| Author |
Session |
Start page |
Title |
| A A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Abdel Metaal, Mohamed |
TENSOR 2020: TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
| Addanki, Vamsi |
TS6-B.3 |
458 |
Moving a step forward in the quest for Deterministic Networks (DetNet) |
| Aguiar, Rui |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Aknin, Noura |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
| Alcaraz, Salvador |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
| Altman, Eitan |
SP5.1 |
584 |
Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks |
| Altman, Zwi |
SP5.1 |
584 |
Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks |
| Amsüss, Christian |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
| Andreoni, Martin |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
| Arcas-Abella, Oriol |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
| Arora, Apoorva |
SP6.2 |
609 |
LoRaWAN Class B Multicast Scalability |
| B A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Backhaus, Martin |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
| Baddeley, Michael |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
| Bajpai, Vaibhav |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
| Banchs, Albert |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
| Barraca, João Paulo |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Ben Basat, Ran |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
| ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
| Ben Houidi, Zied |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Beylot, André-Luc |
TS4-B.1 |
307 |
An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training |
| Bi, Jun |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
| Bolboaca, Roland |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
| Bondorf, Steffen |
SP3.5 |
554 |
Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis |
| Border, John |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
| Borsatti, Davide |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
| Boutaba, Raouf |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
| SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
| Byun, SangHyun |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
| C A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Cabellos-Aparicio, Albert |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
| Caetano, Marcos |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
| Cai, Sheng-Ming |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Capdehourat, Germán |
TS5-A.2 |
370 |
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights |
| Carle, Georg |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
| Carlsson, Niklas |
TS1-A.2 |
10 |
Performance Comparison of Messaging Protocols and Serialization Formats |
| TS2-B.4 |
145 |
Optimized Dynamic Cache Instantiation |
| TS3-A.1 |
190 |
Characterizing the Root Landscape of Certificate Transparency Logs |
| Carvalho, Márcio |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Cerroni, Walter |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
| Chaabane, Ghassen |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
| Chaalal, Elhadja |
SP3.3 |
544 |
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement |
| Chaignon, Paul |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
| Chakraborty, Sandip |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
| Chan, Kevin |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Chang, Sang-Yoon |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
| SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
| Chao, H. Jonathan |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
| Chattopadhyay, Subhrendu |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
| Chen, Guo |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
| Chen, Shuang |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
| Chen, Shuangwu |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
| Chen, Xiaoqi |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
| Chodorek, Agnieszka |
DS3.4 |
683 |
Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements |
| Chodorek, Robert |
DS3.4 |
683 |
Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements |
| Chow, C. Edward |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
| Chowdhury, Shihabur |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
| Chrisment, Isabelle |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
| Ciaccia, Francesco |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
| Cohen, Johanne |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
| Coll, Roger |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
| Contreras, Luis |
Slicing - TS2.1 |
773 |
Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV |
| Corujo, Daniel |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Cunha, Italo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Cunha, Vitor |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Curado, Marilia |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
| Custura, Ana |
FIT - TS2.1 |
731 |
Rethinking ACKs at the Transport Layer |
| D A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Da, Bin |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
| da Silva, Eduardo |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Dahhani, Mohammed |
TS4-B.1 |
307 |
An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training |
| Das, Debasis |
TS5-B.3 |
404 |
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks |
| Davoli, Gianluca |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
| de Alfaro, Luca |
TS3-C.2 |
262 |
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning |
| de Pedro, Luis |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
| Dhamdhere, Amogh |
TS5-A.1 |
361 |
A data centric computational model of IPv6 adoption |
| Diao, Zulong |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
| Dias, Ricardo |
SP2.4 |
529 |
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters |
| Diego, William |
ITS1.1 |
685 |
Evolution Toward the Next Generation Radio Access Network |
| Doan, Trinh Viet |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
| Doerr, Christian |
TS3-A.2 |
199 |
Scaling website fingerprinting |
| TS3-A.4 |
217 |
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services |
| Drichel, Arthur |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
| E A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Eager, Derek |
TS2-B.4 |
145 |
Optimized Dynamic Cache Instantiation |
| Einziger, Gil |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
| ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
| Elmokashfi, Ahmed |
TS5-A.1 |
361 |
A data centric computational model of IPv6 adoption |
| Emmerich, Paul |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
| F A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Fairhurst, Gorry |
FIT - TS2.1 |
731 |
Rethinking ACKs at the Transport Layer |
| Fan, Wenjun |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
| SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
| Fazzion, Elverton |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Fejes, Ferenc |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
| Feng, Jingxia |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
| Feng, Wendi |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
| Feng, Yong |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Ferreira, Gabriel |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
| Ferreira, Ronaldo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Ferriol-Galmés, Miquel |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
| Filiposka, Sonja |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
| Florian, Martin |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
| DS3.2 |
679 |
Demo: Crawling the IPFS Network |
| Fonseca, Osvaldo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Franco, Muriel |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
| François, Jérôme |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
| G A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Gallenmüller, Sebastian |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
| Gallopeni, Getoar |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
| Ganguly, Niloy |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Gao, Shuai |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
| Garcia-Aviles, Ginés |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
| Garcia-Luna-Aceves, J |
TS3-C.2 |
262 |
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning |
| Garcia-Saavedra, Andres |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
| Gaujal, Bruno |
FIT - TS1.2 |
719 |
SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling |
| Genge, Bela |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
| Geyer, Fabien |
SP3.5 |
554 |
Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis |
| Ghaderi, Javad |
TS2-A.3 |
100 |
On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling |
| Ghamri-Doudane, Yacine |
TS4-A.1 |
280 |
Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems |
| Ghiette, Vincent |
TS3-A.2 |
199 |
Scaling website fingerprinting |
| Ghosal, Dipak |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
| Ghosal, Gaurav |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
| Gilly, Katja |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
| Glebke, René |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
| Goldstein, Maayan |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
| Gombos, Gergő |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
| Gourdin, Eric |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
| Govindan, Ramesh |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
| Gramaglia, Marco |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
| Granville, Lisandro |
TS4-C.1 |
334 |
Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations |
| Grewe, Dennis |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Griffioen, Harm |
TS3-A.4 |
217 |
Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services |
| Guillaume, Rene |
TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
| Gündogan, Cenk |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
| H A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Häberle, Marco |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Haller, Piroska |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
| Haque, Israat |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
| He, Guobiao |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
| He, Ting |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Heimgaertner, Florian |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Hendriks, Luuk |
SP1.1 |
494 |
Polymorphic Encryption and Pseudonymisation of IP Network Flows |
| Henningsen, Sebastian |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
| DS3.2 |
679 |
Demo: Crawling the IPFS Network |
| Henze, Martin |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
| Heusse, Martin |
FIT - TS1.2 |
719 |
SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling |
| Hoang, Van Hoan |
TS4-A.1 |
280 |
Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems |
| Hong, Hsiang-Jen |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
| Huang, Longbo |
TS3-B.2 |
235 |
RTCP - Reduce Delay Variability with an End-to-end Approach |
| Huang, Po-Han |
TS3-B.1 |
226 |
Efficient User-Cell Association for 360 Video Streaming over Wireless Networks |
| Huet, Alexis |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| I A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Iannone, Luigi |
TS6-B.3 |
458 |
Moving a step forward in the quest for Deterministic Networks (DetNet) |
| SP2.1 |
514 |
Multi-Cloud Chaining with Segment Routing |
| J A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Jakllari, Gentian |
TS4-B.1 |
307 |
An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training |
| Jayatheerthan, Jay |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Jiang, Yong |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
| Jiang, Yuang |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
| Jin, Dong |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
| Jones, Tom |
FIT - TS2.1 |
731 |
Rethinking ACKs at the Transport Layer |
| Jonglez, Baptiste |
FIT - TS1.2 |
719 |
SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling |
| K A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Kalde, Benedikt |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
| Kar, Sounak |
SP3.1 |
534 |
A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication |
| Karvonen, Heikki |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
| Katsalis, Kostas |
TENSOR TS2.1 |
797 |
Coupling Source Routing with Time-Sensitive Networking |
| Katz-Bassett, Ethan |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Kellerer, Wolfgang |
TS7.1 |
467 |
Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane |
| Keslassy, Isaac |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
| Kettimuthu, Rajkumar |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
| Khandelia, Somesh |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Kobayashi, Katsushi |
FIT - TS1.1 |
713 |
A DRAM-friendly priority queue Internet packet scheduler implementation and its effects on TCP |
| Kodialam, Murali |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
| Kołakowski, Robert |
Slicing - TS1.2 |
767 |
Integration of U-space and 5GS for UAV services |
| Korzhitskii, Nikita |
TS3-A.1 |
190 |
Characterizing the Root Landscape of Certificate Transparency Logs |
| Kossakowski, Mateusz |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
| Kuipers, Fernando |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
| SP6.2 |
609 |
LoRaWAN Class B Multicast Scalability |
| Kukkalli, Hanif |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
| Kuklinski, Slawomir |
Slicing - TS1.2 |
767 |
Integration of U-space and 5GS for UAV services |
| Kunne, Stephan |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
| L A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Labiod, Houda |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
| Laki, Sándor |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
| Lakshman, T. |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
| Landau Feibish, Shir |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
| Langar, Rami |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
| DS2.1 |
673 |
Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators |
| Laraba, Abir |
TS6-A.3 |
431 |
Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification |
| Larroca, Federico |
TS5-A.2 |
370 |
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights |
| Leguay, Jeremie |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
| Lehtihet, Elyes |
TS4-A.1 |
280 |
Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems |
| Lenard, Teri |
TS5-B.2 |
395 |
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks |
| Leung, Kin |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
| Li, Cong |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
| Li, Pengfei |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
| Li, Qing |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
| Li, Xiang |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
| Li, Yuxing |
TS3-B.2 |
235 |
RTCP - Reduce Delay Variability with an End-to-end Approach |
| Liao, Binbin |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
| Lindner, Steffen |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Ling, Dongfang |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
| Liu, Bin |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Liu, Bingyang |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
| Liu, Changchang |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Liu, Qian |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
| Liu, Wuji |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
| Liu, Xinmin |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
| Livadariu, Ioana |
TS5-A.1 |
361 |
A data centric computational model of IPv6 adoption |
| Ljubic, Ivana |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
| Loehr, Hans |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| López de Vergara, Jorge |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
| Lu, Hanlin |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Lv, Jianhui |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
| M A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Maggi, Lorenzo |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
| Maheshwari, Sumit |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
| Mahimkar, Ajay |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
| Mancha, Cristina |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
| Mao, Weixi |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
| Martin, Sébastien |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
| Martínez Redondo, Marta |
TS5-A.3 |
379 |
Estimating Server Load Based on its Correlation with TCP SYN Response Time |
| Masson, Marie |
SP5.1 |
584 |
Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks |
| Mathieu, Bertrand |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Matzutt, Roman |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
| Mauricio, Leopoldo Alexandre |
SP2.4 |
529 |
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters |
| Medagliani, Paolo |
TENSOR TS1.1 |
785 |
Load Balancing for Deterministic Networks |
| Meira, Wagner |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Menth, Michael |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Mesquita de Pinho, Vinicius |
DS1.3 |
671 |
User identification by matching radio ``vision'' and computer vision through means of machine learning |
| Mishev, Anastas |
SP3.2 |
539 |
Modelling Edge Computing in Urban Mobility Simulation Scenarios |
| Mitton, Nathalie |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
| Mondal, Abhijit |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Monteiro, Edmundo |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
| Montero, Diego |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
| Morales, Gastón |
TS5-A.2 |
370 |
A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights |
| Moraney, Jalil |
TS1-B.2 |
37 |
On the Practical Detection of Hierarchical Heavy Hitters |
| Mouaci, Ahlam |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
| Mu, Yanyan |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
| Mühlhäuser, Max |
SP4.2 |
564 |
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone |
| Mukherjee, Sarit |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
| N A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Nádas, Szilveszter |
FIT - TS3.2 |
749 |
On the Incompatibility of Scalable Congestion Controls over the Internet |
| Nahar, Ankur |
TS5-B.3 |
404 |
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks |
| Nandha Kumar, Gagan |
TENSOR TS2.1 |
797 |
Coupling Source Routing with Time-Sensitive Networking |
| Nandi, Sukumar |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
| Narayanan, Arvind |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
| Narayanan, Vijaykrishnan |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Nayak, Naresh |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Neglia, Giovanni |
SP4.4 |
574 |
Dynamic Backup Workers for Parallel Machine Learning |
| Németh, Balázs |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
| Nemirovsky, Mario |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
| Niesler, Thomas |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
| O A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| O'Kennedy, Morgan |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
| Oberprieler, Markus |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
| Oostenbrink, Jorik |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
| Orda, Ariel |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
| Osiński, Tomasz |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
| Ostrowski, Bartłomiej |
TS1-A.1 |
1 |
Packet delay minimization in multi-hop wireless sensor networks with periodic traffic |
| P A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Pal, Nibir |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Palit, Basabdatta |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Papadimitriou, Panagiotis |
TENSOR TS2.1 |
797 |
Coupling Source Routing with Time-Sensitive Networking |
| Paquete, Luís |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
| Pasteris, Stephen |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Paul, Krishna |
TS2-B.2 |
127 |
EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks |
| Pele, Liat |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
| Pennekamp, Jan |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
| Perez Abreu, David |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
| Perez-Hernandez, Ramon |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
| Perpey, André |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
| Perrot, Nancy |
TS1-C.1 |
55 |
Virtual Network Functions Placement and Routing Problem: Path formulation |
| Persson Proos, Daniel |
TS1-A.2 |
10 |
Performance Comparison of Messaging Protocols and Serialization Formats |
| Pham, Tat Dat |
TS2-B.1 |
118 |
Measuring Decentralized Video Streaming: A Case Study of DTube |
| Pignolet, Yvonne-Anne |
TS4-B.2 |
316 |
Implications of Routing Coherence and Consistency on Network Optimization |
| TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
| Pióro, Michal |
TS1-A.1 |
1 |
Packet delay minimization in multi-hop wireless sensor networks with periodic traffic |
| Poggi, Marcus |
SP2.4 |
529 |
Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters |
| Popescu, Dalia |
DS1.3 |
671 |
User identification by matching radio ``vision'' and computer vision through means of machine learning |
| Popławski, Artur |
SP4.3 |
569 |
Optimizing Spectrum Use in Wireless Networks by Learning Agents |
| Poularakis, Konstantinos |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
| Psarakis, Maria |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
| Psounis, Konstantinos |
TS3-B.1 |
226 |
Efficient User-Cell Association for 360 Video Streaming over Wireless Networks |
| Pudelko, Maximilian |
TS4-B.3 |
325 |
Performance Analysis of VPN Gateways |
| Q A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Qin, Qiaofeng |
TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
| R A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Rahim, Rana |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
| DS2.1 |
673 |
Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators |
| Ramezanifarkhani, Toktam |
FIT - TS1.3 |
725 |
Transport Layer Efficiency and Security in IoT: RINA's Approach |
| Rao, Nageswara |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
| Rathgeb, Erwin |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
| Raz, Danny |
TS1-B.2 |
37 |
On the Practical Detection of Hierarchical Heavy Hitters |
| TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
| Ren, Shoushou |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
| Reynaud, Laurent |
SP3.3 |
544 |
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement |
| Rizk, Amr |
SP3.1 |
534 |
A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication |
| TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
| Rocha Filho, Geraldo |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
| Rodrigues, Bruno |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
| Romero, Ivan |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
| Rossberg, Michael |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
| Rossi, Dario |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Rost, Matthias |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
| Ruffin, Clément |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
| Rust, Sebastian |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
| DS3.2 |
679 |
Demo: Crawling the IPFS Network |
| S A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Saha, Dipon |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
| Sakic, Ermin |
TS7.1 |
467 |
Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane |
| Salamatian, Kave |
TS7.3 |
485 |
Baking the ruleset: A heat propagation relaxation to packet classification |
| Salhab, Nazih |
SP4.5 |
579 |
Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond |
| DS2.1 |
673 |
Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators |
| Sanches, Vinicius |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
| Sanz, Igor |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
| Sarker, Arijet |
SP5.3 |
594 |
Voting Credential Management System for Electronic Voting Privacy |
| Saverimoutou, Antoine |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Schaefer, Guenter |
SP3.4 |
549 |
Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X |
| DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
| Scheuermann, Björn |
TS4-A.2 |
289 |
Mapping the Interplanetary Filesystem |
| DS3.2 |
679 |
Demo: Crawling the IPFS Network |
| Schildt, Sebastian |
TENSOR TS1.2 |
791 |
P4 In-Network Source Protection for Sensor Fail-Over |
| Schmid, Stefan |
TS4-B.2 |
316 |
Implications of Routing Coherence and Consistency on Network Optimization |
| TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
| Schmidt, Thomas |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
| Sebastianelli, Nicola |
SP4.4 |
574 |
Dynamic Backup Workers for Parallel Machine Learning |
| Segall, Itai |
ITS1.2 |
686 |
Cost effective troubleshooting of NFV infrastructure |
| Selinis, Ioannis |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
| Senouci, Sidi-Mohammed |
SP3.3 |
544 |
A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement |
| Serral-Gracià, René |
FIT - TS3.1 |
743 |
SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements |
| Serrano, Pablo |
Slicing - TS2.2 |
779 |
The case for serverless mobile networking |
| Serror, Martin |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
| Seskar, Ivan |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
| Shafiee, Mehrnoosh |
TS2-A.3 |
100 |
On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling |
| Shah, Bhavit |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
| Shankaranarayanan, Nemmara |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
| Sharma, Rahul |
TS4-C.2 |
343 |
Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing |
| Shen, Gengbiao |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
| Shenoy, Nirmala |
DS3.3 |
681 |
Optimum Rooted Trees for Failover in Switched Networks |
| Shi, Hao |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Shiferaw, Yonatan |
SP6.2 |
609 |
LoRaWAN Class B Multicast Scalability |
| Shojaee, Meysam |
SP6.1 |
604 |
An Energy-Aware SDN/NFV Architecture for the Internet of Things |
| Sikarwar, Himani |
TS5-B.3 |
404 |
CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks |
| Silva, Brivaldo |
TS3-A.3 |
208 |
Tracking Down Sources of Spoofed IP Packets |
| Sim, Alex |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
| Skorupski, Martin |
Slicing - TS1.1 |
761 |
Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios |
| Solano, Alberto |
Slicing - TS2.1 |
773 |
Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV |
| Solis Barreto, Priscila |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
| Song, Haoyu |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Spinelli, Francesco |
SP2.1 |
514 |
Multi-Cloud Chaining with Segment Routing |
| Sridhara Rao Prasad, Abhinandan |
SP2.2 |
519 |
Amalgam: Distributed Network Control With Scalabale Service Chaining |
| Steinmetz, Ralf |
TENSOR TS2.2 |
803 |
Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications |
| Stiller, Burkhard |
DS1.1 |
667 |
A Practical Analysis on Mirai Botnet Traffic |
| Su, Chi-Jiun |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
| Su, Wei |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
| Szott, Szymon |
SP4.3 |
569 |
Optimizing Spectrum Use in Wireless Networks by Learning Agents |
| T A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Tafazolli, Rahim |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
| Tang, Xianzhe |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
| Tarasiuk, Halina |
TS6-A.1 |
413 |
P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4 |
| Tarchi, Daniele |
DS3.1 |
677 |
FORCH: An Orchestrator for Fog Computing service deployment |
| Tassiulas, Leandros |
TS3-C.3 |
271 |
Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers |
| TS4-C.3 |
352 |
Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning |
| Teymoori, Peyman |
FIT - TS1.3 |
725 |
Transport Layer Efficiency and Security in IoT: RINA's Approach |
| Thakur, Aditya |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
| Theil, Markus |
DS2.2 |
675 |
Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations |
| Tollet, Jerome |
SP2.1 |
514 |
Multi-Cloud Chaining with Segment Routing |
| Tomaszewski, Artur |
TS1-A.1 |
1 |
Packet delay minimization in multi-hop wireless sensor networks with periodic traffic |
| Tomaszewski, Lechosław |
Slicing - TS1.2 |
767 |
Integration of U-space and 5GS for UAV services |
| Torres, Rob |
FIT - TS3.3 |
755 |
Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link |
| Tredan, Gilles |
TS4-B.2 |
316 |
Implications of Routing Coherence and Consistency on Network Optimization |
| Tundis, Andrea |
SP4.2 |
564 |
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone |
| Turkovic, Belma |
TS6-A.2 |
422 |
Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware |
| Tüxen, Michael |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
| U A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Uzair, Muhammad |
SP4.2 |
564 |
Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone |
| V A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Vartiainen, Johanna |
SP5.2 |
589 |
MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks |
| Vass, Balázs |
TS7.2 |
476 |
Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility |
| Velasquez, Karima |
TS1-C.2 |
64 |
A Rank-based Mechanism for Service Placement in the Fog |
| Viegas, Eduardo |
ITS2.1 |
695 |
A Lightweight Network-based Android Malware Detection System |
| Völker, Timo |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
| Volodina, Ekaterina |
FIT - TS2.2 |
737 |
A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue |
| W A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Wagner, Eric |
TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
| Wählisch, Matthias |
TS1-A.3 |
19 |
IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison |
| Walrand, Jean |
TS3-B.2 |
235 |
RTCP - Reduce Delay Variability with an End-to-end Approach |
| Wan, Ying |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Wang, Bin |
ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
| Wang, Jia |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
| Wang, Lei |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
| Wang, Ning |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
| Wang, Shiqiang |
TS2-C.3 |
172 |
Joint Coreset Construction and Quantization for Distributed Machine Learning |
| Wang, Wei |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
| Wang, Yi |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Wehrle, Klaus |
TS4-A.3 |
298 |
How to Securely Prune Bitcoin's Blockchain |
| TS5-B.1 |
386 |
QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation |
| Wei, XinPeng |
SP1.4 |
509 |
Securing Route Leaks using a Decentralized Approach |
| Wendland, Philip |
SP3.4 |
549 |
Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X |
| Westerbaan, Abraham |
SP1.1 |
494 |
Polymorphic Encryption and Pseudonymisation of IP Network Flows |
| Willis, Peter |
DS3.3 |
681 |
Optimum Rooted Trees for Failover in Switched Networks |
| Wolhuter, Riaan |
SP6.3 |
614 |
Practical evaluation of carrier sensing for a LoRa wildlife monitoring network |
| Wu, Chase |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
| Wu, Jianping |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
| Wu, Kesheng |
TS3-C.1 |
253 |
A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers |
| X A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Xie, Gaogang |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
| TS7.3 |
485 |
Baking the ruleset: A heat propagation relaxation to packet classification |
| Xie, Jinsen |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
| Xinneng, XU |
TS2-A.1 |
82 |
Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing |
| Xu, Chuan |
SP4.4 |
574 |
Dynamic Backup Workers for Parallel Machine Learning |
| Xu, Jinchun |
TS1-B.1 |
28 |
Revealing QoE of Web Users from Encrypted Network Traffic |
| Xu, Lu |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
| Xu, Mingwei |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
| SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |
| Xu, Wenquan |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Xu, Xing |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
| Xu, Yang |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
| Xu, Yuedong |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
| Y A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Yang, Jian |
SP4.1 |
559 |
Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine |
| Yang, Kun |
SP1.2 |
499 |
Encrypted Application Classification with Convolutional Neural Network |
| Yu, Delei |
TS2-B.3 |
136 |
On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences |
| Yu, Minlan |
TS3-B.3 |
244 |
Enabling Premium Service for Streaming Video in Cellular Networks |
| Yu, Minlan |
TS6-B.2 |
449 |
Routing Oblivious Measurement Analytics |
| Yue, Jiarui |
SP1.3 |
504 |
Securing Route Origin Authorization with Blockchain for Inter-Domain Routing |
| Yun, Daqing |
TS2-C.4 |
181 |
Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning |
| Z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z |
| Zhang, Beichuan |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Zhang, Cheng |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
| Zhang, Chuwen |
TS6-B.1 |
440 |
PBC: Effective Prefix Caching for Fast Name Lookups |
| Zhang, Guangxing |
TS2-C.1 |
154 |
Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler |
| Zhang, Jun |
DS1.2 |
669 |
Securing messages in C-ITS: a proof of concept |
| Zhang, Molly |
TS3-C.2 |
262 |
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning |
| Zhang, Weifeng |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
| Zhang, Xinyi |
TS7.3 |
485 |
Baking the ruleset: A heat propagation relaxation to packet classification |
| Zhang, Yuan |
TS1-B.3 |
46 |
How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network? |
| Zhang, Yuanrong |
TS2-A.4 |
109 |
Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks |
| Zhang, Zhi-Li |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
| Zhao, Jin |
TS2-C.2 |
163 |
Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach |
| ITS2.2 |
704 |
Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications |
| Zheng, Peng |
TS2-A.2 |
91 |
NFV Performance Profiling on Multi-core Servers |
| Zhou, Xiaobo |
SP2.3 |
524 |
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing |
| Zhou, Yu |
TS1-C.3 |
73 |
FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime |
| Zhu, KeKe |
SP5.4 |
599 |
Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter |