Papers by Title

A B C D E F H I J L M N O P Q R S T U V W Z
Atop A B C D E F H I J L M N O P Q R S T U V W Z

A data centric computational model of IPv6 adoption

A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers

A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication

A DRAM-friendly priority queue Internet packet scheduler implementation and its effects on TCP

A Lightweight Network-based Android Malware Detection System

A Nation-Wide Wi-Fi RSSI Dataset: Statistical Analysis and Resulting Insights

A Practical Analysis on Mirai Botnet Traffic

A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue

A Rank-based Mechanism for Service Placement in the Fog

A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement

Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks

Amalgam: Distributed Network Control With Scalabale Service Chaining

An Analytical Model for Assessing the Performance of IEEE 802.11ad Beamforming Training

An Energy-Aware SDN/NFV Architecture for the Internet of Things

Analyzing and Detecting of Ransom Denial of Service (RDoS) attacks on CoAP Messaging Protocol for Industrial IoT

Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing

Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning

Auditable secure network overlays for multi-domain distributed applications

Autonomous Anomaly Detector for Cloud-Radio Access Network Key Performance Indicators

Btop A B C D E F H I J L M N O P Q R S T U V W Z

Baking the ruleset: A heat propagation relaxation to packet classification

Ctop A B C D E F H I J L M N O P Q R S T U V W Z

Capacity of a LoRaWAN Cell

Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications

Characterizing the Root Landscape of Certificate Transparency Logs

CO2: Collaborative Packet Classification for Network Functions with Overselection

CONtrol: Controlling Quality of Service of Container Networks in a Hyperconverged Platform

Cost effective troubleshooting of NFV infrastructure

Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility

Coupling Source Routing with Time-Sensitive Networking

CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks

Dtop A B C D E F H I J L M N O P Q R S T U V W Z

Decant: Feedback-Free Real-Time Media Rate Controller for Wireless Access Networks

Decoupling of Distributed Consensus, Failure Detection and Agreement in SDN Control Plane

Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond

Defeating Protocol Abuse with P4: an Application to Explicit Congestion Notification

Demo: Crawling the IPFS Network

Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter

Dynamic Backup Workers for Parallel Machine Learning

Etop A B C D E F H I J L M N O P Q R S T U V W Z

EdgeKVS: Edge-Optimized Key-Value Storage

Efficient User-Cell Association for 360 Video Streaming over Wireless Networks

Enabling Premium Service for Streaming Video in Cellular Networks

Encrypted Application Classification with Convolutional Neural Network

EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks

Estimating Server Load Based on its Correlation with TCP SYN Response Time

Evaluating QUIC's Performance Against Performance Enhancing Proxy over Satellite Link

Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing

Evaluation of Multi-operator dynamic 5G Network Slicing for Vehicular Emergency Scenarios

Evaluation of Path States of Large IoT Networks Using Locally and Remotely Controlled Measurements

Evolution of Ethereum: A Temporal Graph Perspective

Evolution Toward the Next Generation Radio Access Network

Ftop A B C D E F H I J L M N O P Q R S T U V W Z

Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers

Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X

FlexMesh: Flexibly Chaining Network Functions on Programmable Data Planes at Runtime

FORCH: An Orchestrator for Fog Computing service deployment

Htop A B C D E F H I J L M N O P Q R S T U V W Z

How Online Social Ties Influence the Epidemic Spreading of a Multiplex Network?

How to Securely Prune Bitcoin's Blockchain

Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone

Itop A B C D E F H I J L M N O P Q R S T U V W Z

Im-OFDP: An Improved OpenFlow-based Topology Discovery Protocol for Software Defined Network

Implications of Routing Coherence and Consistency on Network Optimization

Information Exchange to Support Multi-Domain Slice Service Provision for 5G/NFV

Integrated Industrial Ethernet Networks: Time-sensitive Networking over SDN Infrastructure for mixed Applications

Integration of U-space and 5GS for UAV services

IoT Content Object Security with OSCoRE and NDN: A First Experimental Comparison

IsoRAN: Isolation and Scaling for 5G RAN via User-Level Data Plane Virtualization

Jtop A B C D E F H I J L M N O P Q R S T U V W Z

Joint Coreset Construction and Quantization for Distributed Machine Learning

Ltop A B C D E F H I J L M N O P Q R S T U V W Z

Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning

Load Balancing for Deterministic Networks

LoRaWAN Class B Multicast Scalability

Mtop A B C D E F H I J L M N O P Q R S T U V W Z

Mapping the Interplanetary Filesystem

Measuring Decentralized Video Streaming: A Case Study of DTube

MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks

MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks

Modelling Edge Computing in Urban Mobility Simulation Scenarios

Moving a step forward in the quest for Deterministic Networks (DetNet)

Multi-Cloud Chaining with Segment Routing

Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks

Ntop A B C D E F H I J L M N O P Q R S T U V W Z

NFV Performance Profiling on Multi-core Servers

Otop A B C D E F H I J L M N O P Q R S T U V W Z

OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement Learning

On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling

On the Incompatibility of Scalable Congestion Controls over the Internet

On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences

On the Practical Detection of Hierarchical Heavy Hitters

Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach

Optimized Dynamic Cache Instantiation

Optimizing Social Welfare for Task Offloading in Mobile Edge Computing

Optimizing Spectrum Use in Wireless Networks by Learning Agents

Optimum Rooted Trees for Failover in Switched Networks

Ptop A B C D E F H I J L M N O P Q R S T U V W Z

P4 In-Network Source Protection for Sensor Fail-Over

P4rt-OVS: Programming Protocol-Independent, Runtime Extensions for Open vSwitch with P4

Packet delay minimization in multi-hop wireless sensor networks with periodic traffic

PBC: Effective Prefix Caching for Fast Name Lookups

Per-Hop Bridge-Local Latency Bounds with Strict Priority Transmission Selection

Performance Analysis of VPN Gateways

Performance Comparison of Messaging Protocols and Serialization Formats

Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning

Polymorphic Encryption and Pseudonymisation of IP Network Flows

Poster: A Semi-Supervised Framework to Detect Botnets in IoT Devices

Poster: Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion

Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks

Practical evaluation of carrier sensing for a LoRa wildlife monitoring network

Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler

Priority-Aware Per-flow Measurement using Cuckoo Sketch

Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems

Probing Strategies for Efficient Remapping of Internet Routing Events

Qtop A B C D E F H I J L M N O P Q R S T U V W Z

Quantifying TCP SYN DDoS Resilience: A Longitudinal Study of Internet Services

Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations

QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation

Rtop A B C D E F H I J L M N O P Q R S T U V W Z

Resilient Networks with a Chance of Rain

Rethinking ACKs at the Transport Layer

Revealing QoE of Web Users from Encrypted Network Traffic

Routing Oblivious Measurement Analytics

RTCP - Reduce Delay Variability with an End-to-end Approach

Stop A B C D E F H I J L M N O P Q R S T U V W Z

SABES: A Statistical approach to Available Bandwidth EStimation from passive TCP measurements

SABES: Statistical Available Bandwidth EStimation from passive TCP measurements

SafeSmart: A VANET system for efficient communication for emergency vehicles

Scaling website fingerprinting

Seamless Multimedia Streaming in Controller-Less Wireless Mesh Networks With Mobile Stations

Secure-vhost: Integrating Vhost into Hypervisor for Isolation Guarantee in Virtualized Network I/O

Securing messages in C-ITS: a proof of concept

Securing Route Leaks using a Decentralized Approach

Securing Route Origin Authorization with Blockchain for Inter-Domain Routing

Sequential Zeroing: Online Heavy-Hitter Detection on Programmable Hardware

Service Function Chaining Based on Segment Routing Using P4 and SR-IOV (P4-SFC)

SmartSharing: A CDN with Smart Contract-based Local OTT Sharing

SRPT-ECF: challenging Round-Robin for stream-aware multipath scheduling

Ttop A B C D E F H I J L M N O P Q R S T U V W Z

The case for serverless mobile networking

Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters

Tracking Down Sources of Spoofed IP Packets

Transport Layer Efficiency and Security in IoT: RINA's Approach

Transport Path Explorer (TransPlorer) for Mobile Networks

TrueNets: a Topology Generator for Realistic Network Analysis

Utop A B C D E F H I J L M N O P Q R S T U V W Z

User identification by matching radio ``vision'' and computer vision through means of machine learning

Vtop A B C D E F H I J L M N O P Q R S T U V W Z

Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis

Virtual Network Functions Placement and Routing Problem: Path formulation

vMI: Software Architecture for Transparent High-Performance Media Transport

Voting Credential Management System for Electronic Voting Privacy

Wtop A B C D E F H I J L M N O P Q R S T U V W Z

Word embedding for deployment descriptors in NFV

Ztop A B C D E F H I J L M N O P Q R S T U V W Z

Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine