Abstract is missing.
- Keynotes: Keynote 1: SKT's vision and plan for next-gen OSS in 5G eraJin Hyo Park. [doi]
- A framework for discovering maritime traffic conflict from AIS networkPo-Ruey Lei, Tzu-Hao Tsai, Yu Ting Wen, Wen-Chih Peng. 1-6 [doi]
- Adaptive shipborne base station sleeping control for dynamic broadband maritime communicationsAiling Xiao, Ning Ge, Liuguo Yin, Chuan'ao Jiang, Shaohua Zhao. 7-12 [doi]
- Scalable TDMA cluster-based MAC (STCM) for multichannel vehicular networksNurullah Shahin, Young-Tak Kim. 13-18 [doi]
- Collaborative security attack detection in software-defined vehicular networksMyeongsu Kim, Insun Jang, Sukjin Choo, Jungwoo Koo, Sangheon Pack. 19-24 [doi]
- A QoS-based ONU Group planning algorithm for smart grid communication networkJun-Hai Lu, Fan-Bo Meng, Si-Ya Xu, Dong Guo, Xing-yu Chen, Ying Li. 25-30 [doi]
- Emerging network technologies and network neutrality conformanceRamneek, Patrick Hosein, Woojin Seok, JaiSeung Kwak, Alexandr Ni. 31-36 [doi]
- Building IP geolocation database from online used market articlesHyunsu Mun, Youngseok Lee. 37-41 [doi]
- Identification of user behavior from flow statisticsShingo Ata, Yusuke Iemura, Nobuyuki Nakamura, Ikuo Oka. 42-47 [doi]
- Regional fault tolerant recovery mechanism for multilayer networksXiaomei Wang, Lanlan Rui, Xuesong Qiu, Ying Li, Siya Xu. 48-53 [doi]
- Knowledge-defined networking using in-band network telemetryJonghwan Hyun, James Won-Ki Hong. 54-57 [doi]
- Enabling network function virtualization over heterogeneous resourcesThomas Lin, Naif Tarafdar, Byungchul Park, Paul Chow, Alberto Leon-Garcia. 58-63 [doi]
- A novel vCPE framework for enabling virtual network functions with multiple flow tables architecture in SDN switchesNen-Fu Huang, Chi-Hsuan Li, Chia-Chi Chen, I-Hsien Hsu, Che-Chuan Li, Ching-Hsuan Chen. 64-69 [doi]
- Service failure diagnosis in service function chainShilei Zhang, Ying Wang, Wenjing Li, Xuesong Qiu. 70-75 [doi]
- Towards ONOS-based SDN monitoring using in-band network telemetryNguyen Van Tu, Jonghwan Hyun, James Won-Ki Hong. 76-81 [doi]
- Towards comprehensive protection for OpenFlow controllersShengzhi Zhang, Xiaoqi Jia, Weijuan Zhang. 82-87 [doi]
- Design of optical aggregation network with carrier edge functions virtualizationTakashi Miyamura, Akira Misawa, Junichi Kani. 88-93 [doi]
- OpenAPI-based message router for mashup service developmentDoyoung Lee, Seyeon Jeong, James Won-Ki Hong. 94-99 [doi]
- A survivability-based backup approach for controllers in multi-controller SDN against failuresLingyu Zhang, Ying Wang, Wenjing Li, Xuesong Qiu, Qinghong Zhong. 100-105 [doi]
- Enforcing users' constraints in dynamic, software-defined networks of devicesPierre Peloso, Dinh Thai Bui, Mathieu Boussard. 106-111 [doi]
- IO visor-based packet tracing and collection over distributed SmartX server-switch boxesJungi Lee, Taekho Nam, Aris Cahyadi Risdianto, JongWon Kim 0001. 112-117 [doi]
- An integrated security monitoring system for digital service network devicesWen-Lin Cheng, Ting-Che Chuang, Chien-Wen Yang, Yueh-Hsien Lin, Min Liu, Chuan Yin. 118-122 [doi]
- Firmware over the air for home cybersecurity in the Internet of ThingsChe-Chun Teng, Jia-Wei Gong, Ya-Shian Wang, Chin-Ping Chuang, Mei-Chun Chen. 123-128 [doi]
- Design and implementation of security system for cloud storageJu-Shu Chueh, Min-Te Sun. 129-134 [doi]
- Threshold estimation in self-destructing scheme using regression analysisYoung Ki Kim, Choong Seon Hong. 135-138 [doi]
- Multi-stage stackelberg game approach for colocation datacenter demand responseMinh N. H. Nguyen, Dohyeon Kim, Nguyen H. Tran, Choong Seon Hong. 139-144 [doi]
- Distributed analytics in fog computing platforms using tensorflow and kubernetesPei-Hsuan Tsai, Hua-Jun Hong, An-Chieh Cheng, Cheng-Hsin Hsu. 145-150 [doi]
- Queueing theoretic approach to job assignment strategy considering various inter-arrival of job in fog computingTomoya Mori, Yoichi Utsunomiya, Xuejun Tian, Takashi Okuda. 151-156 [doi]
- iSDF: An integrated software-defined computing framework for scientific experimentsSeoyoung Kim, Julim Ahn, Heewon Kim, Yoonhee Kim, Jieun Choi. 157-162 [doi]
- Traffic management using value function-based regulationYuncheng Zhu, Hideki Okita. 163-168 [doi]
- Backhaul virtualization for multiple services in public WLANsKazuki Ginnan, Keita Kawano, Kazuhiko Kinoshita, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe. 175-180 [doi]
- Ruin theory based modeling of fair spectrum management in LTE-UAunas Manzoor, Nguyen H. Tran, Choong Seon Hong. 181-186 [doi]
- A hybrid pull-push protocol in hybrid CDN-P2P mesh-based architecture for live video streamingTeerapat Sanguankotchakorn, Nonpawich Krueakampliw. 187-192 [doi]
- D2D communications under LTE-U system: QoS and co-existence issues are incorporatedAnupam Kumar Bairagi, Choong Seon Hong. 193-198 [doi]
- Layered video communication in ICN enabled cellular network with D2D communicationSaeed Ullah, Tuan LeAnh, Anselme Ndikumana, Md. Golam Rabiul Alam, Choong Seon Hong. 199-204 [doi]
- Performance measurements of 360° video streaming to head-mounted displays over live 4G cellular networksWen-Chih Lo, Ching-Ling Fan, Shou-Cheng Yen, Cheng-Hsin Hsu. 205-210 [doi]
- The exploration of machine learning for abnormal prediction model of telecom business support systemJen-Hao Chen, Chao-Wen Huang, Chia-Chun Shih. 211-214 [doi]
- Using kernel density estimation to target customer complaint handling serviceHsin-Chieh Chao, Kai-An Tang, Yin-Hsin Liu, Chang-Yu Hsu. 215-218 [doi]
- Orchestration of NFV virtual applications based on TOSCA data modelsYuan-Mao Hung, Shih-Che Chien, Yung-Yi Hsu Chunghwa. 219-222 [doi]
- Effect of the penalty on the QoS received by multihomed clientsRohit Tripathi. 223-226 [doi]
- Load balancing for multiple controllers in SDN based on switches groupYaning Zhou, Ying Wang, Jinke Yu, Junhua Ba, Shilei Zhang. 227-230 [doi]
- A classification-based elephant flow detection method using application round on SDN environmentsYuan-Hao Huang, Wen-Yueh Shih, Jiun-Long Huang. 231-234 [doi]
- Design and implement a mobile badminton stroke classification systemJuyi Lin, Chia-Wei Chang, Chih-Hao Wang, Hong-Chuan Chi, Chih-Wei Yi, Yu-Chee Tseng, Chih-Chuan Wang. 235-238 [doi]
- Location-aware dynamic network provisioningVan-Quyet Nguyen, Sinh-Ngoc Nguyen, Deokjai Choi, Kyungbaek Kim. 239-242 [doi]
- Suspicious traffic detection based on edge gateway sampling methodSinh-Ngoc Nguyen, Jintae Choi, Kyungbaek Kim. 243-246 [doi]
- Could we beat a new mimicking attack?Degang Sun, Kun Yang, Bin Lv, Zhixin Shi. 247-250 [doi]
- File transfer framework with multipath transfer in heterogeneous networks for disaster recoveryKyu-Hwan Lee, Donghyuk Jang, Sung Jae Lee. 251-254 [doi]
- Evaluating scheduling strategies in LOD based applicationUsman Akhtar, Muhammad Bilal Amin, Sungyoung Lee. 255-258 [doi]
- Sky-Scope : Skype application traffic identification systemSung-Ho Lee, Young-Hoon Goo, Jee-Tae Park, Se-Hyun Ji, Myung-Sup Kim. 259-262 [doi]
- High-reliable WDM optical access network expanding by double fiber-tangent-ring topologyQi Shao, Ying Li, Yu Shao, Si-Ya Xu. 263-266 [doi]
- Experimental evaluation of a path switching function to avoid delay spikes in wireless LANsKazumasa Goto, Kazuya Okuda, Ryohei Nakamura, Hisaya Hadama. 267-270 [doi]
- Survey on network protocol reverse engineering approaches, methods and toolsBaraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Sungyun Kim, Mi-Jung Choi, Myung-Sup Kim. 271-274 [doi]
- Feasibility study for simulating community based content caching on CCN network using ndnSIM simulatorSuman Pandey, Yang-Sae Moon, Mi-Jung Choi. 275-279 [doi]
- Design and implementation of a service-oriented network provisioning system for network as a serviceTse-Han Wang, Yen-Cheng Chen, Chen-Min Hsu, Kai-Sheng Hsu, Hey-Chyi Young. 280-283 [doi]
- Topology design for multihop cellular networkJyh-Shyan Huang, Yao-Nan Lien. 284-287 [doi]
- Dynamic reordering bloom filterDa-Chung Chang, Chien Chen, Mahadevan Thanavel. 288-291 [doi]
- Sliced NFV service chaining in mobile edge cloudsSooeun Song, Jong-Moon Chung. 292-294 [doi]
- Forwarding path discovery with software defined networkingChih-Chieh Chen, Yi Ren Chen, Shi-Chun Tsai, Ming-Chuan Yang. 299-302 [doi]
- FERA: A caching scheme in CCN using file-extension and regression analysisJin Won Lee, Choong Seon Hong. 303-306 [doi]
- iToy: A LEGO-like solution for small scale IoT applicationsYi Ren, Muhammad Alfiansyah, Nyoto Arif Wibowo, Cheng-Wei Wu, JieFu Geng, Yu-Chee Tseng. 307-310 [doi]
- A3N: Agile application-awareness in software-defined networksHe Cai, Jun Deng, Yuhua Zhang, Xiaofei Wang, Sangheon Pack. 311-314 [doi]
- Application-aware traffic engineering in software-defined networkSeyeon Jeong, Doyoung Lee, Jonghwan Hyun, Jian Li, James Won-Ki Hong. 315-318 [doi]
- Reliable vehicle selection algorithm with dynamic mobility of vehicle in vehicular cloud systemSukjin Choo, Insun Jang, Jungwoo Koo, Joonwoo Kim, Sangheon Pack. 319-321 [doi]
- Performance analysis of H.264, H.265, VP9 and AV1 video encodersMd. Abu Layek, Quang Thai Ngo, Md. Alamgir Hossain, Ngo Thien Thu, Le Pham Tuyen, Ashis Talukder, TaeChoong Chung, Eui-nam Huh. 322-325 [doi]
- Structured whitelist generation in SCADA network using PrefixSpan algorithmWoo-Suk Jung, Jeong-Han Yun, Sin-Kyu Kim, Kyu-Seok Shim, Myung-Sup Kim. 326 [doi]
- Enhancing service resiliency in the next generation EPC systemZaw Htike, Yoshinori Kitatsuji. 330-333 [doi]
- Parallel and local diagnostic algorithm for wireless sensor networksLidan Wang, Xiaofei Zhang, Yu-Chee Tseng, Cheng-Kuan Lin. 334-337 [doi]
- A hybrid live streaming mode for a reliable serviceDongho Son, Doyoung Lee, Taeyeol Jeong, James Won-Ki Hong. 338-341 [doi]
- User clustering based on correlation in 5G using semidefinite programmingChit Wutyee Zaw, Yan Kyaw Tun, Choong Seon Hong. 342-345 [doi]
- DownlinK power allocation in virtualized wireless networksYan Kyaw Tun, Chit Wutyee Zaw, Choong Seon Hong. 346-349 [doi]
- SigManager: Automatic payload signature management system for the classification of dynamically changing internet applicationsKyu-Seok Shim, Young-Hoon Goo, Sungyun Kim, Mi-Jung Choi, Myung-Sup Kim. 350-353 [doi]
- An approach of cost optimized influence maximization in social networksAshis Talukder, Md. Golam Rabiul Alam, Anupam Kumar Bairagi, Sarder Fakhrul Abedin, Md. Abu Layek, Hoang T. Nguyen, Choong Seon Hong. 354-357 [doi]
- Browser's "search form" issues and countermeasuresYuji Suga. 358-361 [doi]
- Access point selection algorithm for providing optimal AP in SDN-based wireless networkDong-Kyu Lee, Choong Seon Hong. 362-365 [doi]
- Collaborative cache allocation and computation offloading in mobile edge computingAnselme Ndikumana, Saeed Ullah, Tuan LeAnh, Nguyen H. Tran, Choong Seon Hong. 366-369 [doi]
- Infrastructure-assisted hybrid road-aware routing and QoS provisioning in VANETsMuhammad Tahir Abbas, Wang-Cheol Song. 370-373 [doi]
- Mobile charger billing system using lightweight BlockchainNamho Kim, Sun-Moo Kang, Choong Seon Hong. 374-377 [doi]
- Reliable smart energy IoT-cloud service operation with container orchestrationSeungryong Kim, Chorwon Kim, JongWon Kim. 378-381 [doi]
- Probabilistic k-weighted coverage placement in wireless sensor networksGuey-Yun Chang, Chih-Wei Charng, Jang-Ping Sheu, Liang Ruei-Yuan. 382-385 [doi]
- A traffic grouping method using the correlation model of network flowYoung-Hoon Goo, Sung-Ho Lee, Seongyun Choi, Mi-Jung Choi, Myung-Sup Kim. 386-390 [doi]
- Classification of application traffic using tensorflow machine learningJee-Tae Park, Kyu-Seok Shim, Sung-Ho Lee, Myung-Sup Kim. 391-394 [doi]
- Power allocation games for cooperative coordinated multipoint transmission schemeSeunghyun Jung, Hyunggon Park. 395-398 [doi]
- Information fusion based agile streaming telemetry for intelligent traffic analytics of softwarized networkTaesang Choi, Sangsik Yoon, Sejun Song. 399-402 [doi]
- An ontology-based hybrid approach for accurate context reasoningMuhammad Asif Razzaq, Muhammad Bilal Amin, Sungyoung Lee. 403-406 [doi]
- Application identification system for SDN QoS based on machine learning and DNS responsesNen-Fu Huang, Che-Chuan Li, Chi-Hsuan Li, Chia-Chi Chen, Ching-Hsuan Chen, I-Hsien Hsu. 407-410 [doi]
- The unique reliable identity system of enabling lightweight device management in NMS mechanism for the U-IoTKhamdamboy Urunov, Soo Young Shin, Soo-Hyun Park. 411-414 [doi]