Abstract is missing.
- Sea of Lights: Practical Device-to-Device Security Bootstrapping in the DarkFlor Álvarez, Max Kolhagen, Matthias Hollick. 124-132 [doi]
- Improving Wireless Network Performance under MPTCP based Multipath AccessKang Chen, Xin-xing, Mijanur Rahaman Palash, Jianwei Liu, James J. Martin. 133-141 [doi]
- Learning-based Adaptive Data Placement for Low Latency in Data Center NetworksKaiyang Liu, Jingrong Wang, Zhuofan Liao, Boyang Yu, Jianping Pan 0001. 142-149 [doi]
- Collaborative Decentralized Resource Reservation for Emergency Communication NetworksPatrick Lieser, Nils Richerzhagen, Tim Feuerbach, Tobias Meuser, Björn Richerzhagen, Ralf Steinmetz. 150-158 [doi]
- A Novel AID Shuffle Mechanism for RAW Slot Assignment in IEEE 802.11ah NetworksXin Zhang, Kwan L. Yeung. 159-166 [doi]
- Joint Routing and Wireless Resource Allocation in Multihop LTE-D2D CommunicationsSafwan Alwan, Ilhem Fajjari, Nadjib Aitsaadi. 167-174 [doi]
- Topology Preserving Map for Wireless Sensor Networks Equipped with Directional AntennasAshanie Gunathillake, Kanchana Thilakarathna, Anura P. Jayasumana. 175-183 [doi]
- Decoding Superposed LoRa SignalsNancy El Rachkidy, Alexandre Guitton, Megumi Kaneko. 184-190 [doi]
- Estimating Room Occupancy in a Smart Campus using WiFi Soft SensorsIresha Pasquel Mohottige, Tim Moors. 191-199 [doi]
- On Probabilistic Connected Components in Underwater Sensor NetworksSalwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah. 200-207 [doi]
- IaaS-Aided Access Control for Information-Centric IoTGiovanna Carofiglio, Alberto Compagno, Mauro Conti, Fabio De Gaspari, Luca Muscariello. 208-216 [doi]
- Experimental Evaluation of an Energy-Delay Aware Web Routing MethodGandhimathi Velusamy, Ricardo Lent. 217-225 [doi]
- Maximizing the Wearable Network Lifetime through Virtualized Application Function ChainingHarini Kolamunna, Kanchana Thilakarathna, Aruna Seneviratne. 226-234 [doi]
- Link Scheduling in Rechargeable Wireless Sensor Networks with Harvesting Time and Battery Capacity ConstraintsTony 0002, Sieteng Soh, Mihai Lazarescu, Kwan-Wu Chin. 235-242 [doi]
- Multi-Level Fog Based Resource Allocation Model for EVs Energy Planning in Smart GridDjabir Abdeldjalil Chekired, Lyes Khoukhi, Hussein T. Mouftah. 243-250 [doi]
- Mitigating Suppression Attack in Multicast Protocol for Low Power and Lossy NetworksCong Pu, Xitong Zhou, Sunho Lim. 251-254 [doi]
- Exploring Deployment Strategies for the Tor NetworkChristoph Döpmann, Sebastian Rust, Florian Tschorsch. 255-258 [doi]
- Together We are Strong: Securing Industrial Wireless Networks with Overhearing NodesSebastian A. Henningsen, Lucas Mann, Stefan Dietzel, Björn Scheuermann 0001. 259-262 [doi]
- 100 Gbit/s End-to-End Communication: Adding Flexibility with Protocol TemplatesSteffen Büchner 0002, Alireza Hasani, Lukasz Lopacinski, Rolf Kraemer, Jörg Nolte. 263-266 [doi]
- FireFlow - High Performance Hybrid SDN-Firewalls with OpenFlowAndreas Fiessler, Claas Lorenz, Sven Hager, Björn Scheuermann 0001. 267-270 [doi]
- Analysis of Bundle Throughput Over LTPRicardo Lent. 271-274 [doi]
- Scalable Downward Routing for Wireless Sensor Networks and Internet of Things ActuationXiaoyang Zhong, Yao Liang. 275-278 [doi]
- Evaluation of Multi-Gateway LoRaWAN with Different Data Traffic ModelsMuhammad Omer Farooq, Dirk Pesch. 279-282 [doi]
- A Search into a Suitable Channel Access Control Protocol for LoRa-Based NetworksMuhammad Omer Farooq, Dirk Pesch. 283-286 [doi]
- MaxStream: SDN-based Flow Maximization for Video Streaming with QoS EnhancementAbolfazl Samani, Mea Wang. 287-290 [doi]
- A Case for Systematic Detection and Rigorous Location of SDN Control ConflictsLan Lin, Xin Sun. 291-294 [doi]
- Intelligent Caching in Dense Small-Cell Networks with Limited External ResourcesBingshan Hu, Maryam Tanha, Dawood Sajjadi, Jianping Pan 0001. 295-298 [doi]
- An SDN-based Approach For Defending Against Reflective DDoS AttacksThomas Lukaseder, Kevin Stölzle, Stephan Kleber, Benjamin Erb, Frank Kargl. 299-302 [doi]
- In-Device Proxy Re-encryption Service for Information-Centric Networking Access ControlKalika Suksomboon, Atsushi Tagami, Anirban Basu, Jun Kurihara. 303-306 [doi]
- Dynamic Placement of Extended Service Function Chains: Steiner-based Approximation AlgorithmsSelma Khebbache, Makhlouf Hadji, Djamal Zeghlache. 307-310 [doi]
- Common Knowledge Based Transfer Learning for Traffic ClassificationYunming Xiao, Haifeng Sun, Zirui Zhuang, Jingyu Wang, Qi Qi 0001. 311-314 [doi]
- FSE-NG for managing real time media flows and SCTP data channel in WebRTCJulius Flohr, Ekaterina Volodina, Erwin P. Rathgeb. 315-318 [doi]
- Group Identification in Crowded Environments Using Proximity SensingShaden Shaar, Saquib Razak, Fahim Dalvi, Syed Ali Hashim Moosavi. 319-322 [doi]
- Mobile Users Location Prediction with Complex Behavior UnderstandingMostafa Karimzadeh, Zhongliang Zhao, Florian Gerber, Torsten Braun. 323-326 [doi]
- PLS: Proactive Load Shifting for Distributed SDN ControllersOluwatobi Akanbi, Amer Aljaedi, Xiaobo Zhou. 327-330 [doi]
- HoPP: Robust and Resilient Publish-Subscribe for an Information-Centric Internet of ThingsCenk Gündogan, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch. 331-334 [doi]
- Self-optimizing Scanning Parameters for Seamless Handover in IEEE 802.11 WLANLina Hao, Bryan Ng, Ying Qu. 335-342 [doi]
- Empirical study for Dynamic Adaptive Video Streaming Service based on Google Transport QUIC protocolVan Tong, Hai Anh Tran, Sami Souihi, Abdelhamid Mellouk. 343-350 [doi]
- A Multi-dimension Measurement Study of a Large Scale Campus WiFi NetworkCongcong Miao, Jilong Wang, Hui Wang, Jun Zhang, Weiwei Zhou, Shengchao Liu. 351-359 [doi]
- Context-based BSM Aggregation for Broad-Scale Applications in Vehicular NetworksKhireddine Benaissa, Salim Bitam, Abdelhamid Mellouk. 360-368 [doi]
- Broadcast Speedup in Vehicular Networks via Information TeleportationPhilippe Jacquet, Dalia Popescu, Bernard Mans. 369-376 [doi]
- Taxi Dispatch Planning via Demand and Destination ModelingJun Xu 0025, Rouhollah Rahmatizadeh, Ladislau Bölöni, Damla Turgut. 377-384 [doi]
- Towards Improved DASH Adaptation in NDN: An Emulative AnalysisDenny Stohr, Timo Kalle, Andreas Mauthe, Amr Rizk, Ralf Steinmetz, Wolfgang Effelsberg. 385-392 [doi]
- Plato: Learning-based Adaptive Streaming of 360-Degree VideosXiaolan Jiang, Yi-Han Chiang, Yang Zhao, Yusheng Ji. 393-400 [doi]
- Bitrate Adaptation-aware Cache Partitioning for Video Streaming over Information-Centric NetworksWenjie Li, Sharief M. A. Oteafy, Marwan Fayed, Hossam S. Hassanein. 401-408 [doi]
- Iterative Discovery of Multiple Disjoint Paths in Switched Networks with Multicast FramesDiego Lopez-Pajares, Joaquin Alvarez-Horcajo, Elisa Rojas, Juan A. Carral, Guillermo Ibáñez. 409-412 [doi]
- Real-time Smartphone Indoor Tracking Using Particle Filter with Ensemble Learning MethodsJose Luis Carrera, Zhongliang Zhao, Torsten Braun, Zan Li. 413-416 [doi]
- PAST-HOAS: Fast Setup of Per-Address Sink Routing Trees by Reverse FloodingJoaquin Alvarez-Horcajo, Diego Lopez-Pajares, Elisa Rojas, Guillermo Ibáñez, Isaías Martinez-Yelmo, Maria Campos-Selfa. 417-420 [doi]
- Concurrent Transmission-based Packet Concatenation in Wireless Sensor NetworksPeilin Zhang, Xiaoyuan Ma, Oliver E. Theel, Jianming Wei. 421-424 [doi]
- Low-complexity Dynamic Resource Slicing for Mixed Traffics in Virtualized Radio Access NetworkGuolin Sun, Sebakara Samuel Rene Adolphe, Daniel Ayepah-Mensah. 425-428 [doi]
- Virtual Terrain Nullification Using Phased Array Antennas for Wireless Ad Hoc NetworksVinay B. Ramakrishnaiah, Robert F. Kubichek, Suresh S. Muknahallipatna. 429-432 [doi]
- Geometric Monitoring in Action: a Systems Perspective for the Internet of ThingsCharalampos Stylianopoulos, Magnus Almgren, Olaf Landsiedel, Marina Papatriantafilou. 433-436 [doi]
- Efficient Location Sensing in Longitudinal Cohort StudiesAfzal Hossain, Christian Poellabauer. 437-440 [doi]
- Graph-Aware Deep Learning Based Intelligent Routing StrategyZirui Zhuang, Jingyu Wang, Qi Qi 0001, Haifeng Sun, Jianxin Liao. 441-444 [doi]
- Strictly Prioritized Transmission of Urgent Data Based on MAC Coordination in WSNsTsubasa Inoue, Yosuke Tanigawa, Hideki Tode. 445-448 [doi]
- BCXP: Blockchain-Centric Network Layer for Efficient Transaction and Block Exchange over Named Data NetworkingGeorge Sedky, Amr El-Mougy. 449-452 [doi]
- Generative Adversarial Networks Based Industrial Protocol Construction in the Fog ComputingChu Lu, Hong Liu. 453-456 [doi]
- Multidimensional Resource Consumption Analysis of Co-Located VMs using PCAWaltenegus Dargie. 457-460 [doi]
- Exploiting Correlation for Query Resolution in Multi-attribute Structured Peer-to-Peer NetworksShibayan Chatterjee, Anura P. Jayasumana. 461-464 [doi]
- PCach: The Case for Pre-Caching your Mobile DataKatia Jaffrès-Runser, Gentian Jakllari. 465-468 [doi]
- Detection of Anomalous Communications with SDRs and Unsupervised Adversarial LearningSandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Jack Riddle. 469-472 [doi]
- Latency Measurement of Service Function Chaining on OpenStack PlatformZuo Xiang, Frank Gabriel, Giang T. Nguyen, Frank H. P. Fitzek. 473-476 [doi]
- Segment Routed Traffic Engineering with Bounded Stretch in Software-Defined NetworksTossaphol Settawatcharawanit, Vorapong Suppakitpaisarn, Shigeki Yamada, Yusheng Ji. 477-480 [doi]
- Virtual Forces based UAV Fleet Mobility Models for Air Pollution MonitoringAmjed Belkhiri, Walid Bechkit, Hervé Rivano. 481-484 [doi]
- ILP Formulation for Monitoring-Cycle Construction Using Segment RoutingXiaoqian Li, Kwan L. Yeung. 485-492 [doi]
- Whack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environmentsMinh Nguyen, Amitangshu Pal, Saptarshi Debroy. 493-501 [doi]
- An Incremental Approach for Swift OpenFlow Anomaly DetectionRamtin Aryan, Anis Yazidi, Paal Einar Engelstad. 502-510 [doi]
- Representative Measurement Point Selection to Monitor Software-defined NetworksRhaban Hark, Mohamed Ghanmi, Sounak Kar, Nils Richerzhagen, Amr Rizk, Ralf Steinmetz. 511-518 [doi]
- VirtualStack: Flexible Cross-layer Optimization via Network Protocol VirtualizationJens Heuschkel, Lin Wang, Erik Fleckstein, Michael Ofenloch, Marcel Blöcher, Jon Crowcroft, Max Mühlhäuser. 519-526 [doi]
- OSDF: An Intent-based Software Defined Network Programming FrameworkDouglas Comer, Adib Rastegarnia. 527-535 [doi]
- Anonymous Datagrams over DNS RecordsSamuel Brack, Robert Muth, Stefan Dietzel, Björn Scheuermann 0001. 536-544 [doi]
- Improving Quantization for Channel Reciprocity based Key GenerationPaul Walther, Carsten Rudolf Janda, Elke Franz, Mathias Pelka, Horst Hellbrück, Thorsten Strufe, Eduard A. Jorswieck. 545-552 [doi]
- Gargoyle: A Network-based Insider Attack Resilient Framework for OrganizationsArash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha. 553-561 [doi]
- Exploiting Correlations in Request Streams: A Case for Hybrid Caching in Cache NetworksAdita Kulkarni, Anand Seetharam. 562-570 [doi]
- LRU-2 vs 2-LRU: An Analytical StudyAlireza Montazeri, Nicholas R. Beaton, Dwight J. Makaroff. 571-579 [doi]
- GATE and FENCE: Geo-Blocking Protocols for Named Data NetworkingAlberto Compagno, Mauro Conti, Stefano Munari, Riccardo Lazzeretti. 580-588 [doi]
- FCTree: A Space Efficient FIB Data Structure for NDN RoutersOuassim Karrakchou, Nancy Samaan, Ahmed Karmouch. 589-596 [doi]
- Automatic Device Classification from Network Traffic Streams of Internet of ThingsLei Bai, Lina Yao, Salil S. Kanhere, Xianzhi Wang 0001, Zheng Yang. 597-605 [doi]
- Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of ThingsAbdelmuttlib Ibrahim Abdallaahmed, Suleman khan, Abdullah Gani, Siti Hafizah Ab Hamid, Mohsen Guizani. 606-613 [doi]
- Secure Low Latency Communication for Constrained Industrial IoT ScenariosJens Hiller, Martin Henze, Martin Serror, Eric Wagner, Jan Niklas Richter, Klaus Wehrle. 614-622 [doi]
- Real-time Performance Evaluation of LTE for IIoTRoman Zhohov, Dimitar Minovski, Per Johansson, Karl Andersson. 623-631 [doi]
- GoldenEye: stream-based network packet inspection using GPUsQian Gong, Wenji Wu, Phil DeMar. 632-639 [doi]
- On the Practical Irrelevance of Metrics on Segment Routing Traffic Engineering optimizationTimmy Schuller, Nils Aschenbruck, Markus Chimani, Martin Horneffer. 640-647 [doi]
- CLF: An Online Coflow-Aware Packet Scheduling AlgorithmJie Xiao, Kwan L. Yeung, Sugih Jamin. 648-656 [doi]
- Blow up the CPU Chains! OpenCL-assisted Network ProtocolsJens Heuschkel, Rick Vogel, Marcel Blöcher, Max Mühlhäuser. 657-665 [doi]