


default search action
20th BWCCA 2025: Online Conference
- Leonard Barolli

, Zahoor Ali Khan, Leonardo Mostarda:
Advances on Broad-Band and Wireless Computing, Communication and Applications - The 20th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2025), Online Conference. Lecture Notes on Data Engineering and Communications Technologies 278, Springer 2026, ISBN 978-3-032-10346-8 - Konstantinos Tsachrelias, Chrysostomos-Athanasios Katsigiannis, Vasileios Kokkinos

, Christos Bouras, Apostolos Gkamas, Philippos Pouyioutas:
Game Theoretic Reinforcement Learning for Mobility-Aware Resource Allocation in 5G MIMO. 1-13 - Pei-Chi Huang, Fang-Yie Leu, Heru Susanto:

Cross-Domain Handover in 5G/6G Networks. 14-24 - Admir Barolli

, Paboth Kraikritayakul, Shinji Sakamoto, Leonard Barolli:
Mesh Router Optimization by WMN-PSOHCDGA Simulation System for a Small-Scale WMN Considering LDVM and Subway Client Distribution: A Comparison Study for Two Scenarios. 25-37 - Kazuma Matsubara, Naohiro Hayashibara:

Performance Evaluation of A DTN Routing Protocol Based on Road Network. 38-48 - Antonio Esposito, Raffaele Maisto, Gabriele Capasso:

Forecasting Cloud Workload Using ARIMA, VARIMA, and Deep Recurrent Models. 49-58 - Chaeyun Lim, Yongho Kim, Hyunhee Park:

Adaptive ROI-Aware Point Cloud Downsampling for 3D Media Transmission. 59-67 - Tomoyuki Ishida, Aoi Kawabata:

Development of a Biodiversity Learning Support System Using Immersive Virtual Reality Technology. 68-79 - Tomoyuki Ishida, Shun Shigemura:

Finger Alphabet Learning Support System. 80-91 - Yoshihiro Okada, Wei Shi, Kosuke Kaneko, Donghee Han, Hiroyuki Arakawa, Toshioh Fujibuchi:

Radiation Therapy Operation Training Prototype Systems Using 3D Models Generated by PartPacker. 92-101 - Kyohei Wakabayashi, Tetsuya Oda, Leonard Barolli:

A Camera Placement Optimization System for Motion Analysis Considering Posture Changes During Soldering Work. 102-110 - Wenjun Dan, Na Deng, Luotong Li, Xu-An Wang:

Core Patent Identification on the Traditional Chinese Medicine Innovation Evolution Path. 111-122 - Mohamed El-Hajj:

Predicting Zero-Day Vulnerabilities with Machine Learning: Combining Code Analysis and Exploit Patterns. 123-137 - Mohamed El-Hajj:

Leveraging Digital Twins for Proactive Ransomware Mitigation in IoT Ecosystems. 138-150 - Shunya Higashi, Paboth Kraikritayakul, Yi Liu, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

FSASP: A Fuzzy-Based System for Assessment of Security Posture in 5G/B5G Network Slicing. 151-161 - Itta Matsuda, Sena Enomoto, Tsubasa Shibata, Fan Yang, Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki

:
Social Engineering Attack Targeting Vulnerabilities in 1-to-N Avatar Operation Switching: A Positioning Study. 162-173 - Seiya Kajihara, Ryunosuke Harada, Toma Ogiri, Wataru Hatakeyama, Kazuki Takabayashi, Seiji Sato, Nami Ashizawa, Toshiki Shibahara, Osamu Saisho, Tetsushi Ohki, Masakatsu Nishigaki

:
A Study on AI Model Identification Based on Ability Differences: An Initial Approach Using Semantic Understanding Ability. 174-182 - Toma Ogiri, Seiya Kajihara, Ryunosuke Harada, Kazuki Takabayashi, Wataru Hatakeyama, Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki

:
Advanced Persistent Social Engineering Using M-to-N Cybernetic Avatar Operation and Consideration of Countermeasures. 183-192 - Phudit Ampririt, Paboth Kraikritayakul, Yi Liu, Makoto Ikeda, Keita Matsuo, Leonard Barolli:

Edge-IDS: A Fuzzy-Based Simulation System and Design of a Testbed for Detecting Cyber Attacks. 193-203 - Maisei Suzuki, Tomoya Kawakami:

Evaluation of a Heuristic Route Guidance Method Using an Incentive Mechanism to Reduce Traffic Congestion. 204-215 - Yi Liu, Leonard Barolli:

A Fuzzy-Based System for Assessing Driver Condition Considering Different Driver Body Parameters. 216-226 - Yusuke Irie, Shinji Sakamoto, Paboth Kraikritayakul, Admir Barolli

, Yi Liu, Leonard Barolli:
Performance Evaluation of a Cat Swarm Optimization Based Simulation System Considering Different Mixture Ratios and Uniform Distribution of Mesh Clients. 227-236 - Urszula Ogiela, Makoto Takizawa, Marek R. Ogiela:

Distributed Steganography Using CAPTCHA Codes. 237-243 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:

Reducing the Waiting Time to Perform Re-started Transactions in the Energy-Efficient Role-Based Scheduler. 244-253 - Shigenari Nakamura

, Lidia Ogiela, Makoto Takizawa:
A Write Rejection Method in Information Flow Control Based on the LLM. 254-262 - Mayu Hatamoto, Tetsuya Shigeyasu:

A New System for Regulating Electric Power with Battery Swapping EV While Considering Transport Delay. 263-271 - Lingling Wu, Xu An Wang, Wei Zhao, Yize Zhao, Wenhao Liu, Haibo Lei, Yunxuan Su, Zhiwei Zhang:

Secure Text Classification Scheme Based on Homomorphic Encryption. 272-280 - Akira Sakuraba, Shigenobu Shimada:

A Session Initialization Method for V2R Communication Over IEEE 802.11ah Link and QUIC-Based Application Data Transmission. 281-292 - Keita Matsuo, Miku Ikeda, Hironobu Shigyou, Leonard Barolli:

Design and Implementation of a Waste Management Robot Control System for Compost Production. 293-299 - Cedric Lee, Hiroki Fukue, Makoto Ikeda

, Leonard Barolli
:
RDAPT: A Ratio-Difference-Based Anti-packet Triggering Method for Vehicular DTNs. 300-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














