


default search action
20th APNOMS 2019: Matsue, Japan
- 20th Asia-Pacific Network Operations and Management Symposium, APNOMS 2019, Matsue, Japan, September 18-20, 2019. IEEE 2019, ISBN 978-4-88552-320-5

- Asif Mehmood

, Talha Ahmed Khan, Javier Jose Diaz Rivera, Wang-Cheol Song:
Dynamic Auto-scaling of VNFs based on Task Execution Patterns. 1-4 - Ui-Jun Baek, Se-Hyun Ji, Jee-Tae Park, Min-Seob Lee, Jun-Sang Park, Myung-Sup Kim:

DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning. 1-4 - Hiroya Matsumoto, Bo Gu

, Osamu Mizuno:
A V2X Task Offloading Method Considering Automobiles' Behavior in Urban Area. 1-4 - Yueh-Hsien Lin, Chien-Wen Yang, Ting-Che Chuang, Min Liu, Min-Chia Chang:

An Integrated Network Monitoring System for SDN VPN. 1-4 - Yuji Saitoh, Tetsuya Uchiumi, Yukihiro Watanabe:

IT Resource Trend Analysis by Component Decomposition Based on Non-negative Matrix Factorization. 1-6 - Umer Majeed

, Choong Seon Hong
:
FLchain: Federated Learning via MEC-enabled Blockchain Network. 1-4 - Kosuke Sakata, Motomu Nakajima, Aiko Oi, Yuichi Suto, Yuji Soejima:

Evaluaion of assurance closed loop PoC for achieving scheduled maintenance in telecommunication carrier networks. 1-4 - Sheikh Salman Hassan

, Seok Won Kang, Choong Seon Hong
:
Unmanned Aerial Vehicle Waypoint Guidance with Energy Efficient Path Planning in Smart Factory. 1-4 - Shota Ono, Taku Yamazaki

, Takumi Miyoshi, Kaoru Sezaki:
Location-based Flooding Area Restriction for Mobile-assisted Ad Hoc Networks. 1-4 - Yen-Wen Chen, Chih-Hong Chang:

Effective Uplink Data Transmission Scheme for MTCDs in LTE-A Networks. 1-4 - Tsu-Kuang Lee, Tong-Wen Wang, Wen-Xuan Wu, Yu-Chiao Kuo, Shih-Hsuan Huang, Guan-Sheng Wang, Chih-Yu Lin, Jen-Jee Chen, Yu-Chee Tseng:

Building a V2X Simulation Framework for Future Autonomous Driving. 1-6 - Kitae Kim

, Choong Seon Hong
:
Optimal Task-UAV-Edge Matching for Computation Offloading in UAV Assisted Mobile Edge Computing. 1-4 - Hung-Huan Liu, Wei-Chien Chen, Pin-Chun Hsu:

Comparison of NVA and RLOWESS Algorithms in Indoor Positioning System. 1-4 - Yang Qin, Junjie Wei, Weihong Yang:

Deep Learning Based Anomaly Detection Scheme in Software-Defined Networking. 1-4 - Sandy H. Hsiao, Hong-Rong Chang, Yu-Han Lu, Chi-Yu Li

:
Mobility Support for Networks on Trains Using Commercial Off-the-shelf Routers. 1-4 - Woojin Seok, Jeonghoon Moon, Wontaek Hong, JaiSeung Kwak, Manhee Lee:

Store-and-Forward Data Transfer using Optimized Intermediate Node. 1-4 - Kensuke Takahashi, Ryota Katayanagi, Nobuo Onai, Miwaka Ohtani:

Support Method to Generate Catalogs for Orchestrator using Catalog Definition Templates. 1-4 - Yin-Hsin Liu, Yao-Chung Tu, Chang-Yu Hsu, Hsin-Chieh Chao:

Predicting malfunction of mobile network base station using machine learning approach. 1-4 - Se-Hyun Ji, Ui-Jun Baek, Mu-Gon Shin, Young-Hoon Goo, Jun-Sang Park, Myung-Sup Kim:

Best Feature Selection using Correlation Analysis for Prediction of Bitcoin Transaction Count. 1-6 - Tetsuya Uchiumi, Yuji Saitoh, Yukihiro Watanabe:

Automatic parameter tuning framework for performance diagnosis report. 1-6 - Po-Ruey Lei, Pei-Rong Yu, Wen-Chih Peng:

A Framework for Maritime Anti-Collision Pattern Discovery from AIS Network. 1-4 - Shao-Peng Lu, Min-Te Sun:

Detecting Road Conditions in Front of The Vehicle Using Off-The-Shelf Camera. 1-4 - Sabrina I. Soraya, Shao-Ping Chuang, Yu-Chee Tseng, Tsì-Uí Ik

, Yu-Tai Ching:
A Comprehensive Multisensor Dataset Employing RGBD Camera, Inertial Sensor and Web Camera. 1-4 - Qi Li, Xing Wang, Tao Zhao, Ying Wang, Zifan Li, Lanlan Rui:

An Improved Genetic Algorithm for the Scheduling of Virtual Network Functions. 1-4 - Yan-Wei Chen, Li-Hsing Yen, Wei-Cheng Wang, Cheng-An Chuang, Yu-Shen Liu, Chien-Chao Tseng

:
P4-Enabled Bandwidth Management. 1-5 - Gangsong Dong, Yi Jin, Shiwen Wang, Wencui Li, Zhuo Tao, Shaoyong Guo:

DB-Kmeans: An Intrusion Detection Algorithm Based on DBSCAN and K-means. 1-4 - Chen-Hsiang Chen, Yu-An Lin, Wei-Te Wu, Yao-Te Huang, Cha-Chin Chu:

Design and Implementation of IPv4 and IPv6 Provisioning Technologies for VPC Architecture. 1-4 - Chin-Lin Hu, Chao-Yu Hsu, Sod-Erdene Khuukhenbaatar, Yamkhin Dashdorj, Yongqiang Dong:

Path Selection with Joint Latency and Packet Loss for Edge Computing in SDN. 1-4 - Pai-Hui Wang, Tse-Han Wang

, Shih-Ting Lin, Pei-Wen Chen, Chien-Chao Tseng
, Jiun-Long Huang:
A Content-Centric Platform for Home Networks. 1-4 - Takayuki Warabino, Yusuke Suzuki, Masanori Miyazawa:

ROS-based Robot Development Toward Fully Automated Network Management. 1-4 - Min-Cheol Kim, Young-Tak Kim:

Smart Control for Energy Efficient Networking of IEEE 802.11ah-based IoT. 1-6 - Yi Han, Yao Zhang, Huilin Liu, Hecun Yuan, Lanlan Rui, Ying Wang:

A QoS-based Opportunistic Routing Mechanism in Social Internet of Vehicle. 1-4 - Madyan Alsenwi, Yan Kyaw Tun

, Shashi Raj Pandey
, Choong Seon Hong
:
A Hopfield Neural Networks Based Mechanism for Coexistence of LTE-U and WiFi Networks in Unlicensed Spectrum. 1-6 - Nguyen Minh Tri

, Syunya Nagata, Masato Tsuru:
Locating Delay Fluctuation-Prone Links by Packet Arrival Intervals in OpenFlow Networks. 1-6 - Aunas Manzoor

, DoHyeon Kim, Choong Seon Hong
:
Energy Efficient Resource Allocation in UAV-based Heterogeneous Networks. 1-4 - Mu-Gon Shin, Ui-Jun Baek, Kyu-Seok Shim, Jee-Tae Park, Sung-Ho Yoon, Myung-Sup Kim:

Block Analysis in Bitcoin System Using Clustering with Dimension Reduction. 1-4 - Faruk Açan

, Gürkan Gür
, Fatih Alagöz:
Reactive Controller Assignment for Failure Resilience in Software Defined Networks. 1-6 - Hye-Yeong Shin, DaeYong Kim, Soo Hoon Maeng, Kiyoung Lee, Hongtaek Ju:

Web Server for Analysis and Visualization of Bitcoin Data. 1-3 - Sumiyo Okada, Chunghan Lee

, Hitoshi Ueno, Tomohiro Ishihara:
Detecting Wireless LAN Bottlenecks Using TCP Connection Measurement at Traffic Aggregation Point. 1-6 - Meryam Essaid, DaeYong Kim, Soo Hoon Maeng, Sejin Park, Hongtaek Ju:

A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM. 1-6 - Koji Hayashi, Rina Ooka, Takumi Miyoshi, Taku Yamazaki

:
P2PTV Traffic Classification and Its Characteristic Analysis Using Machine Learning. 1-6 - Shinichi Kikuchi, Masaki Aida:

Method for Estimating the Damping Coefficient of Oscillation Dynamics in Networks. 1-4 - Wei Kuang Lai, Chia-Yu Hsu, Yu-Po Kuo:

QoS-guaranteed User Association and Resource Allocation with CoMP JT in Ultra-Dense Networks. 1-6 - Mengnan Cai

, Siye Wang
, Qinxuan Wu, Yijia Jin, Xinling Shen
:
DTCluster: A CFSFDP Improved Algorithm for RFID Trajectory Clustering Under Digital-twin Driven. 1-6 - Aiko Oi, Motomu Nakajima, Yuji Soejima, Mitsuho Tahara:

Reliable Design Method for Service Function Chaining. 1-4 - Yu Min Park, Minkyung Lee, Choong Seon Hong

:
Multi-UAVs Collaboration System based on Machine Learning for Throughput Maximization. 1-4 - Wei-Chiao Huang, Lo-Yao Yeh, Jiun-Long Huang:

A Monitorable Peer-to-Peer File Sharing Mechanism. 1-4 - Jiwon Bang, Mi-Jung Choi:

Design and Implementation of Storage System for Real-time Blockchain Network Monitoring System. 1-4 - Yuji Kojima, Kodo Ran, Yasuhiko Aoki, Takeshi Nishiyama:

Network design system recommending similar configurations characterized by manual knowledges. 1-4 - Atsushi Takada, Naoyuki Tanji, Toshihiko Seki, Kyoko Yamagoe, Yuji Soejima, Mitsuho Tahara:

SLA Driven Operation - optimizing telecom operation based on SLA -. 1-4 - Ashis Talukder, Choong Seon Hong

:
Susceptible-Infection-based Cost-effective Seed Mining in Social Networks. 1-6 - Yan Kyaw Tun

, Madyan Alsenwi, Shashi Raj Pandey
, Chit Wutyee Zaw, Choong Seon Hong
:
Energy Efficient Multi-Tenant Resource Slicing in Virtualized Multi-Access Edge Computing. 1-4 - Lishan Li, Ying Liu, Jianping Wu, Gang Ren:

NFVMP: An Architecture for NFV Applications from Multiple Providers. 1-6 - Ming Yang, Ping Du, Noriaki Kamiyama, Akihiro Nakao:

Evaluation of the Zero Rating System for MVNO in the New Mobile Network Era. 1-4 - Md. Shirajum Munir

, Sarder Fakhrul Abedin
, Choong Seon Hong
:
Artificial Intelligence-based Service Aggregation for Mobile-Agent in Edge Computing. 1-6 - Yida Xu, Qi Wang, Jianmin Liu, Chentao He, Boyu Diao, Yongjun Xu:

PDMAC-SIC: Priority-based Distributed Low Delay MAC with Successive Interference Cancellation for Industrial Wireless Networks. 1-6 - Hao-Yu Kao, Yan-Yih Wang, Chih-Meng Huang, Chang-Ping Hsu:

Heterogeneous Data Ensemble Learning in End-to-End Diagnosis for IPTV. 1-6 - Yonghua Huo, Yu Yan, Dan Du, Zhihao Wang, Yixin Zhang, Yang Yang:

Long-Term Span Traffic Prediction Model Based on STL Decomposition and LSTM. 1-4 - Chen-Yell Yang, Gar-De Tsai, Der-Wen Perng:

A practical approach with big data analysis for customer-driven network optimization. 1-3 - Soohyun Kim, Hyunsu Mun, Youngseok Lee:

A Data-Over-Sound Application: Attendance Book. 1-4 - Sejin Kim, Jisun Oh, Yoonhee Kim:

Data Provenance for Experiment Management of Scientific Applications on GPU. 1-4 - Yoga Andrian, Meryam Essaid, Kim Daeyong, Soo Hoon Maeng, Hongtaek Ju:

Space Weather Data Management System and Monitoring in Decentralized Storage Environment. 1-4 - Chunju Tsai, Wen-Yueh Shih, Yi-Shu Lu, Jiun-Long Huang, Lo-Yao Yeh:

Design of a Data Collection System with Data Compression for Small Manufacturers in Industrial IoT Environments. 1-4 - Mao-Jung Chiang, Li-Hsing Yen:

Distributed Approach to Adaptive VNF Manager Placement Problem. 1-6 - Hsu-Chien Wang, Chien Chen, Ssu-Hsuan Lu:

An SDN-based NAT Traversal Mechanism for End-to-end IoT Networking. 1-4 - Masataka Sato, Shingo Horiuchi:

Flexible Network Resource-Allocation Architecture Using Specification Injection. 1-5 - Kexin Zhou, Jian Wang:

Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT. 1-6 - Chi-Chang Huang, Chi-Yang Kuo, Jen-Hao Chen, Chao-Wen Huang:

A Low-cost Enterprise Application Integration Architecture for Large-scale Environment. 1-4 - Yuki Urabe, Sayaka Yagi, Kimio Tsuchikawa, Takeshi Masuda:

Visualizing User Action Data to Discover Business Process. 1-4 - Teerapat Sanguankotchakorn, Shiva Kumar Arugonda:

Hybrid Controller for Securing SDN from Switched DDoS and ARP Poisoning Attacks. 1-6 - Jiun-Yu Tu, Chih-Lin Hu

, Han Hu
:
A Search Approach Based on Query Similarity in Content-Centric Networks. 1-4 - Jeong Min Jeon, Choong Seon Hong

:
A Study on Utilization of Hybrid Blockchain for Energy Sharing in Micro-Grid. 1-4 - Yu-Chuan Chang, Ting-Wei Huang, Nen-Fu Huang:

A Machine Learning Based Smart Irrigation System with LoRa P2P Networks. 1-4 - Seyeon Jeong, Heegon Kim, Jae-Hyoung Yoo, James Won-Ki Hong:

Machine Learning based Link State Aware Service Function Chaining. 1-4 - Min-Seob Lee, Young-Hoon Goo, Kyu-Seok Shim, Sung-Ho Yoon, Se-Hyun Ji, Myung-Sup Kim:

A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis. 1-6 - Tzu-Han Hsu, Chih-Chuan Wang, Yuan-Hsiang Lin, Ching-Hsuan Chen, Nyan Ping Ju, Tsì-Uí Ik

, Wen-Chih Peng, Yu-Shuen Wang, Yu-Chee Tseng, Jiun-Long Huang, Yu-Tai Ching:
CoachAI: A Project for Microscopic Badminton Match Data Collection and Tactical Analysis. 1-4 - Yung-Sheng Lu, Kate Ching-Ju Lin

:
Enabling Inference Inside Software Switches. 1-4 - Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong:

eVNF - Hybrid Virtual Network Functions with Linux eXpress Data Path. 1-6 - Taku Yamazaki

, Shinnosuke Iwagami, Takumi Miyoshi:
Ant-inspired Backoff-based Opportunistic Routing for Ad Hoc Networks. 1-4 - Ping Du, Akihiro Nakao:

Understanding Intelligent RAN Slicing for Future Mobile Networks Through Field Test. 1-6 - Minh N. H. Nguyen, Chit Wutyee Zaw, Kitae Kim

, Choong Seon Hong
:
Joint User Association and Server Scaling in Multi-access Edge Computing. 1-4 - Dong-Hak Kim, Rehmat Ullah

, Byung-Seo Kim:
RSP Consensus Algorithm for Blockchain. 1-4 - Haruo Oishi, Kyoko Yamori, Cheng Zhang, Yoshiaki Tanaka:

Auction Based Resource Trading Using Relation Between Telecommunication Network Failure Rate and Users' Utility. 1-4 - Takumi Iseki, Masahiro Hayashi:

Improved Secure Computation over Real Numbers and Its Application to Reliability Engineering. 1-4 - Stanislav Lange, Heegon Kim, Seyeon Jeong, Heeyoul Choi, Jae-Hyoung Yoo, James Won-Ki Hong:

Machine Learning-based Prediction of VNF Deployment Decisions in Dynamic Networks. 1-6 - Seiki Kotachi, Takehiro Sato, Ryoichi Shinkuma, Eiji Oki:

Multicast Routing Model to Minimize Number of Flow Entries in Software-Defined Network. 1-6 - Qichao Wang, Zeqi Liu, Jae-Oh Lee:

An Architecture for Managing IoT Device Object in Information Gateway. 1-4 - Yan-Yih Wang, Chang-Ping Hsu, Chih-Meng Huang, Hao-Yu Kao:

Fault Location Prediction Based on Customer Complaint Amount. 1-4 - Xiaojuan Zhang, Xiangyu Bai:

Research On Routing Incentive Strategy Based On Virtual Credit In VANET. 1-4 - Arata Koike, Yoshiko Sueda:

Contents Delivery for Autonomous Driving Cars in Conjunction with Car Navigation System. 1-4 - Motoyuki Ohmori

:
A Case Study of Captive-Portal Detection for Web Authentication on Wired LAN in a Campus Network. 1-4 - Javier Jose Diaz Rivera, Talha Ahmed Khan, Asif Mehmood

, Wang-Cheol Song:
Network Slice Selection Function for Data Plane Slicing in a Mobile Network. 1-4 - Yang Qin, Weihong Yang, Lei Peng:

Inter-Session Network Coding with Clustering Routing in Wireless Delay Tolerant Networks. 1-4 - Tsukasa Kitamura, Noriaki Kamiyama, Miki Yamamoto:

Cache-Decision Policy using User Tastes. 1-5 - Terence Ching Yang Lam, Sherlyn Shi Ling Yew, Sye Loong Keoh

:
Bluetooth Mesh Networking: An Enabler of Smart Factory Connectivity and Management. 1-6 - Hiroshi Yamashita, Masahiro Hayashi:

Survival Traffic Ratio Analysis for Cascading Failure in Interdependent Networks. 1-4 - Abdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri:

A New Lossless Compression Scheme for WSNs Using RLE Algorithm. 1-6 - Li Shang, Wei Zhao, Jiaju Zhang, Qiang Fu, Qian Zhao, Yang Yang:

Network Security Situation Prediction Based on Long Short-Term Memory Network. 1-4 - Kai-Min Liao, Guan-Yi Chen, Yu-Jia Chen

:
Artificial Intelligence based Edge Caching in Vehicular Mobile Networks: Architecture, Opportunities, and Research Issues. 1-6 - Hecun Yuan, Biyao Li, Huilin Liu, Yi Han, Lanlan Rui, Ying Wang:

The Design and Simulation of Service Recovery Strategy Based on Recovery Node in Clustering Network. 1-4 - Xilin Ji, Xiao Liang, Yun Zhou, Yonghua Huo, Xiaodan Shi, Yang Yang:

A Fault Prediction Method Based on Load-capacity Model in the Communication Network. 1-4 - Takuto Koizumi, Masahiro Hayashi:

BDD Method for Evaluating Reliability of Traffic-Path-Based Network Model. 1-4 - Yuh-Jiuh Cheng, Bor-Tauo Chen, Yu-Yun Lee:

Design and Performance Evaluation of Very Large-scale Optical Frame Switching Networks based on WSS for Future Data Centers. 1-4 - You Jun Kim, Choong Seon Hong

:
Blockchain-based Node-aware Dynamic Weighting Methods for Improving Federated Learning Performance. 1-4 - Talha Ahmed Khan, Asif Mehmood

, Javier Jose Diaz Rivera, Wang-Cheol Song:
Machine Learning Approach for Automatic Configuration and Management of 5G Platforms. 1-6 - Zhenzhen Li, Jiangpan Hou, Hai Wang, Chencheng Wang, Cuicui Kang, Peipei Fu:

Ethereum Behavior Analysis with NetFlow Data. 1-6 - Yung-Chang Lai, Jhih-Dao Jhan, Wen-Che Yang, Fei-Hua Kuo, Tai-Chueh Shih:

Quality of Service Measurement Mechanism of Cloud-Based Network Architecture. 1-4 - Yuki Fujita, Atsuo Inomata, Hiroki Kashiwazaki:

Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB. 1-4 - Shize Zhang, Hui Zhang, Jiahai Yang, Guanglei Song, Jianping Wu:

Measurement and Analysis of Adult Websites in IPv6 Networks. 1-6 - Tse-Han Wang

, Yen-Cheng Chen, Yu-Tang Huang, Chen-Min Hsu, Kai-Sheng Hsu, Chung-Hua Hu:
IPDAC: An Integrated IP Address Management Framework for Telecommunication Management Networks. 1-4 - Jibum Hong, Woojoong Kim, Jae-Hyoung Yoo, James Won-Ki Hong:

Design and Implementation of Container-based M-CORD Monitoring System. 1-4 - Zeqi Liu, Qichao Wang, Jae-Oh Lee:

A SDN Controller Enabled Architecture for the IMS. 1-4 - Jean Jimmy Julien, Fuchun Joseph Lin

, Chia-Hsuan Yu, Wan-Hsun Hu:
Charging Factors for Enabling SDN/NFV Accounting Management. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














