Abstract is missing.
- Just-in-Time Aggregation for Federated LearningK. R. Jayaram, Ashish Verma, Gegi Thomas, Vinod Muthusamy. 1-8 [doi]
- G-Networks Can Detect Different Types of CyberattacksErol Gelenbe, Mert Nakip. 9-16 [doi]
- DTS: A Simulator to Estimate the Training Time of Distributed Deep Neural NetworksWilfredo J. Robinson M., Flavio Esposito, Maria A. Zuluaga. 17-24 [doi]
- NorBERT: NetwOrk Representations Through BERT for Network Analysis & ManagementFranck Le, Davis Wertheimer, Seraphin B. Calo, Erich M. Nahum. 25-32 [doi]
- Cross-Level Characterization of Program ExecutionLi Tang, Scott Pakin. 33-40 [doi]
- On the Impact of Internal Webpage Selection when Evaluating Ad Blocker PerformancePhilip Gunnarsson, Adam Jakobsson, Niklas Carlsson. 41-48 [doi]
- RAST: Evaluating Performance of a Legacy System Using Regression Analysis and SimulationJuri Tomak, Sergei Gorlatch. 49-56 [doi]
- Simulation Modeling of Zoom Network TrafficMehdi Karamollahi, Carey Williamson. 57-64 [doi]
- Energy Optimal Activation of Processors for the Execution of a Single Task with Unknown SizeJonatha Anselmi, Bruno Gaujal. 65-72 [doi]
- LoRaLitE: LoRa protocol for Energy-Limited environmentsLukasz Sergiusz Michalik, Loic Guegan, Issam Raïs, Otto J. Anshus, John Markus Bjørndalen. 73-80 [doi]
- Modelling Energy Changes in the Energy Harvesting Battery of an IoT DeviceTadeusz Czachórski, Erol Gelenbe, Godlove Suila Kuaban. 81-88 [doi]
- Efficient Error-Bounded Lossy Compression for CPU ArchitecturesGriffin Dube, Jiannan Tian, Sheng Di, Dingwen Tao, Jon C. Calhoun, Franck Cappello. 89-96 [doi]
- Orchestrating Heterogeneous Cyber-range Event Chains With Serverless-container WorkflowYongquan Fu, Weihong Han, Dong Yuan. 97-104 [doi]
- IFLustre: Towards Interference-Free and Efficient Storage Allocation in Distributed File SystemSunggon Kim, Dong-Kyu Sung, Yongseok Son. 105-112 [doi]
- Design and Simulation of Multi-tiered Heterogeneous Memory ArchitectureJinyuan Hu, Haikun Liu, Hai Jin 0001, Xiaofei Liao. 113-120 [doi]
- Truncating Multi-Dimensional Markov Chains With Accuracy GuaranteeGagan Somashekar, Mohammad Delasay, Anshul Gandhi. 121-128 [doi]
- Surrogate Models for Markov Reward Models with Uncertain ParametersPeter Buchholz 0001. 129-136 [doi]
- Modelling Performance Loss due to Thread Imbalance in Stochastic Variable-Length SIMT WorkloadsStephen Nicholas Swatman, Ana Lucia Varbanescu, Attila Krasznahorkay, Andy Pimentel. 137-144 [doi]
- Securing OFDMA in V2V Communication Among Untrusted PlatoonsRuotong Zhao, Deepak Mishra 0001, Aruna Seneviratne. 145-151 [doi]
- Efficient Data-Driven Network FunctionsZhiyuan Yao, Yoann Desmouceaux, Juan Antonio Cordero Fuertes, Mark Townsley, Thomas H. Clausen. 152-159 [doi]
- Tracking a Mobile Beacon: A Purely Probabilistic ApproachF. Serhan Danis, Cem Ersoy, A. Taylan Cemgil. 160-167 [doi]
- DB-LBT: Deterministic Backoff with Listen Before Talk for Wi-Fi/NR-U Coexistence in Shared BandsKatarzyna Kosek-Szott, Szymon Szott, Alice Lo Valvo, Ilenia Tinnirello. 168-175 [doi]