


default search action
42nd IPCCC 2023: Anaheim, CA, USA
- IEEE International Performance, Computing, and Communications Conference, IPCCC 2023, Anaheim, CA, USA, 17-19 November 2023. IEEE 2023, ISBN 979-8-3503-0294-3

- Ahmed M. Salama, Bin Xie, Jayanta K. Debnath, Anup Kumar:

Low-Latency High-Reliability Industrial MAC Protocol for 6G Networks. 1-8 - Mengyu Wang, Shuyong Zhu, Linghao Wang

, Wenxiao Li, Yujun Zhang:
Heuristic Fast Routing in Large-Scale Deterministic Network. 9-17 - Zinuo Yin, Hailong Ma, Tao Hu:

STAD: A Traffic Anomaly Detection Technology Based on Siamese Neural Network. 18-23 - Jun Xu, Dejun Yang:

Optimal Task Offloading for Edge Computing with Stochastic Task Arrivals. 24-31 - Siyuan Li, Hui Wen, Liting Deng, Yu Zhou, Wenyuan Zhang, Zhi Li, Limin Sun:

Denoising Network of Dynamic Features for Enhanced Malware Classification. 32-39 - Yizhou Gong, Wei Zhang, Yunfang Chen, Chao Tu, Wanting Tian, Yunqu Liu:

How to Adapt RDMA Congestion Control Algorithm Based on Local Conditions. 40-45 - Nahid Ebrahimi Majd, Dhatri Sai Kumar Reddy Gudipelly:

IoT Botnet Classification using CNN-based Deep Learning. 46-51 - Jung-Hwan Cha, Shinhyeok Kang, Yewon Kang, Hansaem Seo, Jungeun Lee, Jongsung Kim, Minsung Jang:

CORN: Cloud-optimized RDMA Networking. 52-59 - Ke Zhao, Junfeng Zhao:

Fuzzy Hierarchy Analysis Based Microservice Splitting Result Evaluation. 60-65 - Bo Li, Hanwen Zhang, Chenhao Jiang, Zhongcheng Li, Yi Sun:

Performance Modeling of Blockchains with Fixed Block Intervals. 66-73 - Nathan Huang, Anthony Li, Sophia Zhang, Ziliang Zong:

Reducing Cloud Expenditures and Carbon Emissions via Virtual Machine Migration and Downsizing. 74-81 - Haoyu Bin

, Sen Zhao, Zhi Li, Nan Yu, Rongrong Xi, Hongsong Zhu, Limin Sun:
UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic. 82-90 - Chao-Xuan Zheng, Wai-Xi Liu, Zhen-Zheng Guo, Jian-Yu Zhang:

Based on Deep Reinforcement Learning with Context Network and Experience pool optimization for Mix-Flow Scheduling in SD-DCN. 91-98 - Yankun Wang, Yongjun Wang, Jun-Jie Huang, Yongxin Chen:

TBP: Tree structure Burst-sequence Padding Defense Against Website Fingerprinting. 99-108 - Huazhen Zhong, Fan Zhang, Yining Zhao, Weifang Zhang, Wenjie Xiao, Xuehai Tang, Liangjun Zang:

UDAD: An Accurate Unsupervised Database Anomaly Detection Method. 109-115 - Jianglong Nie, Wenfei Wu:

AggTree: A Routing Tree With In-Network Aggregation for Distributed Training. 116-122 - Jianfei Cai, Guozheng Yang, Jingju Liu, Yi Xie:

FuzzyCAT: A Framework for Network Configuration Verification Based on Fuzzing. 123-131 - Yuting Li, Yang Yi, Yun Xu, Pengcheng Wang, Yonghui Xu, Weiguang Wang:

iWriter: An Offloading Method for Indirectly Writing Remote Data. 132-139 - Weitao Tang

, Meijie Du, Zhao Li, Shu Li, Zhou Zhou, Qingyun Liu:
Shrink: Identification of Encrypted Video Traffic Based on QUIC. 140-149 - Brad Everman, Trevor Villwock, Dayuan Chen, Noe Soto, Oliver Zhang, Ziliang Zong:

Evaluating the Carbon Impact of Large Language Models at the Inference Stage. 150-157 - Max Parks

, Mark Allison
:
Autonomy and Fatigue in Human-Robot Teams. 158-159 - Stanley Chukwuebuka Nwabuona, Radheshyam Singh, Michael S. Berger

, Sarah Ruepp
, Lars Dittmann
:
Pathloss Analysis and Modelling for 5G Communication in U-SPACE. 160-165 - Jiahui Jin, Yijun Liu, Ting Li:

Redesigning Mobile Crowd Sensing's Selection Logic to Ensure Participant's Diversity. 166-167 - Anh N. Nhu

, Hieu Phan, Chang Liu, Xianglong Feng:
A Comprehensive Defense Approach Targeting The Computer Vision Based Cheating Tools in FPS Video Games. 168-177 - Hongfu Xu, Haiyong Luo, Zijian Wu, Fang Zhao:

Predicting the GNSS Pseudo-Measurement with a Hybrid Multi-Head Attention for Tightly-Coupled Navigation. 178-185 - Keyang Chang, Yimin Du, Min Liu, Jinglin Shi, Yiqing Zhou, Yongkang Li:

OS Packet Processing Mechanism Simulation Architecture for Enabling Digital Twins of Networks in ns-3. 186-193 - Chunyang Zheng, Jinfa Wang, Shuaizong Si, Weidong Zhang, Limin Sun:

ChainDet: A Traffic-Based Detection Method of Microservice Chains. 194-201 - Aaron Harbin, Kane Baldwin, Jui Mhatre, Ahyoung Lee, Hoseon Lee:

Machine Learning Load Balancing Algorithms in SDN-enabled Massive IoT Networks. 202-203 - Carol K. Song, Haoyu Song, Chen Qian:

Dynamic and Load-Aware Flowlet for Load-Balancing in Data Center Networks. 204-209 - Hanzhi Yang, Zhenzhen Li, Gaopeng Gou, Junzheng Shi, Gang Xiong, Zhen Li:

Bitcoin Mixing Service Detection Based on Spatio-Temporal Information Representation of Transaction Graph. 210-219 - Liuxing Su, Zhenzhen Li, Gaopeng Gou, Zhen Li, Gang Xiong, Chengshang Hou:

Identifying Exposed ICS Remote Management Device using Multimodal Feature in the Wild. 220-227 - Arnol Lemogue, Ivan Martinez, Laurent Toutain, Ahmed Bouabdallah:

Towards Flexible and Compact encoded DNS Messages using CBOR Structures. 228-235 - Insaf Rzig, Wael Jaafar, Maha Jebalia, Sami Tabbane:

UAV-Assisted Computation Offloading in Vehicular Networks. 236-241 - Nesrine El Ghoul, Wael Jaafar, Jihene Ben Abderrazak:

Placement Optimization and Resource Allocation in UxNB-Enabled Sliced 5G Networks. 242-248 - Tingqi Wang, Xu Zheng, Liyun Yang, Rong Xiang:

An Adaptive Sampling Strategy for Federal Graph Neural Networks in Internet of Things. 249-258 - Mohsen Gavahi, Abu Naser, Mehran Sadeghi Lahijani, Cong Wu, Zhi Wang, Xin Yuan:

Performance of Software-based Encrypted MPI Communication over Container Clusters. 259-264 - Yunfeng Li, Gaopeng Gou, Gang Xiong, Zhen Li, Mingxin Cui:

The Potential Utility of Image Descriptions: User Identity Linkage across Social Networks Based on MultiModal Self-Attention Fusion. 265-273 - Gaosheng Liu

, Lin Wang:
Routing for Intermittently-Powered Sensing Systems. 274-282 - Ziyan Cai, Xin Chang, Ping Li:

HCPP: A Data-Oriented Framework to Preserve Privacy during Interactions with Healthcare Chatbot. 283-290 - Shuanglin Li

, Yang Sun, Rajesh Nair, Syed Mohsen Naqvi:
Enhancing ADHD Detection Using Diva Interview-Based Audio Signals and A Two-Stream Network. 291-296 - Jianjun Lin, Bo Sun:

AEWF: Autoencoder-based Website Fingerprinting in Data-limited Scenarios. 297-303 - Tianfan Zhang, Huaping Zhou, Chengyuan Huang, Chen Tian, Wei Zhang, Xiaoliang Wang, Yi Wang, Ahmed M. Abdelmoniem

, Matthew Tan, Wanchun Dou, Guihai Chen:
Achieving Zero-copy Serialization for Datacenter RPC. 304-312 - Oleg Kolosov, Mehmet Fatih Aktas, Emina Soljanin, Gala Yadgar:

Theory vs. Practice in Modeling Edge Storage Systems. 313-322 - Reza Poorzare, Oliver P. Waldhorst:

Can MPTCP Proxy Practically Improve Cellular Communication? 323-330 - Shvetha S. Kumar, Reshma R. Nayak, Jismi S. Kannampuzha, Jeeho Ryoo, Sahil Rai, Lizy K. John:

Evaluation of Pruning Techniques. 331-336 - Hengxia Wang, Jinghua Zhu:

Sparse Sequential Recommendation with Interactions and Intentions Contrastive Learning. 337-342 - Yumeng Liu, Wenzhang Zhong, Ke Yan, Ling Tian:

A Dual-view Semi-supervised Learning Framework for Combinatorial Few-shot Fault Diagnosis. 343-350 - Abinash Borah

, Anirudh Paranjothi
:
GPU-based Parallel Computing for VANETs: Current State and Future Prospects. 351-356 - Qing Charles Cao:

Parity Shadow Stack: Dynamic Instrumentation based Control Flow Security for IoT Devices. 357-364 - Jianwei Hao, Emmanuel Oni, In Kee Kim, Lakshmish Ramaswamy:

DynaES: Dynamic Energy Scheduling for Energy Harvesting Environmental Sensors. 365-374 - Sitian Huang, Dongchao Ma, Yuzhu Jin, Mingwei Xu:

Location-Based Prefix Aggregation in Satellite-Ground Networks. 377-384 - Liudong Zuo, Daqing Yun

:
Trade-off Between Completion Time and Cost of Data Transfers in Dedicated HPNs. 385-390 - Souvik Das, Kamil Saraç:

A Scheme to Introduce New Reachability Domains on the Internet. 391-396 - Lihua Song, Jing Li, Honglu Jiang

, Shuhua Wei, Yufei Guo:
Adaptive Edge-Level Personalization on Hierarchical Federated Learning. 397-402 - Dominik Scheinert, Philipp Wiesner, Thorsten Wittkopp, Lauritz Thamsen, Jonathan Will, Odej Kao:

Karasu: A Collaborative Approach to Efficient Cluster Configuration for Big Data Analytics. 403-412 - Nadheesh Jihan, Malith Jayasinghe, Srinath Perera, Caucidheesan Krishnamoorthy:

PERF-Expert: Novel Approach for Dynamically Forecasting the Performance of Cloud-Based Integrations with Zero Performance Tests. 413-421 - Xingyu Hu, Dinghuang Hu, Dezun Dong, Yang Bai, Yuan Lu, Yong Dong:

BCN: A Fast Notified Backpressure Congestion Management. 422-429 - Danyang Xiao, Congcong Zhan, Jialun Li

, Weigang Wu:
Bi-level Sampling: Improved Clients Selection in Heterogeneous Settings for Federated Learning. 430-435 - Muhammad Yasir

, Jianhua Wan, Shanwei Liu, Mingming Xu:
SAR Ship Target Detection Using SAR Images. 436-440 - Dongjin Li, Nahid Ebrahimi Majd:

Intrusion Detection in IoT leveraged by Multi-Access Edge Computing using Machine Learning. 441-446 - P. C. Sherimon, Vinu Sherimon, Yousuf Nasser Al Husaini

, Ambily Merlin Kuruvilla, Ajit Mammen Varghese, Harikrishnan D:
Customized Hybrid Deep Learning Model for Road Accident Detection Based on CCTV Images. 447-452 - Kyungbin Lee, Nahid Ebrahimi Majd:

Anomaly Detection and Attack Classification in IoT Networks Using Machine Learning. 453-458 - Abdulaziz Alshammari:

Empowering Local Wood Detection with YOLO5 and Convolutional Neural Network Architecture. 459-464 - Ishmeet Kaur, Adwaita Janardhan Jadhav:

On the fly Deep Neural Network Optimization Control for Low-Power Computer Vision. 465-469 - Kasim Öztoprak, Yusuf Kursat Tuncel

:
Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication Operators. 470-474 - Han Li, Ke Xiong, Pingyi Fan

, Khaled Ben Letaief
:
Deep Reinforcement Learning Based Task Offloading and Resource Allocation in Small Cell MEC. 475-480 - Fan Zhang, Beibei Xu, Kai Cui:

A Model Compression Method Using Significant Data and Knowledge Distillation. 481-487 - Zheng Wan

, Mingyang Ma, Xuelin Liu:
Collaborative Edge Caching for Panoramic Video Streaming. 488-494 - Hela Hammami, Sadok Elasmi:

An Artificial Neural Network Model for Mapping Extreme Precipitation Events. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














