Abstract is missing.
- A Reward-Based Fair Resource Allocation in EONs Considering Traffic Demand BehaviorTania Panayiotou, Georgios Ellinas. 1-8 [doi]
- MulTLoc: RF Hologram Tensor Filtering and Upscaling for Locating Multiple RFID TagsXiangyu Wang, Jian Zhang 0028, Shiwen Mao, Senthilkumar C. G. Periaswamy, Justin Patton. 1-9 [doi]
- Collaborative optimization of Edge-Cloud Computation Offloading in Internet of VehiclesYureng Li, Shouzhi Xu. 1-6 [doi]
- Network-based Active Defense for Securing Cloud-based Healthcare Data Processing PipelinesVaibhav Akashe, Roshan Lal Neupane, Mauro Lemus Alarcon, Songjie Wang, Prasad Calyam. 1-9 [doi]
- Energy-Efficient Device Selection in Federated Edge LearningCheng Peng, Qin Hu 0001, Jianan Chen, Kyubyung Kang, Feng Li, Xukai Zou. 1-9 [doi]
- 6G as if People Mattered: From Industry 4.0 toward Society 5.0 : (Invited Paper)Martin Maier. 1-10 [doi]
- Federated Authorization for Managed Data Sharing: Experiences from the ImPACT ProjectJeffrey S. Chase, Ilya Baldin. 1-10 [doi]
- Extension Algorithms for Path Exposure in Energy Harvesting Wireless Sensor NetworksAbdulsalam Basabaa, Ehab S. Elmallah. 1-8 [doi]
- Improvement of Bi-directional Communications using Solar Powered Reconfigurable Intelligent SurfacesAbdullah M. Almasoud, Mohamed Y. Selim, Ahmad Alsharoa, Ahmed E. Kamal 0001. 1-8 [doi]
- Fostering user's awareness about indoor air quality through an IoT-enabled home garden systemChiara Ceccarini, Ka Kei Chan, I Lei Lok, Rita Tse, Su-Kit Tang, Catia Prandi. 1-4 [doi]
- MACE: A Mobile Ad-hoc Computing Emulation FrameworkBruno Chianca Ferreira, Guillaume Dufour, Guthemberg Silvestre. 1-6 [doi]
- Smart replication for seamless and efficient real time communication in underground railway trainKariem Fahmi, Douglas J. Leith. 1-8 [doi]
- TREMA: A traffic-aware energy efficient MAC protocol to adapt the LoRaWAN capacityLaurent Chasserat, Nicola Accettura, Balakrishna J. Prabhu, Pascal Berthou. 1-6 [doi]
- Efficient Communication Topology via Partially Differential Privacy for Decentralized LearningCheng-Wei Ching, Hung-Sheng Huang, Chun-An Yang, Yu-Chun Liu, Jian-Jhih Kuo. 1-9 [doi]
- Protection Strategies for Dynamic VNF Placement and Service ChainingLeila Askari, Mohammadhassan Tamizi, Omran Ayoub, Massimo Tornatore. 1-9 [doi]
- Breaking One-RTT Barrier: Ultra-Precise and Efficient Congestion Control in Datacenter NetworksGuoyuan Yuan, Renjie Zhou, Dezun Dong, Shan Huang. 1-9 [doi]
- FedCo: A Federated Learning Controller for Content Management in Multi-party Edge SystemsVenkatraman Balasubramanian 0002, Moayad Aloqaily, Martin Reisslein. 1-9 [doi]
- Protection Techniques For Wavelength Division Multiplexing Networks using Resource Delayed Release StrategyShideh Yavary Mehr, Byrav Ramamurthy. 1-6 [doi]
- Context-Aware Online Offloading Strategy with Mobility Prediction for Mobile Edge ComputingShuyu Chen, Haopeng Chen, Jinteng Ruan, Ziming Wang. 1-9 [doi]
- A Data-Driven Analysis of K-12 Students' Participation and Learning Performance on an Online Supplementary Learning PlatformJiaquan Zhang, Xin Gao, Hui Chen, Lei Chen, Liang Wang, Jar-der Luo, Xiaoming Fu 0001. 1-9 [doi]
- Comparison of Various Sharing Approaches in Survivable Translucent Optical NetworksKrzysztof Walkowiak, Róza Goscien, Piotr Lechowicz, Adam Wlodarczyk. 1-6 [doi]
- Community Detection and Analysis in Air Pollution Complex Network Based on LPAJie Lian, Xin Ding, Jianguo Pan. 1-7 [doi]
- An Edge-based Strategy for Smart AdvertisingRasool Seyghaly, Jordi Garcia, Xavi Masip-Bruin. 1-8 [doi]
- A Few-Shot Class-Incremental Learning Approach for Intrusion DetectionTingting Wang, Qiujian Lv, Bo Hu, Degang Sun. 1-8 [doi]
- Budget-Constrained Reinforcement of SCADA for Cascade MitigationVajiheh Farhadi, Sai Gopal Vennelaganti, Ting He 0001, Nilanjan Ray Chaudhuri, Thomas La Porta. 1-9 [doi]
- On Data-centric Forwarding in Mobile Ad-hoc Networks: Baseline Design and Simulation AnalysisMd Ashiqur Rahman, Beichuan Zhang. 1-9 [doi]
- DRLS: A Deep Reinforcement Learning Based Scheduler for Time-Triggered EthernetChunmeng Zhong, Hongyu Jia, Hai Wan, Xibin Zhao. 1-11 [doi]
- Accelerate Cooperative Deep Inference via Layer-wise Processing Schedule OptimizationNing Wang 0018, Yubin Duan, Jie Wu 0001. 1-9 [doi]
- QoS-Aware Placement of Deep Learning Services on the Edge with Multiple Service ImplementationsNathaniel Hudson, Hana Khamfroush, Daniel E. Lucani. 1-8 [doi]
- SCoIoT: Swarm-Computations for the Internet of ThingsChristopher Scherb, Pascal Bürklin, Christian F. Tschudin. 1-6 [doi]
- Using Deep Reinforcement Learning for Routing in IP NetworksAbhiram Singh, Sidharth Sharma, Ashwin Gumaste. 1-9 [doi]
- Accurately Decoding MIMO Streams in VLCRaghav H. Venkatnarayan, Muhammad Shahzad. 1-10 [doi]
- Realization of an Intrusion Detection use-case in ONAP with AcumosShabnam Sultana, Philippe Dooze, Vijay Venkatesh Kumar. 1-6 [doi]
- Research on User Access Selection Mechanism Based on Maximum Throughput for 5G Network SlicingYangguang Lu, Xin Chen 0018, Ranran Xi, Ying Chen 0010. 1-8 [doi]
- Assessing the Use of Insecure ICS Protocols via IXP Network Traffic AnalysisGiovanni Barbieri, Mauro Conti, Nils Ole Tippenhauer, Federico Turrin. 1-9 [doi]
- Should We Trust Influencers on Social Networks? On Instagram Sponsored Post AnalysisXueting Liao, Danyang Zheng, Yubao Wu, Xiaojun Cao. 1-8 [doi]
- A Control Plane for WireGuardJordi Paillisse, Alejandro Barcia, Albert Lopez, Alberto Rodríguez Natal, Fabio Maino, Albert Cabellos. 1-8 [doi]
- Checking Network Security Policy Violations via Natural Language QuestionsPinyi Shi, Yongwook Song, Zongming Fei, James Griffioen. 1-9 [doi]
- iGate: NDN Gateway for Tunneling over IP WorldRan Zhu, Tianlong Li, Tian Song. 1-9 [doi]
- Combining Auto-Encoder with LSTM for WiFi-Based Fingerprint PositioningYu-Ting Liu, Jen-Jee Chen, Yu-Chee Tseng, Frank Y. Li. 1-6 [doi]
- An SDN Emulation Platform for Converged Fiber-Wireless 5G NetworksAristotelis Kretsis, Polyzois Soumplis, Panagiotis C. Kokkinos, Emmanouel A. Varvarigos. 1-7 [doi]
- PDTM: Phase-based dynamic trust management for Internet of thingsRunbo Su, Arbia Riahi, Enrico Natalizio, Pascal Moyal, Ye-Qiong Song. 1-7 [doi]
- RCP: A Reinforcement Learning-Based Retransmission Control Protocol for Delivery and Latency Sensitive ApplicationsYu Wang 0130, Alhussein A. Abouzeid. 1-9 [doi]
- P4 Programmability at the Network Edge: the BRAINE Approach [Invited]Filippo Cugini, Davide Scano, Alessio Giorgetti, Andrea Sgambelluri, Piero Castoldi, Francesco Paolucci. 1-9 [doi]
- MASS Communication for Constrained DevicesCheng Huang, Zeng Huy Tay, Khaled Harfoush. 1-9 [doi]
- Validation and Benchmarking of CNFs in OSM for pure Cloud Native applications in 5G and beyondAdrián Pino, Pouria Sayyad Khodashenas, Xavier Hesselbach, Estefanía Coronado, Shuaib Siddiqui. 1-9 [doi]
- A Link Quality Estimation Model for a Joint Deployment of Unmanned Aerial Vehicles and Wireless Sensor NetworksWaltenegus Dargie, Jianjun Wen. 1-9 [doi]
- Parallelism-aware Service Function Chaining and Embedding for 5G NetworksDanyang Zheng, Chengzong Peng, Xueting Liao, Xiaojun Cao. 1-9 [doi]
- Towards Decentralized Complex Queries over Distributed Ledgers: a Data Marketplace Use-caseMirko Zichichi, Luca Serena, Stefano Ferretti, Gabriele D'Angelo. 1-6 [doi]
- Online Partial Service Hosting at the EdgeV. S. Ch Lakshmi Narayana, Mohit Agarwala, Nikhil Karamchandani, Sharayu Moharir. 1-9 [doi]
- An Open, Real-World Dataset of Cellular UAV Communication PropertiesGonzalo J. Martínez, Grigoriy Dubrovskiy, Shangyue Zhu, Alamin Mohammed, Hai Lin 0002, J. Nicholas Laneman, Aaron D. Striegel, Ravikumar V. Pragada, Douglas R. Castor. 1-6 [doi]
- A Physarum-based Boost Algorithm for Network Optimization in Dense Wireless Sensor NetworksHaiyang Zhang, Fang Qi, Xiaomeng Liu. 1-9 [doi]
- Contrastive Self-Supervised Representation Learning for Sensing Signals from the Time-Frequency PerspectiveDongxin Liu, Tianshi Wang, Shengzhong Liu, Ruijie Wang 0004, Shuochao Yao, Tarek F. Abdelzaher. 1-10 [doi]
- mck8s: An orchestration platform for geo-distributed multi-cluster environmentsMulugeta Ayalew Tamiru, Guillaume Pierre, Johan Tordsson, Erik Elmroth. 1-10 [doi]
- A Blockchain and Self-Sovereign Identity Empowered Digital Identity PlatformEranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Kasun De Zoysa. 1-7 [doi]
- Performance Characterization of Post-Quantum Digital CertificatesManohar Raavi, Pranav Chandramouli, Simeon Wuthier, Xiaobo Zhou 0002, Sang-Yoon Chang. 1-9 [doi]
- Intrusion Detection System For IoT Networks Using Neural Networks With Extended Kalman FilterDivya D. Kulkarni, Shruti Rathore, Raj K. Jaiswal. 1-7 [doi]
- A novel Two-Factor HoneyToken Authentication MechanismVassilis Papaspirou, Leandros A. Maglaras, Mohamed Amine Ferrag, Ioanna Kantzavelou, Helge Janicke, Christos Douligeris. 1-7 [doi]
- Tagged Cuckoo FiltersKun Huang, Tong Yang. 1-10 [doi]
- Localization of Tagged Objects on Shelf via a Portable Camera-augmented RFID ReaderYazhe Tian, Sheng Chen, Jiuwu Zhang, Zijuan Liu, Xiulong Liu, Keqiu Li. 1-9 [doi]
- Model-based Stream Processing Auto-scaling in Geo-Distributed EnvironmentsHamidReza Arkian, Guillaume Pierre, Johan Tordsson, Erik Elmroth. 1-10 [doi]
- Secure and Privacy-Preserving Stored Surveillance Video Sharing atop Permissioned BlockchainAlem Fitwi, Yu Chen 0002. 1-8 [doi]
- Applying Harary Graph Structures to the Overlay Network KademliaHenner Heck, Arno Wacker. 1-8 [doi]
- Machine Learning based Flow Classification in DCNs using P4 SwitchesRadhakrishna Rajaram Kamath, Krishna M. Sivalingam. 1-10 [doi]
- Future Network Traffic Matrix Synthesis and Estimation Based on Deep Generative ModelsGrigorios Kakkavas, Michail Kalntis, Vasileios Karyotis, Symeon Papavassiliou. 1-8 [doi]
- Blockchain-enabled Personalized Incentives for Sustainable Behavior in Smart CitiesAyten Kahya, Anusha Avyukt, Gowri Sankar Ramachandran, Bhaskar Krishnamachari. 1-6 [doi]
- Designing an Affective States Input Tool for BikingOctavian Cuibus, Kuderna-Iulian Benta, Sebastian Alpers. 1-5 [doi]
- Fed-DDM: A Federated Ledgers based Framework for Hierarchical Decentralized Data MarketplacesRonghua Xu, Yu Chen 0002. 1-8 [doi]
- Influence Spread Control in Complex Networks via Removal of Feed Forward LoopsSatyaki Roy, Prithwiraj Roy, Venkata Sriram Siddhardh Nadendla, Sajal K. Das 0001. 1-9 [doi]
- Message in Message for Improved LoRaWAN CapacityTakwa Attia, Martin Heusse, Andrzej Duda. 1-9 [doi]
- ShadowDGA: Toward Evading DGA Detectors with GANsYu Zheng 0004, Chao Yang, Yanzhou Yang, Qixian Ren, Yue Li, Jianfeng Ma 0001. 1-8 [doi]
- Multi-Operator Cell Tower Locations Prediction from Crowdsourced DataMostafizur Rahman, Mohammad Arif Hossain, Murat Yuksel. 1-9 [doi]
- Pervasive Internet-Wide Low-Latency AuthenticationCyrill Krähenbühl, Markus Legner, Silvan Bitterli, Adrian Perrig. 1-9 [doi]
- Closed-loop Network Automation with Generic Programmable Data Plane (G-PDP) : (Invited Paper)Shaofei Tang, Hui Liang, Min Wang, Tingyu Li, Zuqing Zhu. 1-9 [doi]
- An Analytical Model for Evaluating the Interplay Between Capacity and Energy Efficiency in NB-IoTRomain Barbau, Vincent Deslandes, Gentian Jakllari, André-Luc Beylot. 1-9 [doi]
- Joint Scheduling of eMBB and URLLC Services in RIS-Aided Downlink Cellular NetworksMohammed Almekhlafi, Mohamed-Amine Arfaoui, Mohamed Kadry Elhattab, Chadi Assi, Ali Ghrayeb. 1-9 [doi]
- Sense-Bandits: AI-based Adaptation of Sensing Thresholds for Heterogeneous-technology Coexistence Over Unlicensed BandsMohammed Hirzallah, Marwan Krunz. 1-9 [doi]
- PREDICAT: Efficient Packet Classification via Prefix DisjointnessPavel Chuprikov, Vitalii Demianiuk, Sergey Gorinsky. 1-11 [doi]
- Bayesian Adaptive Path Allocation Techniques for Intra-Datacenter WorkloadsAli Malik, Ruairí de Fréin, Chih-Heng Ke, Hasanen Alyasiri, Obinna Izima. 1-8 [doi]
- Interference-Aware Sector Design in IEEE 802.11ad NetworksGuillaume Gaillard, Gentian Jakllari. 1-9 [doi]
- Cooperative Multi-Agent Deep Reinforcement Learning for Dynamic Virtual Network AllocationAkito Suzuki, Ryoichi Kawahara, Shigeaki Harada. 1-11 [doi]
- Coverage is Not Binary: Quantifying Mobile Broadband Quality in Urban, Rural, and Tribal ContextsVivek Adarsh, Michael Nekrasov, Udit Paul, Tarun Mangla, Arpit Gupta, Morgan Vigil-Hayes, Ellen Zegura, Elizabeth M. Belding. 1-9 [doi]
- Towards Testbed as-a-Service: design and implementation of an unattended SoC clusterGabriele Proietti Mattia, Roberto Beraldi. 1-8 [doi]
- Service Deployment and Service Request Optimization Scheduling in MEC enabled LEO NetworksYe Zhang, Yong Tang, Wenyong Wang. 1-6 [doi]
- A Game theory-based Computation Offloading Method in Cloud-Edge Computing NetworksZhenning Wang, Tong Wu, Zhenyu Zhang, Huan Zhou. 1-6 [doi]
- Engineering an IoT-Edge-Cloud Computing System Architecture: Lessons Learnt from An Undergraduate Lab CourseJasenka Dizdarevic, Admela Jukan. 1-11 [doi]
- Zero-Touch Network Orchestration At The EdgeReza Nejabati, Shadi Moazzeni, Pratchaya Jaisudthi, Dimitra Simenidou. 1-5 [doi]
- Efficient and Trustworthy Authentication in 5G Networks Based on BlockchainJian Liu, Chin-Tser Huang. 1-6 [doi]
- Beartooth Relay Protocol: Supporting Real-Time Application Streams with Dynamically Allocated Data Reservations over LoRaBatuhan Mekiker, Mike P. Wittie, Jefferson Jones, Michael Monaghan. 1-9 [doi]
- A Lightweight Heatmap-based Eye Tracking SystemXiaoxiao Luan, Bojun Zhang, Dongdong Liu, Xiulong Liu, Xinyu Tong, Keqiu Li. 1-9 [doi]
- fybrrStream: A WebRTC based Efficient and Scalable P2P Live Streaming PlatformDebajyoti Halder, Prashant Kumar, Saksham Bhushan, Anand M. Baswade. 1-9 [doi]
- How Optical Technologies Can Innovate Intra Data Center NetworksKen-ichi Sato. 1-8 [doi]
- Anomaly Detection of Network Streams via Dense Subgraph DiscoveryHao Yan, Qianzhen Zhang, Deming Mao, Ziyue Lu, Deke Guo, Sheng Chen. 1-9 [doi]
- Network Traffic Characteristics of IoT Devices in Smart HomesMd Mainuddin, Zhenhai Duan, Yingfei Dong. 1-11 [doi]
- Timetable-based Routing in Fixed Schedule Dynamic NetworksLata Narayanan, Cristian Rodriguez. 1-8 [doi]
- A Framework for Edge Intelligent Smart Distribution Grids via Federated LearningNathaniel Hudson, Md. Jakir Hossain, Minoo Hosseinzadeh, Hana Khamfroush, Mahshid Rahnamay-Naeini, Nasir Ghani. 1-9 [doi]
- False-name-proof mechanism for time window coverage tasks in mobile crowdsensingHao Cheng, Bin Jin, Yu Qiao, Lei Zhang, Chongjun Wang. 1-10 [doi]
- CAMEL: Centrality-Aware Multitemporal Discovery Protocol for Software-defined NetworksFaheed A. F. Alenezi, Sejun Song, Baek-Young Choi. 1-8 [doi]
- SATSS: A Self-Adaptive Task Scheduling Scheme for Mobile Edge ComputingJian Yang, Christian Poellabauer. 1-9 [doi]
- A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection AppliancesPing Jiang, Shuo Zhang, Qingyun Liu, Chao Zheng. 1-9 [doi]
- MOVO: a dApp for DLT-based Smart MobilityMirko Zichichi, Stefano Ferretti, Gabriele D'Angelo. 1-6 [doi]
- Latency-aware Radio Resource Allocation over Cloud RAN for Industry 4.0Haorui Peng, William Tärneberg, Maria Kihl. 1-8 [doi]
- Human-Centric Networking and why it should be a key focus for the Next Generation Internet and 6G research?Dimitra Simeonidou. 1-14 [doi]
- Synthetic and Private Smart Health Care Data Generation using GANsSana Imtiaz, Muhammad Arsalan, Vladimir Vlassov, Ramin Sadre. 1-7 [doi]
- Storage Protection with Connectivity and Processing Restoration for Survivable Cloud ServicesCarlos Natalino, Ahmad Rostami, Paolo Monti 0001. 1-9 [doi]
- Grammatical Evolution for Detecting Cyberattacks in Internet of Things EnvironmentsHasanen Alyasiri, John A. Clark, Ali Malik, Ruairí de Fréin. 1-6 [doi]
- Automatic Recognition of Identification Schemes for IoT Identifiers based on A Hybrid DNN ModelXiaotao Li, Shujuan You, Wai Chen. 1-8 [doi]
- Co-governed Space-Terrestrial Integrated Network Architecture and Prototype Based on MINGuohua Wei, Hui Li 0022, Yongiie Bai, Xin Yang, Huayu Zhang, Jianming Que, Wenjun Li. 1-6 [doi]
- Super-Cloudlet: Rethinking Edge Computing in the Era of Open Optical NetworksBehzad Mirkhanzadeh, Tianliang Zhang, Miguel Razo-Razo, Marco Tacca, Andrea Fumagalli. 1-11 [doi]
- CDetector: Extracting Textual Features of Financial Social Media to Detect Cyber AttacksJinwei Liu, Long Cheng 0003, Hongmei Chi, Cong Liu 0012, Richard A. Alo. 1-6 [doi]
- Def-IDS: An Ensemble Defense Mechanism Against Adversarial Attacks for Deep Learning-based Network Intrusion DetectionJianyu Wang, Jianli Pan, Ismail AlQerm, Yuanni Liu. 1-9 [doi]
- Developing Models from Measurements in a Noisy Environment: Lessons from an Indoor Wi-Fi Measurement Study on Application PerformanceCaylin A. Hartshorn, Waleed Al-Shaikhli, Sheyda Kiani Mehr, Daniel Cummins, Venkatesh Tamarapalli, Deep Medhi. 1-9 [doi]
- cTEx - A Configurable Topology Explorer for Wireless Ad-hoc NetworksChristopher Kohlstruck, Reinhard Gotzhein. 1-9 [doi]
- It's a Matter of Style: Detecting Social Bots through Writing Style ConsistencyMatteo Cardaioli, Mauro Conti, Andrea Di Sorbo, Enrico Fabrizio, Sonia Laudanna, Corrado Aaron Visaggio. 1-9 [doi]
- Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable CredentialsNikos Fotiou, Vasilios A. Siris, George C. Polyzos. 1-9 [doi]
- Breathing Sound-based Exercise Intensity Monitoring via SmartphonesYanzhi Ren, Zhourong Zheng, Hongbo Liu, Yingying Chen 0001, Hongwei Li, Chen Wang. 1-10 [doi]
- Semantic Identifiers and DNS Names for IoTSimon Fernandez, Michele Amoretti, Fabrizio Restori, Maciej Korczynski, Andrzej Duda. 1-9 [doi]
- Energy-Efficient UAV Flight Planning for a General PoI-Visiting Problem with a Practical Energy ModelJianping Huang, Feng Shan, RunQun Xiong, Yuchao Shao, Junzhou Luo. 1-10 [doi]
- A Deep Reinforcement Learning-based Task Scheduling Algorithm for Energy Efficiency in Data CentersPenglei Song, Ce Chi, Kaixuan Ji, Zhiyong Liu 0002, Fa Zhang 0001, Shikui Zhang, Dehui Qiu, Xiaohua Wan. 1-9 [doi]
- Characterizing the Performance of QUIC on Android and Wear OS DevicesAnirudh Ganji, Muhammad Shahzad. 1-11 [doi]
- Machine Learning Approach for Detecting Location Spoofing in VANETAekta Sharma, Arunita Jaekel. 1-6 [doi]
- Epinoia: Intent Checker for Stateful NetworksHuazhe Wang, Puneet Sharma, Faraz Ahmed, Joon-Myung Kang, Chen Qian 0001, Mihalis Yannakakis. 1-9 [doi]
- SenseGraph: Affect Self-monitoring and Tagging Tool with Wearable DevicesSebastian Alpers, Kuderna-Iulian Benta. 1-6 [doi]
- Security of continuous-variable quantum key distribution against canonical attacksPanagiotis Papanastasiou, Carlo Ottaviani, Stefano Pirandola. 1-6 [doi]
- SARACA: Demand-Driven Satellite Network Resource Allocation for Civil AviationXiang Zhang, Yuan Yang, Mingwei Xu. 1-9 [doi]
- Massive MIMO-NOMA Systems Secrecy in the Presence of Active EavesdroppersMarziyeh Soltani, Mahtab Mirmohseni, Panos Papadimitratos. 1-11 [doi]
- Trust- and Rating- based Recommendations for On-line Social NetworksAnna Kobusinska, Dionisis Margaris, Jakub Peikert. 1-11 [doi]
- WiFresh: Age-of-Information from Theory to ImplementationIgor Kadota, Muhammad Shahir Rahman, Eytan H. Modiano. 1-11 [doi]