default search action
ITNAC 2018: Sydney, Australia
- 28th International Telecommunication Networks and Applications Conference, ITNAC 2018, Sydney, Australia, November 21-23, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7177-1
- Chakkaphong Suthaputchakun, Yue Cao:
Rescue Mission Enhancement through Ambulance-to- Vehicle Communications. 1-6 - Shahriar Shirvani Moghaddam, Mahyar Shirvanimoghaddam, Ameneh Habibzadeh:
Clustering-based Handover and Resource Allocation Schemes for Cognitive Radio Heterogeneous Networks. 1-6 - Gerald Ostermayer, Christian Backfrieder, Manuel Lindorfer:
Dynamic Vehicular Traffic Load Quantification by Considering Intermittent Unused Road Space. 1-8 - Di Zhang, Huadong Ma, Dong Zhao, Lei Kuang:
NC-MapCast: Network Coding based Multi-Attribute Profile-Cast in Mobile Opportunistic Networks. 1-6 - Qichang Chen, Rixin Li, Hongbiao Zhang, Shuai Xiao, Qiwen Zhong, Desheng Sun, Lehong Niu, Li Ding, Sen Zhang:
Towards an Unified Multi-service Ethernet Transport Network(ETN). 1-6 - Franciscus X. A. Wibowo, Mark A. Gregory:
Multi-domain Software Defined Network Provisioning. 1-7 - Chenchen Liu, Jing Zhao, Jiaxi Zhou, Zhengyu Zhang, Weilong Ren:
Joint Design of Relay-User Selection in Direct-link Energy Harvesting Relay Networks. 1-4 - Ayub Bokani, Jahan Hassan, Salil S. Kanhere:
Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge Computing. 1-6 - Hongjun Yu, Cheng-Chew Lim, Robert A. Hunjet:
Enabling Energy Efficient Data Ferrying. 1-6 - Quanrun Chen, Tao Zhang, Weibo Zheng:
Optimization of LED Layout to Improve Uniformity of Illumination and SNR for Indoor Visible Light Communication. 1-3 - Dae-Kyo Jeong, Dongwoo Kim:
Power Allocation and Outage Analysis for Cognitive Radio with Jamming Signal under Primary Secrecy Outage Constraint. 1-6 - Weilong Ren, Letian Li, Yanjun Yao, Chenchen Liu, Shuo Wang:
Sleep-based Resource Allocation Algorithm for Inter-Femto Interference Mitigation. 1-6 - Davide Berardi, Franco Callegati, Andrea Melis, Marco Prandini:
Security network policy enforcement through a SDN framework. 1-4 - Wael Hosny Fouad Aly, Yehia Kotb:
Towards SDN Fault Tolerance using Petri-Nets. 1-3 - Luyao Wang, Kwan-Wu Chin:
On Emptying Small Satellite Networks with In-Network Data Aggregation. 1-8 - Ikuya Kitamura, Hong Zhou, Kazuo Kumamoto, Fengping Yan:
A Study on Fiber-Optic Relaying Scheme Using Spatial Modulation for MIMO Transmissions. 1-4 - Habiba Akter, Chris Phillips:
Are Internet Tunnels Worthwhile? 1-6 - Farzaneh Pakzad, Marius Portmann, Thierry Turletti, Thierry Parmentelat, Mohamed Naoufal Mahfoudi, Walid Dabbous:
R2Lab Testbed Evaluation for Wireless Mesh Network Experiments. 1-6 - Mahbuba Sheba Ullah, Ahmed H. Tewfik:
Beam Detection Analysis for 5G mmWave Initial Acquisition. 1-8 - Talha Younas, Jiandong Li, Jehangir Arshad Meo, Muluneh Mekonnen Tulu, Hafiz Mudassir Munir:
New Framework for analysis Of Energy Efficiency in massive MIMO With Hardware Impairments. 1-3 - Mohammed S. Aloqlah, Reem A. Alzubaidi:
Energy-Detection performance for SIMO Cognitive Radio Systems with Selection Combining over κ -μ Shadowed Fading Channels. 1-6 - Kamran Zia, Hifsa Iram, Muhammad Aziz Ul Haq, Aasim Zia:
Comparative study of classification techniques for indoor localization of mobile devices. 1-5 - Jiajia Guo, Caidong Gu, Si Chen, Hongwei Du, Xiaoxiao Wang, Jihong Yu, Wei Gong:
Channel-based Rate Selection for Commodity RFID Networks. 1-6 - Miraj Asghar, Robin Ram Mohan Doss, Lei Pan:
A Scalable and Efficient PKI Based Authentication Protocol for VANETs. 1-3 - Vijaya Durga Chemalamarri, Robin Braun, Justin Lipman, Mehran Abolhasan:
A Multi-agent Controller to enable Cognition in Software Defined Networks. 1-5 - Ogbonnaya Anicho, Philip B. Charlesworth, Gurvinder S. Baicher, Atulya Nagar:
Integrating Routing Schemes and Platform Autonomy Algorithms for UAV Ad-hoc & Infrastructure based networks. 1-5 - Masud Rana, Mazed Rayhan Shuvo:
Detection of Primary User Emulation Attack in Sensor Networks. 1-6 - Jaime Galán-Jiménez, Javier Berrocal, José García-Alonso, Carlos Canal, Juan Manuel Murillo:
Situational and Adaptive Context-Aware Routing for Opportunistic IoT Networks. 1-6 - Da-Ren Chen, Ming-Yang Hsu, Hao-Yen Chang:
Context-Aware and Energy-Efficient Protocol for the Distributed Wireless Sensor Networks. 1-6 - Bihuan Chen, Zhixiong Tan, Wei Fang:
Blockchain-Based Implementation for Financial Product Management. 1-3 - Supreet Singh:
Performance Analysis of Energy Harvesting based Two-way Multi-Relay Wireless Network. 1-6 - Quentin Schueller, Kashinath Basu, Muhammad Younas, Mohit Patel, Frank Ball:
A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center. 1-6 - Xiaoyu Wang, Xiao Lin, Weiqiang Sun, Malathi Veeraraghavan:
Comparison of Two Sharing Modes for a Proposed Optical Enterprise-Access SDN Architecture. 1-8 - Lincy Elizebeth Jim, Mark A. Gregory:
AIS Reputation Mechanism in MANET. 1-6 - Anees Al-Najjar, Siamak Layeghy, Marius Portmann, Jadwiga Indulska:
Enhancing Quality of Experience of VoIP Traffic in SDN based End-hosts. 1-8 - Rana Al Halaseh, Halil Alper Tokel, Subhodeep Chakraborty, Gholamreza Alirezaei, Rudolf Mathar:
Feature-Selection based PMU Placement for Detection of Faults in Power Grids. 1-6 - Ameer Shakayb Arsalaan, Hung Nguyen, Andrew Coyle:
Evaluating the Performance of QoI Algorithms in Realistic MANETs. 1-6 - Bipraneel Roy, Hon Cheung:
A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network. 1-6 - Viktor Kelkkanen, Markus Fiedler:
A Test-bed for Studies of Temporal Data Delivery Issues in a TPCAST Wireless Virtual Reality Set-up. 1-3 - Emerson Cabrera, Rein Vesilo:
An Enhanced K-means Clustering Algorithm with Non-Orthogonal Multiple Access (NOMA) for MMC Networks. 1-8 - Sara A. Althubiti, Eric Marcell Jones, Kaushik Roy:
LSTM for Anomaly-Based Network Intrusion Detection. 1-3 - Bradley Fraser:
Data Ferry Flocking for Bulk Information Transfer Under Ferry Buffer Constraints. 1-6 - Siwen Xing, Ming Ding, Zihuai Lin:
Outage Capacity Analysis for Ambient Backscatter Communication Systems. 1-6 - Zachary W. Lamb, Dharma P. Agrawal:
Context-Aware Mobile Edge Computing in Vehicular Ad-Hoc Networks. 1-7 - Viktor Kelkkanen, Markus Fiedler:
Coefficient of Throughput Variation as Indication of Playback Freezes in Streamed Omnidirectional Videos. 1-6 - Furqan Hameed Khan, Marius Portmann:
Experimental Evaluation of LoRaWAN in NS-3. 1-8 - Anthony Dobson, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu:
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection. 1-6 - Robert A. Minasian:
Advances in microwave photonic signal processing for 5G and IoT Keynote Paper. 1-4 - Humaira Abdul Salam, Franco Davoli, Alessandro Carrega, Andreas Timm-Giel:
Towards Prediction of Power Consumption of Virtual Machines for Varying Loads. 1-6 - Yasser Mawad, Stefan Fischer:
HIDTN: Hybrid DTN and Infrastructure Networks for Reliable and Efficient Data Dissemination. 1-8 - Manpreet Singh, Sarbjeet Singh, Nadesh Seen, Sakshi Kaushal, Harish Kumar:
Comparison of learning techniques for prediction of customer churn in telecommunication. 1-5 - Thi Minh Chau Nguyen, Doan B. Hoang:
S-MANAGE Protocol For Software-Defined IoT. 1-6 - Byeongok Choi, Chae Y. Lee:
Bit Rate and Task Scheduling in Cloud Computing for Multimedia Big Data. 1-5 - Christopher Metter, Valentin Burger, Zheng Hu, Ke Pei, Florian Wamser:
Towards an Active Probing Extension for the ONOS SDN Controller. 1-8 - Payal Tusharkumar Mahida, Seyed A. Shahrestani, Hon Cheung:
Comparision of pathfinding algorithms for visually impaired people in IoT based smart buildings. 1-3 - Khalid Hasan, Khandakar Ahmed, Kamanashis Biswas:
Performance Analysis of Polling Mechanism in WBAN. 1-4 - R. M. P. H. K. Rathnayake, M. Sajeewani Karunarathne, Nazmus Shaker Nafi, Mark A. Gregory:
Cloud Enabled Solution for Privacy Concerns in Internet of Medical Things. 1-4 - Dawood Sheniar, Nabeel Hadaad, David Martin, Ron Addie, Shahab A. Abdullah:
Experiments and Proofs in Web-service Security. 1-6 - Jaebong Lim, Juhee Seo, Yunju Baek:
CamThings: IoT Camera with Energy-Efficient Communication by Edge Computing based on Deep Learning. 1-6 - Ruichen Luo, Ziqian Zhang, Xiaopeng Wang, Zihuai Lin:
Wi-Fi Based Device-free Microwave Ghost Imaging Indoor Surveillance System. 1-6 - Nipun Sood, Shamanth Nagaraju, V. Sreejith, Lucy J. Gudino:
Collaborative Neighbor Discovery with Slow Scan for Directional Sensor Networks. 1-3 - Maryam Pahlevan, Roman Obermaisser:
Redundancy Management for Safety-Critical Applications with Time Sensitive Networking. 1-7 - Ishtiaq Ahmad, Gottfried Lechner, Ismail Shakeel:
On the Error Rate Analysis of Distributed Transmit Beamforming. 1-4 - Hanjun Cho, Jongpil Jeong:
Implementation and Performance Analysis of Power and Cost-Reduced OPC UA Gateway for Industrial IoT Platforms. 1-3 - Narayut Putjaika, Phond Phunchongharn, Khajonpong Akkarajitsakul, Unchalisa Taetragool:
Joint Mode Selection and Resource Allocation for Relay-Assisted Device-to-Device Networks. 1-6 - Mohammed M. A. Mohammed, Cuiwei He, Jean Armstrong:
Iterative Decision-Directed Receiver for the Mitigation of Side-Effect Modulation in indoor VLC applications. 1-6 - Frank T. H. den Hartog, Koen Dittrich, Jan de Nijs:
Towards a viable business model for collaborative use of unlicensed frequency bands in densely populated areas. 1-6 - Ngoc-Thuy Le, Doan B. Hoang:
Security threat probability computation using Markov Chain and Common Vulnerability Scoring System. 1-6 - Muhammad Towfiqur Rahman, Masuduzzaman Bakaul, Rajendran Parthiban:
Analysis of the effects of multiple reflection paths on high speed VLC system performance. 1-6 - Changyong Um, Jaehyeong Lee, Jongpil Jeong:
Virtualized oneM2M System Architecture in Smart Factory Environments. 1-6 - Qingzhi Li, Ming Ding, Chuan Ma, Chang Liu, Zihuai Lin, Ying-Chang Liang:
A Reinforcement Learning Based User Association Algorithm for UAV Networks. 1-6 - Ashish Rauniyar, Paal Engelstad, Olav N. Østerbø:
RF Energy Harvesting and Information Transmission in IoT Relay Systems based on Time Switching and NOMA. 1-7 - Alessandro Carrega, Matteo Repetto:
Cloud Applications Consolidation through Context Information and Heuristic optimization. 1-7 - Arslan Musaddiq, Yousaf Bin Zikria, Sung Won Kim:
Energy-Aware Adaptive Trickle Timer Algorithm for RPL-based Routing in the Internet of Things. 1-6 - Fahad Alkurdi, Ibrahim Elgendi, Kumudu S. Munasinghe, Dharmendra Sharma, Abbas Jamalipour:
Blockchain in IoT Security: A Survey. 1-4 - Jason Brown, Jamil Y. Khan:
Proximity Coordinated Random Access (PCRA) for M2M Applications in LTE-A. 1-3 - Muhammad Sajid Haroon, Ziaul Haq Abbas, Ghulam Abbas, Fazal Muhammad:
Analysis of Interference Mitigation in Heterogeneous Cellular Networks using Soft Frequency Reuse and Load Balancing. 1-6 - James Jin Kang:
Prediction of Personalised Life Expectancy using Personal Health Devices in mHealth Networks. 1-5 - Gladys Diaz, Michelle Sibilla, Noemie Simoni:
Towards information modeling for a QoS-aware support in the lifecycle of virtual networks. 1-6 - Tyler Nicholas Edward Steane, Peter J. Radcliffe:
Multiple Intermittent Controllers for IoT Home Automation. 1-6 - Satoru Ohta:
A New Result on Rearrangeable 3-Stage Clos Networks. 1-6 - James Jin Kang, Sitalakshmi Venkatraman:
An Integrated mHealth and Vehicular Sensor Based Alarm System Emergency Alarm Notification System for Long Distance Drivers using Smart Devices and Cloud Networks. 1-6 - Vinojitha Raghavan, David Airehrour, Emmanuel Ndashimye, Abdullahi B. Baffa:
PEGADyn: A Cluster-Based Energy Efficient Routing Protocol for Ad Hoc Networks. 1-6 - Nayankumar Patel, Swapnil Patel, Wee Lum Tan:
Performance Comparison of WhatsApp versus Skype on Smart Phones. 1-3 - Bradley Fraser:
Radio-Frequency Emitter Localisation Using a Swarm of Search Agents. 1-6 - Alhasani M. Mustafa, Quang Ngoc Nguyen, Takuro Sato, Gen-Ichiro Ohta:
Four Single-Sideband M-QAM Modulation using Soft Input Soft Output Equalizer over OFDM. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.