default search action
25th ISCC 2020: Rennes, France
- IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020. IEEE 2020, ISBN 978-1-7281-8086-1
- Zhong Guan, Gang Xiong, Zhen Li, Gaopeng Gou:
ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation. 1-6 - Rui Lebre, Eduardo Pinho, Jorge Miguel Silva, Carlos Costa:
Dicoogle Framework for Medical Imaging Teaching and Research. 1-7 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:
MOP: A Novel Mobility-Aware Opportunistic Routing Protocol for Connected Vehicles. 1-6 - Meng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. 1-7 - Panagiotis Fountas, Kostas Kolomvatsos:
A Continuous Data Imputation Mechanism based on Streams Correlation. 1-6 - Thiago José Barbosa Lima, Flávio Henrique Duarte de Araújo, Antonio Oseas de Carvalho Filho, Ricardo de Andrade Lira Rabelo, Rodrigo de Melo Souza Veras, Mano Joseph Mathew:
Evaluation of data balancing techniques in 3D CNNs for the classification of pulmonary nodules in CT images. 1-6 - Dyego H. L. Oliveira, Francisco M. V. Filho, Thelmo P. de Araújo, Joaquim Celestino Jr., Rafael L. Gomes:
Adaptive Model for Network Resources Prediction in Modern Internet Service Providers. 1-6 - Guillaume Le Gall, Nicolas Montavont, Georgios Z. Papadopoulos:
Enabling IEEE 802.15.4-2015 TSCH based Wireless Network for Electric Vehicle Battery Management. 1-6 - Miguel Ribeiro, Valentina Nisi, Catia Prandi, Nuno Nunes:
A data visualization interactive exploration of human mobility data during the COVID-19 outbreak: a case study. 1-6 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:
Hierarchical Path Computation With Flexible Ethernet In Multi-layer Multi-domain Networks. 1-6 - Anderson M. Maliszewski, Eduardo Roloff, Emmanuell D. Carreño, Dalvan Griebler, Luciano Paschoal Gaspary, Philippe O. A. Navaux:
Performance and Cost-aware HPC in Clouds: A Network Interconnection Assessment. 1-6 - Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang, Xingyu Zhou:
The Understanding and Forecast of AS-Level Anycast Path Inflation. 1-7 - Antonio Corradi, Giuseppe Di Modica, Luca Evangelisti, Anna Fiorini, Luca Foschini, Luca Zerbini:
HS-AUTOFIT: a highly scalable AUTOFIT application for Cloud and HPC environments. 1-6 - Shie-Yuan Wang, Jui-En Chang, Hsin Fan, Yi-Hsiu Sun:
Performance Comparisons of NB-IoT, LTE Cat-M1, Sigfox, and LoRa Moving at High Speeds in the Air. 1-6 - Rongchun Li, Xin Zhou, Hengyue Pan, Huayou Su, Yong Dou:
A High-Throughput LDPC Decoder Based on GPUs for 5G New Radio. 1-7 - Cristopher G. S. Freitas, Osvaldo Anibal Rosso, André L. L. de Aquino:
Mapping Network Traffic Dynamics in the Complexity-Entropy Plane. 1-6 - Edvar Afonso, Miguel Elias M. Campista:
Opportunistic Data Gathering in IoT Networks using Discrete Optimization. 1-6 - Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. 1-7 - Caitlin Facchina, Arunita Jaekel:
Speed Based Distributed Congestion Control Scheme for Vehicular Networks. 1-4 - Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin:
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation. 1-7 - Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network. 1-6 - Linda Senigagliesi, Gianluca Ciattaglia, Ennio Gambi:
Contactless Walking Recognition based on mmWave RADAR. 1-4 - Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallègue:
A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient's WMSN. 1-6 - Christian Lübben, Marc-Oliver Pahl, Mohammad Irfan Khan:
Using Deep Learning to Replace Domain Knowledge. 1-6 - Masaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata, Bo Sun, Takeshi Takahashi:
Automation of Vulnerability Classification from its Description using Machine Learning. 1-7 - Jiaxian Wu, Shuangjuan Li, Qiong Huang:
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks. 1-6 - Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi:
SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware Detector. 1-7 - Li Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin:
PIV4DB: Probabilistic Integrity Verification for Cloud Database. 1-7 - Imane Taibi, Yassine Hadjadj Aoul, Chadi Barakat:
Data Driven Network Performance Inference From Within The Browser. 1-6 - Lucas Martins Figueiredo, Edelberto Franco Silva:
Cognitive-LoRa: adaptation-aware of the physical layer in LoRa-based networks. 1-6 - Eder Paulo Pereira, Edson Luiz Padoin, Roseclea Duarte Medina, Jean-François Méhaut:
Increasing the efficiency of Fog Nodes through of Priority-based Load Balancing. 1-6 - Furkan Koltuk, Ece Güran Schmidt:
A Novel Method for the Synthetic Generation of Non-I.I.D Workloads for Cloud Data Centers. 1-6 - Karla K. Hashiguchi, Bruno de F. Gai, Daniel F. Pigatto, Keiko V. O. Fonseca:
Exploratory Analysis of Public Transportation Data of Curitiba, Brazil. 1-6 - Shitong Cheng, Zhenghui Xu, Xiuhua Li, Xiongwei Wu, Qilin Fan, Xiaofei Wang, Victor C. M. Leung:
Task Offloading for Automatic Speech Recognition in Edge-Cloud Computing Based Mobile Networks. 1-6 - Claudio Badii, Stefano Bilotta, Daniele Cenni, Angelo Difino, Paolo Nesi, Irene Paoli, Michela Paolucci:
Real-Time Automatic Air Pollution Services from IOT Data Network. 1-6 - Vincent Savaux, Luc Le Magoarou:
On the Computation of Integrals of Bivariate Gaussian Distribution. 1-6 - JiChu Jiang, Murat Simsek, Burak Kantarci, Shahzad Khan:
High Precision Deep Learning-Based Tabular Position Detection. 1-7 - Lars Wüstrich, Marc-Oliver Pahl, Stefan Liebald:
Towards an Extensible IoT Security Taxonomy. 1-6 - Amira Chriki, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
UAV-based Surveillance System: an Anomaly Detection Approach. 1-6 - Tariq Benmansour, Samira Moussaoui, Toufik Ahmed, Oussama Boutaghou:
Server-Based Secure Key Management for the IEEE 802.15.6 standard. 1-6 - Jin Xu, Zishan Li, Bowen Du, Miaomiao Zhang, Jing Liu:
Reluplex made more practical: Leaky ReLU. 1-7 - Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. 1-7 - Lili Zhu, Petros Spachos:
Food Grading System Using Support Vector Machine and YOLOv3 Methods. 1-6 - Ce Chi, Kaixuan Ji, Avinab Marahatta, Fa Zhang, Youshi Wang, Zhiyong Liu:
An Incentive Mechanism for Improving Energy Efficiency of Colocation Data Centers Based on Power Prediction. 1-6 - Ping Peng, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC. 1-7 - Lucas Pacheco, Helder M. N. S. Oliveira, Denis do Rosário, Eduardo Cerqueira, Leandro Villas, Torsten Braun:
Service Migration for Connected Autonomous Vehicles. 1-6 - Chengshang Hou, Gaopeng Gou, Junzheng Shi, Peipei Fu, Gang Xiong:
WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning. 1-7 - Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini:
Binding of Endpoints to Identifiers by On-Chain Proofs. 1-6 - Andrea Sciandra:
COVID-19 Outbreak through Tweeters' Words: Monitoring Italian Social Media Communication about COVID-19 with Text Mining and Word Embeddings. 1-6 - Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
On the Applicability of Secret Share Algorithms for Osmotic Computing. 1-6 - Ali Malik, Ruairí de Fréin:
A Proactive-Restoration Technique for SDNs. 1-6 - Liam Hickey, Martin Harrigan:
The Bisq DAO: On the Privacy Cost of Participation. 1-6 - Jean Moraes, Nagib Matni, André Riker, Helder M. N. S. Oliveira, Eduardo Cerqueira, Cristiano Both, Denis do Rosário:
An Efficient Heuristic LoRaWAN Adaptive Resource Allocation for IoT Applications. 1-6 - Kais Bouallegue, Matthieu Crussière, Sofiane Kharbech:
SVM Assisted Primary User-Detection for Non-Cooperative Cognitive Radio Networks. 1-5 - Tales Lopes, Victor Ströele, Mario A. R. Dantas, Regina Braga, Jean-François Méhaut:
A Parallel Graph Partitioning Approach to Enhance Community Detection in Social Networks. 1-6 - Zhilei Liu, Tao Lin, Liang Dai, Jiyan Sun, Yanjie Hu, Yan Zhang, Zhen Xu:
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks. 1-7 - Sanaz Gheibi, Tania Banerjee, Sanjay Ranka, Sartaj Sahni:
Cache Efficient Louvain with Local RCM. 1-6 - Beakal Gizachew Assefa, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily, Ouns Bouachir:
Energy Efficiency in SDDC: Considering Server and Network Utilities. 1-6 - Amaury Bouchra Pilet, Davide Frey, François Taïani:
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service. 1-6 - Diego A. B. Moreira, Levy G. Chaves, Rafael L. Gomes, Joaquim Celestino Jr.:
An E-Health system for data stream analysis. 1-6 - Ahmed Alioua, Samiha Simoud, Sihem Bourema, Manel Khelifi, Sidi-Mohammed Senouci:
A Stackelberg Game Approach for Incentive V2V Caching in Software-Defined 5G-enabled VANET. 1-6 - Candong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong, Zhen Li, Li Guo:
MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection. 1-7 - Chunjing Han, Kunkun Sun, Haina Tang, Yulei Wu, Xiaodan Zhang:
AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables. 1-7 - Christelle Caillouet, Martin Heusse, Franck Rousseau:
Bringing Fairness in LoRaWAN through SF Allocation Optimization. 1-6 - Riqiang Liu, Melike Erol-Kantarci:
Dynamic Routing with Online Traffic Estimation for Video Streaming over Software Defined Networks. 1-6 - Yara Mahfood Haddad, Hesham H. Ali:
A Dynamic Approach for Managing Heterogeneous Wireless Networks in Smart Environments. 1-7 - Evangelos Boutas, Charalambia Boulougari, Vasileios Anastasopoulos, Ismini Veneti, George Kousiouris:
A cloud-based REST platform for real-time health resources availability registering, discovering and matching in pandemic crisis conditions. 1-6 - Lucas Zanco Ladeira, Allan Mariano de Souza, Heitor S. Ramos, Leandro Aparecido Villas:
GIN: Better going safe with personalized routes. 1-6 - Federica Cavaliere, Antonio Della Cioppa, Angelo Marcelli, Antonio Parziale, Rosa Senatore:
Parkinson's Disease Diagnosis: Towards Grammar-based Explainable Artificial Intelligence. 1-6 - Anandhakumar Palanisamy, Mirsat Sefidanoski, Spiros Koulouzis, Carlos Rubia, Nishant Saurabh, Radu Prodan:
Decentralized Social Media Applications as a Service: a Car-Sharing Perspective. 1-7 - Stefan Ciprian Voinea, Armir Bujari, Claudio Enrico Palazzi:
Air Quality Control through Bike Sharing Fleets. 1-4 - Alessandro Piccoli, Marc-Oliver Pahl, Lars Wüstrich:
Group Key Management in constrained IoT Settings. 1-6 - Zijin Chen, Hui Tian, Gaofeng Nie, Baoling Liu:
AWMF: All-Weighted Metric Factorization for Collaborative Ranking. 1-6 - Francesca Bassi, Hatem Ibn-Khedher:
HARQ-aware allocation of computing resources in C-RAN. 1-6 - Alkhansaa A. Abuhashim, Chiu C. Tan:
Smart Contract Designs on Blockchain Applications. 1-4 - Mirko Zichichi, Stefano Ferretti, Gabriele D'Angelo:
On the Efficiency of Decentralized File Storage for Personal Information Management Systems. 1-6 - Marek Barczyk, Andrzej Chydzinski:
Experimental testing of the performance of packet dropping schemes. 1-7 - Edson Rodrigues, Denis do Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira:
Routing, Modulation, Spectrum and Core Allocation Based on Mapping Scheme. 1-6 - Itamir de Morais Barroca Filho, Silvio Costa Sampaio, Anderson Paiva Cruz, Victor Hugo Freire Ramalho, Jefferson Augusto Rodrigues de Azevedo, Átila Caetano da Silveira:
A Web-based Information System for the Management of ICU Beds During the Coronavirus Outbreak. 1-4 - Min He, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9. 1-6 - Olasupo Ajayi, Antoine B. Bagula, Ifeoma Chukwubueze, Hloniphani Maluleke:
Priority Based Traffic Pre-emption System for Medical Emergency Vehicles in Smart Cities. 1-7 - Brice Leblanc, Hacène Fouchal, Cyril de Runz:
Obstacle Detection based on Cooperative-Intelligent Transport System Data. 1-6 - Li Zhang, Shukui Zhang, Yang Zhang, Wei Tuo, Ye Tao, Mengli Dang:
Task Distribution Based on Variable-Order Markov Position Estimation in Mobile Sensor Networks. 1-7 - Joseph Azar, Abdallah Makhoul, Raphaël Couturier:
Using DenseNet for IoT multivariate time series classification. 1-6 - Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. 1-7 - Wei Cai, Gaopeng Gou, Peipei Fu, Minghao Jiang, Zhen Li, Gang Xiong:
JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion. 1-7 - Maria Fazio, Alina Buzachis, Antonino Galletta, Antonio Celesti, Massimo Villari:
A proximity-based indoor navigation system tackling the COVID-19 social distancing measures. 1-6 - Carlos Pedroso, Yan Uehara de Moraes, Michele Nogueira, Aldri Santos:
Managing Consensus-Based Cooperative Task Allocation for IIoT Networks. 1-6 - Tania Alhajj, Xavier Lagrange:
Reliability and Low Latency: Impact of The Architecture. 1-6 - Yu-Chen Chen, Yi-Wei Ma, Jiann-Liang Chen:
Intelligent Malicious URL Detection with Feature Analysis. 1-5 - Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
Survey on the Cloud-IoT paradigms: Taxonomy and architectures. 1-6 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Identifying Impacts of Protocol and Internet Development on the Bitcoin Network. 1-6 - Stefano Silvestri, Francesco Gargiulo, Mario Ciampi, Giuseppe De Pietro:
Exploit Multilingual Language Model at Scale for ICD-10 Clinical Text Classification. 1-7 - Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks. 1-6 - Francesco Bruschi, Manuel Tumiati, Vincenzo Rana, Mattia Bianchi, Donatella Sciuto:
A Decentralized System for Fair Token Distribution and Seamless Users Onboarding. 1-6 - Mateus Gonçalo do Nascimento, Gabriel Iorio, Thiago G. Thomé, Álvaro Augusto M. de Medeiros, Fabricio Martins Mendonça, Fernanda C. A. Campos, José Maria N. David, Victor Ströele, Mario A. R. Dantas:
Covid-19: A Digital Transformation Approach to a Public Primary Healthcare Environment. 1-6 - Ivan Martinez, Fabienne Nouvel, Samer Lahoud, Philippe Tanguy, Melhem El Helou:
On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming. 1-7 - Zhen Cao, Yu-e Sun, He Huang, Hansong Guo, Yang Du, An Liu, Le Lu:
Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems. 1-7 - Ana Czarnitzki Estrin, Tomás Lagos Jenschke, Georgios Z. Papadopoulos, J. Ignacio Alvarez-Hamelin, Nicolas Montavont:
Thorough Investigation of multipath Techniques in RPL based Wireless Networks. 1-7 - Roberto Gonçalves Pacheco, Rodrigo S. Couto:
Inference Time Optimization Using BranchyNet Partitioning. 1-6 - Daniele Berardini, Lucia Migliorelli, Sara Moccia, Marcello Naldini, Gioia De Angelis, Emanuele Frontoni:
Evaluating the autonomy of children with autism spectrum disorder in washing hands: a deep-learning approach. 1-7 - Marc Jayson Baucas, Petros Spachos:
Fog and IoT-based Remote Patient Monitoring Architecture Using Speech Recognition. 1-6 - Daniel Carvalho, Laécio Rodrigues, Patricia Takako Endo, Sokol Kosta, Francisco Airton Silva:
Mobile Edge Computing Performance Evaluation using Stochastic Petri Nets. 1-6 - Nikita Karandikar, Antorweep Chakravorty, Chunming Rong:
RenewLedger : Renewable energy management powered by Hyperledger Fabric. 1-6 - Dali Zhu, Long Yang, Zhanxun Li, Hualin Zeng:
Remote Speech Extraction from Speckle Image by Convolutional Neural Network. 1-6 - Ali Malik, Ruairí de Fréin:
SLA-Aware Routing Strategy for Multi-Tenant Software-Defined Networks. 1-7 - Yazid M. Khattabi, Salim Abdelkareem Alkhawaldeh:
Spatial Modulation under Vehicular Rayleigh Fading Channels. 1-6 - Miguel Silva, Miguel Luís, Susana Sargento:
Edge Virtualization in Multihomed Vehicular Networks. 1-6 - Armando Ruggeri, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari:
A Decision Support System for Therapy Prescription in a Hospital Centre. 1-4 - Mariana Rodrigues, Daniel F. Pigatto, Kalinka R. L. J. C. Branco:
Context-Aware Operation for Unmanned Systems with HAMSTER. 1-6 - Antoine B. Bagula, Hloniphani Maluleke, Olasupo Ajayi, Amani Bagula, Nancy Bagula, Moise Bagula:
Predictive Models for Mitigating COVID-19 Outbreak. 1-7 - Giacomo Mambelli, Catia Prandi, Silvia Mirri:
What influences sentiment analysis on social networks: a case study. 1-6 - Xiren Ma, Azzedine Boukerche:
An AI-based Visual Attention Model for Vehicle Make and Model Recognition. 1-6 - Murat Simsek, Burak Kantarci, Azzedine Boukerche:
Knowledge-Based Machine Learning Boosting for Adversarial Task Detection in Mobile Crowdsensing. 1-7 - Giusy Esposito, Giulio Pagliari, Gianluca Coppola, Marco Aiello, Marco Salvatore, Giuseppe Aceto, Antonio Pescapè:
A network performance view of a biobanking system for diagnostic images. 1-7 - Marco Furini, Silvia Mirri, Manuela Montangero, Catia Prandi:
Untangling between fake-news and truth in social media to understand the Covid-19 Coronavirus. 1-6 - Xin Fang, Xiaoqing Sun, Jiahai Yang, Xinran Liu:
Domain-Embeddings Based DGA Detection with Incremental Training Method. 1-6 - Thiago Garrett, Luis C. E. Bona, Elias P. Duarte Jr.:
Exploiting AS-level Routing Properties to Locate Traffic Differentiation in the Internet. 1-6 - Mustafa Çaglar Güldiken, Ece Güran Schmidt, Klaus Werner Schmidt:
Telegram Scheduling for the Multifunction Vehicle Bus (MVB): Algorithms and Evaluation. 1-6 - Karim Sonbol, Öznur Özkasap, Ibrahim Al-Oqily, Moayad Aloqaily:
EdgeKV: Distributed Key-Value Store for the Network Edge. 1-6 - Adrian E. Sapio, Shuvra S. Bhattacharyya, Marilyn Wolf:
Efficient Model Solving for Markov Decision Processes. 1-5 - Siyuan Lu, Shengjie Zhao, Qingjiang Shi:
Block-Diagonal Zero-Forcing Beamforming for Weighted Sum-Rate Maximization in Multi-User Massive MIMO Systems. 1-6 - Songyang Li, Aimin Wang, Geng Sun, Lingling Liu:
Improving charging performance for wireless rechargeable sensor networks based on charging UAVs: a joint optimization approach. 1-7 - Yazan Otoum, Amiya Nayak:
On securing IoT from Deep Learning perspective. 1-7 - Augusto C. Ferreira, Natassya B. F. Silva:
Comparison of secure communication with AES between embedded system and general purpose computer. 1-6 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Trail: A Blockchain Architecture for Light Nodes. 1-7 - Rui Carvalho, Diogo Machado, Pedro Brandão:
Gamification, mHealth and user adherence. 1-6 - Murat Akpinar, Ece Güran Schmidt, Klaus Werner Schmidt:
Drift Correction for the Software-based Clock Synchronization on Controller Area Network. 1-6 - Tangui Le Gléau, Xavier Marjou, Tayeb Lemlouma, Benoit Radier:
Game Theory Approach in Multi-agent Resources Sharing. 1-6 - Francis B. Moreira, Danilo Carastan-Santos, Philippe O. A. Navaux:
Attesting L-3 General Program Anomaly Detection Efficiency with SPADA. 1-6 - Dali Zhu, Jie Liang, Haitao Liu, Heng Ping, Ting Li, Hangsheng Zhang, Liru Geng, Yinlong Liu:
A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing. 1-6 - Mónica Marques, Carlos R. Senna, Susana Sargento:
Evaluation of Strategies for Emergency Message Dissemination in VANETs. 1-6 - Carlos Renato Storck, Fátima de L. P. Duarte-Figueiredo:
A Performance Analysis of Adaptive Streaming Algorithms in 5G Vehicular Communications in Urban Scenarios. 1-7 - Ioannis Mavromatis, Robert J. Piechocki, Mahesh Sooriyabandara, Arjun Parekh:
DRIVE: A Digital Network Oracle for Cooperative Intelligent Transportation Systems. 1-7 - Dali Zhu, Yuchen Ma, Yinlong Liu:
Anomaly Detection with Deep Graph Autoencoders on Attributed Networks. 1-6 - Ali Ebrahimi, Uffe Kock Wiil, Kjeld Andersen, Marjan Mansourvar, Anette Søgaard Nielsen:
A Predictive Machine Learning Model to Determine Alcohol Use Disorder. 1-7 - Huda Aldosari, Raafat S. Elfouly, Reda Ammar, Mohammad Alsulami:
Performance of New Monitoring Architectures for Underwater Oil/Gas Pipeline using Hyper-Sensors. 1-6 - Bing Huang, Shouling Dong:
An Enhanced Scheduling Framework for Elephant Flows in SDN-Based Data Center Networks. 1-7 - Isadora Garcia Ferrão, Daniel F. Pigatto, João V. C. Fontes, Natassya B. F. Silva, David Espes, Catherine Dezan, Kalinka R. L. J. C. Branco:
STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack. 1-6 - Carlos Renato Storck, Guilherme G. de O. Silva, Fátima de L. P. Duarte-Figueiredo:
A Vehicle-Centric Probabilistic Approach to Virtual Cell Management in Ultra-Dense 5G Networks. 1-7 - David Hauweele, Remous-Aris Koutsiamanis, Bruno Quoitin, Georgios Z. Papadopoulos:
Pushing 6TiSCH Minimal Scheduling Function (MSF) to the Limits. 1-7 - Fabien Geyer, Steffen Bondorf:
On the Robustness of Deep Learning-predicted Contention Models for Network Calculus. 1-7 - Juan Luis Herrera, Luca Foschini, Jaime Galán-Jiménez, Javier Berrocal:
The Service Node Placement Problem in Software-Defined Fog Networks. 1-6 - Yue Han, Mingwu Yao, Jungang Yang, Yongjian Luo, Xuefang Liu:
On Scalable Delay Bound Evaluation with Stochastic Network Calculus. 1-6 - Berrak Perk, Can Bayraktaroglu, Engin Deniz Dogu, Faizan Safdar Ali, Öznur Özkasap:
Joulin: Blockchain-based P2P Energy Trading Using Smart Contracts. 1-6 - Hicham Lakhlef, Ghada Jaber, Abdelmadjid Bouabdallah, Fabio D'Andreagiovanni, Ahmed Lounis:
Distributed Time Slots Assignment Protocol in Dynamic Networks. 1-6 - Aymen Shaafi, Osman Salem, Ahmed Mehaoua:
Improving the Recognition of Sign Language from Acquired Data by Wireless Body Area Network. 1-6 - Tayeb Lemlouma:
Adaptive Sensing Algorithm for IoT Applications with Data and Temporal Accuracy Requirements. 1-7 - Antonio Celesti, Fabrizio Celesti, Antonino Galletta, Maria Fazio, Massimo Villari:
Improving Machine Learning Algorithm Processing Time in Tele-Rehabilization Through a NoSQL Graph Database Approach: A Preliminary Study. 1-6 - Zhao Ming, Chuan Sun, Xiuhua Li, Qilin Fan, Xiaofei Wang, Victor C. M. Leung:
Ensemble Learning Based Sleeping Cell Detection in Cloud Radio Access Networks. 1-6 - Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Shaohua An, Weiqing Huang:
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. 1-7 - Ceren Canpolat, Ece Güran Schmidt:
Dynamic User Count Aware Resource Allocation for Network Slicing in Virtualized Radio Access Networks. 1-6 - Wenzheng Liu, Xiaofeng Wang, Wei Peng:
NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment. 1-6 - Jiang Zhou, Hewu Li, Qian Wu, Zeqi Lai, Jun Liu:
SR-TPP: Extending IPv6 Segment Routing to enable Trusted and Private Network Paths. 1-6 - Wenying Dai, Hewu Li, Qian Wu, Xiaomo Wang:
NDM: Network Driving IP Mobility Support in Large Scale LEO Satellite Network. 1-7 - Thibaud Ecarot, Benoît Fraikin, Francis Ouellet, Luc Lavoie, Mark M. McGilchrist, Jean-François Ethier:
Sensitive Data Exchange Protocol Suite for Healthcare. 1-7 - Patrick Ryan Sales dos Santos, Vitória de Carvalho Brito, Antonio Oseas de Carvalho Filho, Flávio Henrique Duarte de Araújo, Ricardo de Andrade Lira Rabelo, Mano Joseph Mathew:
A Capsule Network-based for identification of Glaucoma in retinal images. 1-6 - Pierluigi Freni, Enrico Ferro, Roberto H. Moncada:
Tokenization and Blockchain Tokens Classification: a morphological framework. 1-6 - Simona Colucci, Luigi Alfredo Grieco, Agnese V. Ventrella, Eugenio Di Sciascio:
From Name-Centric to Information-Centric Networking. 1-6 - Abeer Ali, Christos Anagnostopoulos, Dimitrios P. Pezaros:
In-Network Placement of Security VNFs in Multi-Tenant Data Centers. 1-6 - Ilias Siniosoglou, Georgios Efstathopoulos, Dimitrios Pliatsios, Ioannis D. Moscholios, Antonios Sarigiannidis, Georgia Sakellari, Georgios Loukas, Panagiotis G. Sarigiannidis:
NeuralPot: An Industrial Honeypot Implementation Based On Deep Neural Networks. 1-7 - Patrick Elfert, Simon Siggelkow, Marco Eichelberg, Andreas Hein:
Towards an Ambient Estimation of Stool Types to Support Nutrition Counseling for People affected by the Geriatric Frailty Syndrome. 1-6 - Adrian Sterca, Darius Bufnea, Virginia Niculescu:
Bandwidth Aggregation over Multihoming Links. 1-7 - Yago Fontoura do Rosário, Xenofon Fafoutis:
CoMP: Efficient Monitoring for Constrained Embedded Devices. 1-7 - Flavio Di Martino, Franca Delmastro:
High-Resolution Physiological Stress Prediction Models based on Ensemble Learning and Recurrent Neural Networks. 1-6 - Meiqi Wang, Yanzeng Li, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Muqian Chen:
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks. 1-7 - Gabriella Casalino, Giovanna Castellano, Gianluca Zaza:
A mHealth solution for contact-less self-monitoring of blood oxygen saturation. 1-7 - Pere Tuset-Peiró, Ferran Adelantado, Xavier Vilajosana, Ruan Delgado Gomes:
Reliability through modulation diversity: can combining multiple IEEE 802.15.4-2015 SUN modulations improve PDR? 1-6 - Lanlan Li, Linfeng Yue, Haipeng Dai, Nan Yu, Guihai Chen:
Scheduling of Wireless Charging Tasks with Precedence Constraints. 1-6 - Xiang Yin, Yanni Han, Hongyu Sun, Zhen Xu, Haibo Yu, Xiaoyu Duan:
A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network. 1-7 - Hangsheng Zhang, Haitao Liu, Jie Liang, Ting Li, Liru Geng, Yinlong Liu, Shujuan Chen:
Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game. 1-6 - Mingzhi Sha, Azzedine Boukerche:
Semantic Fusion-based Pedestrian Detection for Supporting Autonomous Vehicles. 1-6 - Filipe Lautert, Daniel F. Pigatto, Luiz Celso Gomes Jr.:
A fog architecture for privacy-preserving data provenance using blockchains. 1-6 - Pooya Moradian Zadeh, Saghi Khani, Kathryn Pfaff, Saeed Samet:
A Computational Model and Algorithm to Identify Social Isolation in Elderly Population. 1-6 - Edson Damasceno Carvalho, Antônio Oséas de Carvalho Filho, Flávio Henrique Duarte de Araújo, Ricardo de Andrade Lira Rabelo:
Diagnosis of COVID-19 in CT image using CNN and XGBoost. 1-6 - Shaoqing Wang, Youjian Zhao, Hui Xie:
Improving Survivability of LEO Satellite Network with Guaranteed Based Approaches. 1-6 - Raiane Coelho, Regina Braga, José Maria N. David, Mario A. R. Dantas, Victor Ströele, Fernanda Campos:
Blockchain for Reliability in Collaborative Scientific Workflows on Cloud Platforms. 1-7 - Sudarshan S. Chawathe:
Efficient File Collections for Embedded Devices. 1-6 - Carlos Fransley Scatambulo Costa, Eduardo Alexandre Franciscon:
Data Mining applied to the navigation task in autonomous robots. 1-6 - Yang Shi, Mei Wen, Chunyuan Zhang:
Incremental Deployment of Programmable Switches for Sketch-based Network Measurement. 1-7 - Alaleh Alivar, Pegah Faridi, Balasubramaniam Natarajan, Punit Prakash:
Reducing Sparse Motion Artifacts in MR-Thermometry Using Robust Principal Component Analysis. 1-4 - Yutong Chen, Zhen Li, Junzheng Shi, Gaopeng Gou, Chang Liu, Gang Xiong:
Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery. 1-7 - Dmitry Bankov, Evgeny M. Khorov, Andrey I. Lyakhov:
An Algorithm to Satisfy the QoS Requirements in a Heterogeneous LoRaWAN Network. 1-6 - Sonia Alice George, Arunita Jaekel, Ikjot Saini:
Secure Identity Management Framework for Vehicular Ad-hoc Network using Blockchain. 1-6 - Hassan Noura, Ola Salman, Ali Chehab, Raphaël Couturier:
Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher. 1-7 - Peter Robinson:
Performance Overhead of Atomic Crosschain Transactions. 1-6 - Alexandros Bakas, Antonis Michalas:
Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.