| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Abdallah, Mohamed |
CNC'19: CNC IV.6 |
67 |
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming |
| Abdel-Rahman, Mohammad |
NAPE II.6 |
859 |
Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization Framework |
| Abolfathi, Roxana |
MCC & OGC.1 |
582 |
A Novel Rate Control Method for Free-viewpoint Video in MV-HEVC |
| Abusitta, Adel |
CLD.2 |
370 |
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game |
| Adachi, Koichi |
WAHS.3 |
1024 |
Array Antenna for Power Saving of Sensor Nodes in UAV-BS enabled WSN |
| Adam, Nadir |
NAPE I.1 |
735 |
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis |
| Addesso, Paolo |
CIS I:.2 |
437 |
Adversarial Detection of Concealed VoIP Traffic |
| Adler, Aaron |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Ahmed, Tarem |
MLCN.2 |
658 |
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined |
| Al Baidhani, Amer |
CNC III.2 |
6 |
Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading Channels |
| Al-khori, Jaber |
CNC IV.6 |
67 |
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming |
| Alahmadi, Ahmed |
WN II:.2 |
509 |
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry |
| Albalawi, Abdulazaz |
MLCN & NAPE.3 |
809 |
A Delay-Based Congestion-Control Protocol for Information-Centric Networks |
| Alberti, Nikolas |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Alesawi, Sami |
CNC VI.3 |
265 |
Tail Latency Prediction for Datacenter Applications in Consolidated Environments |
| CNC VI.4 |
270 |
Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction |
| Ali, Imad |
ISA.7 |
647 |
SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems |
| Ali, Jehad |
CNC VIII.4 |
197 |
Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET |
| Almosa, Hayder |
WC I.4 |
883 |
Downlink Resource Allocation in Cell-Free Massive MIMO Systems |
| Almutairi, Saleh |
CNC X.2 |
334 |
A Bare PC Text Based Browser |
| Alorini, Dema |
CNC II:.5 |
131 |
Maximizing Secrecy Rates and Payoffs Through Wireless Virtualization in Heterogeneous Wireless Networks |
| CIS I:.4 |
448 |
Automatic Spam Detection on Gulf Dialectical Arabic Tweets |
| Alshamrani, Adel |
CIS II:.6 |
572 |
SUPC: SDN enabled Universal Policy Checking in Cloud Network |
| CIS II:.7 |
577 |
Adaptive MTD Security using Markov Game Modeling |
| Altintas, Onur |
Invited Talks II: AI & WN:.1 |
537 |
Virtual Edge Computing Using Vehicular Micro Clouds |
| Altuwaiyan, Thamer |
CLD.1 |
365 |
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis |
| Alyatama, Anwar |
CNC VII.2 |
153 |
Multi-Resource Continuous Allocation Model for Cloud Services |
| Amir-Mohammadian, Sepehr |
NAPE II.5 |
854 |
Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to Spare |
| An, Min Kyung |
WN I:.1 |
395 |
Minimum Latency Aggregation Scheduling in Internet of Things |
| Antonescu, Bogdan |
MCVC.5 |
923 |
Diffuse Scattering Models for mmWave V2X Communications in Urban Scenarios |
| Aoki, Yuya |
CNC V.1 |
219 |
Construction of Time-Space Radio Environment Database using HMM for Cooperative Sensing |
| Appana, Pranavi |
CIS II:.5 |
567 |
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance |
| Argueta, Derek |
CIS I:.3 |
442 |
A Quantitative Study of the Deployment of DNS Rate Limiting |
| Ascheid, Gerd |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Asfaw, Michael Berhane |
CQSM & ISA.1 |
463 |
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution |
| Atighetchi, Michael |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Auras, Dominik |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Avramovic, Ivan |
NAPE I.3 |
747 |
NP-completeness of Shortest Leaf-to-Leaf Distance in a Tree |
| Ayimba, Constantine |
MLCN.3 |
663 |
Adaptive Resource Provisioning based on Application State |
| Azgin, Aytac |
NAPE II.1 |
828 |
Stateless Forwarding in ICN with Dynamic Non-Bloom Filters |
| B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Baba, Ken-ichi |
CNC VI.7 |
287 |
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls |
| Bambos, Nicholas |
GCNC.7 |
729 |
Bidding-Based Dynamic Power Pricing Scheme in Smart Grids |
| Bande, Meghana |
MLCN.1 |
653 |
Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access |
| Banerjee, Subharthi |
SPC.5 |
1000 |
Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation Detection |
| Barik, Runa |
ISA.1 |
612 |
Investigating the Delay Impact of the DiffServ Code Point (DSCP) |
| Basagni, Stefano |
MCVC.5 |
923 |
Diffuse Scattering Models for mmWave V2X Communications in Urban Scenarios |
| Basta, Nardine |
CNC IV.2 |
46 |
SMAP: A Map Extension Framework for Intelligent Travel Systems |
| Baum, Michael |
GCNC & SCSD.2 |
777 |
Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering Server |
| Baykal, Nazife |
MLCN.2 |
658 |
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined |
| Beard, Cory |
CNC IX.2 |
298 |
Fractional Packet Duplication and Fade Duration Outage Probability Analysis for Handover Enhancement in 5G Cellular Networks |
| Beckerle, Michael |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Bellaïche, Martine |
CLD.2 |
370 |
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game |
| MCVC.1 |
900 |
A Decentralized Reputation Management System for Securing the Internet of Vehicles |
| Benmohamed, Lotfi |
MLCN & NAPE.4 |
816 |
Optimal Cache Allocation under Network-Wide Capacity Constraint |
| Beytur, Hasan Burhan |
CNC X.3 |
339 |
Age Minimization of Multiple Flows using Reinforcement Learning |
| Biagioni, Edoardo |
CNC I:.2 |
78 |
Preventing UDP Flooding Amplification Attacks with Weak Authentication |
| Bin Sahbudin, Murtadha Arif |
CNC X.5 |
350 |
MongoDB Clustering using K-means for Real-Time Song Recognition |
| Birke, Sebastian |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Blais, Stephane |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Blanco, Alejandro |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Blasch, Erik |
CIS I:.1 |
432 |
Towards Multimodal Learning for Android Malware Detection |
| Blough, Douglas |
CQSM & ISA.7 |
497 |
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks |
| Bolla, Raffaele |
CNC VIII.7 |
214 |
An abstraction layer for cybersecurity context |
| Booz, Jarrett |
GCNC.1 |
697 |
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis |
| Boryło, Piotr |
CNC VII.4 |
164 |
Risk Assessment Approach to Secure Northbound Interface of SDN Networks |
| NAPE I.6 |
764 |
Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks |
| Bothe, Shruti |
CNC VI.6 |
282 |
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks |
| Boyanapalli, Uday |
CNC VII.3 |
159 |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis |
| Brisky, James |
WN II:.6 |
531 |
Dynamic EAP Based MAC Protocol for Wireless Body Area Networks |
| Brockelsby, William |
CNC IX.1 |
292 |
A Graded Approach to Network Forensics with Privacy Concerns |
| Brown, Aaron |
NAPE II.4 |
847 |
Virtually the Same: Comparing Physical and Virtual Testbeds |
| C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Cabric, Danijela |
MLCN.5 |
674 |
Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity |
| WC II.2 |
943 |
Joint Precoder and Combiner Design for MMSE Distributed Beamforming with Per-Antenna Power Constraints |
| Cai, Xiaobo |
GCNC & SCSD.3 |
782 |
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing |
| Calcaterra, Claudio |
CNC IV.4 |
56 |
Hadoop Performance Evaluation in Software Defined Data Center Networks |
| Calvert, Ken |
CQSM & ISA.3 |
473 |
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points |
| Cameron, Agnes |
ISA.5 |
637 |
MedRec: A Network for Personal Information Distribution |
| Campbell, Roy |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Cao, Jin |
CLD.6 |
390 |
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks |
| WN I:.5 |
418 |
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System |
| WN I:.6 |
425 |
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet |
| Cao, Zhiyong |
GCNC & SCSD.3 |
782 |
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing |
| Carmenini, Alessio |
CNC IV.4 |
56 |
Hadoop Performance Evaluation in Software Defined Data Center Networks |
| Caro, Armando |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Carrega, Alessandro |
CNC VIII.7 |
214 |
An abstraction layer for cybersecurity context |
| Casari, Paolo |
MLCN.3 |
663 |
Adaptive Resource Provisioning based on Application State |
| Cassioli, Dajana |
CNC IV.4 |
56 |
Hadoop Performance Evaluation in Software Defined Data Center Networks |
| Chafii, Marwa |
WC I.2 |
869 |
Blind Carrier Frequency Offset Estimation in Generalized Frequency Division Multiplexing |
| Chan, Michael |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Chang, Ronald |
ISA.7 |
647 |
SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems |
| SPC.1 |
977 |
Distributed Multi-Stream Beamforming in Multi-Relay Interference Networks with Multi-Antenna Nodes |
| Chang, Sang-Yoon |
CNC III.1 |
1 |
Silent Timestamping for Blockchain Mining Pool Security |
| Chang, Yusun |
NAPE II.2 |
835 |
Multiple Path Infrastructure-less Networks A Cooperative Approach |
| Che, Hao |
CNC VI.3 |
265 |
Tail Latency Prediction for Datacenter Applications in Consolidated Environments |
| Chen, Dayuan |
GCNC & SCSD.2 |
777 |
Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering Server |
| Chen, Gaojie |
CQSM & ISA.6 |
491 |
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems |
| Chen, Lei |
WN I:.1 |
395 |
Minimum Latency Aggregation Scheduling in Internet of Things |
| Chen, Min |
CNC III.3 |
11 |
Product Review Credibility Analysis |
| Chen, Muhao |
WN II:.4 |
520 |
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN |
| Chen, Shi-Xuan |
CNC VII.6 |
175 |
Design of an Efficient Resource Management Model in Elastic Optical Networks |
| MCC & OGC.5 |
602 |
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks |
| Chen, Shuangwu |
CNC I:.5 |
94 |
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking |
| Chen, Sixia |
NAPE II.5 |
854 |
Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to Spare |
| Chen, Wenfan |
WN II:.3 |
515 |
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks |
| Chen, Xiang |
CNC I:.4 |
88 |
Multicast Design for the MobilityFirst Future Internet Architecture |
| Cheng, Yuan |
CIS II:.5 |
567 |
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance |
| Cho, Hyuk |
WN I:.1 |
395 |
Minimum Latency Aggregation Scheduling in Internet of Things |
| Choi, Wan |
CNC III.7 |
34 |
Markov Chain Analysis for Compressed Sensing based Random Access in Cellular Systems |
| Cholda, Piotr |
CNC VII.4 |
164 |
Risk Assessment Approach to Secure Northbound Interface of SDN Networks |
| NAPE I.6 |
764 |
Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks |
| Chowdhary, Ankur |
CQSM & ISA.5 |
486 |
SDN based Network Function Parallelism in Cloud |
| CIS II:.6 |
572 |
SUPC: SDN enabled Universal Policy Checking in Cloud Network |
| CIS II:.7 |
577 |
Adaptive MTD Security using Markov Game Modeling |
| Cirillo, Michele |
CIS I:.2 |
437 |
Adversarial Detection of Concealed VoIP Traffic |
| Coffin, Daniel |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Copeland, John |
NAPE II.2 |
835 |
Multiple Path Infrastructure-less Networks A Cooperative Approach |
| Crussell, Jonathan |
NAPE II.4 |
847 |
Virtually the Same: Comparing Physical and Virtual Testbeds |
| D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Dallesasse, John |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Daneshgadeh Cakmakci, Salva |
MLCN.2 |
658 |
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined |
| Das, Ria |
CNC II:.7 |
141 |
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for VIrtual NEtwork Services in Multi-Cloud Systems |
| David, Rodrigo |
CNC X.1 |
329 |
Hybrid precoded index modulation in downlink mmWave MU-MIMO systems |
| Dawadi, Babu |
GCNC.4 |
714 |
Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal |
| Deccio, Casey |
CIS I:.3 |
442 |
A Quantitative Study of the Deployment of DNS Rate Limiting |
| NAPE I.4 |
753 |
DNS Diagnostics through the Eye of the Beholder |
| Demke, Jonathan |
CIS I:.3 |
442 |
A Quantitative Study of the Deployment of DNS Rate Limiting |
| Di Mauro, Mario |
CIS I:.2 |
437 |
Adversarial Detection of Concealed VoIP Traffic |
| Ditzler, Gregory |
WC I.5 |
888 |
Online Reconfigurable Antenna State Selection based on Thompson Sampling |
| Do, Emily |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Dong, Lijun |
ISA.4 |
630 |
Distributed Mechanism for Computation Offloading Task Routing in Mobile Edge Cloud Network |
| Dressler, Falko |
Invited Talks II: AI & WN:.1 |
537 |
Virtual Edge Computing Using Vehicular Micro Clouds |
| Du, Pengyuan |
WN II:.4 |
520 |
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN |
| Du, Xiaojiang |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| CIS II:.1 |
547 |
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data |
| Du, Xiuyu |
WC II.5 |
960 |
Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSIT |
| Duan, Wei |
CQSM & ISA.1 |
463 |
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution |
| Duarte, David |
CNC VIII.5 |
203 |
An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G System |
| Dubin, Ran |
WN I:.2 |
402 |
Clustering the Unknown - The Youtube Case |
| Dutta, Rudra |
CNC IX.1 |
292 |
A Graded Approach to Network Forensics with Privacy Concerns |
| Dvir, Amit |
WN I:.2 |
402 |
Clustering the Unknown - The Youtube Case |
| Dwaraki, Abhishek |
MLCN & NAPE.2 |
802 |
Using Natural Language Constructs and Concepts to Aid Network Management |
| E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Elgamal, Tarek |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Ellard, Daniel |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Elmokashfi, Ahmed |
ISA.1 |
612 |
Investigating the Delay Impact of the DiffServ Code Point (DSCP) |
| Engoulou, Richard |
MCVC.1 |
900 |
A Decentralized Reputation Management System for Securing the Internet of Vehicles |
| Enkoji, Ai |
WN II:.6 |
531 |
Dynamic EAP Based MAC Protocol for Wireless Body Area Networks |
| Erbad, Aiman |
CNC II:.7 |
141 |
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for VIrtual NEtwork Services in Multi-Cloud Systems |
| Erpek, Tugba |
WC II.3 |
950 |
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA) |
| Essex, Aleksander |
CNC VI.5 |
276 |
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection |
| F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Fan, Howard |
CNC III.2 |
6 |
Learning for Detection: A Deep Learning Wireless Communication Receiver Over Rayleigh Fading Channels |
| Fang, Hua |
CLD.5 |
385 |
Neuro-Fuzzy classifier for behavioral intervention data |
| CIS II:.3 |
557 |
Integrated Node Authentication and Key Distribution Method for Body Area Network |
| Farooq, Hasan |
CNC VI.6 |
282 |
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks |
| Feng, Ming |
MLCN.7 |
687 |
Game Theoretic Based Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment and Unknown Interference |
| WC II.6 |
965 |
Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment |
| Feng, Yimeng |
SPC.3 |
990 |
Blind Channel Subspace Estimation for Massive MIMO with Hybrid Beamforming |
| Fernando, Xavier |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| Fettweis, Gerhard |
WC I.2 |
869 |
Blind Carrier Frequency Offset Estimation in Generalized Frequency Division Multiplexing |
| Freedman, Richard |
MLCN & NAPE.2 |
802 |
Using Natural Language Constructs and Concepts to Aid Network Management |
| Fu, Hsuan-Fang |
CNC VII.6 |
175 |
Design of an Efficient Resource Management Model in Elastic Optical Networks |
| MCC & OGC.5 |
602 |
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks |
| Fu, Xinwen |
CIS II:.4 |
562 |
Toward Drone Privacy via Regulating Altitude and Payload |
| Fujii, Takeo |
CNC V.1 |
219 |
Construction of Time-Space Radio Environment Database using HMM for Cooperative Sensing |
| G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Gaglio, Salvatore |
CNC X.6 |
355 |
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices |
| Gao, Chao |
CIS II:.4 |
562 |
Toward Drone Privacy via Regulating Altitude and Payload |
| Gao, Lin |
WN II:.3 |
515 |
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks |
| Garcia-Garcia, Amanda |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Garcia-Luna-Aceves, J |
NAPE I.5 |
759 |
Flexible Evaluation Caching Using FATE |
| MLCN & NAPE.3 |
809 |
A Delay-Based Congestion-Control Protocol for Information-Centric Networks |
| MCVC.6 |
930 |
Busy-Tone Multiple Access with Collision Avoidance and Detection for Ad-Hoc Networks |
| Garuba, Moses |
CNC II:.5 |
131 |
Maximizing Secrecy Rates and Payoffs Through Wireless Virtualization in Heterogeneous Wireless Networks |
| Gatherer, Alan |
WC II.7 |
970 |
Optimizing Beams and Bits: A Novel Approach for Massive MIMO Base-Station Design |
| Gebremichail, Aklilu |
CNC IX.2 |
298 |
Fractional Packet Duplication and Fade Duration Outage Probability Analysis for Handover Enhancement in 5G Cellular Networks |
| Gerla, Mario |
WN II:.4 |
520 |
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN |
| Invited Talks II: AI & WN:.1 |
537 |
Virtual Edge Computing Using Vehicular Micro Clouds |
| WAHS.6 |
1039 |
Fragmented Data Routing Based on Exponentially Distributed Contacts in Delay Tolerant Networks |
| Ghanem, Sakher |
CNC VI.4 |
270 |
Overcome Heterogeneity Impact in Modeled Fork-Join Queuing Networks for Tail Prediction |
| Ghasemzadeh, Pejman |
SPC.5 |
1000 |
Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation Detection |
| Gilani, Syed |
GCNC.6 |
724 |
Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss Models |
| Gjessing, Stein |
CNC II:.3 |
121 |
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters |
| ISA.1 |
612 |
Investigating the Delay Impact of the DiffServ Code Point (DSCP) |
| Gnawali, Omprakash |
CNC IX.4 |
308 |
UWB-Based Single-Anchor Indoor Localization Using Channel Impulse Response |
| WAHS.4 |
1029 |
Device-Free Activity Recognition Using Ultra-Wideband Radios |
| Gokalgandhi, Bhargav |
WC II.4 |
955 |
Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPU |
| Golan, Nehor |
WN I:.2 |
402 |
Clustering the Unknown - The Youtube Case |
| Golmie, Nada |
WN I:.3 |
408 |
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed |
| GCNC.1 |
697 |
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis |
| Gong, Shimin |
WN II:.3 |
515 |
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks |
| Goss, Ken |
WAHS.1 |
1011 |
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles |
| Goswami, Madhuprana |
CNC IX.5 |
313 |
Satellite MIMO Digital Beam-Forming under Nonlinear High-Power Amplifier and Keyhole |
| Griffioen, James |
CQSM & ISA.3 |
473 |
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points |
| Griffith, David |
WN I:.3 |
408 |
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed |
| GCNC.1 |
697 |
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis |
| Guan, Xinjie |
SPC.6 |
1005 |
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection |
| Guan, Zhitao |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| CIS II:.1 |
547 |
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data |
| Gui, Tina |
CNC II:.4 |
126 |
On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNs |
| Guo, Qi |
GCNC.3 |
708 |
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage |
| Guo, Shan |
CNC I:.3 |
83 |
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors |
| Gupta, Lav |
CNC II:.7 |
141 |
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for VIrtual NEtwork Services in Multi-Cloud Systems |
| Gupta, Riten |
WC II.2 |
943 |
Joint Precoder and Combiner Design for MMSE Distributed Beamforming with Per-Antenna Power Constraints |
| Gurugubelli, Venkata Sukumar |
CLD.5 |
385 |
Neuro-Fuzzy classifier for behavioral intervention data |
| H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Hadian, Mohammad |
CLD.1 |
365 |
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis |
| MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Hagenauer, Florian |
Invited Talks II: AI & WN:.1 |
537 |
Virtual Edge Computing Using Vehicular Micro Clouds |
| Hagiwara, Junichiro |
CNC III.4 |
16 |
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDE |
| CNC III.6 |
29 |
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System |
| Hai, Han |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| Haigh, Karen |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Hain, Regina |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Halabi, Talal |
CLD.2 |
370 |
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game |
| MCVC.1 |
900 |
A Decentralized Reputation Management System for Securing the Internet of Vehicles |
| Hamdi, Mounir |
CNC IV.6 |
67 |
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming |
| Han, Ke |
GCNC & SCSD.3 |
782 |
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing |
| Hanna, Samer |
MLCN.5 |
674 |
Deep Learning Based Transmitter Identification using Power Amplifier Nonlinearity |
| Hassan, Syed Ali |
CNC VI.1 |
255 |
A Method of Moments Estimator for Modulation Index of Continuous Phase Modulation |
| GCNC.6 |
724 |
Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss Models |
| Hatcher, William |
CIS I:.1 |
432 |
Towards Multimodal Learning for Android Malware Detection |
| He, Dongbiao |
NAPE I.2 |
741 |
RankRoute: Efficient Interests Forwarding by Nodes Ranking |
| He, Lijie |
GCNC & SCSD.4 |
787 |
Document Context-Aware Social Recommendation Method |
| Heinzelman, Wendi |
NAPE I.1 |
735 |
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis |
| Hematian, Amirshahram |
WN I:.3 |
408 |
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed |
| Hempel, Michael |
SPC.5 |
1000 |
Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation Detection |
| Heydariaan, Milad |
CNC IX.4 |
308 |
UWB-Based Single-Anchor Indoor Localization Using Channel Impulse Response |
| WAHS.4 |
1029 |
Device-Free Activity Recognition Using Ultra-Wideband Radios |
| Higuchi, Takamasa |
Invited Talks II: AI & WN:.1 |
537 |
Virtual Edge Computing Using Vehicular Micro Clouds |
| Hosangadi, Gurudutt |
CNC VIII.2 |
185 |
Mobile Device Localization in 5G Wireless |
| Hou, Aiqin |
CNC III.5 |
22 |
Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems |
| Hou, Jia |
CQSM & ISA.1 |
463 |
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution |
| Hsu, Cheng-Hsin |
ISA.7 |
647 |
SORT: SOcial HelpeR SelecTion Scheme for Mobile Question Answering Systems |
| Hsu, Ching-Fang |
CNC VII.6 |
175 |
Design of an Efficient Resource Management Model in Elastic Optical Networks |
| MCC & OGC.5 |
602 |
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks |
| Hu, Hao-Cheng |
MCC & OGC.5 |
602 |
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks |
| Hu, Mengxiao |
GCNC & SCSD.4 |
787 |
Document Context-Aware Social Recommendation Method |
| Huang, Chin-Tser |
CIS I:.6 |
457 |
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak |
| Huang, Dijiang |
CQSM & ISA.5 |
486 |
SDN based Network Function Parallelism in Cloud |
| CIS II:.6 |
572 |
SUPC: SDN enabled Universal Policy Checking in Cloud Network |
| CIS II:.7 |
577 |
Adaptive MTD Security using Markov Game Modeling |
| Huang, Mo |
CQSM & ISA.6 |
491 |
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems |
| Huang, Scott |
CNC VIII.1 |
180 |
Enhancing VoIP Security and Efficiency using VPN |
| Hudson, Nathaniel |
NAPE II.3 |
842 |
On the Effectiveness of Standard Centrality Metrics for Interdependent Networks |
| Hughes, Ben |
CNC VI.6 |
282 |
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks |
| Hussain, Fatima |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| Hussain, Rasheed |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Iannucci, Stefano |
CNC V.7 |
250 |
Towards Self-Defense of Non-Stationary Systems |
| Ikeuchi, Tadashi |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Imran, Ali |
CNC VI.6 |
282 |
Generative Adversarial Learning for Machine Learning empowered Self Organizing 5G Networks |
| Injadat, MohammadNoor |
CNC VI.5 |
276 |
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection |
| Ioannidis, Stratis |
MLCN & NAPE.4 |
816 |
Optimal Cache Allocation under Network-Wide Capacity Constraint |
| Islam, Safiqul |
CNC II:.3 |
121 |
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters |
| ISA.1 |
612 |
Investigating the Delay Impact of the DiffServ Code Point (DSCP) |
| J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Jaglarz, Piotr |
CNC VII.4 |
164 |
Risk Assessment Approach to Secure Northbound Interface of SDN Networks |
| Jain, Raj |
CNC II:.7 |
141 |
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for VIrtual NEtwork Services in Multi-Cloud Systems |
| Jekot, Marcin |
CNC VII.4 |
164 |
Risk Assessment Approach to Secure Northbound Interface of SDN Networks |
| Jiang, Jinlei |
NAPE I.2 |
741 |
RankRoute: Efficient Interests Forwarding by Nodes Ranking |
| Jiang, Xiaofeng |
CNC I:.5 |
94 |
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking |
| Jiang, Xiuhua |
CNC V.2 |
224 |
A QoE-Driven Rate Adaptation Approach for Dynamic Adaptive Streaming Over HTTP |
| Jiang, Xueqin |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| CQSM & ISA.1 |
463 |
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution |
| Jiang, Yi |
SPC.3 |
990 |
Blind Channel Subspace Estimation for Massive MIMO with Hybrid Beamforming |
| Jiang, Yuan |
CNC IV.5 |
62 |
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array |
| Jimenez Mateo, Pablo |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Joshi, Shashidhar |
GCNC.4 |
714 |
Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal |
| K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Kagawa, Toshinori |
CNC II:.2 |
116 |
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver |
| Kamhoua, Charles |
CNC X.7 |
360 |
Countering Selfish Mining in Blockchains |
| CIS I:.6 |
457 |
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak |
| Kamiura, Takuto |
CNC VIII.6 |
209 |
A System for Generating Background Colors for e-Books, Based on its Text |
| Kang, Mingon |
CNC VII.3 |
159 |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis |
| Kari, Chadi |
NAPE II.5 |
854 |
Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to Spare |
| Karne, Ramesh |
CNC X.2 |
334 |
A Bare PC Text Based Browser |
| Kawai, Kenta |
CNC VI.7 |
287 |
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls |
| Keitsch, Martina |
GCNC.4 |
714 |
Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal |
| Kemmerich, Thomas |
MLCN.2 |
658 |
An Empirical Investigation of DDoS and Flash Event Detection Using Shannon Entropy, KOAD and SVM Combined |
| Khalid, Ihtisham |
CNC VI.1 |
255 |
A Method of Moments Estimator for Modulation Index of Continuous Phase Modulation |
| Khamfroush, Hana |
NAPE II.3 |
842 |
On the Effectiveness of Standard Centrality Metrics for Interdependent Networks |
| Khoury, Joseph |
MCC & OGC.2 |
588 |
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression |
| Kim, Donghyun |
CNC VII.3 |
159 |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis |
| Kim, Kyungki |
CNC IX.4 |
308 |
UWB-Based Single-Anchor Indoor Localization Using Channel Impulse Response |
| Kim, Yong |
CQSM & ISA.2 |
468 |
Accelerated Prediction of Bradycardia in Preterm Infants Using Time-Frequency Analysis |
| Kim, Youngsoon |
CNC VII.3 |
159 |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis |
| Kitsuwan, Nattapong |
MCC & OGC.6 |
607 |
Performance of Elastic Optical Network with Spectrum Slicing for Fragmented Bandwidth Allocation |
| Ko, Euiseong |
CNC VII.3 |
159 |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis |
| Kojima, Fumihide |
CNC II:.2 |
116 |
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver |
| WC I.6 |
894 |
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity |
| Konstanty, Steven |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Kroeger, Thomas |
NAPE II.4 |
847 |
Virtually the Same: Comparing Physical and Virtual Testbeds |
| Kumar, Suman |
MCVC.2 |
905 |
A Robust Road Region of Interest Identification Scheme for Traffic-Video Data Mining |
| Kwon, Hyuck |
CNC V.3 |
230 |
Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh Fading |
| CNC IX.5 |
313 |
Satellite MIMO Digital Beam-Forming under Nonlinear High-Power Amplifier and Keyhole |
| Kwon, Ki Won |
ISA.3 |
624 |
COMPRESS: A Self-Sufficient Scheme for Measuring Queueing Delay on the Internet Routers |
| L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Lanson, Julian |
MLCN.4 |
669 |
Network-based Classification of Authentication Attempts using Machine Learning |
| Lason, Artur |
NAPE I.6 |
764 |
Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks |
| Lawrence, Stephen |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Le, Tuan |
WN II:.4 |
520 |
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN |
| WAHS.6 |
1039 |
Fragmented Data Routing Based on Exponentially Distributed Contacts in Delay Tolerant Networks |
| Lee, Hyunsun |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Lee, Jooyoung |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| GCNC & SCSD.5 |
792 |
Spatial Community Search Using PageRank Vector |
| Lee, Seunghyun |
CNC III.7 |
34 |
Markov Chain Analysis for Compressed Sensing based Random Access in Cellular Systems |
| Lee, Seungwoon |
CNC VIII.4 |
197 |
Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET |
| Leupers, Rainer |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Li, Bin |
GCNC & SCSD.1 |
771 |
An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless Networks |
| WC II.1 |
936 |
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels |
| Li, Chao |
GCNC.3 |
708 |
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage |
| WC II.1 |
936 |
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels |
| Li, Chengming |
WN II:.3 |
515 |
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks |
| Li, Fenghua |
CLD.6 |
390 |
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks |
| WN I:.5 |
418 |
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System |
| WN I:.6 |
425 |
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet |
| Li, Hongxiang |
GCNC & SCSD.1 |
771 |
An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless Networks |
| Li, Huan-Bang |
CNC II:.2 |
116 |
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver |
| Li, Hui |
CLD.6 |
390 |
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks |
| LI, Hui |
WN I:.5 |
418 |
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System |
| WN I:.6 |
425 |
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet |
| Li, Jun |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| Li, Lanlin |
CNC II:.1 |
110 |
A Two-phase Transmission Protocol Design for Ultra-reliable Communications |
| Li, Lihua |
WC II.5 |
960 |
Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSIT |
| Li, Ming |
WN II:.1 |
503 |
Context-Aware Analysis Scheduling in Wireless Body Area Networks |
| WN II:.6 |
531 |
Dynamic EAP Based MAC Protocol for Wireless Body Area Networks |
| Li, Ming |
WC I.5 |
888 |
Online Reconfigurable Antenna State Selection based on Thompson Sampling |
| Li, Richard |
ISA.4 |
630 |
Distributed Mechanism for Computation Offloading Task Routing in Mobile Edge Cloud Network |
| Li, Sugang |
CNC I:.4 |
88 |
Multicast Design for the MobilityFirst Future Internet Architecture |
| Li, Tengpeng |
MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Li, Tongtong |
CLD.3 |
375 |
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts |
| WN II:.2 |
509 |
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry |
| Li, Victor |
CNC V.6 |
245 |
Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks |
| Li, Wei |
CNC IX.6 |
318 |
Optimal Admission Control For Secondary Users In Cognitive Radio Systems |
| Li, Yan |
CNC V.6 |
245 |
Incentive Marketing Strategy under Multi-state Diffusion Model in Online Social Networks |
| Li, Zejian |
WC II.5 |
960 |
Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSIT |
| Li, Zhouzhou |
CIS II:.3 |
557 |
Integrated Node Authentication and Key Distribution Method for Body Area Network |
| Li, Zupei |
CIS II:.4 |
562 |
Toward Drone Privacy via Regulating Altitude and Payload |
| Liang, Xiaohui |
CLD.1 |
365 |
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis |
| MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Liang, Xiaoyu |
MLCN & NAPE.5 |
821 |
An empirical study of intelligent approaches to DDoS detection in large scale network |
| Liang, Yuan |
WN II:.2 |
509 |
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry |
| Lim, Wansu |
CNC I:.6 |
100 |
Fine-tuning a pre-trained Convolutional Neural Network Model to translate American Sign Language in Real-time |
| Lippman, Andrew |
ISA.5 |
637 |
MedRec: A Network for Personal Information Distribution |
| Liu, Jingyu |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| Liu, Lingjia |
WC I.4 |
883 |
Downlink Resource Allocation in Cell-Free Massive MIMO Systems |
| Liu, PengFei |
CIS II:.2 |
552 |
Three-way Email Spam Filtering with Game-theoretic Rough Sets |
| Liu, Shuwen |
SPC.6 |
1005 |
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection |
| Liu, Xiwen |
CQSM & ISA.4 |
480 |
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals |
| Liu, Xueyan |
CIS II:.1 |
547 |
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data |
| Liu, Yongxin |
MLCN & NAPE.1 |
797 |
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud |
| Liu, Yu |
CNC II:.6 |
136 |
Authenticating Endpoints and Vetting Connections in Residential Networks |
| Lo Re, Giuseppe |
CNC X.6 |
355 |
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices |
| WAHS.1 |
1011 |
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles |
| Loch, Adrian |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Longo, Maurizio |
CIS I:.2 |
437 |
Adversarial Detection of Concealed VoIP Traffic |
| Loos, Scott |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Lu, Chao |
CIS I:.1 |
432 |
Towards Multimodal Learning for Android Malware Detection |
| ISA.6 |
642 |
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things |
| Lu, Guangyan |
WC II.5 |
960 |
Topological Rate-Splitting Based Power Allocation Scheme in K-cell MISO Interference Channel with Imperfect CSIT |
| Lu, Jianhua |
CQSM & ISA.4 |
480 |
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals |
| Ludant, Norbert |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Lujan, Michael |
GCNC & SCSD.2 |
777 |
Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering Server |
| Lumbantoruan, Hendrik |
WAHS.3 |
1024 |
Array Antenna for Power Saving of Sensor Nodes in UAV-BS enabled WSN |
| Luo, Yurong |
WN I:.5 |
418 |
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System |
| Lyke, James |
CNC V.3 |
230 |
Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh Fading |
| CNC IX.5 |
313 |
Satellite MIMO Digital Beam-Forming under Nonlinear High-Power Amplifier and Keyhole |
| M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ma, Christopher |
CNC II:.4 |
126 |
On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNs |
| Ma, Maode |
WN I:.5 |
418 |
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System |
| WN I:.6 |
425 |
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet |
| Ma, Weibin |
WN I:.4 |
413 |
Location Information-Aided Load Balancing Design for Hybrid LiFi and WiFi Networks |
| Ma, Yinglong |
CIS II:.1 |
547 |
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data |
| MacKenzie, Allen |
NAPE II.6 |
859 |
Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization Framework |
| Madani, Anes |
MCVC.2 |
905 |
A Robust Road Region of Interest Identification Scheme for Traffic-Video Data Mining |
| Mahlke, Robin |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Mahmud, Md Shaad |
CQSM & ISA.2 |
468 |
Accelerated Prediction of Bradycardia in Preterm Infants Using Time-Frequency Analysis |
| Mai, Van Sy |
MLCN & NAPE.4 |
816 |
Optimal Cache Allocation under Network-Wide Capacity Constraint |
| Mancuso, Vincenzo |
MLCN.3 |
663 |
Adaptive Resource Provisioning based on Application State |
| Marnerides, Angelos |
WN I:.2 |
402 |
Clustering the Unknown - The Youtube Case |
| Marotta, Andrea |
CNC IV.4 |
56 |
Hadoop Performance Evaluation in Software Defined Data Center Networks |
| Martinez, Ana |
WC I.2 |
869 |
Blind Carrier Frequency Offset Estimation in Generalized Frequency Division Multiplexing |
| Martorella, Gloria |
CNC X.6 |
355 |
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices |
| Marugan Borelli, Matteo |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Mathewson, James |
NAPE I.5 |
759 |
Flexible Evaluation Caching Using FATE |
| Matsuura, Ryota |
MCC & OGC.6 |
607 |
Performance of Elastic Optical Network with Spectrum Slicing for Fragmented Bandwidth Allocation |
| Matta, Vincenzo |
CIS I:.2 |
437 |
Adversarial Detection of Concealed VoIP Traffic |
| Matthé, Maximilian |
WC I.2 |
869 |
Blind Carrier Frequency Offset Estimation in Generalized Frequency Division Multiplexing |
| McDaniel, Troy |
Invited Talks III: QoS Modeling.1 |
542 |
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility |
| McGiff, Josh |
CIS I:.1 |
432 |
Towards Multimodal Learning for Android Malware Detection |
| McHenry, Kenton |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Melvin, Ryan |
WN II:.6 |
531 |
Dynamic EAP Based MAC Protocol for Wireless Body Area Networks |
| Meng, Sachula |
CNC I:.3 |
83 |
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors |
| Miura, Ryu |
CNC II:.2 |
116 |
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver |
| Mo, Haoran |
GCNC & SCSD.5 |
792 |
Spatial Community Search Using PageRank Vector |
| Mohaisen, David |
CNC X.7 |
360 |
Countering Selfish Mining in Blockchains |
| Mohammadmoradi, Hessam |
CNC IX.4 |
308 |
UWB-Based Single-Anchor Indoor Localization Using Channel Impulse Response |
| WAHS.4 |
1029 |
Device-Free Activity Recognition Using Ultra-Wideband Radios |
| Monogioudis, Pantelis |
CNC VIII.2 |
185 |
Mobile Device Localization in 5G Wireless |
| Montemaggio, Andrea |
CNC V.7 |
250 |
Towards Self-Defense of Non-Stationary Systems |
| Moriyama, Masafumi |
WC I.6 |
894 |
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity |
| Morocho-Cayamcela, Manuel Eugenio |
CNC I:.6 |
100 |
Fine-tuning a pre-trained Convolutional Neural Network Model to translate American Sign Language in Real-time |
| Mosleh, Susanna |
WC I.4 |
883 |
Downlink Resource Allocation in Cell-Free Massive MIMO Systems |
| Moubayed, Abdallah |
CNC VI.5 |
276 |
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection |
| Musmeci, Riccardo |
WAHS.1 |
1011 |
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles |
| N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Nagurney, Anna |
CQSM & ISA.3 |
473 |
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points |
| Nahrstedt, Klara |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Naiwala P., Chandrasiri |
CNC VIII.6 |
209 |
A System for Generating Background Colors for e-Books, Based on its Text |
| Nakamura, Yoshitaka |
CNC V.4 |
235 |
A temporary communication system using DTN for improving power consumption of mobile terminals |
| Nasiopoulos, Panos |
MCC & OGC.2 |
588 |
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression |
| Nassif, Ali |
CNC VI.5 |
276 |
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection |
| Nauryzbayev, Galymzhan |
CNC IV.6 |
67 |
Secrecy Capacity of Hybrid RF/VLC DF Relaying Networks with Jamming |
| Nchinda, Nchinda |
ISA.5 |
637 |
MedRec: A Network for Personal Information Distribution |
| Nelson, Samuel |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Nguyen, James |
CIS I:.1 |
432 |
Towards Multimodal Learning for Android Malware Detection |
| ISA.6 |
642 |
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things |
| Nguyen, Linh |
MCVC.2 |
905 |
A Robust Road Region of Interest Identification Scheme for Traffic-Video Data Mining |
| Nguyen, Minh |
CNC VI.3 |
265 |
Tail Latency Prediction for Datacenter Applications in Consolidated Environments |
| Nguyen, Nam |
MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Nguyen, Phuong |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Ni, Wenlong |
CNC IX.6 |
318 |
Optimal Admission Control For Secondary Users In Cognitive Radio Systems |
| Nicholson, Todd |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Niemiec, Marcin |
CNC VII.4 |
164 |
Risk Assessment Approach to Secure Northbound Interface of SDN Networks |
| Nishimura, Toshihiko |
CNC III.4 |
16 |
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDE |
| CNC III.6 |
29 |
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System |
| Niu, Ben |
CLD.6 |
390 |
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks |
| WN I:.5 |
418 |
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System |
| WN I:.6 |
425 |
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet |
| Niure Kandel, Laxima |
WN II:.5 |
526 |
Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges |
| Njilla, Laurent |
CNC X.7 |
360 |
Countering Selfish Mining in Blockchains |
| CIS I:.6 |
457 |
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak |
| MLCN & NAPE.1 |
797 |
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud |
| Nkansah, Asare |
NAPE II.3 |
842 |
On the Effectiveness of Standard Centrality Metrics for Interdependent Networks |
| O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| O'Shea, Timothy |
MLCN.6 |
681 |
Approximating the Void: Learning Stochastic Channel Models from Observation with Variational Generative Adversarial Networks |
| Ogawa, Yasutaka |
CNC III.4 |
16 |
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDE |
| CNC III.6 |
29 |
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System |
| Ohgane, Takeo |
CNC III.4 |
16 |
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDE |
| CNC III.6 |
29 |
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System |
| Okamoto, Satoru |
CNC VII.5 |
170 |
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction |
| Oki, Eiji |
CNC VII.5 |
170 |
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction |
| Oodo, Masayuki |
WC I.6 |
894 |
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity |
| Ortega, Alvaro |
CNC X.1 |
329 |
Hybrid precoded index modulation in downlink mmWave MU-MIMO systems |
| Ostrovskaya, Svetlana |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Palacharla, Paparao |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Pallipuram, Vivek K. |
NAPE II.5 |
854 |
Data Migration in Large Scale Heterogeneous Storage Systems with Nodes to Spare |
| Panchanathan, Sethuraman |
Invited Talks III: QoS Modeling.1 |
542 |
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility |
| Pannu, Gurjashan Singh |
Invited Talks II: AI & WN:.1 |
537 |
Virtual Edge Computing Using Vehicular Micro Clouds |
| Park, Jounsup |
MCC & OGC.4 |
597 |
Video Streaming over the LWA Systems |
| Park, Sangjun |
CNC III.7 |
34 |
Markov Chain Analysis for Compressed Sensing based Random Access in Cellular Systems |
| Park, Younghee |
CNC III.1 |
1 |
Silent Timestamping for Blockchain Mining Pool Security |
| Paropkari, Rahul |
CNC IX.2 |
298 |
Fractional Packet Duplication and Fade Duration Outage Probability Analysis for Handover Enhancement in 5G Cellular Networks |
| Parracho, Diogo |
CNC VIII.5 |
203 |
An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G System |
| Paul, Nilanjan |
WC II.4 |
955 |
Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPU |
| Peri, Daniele |
CNC X.6 |
355 |
A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices |
| Perrins, Erik |
WC I.4 |
883 |
Downlink Resource Allocation in Cell-Free Massive MIMO Systems |
| Pervaiz, Haris |
GCNC.6 |
724 |
Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss Models |
| Pesavento, Davide |
MLCN & NAPE.4 |
816 |
Optimal Cache Allocation under Network-Wide Capacity Constraint |
| Pham, Khanh |
CNC V.3 |
230 |
Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh Fading |
| CNC IX.5 |
313 |
Satellite MIMO Digital Beam-Forming under Nonlinear High-Power Amplifier and Keyhole |
| Phillips, Cynthia |
NAPE II.4 |
847 |
Virtually the Same: Comparing Physical and Virtual Testbeds |
| Pierre, Samuel |
MCVC.1 |
900 |
A Decentralized Reputation Management System for Securing the Internet of Vehicles |
| Pinto, Iola |
CNC VIII.5 |
203 |
An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G System |
| Pinyoanuntapong, Krittetash |
CNC V.3 |
230 |
Frost's and Maximin Space-Time Adaptive Processing under Block Rayleigh Fading |
| Piwczyk, Tobias |
SPC.2 |
983 |
VLSI Architectures for ORVD Trellis based MIMO Detection |
| Polovinkin, Andrey |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| Pouraghily, Arman |
ISA.2 |
617 |
A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices |
| Pourazad, Mahsa |
MCC & OGC.2 |
588 |
A New Prediction Structure for Efficient MV-HEVC based Light Field Video Compression |
| Prabakaran, Anusha |
CNC III.3 |
11 |
Product Review Credibility Analysis |
| Prasad, Narayan |
WC II.7 |
970 |
Optimizing Beams and Bits: A Novel Approach for Massive MIMO Base-Station Design |
| Pu, Cong |
CNC I:.1 |
73 |
Spam DIS Attack Against Routing Protocol in the Internet of Things |
| Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Qi, Xiao-Feng |
WC II.7 |
970 |
Optimizing Beams and Bits: A Novel Approach for Massive MIMO Base-Station Design |
| R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ramanathan, Ram |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Rao, Anil |
CNC VIII.2 |
185 |
Mobile Device Localization in 5G Wireless |
| Ravindran, Ravi |
NAPE II.1 |
828 |
Stateless Forwarding in ICN with Dynamic Non-Bloom Filters |
| Rawat, Danda |
CNC II:.5 |
131 |
Maximizing Secrecy Rates and Payoffs Through Wireless Virtualization in Heterogeneous Wireless Networks |
| CIS I:.4 |
448 |
Automatic Spam Detection on Gulf Dialectical Arabic Tweets |
| GCNC.4 |
714 |
Recommendations for Energy Efficient SoDIP6 Network Deployment at the Early Stage Rural ICT Expansion of Nepal |
| Reeves, Joseph |
WN II:.1 |
503 |
Context-Aware Analysis Scheduling in Wireless Body Area Networks |
| Ren, Jian |
CLD.3 |
375 |
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts |
| WN II:.2 |
509 |
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry |
| Repetto, Matteo |
CNC VIII.7 |
214 |
An abstraction layer for cybersecurity context |
| Retzepi, Kallirroi |
ISA.5 |
637 |
MedRec: A Network for Personal Information Distribution |
| Richards, Dana |
NAPE I.3 |
747 |
NP-completeness of Shortest Leaf-to-Leaf Distance in a Tree |
| Riley, George |
CQSM & ISA.7 |
497 |
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks |
| Rock, Colleen |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Roh, Byeong-hee |
CNC VIII.4 |
197 |
Performance Comparison of Software Defined Networking Simulators for Tactical Network: Mininet vs. OPNET |
| Rojas-Cessa, Roberto |
ISA.3 |
624 |
COMPRESS: A Self-Sufficient Scheme for Measuring Queueing Delay on the Internet Routers |
| Roodaki, Hoda |
MCC & OGC.1 |
582 |
A Novel Rate Control Method for Free-viewpoint Video in MV-HEVC |
| Roy, Tamoghna |
MLCN.6 |
681 |
Approximating the Void: Learning Stochastic Channel Models from Observation with Variational Generative Adversarial Networks |
| Rukkila, Adric |
Invited Talks III: QoS Modeling.1 |
542 |
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility |
| Russell, Katherine |
MCVC.3 |
911 |
Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks |
| Rzepka, Michał |
NAPE I.6 |
764 |
Slotted Flow Stats Acquisition: a Resource-efficient Flow Statistics Polling in OpenFlow Networks |
| S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Saad, Muhammad |
CNC X.7 |
360 |
Countering Selfish Mining in Blockchains |
| Sabur, Abdulhakim |
CIS II:.7 |
577 |
Adaptive MTD Security using Markov Game Modeling |
| Sagduyu, Yalin |
WC II.3 |
950 |
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA) |
| Saito, K. |
CNC III.4 |
16 |
Computational Complexity Reduction of Receive Weight Matrices in Massive MIMO SC-FDE |
| Sakib, Muhammad Nazmus |
CIS I:.6 |
457 |
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak |
| Saleem, Sajid |
CNC VI.1 |
255 |
A Method of Moments Estimator for Modulation Index of Continuous Phase Modulation |
| Salehin, Khondaker |
ISA.3 |
624 |
COMPRESS: A Self-Sufficient Scheme for Measuring Queueing Delay on the Internet Routers |
| Salman, Tara |
CNC II:.7 |
141 |
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for VIrtual NEtwork Services in Multi-Cloud Systems |
| Salo, Fadi |
CNC VI.5 |
276 |
Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection |
| Samaka, Mohammed |
CNC II:.7 |
141 |
HYPER-VINES: A HYbrid Learning Fault and Performance Issues ERadicator for VIrtual NEtwork Services in Multi-Cloud Systems |
| Sampaio-Neto, Raimundo |
CNC X.1 |
329 |
Hybrid precoded index modulation in downlink mmWave MU-MIMO systems |
| Sapavath, Naveen |
CNC II:.5 |
131 |
Maximizing Secrecy Rates and Payoffs Through Wireless Virtualization in Heterogeneous Wireless Networks |
| Scarpa, Marco |
CNC X.4 |
344 |
A full Secondary User model for Cognitive Radio in a GSM-900 scenario |
| CNC X.5 |
350 |
MongoDB Clustering using K-means for Real-Time Song Recognition |
| Segerholm, Christina |
WC II.4 |
955 |
Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPU |
| Sekigawa, Shu |
CNC VII.5 |
170 |
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction |
| Sengupta, Sailik |
CIS II:.7 |
577 |
Adaptive MTD Security using Markov Game Modeling |
| Serrano, Salvatore |
CNC X.4 |
344 |
A full Secondary User model for Cognitive Radio in a GSM-900 scenario |
| CNC X.5 |
350 |
MongoDB Clustering using K-means for Real-Time Song Recognition |
| Seskar, Ivan |
WC II.4 |
955 |
Accelerating Channel Estimation and Demodulation of Uplink OFDM symbols for Large Scale Antenna Systems using GPU |
| Shah, Syed Hassan |
GCNC.6 |
724 |
Performance Analysis of Flexible Duplexing-enabled Heterogeneous Networks Exploiting Multi Slope Path Loss Models |
| Shang, Pingping |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| Sharif, Hamid |
SPC.5 |
1000 |
Accuracy Analysis of Feature-based Automatic Modulation Classification with Blind Modulation Detection |
| Sharma, Sarthak |
WAHS.4 |
1029 |
Device-Free Activity Recognition Using Ultra-Wideband Radios |
| Shen, Jian |
GCNC.5 |
719 |
Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus |
| Shen, Zejiang |
SPC.6 |
1005 |
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection |
| Sheng, Bo |
CLD.1 |
365 |
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis |
| MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Shenoy, Nirmala |
CNC IX.3 |
303 |
A Meshed Tree Protocol for Loop Avoidance in Switched Networks |
| Shi, Zheng |
CNC IV.5 |
62 |
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array |
| Shi, Zhenyu |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Shirmohammadi, Shervin |
MCC & OGC.1 |
582 |
A Novel Rate Control Method for Free-viewpoint Video in MV-HEVC |
| Shue, Craig |
CNC II:.6 |
136 |
Authenticating Endpoints and Vetting Connections in Residential Networks |
| Shurbanov, Vladimir |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Sie, Siou-Ci |
CNC VII.6 |
175 |
Design of an Efficient Resource Management Model in Elastic Optical Networks |
| Silvestri, Simone |
WAHS.1 |
1011 |
A Web Application for the Remote Control of Multiple Unmanned Aerial Vehicles |
| Simon, Robert |
MCVC.3 |
911 |
Evaluation of a Geo-region Based Architecture for Information Centric Disruption Tolerant Networks |
| Singhal, Akshit |
CNC VI.3 |
265 |
Tail Latency Prediction for Datacenter Applications in Consolidated Environments |
| Slock, Dirk |
SPC.4 |
995 |
Massive MISO IBC Reduced Order Zero Forcing Beamforming - a Multi-Antenna Stochastic Geometry Perspective |
| So, Daniel |
CQSM & ISA.6 |
491 |
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems |
| Son, Junggab |
CNC VII.3 |
159 |
Fast and Accurate Machine Learning-based Malware Detection via RC4 Ciphertext Analysis |
| Song, Houbing |
GCNC & SCSD.3 |
782 |
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing |
| MLCN & NAPE.1 |
797 |
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud |
| Song, Lihong |
CNC II:.1 |
110 |
A Two-phase Transmission Protocol Design for Ultra-reliable Communications |
| Song, Mei |
CNC II:.1 |
110 |
A Two-phase Transmission Protocol Design for Ultra-reliable Communications |
| Spila, Timothy |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Strayer, Tim |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Su, Patrick |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| Sun, Han |
MCC & OGC.3 |
592 |
Domain-Specific Image Classification Using Ensemble Learning Utilizing Open-Domain Knowledge |
| Sun, Kai |
CNC I:.3 |
83 |
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors |
| Sun, Wensheng |
CNC I:.3 |
83 |
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors |
| Sun, Xiaoyan |
CIS II:.5 |
567 |
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance |
| Sun, Yunqing |
WN I:.6 |
425 |
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet |
| Sun, Zhe |
CLD.6 |
390 |
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks |
| Surasak, Thattapon |
CNC VIII.1 |
180 |
Enhancing VoIP Security and Efficiency using VPN |
| Surnin, Oleg |
CNC VIII.3 |
191 |
Probabilistic Estimation of Honeypot Detection in Internet of Things Environment |
| Suzuki, Y. |
CNC III.6 |
29 |
A Study on Layouts of Distributed Antenna Arrays in an Indoor Multi-User Massive MIMO System |
| T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Tadayon, Ramin |
Invited Talks III: QoS Modeling.1 |
542 |
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility |
| Takahashi, Norikazu |
CNC VII.1 |
148 |
A Novel NMF Algorithm for Detecting Clusters in Directed Networks |
| Takahashi, Osamu |
CNC V.4 |
235 |
A temporary communication system using DTN for improving power consumption of mobile terminals |
| Takizawa, Kenichi |
CNC II:.2 |
116 |
Improvement on Localization Accuracy of IR-UWB By Adapting Time Bias Inner Transceiver |
| WC I.6 |
894 |
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity |
| Tanabe, Kazuki |
CNC VI.7 |
287 |
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls |
| Tang, Jie |
CQSM & ISA.6 |
491 |
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems |
| Tang, Meng |
CNC VI.2 |
260 |
Text-To-Speech quality evaluation based on LSTM Recurrent Neural Networks |
| Tao, Xiaoming |
CQSM & ISA.4 |
480 |
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals |
| Tao, Yangyang |
CLD.4 |
380 |
kFHCO: Optimal VM Consolidation via k-Factor Horizontal Checkpoint Oversubscription |
| Tapparello, Cristiano |
NAPE I.1 |
735 |
Infrastructure vs. Multi-Hop D2D Networks: Availability and Performance Analysis |
| Taylor, Curtis |
CNC II:.6 |
136 |
Authenticating Endpoints and Vetting Connections in Residential Networks |
| MLCN.4 |
669 |
Network-based Classification of Authentication Attempts using Machine Learning |
| Teague, Kory |
NAPE II.6 |
859 |
Joint Base Station Selection and Adaptive Slicing in Virtualized Wireless Networks: A Stochastic Optimization Framework |
| Tehrani-Moayyed, Miead |
MCVC.5 |
923 |
Diffuse Scattering Models for mmWave V2X Communications in Urban Scenarios |
| Teng, Yinglei |
CNC II:.1 |
110 |
A Two-phase Transmission Protocol Design for Ultra-reliable Communications |
| Tetteh, Will |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Tezuka, Hayato |
WC I.6 |
894 |
Experimental Evaluation of UL-NOMA System Employing Correlated Receive Diversity |
| Thapa, Bishal |
WAHS.5 |
1034 |
Mission-Centric Content Sharing Across Heterogeneous Networks |
| Thomas, Christo |
SPC.4 |
995 |
Massive MISO IBC Reduced Order Zero Forcing Beamforming - a Multi-Antenna Stochastic Geometry Perspective |
| Tian, Run |
WN II:.2 |
509 |
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry |
| Turner, Matthew |
NAPE II.3 |
842 |
On the Effectiveness of Standard Centrality Metrics for Interdependent Networks |
| Turner, Stuart |
Invited Talks V: Mobile Computing/System.2 |
692 |
Bracelet: Edge-Cloud Microservice Infrastructure for Aging Scientific Instruments |
| U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Ullah, Syed Asad |
CNC VI.1 |
255 |
A Method of Moments Estimator for Modulation Index of Continuous Phase Modulation |
| Ulukus, Sennur |
WC II.3 |
950 |
Interference Regime Enforcing Rate Maximization for Non-Orthogonal Multiple Access (NOMA) |
| Usuzaka, Yoshito |
CNC VII.1 |
148 |
A Novel NMF Algorithm for Detecting Clusters in Directed Networks |
| Uysal, Elif |
CNC X.3 |
339 |
Age Minimization of Multiple Flows using Reinforcement Learning |
| V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Veeravalli, Venugopal |
MLCN.1 |
653 |
Multi-User Multi-Armed Bandits for Uncoordinated Spectrum Access |
| Venkateswara, Hemanth |
Invited Talks III: QoS Modeling.1 |
542 |
Smart Stadia as Testbeds for Smart Cities: Enriching Fan Experiences and Improving Accessibility |
| Vieira, Pedro |
CNC VIII.5 |
203 |
An Enhanced Capacity Model based on Network Measurements for a Multi-Service 3G System |
| Voicu, Razvan |
NAPE II.2 |
835 |
Multiple Path Infrastructure-less Networks A Cooperative Approach |
| W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Wan, Xili |
SPC.6 |
1005 |
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection |
| Wang, Bailing |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| Wang, Dandan |
CNC VIII.2 |
185 |
Mobile Device Localization in 5G Wireless |
| Wang, Feng |
CNC II:.4 |
126 |
On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNs |
| Wang, Honggang |
CLD.5 |
385 |
Neuro-Fuzzy classifier for behavioral intervention data |
| CQSM & ISA.2 |
468 |
Accelerated Prediction of Bradycardia in Preterm Infants Using Time-Frequency Analysis |
| CIS II:.3 |
557 |
Integrated Node Authentication and Key Distribution Method for Body Area Network |
| Wang, Huihui |
GCNC & SCSD.3 |
782 |
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing |
| Wang, Jian |
MLCN & NAPE.1 |
797 |
An LSTM Enabled Dynamic Stackelberg Game Theoretic Method for Resource Allocation in the Cloud |
| Wang, Jiaxin |
GCNC.3 |
708 |
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage |
| Wang, Li |
CQSM & ISA.4 |
480 |
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals |
| Wang, Pan |
CNC IV.3 |
51 |
Data Interpolation for Deep Learning based Encrypted Data Packet Classification |
| Wang, Ruyan |
GCNC.2 |
702 |
An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle Platooning |
| Wang, Teng |
MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Wang, Xi |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Wang, Yi |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Wang, Ying |
CNC I:.3 |
83 |
Dynamic Bayesian Game Based Power Allocation in Mobile Edge Computing with Users' Behaviors |
| Wang, Yongjin |
CNC IV.1 |
39 |
Outage Probability Bounds of EGC Over Correlated Lognormal Fading Channels |
| CNC IV.5 |
62 |
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array |
| Wang, Yongqiang |
CNC III.5 |
22 |
Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems |
| Wang, Ziwei |
CNC V.2 |
224 |
A QoE-Driven Rate Adaptation Approach for Dynamic Adaptive Streaming Over HTTP |
| Wapenski, Donald |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Ward, Andrew |
GCNC.7 |
729 |
Bidding-Based Dynamic Power Pricing Scheme in Smart Grids |
| Wei, Chunqiao |
GCNC & SCSD.1 |
771 |
An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless Networks |
| Welzl, Michael |
CNC II:.3 |
121 |
How to Control a TCP: Minimally-Invasive Congestion Management for Datacenters |
| ISA.1 |
612 |
Investigating the Delay Impact of the DiffServ Code Point (DSCP) |
| Wen, Miaowen |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| West, Nathan |
MLCN.6 |
681 |
Approximating the Void: Learning Stochastic Channel Models from Observation with Variational Generative Adversarial Networks |
| Westphal, Cedric |
NAPE I.2 |
741 |
RankRoute: Efficient Interests Forwarding by Nodes Ranking |
| Widmer, Joerg |
WC I.3 |
876 |
A Comprehensive Study of Low Frequency and High Frequency Channel Correlation |
| Wijesinha, Alexander |
CNC X.2 |
334 |
A Bare PC Text Based Browser |
| Wilkins, Dawn |
CNC II:.4 |
126 |
On Cluster Head Selection in Monkey-inspired Optimization based Routing Protocol for WSNs |
| Williams, Byron |
CNC V.7 |
250 |
Towards Self-Defense of Non-Stationary Systems |
| Willis, Peter |
CNC IX.3 |
303 |
A Meshed Tree Protocol for Loop Avoidance in Switched Networks |
| Wolf, Tilman |
CQSM & ISA.3 |
473 |
Enhancing Interdomain Transport via Economic Software-Defined Exchange Points |
| ISA.2 |
617 |
A Lightweight Payment Verification Protocol for Blockchain Transactions on IoT Devices |
| MLCN & NAPE.2 |
802 |
Using Natural Language Constructs and Concepts to Aid Network Management |
| Wu, Chase |
CNC III.5 |
22 |
Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems |
| Wu, Dapeng |
GCNC.2 |
702 |
An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle Platooning |
| Wu, Jiaxing |
GCNC.2 |
702 |
An Energy-efficient and Trust-based Formation Algorithm for Cooperative Vehicle Platooning |
| Wu, Xiaoge |
WC I.1 |
864 |
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel |
| Wu, Yalong |
ISA.6 |
642 |
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things |
| Wu, Zhiqiang |
WN I:.4 |
413 |
Location Information-Aided Load Balancing Design for Hybrid LiFi and WiFi Networks |
| X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Xiao, Zhiqiang |
CNC IV.1 |
39 |
Outage Probability Bounds of EGC Over Correlated Lognormal Fading Channels |
| Xie, Jinsen |
CNC I:.4 |
88 |
Multicast Design for the MobilityFirst Future Internet Architecture |
| CNC I:.5 |
94 |
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking |
| Xing, Ling |
CNC I:.5 |
94 |
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking |
| XU, Dongliang |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| Xu, Guangxia |
GCNC & SCSD.4 |
787 |
Document Context-Aware Social Recommendation Method |
| Xu, Guobin |
GCNC.1 |
697 |
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis |
| Xu, Hao |
MLCN.7 |
687 |
Game Theoretic Based Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment and Unknown Interference |
| WC II.6 |
965 |
Multi-Robot Enhanced Intelligent Multi-User Millimeter-Wave MIMO Systems under Uncertain Environment |
| Xu, Haochen |
WC II.1 |
936 |
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels |
| Xu, Jing |
WN II:.3 |
515 |
Joint Transmission Scheduling and Power Allocation in Wirelessly Powered Hybrid Radio Networks |
| Xu, Mingrui |
CNC III.5 |
22 |
Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems |
| Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Yamada, Shohei |
CNC VIII.6 |
209 |
A System for Generating Background Colors for e-Books, Based on its Text |
| Yamanaka, Naoaki |
CNC VII.5 |
170 |
Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction |
| Yamaoka, Katsunori |
CNC VI.7 |
287 |
Emergency Trunk Reservation Control Using Waiting Queue for Accommodating More General Calls |
| Yan, Han |
WC II.2 |
943 |
Joint Precoder and Combiner Design for MMSE Distributed Beamforming with Per-Antenna Power Constraints |
| Yan, Mei |
CNC II:.1 |
110 |
A Two-phase Transmission Protocol Design for Ultra-reliable Communications |
| Yang, Bowen |
CNC I:.4 |
88 |
Multicast Design for the MobilityFirst Future Internet Architecture |
| Yang, Guangwen |
NAPE I.2 |
741 |
RankRoute: Efficient Interests Forwarding by Nodes Ranking |
| Yang, Hemin |
CQSM & ISA.7 |
497 |
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks |
| Yang, Jian |
CNC I:.4 |
88 |
Multicast Design for the MobilityFirst Future Internet Architecture |
| CNC I:.5 |
94 |
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking |
| Yang, Jian |
MCC & OGC.3 |
592 |
Domain-Specific Image Classification Using Ensemble Learning Utilizing Open-Domain Knowledge |
| Yang, Liwei |
CNC V.5 |
240 |
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces |
| Yao, JingTao |
CIS II:.2 |
552 |
Three-way Email Spam Filtering with Game-theoretic Rough Sets |
| Ye, Feng |
CNC IV.3 |
51 |
Data Interpolation for Deep Learning based Encrypted Data Packet Classification |
| CNC IX.7 |
324 |
D2D-Assisted Physical-Layer Security in Next-Generation Mobile Network |
| SPC.6 |
1005 |
Deep Learning based Framework for Automatic Damage Detection in Aircraft Engine Borescope Inspection |
| Yeo, Chai Kiat |
CNC V.5 |
240 |
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces |
| Yetis, Cenk |
SPC.1 |
977 |
Distributed Multi-Stream Beamforming in Multi-Relay Interference Networks with Multi-Antenna Nodes |
| Ying, Daidong |
CNC IX.7 |
324 |
D2D-Assisted Physical-Layer Security in Next-Generation Mobile Network |
| Yu, Shucheng |
CLD.4 |
380 |
kFHCO: Optimal VM Consolidation via k-Factor Horizontal Checkpoint Oversubscription |
| WN II:.5 |
526 |
Indoor Localization Using Commodity Wi-Fi APs: Techniques and Challenges |
| Yu, Wei |
WN I:.3 |
408 |
Performance Assessment of Smart Meter Traffic over LTE Network Using SDR Testbed |
| CIS I:.1 |
432 |
Towards Multimodal Learning for Android Malware Detection |
| ISA.6 |
642 |
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things |
| GCNC.1 |
697 |
A Deep Learning-Based Weather Forecast System for Data Volume and Recency Analysis |
| Yu, Weicheng |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| Yu, Xiaoyan |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| Yu, Yu |
CQSM & ISA.6 |
491 |
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems |
| Yu, Zhengtao |
CIS II:.1 |
547 |
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data |
| Yue, Hao |
CNC IV.3 |
51 |
Data Interpolation for Deep Learning based Encrypted Data Packet Classification |
| Yue, Qinggang |
CIS II:.4 |
562 |
Toward Drone Privacy via Regulating Altitude and Payload |
| Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Zaghloul, Ehab |
CLD.3 |
375 |
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts |
| Zhan, Yafeng |
CQSM & ISA.4 |
480 |
Developing a QoE Monitoring Approach for Video Service Based on Mobile Terminals |
| Zhang, Chuanji |
CQSM & ISA.7 |
497 |
Queueing Analysis of Auxiliary-Connection-Enabled Switches for Software-Defined Networks |
| Zhang, Guanglin |
CNC V.5 |
240 |
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces |
| Zhang, Jin |
ISA.6 |
642 |
Real-Time Data Transport Scheduling for Edge/Cloud-Based Internet of Things |
| Zhang, Kai |
CNC I:.7 |
105 |
Security Enhancing Spatial Modulation Using Antenna Selection and Artificial Noise Cancellation |
| Zhang, Kuan |
CLD.1 |
365 |
SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis |
| Zhang, Lin |
WN I:.4 |
413 |
Location Information-Aided Load Balancing Design for Hybrid LiFi and WiFi Networks |
| WC I.1 |
864 |
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel |
| Zhang, Meixiang |
CQSM & ISA.1 |
463 |
Performance Analysis of Raptor Code for Reconciliation in Continuous Variable Quantum Key Distribution |
| Zhang, Qi |
CNC I:.5 |
94 |
An Information Feature Extraction and Rapid Updating Scheme for Knowledge Centric Networking |
| Zhang, Qiong |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Zhang, Ruonan |
GCNC.3 |
708 |
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage |
| GCNC & SCSD.1 |
771 |
An Energy-efficient Metric for Relay Selection in Large-Scale Multi-hop Wireless Networks |
| WC II.1 |
936 |
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels |
| Zhang, Wenjie |
CNC V.5 |
240 |
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces |
| Zhang, Xiaoqian |
MCVC.4 |
918 |
FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices |
| Zhang, Xiu Yin |
CQSM & ISA.6 |
491 |
Multi-objective Optimization of Joint Power Allocation and Splitting Control for SWIPT-enabled NOMA Systems |
| Zhang, Yan |
CIS II:.2 |
552 |
Three-way Email Spam Filtering with Game-theoretic Rough Sets |
| Zhang, Yanyong |
CNC I:.4 |
88 |
Multicast Design for the MobilityFirst Future Internet Architecture |
| Zhang, Yue |
GCNC & SCSD.3 |
782 |
An energy-efficiency-aware resource allocation strategy in multi-granularity provision for green computing |
| Zhao, Qi |
WN II:.4 |
520 |
Towards Efficient Cellular Traffic Offloading via Dynamic MPTCP Path Configuration with SDN |
| WAHS.6 |
1039 |
Fragmented Data Routing Based on Exponentially Distributed Contacts in Delay Tolerant Networks |
| Zhao, Tianchi |
WC I.5 |
888 |
Online Reconfigurable Antenna State Selection based on Thompson Sampling |
| Zheng, Jin-Jun |
CNC VII.6 |
175 |
Design of an Efficient Resource Management Model in Elastic Optical Networks |
| MCC & OGC.5 |
602 |
Spectrum Usage Minimization for Shared Backup Path Protection in Elastic Optical Networks |
| Zheng, Yifeng |
CNC V.5 |
240 |
Spectrum Sharing for Heterogeneous Communication Systems in TV White Spaces |
| Zhong, Jiling |
MCVC.2 |
905 |
A Robust Road Region of Interest Identification Scheme for Traffic-Video Data Mining |
| Zhong, Zhimeng |
GCNC.3 |
708 |
WLAN Channel Measurement in Two Classrooms for LOS and NLOS Coverage |
| WC II.1 |
936 |
Elevation Power Spectrum Measurement and Interference Analysis of UMa I2O Uplink Channels |
| Zhou, Bing |
WN I:.1 |
395 |
Minimum Latency Aggregation Scheduling in Internet of Things |
| Zhou, Yiqing |
CNC IV.3 |
51 |
Data Interpolation for Deep Learning based Encrypted Data Packet Classification |
| Zhou, Zhengyuan |
GCNC.7 |
729 |
Bidding-Based Dynamic Power Pricing Scheme in Smart Grids |
| Zhu, Bingcheng |
CNC IV.1 |
39 |
Outage Probability Bounds of EGC Over Correlated Lognormal Fading Channels |
| CNC IV.5 |
62 |
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array |
| Zhu, Jie |
CNC VI.2 |
260 |
Text-To-Speech quality evaluation based on LSTM Recurrent Neural Networks |
| Zhu, Liehuang |
CIS II:.1 |
547 |
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data |
| Zhu, Xiaoyan |
CIS I:.5 |
453 |
Verification Code Recognition Based on Active and Deep Learning |
| Zhu, Yi |
WAHS.2 |
1018 |
A Stochastic Process based Routing Algorithm for Wireless Ad Hoc Networks |
| Zhu, Zhiming |
CNC IV.5 |
62 |
Angle-of-Arrival Estimator for Light Signals Based on Optimized Photodiode Array |
| Zilberstein, Shlomo |
MLCN & NAPE.2 |
802 |
Using Natural Language Constructs and Concepts to Aid Network Management |
| Znati, Taieb |
MLCN & NAPE.5 |
821 |
An empirical study of intelligent approaches to DDoS detection in large scale network |
| Zong, Ziliang |
GCNC & SCSD.2 |
777 |
Evaluating the Performance and Energy Efficiency of OpenGL and Vulkan on a Graphics Rendering Server |