Abstract is missing.
- Efficiency vs. Accuracy of Aerial Base Station PlacementOleksandr Andryeyev, Andreas Mitschele-Thiel. 1-8 [doi]
- Bidirectional Network Coding in Wireless NetworksStephan M. Günther, Maurice Leclaire, Maximilian Riemensberger, Georg Carle, Wolfgang Utschick. 1-4 [doi]
- Energy-Efficient Adaptation Logic for HTTP Streaming in Mobile NetworksChristian Moldovan, Florian Wamser, Tobias Hoßfeld. 1-8 [doi]
- GPU Accelerated Planning and Placement of Edge CloudsPatrick Kalmbach, Andreas Blenk, Wolfgang Kellerer, Rastin Pries, Michael Jarschel, Marco Hoffmann. 1-3 [doi]
- A Simulation of Asynchronous Traffic Shapers in Switched Ethernet NetworksAlexej Grigorjew, Florian Metzger, Tobias Hoßfeld, Johannes Specht. 1-6 [doi]
- Enabling Multi-Tenant Networks for the Automation IndustryReinhard Frank, Matthias Scheffel, Florian Zeiger, Hans-Peter Huth. 1-6 [doi]
- Satellite Internet Performance MeasurementsJörg Deutschmann, Kai-Steffen Jens Hielscher, Reinhard German. 1-4 [doi]
- NeSTiNg: Simulating IEEE Time-sensitive Networking (TSN) in OMNeT++Jonathan Falk, David Hellmanns, Ben W. Carabelli, Naresh Ganesh Nayak, Frank Dürr, Stephan Kehrer, Kurt Rothermel. 1-8 [doi]
- Understanding the Impact of Message Prioritization in Post-Disaster Ad Hoc NetworksPatrick Lieser, Nils Richerzhagen, Simon Luser, Björn Richerzhagen, Ralf Steinmetz. 1-8 [doi]
- Toward scalable and virtualized massive wireless sensor networksPatrick Engelhard, Arne Zachlod, Julius Schulz-Zander, Song Du. 1-6 [doi]
- Decentralized Collaborative Flow Monitoring in Distributed SDN Control-PlanesRhaban Hark, Khalil Tounsi, Amr Rizk, Ralf Steinmetz. 1-8 [doi]
- Automated Processing of Security Requirements and Controls for a common Industrie 4.0 Use CaseMarco Ehrlich, Martin Gergeleit, Kostyantyn Simkin, Henning Trsek. 1-6 [doi]
- AVAIN - a Framework for Automated Vulnerability Indication for the IoT in IP-based NetworksRolf Egert, Tim Grube, Dustin Born, Max Mühlhäuser. 1-3 [doi]
- The Impact of Cache Partitioning on Software-Based Packet ProcessingNorbert Schramm, Torsten M. Runge, Bernd E. Wolfinger. 1-6 [doi]
- Link 'em: An Open Source Link Emulation Bridge for Reproducible Networking ResearchBertram Schütz, Stefanie Thieme, Nils Aschenbruck, Leonhard Brüggemann, Alexander Ditt, Dominic Laniewski, Dennis Rieke. 1-3 [doi]
- Performance Perspective on Private Distributed Ledger Technologies for Industrial NetworksFabien Geyer, Holger Kinkelin, Hendrik Leppelsack, Stefan Liebald, Dominik Scholz, Georg Carle, Dominic Schupke. 1-8 [doi]
- Challenges and Solutions for Industry-Grade Secure ConnectivityHarald Klaus, Felicitas Hetzelt, Peter Hofmann, Andreas Blecker, Daniela Schwaiger. 1-5 [doi]
- Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined NetworksTrung V. Phan, Mehrdad Hajizadeh, Nguyen Tuan Khai, Thomas Bauschert. 1-6 [doi]
- Pedestrians Trajectory Prediction in Urban EnvironmentsMostafa Karimzadeh, Florian Gerber, Zhongliang Zhao, Torsten Braun. 1-8 [doi]
- Secure Real-time Communication and Computing Infrastructure for Industry 4.0 - Challenges and OpportunitiesErich Zielinski, Julius Schulz-Zander, Marc Zimmermann, Christian Schellenberger, Alejandro Ramirez, Florian Zeiger, Mathias Mormul, Felicitas Hetzelt, Felix Beierle, Harald Klaus, Hanspeter Ruckstuhl, Alexander Artemenko. 1-6 [doi]
- Coupling VNF Orchestration and SDN Virtual Network ReconfigurationNemanja Deric, Amir Varasteh, Arsany Basta, Andreas Blenk, Rastin Pries, Michael Jarschel, Wolfgang Kellerer. 1-3 [doi]
- An Energy-aware IoT Node for Sustainable Urban SensingMichel Rottleuthner, Thomas C. Schmidt, Matthias Wählisch. 1-3 [doi]
- An Enhanced Approach to Cloud-based Privacy-preserving BenchmarkingKilian Becher, Martin Beck, Thorsten Strufe. 1-8 [doi]
- A Model-based Time-to-Compromise Estimator to Assess the Security Posture of Vulnerable NetworksAli Alshawish, Korbinian Spielvogel, Hermann de Meer. 1-3 [doi]
- KOMon - Kernel-based Online Monitoring of VNF Packet Processing TimesStefan Geissler, Stanislav Lange, Florian Wamser, Thomas Zinner, Tobias Hoßfeld. 1-8 [doi]
- Softwarized Adaptive Control of Network Monitoring SystemsJochen Kögel, Sebastian Meier. 1-6 [doi]
- Application Threat Modeling and Automated VNF Selection for Mitigation using TOSCAKaroline Saatkamp, Christoph Krieger, Frank Leymann, Julian Sudendorf, Michael Wurster. 1-6 [doi]
- Enforcing Multilevel Security Policies in Database-Defined Networks using Row-Level SecurityAli Al-Haj, Benjamin Aziz. 1-6 [doi]
- Information-Centric IoT Middleware Overlay: VSLMarc-Oliver Pahl, Stefan Liebald. 1-8 [doi]
- Investigation of Uninterrupted Service Live Migration Using Software-Defined NetworkingKeerthana Govindaraj, Mamia Saha, Alexander Artemenko, Andreas Kirstädter. 1-6 [doi]
- VSL: A Data-Centric Internet of Things OverlayMarc-Oliver Pahl, Stefan Liebald, Christian Lübben. 1-3 [doi]