimized Power Consumption in Hardware Accelerated Clouds. 1-8 - Jad Darrous, Thomas Lambert, Shadi Ibrahim:

On the Importance of Container Image Placement for Service Provisioning in the Edge. 1-9 - Qihui Li, Chuanhe Huang, Haizhou Bao

, Bin Fu, Xiaohua Jia:
A Game-Based Combinatorial Double Auction Model for Cloud Resource Allocation. 1-8 - Zhuozhao Li

, Haiying Shen, Lee Ward:
Accelerating Big Data Analytics Using Scale-Up/Out Heterogeneous Clusters. 1-9
Session 7: Security, Privacy & Incentives
- Murugaraj Odiathevar, Winston K. G. Seah

, Marcus Frean:
A Hybrid Online Offline System for Network Anomaly Detection. 1-9 - Ritesh Ahuja, Gabriel Ghinita, Nithin Krishna, Cyrus Shahabi:

Protecting against Inference Attacks on Co-Location Data. 1-11 - Haiyang Jiang, Ye Yang, Hongtao Guan, Gaogang Xie, Kavé Salamatian

:
A Massively Multi-Tenant Virtualized Network Intrusion Prevention Service on NFV Platform. 1-9 - Mohamad Khayat

, Ezedin Barka, Farag M. Sallabi
:
SDN_Based Secure Healthcare Monitoring System(SDN-SHMS). 1-7 - Houda Jmila

, Gregory Blanc:
Designing Security-Aware Service Requests for NFV-Enabled Networks. 1-9
Session 8: Hot Topics in Networking I
- Francisco Fabra, Willian Zamora

, Pablo Reyes, Carlos T. Calafate
, Juan-Carlos Cano, Pietro Manzoni, Enrique Hernández-Orallo:
An UAV Swarm Coordination Protocol Supporting Planned Missions. 1-9 - Zeineb Rejiba, Xavier Masip-Bruin

, Eva Marín-Tordera:
A User-Centric Mobility Management Scheme for High-Density Fog Computing Deployments. 1-8 - Ankur Sarker, Haiying Shen, Bryant Murphy, Roman Wang, Mac Devine, Andrew J. Rindos:

Vehicle Routing Trifecta: Data-Driven Route Recommendation System. 1-9 - Shuan He, Wei Wang:

Price-Driven Economic Cache Content Nash Bargaining Game in Wireless Multimedia Resource Allocation. 1-8
Session 9: Hot Topics in Networking II
- Yubin Duan, Ning Wang, Jie Wu:

Optimizing Order Dispatch for Ride-Sharing Systems. 1-9 - Jiamin Cao, Ying Liu, Yu Zhou, Chen Sun, Yangyang Wang, Jun Bi:

CoFilter: A High-Performance Switch-Accelerated Stateful Packet Filter for Bare-Metal Servers. 1-9 - Takashi Fuchino, Takashi Harada, Ken Tanaka, Kenji Mikawa:

Acceleration of Packet Classification Using Adjacency List of Rules. 1-9 - Jin Ye, Renzhang Liu, Ziqi Xie, Luting Feng, Sen Liu:

EMPTCP: An ECN Based Approach to Detect Shared Bottleneck in MPTCP. 1-10
Session 10: Green Networking & Sustainable Computing
- Fan Liang, William Grant Hatcher, Guobin Xu, James H. Nguyen, Weixian Liao, Wei Yu

:
Towards Online Deep Learning-Based Energy Forecasting. 1-9 - Yi Wang, Kexin Liu, Chen Tian, Bo Bai, Gong Zhang:

Error Recovery of RDMA Packets in Data Center Networks. 1-8 - Li Zhang, Xiaojun Zhu, Xiaobing Wu:

No More Free Riders: Sharing WiFi Secrets with Acoustic Signals. 1-8
Session 11: Internet of Things
- Peng Zhao, Dekui Quan, Wei Yu

, Xinyu Yang, Xinwen Fu
:
Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems. 1-9 - M. Mazhar Rathore, Elmahdi Bentafat, Spiridon Bakiras

:
Smart Home Security: A Distributed Identity-Based Security Protocol for Authentication and Key Exchange. 1-9 - Bo Wu, Haiying Shen:

Distributed Vehicle Trajectory Tracking for Efficient Routing in VDTNs. 1-9 - Amrita Ghosal, Subir Halder, Mauro Conti

:
DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia Things. 1-9 - Hafiz Muhammad Azeem Akram:

Multi-Task Sensing for Multiple Crowdsourcers: A Dynamic Game Based Pricing Model. 1-9
Poster Session I: Wireless Networks Topics: Wireless Communications, Channel Modeling, Ad Hoc Networks
- Yong Jeong Kim, Linh-An Phan, Taejoon Kim, Taehong Kim, JaeSeang Lee, Jae-Hyun Ham:

Adaptive Gradient Time Synchronization Protocol in Wireless Ad-Hoc Networks. 1-2 - Thanh-Tung Nguyen, Linh-An Phan, Taejoon Kim, Taehong Kim, JaeSeang Lee, Jae-Hyun Ham:

Distributed TDMA Scheduling Using Topological Ordering in Wireless Sensor Networks. 1-2 - De-gan Zhang, Jianning Qiu, Ting Zhang, Hao Wu:

New Energy-Efficient Hierarchical Clustering Approach Based on Neighbor Rotation for Edge Computing of IoT. 1-2 - Morihiko Tamai, Akio Hasegawa, Hiroyuki Yokoyama:

Design and Implementation of Sensing System for Quality Analysis of 802.11 Wireless Links. 1-2 - Wanning Zhou, Feng Wang, Zhiguo Zhao, Xie Ma:

Suppression of the EMI from Co-Site VHF Radio to Satellite Communication Network. 1-2 - May Thura Lwin, Young-Bae Ko, Dohyung Kim:

When Blockchain Takes Care of the OLSR Network. 1-2
Poster Session II: Secure & Smart Networks Network Topics: AI, IoT, Security, SDN
- JoonYoung Lee

, MyeongHyun Kim, SungJin Yu
, KiSung Park
, Youngho Park:
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications. 1-2 - Dong Nyeok Choi, Sung Yooun Jin, Juhee Lee, Byung Wook Kim:

Deep Learning Technique for Improving Data Reception in Optical Camera Communication-Based V2I. 1-2 - Kohei Watabe, Norinosuke Murai, Shintaro Hirakawa, Kenji Nakagawa:

Accurate Measurement Technique of Packet Loss Rate in Parallel Flow Monitoring. 1-2 - MyeongHyun Kim, JoonYoung Lee

, SungJin Yu
, KiSung Park
, YoHan Park, Youngho Park:
A Secure Authentication and Key Establishment Scheme for Wearable Devices. 1-2 - Bhavesh Toshniwal, Kalpana D. Joshi, Pragati Shrivastava, Kotaro Kataoka

:
BEAM: BEhavior-Based Access Control Mechanism for SDN Applications. 1-2
BDMLS Workshop: Session 1: Malware Detection
- Xiaofeng Lu, Fei Wang, Zifeng Shu:

Malicious Word Document Detection Based on Multi-View Features Learning. 1-6
BDMLS Workshop: Session 2: Network and IoT Security
- Yosef Ashibani, Qusay H. Mahmoud:

User Authentication for Smart Home Networks Based on Mobile Apps Usage. 1-6 - Waltenegus Dargie:

Identification of Resource Utilisation Patterns in Data Centers Using Tensor Decomposition. 1-6 - Michail Chatzidakis

, Stathes Hadjiefthymiades:
Location Aware Clustering and Epidemic Trust Management in Mobile Ad Hoc Network. 1-7
BDMLS Workshop: Session 3: Algorithm
- Su Yang, Weiqiang Xie, Chensi Wu, Wenjie Wang, Yuqing Zhang:

A Hybrid Model for Optimal Defense Strategy Generation. 1-6
BDMLS Workshop: Session 4: Attack Detection
- Nada Aboueata, Sara Alrasbi, Aiman Erbad

, Andreas Kassler, Deval Bhamare:
Supervised Machine Learning Techniques for Efficient Network Intrusion Detection. 1-8
ECN Workshop: Session 2: Edge Computing Management
- Rafael Moreno-Vozmediano

, Eduardo Huedo
, Rubén S. Montero
, Ignacio Martín Llorente:
Disaggregated Cloud Management for Edge Computing. 1-6 - Ana Juan Ferrer, Joan Manuel Marquès, Josep Jorba

:
Ad-Hoc Edge Cloud: A Framework for Dynamic Creation of Edge Computing Infrastructures. 1-7 - Johannes Vater, Lars Harscheidt, Alois C. Knoll

:
A Reference Architecture Based on Edge and Cloud Computing for Smart Manufacturing. 1-7 - Ahmet Erol, Alper Yazar

, Ece Guran Schmidt
:
OpenStack Generalization for Hardware Accelerated Clouds. 1-8
ECN Workshop: Session 3: Edge Networking
- Weifeng Lu, Xiaoqiang Ren, Jia Xu, Siguang Chen, Lijun Yang, Jian Xu:

DUE Distribution and Pairing in D2D Communication. 1-8 - Francesco Ciaccia, Oriol Arcas-Abella

, Diego Montero
, Ivan Romero, Rodolfo A. Milito, René Serral-Gracià, Mario Nemirovsky:
Improving TCP Performance and Reducing Self-Induced Congestion with Receive Window Modulation. 1-6
EoT Workshop: Session 1: EoT Technologies and Applications
- Jara Suarez de Puga, Carlos E. Palau Salvador

, Andreu Belsa Pellicer
:
Architecture and Use Case for an IoT Deployment with SDN at the Edge and Dual Physical and Virtual Gateway. 1-6 - Andrea Tundis

, Humayun Kaleem, Max Mühlhäuser:
Tracking Criminal Events through IoT Devices and an Edge Computing Approach. 1-6 - Anna Di Mauro, Armando Di Nardo, Giovanni Francesco Santonastaso

, Salvatore Venticinque:
An IoT System for Monitoring and Data Collection of Residential Water End-Use Consumption. 1-6 - Hong-Tri Nguyen

, Juha Partala, Susanna Pirttikangas
:
Blockchain-Based Mobility-as-a-Service. 1-6
EoT Workshop: Session 2: EoT Models and Architectures
- Claudio Savaglio

, Pietro Gerace, Giuseppe Di Fatta, Giancarlo Fortino:
Data Mining at the IoT Edge. 1-6 - Lauri Lovén

, Ella Peltonen
, Abhinay Pandya, Teemu Leppänen, Ekaterina Gilman
, Susanna Pirttikangas
, Jukka Riekki:
Towards EDISON: An Edge-Native Approach to Distributed Interpolation of Environmental Data. 1-6 - Teemu Leppänen:

Distributed Artificial Intelligence with Multi-Agent Systems for MEC. 1-8 - Carmine De Napoli, Agostino Forestiero

, Giancarlo Fortino, Andrea Giordano, Antonio Guerrieri
, Demetrio Laganà, Giovanni Lupi, Carlo Mastroianni, Leonardo Spataro:
IoT-HC: A Novel IoT Architecture for the Hybrid Cloud. 1-6 - Giovanni Ciatto

, Lorenzo Rizzato, Andrea Omicini
, Stefano Mariani:
TuSoW: Tuple Spaces for Edge Computing. 1-6
SmartCityCom Workshop: Session 2
- Xiaoyi Zhou

, Tong Ye, Tony Tong Lee:
The Effect of Mobility on Delayed Data Offloading. 1-6 - Xiao-huan Liu, De-gan Zhang, Ting Zhang, Yu-ya Cui:

New Method of the Best Path Selection with Length Priority Based on Reinforcement Learning Strategy. 1-6 - Ayush Dusia

, Ram Ramanathan, Adarshpal S. Sethi:
CORR: Centralized Opportunistic Reactive Routing for Mobile Multi-Hop Wireless Networks. 1-6 - Jie Li, Tengfei Li, Fuliang Li, Tao Hong, Xingwei Wang:

Multi-Hop D2D Assisted Real-Time Video Streaming Transmission System in Infrastructure-Less Networks. 1-6
SMS Workshop: Session 1: Social Media and Public Health
- Alfonso Niño

, Sebastián Reyes
, Jose Angel Martin-Baos
, Camelia Muñoz-Caro:
A General Approach to Fuzzy Community Detection in Social Networks. 1-8 - Luca Casini

, Giovanni Delnevo
, Silvia Mirri
, Lorenzo Monti
, Catia Prandi
, Marco Roccetti
, Paola Salomoni:
What Do Patients Tell Doctors on the Internet? Ask AI How to Valorize Online Medical Conversations. 1-6 - Stefano Ferretti, Marco Furini

, Manuela Montangero
:
Diabetes: What Are Italian Twitter Users Talking About? 1-6
SMS Workshop: Session 2: Social Media and Society
- Carmela Comito

:
Exploiting Social Media for Recommending New Locations. 1-6 - Zhan Liu

, Shaban Shabani, Nicole Glassey Balet
, Maria Sokhn
:
Detection of Satiric News on Social Media: Analysis of the Phenomenon with a French Dataset. 1-6 - Domenico De Stefano

, Francesco Santelli
:
Combining Sentiment Analysis and Social Network Analysis to Explore Twitter Opinion Spreading. 1-6 - Tommaso Fabbri, Federica Mandreoli

, Riccardo Martoglia, Anna Chiara Scapolan:
Employee Attitudes and (Digital) Collaboration Data: A Preliminary Analysis in the HRM Field. 1-6 - Marco Furini

, Manuela Montangero
:
On Predicting the Success of Political Tweets Using Psycho-Linguistic Categories. 1-6
VFIA Workshop: Session 1: MANETs' Management
- Tae-Hoon Kwon, Wonwoo Jo, Jong-yul Lee, Hyo-Seung Seo, Minjin Baek

, Sang-Sun Lee:
Random Access Congestion Control for Periodic Safety Messages in Dense Traffic Networks. 1-4 - Daniel Schneider, Hannes Frey:

Joint Optimization of Gain and Beaconing for First Order Consensus under Rayleigh Fading. 1-8 - Murat Akpinar

, Klaus Werner Schmidt, Ece Guran Schmidt
:
Improved Clock Synchronization Algorithms for the Controller Area Network (CAN). 1-8
VFIA Workshop: Session 2: VANET, FANET, and Information Centric Networking
- Lev B. Levitin, Yelena Rykalova:

An Analytical Model for Virtual Cut-Through Routing. 1-7 - Floriano De Rango, Mauro Tropea, Pierfrancesco Raimondo, Amilcare Francesco Santamaria, Peppino Fazio:

Bio Inspired Strategy for Improving Platoon Management in the Future Autonomous Electrical VANET Environment. 1-7 - Ahmed Benmoussa

, Abdou El Karim Tahari, Nasreddine Lagraa, Abderrahmane Lakas
, Farhan Ahmad, Rasheed Hussain
, Chaker Abdelaziz Kerrache, Fatih Kurugollu:
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking. 1-6 - Bhanukiran Perabathini, Kiranteja Tummuri, Achal Agrawal, Vineeth S. Varma:

Efficient 3D Placement of UAVs with QoS Assurance in Ad Hoc Wireless Networks. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














