


default search action
16th BWCCA 2021: Fukuoka, Japan
- Leonard Barolli:

Advances on Broad-Band Wireless Computing, Communication and Applications - Proceedings of the 16th International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA 2021, Fukuoka, Japan, 28-30 October 2021. Lecture Notes in Networks and Systems 346, Springer 2021, ISBN 978-3-030-90071-7 - Admir Barolli, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, Leonard Barolli:

A Comparison Study of Chi-square and Uniform Distributions of Mesh Clients by WMN-PSODGA Simulation System for RIWM and LDIWM Router Replacement Methods. 1-13 - Shinji Sakamoto, Yi Liu, Leonard Barolli, Shusuke Okamoto:

Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Number of Mesh Routers and Chi-Square Distribution of Mesh Clients. 14-24 - Dilawaer Duolikun, Tomoya Enokido, Leonard Barolli, Makoto Takizawa:

An Energy-Efficient Algorithm to Make Virtual Machines Migrate in a Server Cluster. 25-36 - Elis Kulla

, Keita Matsuo
, Leonard Barolli
:
Evaluation of Focused Beam Routing Protocol for Different Applications of Underwater Sensor Networks. 37-45 - Yoshitaka Shibata, Akira Sakuraba:

Performance Evaluation of V2X Communication for Road State Information Platform Based on 5G and HighSpeed LAN. 46-56 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:

An Energy-Efficient Process Replication by Differentiating Starting Time of Process Replicas in Virtual Machine Environments. 57-66 - Shigenari Nakamura

, Tomoya Enokido, Makoto Takizawa:
Traffic Reduction for Information Flow Control in the IoT. 67-77 - Aoto Hirata, Tetsuya Oda, Nobuki Saito, Tomoya Yasunaga, Kengo Katayama, Leonard Barolli:

A Simulation System for Mesh Router Placement in WMNs Considering Coverage Construction Method and Simulated Annealing. 78-87 - Koichiro Sugihara, Naohiro Hayashibara:

On the Latency of Nomadic Lévy Walk Based Message Ferry Routing in Delay Tolerant Networks. 88-99 - Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama:

A Machine Learning Based Network Intrusion Detection System with Applying Different Algorithm in Multiple Stages. 100-110 - Chanmin Kim, Insu Oh, Yeji Koh, Myoungsu Kim, Kangbin Yim:

In-vehicle Network IDS Using Message Time Interval Infrastructure. 111-119 - Ermioni Qafzezi, Kevin Bylykbashi, Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

A Fuzzy-Based System for Assessment of Quality of Service Communication Links in SDN-VANETs. 120-128 - Rongze Xia, Baojiang Cui:

Malware Classification Based on Graph Neural Network Using Control Flow Graph. 129-138 - Takumi Takeshita, Kosuke Kaneko, Yoshihiro Okada:

Hand Gesture Input Interface of IntelligentBox Using Leap Motion Controller and Its Application Example. 139-147 - Mamoru Mimura

, Takumi Yamasaki:
Toward Automated Audit of Client-Side Vulnerability Against Cross-Site Scripting. 148-157 - Sriram Bobba, Vamsi Paruchuri

:
Single Sign-On Using Contactless Smart Cards and Fingerprint Authentication. 158-166 - Mekhled Alharbi, Farookh Khadeer Hussain:

Blockchain-Based Identity Management for Personal Data: A Survey. 167-178 - Tetsuya Shigeyasu, Shogo Utahara:

Effects of Buffer Management Considering Time Continuity on Disaster Information on DTN Based Information Sharing System. 179-188 - Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:

Fusion Techniques for Strong Data Protection. 189-192 - Urszula Ogiela, Marek R. Ogiela:

Predictive Intelligence Approaches for Security Technologies. 193-196 - Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:

Project Management Mechanism Based on Burndown Chart to Reduce the Risk of Software Project Failure. 197-205 - Pei-Hua Yu, Heru Susanto, Li-Xuan Liu, Shang-Jie Wu, Fang-Yie Leu:

The Implementation of Dynamical Shortest Path and Resource Management for Network Slicing in 5G Networks. 206-215 - Pei-Xuan Cai, Yao-Chung Fan

, Fang-Yie Leu:
Compare Encoder-Decoder, Encoder-Only, and Decoder-Only Architectures for Text Generation on Low-Resource Datasets. 216-225 - Lung-Bin Chen, Fang-Yie Leu:

Efficient Execution of Malleable Applications in Desktop Grids Using Credit Damping. 226-233 - Masaya Azuma, Shota Uchimura, Yoshiki Tada, Makoto Ikeda, Leonard Barolli:

An Adaptive Anti-packet Recovery Method for Vehicular DTN: Performance Evaluation Considering Shuttle Buses and Roadside Units Scenario. 234-241 - Akira Sakuraba, Yoshitaka Shibata, Mamoru Ohara:

Proposal of Vehicular Real-Time Sensing Method for Amount of Snow Accumulation on the Road. 242-250 - Hiroshi Maeda

:
Numerical Analysis of Electromagnetic Wave Propagation in Photonic Crystal Waveguide with Stubs for Wavelength Filtering. 251-259 - Elis Kulla

, Kuya Shintani, Keita Matsuo
:
Evaluating the Impact of Node Density and Area Shape in Underwater Wireless Sensor Networks. 260-267 - Yi Liu, Shinji Sakamoto, Leonard Barolli:

Improving Peer Reliability in P2P Networks: Implementation of an Integrated Simulation System Considering Fuzzy Logic and NS-3. 268-278 - Wontae Jung, Kangbin Yim, Kyungroul Lee:

Vulnerability Analysis of a Secure USB Memory: Based on a Commercial Product D. 279-283 - Munkhdelgerekh Batzorig, Insu Oh, Chanmin Kim, Yeji Koh, Kangbin Yim:

SPEC: Frame Filtering for CAN Protocol on ECU. 284-293 - Md Rezanur Islam

, Insu Oh, Munkhdelgerekh Batzorig, Seoyeon Kim, Kangbin Yim:
A Concept of IDS for CAN Protocol Based on Statics Theory. 294-302 - Kenshiro Mitsugi, Atushi Toyama, Keita Matsuo, Elis Kulla, Leonard Barolli:

Design and Implementation of a Control Interface for Indoor Position Detection of Moving Omnidirectional Access Point Robot Using Super Sonic Signals. 303-314 - Shota Uchimura, Yoshiki Tada, Makoto Ikeda, Leonard Barolli:

An Intelligent Fallen Object Detection System for Safe Driving. 315-320 - Keita Matsuo, Kenshiro Mitsugi, Atushi Toyama, Elis Kulla, Leonard Barolli:

A Simulation System for Optimal Positions of MOAP Robots Using Elbow and Silhouette Theories: Simulation Results Considering Minimum Transmission Power of MOAP Robots. 321-332 - Takahiro Uchiya, Yudai Furuta, Ichi Takumi:

Proposal of Indoor Navigation System Using Mixed Reality Technology. 333-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














