


default search action
29th ICCCN 2020: Honolulu, HI, USA
- 29th International Conference on Computer Communications and Networks, ICCCN 2020, Honolulu, HI, USA, August 3-6, 2020. IEEE 2020, ISBN 978-1-7281-6607-0

- Kazuki Ikeda, Yua Imai, Hiroyuki Yomo, Yoshihisa Kondo, Hiroyuki Yokoyama:

Data Transmissions From a Drone Using Multi-AP Wireless LAN: A Field Trial. 1-2 - Shuai Liu, Fei Yang, Dandan Li, Marcelo Bagnulo

, Bingyang Liu, Xiaohong Huang:
The Trusted and Decentralized Network Resource Management. 1-7 - Zhiqing Tang, Jiong Lou, Fuming Zhang, Weijia Jia:

Dependent Task Offloading for Multiple Jobs in Edge Computing. 1-9 - Omer F. Ozarslan, Kamil Saraç:

ZIDX: A Generic Framework for Random Access to BGP Records in Compressed MRT Datasets. 1-8 - Joshua Lampkins, Tiffany Hyun-Jin Kim:

Bidirectional Blockchain. 1-8 - Mohammad Al Olaimat

, Dongeun Lee, Youngsoo Kim
, Jonghyun Kim, Jinoh Kim:
A Learning-based Data Augmentation for Network Anomaly Detection. 1-10 - Mohammad Jahanian, Jiachen Chen, K. K. Ramakrishnan:

Managing the Evolution to Future Internet Architectures and Seamless Interoperation. 1-11 - Wenling Li, Jianen Yan, Zhaoxin Zhang:

Relational Database Watermarking Based on Chinese Word Segmentation and Word Embedding. 1-6 - Shaohua Cao, Zhihao Wang

, Yizhi Chen, Dingde Jiang, Yang Yan, Hui Chen:
Research on Design and Application of Mobile Edge Computing Model Based on SDN. 1-6 - Dong Li, Xiao Zhou, Ao Xue:

Open source threat intelligence discovery based on topic detection. 1-4 - Ci-Hung Ciou, Pi-Chung Wang

:
Efficient Multicast Labelling for OpenFlow-Based Switches. 1-2 - Zhuang Liu, Juhua Pu, Nana Zhan, Xingwu Liu:

Predict the Next Attack Location via An Attention-based Fused-SpatialTemporal LSTM. 1-6 - Anton Gulenko, Alexander Acker, Odej Kao, Feng Liu:

AI-Governance and Levels of Automation for AIOps-supported System Administration. 1-6 - John N. Daigle, George Humphrey, Henry C. Lena, Avijit Sarker:

Optimizing Scan Times of BLE Scanning Systems. 1-8 - Prasad Prakash Netalkar, Sumit Maheshwari, Dipankar Raychaudhuri:

Evaluation of Network Assisted Handoffs in Heterogeneous Networks. 1-9 - Huajie Shao, Shuochao Yao, Andong Jing, Shengzhong Liu, Dongxin Liu, Tianshi Wang

, Jinyang Li, Chaoqi Yang, Ruijie Wang, Tarek F. Abdelzaher:
Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social Networks. 1-11 - Haoran Hu

, Wei Chang:
On the Mitigation of Controllable Event Triggering Attack in WSNs. 1-6 - Michael Nekrasov, Maxton Ginier, Ryan Allen, Irina Artamonova, Elizabeth M. Belding:

Impact of 802.15.4 Radio Antenna Orientation on UAS Aerial Data Collection. 1-9 - Min Lei, Peng Liu, Qingshan Wang, Qi Wang:

Precise Identification of Rehabilitation Actions using AI based Strategy. 1-7 - Mengyu Chen, Weifa Liang

, Yuchen Li:
Data Collection Maximization for UAV-Enabled Wireless Sensor Networks. 1-9 - Haodi Ping, Yongcai Wang, Deying Li:

HGO: Hierarchical Graph Optimization for Accurate, Efficient, and Robust Network Localization. 1-9 - Huang Huang, Jingjing Li:

Distributed Energy-Aware Reliable Routing and TDMA Link Scheduling in Wireless Sensor Networks. 1-10 - Anirudh Ganji, Anand Singh, Muhammad Shahzad:

Choosing TCP Variants for Cloud Tenants - A Measurement based Approach. 1-9 - Kerry Veenstra, Katia Obraczka:

Grid Partition: an Efficient Greedy Approach for Outdoor Camera IoT Deployments in 2.5D Terrain. 1-9 - Yilian Li, Yiyu Yang, Xiao Yu, Ting Yang, Lihua Dong, Wengjie Wang:

IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform. 1-5 - Zhenzhe Lin, Yucheng Xie, Xiaonan Guo, Yanzhi Ren, Yingying Chen, Chen Wang:

WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi Signals. 1-9 - Ting-Yi Wu, Yunghsiang S. Han:

ML Soft-decision Decoding for Binary Linear Block Codes Based on Trellises of Their Supercodes. 1-9 - Hang Yang, Qingshan Wang, Qi Wang, Peng Liu, Wei Huang:

Facial Micro-Expression Recognition Using Quaternion-Based Sparse Representation. 1-9 - Meng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen, Yunxi Dong:

Minor Privacy Protection Through Real-time Video Processing at the Edge. 1-6 - John Byabazaire

, Gregory M. P. O'Hare, Declan T. Delaney:
Using Trust as a Measure to Derive Data Quality in Data Shared IoT Deployments. 1-9 - Jamie Wubben

, Izan Catalán
, Manel Lurbe
, Francisco Fabra, Francisco J. Martinez, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni:
Providing resilience to UAV swarms following planned missions. 1-6 - Anu Jagannath, Jithin Jagannath, Andrew L. Drozd:

High Rate-Reliability Beamformer Design for 2×2 Mimo-OFDM System Under Hostile Jamming. 1-9 - Nina Slamnik-Krijestorac, Michaël Peeters

, Steven Latré, Johann M. Márquez-Barja
:
Analyzing the impact of VIM systems over the MEC management and orchestration in vehicular communications. 1-6 - Min Long, Sai Long, Guo-lou Ping, Fei Peng:

A Facial Privacy Protection Framework Based on Component Difference and Template Morphing. 1-9 - Qingxiu Liu, Wenfei Wu, Qingsong Liu, Qun Huang:

T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness. 1-11 - Paul J. Pritz, Daniel Perez, Kin K. Leung:

Fast-Fourier-Forecasting Resource Utilisation in Distributed Systems. 1-9 - Nan Geng, Mingwei Xu, Yuan Yang, Enhuan Dong, Chenyi Liu:

Adaptive and Low-cost Traffic Engineering based on Traffic Matrix Classification. 1-9 - Weiguo Wang, Jinming Li, Meng Jin, Yuan He:

ChordMics: Acoustic Signal Purification with Distributed Microphones. 1-9 - Felix Lorenz, Lauritz Thamsen, Andreas Wilke, Ilja Behnke, Jens Waldmüller-Littke, Ilya Komarov, Odej Kao, Manfred Paeschke:

Fingerprinting Analog IoT Sensors for Secret-Free Authentication. 1-6 - Jingyi Ning, Lei Xie, Chuyu Wang, Yanling Bu, Baoliu Ye, Sanglu Lu:

RF-Detector: 3D Structure Detection of Tiny Objects via RFID Systems. 1-9 - Liuwang Kang, Haiying Shen:

Attack Detection and Mitigation for Sensor and CAN Bus Attacks in Vehicle Anti-lock Braking Systems. 1-9 - Yongkai Fan, Guanqun Zhao, Wenqian Shang, Jingtao Shang, Weiguo Lin, Zhen Wang:

A Preliminary Design for Authenticity of IoT Big Data in Cloud Computing. 1-2 - Jeanette M. Sperhac

, Robert L. DeLeon, Joseph P. White
, Matthew D. Jones, Andrew E. Bruno, Renette L. Jones-Ivey, Thomas R. Furlani
, Jonathan E. Bard, Vipin Chaudhary:
Towards Performant Workflows, Monitoring and Measuring. 1-9 - Shravan Garlapati:

Trade-offs in the Design of Blockchain of Finite-Lifetime Blocks for Edge-IoT Applications. 1-7 - Haoran Niu

, Jiangnan Li, Yu Zhao:
SmartBullets: A Cloud-Assisted Bullet Screen Filter based on Deep Learning. 1-2 - Taku Noguchi

, Yu-Cheng Ting, Masami Yoshida, Alberto Gallegos Ramonet
:
Real-time Cooperative Vehicle Tracking in VANETs. 1-6 - Yang Zhang, Dongzheng Jia, Shijie Jia, Limin Liu, Jingqiang Lin:

Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. 1-11 - Shahbaz Rezaei

, Xin Liu:
Multitask Learning for Network Traffic Classification. 1-9 - Adeel A. Malik, Deepak K. Tosh

:
Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. 1-6 - Christian Meurisch, Bekir Bayrak, Florian Giger, Max Mühlhäuser:

PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI Services. 1-2 - Xiaoyuan Yu, Brandon Haakenson, Tyler Phillips, Xukai Zou:

User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control Models. 1-9 - Daniel Y. Karasek, Jeehyeong Kim, Victor Youdom Kemmoe

, Md. Zakirul Alam Bhuiyan, Sunghyun Cho, Junggab Son:
SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns. 1-9 - Junfeng Tian, Yongqing Tian:

A Model Based on Program Slice and Deep Learning for Software Defect Prediction. 1-6 - Shahryar Afzal, Jiasi Chen

, K. K. Ramakrishnan:
Viewing the 360° Future: Trade-Off Between User Field-of-View Prediction, Network Bandwidth, and Delay. 1-11 - Massimo La Morgia

, Alessandro Mei
, Francesco Sassi
, Julinda Stefa:
Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations. 1-9 - Léo Mendiboure

, Mohamed Aymen Chalouf, Francine Krief:
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks. 1-11 - Xiaomei Zhang:

PeerCould: Enhancing Mobile Cloud with Social-Aware Device-to-Device Offloading. 1-7 - Artur Hlobaz

:
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash Function. 1-6 - Haipeng Dai

, Xiaoyu Wang, Lijie Xu, Chao Dong, Qian Liu, Lei Meng, Guihai Chen
:
Area Charging for Wireless Rechargeable Sensors. 1-9 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:

Joint Optimization Of Routing and Flexible Ethernet Assignment In Multi-layer Multi-domain Networks. 1-9 - Vineet Naique Dhaimodker, Rahul Desai, S. Mini, Deepak K. Tosh

:
Quality-driven Energy Optimization in Internet of Things. 1-8 - Dolly Sapra

, Andy D. Pimentel
:
Deep Learning Model Reuse and Composition in Knowledge Centric Networking. 1-11 - Joaquin Chung

, Mainak Adhikari, Satish Narayana Srirama, Eun-Sung Jung, Rajkumar Kettimuthu:
Resource Management for Processing Wide Area Data Streams on Supercomputers. 1-6 - Youssef Khazbak, Tianxiang Tan, Guohong Cao:

MLGuard: Mitigating Poisoning Attacks in Privacy Preserving Distributed Collaborative Learning. 1-9 - Dilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:

Modelling DoS Attacks & Interoperability in the Smart Grid. 1-6 - Bingyi Liu, Chunli Yu, Weizhen Han, Dongyao Jia, Jianping Wang, Enshu Wang, Kejie Lu:

Towards Reliable Message Dissemination for Multiple Cooperative Drivings: A Hybrid Approach. 1-9 - Zhuo Li, Jiannong Cao, Xiulong Liu, Jiuwu Zhang, Haoyuan Hu, Didi Yao:

A Self-Adaptive Bluetooth Indoor Localization System using LSTM-based Distance Estimator. 1-9 - Shangyue Zhu, Alamin Mohammed, Aaron Striegel:

A Frame-Aggregation-Based Approach for Link Congestion Prediction in WiFi Video Streaming. 1-8 - Christopher González, Bin Tang:

FT-VMP: Fault-Tolerant Virtual Machine Placement in Cloud Data Centers. 1-9 - Morihiko Tamai, Akio Hasegawa, Hiroyuki Yokoyama:

Comprehensive Visualization of Physical and MAC Layer Data for Wireless Network Monitoring. 1-2 - Rahil Gandotra, Levi Perigo:

Comparing Energy Efficiencies of SDN Hardware Based on Forwarding Configurations. 1-7 - Wei Liu, Eun Kyo Park, Udo R. Krieger, S. S. Zhu:

Smart e-Health Security and Safety Monitoring with Machine Learning Services. 1-6 - Pradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof

, Marcos Augusto M. Vieira, Kevin Chan, Ramesh Govindan, Gaurav S. Sukhatme, Paulo Tabuada
, Gunjan Verma:
Rapid Top-Down Synthesis of Large-Scale IoT Networks. 1-9 - Weibin Meng, Ying Liu, Federico Zaiter, Shenglin Zhang

, Yihao Chen, Yuzhe Zhang, Yichen Zhu
, En Wang, Ruizhi Zhang, Shimin Tao, Dian Yang, Rong Zhou, Dan Pei
:
LogParse: Making Log Parsing Adaptive through Word Classification. 1-9 - Xiang Shi, Lin Wang, Fa Zhang, Biyu Zhou, Zhiyong Liu:

PStream: Priority-Based Stream Scheduling for Heterogeneous Paths in Multipath-QUIC. 1-8 - Faheed A. F. Alenezi

, Sejun Song, Baek-Young Choi
, Haymanot Gebre-Amlak:
TaDPole: Traffic-aware Discovery Protocol for Software-Defined Wireless and Mobile Networks. 1-9 - Shuhui Yang, Xuefeng Xi, Wei Li:

QoS Aware Task Management Strategies for Mobile Crowdsensing Applications. 1-9 - Oluwamayowa Ade Adeleke, Nicholas Bastin, Deniz Gurkan:

Network Testing Using a Novel Framework for Traffic Modeling and Generation*. 1-2 - Zengyang Gong, Bo Du

, Zhidan Liu, Wei Zeng
, Pascal Perez
, Kaishun Wu
:
SD-seq2seq : A Deep Learning Model for Bus Bunching Prediction Based on Smart Card Data. 1-9 - Wenjun Fan, Sang-Yoon Chang, Shawn Emery, Xiaobo Zhou:

Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing. 1-9 - Alem Fitwi, Yu Chen:

Privacy-Preserving Selective Video Surveillance. 1-10 - Yunqi Guo, Zhaowei Tan, Songwu Lu:

Towards Model-Centric Security for IoT Systems. 1-6 - Jing Zhang, Chao Yang, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma:

A Preliminary Analysis of Password Guessing Algorithm. 1-9 - Dapeng Qu, Shijun Qu, Yue Yang, Haiying Shen:

An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDNs. 1-9 - Alexander Gerasimov, Vitaly A. Antonenko:

Slicenomics: How to Provide Cost-Based Intra and Inter Slice Resource Management? 1-6 - Desta Haileselassie Hagos, Martin Løland, Anis Yazidi, Øivind Kure, Paal E. Engelstad:

Advanced Passive Operating System Fingerprinting Using Machine Learning and Deep Learning. 1-11 - Liang Dong, Jingao Xu, Guoxuan Chi

, Danyang Li, Xinglin Zhang, Jianbo Li, Qiang Ma, Zheng Yang:
Enabling Surveillance Cameras to Navigate. 1-10 - Cong Shi, Xiaonan Guo, Ting Yu, Yingying Chen, Yucheng Xie, Jian Liu:

Mobile Device Usage Recommendation based on User Context Inference Using Embedded Sensors. 1-9 - Huijie Li, Xin Li, Youyou Lu, Xiaolin Qin:

An Experimental Study on Data Recovery Performance Improvement for HDFS with NVM. 1-9 - Zhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen:

An Efficient Detection Approach for LDoS Attack based on NCS-SVM Algorithm. 1-9 - Huanle Zhang, Bo Han, Prasant Mohapatra:

Toward Mobile 3D Vision. 1-8 - Rahil Gandotra, Levi Perigo:

NFEH: An SDN Framework for Containerized Network Function-enabled End Hosts. 1-6 - Hao Cai, Tilman Wolf:

Implementation of Network Source Authentication and Path Validation Using Orthogonal Sequences. 1-7 - Pandey Pandey, Piyush Tiwary

, Sudhir Kumar, Sajal K. Das:
Residual Neural Networks for Heterogeneous Smart Device Localization in IoT Networks. 1-9 - Yao Wang, Zhaowei Wang, Zejun Xie, Nengwen Zhao, Junjie Chen, Wenchi Zhang, Kaixin Sui, Dan Pei

:
Practical and White-Box Anomaly Detection through Unsupervised and Active Learning. 1-9 - Dongxiao Deng, Wenbi Rao, Bingyi Liu, Dongyao Jia, Yang Sheng, Jianping Wang, Shengwu Xiong:

TA-MAC: A Traffic-Aware TDMA MAC Protocol for Safety Message Dissemination in MEC-assisted VANETs. 1-9 - Weibin Meng, Ying Liu, Yuheng Huang, Shenglin Zhang

, Federico Zaiter, Bingjin Chen, Dan Pei
:
A Semantic-aware Representation Framework for Online Log Analysis. 1-7 - Floriano De Rango, Salvatore Amelio:

Geographic and Energy aware Epidemic Strategy for Mobile Opportunistic DTN. 1-8 - Moh Sabbir Saadat, Sanjib Sur, Srihari Nelakuditi, Parmesh Ramanathan:

MilliCam: Hand-held Millimeter-Wave Imaging. 1-9 - Hai Liu, Wai Kit Wong, Shujin Ye, Chris Yu-Tak Ma:

Joint Energy Optimization of Cooling Systems and Virtual Machine Consolidation in Data Centers. 1-8 - Yan Wang

, Tianming Zhao, Fatemeh Tahmasbi, Jerry Cheng, Yingying Chen, Jiadi Yu:
Driver Identification Leveraging Single-turn Behaviors via Mobile Devices. 1-9 - Wuji Liu, Chase Q. Wu, Qianwen Ye, Aiqin Hou, Wei Shen:

Performance Modeling and Prediction of Big Data Workflows: An Exploratory Analysis. 1-10 - Qian Li, Jiao Zhang, Tian Pan

, Tao Huang
, Yunjie Liu:
Data-driven Routing Optimization based on Programmable Data Plane. 1-9 - Yuan Zhuang, Xiaohui Wei, Hongliang Li, Mingkai Hou, Yundi Wang:

Reducing Fault-tolerant Overhead for Distributed Stream Processing with Approximate Backup. 1-9 - Maria Riaz, Juha-Matti Tilli

, Raimo Kantola:
Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private Networks. 1-11 - Wenxin Li, Ness B. Shroff:

On the Asymptotic Optimality of Work-Conserving Disciplines in Completion Time Minimization. 1-9 - Nuno Afonso, Manuel Bravo, Luís Rodrigues:

Combining High Throughput and Low Migration Latency for Consistent Data Storage on the Edge. 1-11 - Yue Xu, Jingwen Zhang, Hao Zhou, Xiaoyan Wang, Zhi Liu

, Yusheng Ji:
ecUWB: A Energy-Centric Communication Scheme for Unstable WiFi Based Backscatter Systems : (Invited Paper). 1-9 - Ning Wang, Bo Wang, Taoying Liu, Wei Li, Shuhui Yang:

A Middleware Approach to Synchronize Transaction Data to Blockchain. 1-8 - Weihe Li, Jiawei Huang, Shaojun Zou, Zhuoran Liu, Qichen Su

, Xuxing Chen, Jianxin Wang:
Pipeline-Based Chunk Scheduling to Improve ABR Performance in DASH System. 1-9 - Ce Chi, Kaixuan Ji, Avinab Marahatta

, Fa Zhang, Youshi Wang, Zhiyong Liu:
An Energy Saving-Oriented Incentive Mechanism in Colocation Data Centers. 1-6 - Ruike Li, Shichong Tan, Chensi Wu, Xudong Cao, Haitao He, Wenjie Wang:

IFVD: Design of Intelligent Fusion Framework for Vulnerability Data Based on Text Measures. 1-6 - Anatolij Zubow, Suzan Bayhan, Piotr Gawlowicz, Falko Dressler:

DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced Spectrum Sensing. 1-8 - Jonathan Takeshita, Ryan Karl, Taeho Jung:

Secure Single-Server Nearly-Identical Image Deduplication. 1-6 - Jiechao Gao

, Haoyu Wang, Haiying Shen:
Machine Learning Based Workload Prediction in Cloud Computing. 1-9 - Dingjie Sheng, Mingjun Xiao, An Liu, Xiang Zou, Baoyi An, Sheng Zhang:

CPchain: A Copyright-Preserving Crowdsourcing Data Trading Framework Based on Blockchain. 1-9 - Shouxu Lin, Weifa Liang

, Jing Li
:
Reliability-Aware Service Function Chain Provisioning in Mobile Edge-Cloud Networks. 1-9 - Hongliang Li, Zhewen Xu

, Fangyu Tang, Xiaohui Wei, Zhaohui Ding:
CPSA: A Coordinated Process Scheduling Algorithm for Coupled Earth System Model. 1-9 - Yifan Zhang, Xinglin Zhang:

BundleSense: A Task-Bundling-Based Incentive Mechanism for Mobile Crowd Sensings. 1-9 - Pedro Pablo Garrido Abenza

, Manuel P. Malumbres
, Pablo Piñol Peral
, Otoniel López Granado
:
Evaluating the Use of QoS for Video Delivery in Vehicular Networks. 1-9 - Dheeraj Kotagiri, Koichi Nihei, Tansheng Li:

Multi-User Distributed Spectrum Access Method for 802.11ax Stations. 1-2 - Kai Jiang, Huan Zhou, Dawei Li

, Xuxun Liu, Shouzhi Xu:
A Q-learning based Method for Energy-Efficient Computation Offloading in Mobile Edge Computing. 1-7 - Hongpeng Guo

, Tianyuan Liu, King-Shan Lui, Claudiu Danilov, Klara Nahrstedt:
Secure Broadcast Protocol for Unmanned Aerial Vehicle Swarms. 1-9 - Yoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama:

A Low Latency Transmission Control for Multi-link WLAN. 1-6 - Jingsheng Gao, Shaojing Fu, Yuchuan Luo, Tao Xie:

Location Privacy-Preserving Truth Discovery in Mobile Crowd Sensing. 1-9 - Jiale Chen, Jiale Zhang, Yanchao Zhao, Hao Han, Kun Zhu, Bing Chen:

Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning. 1-9 - Benjamin Campbell:

Asynchronous Distributed Topology Control for Signature Management in Mobile Networks. 1-8 - Christian Meurisch, Dennis Werner, Florian Giger, Bekir Bayrak, Max Mühlhäuser:

PDSProxy++: Proactive Proxy Deployment for Confidential Ad-hoc Personalization of AI Services. 1-9 - P. Sergio Rivera, Zongming Fei, James Griffioen:

POLANCO: Enforcing Natural Language Network Policies. 1-9 - Yull Kyu Han, Young Bok Choi:

Human Action Recognition for Disaster Detection. 1-2 - Lei Zhang, Kewei Zhu, Junchen Pan, Hang Shi, Yong Jiang, Yong Cui:

Reinforcement Learning Based Congestion Control in a Real Environment. 1-9 - Yu-Yun Tseng, Po-Min Hsu, Jen-Jee Chen, Yu-Chee Tseng:

Computer Vision-Assisted Instant Alerts in 5G. 1-9 - Dawei Li

, Chigozie Asikaburu, Boxiang Dong, Huan Zhou, Sadoon Azizi:
Towards Optimal System Deployment for Edge Computing: A Preliminary Study. 1-6 - Nitin Shivaraman, Saravanan Ramanathan

, Shanker Shreejith
, Arvind Easwaran
, Sebastian Steinhorst
:
DeCoRIC: Decentralized Connected Resilient IoT Clustering. 1-10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














