Abstract is missing.
- Silent Timestamping for Blockchain Mining Pool SecuritySang-Yoon Chang, Younghee Park. 1-5 [doi]
- Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading ChannelsAmer Al-Baidhani, H. Howard Fan. 6-10 [doi]
- Product Review Credibility AnalysisAnusha Prabakaran, Min Chen 0009. 11-15 [doi]
- †Kensei Saito, Yasutaka Ogawa, Toshihiko Nishimura, Takeo Ohgane, Junichiro Hagiwara. 16-21 [doi]
- Intelligent Scheduling for Parallel Jobs in Big Data Processing SystemsMingrui Xu, Chase Q. Wu, Aiqin Hou, Yongqiang Wang. 22-28 [doi]
- A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO SystemYuya Suzuki, Toshihiko Nishimura, Takeo Ohgane, Yasutaka Ogawa, Junichiro Hagiwara. 29-33 [doi]
- Markov Chain Analysis for Compressed Sensing based Random Access in Cellular SystemsSangjun Park, Seunghyun Lee, Wan Choi. 34-38 [doi]
- Outage Probability Bounds of EGC Over Correlated Lognormal Fading ChannelsZhiqiang Xiao, Bingcheng Zhu, Yongjin Wang. 39-45 [doi]
- SMAP: A Map Extension Framework for Intelligent Travel SystemsNardine Basta, Amal El-Nahas, Hans Peter Großmann, Slim Abdennadher. 46-50 [doi]
- Data Interpolation for Deep Learning based Encrypted Data Packet ClassificationPan Wang, Yiqing Zhou, Feng Ye, Hao Yue. 51-55 [doi]
- Hadoop Performance Evaluation in Software Defined Data Center NetworksC. Calcaterra, A. Carmenini, A. Marotta, D. Cassioli. 56-61 [doi]
- Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode ArrayZhiming Zhu, Bingcheng Zhu, Yongjin Wang, Zheng Shi, Yuan Jiang. 62-66 [doi]
- Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with JammingJaber Al-Khori, Galymzhan Nauryzbayev, Mohamed Abdallah, Mounir Hamdi. 67-72 [doi]
- Spam DIS Attack Against Routing Protocol in the Internet of ThingsCong Pu. 73-77 [doi]
- Preventing UDP Flooding Amplification Attacks with Weak AuthenticationEdoardo Biagioni. 78-82 [doi]
- Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' BehaviorsSachula Meng, Ying Wang, Wensheng Sun, Shan Guo, Kai Sun. 83-87 [doi]
- Multicast Design for the MobilityFirst Future Internet ArchitectureBowen Yang, Xiang Chen, Jinsen Xie, Sugang Li, Yanyong Zhang, Jian Yang. 88-93 [doi]
- An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric NetworkingQi Zhang, Xiaofeng Jiang, Shuangwu Chen, Jinsen Xie, Jian Yang, Ling Xing. 94-99 [doi]
- Fine-tuning a pre-trained Convolutional Neural Network Model to translate American Sign Language in Real-timeManuel Eugenio Morocho Cayamcela, Wansu Lim. 100-104 [doi]
- Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise CancellationWeicheng Yu, Kai Zhang, Pingping Shang, Xueqin Jiang, Miaowen Wen, Jun Li 0036, Han Hai. 105-109 [doi]
- A Two-phase Transmission Protocol Design for Ultra-reliable CommunicationsLanlin Li, Yinglei Teng, Mei Yan, Mei Song, Lihong Song. 110-115 [doi]
- Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner TransceiverHuan-Bang Li, Kenichi Takizawa, Toshinori Kagawa, Fumihide Kojima, Ryu Miura. 116-120 [doi]
- How to Control a TCP: Minimally-Invasive Congestion Management for DatacentersSafiqul Islam, Michael Welzl, Stein Gjessing. 121-125 [doi]
- On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNsTina Gui, Feng Wang, Christopher Ma, Dawn E. Wilkins. 126-130 [doi]
- Maximizing Secrecy Rate and Payoff Through Wireless Virtualization in Heterogeneous Wireless NetworksNaveen Naik Sapavath, Dema Saad Alorini, Danda B. Rawat, Moses Garuba. 131-135 [doi]
- Authenticating Endpoints and Vetting Connections in Residential NetworksYu Liu, Curtis R. Taylor, Craig A. Shue. 136-140 [doi]
- HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for Virtual NEtwork Services over Multi-Cloud SystemsLav Gupta, Tara Salman, Ria Das, Aiman Erbad, Raj Jain, Mohammed Samaka. 141-147 [doi]
- A Novel NMF Algorithm for Detecting Clusters in Directed NetworksYoshito Usuzaka, Norikazu Takahashi. 148-152 [doi]
- Multi-Resource Continuous Allocation Model for Cloud ServicesAnwar Alyatama. 153-158 [doi]
- *Junggab Son, Euiseong Ko, Uday Bhaskar Boyanapalli, Donghyun Kim, Youngsoon Kim, Mingon Kang. 159-163 [doi]
- Risk Assessment Approach to Secure Northbound Interface of SDN NetworksMarcin Niemiec, Piotr Jaglarz, Marcin Jekot, Piotr Cholda, Piotr Borylo. 164-169 [doi]
- Expected Capacity Guaranteed Routing based on Dynamic Link Failure PredictionShu Sekigawa, Satoru Okamoto, Naoaki Yamanaka, Eiji Oki. 170-174 [doi]
- Design of an Efficient Resource Management Model in Elastic Optical NetworksChing-Fang Hsu, Siou-Ci Sie, Hsuan-Fang Fu, Jin-Jun Zheng, Shi-Xuan Chen. 175-179 [doi]
- Enhancing VoIP Security and Efficiency using VPNThattapon Surasak, C.-H. Scott Huang. 180-184 [doi]
- Mobile Device Localization in 5G Wireless NetworksDandan Wang, Gurudutt Hosangadi, Pantelis Monogioudis, Anil Rao. 185-190 [doi]
- Probabilistic Estimation of Honeypot Detection in Internet of Things EnvironmentOleg Surnin, Fatima Hussain, Rasheed Hussain, Svetlana Ostrovskaya, Andrey Polovinkin, Jooyoung Lee, Xavier Fernando. 191-196 [doi]
- Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNETSeungwoon Lee, Jehad Ali, Byeong-hee Roh. 197-202 [doi]
- An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G SystemDiogo Parracho, David Duarte, Iola Pinto, Pedro Vieira 0001. 203-208 [doi]
- A System for Generating Background Colors for e-Books, Based on its TextTakuto Kamiura, Shohei Yamada, Naiwala P. Chandrasiri. 209-213 [doi]
- An abstraction layer for cybersecurity contextRaffaele Bolla, Alessandro Carrega, Matteo Repetto. 214-218 [doi]
- Construction of Time-Space Radio Environment Database using HMM for Cooperative SensingYuya Aoki, Takeo Fujii. 219-223 [doi]
- A QoE-Driven Rate Adaptation Approach for Dynamic Adaptive Streaming Over HTTPZiwei Wang, Xiuhua Jiang. 224-229 [doi]
- Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh FadingKrittetash Pinyoanuntapong, Hyuck Kwon, Khanh Pham, James Lyke. 230-234 [doi]
- A temporary communication system using DTN for improving power consumption of mobile terminalsYoshitaka Nakamura, Tomohiro Kaneta, Osamu Takahashi. 235-239 [doi]
- Spectrum Sharing for Heterogeneous Communication Systems in TV White SpacesWenjie Zhang, Guanglin Zhang, Yifeng Zheng, Liwei Yang, Chai Kiat Yeo. 240-244 [doi]
- Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social NetworksYan Li, Victor O. K. Li. 245-249 [doi]
- Towards Self-Defense of Non-Stationary SystemsStefano Iannucci, Andrea Montemaggio, Byron Williams. 250-254 [doi]
- A Method of Moments Estimator for Modulation Index of Continuous Phase ModulationIhtisham Khalid, Syed Asad Ullah, Sajid Saleem, Syed Ali Hassan. 255-259 [doi]
- Text-To-Speech quality evaluation based on LSTM Recurrent Neural NetworksMeng Tang, Jie Zhu. 260-264 [doi]
- Tail Latency Prediction for Datacenter Applications in Consolidated EnvironmentsSami Alesawi, Minh Nguyen, Hao Che, Akshit Singhal. 265-269 [doi]
- Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail PredictionSami Alesawi, Sakher Ghanem. 270-275 [doi]
- Clustering Enabled Classification using Ensemble Feature Selection for Intrusion DetectionFadi Salo, MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Aleksander Essex. 276-281 [doi]
- Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G NetworksBen Hughes, Shruti Bothe, Hasan Farooq, Ali Imran. 282-286 [doi]
- Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General CallsKenta Kawai, Kazuki Tanabe, Katsunori Yamaoka, Ken-ichi Baba. 287-291 [doi]
- A Graded Approach to Network Forensics with Privacy ConcernsWilliam Brockelsby, Rudra Dutta. 292-297 [doi]
- Fractional Packet Duplication and Fade Duration Outage Probability Analysis for Handover Enhancement in 5G Cellular NetworksRahul Arun Paropkari, Aklilu Assefa Gebremichail, Cory Beard. 298-302 [doi]
- A Meshed Tree Protocol for Loop Avoidance in Switched NetworksPeter Willis, Nirmala Shenoy. 303-307 [doi]
- UWB-Based Single-Anchor Indoor Localization Using Reflected Multipath ComponentsHessam Mohammadmoradi, Milad Heydariaan, Omprakash Gnawali, Kyungki Kim. 308-312 [doi]
- Satellite MIMO Digital Beam-forming under Nonlinear High-Power Amplifier and KeyholeMadhuprana Goswami, Hyuck M. Kwon, Khanh Pham, James Lyke. 313-317 [doi]
- Optimal Admission Control For Secondary Users In Cognitive Radio SystemsWenlong Ni, Wei Li. 318-323 [doi]
- D2D-Assisted Physical-Layer Security in Next-Generation Mobile NetworkDaidong Ying, Feng Ye. 324-328 [doi]
- Hybrid precoded index modulation in downlink mmWave MU-MIMO systemsAlvaro Javier Ortega, Raimundo Sampaio Neto, Rodrigo Pereira David. 329-333 [doi]
- A Bare PC Text Based BrowserSaleh Almutairi, Ramesh K. Karne, Alexander L. Wijesinha. 334-338 [doi]
- Age Minimization of Multiple Flows using Reinforcement LearningHasan Burhan Beytur, Elif Uysal-Biyikoglu. 339-343 [doi]
- A full Secondary User model for Cognitive Radio in a GSM-900 scenarioMarco Scarpa, Salvatore Serrano. 344-349 [doi]
- MongoDB Clustering using K-means for Real-Time Song RecognitionMurtadha Arif Bin Sahbudin, Marco Scarpa, Salvatore Serrano. 350-354 [doi]
- A Lightweight Network Discovery Algorithm for Resource-constrained IoT DevicesSalvatore Gaglio, Giuseppe Lo Re, Gloria Martorella, Daniele Peri. 355-359 [doi]
- Countering Selfish Mining in BlockchainsMuhammad Saad, Laurent Njilla, Charles A. Kamhoua, Aziz Mohaisen. 360-364 [doi]
- SmartEye: Mobile Device Proximity Monitoring via Wireless Signal AnalysisMohammad Hadian, Thamer Altuwaiyan, Xiaohui Liang, Bo Sheng, Kuan Zhang. 365-369 [doi]
- Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching GameTalal Halabi, Martine Bellaïche, Adel Abusitta. 370-374 [doi]
- Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart ContractsEhab Zaghloul, Tongtong Li, Jian Ren 0001. 375-379 [doi]
- kFHCO: Optimal VM Consolidation via k -Factor Horizontal Checkpoint OversubscriptionYangyang Tao, Shucheng Yu. 380-384 [doi]
- Neuro-Fuzzy classifier for longitudinal behavioral intervention dataVenkata Sukumar Gurugubelli, Hua Fang, Honggang Wang. 385-389 [doi]
- An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social NetworksFengHua Li, Zhe Sun, Ben Niu 0001, Jin Cao, Hui Li. 390-394 [doi]
- Minimum Latency Aggregation Scheduling in Internet of ThingsMin Kyung An, Hyuk Cho, Bing Zhou, Lei Chen. 395-401 [doi]
- Clustering the Unknown - The Youtube CaseAmit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan. 402-407 [doi]
- Performance Assessment of Smart Meter Traffic over LTE Network Using SDR TestbedAmirshahram Hematian, Wei Yu 0002, David W. Griffith, Nada Golmie. 408-412 [doi]
- Location Information-Aided Load Balancing Design for Hybrid LiFi and WiFi NetworksWeibin Ma, Lin Zhang 0023, Zhiqiang Wu. 413-417 [doi]
- DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service SystemYurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu 0001, FengHua Li. 418-424 [doi]
- Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNetYunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu 0001, FengHua Li. 425-431 [doi]
- Towards Multimodal Learning for Android Malware DetectionJosh McGiff, William G. Hatcher, James H. Nguyen, Wei Yu 0002, Erik Blasch, Chao Lu 0002. 432-436 [doi]
- Adversarial Detection of Concealed VoIP TrafficPaolo Addesso, M. Cirillo, Mario Di Mauro, Maurizio Longo, Vincenzo Matta. 437-441 [doi]
- A Quantitative Study of the Deployment of DNS Rate LimitingCasey T. Deccio, Derek Argueta, Jonathan Demke. 442-447 [doi]
- Automatic Spam Detection on Gulf Dialectical Arabic TweetsDema Alorini, Danda B. Rawat. 448-452 [doi]
- Verification Code Recognition Based on Active and Deep LearningDongliang Xu, BaiLing Wang, Xiaojiang Du, Xiaoyan Zhu, Zhitao Guan, Xiaoyan Yu, Jingyu Liu. 453-456 [doi]
- A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware OutbreakChin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua. 457-462 [doi]
- Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key DistributionMichael Berhane Asfaw, Xueqin Jiang, Meixiang Zhang, Jia Hou, Wei Duan. 463-467 [doi]
- Accelerated Prediction of Bradycardia in Preterm Infants Using Time-Frequency AnalysisMd Shaad Mahmud, Honggang Wang, Yong Kim. 468-472 [doi]
- Enhancing Interdomain Transport via Economic Software-Defined Exchange PointsTilman Wolf, Anna Nagurney, James Griffioen, Kenneth L. Calvert. 473-479 [doi]
- Developing a QoE Monitoring Approach for Video Service Based on Mobile TerminalsXiwen Liu, Xiaoming Tao, Li Wang, Yafeng Zhan, Jianhua Lu. 480-485 [doi]
- SDN based Network Function Parallelism in CloudAnkur Chowdhary, Dijiang Huang. 486-490 [doi]
- Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA SystemsJie Tang, Yu Yu, Daniel K. C. So, Gaojie Chen, Xiuyin Zhang, Mo Huang. 491-496 [doi]
- Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined NetworksChuanji Zhang, Hemin Yang, George F. Riley, Douglas M. Blough. 497-502 [doi]
- Context-Aware Analysis Scheduling in Wireless Body Area NetworksJoseph Reeves, Ming Li. 503-508 [doi]
- Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic GeometryAhmed Alahmadi, Yuan Liang, Run Tian, Jian Ren 0001, Tongtong Li. 509-514 [doi]
- Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio NetworksWenfan Chen, Chengming Li, Shimin Gong, Lin Gao, Jing Xu. 515-519 [doi]
- Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDNQi Zhao, Muhao Chen, Pengyuan Du, Tuan Le, Mario Gerla. 520-525 [doi]
- Indoor Localization Using Commodity Wi-Fi APs: Techniques and ChallengesLaxima Niure Kandel, Shucheng Yu. 526-530 [doi]
- Dynamic EAP Based MAC Protocol for Wireless Body Area NetworksAi Enkoji, Ming Li, James Daniel Brisky, Ryan Melvin. 531-536 [doi]
- Virtual Edge Computing Using Vehicular Micro CloudsFalko Dressler, Gurjashan Singh Pannu, Florian Hagenauer, Mario Gerla, Takamasa Higuchi, Onur Altintas. 537-541 [doi]
- Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving AccessibilitySethuraman Panchanathan, Troy L. McDaniel, Ramin Tadayon, Adric Rukkila, Hemanth Venkateswara. 542-546 [doi]
- ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced DataXueyan Liu, Zhitao Guan, Xiaojiang Du, Liehuang Zhu, Zhengtao Yu 0001, Yinglong Ma. 547-551 [doi]
- Three-way Email Spam Filtering with Game-theoretic Rough SetsYan Zhang, Pengfei Liu, Jingtao Yao. 552-556 [doi]
- Integrated Node Authentication and Key Distribution Method for Body Area NetworkZhouzhou Li, Hua Fang, Honggang Wang. 557-561 [doi]
- Toward Drone Privacy via Regulating Altitude and PayloadZupei Li, Chao Gao, Qinggang Yue, Xinwen Fu. 562-566 [doi]
- What To Do First: Ranking The Mission Impact Graph for Effective Mission AssurancePranavi Appana, Xiaoyan Sun, Yuan Cheng. 567-571 [doi]
- SUPC: SDN enabled Universal Policy Checking in Cloud NetworkAnkur Chowdhary, Adel Alshamrani, Dijiang Huang. 572-576 [doi]
- Adaptive MTD Security using Markov Game ModelingAnkur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur. 577-581 [doi]
- A Novel Rate Control Method for Free-viewpoint Video in MV-HEVCRoxana Abolfathi, Hoda Roodaki, Shervin Shirmohammadi. 582-587 [doi]
- A New Prediction Structure for Efficient MV-HEVC based Light Field Video CompressionJoseph Khoury, Mahsa T. Pourazad, Panos Nasiopoulos. 588-591 [doi]
- Domain-Specific Image Classification Using Ensemble Learning Utilizing Open-Domain KnowledgeHan Sun, Jian Yang. 593-596 [doi]
- Video Streaming over the LWA SystemsJounsup Park. 597-601 [doi]
- Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical NetworksChing-Fang Hsu, Hao-Cheng Hu, Hsuan-Fang Fu, Jin-Jun Zheng, Shi-Xuan Chen. 602-606 [doi]
- Performance of Elastic Optical Network with Spectrum Slicing for Fragmented Bandwidth AllocationNattapong Kitsuwan, Ryota Matsuura. 607-611 [doi]
- Investigating the Delay Impact of the DiffServ Code Point (DSCP)Michael Welzl, Safiqul Islam, Runa Barik, Stein Gjessing, Ahmed Elmokashfi. 612-616 [doi]
- A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT DevicesArman Pouraghily, Tilman Wolf. 617-623 [doi]
- COMPRESS: A Self-Sufficient Scheme for Measuring Queueing Delay on the Internet RoutersKhondaker M. Salehin, Roberto Rojas-Cessa, Ki-Won Kwon. 624-629 [doi]
- Distributed Mechanism for Computation Offloading Task Routing in Mobile Edge Cloud NetworkLijun Dong, Richard Li. 630-636 [doi]
- MedRec: A Network for Personal Information DistributionNchinda Nchinda, Agnes Cameron, Kallirroi Retzepi, Andrew Lippman. 637-641 [doi]
- Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of ThingsJames H. Nguyen, Yalong Wu, Jin Zhang, Wei Yu, Chao Lu. 642-646 [doi]
- SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering SystemsImad Ali, Ronald Y. Chang, Cheng-Hsin Hsu. 647-652 [doi]
- Multi-User Multi-Armed Bandits for Uncoordinated Spectrum AccessMeghana Bande, Venugopal V. Veeravalli. 653-657 [doi]
- An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM CombinedSalva Daneshgadeh, Thomas Kemmerich, Tarem Ahmed, Nazife Baykal. 658-662 [doi]
- Adaptive Resource Provisioning based on Application StateConstantine Ayimba, Paolo Casari, Vincenzo Mancuso. 663-668 [doi]
- Network-based Classification of Authentication Attempts using Machine LearningCurtis R. Taylor, Julian P. Lanson. 669-673 [doi]
- Deep Learning Based Transmitter Identification using Power Amplifier NonlinearitySamer S. Hanna, Danijela Cabric. 674-680 [doi]
- Approximating the Void: Learning Stochastic Channel Models from Observation with Variational Generative Adversarial NetworksTimothy J. O'Shea, Tamoghna Roy, Nathan West. 681-686 [doi]
- Game Theoretic Based Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment and Unknown InterferenceMing Feng, Hao Xu. 687-691 [doi]
- BRACELET: Edge-Cloud Microservice Infrastructure for Aging Scientific InstrumentsPhuong Nguyen, Tarek Elgamal, Steven Konstanty, Todd Nicholson, Stuart Turner, Patrick Su, Klara Nahrstedt, Timothy Spila, Roy H. Campbell, John Dallesasse, Michael Chan, Kenton McHenry. 692-696 [doi]
- A Deep Learning-Based Weather Forecast System for Data Volume and Recency AnalysisJarrett Booz, Wei Yu 0002, Guobin Xu, David W. Griffith, Nada Golmie. 697-701 [doi]
- An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle PlatooningDapeng Wu 0002, Jiaxing Wu, Ruyan Wang. 702-707 [doi]
- WLAN Channel Measurement in Two Classrooms for LOS and NLOS CoverageRuonan Zhang, Qi Guo, Jiaxin Wang, Zhimeng Zhong, Chao Li. 708-713 [doi]
- Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of NepalBabu R. Dawadi, Danda B. Rawat, Shashidhar R. Joshi, Martina M. Keitsch. 714-718 [doi]
- Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart CampusJian Shen, Xinzhao Jiang, Dengzhi Liu, Tianqi Zhou. 719-723 [doi]
- Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss ModelsSyed Qasim Gilani, Syed Ali Hassan, Haris Pervaiz, Syed Hassan Ahmed. 724-728 [doi]
- Bidding-Based Dynamic Power Pricing Scheme in Smart GridsAndrew Ward, Zhengyuan Zhou, Nicholas Bambos. 729-734 [doi]
- Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance AnalysisNadir Adam, Cristiano Tapparello, Wendi B. Heinzelman. 735-740 [doi]
- RankRoute: Efficient Interest Forwarding Using Nodes RankingDongbiao He, Cédric Westphal, Jinlei Jiang, Guangwen Yang. 741-746 [doi]
- NP-completeness of Shortest Leaf-to-Leaf Distance in a TreeAvramovic Ivan, Richards Dana S. 747-752 [doi]
- DNS Diagnostics through the Eye of the BeholderCasey T. Deccio. 753-758 [doi]
- Flexible Evaluation Caching Using FATEJames Mathewson, J. J. Garcia-Luna-Aceves. 759-763 [doi]
- Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow NetworksMichal Rzepka, Piotr Borylo, Piotr A. Cholda, Artur Lason. 764-770 [doi]
- An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless NetworksBin Li, Hongxiang Li, Ruonan Zhang, Chunqiao Wei. 771-776 [doi]
- Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering ServerMichael Lujan, Michael Baum, Dayuan Chen, Ziliang Zong. 777-781 [doi]
- An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computingXiaobo Cai, Huihui Wang, Houbing Song, Yue Zhang, Ke Han, Zhiyong Cao. 782-786 [doi]
- Document Context-Aware Social Recommendation MethodGuangxia Xu, Lijie He, Mengxiao Hu. 787-791 [doi]
- Spatial Community Search Using PageRank VectorHaoran Mo, Jooyoung Lee. 792-796 [doi]
- An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the CloudYongxin Liu, Laurent L. Njilla, Jian Wang, Houbing Song. 797-801 [doi]
- Using Natural Language Constructs and Concepts to Aid Network ManagementAbhishek Dwaraki, Richard G. Freedman, Shlomo Zilberstein, Tilman Wolf. 802-808 [doi]
- A Delay-Based Congestion-Control Protocol for Information-Centric NetworksAbdulazaz Ali Albalawi, J. J. Garcia-Luna-Aceves. 809-815 [doi]
- Optimal Cache Allocation under Network-Wide Capacity ConstraintVan Sy Mai, Stratis Ioannidis, Davide Pesavento, Lotfi Benmohamed. 816-820 [doi]
- An empirical study of intelligent approaches to DDoS detection in large scale networksXiaoyu Liang, Taieb Znati. 821-827 [doi]
- Stateless Forwarding in ICN with Dynamic Non-Bloom FiltersAytac Azgin, Ravishankar Ravindran. 828-834 [doi]
- Multiple Path Infrastructure-less Networks A Cooperative ApproachRazvan Cristian Voicu, John A. Copeland, Yusun Chang. 835-841 [doi]
- On the Effectiveness of Standard Centrality Metrics for Interdependent NetworksNathaniel Hudson, Matthew Turner, Asare Nkansah, Hana Khamfroush. 842-846 [doi]
- Virtually the Same: Comparing Physical and Virtual TestbedsJonathan Crussell, Thomas M. Kroeger, Aaron Brown, Cynthia A. Phillips. 847-853 [doi]
- Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to SpareChadi Kari, Sixia Chen, Sepehr Amir-Mohammadian, Vivek K. Pallipuram. 854-858 [doi]
- Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization FrameworkKory Teague, Mohammad J. Abdel-Rahman, Allen B. MacKenzie. 859-863 [doi]
- Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap ChannelXiaoge Wu, Lin Zhang. 864-868 [doi]
- Blind Carrier Frequency Offset Estimation in Generalized Frequency Division MultiplexingAna Belen Martinez, Maximilian Matthe, Marwa Chafii, Gerhard P. Fettweis. 869-875 [doi]
- A Comprehensive Study of Low Frequency and High Frequency Channel CorrelationPablo Jiménez Mateo, Alejandro Blanco Pizarro, Norbert Ludant, Matteo Marugan Borelli, Amanda García-García, Adrian Loch, Zhenyu Shi, Yi Wang, Joerg Widmer. 876-882 [doi]
- Downlink Resource Allocation in Cell-Free Massive MIMO SystemsSusanna Mosleh, Hayder Almosa, Erik Perrins, Lingjia Liu. 883-887 [doi]
- Online Reconfigurable Antenna State Selection based on Thompson SamplingTianchi Zhao, Ming Li, Gregory Ditzler. 888-893 [doi]
- Experimental Evaluation of UL-NOMA System Employing Correlated Receive DiversityMasafumi Moriyama, Kenichi Takizawa, Masayuki Oodo, Hayato Tezuka, Fumihide Kojima. 894-899 [doi]
- A Decentralized Reputation Management System for Securing the Internet of VehiclesRichard Gilles Engoulou, Martine Bellaïche, Talal Halabi, Samuel Pierre. 900-904 [doi]
- A Robust Road Region of Interest Identification Scheme for Traffic-Video Data MiningAnes Madani, Suman Kumar, Linh Ba Nguyen, Jiling Zhong. 905-910 [doi]
- Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant NetworksKatherine Russell, Robert Simon. 911-917 [doi]
- FARES: Fast and Accurate Recognition of Exact Scenes on Mobile DevicesTengpeng Li, Xiaoqian Zhang, Teng Wang, Son Nam Nguyen, Xiaohui Liang, Bo Sheng. 918-922 [doi]
- Diffuse Scattering Models for mmWave V2X Communications in Urban ScenariosBogdan Antonescu, Miead Tehrani Moayyed, Stefano Basagni. 923-929 [doi]
- Busy-Tone Multiple Access with Collision Avoidance and Detection for Ad-Hoc NetworksJ. J. Garcia-Luna-Aceves. 930-935 [doi]
- Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink ChannelsRuonan Zhang, Haochen Xu, Bin Li, Zhimeng Zhong, Chao Li. 936-942 [doi]
- Joint Precoder and Combiner Design for MMSE Distributed Beamforming with Per-Antenna Power ConstraintsRiten Gupta, Han Yan, Danijela Cabric. 943-949 [doi]
- Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA)Tugba Erpek, Sennur Ulukus, Yalin E. Sagduyu. 950-954 [doi]
- Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPUBhargav Gokalgandhi, Christina Segerholm, Nilanjan Paul, Ivan Seskar. 955-959 [doi]
- Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSITXiuyu Du, Lihua Li, Zejian Li, Guangyan Lu. 960-964 [doi]
- Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain EnvironmentMing Feng, Hao Xu. 965-969 [doi]
- Optimizing Beams and Bits: A Novel Approach for Massive MIMO Base-Station DesignNarayan Prasad, Xiao-Feng Qi, Alan Gatherer. 970-976 [doi]
- Distributed Multi-Stream Beamforming in Multi-Relay Interference Networks with Multi-Antenna NodesCenk M. Yetis, Ronald Y. Chang. 977-982 [doi]
- VLSI Architectures for ORVD Trellis based MIMO DetectionSebastian Birke, Dominik Auras, Tobias Piwczyk, Robin Mahlke, Nikolas Alberti, Rainer Leupers, Gerd Ascheid. 983-989 [doi]
- Blind Channel Subspace Estimation for Massive MIMO with Hybrid BeamformingYi Jiang, Yimeng Feng. 990-994 [doi]
- Massive MISO IBC Reduced Order Zero Forcing Beamforming - a Multi-Antenna Stochastic Geometry PerspectiveChristo Kurisummoottil Thomas, Dirk T. M. Slock. 995-999 [doi]
- Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation DetectionPejman Ghasemzadeh, Subharthi Banerjee, Michael Hempel, Hamid Sharif. 1000-1004 [doi]
- Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope InspectionZejiang Shen, Xili Wan, Feng Ye, Xinjie Guan, Shuwen Liu. 1005-1010 [doi]
- A Web Application for the Remote Control of Multiple Unmanned Aerial VehiclesRiccardo Musmeci, Ken Goss, Simone Silvestri, Giuseppe Lo Re. 1011-1017 [doi]
- A Stochastic Process based Routing Algorithm for Wireless Ad Hoc NetworksHyunsun Lee, Yi Zhu, Donald Wapenski, Xi Wang 0001, Qiong Zhang, Paparao Palacharla, Tadashi Ikeuchi. 1018-1023 [doi]
- Array Antenna for Power Saving of Sensor Nodes in UAV-BS enabled WSNHendrik Lumbantoruan, Koichi Adachi. 1024-1028 [doi]
- Device-Free Activity Recognition Using Ultra-Wideband RadiosSarthak Sharma, Hessam Mohammadmoradi, Milad Heydariaan, Omprakash Gnawali. 1029-1033 [doi]
- Mission-Centric Content Sharing Across Heterogeneous NetworksTim Strayer, Ram Ramanathan, Daniel Coffin, Samuel C. Nelson, Michael Atighetchi, Aaron Adler, Stephane Blais, Bishal Thapa, William N. Tetteh, Vladimir Shurbanov, Karen Zita Haigh, Regina Hain, Colleen T. Rock, Emily H. Do, Armando Caro, Daniel Ellard, Michael Beckerle, Stephen Lawrence, Scott Loos. 1034-1038 [doi]
- Fragmented Data Routing Based on Exponentially Distributed Contacts in Delay Tolerant NetworksTuan Le, Qi Zhao, Mario Gerla. 1039-1043 [doi]