


default search action
ICNC 2025: Honolulu, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2025, Honolulu, HI, USA, February 17-20, 2025. IEEE 2025, ISBN 979-8-3315-2096-0

- Upendra Prajapati, Bijoy Chand Chatterjee, Amit Banerjee:

DSFSM: Delay-Sensitive Fractional Switch Migration For Multi-Controller Software-Defined Networks. 1-5 - Mei Nakashima, Takashi Kurimoto, Eiji Oki:

Link Weight Design Model with Traffic-Engineering Links based on Preventive Start-Time Optimization against Link Failures. 1-5 - Baker Al Smadi, Dileon Saint-Jean, Majd Tahat, Hosam Alamleh, Syed Raza, Ali Abdullah S. AlQahtani:

Dynamic Memorable Password Generation Algorithm (DyMP-Gen). 1-6 - Nurbek Halikulov, Anna Arestova, Kai-Steffen Hielscher, Reinhard German:

Product Line-Based Network Calculus Analysis in Vehicular Communications. 1-7 - Chikako Takasaki, Tomohiro Korikawa, Kyota Hattori:

Sample Length Determination from Network Traffic based on Periodicity Analysis. 7-11 - Jingyang Zhou, Jianrui Lu, Ruisong Wang, Ruofei Ma, Zhiliang Qin:

Environmental Sound Classification Using Convolutional Neural Network Based Transfer Learning. 12-17 - Takeshi Tsuchiya, Ryuichi Mochizuki, Hiroo Hirose, Hiroshi Ichikawa:

Study on Distributed Models Combining Method for Performance and Efficiency. 18-22 - Yudai Suzuki, Xiaoyan Wang, Masahiro Umehira, Hao Zhou:

Inter-radar Interference Mitigation via Self-attention Augmented biGRU and Customized Loss Functions. 23-27 - Sherenaz W. Al-Haj Baddar, Alessandro Languasco

, Mauro Migliardi
:
Modeling and forecasting overdispersed IoT data using an efficient and accurate computation of the Dirichlet Multinomial distribution. 28-32 - Masahiro Umehira, Yoshihiko Takeuchi:

DFTs-OFDM Radar using Zadoff-Chu Sequence for Radar-Communication Integration. 33-37 - Shota Okochi, Katsunori Yamaoka, Ken-ichi Baba:

A Cost-Effective Node Placement Method in EONs Using Superposition Coding. 38-42 - Vanlin Sathya, Mark Jimenez, Onur Sahin, Mehmet Yavuz:

Private Network - Anywhere and Everywhere. 43-49 - Vanlin Sathya, Mehmet Yavuz:

In-Building VOICE Call using Private Network. 50-56 - Jason Zurawski

, Ezra Kissel, George Robb, Corey Eichelberger, Nathaniel Mendoza:
Improving Data Mobility Through Modern Security Infrastructure. 57-61 - Sampanna Sharma, Yi Li:

Fake News Detection Using Temporal Snapshots in Graph Neural Networks. 62-66 - Thomas Schwarz:

Design Issues for Encodings for Inter-Satellite Optical Communications using Single Photon Avalanche Detectors. 67-73 - Said Mohammed Awad, Mohammed Abdel-Hafez:

Quantitative Analysis of RIS-Assisted NOMA Systems: BER, Outage Probability, and Ergodic Capacity in κ - μ Fading Channels. 74-78 - Matthew Chou:

Distributed Edge Computation for Finding an Optimal Meeting Location. 79-83 - Sean Cannan, Robert Simon:

Analysis of Greedy Hyperbolic Routing in Named Data Networking. 84-90 - Luis Antonio Leite Francisco da Costa

, Rafael Kunst, Rodrigo C. de Lamare, Edison Pignaton de Freitas:
Machine Learning-Based Optimization of Cluster Formations in 6G Networks. 91-95 - Shaghayegh Fereidounfar, Danai Chasaki:

A Secure TSM-based Mobile Coupon Payment Protocol on the Mobile Network Operator Level. 96-102 - Sanskar Shrivastava, Tiger Lim, Aditya P. Mathur:

PlantShield: An Automated Response Tool for Critical Infrastructures. 103-107 - Guokai Zhao, Tongtong Zhang, Yankai Xie, Jin Ma, Chi Zhang, Lingbo Wei:

A Light yet Low-delay Authentication System for the Internet of Vehicles Based on Blockchain. 108-112 - Liudong Zuo, Zhong Chen, Pan Lai:

Balancing Cost and Completion Time Through Variable Paths With Variable Bandwidth in HPNs. 113-117 - Kento Araki, Yuki Konishi, Panote Siriaraya, Kazutoshi Sumiya, Yukiko Kawai, Shinsuke Nakajima:

A Method for Extracting Related Information around Walking Routes and Automatic Generation of Explanatory Text. 118-122 - Haniyeh Ehsani Oskouie, Christina Chance

, Claire Huang, Margaret Capetz, Elizabeth Eyeson, Majid Sarrafzadeh:
Leveraging Large Language Models and Topic Modeling for Toxicity Classification. 123-127 - Harshit Gupta, Nidhi Srivastava, Lotiswar Borman:

AI-Based Handover Decision Algorithm for Conditional Handover in Non-Terrestrial Networks (NTNs). 128-132 - Michael Welzl:

TCP Pacing in the Linux Kernel. 133-139 - Joy Lebese, Thomas O. Olwal:

Hybrid Prediction of TVWS Channel Occupancy for Cognitive Radio Systems. 140-144 - Wei Zhao, Kentaro Go:

Wearable Sensors and Machine Learning: Insights into Depression, Anxiety, and Emotional States and Changes. 145-150 - Hyoung-Kee Choi, Songhui Kwon:

Curious Administrator's Misbehaviors in Message Layer Security (MLS). 151-155 - Kaibo Wang, Anqi Zhang, Tangyou Liu, Wenqian Zhang, Guanglin Zhang:

CloakFed: Exploring Stealthy and Adaptive Backdoor Attacks in Federated Learning. 156-161 - Souryendu Das, Andrew White, Malcolm Lyn, Stavros Kalafatis:

Smartly Managing Traffic and Latency in a Content-Based data center using Modified Packet Headers, Machine Learning, Load Balancing, and Network Telemetry. 162-167 - Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Sachin Shetty:

A Bayesian Belief Network Framework for Protecting Generative AI-driven Attack in Smart Grid Communication. 168-173 - Al Amin, Kamrul Hasan, Sharif Ullah, Liang Hong:

AI-Driven Secure Data Sharing: A Trustworthy and Privacy-Preserving Approach. 174-179 - Ranwa Al Mallah, Alejandro Quintero:

Adversarial Threats and Defense Mechanisms in Machine Learning-Based SQL Injection Detection: A Security Analysis. 180-184 - Mohamad Khattar Awad, Ghazal Alsholi, Haniah Altabaa, Dania Hani Abu Daqar, Shahad Alshaher, Hamed M. K. Alazemi:

Self-similarity-based DDoS Detection for Software-defined Networks. 185-189 - James Norris, Ryan Seeber, John Nieto:

Modulation Recognition Using Cyclostationary Heat Maps With Residual/Deep Learning. 190-194 - Sheikh Tareq Ahmed, Annamalai Annamalai, Ahmed Abdelmoamen Ahmed, Mohamed F. Chouikha:

An Empirical Analysis of LoRa Mesh Configurations for Enhancing Network Efficiency Under Constrained Dwell Time Environments. 195-200 - Sheikh Tareq Ahmed, Annamalai Annamalai, Ahmed Abdelmoamen Ahmed, Mohamed F. Chouikha, Sanjaya Subedi, Miguel Polanco:

An ML-Based Location Tracking System for LoRa Mesh Networks in GPS-Denied Environments. 201-206 - An Vuong, Anthony Q. Nguyen, Thinh Nguyen:

Active Data Acquisition-An Information Theoretic Approach. 207-211 - Raju Dhakal, Bhawana Poudel Devkota, Laxima Niure Kandel:

Radio Frequency Fingerprinting With Siamese Network. 212-216 - Brook W. Abegaz, Lorenzo Trentini, Michael Quiroga:

Coordinated Motion Planning for Multi-Degrees of Freedom Industrial Robots using Edge Computing Devices. 217-221 - Pietro Fusco, Lorenzo Porcelli, Francesco Palmieri, Massimo Ficco:

Supporting UAVs Swarm Missions by Multi-Agent Reinforcement Learning. 222-226 - Komal Shah, Yiheng Niu, Xuehan Yi, Fangxiao Guo, Michal Aibin:

Optimizing Cloud Task Scheduling with Animal-Inspired Metaheuristic Algorithms. 227-232 - Walter Roensch, Hyuck M. Kwon, Amitav Mukherjee, Khanh Pham:

Flexible Routing Algorithm for Digital Intermediate Frequency Interoperability Satellite Systems Using Fair Buffer Queuing. 233-237 - Lucas Miranda, Lucas Senos, Daniel S. Menasché, Gaurav Kumar Srivastava, Anton Kocheturov, Enrico Lovat, Abhishek Ramchandran, Tobias Limmer:

A Product-Oriented Assessment of Vulnerability Severity Through NVD CVSS Scores. 238-242 - Sayyed Farid Ahamed, Soumya Banerjee, Sandip Roy, Marc Vucovich, Devin Quinn, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty:

Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning. 243-248 - Foster Yeboah:

Automatic Collection and Distribution of Discovery to Defense Attorneys. 249-253 - Ankit Chouhan, Nashid Shahriar, JingTao Yao:

HCL: A Hybrid CNN-LSTM Framework for Intrusion Detection in SDN-IoT Networks. 254-258 - Toru Furusawa:

In-Vehicle Artificial Intelligence Agent System with Local Large Language Models for Agent Selection and Vehicle Control. 259-264 - Biagio Boi, Ilaria Amelia Caggiano, Christian Esposito, Lucilla Gatt:

User-aware LLM-based Framework for Enhancing Contractual Clauses Compliance. 265-270 - Md. Nurul Absur, Sourya Saha, Sifat Nawrin Nova, Kazi Fahim Ahmad Nasif, Md Rahat Ul Nasib:

Optimizing CDN Architectures: Multi-Metric Algorithmic Breakthroughs for Edge and Distributed Performance. 271-275 - Liu Jingyu, Mondher Bouazizi, Tomoaki Ohtsuki:

Source Channel Model Selection for Downlink CSI Feedback Estimation using Transfer Learning in Massive MIMO System. 276-281 - Emmanuel J. Samson

, Kamrul Hasan, Liang Hong, Imtiaz Ahmed, Henry Onyeka, Sachin Shetty:
Optimizing 5G Network Slices: LSTM and Game Theory Synergy. 282-287 - Alex Liew, Ping Ji, Sos S. Agaian:

Malware Packet Detections via CNN Ensembles and Optimum Feature Selection. 288-294 - Minh K. Quan

, Mayuri Wijayasundara, Sujeeva Setunge
, Pubudu N. Pathirana:
Quantum-Enhanced Transformers for Robust Acoustic Scene Classification in IoT Environments. 295-299 - Bence Ladóczki:

Accelerating Machine Learning Models for Video Streaming Traffic. 300-306 - Koyuki Izumi, Marin Matsumoto, Masato Oguchi:

Communication Volume Reduction of Homomorphic Ciphertext with Compressed Sensing. 307-312 - Nian Liu, Jia Hou:

Beamforming Optimization of Secrecy Rate in Cognitive Radio Networks Assisted by STAR RIS. 313-317 - Wenhui Du, Yuanhang He, Gaolei Li, Xiao Yang, Jianhua Li, Ge Ren, Kai Zhou

:
HyperTTC: Hypergraph-Empowered Tactic-Specific Traffic Clustering for Atomized APT Detection. 318-322 - Franco Cirillo, Christian Esposito, Francesco Palmieri:

Lightweight Framework for PUF based IoT Authentication without Fuzzy Extractor. 323-328 - Jian Ren, Tongtong Li:

Improving Machine Learning Classification Accuracy in Noisy Environment. 329-333 - Mengdi Wei, Yifan Li, Yiyi Wang, Zijian Cao, Michal Aibin:

Optimizing Real-Time E-Commerce Data Streams: A Comparative Analysis of Serialization and Topic Design Patterns in Apache Kafka. 334-339 - Michal Aibin, F. Chen, M. Menzi, Liam Scholte, Z. Jiang, Yiwu Chen, X. Jin, C. Liu, Ania Aibin:

Federated Learning Framework for Nurse Scheduling to Lower Fatigue Levels of Nurses. 340-344 - Massimo Ficco, Pietro Fusco

, Antonio Guerriero, Roberto Pietrantuono, M. Russo, Flavio Palmieri, Stefano Russo:
A Benchmark for DDoS Attacks Detection in Microservice Architectures. 345-349 - Yijie Zhang, Chase Q. Wu, Aiqin Hou:

Cross-layer Scheduling for MapReduce-based Big Data Workflows in Heterogeneous Hadoop Systems. 350-355 - Rahul Debnath, Ahmed Abdelmoamen Ahmed, Md Jobair Bin Alam:

On Developing Smart IoT-Based Distributed System for Remote Detection of Slope Movements. 356-361 - Shuta Sekimori, Hiroaki Hashida, Yuichi Kawamoto, Nei Kato, Kohei Yoshida, Masayuki Ariyoshi:

Frequency Prism-based Beamforming and Resource Allocation in LEO Satellite Networks with Delay Adjustable IRS. 362-366 - Suman Kumar, Tyler McKinley, Bhimashankar Malbhage:

Enhancing Traffic Video Data Collection from Compromised Views with Adaptive Segmentation. 367-371 - Mai Yamakawa, Seiji Mochizuki, Yu Kuwahara, Tsuyoshi Kato, Kousuke Imamura, Tetsuya Matsumura:

20-µs Low-latency Simple Video Coding with High Compression Ratio for IoT Video-transmission. 372-376 - Zhenchao Ma, Forrest Paul, Sara Zhang, Hongjing Chen, Hamid Reza Tohidypour, Panos Nasiopoulos:

A Novel Deep Learning-Based Compressed Image Enhancement Method for Machine Consumption. 377-381 - Christopher Morales-Gonzalez, Matthew Harper, Boya Yuan, Xinwen Fu:

On Software Security of Building Automation Systems. 382-386 - Fahmida Afrin, Neda Moghim, Sachin S. Shetty:

ResGCN: A Scalable, Robust and Efficient Approach for Radio Fingerprinting. 387-393 - Thibaud Ardoin, Niklas Pauli, Benedikt Groß, Mahsa Kholghi, Khan Reaz, Gerhard Wunder:

Tracking UWB Devices Through Radio Frequency Fingerprinting Is Possible. 394-400 - Svetlana N. Yanushkevich, Vlad P. Shmerko, Gregor Wolbring:

On-Body e-Hub: Accessibility Technology for People with Disabilities. 401-405 - Dimitrios Brodimas

, Nikolaos Tzanis, Alexios N. Birbas:
Intent-Based 5G Core Deployment Using Generative AI. 406-410 - Hovannes Kulhandjian

, Oludayo Iredele:
CrossBot: An AI-Driven Smart Robot for Enhancing Pedestrian Safety at Crosswalks. 411-415 - Marie Louise Uwibambe, Qinghua Li:

Safeguarding Industrial Automation: A Fuzzing Framework for PLC Control Logic. 416-422 - Shabnam Sodagari:

Leakage Thresholds and Security Trade-offs in Finite Blocklength Wiretap Channels. 423-428 - Huzaif Khan, Lokesh Purohit, Ali Jalooli:

Bridging Security and Efficiency: Energy-Aware Clustering for Data Encryption in Smart Agriculture. 429-435 - Ziyu Chen, Denny Vishnu Puri Landika, Alvin Yang, Yizhu Wen, Haofan Cai, Yao Zheng

, Hanqing Guo:
Secure-IRS: Defending Against Adversarial Physical-Layer Sensing in ISAC System. 436-440 - Tongtong Li, Jinxian Deng, Boxin Sun, Jian Ren:

Approximate Equivalence of Causalized Convergent Cross Mapping and Directed Information under Stationary Ergodic Gaussian Random Processes. 441-445 - Congzhou Li, Zhouxiang Wu, Divya Khanure, Jason P. Jue:

A Multi-Agent Reinforcement Learning Scheme for SFC Placement in Edge Computing Networks. 446-451 - Suman Kumar, Byungkwan Jung, Kazi Amanul Islam Siddiqui:

Dual-Objective Optimization in Federated Cloud: Profit Equalization and Ecosystem Maximization. 452-457 - Mark Kotys, Yijie Zhang, Chase Q. Wu, Aiqin Hou:

Optimizing Task Allocation for DNN Inference on Edge Devices. 458-462 - Tomoki Otsuka, Da Li, Panote Siriaraya, Shinsuke Nakajima:

Development of A Relaxation Support System Utilizing Stereophonic AR. 463-467 - Ahmed Abdelmoamen Ahmed, Vratikaben Bhadani:

WanderWatch: LoRaWAN-Based Monitoring System for Wandering Risk Patients. 468-472 - Chen Yang:

Exploring Potential Differences Among Various Model Architectures in Heterogeneous Time Series Through Search Methods. 473-478 - Kwame Assa-Agyei, Kayode Owa, Tawfik Al Hadhrami, Seth Kwame Asafo:

Advanced Techniques for Prime Number Generation in RSA Encryption: A Path Toward Greater Efficiency. 479-484 - Ziqi Wang, Shiwen Mao:

Generative AI for 3D Human Pose Completion Under RFID Sensing Constraints. 485-490 - Muhammad Enayetur Rahman, Md. Shirajum Munir, Sachin Shetty:

Deep Learning-Driven Beam and Blockage Forecasting for Reliable mmWave Vehicular Networks. 491-497 - Hongwei Li, Danai Chasaki:

Graph Density Mutation Study to Improve Cyber-Physical Systems Intrusion Detection with Heterogeneous GNN and Express Edges. 498-504 - Hovannes Kulhandjian

, Nicholas Amely, Michel Kulhandjian:
AI-Powered Fruit Harvesting System Using a Robotic Arm for Precision Agriculture. 505-509 - Sayyed Farid Ahamed, Soumya Banerjee, Sandip Roy, Aayush Kapoor, Marc Vucovich, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:

Privacy Drift: Evolving Privacy Concerns in Incremental Learning. 510-515 - Sayyed Farid Ahamed, Amit Chakraborty, Sandip Roy, Bikash Chandra Singh, Sachin Shetty:

OT3L: Optimal Transport-based Targeted Transfer Learning for Efficient Domain Adaptation. 516-521 - Nasif Fahmid Prangon, Abdalaziz Sawwan, Jie Wu:

Resource Optimized Task Offloading in Delay Sensitive Edge Networks. 522-527 - Nicholas X. Wang:

GraphGPT: A Self Supervised-Learning for Intuitive, Logical, and Visual Education. 528-532 - Anatolij Zubow, Christos Laskos, Sascha Rösler, Gerhard Wunder, Falko Dressler:

Wi-Fi Ranging under Interference. 533-537 - Dengyi Liu, Honggang Wang, Hua Fang:

A Neural Network Model for Autonomous Vehicles Safety Check Using Camera-only/Camera-Lidar Images. 538-543 - Salma Sultana, Shuhao Zeng, Ahmed Abdelhadi, Husheng Li, Zhu Han, H. Vincent Poor:

A Non-Orthogonal Multiple Access Assisted Integrated Sensing and Communication Network using Orthogonal Delay-Doppler Division Multiplexing. 544-550 - Robert Esswein, Quincy Bayer, Mai Abdelhakim, Robert K. Cunningham:

Scalability of LEO Satellite Constellations with Static and Dynamic Topologies. 551-556 - Pankaj Chaudhary, Neminath Hubballi:

EeNCache : Neighborhood Cooperative Content Caching and Delivery in Named Data Networks. 557-561 - Mathias Santos de Brito, Thomas Magedanz, Marius Corici:

Improved DX on the development of O-RAN Near-RT RIC E2 Interface Solutions. 562-566 - Neminath Hubballi, Pratibha Khandait:

WebScreen+: Web Traffic Screening Performance Enhancement with eBPF Filtering. 567-571 - Eiji Oki, Ryotaro Taniguchi, Kazuya Anazawa, Takeru Inoue:

Expanding Optical-Circuit-Switching Multi-Stage Networks to Ensure Admissible Blocking Probability in Data Centers. 572-576 - Jelena V. Misic, Vojislav B. Misic:

Scalable quantum based solutions for Blockchain Systems. 577-582 - Naoaki Yamanaka, Satoru Okamoto, Hiroyuki Tsuda, Takashi Miyamura, Motoharu Matsuura, Kazunori Mukasa:

Very-low-delay massive wavelength division multiplexed optical network using Newly structured hollow-core fiber and its application (Invited talk). 583-587 - Liujianfu Wang, Yuyang Du, Jingqi Lin

, Kexin Chen, Soung Chang Liew:
Rephrase and Contrast: Fine-Tuning Language Models for Enhanced Understanding of Communication and Computer Networks. 588-594 - Daniel Uvaydov, Salvatore D'Oro, Tommaso Melodia:

AutoPilot: Steering OFDM Pilots Away From Jamming Using Deep Learning. 595-600 - William Marfo, Deepak K. Tosh, Shirley V. Moore:

Adaptive Client Selection in Federated Learning: A Network Anomaly Detection Use Case. 601-605 - Nafeez Fahad

, Md Touhiduzzaman, Eyuphan Bulut:
Ensemble Learning based WiFi Sensing using Spatially Distributed TX-RX Links. 606-611 - Chih-Cheng Tseng, Hsin-Cheng Wu, Shao-Yu Lien, Jiun-Chi You, Chang-Yi Liu, Rui-En You:

The Design of GBDT-based Anomaly Detection for O-RAN Near-RT RIC. 612-616 - Ugur Demir, Charlotte Lynn Chen, Anthony Zhao, Nicholas X. Wang, Michelle Wang, Derek Li, Aggelos K. Katsaggelos:

Rethinking Video Generation: Overcoming the Limits of Pretrained Models. 617-621 - Krzysztof Ostrowski, Michal Piasecki, Malgorzata Kudelska, Patryk Bartkowiak

, Haohong Wang, Brian Bullock:
Enhancing Video Stylization with Integral Noise. 622-628 - Isabella D. Lutz, Matthew C. Valenti:

Bridging the Security Gap: Lessons from 5G and What 6G Should Do Better. 629-634 - Andrea Zanella, Andrea Baiocchi, Alexey Rolich:

Analysis of a Persistent Multi-Channel Slotted ALOHA Protocol Without Acknowledgment. 635-641 - Marcin Kalinski, Michal Podstawski, Krzysztof Ostrowski, Malgorzata Kudelska, Patryk Bartkowiak

, Piotr Lyczko, Michal Piasecki, Thomas Visscher, Haohong Wang:
Addressing Character Consistency Challenges in AI Filmmaking. 642-648 - Divya Khanure, Riti Gour

, Jason P. Jue:
Elastic Network Slice Composition with Traffic-Weighted Availability-Guarantee. 649-654 - Razvan Cristian Voicu, Amanda Frischmann, Muhammad Hassan Tanveer, Amir-Ali Amiri Moghadam, Yannique Tello, Gabriela Oprea-Ilies, Yusun Chang

:
Biologically Inspired Networking (BIN): Leveraging Neurobiological Principles for Adaptive, Scalable, and Efficient Communication. 655-661 - Sameh Eldessoki, Christian Hofmann, Dimitrios Alanis, Panagiotis Botsinis, Tarik Tabet:

Distributed Compute Offloading in Local Communications. 662-667 - Michael Welzl, Safiqul Islam, Kristjon Ciko, Petter Barhaugen, Oskar Haukebøe:

NETHINT: Monitoring Local Network Interference With Passive Measurements. 668-674 - Htet Htet Hlaing, Yuuichi Teranishi, Hitoshi Asaeda:

Empowering Secure Data-Driven Services for CPS: An Attribute-Based Access Control Model with Experimental Validation. 675-680 - Yasunori Owada, Toshiaki Kuri, Cheikh Saliou Mbacke Babou, Goshi Sato, Taddashi Ise, Takeshi Isono:

Portable SIP4D: An Information Sharing System for Disaster Response Agencies in Network-Disconnected Areas. 681-686 - Mingrui Zhang, Phuong Ha, Hamid Bagheri, Lisong Xu

:
Accuracy Evaluation of TCP FlightSize Estimation: Analytical and Experimental Study. 687-693 - Haoyu Wang, Xiaoqian Zhang, Allen Yang, Bo Sheng:

DCTCP-FQ: Enhancing Fairness and Convergence Time in Data Center Congestion Control. 699-703 - Subrahmanya Chandra Bhamidipati, Adam Maxwell, Emily Pham, Johann Zhang, Zack Murry, Alicia Esquivel Morel, Chengyi Qu, Sharan Srinivas, Prasad Calyam:

Q-Learning-Based Dynamic Drone Trajectory Planning in Uncertain Environments. 709-715 - Sajid Alam, Wang-Cheol Song:

Enhancing Network Intelligence with LLM-Based IBN and DRL: A Dynamic Approach for SAGIN Resource Management. 723-727 - Giuseppe Baruffa, Luca Rugini, Fabrizio Frescura, Paolo Banelli:

Radio and Computation Resource Management in Unmanned Vehicles with Edge Computing. 728-732 - Changke Wang, Xiaowen Huang, Wenqian Zhang, Guanglin Zhang:

DNN Inference Acceleration and Reliable Task Offloading in Mobile-Edge Computing. 733-739 - William Marfo, Deepak K. Tosh, Shirley V. Moore:

Federated Learning for Efficient Condition Monitoring and Anomaly Detection in Industrial Cyber-Physical Systems. 740-746 - Jacob Taegon Kim, Alex Sim

, Kesheng Wu
, Jinoh Kim:
Improving Slow Transfer Predictions: Generative Methods Compared. 747-751 - Onur Yener, Marcin Brzozowski, Ronald Chitauro, Peter Langendörfer:

Pushing the Limits of 5G Private Networks: A Practical Examination of Network Stressors. 752-756 - Yansong Bai, Liyan Li, Yunlong Cai, Minjian Zhao:

Effective Rate Enhancement for RIS-Assisted Systems: An Irregular Element-Grouping Structure. 757-762 - Alireza Famili, Tolga O. Atalay, Angelos Stavrou:

Unlocking the Potential of IEEE 802.11az: A Deep Dive into Ranging Capabilities. 763-769 - Alperen Balci, Batu Saatçi, Emir Atak, Elif Uysal:

Implementation of an Age Prioritized Wi-Fi Network with Multi-Armed Bandit Polling. 770-774 - Zilu Zhao, Dirk Slock:

Non-Circular Combined Expectation Propagation and Variational Bayes for Semi-Blind Channel Estimation in Cell-Free Systems. 775-779 - Manuele Favero

, Alessandro Canova, Marco Giordani
, Michele Zorzi:
Performance Evaluation of IoT LoRa Networks on Mars Through ns-3 Simulations. 780-785 - Lei Ma, Kai Ying, Lun Kun, Danni Li:

Research on the Effect of Meteorological Factors on Non-terrestrial Channel Characteristics. 786-790 - Kai Ying, Linshan Zhao, Yingkai Cao, Lun Kun, Danni Li, Kai Kang:

A Low-Complexity Post-Distortion Linearization for Satellite and mmWave Communication Systems. 791-795 - Zhonghui Wang, Feng Wang, Khaled Sabbahein:

On WVSN Deployment and Scheduling for 3D Indoor Monitoring: A Cross-Layer Design Approach. 796-800 - Ukyo Hasegawa

, Hideharu Kojima
:
Performance Evaluation of Secure Routing Protocols with Lattice Signature Scheme for Wireless Multi-hop Networks. 801-806 - Koushi Okui, Kengo Ando, Giuseppe Abreu, Koji Ishibashi:

Leakage Minimization in Network-Assisted Full-Duplex Cell-Free Massive MIMO Systems. 807-812 - Sang Wu Kim, Khanh D. Pham:

Integrated Navigation and Frequency-Hopping Communication. 813-817 - Mohammed S. Aloqlah, Abdullah S. Aloqlah:

Unified Outage Probability Analysis for Dual-Hop Decode-and-Forward Relaying with Energy Harvesting over α - η - μ Fading Channels. 818-822 - Kuranage Roche Rayan Ranasinghe

, Yao Ge, Giuseppe Thadeu Freitas de Abreu, Yong Liang Guan:
Joint Channel Estimation and Data Detection for AFDM Receivers With Oversampling. 823-828 - Jay Cheng, Shin-Shiang Huang:

On the Fault-Tolerant Capability of Optimal Constructions of Optical Priority Queues. 829-833 - Imran Ahmed, Eiji Oki, Bijoy Chand Chatterjee:

Modeling Blocking Performance with Fragmentation in Spectrally-Spatially Elastic Optical Networks. 834-838 - Yuhang Liu, Xiaosong Yu, Yongli Zhao:

Flexible Encryption Tunnel with Limited Quantum Key Distribution over Classical Optical Networks. 839-843 - Takahiro Ishiyama, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka:

Trial of the External Electric Power Supply-Less IoT System Using Hollow Core Fiber. 844-848 - Meiling Min, Jia Hou:

Reliability Analysis of CNOMA System Based on STAR-RIS. 849-853 - Jia Qi Yan, Jia Hou:

Performance Analysis of Cooperative RSMA-SWIPT Communication System. 854-858 - Zhilei Chen, Wenhao Wang, Deli Qiao:

Statistical QoS-Aware Design of UAV-Enabled Integrated Sensing and Communication System. 859-864 - Kuranage Roche Rayan Ranasinghe

, Kengo Ando, Giuseppe Thadeu Freitas de Abreu:
From Theory to Reality: A Design Framework for Integrated Communication and Computing Receivers. 865-870 - Zilu Zhao, Dirk Slock:

Extrinsics and Linearized Component-Wise Conditionally Unbiased MMSE Estimation in Approximate Message Passing. 871-875 - Birendra Kathariya, Dae Yeol Lee, Tsung-Wei Huang, Tong Shao, Peng Yin, Guan-Ming Su:

Gaussian Splatting: State-of-The-Arts and Future Trends. 876-881

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














