Abstract is missing.
- HolistIX: a zero-touch approach for IXPsChristoff Visser, Seiichi Yamamoto, Tomine Takashi, Yuji Sekiya, Marc Bruyere. 1-7 [doi]
- Delay-Sensitive Wireless Content Delivery: An Interpretable Artificial Intelligence ApproachEstefanía Coronado, Blas Gómez, José Villalón, Antonio Garrido, Shuaib Siddiqui, Roberto Riggio. 8-13 [doi]
- Network Assurance in Intent-Based Networking Data Centers with Machine Learning TechniquesXiaoang Zheng, Aris Leivadeas. 14-20 [doi]
- Traffic Engineering with Segment Routing Considering Probabilistic FailuresYing Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang, Yingya Guo, Haijun Geng. 21-27 [doi]
- A Hierarchical Tree-Based Syslog Clustering Scheme for Network DiagnosisSizhe Rao, Minghui Wang, Cuixia Tian, Xin'an Yang, Xiangqiao Ao. 28-34 [doi]
- Survivable Virtual Network Mapping against Double-Link Failures Based on Virtual Network Capacity SharingEmanuele Viadana, Omran Ayoub, Francesco Musumeci 0001, Massimo Tornatore. 35-41 [doi]
- Auction-based Federated Learning using Software-defined Networking for resource efficiencyEunil Seo, Dusit Niyato, Erik Elmroth. 42-48 [doi]
- How are your Apps Doing? QoE Inference and Analysis in Mobile DevicesNikolas Wehner, Michael Seufert, Joshua Schüler, Pedro Casas, Tobias Hoßfeld. 49-55 [doi]
- 3D Deployment and User Association of CoMP-assisted Multiple Aerial Base Stations for Wireless Network Capacity EnhancementYikun Zhao, Fanqin Zhou, Wenjing Li 0001, Yuan Gao, Lei Feng 0001, Peng Yu 0001. 56-62 [doi]
- Joint Virtual Machine Embedding and Wireless Data Center Topology ManagementBeyza Butun, Ertan Onur. 63-69 [doi]
- Intelligent and Energy-efficient Distributed Resource Allocation for 5G Cloud Radio Access NetworksZhengyuan Liu, Peng Yu 0001, Fanqin Zhou, Lei Feng 0001, Wenjing Li 0001. 70-76 [doi]
- Max-Min Fair Bandwidth Allocation in Millimeter-Wave Radio ClustersIdil Zeynep Alemdar, Ertan Onur. 77-83 [doi]
- Evaluation of Cluster Effect in Mobile Opportunistic NetworksZeynep Vatandas, Koojana Kuladinithi, Ulrich Killat, Andreas Timm-Giel. 84-90 [doi]
- Charon: Load-Aware Load-Balancing in P4Carmine Rizzi, Zhiyuan Yao, Yoann Desmouceaux, Mark Townsley, Thomas H. Clausen. 91-97 [doi]
- P4 language extensions for stateful packet processingAngelo Tulumello. 98-103 [doi]
- Dynamic Service Programming with Path PreprocessingJulian Klaiber, Severin Dellsperger, Laurent Metzger, Ahmed Abdelsalam, François Clad. 104-110 [doi]
- Optimal Network Design: Edge Server Placement and Link Capacity Assignment for Delay-Constrained ServicesDevyani Gupta, Joy Kuri. 111-117 [doi]
- Network Slicing in 5G Edge Networks with Controlled Slice RedistributionsSamaresh Bera, Neelesh B. Mehta. 118-124 [doi]
- Self Optimizing Network Slicing in 5G for Slice Isolation and High AvailabilityShwetha Vittal, A. Antony Franklin. 125-131 [doi]
- On Auto-scaling and Load Balancing for User-plane Gateways in a Softwarized 5G NetworkVan Giang Nguyen, Karl-Johan Grinnemo, Javid Taheri, Johan Forsman, Thang Le Duc, Anna Brunström. 132-138 [doi]
- Efficient Orchestration of Service Chains in Fog Computing for Immersive MediaJosé Santos 0001, Jeroen van der Hooft, Maria Torres Vega, Tim Wauters, Bruno Volckaert, Filip De Turck. 139-145 [doi]
- An In-Kernel Solution Based on XDP for 5G UPF: Design, Prototype and Performance EvaluationThiago A. Navarro do Amaral, Raphael Vicente Rosa, David F. Cruz Moura, Christian Esteve Rothenberg. 146-152 [doi]
- Token Cell Routing: A New Sub-IP Layer ProtocolStewart Bryant, Alexander Clemm. 153-159 [doi]
- Programmable Data Planes as the Next Frontier for Networked Robotics Security: A ROS Use CaseDiego Rossi Mafioletti, Ricardo Carminati de Mello, Marco Ruffini, Valerio Frascolla, Magnos Martinello, Moisés R. N. Ribeiro. 160-165 [doi]
- Anomaly Detection of ICS Communication Using Statistical ModelsIvana Burgetova, Petr Matousek, Ondrej Rysavý. 166-172 [doi]
- Assessing the Limits of Privacy and Data Usage for Web Browsing AnalyticsDaniel Perdices, Jorge E. López de Vergara, Iván González 0004. 173-179 [doi]
- An Ensemble Learning-Based Architecture for Security Detection in IoT InfrastructuresAdrien Hemmer, Mohamed Abderrahim 0002, Remi Badonnel, Isabelle Chrisment. 180-186 [doi]
- Link Latency Attack in Software-Defined NetworksSanaz Soltani, Mohammad Shojafar, Habib Mostafaei, Zahra Pooranian, Rahim Tafazolli. 187-193 [doi]
- On Detection of Manipulative Cognitive Functions in Cognitive Autonomous NetworksAnubhab Banerjee, Stephen S. Mwanje, Georg Carle. 194-200 [doi]
- Figure of Merit for a Multi-Generation NetworkDarren Ramsook, Daniel Mahatoo, Patrick Hosein. 201-206 [doi]
- Network Traffic Characteristics of Machine Learning Frameworks Under the MicroscopeJohannes Zerwas, Kaan Aykurt, Stefan Schmid 0001, Andreas Blenk. 207-215 [doi]
- Reinforcement Learning for Automated Energy Efficient Mobile Network Performance TuningDiarmuid Corcoran, Per Kreuger, Magnus Boman. 216-224 [doi]
- DRL-based Slice Placement Under Non-Stationary ConditionsJosé Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens 0001. 225-233 [doi]
- ChaosTwin: A Chaos Engineering and Digital Twin Approach for the Design of Resilient IT ServicesFilippo Poltronieri, Mauro Tortonesi, Cesare Stefanelli. 234-238 [doi]
- ASRE - Towards Application-specific Resource Ensembles across Edges and CloudsHong-Linh Truong 0001. 239-243 [doi]
- Improving Quality of HTTP Adaptive Streaming with Server and Network-Assisted DASHReza Shokri Kalan. 244-248 [doi]
- Caching Video on Demand in Radio ClustersFurkan Murat, Ertan Onur. 249-253 [doi]
- Known Performance Issues Are Prevalent in Consumer WiFi RoutersBjørn Ivar Teigen, Kai Olav Ellefsen, Tor Skeie, Jim Tørresen. 254-258 [doi]
- Network Tomography and Partial Least Squares for Traffic Matrix EstimationFrancisco J. Cuberos, Irene Herrera, Katarzyna Wasielewska, José Camacho. 259-263 [doi]
- Towards Evaluating Quality of Datasets for Network Traffic DomainDominik Soukup, Peter Tisovcík, Karel Hynek, Tomás Cejka. 264-268 [doi]
- Energy-aware Coflow Scheduling for Sustainable Workload ManagementSadiya Ahmad, Flavio Esposito, Estefanía Coronado. 269-273 [doi]
- Placement of 5G RAN Slices in Multi-tier O-RAN 5G Networks with Flexible Functional SplitsEgemen Sarikaya, Ertan Onur. 274-282 [doi]
- Using 5G QoS Mechanisms to Achieve QoE-Aware Resource AllocationMarcin Bosk, Marija Gajic, Susanna Schwarzmann, Stanislav Lange, Riccardo Trivisonno, Clarissa Cassales Marquezan, Thomas Zinner. 283-291 [doi]
- Reoptimizing Network Slice Embedding on EON-enabled Transport NetworksSepehr Taeb, Nashid Shahriar, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati. 292-300 [doi]
- EdgeDQN: Multiple SFC Placement in Edge Computing EnvironmentSuman Pandey, Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 301-309 [doi]
- Cost-Efficient Dynamic Service Function Chain Embedding in Edge CloudsWeihan Chen, Zhiliang Wang, Han Zhang, Xia Yin, Xingang Shi. 310-318 [doi]
- SDN/NFV based Secure SCMA design in SDRMüge Erel-Özçevik, Ferdi Tekçe. 319-325 [doi]
- Impact of Retransmission on VoWiFi Cell Capacity Estimation using IEEE 802.11ax WiFi StandardAyes Chinmay, Hemanta Kumar Pati. 326-329 [doi]
- On-demand network bandwidth reservation combining machine learning and linear programmingKouichi Genda. 330-334 [doi]
- Proactive Live Migration for Virtual Network Functions using Machine LearningSeyeon Jeong, Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong. 335-339 [doi]
- Artificial intelligence and big data driven IS security management solution with applications in higher education organizationsVladislavs Minkevics, Janis Kampars. 340-344 [doi]
- Novel HTTPS classifier driven by packet bursts, flows, and machine learningZdena Tropková, Karel Hynek, Tomás Cejka. 345-349 [doi]
- IoT-based Access Management Supported by AI and BlockchainsEryk Schiller, Elfat Esati, Burkhard Stiller. 350-354 [doi]
- countBF: A General-purpose High Accuracy and Space Efficient Counting Bloom FilterSabuzima Nayak, Ripon Patgiri. 355-359 [doi]
- Session-persistent Load Balancing for Clustered Web Servers without Acting as a Reverse-proxySeyed Mohammad Hosseini, Amir-Hossein Jahangir, Sina Daraby. 360-364 [doi]
- NUFTCP: Towards Smooth Network Updates in Software-Defined Datacenter NetworksAbdul Basit Dogar, Yiran Zhang. 365-369 [doi]
- Investigating Inter-NF Dependencies in Cloud-Native 5G Core NetworksEndri Goshi, Michael Jarschel, Rastin Pries, Mu He, Wolfgang Kellerer. 370-374 [doi]
- Automation of Modular and Programmable Control and Data Plane SDN NetworksEder Ollora Zaballa, David Franco, Eduardo Jacob, Marivi Higuero, Michael Stübert Berger. 375-379 [doi]
- An Intent-Driven Orchestration of Cognitive Autonomous Networks for RAN managementAnubhab Banerjee, Stephen S. Mwanje, Georg Carle. 380-384 [doi]
- LoRaPlan: A Software to Evaluate Gateway Placement in LoRaWANFrank Loh, Noah Mehling, Florian Metzger, Tobias Hoßfeld, David Hock. 385-387 [doi]
- IEEE 802.11ah (HaLow) Dongle for Simplified IoT Wireless NetworkingMin-Cheol Kim, Young-Tak Kim. 388-390 [doi]
- An experimentation environment for SDN-based autonomous vehicles in smart citiesAthanasios Papadakis, Tryfon Theodorou, Lefteris Mamatas, Sophia G. Petridou. 391-393 [doi]
- Cloud Native Data Platform for Network Telemetry and AnalyticsDaniel Tovarnák, Matús Racek, Petr Velan. 394-396 [doi]
- Optimizing primary and backup SDN controllers' placement resilient to node-targeted attacksMariusz Mycek, Michal Pióro, Artur Tomaszewski, Amaro de Sousa. 397-401 [doi]
- Proactive Detection for Countermeasures on Port Scanning based AttacksEvgeny S. Sagatov, S. Mayhoub, Andrei M. Sukhov, Flavio Esposito, Prasad Calyam. 402-406 [doi]
- A Novel Unified Handover Algorithm for LTE-ASunil Hebbur Srikantamurthy, Andreas Baumgartner. 407-411 [doi]
- EdgeEcho: An Architecture for Echocardiology at the EdgeAman Khalid, Flavio Esposito, Alessio Sacco, Steven C. Smart. 412-416 [doi]
- Evaluating Urban Network Activity Hotspots through Granular Cluster Analysis of Spatio-Temporal DataJane Frances Pajo, George Kousiouris, Dimosthenis Kyriazis, Roberto Bruschi, Franco Davoli. 417-421 [doi]
- A Greedy Algorithm for Minimum Cut into Bounded Sets ProblemOnur Ugurlu, Vahid Khalilpour Akram, Deniz Türsel Eliiyi. 422-426 [doi]
- Fault-Tolerant 1-bit Representation for Distributed Inference Tasks in Wireless IoTMostafa Hussien, Kim Khoa Nguyen, Mohamed Cheriet. 427-431 [doi]
- Optimized Transfer Learning: Application for Wireless Channel SelectionMohammad Askarizadeh, Mostafa Hussien, Masoumeh Zare, Kim Khoa Nguyen. 432-436 [doi]
- Inferring Software Composition and Credentials of Embedded Devices from Partial KnowledgePierre-Marie Junges, Jérôme François, Olivier Festor. 437-445 [doi]
- Obstacle-Aware and Energy-Efficient Multi-Drone Coordination and Networking for Disaster ResponseChengyi Qu, Rounak Singh, Alicia Esquivel Morel, Francesco Betti Sorbelli, Prasad Calyam, Sajal K. Das 0001. 446-454 [doi]
- Automating Reliable and Fault-Tolerant Design of LoRa-based IoT NetworksXiaofan Yu, Weihong Xu, Ludmila Cherkasova, Tajana Simunic Rosing. 455-463 [doi]
- Performance Analysis of Anomaly Detection Methods for Application System on Kubernetes with Auto-scaling and Self-healingYoichi Matsuo, Daisuke Ikegami. 464-472 [doi]
- IntStream: An Intent-driven Streaming Network Telemetry FrameworkXin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai Yang. 473-481 [doi]
- Network Problem Diagnostics using Typographic Error CorrectionMartin Holkovic, Michal Bohus, Ondrej Rysavý. 482-490 [doi]
- Analyzing and Assessing Pollution Attacks on Bloom Filters: Some Filters are More Vulnerable than OthersPedro Reviriego, Ori Rottenstreich, Shanshan Liu, Fabrizio Lombardi. 491-499 [doi]
- ANYway: Measuring the Amplification DDoS Potential of DomainsOlivier van der Toorn, Johannes Krupp, Mattijs Jonker, Roland van Rijswijk-Deij, Christian Rossow, Anna Sperotto. 500-508 [doi]
- Learning Intrusion Prevention Policies through Optimal StoppingKim Hammar, Rolf Stadler. 509-517 [doi]
- A compact 5G Non-Public NetworkDániel Ficzere, Gabor Soos, Pál Varga. 518-520 [doi]
- A Zero Touch Emulation Framework for Network Slicing Management in a 5G Core TestbedShwetha Vittal, Sourav Sarkar, Prashanth P. S, A. Antony Franklin. 521-523 [doi]
- DRL-based Slice Placement under Realistic Network Load ConditionsJosé Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin, Pierre Sens 0001. 524-526 [doi]
- Online Feature Selection for Low-overhead Learning in Networked SystemsXiaoxuan Wang, Forough Shahab Samani, Andreas Johnsson, Rolf Stadler. 527-529 [doi]
- EnGINE: Developing a Flexible Research Infrastructure for Reliable and Scalable Intra-Vehicular TSN NetworksFilip Rezabek, Marcin Bosk, Thomas Paul, Kilian Holzinger, Sebastian Gallenmüller, Angela Gonzalez Mariño, Abdoul Kane, Francesc Fons, Haigang Zhang, Georg Carle, Jörg Ott. 530-536 [doi]
- Ducked Tails: Trimming the Tail Latency of(f) Packet Processing SystemsSebastian Gallenmüller, Florian Wiedner, Johannes Naab, Georg Carle. 537-543 [doi]
- Assessing the Threats Targeting Low Latency Traffic: the Case of L4SMarius Letourneau, Kouame Boris N'Djore, Guillaume Doyen, Bertrand Mathieu, Rémi Cogranne, Huu-Nghia Nguyen. 544-550 [doi]
- An Analysis of Cloud Gaming Platforms Behavior under Different Network ConstraintsPhilippe Graff, Xavier Marchal, Thibault Cholez, Stéphane Tuffin, Bertrand Mathieu, Olivier Festor. 551-557 [doi]
- Machine-Learning Based Prediction of Next HTTP Request Arrival Time in Adaptive Video StreamingAndrea Pimpinella, Alessandro E. C. Redondi, Frank Loh, Michael Seufert. 558-564 [doi]
- Asynchronous Time-Aware Shaper for Time-Sensitive NetworkingMiklós Máté, Csaba Simon, Markosz Maliosz. 565-571 [doi]
- Network Slicing for Deterministic LatencySebastien Martin, Paolo Medagliani, Jeremie Leguay. 572-577 [doi]
- gLBF: Per-Flow Stateless Packet Forwarding with Guaranteed Latency and Near-Synchronous JitterToerless Eckert, Alexander Clemm, Stewart Bryant. 578-584 [doi]