Abstract is missing.
- Detecting Road Conditions in Front of The Vehicle Using Off-The-Shelf CameraShao-Peng Lu, Min-Te Sun. 1-4 [doi]
- Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSBYuki Fujita, Atsuo Inomata, Hiroki Kashiwazaki. 1-4 [doi]
- eVNF - Hybrid Virtual Network Functions with Linux eXpress Data PathNguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 1-6 [doi]
- NFVMP: An Architecture for NFV Applications from Multiple ProvidersLishan Li, Ying Liu, Jianping Wu, Gang Ren. 1-6 [doi]
- An Architecture for Managing IoT Device Object in Information GatewayQichao Wang, Zeqi Liu, Jae-Oh Lee. 1-4 [doi]
- Space Weather Data Management System and Monitoring in Decentralized Storage EnvironmentYoga Andrian, Essaid Maryam, Kim Daeyong, Soo Hoon Maeng, Hongtaek Ju. 1-4 [doi]
- DB-Kmeans: An Intrusion Detection Algorithm Based on DBSCAN and K-meansGangsong Dong, Yi Jin, Shiwen Wang, Wencui Li, Zhuo Tao, Shaoyong Guo. 1-4 [doi]
- A Study on Utilization of Hybrid Blockchain for Energy Sharing in Micro-GridJeong Min Jeon, Choong Seon Hong. 1-4 [doi]
- Hybrid Controller for Securing SDN from Switched DDoS and ARP Poisoning AttacksTeerapat Sanguankotchakorn, Shiva Kumar Arugonda. 1-6 [doi]
- Blockchain-based Node-aware Dynamic Weighting Methods for Improving Federated Learning PerformanceYou Jun Kim, Choong Seon Hong. 1-4 [doi]
- Ant-inspired Backoff-based Opportunistic Routing for Ad Hoc NetworksTaku Yamazaki, Shinnosuke Iwagami, Takumi Miyoshi. 1-4 [doi]
- Design and Implementation of Container-based M-CORD Monitoring SystemJibum Hong, Woojoong Kim, Jae-Hyoung Yoo, James Won-Ki Hong. 1-4 [doi]
- Cache-Decision Policy using User TastesTsukasa Kitamura, Noriaki Kamiyama, Miki Yamamoto. 1-5 [doi]
- A New Lossless Compression Scheme for WSNs Using RLE AlgorithmAbdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri. 1-6 [doi]
- A Fault Prediction Method Based on Load-capacity Model in the Communication NetworkXilin Ji, Xiao Liang, Yun Zhou, Yonghua Huo, Xiaodan Shi, Yang Yang 0006. 1-4 [doi]
- Multicast Routing Model to Minimize Number of Flow Entries in Software-Defined NetworkSeiki Kotachi, Takehiro Sato, Ryoichi Shinkuma, Eiji Oki. 1-6 [doi]
- Data Provenance for Experiment Management of Scientific Applications on GPUSejin Kim, Jisun Oh, Yoonhee Kim. 1-4 [doi]
- A Search Approach Based on Query Similarity in Content-Centric NetworksJiun-Yu Tu, Chih-Lin Hu, Han Hu. 1-4 [doi]
- Machine Learning-based Prediction of VNF Deployment Decisions in Dynamic NetworksStanislav Lange, Heegon Kim, Seyeon Jeong, Heeyoul Choi, Jae-Hyung Yoo, James Won-Ki Hong. 1-6 [doi]
- Visualizing User Action Data to Discover Business ProcessYuki Urabe, Sayaka Yagi, Kimio Tsuchikawa, Takeshi Masuda. 1-4 [doi]
- SLA Driven Operation - optimizing telecom operation based on SLA -Atsushi Takada, Naoyuki Tanji, Toshihiko Seki, Kyoko Yamagoe, Yuji Soejima, Mitsuho Tahara. 1-4 [doi]
- Deep Learning Based Anomaly Detection Scheme in Software-Defined NetworkingYang Qin, Junjie Wei, Weihong Yang. 1-4 [doi]
- Susceptible-Infection-based Cost-effective Seed Mining in Social NetworksAshis Talukder, Choong Seon Hong. 1-6 [doi]
- CoachAI: A Project for Microscopic Badminton Match Data Collection and Tactical AnalysisTzu-Han Hsu, Chih-Chuan Wang, Yuan-Hsiang Lin, Ching-Hsuan Chen, Nyan Ping Ju, Tsì-Uí Ik, Wen-Chih Peng, Yu-Shuen Wang, Yu-Chee Tseng, Jiun-Long Huang, Yu-Tai Ching. 1-4 [doi]
- Network design system recommending similar configurations characterized by manual knowledgesYuji Kojima, Kodo Ran, Yasuhiko Aoki, Takeshi Nishiyama. 1-4 [doi]
- Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoTKexin Zhou, Jian Wang. 1-6 [doi]
- FLchain: Federated Learning via MEC-enabled Blockchain NetworkUmer Majeed, Choong Seon Hong. 1-4 [doi]
- An Integrated Network Monitoring System for SDN VPNYueh-Hsien Lin, Chien-Wen Yang, Ting-Che Chuang, Min Liu, Min-Chia Chang. 1-4 [doi]
- P4-Enabled Bandwidth ManagementYan-Wei Chen, Li-Hsing Yen, Wei Cheng Wang, Cheng-An Chuang, Yu-Shen Liu, Chien-Chao Tseng. 1-5 [doi]
- Evaluaion of assurance closed loop PoC for achieving scheduled maintenance in telecommunication carrier networksKosuke Sakata, Motomu Nakajima, Aiko Oi, Yuichi Suto, Yuji Soejima. 1-4 [doi]
- A Machine Learning Based Smart Irrigation System with LoRa P2P NetworksYu-Chuan Chang, Ting-Wei Huang, Nen-Fu Huang. 1-4 [doi]
- P2PTV Traffic Classification and Its Characteristic Analysis Using Machine LearningKoji Hayashi, Rina Ooka, Takumi Miyoshi, Taku Yamazaki. 1-6 [doi]
- A Comprehensive Multisensor Dataset Employing RGBD Camera, Inertial Sensor and Web CameraSabrina I. Soraya, Shao-Ping Chuang, Yu-Chee Tseng, Tsì-Uí Ik, Yu-Tai Ching. 1-4 [doi]
- Mobility Support for Networks on Trains Using Commercial Off-the-shelf RoutersSandy H. Hsiao, Hong-Rong Chang, Yu-Han Lu, Chi-Yu Li. 1-4 [doi]
- DTCluster: A CFSFDP Improved Algorithm for RFID Trajectory Clustering Under Digital-twin DrivenMengnan Cai, Siye Wang, Qinxuan Wu, Yijia Jin, Xinling Shen. 1-6 [doi]
- A practical approach with big data analysis for customer-driven network optimizationChen-Yell Yang, Gar-De Tsai, Der-Wen Perng. 1-3 [doi]
- Research On Routing Incentive Strategy Based On Virtual Credit In VANETXiaojuan Zhang, Xiangyu Bai. 1-4 [doi]
- Predicting malfunction of mobile network base station using machine learning approachYin-Hsin Liu, Yao-Chung Tu, Chang-Yu Hsu, Hsin-Chieh Chao. 1-4 [doi]
- A Low-cost Enterprise Application Integration Architecture for Large-scale EnvironmentChi-Chang Huang, Chi-Yang Kuo, Jen-Hao Chen, Chao-Wen Huang. 1-4 [doi]
- Auction Based Resource Trading Using Relation Between Telecommunication Network Failure Rate and Users' UtilityHaruo Oishi, Kyoko Yamori, Cheng Zhang, Yoshiaki Tanaka. 1-4 [doi]
- Design and Implementation of Storage System for Real-time Blockchain Network Monitoring SystemJiwon Bang, Mi-Jung Choi. 1-4 [doi]
- Smart Control for Energy Efficient Networking of IEEE 802.11ah-based IoTMin-Cheol Kim, Young-Tak Kim. 1-6 [doi]
- Flexible Network Resource-Allocation Architecture Using Specification InjectionMasataka Sato, Shingo Horiuchi. 1-5 [doi]
- Web Server for Analysis and Visualization of Bitcoin DataHye-Yeong Shin, Daeyong Kim, Soo Hoon Maeng, KiYoung Lee, Hongtaek Ju. 1-3 [doi]
- ROS-based Robot Development Toward Fully Automated Network ManagementTakayuki Warabino, Yusuke Suzuki, Masanori Miyazawa. 1-4 [doi]
- Improved Secure Computation over Real Numbers and Its Application to Reliability EngineeringTakumi Iseki, Masahiro Hayashi. 1-4 [doi]
- Comparison of NVA and RLOWESS Algorithms in Indoor Positioning SystemHung-Huan Liu, Wei-Chien Chen, Pin-Chun Hsu. 1-4 [doi]
- Effective Uplink Data Transmission Scheme for MTCDs in LTE-A NetworksYen-Wen Chen, Chih-Hong Chang. 1-4 [doi]
- Design and Implementation of IPv4 and IPv6 Provisioning Technologies for VPC ArchitectureChen-Hsiang Chen, Yu-An Lin, Wei-Te Wu, Yao-Te Huang, Cha-Chin Chu. 1-4 [doi]
- Network Security Situation Prediction Based on Long Short-Term Memory NetworkLi Shang, Wei Zhao, Jiaju Zhang, Qiang Fu, Qian Zhao, Yang Yang. 1-4 [doi]
- Machine Learning based Link State Aware Service Function ChainingSeyeon Jeong, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong. 1-4 [doi]
- An Improved Genetic Algorithm for the Scheduling of Virtual Network FunctionsQi Li, Xing Wang, Tao Zhao, Ying Wang, Zifan Li, Lanlan Rui. 1-4 [doi]
- A Hopfield Neural Networks Based Mechanism for Coexistence of LTE-U and WiFi Networks in Unlicensed SpectrumMadyan Alsenwi, Yan Kyaw Tun, Shashi Raj Pandey, Choong Seon Hong. 1-6 [doi]
- Method for Estimating the Damping Coefficient of Oscillation Dynamics in NetworksShinichi Kikuchi, Masaki Aida. 1-4 [doi]
- Dynamic Auto-scaling of VNFs based on Task Execution PatternsAsif Mehmood, Talha Ahmed Khan, Javier Jose Diaz Rivera, Wang-Cheol Song. 1-4 [doi]
- Enabling Inference Inside Software SwitchesYung-Sheng Lu, Kate Ching-Ju Lin. 1-4 [doi]
- Locating Delay Fluctuation-Prone Links by Packet Arrival Intervals in OpenFlow NetworksNguyen Minh Tri, Syunya Nagata, Masato Tsuru. 1-6 [doi]
- DDoS Attack Detection on Bitcoin Ecosystem using Deep-LearningUi-Jun Baek, Se-Hyun Ji, Jee-Tae Park, Min-Seob Lee, Jun-Sang Park, Myung-Sup Kim. 1-4 [doi]
- Distributed Approach to Adaptive VNF Manager Placement ProblemMao-Jung Chiang, Li-Hsing Yen. 1-6 [doi]
- A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTMMeryam Essaid, Daeyong Kim, Soo Hoon Maeng, Sejin Park, Hongtaek Ju. 1-6 [doi]
- Design and Performance Evaluation of Very Large-scale Optical Frame Switching Networks based on WSS for Future Data CentersYuh-Jiuh Cheng, Bor-Tauo Chen, Yu-Yun Lee. 1-4 [doi]
- PDMAC-SIC: Priority-based Distributed Low Delay MAC with Successive Interference Cancellation for Industrial Wireless NetworksYida Xu, Qi Wang, Jianmin Liu, Chentao He, Boyu Diao, Yongjun Xu. 1-6 [doi]
- A Framework for Maritime Anti-Collision Pattern Discovery from AIS NetworkPo-Ruey Lei, Pei-Rong Yu, Wen-Chih Peng. 1-4 [doi]
- Energy Efficient Resource Allocation in UAV-based Heterogeneous NetworksAunas Manzoor, Dohyeon Kim, Choong Seon Hong. 1-4 [doi]
- IPDAC: An Integrated IP Address Management Framework for Telecommunication Management NetworksTse-Han Wang, Yen-Cheng Chen, Yu-Tang Huang, Chen-Min Hsu, Kai-Sheng Hsu, Chung-Hua Hu. 1-4 [doi]
- Artificial Intelligence based Edge Caching in Vehicular Mobile Networks: Architecture, Opportunities, and Research IssuesKai-Min Liao, Guan-Yi Chen, Yu-Jia Chen. 1-6 [doi]
- IT Resource Trend Analysis by Component Decomposition Based on Non-negative Matrix FactorizationYuji Saitoh, Tetsuya Uchiumi, Yukihiro Watanabe. 1-6 [doi]
- Machine Learning Approach for Automatic Configuration and Management of 5G PlatformsTalha Ahmed Khan, Asif Mehmood, Javier Jose Diaz Rivera, Wang-Cheol Song. 1-6 [doi]
- Inter-Session Network Coding with Clustering Routing in Wireless Delay Tolerant NetworksYang Qin, Weihong Yang, Lei Peng. 1-4 [doi]
- Path Selection with Joint Latency and Packet Loss for Edge Computing in SDNChin-Lin Hu, Chao-Yu Hsu, Sod-Erdene Khuukhenbaatar, Yamkhin Dashdorj, Yongqiang Dong. 1-4 [doi]
- Network Slice Selection Function for Data Plane Slicing in a Mobile NetworkJavier Jose Diaz Rivera, Talha Ahmed Khan, Asif Mehmood, Wang-Cheol Song. 1-4 [doi]
- Ethereum Behavior Analysis with NetFlow DataZhenzhen Li, Jiangpan Hou, Hai Wang, Chencheng Wang, Cuicui Kang, Peipei Fu. 1-6 [doi]
- Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT EnvironmentsChunju Tsai, Wen-Yueh Shih, Yi-Shu Lu, Jiun-Long Huang, Lo-Yao Yeh. 1-4 [doi]
- Quality of Service Measurement Mechanism of Cloud-Based Network ArchitectureYung-Chang Lai, Jhih-Dao Jhan, Wen-Che Yang, Fei-Hua Kuo, Tai-Chueh Shih. 1-4 [doi]
- RSP Consensus Algorithm for BlockchainDong-Hak Kim, Rehmat Ullah, Byung-Seo Kim. 1-4 [doi]
- Building a V2X Simulation Framework for Future Autonomous DrivingTsu-Kuang Lee, Tong-wen Wang, Wen-Xuan Wu, Yu-Chiao Kuo, Shih Hsuan Huang, Guan-Sheng Wang, Chih-Yu Lin, Jen-Jee Chen, Yu-Chee Tseng. 1-6 [doi]
- Heterogeneous Data Ensemble Learning in End-to-End Diagnosis for IPTVHao-Yu Kao, Yan-Yih Wang, Chih-Meng Huang, Chang-Ping Hsu. 1-6 [doi]
- Long-Term Span Traffic Prediction Model Based on STL Decomposition and LSTMYonghua Huo, Yu Yan, Dan Du, ZhiHao Wang, Yixin Zhang, Yang Yang 0006. 1-4 [doi]
- The Design and Simulation of Service Recovery Strategy Based on Recovery Node in Clustering NetworkHecun Yuan, Biyao Li, Huilin Liu, Yi Han, Lanlan Rui, Ying Wang. 1-4 [doi]
- A SDN Controller Enabled Architecture for the IMSZeqi Liu, Qichao Wang, Jae-Oh Lee. 1-4 [doi]
- Joint User Association and Server Scaling in Multi-access Edge ComputingMinh N. H. Nguyen, Chit Wutyee Zaw, Kitae Kim, Choong Seon Hong. 1-4 [doi]
- A V2X Task Offloading Method Considering Automobiles' Behavior in Urban AreaHiroya Matsumoto, Bo Gu, Osamu Mizuno. 1-4 [doi]
- Detecting Wireless LAN Bottlenecks Using TCP Connection Measurement at Traffic Aggregation PointSumiyo Okada, Chunghan Lee, Hitoshi Ueno, Tomohiro Ishihara. 1-6 [doi]
- A Case Study of Captive-Portal Detection for Web Authentication on Wired LAN in a Campus NetworkMotoyuki Ohmori. 1-4 [doi]
- Store-and-Forward Data Transfer using Optimized Intermediate NodeWoojin Seok, Jeonghoon Moon, Wontaek Hong, JaiSeung Kwak, Manhee Lee. 1-4 [doi]
- Block Analysis in Bitcoin System Using Clustering with Dimension ReductionMu-gon Shin, Ui-Jun Baek, Kyu-Seok Shim, Jee-Tae Park, Sung Ho Yoon, Myung-Sup Kim. 1-4 [doi]
- Fault Location Prediction Based on Customer Complaint AmountYan-Yih Wang, Chang-Ping Hsu, Chih-Meng Huang, Hao-Yu Kao. 1-4 [doi]
- Bluetooth Mesh Networking: An Enabler of Smart Factory Connectivity and ManagementTerence Ching Yang Lam, Sherlyn Shi Ling Yew, Sye Loong Keoh. 1-6 [doi]
- Support Method to Generate Catalogs for Orchestrator using Catalog Definition TemplatesKensuke Takahashi, Ryota Katayanagi, Nobuo Onai, Miwaka Ohtani. 1-4 [doi]
- Automatic parameter tuning framework for performance diagnosis reportTetsuya Uchiumi, Yuji Saitoh, Yukihiro Watanabe. 1-6 [doi]
- Multi-UAVs Collaboration System based on Machine Learning for Throughput MaximizationYu Min Park, Minkyung Lee, Choong Seon Hong. 1-4 [doi]
- Optimal Task-UAV-Edge Matching for Computation Offloading in UAV Assisted Mobile Edge ComputingKitae Kim, Choong Seon Hong. 1-4 [doi]
- Location-based Flooding Area Restriction for Mobile-assisted Ad Hoc NetworksShota Ono, Taku Yamazaki, Takumi Miyoshi, Kaoru Sezaki. 1-4 [doi]
- Unmanned Aerial Vehicle Waypoint Guidance with Energy Efficient Path Planning in Smart FactorySheikh Salman Hassan, Seok-won Kang, Choong Seon Hong. 1-4 [doi]
- Reactive Controller Assignment for Failure Resilience in Software Defined NetworksFaruk Açan, Gürkan Gür, Fatih Alagöz. 1-6 [doi]
- An SDN-based NAT Traversal Mechanism for End-to-end IoT NetworkingHsu-Chien Wang, Chien Chen, Ssu-Hsuan Lu. 1-4 [doi]
- Evaluation of the Zero Rating System for MVNO in the New Mobile Network EraMing Yang, Ping Du, Noriaki Kamiyama, Akihiro Nakao. 1-4 [doi]
- Measurement and Analysis of Adult Websites in IPv6 NetworksShize Zhang, Hui Zhang, Jiahai Yang, Guanglei Song, Jianping Wu. 1-6 [doi]
- Energy Efficient Multi-Tenant Resource Slicing in Virtualized Multi-Access Edge ComputingYan Kyaw Tun, Madyan Alsenwi, Shashi Raj Pandey, Chit Wutyee Zaw, Choong Seon Hong. 1-4 [doi]
- BDD Method for Evaluating Reliability of Traffic-Path-Based Network ModelTakuto Koizumi, Masahiro Hayashi. 1-4 [doi]
- Reliable Design Method for Service Function ChainingAiko Oi, Motomu Nakajima, Yuji Soejima, Mitsuho Tahara. 1-4 [doi]
- Survival Traffic Ratio Analysis for Cascading Failure in Interdependent NetworksHiroshi Yamashita, Masahiro Hayashi. 1-4 [doi]
- Best Feature Selection using Correlation Analysis for Prediction of Bitcoin Transaction CountSe-Hyun Ji, Ui-Jun Baek, Mu-gon Shin, Young-Hoon Goo, Jun-Sang Park, Myung-Sup Kim. 1-6 [doi]
- A Content-Centric Platform for Home NetworksPai-Hui Wang, Tse-Han Wang, Shih-Ting Lin, Pei-Wen Chen, Chien-Chao Tseng, Jiun-Long Huang. 1-4 [doi]
- Charging Factors for Enabling SDN/NFV Accounting ManagementJean Jimmy Julien, Fuchun Joseph Lin, Chia-Hsuan Yu, Wan-Hsun Hu. 1-4 [doi]
- A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical AnalysisMin-Seob Lee, Young-Hoon Goo, Kyu-Seok Shim, Sung Ho Yoon, Se-Hyun Ji, Myung-Sup Kim. 1-6 [doi]
- Contents Delivery for Autonomous Driving Cars in Conjunction with Car Navigation SystemArata Koike, Yoshiko Sueda. 1-4 [doi]
- A Monitorable Peer-to-Peer File Sharing MechanismWei-Chiao Huang, Lo-Yao Yeh, Jiun-Long Huang. 1-4 [doi]
- QoS-guaranteed User Association and Resource Allocation with CoMP JT in Ultra-Dense NetworksWei Kuang Lai, Chia-Yu Hsu, Yu-Po Kuo. 1-6 [doi]
- A QoS-based Opportunistic Routing Mechanism in Social Internet of VehicleYi Han, Yao Zhang, Huilin Liu, Hecun Yuan, Lanlan Rui, Ying Wang. 1-4 [doi]
- A Data-Over-Sound Application: Attendance BookSoohyun Kim, Hyunsu Mun, Youngseok Lee. 1-4 [doi]
- Understanding Intelligent RAN Slicing for Future Mobile Networks Through Field TestPing Du, Akihiro Nakao. 1-6 [doi]
- Artificial Intelligence-based Service Aggregation for Mobile-Agent in Edge ComputingMd. Shirajum Munir, Sarder Fakhrul Abedin, Choong Seon Hong. 1-6 [doi]