Abstract is missing.
- A Scalable Color-Based Caching Scheme in Telco-CDNsAnh-Tu Ngoc Tran, Thanh-Dang Diep, Takuma Nakajima, Masato Yoshimi, Nam Thoai. 1-5 [doi]
- P4-BNG: Central Office Network Functions on Programmable Packet PipelinesRalf Kundel, Leonhard Nobach, Jeremias Blendin, Hans-Joerg Kolbe, Georg Schyguda, Vladimir Gurevich, Boris Koldehofe, Ralf Steinmetz. 1-9 [doi]
- Look Ahead Distributed Planning For Application Management In CloudFarzin Zaker, Marin Litoiu, Mark Shtern. 1-7 [doi]
- A Composition Selection Mechanism for Chaining and Placement of Virtual Network FunctionsSamuel Moreira Abreu Araújo, Fernanda Sumika Hojo de Souza, Geraldo R. Mateus. 1-5 [doi]
- Systematic Mapping on Orchestration of Container-based Applications in Fog ComputingWalter do Espírito Santo, Rúbens de Souza Matos Júnior, Admilson de Ribamar Lima Ribeiro, Danilo Souza Silva, Reneilson Santos. 1-7 [doi]
- Causal analysis of network logs with layered protocols and topology knowledgeSatoru Kobayashi, Kazuki Otomo, Kensuke Fukuda. 1-9 [doi]
- Deep Learning Models For Aggregated Network Traffic PredictionAggelos Lazaris, Viktor K. Prasanna. 1-5 [doi]
- The Softwarised Network Data ZooManuel Peuster, Stefan Schneider, Holger Karl. 1-5 [doi]
- Slotted TDMA Multichannel MAC for Overlapped Vehicular Networks with SDN-based Distributed SystemHyundong Hwang, Young-Tak Kim. 1-5 [doi]
- Accurate Loss Estimation Technique Utilizing Parallel Flow MonitoringKohei Watabe, Norinosuke Murai, Shintaro Hirakawa, Kenji Nakagawa. 1-5 [doi]
- Data-Driven Emulation of Mobile Access NetworksAli Safari Khatouni, Martino Trevisan, Danilo Giordano. 1-6 [doi]
- A Reinforcement Learning Based Approach for 5G Network Slicing Across Multiple DomainsGodfrey kibalya, Joan Serrat 0001, Juan-Luis Gorricho, Rafael Pasquini, Haipeng Yao, Peiying Zhang. 1-5 [doi]
- A Study of Simple Partially-Recovered Sensor Data Imputation MethodsChristoph Sydora, Johannes Jung, Ioanis Nikolaidis. 1-7 [doi]
- 3-D Matching-based Resource Allocation for D2D Communications in H-CRAN NetworkPan Zhao, Xiaoyang Li, Lei Feng, Qinghui Zhang, Weidong Yang, Fei Zheng. 1-4 [doi]
- Exploring NAT Detection and Host Identification Using Machine LearningAli Safari Khatouni, Lan Zhang, Khurram Aziz, Ibrahim Zincir, A. Nur Zincir-Heywood. 1-8 [doi]
- Energy Efficient Scheduling for Networked IoT Device Software UpdateNgoc Hai Bui, Chuan Pham, Kim Khoa Nguyen, Mohamed Cheriet. 1-5 [doi]
- Scout: A Framework for Querying NetworksAndrew Curtis-Black, Andreas Willig, Matthias Galster. 1-7 [doi]
- *Adja Ndeye Sylla, Karine Guillouard, Frédéric Klamm, Meryem Ouzzif, Philippe Merle, Souha Ben Rayana, Jean-Bernard Stefani. 1-5 [doi]
- A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case StudyA. H. M. Jakaria, Mohammad Ashiqur Rahman, Aniruddha Gokhale. 1-5 [doi]
- Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learningTrung V. Phan, Syed Tasnimul Islam, Tri Gia Nguyen, Thomas Bauschert. 1-9 [doi]
- Low Overhead, Fine-grained End-to-end Monitoring of Wireless Networks using In-band TelemetryJetmir Haxhibeqiri, Ingrid Moerman, Jeroen Hoebeke. 1-5 [doi]
- SACO: A Service Chain Aware SDN Controller-Switch Mapping FrameworkDuong Tuan Nguyen, Chuan Pham, Kim Khoa Nguyen, Mohamed Cheriet. 1-8 [doi]
- Active Learning for High-Dimensional Binary FeaturesAli Vahdat, Mouloud Belbahri, Vahid Partovi Nia. 1-4 [doi]
- Reliable Slicing of 5G Transport Networks with Dedicated ProtectionNashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Mubeen Zulfiqar, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati. 1-9 [doi]
- Inter-container Communication Aware Container Placement in Fog ComputingEl Houssine Bourhim, Halima Elbiaze, Mouhamad Dieye. 1-6 [doi]
- NFV-VIPP: Catching Internal Figures of Packet Processing for Accelerating Development and Operations of NFV-nodesMasahiro Dodare, Yuki Taguchi, Ryota Kawashima, Hiroki Nakayama, Tsunemasa Hayashi, Hiroshi Matsuo. 1-4 [doi]
- Enabling Emergency Flow Prioritization in SDN NetworksJerico Moeyersons, Behrooz Farkiani, Bahador Bakhshi, Seyyed Ali MirHassani, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-8 [doi]
- Wireless Service Providers Pricing Game in Presence of Possible Sponsored DataPatrick Maillé, Bruno Tuffin. 1-5 [doi]
- Distributed Middlebox Architecture for IoT ProtectionLionel Metongnon, Ramin Sadre, Eugène C. Ezin. 1-7 [doi]
- Sense-Share: A Framework for Resilient Collaborative Service Performance MonitoringKhulan Batbayar, Emmanouil Dimogerontakis, Roc Meseguer, Leandro Navarro, Ramin Sadre. 1-7 [doi]
- Autonomic Closed Control Loops for Management, an idea whose time has come?Liam Fallon, John Keeney, Ram Krishna Verma. 1-5 [doi]
- Janus - A Software-Defined Networking MPEG-DASH Video Streaming Load BalancerEdenilson Jônatas dos Passos, Adriano Fiorese. 1-5 [doi]
- Host in Danger? Detecting Network Intrusions from Authentication LogsHaibo Bian, Tim Bai, Mohammad A. Salahuddin, Noura Limam, Abbas Abou Daya, Raouf Boutaba. 1-9 [doi]
- Experimental Estimation of LTE-A PerformanceImane Oussakel, Philippe Owezarski, Pascal Berthou. 1-9 [doi]
- Orchestrating End-to-end Slices in 5G NetworksDavit Harutyunyan, Riccardo Fedrizzi, Nashid Shahriar, Raouf Boutaba, Roberto Riggio. 1-9 [doi]
- Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage NetworkIman Vakilinia, Shahin Vakilinia, Shahriar Badsha, Engin Arslan, Shamik Sengupta. 1-6 [doi]
- Communication Challenges and Solutions between Heterogeneous Industrial IoT SystemsDániel Kozma, Gábor Soós, Dániel Ficzere, Pál Varga. 1-6 [doi]
- ADAM & RAL: Adaptive Memory Learning and Reinforcement Active Learning for Network MonitoringSarah Wassermann, Thibaut Cuvelier, Pavol Mulinka, Pedro Casas. 1-9 [doi]
- Bandwidth Prediction Schemes for Defining Bitrate Levels in SDN-enabled Adaptive StreamingAli Edan Al-Issa, Abdelhak Bentaleb, Alcardo Alex Barakabitze, Thomas Zinner, Bogdan V. Ghita. 1-7 [doi]
- Quick Execution Time Predictions for Spark ApplicationsSarah Shah, Yasaman Amannejad, Diwakar Krishnamurthy, Mea Wang. 1-9 [doi]
- SD-FAST: A Packet Rerouting Architecture in SDNM. A. Moyeen, Fangye Tang, Dipon Saha, Israat Haque. 1-7 [doi]
- Towards Content-Centric Control Plane Supporting Efficient Anomaly Detection FunctionsHoang Long Mai, Guillaume Doyen, Wissam Mallouli, Edgardo Montes de Oca, Olivier Festor. 1-9 [doi]
- Energy Consumption of Hybrid Data Center NetworksJoel Reginald Dodoo, Weiqiang Sun, Feng Zhu, Weisheng Hu. 1-5 [doi]
- A Hybrid Machine Learning/Policy Approach to Optimise Video Path SelectionJoseph McNamara, Liam Fallon, Enda Fallon. 1-5 [doi]
- Flow-based Throughput Prediction using Deep Learning and Real-World Network TrafficChristoph Hardegen, Benedikt Pfülb, Sebastian Rieger, Alexander Gepperth, Sven Reißmann. 1-9 [doi]
- Performance Evaluation of GTP-U and SRv6 Stateless TranslationChunghan Lee, Kentaro Ebisawa, Hitoshi Kuwata, Miya Kohno, Satoru Matsushima. 1-6 [doi]
- Steering Traffic via Recurrent Neural Networks in Challenged Edge ScenariosAlessandro Gaballo, Matteo Flocco, Flavio Esposito, Guido Marchetto. 1-5 [doi]
- CapExec: Towards Transparently-Sandboxed ServicesMahya Soleimani Jadidi, Mariusz Zaborski, Brian J. Kidney, Jonathan Anderson. 1-5 [doi]
- Exploring Ethereum's Blockchain Anonymity Using Smart Contract Code AttributionShlomi Linoy, Natalia Stakhanova, Alina Matyukhina. 1-9 [doi]
- Meta-Learning-Based Deep Learning Model Deployment Scheme for Edge CachingKyi Thar, Thant Zin Oo, Zhu Han, Choong Seon Hong. 1-6 [doi]
- Towards a Unified Network Slicing ModelMohammed Chahbar, Gladys Diaz, Abdulhalim Dandoush. 1-5 [doi]
- Service Function Chaining Leveraging Segment Routing for 5G Network SlicingDavide Borsatti, Gianluca Davoli, Walter Cerroni, Franco Callegati. 1-6 [doi]
- Large- and Small-Scale Modeling of User Traffic in 5G NetworksAlberto Martínez Alba, Wolfgang Kellerer. 1-5 [doi]
- Fog-based Data Fusion for Heterogeneous IoT Sensor Networks: A Real ImplementationFredy João Valente, João Paulo Morijo, Kelen Cristiane Teixeira Vivaldini, Luis Carlos Trevelin. 1-5 [doi]
- Geographic Clustering Based Mobile Edge Computing Resource Allocation Optimization MechanismSong Kang, Linna Ruan, Shaoyong Guo, Wencui Li, Xuesong Qiu. 1-5 [doi]
- Trace-based Behaviour Analysis of Network ServersNik Sultana, Achala Rao, Zihao Jin, Pardis Pashakhanloo, Henry Zhu, Vinod Yegneswaran, Boon Thau Loo. 1-5 [doi]
- Building Hybrid Virtual Network Functions with eXpress Data PathNguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 1-9 [doi]
- On Accounting for Screen Resolution in Adaptive Video Streaming: A QoE-Driven Bandwidth Sharing FrameworkOthmane Belmoukadam, Muhammad Jawad Khokhar, Chadi Barakat. 1-9 [doi]
- Compromised Tweet Detection Using Siamese Networks and fastText RepresentationsMihir Joshi, Parmeet Singh, A. Nur Zincir-Heywood. 1-5 [doi]
- Machine Learning for Location and Orientation Fingerprinting in MIMO WLANsHui Xiong, Jacek Ilow. 1-6 [doi]
- Efficient Learning on High-dimensional Operational DataForough Shahab Samani, Hongyi Zhang, Rolf Stadler. 1-9 [doi]
- Deep Reinforcement Learning for Network Slicing with Heterogeneous Resource Requirements and Time Varying Traffic DynamicsJaehoon Koo, Veena B. Mendiratta, Muntasir Raihan Rahman, Anwar Walid. 1-5 [doi]
- A Framework & System for Classification of Encrypted Network Traffic using Machine LearningNabil Seddigh, Biswajit Nandy, Don Bennett, Yonglin Ren, Serge Dolgikh, Colin Zeidler, Juhandre Knoetze, Naveen Sai Muthyala. 1-5 [doi]
- Lumped Markovian Estimation for Wi-Fi Channel Utilization PredictionSepehr Kazemian, Ioanis Nikolaidis. 1-5 [doi]
- Adaptive Quorum-inspired SLA-Aware Consistency for Distributed SDN ControllersFetia Bannour, Sami Souihi, Abdelhamid Mellouk. 1-7 [doi]
- Learning From Evolving Network Data for Dependable Botnet DetectionDuc C. Le, A. Nur Zincir-Heywood. 1-5 [doi]
- TradeMap: A FINMA-compliant Anonymous Management of an End-2-end Trading Market PlaceSina Rafati Niya, Sebastian Allemann, Arik Gabay, Burkhard Stiller. 1-5 [doi]
- Quantitative Analysis of Dynamically Provisioned Heterogeneous Network ServicesHadi Razzaghi Kouchaksaraei, Holger Karl. 1-5 [doi]
- Predicting Distributions of Waiting Times in Customer Service Systems using Mixture Density NetworksMajid Raeis, Ali Tizghadam, Alberto Leon-Garcia. 1-6 [doi]
- An Access Control Implementation Targeting Resource-constrained EnvironmentsFan Zhang, Bernard Butler, Brendan Jennings. 1-6 [doi]
- Scalability evaluation of VPN technologies for secure container networkingTom Goethals, Dwight Kerkhove, Bruno Volckaert, Filip De Turck. 1-7 [doi]
- Dynamic architecture based on network virtualization and distributed orchestration for management of autonomic networkGuy Saadon, Yoram Haddad 0001, Noemie Simoni. 1-5 [doi]
- Detecting Factors Responsible for Diabetes Prevalence in Nigeria using Social Media and Machine LearningOladapo Oyebode, Rita Orji. 1-4 [doi]
- Analyzing Dynamics of MVNO Market Using Evolutionary GameNoriaki Kamiyama, Akihiro Nakao. 1-6 [doi]
- Concurrent Traffic Queuing Game in Smart HomeMaroua Ben Attia, Kim Khoa Nguyen, Mohamed Cheriet. 1-7 [doi]
- BANQUET: Balancing Quality of Experience and Traffic Volume in Adaptive Video StreamingTakuto Kimura, Tatsuaki Kimura, Arifumi Matsumoto, Jun Okamoto. 1-7 [doi]
- Intelligent Edge Control with Deterministic-IP based Industrial Communication in Process AutomationAmjad Badar, David Zhe Lou, Ulrich Graf, Christian Barth, Christian Stich. 1-7 [doi]
- WASPP: Workflow Automation for Security Policy ProceduresRen Quinn, Nico Holguin, Ben Poster, Corey Roach, Jacobus Kobus Van der Merwe. 1-5 [doi]
- Can you hear me now? A call detail record based end-to-end diagnostics system for mobile networksAnssi Tauriainen. 1-7 [doi]
- DBvLEA: A Demand-Based Approach to Virtual Link Mapping for Multi-Service Industrial ApplicationsAnsah Frimpong, Hermann de Meer. 1-9 [doi]
- Predicting VNF Deployment Decisions under Dynamically Changing Network ConditionsStanislav Lange, Heegon Kim, Seyeon Jeong, Heeyoul Choi, Jae-Hyung Yoo, James Won-Ki Hong. 1-9 [doi]
- MENTOR: The Design and Evaluation of a Protection Services Recommender SystemMuriel Figueredo Franco, Bruno Rodrigues, Burkhard Stiller. 1-7 [doi]
- Are There Bots even in FIFA World Cup 2018 Tweets?Moath Bagarish, Riyad Alshammari, A. Nur Zincir-Heywood. 1-5 [doi]
- Informed Access Network Selection: The Benefits of Socket Intents for Web PerformanceTheresa Enghardt, Philipp S. Tiesel, Thomas Zinner, Anja Feldmann. 1-9 [doi]
- Exploring Feature Normalization and Temporal Information for Machine Learning Based Insider Threat DetectionPedro Ferreira, Duc C. Le, A. Nur Zincir-Heywood. 1-7 [doi]