


default search action
ICNC 2019: Honolulu, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2019, Honolulu, HI, USA, February 18-21, 2019. IEEE 2019, ISBN 978-1-5386-9223-3
- Sang-Yoon Chang, Younghee Park:
Silent Timestamping for Blockchain Mining Pool Security. 1-5 - Amer Al-Baidhani, H. Howard Fan:
Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading Channels. 6-10 - Anusha Prabakaran, Min Chen:
Product Review Credibility Analysis. 11-15 - Kensei Saito, Yasutaka Ogawa, Toshihiko Nishimura, Takeo Ohgane, Junichiro Hagiwara:
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDF†. 16-21 - Mingrui Xu, Chase Q. Wu, Aiqin Hou, Yongqiang Wang:
Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems. 22-28 - Yuya Suzuki, Toshihiko Nishimura, Takeo Ohgane, Yasutaka Ogawa, Junichiro Hagiwara:
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System. 29-33 - Sangjun Park, Seunghyun Lee, Wan Choi
:
Markov Chain Analysis for Compressed Sensing based Random Access in Cellular Systems. 34-38 - Zhiqiang Xiao, Bingcheng Zhu, Yongjin Wang:
Outage Probability Bounds of EGC Over Correlated Lognormal Fading Channels. 39-45 - Nardine Basta, Amal El-Nahas, Hans Peter Großmann, Slim Abdennadher:
SMAP: A Map Extension Framework for Intelligent Travel Systems. 46-50 - Pan Wang
, Yiqing Zhou, Feng Ye, Hao Yue:
Data Interpolation for Deep Learning based Encrypted Data Packet Classification. 51-55 - Claudio Calcaterra, Alessio Carmenini, Andrea Marotta, Dajana Cassioli:
Hadoop Performance Evaluation in Software Defined Data Center Networks. 56-61 - Zhiming Zhu, Bingcheng Zhu, Yongjin Wang, Zheng Shi, Yuan Jiang:
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array. 62-66 - Jaber Al-Khori, Galymzhan Nauryzbayev
, Mohamed Abdallah
, Mounir Hamdi
:
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming. 67-72 - Cong Pu
:
Spam DIS Attack Against Routing Protocol in the Internet of Things. 73-77 - Edoardo Biagioni:
Preventing UDP Flooding Amplification Attacks with Weak Authentication. 78-82 - Sachula Meng, Ying Wang, Wensheng Sun, Shan Guo, Kai Sun:
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors. 83-87 - Bowen Yang, Xiang Chen, Jinsen Xie, Sugang Li, Yanyong Zhang, Jian Yang
:
Multicast Design for the MobilityFirst Future Internet Architecture. 88-93 - Qi Zhang, Xiaofeng Jiang, Shuangwu Chen, Jinsen Xie, Jian Yang
, Ling Xing:
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking. 94-99 - Manuel Eugenio Morocho Cayamcela
, Wansu Lim:
Fine-tuning a pre-trained Convolutional Neural Network Model to translate American Sign Language in Real-time. 100-104 - Weicheng Yu, Kai Zhang, Pingping Shang, Xue-Qin Jiang, Miaowen Wen
, Jun Li, Han Hai:
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation. 105-109 - Lanlin Li, Yinglei Teng, Mei Yan, Mei Song, Lihong Song:
A Two-phase Transmission Protocol Design for Ultra-reliable Communications. 110-115 - Huan-Bang Li, Kenichi Takizawa, Toshinori Kagawa, Fumihide Kojima, Ryu Miura:
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver. 116-120 - Safiqul Islam, Michael Welzl
, Stein Gjessing:
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters. 121-125 - Tina Gui, Feng Wang, Christopher Ma, Dawn E. Wilkins:
On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNs. 126-130 - Naveen Naik Sapavath
, Dema Saad Alorini
, Danda B. Rawat
, Moses Garuba:
Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless Networks. 131-135 - Yu Liu, Curtis R. Taylor
, Craig A. Shue:
Authenticating Endpoints and Vetting Connections in Residential Networks. 136-140 - Lav Gupta, Tara Salman
, Ria Das, Aiman Erbad
, Raj Jain
, Mohammed Samaka:
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for Virtual NEtwork Services over Multi-Cloud Systems. 141-147 - Yoshito Usuzaka, Norikazu Takahashi
:
A Novel NMF Algorithm for Detecting Clusters in Directed Networks. 148-152 - Anwar Alyatama:
Multi-Resource Continuous Allocation Model for Cloud Services. 153-158 - Junggab Son, Euiseong Ko, Uday Bhaskar Boyanapalli, Donghyun Kim, Youngsoon Kim, Mingon Kang:
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis*. 159-163 - Marcin Niemiec
, Piotr Jaglarz, Marcin Jekot, Piotr Cholda
, Piotr Borylo
:
Risk Assessment Approach to Secure Northbound Interface of SDN Networks. 164-169 - Shu Sekigawa, Satoru Okamoto, Naoaki Yamanaka, Eiji Oki:
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction. 170-174 - Ching-Fang Hsu, Siou-Ci Sie, Hsuan-Fang Fu, Jin-Jun Zheng, Shi-Xuan Chen:
Design of an Efficient Resource Management Model in Elastic Optical Networks. 175-179 - Thattapon Surasak
, Scott C.-H. Huang:
Enhancing VoIP Security and Efficiency using VPN. 180-184 - Dandan Wang, Gurudutt Hosangadi, Pantelis Monogioudis, Anil Rao:
Mobile Device Localization in 5G Wireless Networks. 185-190 - Oleg Surnin, Fatima Hussain, Rasheed Hussain
, Svetlana Ostrovskaya, Andrey Polovinkin, Jooyoung Lee, Xavier N. Fernando
:
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment. 191-196 - Seungwoon Lee, Jehad Ali
, Byeong-Hee Roh
:
Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET. 197-202 - Diogo Parracho, David Duarte, Iola Pinto
, Pedro Vieira
:
An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G System. 203-208 - Takuto Kamiura, Shohei Yamada, Naiwala P. Chandrasiri:
A System for Generating Background Colors for e-Books, Based on its Text. 209-213 - Raffaele Bolla, Alessandro Carrega
, Matteo Repetto:
An abstraction layer for cybersecurity context. 214-218 - Yuya Aoki, Takeo Fujii:
Construction of Time-Space Radio Environment Database using HMM for Cooperative Sensing. 219-223 - Ziwei Wang, Xiuhua Jiang:
A QoE-Driven Rate Adaptation Approach for Dynamic Adaptive Streaming Over HTTP. 224-229 - Krittetash Pinyoanuntapong, Hyuck Kwon, Khanh D. Pham, James Lyke:
Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh Fading. 230-234 - Yoshitaka Nakamura
, Tomohiro Kaneta, Osamu Takahashi:
A temporary communication system using DTN for improving power consumption of mobile terminals. 235-239 - Wenjie Zhang, Guanglin Zhang, Yifeng Zheng, Liwei Yang, Chai Kiat Yeo
:
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces. 240-244 - Yan Li, Victor O. K. Li:
Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks. 245-249 - Stefano Iannucci, Andrea Montemaggio
, Byron Williams:
Towards Self-Defense of Non-Stationary Systems. 250-254 - Ihtisham Khalid, Syed Asad Ullah
, Sajid Saleem, Syed Ali Hassan
:
A Method of Moments Estimator for Modulation Index of Continuous Phase Modulation. 255-259 - Meng Tang, Jie Zhu:
Text-To-Speech quality evaluation based on LSTM Recurrent Neural Networks. 260-264 - Sami Alesawi
, Minh Nguyen
, Hao Che, Akshit Singhal:
Tail Latency Prediction for Datacenter Applications in Consolidated Environments. 265-269 - Sami Alesawi
, Sakher Ghanem:
Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction. 270-275 - Fadi Salo, MohammadNoor Injadat
, Abdallah Moubayed
, Ali Bou Nassif, Aleksander Essex:
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection. 276-281 - Ben Hughes, Shruti Bothe, Hasan Farooq
, Ali Imran:
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks. 282-286 - Kenta Kawai, Kazuki Tanabe, Katsunori Yamaoka, Ken-ichi Baba:
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls. 287-291 - William Brockelsby, Rudra Dutta:
A Graded Approach to Network Forensics with Privacy Concerns. 292-297 - Rahul Arun Paropkari, Aklilu Assefa Gebremichail, Cory C. Beard:
Fractional Packet Duplication and Fade Duration Outage Probability Analysis for Handover Enhancement in 5G Cellular Networks. 298-302 - Peter Willis, Nirmala Shenoy:
A Meshed Tree Protocol for Loop Avoidance in Switched Networks. 303-307 - Hessam Mohammadmoradi, Milad Heydariaan, Omprakash Gnawali
, Kyungki Kim
:
UWB-Based Single-Anchor Indoor Localization Using Reflected Multipath Components. 308-312 - Madhuprana Goswami, Hyuck M. Kwon, Khanh D. Pham, James Lyke:
Satellite MIMO Digital Beam-forming under Nonlinear High-Power Amplifier and Keyhole. 313-317 - Wenlong Ni, Wei Li:
Optimal Admission Control For Secondary Users In Cognitive Radio Systems. 318-323 - Daidong Ying, Feng Ye:
D2D-Assisted Physical-Layer Security in Next-Generation Mobile Network. 324-328 - Alvaro Javier Ortega, Raimundo Sampaio Neto
, Rodrigo Pereira David:
Hybrid precoded index modulation in downlink mmWave MU-MIMO systems. 329-333 - Saleh Almutairi, Ramesh K. Karne, Alexander L. Wijesinha:
A Bare PC Text Based Browser. 334-338 - Hasan Burhan Beytur, Elif Uysal-Biyikoglu
:
Age Minimization of Multiple Flows using Reinforcement Learning. 339-343 - Marco Scarpa, Salvatore Serrano
:
A full Secondary User model for Cognitive Radio in a GSM-900 scenario. 344-349 - Murtadha Arif Bin Sahbudin
, Marco Scarpa, Salvatore Serrano
:
MongoDB Clustering using K-means for Real-Time Song Recognition. 350-354 - Salvatore Gaglio, Giuseppe Lo Re
, Gloria Martorella, Daniele Peri
:
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices. 355-359 - Muhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen
:
Countering Selfish Mining in Blockchains. 360-364 - Mohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, Bo Sheng, Kuan Zhang
:
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis. 365-369 - Talal Halabi
, Martine Bellaïche, Adel Abusitta:
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game. 370-374 - Ehab Zaghloul, Tongtong Li, Jian Ren:
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts. 375-379 - Yangyang Tao, Shucheng Yu
:
kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint Oversubscription. 380-384 - Venkata Sukumar Gurugubelli
, Hua Fang, Honggang Wang
:
Neuro-Fuzzy classifier for longitudinal behavioral intervention data. 385-389 - Fenghua Li, Zhe Sun
, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. 390-394 - Min Kyung An
, Hyuk Cho, Bing Zhou, Lei Chen:
Minimum Latency Aggregation Scheduling in Internet of Things. 395-401 - Amit Dvir
, Angelos K. Marnerides
, Ran Dubin
, Nehor Golan:
Clustering the Unknown - The Youtube Case. 402-407 - Amirshahram Hematian, Wei Yu
, David W. Griffith, Nada Golmie:
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed. 408-412 - Weibin Ma, Lin Zhang, Zhiqiang Wu
:
Location Information-Aided Load Balancing Design for Hybrid LiFi and WiFi Networks. 413-417 - Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. 418-424 - Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. 425-431 - Josh McGiff, William G. Hatcher, James H. Nguyen, Wei Yu
, Erik Blasch, Chao Lu:
Towards Multimodal Learning for Android Malware Detection. 432-436 - Paolo Addesso, Michele Cirillo, Mario Di Mauro
, Maurizio Longo, Vincenzo Matta:
Adversarial Detection of Concealed VoIP Traffic. 437-441 - Casey T. Deccio, Derek Argueta, Jonathan Demke:
A Quantitative Study of the Deployment of DNS Rate Limiting. 442-447 - Dema Alorini
, Danda B. Rawat
:
Automatic Spam Detection on Gulf Dialectical Arabic Tweets. 448-452 - Dongliang Xu, Bailing Wang, Xiaojiang Du, Xiaoyan Zhu, Zhitao Guan, Xiaoyan Yu
, Jingyu Liu:
Verification Code Recognition Based on Active and Deep Learning. 453-456 - Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua:
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. 457-462 - Michael Berhane Asfaw, Xueqin Jiang, Meixiang Zhang, Jia Hou, Wei Duan:
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution. 463-467 - Md Shaad Mahmud, Honggang Wang
, Yong Kim:
Accelerated Prediction of Bradycardia in Preterm Infants Using Time-Frequency Analysis. 468-472 - Tilman Wolf, Anna Nagurney, James Griffioen, Kenneth L. Calvert:
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points. 473-479 - Xiwen Liu, Xiaoming Tao, Li Wang, Yafeng Zhan, Jianhua Lu:
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals. 480-485 - Ankur Chowdhary, Dijiang Huang
:
SDN based Network Function Parallelism in Cloud. 486-490 - Jie Tang, Yu Yu, Daniel K. C. So
, Gaojie Chen, Xiu Yin Zhang
, Mo Huang
:
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems. 491-496 - Chuanji Zhang, Hemin Yang, George F. Riley, Douglas M. Blough:
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks. 497-502 - Joseph Reeves, Ming Li:
Context-Aware Analysis Scheduling in Wireless Body Area Networks. 503-508 - Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. 509-514 - Wenfan Chen, Chengming Li, Shimin Gong, Lin Gao, Jing Xu:
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks. 515-519 - Qi Zhao, Muhao Chen, Pengyuan Du, Tuan Le, Mario Gerla:
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN. 520-525 - Laxima Niure Kandel, Shucheng Yu
:
Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges. 526-530 - Ai Enkoji, Ming Li, James Daniel Brisky, Ryan Melvin:
Dynamic EAP Based MAC Protocol for Wireless Body Area Networks. 531-536 - Falko Dressler
, Gurjashan Singh Pannu, Florian Hagenauer, Mario Gerla, Takamasa Higuchi, Onur Altintas:
Virtual Edge Computing Using Vehicular Micro Clouds. 537-541 - Sethuraman Panchanathan, Troy McDaniel
, Ramin Tadayon, Adric Rukkila, Hemanth Venkateswara
:
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility. 542-546 - Xueyan Liu, Zhitao Guan, Xiaojiang Du, Liehuang Zhu, Zhengtao Yu, Yinglong Ma
:
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data. 547-551 - Yan Zhang
, PengFei Liu, JingTao Yao:
Three-way Email Spam Filtering with Game-theoretic Rough Sets. 552-556 - Zhouzhou Li, Hua Fang, Honggang Wang
:
Integrated Node Authentication and Key Distribution Method for Body Area Network. 557-561 - Zupei Li, Chao Gao, Qinggang Yue, Xinwen Fu
:
Toward Drone Privacy via Regulating Altitude and Payload. 562-566 - Pranavi Appana, Xiaoyan Sun, Yuan Cheng
:
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance. 567-571 - Ankur Chowdhary, Adel Alshamrani, Dijiang Huang
:
SUPC: SDN enabled Universal Policy Checking in Cloud Network. 572-576 - Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang
, Abdulhakim Sabur:
Adaptive MTD Security using Markov Game Modeling. 577-581 - Roxana Abolfathi, Hoda Roodaki, Shervin Shirmohammadi
:
A Novel Rate Control Method for Free-viewpoint Video in MV-HEVC. 582-587 - Joseph Khoury, Mahsa T. Pourazad, Panos Nasiopoulos:
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression. 588-591 - Han Sun, Jian Yang:
Domain-Specific Image Classification Using Ensemble Learning Utilizing Open-Domain Knowledge. 593-596 - Jounsup Park:
Video Streaming over the LWA Systems. 597-601 - Ching-Fang Hsu, Hao-Cheng Hu, Hsuan-Fang Fu, Jin-Jun Zheng, Shi-Xuan Chen:
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks. 602-606 - Nattapong Kitsuwan, Ryota Matsuura:
Performance of Elastic Optical Network with Spectrum Slicing for Fragmented Bandwidth Allocation. 607-611 - Michael Welzl
, Safiqul Islam, Runa Barik, Stein Gjessing, Ahmed Elmokashfi:
Investigating the Delay Impact of the DiffServ Code Point (DSCP). 612-616 - Arman Pouraghily, Tilman Wolf:
A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices. 617-623 - Khondaker Musfakus Salehin, Roberto Rojas-Cessa, Ki-Won Kwon:
COMPRESS: A Self-Sufficient Scheme for Measuring Queueing Delay on the Internet Routers. 624-629 - Lijun Dong, Richard Li
:
Distributed Mechanism for Computation Offloading Task Routing in Mobile Edge Cloud Network. 630-636 - Nchinda Nchinda, Agnes Cameron
, Kallirroi Retzepi, Andrew Lippman:
MedRec: A Network for Personal Information Distribution. 637-641 - James H. Nguyen, Yalong Wu, Jin Zhang, Wei Yu
, Chao Lu:
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things. 642-646 - Imad Ali
, Ronald Y. Chang
, Cheng-Hsin Hsu:
SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems. 647-652 - Meghana Bande, Venugopal V. Veeravalli:
Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access. 653-657 - Salva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed
, Nazife Baykal:
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined. 658-662 - Constantine Ayimba, Paolo Casari
, Vincenzo Mancuso:
Adaptive Resource Provisioning based on Application State. 663-668 - Curtis R. Taylor
, Julian P. Lanson
:
Network-based Classification of Authentication Attempts using Machine Learning. 669-673 - Samer S. Hanna, Danijela Cabric
:
Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity. 674-680 - Timothy J. O'Shea, Tamoghna Roy, Nathan E. West:
Approximating the Void: Learning Stochastic Channel Models from Observation with Variational Generative Adversarial Networks. 681-686 - Ming Feng, Hao Xu:
Game Theoretic Based Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment and Unknown Interference. 687-691 - Phuong Nguyen, Tarek Elgamal, Steven Konstanty, Todd Nicholson, Stuart Turner, Patrick Su, Klara Nahrstedt, Timothy Spila, Roy H. Campbell, John Dallesasse
, Michael Chan, Kenton McHenry:
BRACELET: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments. 692-696 - Jarrett Booz, Wei Yu
, Guobin Xu, David W. Griffith, Nada Golmie:
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis. 697-701 - Dapeng Wu
, Jiaxing Wu, Ruyan Wang:
An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle Platooning. 702-707 - Ruonan Zhang, Qi Guo, Jiaxin Wang, Zhimeng Zhong, Chao Li:
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage. 708-713 - Babu R. Dawadi
, Danda B. Rawat
, Shashidhar R. Joshi, Martina M. Keitsch:
Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal. 714-718 - Jian Shen
, Xinzhao Jiang, Dengzhi Liu, Tianqi Zhou:
Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus. 719-723 - Syed Qasim Gilani, Syed Ali Hassan
, Haris Pervaiz
, Syed Hassan Ahmed
:
Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss Models. 724-728 - Andrew Ward
, Zhengyuan Zhou, Nicholas Bambos:
Bidding-Based Dynamic Power Pricing Scheme in Smart Grids. 729-734 - Nadir H. Adam
, Cristiano Tapparello
, Wendi B. Heinzelman:
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis. 735-740 - Dongbiao He, Cédric Westphal, Jinlei Jiang, Guangwen Yang:
RankRoute: Efficient Interest Forwarding Using Nodes Ranking. 741-746 - Ivan Avramovic
, Richards Dana S:
NP-completeness of Shortest Leaf-to-Leaf Distance in a Tree. 747-752 - Casey T. Deccio:
DNS Diagnostics through the Eye of the Beholder. 753-758 - James Mathewson, J. J. Garcia-Luna-Aceves:
Flexible Evaluation Caching Using FATE. 759-763 - Michal Rzepka
, Piotr Borylo
, Piotr A. Cholda
, Artur Lason
:
Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks. 764-770 - Bin Li, Hongxiang Li, Ruonan Zhang, Chunqiao Wei:
An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless Networks. 771-776 - Michael Lujan, Michael Baum, Dayuan Chen, Ziliang Zong:
Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering Server. 777-781 - Xiaobo Cai, Huihui Wang, Houbing Song
, Yue Zhang, Ke Han, Zhiyong Cao:
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing. 782-786 - Guangxia Xu, Lijie He, Mengxiao Hu:
Document Context-Aware Social Recommendation Method. 787-791 - Haoran Mo, JooYoung Lee:
Spatial Community Search Using PageRank Vector. 792-796 - Yongxin Liu, Laurent L. Njilla, Jian Wang
, Houbing Song
:
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud. 797-801 - Abhishek Dwaraki, Richard G. Freedman, Shlomo Zilberstein
, Tilman Wolf:
Using Natural Language Constructs and Concepts to Aid Network Management. 802-808 - Abdulazaz Ali Albalawi, J. J. Garcia-Luna-Aceves:
A Delay-Based Congestion-Control Protocol for Information-Centric Networks. 809-815 - Van Sy Mai, Stratis Ioannidis
, Davide Pesavento
, Lotfi Benmohamed:
Optimal Cache Allocation under Network-Wide Capacity Constraint. 816-820 - Xiaoyu Liang, Taieb Znati:
An empirical study of intelligent approaches to DDoS detection in large scale networks. 821-827 - Aytac Azgin, Ravishankar Ravindran:
Stateless Forwarding in ICN with Dynamic Non-Bloom Filters. 828-834 - Razvan Cristian Voicu, John A. Copeland, Yusun Chang:
Multiple Path Infrastructure-less Networks A Cooperative Approach. 835-841 - Nathaniel Hudson
, Matthew Turner, Asare Nkansah, Hana Khamfroush:
On the Effectiveness of Standard Centrality Metrics for Interdependent Networks. 842-846 - Jonathan Crussell, Thomas M. Kroeger, Aaron Brown, Cynthia A. Phillips:
Virtually the Same: Comparing Physical and Virtual Testbeds. 847-853 - Chadi Kari, Sixia Chen, Sepehr Amir-Mohammadian, Vivek K. Pallipuram:
Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to Spare. 854-858 - Kory Teague, Mohammad J. Abdel-Rahman
, Allen B. MacKenzie
:
Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization Framework. 859-863 - Xiaoge Wu
, Lin Zhang:
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel. 864-868 - Ana Belen Martinez, Maximilian Matthé, Marwa Chafii
, Gerhard P. Fettweis:
Blind Carrier Frequency Offset Estimation in Generalized Frequency Division Multiplexing. 869-875 - Pablo Jiménez Mateo, Alejandro Blanco Pizarro
, Norbert Ludant, Matteo Marugan Borelli, Amanda García-García, Adrian Loch, Zhenyu Shi, Yi Wang, Joerg Widmer
:
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation. 876-882 - Susanna Mosleh
, Hayder Almosa
, Erik Perrins, Lingjia Liu:
Downlink Resource Allocation in Cell-Free Massive MIMO Systems. 883-887 - Tianchi Zhao, Ming Li, Gregory Ditzler:
Online Reconfigurable Antenna State Selection based on Thompson Sampling. 888-893 - Masafumi Moriyama, Kenichi Takizawa, Masayuki Oodo, Hayato Tezuka, Fumihide Kojima:
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity. 894-899 - Richard Gilles Engoulou, Martine Bellaïche, Talal Halabi
, Samuel Pierre:
A Decentralized Reputation Management System for Securing the Internet of Vehicles. 900-904 - Anes Madani, Suman Kumar
, Linh Ba Nguyen, Jiling Zhong:
A Robust Road Region of Interest Identification Scheme for Traffic-Video Data Mining. 905-910 - Katherine Russell, Robert Simon:
Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks. 911-917 - Tengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, Bo Sheng:
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices. 918-922 - Bogdan Antonescu, Miead Tehrani Moayyed, Stefano Basagni:
Diffuse Scattering Models for mmWave V2X Communications in Urban Scenarios. 923-929 - J. J. Garcia-Luna-Aceves:
Busy-Tone Multiple Access with Collision Avoidance and Detection for Ad-Hoc Networks. 930-935 - Ruonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, Chao Li:
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels. 936-942 - Riten Gupta, Han Yan, Danijela Cabric:
Joint Precoder and Combiner Design for MMSE Distributed Beamforming with Per-Antenna Power Constraints. 943-949 - Tugba Erpek, Sennur Ulukus, Yalin E. Sagduyu:
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA). 950-954 - Bhargav Gokalgandhi
, Christina Segerholm, Nilanjan Paul, Ivan Seskar:
Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPU. 955-959 - Xiuyu Du, Lihua Li, Zejian Li, Guangyan Lu:
Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSIT. 960-964 - Ming Feng, Hao Xu:
Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment. 965-969 - Narayan Prasad, Xiao-Feng Qi, Alan Gatherer:
Optimizing Beams and Bits: A Novel Approach for Massive MIMO Base-Station Design. 970-976 - Cenk M. Yetis, Ronald Y. Chang
:
Distributed Multi-Stream Beamforming in Multi-Relay Interference Networks with Multi-Antenna Nodes. 977-982 - Sebastian Birke, Dominik Auras, Tobias Piwczyk, Robin Mahlke, Nikolas Alberti, Rainer Leupers, Gerd Ascheid:
VLSI Architectures for ORVD Trellis based MIMO Detection. 983-989 - Yi Jiang, Yimeng Feng:
Blind Channel Subspace Estimation for Massive MIMO with Hybrid Beamforming. 990-994 - Christo Kurisummoottil Thomas, Dirk T. M. Slock:
Massive MISO IBC Reduced Order Zero Forcing Beamforming - a Multi-Antenna Stochastic Geometry Perspective. 995-999 - Pejman Ghasemzadeh, Subharthi Banerjee, Michael Hempel, Hamid Sharif:
Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation Detection. 1000-1004 - Zejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, Shuwen Liu:
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection. 1005-1010 - Riccardo Musmeci, Ken Goss, Simone Silvestri, Giuseppe Lo Re
:
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles. 1011-1017 - Hyunsun Lee, Yi Zhu, Donald Wapenski, Xi Wang, Qiong Zhang, Paparao Palacharla, Tadashi Ikeuchi:
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks. 1018-1023 - Hendrik Lumbantoruan, Koichi Adachi:
Array Antenna for Power Saving of Sensor Nodes in UAV-BS enabled WSN. 1024-1028 - Sarthak Sharma, Hessam Mohammadmoradi, Milad Heydariaan, Omprakash Gnawali
:
Device-Free Activity Recognition Using Ultra-Wideband Radios. 1029-1033 - Tim Strayer, Ram Ramanathan, Daniel Coffin, Samuel C. Nelson, Michael Atighetchi, Aaron Adler, Stephane Blais, Bishal Thapa, William N. Tetteh, Vladimir Shurbanov, Karen Zita Haigh, Regina Hain, Colleen T. Rock
, Emily H. Do, Armando Caro, Daniel Ellard, Michael J. Beckerle, Stephen Lawrence, Scott Loos:
Mission-Centric Content Sharing Across Heterogeneous Networks. 1034-1038 - Tuan Le, Qi Zhao, Mario Gerla:
Fragmented Data Routing Based on Exponentially Distributed Contacts in Delay Tolerant Networks. 1039-1043

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.