Program at a Glance
Technical Session 1-A: IoT Networking
Technical Session 1-B: User Behavior Modeling
Technical Session 1-C: Service Function Chaining
Technical Session 2-A: DC Networking
- Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
- pp. 82-90
- NFV Performance Profiling on Multi-core Servers
- pp. 91-99
- On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling
- pp. 100-108
- Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
- pp. 109-117
Technical Session 2-B: Streaming Services
- Measuring Decentralized Video Streaming: A Case Study of DTube
- pp. 118-126
- EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
- pp. 127-135
- On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
- pp. 136-144
- Optimized Dynamic Cache Instantiation
- pp. 145-153
Technical Session 2-C: AI for Networks
- Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
- pp. 154-162
- Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
- pp. 163-171
- Joint Coreset Construction and Quantization for Distributed Machine Learning
- pp. 172-180
- Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
- pp. 181-189
Technical Session 3-A: Network Security
Technical Session 3-B: Streaming Services
Technical Session 3-C: AI for Networks
- A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
- pp. 253-261
- Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
- pp. 262-270
- Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
- pp. 271-279
Technical Session 4-A: Blockchain Networking
Technical Session 4-B: Network Modeling
Technical Session 4-C: Network Security
- Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
- pp. 334-342
- Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing
- pp. 343-351
- Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
- pp. 352-360
Technical Session 5-A: Traffic Monitoring and Analysis
Technical Session 5-B: Industrial and Vehicular networking
- QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
- pp. 386-394
- MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
- pp. 395-403
- CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks
- pp. 404-412
Technical Session 6-A: Programmable Control and Data Planes
Technical Session 6-B: Advanced Forwarding and Routing Schemes
Technical Session 7: Programmable Control and Data Planes
Short Papers 1: Network Security
- Polymorphic Encryption and Pseudonymisation of IP Network Flows
- pp. 494-498
- Encrypted Application Classification with Convolutional Neural Network
- pp. 499-503
- Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
- pp. 504-508
- Securing Route Leaks using a Decentralized Approach
- pp. 509-513
Short Papers 2: SFC and Cloud Networking
- Multi-Cloud Chaining with Segment Routing
- pp. 514-518
- Amalgam: Distributed Network Control With Scalabale Service Chaining
- pp. 519-523
- Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
- pp. 524-528
- Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters
- pp. 529-533
Short Papers 3: Network Modeling
- A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication
- pp. 534-538
- Modelling Edge Computing in Urban Mobility Simulation Scenarios
- pp. 539-543
- A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement
- pp. 544-548
- Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X
- pp. 549-553
- Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis
- pp. 554-558
Short Papers 4: AI for Networks
- Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
- pp. 559-563
- Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone
- pp. 564-568
- Optimizing Spectrum Use in Wireless Networks by Learning Agents
- pp. 569-573
- Dynamic Backup Workers for Parallel Machine Learning
- pp. 574-578
- Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
- pp. 579-583
Short Papers 5: 5G Networking, Credential Management and AI for Networks
- Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks
- pp. 584-588
- MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
- pp. 589-593
- Voting Credential Management System for Electronic Voting Privacy
- pp. 594-598
- Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
- pp. 599-603
Short Papers 6: IoT Networking
Poster Session 1: NFV/SDN/5G
- CO2: Collaborative Packet Classification for Network Functions with Overselection
- pp. 619-621
- Priority-Aware Per-flow Measurement using Cuckoo Sketch
- pp. 622-624
- Word embedding for deployment descriptors in NFV
- pp. 625-627
- Im-OFDP: An Improved OpenFlow-based Topology Discovery Protocol for Software Defined Network
- pp. 628-630
- SmartSharing: A CDN with Smart Contract-based Local OTT Sharing
- pp. 631-633
- IsoRAN: Isolation and Scaling for 5G RAN via User-Level Data Plane Virtualization
- pp. 634-636
Poster Session 2: VANETs/WMNs
- Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks
- pp. 637-639
- Poster: Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion
- pp. 640-642
- SafeSmart: A VANET system for efficient communication for emergency vehicles
- pp. 643-645
- TrueNets: a Topology Generator for Realistic Network Analysis
- pp. 646-648
Poster Session 3: ML/Privacy
- Poster: A Semi-Supervised Framework to Detect Botnets in IoT Devices
- pp. 649-651
- Evolution of Ethereum: A Temporal Graph Perspective
- pp. 652-654
- OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement Learning
- pp. 655-657
- Auditable secure network overlays for multi-domain distributed applications
- pp. 658-660
- CONtrol: Controlling Quality of Service of Container Networks in a Hyperconverged Platform
- pp. 661-663
- Per-Hop Bridge-Local Latency Bounds with Strict Priority Transmission Selection
- pp. 664-666