


default search action
27th ICCCN 2018: Hangzhou, China
- 27th International Conference on Computer Communication and Networks, ICCCN 2018, Hangzhou, China, July 30 - August 2, 2018. IEEE 2018, ISBN 978-1-5386-5156-8

- Kang Chen, Jianwei Liu, James Martin, Kuang-Ching Wang

, Hongxin Hu:
Improving Integrated LTE-WiFi Network Performance with SDN Based Flow Scheduling. 1-9 - Xianliang Jiang

, Guang Jin, Haiming Chen:
HFCC: An Adaptive Congestion Control Algorithm Based on Explicit Hybrid Feedbacks. 1-8 - Xiaofei He, Wei Yu

, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu, Xinwen Fu
:
Towards 3D Deployment of UAV Base Stations in Uneven Terrain. 1-9 - Yi Ji, Juncheng Jia, Jin Wang, Jingya Zhou, Shukui Zhang:

Group Based Strategy to Accelerate Rendezvous in Cognitive Radio Networks. 1-9 - Babak Mafakheri, Leonardo Goratti, Roberto Riggio

, Chiara Buratti, Sam Reisenfeld
:
LTE Transmission in Unlicensed Bands: Evaluating the Impact over Clear Channel Assessment. 1-8 - Kun Tang, Xubin He, Saurabh Gupta, Sudharshan S. Vazhkudai, Devesh Tiwari:

Exploring the Optimal Platform Configuration for Power-Constrained HPC Workflows. 1-9 - Tiago B. G. Perez, Wei Chen, Raymond Ji, Liu Liu, Xiaobo Zhou:

PETS: Bottleneck-Aware Spark Tuning with Parameter Ensembles. 1-9 - Fei Peng

, Le Qin, Min Long:
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection. 1-9 - Dominik Schäfer, Janick Edinger, Martin Breitbach

, Christian Becker:
Workload Partitioning and Task Migration to Reduce Response Times in Heterogeneous Computing Environments. 1-11 - Yuan Zhuang, Xiaohui Wei, Hongliang Li, Yongfang Wang, Xubin He:

An Optimal Checkpointing Model with Online OCI Adjustment for Stream Processing Applications. 1-9 - Xu Chen, Wenzhong Li, Tong Zhan, Sanglu Lu:

MMCode: Enhancing Color Channels for Screen-Camera Communication with Semi-Supervised Clustering. 1-9 - Guang Yang, Yong Jiang, Qing Li

, Xuya Jia, Mingwei Xu:
Cross-Layer Self-Similar Coflow Scheduling for Machine Learning Clusters. 1-9 - Shiyan Chen, Dagang Li

, Xiaogang Chen, Wenbing Han, Deze Zeng:
Storage-Aware Network Stack for NVM-Assisted Key-Value Store. 1-9 - Hamed Rezaei, Mojtaba MalekpourShahraki, Balajee Vamanan

:
Slytherin: Dynamic, Network-Assisted Prioritization of Tail Packets in Datacenter Networks. 1-9 - Ryan Blake Jackson, Tracy Camp:

Amazon Echo Security: Machine Learning to Classify Encrypted Traffic. 1-10 - Philip Lundrigan

, Sneha Kumar Kasera, Neal Patwari:
STRAP: Secure TRansfer of Association Protocol. 1-9 - Yuan Gong

, Christian Poellabauer
:
Protecting Voice Controlled Systems Using Sound Source Identification Based on Acoustic Cues. 1-9 - Zhiyuan Zheng, Allen Webb, A. L. Narasimha Reddy, Riccardo Bettati:

IoTAegis: A Scalable Framework to Secure the Internet of Things. 1-9 - Gonca Gürsun, Murat Sensoy

, Melih Kandemir
:
On Context-Aware DDoS Attacks Using Deep Generative Networks. 1-9 - Hong Zhong, Bo Huang, Jie Cui, Jiang Li, Kewei Sha

:
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. 1-8 - Shujie Cui, Sana Belguith

, Ming Zhang, Muhammad Rizwan Asghar
, Giovanni Russello:
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search. 1-9 - Ihsan H. Abdulqadder

, Deqing Zou, Israa T. Aziz
, Bin Yuan:
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network. 1-9 - Rui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li:

Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures. 1-9 - Yan Sun, Shambhu J. Upadhyaya:

Synthetic Forgery Attack against Continuous Keystroke Authentication Systems. 1-7 - Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:

FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. 1-9 - Ahmed Boubrima, Walid Bechkit, Hervé Rivano

, Lionel Soulhac:
Leveraging the Potential of WSN for an Efficient Correction of Air Pollution Fine-Grained Simulations. 1-9 - Sheng Tan, Linghan Zhang

, Jie Yang:
Sensing Fruit Ripeness Using Wireless Signals. 1-9 - Han Zou, Jianfei Yang, Yuxun Zhou, Lihua Xie

, Costas J. Spanos:
Robust WiFi-Enabled Device-Free Gesture Recognition via Unsupervised Adversarial Domain Adaptation. 1-8 - Yufeng Deng, Dong Wang, Qian Zhang, Run Zhao, Bo Chen

:
ReaderTrack: Reader-Book Interaction Reasoning Using RFID and Smartwatch. 1-9 - Yuan Cao, Yunyi Guo, Benyu Liu, Wei Ge, Min Zhu, Chip-Hong Chang

:
A Fully Digital Physical Unclonable Function Based Temperature Sensor for Secure Remote Sensing. 1-8 - Weichao Gao, William G. Hatcher, Wei Yu

:
A Survey of Blockchain: Techniques, Applications, and Challenges. 1-11 - You Sun, Rui Zhang, Xin Wang, Kaiqiang Gao, Ling Liu:

A Decentralizing Attribute-Based Signature for Healthcare Blockchain. 1-9 - Ruozhou Yu

, Guoliang Xue, Vishnu Teja Kilari, Dejun Yang
, Jian Tang:
CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel Networks. 1-9 - Yutao Huang, Yifei Zhu

, Xiaoyi Fan, Xiaoqiang Ma, Fangxin Wang, Jiangchuan Liu, Ziyi Wang
, Yong Cui:
Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge Learning. 1-9 - Yu-Jen Ku, Po-Han Chiang, Sujit Dey:

Quality of Service Optimization for Vehicular Edge Computing with Solar-Powered Road Side Units. 1-10 - Hongyue Wu, Shuiguang Deng

, Wei Li, Samee U. Khan
, Jianwei Yin, Albert Y. Zomaya
:
Request Dispatching for Minimizing Service Response Time in Edge Cloud Systems. 1-9 - Alimzhan Sultangazin, Suhas N. Diggavi, Paulo Tabuada

:
Protecting the Privacy of Networked Multi-Agent Systems Controlled over the Cloud. 1-7 - Seungwon Shin, Zhaoyan Xu, Yeonkeun Kim, Guofei Gu:

CloudRand: Building Heterogeneous and Moving-Target Network Interfaces. 1-11 - Xiaokun Li, Siyang Wang, Weigang Wu, Xu Chen, Bin Xiao

:
Interest Tree Based Information Dissemination via Vehicular Named Data Networking. 1-9 - Fan Wu

, Wang Yang, Zhenyu Fan, Kaijin Tian:
Multicast Rate Adaptation in WLAN via NDN. 1-8 - Aleksei Fedorov, Haibo Zhang

, Yawen Chen
:
User Localization Using Random Access Channel Signals in LTE Networks with Massive MIMO. 1-9 - Yao Ma, William F. Young, Eric Anderson

, Jason B. Coder:
Probability of Coexistence of LTE-LAA and WLAN Systems Based on Delay Constraints. 1-9 - Tianyuan Sun, Yongcai Wang, Deying Li, Wenping Chen, Zhaoquan Gu:

Robust Component-Based Network Localization with Noisy Range Measurements. 1-9 - Hemin Yang, George F. Riley:

Machine Learning Based Flow Entry Eviction for OpenFlow Switches. 1-8 - Zhijie Zhu, Qing Li, Shu-Tao Xia, Mingwei Xu:

CAFFE: Congestion-Aware Fast Failure Recovery in Software Defined Networks. 1-9 - Deepak Singh, Bryan C. K. Ng, Yuan-Cheng Lai, Ying-Dar Lin, Winston K. G. Seah

:
Modelling Switches with Internal Buffering in Software-Defined Networks. 1-9 - Lei Wang, Qing Li, Yang Liu, Yong Jiang, Jianping Wu:

Simplifying Network Updates in SDN and NFV Networks Using GUM. 1-9 - Minshen Wang, Jinbo Xiong, Rong Ma, Qi Li, Biao Jin:

A Novel Data Secure Deletion Scheme for Mobile Devices. 1-8 - Fei Yan, Yijia Li, Liqiang Zhang:

ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices. 1-9 - Zhen Li, Qi Liao:

Harnessing Uncertainty in Vulnerability Market. 1-9 - Yu Zhang, Huan Wu, Jianzhong Zhang, Jingjing Wang, Xueqiang Zou:

TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT Detection. 1-9 - Jia-Hao Xu, Zhen Wang, Guanghai Cui, Yizhi Ren, Hong Ding, Kim-Kwang Raymond Choo

:
An Extended Exploration to the Epidemic Containment Game. 1-7 - Zengwen Yuan, Yuanjie Li, Chunyi Peng, Songwu Lu, Haotian Deng, Zhaowei Tan, Taqi Raza:

A Machine Learning Based Approach to Mobile Network Analysis. 1-9 - Bryan Hall, Manimaran Govindarasu:

An Assured Deletion Technique for Cloud-Based IoT. 1-9 - Anuj Kaul, Li Xue, Katia Obraczka, Mateus A. S. Santos, Thierry Turletti:

Handover and Load Balancing for Distributed Network Control: Applications in ITS Message Dissemination. 1-8 - Ashwin Bahulkar, Boleslaw K. Szymanski

:
Interaction Patterns in a Multilayer Social Network. 1-8 - Hanshang Li, Ting Li, Fan Li, Yue Wu, Yu Wang:

Cumulative Participant Selection with Switch Costs in Large-Scale Mobile Crowd Sensing. 1-9 - Huiling Shi, Wei Zhang, Xinchang Zhang:

Xspider: A Multi-Switch Testbed for Software Defined Networks. 1-2 - Zhenguang Yu, Jingyu Wang

, Qi Qi, Haifeng Sun, Jian Zou:
A Boundless Resource Orchestrator Based on Container Technology in Edge Computing. 1-2 - Ligang Dong, Long Chen, Bohan He, Weiming Wang:

The Research on Designs of Multiple Flow Tables in the OpenFlow Protocol. 1-2 - Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:

Towards Blockchain-Based Scalable and Trustworthy File Sharing. 1-2 - Jian Zou, Jingyu Wang

, Qi Qi, Haifeng Sun, Zhenguang Yu, Jun Xu:
EVN: An Elastic Virtual Network Supporting NFV Customized and Rapid Migration. 1-2 - Dejiao Niu, Bo Chen, Tao Cai

, ZhiPeng Chen:
The Classified and Active Caching Strategy for Iterative Application in Spark. 1-2 - Ragaharini Jawaharan, Purnima Murali Mohan

, Tamal Das, Mohan Gurusamy
:
Empirical Evaluation of SDN Controllers Using Mininet/Wireshark and Comparison with Cbench. 1-2 - Yong Zhi Lim

, Purnima Murali Mohan
, Vignesh Sridharan, Mohan Gurusamy
:
Secondary Controller Mapping for Reliable Control Traffic Forwarding in SDN. 1-2 - Donghyeok An, Dohyung Kim

:
ICN-Based Light-Weighted Mobility Support in IoT. 1-2 - Ying Qian, Prabir Bhattacharya, Wanqing You, Kai Qian:

Security Threat Analysis of SDN Switch Flow Table. 1-2 - Jiaqi Wang, Xinlei He, Qingyuan Gong, Yang Chen, Tianyi Wang, Xin Wang:

Deep Learning-Based Malicious Account Detection in the Momo Social Network. 1-2 - Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv:

Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. 1-2 - Yongshun Zhang, Xin Jia, Weigang Zhu, Jianquan Zhao, Shuya Kong:

Chirp Interference Mitigation for FHSS Communication Based on Compressive Sensing. 1-2 - Degan Zhang, Xiaohua Liu, Yuya Cui, Hong-tao Peng:

New Big Data Collecting Method Based on Compressive Sensing in WSN. 1-2 - Chi-Shih Chao:

A Feasible Anomaly Diagnosis Mechanism for Stateful Firewall Rules. 1-2 - He Li, Tian Xiao, Yihua Lan, Qinglei Qi, Quan Liu, Jinjiang Liu:

A Stop-Wait Collaborative Charging Scheme for Mobile Wireless Rechargeable Sensor Networks. 1-2 - Aung Kaung Myat, Masaru Onodera, Yoshito Tobe:

FastQ: QoS Control Based on the Time Sequence of First Few Packets. 1-2 - Eliana Neuza Silva, Fernando Mira da Silva, Rui Manuel Rocha

:
Crowdsensing Approach to Monitoring and Optimize Wi-Fi Networks in Adversarial Environments. 1-2 - Meng Sun, Xinchang Zhang, Jianwei Zhang:

A Distributed Approach Based on Hierarchical Decompostion for Network Coded Group Multicast. 1-2 - Liudong Zuo

, Chase Q. Wu, Nageswara S. V. Rao, Aiqin Hou, Chia-Han Chang:
Bandwidth Preemption for High-Priority Data Transfer on Dedicated Channels. 1-8 - Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Øivind Kure:

Towards a Robust and Scalable TCP Flavors Prediction Model from Passive Traffic. 1-11 - Jing Xie, Wenxue Cheng, Tong Zhang, Danfeng Shan, Fengyuan Ren:

Estimating Short Connection Capacity on High Performance User Level Network Stack. 1-9 - Ningjia Fu, Yuwei Xu, Jianzhong Zhang, Rongkang Wang, Jingdong Xu:

FlowCop: Detecting "Stranger" in Network Traffic Classification. 1-9 - Leijun Huang, Hailin Feng, Ying Le, Chaofan Shen:

Redundancy Elimination on Unidirectional Lossy Links. 1-9 - Soklong Lim, Jun Hao, Zaixin Lu, Xuechen Zhang, Zhao Zhang:

Approximating the k-Minimum Distance Rumor Source Detection in Online Social Networks. 1-9 - Yang Zhang, Daniel Zhang, Nathan Vance

, Dong Wang:
Optimizing Online Task Allocation for Multi-Attribute Social Sensing. 1-9 - Guanghai Cui, Yizhi Ren, Shengwen Tian, Ting Wu, Kim-Kwang Raymond Choo

:
Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks. 1-9 - Seng-Kyoun Jo, Lin Wang, Jussi Kangasharju

, Max Mühlhäuser:
Cost-Effective and Eco-Friendly Green Routing Using Renewable Energy. 1-8 - Kun Huang, Xuelin Chen:

A Power-Efficient Approach to TCAM-Based Regular Expression Matching. 1-9 - Taruna Seth, Chao Feng, Murali Ramanathan, Vipin Chaudhary

:
Exploring Scalable Computing Architectures for Interactions Analysis. 1-9 - Teng Wang, Son Nam Nguyen, Jiayin Wang, Tengpeng Li, Xiaoqian Zhang, Ningfang Mi, Bin Zhao, Bo Sheng

:
RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems. 1-9 - Jiazhen Zhou, Cory C. Beard, Yi Qian:

Distributed Device Caching for Information Updating in Emergency Communications. 1-9 - Joaquin Chung, Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster:

Democratizing Network Reservations through Application-Aware Orchestration. 1-9 - Bingqian Lu, Sai Santosh Dayapule, Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam

:
PopCorns: Power Optimization Using a Cooperative Network-Server Approach for Data Centers. 1-9 - Ziji Guo, Yong Guan:

Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains. 1-9 - Malek Athamnah

, Amitangshu Pal, Krishna Kant:
A Framework for Misconfiguration Diagnosis in Interconnected Multiparty Systems. 1-9 - Ligang Dong, Long Chen, Yunfei Zhang, Bohan He, Jing Zhou, Weiming Wang, Victor C. M. Leung:

Dynamic Policy Deployment in SDN Switch Based on Monitoring and Analysis of User Behaviors. 1-8 - Phani Krishna Penumarthi, Aaron Pecora, Jason M. O'Kane, Srihari Nelakuditi:

Failure-Inference-Based Fast Reroute with Progressive Link Metric Increments. 1-7 - Sigit Aryo Pambudi, Jie Wang

, Wenye Wang, Min Song, Xiaoyan Zhu:
The Aftermath of Broken Links: Resilience of IoT Systems from a Networking Perspective. 1-9 - Jie Cui, Sheng Zhou, Hong Zhong, Yan Xu, Kewei Sha

:
Transaction-Based Flow Rule Conflict Detection and Resolution in SDN. 1-9 - Thierry Arrabal, Dominique Dhoutaut, Eugen Dedu:

Efficient Density Estimation Algorithm for Ultra Dense Wireless Networks. 1-9 - Fenghua Li, Yongjun Li, Zhengkun Yang, Yunchuan Guo, Lihua Yin, Zhen Wang:

Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System. 1-9 - Eyuphan Bulut, Steven M. Hernandez

, Aashish Dhungana, Boleslaw K. Szymanski
:
Is Crowdcharging Possible? 1-9 - Julien Gedeon

, Michael Stein, Lin Wang, Max Mühlhäuser:
On Scalable In-Network Operator Placement for Edge Computing. 1-9 - Yanni Yang, Jiannong Cao, Xuefeng Liu

, Xiulong Liu:
Wi-Count: Passing People Counting with COTS WiFi Devices. 1-9 - Jiaying Kou

, Xiaoming Fu
, Jiahua Du, Hua Wang
, Geordie Z. Zhang:
Understanding Housing Market Behaviour from a Microscopic Perspective. 1-9 - Dan Zhu, Hui Zhu, Ximeng Liu, Hui Li, Fengwei Wang, Hao Li:

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN. 1-9 - Weidong Yang, Xuyu Wang

, Shui Cao, Hui Wang, Shiwen Mao:
Multi-Class Wheat Moisture Detection with 5GHz Wi-Fi: A Deep LSTM Approach. 1-9 - En Wang, Yongjian Yang, Jie Wu, Dongming Luan, Hengzhi Wang:

Worker Recruitment Strategy for Self-Organized Mobile Social Crowdsensing. 1-9 - Rajesh Bajracharya, John N. Daigle:

Centralized versus Distributed Efficient Route Computation with Multiply-Constrained Link Costs. 1-9 - Chowdhury Sayeed Hyder, Li Xiao, Guoliang Xing:

Coalition-Based Cooperative Routing in Cognitive Radio Networks. 1-9 - James Mariani, Spencer Ottarson, Li Xiao:

HSNet: Energy Conservation in Heterogeneous Smartphone Ad Hoc Networks. 1-9 - Feiran You

, Jun Li
, Jinhui Lu, Feng Shu, Tingting Liu, Zhu Han:
A Multi-Rounds Double Auction Based Resource Trading for Small-Cell Caching System. 1-7 - Stefano Basagni, Georgia Koutsandria

, Chiara Petrioli:
A Comparative Performance Evaluation of Wake-Up Radio-Based Data Forwarding for Green Wireless Networks. 1-9 - Lei Deng

, Jing Deng, Po-Ning Chen
, Yunghsiang S. Han:
On the Asymptotic Performance of Delay-Constrained Slotted ALOHA. 1-8 - Yue Zheng, Zheng Yang, Junjie Yin, Chenshu Wu, Kun Qian, Fu Xiao, Yunhao Liu:

Combating Cross-Technology Interference for Robust Wireless Sensing with COTS WiFi. 1-9 - Abdulhamid Adebayo, Danda B. Rawat

, Lina Ni, Min Song:
Group-Query-as-a-Service for Secure Low-Latency Opportunistic RF Spectrum Access in Mobile Edge Computing Enabled Wireless Networks. 1-7 - Lixing Song, Aaron Striegel:

A Lightweight Scheme for Rapid and Accurate WiFi Path Characterization. 1-9 - Guanglin Zhang, Yan Chen, Zhirong Shen, Lin Wang:

Energy Management for Multi-User Mobile-Edge Computing Systems with Energy Harvesting Devices and QoS Constraints. 1-6 - Siguang Chen, Zhihao Wang, Kewei Sha

:
Cluster-Aware Kronecker Supported Data Collection for Sensory Data. 1-6 - Yongzheng Ren, Feng Zeng, Wenjia Li, Lin Meng

:
A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area Networks. 1-6 - Tingting Xu, Jian Jiao, Xin Chen, Ying Chen:

Social-Aware D2D Caching Content Deployment Strategy over Edge Computing Wireless Networks. 1-6 - Zhenlong Peng, Jian An, Xiaolin Gui, Tianjie Wu, Jingxian Xu:

Diffusion Utility Increment Based Crowdsensing Data Transmission Model over City Public Traffic System. 1-6 - Siguang Chen, Shujun Zhang, Bin Xu, Jing Hu, Vijayakumar Varadarajan

:
Layered Compression Scheme for Efficient Data Collection of Sensory Data. 1-5 - Degan Zhang, Yue Dong, Jie Zhang, Ting Zhang:

New Reliable Self-Adaptive Routing Protocol for Vehicular Ad Hoc Network. 1-6 - Yao Ma:

Analysis of Channel Access Priority Classes in LTE-LAA Spectrum Sharing System. 1-7 - Toshifusa Sekizawa, Taiju Mikoshi, Masataka Nagura, Ryo Watanabe, Qian Chen

:
Probabilistic Position Estimation and Model Checking for Resource-Constrained IoT Devices. 1-7 - Jarrod N. Bakker, Bryan C. K. Ng, Winston K. G. Seah

:
Can Machine Learning Techniques Be Effectively Used in Real Networks against DDoS Attacks? 1-6 - Xiaolin Chang, ShaoHua Lv, Ricardo J. Rodríguez, Kishor S. Trivedi:

Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System. 1-6 - Mandrita Banerjee

, Junghee Lee
, Qian Chen
, Kim-Kwang Raymond Choo
:
Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design. 1-6 - Yang Wang, Hung Nguyen, Chaoyang Li:

On the RSA Problem in SLICE Networks: A Novel Relaxation and Decomposition Approach. 1-5 - Dongxing Li, Wei Peng

, Wenping Deng, Fangyu Gai:
A Blockchain-Based Authentication and Security Mechanism for IoT. 1-6 - Thang Le Duc

, Per-Olov Östberg:
Application, Workload, and Infrastructure Models for Virtualized Content Delivery Networks Deployed in Edge Computing Environments. 1-7 - Dominik Schäfer, Janick Edinger, Christian Becker:

GPU-Accelerated Task Execution in Heterogeneous Edge Environments. 1-7 - Xili Wan, Jia Yin, Xinjie Guan, Guangwei Bai, Baek-Young Choi

:
A Pricing Based Cost-Aware Dynamic Resource Management for Cooperative Cloudlets in Edge Computing. 1-6 - De-gan Zhang, Ya-meng Tang, Xiao-huan Liu, Yu-ya Cui:

Novel Method of Game-Based Energy Efficient Subcarrier Allocation for IoT. 1-6 - Tamal Das, Mohan Gurusamy

:
INCEPT: INcremental ControllEr PlacemenT in Software Defined Networks. 1-6 - Melanie Heck

, Janick Edinger, Dominik Schäfer, Christian Becker:
IoT Applications in Fog and Edge Computing: Where Are We and Where Are We Going? 1-6 - Srinivasan Iyengar, Vijay K. Gurbani, Yu Zhou, Sameerkumar Sharma:

Opportunistic Prefetching of Cellular Internet of Things (cIoT) Device Contexts. 1-6 - Longjiang Li, Shawn Xiaoli Xiong, Jianjun Yang, Yuming Mao:

Synchronization of Video-Embedded 3D Contents for Tiled Display System. 1-6 - Wei Liu, Eun Kyo Park, S. S. Zhu, Udo R. Krieger:

An Edge Device Centric E-Health Interconnection Architecture. 1-5 - Jingling Zhao, Suoxing Zhang, Bohan Liu, Baojiang Cui:

Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features. 1-6 - Chong Sun, Kun Lv, Changzhen Hu, Hui Xie:

A Double-Layer Detection and Classification Approach for Network Attacks. 1-8 - Jun Yang, Guojun Mei, Chen Chen:

Vulnerability Mining Method Based on Genetic Algorithm and Model Constraint. 1-7 - Hui Xie, Kun Lv, Changzhen Hu, Chong Sun:

A Monte Carlo Graph Search Algorithm with Ant Colony Optimization for Optimal Attack Path Analysis. 1-8 - Shengwei Yi, Hongwei Wang, Yangyang Ma, Feng Xie, Puhan Zhang, Liqing Di:

A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree. 1-5 - Xiaofeng Lu, Chen Liang, Shengfei Zhang, Pietro Liò

, Jing Sha:
Terminal Sensitive Data Protection by Adjusting Access Time Bidirectionally and Automatically. 1-6 - Yanfang Liu, Jianghua Lv, Shilong Ma, Wentao Yao:

The Runtime System Problem Identification Method Based on Log Analysis. 1-7 - Yatao Yang, Guangcan Cao, Ming Qu, Jierun Huang, Yuan Gao:

HSATA: Improved SATA Protocol with HMAC. 1-6 - Jia Wen, Pengfei Liu, Chu Jia, Hongjun Wang:

Pedestrian Detection Algorithm Based on Multi-Feature Cascade. 1-6 - Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv:

Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














