Abstract is missing.
- Application-Oriented Optical Transmission Control for Computationally Efficient Edge ComputingTakahiro Suzuki, Sang-Yuep Kim, Yushi Koyasako, Junichi Kani, Jun Terada. 1-2 [doi]
- Spectrum Reuse among Aerial and Ground Users in mmWave Cellular Networks in Urban SettingsSimran Singh, Sri Latha Sunkara, Ismail Güvenç, Arupjyoti Bhuyan, Huaiyu Dai, Mihail L. Sichitiu. 1-6 [doi]
- Virtual Network Function Placement Method for Evolving Network Slices based on SalienceTakahiro Hirayama, Masahiro Jibiki, Ved P. Kafle. 1-6 [doi]
- Optimal Battery Cycling Management for Smart Grid Operated Mobile NetworkWael Labidi, Tijani Chahed, Salah-Eddine Elayoubi. 1-7 [doi]
- A Maximum Concurrent Flow Technique for Optimized Data Routing in IoT ArchitecturesAbou-Bakr Djaker, Kechar Bouabdellah, Hossam Afifi, Hassine Moungla. 1-2 [doi]
- Thompson Sampling-Based Heterogeneous Network Selection Considering Stochastic Geometry AnalysisWangdong Deng, Shotaro Kamiya, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura. 1-6 [doi]
- Hardware Root Of Trust for IoT Security In Smart Home SystemsSamah Mansour, Adrian P. Lauf. 1-2 [doi]
- Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network VirtualizationAbdulhamid Adebayo, Danda B. Rawat. 1-6 [doi]
- On the Ultra-Reliable and Low-Latency Communications in Flexible TDD/FDD 5G NetworksAli A. Esswie, Klaus I. Pedersen. 1-6 [doi]
- Prototype implementation of multi-hop communication scheme among smartphones based on BLE communicationToru Yoshizaki, Yuki Yamada, Shinya Sugiura, Katsuhiro Naito. 1-2 [doi]
- A Distributed Ledger Based Infrastructure for Smart Transportation System and Social GoodMirko Zichichi, Stefano Ferretti, Gabriele D'Angelo. 1-6 [doi]
- An Authorized Access Attack Detection Method for Realtime Intrusion Detection SystemSung-Kwan Youm, Yong-Kab Kim, Kwang-Seong Shin, Eui Jik Kim. 1-6 [doi]
- Split analysis and fronthaul dimensioning in 5G C-RAN to guarantee ultra low latencyHadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sara Akbarzadeh. 1-4 [doi]
- Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Edge NetworksHongmin Yang, Jin-Hee Cho, Heesuk Son, Dongman Lee. 1-6 [doi]
- Distributed Wireless Network Optimization With Stochastic Local SearchTim van der Lee, Georgios Exarchakos, Sonia M. Heemstra de Groot. 1-6 [doi]
- Towards the quest for 5G Network SlicingFarouk Messaoudi, Philippe Bertin, Adlen Ksentini. 1-7 [doi]
- Improving Secrecy Performance of Land Mobile Satellite Systems via a UAV Friendly JammerVinay Bankey, Prabhat K. Upadhyay. 1-4 [doi]
- Secure and Efficient Outsourcing of Matrix Multiplication based on Secret Sharing Scheme using only One ServerMasashi Yamane, Keiichi Iwamura. 1-6 [doi]
- Pervasive Games as Web-applications: a Case Study based on a Laser GameGiovanni Delnevo, Diego Pergolini, Luca Passeri, Silvia Mirri. 1-6 [doi]
- Exact Outage Analysis for Stochastic Cellular Networks under Multi-User MIMOSachitha Kusaladharma, W.-P. Zhu, Wessam Ajib. 1-6 [doi]
- Communication Mechanisms for Service-Centric NetworkingMikael Gasparyan, Eryk Schiller, Ali Marandi, Torsten Braun. 1-8 [doi]
- Opportunistic Selection of Vehicular Data Brokers as Relay Nodes to the CloudShadha Tabatabai, Ihab Mohammed, Ala Al-Fuqaha Senior, Junaid Qadir 0001. 1-6 [doi]
- Mobile Vehicular Edge Computing Architecture using Rideshare Taxis as a Mobile Edge ServerMohammed Laroui, Boubakr Nour, Hassine Moungla, Hossam Afifi, Moussa Ali Cherif. 1-2 [doi]
- Real-Time Motion Control Method Using Measured Delay Information on Access Edge ComputingYushi Koyasako, Takahiro Suzuki, Sang-Yuep Kim, Junichi Kani, Jun Terada. 1-4 [doi]
- Encoded Flow Features for Network Intrusion Detection in Internet of ThingsAbdul Jabbar Siddiqui, Azzedine Boukerche. 1-6 [doi]
- Are CAPTCHAs preventing robotic intrusion or accessibility for impaired users?Rudy Berton, Ombretta Gaggi, Agnieszka Kolasinska, Claudio Enrico Palazzi, Giacomo Quadrio. 1-6 [doi]
- Effective disaster recovery for edge computing against large-scale natural disastersTakuma Tsubaki, Ryota Ishibashi, Takeshi Kuwahara, Yoshikatsu Okazaki. 1-2 [doi]
- Proposal of service framework for information sharing based on delay tolerant networksShinya Sugiura, Yuki Yamada, Toru Yoshizaki, Katsuhiro Naitot. 1-2 [doi]
- Service Identification Based on SNI AnalysisHiroaki Yamauchi, Akihiro Nakao, Masato Oguchi, Shu Yamamoto, Saneyasu Yamaguchi. 1-6 [doi]
- A face recognition based system to assist seniors in managing access to their homeFabio Pittarello, Samuele Botter. 1-6 [doi]
- BER Measurement for Transmission Pattern Design of ITS Image Sensor Communication Using DMD ProjectorTomoya Arisue, Takaya Yamazato, Hiraku Okada, Toshiaki Fujii, Masayuki Kinoshita, Koji Kamakura, Shintaro Arai, Tomohiro Yendo. 1-6 [doi]
- Blockchain-based Mobility Verification of Connected CarsCarla-Fabiana Chiasserini, Paolo Giaccone, Giovanni Malnati, Michele Macagno, German Sviridov. 1-6 [doi]
- Smart Grids for Smarter CitiesRiccardo Bonetto, Ilya Sychev, Oleksandr Zhdanenko, Abdelrahman Abdelkader, Frank H. P. Fitzek. 1-2 [doi]
- PEX: Privacy-Preserved, Multi-Tier Exchange Framework for Cross Platform Virtual Assets TradingAkkarit Sangpetch, Orathai Sangpetch. 1-4 [doi]
- EdgeMORE: improving resource allocation with multiple options from tenantsAndrea Araldo, Alessandro Di Stefano, Antonella Di Stefano. 1-6 [doi]
- Towards Secure Smart Parking System Using Blockchain TechnologyWesam Al Amiri, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, Kemal Akkaya. 1-2 [doi]
- Stabilization of Multi-Hop Routing Construction in Wi-SUN FAN SystemsDaiki Hotta, Ryota Okumura, Keiichi Mizutani, Hiroshi Harada. 1-6 [doi]
- A Study on Innovation in University Education: Focusing on 5G Mobile CommunicationJunghwan Lee, Dongwook Kim. 1-4 [doi]
- Attack Trees for Security and Privacy in Social Virtual Reality Learning EnvironmentsSamaikya Valluripally, Aniket Gulhane, Reshmi Mitra, Khaza Anuarul Hoque, Prasad Calyam. 1-9 [doi]
- A Cooperative Physical Layer Scene-Awareness Scheme for Visible Light CommunicationsHamid Hosseinianfar, Maïté Brandt-Pearce. 1-2 [doi]
- Temporal difference based adaptive object Detection (ToDo) platform at Edge Computing SystemYousung Yang, Kug Han, Seongsoo Lee, Joohyung Lee. 1-2 [doi]
- Harvesting Social Media Sentiments for Stock Index PredictionMingWei Lim, Chai Kiat Yeo. 1-4 [doi]
- Blockchain-Powered Software Defined Network-Enabled Networking Infrastructure for Cloud ManagementPraveen Fernando, Jin Wei. 1-6 [doi]
- Impact of Locality-awareness on Tit-for-Tat-based P2P File DistributionYohei Nishi, Masahiro Sasabe, Shoji Kasahara. 1-6 [doi]
- TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network PoliciesDavide Berardi, Franco Callegati, Andrea Melis, Marco Prandini. 1-6 [doi]
- CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced NetworksEric Muhati, Danda B. Rawat, Moses Garuba, Laurent Njilla. 1-4 [doi]
- TrinaryMC: Monte Carlo Based Anchorless Relative Positioning for Indoor PositioningSteven M. Hernandez, Eyuphan Bulut. 1-6 [doi]
- A Realistic Approach to Enhance the Battery Performance of Device-to-Device (D2D) Relay UEsAnup Chaudhari, Jagadeesh Gandikota, Arijit Sen, Sunny Narayan. 1-2 [doi]
- Know Your Customer: Opening a new bank account online using UAAFRomain Laborde, Arnaud Oglaza, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri, David W. Chadwick, Rémi Venant. 1-2 [doi]
- Delay Impacts on EEG-Based Determination of the Human Visual Interface QoE for Virtual and Augmented RealitiesPatrick Seeling, Frank H. P. Fitzek. 1-6 [doi]
- Leveraging Distributed Protocols for full End-to-End Softwarization in IoT NetworksEsteban Municio, Niels Balemans, Steven Latré, Johann Márquez-Barjal. 1-6 [doi]
- Congestion Window Scaling Method for Inter-protocol Fairness of BBRYeong Jun Song, Geon-Hwan Kim, You Ze Cho. 1-4 [doi]
- A Stochastic Theoretical Game Approach for Resource Allocation in Vehicular Fog ComputingHabtamu Mohammed Birhanie, Sidi-Mohammed Senouci, Mohamed Ayoub Messous, Amel Arfaoui, Ali Kies. 1-2 [doi]
- Efficient Pull-based Mobile Video Streaming leveraging In-Network FunctionsKazuhisa Matsuzono, Hitoshi Asaeda, Indukala Naladala, Thierry Turletti. 1-7 [doi]
- Distributed Decision Fusion With M -ary Source Coding On Sensor Observation and Uncoded Data TransmissionVictor W. Cheng, Tsang-Yi Wang, Hao Wang. 1-6 [doi]
- Priority-Aware SFC Provisioning in Fog ComputingN. Siasi, A. Jaesim. 1-6 [doi]
- A blockchain-based mechanism for secure data exchange in smart grid protection systemsDimitrios Sikeridis, Ali Bidram, Michael Devetsikiotis, Matthew J. Reno. 1-6 [doi]
- Boost Your CotS IEEE 802.15.4 Network with Inter-Slot Interference Cancellation for Industrial IoTH. Murat Gürsu, Hansini Vijayaraghavan, Wolfgang Kellerer. 1-6 [doi]
- Leveraging Mobile Edge Computing to Improve Vehicular CommunicationsNina Slamnik-Krijestorac, Henrique Cesar Carvalho de Resende, Carlos Donato, Steven Latré, Roberto Riggio, Johann Márquez-Barja. 1-4 [doi]
- A Task Placement System for Face Recognition Applications in Edge ComputingHayata Satake, Ryotaro Tani, Hiroshi Shigeno. 1-6 [doi]
- Artificial Neural Network-based Estimation of Individual Localization Errors in FingerprintingFilip Lemic, Jeroen Famaey. 1-6 [doi]
- Field Experiments of 28 GHz Band 5G System at Indoor Train Station PlatformMayuko Okano, Yohei Hasegawa, Kenji Kanai, Bo Wei, Jiro Katto. 1-6 [doi]
- Emerging Interactive Applications over QUICArmir Bujari, Claudio E. Palazzi, Giacomo Quadrio, Daniele Ronzani. 1-4 [doi]
- Multi-AP Multi-Link Aggregation for High Data Rate Real-Time ApplicationsYoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama. 1-2 [doi]
- Cache Poisoning Prevention Scheme in 5G-enabled Vehicular Networks: A Tangle-based Theoretical PerspectiveSantosh Kumar Desai, Amit Dua, Neeraj Kumar 0009, Ashok Kumar Das, Joel J. P. C. Rodrigues. 1-6 [doi]
- Update Interval Violation Probability in Energy Harvesting Wireless Sensor NetworksAmina Hentati, Wael Jaafar, Jean-François Frigon, Wessam Ajib. 1-6 [doi]
- Performance of SWIPT in Cell-free Massive MIMO: A Stochastic Geometry Based PerspectiveSachitha Kusaladharma, W.-P. Zhu, Wessam Ajib, Gayan Amarasuriya. 1-6 [doi]
- Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-ThingsRonald Doku, Danda B. Rawat, Moses Garuba, Laurent Njilla. 1-6 [doi]
- Foreseeing Semi-Persistent Scheduling in Mode-4 for 5G enhanced V2X communicationPuneeth Jubba Honnaiah, Nicola Maturo, Symeon Chatzinotas. 1-2 [doi]
- Fast Session Resumption in DTLS for Mobile CommunicationsGyordan Caminati, Sara Kiade, Gabriele D'Angelo, Stefano Ferretti, Vittorio Ghini. 1-6 [doi]
- Training Task Allocation in Federated Edge Learning: A Matching-Theoretic ApproachJiawen Kang, Zehui Xiong, Dusit Niyato, Zhiguang Cao, Amir Leshem. 1-6 [doi]
- An AODV-Based Communication-Efficient Secure Routing Protocol for Large Scale Ad-Hoc NetworksYuma Shibasaki, Koya Sato, Keiichi Iwamura. 1-6 [doi]
- Shortened Query and Time-Split Response Based Dynamic Slot Reservation for Anti-CollisionJi Hwan Choi. 1-5 [doi]
- QoS Improvement of VoIP over SDNWen-Kang Jia, Yi-Yu Chou, Yaw-Chung Chen. 1-6 [doi]
- A Green IoT Node Incorporating Transient Computing, Approximate Computing and Energy/Data PredictionSikandar Zulqarnain Khan, Rashiduddin Kakar, Muhammad Mahtab Alam, Yannick Le Moullec, Haris Pervaiz. 1-6 [doi]
- Don't Go There: A Zero-Permission Geofencing App to Alleviate Gambling DisordersRoberto Coral, Flavio Esposito, Jeremiah Weinstock. 1-6 [doi]
- On BER of Fixed-Scale MIMO Underwater Wireless Optical Communication SystemsRuning Xu, Yingjie Chen, Zixian Wei, Hongyan Fu, Julian Cheng, Yuhan Dong. 1-6 [doi]
- An UAV-based incentive mechanism for Crowdsensing with budget constraintsLuis Gabriel Jaimes, Juan M. Calderon. 1-6 [doi]
- Performance Evaluation of Machine Learning Based Channel Selection Algorithm Implemented on IoT Sensor Devices in Coexisting IoT NetworksSo Hasegawa, Song-Ju Kim, Yozo Shoji, Mikio Hasegawa. 1-5 [doi]
- Generating IoT Traffic in Smart Home EnvironmentHung Nguyen-An, Thomas Silverston, Taku Yamazaki, Takumi Miyoshi. 1-2 [doi]
- A Quantum Assisted Secure Client-Centric Polyvalent Blockchain Architecture for Smart CitiesChen-Fu Chiang, Saumendra Sengupta, Ali Tekeoglu, Jorge J. Novillo, Bruno Andriamanalimanana. 1-6 [doi]
- On Fairness Issue of ABR and TCP Algorithms in Video StreamingTomotaka Matsumoto, Koki Goto, Miki Yamamoto. 1-2 [doi]
- On Kurtosis of Spreading Sequences for NOMANazli Ahmad Khan Beigi, Afshin Haghighat. 1-5 [doi]
- Non-invasive Blood Glucose Measurement Based on mid-Infrared SpectroscopyYang Chen, Jiang Liu 0005, Zhenni Pan, Shigeru Shimamoto. 1-5 [doi]
- Optimal Power Allocation and Signal Phase Selection in NOMA Wireless Relay NetworksYen-Chun Liu, Rung-Hung Gau. 1-6 [doi]
- Do Conversational Interfaces Kill Web Accessibility?Marco Furini, Silvia Mirri, Manuela Montangero, Catia Prandi. 1-6 [doi]
- Enterprise Security with Adaptive Ensemble Learning on Cooperation and Interaction PatternsKyle Quintal, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein. 1-7 [doi]
- Game theoretic approach applied in cybersecurity information exchange frameworkAnkita Thakkar, Shahriar Badsha, Shamik Sengupta. 1-7 [doi]
- Closed Loop Benchmark for Timeseries DatabasesIlya Sychev, Abdelrahman Abdelkader, Wojciech Kozak, Riccardo Bonetto, Frank H. P. Fitzek. 1-6 [doi]
- Secure Pairwise Key Sharing using Geometric Group Key Sharing MethodShogo Ochiai, Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal. 1-2 [doi]
- Upper Bound on LoRa Smart Metering Uplink RateChristopher Paolini, Hrishikesh Adigal, Mahasweta Sarkar. 1-4 [doi]
- Simultaneous Wireless Information and Power Transfer in UAV-assisted Cellular IoT NetworksXueyuan Wang, M. Cenk Gursoy, Ismail Güvenç. 1-6 [doi]
- Network-Side Task Allocation for Mobile CrowdsensingYu Nakayama. 1-6 [doi]
- Cooperative Sensing in Deep RL-Based Image-to-Decision Proactive Handover for mmWave NetworksYusuke Koda, Kota Nakashima, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura. 1-6 [doi]
- Adaptive Containerization for Microservices in Distributed Cloud SystemsNishant Deepak Keni, Ahan Kak. 1-6 [doi]
- Cuttlefish: A Flexible and Lightweight Middleware for Combining Heterogeneous IoT DevicesAndreas Pamboris, Charalampos Kozis, Herodotos Herodotou. 1-6 [doi]
- OTMS: A Novel Radar-Based Mapping System for Automotive ApplicationsJustin Bode, Arslan Munir. 1-6 [doi]
- On Performance of Underwater Wireless Optical Communications Under TurbulenceShi Zhang, Li Zhang, Zhaocheng Wang, Jinguo Quan, Julian Cheng, Yuhan Dong. 1-2 [doi]
- Low Cost C-RAN and Fronthaul Design with WDM-PON and Multi-hopping Wireless LinkDaisuke Hisano, Kazuki Maruta, Yu Nakayama. 1-6 [doi]
- NCSbench: Reproducible Benchmarking Platform for Networked Control SystemsSamuele Zoppi, Onur Ayan, Fabio Molinari, Zenit Music, Sebastian Gallenmüller, Georg Carle, Wolfgang Kellerer. 1-9 [doi]
- Where to Go Next?: A Realistic Evaluation of AI-Assisted Mobility Predictors for HetNetsMarvin Manalastas, Hasan Farooq, Syed Muhammad Asad Zaidi, Ali Imran. 1-6 [doi]
- Wireless Smart Ubiquitous Network by CSL-based Low Power MAC ProtocolKai Samejima, Ryota Okumura, Keiichi Mizutani, Hiroshi Harada. 1-2 [doi]
- A Home Area Heterogeneous Wireless Management Scheme by Wi-SUN FAN and Wi-Fi SystemsKiyoshi Mizutani, Ryota Okumura, Keiichi Mizutani, Hiroshi Harada. 1-4 [doi]
- High Security Bare Metal Bluetooth Blockchain Payment Terminal For Trusted Ethereum TransactionPascal Urien. 1-2 [doi]
- RSS-Based Detection of Drones in the Presence of RF InterferersPriyanka Sinha, Yavuz Yapici, Ismail Güvenç, Esma Turgut, Mustafa Cenk Gursoy. 1-6 [doi]
- Learning-based Downlink User Selection Algorithm for UAV-BS Communication NetworkChu-Peng Wu, Yun-Ruei Li, Jing-Ling Wang, Hsin-Piao Lin, Li-Chun Wang 0001, Shiann Shiun Jeng, Jen-Yeu Chen. 1-5 [doi]
- Evolutionary Actor-Multi-Critic Model for VNF-FG EmbeddingPham Tran Anh Quang, Yassine Hadjadj Aoul, Abdelkader Outtagarts. 1-6 [doi]
- Seamless Service Migration Framework for Autonomous Driving in Mobile Edge CloudTung V. Doan, Zhongyi Fan, Giang T. Nguyen, Dongho You, Alexander Kropp, Hani Salah, Frank H. P. Fitzek. 1-2 [doi]
- Accelerating Smart Speaker Service with Content Prefetching and Local ControlHyunsu Mun, Youngseok Lee. 1-6 [doi]
- When Deep Learning meets Web Measurements to infer Network PerformanceImane Taibi, Yassine Hadjadj Aoul, Chadi Barakat. 1-6 [doi]
- SmartFIB: Low-Replacement Route Storage for Large Name Space ForwardingDinh Nguyen, Hitoshi Asaeda. 1-7 [doi]
- MOTH- Mobility-induced Outages in THz: A Beyond 5G (B5G) applicationRohit Singh 0007, Douglas C. Sicker, Kazi Mohammed Saidul Huq. 1-9 [doi]
- Topology control method adopting optimal topology with minimum cumulative energy consumption over update interval in MANETsKouichi Genda. 1-6 [doi]
- TOM: a self-trained Tomography solution for Overlay networks MonitoringMohamed Rahali, Jean-Michel Sanner, Gerardo Rubino. 1-6 [doi]
- Distributed Scheduling for Time-Critical Tasks in a Two-layer Vehicular Fog Computing ArchitectureYi Zhou, Kai Liu, Xincao Xu, Songtao Guo, Zhou Wu, Victor Lee, Sang Hyuk Son. 1-7 [doi]
- PoolCoin: Toward a distributed trust model for miners' reputation management in blockchainAbdellah Kaci, Abderrezak Rachedi. 1-6 [doi]
- Cooperative Drone Positioning Measuring in Internet-of-DronesChao-Yang Lee. 1-3 [doi]
- A Framework for Predicting Haptic Feedback in Needle Insertion in 5G Remote Robotic SurgeryFrancis Boabang, Roch H. Glitho, Halima Elbiaze, Fatna Belqasmi, Omar Alfandi. 1-6 [doi]
- Performance improvement of V2I uplink transmission on far vehicles using frequency scheduling-based cooperative V2V relay transmissionHayato Ishikawa, Eiji Okamoto, Hiraku Okada, Satoshi Makido. 1-6 [doi]
- Remote Authentication Using an Ultra-Wideband Radio Frequency TransceiverSeong Kyu Leem, Faheem Khan, Sung Ho Cho. 1-8 [doi]
- Fast Reroute in Hybrid Segment Routing NetworkXiaoqian Li, Kwan L. Yeung. 1-6 [doi]
- On Selecting Channel Parameters for Public Safety Network Applications in LTE D2D CommunicationsSiyuan Feng, Hyeong-Ah Choi, David W. Griffith, Richard Rouil. 1-6 [doi]
- Dependable Source Routing Scheme for Multi-Hop Networks Based on Receiver-Initiated MAC ProtocolRyota Okumura, Keiichi Mizutani, Hiroshi Harada. 1-4 [doi]
- Evaluation of CSL-based Low Power MAC Protocol for Wireless Smart Metering NetworksKai Samejima, Ryota Okumura, Keiichi Mizutani, Hiroshi Harada. 1-6 [doi]
- Secrecy Improvement of Cognitive Relay Networks using Modulation DiversityMuhammad Ajmal Khan, Firas Hassan. 1-6 [doi]
- UAV Path Planning for Data Ferrying with Communication ConstraintsJose Joseph, Mohammadreza Radmanesh, Mohammad Nazmus Sadat, Rui Dai, Manish Kumar 0006. 1-9 [doi]
- Cache Policy Based on Popularity Dynamics of YouTube Video ContentKoki Nagata, Noriaki Kamiyama, Miki Yamamoto. 1-4 [doi]
- CSI feedback based on space-frequency compressionMd Saifur Rahman, Eko N. Onggosanusi, Hongbo Si, Joonyoung Cho. 1-6 [doi]
- Using Coalitional Game for Bandwidth-aware Fast Failover in Distributed SDN EnvironmentJia-Wei Li, Chun-Chien Teng, Ta-Wei Yang, Cheng-Fu Chou. 1-6 [doi]
- NOMA-Based Network Coding in IoT Networks with Correlated SourcesNazli Ahmad Khan Beigi, Mohammad Reza Soleymani. 1-2 [doi]
- A visual immersive participatory platform to foster dialogue between locals and touristsJosé Candido, Valentina Nisi, Catia Prandi, Nuno Nunes 0001. 1-6 [doi]
- Alternate Action Recommender System Using Recurrent Patterns of Smart Home UsersPrabhat Mishra, Suresh Kumar Gudla, Amogha D. Shanbhag, Joy Bose. 1-6 [doi]
- Novel Adaptive Data Collection based on a Confidence Index in SDNKokouvi Bénoît Nougnanke, Yann Labit. 1-6 [doi]
- Convergence Communication over Heterogeneous Mesh Network for Disaster and Underserved AreasArul Mathi Maran Chandran, Maciej Zawodniok, Aaron Phillips. 1-4 [doi]
- NCSbench Demo: Reproducible Benchmarking Platform for Networked Control SystemsSamuele Zoppi, Onur Ayan, Fabio Molinari, Zenit Music, Sebastian Gallenmüller, Georg Carle, Wolfgang Kellerer. 1-2 [doi]
- Lightweight Authentication Scheme for Internet of ThingsArie Haenel, Yoram Haddad, Zonghua Zhang. 1-2 [doi]
- A Novel Q- Learning Assisted Dynamic Power Sharing for Dual Connectivity ScenarioAnup Chaudhari, Naveen Kumar, Prakash Rao. 1-6 [doi]
- Reliable THz Communications for Outdoor based Applications- Use Cases and MethodsRohit Singh, Douglas C. Sicker. 1-4 [doi]
- Work datafication and digital work behavior analysis as a source of social goodFabiola Bertolotti, Tommaso Fabbri, Federica Mandreoli, Riccardo Martoglia, Anna Chiara Scapolan. 1-6 [doi]
- Optimal Scheduling for Discounted Age Penalty Minimization in Multi-Loop Networked ControlOnur Ayan, Mikhail Vilgelm, Wolfgang Kellerer. 1-7 [doi]
- Novel System Design for Reducing Cost and Power Consumption in a Multi-SIM User EquipmentKumud Sinha, Tushar Vrind, Lalit Pathak, Debabrata Das. 1-2 [doi]
- A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular NetworksKiho Lim, Tariqul Islam, Hyunbum Kim, Jingon Joung. 1-5 [doi]
- Analytical Formulas for the Ergodic Capacity in Association of RRHs in Cloud Radio Access NetworksAyad N. Bihnam, Xian Liu, Bilal Al-Doori. 1-4 [doi]
- AirQ: A Smart IoT Platform for Air Quality MonitoringVishal Choudhary, Jun Hao Teh, Victoria Beltran, Hock-Beng Lim. 1-2 [doi]
- Outage Probability-based Adaptive Guard Band Allocation for Mixed NumerologyEungkuk Nam, Taehyun Kim, Joosung Park, Kitaek Bae. 1-4 [doi]
- Grey Wolf Optimization in VANET to manage Platooning of Future Autonomous Electrical VehiclesFloriano De Rango, Mauro Tropea, Pierfrancesco Raimondo, Amilcare Francesco Santamaria. 1-2 [doi]
- Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient CloudTariqul Islam, Kiho Lim, D. Manivannan 0001. 1-6 [doi]
- A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication FrameworkRomain Laborde, Arnaud Oglaza, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri, David W. Chadwick, Rémi Venant. 1-8 [doi]
- A Reinforcement Learning Approach to Handle Radio Link Failure in Elevator ScenarioJyotirmoy Karjee, Rajan Garg, Vaishal Tijoriwala, Ashok Kumar Reddy Chavva. 1-6 [doi]
- IoT Sensor Network Powered by Sediment Microbial Fuel CellMasato Niwa, Zhenni Pan, Shigeru Shimamoto. 1-5 [doi]
- Dynamic URLLC and eMBB Multiplexing Design in 5G New RadioWei Yang, Chih-Ping Li, Ali Fakoorian, Kianoush Hosseini, Wanshi Chen. 1-5 [doi]
- Towards Performance Improvement of User Plane Traffic in Wireless System: Security AspectsR. Rajavelsamy, Hilam Patel, Siva Naga Kumar A. V. 1-2 [doi]
- Throughput Analysis for Wireless Multi-hop Networks with Synchronous Full-Duplex MACYosuke Yumen, Shota Sakakura, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori. 1-7 [doi]
- Deep Learning Decoder for MIMO Communications with Impulsive NoiseOscar Delgado, Fabrice Labeau. 1-6 [doi]
- Network Management - Edge and Cloud Computing The SliceNet CaseMaria Barros Weiss, Anastasius Gavras, Pablo Salva-Garcia, Jose M. Alcaraz Calero, Qi Wang. 1-6 [doi]
- Impact of Hardware Impairments on Cognitive Satellite-Terrestrial Relaying with a Direct LinkVibhum Singh, Sourabh Solanki, Prabhat K. Upadhyay, Daniel B. da Costa, Jules Merlin Mouatcho Moualeu. 1-6 [doi]
- liteNDN: QoS-Aware Packet Forwarding and Caching for Named Data NetworksMohamed Abdelaal 0001, Mustafa Karadeniz, Frank Dürr, Kurt Rothermel. 1-9 [doi]
- Leveraging Privileged Information to Limit Distraction in End-to-End Lane FollowingFrançois Robinet, Antoine Demeules, Raphaël Frank, Georgios Varisteas, Christian Hundt. 1-6 [doi]
- Station-centric Access Point Selection Method for Heterogeneous Wi -Fi EnvironmentShohei Arakaki, Daiki Nobayashi, Kazuya Tsukamoto. 1-6 [doi]
- An Efficient D2D Handover Management Scheme for SDN-based 5G networksKaouthar Ouali, Meriem Kassar, Thi Mai Trang Nguyen, Kaouthar Sethom, Brigitte Kervella. 1-6 [doi]
- ESAC: An Energetic Sustainable Adaptive Clustering Protocol for Heterogenous Wireless Ad Hoc Networks (HANETs)Nahid Ebrahimi Maid, Michael McDermott. 1-6 [doi]
- Temporal Mobile Relay Selection for Information Dissemination in Distributed Wireless NetworksHakgyun Roh, Cheonyong Kim, Sangdae Kim, Kwansoo Jung, Sang-Ha Kim 0001. 1-2 [doi]
- Machine Learning based Video Hosting Site Identification Method for MVNO NetworksAnan Sawabe, Tomoki Ito, Takanori Iwai. 1-4 [doi]
- On Using Flow Classification to Optimize Traffic Routing in SDN NetworksHaythem Yahyaoui, Saifeddine Aidi, Mohamed Faten Zhani. 1-6 [doi]
- Location-dependent Task Assignment for Opportunistic Mobile CrowdsensingFatih Yucel, Eyuphan Bulut. 1-6 [doi]
- Factor Discrimination of Scanning Failure and Delay for Efficient Network Scanning of IoT Wireless EquipmentBabatunde Ojetunde, Naoto Egashira, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki. 1-2 [doi]
- Vehicular Fog Resource Allocation Scheme: A Multi-Objective Optimization based ApproachTesnim Mekki, Rihab Jmal, Lamia Chaari, Issam Jabri, Abderrezak Rachedi. 1-6 [doi]
- Reducing Transmission Delay in EDCA Using Policy Gradient Reinforcement LearningMasao Shinzaki, Yusuke Koda, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura. 1-6 [doi]
- Detecting Malware-infected Hosts Using Templates of Multiple HTTP RequestsTaiga Hokaguchi, Yuichi Ohsita, Toshiki Shibahara, Daiki Chiba 0001, Mitsuaki Akiyama, Masayuki Murata. 1-2 [doi]
- Implementation and Analysis of Blockchain Based DApp for Secure Sharing of Students' CredentialsRaaj Anand Mishra, Anshuman Kalla, Nimer Amol Singh, Madhusanka Liyanage. 1-2 [doi]
- Machine Learning-Based MIMO Enabling Techniques for Energy Optimization in Cellular NetworksMariam M. N. Aboelwafa, Mohamed Mahmoud Zaki, Ayman Gaber, Karim G. Seddik, Yasser Gadallah, Ayman Elezabi. 1-6 [doi]
- Equipping NDN-VANETs with Directional Antennas for Efficient Content RetrievalEirini Kalogeiton, Domenico Iapello, Torsten Braun. 1-8 [doi]
- Evaluating the performance of NRENs in deploying IoT in Africa: the case for TTNMarco Zennaro, Cristel Pelsser, Franck Albinet, Pietro Manzoni. 1-4 [doi]
- Millimeter Wave Multi-Beam Combining Algorithm for Efficient 5G Cell SearchSripada Kadambar, Ankur Goyal, Ashok Kumar Reddy Chavva. 1-6 [doi]
- Wireless- Powered UAV assisted Communication System in Nakagami-m Fading ChannelsTharindu D. Ponnimbaduge Perera, Dushantha Nalin K. Jayakody, Sahil Garg, Neeraj Kumar 0001, Ling Cheng. 1-6 [doi]
- Load Balancing in Cellular Networks: A Reinforcement Learning ApproachKareem M. Attiah, Karim Banawan, Ayman Gaber, Ayman Elezabi, Karim G. Seddik, Yasser Gadallah, Kareem Abdullah. 1-6 [doi]
- IoT-Enabled Shipping Container with Environmental Monitoring and Location TrackingK. Salah, A. Alfalasi, M. Alfalasi, M. Alharmoudi, M. Alzaabi, A. Alzyeodi, R. W. Ahmad. 1-6 [doi]
- Innovative ATMEGA8 Microcontroler Static Authentication Based on SRAM PUFPascal Urien. 1-2 [doi]
- Proof-of-Concept of Uncompressed 4K Video Transmission from Drone through mmWaveYoshitaka Takaku, Yohei Kaieda, Tao Yu, Kei Sakaguchi. 1-6 [doi]
- Real-time Crop Classification Using Edge Computing and Deep LearningMing-Der Yang, Hsin-Hung Tseng, Yu-Chun Hsu, Wei Chen Tseng. 1-4 [doi]
- Effects of Vehicular Blockage on Latency in 5G mm Wave Systems with Dynamic Point SelectionAnusha Gunturu, Ashok Kumar Reddy Chavva, Virendra Kumar. 1-6 [doi]
- Alloyed Pseudonym Change Strategy for Location Privacy in VANETsLeila Benarous, Benamar Kadri, Saadi Boudjit. 1-6 [doi]
- A Machine Learning-Based Technique for the Classification of Indoor/Outdoor Cellular Network ClientsKareem Abdullah, Sara A. Attalla, Yasser Gadallah, Ayman Elezabi, Karim G. Seddik, Ayman Gaber, Dina Samak. 1-2 [doi]
- Communication-Efficient Cooperative Contextual Bandit and Its Application to Wi-Fi BSS SelectionTaichi Sakakibara, Takayuki Nishio, Akihito Taya, Masahiro Morikura, Koji Yamamoto, Toshihisa Nabetani. 1-6 [doi]
- Co-simulation of an electrical distribution network and its supervision communication networkBenjamin Camus, Anne Blavette, Anne-Cécile Orgerie, Jean-Baptiste Blanc-Rouchossé. 1-6 [doi]
- Long-Range MIMO Channel Prediction Using Recurrent Neural NetworksWei Jiang, Mathias Strufe, Hans Dieter Schotten. 1-6 [doi]
- Intelligent and Adaptive Machine Learning-based Algorithm for Power Saving in Mobile HotspotKavin Kumar Thangadorai, Raj Kumar Saranappa, Abdus Sarif Ahmed, Kumar Murugesan, Manbir Singh Soni, Radhika Mundra, Manjunath Neelappa Sataraddi, Srihari Sriram, Varun Singh, B. Shashi Kumar, Mayuresh Madhukar Patil, Debabrata Das. 1-6 [doi]
- A Sequential WLAN Channel Selection Adaptive to Factors Outside the SystemKazuki Ohtsu, Shotaro Kamiya, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura, Noriyasu Kato. 1-2 [doi]
- Improving Maliciousness Estimation of Indicator of Compromise Using Graph Convolutional NetworksYuta Kazato, Yoshihide Nakagawa, Yuichi Nakatani. 1-7 [doi]
- Novel C-RAN Architecture with PON based Midhaul and Wireless Relay FronthaulYu Nakayama, Daisuke Hisano, Takuya Tsutsumi, Kazuki Maruta. 1-6 [doi]
- Enabling Broadcast-based Offload and Distributed Caching for Mobile Social NetworksVinay Kumar Shrivastava, Rohan Raj, Lalit Pathak. 1-2 [doi]
- On-Demand, Unattended Authentication: A Novel Online Access Model Without Cumbersome Login ProceduresManki Min. 1-2 [doi]
- Almawhere 2.0: a pervasive system to facilitate indoor wayfindingGiovanni Delnevo, Giacomo Mambelli, Vincenzo Rubano, Catia Prandi, Silvia Mirri. 1-4 [doi]
- A Cooperative Coevolutionary Approach to Maximise Surveillance Coverage of UAV SwarmsDaniel H. Stolfi, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry. 1-6 [doi]
- Efficient Load balancing to serve Heterogeneous Requests in Clustered Systems using KubernetesAmit Dua, Sahil Randive, Aditi Agarwal, Neeraj Kumar 0001. 1-2 [doi]
- Spectrum Misuse Detection in Cooperative Wireless NetworksDebarun Das, J. Stepanie Rose, Taieb Znati, Pedro Bustamante, Martin Weiss, Marcela M. Gomez. 1-6 [doi]
- Low Complexity Decoding of Downlink Chaos NOMA Scheme with Physical Layer SecurityYoshihiro Masuda, Eiji Okamoto, Tetsuya Yamamoto. 1-6 [doi]
- Detouring Skip Graph: A Structured Overlay Utilizing Detour RoutesTakeshi Kaneko, Ryohei Banno, Kazuyuki Shudo, Yusuke Aoki, Kota Abe, Yuuichi Teranishi. 1-7 [doi]
- PUF-IPA: A PUF-based Identity Preserving Protocol for Internet of Things AuthenticationMahmood Azhar Qureshi, Arslan Munir. 1-7 [doi]
- ECU Counterfeit Mitigation Using Holistic Approach in Modern Automotive Echo SystemMostafa El-Said. 1-2 [doi]
- Mimic Learning to Generate a Shareable Network Intrusion Detection ModelAhmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud. 1-6 [doi]
- On Design of Multilevel Coded Modulation Based on CRC-Concatenated Polar CodesYuki Yajima, Hideki Ochiai. 1-6 [doi]
- Drone Detection via Low Complexity Zadoff-Chu Sequence Root EstimationChun Kin Au-Yeung, Brandon F. Lo, Scott Torborg. 1-4 [doi]
- Improving Information Dissemination in Vehicular Opportunistic NetworksLeonardo Chancay-Garcia, Jorge Herrera-Tapia, Pietro Manzoni, Enrique Hernández-Orallo, Carlos Miguel Tavares Calafate, Juan-Carlos Cano. 1-6 [doi]
- IoT-MAAC: Multiple Attribute Access Control for IoT environmentsAhmad Khalil, Nader Mbarek, Olivier Togni. 1-6 [doi]
- An Energy-Efficient Collaborative Scheme for UAVs and VANETs for Dissemination of Real-Time Surveillance Data on HighwaysNouman Bashir, Saadi Boudjit. 1-6 [doi]
- ProSign+ A Cloud-Based Platform Supporting Inclusiveness in Public CommunicationPietro Battistoni, Monica Sebillo, Marianna Di Gregorio, Giuliana Vitiello, Marco Romano 0001. 1-5 [doi]