Abstract is missing.
- A Cognitive Resource Aware Orchestration of Network Services for 5G and beyondShameem Raj Nadaf, Sai Bhavadeesh Yarlagadda, Hemant Kumar Rath, Garima Mishra. 1-10 [doi]
- Multi-Stream TSN Gate Control Scheduling in the Presence of Clock SynchronizationAviroop Ghosh, Saleh Yousefi, Thomas Kunz. 11-20 [doi]
- On-demand Multi-Node Partial Charging Scheme using Multiple Wireless Charging Vehicles in WRSNRohit Kumar 0004, Joy Chandra Mukherjee. 21-30 [doi]
- LitE: Load Balanced Virtual Data Center Embedding for Energy Efficiency in Data CentersPreetham N, Sourav Kanti Addya, Keerthan Kumar T. G., Saumya Hegde. 31-35 [doi]
- Renting Servers for Multi-Parameter Jobs in the CloudYaqiao Li, Mahtab Masoori, Lata Narayanan, Denis Pankratov. 36-45 [doi]
- SMEVCA: Stable Matching-based EV Charging Assignment in Subscription-Based ModelsArindam Khanda, Anurag Satpathy, Anusha Vangala, Sajal K. Das 0001. 46-55 [doi]
- Jamming-Resilient Channel Hopping for WirelessHART NetworksElisabeth Permatasari, Abusayeed Saifullah, Haibo Zhang 0001. 56-65 [doi]
- Advanced Method for Flow Frequency Estimation and Top-k Heavy Hitters Detection in SDN Leveraging Programmable SwitchAli Nadim Alhaj, Wilson Naik Bhukya, Rajendra Prasad Lal. 66-72 [doi]
- PDPTW-DB: MILP-Based Offline Route Planning for PDPTW with Driver BreaksAgrima Khanna, Fangqi Liu, Samir Gupta, Sophie Pavia, Ayan Mukhopadhyay, Abhishek Dubey. 73-83 [doi]
- Mixing Entanglement Swapping and Hop-by-Hop Transmission On Heterogeneous Quantum NetworksAnoop Kumar Pandey, Bheemarjuna Reddy Tamma, M. V. Panduranga Rao. 84-93 [doi]
- Transformer-based GAN-augmented Defender for Adversarial USB Keystroke Injection AttacksAnil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti. 94-103 [doi]
- Federated Learning-enabled Network Incident Anomaly Detection Optimization for Drone SwarmsKevin Kostage, Rohan Adepu, Jenaya Monroe, Trevontae Haughton, Juan Mogollon, Saketh Poduvu, Kannappan Palaniappan, Chengyi Qu, Prasad Calyam, Reshmi Mitra. 104-114 [doi]
- Deterministic Collision-Free Exploration of Unknown Anonymous GraphsSubhash Bhagat, Andrzej Pelc. 115-124 [doi]
- Distributed Computation of Skyline Probability over Uncertain PreferencesEaswar Kilari, Sriram Kailasam. 125-133 [doi]
- Distributed Small Cuts using SemigroupsJohn Augustine, Mohit Daga. 134-143 [doi]
- Faster Set Cover in the MPC ModelHongyan Ji, Shreyas Pai, Sriram V. Pemmaraju, Joshua Z. Sobel. 144-151 [doi]
- Fast Deterministic Massively Parallel Ruling Sets AlgorithmsHongyan Ji, Kishore Kothapalli, Sriram V. Pemmaraju, Ajitanshu Singh. 152-160 [doi]
- Collision-free Exploration by Mobile Agents Using PebblesSajal K. Das 0001, Amit Kumar Dhar, Barun Gorain, Madhuri Mahawar. 161-170 [doi]
- Path Connected Dynamic Graphs with a Study of Efficient DispersionAshish Saxena, Kaushik Mondal 0001. 171-180 [doi]
- User-based I/O Profiling for Leadership Scale HPC WorkloadsAhmad Hossein Yazdani, Arnab K. Paul, Ahmad Maroof Karimi, Feiyi Wang, Ali Raza Butt. 181-190 [doi]
- Perfectly Secure Message Transmission Tolerating Omission Faults - Possibility Feasibility, and OptimalityRavi Kishore. 191-200 [doi]
- Byzantine-Tolerant Privacy-Preserving Atomic RegisterVincent Kowalski, Achour Mostéfaoui, Matthieu Perrin, Sinchan Sengupta. 201-210 [doi]
- Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication ApproachKalash, Bishakh Chandra Ghosh, Sourav Kanti Addya. 211-220 [doi]
- Black Hole Search in Dynamic GraphsTanvir Kaur, Ashish Saxena, Partha Sarathi Mandal 0001, Kaushik Mondal 0001. 221-230 [doi]
- Computational Power of Mobile Robots: Discrete VersionAvisek Sharma, Pritam Goswami, Buddhadeb Sau. 231-238 [doi]
- On Constructing a Byzantine Linearizable SWMR Atomic Register from SWSR Atomic RegistersAjay D. Kshemkalyani, Manaswini Piduguralla, Sathya Peri, Anshuman Misra. 239-243 [doi]
- Fair and Representative Jury Selection for Decentralized JusticeBhargavi Sriram, John Augustine. 244-248 [doi]
- Rectangle Enclosed Triangular Grid Exploration with Myopic Luminous RobotsRaja Das, Pritam Goswami, Brati Mondal, Buddhadeb Sau. 249-253 [doi]
- Optimal Fault-Tolerant Dispersion on Oriented GridsRik Banerjee, Manish Kumar, Anisur Rahaman Molla. 254-258 [doi]
- k-Dispersion on Dynamic RingBrati Mondal, Pritam Goswami, Buddhadeb Sau. 259-263 [doi]
- Exploration of Infinite Triangular Grid by Myopic Robots without ChiralityRaja Das, Buddhadeb Sau. 264-268 [doi]
- Dispersion on Time Varying GraphsAshish Saxena, Tanvir Kaur, Kaushik Mondal 0001. 269-273 [doi]
- Quantitative characterization of consistency violating faults at individual distributed computing processesAmit Garu, Arya Tanmay Gupta, Duong Ngoc Nguyen, Sandeep S. Kulkarni. 274-275 [doi]
- Adaptive Workload Management for Enhanced Function Performance in Serverless ComputingPriyanka Ashok Birajdar, Harsha V, Anurag Satpathy, Sourav Kanti Addya. 276-277 [doi]
- PhishURLDetect: A parameter efficient fine-tuning of LLMs using LoRA for detection of phishing URLsIrshad Ali, Basant Subba. 278-279 [doi]
- Distributing Context-Aware Shared Memory Data Structures: A Case Study on Singly-Linked ListsRaaghav Ravishankar, Sandeep S. Kulkarni, Sathya Peri, Gokarna Sharma. 280-281 [doi]
- A Committee Based Optimal Asynchronous Byzantine Agreement Protocol W.P. 1Nasit S. Sony, Xianzhong Ding. 282-283 [doi]
- Postprandial Blood Glucose Level Prediction through combined Machine Learning, Meta-Learning and XAIAruna Devi B, Karthik N. 284-286 [doi]
- MIS Filling and Mutual Visibility with Luminous Robot SwarmSubhajit Pramanick, Partha Sarathi Mandal 0001. 287-288 [doi]
- Algebraic Signature based Trusted Execution Environment for Remote ComputationArnab Majumder, Shahnaz Warsi, Junaid Alam, Soumyadev Maity. 289-294 [doi]
- Topological Analysis of Dermatoglyphic Patterns using Synthetic and Real DataPrasad D. Devkar, Nalini Ajwani, Sudarshan Malla, Aasttha Bhatt, Mahiman Dave, Neha Sharma, Mrityunjoy Panday, Chittaranjan S. Yajnik. 295-301 [doi]
- Federated Learning for Privacy Preserving Intelligent Healthcare Application to Breast Cancer DetectionAmritanjali, Ragav Gupta. 302-306 [doi]
- On Underground Mine Communication SystemsSaikat Chandra Bakshi, Gopal Chandra Roy, Eravelli Saicharan, E. Parvathi. 307-312 [doi]
- Comprehensive Analysis of Air Quality Trends in India Using Machine Learning and Deep Learning ModelsIsha Ganguli, Meet Nakum, Bhashwatee Das, Nancy Kshetrimayum. 313-318 [doi]
- Decentralized Ridesharing: Overcoming Scalability Issues with Layer 2 SolutionAqsa Ashraf Makhdomi, Iqra Altaf Gillani. 319-324 [doi]
- Advancing Carbon-Efficient Software Development: A Sustainable Path ForwardSagar Gupta, Aman Gupta. 325-330 [doi]
- Towards Zero Trust Security in SDN: A Multi-Layered Defense StrategyJay Barach. 331-339 [doi]
- Scams and Frauds in the Digital Age: ML-Based Detection and Prevention StrategiesSai Venkata Jaswant Kolupuri, Ananya Paul, Rajat Subhra Bhowmick, Isha Ganguli. 340-345 [doi]
- SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDNMitali Sinha, Padmalochan Bera, Manoranjan Satpathy. 346-351 [doi]
- On IoT based Underground Mine Environment Monitoring SystemsSaikat Chandra Bakshi, Ankita Pramanik, Gopal Chandra Roy, Eravelli Saicharan. 352-357 [doi]
- Grouping nodes based PBFT for Preventing Fake Educational Certificates VerificationAmritesh Kumar, Nitin Bhatia, Debasis Das 0001. 358-363 [doi]
- A Scalable Framework for Multi-cloud IoT Data SynchronizationArnab Mallick, Rajesh P. Barnwal. 364-369 [doi]
- Non-Fungible Tokens (NFTs): A Systematic Study of Trust CriteriaRangin Lahiri, Saikat Chakrabarti 0006, Subrata Saha. 370-376 [doi]
- Faster Convergence of Adaptive Data Rate in Dynamic LoRa-based IoT Network ApplicationsAlekhya Gorrela, Nikumani Choudhury. 377-382 [doi]
- Optimizing Autonomous Intersection Control Using Single Agent Reinforcement LearningYash Ganar, Vinay Kumar, Shraddha Dulera, Ram Narayan Yadav. 383-389 [doi]
- Secure and Expressive Authorized Keyword Search in Cloud-Assisted Cyber-Physical SystemsKasturi Routray, Padmalochan Bera. 390-395 [doi]
- RoadEye: A Framework For Detecting Traffic Rule ViolationsAnkit Dixit, Ravi Bhandari, Pallab Maji. 396-401 [doi]
- NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation StrategyPrianshu Jha, Gurpreet Singh, Amit Kumar, Dewesh Agrawal, Yashwant Singh Patel, Javad Forough. 402-407 [doi]
- Automated Identification of Traffic Accidents in Images and Videos Employing Advanced Deep Learning MethodsBabli Kumari, Renu Dhir, Siddhartha Chatterjee, Suchi Jain. 408-413 [doi]
- Unmanned Aerial Vehicle (UAV) Based Disaster Detection and Crowd Sensing Using Deep Learning ModelsPushpak Shukla, Shailendra Shukla. 414-419 [doi]
- Detecting Adversarial Samples using Kernel Density Feature Extractor in Medical ImageSuman Das, Pankaj Kumar Keserwani, Mahesh Chandra Govil. 420-425 [doi]
- O-RIDE: Open-RAN Innovation and Deployments ExplorationKoteswararao Kondepu, Bheemarjuna Reddy Tamma, Venkateswarlu Gudepu. 426-429 [doi]
- Concurrent and Learned Data StructuresBapi Chatterjee, Sathya Peri. 430-434 [doi]