


default search action
33rd ICOIN 2019: Kuala Lumpur, Malaysia
- 33rd International Conference on Information Networking, ICOIN 2019, Kuala Lumpur, Malaysia, January 9-11, 2019. IEEE 2019, ISBN 978-1-5386-8350-7

- Yuan Zhuang, Qiaoyue Pang, Min Wei:

Secure and Fast Multiple Nodes Join Mechanism for IPv6-Based Industrial Wireless Network. 1-6 - Joong-Hwa Jung, Dong-Kyu Choi, Ji-In Kim, Seok Joo Koh:

Mobility Management for Healthcare Services in CoAP-Based IoT Networks. 7-12 - Masaki Ueno, Go Hasegawa, Masayuki Murata:

Experimental Evaluation of Mobile Core Networks on Simultaneous Access from M2M/IoT Terminals. 13-18 - Yuki Takei, Zhi Liu

, Hiroaki Sawano, Susumu Ishihara:
Accurate Position Estimation of a Drifting Wireless LAN Communication Device in a 200mm-Diameter Small Sewer Pipe. 19-24 - Preeti Jain

, Sunil K. Surve
:
Resource Centric Characterization and Classification of Applications Using KMeans for Multicores. 25-30 - Robert Basomingera

, Young-June Choi:
Route Cache Based SVM Classifier for Intrusion Detection of Control Packet Attacks in Mobile Ad-Hoc Networks. 31-36 - Phuylai Oeung, Fuke Shen:

Imbalanced Internet Traffic Classification Using Ensemble Framework. 37-42 - Nishat I. Mowla, Inshil Doh, Kijoon Chae:

Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System. 43-48 - Anselme Ndikumana

, Choong Seon Hong
:
Self-Driving Car Meets Multi-Access Edge Computing for Deep Learning-Based Caching. 49-54 - Adamu Muhammad Noma, Abdullah Muhammad

:
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness. 55-59 - Muhammad I. H. Sukmana

, Kennedy A. Torkura, Hendrik Graupner
, Feng Cheng, Christoph Meinel:
Unified Cloud Access Control Model for Cloud Storage Broker. 60-65 - Varun Amrutiya, Siddhant Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia:

Trustless Two-Factor Authentication Using Smart Contracts in Blockchains. 66-71 - Harsha Vasudev

, Debasis Das
:
A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing. 72-77 - Madhur Poddar, Swathi Ganta, K. R. Swaraj, Debasis Das

:
Privacy in the Internet of Vehicles: Models, Algorithms, and Applications. 78-83 - Myungwhan Choi, Areeya Rubenecia, Hyo Hyun Choi:

Reservation-Based Intersection Crossing Scheme for Autonomous Vehicles Traveling in a Speed Range. 84-87 - Dong-Kyu Choi, Joong-Hwa Jung, Seok Joo Koh, Ji-In Kim, Juyoung Park:

In-Vehicle Infotainment Management System in Internet-of-Things Networks. 88-92 - Nway Nway Ei, Chit Wutyee Zaw, Min Kyung Lee, Choong Seon Hong

:
Cell Association in Energy-Constrained Unmanned Aerial Vehicle Communications Under Altitude Consideration. 93-97 - Hayato Ishikawa, Eiji Okamoto, Shouhei Okamoto, Hiraku Okada, Satoshi Makido:

Performance Analysis of Uplink V2I Cooperative Transmission Scheme in Practical Road Environments. 98-102 - Ryo Hasegawa, Eiji Okamoto, Hiroyuki Tsuji, Amane Miura:

Performance Analysis of a Terrestrial/UAV Integrated Mobile Communications System Using Code Division Multiplexing in Natural Disasters. 103-107 - Madyan Alsenwi, Shashi Raj Pandey

, Yan Kyaw Tun
, Ki Tae Kim
, Choong Seon Hong
:
A Chance Constrained Based Formulation for Dynamic Multiplexing of eMBB-URLLC Traffics in 5G New Radio. 108-113 - Zhipeng Cheng

, Yuliang Tang, Haijie Wu:
Joint Task Offloading and Flexible Functional Split in 5G Radio Access Network. 114-119 - Hiroki Utatsu, Kai Osawa, Jun Mashino, Satoshi Suyama, Hiroyuki Otsuka:

Throughput Performance of Relay Backhaul Enhancement Using 3D Beamforming. 120-124 - Teerapat Sanguankotchakorn, Chintala Aravind Kumar:

Optimizing Power by Combining Small Cells with a Massive MIMO for Maximum Energy Efficiency Under Two Path Loss Models. 125-130 - Md. Kamruzzaman

, Nurul I. Sarkar
, Jairo A. Gutiérrez
, Sayan Kumar Ray
:
A Mode Selection Algorithm for Mitigating Interference in D2D Enabled Next-Generation Heterogeneous Cellular Networks. 131-135 - Yoshihiro Masuda, Eiji Okamoto, Keita Ito, Tetsuya Yamamoto:

An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation. 136-140 - Ashis Talukder, DoHyeon Kim, Choong Seon Hong

:
A Heuristic Mixed Model for Viral Marketing Cost Minimization in Social Networks. 141-146 - Takehiro Nagato, Takumi Tsutano, Tomio Kamada

, Yumi Takaki, Chikara Ohta:
Distributed Key-Value Storage for Edge Computing and its Explicit Data Distribution Method. 147-152 - Hanen Brahmi:

Post-Mining of Generalized Association Rules from Data Cubes. 153-158 - Hanen Brahmi:

Ontology Enhanced Mining of Multidimensional Association Rules from Data Cubes. 159-164 - W. A. Shanaka P. Abeysiriwardhana, Janaka Wijekoon

, Hiroaki Nishi
:
Optimized Service Function Path Selection for IoT Devices Using Virtual Network Function Performance Data. 165-170 - Huali Cui, Qindong Sun, Beibei Zhang, Xingjun Zhang, Weiguo Wu:

Video-Aware Multipath Network Coding over Multi-Hop Wireless Networks. 171-175 - Sangwook Han, Yunmin Go, Hyunmin Noh, Hwangjun Song:

Cooperative Server-Client HTTP Adaptive Streaming System for Live Video Streaming. 176-180 - Yuki Maehara, Toshiro Nunome:

WebRTC-Based Multi-View Video and Audio Transmission and its QoE. 181-186 - Heekwang Kim, Kwangsue Chung:

Collective Segment Request Policy of HTTP Adaptive Streaming in Multipath Environments. 187-192 - Meihua Jin, Ji-Young Jung

, Dara Ron, Sengly Muy, Jung-Ryun Lee:
Energy-Efficient Sleep Mode Adjustment Considering GoP Structure. 193-197 - Masaaki Ohnishi, Kazuyuki Shudo:

Distributed ID/Locator Resolution System for Inter Mesh Networks. 198-203 - Nor Aida Mahiddin

, Nurul I. Sarkar
:
An Efficient Gateway Routing Scheme for Disaster Recovery Scenario. 204-209 - Toshiki Nonaka, Takeo Fujii, Osamu Takyu, Mai Ohta:

Network MIMO with Interference Cancellation for Cloud-Cooperated Wireless Sensor Networks. 210-215 - Nurul I Sarkar

, Sonia Gul
, Bowen Anderton:
Gigabit Ethernet with Wireless Extension: OPNET Modelling and Performance Study. 216-221 - Sai Wang, Yoan Shin:

3D- Deployment of Magnetic Induction Relays in Underwater Sensor Networks. 222-226 - Avinash Subramaniam, Hwee-Xian Tan, Hwee-Pink Tan:

BLE-Enabled Medication Events Monitoring System (MEMS) for Community Dwelling Seniors. 227-232 - Heesang Jin, Gyeongsik Yang

, Bong-yeol Yu, Chuck Yoo:
TALON: Tenant Throughput Allocation Through Traffic Load-Balancing in Virtualized Software-Defined Networks. 233-238 - Tri-Hai Nguyen

, Jaejin Lee, Myungsik Yoo:
A Practical Model for Optimal Placement of Virtual Network Functions. 239-241 - Bong-yeol Yu, Gyeongsik Yang

, Heesang Jin, Chuck Yoo:
White Visor: Support of White-Box Switch in SDN-Based Network Hypervisor. 242-247 - Melchizedek I. Alipio, Alex Gyran A. Co, Melinda Faye C. Hilario, Christian Miguel C. Pama:

SDN-Enabled Value-Based Traffic Management Mechanism in Resource-Constrained Sensor Devices. 248-253 - Samir Kumar Tarai, Samar Shailendra

:
Optimal and Secure Controller Placement in SDN Based Smart City Network. 254-261 - Keita Ito, Yoshihiro Masuda, Eiji Okamoto:

A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding. 262-267 - Aunas Manzoor

, Seok Won Kang, Choong Seon Hong
:
Chance-Constrained Spectrum Allocation for Fair LTE-U/Wi-Fi Coexistence. 268-273 - Keita Onose, Koya Sato

, Kei Inage, Takeo Fujii:
Experimental Verification of Frequency-Correlation in Radio Propagation Characteristics for Radio Environment Recognition. 274-278 - Yoonkyung Jang, Ahreum Shin, Myeongseung Han, Intae Ryoo:

3-D GM-MAC with Fixed Sensor Nodes for Stability Improvement. 279-283 - Yan Kyaw Tun

, Shashi Raj Pandey
, Madyan Alsenwi, Chit Wutyee Zaw, Choong Seon Hong
:
Weighted Proportional Allocation Based Power Allocation in Wireless Network Virtualization for Future Wireless Networks. 284-289 - Jinhyeok Park, Hoki Baek

, Jaesung Lim:
A Dynamic TDMA Scheme for UAV Based Relay in Combat Net Radio Networks. 290-295 - Mee Hong Ling, Kok-Lim Alvin Yau:

Can Reinforcement Learning Address Security Issues? an Investigation into a Clustering Scheme in Distributed Cognitive Radio Networks. 296-300 - Natasa Zivic, Christoph Ruland

, Jochen Sassmannshausen:
Distributed Ledger Technologies for M2M Communications. 301-306 - Chih-Min Chao, Chia-Tsun Chen, Sin-Jhong Huang:

An Adjustable Channel Hopping Algorithm Based on Channel Usage Ratio for Multi-Radio CRNs. 307-309 - Johannes Goltz

, Thomas Mundt, Simeon Wiedenmann
:
Risk Analysis in Fieldbus Networks Using the Example of KNX. 310-315 - Azusa Iikubo, Shou-Chih Lo:

Design of Power Saving Schemes for the IoT. 316-319 - Wentao Zhou, Yoan Shin:

Application of OFDM in Underwater Magnetic Induction Communication. 320-323 - Keitaro Terada, Hiroaki Mukai, Tetsuya Yokotani:

Enhancement of MAC Protocol for Power Reduction in LoRa WAn. 324-326 - Daiki Takemura, Atsusuke Murata, Kensei Miyakoshi, Tetsuya Yokotani, Yasunori Kobayashi, Yasuhiro Kobayashi:

System Designing and Plototyping on IoT for a Factory. 327-329 - Shota Uchiyama, Yutaro Yanagida, Masahiro Murakami, Osamu Mizuno:

The Urban-Area Mitigation System for Providing Information and its Generalization. 330-335 - Keigo Kimura, Kandai Mochizuki, Masafumi Koike, Osamu Mizuno:

Data Transfer Methods for Information-Centric Networking-Based Wireless Sensor Network Platform. 336-341 - Bum Il Hong, Intae Ryoo, Gon Khang:

On a Posteriori Error Bounds of Trapezoidal Rule. 342-344 - Jeongmin Moon, Mukoe Cheong, Ikjun Yeom, Honguk Woo:

Deep Reinforcement Learning Based Sensor Data Management for Vehicles. 345-349 - Krisada Sangsanit, Chian Techapanupreeda:

NodeMCU Choreography Automation by CoAP. 350-353 - Yuya Sasaki, Tetsuya Yokotani, Hiroaki Mukai:

MQTT over VLAN for Reduction of Overhead on Information Discovery. 354-356 - Chung-Ming Huang, Zhong-You Wu, Shih Yang Lin:

The Mobile Edge Computing (MEC)-Based VANET Data Offloading Using the Staying-Time-Oriented k-Hop Away Offloading Agent. 357-362 - Yoshiki Kuwabara, Yudai Matsuno, Kan Akutsu, Hiroaki Mukai, Tetsuya Yokotani:

Evaluation of Multiplexing on the Characteristics of Surveillance Camera Data Traffic. 363-365 - Youngpin Kim, Sungwon Ahn, Nguyen Canh Thang

, DongHo Choi, Minho Park:
ARP Poisoning Attack Detection Based on ARP Update State in Software-Defined Networks. 366-371 - Dohyun Kwon, Joongheon Kim

:
Optimal Trajectory Learning for UAV-BS Video Provisioning System: A Deep Reinforcement Learning Approach. 372-374 - Tuan V. Ha, Doan B. Hoang:

Toward an Active Aging Society: An IT Model to Engage the Aging Population. 375-380 - Jin Qiang Goh, Hwee-Pink Tan, Hwee-Xian Tan:

Quantifying Activity Levels of Community-Dwelling Seniors Through Beacon Monitoring. 381-386 - Ryota Kurokawa, Go Hasegawa, Masayuki Murata:

Biochemical-Inspired Autonomous Control of Virtualized Network Functions. 387-392 - Muhammad Hanif

, Hyeongdeok Yoon, Choonhwa Lee:
Benchmarking Tool for Modern Distributed Stream Processing Engines. 393-395 - Akashah Arshad, Zurina Mohd Hanapi

, Shamala K. Subramaniam, Rohaya Latip:
Performance Evaluation of the Geographic Routing Protocols Scalability. 396-398 - Jiwon Min, Youngseok Lee:

An Experimental View on Fairness between HTTP/1.1 and HTTP/2. 399-401 - Ahreum Shin, Myeongseung Han, Yoonkyung Jang, Intae Ryoo:

Anchor-Based Group Relay MAC. 402-407 - Yuya Kumai, Koki Hongyo, Tomotaka Kimura

, Kouji Hirata:
Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling. 408-410 - Taketo Fukushima, Masamitsu Iio, Kouji Hirata, Miki Yamamoto:

Popularity-Based Content Cache Management for in-Network Caching. 411-413 - Tomotaka Kimura

, Chinthaka Premachandra
:
Aggressive Recovery Scheme for Multicast Communication in Intermittently Connected Mobile Ad-Hoc Networks. 414-416 - Tetsuya Noguchi, Osamu Takyu, Takeo Fujii, Tomoaki Ohtsuki

:
Performance Evaluation of Information-Sharing Scheme Among Multiple Destinations with Mirroring Null Steering in Single Antenna Networks. 417-420 - Shuhei Yamasaki, Osamu Takyu, Keiichiro Shirai, Takeo Fujii, Mai Ohta, Fumihito Sasamori, Shiro Handa:

Data Separation Considering Smoothness of Sensing Data in Physical Wireless Parameter Conversion Sensor Networks. 421-423 - Kenji Fukui, Koji Tsubouchi, Shigeru Iwashina:

A Comparative Study on Anchorless Routing in 5G System. 424-426 - Moonjoong Kang, Jun-Sik Shin, JongWon Kim:

Protected Coordination of Service Mesh for Container-Based 3-Tier Service Traffic. 427-429 - Atsuko Yokotani, Satoshi Ohzahata, Ryo Yamamoto

, Toshihiko Kato:
A Dynamic Cache Size Assignment Method with Bandwidth Reservation for CCN. 430-435 - JinCheol Kwon, Namgon Lucas Kim, Moonjoong Kang, Jong WonKim:

Design and Prototyping of Container-Enabled Cluster for High Performance Data Analytics. 436-438 - Junhyun Park, Youngjune Oh, HyungHo Byun

, Chong-kwon Kim:
Low Cost Fine-Grained Air Quality Monitoring System Using LoRa WAN. 439-441 - Sinan Emre Tasçi, Ömer Korçak:

On Fair and Efficient Bandwidth Sharing in User Provided Networks. 442-447 - Kitae Kim

, Jared Lynskey, Seok Won Kang, Choong Seon Hong
:
Prediction Based Sub-Task Offloading in Mobile Edge Computing. 448-452 - Kyoungjae Sun, Younghan Kim:

PMIP-Based Distributed Session Mobility Management for 5G Mobile Network. 453-456 - Myeongseung Han, Eunsung Cho, Jun-Hyuk Lee, Intae Ryoo:

A Study on Fault Tolerance Technique for AGR-MAC Protocol Based Sensor Networks. 457-460 - Woojin Shim, Keecheon Kim:

A Study on Communication Optimization in Multi-SDN Controller. 461-464 - Yena Jeong, DongYeop Hwang, Ki-Hyung Kim:

Blockchain-Based Management of Video Surveillance Systems. 465-468 - JaeSik Cho, DongYeop Hwang, Ki-Hyung Kim:

Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment. 469-472 - Tong-Sheng Wong, Gaik-Yee Chan, Fang-Fang Chua:

Adaptive Preventive and Remedial Measures in Resolving Cloud Quality of Service Violation. 473-479 - Ali Gohar

, Ali Raza, Sanghwan Lee:
Dynamic Adaptive Streaming Over HTTP Using Scalable Video Coding with Multipath TCP in SDN. 480-484 - Sang Il Kim, Hwa Sung Kim:

Dynamic Service Function Chaining by Resource Usage Learning in SDN/NFV Environment. 485-488 - Yongseon Ji, Suhwan Bae, Yongtae Shin:

A Personal Information Management Using BlockChain. 489-493

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














