default search action
18th NCA 2019: Cambridge, MA, USA
- Aris Gkoulalas-Divanis, Mirco Marchetti, Dimiter R. Avresky:
18th IEEE International Symposium on Network Computing and Applications, NCA 2019, Cambridge, MA, USA, September 26-28, 2019. IEEE 2019, ISBN 978-1-7281-2522-0 - Subhankar Ghosal, Sasthi C. Ghosh:
A Randomized Algorithm for Joint Power and Channel Allocation in 5G D2D Communication. 1-5 - Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. 1-5 - Svetoslav Zhelev, Dimiter R. Avresky:
Using LSTM Neural Network for Time Series Predictions in Financial Markets. 1-5 - Cong Pu, Logan Carpenter:
Digital Signature Based Countermeasure Against Puppet Attack in the Internet of Things. 1-4 - Cong Pu, Logan Carpenter:
To Route or To Ferry: A Hybrid Packet Forwarding Algorithm in Flying Ad Hoc Networks. 1-8 - Ricardo Filipe, Jaime Correia, Filipe Araújo, Jorge Cardoso:
Towards Occupation Inference in Non-instrumented Services. 1-7 - Or Raz, Chen Avin, Stefan Schmid:
Nap: Network-Aware Data Partitions for Efficient Distributed Processing. 1-9 - Nachiket Tapas, Francesco Longo, Giovanni Merlino, Antonio Puliafito:
Transparent, Provenance-assured, and Secure Software-as-a-Service. 1-8 - Andreas Grüner, Alexander Mühle, Christoph Meinel:
An Integration Architecture to Enable Service Providers for Self-sovereign Identity. 1-5 - Hamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall:
Semantic Smart Contracts for Blockchain-based Services in the Internet of Things. 1-5 - Marek Klonowski, Dariusz R. Kowalski, Jaroslaw Mirek, Prudence W. H. Wong:
Performing Partially Ordered Sets of Jobs on a MAC in Presence of Adversarial Crashes. 1-4 - Cristoffer Leite, João J. C. Gondim, Priscila Solís Barreto, Eduardo Adílio Pelinson Alchieri:
Waste Flooding: A Phishing Retaliation Tool. 1-8 - Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments. 1-9 - Junyoung Lee, Seongeun Yoo:
Adaptive Energy Efficient RPL Avoiding Unstable Nodes for Smart Factory. 1-4 - Rodrigo Izidoro Tinini, Gustavo Bittencourt Figueiredo, Daniel Macêdo Batista:
A Batch Scheduling Algorithm for VPON Reconfiguration and BBU Migration in Hybrid Cloud-Fog RAN. 1-8 - Yaozhong Ge, Zhe Ding, Maolin Tang, Yu-Chu Tian:
Resource Provisioning for MapReduce Computation in Cloud Container Environment. 1-4 - M. Reza HoseinyFarahabady, Ali Jannesari, Zahir Tari, Javid Taheri, Albert Y. Zomaya:
Dynamic Control of CPU Cap Allocations in Stream Processing and Data-Flow Platforms. 1-8 - Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:
A Detection Method Against DNS Cache Poisoning Attacks Using Machine Learning Techniques: Work in Progress. 1-3 - Hafiz Husnain Raza Sherazi, Razi Iqbal, Luigi Alfredo Grieco:
AREA: Adaptive Resilience Algorithm for clustering in Vehicular Ad-hoc Networks. 1-3 - Fabien Charmet, Gregory Blanc, Christophe Kiennert:
Optimizing Resource Allocation for Secure SDN-based Virtual Network Migration. 1-10 - Sudarshan S. Chawathe:
Indoor-Location Classification Using RF Signatures. 1-4 - José Reyes, Jorge López, Natalia Kushik, Djamal Zeghlache:
On the Assessment and Debugging of QoE in SDN: Work in Progress. 1-3 - Paulo Ferreira, Andriy Zabolotny, João Barreto:
Bicycle Mode Activity Detection with Bluetooth Low Energy Beacons. 1-4 - José Reyes, Jorge López, Djamal Zeghlache:
Identifying Running Data-paths in Software Defined Networking Driven Data-planes. 1-8 - Young Choon Lee, Jayden King, Seok-Hee Hong:
Holistic Approach for Studying Resource Failures at Scale. 1-4 - Zeineb Rejiba, Xavier Masip-Bruin, Eva Marín-Tordera:
Computation Task Assignment in Vehicular Fog Computing: A Learning Approach via Neighbor Advice. 1-5 - Francis Laniel, Damien Carver, Julien Sopena, Franck Wajsbürt, Jonathan Lejeune, Marc Shapiro:
Highlighting the Container Memory Consolidation Problems in Linux. 1-4 - Klaus-Tycho Foerster, Stefan Schmid:
Distributed Consistent Network Updates in SDNs: Local Verification for Global Guarantees. 1-4 - Xuan Li, Miao Jin:
Charger Scheduling Optimization Framework. 1-8 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:
Platypus: Offchain Protocol Without Synchrony. 1-8 - Federico Magnanini, Luca Ferretti, Michele Colajanni:
Efficient License Management Based on Smart Contracts Between Software Vendors and Service Providers. 1-6 - Giovanni Apruzzese, Michele Colajanni, Mirco Marchetti:
Evaluating the effectiveness of Adversarial Attacks against Botnet Detectors. 1-8 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
SlingShot - Automated Threat Detection and Incident Response in Multi Cloud Storage Systems. 1-5 - Manuel F. López-Vizcaíno, Carlos Dafonte, Francisco Javier Nóvoa, Daniel Garabato, Marco Antonio Álvarez, Diego Fernández:
Network Data Flow Clustering based on Unsupervised Learning. 1-5 - Xiaojie Zhang, Saptarshi Debroy:
Migration-driven Resilient Disaster Response Edge-Cloud Deployments. 1-8 - Romas James Hada, Miao Jin, Ying Xie, Linh Le:
Link Prediction Based Minimum Cost and Balanced Partition of Large Online Social Networks. 1-9 - Younghun Chae, Natallia Katenka, Lisa Cingiser DiPippo:
An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems. 1-4 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
Security Chaos Engineering for Cloud Services: Work In Progress. 1-3 - Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. 1-9 - Yann Busnel, Noël Gillet:
A Cost-effective and Lightweight Membership Assessment for Large-scale Data Stream. 1-8 - Nguyen Binh Truong, Kai Sun, Yike Guo:
Blockchain-based Personal Data Management: From Fiction to Solution. 1-8 - Tarek Zaarour, Edward Curry:
Adaptive Filtering of Visual Content in Distributed Publish/Subscribe Systems. 1-5 - Etienne Mauffret, Flavien Vernier, Sébastien Monnet:
CAnDoR: Consistency Aware Dynamic data Replication. 1-5 - Bader A. Aldawsari, Bogdan S. Chlebus, Dariusz R. Kowalski:
Broadcasting on Adversarial Multiple Access Channels. 1-4 - Dobrin Dobrev, Dimiter Avresky:
Comparison of SDN Controllers for Constructing Security Functions. 1-5 - Sudarshan S. Chawathe:
Cost-Based Query-Rewriting for DynamoDB: Work in Progress. 1-3 - Lukasz Krzywiecki, Patryk Koziel, Nisha Panwar:
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. 1-4 - Lewis Tseng, Zezhi Wang, Yajie Zhao, Haochen Pan:
Distributed Causal Memory in the Presence of Byzantine Servers. 1-8 - Yann Busnel, Christelle Caillouet, David Coudert:
Self-organized UAV-based Supervision and Connectivity: Challenges and Opportunities. 1-5 - Xiaofei Cao, Sanjay Madria:
Efficient Geospatial Data Collection in IoT Networks for Mobile Edge Computing. 1-10 - Fatma Ezzahra Salem, Tijani Chahed, Eitan Altman, Azeddine Gati, Zwi Altman:
Optimal Policies of Advanced Sleep Modes for Energy-Efficient 5G networks. 1-7 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi:
Classification of Delay-based TCP Algorithms From Passive Traffic Measurements. 1-10 - Pedro Paulo Libório, Chan-Tong Lam, Benjamin K. Ng, Daniel L. Guidoni, Marília Curado, Leandro A. Villas:
Network Slicing in IEEE 802.11ah. 1-9 - Válter Santos, Luís Rodrigues:
Localized Reliable Causal Multicast. 1-10 - Aliyu Lawal Aliyu, Adel Aneiba, Mohammad N. Patwary:
Secure Communication between Network Applications and Controller in Software Defined Network. 1-8 - Manuel F. López-Vizcaíno, Francisco Javier Nóvoa, Diego Fernández, Victor Carneiro, Fidel Cacheda:
Early Intrusion Detection for OS Scan Attacks. 1-5 - Shankar K. Ghosh, Sasthi C. Ghosh:
$Q$-learning Based Network Selection Mechanism for CRNs with Secrecy Provisioning. 1-5 - Omid Tavallaie, Javid Taheri, Albert Y. Zomaya:
MARA: Mobility-Aware Rate Adaptation for Low Power IoT Networks Using Game Theory. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.