


default search action
43rd IPCCC 2024: Orlando, FL, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2024, Orlando, FL, USA, November 22-24, 2024. IEEE 2024, ISBN 979-8-3503-6794-2
- Md Majedul Islam
, Jing Selena He:
A Review on Quantum Machine Learning in Different Computer Vision Fields. 1-2 - Mark Allison
:
Towards A Computational Model for Learning Affective Empathy Responses in Robotic System. 1-7 - James Mariani, Li Xiao:
Computation Caching in Mobile Convolutional Neural Network Inference. 1-8 - Jui Mhatre, Minh Nguyen, Ahyoung Lee, Hoseon Lee:
Experimental Analysis of LoRaWAN for Optimizing Water Quality Monitoring with Reinforcement Learning-Driven Scheduling. 1-6 - Andrew Quijano
, Spyros T. Halkidis, Kevin Gallagher, Kemal Akkaya, Nikolaos Samaras:
Enhanced Outsourced and Secure Inference for Tall Sparse Decision Trees. 1-6 - Jiaxing Guo, Lin He, Ying Liu:
Overlooked Backdoors: Investigating 6to4 Tunnel Nodes and Their Exploitation in the Wild. 1-8 - Rohit Sahu, Vishal Deep, Henry Duwe
:
HANNA: Harvesting-Aware Neural Network Architecture Search for Batteryless Intermittent Devices. 1-10 - Yong Yuan, Ziling Wei, Lin Liu, Shuhui Chen, Jinshu Su:
AST-Trans: Detecting Web Tracking using Transformer-based Deep Learning with Abstract Syntax Tree. 1-7 - Xinyue Xu, Baosheng Wang, Qianqian Xing, Xiaofeng Wang:
CART: Concurrent Asynchronous Ratchet Tree for Group Messaging. 1-9 - Ziqian Chen, Wei Xia, Zhen Li, Gang Xiong, Gaopeng Gou:
RecoSelector: Cost-Sensitive Feature Selection for Network Intrusion Detection in Resource-Constrained Internet of Things. 1-10 - Xingchen Wei, Laixian Peng, Renhui Xu, Hai Wang:
Learning-Empowered Resource Allocation in UxNB-Enabled Sliced HetECNs. 1-6 - Ying Zhou, Mingzhen Wu, Fei Song:
Correlation Analysis for Exploring Large-Scale Latency Variability in WANs. 1-6 - Bo Yu, Qihong Song, Chengnuo Cai:
Large Language Model guided State Selection Approach for Fuzzing Network Protocol. 1-6 - Mohammad Al-Tahat, Strahinja Trecakov, Jonathan E. Cook:
Statistical and Shapelet Analysis of HPC Application Performance Using Time-Series Heartbeat Data. 1-9 - Xinxuan Hang, Quan Zheng, Wenjing Jing, Qisheng Su, Feng Yang, Xiaobin Tan:
Adaptive Cache Optimization Integrating Spatiotemporal Analysis and Sliding Modules. 1-8 - Niladri Mondal, Mario Niggemeyer, Simon Welzel, Florian Klingler:
DecMEN: Scalable Measurement and Impairment Framework for Network Characterization in 5G(+). 1-6 - Mehmed K. Uludag, Murat Karakus, Evrim Guler, Suleyman Uludag
:
Adaptive Mitigation of Blackhole Attacks in Blockchain-Enhanced Software Defined Networks. 1-8 - Simon Welzel, Florian Klingler:
Bad Neighbors? On the Impact of IEEE 802.11p and Cellular 5G on Vehicular Neighbor Sets. 1-2 - Sonali Keshava Murthy Naik, Mea Wang, Diwakar Krishnamurthy:
TYLE: Tile-based Dynamic Quality Enhancement for 360-degree Video Streaming. 1-8 - Lin Liu, Ziling Wei, Shuhui Chen, Zixuan Dong, Jinshu Su:
FingerMamba: Mamba-based Efficient Multi-tab Website Fingerprinting. 1-9 - Han Li, Ke Lyu, Owen Dossett, Xianglong Feng:
A Multimodal Method for Semi-Biometric Information Based User Identification in AR and VR Applications. 1-7 - Jussif J. Abularach Arnez, Isaac Barros Gomes, Fabrício Falcáo de Souza Oliveira, Lucas Cavalcante Tribuzy, Caio Pedrosa Galvao, Jessica Da Silva Gomes:
Analysis of Intermediate Mean Opinion Score (MOS) and QoS in a High Definition Voice Call Conference in Mobile Networks. 1-2 - Zhaowen Chen, Mingze Zhang, Caleb Mostyn, Honglu Jiang
, Xianglong Feng:
Curse to Blessing: Leveraging Model Inversion Attacks to Detect Backdoor Attacks in Federated Learning. 1-9 - Ilke Kutlu, Quentin Goss, Tahir Cetin Akinci, Mustafa Ilhan Akbas:
Formal Modeling of Road Network-Based Autonomous Vehicle Validation Scenarios With Intersections and Pedestrians. 1-6 - Tao Tian:
SndGLM-SA: A Social Network Debate Text Generation Model Based on Sentiment Analysis. 1-6 - David Monschein, Oliver P. Waldhorst:
HEJet: A Framework for Efficient Machine Learning Inference with Homomorphic Encryption. 1-10 - Amin Sarihi, Ahmad Patooghy, Abdel-Hameed A. Badawy, Peter Jamieson:
The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection. 1-8 - Chenming Chang
, Jiawei Li, Yucheng Kang, Yupeng Chen, Yi Zhang:
Resd: High-Performance RDMA-enabled Control Plane for NVMe Shared-Disk Cluster. 1-7 - Yacoub Hanna, Diana Pineda, Maryna Veksler, Manish Paudel, Kemal Akkaya, Mila Anastasova, Reza Azarderakhsh:
Integrating Post-Quantum TLS into the Control Plane of 5G Networks. 1-8 - Akito Yamamoto
, Tetsuo Shibuya:
Differentially Private Selection using Smooth Sensitivity. 1-10 - Jiawei Huang, Qi Liang, Jing Shao, Qile Wang, Yilin Zhao, Hui Li, Sitan Li, Shu Lin:
P2Sketch: Finding Persistent Items in Data Streams Based on Periodic Arrival. 1-8 - Chiyu Chen, Yuliang Lu, Guozheng Yang, Yi Xie, Shasha Guo:
ZBanner: Fast Stateless Scanning Capable of Obtaining Responses over TCP. 1-6 - Zekun Zhang, Lujie Zhong, Xiang Ji:
FlexMRS: Multi-Objective Optimization for Diverse Application Requirements in MPTCP Scheduling. 1-2 - Manh V. Nguyen, Liang Zhao, Bobin Deng, William Severa, Honghui Xu, Shaoen Wu:
The Robustness of Spiking Neural Networks in Communication and its Application towards Network Efficiency in Federated Learning. 1-7 - Xuetao Liu, Jing Shao, Sitan Li, Yilin Zhao, Jiawei Huang:
PIB Sketch: Accurately Tracking Persistent and Infrequent Flows with Bursty Characteristic. 1-8 - Zhenchao Yan, Songlin He, Chase Wu, Aiqin Hou:
Optimized Deliverer Selection in Blockchain-Based P2P Content Delivery Networks. 1-8 - Kuai Xu, Feng Wang, Mitchell Hoikka:
Less is More: Exploring Sampled Twitter Data Steams for Pandemic Surveillance and Monitoring. 1-6 - Mingxuan Li, Jinbao Li, Yingchun Cui:
A Dexterous Hybrid Attention Transformer For MRI Super-resolution Of Brain Tumors. 1-8 - Jiasheng Liang, Siyu Zhang, Yong Deng:
Optimization of Heterogeneous Coded Distributed Computing with Nonuniform Input File Sizes. 1-2 - Robin Laidig, Jona Herrmann, David Augustat, Frank Dürr, Kurt Rothermel:
Combining Dynamic Deterministic Latency Bounds and Networked Control Systems. 1-9 - J. J. Garcia-Luna-Aceves, Morteza Moghaddassian, Charles Hsieh:
Spreading Computations for Loop-Free Multipath Routing in Computer Networks. 1-10 - Meng Zeng, Yujia Zhu, Baiyang Li, Yuedong Zhang, Qingyun Liu, Binxing Fang:
Failed Yet Stored: A First Look at DNS Negative Caching. 1-10 - Lamya Benaddi, Charaf Ouaddi
, Abdeslam Jakimi, Rachid Saadane, Brahim Ouchao, Mohamed Rahouti, Abdelatif Hafid, Diogo Oliveira:
An Analytical Study on the Evolution and Impact of Chatbots in Tourism Over the Past Decade. 1-6 - Shuo Zhang, Luoyao Hao, Henning Schulzrinne:
Policy Enforcement for IoT: Complexities and Emerging Solutions. 1-2 - Anice Kiarra Thompson, Dev D. Patel, M. Ilhan Akbas:
Formulating a Comprehensive Cybersecurity Framework for Uncrewed Aerial Vehicles. 1-6 - Shelby Williams, Prosen Kirtonia, Kasem Khalil, Magdy A. Bayoumi:
Digital-Twin Architecture of a Spiking Neuron using Carbon Nanotube Field Effect Transistors. 1-6 - James Agresto, Zhuojun Duan, Mace Bentley, Tobias Gerken, Dudley Bonsal:
Spatiotemporal-DBSCAN: A Density-Based Clustering Method for Analyzing Spatiotemporal Ground-lightning Dataset. 1-2 - Mengxia Ren, Chuan Yue:
Content Security Policy Deployment Issues Related to Third-party Scripts among Builder-generated Websites and Other Websites. 1-10 - Guangzhen Yao
, Long Zhang, Sandong Zhu, Miao Qi:
DP-Prune: Global Optimal Strategy for Retraining-Free Pruning of Transformer Models. 1-6 - Shuailou Li, Yu Wen, Zhaoyang Wang, Wenbo Wang, Lisong Zhang, Dan Meng:
StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy. 1-10 - Haikuo Li, Gang Xiong, Chengshang Hou, Gaopeng Gou, Ziqian Chen, Zhen Li:
Smart Contract Vulnerability Detection Based on AST-Augmented Heterogeneous Graphs. 1-10 - Ye Xia:
Optimal Sequencing for a Class of Task Offloading Problems in Edge-Cloud Computing. 1-8 - Shiqi Zhao, Xiaohong Huang, Pei Zhang:
Locating the Root Cause of Large-scale BGP Anomaly with Routing Dependence. 1-7 - Asad Waqar Malik, Samee U. Khan:
Dynamic Task Offloading in Connected Vehicles: Leveraging a Graph Neural Networks Approach for Multi-hop Search. 1-8 - Md. Romyull Islam, Nobel Dhar, Bobin Deng, Tu N. Nguyen, Selena He, Kun Suo:
Characterizing and Understanding the Performance of Small Language Models on Edge Devices. 1-10 - Nobel Dhar, Bobin Deng, Md. Romyull Islam, Kazi Fahim Ahmad Nasif, Liang Zhao, Kun Suo:
Activation Sparsity Opportunities for Compressing General Large Language Models. 1-9 - Haoran Jiang, Yehua Wei, Wenjia Li, Jiangwei Li:
Lightweight Secure Communication Scheme Based on PUF for In-vehicle Controller Area Networks. 1-8 - Abdelatif Hafid, Maad Ebrahim, Mohamed Rahouti, Diogo Oliveira:
Cryptocurrency Price Forecasting Using XGBoost Regressor and Technical Indicators. 1-6 - Yikai Zhao, Yuanpeng Li, Zicang Xu, Tong Yang, Kaicheng Yang, Li Chen, Xin Yao, Gong Zhang:
Fat-B+Tree: Fast B+tree Indexing with In-Network Memory. 1-10 - Yunlan Wang, Qing Wang, Tianhai Zhao, YongKuo Hu, Jianhua Gu, Zhengxiong Hou:
Stochastic Network Calculus Based Quality of Service Guarantee for Multi-class Traffic. 1-9 - Tao Yang, Wang Yang, Yanbo Wang, Lihuan Hui, Jianwei Yao:
SARP: Service-Aware Routing Protocol in Task-Oriented FANET. 1-8 - Alireza Famili, Shihua Sun, Tolga O. Atalay, Angelos Stavrou:
Precision Tracking in Geofencing Systems using Deep Reinforcement Learning. 1-10 - Fei Li:
Algorithms for the Generalized Network Construction Problem. 1-6 - DongJin Lee, Seongsu Park, BumJun Lee:
Dynamic Traffic Load Rebalancing for Hardware-accelerated 6G UPF Resilient Architecture. 1-7 - Heeyun Kim, Wei Xiong Toh, Luoyao Hao, Henning Schulzrinne:
Wital: A Whitelist-Based IoT Firewall for Mitigating Device Exploitation. 1-2 - Zefu Wang, Zhenzhe Zheng, Fan Wu:
CAUDA: Cloud-assisted Active Unsupervised Domain Adaptation for On-device Learning. 1-7 - Jiewen Liu, Zhiyuan Peng, Dongkuan Xu, Yuchen Liu:
Revolutionizing Wireless Modeling and Simulation with Network-Oriented LLMs. 1-8 - Dinghua Zhao, Juntao Zhou, Dian Ding, Yu Lu, Yijie Li, Hang Yang, Yi-Chao Chen, Guangtao Xue:
DASIV: Directional Acoustic Sensing based Intelligent Vehicle Interaction System. 1-8 - Haizhang Zhu, Zhongyi Zhang, Zhou Zhou, Chengwei Peng, Hongfei Zhang, Shu Li, Rong Yang, Qingyun Liu:
P4-FILB: Stateless Load Balancing Mechanism in Firewall and IPv6 Environment with P4. 1-8 - Xiao Yue, Guangzhi Qu:
LSAFE: a Lightweight Static Analysis Framework for binary Executables. 1-6 - Visvam Rajesh, Chase Q. Wu:
An Extension of Pathfinding Algorithms for Randomly Determined Speeds. 1-8 - Mohamed R. Elshamy, Mehdi Elahi, Ahmad Patooghy, Abdel-Hameed A. Badawy:
Cluster-BPI: Efficient Fine-Grain Blind Power Identification for Defending against Hardware Thermal Trojans in Multicore SoCs. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.