default search action
47th LCN 2022: Edmonton, AB, Canada
- Sharief Oteafy, Eyuphan Bulut, Florian Tschorsch:
47th IEEE Conference on Local Computer Networks, LCN 2022, Edmonton, AB, Canada, September 26-29, 2022. IEEE 2022, ISBN 978-1-6654-8001-7 - Christos Profentzas, Magnus Almgren, Olaf Landsiedel:
MicroTL: Transfer Learning on Low-Power IoT Devices. 1-8 - J. J. Garcia-Luna-Aceves:
Eliminating Routing Loops and Oscillations in BGP Using Total Ordering. 9-17 - Ahmed Shokry, Moustafa Youssef:
A Quantum Algorithm for RF-based Fingerprinting Localization Systems. 18-25 - Amir Mohamad, Hossam S. Hassanein:
Prediction-based SFC Placement with VNF Sharing at the Edge. 26-33 - Ghina Dandachi, Anouar Rkhami, Yassine Hadjadj Aoul, Abdelkader Outtagarts:
A Robust Monte-Carlo-Based Deep Learning Strategy for Virtual Network Embedding. 34-41 - Shakil Ahmed, Mohamed Y. Selim, Ahmed E. Kamal:
Enhanced IoT Batteryless D2D Communications Using Reconfigurable Intelligent Surfaces. 42-47 - Atefeh Talebian, Alvin C. Valera, Jyoti Sahni, Winston K. G. Seah:
Robust Intra-Slice Migration in Fog Computing. 48-55 - Minji Kim, Dongeun Lee, Kookjin Lee, Doowon Kim, Sangman Lee, Jinoh Kim:
Deep Sequence Models for Packet Stream Analysis and Early Decisions. 56-63 - Eric Lanfer, Thomas Hänel, Roland van Rijswijk-Deij, Nils Aschenbruck:
Improving Proximity Classification for Contact Tracing using a Multi-channel Approach. 64-72 - Linfei Ren, Ruimin Hu, Dengshi Li, Junhang Wu, Yilong Zang, Wenyi Hu:
Cross-Regional Friendship Inference via Category-Aware Multi-Bipartite Graph Embedding. 73-80 - Peyvand Teymoori, Azzedine Boukerche, Feng Liang:
Efficient Mobile Computation Offloading over a Finite-State Markovian Channel using Spectral State Aggregation. 81-89 - Samuel Kopmann, Hauke Heseding, Martina Zitterbart:
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic. 90-97 - Eder J. Scheid, Muriel Figueredo Franco, Fabian Küffer, Niels Kübler, Pascal Kiechl, Burkhard Stiller:
VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events. 98-105 - Hauke Heseding, Martina Zitterbart:
ReCEIF: Reinforcement Learning-Controlled Effective Ingress Filtering. 106-113 - Konrad Wolsing, Antoine Saillard, Jan Bauer, Eric Wagner, Christian van Sloun, Ina Berenice Fink, Mari Schmidt, Klaus Wehrle, Martin Henze:
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset. 114-122 - Leonard Bradatsch, Marco Häberle, Benjamin Steinert, Frank Kargl, Michael Menth:
Secure Service Function Chaining in the Context of Zero Trust Security. 123-131 - Thilini Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne:
Inline Traffic Analysis Attacks on DNS over HTTPS. 132-139 - Hua Wu, Xingmeng Fan, Guang Cheng, Xiaoyan Hu:
Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks. 140-148 - Zakaria Abou El Houda, Bouziane Brik, Lyes Khoukhi:
Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid Systems. 149-156 - Mhd Saria Allahham, Amr Mohamed, Hossam S. Hassanein:
Incentive-based Resource Allocation for Mobile Edge Learning. 157-164 - Patrick Rathje, Olaf Landsiedel:
DisruptaBLE: Opportunistic BLE Networking. 165-172 - Ibrahim M. Amer, Sharief M. A. Oteafy, Hossam S. Hassanein:
Task Replication in Unreliable Edge Networks. 173-180 - Ahmed Badr, Abdulmonem M. Rashwan, Khalid Elgazzar:
An Application-Specific Power Consumption Optimization for Wearable Electrocardiogram Devices. 181-188 - Bjørn Ivar Teigen, Neil Davies, Kai Olav Ellefsen, Tor Skeie, Jim Torresen:
Quantifying the Quality Attenuation of WiFi. 189-197 - Hossein Doroud, Ahmad Alaswad, Falko Dressler:
Encrypted Traffic Detection: Beyond the Port Number Era. 198-204 - Oscar G. Bautista, Kemal Akkaya:
Network-Efficient Pipelining-Based Secure Multiparty Computation for Machine Learning Applications. 205-213 - Tomás Lagos Jenschke, Marcelo Dias de Amorim, Serge Fdida:
Quantifying Direct Link Establishment Delay Between Android Devices. 214-219 - Peter Willis, Nirmala Shenoy, Yin Pan, John F. Hamilton:
A Novel Frame Forwarding Algorithm for Switched Networks. 220-226 - Debanjan Roy Chowdhury, Sukumar Nandi, Diganta Goswami:
Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network. 227-232 - Jinglong Wang, Hanjiang Luo, Rukhsana Ruby, Jiangang Liu, Kai Guo, Kaishun Wu:
Reliable Water-Air Direct Wireless Communication: Kalman Filter-Assisted Deep Reinforcement Learning Approach. 233-238 - Mohamed Mekki, Nassima Toumi, Adlen Ksentini:
Microservices Configurations and the Impact on the Performance in Cloud Native Environments. 239-244 - Thomas Dreibholz, Mah-Rukh Fida, Azza H. Ahmed, Andrés F. Ocampo, Foivos Michelinakis:
A Live Demonstration of In-Band Telemetry in OSM-Orchestrated Core Networks. 245-247 - Robert Seeliger, Louay Bassbouss:
Dynamic Ad Substitution in Hybrid Broadband Broadcast Environments. 248-250 - Till Zimmermann, Eric Lanfer, Nils Aschenbruck:
Developing a Scalable Network of High-Interaction Threat Intelligence Sensors for IoT Security. 251-253 - Matthias Frank:
A Framework for Flexible ILDA Digital Network (IDN) Audio Streaming. 254-257 - Quentin Vey, Réjane Dalcé, Adrien van den Bossche, Thierry Val:
Indoor UWB localisation: LocURa4IoT testbed and dataset presentation. 258-260 - Stefan Aust:
Vehicle Update Management in Software Defined Vehicles. 261-263 - Patrick Lampe, Markus Sommer, Artur Sterz, Jonas Höchst, Christian Uhl, Bernd Freisleben:
ForestEdge: Unobtrusive Mechanism Interception in Environmental Monitoring. 264-266 - Jiangbin Chen, Yujing Liu, Shuhui Chen, Xiangquan Shi:
Research on the derivation of AS hidden links and the Discovery of Critical AS. 267-270 - Oliver Nielsen, Lucas Koefoed Schnügger, Charalampos Orfanidis, Xenofon Fafoutis:
Mobility-Focused Joining in TSCH Networks. 271-274 - Aakash Soni, Jean-Luc Scharbarg:
Deficit Round-Robin: Network Calculus based Worst-Case Traversal Time Analysis Revisited. 275-278 - Hua Wu, Rui Wang, Guang Cheng, Xiaoyan Hu:
Service-Based Identification of Highly Coupled Mobile Applications. 279-282 - Quinten Stokkink, Can Umut Ileri, Johan Pouwelse:
Reputation-Based Data Carrying for Web3 Networks. 283-286 - Camille Moriot, François Lesueur, Nicolas Stouls, Fabrice Valois:
How to build socio-organizational information from remote IP addresses to enrich security analysis? 287-290 - Sebastian Schäfer, Alexander Löbel, Ulrike Meyer:
Accurate Real-Time Labeling of Application Traffic. 291-294 - Zhejiayu Ma, Soufiane Rouibia, Frédéric Giroire, Guillaume Urvoy-Keller:
Neighbor Selection Strategies in the Wild for CDN/V2V WebRTC Live Streaming: Can we learn what a good neighbor is? 295-298 - Muhammad Hassan, Davide Pesavento, Lotfi Benmohamed:
Blockchain-Based Decentralized Authentication for Information-Centric 5G Networks. 299-302 - Patrick Lampe, Markus Sommer, Artur Sterz, Jonas Höchst, Christian Uhl, Bernd Freisleben:
Unobtrusive Mechanism Interception. 303-306 - Surabhi Sharma, Sateesh Kumar Peddoju:
IoT-Cache: Caching Transient Data at the IoT Edge. 307-310 - Ankur Nahar, Himani Sikarwar, Debasis Das:
AlcFier: Adaptive Self-Learning Classifier for Routing in Vehicular Ad-Hoc Network. 311-314 - Jihyeon Lee, Sangwon Seo, Taehun Yang, Soochang Park:
AI-aided Hidden Camera Detection and Localization based on Raw IoT Network Traffic. 315-318 - Eryk Schiller, Timo Surbeck, Mikael Gasparyan, Burkhard Stiller, Torsten Braun:
ICN With DHT Support in Mobile Networks. 319-322 - João Tiago, David Dias, Luís Veiga:
Adaptive Edge Content Delivery Networks for Web-Scale File Systems. 323-326 - Pedro Agostinho, David Dias, Luís Veiga:
SmartPubSub: Content-based Pub-Sub on IPFS. 327-330 - Chinh Tran, Mustafa Mehmet-Ali:
Towards Job Completion Time in Vehicular Cloud by Overcoming Resource Volatility. 331-334 - Akanksha Dixit, Max Smith-Creasey, Muttukrishnan Rajarajan:
A Decentralized IIoT Identity Framework based on Self-Sovereign Identity using Blockchain. 335-338 - Shudian Song, Shuyue Ma, Xiumin Zhu, Yumei Li, Feng Yang, Linbo Zhai:
Delay-sensitive Task offloading combined with Bandwidth Allocation in Multi-access Edge Computing. 339-342 - Zakaria Abou El Houda, Lyes Khoukhi, Bouziane Brik:
A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated Learning. 343-346 - Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou:
Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks. 347-350 - Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj Aoul:
Robust Deep Reinforcement Learning Algorithm for VNF-FG Embedding. 351-354 - Safa El Ayeb, Baptiste Hemery, Fabrice Jeanne, Estelle Cherrier, Christophe Charrier:
Evaluation Metrics for Overlapping Community Detection. 355-358 - Sanku Kumar Roy, Ioanis Nikolaidis:
Limited Size Lossy Compression for WSNs. 359-362 - Robert Thompson, Muhammad Ismail, Susmit Shannigrahi:
Vehicle-to-Vehicle Charging Coordination over Information Centric Networking. 363-366 - J. J. Garcia-Luna-Aceves:
Safe, Fast, and Cycle-Free Multi-Path Routing Using Vouchers. 367-370 - Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu:
Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning. 371-374 - Jiayi Liu, Shan Lu, Qinghai Yang:
Accurate-ECN: An ECN Enhancement with Inband Network Telemetry. 375-378 - Manuel Jiménez-Lázaro, Javier Berrocal, Jaime Galán-Jiménez:
Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic Solution. 379-382 - Youmna Nasser, Wafa Badreddine:
e-CLDC: Efficient Cross-Layer protocol for Data Collection in WBAN for remote patient monitoring. 383-386 - Martin Nischwitz, Marko Esche, Florian Tschorsch:
Raising the AWAREness of BFT Protocols for Soaring Network Delays. 387-390 - Abdelrahman Elewah, Walid M. Ibrahim, Khalid Elgazzar:
Paving the Way for Massive Public Sensing as a Service. 391-394 - Jiayao Wang, Ziling Wei, Baosheng Wang, Baokang Zhao, Jincheng Zhong:
Robust Packet Classification with Field Missing. 395-398 - João Pedro Meira, Rui Pedro C. Monteiro, João Marco C. Silva:
Securing MPTCP Connections: A Solution for Distributed NIDS Environments. 399-402 - Shunliang Zhang, Xiang Wang, Jing Li:
Reliability-Aware and Delay-Constrained Service Function Chain Orchestration in Multi-Data-Center Networks. 403-406 - Vijaya Durga Chemalamarri, Mehran Abolhasan, Robin Braun:
An agent-based approach to disintegrate and modularise Software Defined Networks controller. 407-413 - Rowdy Chotkan, Jérémie Decouchant, Johan Pouwelse:
Distributed Attestation Revocation in Self-Sovereign Identity. 414-421 - Esmaeil Amiri, Ning Wang, Mohammad Shojafar, Rahim Tafazolli:
Optimizing Virtual Network Function Splitting in Open-RAN Environments. 422-429 - Abdeldjalil Ikhelef, Mohand Yazid Saidi, Shuopeng Li, Ken Chen:
A Knapsack-based Optimization Algorithm for VNF Placement and Chaining Problem. 430-437 - Michael Niebisch, Daniel Pfaller, Reinhard German, Anatoli Djanatliev:
Performance Improvements in Cooperative Downloading: Encoding and Strategies for Heterogeneous Vehicular Networks. 438-446 - Peter Detzner, Jana Gödeke, Steffen Bondorf:
Peer Discovery in Tree-Structured P2P Overlay Networks by Means of Connected Dominating Sets. 447-454 - Baosen Zhao, Yifang Qin, Wanghong Yang, Pengfei Fan, Xu Zhou:
SRA: Leveraging AF_XDP for Programmable Network Functions with IPv6 Segment Routing. 455-462 - Houda Amari, Lyes Khoukhi, Lamia Hadrich Belguith:
Prediction and detection model for hierarchical Software-Defined Vehicular Network. 463-470 - Salwa Abougamila, Mohammed Elmorsy, Ehab S. Elmallah:
On Slicing Weighted Energy-Harvesting Wireless Sensing Networks with Transmission Range Uncertainty. 471-478 - Lennart Buhl:
The ClusterDuck Protocol put to the test: Evaluating and Enhancing a Communication Network for Disaster Management. 479-482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.