Abstract is missing.
- A Study on Automation of Network Maintenance in Telecom Carriers for Zero-Touch OperationsAiko Oi, Ryosuke Sato, Yuichi Suto, Kosuke Sakata, Motomu Nakajima, Tsuyoshi Furukawa. 1-6 [doi]
- Graph Neural Network based Service Function Chaining for Automatic Network ControlDongNyeong Heo, Stanislav Lange, Heegon Kim, Heeyoul Choi. 7-12 [doi]
- Graph Neural Network-based Virtual Network Function ManagementHeegon Kim, Suhyun Park, Stanislav Lange, Doyoung Lee, DongNyeong Heo, Heeyoul Choi, Jae-Hyoung Yoo, James Won-Ki Hong. 13-18 [doi]
- IBNSlicing: Intent-Based Network Slicing Framework for 5G Networks using Deep LearningKhizar Abbas, Muhammad Afaq, Talha Ahmed Khan, Asif Mehmood, Wang-Cheol Song. 19-24 [doi]
- Distributed SDN Based Network State Aware Architecture for Flying Ad-hoc NetworkMuhammad Saqib, Asif Mehmood, Adeel Rafiq, Muhammad Afaq, Wang-Cheol Song. 25-30 [doi]
- A Load Balancing Approach for Distributed SDN Architecture Based on Sharing Data StoreJiacong Li, Bo Lei, Ni Li, Hang Lv 0006. 31-36 [doi]
- Dynamic Control Method of Explicit Address Mapping Table in IPv6 Single-Stack NetworkYasunobu Toyota, Osamu Nakamura. 37-42 [doi]
- An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference ModelYoung-Hoon Goo, Kyu-Seok Shim, Ui-Jun Baek, Jee-Tae Park, Mu-gon Shin, Myung-Sup Kim. 43-48 [doi]
- Generic Intent-based Networking Platform for E2E Network Slice Orchestration & Lifecycle ManagementTalha Ahmed Khan, Khizar Abbas, Adeel Rafique, Muhammad Afaq, Wang-Cheol Song. 49-54 [doi]
- Deep Multi-Agent Reinforcement Learning for Resource Allocation in D2D Communication Underlaying Cellular NetworksXu Zhang, Ziqi Lin, Beichen Ding, Bo Gu, Yu Han. 55-60 [doi]
- Structural deterioration determination system for improving the efficiency of utility pole inspectionYukihiro Goto, Shigehiro Matsuda, Masaki Waki, Hiroyuki Oshida. 61-66 [doi]
- Machine Learning-based Optimal VNF DeploymentSuhyun Park, Heegon Kim, Jibum Hong, Stanislav Lange, Jae-Hyoung Yoo, James Won-Ki Hong. 67-72 [doi]
- Entropy-based IoT Devices IdentificationHung Nguyen-An, Thomas Silverston, Taku Yamazaki, Takumi Miyoshi. 73-78 [doi]
- Event-aware Hierarchical Routing with Differential Compression to Extend WSN LifetimeYou-Chiun Wang, Bo-Chun Pan. 79-84 [doi]
- Topic-based Allocation of Distributed Message Processors on Edge-Servers for Real-time Notification ServiceTomoya Tanaka, Tomio Kamada, Chikara Ohta. 85-90 [doi]
- JBRC: Jointly Balanced Routing and Charging Scheme for RF Energy Harvesting Wireless Sensor NetworksChenyiming Wen, Bingqian Zhu, Yinan Zhu. 91-95 [doi]
- Channel Assignment and Access System Selection in Heterogeneous Wireless Network with Unlicensed BandsKazuhiko Kinoshita, Kazuki Ginnan, Keita Kawano, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe. 96-101 [doi]
- Optimized Deployment of Multi-UAV based on Machine Learning in UAV-HST NetworkingYu Min Park, Yan Kyaw Tun, Choong Seon Hong. 102-107 [doi]
- Energy-Efficient Offloading and User Association in UAV-assisted Vehicular Ad Hoc NetworkPyae Sone Aung, Yan Kyaw Tun, Nway Nway Ei, Choong Seon Hong. 108-113 [doi]
- Mitigating SYN flooding Attack and ARP Spoofing in SDN Data PlaneTing-Yu Lin, Jhen-Ping Wu, Pei-Hsuan Hung, Ching-Hsuan Shao, Yu-Ting Wang, Yun-Zhan Cai, Meng-Hsun Tsai. 114-119 [doi]
- A Design of Port Scan Detection Method Based on the Characteristics of Packet-In Messages in OpenFlow NetworksDaichi Ono, Satoru Izumi, Toru Abe, Takuo Suganuma. 120-125 [doi]
- Improving Scanner Data Collection in P4-based SDNYun-Zhan Cai, Chih-Hao Lai, Yu-Ting Wang, Meng-Hsun Tsai. 126-131 [doi]
- A Light-weight Mitigation Scheme on the Mole Content Poisoning Attack in NDNPengfei Yue, Ru Li, Bin Pang. 132-137 [doi]
- Real-time Monitoring of Packet Processing Time for Virtual Network FunctionsNguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 138-143 [doi]
- An Evaluation of Network Service Monitoring Method Using User Traffic InformationKei Takeshita, Yuji Soejima. 144-149 [doi]
- Optimized Quantization for Convolutional Deep Neural Networks in Federated LearningYou Jun Kim, Choong Seon Hong. 150-154 [doi]
- A Self-Adaptive Measurement Rate Control Method for an Agent-based Service Monitoring SystemMasaru Sakai, Kensuke Takahashi, Satoshi Kondoh. 155-160 [doi]
- Real-time Monitoring System for Container Networks in the Era of MicroservicesTakashi Shiraishi, Masaaki Noro, Reiko Kondo, Yosuke Takano, Naoki Oguchi. 161-166 [doi]
- IWApriori: An Association Rule Mining and Self-updating Method Based on Weighted IncrementYonghua Huo, Jing Dong, Zhongdi Ge, Ping Xie, Na An, Yang Yang. 167-172 [doi]
- Exploiting Interference-aware GPU Container Concurrency Learning from Resource Usage of Application ExecutionSejin Kim, Yoonhee Kim. 173-178 [doi]
- Asocial: Adaptive Task Re-Allocation in Distributed Computing Systems with Node FailuresWeiwei Zheng, Yanli Shen, Taoshun Xiao. 179-184 [doi]
- Smart Self-Checkout Carts Based on Deep Learning for Shopping Activity RecognitionHong-Chuan Chi, Muhammad Atif Sarwar, Yousef-Awwad Daraghmi, Kuan-Wen Liu, Tsì-Uà Ik, Yih-Lang Li. 185-190 [doi]
- Friend Recommendation Based on Mobile Crowdsensing in Social NetworksTzung-Shi Chen, Song-Wei Syu. 191-196 [doi]
- Information Diffusion Within a Limited Budget Using Node Centralities and Community DetectionKalyanee Devi, Rohit Tripathi 0001. 197-202 [doi]
- Analysis of Ethereum Network Properties and Behavior of Influential NodesSoo Hoon Maeng, Meryam Essaid, Hongtaek Ju. 203-207 [doi]
- Distributed Profitable Deployment of Network Services to Geo-distributed Edge SystemsYi-Chia Chen, Li-Hsing Yen. 208-213 [doi]
- Deployment of Facial Recognition Models at the Edge: A Feasibility StudyXihao Zhou, Sye Loong Keoh. 214-219 [doi]
- Q-Learning based SFC deployment on Edge Computing EnvironmentSuman Pandey, James Won-Ki Hong, Jae-Hyoung Yoo. 220-226 [doi]
- Event-Triggered Media Stream Bandwidth Adjustment in IoT-Based Home NetworksChao-Yu Hsu, Chin-Lin Hu, Kun-Sheng Huang, Yung-Hui Chen, Jiun-Long Huang. 227-230 [doi]
- Joint Analysis of Port and Protocol via Endpoint Measurement: An Empirical StudyChengshang Hou, Gaopeng Gou, Gang Xiong, Zhen Li 0011. 231-234 [doi]
- Utilization of the Blockchain Network in The Public Community Health Center Medicine Supply ChainHartanto Kumiawan, Jungyeon Kim, Hongtaek Ju. 235-238 [doi]
- Improving Performance of Collaborative Source-Side DDoS Attack DetectionSungwoong Yeom, Kyungbaek Kim. 239-242 [doi]
- TCP-PPCC: Online-Learning Proximal Policy for Congestion ControlJing Li, Yuyao Guan, Pengpeng Ding, Shiwei Wang. 243-246 [doi]
- Task Scheduling System Based on Consensus Algorithm in P2P NetworkChenhang Jiao, Yun Wang, Jinbin Tu. 247-250 [doi]
- FingerTalk: Real-time Fingertip Trajectories Tracking Service based on IoTtalkYun-Wei Lin, Lin-Hang Kao, Chun-Ting Yeh. 251-254 [doi]
- Co-Channel Interference Cancellation in OFDMA SystemKwanwoong Ryu, Joon-Young Jung, Ran-Jae Im. 255-258 [doi]
- A Study On Performance Improvement Of Hyperledger Fabric Through Batched Chaincode MessageJung-Won Lee, Sejin Park. 259-262 [doi]
- IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV EnvironmentChia-Wei Tseng, Li Fan Wu, Shih-Chun Hsu, Sheng-Wang Yu. 263-266 [doi]
- Comparison of Distance Measurement in Time Series Clustering for Predicting Bitcoin PricesUi-Jun Baek, Mu-gon Shin, Min-Seong Lee, Boseon Kim, Jee-Tae Park, Myung-Sup Kim. 267-270 [doi]
- Dynamic Network Provisioning with AI-enabled Path PlanningHong-Nam Quach, Chulwoong Choi, Kyungbaek Kim. 271-274 [doi]
- Design and Implementation of Comprehensive Test Automation Method for API Adapter in C-Plane and U-PlaneSho Kanemaru, Tomoki Ikegaya, Kensuke Takahashi, Tsuyoshi Toyoshima. 275-278 [doi]
- Q-learning based Service Function Chaining using VNF Resource-aware Reward ModelDoyoung Lee, Jae-Hyoung Yoo, James Won-Ki Hong. 279-282 [doi]
- Topology Discovery for Telecommunications-carrier Networks using Equipment AlarmsAtsushi Takada, Naoki Hayashi, Mizuto Nakamura, Naoyuki Tanji, Toshihiko Seki, Kyoko Yamagoe. 283-286 [doi]
- Examining Bitcoin mempools Resemblance Using Jaccard Similarity IndexDae-Yong Kim, Meryam Essaid, Hongtaek Ju. 287-290 [doi]
- Hierarchical Identifier (HID)-based 5G Architecture with Backup SliceHaneul Ko, Jaewook Lee 0002, Hongrok Cho, Sangheon Pack. 291-293 [doi]
- Dynamic reverse proxy chain generation for networks in data centersYang Bai, GuiXin Guo, Yong Wang, Kangyou Zhong, Jiang Li 0008, Yunfei Du. 294-297 [doi]
- VM Allocation in Data Center Subject to CPU Percentile ConstraintsYue Han, Harry Perros, Mingwu Yao. 298-301 [doi]
- Effect of Packet Loss and Delay on V2X Data FusionTzu-Kuang Lee, Jen-Jee Chen, Yu-Chee Tseng, Cheng-Kuan Lin. 302-305 [doi]
- End-to-end Service Assurance in 5G Crosshaul NetworksChe-Chun Teng, Mei-Chun Chen, Min-Han Hung, Hong-Jie Chen. 306-309 [doi]
- Design and Performance Evaluation of Hexagonal Topology Networks with Novel Routing AlgorithmsYuh-Jiuh Cheng, Bor-Tauo Chen, Wen-Lin Cheng. 310-313 [doi]
- Switched Digital Video Using Convergence Transmission of Broadcasting and Communication on Cable TV NetworkJoon-Young Jung, Dong Joon Choi, Ran-Jae Im. 314-317 [doi]
- Towards Blockchain-based Stainless Steel TrackingKyungchan Ko, Changhoon Kang, Youngbok Park, Jongsoo Woo, James Won-Ki Hong. 318-321 [doi]
- Docker environment based Apache Storm and Spark Benchmark TestJiwon Bang, Mi-Jung Choi. 322-325 [doi]
- Load Balancing Algorithm with Programmable SwitchJiyoon Lim, Sukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong. 326-329 [doi]
- Oversampling Techniques for Detecting Bitcoin Illegal TransactionsJungsu Han, Jongsoo Woo, James Won-Ki Hong. 330-333 [doi]
- An autonomous Mobile Robot System based on Serverless Computing and Edge ComputingTri Thong Tran, Yu-Chen Zhang, Wei-Tung Liao, Yu-Jen Lin, Ming-Chia Li, Huai-Sheng Huang. 334-337 [doi]
- An Integrated Monitoring System for 5G Crosshaul NetworkTing-Che Chuang, Min Liu, Yueh-Hsien Lin, Yong-Zen Haung, Chien-Wen Yang. 338-340 [doi]
- Estimating wallets and bitcoins owned by Satoshi using Hash-rate and Transactions analysisHye-Yeong Shin, Meryam Essaid, Hongtaek Ju. 341-344 [doi]
- A Measurement Study on Evaluating Container Network Performance for Edge ComputingJunghan Yoon, Jian Li, Sangho Shin. 345-348 [doi]
- Reliability Evaluation and Optimization Method in Power Communication Network Based on Environmental Factors and Controlled Hybrid Stochastic Petri NetHuilin Liu, Yucheng Ma, Xushan Chen, Meng Zhou, Shiyou Chen. 349-352 [doi]
- Mobile agents' dynamic small-world network based on attention mechanismRong Xie. 353-356 [doi]
- Design and simulation of self-organizing network routing algorithm based on Q-learningYuejia Dou, Huilin Liu, Liangkang Wei, Shiyou Chen. 357-360 [doi]
- Design and Implementation of IEEE 802.11ah (HaLow) Dongle for IoT Wireless NetworkingMin-Cheol Kim, Young-Tak Kim. 361-364 [doi]
- Automatic Mobile App Speed Measurement with RobotSoohyun Kim, Hyunsu Mun, Youngseok Lee. 365-368 [doi]
- A Framework for a Multisensory IoT System Based on Service-oriented ArchitectureSevendi Eldrige Rifki Poluan, Yan-Ann Chen. 369-372 [doi]
- Mobility Performance Enhancement in Small Cells Cluster of 5G Network: A Handover Overhead Reduction ApproachAdeel Rafiq, Muhammad Afaq, Wang-Cheol Song. 373-376 [doi]
- Experimental Comparison of Machine Learning Models in Malware Packing DetectionJong-Wouk Kim, Juhong Namgung, Yang-Sae Moon, Mi-Jung Choi. 377-380 [doi]
- Video Communication Optimization Using Distributed Edge ComputingKouichi Genda, Mitsuru Abe, Shohei Kamamura. 381-384 [doi]
- G-PFC: A Packet-Priority Aware PFC Scheme for the DatacenterZhenguo Cui, Steven Y. Rim. 385-388 [doi]
- Cross-Silo Horizontal Federated Learning for Flow-based Time-related-Features Oriented Traffic ClassificationUmer Majeed, Latif U. Khan, Choong Seon Hong. 389-392 [doi]
- Service Chaining Offloading Decision in the EdgeAI: A Deep Reinforcement Learning ApproachMinkyung Lee, Choong Seon Hong. 393-396 [doi]
- Intelligent Management System: Deep Convolutional Neural Networks for Automatic Attribute Recognition in IP Surveillance NetworksChien-Chi Kao, Yung-Chang Lai, Jung Pei, Chih-Wei Chang, Fei-Hua Kuo, Jin-Yuan Shun. 397-400 [doi]
- Evaluating NFV-enabled Network Slicing for 5G CoreChia-Wei Liao, Fuchun Joseph Lin, Yoichi Sato. 401-404 [doi]
- Federated Learning for Cellular Networks: Joint User Association and Resource AllocationLatif U. Khan, Umer Majeed, Choong Seon Hong. 405-408 [doi]
- Double-Lead Content Search Scheme for Producer Mobility in Named Data NetworkingHuilin Liu, Xushan Chen, Guoxin Xia, Hui Guo. 409-412 [doi]
- Joint Deployment and Task Computation of UAVs in UAV-assisted Edge Computing NetworkYuqing Chen, Zhaohui Zheng. 413-416 [doi]
- Prequalification of VDSL2 copper customers for G.fast services with artificial intelligence technologyPang-Chen Liu, Shun-Kai Yang, Lung-Chin Huang, Huai-En Tseng, Fei-Hua Kuo, Tai-Chueh Shih. 417-420 [doi]
- A beam-based eICIC algorithmChun-Yu Chan, Guey-Yun Chang. 421-427 [doi]