


default search action
43rd IPCCC 2024: Orlando, FL, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2024, Orlando, FL, USA, November 22-24, 2024. IEEE 2024, ISBN 979-8-3503-6794-2

- Md Majedul Islam

, Jing Selena He:
A Review on Quantum Machine Learning in Different Computer Vision Fields. 1-2 - Mark Allison

:
Towards A Computational Model for Learning Affective Empathy Responses in Robotic System. 1-7 - James Mariani, Li Xiao:

Computation Caching in Mobile Convolutional Neural Network Inference. 1-8 - Jui Mhatre, Minh Nguyen, Ahyoung Lee, Hoseon Lee:

Experimental Analysis of LoRaWAN for Optimizing Water Quality Monitoring with Reinforcement Learning-Driven Scheduling. 1-6 - Andrew Quijano

, Spyros T. Halkidis, Kevin Gallagher, Kemal Akkaya, Nikolaos Samaras:
Enhanced Outsourced and Secure Inference for Tall Sparse Decision Trees. 1-6 - Jiaxing Guo, Lin He, Ying Liu:

Overlooked Backdoors: Investigating 6to4 Tunnel Nodes and Their Exploitation in the Wild. 1-8 - Rohit Sahu, Vishal Deep, Henry Duwe

:
HANNA: Harvesting-Aware Neural Network Architecture Search for Batteryless Intermittent Devices. 1-10 - Yong Yuan, Ziling Wei, Lin Liu, Shuhui Chen, Jinshu Su:

AST-Trans: Detecting Web Tracking using Transformer-based Deep Learning with Abstract Syntax Tree. 1-7 - Xinyue Xu, Baosheng Wang, Qianqian Xing, Xiaofeng Wang:

CART: Concurrent Asynchronous Ratchet Tree for Group Messaging. 1-9 - Ziqian Chen, Wei Xia, Zhen Li, Gang Xiong, Gaopeng Gou:

RecoSelector: Cost-Sensitive Feature Selection for Network Intrusion Detection in Resource-Constrained Internet of Things. 1-10 - Xingchen Wei

, Laixian Peng, Renhui Xu, Hai Wang:
Learning-Empowered Resource Allocation in UxNB-Enabled Sliced HetECNs. 1-6 - Ying Zhou, Mingzhen Wu, Fei Song:

Correlation Analysis for Exploring Large-Scale Latency Variability in WANs. 1-6 - Bo Yu, Qihong Song, Chengnuo Cai:

Large Language Model guided State Selection Approach for Fuzzing Network Protocol. 1-6 - Mohammad Al-Tahat, Strahinja Trecakov, Jonathan E. Cook:

Statistical and Shapelet Analysis of HPC Application Performance Using Time-Series Heartbeat Data. 1-9 - Xinxuan Hang, Quan Zheng, Wenjing Jing, Qisheng Su, Feng Yang, Xiaobin Tan:

Adaptive Cache Optimization Integrating Spatiotemporal Analysis and Sliding Modules. 1-8 - Niladri Mondal, Mario Niggemeyer, Simon Welzel, Florian Klingler:

DecMEN: Scalable Measurement and Impairment Framework for Network Characterization in 5G(+). 1-6 - Mehmed Kerem Uludag, Murat Karakus, Evrim Guler, Suleyman Uludag

:
Adaptive Mitigation of Blackhole Attacks in Blockchain-Enhanced Software Defined Networks. 1-8 - Simon Welzel, Florian Klingler:

Bad Neighbors? On the Impact of IEEE 802.11p and Cellular 5G on Vehicular Neighbor Sets. 1-2 - Sonali Keshava Murthy Naik, Mea Wang, Diwakar Krishnamurthy:

TYLE: Tile-based Dynamic Quality Enhancement for 360-degree Video Streaming. 1-8 - Lin Liu, Ziling Wei, Shuhui Chen, Zixuan Dong, Jinshu Su:

FingerMamba: Mamba-based Efficient Multi-tab Website Fingerprinting. 1-9 - Han Li, Ke Lyu, Owen Dossett

, Xianglong Feng:
A Multimodal Method for Semi-Biometric Information Based User Identification in AR and VR Applications. 1-7 - Jussif J. Abularach Arnez

, Isaac Barros Gomes, Fabrício Falcáo de Souza Oliveira, Lucas Cavalcante Tribuzy, Caio Pedrosa Galvao, Jessica Da Silva Gomes:
Analysis of Intermediate Mean Opinion Score (MOS) and QoS in a High Definition Voice Call Conference in Mobile Networks. 1-2 - Zhaowen Chen, Mingze Zhang, Caleb Mostyn, Honglu Jiang

, Xianglong Feng:
Curse to Blessing: Leveraging Model Inversion Attacks to Detect Backdoor Attacks in Federated Learning. 1-9 - Ilke Kutlu, Quentin Goss, Tahir Cetin Akinci, Mustafa Ilhan Akbas

:
Formal Modeling of Road Network-Based Autonomous Vehicle Validation Scenarios With Intersections and Pedestrians. 1-6 - Tao Tian:

SndGLM-SA: A Social Network Debate Text Generation Model Based on Sentiment Analysis. 1-6 - David Monschein, Oliver P. Waldhorst:

HEJet: A Framework for Efficient Machine Learning Inference with Homomorphic Encryption. 1-10 - Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson:

The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection. 1-8 - Chenming Chang

, Jiawei Li, Yucheng Kang, Yupeng Chen, Yi Zhang:
Resd: High-Performance RDMA-enabled Control Plane for NVMe Shared-Disk Cluster. 1-7 - Yacoub Hanna

, Diana Pineda, Maryna Veksler, Manish Paudel, Kemal Akkaya, Mila Anastasova, Reza Azarderakhsh:
Integrating Post-Quantum TLS into the Control Plane of 5G Networks. 1-8 - Akito Yamamoto

, Tetsuo Shibuya:
Differentially Private Selection using Smooth Sensitivity. 1-10 - Jiawei Huang, Qi Liang, Jing Shao, Qile Wang, Yilin Zhao, Hui Li, Sitan Li, Shu Lin:

P2Sketch: Finding Persistent Items in Data Streams Based on Periodic Arrival. 1-8 - Chiyu Chen, Yuliang Lu, Guozheng Yang, Yi Xie, Shasha Guo:

ZBanner: Fast Stateless Scanning Capable of Obtaining Responses over TCP. 1-6 - Zekun Zhang, Lujie Zhong, Xiang Ji:

FlexMRS: Multi-Objective Optimization for Diverse Application Requirements in MPTCP Scheduling. 1-2 - Manh V. Nguyen, Liang Zhao, Bobin Deng, William Severa, Honghui Xu, Shaoen Wu:

The Robustness of Spiking Neural Networks in Communication and its Application towards Network Efficiency in Federated Learning. 1-7 - Xuetao Liu, Jing Shao, Sitan Li, Yilin Zhao, Jiawei Huang:

PIB Sketch: Accurately Tracking Persistent and Infrequent Flows with Bursty Characteristic. 1-8 - Zhenchao Yan, Songlin He, Chase Wu, Aiqin Hou:

Optimized Deliverer Selection in Blockchain-Based P2P Content Delivery Networks. 1-8 - Kuai Xu, Feng Wang, Mitchell Hoikka:

Less is More: Exploring Sampled Twitter Data Steams for Pandemic Surveillance and Monitoring. 1-6 - Mingxuan Li, Jinbao Li, Yingchun Cui:

A Dexterous Hybrid Attention Transformer For MRI Super-resolution Of Brain Tumors. 1-8 - Jiasheng Liang, Siyu Zhang, Yong Deng:

Optimization of Heterogeneous Coded Distributed Computing with Nonuniform Input File Sizes. 1-2 - Robin Laidig, Jona Herrmann, David Augustat, Frank Dürr, Kurt Rothermel:

Combining Dynamic Deterministic Latency Bounds and Networked Control Systems. 1-9 - J. J. Garcia-Luna-Aceves, Morteza Moghaddassian, Charles Hsieh:

Spreading Computations for Loop-Free Multipath Routing in Computer Networks. 1-10 - Meng Zeng, Yujia Zhu, Baiyang Li, Yuedong Zhang, Qingyun Liu, Binxing Fang:

Failed Yet Stored: A First Look at DNS Negative Caching. 1-10 - Lamya Benaddi, Charaf Ouaddi

, Abdeslam Jakimi, Rachid Saadane, Brahim Ouchao, Mohamed Rahouti, Abdelatif Hafid, Diogo Oliveira:
An Analytical Study on the Evolution and Impact of Chatbots in Tourism Over the Past Decade. 1-6 - Shuo Zhang, Luoyao Hao, Henning Schulzrinne:

Policy Enforcement for IoT: Complexities and Emerging Solutions. 1-2 - Anice Kiarra Thompson, Dev D. Patel, M. Ilhan Akbas:

Formulating a Comprehensive Cybersecurity Framework for Uncrewed Aerial Vehicles. 1-6 - Shelby Williams, Prosen Kirtonia, Kasem Khalil, Magdy A. Bayoumi:

Digital-Twin Architecture of a Spiking Neuron using Carbon Nanotube Field Effect Transistors. 1-6 - James Agresto, Zhuojun Duan, Mace Bentley, Tobias Gerken, Dudley Bonsal:

Spatiotemporal-DBSCAN: A Density-Based Clustering Method for Analyzing Spatiotemporal Ground-lightning Dataset. 1-2 - Mengxia Ren, Chuan Yue:

Content Security Policy Deployment Issues Related to Third-party Scripts among Builder-generated Websites and Other Websites. 1-10 - Guangzhen Yao

, Long Zhang, Sandong Zhu, Miao Qi:
DP-Prune: Global Optimal Strategy for Retraining-Free Pruning of Transformer Models. 1-6 - Shuailou Li, Yu Wen, Zhaoyang Wang, Wenbo Wang, Lisong Zhang, Dan Meng:

StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy. 1-10 - Haikuo Li, Gang Xiong, Chengshang Hou, Gaopeng Gou, Ziqian Chen, Zhen Li:

Smart Contract Vulnerability Detection Based on AST-Augmented Heterogeneous Graphs. 1-10 - Ye Xia:

Optimal Sequencing for a Class of Task Offloading Problems in Edge-Cloud Computing. 1-8 - Shiqi Zhao, Xiaohong Huang, Pei Zhang:

Locating the Root Cause of Large-scale BGP Anomaly with Routing Dependence. 1-7 - Asad Waqar Malik, Samee U. Khan:

Dynamic Task Offloading in Connected Vehicles: Leveraging a Graph Neural Networks Approach for Multi-hop Search. 1-8 - Md. Romyull Islam, Nobel Dhar, Bobin Deng, Tu N. Nguyen, Selena He, Kun Suo:

Characterizing and Understanding the Performance of Small Language Models on Edge Devices. 1-10 - Nobel Dhar, Bobin Deng, Md. Romyull Islam, Kazi Fahim Ahmad Nasif, Liang Zhao, Kun Suo:

Activation Sparsity Opportunities for Compressing General Large Language Models. 1-9 - Haoran Jiang, Yehua Wei, Wenjia Li, Jiangwei Li:

Lightweight Secure Communication Scheme Based on PUF for In-vehicle Controller Area Networks. 1-8 - Abdelatif Hafid, Maad Ebrahim, Mohamed Rahouti, Diogo Oliveira:

Cryptocurrency Price Forecasting Using XGBoost Regressor and Technical Indicators. 1-6 - Yikai Zhao, Yuanpeng Li, Zicang Xu, Tong Yang, Kaicheng Yang, Li Chen, Xin Yao, Gong Zhang:

Fat-B+Tree: Fast B+tree Indexing with In-Network Memory. 1-10 - Yunlan Wang, Qing Wang, Tianhai Zhao, YongKuo Hu, Jianhua Gu, Zhengxiong Hou:

Stochastic Network Calculus Based Quality of Service Guarantee for Multi-class Traffic. 1-9 - Tao Yang, Wang Yang, Yanbo Wang, Lihuan Hui, Jianwei Yao:

SARP: Service-Aware Routing Protocol in Task-Oriented FANET. 1-8 - Alireza Famili, Shihua Sun, Tolga O. Atalay, Angelos Stavrou:

Precision Tracking in Geofencing Systems using Deep Reinforcement Learning. 1-10 - Fei Li:

Algorithms for the Generalized Network Construction Problem. 1-6 - DongJin Lee, Seongsu Park, BumJun Lee:

Dynamic Traffic Load Rebalancing for Hardware-accelerated 6G UPF Resilient Architecture. 1-7 - Heeyun Kim, Wei Xiong Toh, Luoyao Hao, Henning Schulzrinne:

Wital: A Whitelist-Based IoT Firewall for Mitigating Device Exploitation. 1-2 - Zefu Wang, Zhenzhe Zheng, Fan Wu:

CAUDA: Cloud-assisted Active Unsupervised Domain Adaptation for On-device Learning. 1-7 - Jiewen Liu, Zhiyuan Peng, Dongkuan Xu

, Yuchen Liu
:
Revolutionizing Wireless Modeling and Simulation with Network-Oriented LLMs. 1-8 - Dinghua Zhao, Juntao Zhou, Dian Ding, Yu Lu, Yijie Li, Hang Yang, Yi-Chao Chen, Guangtao Xue:

DASIV: Directional Acoustic Sensing based Intelligent Vehicle Interaction System. 1-8 - Haizhang Zhu, Zhongyi Zhang, Zhou Zhou, Chengwei Peng, Hongfei Zhang, Shu Li, Rong Yang, Qingyun Liu:

P4-FILB: Stateless Load Balancing Mechanism in Firewall and IPv6 Environment with P4. 1-8 - Xiao Yue, Guangzhi Qu:

LSAFE: a Lightweight Static Analysis Framework for binary Executables. 1-6 - Visvam Rajesh, Chase Q. Wu:

An Extension of Pathfinding Algorithms for Randomly Determined Speeds. 1-8 - Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy:

Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














