


default search action
ICNC 2020: Big Island, HI, USA
- International Conference on Computing, Networking and Communications, ICNC 2020, Big Island, HI, USA, February 17-20, 2020. IEEE 2020, ISBN 978-1-7281-4905-9
- Jin Dai, Tianyu Wang, Shaowei Wang:
A Deep Forest Method for Classifying E-Commerce Products by Using Title Information. 1-5 - Geon-Woong Jung, Hyoung-Keon Kim, Yong-Hwan Lee:
Zero-Forcing Beamforming with User Grouping in Spatially Correlated Channel Environments. 1-5 - Shengyang He, Guanghui Ren, Longwen Wu, Zhe Sun, Yaqin Zhao:
Flicker Mitigation and Dimming Control Analyze of Duty Cycle Fixed-MVPM for Indoor VLC System. 6-9 - Runa Barik, Michael Welzl
, Peyman Teymoori, Safiqul Islam
, Stein Gjessing:
Performance Evaluation of In-network Packet Retransmissions using Markov Chains. 10-16 - Torrey J. Wagner, Thomas C. Ford:
Metrics to Meet Security & Privacy Requirements with Agile Software Development Methods in a Regulated Environment. 17-23 - Hao Wu, Min Chen:
Chinese Landmark Recognition. 24-28 - Xiao Su
, Zhenzhen Ye, Lingshuang Wu, Yi Shang:
Optimal Stochastic Media Storage in Federated Cloud Environments. 29-34 - Nader Beigiparast, Ender Ayanoglu:
Precoders and Equalizers for Spatially Correlated Antennas in Single-Carrier Massive MIMO Transmission. 35-40 - Zipei Li, Qianqian Huang, Chengqi Yi, Huiying Li, Mingjun Guo, Jiandong Wang:
Blackmailer or Consumer? A Character-level CNN Approach for Identifying Malicious Complaint Behaviors. 41-45 - Min-Jen Tsai, Chin-Yu Hsieh:
The Human Visual System Based Color QR Codes. 46-50 - Himanshu Ajmera
, Bilal Gonen
:
Virtual Reality in Health Care. 51-55 - Thuan Nguyen, Yu-Jung Chu, Thinh Nguyen:
A New Fast Algorithm for Finding Capacity of Discrete Memoryless Thresholding Channels. 56-60 - Lijun Dong, Richard Li
:
A Survey on IETF Standardization for Connecting and Integrating the Low-Power and Constrained IoT Devices. 61-67 - Lijun Dong:
Queuing Analysis for Content Placement and Request Scheduling in Data Center. 68-73 - Liudong Zuo
, Michelle M. Zhu:
Minimize Cost of Data Transfers Using Bandwidth Reservation on FPVB Paths of Dynamic HPNs. 74-78 - Xiaofeng Wang, Qian Zhang, Chuntao Jiang, Ying Zhang:
Coarse-to-fine Grained Image Splicing Localization Method Based on Noise Level Inconsistency. 79-83 - Summera Nosheen
, Jamil Y. Khan:
High Throughput and QoE Fairness Algorithms for HD Video Transmission over IEEE802.11ac Networks. 84-89 - Shigeo Shioda
, Yuto Ohashi:
Environment Sensing Based on Non-Geotagged Sensor Data. 90-95 - Arman Farhang
, Amir Aminjavaheri, Behrouz Farhang-Boroujeny
:
Single Carrier Transmission in Massive MIMO Revisited. 96-101 - Matthew H. Johnson, Willie K. Harrison:
Comparison of Latency with Selective Repeat and Rateless Coding in Delayed Feedback Systems. 102-106 - Yiyun Zhou, Meng Han, Jing Selena He, Liyuan Liu, Xiaohua Xu, Xi Gao:
Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach. 107-111 - Katherine Russell, Robert Simon:
Efficient Data Advertisement in Information Centric Disruption Tolerant Networks. 112-117 - Qiwei Wang, Thinh Nguyen, Bella Bose:
Towards Adaptive Packet Scheduler with Deep-Q Reinforcement Learning. 118-123 - Jiaqi Zhao, Rui Jiang, Youyun Xu:
Low Complexity Beam Selection Scheme for High Speed Railway Communications. 124-128 - Ye Wang, Xinyu Gu, Hao Wang, Zeyang Zhang, Yi Gong, Lin Zhang:
Resource Allocation Mechanism with the Base Station Assistance in New Radio-Vehicle. 129-133 - Mohammed S. Aloqlah:
Towards Derivation of Exact Closed-Form Expressions for the Distribution and Bit Error Probability of Binary Modulation over Composite Shadowed Fading Channels. 134-138 - Joshua Comden, Jessica Maghakian, Zhenhua Liu:
Online Economic Dispatch with Volatile Renewable Generation and Ramping Costs. 139-144 - Danai Chasaki, Christopher Mansour:
Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning. 145-151 - Hosam Alamleh
, Ali Abdullah S. AlQahtani
, Jean Gourd, Hatwib Mugasa:
A weighting system for building RSS maps by crowdsourcing data from smartphones. 152-156 - Aizaz U. Chaudhry
, Roshdy H. M. Hafez:
On Finding Hidden Relationship among Variables in WiFi using Machine Learning. 157-161 - Yuyu Lai, Ryan Norfield, Alexander Micsoniu, Raziq Khan, Michal Aibin
:
Overlapping Histograms for 3D Data Classification. 162-165 - Edyta Biernacka
, Michal Aibin
:
On advantages of data driven traffic classification for dynamic routing in optical networks. 166-170 - Olusola Tolulope Odeyomi, Hyuck M. Kwon, David A. Murrell:
Time-Varying Truth Prediction in Social Networks Using Online Learning. 171-175 - Bhagya Nathali Silva
, Murad Khan, Kyuchang Lee, Yongtak Yoon, Muhammad Diyan, Jihun Han, Kijun Han:
RESTful Web of Things for Ubiquitous Smart Home Energy Management. 176-180 - Jared Lee Lewis, Geanina F. Tambaliuc, Husnu S. Narman
, Wook-Sung Yoo:
IP Reputation Analysis of Public Databases and Machine Learning Techniques. 181-186 - Husnu S. Narman
, Alymbek Damir Uulu:
Impacts of Positive and Negative Comments of Social Media Users to Cryptocurrency. 187-192 - Weixia Zou, Tengfei Cheng, Song Lan:
An Improved Real-time Video Stream Differentiated Transmission Algorithm Based on IDNC. 193-197 - Meihua Liu, Rui Jiang, Youyun Xu:
Dual-Hop Wireless Powered Communication Networks Assisted by Backscatter. 198-203 - Zipiao Zhao, Yongli Zhao, Yajie Li, Ying Wang, Sabidur Rahman, Dongmei Liu, Jie Zhang:
Service Restoration in Multi-Modal Optical Transport Networks with Reinforcement Learning. 204-208 - Abhishek Dwaraki, Shachi Kumary, Tilman Wolf:
Automated Event Identification from System Logs Using Natural Language Processing. 209-215 - Haseen Rahman, Ankith Vinayachandran
, Sibi Raj B. Pillai, Kumar Appaiah
, Rahul Vaze:
A Game Theoretic Model for Deadline Constrained Packet Scheduling with an Energy Harvesting Jammer. 216-221 - Sidney Golstein, Trung-Hien Nguyen, François Horlin, Philippe De Doncker, Julien Sarrazin
:
Physical Layer Security in Frequency-Domain Time-Reversal SISO OFDM Communication. 222-227 - Aaron Faulkenberry, Utku Demir, Cristiano Tapparello
, Wendi B. Heinzelman:
Evaluating Methods for Enabling Continuous Operation in Dynamic WiFi Direct Networks. 228-234 - Yulan Yuan, Konglin Zhu, Lin Zhang, Yuming Ge:
An EV Charging Station Placement for Ride-hailing Service: from Big Data Networking Perspective. 235-239 - Wentao Chen, Konglin Zhu, Lin Zhang, Yuming Ge:
SmartNavi: A Smart Navigation Application with Main and Auxiliary Distinguishing Using Deep Learning Approach. 240-244 - Qingyong Su, Bin Li, Chaowei Wang, Cai Qin, Weidong Wang:
A Power Allocation Scheme Based on Deep Reinforcement Learning in HetNets. 245-250 - Greg Yera, Xingya Liu:
An Anti-sniffing Protocol for Location-based Services in Wireless Networks. 251-255 - Bruce Hartpence, Andres Kwasinski:
Combating TCP Port Scan Attacks Using Sequential Neural Networks. 256-260 - Stratos Dimopoulos, Chandra Krintz, Rich Wolski:
Fair Scheduling for Deadline-Driven, Resource-Constrained, Multi-Analytics Workloads. 261-267 - Shufeng Li, Xiaosong Yu, Yongli Zhao, Hua Wang, Xiaotian Zhou, Jie Zhang:
Routing and Wavelength Allocation in Spatial Division Multiplexing Based Quantum Key Distribution Optical Networks. 268-272 - Douglas Paulo de Mattos, Débora C. Muchaluat-Saade, Gheorghita Ghinea
:
An Approach for Authoring Mulsemedia Documents Based on Events. 273-277 - Lauren M. Huie, Mark L. Fowler:
Biased Estimation for Source Localization in Fault Tolerant Networks. 278-281 - Vidhi Rana, Hyuck M. Kwon, David A. Murrell:
Time-Varying Diffusion Social Learning. 282-286 - Alex Berian, Irmak Aykin, Marwan Krunz, Tamal Bose:
Deep Learning Based Identification of Wireless Protocols in the PHY layer. 287-293 - Haotao Zhuang, Yongli Zhao, Xiaosong Yu, Yajie Li, Ying Wang, Jie Zhang:
Machine-Learning-based Alarm Prediction with GANs-based Self-Optimizing Data Augmentation in Large-Scale Optical Transport Networks. 294-298 - Maxime Labonne, Alexis Olivereau, Baptiste Polvé, Djamal Zeghlache
:
Unsupervised Protocol-based Intrusion Detection for Real-world Networks. 299-303 - Yibing Li, Sitong Zhang
, Jie Chen, Tao Jiang, Fang Ye:
Multi-UAV Cooperative Mission Assignment Algorithm Based on ACO method. 304-308 - Jun Wang, Xing Liu, Ali M. S. Alfosool, Junjie Su, Xirui Fu, Jinghua Tan:
An Intelligent System for Rumor Recognition and Rumor Sentiment Judgment. 309-313 - Tong-Xing Zheng, Hao-Wen Liu, Zhaowei Wang, Qian Yang, Hui-Ming Wang:
Physical-Layer Security with Finite Blocklength over Slow Fading Channels. 314-319 - Thaina Saraiva, David Duarte, Iola Pinto
, Pedro Vieira
:
An Improved BBU/RRU Energy Consumption Predictor for 4G and Legacy Mobile Networks using Mixed Statistical Models. 320-325 - Austin Stevens, Taylor Sibbett, Jonathan Driggs, Hussein Moradi, Behrouz Farhang-Boroujeny
:
Spread Spectrum Technique Using Staggered Multi-tone. 326-331 - Btissam El Khamlichi, Jamal El Abbadi, Nathaniel W. Rowe, Sunil Kumar:
Adaptive Directional Neighbor Discovery Schemes in Wireless Networks. 332-337 - Mehrtash Mehrabi, Mostafa Mohammadkarimi, Masoud Ardakani, Yindi Jing:
A Deep Learning Based Channel Estimation for High Mobility Vehicular Communications. 338-342 - Fang Ye, Zitao Zhou
, Ping Bai, Yansong Wang, Tao Jiang:
A SNR-based PSO Cooperative Spectrum Sensing Algorithm against Malicious Nodes. 343-346 - HyukJoon Kwon, Kee-Bong Song:
MIMO-OFDM Detector Selection using Reinforcement Learning. 347-352 - Hasan Burhan Beytur, Sajjad Baghaee
, Elif Uysal
:
Towards AoI-aware Smart IoT Systems. 353-357 - Sixia Chen, Chadi Kari, Matthew Coolbeth:
Data Migration in Large Scale Heterogeneous Storage Systems with Space Constraints. 358-362 - Mehrtash Mehrabi, Mostafa Mohammadkarimi, Masoud Ardakani, Yindi Jing:
Deep Adaptive Transmission for Internet of Vehicles (IoV). 363-367 - Matthew Turner, Hana Khamfroush:
Meeting Users' QoS in a Edge-to-Cloud Platform via Optimally Placing Services and Scheduling Tasks. 368-372 - Kai Dinghofer, Frank Hartung:
Analysis of Criteria for the Selection of Machine Learning Frameworks. 373-377 - Yibing Li, Xiaoyu Geng
, Wei Lv, Han Yu, Fang Ye, Tao Jiang:
Interference Resource Allocation Models for Communication Equipment. 378-382 - Marco Giordani, Michele Zorzi:
Satellite Communication at Millimeter Waves: a Key Enabler of the 6G Era. 383-388 - Ehab Zaghloul, Tongtong Li, Jian Ren:
Anonymous and Coercion-Resistant Distributed Electronic Voting. 389-393 - Yuan Liang, Jian Ren, Tongtong Li:
Secure and Efficient OFDM System Design under Disguised Jamming. 394-399 - Charles Aoki Tuttle, Savankumar Patel, Hao Yue:
Malicious Message Detection on Twitter via Dissemination Paths. 400-404 - Nguyen Van Huynh
, Diep N. Nguyen
, Dinh Thai Hoang, Eryk Dutkiewicz
, Markus Mueck, Srikathyayani Srikanteswara:
Defeating Jamming Attacks with Ambient Backscatter Communications. 405-409 - Anish Jindal
, Alberto Schaeffer-Filho, Angelos K. Marnerides
, Paul Smith, Andreas Mauthe
, Lisandro Zambenedetti Granville
:
Tackling Energy Theft in Smart Grids through Data-driven Analysis. 410-414 - Sharif Ullah
, Sachin Shelly, Amin Hassanzadeh, Anup Nayak, Kamrul Hasan:
On the Effectiveness of Intrusion Response Systems against Persistent Threats. 415-421 - Hatem Khedher, Sahar Hoteit
, Patrick Brown, Véronique Vèque, Ruby Krishnaswamy, William Diego
, Makhlouf Hadji:
Real Traffic-Aware Scheduling of Computing Resources in Cloud-RAN. 422-427 - Yuyang Zhang, Ping Dong, Xiaojiang Du, Hongbin Luo, Hongke Zhang, Mohsen Guizani:
Dynamic Time-Threshold Based Receive Buffer for Vehicle-to-Cloud Multipath Transmission. 428-433 - Taejoon Kim, Yu Gu, Jinoh Kim:
QoS-enabled Cache Architecture for a Private Cloud. 434-439 - Joshua Rumbut
, Hua Fang, Honggang Wang, Stephanie Carreiro, David Smelson, Brittany P. Chapman, Edward W. Boyer:
Harmonizing Wearable Biosensor Data Streams to Test Polysubstance Detection. 445-449 - Chen Xu
, Ruipeng Zhang
, Mengjun Xie
, Li Yang:
Network Intrusion Detection System as a Service in OpenStack Cloud. 450-455 - Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu
:
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples. 456-460 - Qian Chen, Xiaolin He, Weixiao Meng:
Air-Ground Cooperative Access Control Algorithm Based on Q-Learning. 461-465 - Weidang Lu, Guangzhe Liu, Peiyuan Si, Guoxing Huang, Bo Li, Yi Gong
:
Joint Subcarrier-Pair and Power Allocation Based on SWIPT in Multi-Relay OFDM System. 466-470 - Jiangbin Lyu, Dan Yu, Liqun Fu:
Achieving Max-Min Throughput in LoRa Networks. 471-476 - Xiao Chen:
Energy Efficient NFV Resource Allocation in Edge Computing Environment. 477-481 - Ying Liu, Kwan-Wu Chin
, Changlin Yang:
Link Scheduling in Wireless Powered Communication Networks. 482-486 - Dania Marabissi, Lorenzo Mucchi, Simone Casini:
Physical-layer security metric for user association in ultra-dense networks. 487-491 - Ross K. Gegan, Christina Mao, Dipak Ghosal
, Matt Bishop, Sean Peisert
:
Anomaly Detection for Science DMZs Using System Performance Data. 492-496 - Zhiqiang Li, Shuai Han, Xiao Wang:
Power Allocation Scheme for Physical-Layer Security of Two-Way Untrusted Relay in SCMA networks. 497-501 - Ahmed H. Anwar
, Charles A. Kamhoua, Nandi Leslie:
Honeypot Allocation over Attack Graphs in Cyber Deception Games. 502-506 - Thanh V. Pham
, Anh T. Pham:
Energy Efficient Artificial Noise-Aided Precoding Design for Visible Light Communication Systems. 507-512 - Hongyue Kang, Bo Liu, Jelena V. Misic, Vojislav B. Misic, Xiaolin Chang:
Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks. 513-517 - Michael Welzl
, Peyman Teymoori, Stein Gjessing, Safiqul Islam:
Follow the Model: How Recursive Networking Can Solve the Internet's Congestion Control Problems. 518-524 - Zhiqiang Xiong, Yu Chen, Qimei Cui, Xiaofeng Tao:
Joint Power Allocation over Two-Hop Wireless Relay Systems Under Target Delay-Outage Constraints. 525-530 - Soudalin Khouangvichit, Nattapong Kitsuwan, Eiji Oki:
Backup Network Design Considering Primary and Backup Routing for Multiple Link Failures under Uncertain Traffic Demands. 531-535 - Livinus Obiora Nweke, Stephen D. Wolthusen:
Resilience Analysis of Software-Defined Networks Using Queueing Networks. 536-542 - Te Chen, Binhong Dong, Yantao Chen, Yang Du, Shaoqian Li:
Multi-Objective Learning for Efficient Content Caching for Mobile Edge Networks. 543-547 - Chen Yang, Radu Stoleru:
CEO: Cost-Aware Energy Efficient Mobile Data Offloading via Opportunistic Communication. 548-554 - Longwen Wu, Yaqin Zhao, Liang He, Shengyang He, Guanghui Ren:
A Time-varying Filtering Algorithm based on Short-time Fractional Fourier Transform. 555-560 - Chengxiao Liu, Wei Feng, Yukui Pei, Jue Wang, Yunfei Chen
, Ning Ge:
Energy Efficiency optimization for UAV Swarm-Enabled Aerial Small Cell Networks. 561-566 - He Jiang
, Lusi Li
, Haibo He, Lingjia Liu:
Evolutionary Search for Energy-Efficient Distributed Cooperative Spectrum Sensing. 567-571 - Qiang Hu, Douglas M. Blough:
On the Feasibility of High Throughput mmWave Backhaul Networks in Urban Areas. 572-578 - Yan Yan, Qiang Hu, Douglas M. Blough:
Optimal Path Construction with Decode and Forward Relays in mmWave Backhaul Networks. 579-585 - Hacène Fouchal
, Alain Ninet:
Partial Signature for Cooperative Intelligent Transport Systems. 586-590 - Sharare Zehtabian, Mina Razghandi, Ladislau Bölöni, Damla Turgut:
Predictive Caching for AR/VR Experiences in a Household Scenario. 591-595 - Vanlin Sathya, Adam Dziedzic, Monisha Ghosh, Sanjay Krishnan:
Machine Learning based detection of multiple Wi-Fi BSSs for LTE-U CSAT. 596-601 - Tommy Azzino, Tanguy Ropitault, Michele Zorzi:
Scheduling the Data Transmission Interval in IEEE 802.11ad: A Reinforcement Learning Approach. 602-607 - Shailesh Chaudhari
, HyukJoon Kwon, Kee-Bong Song:
Reliable and Low-Complexity MIMO Detector Selection using Neural Network. 608-613 - Ahmed Abotabl, Jung Hyun Bae, Kee-Bong Song:
Learning PHY Layer Parameters via SNR-Value Network. 614-619 - Zening Liu, Kunlun Wang, Ming-Tuo Zhou, Ziyu Shao, Yang Yang:
Distributed Task Scheduling in Heterogeneous Fog Networks: A Matching with Externalities Method. 620-625 - Brian Coffen, Patrick Scott, Md Shaad Mahmud:
Real-time Wireless Health Monitoring: An Ultra-low Power Biosensor Ring for Heart Disease Monitoring. 626-630 - Mengxin Yu, Aimin Tang, Xudong Wang, Chong Han:
Joint Scheduling and Power Allocation for 6G Terahertz Mesh Networks. 631-635 - Shiyu Chen, Zhi Chen, Lingxiang Li, Shaoqian Li:
Smart Antenna Allocation for Wireless Surveillance. 636-640 - Jeromy Yu, Aditya Vandanapu, Chengyi Qu
, Songjie Wang, Prasad Calyam:
Energy-aware Dynamic Computation Offloading for Video Analytics in Multi-UAV Systems. 641-647 - Emory Hufbauer, Nathaniel Hudson
, Hana Khamfroush:
A Proximity-Based Generative Model for Online Social Network Topologies. 648-653 - George Klimiashvili, Cristiano Tapparello
, Wendi B. Heinzelman:
LoRa vs. WiFi Ad Hoc: A Performance Analysis and Comparison. 654-660 - Nadir H. Adam
, Cristiano Tapparello
, Wendi B. Heinzelman:
Performance Evaluation of WiFi Direct Multi Hop Ad-Hoc Networks. 661-666 - Md Nashid Anjum, Honggang Wang, Hua Fang:
Coverage Analysis of Random UAV Networks Using Percolation Theory. 667-673 - Eric Elliott, Nicholas Shanklin, Sharare Zehtabian, Qun Zhou
, Damla Turgut:
Peer-to-Peer Energy Trading and Grid Impact Studies in Smart Communities. 674-678