Abstract is missing.
- A Secure Container-based Backup Mechanism to Survive Destructive Ransomware AttacksYong Jin, Masahiko Tomoishi, Satoshi Matsuura, Yoshiaki Kitaguchi. 1-6 [doi]
- Adaptive Video Transmission Designs Over Underwater Acoustic ChannelsRongxin Zhang, Yiming Kong, Xiaoli Ma, Deqing Wang. 1-5 [doi]
- An efficient quantum teleportation scheme based on six-particle cluster quantum channelNan Zhao 0003, Min Li, Nan Chen. 7-10 [doi]
- Compressed Sensing based Intrusion Detection System for Hybrid Wireless Mesh NetworksTianhe Shi, Wenxiao Shi, Ce Wang, Zhuo Wang. 11-15 [doi]
- Cryptanalysis and Improvement of a Biometrics-based Multi-server Authentication ProtocolYi Gu, Shengqiang Li. 16-20 [doi]
- Defending Web Servers with Feints, Distraction and ObfuscationDaniel Fraunholz, Hans D. Schotten. 21-25 [doi]
- A Joint Rate and Buffer Control Scheme for Video Transmission over LTE Wireless NetworksYu-ning Dong, Zheng Wu, Chun Liu. 26-30 [doi]
- Differentiated Connection Admission Control Strategy for Wireless VoIP Networks with Adaptive Modulation CodingMario A. Ramirez-Reyna, Felipe A. Cruz-Pérez, S. Lirio Castellanos-Lopez, Genaro Hernández-Valdez, Mario E. Rivero-Angeles. 31-37 [doi]
- SAND: A Social-Aware and Distributed Scheme for Device Discovery in the Internet of ThingsJames Sunthonlap, Phuoc Nguyen, Hao Wang, Mohammad Pourhomanyoun, Yuqing Zhu, Zilong Ye. 38-42 [doi]
- Two Types of Flows Admission control by altruistic behavior based on warningSumiko Miyata. 43-47 [doi]
- Optimal Code Regeneration with Background Traffic Awareness in Distributed StorageYangyang Tao, Shucheng Yu, Kenji Yoshigoe, Junxiu Zhou. 48-52 [doi]
- Appliance-level Short-Term Load Forecasting using Deep Neural NetworksGhulam Mohi-Ud-Din, Andreas U. Mauthe, Angelos K. Marnerides. 53-57 [doi]
- Optimal Peak Shaving Using Batteries at Datacenters: Charging Risk and Degradation ModelNeda Nasiriani, George Kesidis. 58-62 [doi]
- Optimal Planning of Renewable Generations for Electric Vehicle Charging StationHao Wang, Arish Balasubramani, Zilong Ye. 63-67 [doi]
- Performance Analysis and Evaluation of Cloud Radio Access NetworksXinran Zhang, Mugen Peng, Zhen Wang, Sihang Mai. 68-72 [doi]
- A Flickering Reduction Scheme for Tone Mapped HDR VideoStelios E. Ploumis, Mahsa T. Pourazad, Panos Nasiopoulos. 73-76 [doi]
- Smooth Streaming With MPEG-DASH Using SDN-Based Application-Aware NetworkingShuai Zhao 0002, Goutham Muppala, Zhu Li, Deep Medhi. 77-81 [doi]
- GPS Improvement System Using Short-Range CommunicationTadashi Ogino. 82-87 [doi]
- Semantic-Aware Clustering-based Approach of Trajectory Data Stream MiningSamia Tasnim, Juan Caldas, Niki Pissinou, S. S. Iyengar, Ziqian Ding. 88-92 [doi]
- Adaptive Multimedia Streaming between Heterogeneous Users using D2D and Dynamic Wi-Fi ConfigurationSneha Tipugade, Chetna Singhal. 93-97 [doi]
- Content-aware Efficient Video Uploading for Crowdsourced Multi-view Video StreamingThan Than Nu, Takuya Fujihashi, Takashi Watanabe. 98-104 [doi]
- Scalable Multicast for Content Delivery in Information Centric NetworksAytac Azgin, Ravishankar Ravindran, Guoqiang Wang. 105-111 [doi]
- THU Face Database for Real-Time Automatic Video Scoring ModelYifeng Liu, Xiaoming Tao, Ailing Xiao. 112-116 [doi]
- Short Block Turbo Coded OFDM with near Sphere Packing Bound PerformanceFatemeh Khalili, Jeffrey C. Dill. 117-121 [doi]
- Characterizing Emerging Markets: An Evaluation of TCP congestion control with real internet traffic over HTTP2Prasanna Vijayanathan, Ritesh Maheshwari, Rahul Malik, Shen Zhang, Siddharth Agarwal, Anant Rao, Goksel Genc. 122-126 [doi]
- Computer-Aided ReproducibilityMarcel Marek, Peyman Teymoori, Michael Welzl, Stein Gjessing. 127-133 [doi]
- An Algorithm for Dynamic Multicast Traffic Grooming in Light-trail Optical WDM Mesh NetworksHwa-Chun Lin, Yuan-Xi Zhuang. 134-138 [doi]
- Enhanced RWA Exact Solution with a New Lightpath Decomposition AlgorithmJulian Enoch, Brigitte Jaumard. 139-144 [doi]
- Robust Data Center Network Design Based on Space Division MultiplexingSaja Al-Mamoori, Arunita Jaekel, Subir Bandyopadhyay. 145-150 [doi]
- Utilizing Scalable Video to Optimize Video Playback over Passive Optical NetworksDavid L. Moore, Rami J. Haddad. 151-155 [doi]
- Poet-based Poetry Generation: Controlling Personal Style with Recurrent Neural NetworksJia Wei, Qiang Zhou, Yici Cai. 156-160 [doi]
- Profiling Facebook Public Page GraphYunfeng Hong, Yu-Cheng Lin, Chun-Ming Lai, Shyhtsun Felix Wu, George A. Barnett. 161-165 [doi]
- Graph-based Cooperative Caching in Fog-RANXiaoting Cui, Yanxiang Jiang, Xuan Chen, Fuchun Zheng, Xiaohu You. 166-171 [doi]
- Queueing Network Model and Average Delay Analysis for Mobile Edge ComputingShuaishuai Guo, Dalei Wu, Haixia Zhang 0001, Dongfeng Yuan. 172-176 [doi]
- Secure Payment Routing Protocol for Economic Systems Based on BlockchainQi Xia, Emmanuel Boateng Sifah, Ke Huang, Ruidong Chen, Xiaojiang Du, Jianbin Gao. 177-181 [doi]
- Secure Smart Card Signing with Time-based Digital SignatureHossein Rezaeighaleh, Roy Laurens, Cliff C. Zou. 182-187 [doi]
- Securing the Internet of Things with Recursive InterNetwork Architecture (RINA)Toktam Ramezanifarkhani, Peyman Teymoori. 188-194 [doi]
- Identifying Malicious Traffic in Software-Defined Wireless Local Area NetworksRadoslaw Cwalinski, Hartmut König. 195-199 [doi]
- IPv6 transmission over BLE Using Raspberry PI 3Javier Campos, Slater Colteryahn, Kanwalinderjit Gagneja. 200-204 [doi]
- CCP: Conflicts Check Protocol for Bitcoin Block SecurityChen Yang, Haohong Wang. 205-209 [doi]
- An O-QPSK modem using an FSK RF front end for IEEE 802.15.4 operation providing Maximum-Likelihood dataMoritz Schrey, Markus Scholl, Tobias Saalfeld, Jan Henning Mueller, Vahid Bonehi, Christoph Beyerstedt, Fabian Speicher, Stefan Heinen. 210-214 [doi]
- Bias Based General Framework for Delay Reduction in Backpressure Routing AlgorithmJuntao Gao, Yulong Shen, Minoru Ito, Norio Shiratori. 215-219 [doi]
- Collision-Aware Neighbor Discovery with Directional AntennasBtissam El Khamlichi, Duy H. N. Nguyen, Jamal El Abbadi, Nathaniel W. Rowe, Sunil Kumar 0001. 220-225 [doi]
- Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust ApproachConcepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Kianoosh G. Boroojeni, Jerry Miller, Ziqian Ding. 226-230 [doi]
- Resilient Data Collection Protocol with In-Network Processing for Oil and Gas Refinery NetworksHongpeng Guo, King-Shan Lui, Tianyuan Liu, Klara Nahrstedt. 231-237 [doi]
- Decoding of Polar Code by Using Deep Feed-Forward Neural NetworksJihoon Seo, Juyul Lee, Keunyoung Kim. 238-242 [doi]
- Experimental Results of a Land-to-Ship Propagation Channel using a Wideband Channel Sounding System at 2.4 GHzJae-Hyun Lee, Jeongsik Choi, Jung-Yong Lee, Seong-Cheol Kim. 243-248 [doi]
- Initial Access Techniques for 5G NR: Omni/Beam SYNC and RACH designsLili Wei, Qian Clara Li, Geng Wu. 249-253 [doi]
- Low-Complexity Universal-Filtered Multi-Carrier for Beyond 5G Wireless SystemsKorey Cain, Vida Vakilian, Reza Abdolee. 254-258 [doi]
- Multi-operator Fairness in Transparent RAN SharingYing-Dar Lin, Hsu-Tung Chien, Hsien-Wen Chang, Chia-Lin Lai. 259-263 [doi]
- Multilevel Code-block Group based HARQ-ACK Control Channel DesignJianming Wu. 264-268 [doi]
- Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure CommunicationsJing Wan, Deli Qiao, Haifeng Qian. 269-274 [doi]
- Applying Lattice Reduction Technique to Space-Time Coded Multiplexing SystemsYiming Kong, Xiaoli Ma, Yiyin Wang. 275-279 [doi]
- Performance Analysis of DC-SSK Scheme and Its Power Allocation in VLC SystemQi Zhang, Zhiquan Bai, Na Zhang, Shangqian Sun, Kyung Sup Kwak. 280-284 [doi]
- Reed Solomon Encoding for the Mitigation of Clipping Noise in OFDM-Based Visible Light CommunicationsNima Taherkhani, Kamran Kiasaleh. 285-289 [doi]
- A Deep Neural Network-Based Indoor Positioning Method using Channel State InformationGuan-Sian Wu, Po-Hsuan Tseng. 290-294 [doi]
- Combating Bit Errors From Stuck Cells in Flash Memory Using Novel Information Theory TechniquesRavi Motwani, Zion S. Kwok, Poovaiah M. Palangappa. 300-304 [doi]
- Matrix-Based Joint Interference and Channel Order Enumerators for SIMO Systems Suffering From RFITilahun Melkamu Getu, Wessam Ajib, René Landry Jr.. 305-309 [doi]
- Realizing Data driven and Hampel preprocessor based Adaptive filtering on a Software Defined Radio testbed: A USRP case StudyAnu Jagannath, Ashwin Amanna. 310-314 [doi]
- Reducing the Computational Complexity of ORVD-Trellis Search Based MIMO DetectionDominik Auras, Sebastian Birke, Rainer Leupers, Gerd Ascheid. 315-321 [doi]
- Efficient ID-based Message Authentication with Enhanced Privacy in Wireless Ad-hoc NetworksJian Li, Yun Liu, Zhenjiang Zhang, Bin Li, Hui Liu, Junjun Cheng. 322-326 [doi]
- Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor NetworksDi Tang, Jian Gu, You Yu, Yuanyuan Yang, Weijia Han, Xiao Ma. 327-331 [doi]
- Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS ConstraintsDanda B. Rawat, Amani Alshaikhi. 332-336 [doi]
- Exploiting Time and Subject Locality for Fast, Efficient, and Understandable Alert TriageDavid Kavaler, Corey Hudson, Michael Bierma. 337-343 [doi]
- Diversity Modeling to Evaluate Security of Multiple SDN ControllersHellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat. 344-348 [doi]
- An optimized VM Allocation Strategy to Make a Secure and Energy-Efficient Cloud Against Co-residence AttackYuhong Liu, Xiaojun Ruan, Songjie Cai, Ruiwen Li, Hanxiao He. 349-353 [doi]
- Mr.Tree: Multiple Realities in Tree-based Monitoring Overlays for Peer-to-Peer NetworksAndreas Disterhöft, Phillip Sandkuhler, Andre Ippisch, Kalman Graffi. 354-360 [doi]
- Reliable Transport for Mobile Ad Hoc Networks with Constrained Application Protocol (CoAP) over Negative-Acknowledgment Oriented Reliable Multicast (NORM)James H. Nguyen, Wei Yu 0002, Daniel Ku. 361-366 [doi]
- Low-Computational Complexity Intrusion Detection System for Jamming Attacks in Smart GridsBrycent Chatfield, Rami J. Haddad, Lei Chen 0029. 367-371 [doi]
- Gateway Placement for Reliability Optimization in 5G-Satellite Hybrid NetworksYurui Cao, Lei Zhao 0007, Yongpeng Shi, Jiajia Liu. 372-376 [doi]
- Cross-layer Multiuser Session Control for Improved SDN Cloud CommunicationsHelber Silva, Felipe Barbalho, Augusto Neto. 377-382 [doi]
- Evaluating QoS for Real-Time Applications Using a Lightweight Simulation of Network TrafficTim Humernbrum, Christian Ahlbrand, Sergei Gorlatch. 383-387 [doi]
- Cost and Energy Efficient Programmable Architecture for Integrated Hybrid Optical SwitchingCarla Raffaelli, Norvald Stol. 388-392 [doi]
- Traffic Prediction for Inter-Data Center Cross-Stratum Optimization ProblemsMichal Aibin, Krzysztof Walkowiak, Soroush Haeri, Ljiljana Trajkovic. 393-398 [doi]
- Energy Efficiency of Dynamic Routing in Elastic Optical Networks with Back-to-Back RegenerationKrzysztof Walkowiak, Miroslaw Klinkowski. 399-403 [doi]
- A Study on the Impact of Inter-Core Crosstalk on SDM Network PerformanceMiroslaw Klinkowski, Piotr Lechowicz, Krzysztof Walkowiak. 404-408 [doi]
- A Hybrid Testbed for Performance Evaluation of Large-Scale Datacenter NetworksArtur Pilimon, Sarah Ruepp. 409-413 [doi]
- Scheduled Lightpath Switching with Spatio-Spectral Resource AffinityJeremy M. Plante, Vinod M. Vokkarane. 414-419 [doi]
- Cyber Physical Social Systems: Towards Deeply Integrated Hybridized SystemsFalko Dressler. 420-424 [doi]
- iShare: Blockchain-Based Privacy-Aware Multi-Agent Information Sharing Games for CybersecurityDanda B. Rawat, Laurent Njilla, Kevin A. Kwiat, Charles A. Kamhoua. 425-431 [doi]
- Effects of the atmospheric turbulence on the single photon transmission in quantum channelNan Zhao 0003, Xiao-yang Wang, Nan Chen. 432-436 [doi]
- An Android Malware Detection Approach Using Weight-Adjusted Deep LearningWenjia Li, Zi Wang, Juecong Cai, Sihua Cheng. 437-441 [doi]
- A Case Study of Security and Privacy Threats from Augmented Reality (AR)Song Chen, Zupei Li, Fabrizio Dangelo, Chao Gao, Xinwen Fu. 442-446 [doi]
- Collaborative Adversarial Modeling for Spectrum Aware IoT CommunicationsPriyanka Samanta, Elizabeth Kelly, Amina Bashir, Saptarshi Debroy. 447-451 [doi]
- An Location-aware Authentication Scheme for Cross-domain Internet of Thing SystemsChenglong Fu, Tassadit Kezmane, Xiaojiang Du, Yat Fu, Colin Morrisseau. 452-456 [doi]
- Adaptive Resource Allocation for LTE/WiFi Coexistence in the Unlicensed SpectrumJianxin Dai, Cong Shen. 457-462 [doi]
- COQRC: A Rateless Video Transmission SolutionLingyu Liu, Jun Wu, Jian Wu. 463-467 [doi]
- An Accurate Simple Approximation to the Double-Nakagami (Generalized-K) Fading ChannelsHua Fu, Sebastien Roy, Julian Cheng. 468-474 [doi]
- Modeling and Analysis of Clustered D2D Millimeter-Wave CommunicationsWenqiang Yi, Yuanwei Liu, Arumugam Nallanathan. 475-479 [doi]
- A Bipartite Matching Based User Pairing Scheme for Hybrid VLC-RF NOMA SystemsYu Han, Xiaotian Zhou, Liuqing Yang 0001, Shanshan Li. 480-485 [doi]
- New Space-Frequency Conjugate Two-Path Transmission OFDM SystemsHen-Geul Yeh. 486-490 [doi]
- A Novel Approach for Mitigation of AM/PM Delay Mismatch in Polar TransmittersBasak Can, Giuseppe Li Puma. 491-495 [doi]
- Joint Estimation of Channel Parameters in Massive MIMO Systems via PARAFAC AnalysisXiao Wei, Wei Peng 0003, Derrick Wing Kwan Ng, Robert Schober, Tao Jiang. 496-502 [doi]
- Performance Analysis of Hybrid ARO Buffer ManagementSangmin Kim, Daejung Yoon, Kilsik Ha. 503-507 [doi]
- Reliable Video Streaming over mmWave with Multi Connectivity and Network CodingMatteo Drago, Tommy Azzino, Michele Polese, Cedomir Stefanovic, Michele Zorzi. 508-512 [doi]
- End-to-End Delay in Multi-Hop Wireless Networks With Random Relay DeploymentYuan Liang, Yu Zheng, Jian Ren, Tongtong Li. 513-517 [doi]
- Energy-Efficient Beamforming for Massive MIMO with Inter-Cell Interference and Inaccurate CSIShuai Zhang, Lu Liu, Yu Cheng, Xianghui Cao, Lin Cai. 518-523 [doi]
- Multi-rate ALOHA Protocols for Machine-Type CommunicationDaniel Zucchetto, Andrea Zanella. 524-530 [doi]
- Energy Conservation in Animal TrackingHoda Ayatollahi, Cristiano Tapparello, Malitha N. Wijesundara, Wendi B. Heinzelman. 531-536 [doi]
- Security Mechanisms to Defend against New Attacks on Software-Defined RadioKe Li, Xiangzhan Yu, Hongli Zhang, Longfei Wu, Xiaojiang Du, Paul Ratazzi, Mohsen Guizani. 537-541 [doi]
- K-Loop Free Assignment in Conference Review SystemsLonghua Guo, Jie Wu 0001, Wei Chang, Jun Wu, Jianhua Li. 542-547 [doi]
- Avoiding Inconsistency in OpenFlow Stateful Applications Caused by Multiple Flow RequestsWalber Jose Adriano Silva. 548-553 [doi]
- A Popularity-aware Centrality Metric for Content Placement in Information Centric NetworksJunaid Ahmed Khan, Cédric Westphal, Yacine Ghamri-Doudane. 554-560 [doi]
- Software Defined Networking for Quality-aware Management of Multi-hop Spontaneous NetworksCarlo Giannelli, Paolo Bellavista, Domenico Scotece. 561-566 [doi]
- AgileDC: A Novel Optical Data Center Network ArchitectureDinh Danh Le, Jingyan Wang, Liam P. Barry, Conor McArdle. 567-573 [doi]
- A Hybrid Approach for Name Resolution and Producer Selection in Information Centric NetworkLijun Dong, Guoqiang Wang. 574-580 [doi]
- JORDAN: A Novel Traffic Engineering Algorithm for Dynamic Adaptive Streaming over HTTPJing Ren, Kejie Lu, Cédric Westphal, Jin Wang, Jinfan Wang, Tongyu Song, Shucheng Liu, Jianping Wang. 581-587 [doi]
- Video QoE Prediction Based on User ProfileRaffael Shalala, Ran Dubin, Ofer Hadar, Amit Dvir. 588-592 [doi]
- A Progressive Transmission Technique for the Streaming of Point Cloud Data Using the KinectCarlos Moreno, Ming Li. 593-598 [doi]
- Towards UAV Assisted Multi-Path Data Streaming in Mobile Ad-Hoc NetworksFan Liang, James H. Nguyen, Weichao Gao, William G. Hatcher, Wei Yu 0002. 599-603 [doi]
- Scaling 360-degree Adaptive Bitrate Video Delivery Over an SDN ArchitectureBrian Hayes, Yusun Chang, George F. Riley. 604-608 [doi]
- An Opportunistic Medium Access Control Protocol for Visible Light Ad Hoc NetworksJithin Jagannath, Tommaso Melodia. 609-614 [doi]
- Task Allocation Schemes for Crowdsourcing in Opportunistic Mobile Social NetworksXiao Chen, Bo Deng. 615-619 [doi]
- Enabling Dynamic and Lightweight Management of Distributed Bluetooth Low Energy DevicesMinkeun Ha, Thomas Lindh. 620-624 [doi]
- Evolutionary Algorithm Optimized Centralized Offline Localization and MappingStephan Schlupkothen, Ahmed Hallawa, Gerd Ascheid. 625-631 [doi]
- Hiding Critical Targets in Smart Grid NetworksWei Bao, Qinghua Li. 632-636 [doi]
- A Framework to Enable Multiple Coexisting Internet of Things ApplicationsWei Yu 0002, Hanlin Zhang, Yalong Wu, David W. Griffith, Nada Golmie. 637-641 [doi]
- Performance Analysis and Application of Mobile BlockchainKongrath Suankaewmanee, Dinh Thai Hoang, Dusit Niyato, Suttinee Sawadsitang, Ping Wang, Zhu Han. 642-646 [doi]
- Digital Forensic Analysis of Instant Messaging Applications on Android SmartphonesHao Zhang, Lei Chen, Qingzhong Liu. 647-651 [doi]
- An Efficient Cross-layer Approach for Throughput-Maximal and Delay-Minimal Green Vehicular NetworksXing Liu, Kun Hua, Zheyi Chen, Ali S. Alghamdi, Mahdi N. Ali. 652-658 [doi]
- SDN-based Mobility Management and QoS Support for Vehicular Ad-hoc NetworksKuldip Singh Atwal, Ajay Guleria, Mostafa A. Bassiouni. 659-664 [doi]
- 5G-UCDA in High Speed Rail with Multi Antenna-to-Logical Cell Circular FIFO Mapping StrategySubharthi Banerjee, Sushanta Mohan Rakshit, Michael Hempel, Hamid Sharif. 665-669 [doi]
- Distributed Optimization of Multi-Beam Directional Communication NetworksTheodoros Tsiligkaridis. 670-675 [doi]
- Stationary Distribution of a Generalized LRU-MRU Content CacheGeorge Kesidis. 676-681 [doi]
- A Novel Approach to Exponential Speedup of Simulation Events in Wireless NetworksAnand Ganti, Uzoma Onunkwo, Brian Van Leeuwen, Michael P. Scoggin, Richard Schroeppel. 682-688 [doi]
- JumboNet Elephant Tracking Using Delay-Tolerant Routing with Multiple SinksNadir Adam, Cristiano Tapparello, Malitha N. Wijesundara, Wendi B. Heinzelman. 689-695 [doi]
- Caching UAV Assisted Secure Transmission in Small-Cell NetworksFen Cheng, Guan Gui, Nan Zhao 0001, F. Richard Yu, Yunfei Chen, Jie Tang, Hikmet Sari. 696-701 [doi]
- Social Data Driven SDN Network Operation using Northbound InterfaceTsumugi Tairaku, Akihiro Nakao, Shu Yamamoto, Saneyasu Yamaguchi, Masato Oguchi. 702-706 [doi]
- End-to-End Network Performance Monitoring for Dispersed ComputingQuynh Nguyen, Pradipta Ghosh, Bhaskar Krishnamachari. 707-711 [doi]
- Diversity for Detecting Routing Attacks in Multihop NetworksMai Abdelhakim, Xin Liu, Prashant Krishnamurthy. 712-717 [doi]
- Reducing Network Vulnerability to Malicious AttacksMaede Rayatidamavandi, Frank Conlon, Mahshid Rahnamay-Naeini. 718-723 [doi]
- Embedding Chains of Virtual Network Functions in Inter-Datacenter NetworksHideo Kobayashi, Genya Ishigaki, Riti Gour, Jason P. Jue, Norihiko Shinomiya. 724-728 [doi]
- Generalized Survivability Models for Many-to-Many CommunicationDylan A. P. Davis, Vinod M. Vokkarane. 729-735 [doi]
- Modeling and Analysis of Power Amplifier Dissipation Energy in Wireless Handset TransceiversFarhad E. Mahmood, Erik S. Perrins, Lingjia Liu. 736-740 [doi]
- Energy Efficient User Association and Power Control for Dense Heterogeneous NetworksHui Ding, Haixia Zhang 0001, Jie Tian 0003, Shenghao Xu, Dongfeng Yuan. 741-746 [doi]
- Performance Evaluation of Energy Efficiency with Sleep Mode in Ultra Dense NetworksHansong Xu, Wei Yu 0002, Amirshahram Hematian, David W. Griffith, Nada Golmie. 747-751 [doi]
- Performance Analysis of Cooperative Relaying in Diffusion-Based Molecular CommunicationBonan Yin, Mugen Peng. 752-756 [doi]
- Efficient Cloudlet Deployment: Local Cooperation and Regional ProxyDawei Li, Jie Wu, Wei Chang. 757-761 [doi]
- Analysis on Connectivity of Energy Harvesting Wireless Sensor Networks Based on SimulationHanbing Cong, Quanlong Li, Chengchao Zhou, Qing Yang 0003. 762-768 [doi]
- An Out-of-band Authentication Scheme for Internet of Things Using Blockchain TechnologyLongfei Wu, Xiaojiang Du, Wei Wang, Bin Lin. 769-773 [doi]
- Don't Be Surprised: I See Your Mobile App Stealing Your DataSwarna Gopalan, Aditi Kulkarni, Arpitaben Narendrabhai Shah, Jun Dai, Jinsong Ouyang, Pinar Muyan-Özçelik, Xiaoyan Sun. 774-778 [doi]
- Realtime Software Defined Self-Interference Cancellation Based on Machine Learning for In-Band Full Duplex Wireless CommunicationsHanqing Guo, Junhong Xu, Shangyue Zhu, Shaoen Wu. 779-783 [doi]
- Automatic Detection of Opioid Intake Using Wearable BiosensorMd Shaad Mahmud, Hua Fang, Honggang Wang, Stephanie Carreiro, Edward W. Boyer. 784-788 [doi]
- Spatio-Temporal Motifs for Optimized Vehicle-to-Vehicle (V2V) CommunicationsTengchan Zeng, Omid Semiari, Walid Saad. 789-794 [doi]
- Secrecy Energy Efficiency Optimization for Cooperative Jamming in Cognitive Radio NetworksYingkun Wen, Tao Jing, Yan Huo, Zhen Li, Qinghe Gao. 795-799 [doi]
- Joint Mode Selection, VBS Association and Resource Allocation for Cellular D2D Communication NetworksLing Wang, Rong Chai, Hong Chen, Qianbin Chen. 800-804 [doi]
- Exploiting Magnetic Field Analysis to Characterize MI Wireless Communications in Subsea EnvironmentsDebing Wei, Li Yan, Xuanheng Li, Yi Sun, Dongfeng Yuan, Jiefu Chen, Miao Pan. 805-809 [doi]
- Towards An Integrated Approach for Distributed 5G Cell Association in UDN under Interference and MobilitySushanta Mohan Rakshit, Subharthi Banerjee, Michael Hempel, Hamid Sharif. 810-814 [doi]
- Fairness-Energy-Throughput Optimized Trade-off in Wireless NetworksCédric Gueguen, Malo Manini. 815-821 [doi]
- A Novel Fault Tolerance Parallel Routing Mechanism with Network Coding in Hybrid Wireless-Optical Broadband Access NetworkHong Zhang 0012, Ruyan Wang, Honggang Wang, Guangkai Wu. 822-826 [doi]
- Distance Based User Localization and Tracking with Mechanical Ultrasonic BeamformingShangyue Zhu, Hanqing Guo, Junhong Xu, Shaoen Wu. 827-831 [doi]
- Heterogeneous Flow Table Integration for Capacity Enhancement in Software-Defined NetworksChi-Hsiang Hung, Jheng-Jyun Wang, Li-Chun Wang, Kuo-Chen Wang, Chain-Wu Lee. 832-836 [doi]
- PWiG: A Phase-based Wireless Gesture Recognition SystemDapeng Man, Wu Yang, Xin Wang, Jiguang Lv, Xiaojiang Du, Miao Yu. 837-842 [doi]
- A Novel Authentication Protocol with Tree-based Signature for Green Cloud ComputingJian Shen, Dengzhi Liu, Qi Liu, Zhihua Xia, Tianqi Zhou. 843-848 [doi]
- Energy vs QoE Tradeoff of Dense Mobile NetworksGeorge Arvanitakis, Florian Kaltenberger. 849-854 [doi]
- Pilot Length Optimization for Spectral and Energy Efficient D2D Communications Underlay Massive MIMO NetworksShenghao Xu, Haixia Zhang, Jie Tian 0003, Dalei Wu, Dongfeng Yuan. 855-860 [doi]
- PVFlow: Flow-Table Virtualization in POF-based vSDN Hypervisor (PVX)Shengru Li, Kai Han, Huibai Huang, Zuqing Zhu. 861-865 [doi]
- Survivable Virtual Network Mapping Based on Two-Stage Potential Games for Cloud InfrastructureYi Zhu, Jiru Xu, Qiong Zhang, Xi Wang 0001, Paparao Palacharla, Tadashi Ikeuchi. 866-872 [doi]
- Identifying Influential Factors of CDN Performance with Large-scale Data AnalysisDawei Wang, Shuzhuang Zhang, Yibo Xue, Yingfei Dong. 873-877 [doi]
- The Identification of Secular Variation in IoT Based on Transfer LearningCaidan Zhao, Zhibiao Cai, Minmin Huang, Mingxian Shi, Xiaojiang Du, Mohsen Guizani. 878-882 [doi]
- Cost-Adaptive Load Sharing for Cloud ComputingZohar Naor. 883-887 [doi]
- Information Flow Queue Optimization in EC CloudYangyang Tao, Shucheng Yu, Junxiu Zhou. 888-892 [doi]
- An Empirical Evaluation of Deep Learning for Network Anomaly DetectionRitesh K. Malaiya, Donghwoon Kwon, Jinoh Kim, Sang C. Suh, Hyunjoo Kim, Ikkyun Kim. 893-898 [doi]
- Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor NetworksMin Kyung An, Hyuk Cho, Lei Chen. 899-904 [doi]
- Location-driven Mobility Support Architecture for Information Centric NetworksAytac Azgin, Ravishankar Ravindran, Guoqiang Wang. 905-911 [doi]
- eFCM: An Enhanced Fuzzy C-Means Algorithm for Longitudinal Intervention DataVenkata Sukumar Gurugubelli, Zhouzhou Li, Honggang Wang, Hua Fang. 912-916 [doi]
- Tensor-Based Efficient Multi-Interferer RFI Excision: Results Using Real-World DataTilahun Melkamu Getu, Wessam Ajib, Omar A. Yeste Ojeda, René Landry Jr.. 917-921 [doi]