


default search action
ITNAC 2017: Melbourne, Australia
- 27th International Telecommunication Networks and Applications Conference, ITNAC 2017, Melbourne, Australia, November 22-24, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6796-1

- Sung-Yeon Kim, Xavier De Foy, Alex Reznik:

Practical service allocation in mobile edge computing systems. 1-6 - Franciscus X. A. Wibowo, Mark A. Gregory:

Updating guaranteed bandwidth in multi-domain software defined networks. 1-6 - Bahaa Al-Musawi

, Philip Branch, Grenville Armitage:
Recurrence behaviour of BGP traffic. 1-7 - Wojtek Burakowski, Maciek Sosnowski

:
On cycle based schedulers with time alternating priorities. 1-6 - Jerzy Konorski

:
Fake VIP attacks and their mitigation via double-blind reputation. 1-8 - Takoua Ghariani, Badii Jouaber:

Green topological potential-based optimization for power and spectral efficiency tradeoff in LTE HetNets. 1-6 - Xipei Luo, Jing Wang, Qiwei Shen, Jingyu Wang

, Qi Qi:
User behavior analysis based on user interest by web log mining. 1-5 - Yuki Arikawa, Takeshi Sakamoto, Shunji Kimura

:
Hardware accelerator for coordinated radioresource scheduling in 5G ultra-high-density distributed antenna systems. 1-6 - Ryota Kimoto, Yusuke Kozawa, Yohtaro Umeda, Hiromasa Habuchi:

Inverse pulse position modulation schemes for simultaneous visible light wireless information and power transfer. 1-6 - Rashmi Munjal, William Liu, Xue Jun Li

, Jairo A. Gutiérrez
, Marija Furdek
:
Sustainable massive data dissemination by using software defined connectivity approach. 1-6 - Ash Bellett, Gayathri Kongara:

Optimisation of relay-assisted wireless systems in quasi-static environments using ray tracing. 1-6 - Frank T. H. den Hartog

, Alessandro Raschellà, Faycal Bouhafs
, Pia Kempker, Bert Boltjes, Mir Seyedebrahimi
:
A pathway to solving the Wi-Fi tragedy of the commons in apartment blocks. 1-6 - María E. Villapol, William Liu, Jairo A. Gutiérrez

, Luca Chiaraviglio, Arjuna Sathiaseelan, Jinsong Wu
, Antoine B. Bagula
, Junaid Qadir
, Jian Song, Wenjun Zhang
, Mark A. Gregory, Ji Wu:
Connecting the unconnected 10% of New Zealanders by 2025: Is a MahiTahi approach possible? 1-7 - Tomohiro Nishida, Masahiro Sasabe, Shoji Kasahara

:
Maximizing communication opportunity for collaborative spectrum sensing in cognitive radio networks. 1-6 - Ting Ma, Feng Hu, Maode Ma:

Fast and efficient physical layer authentication for 5G HetNet handover. 1-3 - Thavamaran Kanesan

, H. M. Hizan, S. K. Sadon, Gee-Kung Chang:
Experimental investigation of cascaded SMF-MMF-dithering technique for nonlinear compensation in fiber-wireless system. 1-3 - Khalid Hasan, Nazmus S. Nafi

, Khandakar Ahmed
, Mark A. Gregory, Edward Mutafungwa:
Use of coordinated multipoint transmission /reception for enhanced backhauling in nomadic relay. 1-6 - Rajan Kadel

, Khandakar Ahmed
, Anuj Nepal:
Adaptive error control code implementation framework for software defined wireless sensor network (SDWSN). 1-6 - Da-Ren Chen

, Ping-Feng Wang, Wei-Min Chiu:
On the study of interference mitigation and QoS protocol for wireless body area networks using real-time scheduling. 1-6 - Qinwen Hu, Muhammad Rizwan Asghar

, Nevil Brownlee:
Evaluating network intrusion detection systems for high-speed networks. 1-6 - Oscar Felipe Saenz de Miera Berglind:

Competition, regulation and institutional framework in telecommunications, implications for NGN in Mexico. 1-6 - Xiaojie Liu, Ulrich Speidel:

Can observed entropy detect congestion in Ad-Hoc networks? 1-6 - Kodai Satake, Tatsuya Otoshi

, Yuichi Ohsita, Masayuki Murata:
Traffic engineering cooperating with traffic monitoring for the case with incomplete information. 1-7 - Asmaa Elsaeidy, Ibrahim Elgendi

, Kumudu S. Munasinghe
, Dharmendra Sharma
, Abbas Jamalipour
:
A smart city cyber security platform for narrowband networks. 1-6 - Khandakar Tanvir Ahmed, Md. Nabid Hasan, Md. Farhad Hossain

, Kumudu S. Munasinghe
, Abbas Jamalipour
:
Demand management using utility based real time pricing for smart grid with a new cost function. 1-6 - Soo-Yeon Lee, Sa-rang Wi, Eunil Seo, Jun-Kwon Jung, Tai-Myoung Chung:

ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach. 1-6 - Abdullah Omar Arafat, Nazmus S. Nafi

, Mark A. Gregory:
Priority based resource allocation for LTE-A femtocell networks. 1-6 - Mohammad Reza Nosouhi

, Youyang Qu, Shui Yu
, Yong Xiang, Damien Manuel:
Distance-based location privacy protection in social networks. 1-6 - Andrew Curtis-Black, Matthias Galster, Andreas Willig:

High-level concepts for northbound APIs: An interview study. 1-8 - Ziwei Wang, Xiuhua Jiang:

A QoE-driven optimization strategy for dynamic adaptive streaming over HTTP. 1-7 - Mehdi Malboubi:

Optimal-coherent and adaptive software defined inference of network traffics (OCcASION). 1-7 - Thi Minh Chau Nguyen, Doan B. Hoang, Thanh Dat Dang:

Toward a programmable software-defined IoT architecture for sensor service provision on demand. 1-6 - Ammar Moufak Dukhan

, Dhammika Jayalath
, Bouchra Senadji
, Jasmine Banks
:
A multi-level hybrid chaotic system with a novel damping approach to achieve variable rates. 1-6 - Nusrat Fatema, Yong Xiang, Iynkaran Natgunanathan:

Analysis of a semi blind pilot decontamination method in massive MIMO. 1-6 - Talal Alharbi, Siamak Layeghy

, Marius Portmann:
Experimental evaluation of the impact of DoS attacks in SDN. 1-6 - Takashi Tokunaga, Hiromasa Habuchi, Yusuke Kozawa, Ran Sun:

SCDMA capability of high-density code-shift keying using dual MPOMs in optical-wireless channel. 1-6 - Mohammad Javad Shamani, Saeid Rezaei, Guillaume Jourjon, Aruna Seneviratne:

MPTCP energy enhancement paradox: A Q-learning approach. 1-4 - Lincy Elizebeth Jim

, Mark A. Gregory:
Pain modelling in an artificial immune system based MANET. 1-6 - David Airehrour

, Jairo A. Gutiérrez
, Sayan Kumar Ray
:
A testbed implementation of a trust-aware RPL routing protocol. 1-6 - Kaori Iwata, Yoshihiro Ito:

Proposal and development of TCP multi-pathization method with SDN by IoT devices. 1-6 - Ran Sun, Hiromasa Habuchi, Yusuke Kozawa:

Proposal of optical wireless turbo coded APPM system. 1-5 - Kin-Ping Hui, Damien Phillips, Asanka Kekirigoda:

Beyond line-of-sight range extension in contested environments with OPAL using autonomous unmanned aerial vehicles. 1-5 - H. Joe Steinhauer, Tove Helldin, Alexander Karlsson, Gunnar Mathiason

:
Topic modeling for situation understanding in telecommunication networks. 1-6 - Xiaoyu Ma, Xiuhua Jiang:

PA VIF: A passive aggressive visual information fidelity for full reference image quality assessment. 1-6 - Amirhossein Moravejosharieh, Kourosh Ahmadi:

Experimental evaluation of mutual interference in co-located IEEE 802.15.4-based wireless body sensor networks. 1-6 - Kwan-Wu Chin

:
On energy and data delivery in wireless local area networks with RF charging nodes. 1-7 - D. Battulga, J. Ankhzaya, B. Ankhbayar, U. Ganbayar, S. H. Sodbileg:

Handover management for distributed mobility management in SDN-based mobile networks. 1-6 - Mohammed Al-Zobbi

, Seyed A. Shahrestani
, Chun Ruan:
Towards optimal sensitivity-based anonymization for big data. 1-6 - Luca Chiaraviglio, William Liu, Jairo A. Gutiérrez

, Nicola Blefari-Melazzi:
Optimal pricing strategy for 5G in rural areas with unmanned aerial vehicles and large cells. 1-7 - Salman Naseer, William Liu, Nurul I. Sarkar

, Peter Han Joo Chong, Edmund M.-K. Lai, Rangarao Venkatesha Prasad
:
A sustainable vehicular based energy efficient data dissemination approach. 1-8 - M. T. A. Rana, Rein Vesilo, Ahsan Saadat:

Antenna selection for massive MIMO Kronecker channel models using non-central principal component analysis. 1-7 - Craig Walker, Adnan Al-Anbuky

:
LED-WSN: Light weight edge computed dynamic wireless sensor network routing protocol. 1-8 - Waleed Ejaz

, Muhammad Naeem
, Muhammad Rashid Ramzan, Farkhund Iqbal
, Alagan Anpalagan
:
Charging infrastructure placement for electric vehicles: An optimization prospective. 1-6 - Phillip Smith

, Robert A. Hunjet, Aldeida Aleti
, Jan Carlo Barca:
Adaptive data transfer methods via policy evolution for UAV swarms. 1-8 - Chung-Ming Huang, Duy-Tuan Dao, Ping-Yi Lu:

A credit-aware clustering scheme for the proximate sharing of geo data downloading. 1-6 - Yusuke Ito, Kouji Ohuchi:

Performance of multilevel differential polarization shift keying with estimation of inclined polarization axes over atmospheric turbulence channel. 1-6 - Tyler Nicholas Edward Steane, Peter J. Radcliffe:

A universal iot joining protocol for DIY applications. 1-3 - Yinjun Tu, Yudong Lei, Hanxuan Li, Yifu Wang, Yifeng Chen:

An augmented smart home system based on the internet of people concept. 1-3 - Samiru Gayan, Rajitha Senanayake

, Jamie S. Evans:
On the symbol error probability for QPSK with quantized observations. 1-6 - Kubra Uludag, Ömer Korçak:

Energy and rate modeling of data download over LTE with respect to received signal characteristics. 1-6 - Ming Xiang, William Liu, Quan Bai, Adnan Al-Anbuky

, Jinsong Wu
, Arjuna Sathiaseelan:
NTaaS: Network trustworthiness as a service. 1-6 - Ying-Dar Lin:

Keynote topic: Network cloudification: SDN-NFV and 5G-MEC with edge and fog computing. 1-8 - Anees Al-Najjar, Samuel Teed, Jadwiga Indulska

, Marius Portmann
:
Flow-based load balancing of web traffic using OpenFlow. 1-6 - Md. Rajib Hasan, Hamid Gholamhosseini

, Nurul I. Sarkar
:
A new ensemble classifier for multivariate medical data. 1-6 - Qin Xin, Yan Xia:

Latency optimal broadcasting in noisy wireless mesh networks. 1-7 - Ali Rafiei, Mehran Abolhasan

, Daniel Robert Franklin
, Farzad Safaei
, Stephen Smith
, Wei Ni:
Effect of the number of participating nodes on recovery of WSN coverage holes. 1-8 - Elie Inaty, Robert Raad:

A CDMA-based dynamic power and bandwidth allocation (DPBA) scheme for multiclass EPON. 1-8 - Linchen Xiao, Arash Behboodi, Rudolf Mathar:

A deep learning approach to fingerprinting indoor localization solutions. 1-7 - Johannes Göbel, Anthony E. Krzesinski:

Increased block size and Bitcoin blockchain dynamics. 1-6 - Sujatha Sivabalan, Peter J. Radcliffe:

Detecting IoT zombie attacks on web servers. 1-3 - Ewa Niewiadomska-Szynkiewicz

, Filip Nabrdalik:
Secure low energy AODV protocol for wireless sensor networks. 1-6 - Fan Wu

, Christoph Rüdiger
, Mehmet Rasit Yuce
:
Design and field test of an autonomous IoT WSN platform for environmental monitoring. 1-6 - Xu Yang

, Yue Liu
, Ka Seng Chou
, Laurie G. Cuthbert
:
A game-theoretic approach to network slicing. 1-4 - Paula Raymond Lutui

, Osai Tete'imoana, George Maeakafa:
An analysis of personal wireless network security in Tonga: A study of Nuku'alofa. 1-4 - Asanka Kekirigoda, Kin-Ping Hui:

Tactical line-of-sight MIMO communication system for contested networks. 1-6 - Khandakar Ahmed

, Nazmus S. Nafi
, Jan Olaf Blech
, Mark A. Gregory, Heinrich-Wilhelm Schmidt:
Software defined industry automation networks. 1-3 - YeJi Kang, Doyeon Jung, Inshil Doh:

Automated parking lot management system using embedded robot type smart car based on wireless sensors. 1-6 - Ye Feng, Chamil Jayasundara, Ampalavanapillai Nirmalathas, Elaine Wong:

IEEE 802.11 HCCA for tactile applications. 1-3 - Muhammad Ammad uddin

, Ali Mansour
, Denis Le Jeune, El-Hadi M. Aggoune
:
Agriculture internet of things: AG-IoT. 1-6 - James Jin Kang

, Iryna Khodasevych
, Sasan Adibi:
A disaster recovery system for location identification-based low power wide area networks (LPWAN). 1-6 - Sharon Ezekiel, Dinil Mon Divakaran, Mohan Gurusamy

:
Dynamic attack mitigation using SDN. 1-6 - Bob Warfield:

Extrapolation of customer demand, and implications for broadband access network design. 1-5 - Suman Sankar Bhunia, Mohan Gurusamy

:
Dynamic attack detection and mitigation in IoT using SDN. 1-6 - Akbar Hossain

, Farhaan Mirza, Muhammad Asif Naeem
, Jairo A. Gutiérrez
:
A crowd sourced framework for neighbour assisted medical emergency system. 1-6 - Kaixing Huang, Chunjie Zhou, Yu-Chu Tian

, Weixun Tu, Yuan Peng:
Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks. 1-6 - Jianhua Li

, Tiehua Zhang
, Jiong Jin
, Yingying Yang, Dong Yuan, Longxiang Gao:
Latency estimation for fog-based internet of things. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














