


default search action
ITNAC 2018: Sydney, Australia
- 28th International Telecommunication Networks and Applications Conference, ITNAC 2018, Sydney, Australia, November 21-23, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7177-1

- Chakkaphong Suthaputchakun, Yue Cao

:
Rescue Mission Enhancement through Ambulance-to- Vehicle Communications. 1-6 - Shahriar Shirvani Moghaddam, Mahyar Shirvanimoghaddam

, Ameneh Habibzadeh:
Clustering-based Handover and Resource Allocation Schemes for Cognitive Radio Heterogeneous Networks. 1-6 - Gerald Ostermayer, Christian Backfrieder, Manuel Lindorfer:

Dynamic Vehicular Traffic Load Quantification by Considering Intermittent Unused Road Space. 1-8 - Di Zhang, Huadong Ma, Dong Zhao, Lei Kuang:

NC-MapCast: Network Coding based Multi-Attribute Profile-Cast in Mobile Opportunistic Networks. 1-6 - Qichang Chen, Rixin Li, Hongbiao Zhang, Shuai Xiao, Qiwen Zhong, Desheng Sun, Lehong Niu, Li Ding, Sen Zhang:

Towards an Unified Multi-service Ethernet Transport Network(ETN). 1-6 - Franciscus X. A. Wibowo, Mark A. Gregory:

Multi-domain Software Defined Network Provisioning. 1-7 - Chenchen Liu, Jing Zhao, Jiaxi Zhou, Zhengyu Zhang, Weilong Ren:

Joint Design of Relay-User Selection in Direct-link Energy Harvesting Relay Networks. 1-4 - Ayub Bokani

, Jahan Hassan
, Salil S. Kanhere
:
Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge Computing. 1-6 - Hongjun Yu

, Cheng-Chew Lim
, Robert A. Hunjet
:
Enabling Energy Efficient Data Ferrying. 1-6 - Quanrun Chen, Tao Zhang, Weibo Zheng:

Optimization of LED Layout to Improve Uniformity of Illumination and SNR for Indoor Visible Light Communication. 1-3 - Dae-Kyo Jeong

, Dongwoo Kim:
Power Allocation and Outage Analysis for Cognitive Radio with Jamming Signal under Primary Secrecy Outage Constraint. 1-6 - Weilong Ren, Letian Li, Yanjun Yao, Chenchen Liu, Shuo Wang:

Sleep-based Resource Allocation Algorithm for Inter-Femto Interference Mitigation. 1-6 - Davide Berardi, Franco Callegati

, Andrea Melis
, Marco Prandini
:
Security network policy enforcement through a SDN framework. 1-4 - Wael Hosny Fouad Aly, Yehia Kotb

:
Towards SDN Fault Tolerance using Petri-Nets. 1-3 - Luyao Wang, Kwan-Wu Chin

:
On Emptying Small Satellite Networks with In-Network Data Aggregation. 1-8 - Ikuya Kitamura, Hong Zhou, Kazuo Kumamoto, Fengping Yan:

A Study on Fiber-Optic Relaying Scheme Using Spatial Modulation for MIMO Transmissions. 1-4 - Habiba Akter, Chris Phillips:

Are Internet Tunnels Worthwhile? 1-6 - Farzaneh Pakzad, Marius Portmann

, Thierry Turletti, Thierry Parmentelat, Mohamed Naoufal Mahfoudi, Walid Dabbous:
R2Lab Testbed Evaluation for Wireless Mesh Network Experiments. 1-6 - Mahbuba Sheba Ullah, Ahmed H. Tewfik:

Beam Detection Analysis for 5G mmWave Initial Acquisition. 1-8 - Talha Younas, Jiandong Li, Jehangir Arshad Meo

, Muluneh Mekonnen Tulu
, Hafiz Mudassir Munir
:
New Framework for analysis Of Energy Efficiency in massive MIMO With Hardware Impairments. 1-3 - Mohammed S. Aloqlah, Reem A. Alzubaidi:

Energy-Detection performance for SIMO Cognitive Radio Systems with Selection Combining over κ -μ Shadowed Fading Channels. 1-6 - Kamran Zia

, Hifsa Iram, Muhammad Aziz Ul Haq, Aasim Zia:
Comparative study of classification techniques for indoor localization of mobile devices. 1-5 - Jiajia Guo

, Caidong Gu, Si Chen, Hongwei Du, Xiaoxiao Wang, Jihong Yu
, Wei Gong:
Channel-based Rate Selection for Commodity RFID Networks. 1-6 - Miraj Asghar, Robin Ram Mohan Doss

, Lei Pan
:
A Scalable and Efficient PKI Based Authentication Protocol for VANETs. 1-3 - Vijaya Durga Chemalamarri, Robin Braun

, Justin Lipman
, Mehran Abolhasan
:
A Multi-agent Controller to enable Cognition in Software Defined Networks. 1-5 - Ogbonnaya Anicho

, Philip B. Charlesworth, Gurvinder S. Baicher, Atulya Nagar
:
Integrating Routing Schemes and Platform Autonomy Algorithms for UAV Ad-hoc & Infrastructure based networks. 1-5 - Masud Rana, Mazed Rayhan Shuvo:

Detection of Primary User Emulation Attack in Sensor Networks. 1-6 - Jaime Galán-Jiménez

, Javier Berrocal
, José García-Alonso
, Carlos Canal, Juan Manuel Murillo:
Situational and Adaptive Context-Aware Routing for Opportunistic IoT Networks. 1-6 - Da-Ren Chen, Ming-Yang Hsu, Hao-Yen Chang:

Context-Aware and Energy-Efficient Protocol for the Distributed Wireless Sensor Networks. 1-6 - Bihuan Chen, Zhixiong Tan, Wei Fang:

Blockchain-Based Implementation for Financial Product Management. 1-3 - Supreet Singh:

Performance Analysis of Energy Harvesting based Two-way Multi-Relay Wireless Network. 1-6 - Quentin Schueller, Kashinath Basu, Muhammad Younas, Mohit Patel, Frank Ball:

A Hierarchical Intrusion Detection System using Support Vector Machine for SDN Network in Cloud Data Center. 1-6 - Xiaoyu Wang, Xiao Lin, Weiqiang Sun, Malathi Veeraraghavan:

Comparison of Two Sharing Modes for a Proposed Optical Enterprise-Access SDN Architecture. 1-8 - Lincy Elizebeth Jim, Mark A. Gregory:

AIS Reputation Mechanism in MANET. 1-6 - Anees Al-Najjar, Siamak Layeghy

, Marius Portmann
, Jadwiga Indulska
:
Enhancing Quality of Experience of VoIP Traffic in SDN based End-hosts. 1-8 - Rana Al Halaseh, Halil Alper Tokel, Subhodeep Chakraborty, Gholamreza Alirezaei, Rudolf Mathar:

Feature-Selection based PMU Placement for Detection of Faults in Power Grids. 1-6 - Ameer Shakayb Arsalaan, Hung Nguyen, Andrew Coyle:

Evaluating the Performance of QoI Algorithms in Realistic MANETs. 1-6 - Bipraneel Roy, Hon Cheung:

A Deep Learning Approach for Intrusion Detection in Internet of Things using Bi-Directional Long Short-Term Memory Recurrent Neural Network. 1-6 - Viktor Kelkkanen, Markus Fiedler:

A Test-bed for Studies of Temporal Data Delivery Issues in a TPCAST Wireless Virtual Reality Set-up. 1-3 - Emerson Cabrera, Rein Vesilo:

An Enhanced K-means Clustering Algorithm with Non-Orthogonal Multiple Access (NOMA) for MMC Networks. 1-8 - Sara A. Althubiti

, Eric Marcell Jones, Kaushik Roy:
LSTM for Anomaly-Based Network Intrusion Detection. 1-3 - Bradley Fraser

:
Data Ferry Flocking for Bulk Information Transfer Under Ferry Buffer Constraints. 1-6 - Siwen Xing, Ming Ding, Zihuai Lin

:
Outage Capacity Analysis for Ambient Backscatter Communication Systems. 1-6 - Zachary W. Lamb, Dharma P. Agrawal:

Context-Aware Mobile Edge Computing in Vehicular Ad-Hoc Networks. 1-7 - Viktor Kelkkanen, Markus Fiedler:

Coefficient of Throughput Variation as Indication of Playback Freezes in Streamed Omnidirectional Videos. 1-6 - Furqan Hameed Khan, Marius Portmann

:
Experimental Evaluation of LoRaWAN in NS-3. 1-8 - Anthony Dobson, Kaushik Roy, Xiaohong Yuan, Jinsheng Xu

:
Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection. 1-6 - Robert A. Minasian:

Advances in microwave photonic signal processing for 5G and IoT Keynote Paper. 1-4 - Humaira Abdul Salam, Franco Davoli

, Alessandro Carrega
, Andreas Timm-Giel
:
Towards Prediction of Power Consumption of Virtual Machines for Varying Loads. 1-6 - Yasser Mawad, Stefan Fischer:

HIDTN: Hybrid DTN and Infrastructure Networks for Reliable and Efficient Data Dissemination. 1-8 - Manpreet Singh, Sarbjeet Singh

, Nadesh Seen, Sakshi Kaushal, Harish Kumar:
Comparison of learning techniques for prediction of customer churn in telecommunication. 1-5 - Thi Minh Chau Nguyen, Doan B. Hoang:

S-MANAGE Protocol For Software-Defined IoT. 1-6 - Byeongok Choi, Chae Y. Lee:

Bit Rate and Task Scheduling in Cloud Computing for Multimedia Big Data. 1-5 - Christopher Metter, Valentin Burger, Zheng Hu, Ke Pei, Florian Wamser:

Towards an Active Probing Extension for the ONOS SDN Controller. 1-8 - Payal Tusharkumar Mahida, Seyed A. Shahrestani, Hon Cheung:

Comparision of pathfinding algorithms for visually impaired people in IoT based smart buildings. 1-3 - Khalid Hasan, Khandakar Ahmed

, Kamanashis Biswas
:
Performance Analysis of Polling Mechanism in WBAN. 1-4 - R. M. P. H. K. Rathnayake, M. Sajeewani Karunarathne, Nazmus Shaker Nafi

, Mark A. Gregory:
Cloud Enabled Solution for Privacy Concerns in Internet of Medical Things. 1-4 - Dawood Sheniar, Nabeel Mahdy Haddad

, David Martin, Ron Addie
, Shahab A. Abdullah:
Experiments and Proofs in Web-service Security. 1-6 - Jaebong Lim, Juhee Seo, Yunju Baek:

CamThings: IoT Camera with Energy-Efficient Communication by Edge Computing based on Deep Learning. 1-6 - Ruichen Luo, Ziqian Zhang, Xiaopeng Wang, Zihuai Lin

:
Wi-Fi Based Device-free Microwave Ghost Imaging Indoor Surveillance System. 1-6 - Nipun Sood

, Shamanth Nagaraju
, V. Sreejith
, Lucy J. Gudino:
Collaborative Neighbor Discovery with Slow Scan for Directional Sensor Networks. 1-3 - Maryam Pahlevan, Roman Obermaisser:

Redundancy Management for Safety-Critical Applications with Time Sensitive Networking. 1-7 - Ishtiaq Ahmad

, Gottfried Lechner, Ismail Shakeel
:
On the Error Rate Analysis of Distributed Transmit Beamforming. 1-4 - Hanjun Cho, Jongpil Jeong

:
Implementation and Performance Analysis of Power and Cost-Reduced OPC UA Gateway for Industrial IoT Platforms. 1-3 - Narayut Putjaika, Phond Phunchongharn, Khajonpong Akkarajitsakul, Unchalisa Taetragool:

Joint Mode Selection and Resource Allocation for Relay-Assisted Device-to-Device Networks. 1-6 - Mohammed M. A. Mohammed, Cuiwei He

, Jean Armstrong:
Iterative Decision-Directed Receiver for the Mitigation of Side-Effect Modulation in indoor VLC applications. 1-6 - Frank T. H. den Hartog

, Koen Dittrich
, Jan de Nijs:
Towards a viable business model for collaborative use of unlicensed frequency bands in densely populated areas. 1-6 - Ngoc-Thuy Le

, Doan B. Hoang:
Security threat probability computation using Markov Chain and Common Vulnerability Scoring System. 1-6 - Muhammad Towfiqur Rahman

, Masuduzzaman Bakaul, Rajendran Parthiban
:
Analysis of the effects of multiple reflection paths on high speed VLC system performance. 1-6 - Changyong Um, Jaehyeong Lee, Jongpil Jeong

:
Virtualized oneM2M System Architecture in Smart Factory Environments. 1-6 - Qingzhi Li, Ming Ding, Chuan Ma

, Chang Liu, Zihuai Lin
, Ying-Chang Liang
:
A Reinforcement Learning Based User Association Algorithm for UAV Networks. 1-6 - Ashish Rauniyar

, Paal Engelstad, Olav N. Østerbø:
RF Energy Harvesting and Information Transmission in IoT Relay Systems based on Time Switching and NOMA. 1-7 - Alessandro Carrega

, Matteo Repetto
:
Cloud Applications Consolidation through Context Information and Heuristic optimization. 1-7 - Arslan Musaddiq

, Yousaf Bin Zikria, Sung Won Kim:
Energy-Aware Adaptive Trickle Timer Algorithm for RPL-based Routing in the Internet of Things. 1-6 - Fahad Alkurdi, Ibrahim Elgendi

, Kumudu S. Munasinghe
, Dharmendra Sharma
, Abbas Jamalipour
:
Blockchain in IoT Security: A Survey. 1-4 - Jason Brown

, Jamil Y. Khan
:
Proximity Coordinated Random Access (PCRA) for M2M Applications in LTE-A. 1-3 - Muhammad Sajid Haroon, Ziaul Haq Abbas

, Ghulam Abbas, Fazal Muhammad:
Analysis of Interference Mitigation in Heterogeneous Cellular Networks using Soft Frequency Reuse and Load Balancing. 1-6 - James Jin Kang

:
Prediction of Personalised Life Expectancy using Personal Health Devices in mHealth Networks. 1-5 - Gladys Diaz

, Michelle Sibilla, Noemie Simoni:
Towards information modeling for a QoS-aware support in the lifecycle of virtual networks. 1-6 - Tyler Nicholas Edward Steane, Peter J. Radcliffe:

Multiple Intermittent Controllers for IoT Home Automation. 1-6 - Satoru Ohta:

A New Result on Rearrangeable 3-Stage Clos Networks. 1-6 - James Jin Kang

, Sitalakshmi Venkatraman:
An Integrated mHealth and Vehicular Sensor Based Alarm System Emergency Alarm Notification System for Long Distance Drivers using Smart Devices and Cloud Networks. 1-6 - Vinojitha Raghavan, David Airehrour

, Emmanuel Ndashimye
, Abdullahi B. Baffa:
PEGADyn: A Cluster-Based Energy Efficient Routing Protocol for Ad Hoc Networks. 1-6 - Nayankumar Patel, Swapnil Patel, Wee Lum Tan

:
Performance Comparison of WhatsApp versus Skype on Smart Phones. 1-3 - Bradley Fraser

:
Radio-Frequency Emitter Localisation Using a Swarm of Search Agents. 1-6 - Alhasani M. Mustafa, Quang Ngoc Nguyen

, Takuro Sato, Gen-Ichiro Ohta:
Four Single-Sideband M-QAM Modulation using Soft Input Soft Output Equalizer over OFDM. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














