Abstract is missing.
- Basic Model for Process-Aware Control of Wireless Links in a Flexible FactorySatoko Itaya, Fumiko Ohori, Toru Osuga, Fumihide Kojima. 1-9 [doi]
- Unknown Traffic Identification Based on Deep Adaptation NetworksZiji Yang, Wei Lin. 10-18 [doi]
- Maginot Lines and Tourniquets: On the Defendability of National CyberspaceDevashish Gosain, Madhur Rawat, Piyush Kumar Sharma, H. B. Acharya. 19-30 [doi]
- Sum-Rate Optimization-based Access Mode Selection and Resource Allocation for IoT Devices in 5GTazeem Ahmad, Rong Chai, Mohd Adnan. 31-38 [doi]
- GAA-GAA Coexistence in the CBRS Band: Performance Evaluation of Approach 3Weichao Gao, Anirudha Sahoo, Emma Bradford. 39-47 [doi]
- Deep Reinforcement Learning Based Energy-efficient Task Offloading for Secondary Mobile Edge SystemsXiaojie Zhang, Amitangshu Pal, Saptarshi Debroy. 48-59 [doi]
- Guidelines for an Energy Efficient Tuning of the NB-IoT StackMuhammad Tahir Abbas, Johan Eklund, Karl-Johan Grinnemo, Anna Brunström, Stefan Alfredsson, Özgü Alay, Sándor Katona, Gergely Seres, Bela Rathonyi. 60-69 [doi]
- Secrecy Performance of Cooperative NOMA System with Multiple Full-Duplex Relays against Non-Colluding/Colluding EavesdroppersNesrine Zaghdoud, Adel Ben Mnaouer, Hatem Boujemaa, Farid Touati. 70-77 [doi]
- On the Impact of Burst Loss for QoE-Based Performance Evaluations for Video StreamingDominic Laniewski, Bertram Schütz, Nils Aschenbruck. 78-87 [doi]
- Topology-aware Path Planning for In-Transit Coverage of Aerial Post-Disaster Communication Assistance SystemsJulian Zobel, Benjamin Becker, Ralf Kundel, Patrick Lieser, Ralf Steinmetz. 88-98 [doi]
- Evaluation of Container Overlays for Secure Data SharingSara Shakeri, Lourens Veen, Paola Grosso. 99-108 [doi]
- The Impact of Bit Errors on Intra-session Network Coding with Heterogeneous Packet LengthsBertram Schütz, Nils Aschenbruck, Stephan Bussmann, Hanna Döring, Martina Juhnke-Kubitzke. 109-119 [doi]
- Anomaly Detection for Mixed Packet SequencesFares Meghdouri, Félix Iglesias Vázquez, Tanja Zseby. 120-130 [doi]
- On the Impact of Geographic Restrictions on Contact Metrics in Opportunistic NetworksAlexander Tessmer, Thomas Hänel, Nils Aschenbruck. 131-140 [doi]
- Online Games Servers Placement in Fog Computing: an Hybrid Bio-inspired ApproachAmira Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta. 141-149 [doi]
- Retrospective Sensing Based on Federated Learning in the IoTRafiq Mazen Kamel, Amr El-Mougy. 150-161 [doi]