A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Author Session Start page Title
A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Abdel Metaal, Mohamed TENSOR 2020: TENSOR TS2.2 803 Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications
Addanki, Vamsi TS6-B.3 458 Moving a step forward in the quest for Deterministic Networks (DetNet)
Aguiar, Rui TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Aknin, Noura SP3.2 539 Modelling Edge Computing in Urban Mobility Simulation Scenarios
Alcaraz, Salvador SP3.2 539 Modelling Edge Computing in Urban Mobility Simulation Scenarios
Altman, Eitan SP5.1 584 Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks
Altman, Zwi SP5.1 584 Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks
Amsüss, Christian TS1-A.3 19 IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison
Andreoni Lopez, Martin ITS2.1 695 A Lightweight Network-based Android Malware Detection System
Arcas-Abella, Oriol FIT - TS3.1 743 SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements
Arora, Apoorva SP6.2 609 LoRaWAN Class B Multicast Scalability
B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Backhaus, Martin DS2.2 675 Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations
Baddeley, Michael SP6.1 604 An Energy-Aware SDN/NFV Architecture for the Internet of Things
Bajpai, Vaibhav TS2-B.1 118 Measuring Decentralized Video Streaming: A Case Study of DTube
Banchs, Albert Slicing - TS2.2 779 The case for serverless mobile networking
Barraca, João Paulo TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Ben Basat, Ran TS6-B.2 449 Routing Oblivious Measurement Analytics
ITS1.2 686 Cost effective troubleshooting of NFV infrastructure
Ben Houidi, Zied TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Beylot, André-Luc TS4-B.1 307 An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training
Bi, Jun TS1-C.3 73 FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime
Bolboaca, Roland TS5-B.2 395 MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
Bondorf, Steffen SP3.5 554 Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis
Border, John FIT - TS3.3 755 Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link
Borsatti, Davide DS3.1 677 FORCH: An Orchestrator for Fog Computing service deployment
Boutaba, Raouf TS6-A.3 431 Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification
SP4.5 579 Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
Byun, SangHyun SP5.3 594 Voting Credential Management System for Electronic Voting Privacy
C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cabellos-Aparicio, Albert SP1.4 509 Securing Route Leaks using a Decentralized Approach
Caetano, Marcos SP5.2 589 MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Cai, Sheng-Ming TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Capdehourat, Germán TS5-A.2 370 A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights
Carle, Georg TS4-B.3 325 Performance Analysis of VPN Gateways
Carlsson, Niklas TS1-A.2 10 Performance Comparison of Messaging Protocols and Serialization Formats
TS2-B.4 145 Optimized Dynamic Cache Instantiation
TS3-A.1 190 Characterizing the Root Landscape of Certificate Transparency Logs
Carvalho, Márcio TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Cerroni, Walter DS3.1 677 FORCH: An Orchestrator for Fog Computing service deployment
Chaabane, Ghassen DS1.2 669 Securing messages in C-ITS: a proof of concept
Chaalal, Elhadja SP3.3 544 A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement
Chaignon, Paul TS6-A.1 413 P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4
Chakraborty, Sandip TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
SP2.2 519 Amalgam: Distributed Network Control With Scalabale Service Chaining
Chan, Kevin TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Chang, Sang-Yoon SP2.3 524 Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
SP5.3 594 Voting Credential Management System for Electronic Voting Privacy
Chao, H. Jonathan SP1.2 499 Encrypted Application Classification with Convolutional Neural Network
Chattopadhyay, Subhrendu SP2.2 519 Amalgam: Distributed Network Control With Scalabale Service Chaining
Chen, Guo TS2-A.4 109 Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
Chen, Shuang TENSOR TS1.1 785 Load Balancing for Deterministic Networks
Chen, Shuangwu SP4.1 559 Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Chen, Xiaoqi TS6-B.2 449 Routing Oblivious Measurement Analytics
Chodorek, Agnieszka DS3.4 683 Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements
Chodorek, Robert DS3.4 683 Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements
Chow, C. Edward SP2.3 524 Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
Chowdhury, Shihabur TS6-A.3 431 Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification
Chrisment, Isabelle TS6-A.3 431 Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification
Ciaccia, Francesco FIT - TS3.1 743 SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements
Cohen, Johanne TS2-A.1 82 Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
Coll, Roger SP1.4 509 Securing Route Leaks using a Decentralized Approach
Contreras, Luis Slicing - TS2.1 773 Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV
Corujo, Daniel TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Cunha, Italo TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Cunha, Vitor TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Curado, Marilia TS1-C.2 64 A Rank-based Mechanism for Service Placement in the Fog
Custura, Ana FIT - TS2.1 731 Rethinking ACKs at the Transport Layer
D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Da, Bin TS2-B.3 136 On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
da Silva, Eduardo TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Dahhani, Mohammed TS4-B.1 307 An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training
Das, Debasis TS5-B.3 404 CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks
Davoli, Gianluca DS3.1 677 FORCH: An Orchestrator for Fog Computing service deployment
de Alfaro, Luca TS3-C.2 262 Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
de Pedro, Luis TS5-A.3 379 Estimating Server Load Based on its Correlation with TCP SYN Response Time
Dhamdhere, Amogh TS5-A.1 361 A data centric computational model of IPv6 adoption
Diao, Zulong TS2-C.1 154 Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
Dias, Ricardo SP2.4 529 Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters
Diego, William ITS1.1 685 Evolution Toward the Next Generation Radio Access Network
Doan, Trinh Viet TS2-B.1 118 Measuring Decentralized Video Streaming: A Case Study of DTube
Doerr, Christian TS3-A.2 199 Scaling website fingerprinting
TS3-A.4 217 Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services
Drichel, Arthur TS4-A.3 298 How to Securely Prune Bitcoin's Blockchain
E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Eager, Derek TS2-B.4 145 Optimized Dynamic Cache Instantiation
Einziger, Gil TS6-B.2 449 Routing Oblivious Measurement Analytics
ITS1.2 686 Cost effective troubleshooting of NFV infrastructure
Elmokashfi, Ahmed TS5-A.1 361 A data centric computational model of IPv6 adoption
Emmerich, Paul TS4-B.3 325 Performance Analysis of VPN Gateways
F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Fairhurst, Gorry FIT - TS2.1 731 Rethinking ACKs at the Transport Layer
Fan, Wenjun SP2.3 524 Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
SP5.3 594 Voting Credential Management System for Electronic Voting Privacy
Fazzion, Elverton TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Fejes, Ferenc FIT - TS3.2 749 On the Incompatibility of Scalable Congestion Controls over the Internet
Feng, Jingxia ITS2.2 704 Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications
Feng, Wendi TS2-A.2 91 NFV Performance Profiling on Multi-core Servers
Feng, Yong TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Ferreira, Gabriel SP5.2 589 MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Ferreira, Ronaldo TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Ferriol-Galmés, Miquel SP1.4 509 Securing Route Leaks using a Decentralized Approach
Filiposka, Sonja SP3.2 539 Modelling Edge Computing in Urban Mobility Simulation Scenarios
Florian, Martin TS4-A.2 289 Mapping the Interplanetary Filesystem
DS3.2 679 Demo: Crawling the IPFS Network
Fonseca, Osvaldo TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Franco, Muriel DS1.1 667 A Practical Analysis on Mirai Botnet Traffic
François, Jérôme TS6-A.3 431 Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification
G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Gallenmüller, Sebastian TS4-B.3 325 Performance Analysis of VPN Gateways
Gallopeni, Getoar DS1.1 667 A Practical Analysis on Mirai Botnet Traffic
Ganguly, Niloy TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Gao, Shuai SP1.3 504 Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
Garcia-Aviles, Ginés Slicing - TS2.2 779 The case for serverless mobile networking
Garcia-Luna-Aceves, Jj TS3-C.2 262 Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
Garcia-Saavedra, Andres Slicing - TS2.2 779 The case for serverless mobile networking
Gaujal, Bruno FIT - TS1.2 719 SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling
Genge, Bela TS5-B.2 395 MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
Geyer, Fabien SP3.5 554 Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis
Ghaderi, Javad TS2-A.3 100 On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling
Ghamri-Doudane, Yacine TS4-A.1 280 Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems
Ghiette, Vincent TS3-A.2 199 Scaling website fingerprinting
Ghosal, Dipak TS3-C.1 253 A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
Ghosal, Gaurav TS3-C.1 253 A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
Gilly, Katja SP3.2 539 Modelling Edge Computing in Urban Mobility Simulation Scenarios
Glebke, René TS5-B.1 386 QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Goldstein, Maayan ITS1.2 686 Cost effective troubleshooting of NFV infrastructure
Gombos, Gergo FIT - TS3.2 749 On the Incompatibility of Scalable Congestion Controls over the Internet
Gourdin, Eric TS1-C.1 55 Virtual Network Functions Placement and Routing Problem: Path formulation
Govindan, Ramesh TS3-B.3 244 Enabling Premium Service for Streaming Video in Cellular Networks
Gramaglia, Marco Slicing - TS2.2 779 The case for serverless mobile networking
Granville, Lisandro TS4-C.1 334 Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
Grewe, Dennis TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Griffioen, Harm TS3-A.4 217 Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services
Guillaume, Rene TENSOR TS2.2 803 Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications
Gündogan, Cenk TS1-A.3 19 IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison
H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Häberle, Marco TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Haller, Piroska TS5-B.2 395 MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
Haque, Israat SP6.1 604 An Energy-Aware SDN/NFV Architecture for the Internet of Things
He, Guobiao SP1.3 504 Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
He, Ting TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Heimgaertner, Florian TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Hendriks, Luuk SP1.1 494 Polymorphic Encryption and Pseudonymisation of IP Network Flows
Henningsen, Sebastian TS4-A.2 289 Mapping the Interplanetary Filesystem
DS3.2 679 Demo: Crawling the IPFS Network
Henze, Martin TS4-A.3 298 How to Securely Prune Bitcoin's Blockchain
Heusse, Martin FIT - TS1.2 719 SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling
Hoang, Van Hoan TS4-A.1 280 Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems
Hong, Hsiang-Jen SP2.3 524 Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
Huang, Longbo TS3-B.2 235 RTCP - Reduce Delay Variability with an End-to-end Approach
Huang, Po-Han TS3-B.1 226 Efficient User-Cell Association for 360 Video Streaming over Wireless Networks
Huet, Alexis TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Iannone, Luigi TS6-B.3 458 Moving a step forward in the quest for Deterministic Networks (DetNet)
SP2.1 514 Multi-Cloud Chaining with Segment Routing
J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Jakllari, Gentian TS4-B.1 307 An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training
Jayatheerthan, Jay TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Jiang, Yong SP5.4 599 Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
Jiang, Yuang TS3-C.3 271 Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
Jin, Dong SP4.1 559 Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Jones, Tom FIT - TS2.1 731 Rethinking ACKs at the Transport Layer
Jonglez, Baptiste FIT - TS1.2 719 SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling
K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Kalde, Benedikt TS4-A.3 298 How to Securely Prune Bitcoin's Blockchain
Kar, Sounak SP3.1 534 A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication
Karvonen, Heikki SP5.2 589 MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Katsalis, Kostas TENSOR TS2.1 797 Coupling Source Routing with Time-Sensitive Networking
Katz-Bassett, Ethan TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Kellerer, Wolfgang TS7.1 467 Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane
Keslassy, Isaac TS6-A.2 422 Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware
Kettimuthu, Rajkumar TS2-C.4 181 Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
Khandelia, Somesh TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Kobayashi, Katsushi FIT - TS1.1 713 A DRAM-friendly priority queue Internet packet scheduler implementation and its effects on TCP
Kodialam, Murali TS3-C.3 271 Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
Kołakowski, Robert Slicing - TS1.2 767 Integration of U-space and 5GS for UAV services
Korzhitskii, Nikita TS3-A.1 190 Characterizing the Root Landscape of Certificate Transparency Logs
Kossakowski, Mateusz TS6-A.1 413 P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4
Kuipers, Fernando TS6-A.2 422 Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware
SP6.2 609 LoRaWAN Class B Multicast Scalability
Kukkalli, Hanif Slicing - TS1.1 761 Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios
Kuklinski, Slawomir Slicing - TS1.2 767 Integration of U-space and 5GS for UAV services
Kunne, Stephan TS2-A.1 82 Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Labiod, Houda DS1.2 669 Securing messages in C-ITS: a proof of concept
Laki, Sándor FIT - TS3.2 749 On the Incompatibility of Scalable Congestion Controls over the Internet
Lakshman, T. TS3-C.3 271 Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
Landau Feibish, Shir TS6-B.2 449 Routing Oblivious Measurement Analytics
Langar, Rami SP4.5 579 Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
DS2.1 673 Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators
Laraba, Abir TS6-A.3 431 Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification
Larroca, Federico TS5-A.2 370 A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights
Leguay, Jeremie TENSOR TS1.1 785 Load Balancing for Deterministic Networks
Lehtihet, Elyes TS4-A.1 280 Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems
Lenard, Teri TS5-B.2 395 MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
Leung, Kin TS4-C.3 352 Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
Li, Cong TS1-B.3 46 How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?
Li, Pengfei TS2-A.4 109 Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
Li, Qing SP5.4 599 Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
Li, Xiang TS1-B.3 46 How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?
Li, Yuxing TS3-B.2 235 RTCP - Reduce Delay Variability with an End-to-end Approach
Liao, Binbin TS2-C.1 154 Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
Lindner, Steffen TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Ling, Dongfang TS2-A.4 109 Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
Liu, Bin TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Liu, Bingyang SP1.4 509 Securing Route Leaks using a Decentralized Approach
Liu, Changchang TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Liu, Qian ITS2.2 704 Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications
Liu, Wuji TS2-C.4 181 Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
Liu, Xinmin SP4.1 559 Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Livadariu, Ioana TS5-A.1 361 A data centric computational model of IPv6 adoption
Ljubic, Ivana TS1-C.1 55 Virtual Network Functions Placement and Routing Problem: Path formulation
Loehr, Hans TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
López de Vergara, Jorge TS5-A.3 379 Estimating Server Load Based on its Correlation with TCP SYN Response Time
Lu, Hanlin TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Lv, Jianhui SP5.4 599 Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Maggi, Lorenzo TS2-A.1 82 Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
Maheshwari, Sumit Slicing - TS1.1 761 Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios
Mahimkar, Ajay TS3-B.3 244 Enabling Premium Service for Streaming Video in Cellular Networks
Mancha, Cristina TS5-A.3 379 Estimating Server Load Based on its Correlation with TCP SYN Response Time
Mao, Weixi TS2-C.2 163 Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
Martin, Sébastien TENSOR TS1.1 785 Load Balancing for Deterministic Networks
Martínez Redondo, Marta TS5-A.3 379 Estimating Server Load Based on its Correlation with TCP SYN Response Time
Masson, Marie SP5.1 584 Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks
Mathieu, Bertrand TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Matzutt, Roman TS4-A.3 298 How to Securely Prune Bitcoin's Blockchain
Mauricio, Leopoldo Alexandre SP2.4 529 Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters
Medagliani, Paolo TENSOR TS1.1 785 Load Balancing for Deterministic Networks
Meira, Wagner TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Menth, Michael TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Mesquita de Pinho, Vinicius DS1.3 671 User identification by matching radio ``vision'' and computer vision through means of machine learning
Mishev, Anastas SP3.2 539 Modelling Edge Computing in Urban Mobility Simulation Scenarios
Mitton, Nathalie SP6.3 614 Practical evaluation of carrier sensing for a LoRa wildlife monitoring network
Mondal, Abhijit TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Monteiro, Edmundo TS1-C.2 64 A Rank-based Mechanism for Service Placement in the Fog
Montero, Diego FIT - TS3.1 743 SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements
Morales, Gastón TS5-A.2 370 A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights
Moraney, Jalil TS1-B.2 37 On the Practical Detection of Hierarchical Heavy Hitters
Mouaci, Ahlam TS1-C.1 55 Virtual Network Functions Placement and Routing Problem: Path formulation
Mu, Yanyan ITS2.2 704 Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications
Mühlhäuser, Max SP4.2 564 Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone
Mukherjee, Sarit TS3-C.3 271 Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Nádas, Szilveszter FIT - TS3.2 749 On the Incompatibility of Scalable Congestion Controls over the Internet
Nahar, Ankur TS5-B.3 404 CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks
Nandha Kumar, Gagan TENSOR TS2.1 797 Coupling Source Routing with Time-Sensitive Networking
Nandi, Sukumar SP2.2 519 Amalgam: Distributed Network Control With Scalabale Service Chaining
Narayanan, Arvind TS2-A.2 91 NFV Performance Profiling on Multi-core Servers
Narayanan, Vijaykrishnan TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Nayak, Naresh TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Neglia, Giovanni SP4.4 574 Dynamic Backup Workers for Parallel Machine Learning
Németh, Balázs TS7.2 476 Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility
Nemirovsky, Mario FIT - TS3.1 743 SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements
Niesler, Thomas SP6.3 614 Practical evaluation of carrier sensing for a LoRa wildlife monitoring network
O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
O'Kennedy, Morgan SP6.3 614 Practical evaluation of carrier sensing for a LoRa wildlife monitoring network
Oberprieler, Markus TS2-B.1 118 Measuring Decentralized Video Streaming: A Case Study of DTube
Oostenbrink, Jorik TS6-A.2 422 Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware
Orda, Ariel TS6-A.2 422 Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware
Osiński, Tomasz TS6-A.1 413 P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4
Ostrowski, Bartłomiej TS1-A.1 1 Packet delay minimization in multi-hop wireless sensor networks with periodic traffic
P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Pal, Nibir TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Palit, Basabdatta TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Papadimitriou, Panagiotis TENSOR TS2.1 797 Coupling Source Routing with Time-Sensitive Networking
Paquete, Luís TS1-C.2 64 A Rank-based Mechanism for Service Placement in the Fog
Pasteris, Stephen TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Paul, Krishna TS2-B.2 127 EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
Pele, Liat ITS1.2 686 Cost effective troubleshooting of NFV infrastructure
Pennekamp, Jan TS4-A.3 298 How to Securely Prune Bitcoin's Blockchain
Perez Abreu, David TS1-C.2 64 A Rank-based Mechanism for Service Placement in the Fog
Perez-Hernandez, Ramon Slicing - TS2.2 779 The case for serverless mobile networking
Perpey, André DS1.2 669 Securing messages in C-ITS: a proof of concept
Perrot, Nancy TS1-C.1 55 Virtual Network Functions Placement and Routing Problem: Path formulation
Persson Proos, Daniel TS1-A.2 10 Performance Comparison of Messaging Protocols and Serialization Formats
Pham, Tat Dat TS2-B.1 118 Measuring Decentralized Video Streaming: A Case Study of DTube
Pignolet, Yvonne-Anne TS4-B.2 316 Implications of Routing Coherence and Consistency on Network Optimization
TS7.2 476 Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility
Pióro, Michal TS1-A.1 1 Packet delay minimization in multi-hop wireless sensor networks with periodic traffic
Poggi, Marcus SP2.4 529 Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters
Popescu, Dalia DS1.3 671 User identification by matching radio ``vision'' and computer vision through means of machine learning
Popławski, Artur SP4.3 569 Optimizing Spectrum Use in Wireless Networks by Learning Agents
Poularakis, Konstantinos TS4-C.3 352 Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
Psarakis, Maria SP5.3 594 Voting Credential Management System for Electronic Voting Privacy
Psounis, Konstantinos TS3-B.1 226 Efficient User-Cell Association for 360 Video Streaming over Wireless Networks
Pudelko, Maximilian TS4-B.3 325 Performance Analysis of VPN Gateways
Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Qin, Qiaofeng TS4-C.3 352 Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Rahim, Rana SP4.5 579 Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
DS2.1 673 Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators
Ramezanifarkhani, Toktam FIT - TS1.3 725 Transport Layer Efficiency and Security in IoT: RINA's Approach
Rao, Nageswara TS2-C.4 181 Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
Rathgeb, Erwin FIT - TS2.2 737 A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue
Raz, Danny TS1-B.2 37 On the Practical Detection of Hierarchical Heavy Hitters
TS6-B.2 449 Routing Oblivious Measurement Analytics
Ren, Shoushou SP1.4 509 Securing Route Leaks using a Decentralized Approach
Reynaud, Laurent SP3.3 544 A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement
Rizk, Amr SP3.1 534 A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication
TENSOR TS2.2 803 Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications
Rocha Filho, Geraldo SP5.2 589 MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Rodrigues, Bruno DS1.1 667 A Practical Analysis on Mirai Botnet Traffic
Romero, Ivan FIT - TS3.1 743 SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements
Rossberg, Michael DS2.2 675 Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations
Rossi, Dario TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Rost, Matthias TS7.2 476 Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility
Ruffin, Clément DS1.2 669 Securing messages in C-ITS: a proof of concept
Rust, Sebastian TS4-A.2 289 Mapping the Interplanetary Filesystem
DS3.2 679 Demo: Crawling the IPFS Network
S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Saha, Dipon SP6.1 604 An Energy-Aware SDN/NFV Architecture for the Internet of Things
Sakic, Ermin TS7.1 467 Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane
Salamatian, Kave TS7.3 485 Baking the ruleset: A heat propagation relaxation to packet classification
Salhab, Nazih SP4.5 579 Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
DS2.1 673 Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators
Sanches, Vinicius ITS2.1 695 A Lightweight Network-based Android Malware Detection System
Sanz, Igor ITS2.1 695 A Lightweight Network-based Android Malware Detection System
Sarker, Arijet SP5.3 594 Voting Credential Management System for Electronic Voting Privacy
Saverimoutou, Antoine TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Schaefer, Guenter SP3.4 549 Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X
DS2.2 675 Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations
Scheuermann, Björn TS4-A.2 289 Mapping the Interplanetary Filesystem
DS3.2 679 Demo: Crawling the IPFS Network
Schildt, Sebastian TENSOR TS1.2 791 P4 In-Network Source Protection for Sensor Fail-Over
Schmid, Stefan TS4-B.2 316 Implications of Routing Coherence and Consistency on Network Optimization
TS7.2 476 Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility
Schmidt, Thomas TS1-A.3 19 IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison
Sebastianelli, Nicola SP4.4 574 Dynamic Backup Workers for Parallel Machine Learning
Segall, Itai ITS1.2 686 Cost effective troubleshooting of NFV infrastructure
Selinis, Ioannis TS2-B.3 136 On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
Senouci, Sidi-Mohammed SP3.3 544 A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement
Serral-Gracià, René FIT - TS3.1 743 SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements
Serrano, Pablo Slicing - TS2.2 779 The case for serverless mobile networking
Serror, Martin TS5-B.1 386 QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Seskar, Ivan Slicing - TS1.1 761 Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios
Shafiee, Mehrnoosh TS2-A.3 100 On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling
Shah, Bhavit FIT - TS3.3 755 Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link
Shankaranarayanan, Nemmara TS3-B.3 244 Enabling Premium Service for Streaming Video in Cellular Networks
Sharma, Rahul TS4-C.2 343 Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing
Shen, Gengbiao SP5.4 599 Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
Shenoy, Nirmala DS3.3 681 Optimum Rooted Trees for Failover in Switched Networks
Shi, Hao TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Shiferaw, Yonatan SP6.2 609 LoRaWAN Class B Multicast Scalability
Shojaee, Meysam SP6.1 604 An Energy-Aware SDN/NFV Architecture for the Internet of Things
Sikarwar, Himani TS5-B.3 404 CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks
Silva, Brivaldo TS3-A.3 208 Tracking Down Sources of Spoofed IP Packets
Sim, Alex TS3-C.1 253 A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
Skorupski, Martin Slicing - TS1.1 761 Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios
Solano, Alberto Slicing - TS2.1 773 Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV
Solis Barreto, Priscila SP5.2 589 MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Song, Haoyu TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Spinelli, Francesco SP2.1 514 Multi-Cloud Chaining with Segment Routing
Sridhara Rao Prasad, Abhinandan SP2.2 519 Amalgam: Distributed Network Control With Scalabale Service Chaining
Steinmetz, Ralf TENSOR TS2.2 803 Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications
Stiller, Burkhard DS1.1 667 A Practical Analysis on Mirai Botnet Traffic
Su, Chi-Jiun FIT - TS3.3 755 Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link
Su, Wei SP1.3 504 Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
Szott, Szymon SP4.3 569 Optimizing Spectrum Use in Wireless Networks by Learning Agents
T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Tafazolli, Rahim TS2-B.3 136 On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
Tang, Xianzhe TS1-B.3 46 How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?
Tarasiuk, Halina TS6-A.1 413 P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4
Tarchi, Daniele DS3.1 677 FORCH: An Orchestrator for Fog Computing service deployment
Tassiulas, Leandros TS3-C.3 271 Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
TS4-C.3 352 Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
Teymoori, Peyman FIT - TS1.3 725 Transport Layer Efficiency and Security in IoT: RINA's Approach
Thakur, Aditya TS3-C.1 253 A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
Theil, Markus DS2.2 675 Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations
Tollet, Jerome SP2.1 514 Multi-Cloud Chaining with Segment Routing
Tomaszewski, Artur TS1-A.1 1 Packet delay minimization in multi-hop wireless sensor networks with periodic traffic
Tomaszewski, Lechosław Slicing - TS1.2 767 Integration of U-space and 5GS for UAV services
Torres, Rob FIT - TS3.3 755 Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link
Tredan, Gilles TS4-B.2 316 Implications of Routing Coherence and Consistency on Network Optimization
Tundis, Andrea SP4.2 564 Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone
Turkovic, Belma TS6-A.2 422 Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware
Tüxen, Michael FIT - TS2.2 737 A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue
U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Uzair, Muhammad SP4.2 564 Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone
V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Vartiainen, Johanna SP5.2 589 MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
Vass, Balázs TS7.2 476 Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility
Velasquez, Karima TS1-C.2 64 A Rank-based Mechanism for Service Placement in the Fog
Viegas, Eduardo ITS2.1 695 A Lightweight Network-based Android Malware Detection System
Völker, Timo FIT - TS2.2 737 A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue
Volodina, Ekaterina FIT - TS2.2 737 A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue
W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wagner, Eric TS5-B.1 386 QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Wählisch, Matthias TS1-A.3 19 IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison
Walrand, Jean TS3-B.2 235 RTCP - Reduce Delay Variability with an End-to-end Approach
Wan, Ying TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Wang, Bin ITS2.2 704 Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications
Wang, Jia TS3-B.3 244 Enabling Premium Service for Streaming Video in Cellular Networks
Wang, Lei TS2-C.2 163 Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
Wang, Ning TS2-B.3 136 On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
Wang, Shiqiang TS2-C.3 172 Joint Coreset Construction and Quantization for Distributed Machine Learning
Wang, Wei SP4.1 559 Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Wang, Yi TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Wehrle, Klaus TS4-A.3 298 How to Securely Prune Bitcoin's Blockchain
TS5-B.1 386 QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
Wei, XinPeng SP1.4 509 Securing Route Leaks using a Decentralized Approach
Wendland, Philip SP3.4 549 Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X
Westerbaan, Abraham SP1.1 494 Polymorphic Encryption and Pseudonymisation of IP Network Flows
Willis, Peter DS3.3 681 Optimum Rooted Trees for Failover in Switched Networks
Wolhuter, Riaan SP6.3 614 Practical evaluation of carrier sensing for a LoRa wildlife monitoring network
Wu, Chase TS2-C.4 181 Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
Wu, Jianping TS1-C.3 73 FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime
Wu, Kesheng TS3-C.1 253 A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Xie, Gaogang TS2-C.1 154 Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
TS7.3 485 Baking the ruleset: A heat propagation relaxation to packet classification
Xie, Jinsen SP4.1 559 Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Xinneng, XU TS2-A.1 82 Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
Xu, Chuan SP4.4 574 Dynamic Backup Workers for Parallel Machine Learning
Xu, Jinchun TS1-B.1 28 Revealing QoE of Web Users from Encrypted Network Traffic
Xu, Lu SP1.2 499 Encrypted Application Classification with Convolutional Neural Network
Xu, Mingwei TS1-C.3 73 FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime
SP5.4 599 Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
Xu, Wenquan TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Xu, Xing TS3-B.3 244 Enabling Premium Service for Streaming Video in Cellular Networks
Xu, Yang SP1.2 499 Encrypted Application Classification with Convolutional Neural Network
Xu, Yuedong TS2-C.2 163 Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Yang, Jian SP4.1 559 Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
Yang, Kun SP1.2 499 Encrypted Application Classification with Convolutional Neural Network
Yu, Delei TS2-B.3 136 On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
Yu, Minlan TS3-B.3 244 Enabling Premium Service for Streaming Video in Cellular Networks
Yu, Minlan TS6-B.2 449 Routing Oblivious Measurement Analytics
Yue, Jiarui SP1.3 504 Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
Yun, Daqing TS2-C.4 181 Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Zhang, Beichuan TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Zhang, Cheng TS1-C.3 73 FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime
Zhang, Chuwen TS6-B.1 440 PBC: Effective Prefix Caching for Fast Name Lookups
Zhang, Guangxing TS2-C.1 154 Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
Zhang, Jun DS1.2 669 Securing messages in C-ITS: a proof of concept
Zhang, Molly TS3-C.2 262 Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
Zhang, Weifeng TS2-A.4 109 Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
Zhang, Xinyi TS7.3 485 Baking the ruleset: A heat propagation relaxation to packet classification
Zhang, Yuan TS1-B.3 46 How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?
Zhang, Yuanrong TS2-A.4 109 Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
Zhang, Zhi-Li TS2-A.2 91 NFV Performance Profiling on Multi-core Servers
Zhao, Jin TS2-C.2 163 Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
ITS2.2 704 Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications
Zheng, Peng TS2-A.2 91 NFV Performance Profiling on Multi-core Servers
Zhou, Xiaobo SP2.3 524 Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
Zhou, Yu TS1-C.3 73 FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime
Zhu, KeKe SP5.4 599 Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter