default search action
21st NCA 2022: Boston, MA, USA
- Michele Colajanni, Luca Ferretti, Miguel L. Pardal, Dimiter R. Avresky:
21st IEEE International Symposium on Network Computing and Applications, NCA 2022, Boston, MA, USA, December 14-16, 2022. IEEE 2022, ISBN 979-8-3503-9730-7 - Claudio Zanasi, Federico Magnanini, Silvio Russo, Michele Colajanni:
A Zero Trust approach for the cybersecurity of Industrial Control Systems. 1-7 - Kadir Korkmaz, Joachim Bruneau-Queyreix, Sonia Ben Mokhtar, Laurent Réveillère:
ALDER: Unlocking blockchain performance by multiplexing consensus protocols. 9-18 - Aymeric Agon-Rambosson, Jonathan Lejeune, Julien Sopena, Pierre Sens:
Alternating MPR: a balanced broadcast algorithm for MANETs. 19-26 - Sridevi S, Jacob Augustine, Shankar K. Ghosh:
An analytic hierarchy process (AHP) based UAV selection mechanism for beyond 5G networks. 27-34 - Richard von Seck, Filip Rezabek, Benedikt Jaeger, Sebastian Gallenmüller, Georg Carle:
BFT-Blocks: The Case for Analyzing Networking in Byzantine Fault Tolerant Consensus. 35-44 - André Bento, João Soares, António Ferreira, João Durães, José Ferreira, Rita Carreira, Filipe Araújo, Raul Barbosa:
Bi-objective optimization of availability and cost for cloud services. 45-53 - Ricardo Grade, Samih Eisa, Miguel L. Pardal:
Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application. 55-62 - Anshuman Misra, Ajay D. Kshemkalyani:
Byzantine Fault-Tolerant Causal Broadcast on Incomplete Graphs. 63-71 - Anshuman Misra, Ajay D. Kshemkalyani:
Detecting Causality in the Presence of Byzantine Processes: There is No Holy Grail. 73-80 - Andrea Venturi, Dario Stabili, Francesco Pollicino, Emanuele Bianchi, Mirco Marchetti:
Comparison of Machine Learning-based anomaly detectors for Controller Area Network. 81-88 - Mehrzad Lavassani, Johan Åkerberg, Mats Björkman:
Data-driven Method for In-band Network Telemetry Monitoring of Aggregated Traffic. 89-95 - Maya Kapoor, Siddharth Krishnan, Thomas Moyer:
Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing. 97-105 - Ibtissem Brahmi, Monia Hamdi, Ines Rahmany, Faouzi Zarai:
Deep Reinforcement Learning for Downlink Resource Allocation in Vehicular Small Cell Networks. 107-114 - Anshuman Misra, Ajay D. Kshemkalyani:
Causal Ordering Properties of Byzantine Reliable Broadcast Primitives. 115-122 - Priyanka Kamboj, Sujata Pal:
Energy-Aware Routing in SDN Enabled Data Center Network. 123-130 - Imene Ben Hafaiedh:
Formal models for the verification, performance evaluation, and comparison of IoT communication protocols. 131-138 - Kadir Korkmaz, Joachim Bruneau-Queyreix, Stéphane Delbruel, Sonia Ben Mokhtar, Laurent Réveillère:
In-depth analysis of the IDA-Gossip protocol. 139-147 - Giovanni Merlino, Rafael Asorey-Cacheda, Luca D'Agati, Francesco Longo, Antonio-Javier García-Sánchez, Joan García-Haro, Antonio Puliafito:
Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming. 149-156 - Fadoua Debbabi, Raouia Taktak, Rihab Jmal, Lamia Chaari Fourati, Rui L. Aguiar:
Inter-slice B5G Bandwidth Resource Allocation. 157-163 - Lucas H. Vicente, Samih Eisa, Miguel L. Pardal:
LoCaaS: Location-Certification-as-a-Service. 165-172 - Souvik Deb, Shankar Kumar Ghosh, Sasthi C. Ghosh:
MAB based Network Selection mechanism for URLLC users in RIS assisted network. 173-179 - Samira Afzal, Zahra Najafabadi Samani, Narges Mehran, Christian Timmerer, Radu Prodan:
MPEC2: Multilayer and Pipeline Video Encoding on the Computing Continuum. 181-190 - Ramesh Singh, Radhika Sukapuram, Suchetana Chakraborty:
Mobility-aware Multi-Access Edge Computing for Multiplayer Augmented and Virtual Reality Gaming. 191-200 - Shlomi Dolev, Yaniv Kleinman:
Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version). 201-207 - Hajer Nabli, Ines Regaig, Raoudha Ben Djemaa, Layth Sliman:
Never Alone: a Quality of Context-aware Monitoring System for Aging in Place Smart Home. 209-215 - Slim Abbes, Slim Rekhis:
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV). 217-224 - Muhong Huang, Runchao Han, Zhiqiang Du, Yanfang Fu, Liangxin Liu:
Reputation-based state machine replication. 225-234 - Andrea Venturi, Claudio Zanasi, Mirco Marchetti, Michele Colajanni:
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning. 235-242 - Gabriele Gambigliani Zoccoli, Francesco Pollicino, Dario Stabili, Mirco Marchetti:
SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs. 243-249 - Ziran Min, Shashank Shekhar, Charif Mahmoudi, Valerio Formicola, Swapna S. Gokhale, Aniruddha Gokhale:
Software-defined Dynamic 5G Network Slice Management for Industrial Internet of Things. 251-259 - Rafael Figueiredo, Samih Eisa, Miguel L. Pardal:
SureRepute: Reputation System for Crowdsourced Location Witnesses. 261-268 - Shlomi Dolev, Alexander Fok, Michael Segal:
Swarming with (Visual) Secret (Shared) Mission. 269-276 - Lorenzo Rossi, Luca Ferretti:
WebDHT: browser-compatible distributed hash table for decentralized Web applications. 277-284 - Michel Neves, André Riker, Jéferson Campos Nobre, Antônio J. G. Abelém, Bruno Lopes Dalmazo:
Modularized and Contract-Based Prediction Models in Programmable Networks. 285-289 - Yuri Santo, Bruno Lopes Dalmazo, Roger Immich, André Riker:
On the Performance of Machine Learning at the Network Edge to Detect Industrial IoT Faults. 291-295 - Erick Petersen, Jorge López, Natalia Kushik, Claude Poletti, Djamal Zeghlache:
On using Cellular Automata for Modeling the Evolution of Dynamic-Link Network Parameters. 297-301 - Yotam Ashkenazi, Shlomi Dolev:
Distributed Coordination Based on Quantum Entanglement (Work in Progress). 303-305 - Towhidul Islam, Asif Ahmed, Raihan Tanvir, Rezwana Reaz:
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress). 307-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.