Program at a Glance
Technical Session 1-A: IoT Networking
Technical Session 1-B: User Behavior Modeling
Technical Session 1-C: Service Function Chaining
Technical Session 2-A: DC Networking
- Anytime Backtrack Unimodal Bandits and Applications to Cloud Computing
-
pp. 82-90
- NFV Performance Profiling on Multi-core Servers
-
pp. 91-99
- On Max-Min Fairness of Completion Times for Multi-Task Job Scheduling
-
pp. 100-108
- Achieving Optimal Edge-based Congestion-aware Load Balancing in Data Center Networks
-
pp. 109-117
Technical Session 2-B: Streaming Services
- Measuring Decentralized Video Streaming: A Case Study of DTube
-
pp. 118-126
- EnDASH - A Mobility Adapted Energy Efficient ABR Video Streaming for Cellular Networks
-
pp. 127-135
- On the Internet-scale Streaming of Holographic-type Content with Assured User Quality of Experiences
-
pp. 136-144
- Optimized Dynamic Cache Instantiation
-
pp. 145-153
Technical Session 2-C: AI for Networks
- Precise and Adaptable: Leveraging Deep Reinforcement Learning for GAP-based Multipath Scheduler
-
pp. 154-162
- Online Fault-tolerant VNF Chain Placement: A Deep Reinforcement Learning Approach
-
pp. 163-171
- Joint Coreset Construction and Quantization for Distributed Machine Learning
-
pp. 172-180
- Performance Prediction of Big Data Transfer Through Experimental Analysis and Machine Learning
-
pp. 181-189
Technical Session 3-A: Network Security
Technical Session 3-B: Streaming Services
Technical Session 3-C: AI for Networks
- A Deep Deterministic Policy Gradient Based Network Scheduler For Deadline-Driven Data Transfers
-
pp. 253-261
- Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
-
pp. 262-270
- Fast Reinforcement Learning Algorithms for Resource Allocation in Data Centers
-
pp. 271-279
Technical Session 4-A: Blockchain Networking
Technical Session 4-B: Network Modeling
Technical Session 4-C: Network Security
- Quantifying the Influence of Regulatory Instructions over the Detection of Network Neutrality Violations
-
pp. 334-342
- Evaluation of Centralised vs Distributed Collaborative Intrusion Detection Systems in Multi-Access Edge Computing
-
pp. 343-351
- Line-Speed and Scalable Intrusion Detection at the Network Edge via Federated Learning
-
pp. 352-360
Technical Session 5-A: Traffic Monitoring and Analysis
Technical Session 5-B: Industrial and Vehicular networking
- QWIN: Facilitating QoS in Wireless Industrial Networks Through Cooperation
-
pp. 386-394
- MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
-
pp. 395-403
- CSBR: A Cosine Similarity Based Selective Broadcast Routing Protocol for Vehicular Ad-Hoc Networks
-
pp. 404-412
Technical Session 6-A: Programmable Control and Data Planes
Technical Session 6-B: Advanced Forwarding and Routing Schemes
Technical Session 7: Programmable Control and Data Planes
Short Papers 1: Network Security
- Polymorphic Encryption and Pseudonymisation of IP Network Flows
-
pp. 494-498
- Encrypted Application Classification with Convolutional Neural Network
-
pp. 499-503
- Securing Route Origin Authorization with Blockchain for Inter-Domain Routing
-
pp. 504-508
- Securing Route Leaks using a Decentralized Approach
-
pp. 509-513
Short Papers 2: SFC and Cloud Networking
- Multi-Cloud Chaining with Segment Routing
-
pp. 514-518
- Amalgam: Distributed Network Control With Scalabale Service Chaining
-
pp. 519-523
- Optimizing Social Welfare for Task Offloading in Mobile Edge Computing
-
pp. 524-528
- Toward an Efficient Real-Time Anomaly Detection System for Cloud Datacenters
-
pp. 529-533
Short Papers 3: Network Modeling
- A Delicate Union of Batching and Parallelization Models in Distributed Computing and Communication
-
pp. 534-538
- Modelling Edge Computing in Urban Mobility Simulation Scenarios
-
pp. 539-543
- A Social Spider Optimisation Algorithm for 3D Unmanned Aerial Base Stations Placement
-
pp. 544-548
- Feedback-Based Hidden-Terminal Mitigation for Distributed Scheduling in Cellular V2X
-
pp. 549-553
- Virtual Cross-Flow Detouring in the Deterministic Network Calculus Analysis
-
pp. 554-558
Short Papers 4: AI for Networks
- Zero-Day Traffic Identification Using One-Dimension Convolutional Neural Networks And Auto Encoder Machine
-
pp. 559-563
- Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone
-
pp. 564-568
- Optimizing Spectrum Use in Wireless Networks by Learning Agents
-
pp. 569-573
- Dynamic Backup Workers for Parallel Machine Learning
-
pp. 574-578
- Deep Neural Networks approach for Power Head-Room Predictions in 5G Networks and Beyond
-
pp. 579-583
Short Papers 5: 5G Networking, Credential Management and AI for Networks
- Multi-User collaborative scheduling in 5G massive MIMO heterogeneous networks
-
pp. 584-588
- MHM: A Novel Collaborative Spectrum Sensing Method based on Markov-chains and Harmonic Mean for 5G Networks
-
pp. 589-593
- Voting Credential Management System for Electronic Voting Privacy
-
pp. 594-598
- Differentiated Transmission based on Traffic Classification with Deep Learning in DataCenter
-
pp. 599-603
Short Papers 6: IoT Networking
Poster Session 1: NFV/SDN/5G
- CO2: Collaborative Packet Classification for Network Functions with Overselection
-
pp. 619-621
- Priority-Aware Per-flow Measurement using Cuckoo Sketch
-
pp. 622-624
- Word embedding for deployment descriptors in NFV
-
pp. 625-627
- Im-OFDP: An Improved OpenFlow-based Topology Discovery Protocol for Software Defined Network
-
pp. 628-630
- SmartSharing: A CDN with Smart Contract-based Local OTT Sharing
-
pp. 631-633
- IsoRAN: Isolation and Scaling for 5G RAN via User-Level Data Plane Virtualization
-
pp. 634-636
Poster Session 2: VANETs/WMNs
- Poster: Seamless Client Integration for Fast Roaming in Wireless Mesh Networks
-
pp. 637-639
- Poster: Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion
-
pp. 640-642
- SafeSmart: A VANET system for efficient communication for emergency vehicles
-
pp. 643-645
- TrueNets: a Topology Generator for Realistic Network Analysis
-
pp. 646-648
Poster Session 3: ML/Privacy
- Poster: A Semi-Supervised Framework to Detect Botnets in IoT Devices
-
pp. 649-651
- Evolution of Ethereum: A Temporal Graph Perspective
-
pp. 652-654
- OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement Learning
-
pp. 655-657
- Auditable secure network overlays for multi-domain distributed applications
-
pp. 658-660
- CONtrol: Controlling Quality of Service of Container Networks in a Hyperconverged Platform
-
pp. 661-663
- Per-Hop Bridge-Local Latency Bounds with Strict Priority Transmission Selection
-
pp. 664-666