


default search action
MLN 2018: Paris, France
- Éric Renault, Paul Mühlethaler, Selma Boumerdassi:

Machine Learning for Networking - First International Conference, MLN 2018, Paris, France, November 27-29, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11407, Springer 2019, ISBN 978-3-030-19944-9 - Nageswara S. V. Rao, Satyabrata Sen

, Zhengchun Liu
, Rajkumar Kettimuthu, Ian T. Foster:
Learning Concave-Convex Profiles of Data Transport over Dedicated Connections. 1-22 - Brice Leblanc, Emilien Bourdy, Hacène Fouchal

, Cyril de Runz, Secil Ercan
:
Towards Analysing Cooperative Intelligent Transport System Security Data. 23-32 - Kheir Eddine Daouadi

, Rim Zghal Rebaï, Ikram Amous
:
Towards a Statistical Approach for User Classification in Twitter. 33-43 - Qinliang Lin, Zhibo Gong, Qiaoling Wang, Jinlong Li:

RILNET: A Reinforcement Learning Based Load Balancing Approach for Datacenter Networks. 44-55 - Zhengchun Liu

, Rajkumar Kettimuthu, Prasanna Balaprakash, Nageswara S. V. Rao, Ian T. Foster:
Building a Wide-Area File Transfer Performance Predictor: An Empirical Study. 56-78 - Meryem Amar, Mouad Lemoudden

, Bouabid El Ouahidi
:
Advanced Hybrid Technique in Detecting Cloud Web Application's Attacks. 79-97 - Hamidreza Anvari, Jesse Huard, Paul Lu:

Machine-Learned Classifiers for Protocol Selection on a Shared Network. 98-116 - Yue Jin, Dimitre Kostadinov, Makram Bouzid, Armen Aghasaryan:

Common Structures in Resource Management as Driver for Reinforcement Learning: A Survey and Research Tracks. 117-132 - Nicolás Viveros Barrera, Octavio José Salcedo Parra, Lewys Correa Sánchez

:
Inverse Kinematics Using Arduino and Unity for People with Motor Skill Limitations. 133-145 - Rui Li, Chaoyun Zhang, Pan Cao, Paul Patras

, John S. Thompson:
Delmu: A Deep Learning Approach to Maximising the Utility of Virtualised Millimetre-Wave Backhauls. 146-165 - Mohamed Belaoued

, Bouchra Guelib
, Yasmine Bounaas, Abdelouahid Derhab, Mahmoud Boufaïda:
Malware Detection System Based on an In-Depth Analysis of the Portable Executable Headers. 166-180 - Diego Madariaga

, Martín Panza, Javier Bustos-Jiménez:
DNS Traffic Forecasting Using Deep Neural Networks. 181-192 - Basem Abid, Sarra Messai, Hamida Seba:

Energy-Based Connected Dominating Set for Data Aggregation for Intelligent Wireless Sensor Networks. 193-211 - Ujjwal Peshin, Tanay Jha, Shivam Kantival:

Touchless Recognition of Hand Gesture Digits and English Characters Using Convolutional Neural Networks. 212-221 - S. M. Abdullah Al-Mamun, Mehmet Beyaz:

LSTM Recurrent Neural Network (RNN) for Anomaly Detection in Cellular Mobile Networks. 222-237 - Khadoudja Ghanem:

Towards a Better Compromise Between Shallow and Deep CNN for Binary Classification Problems of Unstructured Data. 238-246 - Redha Mili, Salim Chikhi:

Reinforcement Learning Based Routing Protocols Analysis for Mobile Ad-Hoc Networks - Global Routing Versus Local Routing. 247-256 - Giuseppe Nebbione, Derek Doran, Srikanth Nadella, Brandon S. Minnery:

Deep Neural Ranking for Crowdsourced Geopolitical Event Forecasting. 257-269 - Xuanlong Weng, Yin Luo, Jianbo Gao, Haishan Feng, Ke Huang:

The Comment of BBS: How Investor Sentiment Affects a Share Market of China. 270-278 - Hasseeb Azzawi, Jingyu Hou, Russul Alanni

, Yong Xiang:
A Hybrid Neural Network Approach for Lung Cancer Classification with Gene Expression Dataset and Prior Biological Knowledge. 279-293 - Rishabh Yadav, Yogesh Kumar Rana, Sushama Nagpal:

Plant Leaf Disease Detection and Classification Using Particle Swarm Optimization. 294-306 - Julián Francisco Mojica Sánchez, Octavio José Salcedo Parra, Miguel José Espitia Rico:

Game Theory Model for Intrusion Prevention in Computer Networks. 307-320 - Naila Bouchemal, Sondès Khemiri-Kallel

, Nardjes Bouchemal:
A Survey: WSN Heterogeneous Architecture Platform for IoT. 321-332 - Kevin Curran

, Gary Mansell, Jack Curran:
An IoT Framework for Detecting Movement Within Indoor Environments. 333-340 - Salima Bella

, Assia Belbachir
, Ghalem Belalem
:
A Hybrid Architecture for Cooperative UAV and USV Swarm Vehicles. 341-363 - Mayra Samaniego

, Ralph Deters:
Detecting Suspicious Transactions in IoT Blockchains for Smart Living Spaces. 364-377 - Nardjes Bouchemal, Naila Bouchemal:

Intelligent ERP Based Multi Agent Systems and Cloud Computing. 378-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














