default search action
21st CCNC 2024: Las Vegas, NV, USA
- 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024. IEEE 2024, ISBN 979-8-3503-0457-2
- Carla Mouradian, Fetahi Wuhib:
Automated Resource Dimensioning in Cloud Using Hybrid Reinforcement Learning. 1-8 - Giovanni Delnevo, Gianni Tumedei, Vittorio Ghini, Catia Prandi:
Toward a Digital Twin: Combining Sensing, Machine Learning, and Data Visualization for the Effective Management of a Coastal Lagoon Environment. 1-6 - Fabio Bove, Simone Colli, Luca Bedogni:
Performance Evaluation of Split Computing with TinyML on IoT Devices. 1-6 - Junki Oura, Akihiro Wada, Masatoshi Ogawa, Kaoru Yokoo, Jun Kakuta, Teruhisa Ninomiya:
QoE Estimation Method with Time-series Features Extracted from Packet Flows for Video Streaming. 1-6 - Diego Mendez, Marco Zennaro, Moez Altayeb, Pietro Manzoni:
On TinyML WiFi Fingerprinting-Based Indoor Localization: Comparing RSSI vs. CSI Utilization. 1-6 - Shintaro Mori:
Test-field Development for ICWSNs and Preliminary Evaluation for mmWave-Band Wireless Communications. 1-2 - Laura Belli, Luca Davoli, Gianluigi Ferrari:
A Cloud-Oriented Indoor-Outdoor Real-Time Localization IoT Architecture for Industrial Environments. 1-6 - Mihnea Cristian Marin, Mattia Cerutti, Sanders Batista, Mattia Brambilla:
A Multi-Protocol IoT Platform for Enhanced Interoperability and Standardization in Smart Home. 1-6 - Fabio Pittarello, Manuel Semenzato:
Towards a Data Physicalization Toolkit for Non-Sighted Users. 1-6 - Vignay Chanda, Luoyao Hao, Henning Schulzrinne:
From Frustration to Function: A Study on Usability Challenges in Smart Home IoT Devices. 1-6 - Hongshan Mao, Hao Xu:
Data-Driven Learning Based Secrecy Rate Optimization for RIS-Assisted Secure Wireless Networks: A Multi-Armed Bandit Approach. 1-6 - Lorenzo Perinello, Ombretta Gaggi:
Accessibility of Mobile User Interfaces using Flutter and React Native. 1-6 - Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li:
Decentralized Cluster Head Selection in IoV using Federated Deep Reinforcement Learning. 1-7 - Uttam Ghosh, Debashis Das, Sourav Banerjee, Saraju P. Mohanty:
Blockchain-Based Device Identity Management and Authentication in Cyber-Physical Systems. 1-6 - Shivam Barke, Gautam Srivastava:
ReVo: A Hybrid Consensus Protocol for Blockchain in the Internet of Things through Reputation and Voting Mechanisms. 1-8 - Reinhardt Karnapke, Martin Richter, Matthias Werner:
Virtualization in Robot Swarms: Past, Present, and Future. 1-6 - Mariagrazia Benassi, Davide Paolillo, Matilde Spinoso, Sara Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi:
Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse Children. 1-6 - Cristiano Aguzzi, Lorenzo Gigli, Ivan D. Zyrianoff, Luca Roffia:
ZION: A Scalable W3C Web of Things Directory. 1-6 - Fahim Ahmed Irfan, Razib Iqbal, Ayesha Siddiqua:
SeReIn-M: Sensor Relationship Inference in Multi-Resident Smart Homes. 1-6 - Giovanni Delnevo, Manuel Andruccioli, Silvia Mirri:
On the Interaction with Large Language Models for Web Accessibility: Implications and Challenges. 1-6 - Suzumi Sato, Hayato Shimano, Megumi Saito, Shigeru Shimamoto, Nao Kobayashi:
Stress Evaluation with Biometric Information Using Smartphone by Radio Wave Reflection. 1-4 - David Mortimore, Raymond R. Buettner, Marc S. Ramsey:
An Information Processing System Design Approach to Underwater Robotic Swarms. 1-6 - Hung-Yu Lin, Zhe-Yu Xu, Jian-Yu Zhou, Jen-Yeu Chen:
A ROS-based Agricultural AI-Driven AGV (A3GV) with Collaboration and Guiding from Drones in the Outdoor Farming Fields. 1-2 - Alex Howe, Dale Peasley, Mauricio Papa:
Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection. 1-6 - Christine Bassem:
Challenges of Modeling Participant Behavior in CrowdSensing Evaluation. 1-6 - Luca Davoli, Laura Belli, Gianluigi Ferrari, Elisa Londero, Paolo Azzoni:
An Edge Computing-Oriented WoT Architecture for Air Quality Monitoring in Mobile Vehicular Scenarios. 1-7 - Lina Nachabe, Alexandre Bento, Kamal Singh, Lionel Médini, Frédérique Laforest:
Distributing Reasoning on WoT Edge Architectures. 1-7 - Marco Picone, Valeria Villani, Marcello Pietri, Luca Bedogni:
Towards Coordinating Machines and Operators in Industry 5.0 through the Web of Things. 1-6 - Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata:
A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks. 25-30 - Makoto Misumi, Masato Tariki, Noriaki Kamiyama:
Cache Control Method for Multiple Web Cache Servers Based on Co-Occurrence Degree. 31-36 - Florian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi:
SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort Networks. 37-43 - Sabbir Ahmed, Md. Nahiduzzaman, Tariqul Islam, Faisal Haque Bappy, Tarannum Shaila Zaman, Raiful Hasan:
FASTEN: Towards a FAult-Tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication. 44-50 - Michael Wentz, Jack Capper, Binoy G. Kurien, Keith Forsythe, Kaushik R. Chowdhury:
Classification-Based Transfer Learning for Blind Adaptive Receiver Beamforming. 59-64 - Tailai Song, Gianluca Perna, Paolo Garza, Michela Meo, Maurizio Matteo Munafò:
BitFormer: Transformer-Based Neural Network for Bitrate Prediction in Real-Time Communications. 65-70 - Amr Abo-eleneen, Alaa Awad Abdellatif, Aiman Erbad, Amr Mohamed:
DRL-APNS: A Deep Reinforcement Learning-Powered Framework for Accurate Predictive Network Slicing Allocation. 71-76 - Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner:
Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication Systems. 77-83 - Han Jang, Youngbin Jin, Dongjun Lee, Ben Lee:
Dynamic Clustering Page Allocation for Read-Intensive Multimedia Streaming Applications. 84-89 - Sasan Sabour, Amin Ebrahimzadeh, Fetahi Wuhib, Mbarka Soualhia, Roch H. Glitho:
Service Graphs Generation in Intent-Based Networks. 90-97 - Rei Nakagawa, Satoshi Ohzahata, Ryo Yamamoto:
Accelerating Feedback Control for QoE Fairness in Adaptive Video Streaming Over ICN. 98-106 - Thulitha Senevirathna, Bartlomiej Siniarski, Madhusanka Liyanage, Shen Wang:
Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection. 107-112 - Supriya Kumari, Shwetha Vittal, A. Antony Franklin:
Resource-Aware Service Prioritization in a Slice-Supportive 5G Core Control Plane for Improved Resilience and Sustenance. 113-120 - Bharath Kumar R., Rajavelsamy R.:
Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBI. 121-126 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation. 127-134 - Ahmed Boubrima, Zhambyl Shaikhanov, Edward W. Knightly:
Toward Accurate Environmental Mapping using Balloon-based UAVs. 135-142 - Image Bhattarai, Cong Pu, Kim-Kwang Raymond Choo:
A Lightweight Aggregate Authentication Protocol for Internet of Drones. 143-151 - Abdulaziz Alshaeri, Mohamed Younis:
Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things. 152-158 - Shusuke Narieda, Takeo Fujii:
Analyses of Hidden and Exposed Nodes in LPWAN with Energy Detection Based Carrier Sense. 159-164 - Naoki Fukushi, Toshiki Shibahara, Hiroki Nakano, Takashi Koide, Daiki Chiba:
Noisy Label Detection for Multi-labeled Malware. 165-171 - Harichandana B. S. S, Sumit Kumar, Manjunath Bhimappa Ujjinakoppa, Barath Raj Kandur Raja:
COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection. 172-179 - Joshua H. Tyler, Donald R. Reising, Mohamed K. M. Fadul, Mina Sartipi:
Assessing Time Offset and Classifier Impacts on Preamble-based Cross-Collection SEI. 180-187 - Hozefa Lakadawala, Komla Dzigbede, Yu Chen:
Detecting Reentrancy Vulnerability in Smart Contracts using Graph Convolution Networks. 188-193 - Alexander Jung, Helge Parzyjegla, Peter Danielis:
Opportunistic Protocols for People Counting in Dynamic Networks. 198-201 - Maher Dissem, Manar Amayri, Nizar Bouguila:
Robust Interactive HMI for Occupancy Estimation in Smart Buildings (WIP). 202-205 - Fabio Gaiba, Luca Bedogni, Giacomo Gori, Andrea Melis, Marco Prandini:
Wi-Fi Sensing for Human Identification Through ESP32 Devices: An Experimental Study. 206-209 - Hikaru Katayama, Hideto Yano, Tomoki Yoshihisa, Hideyuki Shimonishi:
A Real-Time Human Tracking System Using Multiple Cameras to Reduce Network Loads. 210-213 - Satoru Matsumoto, Tomoki Yoshihisa, Hideyuki Shimonishi, Tomoya Kawakami, Yuuichi Teranishi:
Implementation and Evaluation of a Facial Image Obscuring Method for Person Identification to Protect Personal Data. 214-217 - Jeniya Sultana, Razib Iqbal:
A Framework for Context Recognition from Voice Commands and Conversations with Smart Assistants. 218-221 - Hideyuki Saito, Kenji Kanai, Hidenori Nakazato:
Development and Evaluation of Information-Centric Service Mesh Using NDN Function Chaining. 222-227 - Yohei Namba, Ryo Morishima, Hiroaki Nishi:
Network-Transparent Load Balancing and Migration for Edge Computing. 228-233 - Ivan D. Zyrianoff, Leonardo Montecchiari, Angelo Trotta, Lorenzo Gigli, Carlos Kamienski, Marco Di Felice:
Proactive Caching in the Edge-Cloud Continuum with Federated Learning. 234-240 - Daiki Kodama, Kenji Ohira, Hideyuki Shimonishi, Toshiro Nakahira, Daisuke Murayama, Tomoaki Ogawa:
Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map Estimation. 241-247 - Shoki Ohta, Cheng Chen, Takayuki Nishio:
Proactive Millimeter-Wave Link Quality Prediction Utilizing Out-of-Band CSI Fingerprinting and Supervised Learning: An Experimental Study. 248-253 - Natsuki Ikuo, Sorachi Kato, Takuma Matsukawa, Tomoki Murakami, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari:
CSI2PC: 3D Point Cloud Reconstruction Using CSI. 254-259 - Madeleine Miller, Hany Habbak, Mahmoud M. Badr, Mohamed Baza, Mohamed Mahmoud, Mostafa M. Fouda:
Electricity Theft Detection Approach Using One-Class Classification for AMI. 260-265 - Nathan Dillbary, Roi Yozevitch, Amit Dvir, Ran Dubin, Chen Hajaj:
Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification. 266-271 - Simone Marasi, Stefano Ferretti:
Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative Study. 272-277 - Roberto Cavicchioli, Jia-Cheng Hu, Marco Furini:
On Using Artificial Intelligence to Predict Music Playlist Success. 278-283 - Andreas Ingo Grohmann, Frank Peters, David Kuss, Mauri Seidel, Frank H. P. Fitzek:
HYDRAted - High Yield Dense Robotic Arms Technically Evolved Demonstrator. 282-283 - Davide Paolillo, Bryan Corradino, Gianni Tumedei, Mariagrazia Benassi, Catia Prandi:
On developing a procedural level generator based on the Model Synthesis algorithm in the context of serious games. 284-289 - Maria Mengozzi, Manuel Andruccioli, Silvia Mirri, Giovanni Delnevo, Roberto Girau:
Enhancing Road Safety Through Fitness-to-Drive Metrics: The NextPerception Project on Driver Behavior Analysis and Gamification. 290-295 - Srinivas Tenneti, Romika Jakhar, Khaled Harfoush:
Reactive Jamming of the Helium Network. 296-301 - Mohamed Anis Fekih, Walid Bechkit, Hervé Rivano:
Route Selection in Low-Cost Participatory Mobile Sensing of Air Quality. 302-310 - Lorenzo Gigli, Federico Montori, Mirko Zichichi, Luca Bedogni, Stefano Ferretti, Marco Di Felice:
On the Decentralization of Mobile Crowdsensing in Distributed Ledgers: An Architectural Vision. 311-317 - Arzoo Miglani, Neeraj Kumar:
Maximized Content Offloading for Content Centric V2G Networks. 318-323 - Mart Keizer, Savio Sciancalepore, Gabriele Oligeri:
GhostBuster: Detecting Misbehaving Remote ID-Enabled Drones. 324-332 - Islam Elgarhy, Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy:
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. 333-338 - Taishi Nishiyama, Atsutoshi Kumagai, Akinori Fujino, Kazunori Kamiya:
Malicious Log Detection Using Machine Learning to Maximize the Partial AUC. 339-344 - Ignacio Astaburuaga, Shamik Sengupta:
Introduction to Quantum Systems and Security Vulnerabilities. 345-351 - Jingwen Wang, Peilong Li, Ethan Weitkamp, Yusuke Satani, Adam Omundsen:
MalBuster: Scalable, Real-Time, and Concept Drift-Adaptive Malware Detection for Smart Environments. 352-355 - Takahiro Ohtani, Ryo Yamamoto, Satoshi Ohzahata:
Detecting Zero-Day Attack with Federated Learning Using Autonomously Extracted Anomalies in IoT. 356-359 - Ayub Shah, Roberto Passerone:
Architectural Exploration and Design for Ultra-Reliable Low-Latency Indoor Robotics Systems. 360-363 - Khanh Nam Nguyen, Kenichi Takizawa:
Deep Learning-Based Proactive Physical Layer Handover using Cameras for Indoor Environment. 364-367 - Nathan Thom, Jay Thom, Batyr Charyyev, Emily M. Hand, Shamik Sengupta:
FlexHash - Hybrid Locality Sensitive Hashing for IoT Device Identification. 368-371 - Chiara Brunelli, Gianmarco Pappacoda, Ivan D. Zyrianoff, Luciano Bononi, Marco Di Felice:
Water Wastage Detection in Smart Homes Through IoT and Machine Learning. 372-375 - Silvia Corpino, Matteo Anedda, Mauro Fadda, Daniele D. Giusto, Roberto Girau:
Enabling a Scalable and Adaptive Cloud Infrastructure for Virtual Users in the Social Internet of Things. 376-379 - Salah Eddine Merzougui, Xhulio Limani, Andreas Gavrielides, Philippe Reiter, Claudio E. Palazzi, Johann Márquez-Barja:
Leveraging Edge Computing and Orchestration Platform for Enhanced Pedestrian Safety Application: The DEDICAT-6G Approach. 380-383 - Muhammad Mansoor Ashraf, Saadi Boudjit:
Distributed Framework of WSN-Assisted UAV Network for Highway Surveillance. 384-387 - Xing Liu, Wei Yu, Cheng Qian, David W. Griffith, Nada Golmie:
Deep Reinforcement Learning for Channel State Information Prediction in Internet of Vehicles. 388-391 - Nivin Madawalage, Tharani Thalgahagoda, Inushi Gunatilake, Pramitha Fernando, Geeth P. Wijesiri, Chatura Seneviratne, Madhusanka Liyanage:
Blockchain-Enabled RF Radiation Exposure Level Measurement in Wireless Mobile Networks. 392-395 - Patrick McEnroe, Shen Wang, Madhusanka Liyanage:
Towards Faster DRL Training: An Edge AI Approach for UAV Obstacle Avoidance by Splitting Complex Environments. 396-399 - Itsuki Takada, Daiki Nitto, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi, Ryoichi Shinkuma:
Edge-Oriented Point Cloud Compression by Moving Object Detection for Realtime Smart Monitoring. 400-405 - Ren-Hung Hwang, Yuan-Cheng Lai, Ying-Dar Lin:
Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems. 406-411 - Luca Bedogni, Marco Picone, Marcello Pietri, Marco Mamei, Franco Zambonelli:
Fluid Computing in the Internet of Things: A Digital Twin Approach. 412-418 - Jyotirmoy Karjee, Karan Raj Kakwani, Kartik Anand, Praveen S. Naik:
Lightweight Multimodal Fusion Computing Model for Emotional Streaming in Edge Platform. 419-424 - Kaushik Dey, Satheesh K. Perepu, Abir Das:
Goals are Enough: Inducing AdHoc Cooperation Among Unseen Multi-Agent Systems in IMFs. 425-432 - Ting-Hui Wang, Li-Hsiang Shen, Kai-Ten Feng:
Distributed Multi-Agent Deep Q-Learning for Fast Roaming in IEEE 802.11ax Wi-Fi Systems. 433-438 - Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, Kasun De Zoysa:
SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace. 439-445 - Yifeng Peng, Xinyi Li, Jingda Yang, Sudhanshu Arya, Ying Wang:
RAFT: A Real-Time Framework for Root Cause Analysis in 5G and Beyond Vulnerability Detection. 446-454 - Tatsuya Fukui, Kousuke Morita, Hiroki Ishiduka, Yuki Sakaue, Satoshi Narikawa:
Burst Collision Reduction Scheme for Low-Latency Video Transmission in 5G Uplink Systems. 455-459 - Alexander F. K. Janus, Steffen Moser, Frank Slomka:
Cost-Effective Network Packet Manipulation and Error-Detection Device. 460-465 - Ayano Higuchi, Yu Nakayama:
Cipher Modulation for Optical Camera Communication with Digital Signage. 466-471 - Gustavo Flores, Ani Nahapetian:
Keyboardless Keyboard: Smart Phone Gyroscope for Improved User Interface. 472-477 - Neminath Hubballi, Pankaj Chaudhary, Sameer G. Kulkarni:
PePC: Popularity Based Early Predictive Caching in Named Data Networks. 478-483 - Haoting Zhang, Hiroshi Yamamoto:
Lifelog Mesh Sensor Network System Supporting Wake-Up Control Function Based on States of Power Generation. 484-489 - Zahraa Khais Shahid, Saguna Saguna, Christer Åhlund:
Recognizing Seasonal Sleep Patterns of Elderly in Smart Homes Using Clustering. 490-498 - Alyssa Yu, Cheng Qian, Yifan Guo:
A Real-Time Hand Gesture Recognition System on Raspberry Pi: A Deep Learning-Based Approach. 499-506 - Igor Fontes, Arthur Melo, Alejandro C. Frery, André L. L. de Aquino:
Sensor Sound Classification in Neonatal Intensive Care Units Based on Multiple Features and Neural Networks. 507-512 - Farzad Veisi, Julien Montavont, Fabrice Theoleyre:
Energy Efficient and Reliable Maintenance for SDN-Based Scheduled Wireless Networks. 513-518 - Simeon Wuthier, Nazmus Sakib, Sang-Yoon Chang:
Positive Reputation Score for Bitcoin P2P Network. 519-524 - Alvin Kuruvilla, Rojanaye Daley, Rajesh Kumar:
Spotting Fake Profiles in Social Networks via Keystroke Dynamics. 525-533 - Nihal Poredi, Deeraj Nagothu, Yu Chen:
Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis. 534-539 - Mohammad Ebrahimabadi, Javad Bahrami, Mohamed Younis, Naghmeh Karimi:
Digital Twin Integrity Protection in Distributed Control Systems. 540-545 - Vinay Kumar Shrivastava, Sriganesh Rajendran, Aby Kanneath Abraham, Rajavelsamy Rajadurai:
Enhanced Scheduling Strategy and Energy Efficiency for Extended Reality in 5G Advanced. 546-549 - Henrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis, Niclas Örgen, Per Johansson:
Objective QoE Models for Cloud-Based First Person Shooter Game over Mobile Networks. 550-553 - Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango:
Securing MQTT-M2M Communications in a Food Retail Distribution. 554-557 - Yesin Sahraoui, Chaker Abdelaziz Kerrache, Carlos T. Calafate, Pietro Manzoni:
FedRx: Federated Distillation-Based Solution for Preventing Hospitals Overcrowding During Seasonal Diseases Using MEC. 558-561 - Midhun Nair, Obeng Lydia Dede, Soumadeep De, Renny Edwin Fernandez:
Digital Twin for Bruise Detection in Precision Agriculture. 562-565 - JeongJun Park, Lusungu Josh Mwasinga, Huigyu Yang, Syed M. Raza, Duc-Tai Le, Moonseong Kim, Min Young Chung, Hyunseung Choo:
Regional Correlation Aided Mobile Traffic Prediction with Spatiotemporal Deep Learning. 566-569 - Xuheng Cao, Noriaki Kamiyama:
Dynamic Mirror Placement for Reducing Inter-AS Traffic in NDN. 570-573 - Dazhou Liu, Younghee Park:
A Real-Time Anonymous Traffic Detection Based on Reinforcement Learning. 574-577 - Ryouhei Tsugami, Tatsuya Fukui, Satoshi Narikawa:
RDMA Transmission Control Method: Using Network Resource Allocation For Wide-Area Data Collection. 578-581 - Raúl Cuervo Bello, Nina Slamnik-Krijestorac, Johann M. Márquez-Barja:
Zero-touch Service Management for 6G verticals: Smart Traffic Management Case Study. 582-585 - Natsuki Natori, Masayuki Mikuriya, Fumitoshi Ogino, Yu Nakayama:
RGB-D Camera-Based Object Grounding Surface Estimation System. 586-589 - Jyotirmoy Karjee, Praveen S. Naik, Kartik Anand, Utkash Sharma, Abhay Thakur:
Multi-Channel Transport Scheduler for Extended Reality in Distributed Computing. 590-593 - Brent Anderson, Razib Iqbal:
Word Embedding with Emotionally Relevant Keyword Search for Context Detection from Smart Home Voice Commands. 594-595 - Omar Otoniel Flores-Cortez:
A Low-Cost IoT System for Water Quality Monitoring in Developing Countries. 596-597 - Khaled Chikh, Chinmay Satish Shrivastav, Roberto Cavicchioli:
Collaborative Misbehaviour Response System for Improving Road Safety. 600-601 - Yang Lou, Hideyuki Shimonishi, Masayuki Murata, Nattaon Techasarntikul:
Energy Optimization of Distributed Video Processing System in Dynamic Environment. 602-603 - Noor Khial, Alaa Awad Abdellatif, Amr Mohamed, Aiman Erbad, Carla-Fabiana Chiasserini:
Edge-Assisted Opportunistic Federated Learning for Distributed IoT Systems. 604-605 - Mingyu Ma, Hidenori Nakazato:
An Application of Named Data Network on InterPlanetary File System. 606-607 - Farha Masroor, Rishab Khanna, Neena Goveas:
Task Allocation in the Edge Cloud Scenario Incorporating Customized Requirements. 608-609 - Shota Ono, Taku Yamazaki, Takumi Miyoshi, Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki:
Experimental Evaluation Toward Mobility-Driven Model Integration Between Edges. 610-611 - Kohei Ogawa, Sumiko Miyata:
Heterogeneous Edge Server and Job Allocation Based on k-means++ and Transfer Probability. 612-613 - Truc Duong, Anna Wisniewska, Nirnimesh Ghose:
Reciprocal Altruism as a Rogue Node Detection Mechanism in Dynamic Spectrum Access Networks. 614-615 - Ryuto Maeda, Masayuki Kinoshita, Koji Kamakura, Takaya Yamazato:
Superimposed Iterative Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light Communication. 616-617 - Hironao Abe, Hideo Kawata, Yuhei Kawakami, Shinichi Yoshihara, Tomoaki Yoshida:
TAS Rescheduling Using Different Amounts of Allowable Jitter. 618-619 - Kennedy A. Lee, John R. Barry:
Outage Analysis for All the Satellites in a Randomly Distributed Constellation. 620-621 - Behzad Mozaffari Tazehkand, Fatemeh Asghari Azhiri, Reza Abdolee, Vida Vakilian:
On the Theoretical BER Performance of STCM-MIMO Systems. 622-623 - Fan-Shuo Tseng, Tsang-Yi Wang, Pin-Chu Yu:
Untrained Deep Learning Techniques for Channel Estimation With Limited Pilots in RIS-Enhanced SIMO-OFDM Systems. 624-625 - Matthew Boeding, Paul Scalise, Michael Hempel, Hamid Sharif:
Evaluating the Latency Impact for Time-Critical Operational Technology Applications of Transitioning IEC-61850 GOOSE Operations to 5G. 626-627 - Sota Yamamoto, Jin Nakazato, Gia Khanh Tran:
Study on the Coverage Extension of Millimeter Wave UAV BS Networks by Using IRS. 628-629 - Sridhar Kondabathini, Lalit Pathak, Kiran Bynam, Jyotirmov Karjee:
A Novel Framework to Reduce the Initial Access Latency by Utilizing Multi Resolution Angle of Arrival Estimation in 6G. 630-631 - Bikash Chandra Singh, Sachin Shetty, Praneet Chivate, David Wright, Alex Alenberg, Peter Woodward:
Performance Analysis of Indoor 5G NR Systems. 632-633 - Kentaro Morise, Tokimasa Toyohara, Hiroaki Nishi:
Proposal of Differential Privacy Anonymization for IoT Applications Using MQTT Broker. 634-635 - Sabrina Ahmed, Mohammed Zamshed Ali:
Application-Specific Security in IoT Network. 636-637 - Miyu Matsuda, Jiang Liu, Taka-aki Nakada, Shigeru Shimamoto:
Estimation of Systolic and Diastolic Blood Pressure in a Non-Contact Method Using Microwaves. 638-639 - Tarun Vihar Tumati, Xunfei Jiang, Yun Tian:
SBTCert: A Soulbound Token Certificate Verification System. 640-641 - Obeng Lydia Dede, Harikrishnan Muraleedharan Jalajamony, Renny Edwin Fernandez:
Image Transmission over LoRa-Based Networks: A Performance Study Using Image Compression and Reconstruction Methods. 642-643 - Ekramul Haque, Kamrul Hasan, Imtiaz Ahmed, Md. Sahabul Alam, Tariqul Islam:
Towards an Interpretable AI Framework for Advanced Classification of Unmanned Aerial Vehicles (UAVs). 644-645 - Yasuhiro Mori, Hiroshi Yamamoto, Yojiro Suyama, Tatsuya Izumi, Hirofumi Urayama, Shiho Kobayashi, Hideaki Tani:
Automated Design System of Automotive Ethernet Utilizing Simulation-Based Machine Learning. 646-647 - Nisha Kumari Barsha, Neminath Hubballi:
Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution Comparison. 648-649 - Peter Foytik, Safdar Hussain Bouk, Gustave Anderson, Sachin Shetty:
Self-Sovereign Identity Management in Ship-Based 5G-Devices Use Case. 650-651 - Akito Ohshima, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori:
Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle Platooning. 654-655 - Thanh Trung Nguyen, Minh Hai Vu, Thi Ha Ly Dinh, Phi Le Nguyen, Kien Nguyen:
MuLeS: A Multi-Client Learning-Based MPQUIC Scheduler. 656-661 - Christo Kurisummoottil Thomas, Emilio Calvanese Strinati, Walid Saad:
Reasoning with the Theory of Mind for Pragmatic Semantic Communication. 662-668 - Gianluca Perna, Martino Trevisan, Danilo Giordano, Daniel Perdices, Marco Mellia:
Monitoring Web QoE in Satellite Networks from Passive Measurements. 669-676 - Tomás Hüttebräucker, Mohamed Sana, Emilio Calvanese Strinati:
Pragmatic Goal-Oriented Communications Under Semantic-Effectiveness Channel Errors. 683-689 - Takuma Kobayashi, Takumi Takahashi, Shinsuke Ibi, Seiichi Sampei:
Concatenated Structure of EP and Turbo Equalizer for Overloaded Massive MIMO Detection. 690-695 - Shunsuke Kamiwatari, Masaaki Ito, Issei Kanno, Kengo Ando, Koji Ishibashi:
Interference-Aware Analog Beam Selection for Cell-Free Massive MIMO With Hybrid Beamforming Over Millimeter-Wave Channels. 696-701 - Nariman Torkzaban, Mohammad Ali Khojastepour, John S. Baras:
Enabling Cooperative Hybrid Beamforming in TDD-Based Distributed MIMO Systems. 702-707 - Ahmed T. El-Toukhy, Mohamed Mahmoud, Atef H. Bondok, Mostafa M. Fouda, Maazen Alsabaan:
Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach. 708-713 - Pranay Chowdary Jasti, Henry Griffith, Heena Rathore:
A Multi-Level Dempster-Shafer and Reinforcement Learning-Based Reputation System for Connected Vehicle Security. 714-720 - Anthony Jairam, Yong Wang:
Community-Sourced Bluetooth Low Energy Device Fingerprinting Based on Link Layer Packets. 721-729 - Ignacio Astaburuaga, Shamik Sengupta:
Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework. 730-735 - Marco Picone, Stefano Mariani, Roberto Cavicchioli, Paolo Burgio, Arslane Hamza Cherif:
The Degree of Entanglement: Cyber-Physical Awareness in Digital Twin Applications. 736-744 - Luca Sciullo, Angelo Trotta, Sara Bosi, Luciano Bononi, Marco Di Felice:
Digital Shadow Sensor Framework for Smart Agriculture: Time Series Prediction Through Data Segmentation and Clustering. 745-751 - Ion Turcanu, German Castignani, Sébastien Faye:
On the Integration of Digital Twin Networks into City Digital Twins: Benefits and Challenges. 752-758 - Giacomo Cabri, Alireza Rahimi:
Exploitation of Digital Twins in Smart Manufacturing. 759-764 - Takamasa Higuchi, Seyhan Ucar, Chunghan Lee, Onur Altintas:
Link Setup Latency in Vehicle-to-Vehicle WLANs: A Comparative Study. 765-770 - Constance Hendrix, Gedare Bloom:
Platoon Vulnerability due to Network Topology and Targeted Vehicle. 771-776 - Shubhangi Bhadauria, Klea Plaku, Yash Deshpande, Wolfgang Kellerer:
Evaluation of NR-Sidelink for Cooperative Industrial AGVs. 777-783 - Mohammad Shah Alamgir, Brian Kelley:
On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO. 784-791 - Michael R. Jones, Soufiene Djahel, Kristopher Welsh:
A Cyclic Hyper-parameter Selection Approach for Reinforcement Learning-based UAV Path Planning. 792-798 - Matthew Smith, Luke Zhao, Jonathan Cordova, Xunfei Jiang, Mahdi Ebrahimi:
Machine Learning-Based Energy-efficient Workload Management for Data Centers. 799-802 - Kai Vogelgesang, Phillip Raffeck, Peter Wägemann, Thorsten Herfet, Wolfgang Schröder-Preikschat:
WIP: Towards a Transactional Network Stack for Power-Failure Resilience. 803-806 - Shusuke Narieda, Takeo Fujii:
On Execution at End Devices for Energy Detection Based Carrier Sense in LPWAN. 807-810 - Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano:
Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN. 811-814 - Takahide Murakami, Naoki Aihara, Yu Tsukamoto, Akio Ikami, Hiroyuki Shinbo, Yoshiaki Amano:
Analysis of Clock Distribution in User-centric Radio Access Network for Cell-Free Massive MIMO. 815-818 - Amato Otsuki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata, Tatsuya Otoshi:
Adaptive Network Slicing Control Method for Unpredictable Network Variations Using Quality-Diversity Algorithms. 819-822 - Haoxuan Xie, Lam Chi Hou, Lap Tou Chau, Lei Ka Weng, Xichen Wang, Yuxuan Guo, Giovanni Delnevo, Chiara Ceccarini, Chan-Tong Lam, Su-Kit Tang:
Multimodal Interface for Games: A Case Study with TinyML. 823-826 - Gabriele Oligeri, Savio Sciancalepore, Alireza Sadighian:
FadePrint - Satellite Spoofing Detection via Fading Fingerprinting. 827-830 - Shammi A. Doly, Alex R. Chiriyath, Andrew Herschfelt, Md. Ali Azam, Shankarachary Ragi, Daniel W. Bliss:
Decentralized Waveform Co-Design for Integrated Sensing and Communications Systems via Approximate Dynamic Programming. 831-834 - Pratik Abhijeet Bendre, Shashwat Kumar, A. Antony Franklin:
Enhancing 360- Degree Video Streaming via Selective Inpainting for Bandwidth Optimization. 835-838 - Kotaro Shimamura, Shinya Takamaeda-Yamazaki:
FS-Boost: Communication-Efficient Federated Subtree-Based Gradient Boosting Decision Trees. 839-842 - Nann Win Moe Thet, Kenichi Takizawa:
Low Latency Self-Interference Suppression in In-Band Full-Duplex Relay. 843-846 - Stefan Aust:
Measurement Study of IEEE 802.11ah Sub-1 GHz Wireless Channel Performance. 847-850 - Hayato Yamakata, Yosuke Tanigawa, Hideki Tode:
Selective OFDMA Transmission Method Based on Downlink Communication Quality Requirements in IEEE 802.11ax Wireless LANs. 851-856 - Anan Sawabe, Yusuke Shinohara, Takanori Iwai:
Congestion State Estimation via Packet-Level RTT Gradient Analysis with Gradual RTT Smoothing. 857-862 - Anan Sawabe, Yusuke Shinohara, Takanori Iwai:
Revisiting TCP Pacing for Throughput Performance Enhancement Over TDD Band in Private Mobile Networks. 863-868 - Kazuaki Hanazawa, Yuto Hama, Hideki Ochiai:
Performance Comparison of Clipped and Filtered OFDM/QAM and SC/APSK with BICM. 869-874 - Suneel Kumar, Eduard Garcia Villegas, Daniel Camps-Mur:
SLA-MLO: Congestion-Aware SLA-Based Scheduling of Multiple Links in IEEE 802.11 be. 875-880 - Taisuke Nogami, Shinsuke Ibi, Takumi Takahashi, Hisato Iwai:
Data-Driven Tuning of Deep Unfolding-Aided Blind Signal Separation for Short Data Length. 881-886 - Kengo Furuta, Takumi Takahashi, Kenta Ito, Shinsuke Ibi:
Joint Channel and Data Estimation via Bayesian Parametric Bilinear Inference for OTFS Transmission. 887-892 - Zahraa El Attar, Yassine Hadjadj Aoul, Géraldine Texier:
Monitoring Network Slices with a Genetic Algorithm Approach. 893-898 - Elmahedi Mahalal, Muhammad Ismail, Zi-Yang Wu, Mostafa M. Fouda, Zubair Md. Fadlullah, Nei Kato:
Robust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept Drift. 899-904 - Siang-Jhen Wu, Chien Chen, Jyh-Cheng Chen:
Design and Implementation of Data Plane Supporting Time-Sensitive Networking in 5G Networks. 905-911 - Masahiro Takigawa, Ryochi Kataoka, Issei Kanno, Yoji Kishi:
Antenna Design for Robust Millimeter Wave LoS-MIMO Link in Mobile Analog Repeater Achieving Low Latency and High Capacity. 912-917 - Israt Ara, Brian Kelley:
Natively Secure 6G IoT Using Intelligent Physical Layer Security. 918-924 - Naoki Aihara, Akio Ikami, Yu Tsukamoto, Takahide Murakami, Hiroyuki Shinbo, Yoshiaki Amano:
Multi-Homing AP Connection for Cell-Free Massive MIMO in Distributed CPU Environment. 925-930 - Cong Pu, Kim-Kwang Raymond Choo, Image Bhattarai:
Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks. 931-936 - Prateek Sethi, Tri Nguyen, Mayukh Roy Chowdhury, Susanna Pirttikangas, Aloizio P. Silva:
Fair Consensus in Blockchain with Heterogeneous Miners using Reinforcement Learning aided Adaptive Proof-of-Work. 937-942 - Rukayat Olapojoye, Mohamed Baza, Tara Salman:
On the Analysis of Model Poisoning Attacks Against Blockchain-Based Federated Learning. 943-949 - Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage:
Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems. 950-955 - Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Samuel Marchal, Mika Ylianttila:
Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications. 956-962 - Atef H. Bondok, Mohamed Mahmoud, Mahmoud M. Badr, Mostafa M. Fouda, Maazen Alsabaan:
A Distillation-Based Attack Against Adversarial Training Defense for Smart Grid Federated Learning. 963-968 - Mohamed I. Ibrahem, Mostafa M. Fouda, Zubair Md. Fadlullah:
FedSafe-No KDC Needed: Decentralized Federated Learning with Enhanced Security and Efficiency. 969-975 - Sultan Almutairi, Yogev Neumann, Khaled Harfoush:
Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model. 976-981 - Uttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua:
A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain. 982-985 - Sogo Pierre Sanon, Rekha Reddy, Christoph Lipps, Hans Dieter Schotten:
DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated Learning. 986-989 - Francesco Salatino, Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango:
Detecting DDoS Attacks Through AI driven SDN Intrusion Detection System. 990-993 - Francesco Apollonio, Luca Bedogni, Giacomo Gori, Andrea Melis, Marco Prandini:
On the Trade-Off Between Privacy and Information Quality in Location Based Services. 994-997 - Fetulhak Abdurahman Shewajo, Abdelwahab Boualouache, Sidi Mohammed Senouci, Inès El Korbi, Bouziane Brik, Kinde Anlay Fante:
Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular Networks. 998-1001 - Kouichi Genda:
Autonomous Multi-Hop Network Using PSO-based Mobile Robot Swarm with the Moving Target Technique. 1002-1005 - Tushar Vrind, Chandar Kumar, Debabrata Das:
ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network. 1006-1009 - S. Ram Aditya, Shyamal Dhua, Animesh Kumar, Vimal Bastin Edwin Joseph, R. Rajavelsamy:
Deep Reinforcement Learning Based Bandwidth Part Assignment in 5G NR-U. 1010-1013 - Siddhesh Pratim Sovitkar, Shwetha Vittal, A. Antony Franklin:
Evaluating CAP Theorem on a Stateless 5G Core. 1014-1017 - Hendrik Schippers, Christian Wietfeld:
Data-Driven Energy Profiling for Resource-Efficient 5G Vertical Services. 1018-1021 - Nobutaka Kawaguchi, Charlie Hart:
On the Deployment Control and Runtime Monitoring of Containers Based on Consumer Side SBOMs. 1022-1025 - Sudharshan Paindi Jayakumar, Alberto Conte:
Framework: Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp). 1026-1029 - Nathan Dai, Suleyman Uludag:
Performance Tradeoff in ML-Based Intrusion Detection Systems: Efficacy vs. Resource Usage. 1030-1031 - Yi-Wei Chen, Min-Je Tsai, Henry Horng-Shing Lu, Kai-Ten Feng, Ta-Sung Lee, Jih-Chuan Lan:
Efficient TIS Sensitivity Measurement With Machine Learning Approach and 5G Dataset. 1032-1033 - Francesco Colosimo, Floriano De Rango:
Distance-Statistical Based Byzantine-Robust Algorithms in Federated Learning. 1034-1035 - Elies Gherbi, Hamza Khemissa, Mohammed Lamine Bouchouia, Maxime Ayrault:
A Study of AI-Based In-Vehicle Intrusion Detection Systems. 1036-1037 - Kota Maejima, Takayuki Nishio, Asato Yamazaki, Yuko Hara-Azumi:
Tram-FL: Routing-based Model Training for Decentralized Federated Learning. 1038-1039 - Takahiro Shindo, Taiju Watanabe, Kein Yamada, Hiroshi Watanabe:
Image Coding for Machines with Object Region Learning. 1040-1041 - Mayuko Inoue, Tomoaki Ohtsuki:
Source CSI Dataset for Multi-Task CSI Feedback. 1042-1043 - Ayesha Siddiqua, Siming Liu, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink:
TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments. 1044-1045 - Ronald Petrlic, David Stiegler:
Towards Transparency in Email Security. 1046-1047 - Ethan Berei, Muhammad Ajmal Khan, Ahmed Oun:
Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-Time Environment. 1048-1049 - Eri Hosonuma, Taku Yamazaki, Takumi Miyoshi, Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki:
Exploiting Spatial and Descriptive Information for Generative Compression. 1050-1051 - Taku Yamazaki, Tomoyuki Yokoyama, Takumi Miyoshi, Ryo Yamamoto:
Backoff-Based Opportunistic Routing with Concurrent Transmission. 1052-1053 - Faisal Haque Bappy, Tariqul Islam, Tarannum Shaila Zaman, Md Sajidul Islam Sajid, Mir Mehedi Ahsan Pritom:
ConChain: A Scheme for Contention-Free and Attack Resilient BlockChain. 1054-1055 - Safdar Hussain Bouk, Babatunji Omoniwa, Sachin Shetty:
Predicting Downlink Retransmissions in 5G Networks Using Deep Learning. 1056-1057 - Taku Yamazaki, Naoki Maeda, Takumi Miyoshi, Takuya Asaka:
Wireless Point Cloud Streaming Experiment Using IEEE 802.11ax. 1058-1059 - Changi Hong, Jung Hyuk Lee, Moongu Jeon, Hong Kook Kim:
Optimization for Low-Resource Speaker Adaptation in End-to-End Text-to-Speech. 1060-1061 - Shusaku Umeda, Kazuaki Ishioka, Kota Nakamura, Michiya Hayama, Akinori Taira, Akihiro Okazaki:
Heartbeat Interval Estimation Method Using Sub-Terahertz Sensing. 1062-1063 - Ei Tanaka, Yuichi Kawamoto, Nei Kato, Masashi Iwabuchi, Riku Ohmiya, Tomoki Murakami:
Frequency Resource Allocation for IRS-Aided Communication Using Beam Squint Approach. 1064-1065 - Siya Bao, Yiqun Jin:
BERT-Based Prediction Model of Management Sales Forecast Error Using Japanese Firms' Earnings Meeting Transcripts. 1066-1067 - Junichiro Yamada, Katsuya Suto:
Deep Joint Source-Channel Coding with Optimal Compression Rate for mmWave Mobile Image Transmission. 1068-1069 - Yuki Sasaki, Sojin Ozawa, Kabuto Arai, Jin Nakazato, Manabu Tsukada, Kazuki Maruta:
Location-Based Broad-Range Null-Steering in V2X Multiuser MIMO Transmission. 1070-1071 - Yuta Sone, Katsuki Teraoka, Kenta Azuma, Ryoichi Shinkuma, Gabriele Trovato, Koichi Nihei, Takanori Iwai:
Calibration of Real-Time LIDAR Data with Static 3D Image. 1072-1073 - Keita Fukushima, Keiichi Mizutani, Hiroshi Harada:
A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks. 1074-1075 - Ju Yeong Baek, Young-Seok Lee, Bang Chul Jung:
Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication Systems. 1076-1077 - Masaaki Miura, Katsuya Suto:
Performance Analysis for IRS-Assisted SWIPT with Geometry-Based Phase Shift. 1078-1079 - Futo Noda, Gia Khanh Tran:
Proposal of LEO Based Population Estimation System Using Smartphone Emitted WLAN signals. 1080-1081 - Minkyu Oh, Young-Seok Lee, Jeong-Bong Lim, Chang-Ok Kang, Bang Chul Jung:
Hierarchical MUSIC Technique for Direction Finding of Multiple Signal Sources. 1082-1083 - Akihito Noda:
Underwater Large-Area Non-Contact Power Transfer Using Two-Dimensional Waveguide. 1084-1085 - Kotaro Uchida, Mikiya Yoshida, Hiroyuki Koga:
A Study on Semi-Reliable Communications for Real-Time Data Stream Services. 1086-1087 - Ryo Iwaki, Jin Nakazato, Muhammad Asad, Ehsan Javanmardi, Kazuki Maruta, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
Optimizing mmWave Beamforming for High-Speed Connected Autonomous Vehicles: An Adaptive Approach. 1088-1089 - Abiola Adegboyega:
Cloud Storage Workload Characterization: An Approach with Time-Series Analysis. 1090-1091 - Takayuki Nishio, Kojin Yorita, Shoki Ohta, Kota Maejima, Kanare Kodera, Yutaro Horikawa, Kozo Fukui:
Demo: Split Computing-Based Privacy-Preserving Image Classification and Object Detection. 1092-1093 - Kakyeom Jeon, Howon Lee:
Hierarchical Distributed Q-Learning-Based Resource Allocation and UBS Control in SATIN. 1094-1095 - Yerin Lee, Howon Lee:
Resource Allocation and Placement for Tethered Flying Platform-Aided IAB Network: Distributed DQN Approach. 1096-1097 - Jimin Jeon, Howon Lee:
Performance Improvement of Laser-Charged Multi-UAV Networks Based on a DQN Approach. 1098-1099 - Taketo Yasuyama, Mikiya Yoshida, Hiroyuki Koga:
A Study on Bloom Filter-Based Routing Scheme to Reduce Network Overhead in ICN. 1100-1101 - Rikuto Tanaka, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Goshi Sato, Kenichi Takizawa:
Dynamic Transmission Parameter Settings Based on Data Transmission and Reception Performance for 920MHz LoRa Communication. 1102-1103 - Yusuke Takeuchi, Daiki Nobayashi, Takeshi Ikenaga:
Performance Evaluation of the Impact Between IEEE 802.11ah and Private LoRa Using 920 MHz Band. 1104-1105 - Fitsum Debebe Tilahun, Chung G. Kang:
Attention Mechanism-Empowered MADDPG for Distributed Resource Allocation in Cell-Free Mobile Edge Computing. 1106-1107 - Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga:
Accuracy Improvement Method for Malicious Domain Detection Using Machine Learning. 1108-1109 - Kazuma Nonomura, Kui Wang, Gunhee Cho, Hiroki Matsuo, Jin Nakazato, Zongdian Li, Tao Yu, Kei Sakaguchi:
Proof-of-Concept of Digital Twin for Road Safety Assisted by B5G Heterogeneous MEC Network. 1110-1111 - Naoki Tanaka, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga:
Packet Recovery Method with Redundant Packets for Large Spatio-Temporal Data Retention. 1110-1111 - Sifat Rezwan, Juan A. Cabrera, Frank H. P. Fitzek:
Balancing Beyond-Shannon: Demonstration of Functional Compression Using a Balancing Robot. 1112-1113 - Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen, Frank H. P. Fitzek:
Intuitive Robot Control with Data Gloves for Industrial Use Cases. 1114-1115 - Ren Goto, Kazushige Matama, Ryouta Aihata, Michiyo Suda, Hidekazu Suzuki, Katsuhiro Naito:
CYPHONIC Adapter: Enabling Secure P2P Connectivity for Diverse IoT Devices. 1116-1117 - Christopher Lehmann, Yijun Zhu, Andreas Ingo Grohmann, Frank H. P. Fitzek:
Demonstration of Wireless Multi-Path Communication to Improve Reliability. 1118-1119 - Henrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis:
A Demonstration of ALTRUIST for Conducting QoE Subjective Tests in Immersive Systems. 1120-1121 - Xhulio Limani, Nina Slamnik-Krijestorac, Gilson Miranda, Ali Bostani, Xiaoman Shen, Chun Pan, Xingfeng Jiang, Chi Zhang, Johann M. Márquez-Barja:
Demonstrating Wi-Fi Slicing Capabilities for Enhancing Performance of Industrial Applications. 1122-1123 - Vincent Charpentier, Nina Slamnik-Krijestorac, Juan Brenes, Johann M. Márquez-Barja:
Showcasing 5G SA Experimentation Capabilities for Vertical Industries. 1124-1125 - Pascal Urien:
Demonstration of Innovative Trusted TLS-IM Multi-Factor Authentication Token. 1126-1127
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.