Abstract is missing.
- On the interplay between scheduling interval and beamwidth selection for low-latency and reliable V2V mmWave communicationsCristina Perfecto, Javier Del Ser, Mehdi Bennis. 1-8 [doi]
- Techno-economic analysis and prediction for the deployment of 5G mobile networkSmail Ghoul, Weijia Jia. 9-16 [doi]
- Sub-channel assignment and resource scheduling for non-orthogonal multiple access (NOMA) in downlink coordinated multi-point systemsRupesh Singh. 17-22 [doi]
- Feasibility, architecture and cost considerations of using TVWS for rural Internet access in 5GMohsin Khalil, Junaid Qadir, Oluwakayode Onireti, Muhammad Ali Imran, Shahzad Younis. 23-30 [doi]
- Dynamic overlay multicasting for deadline-driven requests provisioning in elastic optical networksWojciech Kmiecik, Krzysztof Walkowiak. 31-35 [doi]
- Bare-metal, virtual machines and containers in OpenStackCharalampos Gavriil Kominos, Nicolas Seyvet, Konstantinos Vandikas. 36-43 [doi]
- Beekup: A distributed and safe P2P storage framework for IoE applicationsFederico Rizzo, Giovanni Luca Spoto, Paolo Brizzi, Dario Bonino, Giuseppe Di Bella, Pino Castrogiovanni. 44-51 [doi]
- Achieving the autonomic adaptation of resources in virtualized network environmentsPedro Martinez-Julia, Ved P. Kafle, Hiroaki Harai. 52-59 [doi]
- Analysis of virtual resource allocation for cloud-RAN based systemsValentin Rakovic, Aleksandar Ichkov, Nina Grosheva, Vladimir Atanasovski, Liljana Gavrilovska. 60-64 [doi]
- Performance modeling of cloud apps using message queueing as a service (MaaS)Khaled Salah, Tarek Rahil Sheltami. 65-71 [doi]
- A scalable routing mechanism for stateful microservicesNam H. Do, Tien Van Do, Xuan Thi Tran, Lóránt Farkas, Csaba Rotter. 72-78 [doi]
- Providing for privacy in a network infrastructure protection contextIan Oliver, Silke Holtmanns. 79-86 [doi]
- Incorporating trust in NFV: Addressing the challengesSowmya Ravidas, Shankar Lal, Ian Oliver, Leo Hippelainen. 87-91 [doi]
- Scalable and cost-efficient algorithms for VNF chaining and placement problemSelma Khebbache, Makhlouf Hadji, Djamal Zeghlache. 92-99 [doi]
- Cloud-based moving object detection for mobile devicesRuoqiao Li, Xi Xie, Pu Wang, Cong Jin. 100-102 [doi]
- Towards automated IoT service recommendationLudovic Noirie, Michel Le Pallec, Nesrine Ammar. 103-106 [doi]
- SDN & NFV in 5G: Advancements and challengesChristos Bouras, Anastasia Kollia, Andreas Papazois. 107-111 [doi]
- Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management"Mojtaba Alizadeh, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani, Akram M. Zeki, Shehzad Ashraf Chaudhry, Muhammad Khurram Khan. 112-116 [doi]
- Usable authentication systems for real time web-based audio/video communicationsHassan Bostani, Jean-Charles Grégoire. 117-121 [doi]
- Stochastic modelling and analysis of cloud computing data centerSaid El Kafhali, Khaled Salah. 122-126 [doi]
- Forecasting and anticipating SLO breaches in programmable networksJaafar Bendriss, Imen Grida Ben Yahia, Djamal Zeghlache. 127-134 [doi]
- Designing and deploying a bioinformatics software-defined network exchange (SDX): Architecture, services, capabilities, and foundation technologiesJoe Mambretti, Jim Hao Chen, Fei Yeh, Robert L. Grossman, Piers Nash, Alison Heath, Renuka Arya, Stuti Agrawal, Zhenyu Zhang. 135-142 [doi]
- Demonstration of Segment Routing with SDN based label stack optimizationOlivier Dugeon, Rabah Guedrez, Samer Lahoud, Géraldine Texier. 143-145 [doi]
- Internet of Things: An end-to-end security layerReinhard Behrens, Ali Ahmed. 146-149 [doi]
- On prediction of resource consumption of service requests in cloud environmentsFariborz Derakhshan, Horst Roessler, Peter Schefczik, Sabine Randriamasy. 169-176 [doi]
- Sensor observation streams within cloud-based IoT platforms: Challenges and directionsAntoine Auger, Ernesto Exposito, Emmanuel Lochin. 177-184 [doi]
- Performance comparison between container-based and VM-based servicesTasneem Salah, Mohamed Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi. 185-190 [doi]
- A security controller-based software defined security architectureXiaofeng Qiu, Fangyuan Cheng, Weijia Wang, Gang Zhang, Yangjun Qiu. 191-195 [doi]
- Independently Verifiable Identity Scheme (IVIS)Rebecca Copeland, Michael Copeland. 196-198 [doi]
- SDN enabled resiliency in LTE assisted small cell mmWave backhaul networksJonathan Vestin, Andreas Kassler. 199-202 [doi]
- A VNF-as-a-service design through micro-services disassembling the IMSAmina Boubendir, Emmanuel Bertin, Noëmie Simoni. 203-210 [doi]
- An extended SNMP based IoT context-aware model for dynamic adaptability of embedded systems softwareCamille Jaggernauth, Douglas Gubbe. 211-213 [doi]
- Telecom strategies for service discovery in microservice environmentsCsaba Rotter, Janos Illes, Gabor Nyiri, Lóránt Farkas, Gergely Csatari, Gergo Huszty. 214-218 [doi]
- NFV enabling network slicing for 5GBruno Chatras, Steve Tsang Kwong U, Nicolas Bihannic. 219-225 [doi]
- Communication portals: Immersive communication for everyday lifeSirisilp Kongsilp, Matthew N. Dailey. 226-228 [doi]
- MiniNAM: A network animator for visualizing real-time packet flows in MininetAhmed Khalid, Jason J. Quinlan, Cormac J. Sreenan. 229-231 [doi]
- A SIoT-aware approach to the resource management issue in mobile crowdsensingLuigi Atzori, Roberto Girau, Salvatore Martis, Virginia Pilloni, Marco Uras. 232-237 [doi]
- Stimulus-based sandbox for learning resource dependencies in virtualized distributed applicationsArmen Aghasaryan, Makram Bouzid, Dimitre Kostadinov. 238-245 [doi]
- CogNitive 5G networks: Comprehensive operator use cases with machine learning for management operationsImen Grida Ben Yahia, Jaafar Bendriss, Alassane Samba, Philippe Dooze. 252-259 [doi]
- Concealed regression for aggregation in low power wireless networksAndrey Tolstikhin, Zeljko Zilic. 260-267 [doi]
- Traffic management in LTE-WiFi slicing networksAli Saeed Dayem Alfoudi, Mohammed Dighriri, Gyu Myoung Lee, Rubem Pereira, Fung Po Tso. 268-273 [doi]
- Mediation-based communicationsJean-Charles Grégoire. 274-278 [doi]
- Gavel: Software-defined network control with graph databasesOsamah L. Barakat, David Koll, Xiaoming Fu 0001. 279-286 [doi]
- Describing the Internet of Things with an ontology: The SusCity project case studyDavid Perez Abreu, Karima Velasquez, Alexandre Miguel Pinto, Marília Curado, Edmundo Monteiro. 294-299 [doi]
- A persuasive real-time carpooling service in a smart city: A case-study to measure the advantages in urban areaMatteo Mallus, Giuseppe Colistra, Luigi Atzori, Maurizio Murroni, Virginia Pilloni. 300-307 [doi]
- Neo-NSH: Towards scalable and efficient dynamic service function chaining of elastic network functionsSameer G. Kulkarni, Mayutan Arumaithurai, K. K. Ramakrishnan, Xiaoming Fu 0001. 308-312 [doi]
- Ontology-based model for trusted critical site supervision in FUSE-ITShohreh Ahvar, Gabriel Santos, Nouredine Tamani, Bernard Istasse, Isabel Praça, Paul-Emmanuel Brun, Yacine Ghamri-Doudane, Noël Crespi. 313-315 [doi]
- Tell me again, why should i talk to strangers?Jean-Charles Grégoire, Song Nhi Nguyen. 316-318 [doi]
- Privacy, consent and authorization in IoTCigdem Sengul. 319-321 [doi]
- A model to enable application-scoped access control as a service for IoT using OAuth 2.0Federico Fernandez, Álvaro Alonso, Lourdes Marco, Joaquín Salvachúa. 322-324 [doi]
- Trustworthiness management in the IoT: The importance of the feedbackMichele Nitti, Roberto Girau, Luigi Atzori, Virginia Pilloni. 325-327 [doi]
- Access control in IoT: From requirements to a candidate visionDina Hussein, Emmanuel Bertin, Vincent Frey. 328-330 [doi]
- A comparison of IoT application layer protocols through a smart parking implementationParidhika Kayal, Harry G. Perros. 331-336 [doi]
- Calibration-free wireless indoor localization (CAFLOC)Lei Miao. 337-342 [doi]
- Effective data collection scheme for real-spatial group communication among mobile nodesHitomi Fuji, Kazuya Tsukamoto, Akira Nagata, Katsuichi Nakamura. 343-348 [doi]
- An infrastructure-based interpolation and propagation approach for IoT data analyticsDaniel Kümper, Ralf Tönjes, Elke Pulvermüller. 349-354 [doi]
- A public transportation journey planner enabled by IoT data analyticsDan Puiu, Stefan Bischof, Bogdan Serbanescu, Septimiu Nechifor, Josiane Xavier Parreira, Herwig Schreiner. 355-359 [doi]
- Automatic configuration of smart city applications for user-centric decision supportThu-Le Pham, Stefano Germano, Alessandra Mileo, Daniel Kümper, Muhammad Intizar Ali. 360-365 [doi]