


Остановите войну!
for scientists:


default search action
25th ISCC 2020: Rennes, France
- IEEE Symposium on Computers and Communications, ISCC 2020, Rennes, France, July 7-10, 2020. IEEE 2020, ISBN 978-1-7281-8086-1
- Zhong Guan, Gang Xiong, Zhen Li, Gaopeng Gou:
ResTor: A Pre-Processing Model for Removing the Noise Pattern in Flow Correlation. 1-6 - Rui Lebre
, Eduardo Pinho, Jorge Miguel Silva
, Carlos Costa
:
Dicoogle Framework for Medical Imaging Teaching and Research. 1-7 - Clayson Celes, Azzedine Boukerche, Antonio A. F. Loureiro:
MOP: A Novel Mobility-Aware Opportunistic Routing Protocol for Connected Vehicles. 1-6 - Meng Luo, Qiuyun Wang
, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. 1-7 - Panagiotis Fountas
, Kostas Kolomvatsos:
A Continuous Data Imputation Mechanism based on Streams Correlation. 1-6 - Thiago José Barbosa Lima
, Flávio Henrique Duarte de Araújo, Antonio Oseas de Carvalho Filho, Ricardo de Andrade Lira Rabelo, Rodrigo de Melo Souza Veras
, Mano Joseph Mathew:
Evaluation of data balancing techniques in 3D CNNs for the classification of pulmonary nodules in CT images. 1-6 - Dyego H. L. Oliveira, Francisco M. V. Filho, Thelmo P. de Araujo, Joaquim Celestino Jr., Rafael L. Gomes:
Adaptive Model for Network Resources Prediction in Modern Internet Service Providers. 1-6 - Guillaume Le Gall, Nicolas Montavont, Georgios Z. Papadopoulos:
Enabling IEEE 802.15.4-2015 TSCH based Wireless Network for Electric Vehicle Battery Management. 1-6 - Miguel Ribeiro
, Valentina Nisi, Catia Prandi
, Nuno Nunes:
A data visualization interactive exploration of human mobility data during the COVID-19 outbreak: a case study. 1-6 - Dahina Koulougli, Kim Khoa Nguyen, Mohamed Cheriet:
Hierarchical Path Computation With Flexible Ethernet In Multi-layer Multi-domain Networks. 1-6 - Anderson M. Maliszewski, Eduardo Roloff, Emmanuell D. Carreño, Dalvan Griebler, Luciano Paschoal Gaspary, Philippe O. A. Navaux:
Performance and Cost-aware HPC in Clouds: A Network Interconnection Assessment. 1-6 - Yan Yang, Xingang Shi, Xia Yin, Zhiliang Wang, Xingyu Zhou:
The Understanding and Forecast of AS-Level Anycast Path Inflation. 1-7 - Antonio Corradi
, Giuseppe Di Modica
, Luca Evangelisti, Anna Fiorini, Luca Foschini
, Luca Zerbini:
HS-AUTOFIT: a highly scalable AUTOFIT application for Cloud and HPC environments. 1-6 - Shie-Yuan Wang, Jui-En Chang, Hsin Fan, Yi-Hsiu Sun:
Performance Comparisons of NB-IoT, LTE Cat-M1, Sigfox, and LoRa Moving at High Speeds in the Air. 1-6 - Rongchun Li, Xin Zhou, Hengyue Pan, Huayou Su, Yong Dou:
A High-Throughput LDPC Decoder Based on GPUs for 5G New Radio. 1-7 - Cristopher G. S. Freitas, Osvaldo Anibal Rosso, André L. L. de Aquino:
Mapping Network Traffic Dynamics in the Complexity-Entropy Plane. 1-6 - Edvar Afonso, Miguel Elias M. Campista
:
Opportunistic Data Gathering in IoT Networks using Discrete Optimization. 1-6 - Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. 1-7 - Caitlin Facchina, Arunita Jaekel:
Speed Based Distributed Congestion Control Scheme for Vehicular Networks. 1-4 - Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin:
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation. 1-7 - Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda:
Security and Performance Evaluation of Master Node Protocol in the Bitcoin Peer-to-Peer Network. 1-6 - Linda Senigagliesi
, Gianluca Ciattaglia, Ennio Gambi:
Contactless Walking Recognition based on mmWave RADAR. 1-4 - Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallègue:
A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient's WMSN. 1-6 - Christian Lübben, Marc-Oliver Pahl
, Mohammad Irfan Khan:
Using Deep Learning to Replace Domain Knowledge. 1-6 - Masaki Aota, Hideaki Kanehara, Masaki Kubo, Noboru Murata
, Bo Sun, Takeshi Takahashi:
Automation of Vulnerability Classification from its Description using Machine Learning. 1-7 - Jiaxian Wu, Shuangjuan Li, Qiong Huang:
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks. 1-6 - Taishi Nishiyama, Atsutoshi Kumagai, Kazunori Kamiya, Kenji Takahashi:
SILU: Strategy Involving Large-scale Unlabeled Logs for Improving Malware Detector. 1-7 - Li Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin:
PIV4DB: Probabilistic Integrity Verification for Cloud Database. 1-7 - Imane Taibi, Yassine Hadjadj Aoul, Chadi Barakat
:
Data Driven Network Performance Inference From Within The Browser. 1-6 - Lucas Martins Figueiredo, Edelberto Franco Silva:
Cognitive-LoRa: adaptation-aware of the physical layer in LoRa-based networks. 1-6 - Eder Paulo Pereira, Edson Luiz Padoin, Roseclea Duarte Medina, Jean-François Méhaut
:
Increasing the efficiency of Fog Nodes through of Priority-based Load Balancing. 1-6 - Furkan Koltuk, Ece Güran Schmidt
:
A Novel Method for the Synthetic Generation of Non-I.I.D Workloads for Cloud Data Centers. 1-6 - Karla K. Hashiguchi, Bruno de F. Gai, Daniel F. Pigatto, Keiko V. O. Fonseca:
Exploratory Analysis of Public Transportation Data of Curitiba, Brazil. 1-6 - Shitong Cheng, Zhenghui Xu, Xiuhua Li, Xiongwei Wu, Qilin Fan, Xiaofei Wang, Victor C. M. Leung:
Task Offloading for Automatic Speech Recognition in Edge-Cloud Computing Based Mobile Networks. 1-6 - Claudio Badii
, Stefano Bilotta, Daniele Cenni
, Angelo Difino, Paolo Nesi, Irene Paoli, Michela Paolucci:
Real-Time Automatic Air Pollution Services from IOT Data Network. 1-6 - Vincent Savaux, Luc Le Magoarou:
On the Computation of Integrals of Bivariate Gaussian Distribution. 1-6 - JiChu Jiang, Murat Simsek, Burak Kantarci, Shahzad Khan:
High Precision Deep Learning-Based Tabular Position Detection. 1-7 - Lars Wüstrich, Marc-Oliver Pahl
, Stefan Liebald:
Towards an Extensible IoT Security Taxonomy. 1-6 - Amira Chriki
, Haifa Touati, Hichem Snoussi, Farouk Kamoun:
UAV-based Surveillance System: an Anomaly Detection Approach. 1-6 - Tariq Benmansour, Samira Moussaoui, Toufik Ahmed, Oussama Boutaghou:
Server-Based Secure Key Management for the IEEE 802.15.6 standard. 1-6 - Jin Xu, Zishan Li, Bowen Du, Miaomiao Zhang, Jing Liu:
Reluplex made more practical: Leaky ReLU. 1-7 - Kilian Becher, Thorsten Strufe:
Efficient Cloud-based Secret Shuffling via Homomorphic Encryption. 1-7 - Lili Zhu, Petros Spachos:
Food Grading System Using Support Vector Machine and YOLOv3 Methods. 1-6 - Ce Chi, Kaixuan Ji, Avinab Marahatta
, Fa Zhang, Youshi Wang, Zhiyong Liu:
An Incentive Mechanism for Improving Energy Efficiency of Colocation Data Centers Based on Power Prediction. 1-6 - Ping Peng, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC. 1-7 - Lucas Pacheco, Helder M. N. S. Oliveira, Denis do Rosário, Eduardo Cerqueira, Leandro Villas, Torsten Braun
:
Service Migration for Connected Autonomous Vehicles. 1-6 - Chengshang Hou, Gaopeng Gou, Junzheng Shi, Peipei Fu, Gang Xiong:
WF-GAN: Fighting Back Against Website Fingerprinting Attack Using Adversarial Learning. 1-7 - Diego Pennino
, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini
:
Binding of Endpoints to Identifiers by On-Chain Proofs. 1-6 - Andrea Sciandra
:
COVID-19 Outbreak through Tweeters' Words: Monitoring Italian Social Media Communication about COVID-19 with Text Mining and Word Embeddings. 1-6 - Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
On the Applicability of Secret Share Algorithms for Osmotic Computing. 1-6 - Ali Malik, Ruairí de Fréin:
A Proactive-Restoration Technique for SDNs. 1-6 - Liam Hickey, Martin Harrigan
:
The Bisq DAO: On the Privacy Cost of Participation. 1-6 - Jean Moraes, Nagib Matni, André Riker
, Helder M. N. S. Oliveira, Eduardo Cerqueira, Cristiano Both, Denis do Rosário:
An Efficient Heuristic LoRaWAN Adaptive Resource Allocation for IoT Applications. 1-6 - Kais Bouallegue, Matthieu Crussière, Sofiane Kharbech:
SVM Assisted Primary User-Detection for Non-Cooperative Cognitive Radio Networks. 1-5 - Tales Lopes, Victor Ströele
, Mario A. R. Dantas, Regina Braga, Jean-François Méhaut
:
A Parallel Graph Partitioning Approach to Enhance Community Detection in Social Networks. 1-6 - Zhilei Liu, Tao Lin, Liang Dai, Jiyan Sun, Yanjie Hu, Yan Zhang, Zhen Xu:
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks. 1-7 - Sanaz Gheibi, Tania Banerjee, Sanjay Ranka
, Sartaj Sahni:
Cache Efficient Louvain with Local RCM. 1-6 - Beakal Gizachew Assefa
, Öznur Özkasap, Ipek Kizil, Moayad Aloqaily
, Ouns Bouachir:
Energy Efficiency in SDDC: Considering Server and Network Utilities. 1-6 - Amaury Bouchra Pilet
, Davide Frey
, François Taïani
:
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service. 1-6 - Diego A. B. Moreira, Levy G. Chaves
, Rafael L. Gomes, Joaquim Celestino Jr.:
An E-Health system for data stream analysis. 1-6 - Ahmed Alioua, Samiha Simoud, Sihem Bourema, Manel Khelifi
, Sidi-Mohammed Senouci:
A Stackelberg Game Approach for Incentive V2V Caching in Software-Defined 5G-enabled VANET. 1-6 - Candong Rong, Gaopeng Gou, Mingxin Cui, Gang Xiong, Zhen Li, Li Guo:
MalFinder: An Ensemble Learning-based Framework For Malicious Traffic Detection. 1-7 - Chunjing Han, Kunkun Sun, Haina Tang, Yulei Wu, Xiaodan Zhang:
AFT-Anon: A scaling method for online trace anonymization based on anonymous flow tables. 1-7 - Christelle Caillouet
, Martin Heusse, Franck Rousseau
:
Bringing Fairness in LoRaWAN through SF Allocation Optimization. 1-6 - Riqiang Liu, Melike Erol-Kantarci:
Dynamic Routing with Online Traffic Estimation for Video Streaming over Software Defined Networks. 1-6 - Yara Mahfood Haddad, Hesham H. Ali:
A Dynamic Approach for Managing Heterogeneous Wireless Networks in Smart Environments. 1-7 - Evangelos Boutas, Charalambia Boulougari, Vasileios Anastasopoulos, Ismini Veneti, George Kousiouris
:
A cloud-based REST platform for real-time health resources availability registering, discovering and matching in pandemic crisis conditions. 1-6 - Lucas Zanco Ladeira, Allan Mariano de Souza, Heitor S. Ramos, Leandro Aparecido Villas:
GIN: Better going safe with personalized routes. 1-6 - F. Cavaliere, Antonio Della Cioppa, Angelo Marcelli, Antonio Parziale
, Rosa Senatore:
Parkinson's Disease Diagnosis: Towards Grammar-based Explainable Artificial Intelligence. 1-6 - Anandhakumar Palanisamy, Mirsat Sefidanoski, Spiros Koulouzis
, Carlos Rubia, Nishant Saurabh
, Radu Prodan:
Decentralized Social Media Applications as a Service: a Car-Sharing Perspective. 1-7 - Stefan Ciprian Voinea, Armir Bujari, Claudio Enrico Palazzi:
Air Quality Control through Bike Sharing Fleets. 1-4 - Alessandro Piccoli, Marc-Oliver Pahl
, Lars Wüstrich:
Group Key Management in constrained IoT Settings. 1-6 - Zijin Chen, Hui Tian, Gaofeng Nie, Baoling Liu:
AWMF: All-Weighted Metric Factorization for Collaborative Ranking. 1-6 - Francesca Bassi, Hatem Ibn-Khedher:
HARQ-aware allocation of computing resources in C-RAN. 1-6 - Alkhansaa A. Abuhashim, Chiu C. Tan:
Smart Contract Designs on Blockchain Applications. 1-4 - Mirko Zichichi
, Stefano Ferretti, Gabriele D'Angelo:
On the Efficiency of Decentralized File Storage for Personal Information Management Systems. 1-6 - Marek Barczyk, Andrzej Chydzinski
:
Experimental testing of the performance of packet dropping schemes. 1-7 - Edson Rodrigues, Denis do Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira:
Routing, Modulation, Spectrum and Core Allocation Based on Mapping Scheme. 1-6 - Itamir de Morais Barroca Filho
, Silvio Costa Sampaio, Anderson Paiva Cruz
, Victor Hugo Freire Ramalho, Jefferson Augusto Rodrigues de Azevedo, Átila Caetano da Silveira:
A Web-based Information System for the Management of ICU Beds During the Coronavirus Outbreak. 1-4 - Min He, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9. 1-6 - Olasupo Ajayi
, Antoine B. Bagula, Ifeoma Chukwubueze, Hloniphani Maluleke:
Priority Based Traffic Pre-emption System for Medical Emergency Vehicles in Smart Cities. 1-7 - Brice Leblanc, Hacène Fouchal
, Cyril de Runz:
Obstacle Detection based on Cooperative-Intelligent Transport System Data. 1-6 - Li Zhang, Shukui Zhang, Yang Zhang, Wei Tuo, Ye Tao, Mengli Dang:
Task Distribution Based on Variable-Order Markov Position Estimation in Mobile Sensor Networks. 1-7 - Joseph Azar, Abdallah Makhoul, Raphaël Couturier:
Using DenseNet for IoT multivariate time series classification. 1-6 - Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. 1-7 - Wei Cai, Gaopeng Gou, Peipei Fu, Minghao Jiang, Zhen Li, Gang Xiong:
JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion. 1-7 - Maria Fazio, Alina Buzachis, Antonino Galletta, Antonio Celesti, Massimo Villari:
A proximity-based indoor navigation system tackling the COVID-19 social distancing measures. 1-6 - Carlos Pedroso, Yan Uehara de Moraes
, Michele Nogueira, Aldri Santos:
Managing Consensus-Based Cooperative Task Allocation for IIoT Networks. 1-6 - Tania Alhajj, Xavier Lagrange:
Reliability and Low Latency: Impact of The Architecture. 1-6 - Yu-Chen Chen, Yi-Wei Ma, Jiann-Liang Chen:
Intelligent Malicious URL Detection with Feature Analysis. 1-5 - Mohamed Redha Bouakouk, Abdelkrim Abdelli, Lynda Mokdad:
Survey on the Cloud-IoT paradigms: Taxonomy and architectures. 1-6 - Ryunosuke Nagayama, Ryohei Banno, Kazuyuki Shudo:
Identifying Impacts of Protocol and Internet Development on the Bitcoin Network. 1-6 - Stefano Silvestri
, Francesco Gargiulo, Mario Ciampi, Giuseppe De Pietro:
Exploit Multilingual Language Model at Scale for ICD-10 Clinical Text Classification. 1-7 - Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Hicham Lakhlef:
An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks. 1-6 - Francesco Bruschi, Manuel Tumiati, Vincenzo Rana, Mattia Bianchi, Donatella Sciuto:
A Decentralized System for Fair Token Distribution and Seamless Users Onboarding. 1-6 - Mateus Gonçalo do Nascimento, Gabriel Iorio, Thiago G. Thomé
, Álvaro Augusto M. de Medeiros
, Fabricio Martins Mendonça, Fernanda C. A. Campos, José Maria N. David, Victor Ströele
, Mario A. R. Dantas:
Covid-19: A Digital Transformation Approach to a Public Primary Healthcare Environment. 1-6 - Ivan Martinez, Fabienne Nouvel, Samer Lahoud, Philippe Tanguy, Melhem El Helou:
On the Performance Evaluation of LoRaWAN with Re-transmissions under Jamming. 1-7 - Zhen Cao, Yu-e Sun, He Huang, Hansong Guo, Yang Du, An Liu, Le Lu:
Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems. 1-7 - Ana Czarnitzki Estrin, Tomás Lagos Jenschke
, Georgios Z. Papadopoulos, J. Ignacio Alvarez-Hamelin
, Nicolas Montavont:
Thorough Investigation of multipath Techniques in RPL based Wireless Networks. 1-7 - Roberto Gonçalves Pacheco, Rodrigo S. Couto
:
Inference Time Optimization Using BranchyNet Partitioning. 1-6 - Daniele Berardini
, Lucia Migliorelli, Sara Moccia, Marcello Naldini, Gioia De Angelis, Emanuele Frontoni:
Evaluating the autonomy of children with autism spectrum disorder in washing hands: a deep-learning approach. 1-7 - Marc Jayson Baucas, Petros Spachos:
Fog and IoT-based Remote Patient Monitoring Architecture Using Speech Recognition. 1-6 - Daniel Carvalho, Laécio Rodrigues, Patricia Takako Endo
, Sokol Kosta
, Francisco Airton Silva:
Mobile Edge Computing Performance Evaluation using Stochastic Petri Nets. 1-6 - Nikita Karandikar, Antorweep Chakravorty, Chunming Rong
:
RenewLedger : Renewable energy management powered by Hyperledger Fabric. 1-6 - Dali Zhu, Long Yang, Zhanxun Li, Hualin Zeng:
Remote Speech Extraction from Speckle Image by Convolutional Neural Network. 1-6 - Ali Malik, Ruairí de Fréin:
SLA-Aware Routing Strategy for Multi-Tenant Software-Defined Networks. 1-7 - Yazid M. Khattabi
, Salim Abdelkareem Alkhawaldeh:
Spatial Modulation under Vehicular Rayleigh Fading Channels. 1-6 - Miguel Silva, Miguel Luís, Susana Sargento:
Edge Virtualization in Multihomed Vehicular Networks. 1-6 - Armando Ruggeri
, Maria Fazio, Antonino Galletta, Antonio Celesti, Massimo Villari:
A Decision Support System for Therapy Prescription in a Hospital Centre. 1-4 - Mariana Rodrigues, Daniel F. Pigatto, Kalinka R. L. J. C. Branco:
Context-Aware Operation for Unmanned Systems with HAMSTER. 1-6 - Antoine B. Bagula, Hloniphani Maluleke, Olasupo Ajayi
, Amani Bagula, Nancy Bagula, Moise Bagula:
Predictive Models for Mitigating COVID-19 Outbreak. 1-7 - Giacomo Mambelli, Catia Prandi
, Silvia Mirri:
What influences sentiment analysis on social networks: a case study. 1-6 - Xiren Ma, Azzedine Boukerche:
An AI-based Visual Attention Model for Vehicle Make and Model Recognition. 1-6 - Murat Simsek, Burak Kantarci, Azzedine Boukerche:
Knowledge-Based Machine Learning Boosting for Adversarial Task Detection in Mobile Crowdsensing. 1-7 - Giusy Esposito, Giulio Pagliari, Gianluca Coppola, Marco Aiello
, Marco Salvatore
, Giuseppe Aceto, Antonio Pescapè:
A network performance view of a biobanking system for diagnostic images. 1-7