Author |
Session |
Start page |
Title |
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Abdel Metaal, Mohamed |
TENSOR 2020: TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
Addanki, Vamsi |
TS6-B.3 |
458 |
Moving a step forward in the quest for Deterministic Networks (DetNet) |
Aguiar, Rui |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Aknin, Noura |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
Alcaraz, Salvador |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
Altman, Eitan |
SP5.1 |
584 |
Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks |
Altman, Zwi |
SP5.1 |
584 |
Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks |
Amsüss, Christian |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
Andreoni Lopez, Martin |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
Arcas-Abella, Oriol |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
Arora, Apoorva |
SP6.2 |
609 |
LoRaWAN Class B Multicast Scalability |
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Backhaus, Martin |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
Baddeley, Michael |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
Bajpai, Vaibhav |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
Banchs, Albert |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
Barraca, João Paulo |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Ben Basat, Ran |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
Ben Houidi, Zied |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Beylot, André-Luc |
TS4-B.1 |
307 |
An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training |
Bi, Jun |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
Bolboaca, Roland |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
Bondorf, Steffen |
SP3.5 |
554 |
Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis |
Border, John |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
Borsatti, Davide |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
Boutaba, Raouf |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
Byun, SangHyun |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Cabellos-Aparicio, Albert |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
Caetano, Marcos |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
Cai, Sheng-Ming |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Capdehourat, Germán |
TS5-A.2 |
370 |
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights |
Carle, Georg |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
Carlsson, Niklas |
TS1-A.2 |
10 |
Performance Comparison of Messaging Protocols and Serialization Formats |
TS2-B.4 |
145 |
Optimized Dynamic Cache Instantiation |
TS3-A.1 |
190 |
Characterizing the Root Landscape of Certificate Transparency Logs |
Carvalho, Márcio |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Cerroni, Walter |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
Chaabane, Ghassen |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
Chaalal, Elhadja |
SP3.3 |
544 |
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement |
Chaignon, Paul |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
Chakraborty, Sandip |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
Chan, Kevin |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Chang, Sang-Yoon |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
Chao, H. Jonathan |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
Chattopadhyay, Subhrendu |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
Chen, Guo |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
Chen, Shuang |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
Chen, Shuangwu |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
Chen, Xiaoqi |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
Chodorek, Agnieszka |
DS3.4 |
683 |
Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements |
Chodorek, Robert |
DS3.4 |
683 |
Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements |
Chow, C. Edward |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
Chowdhury, Shihabur |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
Chrisment, Isabelle |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
Ciaccia, Francesco |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
Cohen, Johanne |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
Coll, Roger |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
Contreras, Luis |
Slicing - TS2.1 |
773 |
Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV |
Corujo, Daniel |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Cunha, Italo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Cunha, Vitor |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Curado, Marilia |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
Custura, Ana |
FIT - TS2.1 |
731 |
Rethinking ACKs at the Transport Layer |
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Da, Bin |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
da Silva, Eduardo |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Dahhani, Mohammed |
TS4-B.1 |
307 |
An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training |
Das, Debasis |
TS5-B.3 |
404 |
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks |
Davoli, Gianluca |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
de Alfaro, Luca |
TS3-C.2 |
262 |
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning |
de Pedro, Luis |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
Dhamdhere, Amogh |
TS5-A.1 |
361 |
A data centric computational model of IPv6 adoption |
Diao, Zulong |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
Dias, Ricardo |
SP2.4 |
529 |
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters |
Diego, William |
ITS1.1 |
685 |
Evolution Toward the Next Generation Radio Access Network |
Doan, Trinh Viet |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
Doerr, Christian |
TS3-A.2 |
199 |
Scaling website fingerprinting |
TS3-A.4 |
217 |
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services |
Drichel, Arthur |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Eager, Derek |
TS2-B.4 |
145 |
Optimized Dynamic Cache Instantiation |
Einziger, Gil |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
Elmokashfi, Ahmed |
TS5-A.1 |
361 |
A data centric computational model of IPv6 adoption |
Emmerich, Paul |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Fairhurst, Gorry |
FIT - TS2.1 |
731 |
Rethinking ACKs at the Transport Layer |
Fan, Wenjun |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
Fazzion, Elverton |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Fejes, Ferenc |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
Feng, Jingxia |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
Feng, Wendi |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
Feng, Yong |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Ferreira, Gabriel |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
Ferreira, Ronaldo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Ferriol-Galmés, Miquel |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
Filiposka, Sonja |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
Florian, Martin |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
DS3.2 |
679 |
Demo: Crawling the IPFS Network |
Fonseca, Osvaldo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Franco, Muriel |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
François, Jérôme |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Gallenmüller, Sebastian |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
Gallopeni, Getoar |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
Ganguly, Niloy |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Gao, Shuai |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
Garcia-Aviles, Ginés |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
Garcia-Luna-Aceves, Jj |
TS3-C.2 |
262 |
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning |
Garcia-Saavedra, Andres |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
Gaujal, Bruno |
FIT - TS1.2 |
719 |
SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling |
Genge, Bela |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
Geyer, Fabien |
SP3.5 |
554 |
Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis |
Ghaderi, Javad |
TS2-A.3 |
100 |
On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling |
Ghamri-Doudane, Yacine |
TS4-A.1 |
280 |
Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems |
Ghiette, Vincent |
TS3-A.2 |
199 |
Scaling website fingerprinting |
Ghosal, Dipak |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
Ghosal, Gaurav |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
Gilly, Katja |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
Glebke, René |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
Goldstein, Maayan |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
Gombos, Gergo |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
Gourdin, Eric |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
Govindan, Ramesh |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
Gramaglia, Marco |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
Granville, Lisandro |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
Grewe, Dennis |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Griffioen, Harm |
TS3-A.4 |
217 |
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services |
Guillaume, Rene |
TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
Gündogan, Cenk |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Häberle, Marco |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Haller, Piroska |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
Haque, Israat |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
He, Guobiao |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
He, Ting |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Heimgaertner, Florian |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Hendriks, Luuk |
SP1.1 |
494 |
Polymorphic Encryption and Pseudonymisation of IP Network Flows |
Henningsen, Sebastian |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
DS3.2 |
679 |
Demo: Crawling the IPFS Network |
Henze, Martin |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
Heusse, Martin |
FIT - TS1.2 |
719 |
SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling |
Hoang, Van Hoan |
TS4-A.1 |
280 |
Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems |
Hong, Hsiang-Jen |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
Huang, Longbo |
TS3-B.2 |
235 |
RTCP - Reduce Delay Variability with an End-to-end Approach |
Huang, Po-Han |
TS3-B.1 |
226 |
Efficient User-Cell Association for 360 Video Streaming over Wireless Networks |
Huet, Alexis |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Iannone, Luigi |
TS6-B.3 |
458 |
Moving a step forward in the quest for Deterministic Networks (DetNet) |
SP2.1 |
514 |
Multi-Cloud Chaining with Segment Routing |
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Jakllari, Gentian |
TS4-B.1 |
307 |
An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training |
Jayatheerthan, Jay |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Jiang, Yong |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
Jiang, Yuang |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
Jin, Dong |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
Jones, Tom |
FIT - TS2.1 |
731 |
Rethinking ACKs at the Transport Layer |
Jonglez, Baptiste |
FIT - TS1.2 |
719 |
SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling |
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Kalde, Benedikt |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
Kar, Sounak |
SP3.1 |
534 |
A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication |
Karvonen, Heikki |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
Katsalis, Kostas |
TENSOR TS2.1 |
797 |
Coupling Source Routing with Time-Sensitive Networking |
Katz-Bassett, Ethan |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Kellerer, Wolfgang |
TS7.1 |
467 |
Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane |
Keslassy, Isaac |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
Kettimuthu, Rajkumar |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
Khandelia, Somesh |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Kobayashi, Katsushi |
FIT - TS1.1 |
713 |
A DRAM-friendly priority queue Internet packet scheduler implementation and its effects on TCP |
Kodialam, Murali |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
Kołakowski, Robert |
Slicing - TS1.2 |
767 |
Integration of U-space and 5GS for UAV services |
Korzhitskii, Nikita |
TS3-A.1 |
190 |
Characterizing the Root Landscape of Certificate Transparency Logs |
Kossakowski, Mateusz |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
Kuipers, Fernando |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
SP6.2 |
609 |
LoRaWAN Class B Multicast Scalability |
Kukkalli, Hanif |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
Kuklinski, Slawomir |
Slicing - TS1.2 |
767 |
Integration of U-space and 5GS for UAV services |
Kunne, Stephan |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Labiod, Houda |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
Laki, Sándor |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
Lakshman, T. |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
Landau Feibish, Shir |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
Langar, Rami |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
DS2.1 |
673 |
Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators |
Laraba, Abir |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
Larroca, Federico |
TS5-A.2 |
370 |
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights |
Leguay, Jeremie |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
Lehtihet, Elyes |
TS4-A.1 |
280 |
Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems |
Lenard, Teri |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
Leung, Kin |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
Li, Cong |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
Li, Pengfei |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
Li, Qing |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
Li, Xiang |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
Li, Yuxing |
TS3-B.2 |
235 |
RTCP - Reduce Delay Variability with an End-to-end Approach |
Liao, Binbin |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
Lindner, Steffen |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Ling, Dongfang |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
Liu, Bin |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Liu, Bingyang |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
Liu, Changchang |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Liu, Qian |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
Liu, Wuji |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
Liu, Xinmin |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
Livadariu, Ioana |
TS5-A.1 |
361 |
A data centric computational model of IPv6 adoption |
Ljubic, Ivana |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
Loehr, Hans |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
López de Vergara, Jorge |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
Lu, Hanlin |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Lv, Jianhui |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Maggi, Lorenzo |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
Maheshwari, Sumit |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
Mahimkar, Ajay |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
Mancha, Cristina |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
Mao, Weixi |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
Martin, Sébastien |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
Martínez Redondo, Marta |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
Masson, Marie |
SP5.1 |
584 |
Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks |
Mathieu, Bertrand |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Matzutt, Roman |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
Mauricio, Leopoldo Alexandre |
SP2.4 |
529 |
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters |
Medagliani, Paolo |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
Meira, Wagner |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Menth, Michael |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Mesquita de Pinho, Vinicius |
DS1.3 |
671 |
User identification by matching radio ``vision'' and computer vision through means of machine learning |
Mishev, Anastas |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
Mitton, Nathalie |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
Mondal, Abhijit |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Monteiro, Edmundo |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
Montero, Diego |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
Morales, Gastón |
TS5-A.2 |
370 |
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights |
Moraney, Jalil |
TS1-B.2 |
37 |
On the Practical Detection of Hierarchical Heavy Hitters |
Mouaci, Ahlam |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
Mu, Yanyan |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
Mühlhäuser, Max |
SP4.2 |
564 |
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone |
Mukherjee, Sarit |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Nádas, Szilveszter |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
Nahar, Ankur |
TS5-B.3 |
404 |
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks |
Nandha Kumar, Gagan |
TENSOR TS2.1 |
797 |
Coupling Source Routing with Time-Sensitive Networking |
Nandi, Sukumar |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
Narayanan, Arvind |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
Narayanan, Vijaykrishnan |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Nayak, Naresh |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Neglia, Giovanni |
SP4.4 |
574 |
Dynamic Backup Workers for Parallel Machine Learning |
Németh, Balázs |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
Nemirovsky, Mario |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
Niesler, Thomas |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
O'Kennedy, Morgan |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
Oberprieler, Markus |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
Oostenbrink, Jorik |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
Orda, Ariel |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
Osiński, Tomasz |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
Ostrowski, Bartłomiej |
TS1-A.1 |
1 |
Packet delay minimization in multi-hop wireless sensor networks with periodic traffic |
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Pal, Nibir |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Palit, Basabdatta |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Papadimitriou, Panagiotis |
TENSOR TS2.1 |
797 |
Coupling Source Routing with Time-Sensitive Networking |
Paquete, Luís |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
Pasteris, Stephen |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Paul, Krishna |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
Pele, Liat |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
Pennekamp, Jan |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
Perez Abreu, David |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
Perez-Hernandez, Ramon |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
Perpey, André |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
Perrot, Nancy |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
Persson Proos, Daniel |
TS1-A.2 |
10 |
Performance Comparison of Messaging Protocols and Serialization Formats |
Pham, Tat Dat |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
Pignolet, Yvonne-Anne |
TS4-B.2 |
316 |
Implications of Routing Coherence and Consistency on Network Optimization |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
Pióro, Michal |
TS1-A.1 |
1 |
Packet delay minimization in multi-hop wireless sensor networks with periodic traffic |
Poggi, Marcus |
SP2.4 |
529 |
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters |
Popescu, Dalia |
DS1.3 |
671 |
User identification by matching radio ``vision'' and computer vision through means of machine learning |
Popławski, Artur |
SP4.3 |
569 |
Optimizing Spectrum Use in Wireless Networks by Learning Agents |
Poularakis, Konstantinos |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
Psarakis, Maria |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
Psounis, Konstantinos |
TS3-B.1 |
226 |
Efficient User-Cell Association for 360 Video Streaming over Wireless Networks |
Pudelko, Maximilian |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Qin, Qiaofeng |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Rahim, Rana |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
DS2.1 |
673 |
Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators |
Ramezanifarkhani, Toktam |
FIT - TS1.3 |
725 |
Transport Layer Efficiency and Security in IoT: RINA's Approach |
Rao, Nageswara |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
Rathgeb, Erwin |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
Raz, Danny |
TS1-B.2 |
37 |
On the Practical Detection of Hierarchical Heavy Hitters |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
Ren, Shoushou |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
Reynaud, Laurent |
SP3.3 |
544 |
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement |
Rizk, Amr |
SP3.1 |
534 |
A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication |
TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
Rocha Filho, Geraldo |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
Rodrigues, Bruno |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
Romero, Ivan |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
Rossberg, Michael |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
Rossi, Dario |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Rost, Matthias |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
Ruffin, Clément |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
Rust, Sebastian |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
DS3.2 |
679 |
Demo: Crawling the IPFS Network |
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Saha, Dipon |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
Sakic, Ermin |
TS7.1 |
467 |
Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane |
Salamatian, Kave |
TS7.3 |
485 |
Baking the ruleset: A heat propagation relaxation to packet classification |
Salhab, Nazih |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
DS2.1 |
673 |
Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators |
Sanches, Vinicius |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
Sanz, Igor |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
Sarker, Arijet |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
Saverimoutou, Antoine |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Schaefer, Guenter |
SP3.4 |
549 |
Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
Scheuermann, Björn |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
DS3.2 |
679 |
Demo: Crawling the IPFS Network |
Schildt, Sebastian |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
Schmid, Stefan |
TS4-B.2 |
316 |
Implications of Routing Coherence and Consistency on Network Optimization |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
Schmidt, Thomas |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
Sebastianelli, Nicola |
SP4.4 |
574 |
Dynamic Backup Workers for Parallel Machine Learning |
Segall, Itai |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
Selinis, Ioannis |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
Senouci, Sidi-Mohammed |
SP3.3 |
544 |
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement |
Serral-Gracià, René |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
Serrano, Pablo |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
Serror, Martin |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
Seskar, Ivan |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
Shafiee, Mehrnoosh |
TS2-A.3 |
100 |
On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling |
Shah, Bhavit |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
Shankaranarayanan, Nemmara |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
Sharma, Rahul |
TS4-C.2 |
343 |
Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing |
Shen, Gengbiao |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
Shenoy, Nirmala |
DS3.3 |
681 |
Optimum Rooted Trees for Failover in Switched Networks |
Shi, Hao |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Shiferaw, Yonatan |
SP6.2 |
609 |
LoRaWAN Class B Multicast Scalability |
Shojaee, Meysam |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
Sikarwar, Himani |
TS5-B.3 |
404 |
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks |
Silva, Brivaldo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
Sim, Alex |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
Skorupski, Martin |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
Solano, Alberto |
Slicing - TS2.1 |
773 |
Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV |
Solis Barreto, Priscila |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
Song, Haoyu |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Spinelli, Francesco |
SP2.1 |
514 |
Multi-Cloud Chaining with Segment Routing |
Sridhara Rao Prasad, Abhinandan |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
Steinmetz, Ralf |
TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
Stiller, Burkhard |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
Su, Chi-Jiun |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
Su, Wei |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
Szott, Szymon |
SP4.3 |
569 |
Optimizing Spectrum Use in Wireless Networks by Learning Agents |
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Tafazolli, Rahim |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
Tang, Xianzhe |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
Tarasiuk, Halina |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
Tarchi, Daniele |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
Tassiulas, Leandros |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
Teymoori, Peyman |
FIT - TS1.3 |
725 |
Transport Layer Efficiency and Security in IoT: RINA's Approach |
Thakur, Aditya |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
Theil, Markus |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
Tollet, Jerome |
SP2.1 |
514 |
Multi-Cloud Chaining with Segment Routing |
Tomaszewski, Artur |
TS1-A.1 |
1 |
Packet delay minimization in multi-hop wireless sensor networks with periodic traffic |
Tomaszewski, Lechosław |
Slicing - TS1.2 |
767 |
Integration of U-space and 5GS for UAV services |
Torres, Rob |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
Tredan, Gilles |
TS4-B.2 |
316 |
Implications of Routing Coherence and Consistency on Network Optimization |
Tundis, Andrea |
SP4.2 |
564 |
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone |
Turkovic, Belma |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
Tüxen, Michael |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Uzair, Muhammad |
SP4.2 |
564 |
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone |
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Vartiainen, Johanna |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
Vass, Balázs |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
Velasquez, Karima |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
Viegas, Eduardo |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
Völker, Timo |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
Volodina, Ekaterina |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Wagner, Eric |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
Wählisch, Matthias |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
Walrand, Jean |
TS3-B.2 |
235 |
RTCP - Reduce Delay Variability with an End-to-end Approach |
Wan, Ying |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Wang, Bin |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
Wang, Jia |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
Wang, Lei |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
Wang, Ning |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
Wang, Shiqiang |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
Wang, Wei |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
Wang, Yi |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Wehrle, Klaus |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
Wei, XinPeng |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
Wendland, Philip |
SP3.4 |
549 |
Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X |
Westerbaan, Abraham |
SP1.1 |
494 |
Polymorphic Encryption and Pseudonymisation of IP Network Flows |
Willis, Peter |
DS3.3 |
681 |
Optimum Rooted Trees for Failover in Switched Networks |
Wolhuter, Riaan |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
Wu, Chase |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
Wu, Jianping |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
Wu, Kesheng |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Xie, Gaogang |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
TS7.3 |
485 |
Baking the ruleset: A heat propagation relaxation to packet classification |
Xie, Jinsen |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
Xinneng, XU |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
Xu, Chuan |
SP4.4 |
574 |
Dynamic Backup Workers for Parallel Machine Learning |
Xu, Jinchun |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
Xu, Lu |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
Xu, Mingwei |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
Xu, Wenquan |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Xu, Xing |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
Xu, Yang |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
Xu, Yuedong |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Yang, Jian |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
Yang, Kun |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
Yu, Delei |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
Yu, Minlan |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
Yu, Minlan |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
Yue, Jiarui |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
Yun, Daqing |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
Zhang, Beichuan |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Zhang, Cheng |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
Zhang, Chuwen |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
Zhang, Guangxing |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
Zhang, Jun |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
Zhang, Molly |
TS3-C.2 |
262 |
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning |
Zhang, Weifeng |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
Zhang, Xinyi |
TS7.3 |
485 |
Baking the ruleset: A heat propagation relaxation to packet classification |
Zhang, Yuan |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
Zhang, Yuanrong |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
Zhang, Zhi-Li |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
Zhao, Jin |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
Zheng, Peng |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
Zhou, Xiaobo |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
Zhou, Yu |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
Zhu, KeKe |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |