Abstract is missing.
- Reinforcement Learning Based Congestion Control in a Real EnvironmentLei Zhang, Kewei Zhu, Junchen Pan, Hang Shi, Yong Jiang, Yong Cui 0001. 1-9 [doi]
- DeepTxFinder: Multiple Transmitter Localization by Deep Learning in Crowdsourced Spectrum SensingAnatolij Zubow, Suzan Bayhan, Piotr Gawlowicz, Falko Dressler. 1-8 [doi]
- A Low Latency Transmission Control for Multi-link WLANYoshihisa Kondo, Hiroyuki Yomo, Hiroyuki Yokoyama. 1-6 [doi]
- BundleSense: A Task-Bundling-Based Incentive Mechanism for Mobile Crowd SensingsYifan Zhang, Xinglin Zhang. 1-9 [doi]
- Rapid Top-Down Synthesis of Large-Scale IoT NetworksPradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof, Marcos Augusto M. Vieira, Kevin Chan 0001, Ramesh Govindan, Gaurav S. Sukhatme, Paulo Tabuada, Gunjan Verma. 1-9 [doi]
- Asynchronous Distributed Topology Control for Signature Management in Mobile NetworksBenjamin Campbell. 1-8 [doi]
- An Efficient Detection Approach for LDoS Attack based on NCS-SVM AlgorithmZhiqing Zheng, Dan Tang, Siyuan Wang, Xiaoxue Wu, Jingwen Chen. 1-9 [doi]
- HGO: Hierarchical Graph Optimization for Accurate, Efficient, and Robust Network LocalizationHaodi Ping, Yongcai Wang, Deying Li 0001. 1-9 [doi]
- Towards Optimal System Deployment for Edge Computing: A Preliminary StudyDawei Li 0002, Chigozie Asikaburu, Boxiang Dong, Huan Zhou 0002, Sadoon Azizi. 1-6 [doi]
- Privacy-Preserving Selective Video SurveillanceAlem Fitwi, Yu Chen 0002. 1-10 [doi]
- Machine Learning Based Workload Prediction in Cloud ComputingJiechao Gao, Haoyu Wang 0003, Haiying Shen. 1-9 [doi]
- Trade-offs in the Design of Blockchain of Finite-Lifetime Blocks for Edge-IoT ApplicationsShravan Garlapati. 1-7 [doi]
- Managing the Evolution to Future Internet Architectures and Seamless InteroperationMohammad Jahanian, Jiachen Chen, K. K. Ramakrishnan. 1-11 [doi]
- On the Asymptotic Optimality of Work-Conserving Disciplines in Completion Time MinimizationWenxin Li, Ness B. Shroff. 1-9 [doi]
- TA-MAC: A Traffic-Aware TDMA MAC Protocol for Safety Message Dissemination in MEC-assisted VANETsDongxiao Deng, Wenbi Rao, Bingyi Liu, Dongyao Jia, Yang Sheng, Jianping Wang 0001, Shengwu Xiong. 1-9 [doi]
- Reliability-Aware Service Function Chain Provisioning in Mobile Edge-Cloud NetworksShouxu Lin, Weifa Liang, Jing Li. 1-9 [doi]
- Multitask Learning for Network Traffic ClassificationShahbaz Rezaei, Xin Liu. 1-9 [doi]
- User-Friendly Design of Cryptographically-Enforced Hierarchical Role-based Access Control ModelsXiaoyuan Yu, Brandon Haakenson, Tyler Phillips, Xukai Zou. 1-9 [doi]
- Mobile Device Usage Recommendation based on User Context Inference Using Embedded SensorsCong Shi 0004, Xiaonan Guo, Ting Yu, Yingying Chen 0001, Yucheng Xie, Jian Liu. 1-9 [doi]
- Practical and White-Box Anomaly Detection through Unsupervised and Active LearningYao Wang, Zhaowei Wang, Zejun Xie, Nengwen Zhao, Junjie Chen 0003, Wenchi Zhang, Kaixin Sui, Dan Pei. 1-9 [doi]
- CPchain: A Copyright-Preserving Crowdsourcing Data Trading Framework Based on BlockchainDingjie Sheng, Mingjun Xiao, An Liu 0002, Xiang Zou, Baoyi An, Sheng Zhang. 1-9 [doi]
- Resource Management for Processing Wide Area Data Streams on SupercomputersJoaquín Chung, Mainak Adhikari, Satish Narayana Srirama, Eun Sung Jung, Rajkumar Kettimuthu. 1-6 [doi]
- A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular NetworksLéo Mendiboure, Mohamed Aymen Chalouf, Francine Krief. 1-11 [doi]
- Grid Partition: an Efficient Greedy Approach for Outdoor Camera IoT Deployments in 2.5D TerrainKerry Veenstra, Katia Obraczka. 1-9 [doi]
- Adaptive and Low-cost Traffic Engineering based on Traffic Matrix ClassificationNan Geng, Mingwei Xu, Yuan Yang 0001, Enhuan Dong, Chenyi Liu. 1-9 [doi]
- Open source threat intelligence discovery based on topic detectionDong Li, Xiao Zhou, Ao Xue. 1-4 [doi]
- Advanced Passive Operating System Fingerprinting Using Machine Learning and Deep LearningDesta Haileselassie Hagos, Martin Løland, Anis Yazidi, Øivind Kure, Paal E. Engelstad. 1-11 [doi]
- ecUWB: A Energy-Centric Communication Scheme for Unstable WiFi Based Backscatter Systems : (Invited Paper)Yue Xu, Jingwen Zhang, Hao Zhou 0001, Xiaoyan Wang 0003, Zhi Liu 0002, Yusheng Ji. 1-9 [doi]
- Evaluation of Network Assisted Handoffs in Heterogeneous NetworksPrasad Prakash Netalkar, Sumit Maheshwari, Dipankar Raychaudhuri. 1-9 [doi]
- Reducing Fault-tolerant Overhead for Distributed Stream Processing with Approximate BackupYuan Zhuang, Xiaohui Wei, Hongliang Li, Mingkai Hou, Yundi Wang. 1-9 [doi]
- Towards Model-Centric Security for IoT SystemsYunqi Guo, Zhaowei Tan, Songwu Lu. 1-6 [doi]
- NFEH: An SDN Framework for Containerized Network Function-enabled End HostsRahil Gandotra, Levi Perigo. 1-6 [doi]
- ZIDX: A Generic Framework for Random Access to BGP Records in Compressed MRT DatasetsOmer F. Ozarslan, Kamil Saraç. 1-8 [doi]
- Area Charging for Wireless Rechargeable SensorsHaipeng Dai, Xiaoyu Wang, Lijie Xu, Chao Dong 0001, Qian Liu, Lei Meng, Guihai Chen. 1-9 [doi]
- Secure Single-Server Nearly-Identical Image DeduplicationJonathan Takeshita, Ryan Karl, Taeho Jung. 1-6 [doi]
- The Trusted and Decentralized Network Resource ManagementShuai Liu, Fei Yang, Dandan Li, Marcelo Bagnulo, Bingyang Liu, Xiaohong Huang. 1-7 [doi]
- RF-Detector: 3D Structure Detection of Tiny Objects via RFID SystemsJingyi Ning, Lei Xie 0004, Chuyu Wang, Yanling Bu, Baoliu Ye, Sanglu Lu. 1-9 [doi]
- Choosing TCP Variants for Cloud Tenants - A Measurement based ApproachAnirudh Ganji, Anand Singh, Muhammad Shahzad. 1-9 [doi]
- IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT PlatformYilian Li, Yiyu Yang, Xiao Yu, Ting Yang, Lihua Dong, Wenjie Wang. 1-5 [doi]
- Data Collection Maximization for UAV-Enabled Wireless Sensor NetworksMengyu Chen, Weifa Liang, Yuchen Li. 1-9 [doi]
- Comprehensive Visualization of Physical and MAC Layer Data for Wireless Network MonitoringMorihiko Tamai, Akio Hasegawa, Hiroyuki Yokoyama. 1-2 [doi]
- Joint Optimization Of Routing and Flexible Ethernet Assignment In Multi-layer Multi-domain NetworksDahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet. 1-9 [doi]
- A Frame-Aggregation-Based Approach for Link Congestion Prediction in WiFi Video StreamingShangyue Zhu, Alamin Mohammed, Aaron Striegel. 1-8 [doi]
- DeCoRIC: Decentralized Connected Resilient IoT ClusteringNitin Shivaraman, Saravanan Ramanathan, Shanker Shreejith, Arvind Easwaran, Sebastian Steinhorst. 1-10 [doi]
- A Facial Privacy Protection Framework Based on Component Difference and Template MorphingMin Long, Sai Long, Guo-lou Ping, Fei Peng. 1-9 [doi]
- LogParse: Making Log Parsing Adaptive through Word ClassificationWeibin Meng, Ying Liu 0024, Federico Zaiter, Shenglin Zhang, Yihao Chen, Yuzhe Zhang, Yichen Zhu, En Wang, Ruizhi Zhang, Shimin Tao, Dian Yang, Rong Zhou, Dan Pei. 1-9 [doi]
- Driver Identification Leveraging Single-turn Behaviors via Mobile DevicesYan Wang 0003, Tianming Zhao 0001, Fatemeh Tahmasbi, Jerry Cheng, Yingying Chen 0001, Jiadi Yu. 1-9 [doi]
- Performance Modeling and Prediction of Big Data Workflows: An Exploratory AnalysisWuji Liu, Chase Q. Wu, Qianwen Ye, Aiqin Hou, Wei Shen. 1-10 [doi]
- Enabling Surveillance Cameras to NavigateLiang Dong, Jingao Xu, Guoxuan Chi, Danyang Li, Xinglin Zhang, Jianbo Li, Qiang Ma, Zheng Yang 0002. 1-10 [doi]
- Using Trust as a Measure to Derive Data Quality in Data Shared IoT DeploymentsJohn Byabazaire, Gregory M. P. O'Hare, Declan T. Delaney. 1-9 [doi]
- 2DNS: A Third-Party DNS Service with Privacy Preservation and TrustworthinessQingxiu Liu, Wenfei Wu, Qingsong Liu, Qun Huangy. 1-11 [doi]
- Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical SystemsAdeel A. Malik, Deepak K. Tosh. 1-6 [doi]
- Comparing Energy Efficiencies of SDN Hardware Based on Forwarding ConfigurationsRahil Gandotra, Levi Perigo. 1-7 [doi]
- A Learning-based Data Augmentation for Network Anomaly DetectionMohammad Al Olaimat, Dongeun Lee 0001, Youngsoo Kim, Jonghyun Kim, Jinoh Kim. 1-10 [doi]
- Viewing the 360° Future: Trade-Off Between User Field-of-View Prediction, Network Bandwidth, and DelayShahryar Afzal, Jiasi Chen, K. K. Ramakrishnan. 1-11 [doi]
- On the Mitigation of Controllable Event Triggering Attack in WSNsHaoran Hu, Wei Chang. 1-6 [doi]
- Towards Reliable Message Dissemination for Multiple Cooperative Drivings: A Hybrid ApproachBingyi Liu, Chunli Yu, Weizhen Han, Dongyao Jia, Jianping Wang 0001, Enshu Wang, Kejie Lu. 1-9 [doi]
- PDSProxy: Trusted IoT Proxies for Confidential Ad-hoc Personalization of AI ServicesChristian Meurisch, Bekir Bayrak, Florian Giger, Max Mühlhäuser. 1-2 [doi]
- Providing resilience to UAV swarms following planned missionsJamie Wubben, Izan Catalán, Manel Lurbe, Francisco Fabra, Francisco J. Martinez, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni. 1-6 [doi]
- Combining High Throughput and Low Migration Latency for Consistent Data Storage on the EdgeNuno Afonso, Manuel Bravo, Luís Rodrigues 0001. 1-11 [doi]
- PeerCould: Enhancing Mobile Cloud with Social-Aware Device-to-Device OffloadingXiaomei Zhang. 1-7 [doi]
- Attack Detection and Mitigation for Sensor and CAN Bus Attacks in Vehicle Anti-lock Braking SystemsLiuwang Kang, Haiying Shen. 1-9 [doi]
- PStream: Priority-Based Stream Scheduling for Heterogeneous Paths in Multipath-QUICXiang Shi, Lin Wang 0015, Fa Zhang, Biyu Zhou, Zhiyong Liu 0002. 1-8 [doi]
- Misinformation Detection and Adversarial Attack Cost Analysis in Directional Social NetworksHuajie Shao, Shuochao Yao, Andong Jing, Shengzhong Liu, Dongxin Liu, Tianshi Wang, Jinyang Li 0004, Chaoqi Yang, Ruijie Wang, Tarek F. Abdelzaher. 1-11 [doi]
- Evaluating the Use of QoS for Video Delivery in Vehicular NetworksPedro Pablo Garrido Abenza, Manuel P. Malumbres, Pablo Piñol Peral, Otoniel López Granado. 1-9 [doi]
- Fingerprinting Analog IoT Sensors for Secret-Free AuthenticationFelix Lorenz, Lauritz Thamsen, Andreas Wilke, Ilja Behnke, Jens Waldmüller-Littke, Ilya Komarov, Odej Kao, Manfred Paeschke. 1-6 [doi]
- Precise Identification of Rehabilitation Actions using AI based StrategyMin Lei, Peng Liu, Qingshan Wang, Qi Wang. 1-7 [doi]
- Toward Mobile 3D VisionHuanle Zhang, Bo Han, Prasant Mohapatra. 1-8 [doi]
- A Preliminary Analysis of Password Guessing AlgorithmJing Zhang, Chao Yang 0016, Yu Zheng, Wei You, Ruidan Su, Jianfeng Ma 0001. 1-9 [doi]
- CPSA: A Coordinated Process Scheduling Algorithm for Coupled Earth System ModelHongliang Li, Zhewen Xu, Fangyu Tang, Xiaohui Wei, Zhaohui Ding. 1-9 [doi]
- Fast-Fourier-Forecasting Resource Utilisation in Distributed SystemsPaul J. Pritz, Daniel Pérez 0002, Kin K. Leung. 1-9 [doi]
- Predict the Next Attack Location via An Attention-based Fused-SpatialTemporal LSTMZhuang Liu, Juhua Pu, Nana Zhan, Xingwu Liu. 1-6 [doi]
- A Model Based on Program Slice and Deep Learning for Software Defect PredictionJunfeng Tian, Yongqing Tian. 1-6 [doi]
- An Experimental Study on Data Recovery Performance Improvement for HDFS with NVMHuijie Li, Xin Li, Youyou Lu, Xiaolin Qin. 1-9 [doi]
- Geographic and Energy aware Epidemic Strategy for Mobile Opportunistic DTNFloriano De Rango, Salvatore Amelio. 1-8 [doi]
- Facial Micro-Expression Recognition Using Quaternion-Based Sparse RepresentationHang Yang, Qingshan Wang, Qi Wang, Peng Liu, Wei Huang. 1-9 [doi]
- IFVD: Design of Intelligent Fusion Framework for Vulnerability Data Based on Text MeasuresRuike Li, Shichong Tan, Chensi Wu, Xudong Cao, Haitao He, Wenjie Wang. 1-6 [doi]
- Pipeline-Based Chunk Scheduling to Improve ABR Performance in DASH SystemWeihe Li, Jiawei Huang, Shaojun Zou, Zhuoran Liu, Qichen Su, Xuxing Chen, Jianxin Wang. 1-9 [doi]
- Location Privacy-Preserving Truth Discovery in Mobile Crowd SensingJingsheng Gao, Shaojing Fu, Yuchuan Luo, Tao Xie. 1-9 [doi]
- Relational Database Watermarking Based on Chinese Word Segmentation and Word EmbeddingWenling Li, Jianen Yan, Zhaoxin Zhang. 1-6 [doi]
- Minor Privacy Protection Through Real-time Video Processing at the EdgeMeng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen 0002, Yunxi Dong. 1-6 [doi]
- Joint Energy Optimization of Cooling Systems and Virtual Machine Consolidation in Data CentersHai Liu 0001, Wai Kit Wong, Shujin Ye, Yu Tak Ma Chris. 1-8 [doi]
- Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data PubliclyYang Zhang, Dongzheng Jia, Shijie Jia, Limin Liu, Jingqiang Lin. 1-11 [doi]
- Modelling DoS Attacks & Interoperability in the Smart GridDilara Acarali, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg. 1-6 [doi]
- High Rate-Reliability Beamformer Design for 2×2 Mimo-OFDM System Under Hostile JammingAnu Jagannath, Jithin Jagannath, Andrew L. Drozd. 1-9 [doi]
- Efficient Multicast Labelling for OpenFlow-Based SwitchesCi-Hung Ciou, Pi-Chung Wang. 1-2 [doi]
- Smart e-Health Security and Safety Monitoring with Machine Learning ServicesW. Liu, E. K. Park, Udo R. Krieger, S. S. Zhu. 1-6 [doi]
- TaDPole: Traffic-aware Discovery Protocol for Software-Defined Wireless and Mobile NetworksFaheed A. F. Alenezi, Sejun Song, Baek-Young Choi, Haymanot Gebre-Amlak. 1-9 [doi]
- Real-time Cooperative Vehicle Tracking in VANETsTaku Noguchi, Yu-Cheng Ting, Masami Yoshida, Alberto Gallegos Ramonet. 1-6 [doi]
- Analyzing the impact of VIM systems over the MEC management and orchestration in vehicular communicationsNina Slamnik-Krijestorac, Michaël Peeters, Steven Latré, Johann M. Márquez-Barja. 1-6 [doi]
- AI-Governance and Levels of Automation for AIOps-supported System AdministrationAnton Gulenko, Alexander Acker, Odej Kao, Feng Liu. 1-6 [doi]
- Human Action Recognition for Disaster DetectionYull Kyu Han, Young-Bok Choi. 1-2 [doi]
- WiEat: Fine-grained Device-free Eating Monitoring Leveraging Wi-Fi SignalsZhenzhe Lin, Yucheng Xie, Xiaonan Guo, Yanzhi Ren, Yingying Chen 0001, Chen Wang. 1-9 [doi]
- SmartBullets: A Cloud-Assisted Bullet Screen Filter based on Deep LearningHaoran Niu, Jiangnan Li, Yu Zhao. 1-2 [doi]
- Quality-driven Energy Optimization in Internet of ThingsVineet Naique Dhaimodker, Rahul Desai, S. Mini 0001, Deepak K. Tosh. 1-8 [doi]
- A Preliminary Design for Authenticity of IoT Big Data in Cloud ComputingYongkai Fan, Guanqun Zhao, Wenqian Shang, Jingtao Shang, Weiguo Lin, Zhen Wang. 1-2 [doi]
- Implementation of Network Source Authentication and Path Validation Using Orthogonal SequencesHao Cai, Tilman Wolf. 1-7 [doi]
- Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction ProcessingWenjun Fan, Sang-Yoon Chang, Shawn Emery, Xiaobo Zhou 0002. 1-9 [doi]
- Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market ManipulationsMassimo La Morgia, Alessandro Mei, Francesco Sassi, Julinda Stefa. 1-9 [doi]
- An Energy Saving-Oriented Incentive Mechanism in Colocation Data CentersCe Chi, Kaixuan Ji, Avinab Marahatta, Fa Zhang, Youshi Wang, Zhiyong Liu 0002. 1-6 [doi]
- Dependent Task Offloading for Multiple Jobs in Edge ComputingZhiqing Tang, Jiong Lou, Fuming Zhang, Weijia Jia. 1-9 [doi]
- MLGuard: Mitigating Poisoning Attacks in Privacy Preserving Distributed Collaborative LearningYoussef Khazbak, Tianxiang Tan, Guohong Cao. 1-9 [doi]
- Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated LearningJiale Chen, Jiale Zhang, Yanchao Zhao, Hao Han, Kun Zhu 0001, Bing Chen 0002. 1-9 [doi]
- Multi-User Distributed Spectrum Access Method for 802.11ax StationsDheeraj Kotagiri, Koichi Nihei, Tansheng Li. 1-2 [doi]
- Towards Performant Workflows, Monitoring and MeasuringJeanette M. Sperhac, Robert L. DeLeon, Joseph P. White, Matthew D. Jones, Andrew E. Bruno, Renette L. Jones-Ivey, Thomas R. Furlani, Jonathan E. Bard, Vipin Chaudhary. 1-9 [doi]
- Impact of 802.15.4 Radio Antenna Orientation on UAS Aerial Data CollectionMichael Nekrasov, Maxton Ginier, Ryan Allen, Irina Artamonova, Elizabeth M. Belding. 1-9 [doi]
- SD-seq2seq : A Deep Learning Model for Bus Bunching Prediction Based on Smart Card DataZengyang Gong, Bo Du, Zhidan Liu, Wei Zeng, Pascal Perez, Kaishun Wu. 1-9 [doi]
- Distributed Energy-Aware Reliable Routing and TDMA Link Scheduling in Wireless Sensor NetworksHuang Huang, Jingjing Li. 1-10 [doi]
- FT-VMP: Fault-Tolerant Virtual Machine Placement in Cloud Data CentersChristopher Gonzalez, Bin Tang. 1-9 [doi]
- *Oluwamayowa Ade Adeleke, Nicholas Bastin, Deniz Gurkan. 1-2 [doi]
- MilliCam: Hand-held Millimeter-Wave ImagingMoh Sabbir Saadat, Sanjib Sur, Srihari Nelakuditi, Parmesh Ramanathan. 1-9 [doi]
- ML Soft-decision Decoding for Binary Linear Block Codes Based on Trellises of Their SupercodesTing-Yi Wu, Yunghsiang S. Han. 1-9 [doi]
- ChordMics: Acoustic Signal Purification with Distributed MicrophonesWeiguo Wang, Jinming Li, Meng Jin, Yuan He 0004. 1-9 [doi]
- Data Transmissions From a Drone Using Multi-AP Wireless LAN: A Field TrialKazuki Ikeda, Yua Imai, Hiroyuki Yomo, Yoshihisa Kondo, Hiroyuki Yokoyama. 1-2 [doi]
- Residual Neural Networks for Heterogeneous Smart Device Localization in IoT NetworksPandey Pandey, Piyush Tiwary, Sudhir Kumar 0002, Sajal K. Das 0001. 1-9 [doi]
- Secure Broadcast Protocol for Unmanned Aerial Vehicle SwarmsHongpeng Guo, Tianyuan Liu, King-Shan Lui, Claudiu Danilov, Klara Nahrstedt. 1-9 [doi]
- PDSProxy++: Proactive Proxy Deployment for Confidential Ad-hoc Personalization of AI ServicesChristian Meurisch, Dennis Werner, Florian Giger, Bekir Bayrak, Max Mühlhäuser. 1-9 [doi]
- A Self-Adaptive Bluetooth Indoor Localization System using LSTM-based Distance EstimatorZhuo Li 0003, Jiannong Cao 0001, Xiulong Liu, Jiuwu Zhang, Haoyuan Hu, Didi Yao. 1-9 [doi]
- A Semantic-aware Representation Framework for Online Log AnalysisWeibin Meng, Ying Liu 0024, Yuheng Huang, Shenglin Zhang, Federico Zaiter, Bingjin Chen, Dan Pei. 1-7 [doi]
- Data-driven Routing Optimization based on Programmable Data PlaneQian Li, Jiao Zhang 0002, Tian Pan, Tao Huang 0005, Yunjie Liu. 1-9 [doi]
- Research on Design and Application of Mobile Edge Computing Model Based on SDNShaohua Cao, ZhiHao Wang, Yizhi Chen, Dingde Jiang, Yang Yan, Hui Chen. 1-6 [doi]
- Sec-ALG: An Open-source Application Layer Gateway for Secure Access to Private NetworksMaria Riaz, Juha-Matti Tilli, Raimo Kantola. 1-11 [doi]
- Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-512 Hash FunctionArtur Hlobaz. 1-6 [doi]
- SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic PatternsDaniel Y. Karasek, Jeehyeong Kim, Victor Youdom Kemmoe, Md. Zakirul Alam Bhuiyan, Sunghyun Cho, Junggab Son. 1-9 [doi]
- A Q-learning based Method for Energy-Efficient Computation Offloading in Mobile Edge ComputingKai Jiang, Huan Zhou 0002, Dawei Li 0002, Xuxun Liu, Shouzhi Xu. 1-7 [doi]
- Deep Learning Model Reuse and Composition in Knowledge Centric NetworkingDolly Sapra, Andy D. Pimentel. 1-11 [doi]
- An Effective and Lightweight Countermeasure Scheme to Multiple Network Attacks in NDNsDapeng Qu, Shijun Qu, Yue Yang, Haiying Shen. 1-9 [doi]
- Slicenomics: How to Provide Cost-Based Intra and Inter Slice Resource Management?Alexander Gerasimov, Vitaly A. Antonenko. 1-6 [doi]
- Bidirectional BlockchainJoshua Lampkins, Tiffany Hyun-Jin Kim. 1-8 [doi]
- Optimizing Scan Times of BLE Scanning SystemsJohn N. Daigle, George Humphrey, Henry C. Lena, Avijit Sarker. 1-8 [doi]
- A Middleware Approach to Synchronize Transaction Data to BlockchainNing Wang, Bo Wang, Taoying Liu, Wei Li 0008, Shuhui Yang. 1-8 [doi]
- POLANCO: Enforcing Natural Language Network PoliciesP. Sergio Rivera, Zongming Fei, James Griffioen. 1-9 [doi]
- QoS Aware Task Management Strategies for Mobile Crowdsensing ApplicationsShuhui Yang, Xuefeng Xi, Wei Li. 1-9 [doi]
- Computer Vision-Assisted Instant Alerts in 5GYu-Yun Tseng, Po-Min Hsu, Jen-Jee Chen, Yu-Chee Tseng. 1-9 [doi]