Abstract is missing.
- Simulative Evaluation of KPIs in SDN for Topology Classification and Performance Prediction ModelsNicholas Gray, Katharina Dietz, Tobias Hoßfeld. 1-9 [doi]
- A Synchronous Multi-Step Algorithm for Flexible and Efficient Virtual Network ReconfigurationNguyen Tuan Khai, Andreas Baumgartner, Thomas Bauschert. 1-7 [doi]
- Service-centric Segment Routing Mechanism using Reinforcement Learning for Encrypted TrafficVan Tong, Sami Souihi, Hai Anh Tran, Abdelhamid Mellouk. 1-5 [doi]
- Challenges Towards Automation of Live Telco Network Management: Closed Control LoopsIshan Vaishnavi, Laurent Ciavaglia. 1-5 [doi]
- GateSelect: A novel Internet gateway selection algorithm for client nodesKhulan Batbayar, Roc Meseguer, Ramin Sadre, Suresh Subramaniam. 1-9 [doi]
- AI development and application of AI-based solutions in the area of information and data management in PolandGrzegorz Chmielarz, Arnold Pabian. 1-8 [doi]
- Unsupervised Noise Detection in Unstructured data for Automatic ParsingShubham Jain, Amy de Buitléir, Enda Fallon. 1-5 [doi]
- On the impact of novel function mappings, sharing policies, and split settings in network slice designWesley da Silva Coelho, Amal Benhamiche, Nancy Perrot, Stefano Secci. 1-9 [doi]
- Transfer Log-based Anomaly Detection with Pseudo LabelsShaohan Huang, Yi Liu, Carol Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan. 1-5 [doi]
- Analytical Delay Model of virtual CPE for 5G eMBB services in SD-CDNMüge Erel Ozcevik, Ferdi Tekçe, Fuat Kayapinar. 1-5 [doi]
- amulog: A General Log Analysis Framework for Diverse Template Generation MethodsSatoru Kobayashi, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda. 1-5 [doi]
- Using Reinforcement Learning to Allocate and Manage SFC in Cellular NetworksGuto Leoni Santos, Judith Kelner, Djamel Sadok, Patricia Takako Endo. 1-5 [doi]
- An Effective Policy Sharing Mechanism for Smart Home NetworksCarol J. Fung, Bill McCormick. 1-7 [doi]
- Network Coding Aware User Plane for Mobile NetworksYekta Turk, Engin Zeydan, Zeki Bilgin, Baris Berk Zorba. 1-5 [doi]
- Connection-Free Reliable and Efficient Transport Services in the IP InternetJ. J. Garcia-Luna-Aceves, Abdulazaz Ali Albalawi. 1-7 [doi]
- Graph Neural Network-based Virtual Network Function Deployment PredictionHeegon Kim, Suhyun Park, DongNyeong Heo, Stanislav Lange, Heeyoul Choi, Jae-Hyoung Yoo, James Won-Ki Hong. 1-7 [doi]
- A PCE-Based Framework for Future Internet Deterministic and Time-Sensitive NetworksDaniel King, Adrian Farrel. 1-7 [doi]
- A Formal Approach for Automatic Detection and Correction of SDN Switch MisconfigurationsWejdene Saied, Adel Bouhoula. 1-5 [doi]
- SafeGuard: Congestion and Memory-aware Failure Recovery in SD-WANMeysam Shojaee, Miguel C. Neves, Israat Haque. 1-7 [doi]
- Augmented Wi-Fi: An AI-based Wi-Fi Management Framework for Wi-Fi/LTE CoexistencePaola Soto, Miguel Camelo, Jaron Fontaine, Merkebu Girmay, Adnan Shahid, Vasilis Maglogiannis, Eli De Poorter, Ingrid Moerman, Juan Felipe Botero, Steven Latré. 1-9 [doi]
- A Performance Analysis of Native JSON Parsers in Java, Python, MS.NET Core, JavaScript, and PHPHardeep Kaur Dhalla. 1-5 [doi]
- Mind the (QoE) Gap: On the Incompatibility of Web and Video QoE Models in the WildMichael Seufert, Nikolas Wehner, Viktoria Wieser, Pedro Casas, Germán Capdehourat. 1-5 [doi]
- Recent Advances and Trends in Lightweight Cryptography for IoT SecurityNilupulee Anuradha Gunathilake, Ahmed Al-Dubai, William J. Buchanan. 1-5 [doi]
- Content Placement Problem in a Hierarchical Collaborative Caching method for 5G networks (CPP-HCC)Farnaz Hassanzadeh, Ertan Onur. 1-7 [doi]
- From Encrypted Video Traces to Viewport ClassificationOthmane Belmoukadam, Chadi Barakat. 1-9 [doi]
- Ensuring Consistency for Asynchronous Group-Key Management in the Industrial IoTAlessandro Piccoli, Marc-Oliver Pahl, Steffen Fries, Tolga Sel. 1-5 [doi]
- BGP Anycast Tuner: Intuitive Route Management for Anycast ServicesLeandro Marcio Bertholdo, João M. Ceron, Lisandro Zambenedetti Granville, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij. 1-7 [doi]
- Finding Effective Security Strategies through Reinforcement Learning and Self-PlayKim Hammar, Rolf Stadler. 1-9 [doi]
- Pollution Attacks on Counting Bloom Filters for Black Box AdversariesPedro Reviriego, Ori Rottenstreich. 1-7 [doi]
- A Workflow-less Autonomous System Architecture for Assurance Operations using Choreography ArchitectureKensuke Takahashi, Tomoki Ikegaya, Ryota Katayanagi, Satoshi Kondoh, Tsuyoshi Toyoshima. 1-5 [doi]
- UDP Flow Entry Eviction Strategy Using Q-Learning in Software Defined NetworkingHanhimnara Choi, Syed M. Raza, Moonseong Kim, Hyunseung Choo. 1-7 [doi]
- Deep Q-Networks based Auto-scaling for Service Function ChainingDoyoung Lee, Jae-Hyoung Yoo, James Won-Ki Hong. 1-9 [doi]
- Efficient Application Deployment in Fog-enabled InfrastructuresLyla Naghipour Vijouyeh, Masoud Sabaei, José Santos 0001, Tim Wauters, Bruno Volckaert, Filip De Turck. 1-9 [doi]
- Building and Evaluating Federated Models for Edge ComputingYasaman Amannejad. 1-5 [doi]
- Dynamic Service Placement and Load Distribution in Edge ComputingAdyson Magalhães Maia, Yacine Ghamri-Doudane, Dario Vieira, Miguel Franklin de Castro. 1-9 [doi]
- Analysis of Content Availability at Network Failure in Information-Centric NetworkingRyo Nakamura, Noriaki Kamiyama. 1-7 [doi]
- Accelerating Virtual Network Embedding with Graph Neural NetworksFarzad Habibi, Mahdi Dolati, Ahmad Khonsari, Majid Ghaderi. 1-9 [doi]
- Deep Learning Models for Gesture-controlled Drone OperationTahajjat Begum, Israat Haque, Vlado Keselj. 1-7 [doi]
- A Distributed Depth First Search based Algorithm for Edge Connectivity EstimationOnur Ugurlu, Vahid Khalilpour Akram, Deniz Türsel Eliiyi. 1-6 [doi]
- Modeling Components for Cut-Through Performance Analysis of Network SwitchesMarat Zhanikeev. 1-5 [doi]
- Ensemble Deep Learning Aided VNF Deployment for IoT ServicesMahzabeen Emu, Salimur Choudhury. 1-7 [doi]
- Towards avatar-based discovery for IoT services using social networking and clustering mechanismsKarima Khadir, Nawal Guermouche, Thierry Monteil 0001, Amal Guittoum. 1-7 [doi]
- Heuristic for Edge-enabled Network Slicing Optimization using the "Power of Two Choices"José Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens 0001. 1-9 [doi]
- SWEETEN: Automated Network Management Provisioning for 5G Microservices-Based Virtual Network FunctionsRafael de Jesus Martins, Ariel Galante Dalla-Costa, Juliano Araujo Wickboldt, Lisandro Zambenedetti Granville. 1-9 [doi]
- Understanding Hop Characteristics for Enhanced Relay ServicesSalim Mohamed, Osama Mohammed 0005. 1-5 [doi]
- Reliability-Driven Deployment in Energy-Harvesting Sensor NetworksXiaofan Yu, Xueyang Song, Ludmila Cherkasova, Tajana Simunic Rosing. 1-9 [doi]
- An IoT Device Identification Method based on Semi-supervised LearningLinna Fan, Shize Zhang, Yichao Wu, Zhiliang Wang, Chenxin Duan, Jia Li, Jiahai Yang. 1-7 [doi]
- Experimental validation of L3 VPN Network Model for improving VPN service design and provisioningSamier Barguil, Óscar González de Dios, Victor Lopez-Alvarez, Roque Gagliano, Ignacio Carretero, Ricard Vilalta. 1-5 [doi]
- Self-Driving Network and Service Coordination Using Deep Reinforcement LearningStefan Schneider 0008, Adnan Manzoor, Haydar Qarawlus, Rafael Schellenberg, Holger Karl, Ramin Khalili, Artur Hecker. 1-9 [doi]
- Detecting Degradation of Web Browsing Quality of ExperienceAlexis Huet, Zied Ben-Houidi, Bertrand Mathieu, Dario Rossi. 1-7 [doi]
- Interpretable Unsupervised Anomaly Detection For RAN Cell Trace AnalysisAshima Chawla, Paul Jacob, Saman Feghhi, Devashish Rughwani, Sven van der Meer, Sheila Fallon. 1-5 [doi]
- Demystifying Content-blockers: A Large-scale Study of Actual Performance GainsIsmael Castell-Uroz, Josep Solé-Pareta, Pere Barlet-Ros. 1-7 [doi]
- SDN Heading North: Towards a Declarative Intent-based Northbound InterfaceShiyam Alalmaei, Yehia Elkhatib, Mehdi Bezahaf, Matthew Broadbent, Nicholas J. P. Race. 1-5 [doi]
- ML-Driven DASH Content Pre-Fetching in MEC-Enabled Mobile NetworksRasoul Behravesh, Daniel F. Perez-Ramirez, Akhila Rao, Davit Harutyunyan, Roberto Riggio, Rebecca Steinert. 1-7 [doi]
- AnnaBellaDB: Key-Value Store Made Cloud NativeMark Szalay, Péter Mátray, László Toka. 1-5 [doi]
- Best nexthop Load Balancing Algorithm with Inband network telemetryJiyoon Lim, Sukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong. 1-7 [doi]
- Weaknesses and Challenges of Network Neutrality Measurement ToolsXimun Castoreo, Patrick Maillé, Bruno Tuffin. 1-5 [doi]
- Quality estimation for DASH clients by using Deep Recurrent Neural NetworksBita Kheibari, Müge Sayit. 1-8 [doi]
- URL-based Web Tracking Detection Using Deep LearningIsmael Castell-Uroz, Théo Poissonnier, Pierre Manneback, Pere Barlet-Ros. 1-5 [doi]
- Are you on Mobile or Desktop? On the Impact of End-User Device on Web QoE Inference from Encrypted TrafficSarah Wassermann, Pedro Casas, Zied Ben-Houidi, Alexis Huet, Michael Seufert, Nikolas Wehner, Joshua Schüler, Shengming Cai, Hao Shi, Jinchun Xu, Tobias Hoßfeld, Dario Rossi. 1-9 [doi]
- Online feature selection for rapid, low-overhead learning in networked systemsXiaoxuan Wang, Forough Shahab Samani, Rolf Stadler. 1-7 [doi]
- A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane ConfigurationsWejdene Saied, Faouzi Jaïdi, Adel Bouhoula. 1-7 [doi]
- Machine Learning based SLA-Aware VNF Anomaly Detection for Virtual Network ManagementJibum Hong, Suhyun Park, Jae-Hyoung Yoo, James Won-Ki Hong. 1-7 [doi]
- Evaluating the Cloud-RAN architecture: functional splitting and switched Ethernet XhaulAndres F. Ocampo, Mah-Rukh Fida, Ahmed Elmokashfi, Haakon Bryhni. 1-5 [doi]
- Topology Discovery Method using Network Equipment AlarmsAtsushi Takada, Naoki Hayashi, Mizuto Nakamura, Toshihiko Seki, Kyoko Yamagoe. 1-5 [doi]
- R2-D2: Filter Rule set Decomposition and Distribution in Software Defined NetworksAhmad Abboud, Rémi Garcia, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula. 1-4 [doi]
- A Mechanism for Intent Driven Adaptive Policy Decision MakingJoseph McNamara, Liam Fallon, Enda Fallon. 1-3 [doi]
- SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and ManagementMuriel Figueredo Franco, Bruno Rodrigues 0001, Eder John Scheid, Arthur Selle Jacobs, Christian Killer, Lisandro Zambenedetti Granville, Burkhard Stiller. 1-7 [doi]
- Prediction-based Flow Routing in Programmable Networks with P4Christoph Hardegen, Sebastian Rieger. 1-5 [doi]
- Experimental Model of the System for Intelligent Power Plant ManagementRobert Kuceba, Grzegorz Chmielarz. 1-5 [doi]
- Automated Performance Evaluation of Intent-based Virtual Network SystemsKazuki Tanabe, Tatsuya Fukuda, Takayuki Kuroda. 1-7 [doi]
- DASH QoE Performance Evaluation Framework with 5G DatasetsRaza Ul-Mustafa, Md Tariqul Islam, Christian Esteve Rothenberg, Simone Ferlin, Darijo Raca, Jason J. Quinlan. 1-6 [doi]
- A Novel SDN Dataset for Intrusion Detection in IoT NetworksAlper Kaan Sarica, Pelin Angin. 1-5 [doi]
- Environment Aware Adaptive Q-Learning to Deploy SFC on Edge ComputingSuman Pandey, James W. Hong, Jae-Hyung Yoo. 1-5 [doi]
- Every Node for Itself: Fully Distributed Service CoordinationStefan Schneider 0008, Lars Dietrich Klenner, Holger Karl. 1-9 [doi]
- A QoE Inference Method for DASH Video Using ICMP ProbingGilson Miranda Jünior, Daniel Fernandes Macedo, Johann M. Márquez-Barja. 1-5 [doi]
- A Techno-Economic Assessment of MicroservicesIoannis Papakonstantinou, Sarantis Kalafatidis, Lefteris Mamatas. 1-5 [doi]
- On Minimizing Synchronization Cost in NFV-based EnvironmentsZakaria Alomari, Mohamed Faten Zhani, Moayad Aloqaily, Ouns Bouachir. 1-9 [doi]
- Micro SIDs: a solution for Efficient Representation of Segment IDs in SRv6 NetworksAngelo Tulumello, Andrea Mayer, Marco Bonola, Paolo Lungaroni, Carmine Scarpina, Stefano Salsano, Ahmed Abdelsalam, Pablo Camarillo, Darren Dukes, François Clad, Clarence Filsfils. 1-10 [doi]
- Measuring End-to-end Packet Processing Time in Service Function ChainingNguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 1-9 [doi]
- Investigating the network traffic of Industry 4.0 applications - methodology and initial resultsGábor Soós, Dániel Ficzere, Pál Varga. 1-6 [doi]
- Temporal Representations for Detecting BGP Blackjack AttacksRafael Copstein, Nur Zincir-Heywood. 1-7 [doi]
- Time-based Anomaly Detection using AutoencoderMohammad A. Salahuddin, Md. Faizul Bari, Hyame Assem Alameddine, Vahid Pourahmadi, Raouf Boutaba. 1-9 [doi]