Abstract is missing.
- Post Quantum Communication Over the Internet InfrastructureShlomi Dolev. 1-3 [doi]
- Distributed Machine LearningBapi Chatterjee. 4-7 [doi]
- Efficient and Resilient Edge Computing: Algorithms, Techniques and Research OpportunitiesBalaji Palanisamy, Jinlai Xu. 8-11 [doi]
- Self-stabilizing Byzantine Multivalued Consensus: (extended abstract)Romaric Duvignau, Michel Raynal, Elad Michael Schiller. 12-21 [doi]
- A Further Study on Weak Byzantine Gathering of Mobile AgentsAshish Saxena, Kaushik Mondal 0001. 22-31 [doi]
- ASAP: Asynchronous Split Inference for Accelerated DNN ExecutionWaleed Hassan Mubark, Jagannath Guptha Kasula, Md. Yusuf Sarwar Uddin. 32-44 [doi]
- Halting the Solana Blockchain with Epsilon StakeJakub Sliwinski, Quentin Kniep, Roger Wattenhofer, Fabian Schaich. 45-54 [doi]
- Distributed Uniform Partitioning of a Region using Opaque ASYNC Luminous Mobile RobotsSubhajit Pramanick, Saswata Jana, Adri Bhattacharya, Partha Sarathi Mandal 0001. 55-64 [doi]
- Space and Move-optimal Arbitrary Pattern Formation on a Rectangular Grid by Robot SwarmsAvisek Sharma, Satakshi Ghosh, Pritam Goswami, Buddhadeb Sau. 65-73 [doi]
- Maximal Independent Set via Mobile AgentsDebasish Pattanayak, Subhash Bhagat, Sruti Gan Chaudhuri, Anisur Rahaman Molla. 74-83 [doi]
- Collision-Free Linear Time Mutual Visibility for Asynchronous Fat RobotsSubhash Bhagat, Paulomi Dey, Rajarshi Ray 0001. 84-93 [doi]
- Arbitrary Pattern Formation on a Continuous Circle by Oblivious Robot SwarmBrati Mondal, Pritam Goswami, Avisek Sharma, Buddhadeb Sau. 94-103 [doi]
- Parallel Algorithms for Equilevel PredicatesVijay K. Garg, Robert P. Streit. 104-113 [doi]
- Replay ClocksIshaan Lagwankar, Sandeep S. Kulkarni. 114-123 [doi]
- Sublinear Message Bounds of Authenticated Implicit Byzantine AgreementManish Kumar, Anisur Rahaman Molla. 124-133 [doi]
- Defending Hash Tables from Subterfuge with Depth ChargeTrisha Chakraborty, Jared Saia, Maxwell Young. 134-143 [doi]
- Correctness of Flow MigrationRadhika Sukapuram, Ranjan Patowary, Gautam Barua. 144-153 [doi]
- SMT-as-a-Service for Fog-Supported Cyber-Physical SystemsStefan Holzer, Pantelis A. Frangoudis, Christos Tsigkanos, Schahram Dustdar. 154-163 [doi]
- Mitigating IoT Botnet DDoS Attacks through MUD and eBPF based Traffic FilteringAngelo Feraudo, Diana Andreea Popescu, Poonam Yadav, Richard Mortier, Paolo Bellavista. 164-173 [doi]
- SmartGrid-NG: Blockchain Protocol for Secure Transaction Processing in Next Generation Smart GridLokendra Vishwakarma, Debasis Das 0001, Sajal K. Das 0001, Christian Becker 0001. 174-185 [doi]
- Tero: Offloading CDN Traffic to Massively Distributed DevicesJuan Vanerio, Lily Hügerich, Stefan Schmid 0001. 186-198 [doi]
- Renting Servers in the Cloud: Parameterized Analysis of FirstFitMahtab Masoori, Lata Narayanan, Denis Pankratov. 199-208 [doi]
- LightKey: Lightweight and Secure Key Agreement Protocol for Effective Communication in Internet of VehiclesHarsha Vasudev, Mohd Shariq, Sanjeev Kumar Dwivedi, Mauro Conti. 209-216 [doi]
- Performance evaluation of Private and Public Blockchains for multi-cloud service federationAdam Zahir, Milan Groshev, Kiril Antevski, Carlos J. Bernardos, Constantine Ayimba, Antonio de la Oliva. 217-221 [doi]
- Application and Energy-Aware Data Aggregation using Vector Synchronization in Distributed Battery-less IoT NetworksChetna Singhal 0001, Subhrajit Barick, Rishabh Sonkar. 222-231 [doi]
- A Network Segmentation Architecture for Flow Aggregation and DDoS Mitigation in SDN Using RAPID Flow RulesHimanshu, Kaushik Saha, Payali Das, Swades De. 232-241 [doi]
- Re-Max: A Reward Maximization Approach for Heterogeneous Drone Scheduling ProblemSatyajit Mohapatra, Sanjeet Kumar Nayak. 242-243 [doi]
- Optimal Localization Prediction Using Red Vulture Arrival Approach in Underwater Sensor NetworksKamal Kumar Gola, Shikha Arya. 244-245 [doi]
- Real-Time Air Quality Predictions for Smart Cities using TinyMLArko Datta, Aniruddha Pal, Ranbir Marandi, Nilanjan Chattaraj, Subrata Nandi, Sujoy Saha. 246-247 [doi]
- Security Framework for Non-public 5G Network DeploymentsArpit Tripathi. 248-249 [doi]
- Enhancing Connectivity in UAV-Assisted Cellular Networks: A Dynamic Approach to User Association and Resource AllocationKanhu Charan Gouda, Rahul Thakur. 250-251 [doi]
- Distributed Graph Computations via Mobile RobotsPrabhat Kumar Chand, Anisur Rahaman Molla. 252-253 [doi]
- Resource Allocation Optimization in Local and Wide Area Networks through Social Network IntegrationSangya Shrivastava, Rahul Thakur. 254-255 [doi]
- Improving Throughput and Fault Tolerance of Blockchain NodesManaswini Piduguralla, Souvik Sarkar, Sathya Peri. 256-257 [doi]
- Concurrent Lock-Free Dynamic Graphs with wait-free snapshots using versioningGaurav Bhardwaj, Ayaz Ahmed, Sathya Peri. 258-259 [doi]
- Gathering and Arbitrary Pattern Formation by Asynchronous Robot SwarmSatakshi Ghosh, Avisek Sharma, Pritam Goswami, Buddhadeb Sau. 260-261 [doi]
- Edge Supported QoS based Secure Data Communication mechanism for Software Defined Vehicular NetworksDeepanshu Garg, Rasmeet Singh Bali. 262-267 [doi]
- SAHA: An SDN Enabled Fog Architecture for Healthcare ApplicationsJoy Lal Sarkar, Sheng-Lung Peng, Subhrajyoti Deb, Muthaiah U, Ayan Mondal, Gaddam Venu Gopal. 268-273 [doi]
- A Cooperative Game Approach for Multi-lane Merging Decision-making Algorithm for CAVsAnjum Mohd Aslam, Aditya Bhardwaj, Rajat Chaudhary, Ishan Budhiraja. 274-279 [doi]
- Intelligent Resource Orchestration for Task Distribution in Hybrid Vehicular NetworksShilpi Mittal, Rasmeet Singh Bali. 280-285 [doi]
- Workload Prediction for Edge ComputingKavish Shah, Ayush Gandhi, Kalgi Gandhi, Minal Bhise. 286-291 [doi]
- Information Diversity based Detection for ON-OFF Low Strength DDoS Attacks in Smart Home IoTJoseph Okonofua, Richard T. Meyer, Shameek Bhattacharjee. 292-297 [doi]
- A Cost-effective Framework for Privacy Preserving Federated LearningRojalini Tripathy, Padmalochan Bera. 298-303 [doi]
- Efficient Air Quality Index Prediction on Resource-Constrained Devices using TinyML: Design, Implementation, and EvaluationArko Datta, Aniruddha Pal, Ranbir Marandi, Nilanjan Chattaraj, Subrata Nandi, Sujoy Saha. 304-309 [doi]
- Fed-Avis: A Lightweight Federated Learning Assisted Anti-Vehicle Infiltration SystemDewesh Agrawal, Gurpreet Singh, Harinderjit Singh, Kulvir Singh, Prianshu Jha, Yashwant Singh Patel. 310-315 [doi]
- OEAD: An Online Ensemble-based Anomaly Detection technique for RPL networkSumitra Budania, Meetha V. Shenoy. 316-321 [doi]
- ATT-LSTM: An Interpretable Deep Learning Framework for COVID Outbreak PredictionNeeraj Choudhary, Jimson Mathew, Ranjan Kumar Behera, Zenin Easa Panthakkalakath. 322-327 [doi]
- Context-aware Community Detection in the Russia-Ukraine Conflict NetworkAmartya Chakraborty, Deepamoy Pal, Nandini Mukherjee. 328-333 [doi]
- K Circle Formation by Swarm Robots on a GridMoumita Mondal, Subodh Singh, Sruti Gan Chaudhuri. 334-339 [doi]
- Blockchain and Fog Access Point Integrated Healthcare System for Contact Tracing and Infection Probability EvaluationMoirangthem Biken Singh, Suraj Mahawar, Himanshu Singh, Shilpi Kumari, Ajay Pratap. 340-345 [doi]
- Fog-Assisted Dynamic IoT Device Access Management Using Attribute-Based EncryptionKasturi Routray, Padmalochan Bera. 346-352 [doi]
- Scalable Real-Time Control in Industrial Cyber-Physical SystemsMd Ashikul Haque, Dali Ismail, Abusayeed Saifullah. 353-358 [doi]
- SynFloWatch: A Detection System against TCP-SYN based DDoS Attacks using Entropy in Hybrid SDNMitali Sinha. 359-364 [doi]
- NVM-Enhanced MLI Placement for Revenue Maximization in UAV-Fog Assisted MEC with Stable MatchingAbhishek Kumar, Shilpi Kumari, Ajay Pratap, Sunil Kumar 0002. 365-370 [doi]
- SDN Defense: Detection and mitigation of DDoS attack via IoT NetworkK. Rajkumar, Mercy Shalinie Selvaraj, Hamil Stanly. 371-376 [doi]
- A Hybrid Federated Learning for Medical Cyber Physical SystemsRojalini Tripathy. 377-381 [doi]
- A Wireless System to Track Communicable Disease OutbreaksDali Ismail, Abusayeed Saifullah. 382-387 [doi]
- Splitfed-based Patient Severity Prediction and Utility Maximization in Industrial Healthcare 4.0Himanshu Singh, Biken Moirangthem, Ajay Pratap, Shilpi Kumari, Abhishek Kumar, Sajal K. Das 0001. 388-393 [doi]
- Integration of ROS and Gazebo Platform using MAVLINK Protocol for Real-Time UAV ApplicationsAshutosh Kumar Jha, Vidyuth Sridhar, Victor Azad, Ram Narayan Yadav, Jagat Rath. 394-399 [doi]
- Dispersion, Capacitated Nodes, and the Power of a Trusted ShepherdWilliam K. Moses Jr., Amanda Redlich. 400-405 [doi]
- Binary Pattern Classification with Cellular Automata-based AlgorithmsKhitish Kumar Gadnayak, Himanshu Khaitan, Mousumi Saha. 406-411 [doi]
- Surveying Quantum-Proof Blockchain Security: The Era of Exotic SignaturesRahat Naz, Anuj Kumar. 412-417 [doi]
- Performance Analysis of Tweet Summarization Techniques Considering Crisis DynamicsShrikant Manikarao Mahindrakar, Tamal Mondal, Amol Dhakne, Shirshendu Arosh, Indrajit Bhattacharya. 418-423 [doi]