Abstract is missing.
- Analysis and Performance Evaluation of Deep Learning on Big DataKassiano J. Matteussi, Breno F. Zanchetta, Germano Bertoncello, Jobe D. D. dos Santos, Julio C. S. dos Anjos, Cláudio F. R. Geyer. 1-6 [doi]
- Intelligent Routing based on Deep Reinforcement Learning in Software-Defined Data-Center NetworksWai-Xi Liu. 1-6 [doi]
- Identifying and Characterizing Bashlite and Mirai C&C ServersGabriel Bastos, Wagner Meira Jr., Artur Marzano, Osvaldo L. H. M. Fonseca, Elverton C. Fazzion, Cristine Hoepers, Klaus Steding-Jessen, Marcelo H. P. Chaves, Ítalo Cunha, Dorgival O. Guedes. 1-6 [doi]
- Toward Migration of SGX-Enabled ContainersHongliang Liang, Qiong Zhang, Mingyu Li, JianQiang Li. 1-6 [doi]
- SERUM: A Lightweight Approach for Secure Network Route Monitoring in Industrial NetworksKiron Mirdha, Markus Jung. 1-6 [doi]
- information-Agnostic Traffic Scheduling in Data Center Networks with Asymmetric TopologiesNing Wei, Qizhen Jin, Xiaodong Dong, Xiaobo Zhou, Deke Guo, Keqiu Li. 1-6 [doi]
- Clustering of Spatial Data with DBSCAN: An Assessment of STARKPaolo Bellavista, Mattia Campestri, Luca Foschini, Rebecca Montanari. 1-6 [doi]
- Signal reconstruction by means of Embedding, Clustering and AutoEncoder EnsemblesCorrado Mio, Gabriele Gianini. 1-6 [doi]
- Cost and Energy Aware Dynamic Splitting of Video Traffic in Heterogeneous NetworksNadine Abbas, Sanaa Sharafeddine, Hazem M. Hajj, Zaher Dawy. 1-7 [doi]
- A Reputation-aware Mobile Crowd Sensing Scheme for Emergency DetectionRawan F. El Khatib, Nizar Zorba, Hossam S. Hassanein. 1-6 [doi]
- Content Retrieval while Moving Across IP and NDN Network ArchitecturesCarlos Guimarães, José Quevedo, Rui Ferreira 0001, Daniel Corujo, Rui L. Aguiar. 1-6 [doi]
- Optimal Multi-Decision Mobile Computation Offloading With Hard Task DeadlinesArvin Hekmati, Peyvand Teymoori, Terence D. Todd, Dongmei Zhao, George Karakostas. 1-8 [doi]
- Real-Time Decision Making for Underwater Big Data Applications Using the Apriori AlgorithmHussain Albarakati, Reda Ammar, Raafat S. Elfouly, Sanguthevar Rajasekaran. 1-7 [doi]
- Modeling User Network Behavior Based on Network Packet Sketches for Masquerade DetectionZhiyuan Lv, Youjian Zhao, Haibin Li. 1-8 [doi]
- HRM Smart Contracts on the BlockchainRay Neiheiser, Gustavo Inácio, Luciana Rech, Joni Fraga. 1-6 [doi]
- A Hybrid Stacked Traffic Volume Prediction Approach for a Sparse Road NetworkYanjie Tao, Peng Sun 0007, Azzedine Boukerche. 1-6 [doi]
- Deep Learning for Recognizing the Anatomy of Tables on DatasheetsErtugrul Kara, Mark Traquair, Burak Kantarci, Shahzad Khan. 1-6 [doi]
- Keynote 2: Resource Management in Edge Computing: Opportunities and Open IssuesAlbert Y. Zomaya. 1 [doi]
- Affinity Aware-Scheduling of Live Migration of Virtual Machines Under Maintenance ScenariosAnis Yazidi, Frederik Ung, Hårek Haugerud, Kyrre M. Begnum. 1-4 [doi]
- Parallel Running and Comparing the Behavior of Two Identical Network ServersShie-Yuan Wang, Po-Han Huang. 1-6 [doi]
- Active Sample Selection Through Sparse Neighborhood for Imbalanced DatasetsPing Gu, Zhao Ling, Si Yu Shao, Meng Zhou. 1-6 [doi]
- Distributed Parallel VN Embedding Based on Genetic AlgorithmQiao Lu, Changcheng Huang. 1-6 [doi]
- Achieving Near-Optimal Fairness in Energy Harvesting Wireless Sensor NetworksOmer Melih Gul. 1-6 [doi]
- Topology Measurement and Analysis on Ethereum P2P NetworkYue Gao 0003, Jinqiao Shi, Xuebin Wang, Qingfeng Tan, Can Zhao, Zelin Yin. 1-7 [doi]
- PTAD: Provable and Traceable Assured Deletion in Cloud StorageMengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen. 1-6 [doi]
- Exploring the Influence of News Articles on Bitcoin Price with Machine LearningWenbing Yao, Ke Xu, Qi Li. 1-6 [doi]
- Elastic Deployment of Software Containers in Geo-Distributed Computing EnvironmentsFabiana Rossi, Valeria Cardellini, Francesco Lo Presti. 1-7 [doi]
- Sharing is caring: a cooperation scheme for RPL network resilience and efficiencyBrandon Foubert, Julien Montavont. 1-6 [doi]
- KVSwitch: An In-network Load Balancer for Key-Value StoresYang Shi, Jiawei Fei, Mei Wen, Chunyuan Zhang. 1-7 [doi]
- A Routing Metric for Inter-flow Interference-aware Flying Multi-hop NetworksAndré Coelho, Eduardo Nuno Almeida, José Ruela, Rui Campos, Manuel Ricardo. 1-6 [doi]
- Optimization for Hard Combining Cooperative Spectrum Sensing with Heterogeneous DevicesChang Tian, Wei Jiang, Wu Luo. 1-6 [doi]
- Cache Efficient Value IterationAnuj Jain, Sartaj Sahni. 1-6 [doi]
- Building A Prototype of a Pair of Weighing Shoes Based on Machine Learning TechniquesShie-Yuan Wang, En-Yu Jenp, Ya-Jen Hsu. 1-6 [doi]
- Smart Spreading Factor Assignment for LoRaWANsTugrul Yatagan, Sema Oktug. 1-7 [doi]
- SignalCookie: Discovering Guard Relays of Hidden Services in ParallelMuqian Chen, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Zelin Yin, Binxing Fang. 1-7 [doi]
- Edge-oriented Collaborative Caching in Information-Centric NetworkingHaibo Wu, Jun Li, Jiang Zhi, Yongmao Ren, Lingling Li. 1-6 [doi]
- Target Localization using Machine Learning and Belief Functions: Application for Elderly People in Indoor EnvironmentsDaniel AlShamaa, Aly Chkeir, Farah Mourad-Chehade. 1-6 [doi]
- Learning Sensor Placement from Demonstration for UAV networksAssia Benbihi, Matthieu Geist, Cédric Pradalier. 1-6 [doi]
- Mitigating Negative Impacts on DNS Caches Caused by Disposable Domain NamesGuangxi Yu, Yan Zhang 0014, Huajun Cui, Xinghua Yang, Yang Li. 1-6 [doi]
- Improved Network Traffic Classification Using Ensemble LearningIsadora P. Possebon, Anderson S. Silva, Lisandro Zambenedetti Granville, Alberto E. Schaeffer Filho, Angelos K. Marnerides. 1-6 [doi]
- Reinforcement Learning Based Scheduling Algorithm for Optimizing Age of Information in Ultra Reliable Low Latency NetworksAnis Elgabli, Hamza Khan, Mounssif Krouka, Mehdi Bennis. 1-6 [doi]
- Trunk Detection and Tree Disparity Calculation in Uncontrolled EnvironmentsGabriel da Silva Vieira, Fabrizzio A. A. M. N. Soares, Junio Cesar de Lima, Gustavo Teodoro Laureano, Samuel A. Santos, Ronaldo M. Costa, Rogério Lopes Salvini. 1-6 [doi]
- The Relative Smoothed Throughput Approach for Adaptive HTTP StreamingPaulo Cezar Lacerda Neto, Célio Vinicius Neves de Albuquerque, Débora C. Muchaluat-Saade. 1-6 [doi]
- A Network Service for Preventing Data Leakage from IoT Cloud-assisted EquipmentVitor A. Cunha, Rui L. Aguiar, Eduardo da Silva, Marcio Barbosa de Carvalho, Daniel Corujo, João Paulo Barraca, Diogo Gomes 0001, Alberto E. Schaeffer Filho, Carlos R. P. dos Santos, Lisandro Zambenedetti Granville. 1-7 [doi]
- Quantifying Group Influence on Individuals in Online Social NetworksQing Meng, Junzhou Luo, Bo Liu, Xiangguo Sun, Jiuxin Cao. 1-6 [doi]
- Adaptive SDN Master Controller Assignment for Maximizing Network ThroughputJianfeng Xu, Liming Wang, Chen Song, Zhen Xu. 1-6 [doi]
- Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User MobilityRania Islambouli, Sanaa Sharafeddine. 1-6 [doi]
- Multilevel Coding Schemes Using LDPC Codes with Signal Shaping for Spectral Efficient Data Communication SystemsTarek Arafa, Wolfgang Sauer-Greff, Ralph Urbansky. 1-6 [doi]
- Deep Learning for the Detection of Tabular Information from Electronic Component DatasheetsMark Traquair, Ertugrul Kara, Burak Kantarci, Shahzad Khan. 1-6 [doi]
- Scalability Analysis of Data Transfer in Massive Internet of Things ApplicationsOlli Mämmelä, Pekka Karhula, Jukka Mäkelä. 1-7 [doi]
- On the use of prioritization and network slicing features for mission critical and commercial traffic multiplexing in 5G Radio Access NetworksShaoxuan Wang, Ramon Ferrús. 1-6 [doi]
- Keynote 1: SPACE for Internet & INTERNET for SpaceVassilis Tsaoussidis. 1 [doi]
- On the Design of a Blockchain-as-a-Service-Based Health Information Exchange (BaaS-HIE) System for Patient MonitoringAlina Buzachis, Antonio Celesti, Maria Fazio, Massimo Villari. 1-6 [doi]
- Keynote 3: Data Analytics of Mobility EntitiesAntonio A. F. Loureiro. 1 [doi]
- A Cache-Aware Approach for Dynamic Adaptive Video Streaming over HTTPYudan Liu, Tao Lin, Zhilei Liu, Liang Dai. 1-6 [doi]
- Social-aware Mobile Road Side Unit for Content Distribution in Vehicular Social NetworksSaeid Akhavan Bitaghsir, Sina Kashipazha, Aresh Dadlani, Ahmad Khonsari. 1-6 [doi]
- Joint Communication and Computing Optimization for Hierarchical Machine Learning Tasks DistributionBo Yang, Xuelin Cao, Xiangfang Li, Timothy S. Kroecker, Lijun Qian. 1-6 [doi]
- CoMon-DAS: A Framework for Efficient and Robust Dynamic Adaptive Streaming over NDNMuhammad Hassan, Hani Salah, Mauro Conti, Frank H. P. Fitzek, Thorsten Strufe. 1-7 [doi]
- Constructing QC-LDPC codes based on dimension reduction for physical layer securityManfei Zhang, Renyong Wu. 1-6 [doi]
- Cyber Profiles Based Risk Prediction of Application Systems for Effective Access ControlDegang Sun, Zhengrong Wu, Yan Wang, Qiujian Lv, Bo Hu. 1-7 [doi]
- Using data mining techniques to extract key factors in Mobile live streamingDaniel Vasconcelos Correa da Silva, Pedro Braconnot Velloso, Antônio Augusto de Aragão Rocha. 1-6 [doi]
- Tutorial Enabling Technologies for Crowd Sensing and ManagementHossam S. Hassanein, Nizar Zorba. 1 [doi]
- Trustworthiness and Comfort-Aware Participant Recruitment for Mobile Crowd-Sensing in Smart EnvironmentsVenkat Surya Dasari, Burak Kantarci, Murat Simsek. 1-6 [doi]
- Minimum Reconfiguration Cost for Drone Swarm Formation via Two-Stage Stochastic ProgrammingChenghao Jin, Bing Chen, Feng Hu 0003. 1-6 [doi]
- Scalable precondition-aware service composition with SPARQLAlexis Huf, Frank Siqueira. 1-6 [doi]
- QoE-Driven Resource Allocation Optimized for Delay-Sensitive VR Video Uploading over Cellular NetworkJunchao Yang, Jiangtao Luo, De Meng, Jenq-Neng Hwang. 1-6 [doi]
- LTE for Trains - Performance Interactions Examined with DL, ML and ResamplingJohan Garcia, Simon Sundberg, Anna Brunström. 1-6 [doi]
- Crowdsensed Data Learning-Driven Prediction of Local Businesses Attractiveness in Smart CitiesAndrea Capponi, Piergiorgio Vitello, Claudio Fiandrino, Guido Cantelmo, Dzmitry Kliazovich, Ulrich Sorgeu, Pascal Bouvry. 1-6 [doi]
- Analytical Evaluation and Potentials of Frame Based Equipment for LTE-LAA/Wi-Fi CoexistenceAmr Abdelfattah, Naceur Malouch, Jonathan Ling. 1-7 [doi]
- Selection of Mobile Edges for a Hybrid CrowdSensing ArchitectureDimitri Belli, Stefano Chessa, Antonio Corradi, Giampiero Di Paolo, Luca Foschini, Michele Girolami. 1-6 [doi]
- QoE-based Load Balancing of OTT Video Content in SDN NetworksTiago Oliveira, Susana Sargento. 1-6 [doi]
- Android Malware Family Classification Based on Sensitive Opcode SequenceJianguo Jiang, Song Li, Min Yu, Gang Li, Chao Liu 0020, Kai Chen, Hui Liu, Weiqing Huang. 1-7 [doi]
- Queue-based model approximation for inter-cell coordination with service differentiationHadjer Touati, Hind Castel-Taleb, Badii Jouaber, Sara Akbarzadeh. 1-7 [doi]
- A Case Study of Association Instability in Dense IEEE 802.11 NetworksHelga Dolorico Balbi, Diego G. Passos, Ricardo Campanha Carrano, Luiz Magalhães, Ceélio Albuquerque. 1-6 [doi]
- Towards High Energy Efficiency in the Internet of ThingsAndré Riker, João Subtil, Marília Curado, Edmundo Monteiro. 1-6 [doi]
- An Experimental Evaluation of the 6top Protocol for Industrial IoT ApplicationsFrancesca Righetti, Carlo Vallati, Sajal K. Das 0001, Giuseppe Anastasi. 1-6 [doi]
- Analyzing resource distribution over a real-world large-scale virtual content infrastructurePatricia Takako Endo, James Byrne, Theo Lynn, Radhika Loomba, Ruth Quinn, Christos K. Filelis-Papadopoulos, Konstantinos M. Giannoutakis, George A. Gravvanis, Dimitrios Tzovaras, Peter Willis, Sergej Svorobej. 1-7 [doi]
- Similarity detection for smart and transparent long-range IoT relayingCongDuc Pham, Abdallah Makhoul, Mamour Diop. 1-7 [doi]
- PQ-MAC: Exploiting Bidirectional Transmission Opportunities via Leveraging Peers' Queuing Information for Full-Duplex WLANRongchang Duan, Qinglin Zhao, Hanwen Zhang, Yujun Zhang, Zhongcheng Li. 1-6 [doi]
- Improving the Localization Accuracy for Sigfox Low-Power Wide Area NetworksShie-Yuan Wang, Yu-Hsiang Cheng, Jenn-Hwan Tarng. 1-6 [doi]
- Machine Learning-based SON function conflict resolutionDiego Fernando Preciado Rojas, Andreas Mitschele-Thiel. 1-6 [doi]
- GreenFlowing: A Green Way of Reducing Electricity Cost for Cloud Data Center Using Heterogeneous ESDsChonglin Gu, Wenye Li, Cong Shen, Shuguang Cui. 1-6 [doi]
- Integrating Machine Learning with Off-the-Shelf Traffic Flow Features for HTTP/HTTPS Traffic ClassificationAli Safari Khatouni, Ayse Nur Zincir-Heywood. 1-7 [doi]
- Network Coded Cooperative Multicast in Integrated Terrestrial-Satellite NetworksXinmu Wang, Hewu Li, Mingkai Tong, Kang Pan, Qian Wu. 1-6 [doi]
- ARMOR: An Architecture for Diagnosis and Remediation of Network MisconfigurationsAnderson Santos da Silva, Alberto Schaeffer-Filho. 1-6 [doi]
- Deep Dive on Politician Impersonating Accounts in Social MediaKoosha Zarei, Reza Farahbakhsh, Noël Crespi. 1-6 [doi]
- Wi-Fi Secure Access Control System Based on Geo-fenceHaofeng Jiang, Xiaorui Gong. 1-6 [doi]
- KPaM: A Key Protection Framework for Mobile Devices Based on Two-party ComputationPengcheng Zhang, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Donglei Han. 1-6 [doi]
- Using Complex Networks Metrics to Mitigate the Broadcast Storm ProblemEfrem E. O. Lousada, Carlos R. Storck, Raquel A. F. Mini, Fatima de Lima Procópio Duarte-Figueiredo. 1-6 [doi]
- Towards Osmotic Computing: a Blue-Green Strategy for the Fast Re-Deployment of MicroservicesAlina Buzachis, Antonino Galletta, Antonio Celesti, Lorenzo Carnevale, Massimo Villari. 1-6 [doi]
- Data Loss Prevention and Storage Utilization Improvement of the Hidden Volume on Mobile DevicesWendi Feng, Chuanchang Liu, Zehua Guo 0001, Thar Baker, Bo Cheng 0001, Junliang Chen. 1-6 [doi]
- BGP Dataset Generation and Feature Extraction for Anomaly DetectionPaulo Fonseca 0001, Edjard S. Mota, Ricardo Bennesby, Alexandre Passito. 1-6 [doi]
- A Deep ConvNet-Based Countermeasure to Mitigate Link Flooding Attacks Using Software-Defined NetworksJunchi Xing, Jingjing Cai, Boyang Zhou, Chunming Wu. 1-6 [doi]
- OFFER Referees Suggester for the Journal EditorsMustafa Coskun, Hilal Hacilar, Cengiz Gezer, Vehbi Cagri Gungor. 1-6 [doi]
- Knowledge-centric Analytics Queries Allocation in Edge Computing EnvironmentsStefanos Sagkriotis, Kostas Kolomvatsos, Christos Anagnostopoulos, Dimitrios P. Pezaros, Stathes Hadjiefthymiades. 1-6 [doi]
- HCNet: An SDN Enabled Virtual Network Management System for Hybrid CloudsJie Sun, Nan Zhang, Tianyu Wo, Xudong Liu. 1-7 [doi]
- Optimization of Service Placement with FairnessNoé Godinho, Marília Curado, Luís Paquete. 1-6 [doi]
- Fast and Reliable LoRa-based Data TransmissionsDimitrios Zorbas, Patrick Maillé, Brendan O'Flynn, Christos Douligeris. 1-6 [doi]
- Effect of Receiving Antennas Radiation Pattern on an SFN Network CoveragePedro Javier Orbea, José María Matías, Mario Hernández, Yenny Valdés, Salvador Landeros. 1-7 [doi]
- DisTraC: A Distributed and Low-Overhead Protocol for Traffic Congestion Control Using Vehicular NetworksRoniel S. de Sousa, Azzedine Boukerche, Antonio A. F. Loureiro. 1-6 [doi]
- Named Functions at the EdgeGeorge Xylomenos, George Pavlou, Ioannis Psaras, Ioannis Karakonstantis. 1-6 [doi]
- Applied Comparative Evaluation of the Metasploit Evasion ModulePeter Casey, Mateusz Topor, Emily Hennessy, Saed Alrabaee, Moayad Aloqaily, Azzedine Boukerche. 1-6 [doi]
- A Scheduling Algorithm for Low Jitter in Ethernet-Based FronthaulLong Wang, Xirong Que, Xiangyang Gong, Ye Tian, Tongtong Wang, Xinyuan Wang. 1-6 [doi]
- Improved Selection of the Best Forwarding Candidate in 3MRP for VANETsAhmad Mohamad Mezher, Leticia Lemus Cárdenas, Julián L. Cárdenas-Barrera, Eduardo Castillo Guerra, Julian Meng, Mónica Aguilar-Igartua. 1-6 [doi]
- Performance Analysis of UAV-assisted Ferrying for the Internet of ThingsSafae Lhazmir, Mohammed-Amine Koulali, Abdellatif Kobbane, Halima Elbiaze. 1-6 [doi]
- A Capacity-Aware User Recruitment Framework for Fog-Based Mobile Crowd-Sensing PlatformsDimitri Belli, Stefano Chessa, Burak Kantarci, Luca Foschini. 1-6 [doi]
- Improving big-data automotive applications performance through adaptive resource allocationAnthony Nassar, Ahmed Mostefaoui, François Dessables. 1-7 [doi]
- IDSA-IoT: An Intrusion Detection System Architecture for IoT NetworksGuilherme Weigert Cassales, Hermes Senger, Elaine Ribeiro de Faria, Albert Bifet. 1-7 [doi]
- Load balancing in D2D networks Using Reinforcement LearningPedro H. Barros, Isadora Cardoso-Pereira, Luca Foschini, Antonio Corradi, Heitor S. Ramos. 1-6 [doi]
- Cost-Aware and Delay-Constrained Service Function Orchestration in Multi-Data-Center NetworksXiang Wang, Shunliang Zhang, Yongming Wang. 1-6 [doi]
- Cooperative Network-Coded Multicast for Layered Content Delivery in D2D-Enhanced HetNetsXinmu Wang, Hewu Li, Mingkai Tong, Wenbing Yao, Qian Wu. 1-6 [doi]
- Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling ApproachBo Liu, Xiaolin Chang, Yang Yang 0050, Zhi Chen, Zhen Han. 1-6 [doi]
- Decentralized AP selection using Multi-Armed Bandits: Opportunistic ε-Greedy with StickinessMarc Carrascosa, Boris Bellalta. 1-7 [doi]
- ADAPT-T: An Adaptive Algorithm for Auto-Tuning Worker Thread Pool Size in Application ServersNilushan Costa, Malith Jayasinghe, Ajantha S. Atukoralez, Supun Abeysinghe, Srinath Perera, Isuru Perera. 1-6 [doi]
- OPQR: Online Pricing and Quality Requesting for Mobile Crowd SensingJiachen Liang, Li Li 0013, Qing Li, Yong Jiang. 1-6 [doi]
- Optimizing Compressed Sensing for seeing through walls based on Wireless SignalsScott Fowler, George Baravdish, Martin Rudberg. 1-6 [doi]
- Leveraging Mobile Edge Computing on Smart Grids Using LTE Cellular NetworksAlex F. R. Trajano, Antonio Alex Monteiro de Sousa, Emanuel B. Rodrigues, José Neuman de Souza, Arthur de Castro Callado, Emanuel F. Coutinho. 1-7 [doi]
- Tutorial Information-Centric Vehicular Networking: Why and Wherefores, Challenges, and Design GuidelinesAzzedine Boukerche, Rodolfo W. L. Coutinho. 1-2 [doi]
- Concept extraction for structured text using entropy weight methodJie Yu, Rongrong Chen, Lingyu Xu, Dongdong Wang. 1-6 [doi]
- Evaluation of a Backup-as-a-Service Environment for Disaster RecoveryJúlio Mendonça, Ricardo Lima, Ewerton Queiroz, Ermeson Carneiro de Andrade, Dong Seong Kim. 1-6 [doi]
- A Traffic Classification Method Based on Packet Transport Layer Payload by Ensemble LearningLuyang Xu, Xu Zhou, Yongmao Ren, Yifang Qin. 1-6 [doi]
- A V2X Approach for Data Dissemination in Vehicular Ad Hoc NetworksLuiz Henrique Silva Lopes, Raquel A. F. Mini, Felipe D. da Cunha. 1-6 [doi]
- Minimizing Multi-Controller Deployment Cost in Software-Defined NetworkingJianfeng Xu, Liming Wang, Chen Song, Zhen Xu. 1-6 [doi]
- A Novel Immune Detection Approach Enhanced by Attack Graph Based CorrelationRoberto Vasconcelos Melo, Douglas D. J. de Macedo, Mario A. R. Dantas, Luis Carlos Erpen De Bona. 1-6 [doi]
- Improving the QoE of OTT Multimedia Services in Wireless ScenariosAndré Dias, Andre B. Reis, Susana Sargento. 1-6 [doi]
- Towards Human Mobility Detection Scheme for Location-Based Social NetworkMunairah Al-Jeri. 1-7 [doi]
- Lightpath Concentration by CirculationYiu-Wing Leung. 1-7 [doi]
- Multilevel resource allocation for performance-aware energy-efficient cloud data centersFábio Diniz Rossi, Paulo Silas Severo de Souza, Wagner dos Santos Marques, Marcelo Da Silva Conterato, Tiago Coelho Ferreto, Arthur Francisco Lorenzon, Marcelo Caggiani Luizelli. 1-6 [doi]
- ALSR: An Adaptive Label Screening and Relearning Approach for Anomaly DetectionYuhan Jing, Qi Qi 0001, Jingyu Wang, Tongtong Feng, Jianxin Liao. 1-6 [doi]
- Modeling and predicting dynamics of heterogeneous workloads for cloud environmentsMaria Carla Calzarossa, Marco L. Della Vedova, Luisa Massari, Giuseppe Nebbione, Daniele Tessera. 1-7 [doi]
- Locating Deteriorated Links by Network-Assisted Multicast Proving on OpenFlow NetworksNguyen Minh Tri, Masato Tsuru. 1-6 [doi]
- PCon: A Novel Opportunistic Routing Protocol for Duty-Cycled Internet of Underwater ThingsRodolfo W. L. Coutinho, Azzedine Boukerche. 1-6 [doi]
- Semantics and Deviation Aware Content RequestLijun Dong, Richard Li. 1-7 [doi]
- Energy-Efficient UAV-Assisted Communication with Spectrum optimizationFanZi Zeng, Shanshan Li, Peng Huang, Zhu Xiao, Zhenzhen Hu. 1-6 [doi]
- IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale TrafficCaiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang. 1-7 [doi]
- A Privacy-Preserving Scheme Based on Fragments Storage and Fragments Recombination in CCNTing Li, Jie Liang, Liru Geng, YinLong Liu. 1-6 [doi]
- FSNet: Android Malware Detection with Only One FeatureDali Zhu, Yuchen Ma, Tong Xi, Yiming Zhang. 1-6 [doi]
- iMCircle: Automatic Mining of Indicators of Compromise from the WebPanpan Zhang, Jing Ya, Tingwen Liu, Quangang Li, Jinqiao Shi, Zhaojun Gu. 1-6 [doi]
- Minimizing Communication Overheads in Container-based Clouds for HPC ApplicationsAnderson M. Maliszewski, Adriano Vogel, Dalvan Griebler, Eduardo Roloff, Luiz Gustavo Fernandes, Navaux Philippe O. A.. 1-6 [doi]
- MQTT-based Middleware for Container Support in Fog Computing EnvironmentsPaolo Bellavista, Luca Foschini, Nicola Ghiselli, Andrea Reale. 1-7 [doi]
- Energy Efficient Communication among Wearable Devices using Optimized Motion DetectionXin Yao, Aftab Khan, Yichao Jin. 1-6 [doi]
- Traffic Matrix Prediction Based on Deep Learning for Dynamic Traffic EngineeringZhifeng Liu, Zhiliang Wang, Xia Yin, Xingang Shi, Yingya Guo, Ying Tian. 1-7 [doi]
- ALTEE: Constructing Trustworthy Execution Environment for Mobile App DynamicallyYang Cai, Yuewu Wang, Lingguang Lei, Quan Zhou. 1-7 [doi]
- SDN Based Fast and Soft Handover (FSH) For a Shuttle Bus Monitoring SystemNadia Mouawad, Rola Naja, Samir Tohmé. 1-6 [doi]
- LoBaPS: Load Balancing Parent Selection for RPL Using Wake-Up RadiosSebastian L. Sampayo, Julien Montavont, Thomas Noël. 1-6 [doi]
- An SDN-based Hybrid Strategy for Load Balancing in Data Center NetworksLu Liu, Yong Jiang, Gengbiao Shen, Qing Li, Dong Lin, Li Li, Yi Wang. 1-6 [doi]
- SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in CloudXin Wang, Liming Wang, Fabiao Miao, Jing Yang. 1-7 [doi]
- Mitigating Both Data Corruption and Content Replay Attacks with Implicit Data IntegrityMichael E. Kounavis. 1-7 [doi]
- On the impact of the covariance matrix size for spectrum sensing methods: beamforming versus eigenvaluesKais Bouallegue, Matthieu Crussière, Iyad Dayoub. 1-5 [doi]
- Energy Usage Profiling for Virtualized Single Board Computer ClustersStefanos Sagkriotis, Christos Anagnostopoulos, Dimitrios P. Pezaros. 1-6 [doi]
- IVP: A Three Level Confusion-Diffusion Network Supporting Implicit Data IntegrityMichael E. Kounavis, David Durham, Sergej Deutsch, Ken Grewal. 1-7 [doi]
- An Adaptation Aware Model to Predict Engagement on HTTP Adaptive Live StreamingThiago A. Guarnieri, Jussara Almeida, Alex Borges Vieira. 1-6 [doi]
- DSOR: A Traffic-Differentiated Secure opportunistic Routing with Game Theoretic Approach in MANETsXiaoxiong Zhong, Renhao Lu, Li Li 0015, Xinghan Wang, Yanbin Zheng. 1-6 [doi]
- Counting Vehicles with Deep Learning in Onboard UAV ImageryGiuseppe Amato, Luca Ciampi, Fabrizio Falchi, Claudio Gennaro. 1-6 [doi]
- Impact of Header on Coded Slotted Aloha with CaptureFulvio Babich, Massimiliano Comisso. 1-6 [doi]
- Improving Resiliency of Software-Defined Networks with Network Coding-based Multipath RoutingJianjian Ai, Hongchang Chen, Zehua Guo 0001, Guozhen Cheng, Thar Baker. 1-6 [doi]
- Reusing Sub-chains of Network Functions to Support MEC ServicesTung V. Doan, Alexander Kropp, Giang T. Nguyen 0002, Hani Salah, Frank H. P. Fitzek. 1-8 [doi]
- A Dynamic Replication Scheme of User Plane Data over Lossy Backhaul LinksYekta Turk, Engin Zeydan. 1-7 [doi]
- Tutorial Machine Learning for AI-Driven Wireless Networks: Challenges and OpportunitiesWalid Saad. 1 [doi]
- Transformation of Cloud Workflow Graphs into Computational ModelsAbdullah Alenizi, Raafat S. Elfouly, Reda Ammar. 1-6 [doi]
- Autonomous Flying WiFi Access PointGareth J. Nunns, Yu-Jia Chen, Deng-Kai Chang, Kai-Min Liao, Fung Po Tso, Lin Cui. 278-283 [doi]
- Clusterhead Selection Algorithm Based on Energy and Mobility in Wireless Mobile Sensor NetworksAmir Djouama, Marwen Abdennebi. 982-986 [doi]
- Dynamic Multipath Resource Management for Ultra Reliable Low Latency ServicesRania Islambouli, Zahraa Sweidan, Sanaa Sharafeddine. 987-992 [doi]
- Backhaul Pairing of Small Cells Using Non-Orthogonal Multiple AccessH. Faizan Saeed, Sobia Jangsher, Hassaan Khaliq Qureshi, Moayad Aloqaily, Jalel Ben-Othman. 993-997 [doi]
- Colored Petri Nets for Modeling Congestion Control in Wireless Sensor Networks with RetrialsSamy Hafidi, Nawel Gharbi. 998-1003 [doi]
- Formal Approach for Compatibility Checking of Orchestrations of Composite Semantic Web ServicesYoucef Hammal, Khadidja Salah-Mansour, Abdelkrim Abdelli, Lynda Mokdad. 1004-1009 [doi]
- Security Enforcement on Web Services CompositionsLaila Boumlik, Mohamed Mejri. 1010-1015 [doi]
- Formal specification and validation of refinement from WS-CDL to BPELKhadidja Salah-Mansour, Youcef Hammal, Lynda Mokdad. 1016-1021 [doi]
- ISOCOV: a new MCDM method to handle value constraints in Web service selectionAbdelkrim Abdelli, Youcef Hammal, Lynda Mokdad. 1022-1027 [doi]
- Risk Analysis of Blocked Rate Predictions for SDN Load Balancing Using Monte Carlo SimulationAymen Hasan Alawadi, Sándor Molnár. 1028-1033 [doi]
- BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDNSarra Boukria, Mohamed Guerroumi, Imed Romdhani. 1034-1039 [doi]
- Design and modeling an Adaptive Neuro-Diffuse System (ANFIS) for the prediction of a security index in VANETCaroly Gabriela Pereira Diaz, Boucif Amar Bensaber, Youssef Lahrouni. 1040-1045 [doi]
- Privacy Protection with Less Certificates in C-ITSHacène Fouchal. 1046-1050 [doi]
- A Seamless Virtual Emotion System with Replaceable Detection toward Proper Emotion-based IoT ServicesHyunbum Kim, Jalel Ben-Othman, Lynda Mokdad, Kiho Lim. 1051-1055 [doi]
- Comparing the PaGMO Framework to a De-randomized Meta-Differential Evolution on Calculation and Prediction of Glucose LevelsTomas Koutny, Martin Ubl, I. De Falco, Ernesto Tarantino, Umberto Scafuri, Antonio Della Cioppa, Michal Krcma. 1056-1061 [doi]
- The Prediction of Alcohol Use Disorder: A Scoping ReviewAli Ebrahimi, Anette Søgaard Nielsen, Uffe Kock Wiil, Marjan Mansourvar. 1062-1067 [doi]
- Distilled Deep Learning based Classification of Abnormal Heartbeat Using ECG Data through a Low Cost Edge DeviceMorghan Hartmann, Hasan Farooq, Ali Imran. 1068-1071 [doi]
- NLP for the Generation of Training Data Sets for Ontology-Guided Weakly-Supervised Machine Learning in Digital PathologyRobert Reihs, Birgit Pohn, Kurt Zatloukal, Andreas Holzinger, Heimo Müller. 1072-1076 [doi]
- A Decision-support Algorithm for Self-management of Anticoagulation Therapy Used in a Smartphone ApplicationMartin W. Gerdes, Berglind Fjola Smaradottir, Santiago G. Martinez, Jarle Jortveit, Rune Werner Fensli. 1077-1080 [doi]
- Towards a Deeper Understanding of How a Pathologist Makes a Diagnosis: Visualization of the Diagnostic Process in HistopathologyBirgit Pohn, Michaela Kargl, Robert Reihs, Andreas Holzinger, Kurt Zatloukal, Heimo Müller. 1081-1086 [doi]
- Data Augmentation using CA Evolved GANsKaitav Mehta, Ziad Kobti, Kathryn Pfaff, Susan Fox. 1087-1092 [doi]
- Health@Hand A Visual Interface for eHealth MonitoringLars Nonnemann, Marian Haescher, Mario Aehnelt, Gerald Bieber, Holger Diener, Bodo Urban. 1093-1096 [doi]
- System of Upper Limb Motor Rehabilitation Training Using Leap Motion and Gear VR in Sessions of Home Game TherapyAna Grasielle Dionásio Corrêa, Natália Regina Kintschner, Silvana Maria Blascovi-Assis. 1097-1102 [doi]
- Using Machine Learning to Study Flu Vaccines Opinions of Twitter UsersAntonio Celesti, Antonino Galletta, Fabrizio Celesti, Maria Fazio, Massimo Villari. 1103-1106 [doi]
- Towards Chronic Liver Dysfunction Self-monitoring: a Proof-of-Concept StudyDanila Germanese, Sara Colantonio, Mario D'Acunto, Maurizia Brunetto, Veronica Romagnoli, Antonio Salvati. 1107-1112 [doi]
- Enhancing the Processing of Healthcare Data Streams using Fog ComputingElarbi Badidi, Karima Moumane. 1113-1118 [doi]
- Anonymous multi-source counting statistics New methodology applied to the health sectorT. Delsate, M. Boukhebouze. 1119-1122 [doi]
- Data Science in Public Mental Health: A New Analytic FrameworkCharith Silva, Mahsa Saraee, Mo Saraee. 1123-1128 [doi]
- Improving Biomedical Information Extraction with Word Embeddings Trained on Closed-Domain CorporaStefano Silvestri, Francesco Gargiulo 0001, Mario Ciampi. 1129-1134 [doi]
- Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text SimplificationSilvana Togneri MacMahon, Marco Alfano, Biagio Lenzitti, Giosuè Lo Bosco, Fergal McCaffery, Davide Taibi, Markus Helfert. 1135-1140 [doi]
- FCIG Grammar Evaluation: A Usability Assessment of Clinical Guideline Modelling ConstructsYamiko Joseph Msosa. 1141-1146 [doi]
- Towards the Development of a Web Support System for Improving Accuracy in Coding Discharge DiagnosisElena Cardillo, Lucilla Frattura, Salvatore Ciambrini, Claudio Eccher, Elia Nardo, Carlo Zavaroni, Vincenzo Della Mea. 1147-1152 [doi]
- optimizing the Research of DNA Sequences in a NoSQL Document Database: A Preliminary StudyFabrizio Celesti, Antonio Celesti, Antonino Galletta, Maria Fazio, Massimo Villari. 1153-1158 [doi]
- Distributed Priority Based Management of Road Intersections Using BlockchainAlina Buzachis, Basilio Filocamo, Maria Fazio, Javier Alonso Ruiz, Miguel Ángel Sotelo, Massimo Villari. 1159-1164 [doi]
- RemBit: a blockchain based solution for remittances to EthiopiaPiergiorgio Ricci, Valentina Mammanco. 1165-1170 [doi]
- One Step Towards Dynamically Programmable Things: an Implementation Using BeaconsDavid Bandera, Alejandro Pérez-Vereda, Carlos Canal, Ernesto Pimentel. 1171-1176 [doi]
- Experimenting Forecasting Models for Solar Energy Harvesting Devices for Large Smart Cities DeploymentsAntonio Caruso 0001, Stefano Chessa, Soledad Escolar, Xavier del Toro, Melisa Kuzman, Juan Carlos López. 1177-1182 [doi]
- Simplifying Multi-layer and Multi-tenant Support in OpenStack: The SACHER Use CaseLuca Foschini, Giuseppe Martuscelli, Rebecca Montanari. 1183-1188 [doi]
- A Support Infrastructure for Machine Learning at the Edge in Smart City SurveillancePaolo Bellavista, Periklis Chatzimisios, Luca Foschini, Marianna Paradisioti, Domenico Scotece. 1189-1194 [doi]
- A Case Study of Primary User Arrival Prediction Using the Energy Detector and the Hidden Markov Model in Cognitive Radio NetworksGuilherme M. D. Santana, Rogers S. Cristo, Jean-Philippe Diguet, Catherine Dezan, Diana Pamela Moya Osorio, Kalinka R. J. L. Branco. 1195-1198 [doi]
- FPGA-based Real-time Abnormal Packet Detector for Critical Industrial NetworkJiwoong Kang, Taein Kim, Jaehyun Park. 1199-1203 [doi]
- Evaluation of a Link Quality Estimator in an Outdoor WSN Using a Dedicated NodeEmerson Brasil Gomes, Ruan Delgado Gomes, Iguatemi E. Fonseca. 1204-1209 [doi]
- Authentication Methods for UAV CommunicationMariana Rodrigues, Jean Amaro, Fernando Santos Osório, Kalinka R. J. L. Branco. 1210-1215 [doi]
- Path-following algorithms comparison using Software-in-the-Loop simulations for UAVsDaniel M. Xavier, Natassya B. F. Silva, Kalinka R. J. L. Branco. 1216-1221 [doi]
- Control validation with software-in-the-loop for a fixed-wing vertical takeoff and landing unmanned aerial vehicle with multiple flight stagesNatassya B. F. Silva, João V. C. Fontes, Kalinka R. J. L. Branco. 1222-1227 [doi]