


default search action
21st CCNC 2024: Las Vegas, NV, USA
- 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024. IEEE 2024, ISBN 979-8-3503-0457-2

- Carla Mouradian, Fetahi Wuhib:

Automated Resource Dimensioning in Cloud Using Hybrid Reinforcement Learning. 1-8 - Giovanni Delnevo

, Gianni Tumedei, Vittorio Ghini, Catia Prandi:
Toward a Digital Twin: Combining Sensing, Machine Learning, and Data Visualization for the Effective Management of a Coastal Lagoon Environment. 1-6 - Fabio Bove, Simone Colli, Luca Bedogni:

Performance Evaluation of Split Computing with TinyML on IoT Devices. 1-6 - Junki Oura, Akihiro Wada, Masatoshi Ogawa, Kaoru Yokoo, Jun Kakuta, Teruhisa Ninomiya:

QoE Estimation Method with Time-series Features Extracted from Packet Flows for Video Streaming. 1-6 - Diego Mendez, Marco Zennaro, Moez Altayeb

, Pietro Manzoni:
On TinyML WiFi Fingerprinting-Based Indoor Localization: Comparing RSSI vs. CSI Utilization. 1-6 - Shintaro Mori:

Test-field Development for ICWSNs and Preliminary Evaluation for mmWave-Band Wireless Communications. 1-2 - Laura Belli, Luca Davoli

, Gianluigi Ferrari:
A Cloud-Oriented Indoor-Outdoor Real-Time Localization IoT Architecture for Industrial Environments. 1-6 - Mihnea Cristian Marin, Mattia Cerutti, Sanders Batista, Mattia Brambilla

:
A Multi-Protocol IoT Platform for Enhanced Interoperability and Standardization in Smart Home. 1-6 - Fabio Pittarello, Manuel Semenzato:

Towards a Data Physicalization Toolkit for Non-Sighted Users. 1-6 - Vignay Chanda, Luoyao Hao, Henning Schulzrinne:

From Frustration to Function: A Study on Usability Challenges in Smart Home IoT Devices. 1-6 - Hongshan Mao, Hao Xu:

Data-Driven Learning Based Secrecy Rate Optimization for RIS-Assisted Secure Wireless Networks: A Multi-Armed Bandit Approach. 1-6 - Lorenzo Perinello, Ombretta Gaggi:

Accessibility of Mobile User Interfaces using Flutter and React Native. 1-6 - Chandler Scott, Mohammad S. Khan, Anirudh Paranjothi, Joshua Qiang Li

:
Decentralized Cluster Head Selection in IoV using Federated Deep Reinforcement Learning. 1-7 - Uttam Ghosh, Debashis Das, Sourav Banerjee

, Saraju P. Mohanty:
Blockchain-Based Device Identity Management and Authentication in Cyber-Physical Systems. 1-6 - Shivam Barke, Gautam Srivastava:

ReVo: A Hybrid Consensus Protocol for Blockchain in the Internet of Things through Reputation and Voting Mechanisms. 1-8 - Reinhardt Karnapke, Martin Richter, Matthias Werner:

Virtualization in Robot Swarms: Past, Present, and Future. 1-6 - Mariagrazia Benassi, Davide Paolillo

, Matilde Spinoso
, Sara Giovagnoli, Noemi Mazzoni, Luca Formica, Gianni Tumedei, Catia Prandi:
Train Your Attention and Executive Functions with Eye-Riders! A Videogame for Improving Cognitive Abilities in Neurodiverse Children. 1-6 - Cristiano Aguzzi, Lorenzo Gigli, Ivan D. Zyrianoff

, Luca Roffia:
ZION: A Scalable W3C Web of Things Directory. 1-6 - Fahim Ahmed Irfan, Razib Iqbal, Ayesha Siddiqua

:
SeReIn-M: Sensor Relationship Inference in Multi-Resident Smart Homes. 1-6 - Giovanni Delnevo

, Manuel Andruccioli, Silvia Mirri:
On the Interaction with Large Language Models for Web Accessibility: Implications and Challenges. 1-6 - Suzumi Sato, Hayato Shimano, Megumi Saito, Shigeru Shimamoto, Nao Kobayashi:

Stress Evaluation with Biometric Information Using Smartphone by Radio Wave Reflection. 1-4 - David Mortimore

, Raymond R. Buettner
, Marc S. Ramsey
:
An Information Processing System Design Approach to Underwater Robotic Swarms. 1-6 - Hung-Yu Lin, Zhe-Yu Xu, Jian-Yu Zhou, Jen-Yeu Chen:

A ROS-based Agricultural AI-Driven AGV (A3GV) with Collaboration and Guiding from Drones in the Outdoor Farming Fields. 1-2 - Alex Howe, Dale Peasley, Mauricio Papa

:
Graph Autoencoders for Detecting Anomalous Intrusions in OT Networks Through Dynamic Link Detection. 1-6 - Christine Bassem

:
Challenges of Modeling Participant Behavior in CrowdSensing Evaluation. 1-6 - Luca Davoli

, Laura Belli, Gianluigi Ferrari, Elisa Londero, Paolo Azzoni:
An Edge Computing-Oriented WoT Architecture for Air Quality Monitoring in Mobile Vehicular Scenarios. 1-7 - Lina Nachabe, Alexandre Bento, Kamal Singh, Lionel Médini, Frédérique Laforest:

Distributing Reasoning on WoT Edge Architectures. 1-7 - Marco Picone

, Valeria Villani, Marcello Pietri
, Luca Bedogni:
Towards Coordinating Machines and Operators in Industry 5.0 through the Web of Things. 1-6 - Sanetora Hiragi, Bijoy Chand Chatterjee, Eiji Oki, Akio Kawabata:

A Distributed Processing Communication Scheme for Real-Time Applications over Wide-Area Networks. 25-30 - Makoto Misumi, Masato Tariki, Noriaki Kamiyama:

Cache Control Method for Multiple Web Cache Servers Based on Co-Occurrence Degree. 31-36 - Florian Beye, Yasunori Babazaki, Ryuhei Ando, Takashi Oshiba, Koichi Nihei, Katsuhiko Takahashi:

SwitchingNet: Edge-Assisted Model Switching for Accurate Video Recognition Over Best-Effort Networks. 37-43 - Sabbir Ahmed, Md. Nahiduzzaman, Tariqul Islam, Faisal Haque Bappy

, Tarannum Shaila Zaman, Raiful Hasan:
FASTEN: Towards a FAult-Tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication. 44-50 - Michael Wentz, Jack Capper, Binoy G. Kurien, Keith Forsythe, Kaushik R. Chowdhury:

Classification-Based Transfer Learning for Blind Adaptive Receiver Beamforming. 59-64 - Tailai Song

, Gianluca Perna, Paolo Garza, Michela Meo
, Maurizio Matteo Munafò:
BitFormer: Transformer-Based Neural Network for Bitrate Prediction in Real-Time Communications. 65-70 - Amr Abo-eleneen, Alaa Awad Abdellatif

, Aiman Erbad, Amr Mohamed:
DRL-APNS: A Deep Reinforcement Learning-Powered Framework for Accurate Predictive Network Slicing Allocation. 71-76 - Ramon Moscatelli, Kevin Stahel, Robert Kraneis, Christian Werner:

Why Real-Time Matters: Performance Evaluation of Recent Ultra-Low Latency Audio Communication Systems. 77-83 - Han Jang, Youngbin Jin

, Dongjun Lee, Ben Lee:
Dynamic Clustering Page Allocation for Read-Intensive Multimedia Streaming Applications. 84-89 - Sasan Sabour, Amin Ebrahimzadeh

, Fetahi Wuhib, Mbarka Soualhia, Roch H. Glitho:
Service Graphs Generation in Intent-Based Networks. 90-97 - Rei Nakagawa, Satoshi Ohzahata, Ryo Yamamoto:

Accelerating Feedback Control for QoE Fairness in Adaptive Video Streaming Over ICN. 98-106 - Thulitha Senevirathna, Bartlomiej Siniarski

, Madhusanka Liyanage
, Shen Wang:
Deceiving Post-Hoc Explainable AI (XAI) Methods in Network Intrusion Detection. 107-112 - Supriya Kumari, Shwetha Vittal, A. Antony Franklin:

Resource-Aware Service Prioritization in a Slice-Supportive 5G Core Control Plane for Improved Resilience and Sustenance. 113-120 - Bharath Kumar R., Rajavelsamy R.:

Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBI. 121-126 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:

Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation. 127-134 - Ahmed Boubrima, Zhambyl Shaikhanov, Edward W. Knightly:

Toward Accurate Environmental Mapping using Balloon-based UAVs. 135-142 - Image Bhattarai

, Cong Pu, Kim-Kwang Raymond Choo:
A Lightweight Aggregate Authentication Protocol for Internet of Drones. 143-151 - Abdulaziz Alshaeri, Mohamed Younis:

Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things. 152-158 - Shusuke Narieda

, Takeo Fujii:
Analyses of Hidden and Exposed Nodes in LPWAN with Energy Detection Based Carrier Sense. 159-164 - Naoki Fukushi, Toshiki Shibahara, Hiroki Nakano

, Takashi Koide, Daiki Chiba
:
Noisy Label Detection for Multi-labeled Malware. 165-171 - Harichandana B. S. S

, Sumit Kumar, Manjunath Bhimappa Ujjinakoppa, Barath Raj Kandur Raja:
COPS: A Compact On-Device Pipeline for Real-Time Smishing Detection. 172-179 - Joshua H. Tyler, Donald R. Reising, Mohamed K. M. Fadul, Mina Sartipi:

Assessing Time Offset and Classifier Impacts on Preamble-based Cross-Collection SEI. 180-187 - Hozefa Lakadawala, Komla Dzigbede, Yu Chen:

Detecting Reentrancy Vulnerability in Smart Contracts using Graph Convolution Networks. 188-193 - Alexander Jung, Helge Parzyjegla, Peter Danielis:

Opportunistic Protocols for People Counting in Dynamic Networks. 198-201 - Maher Dissem

, Manar Amayri, Nizar Bouguila:
Robust Interactive HMI for Occupancy Estimation in Smart Buildings (WIP). 202-205 - Fabio Gaiba, Luca Bedogni, Giacomo Gori

, Andrea Melis, Marco Prandini:
Wi-Fi Sensing for Human Identification Through ESP32 Devices: An Experimental Study. 206-209 - Hikaru Katayama, Hideto Yano, Tomoki Yoshihisa, Hideyuki Shimonishi:

A Real-Time Human Tracking System Using Multiple Cameras to Reduce Network Loads. 210-213 - Satoru Matsumoto, Tomoki Yoshihisa, Hideyuki Shimonishi, Tomoya Kawakami, Yuuichi Teranishi:

Implementation and Evaluation of a Facial Image Obscuring Method for Person Identification to Protect Personal Data. 214-217 - Jeniya Sultana, Razib Iqbal:

A Framework for Context Recognition from Voice Commands and Conversations with Smart Assistants. 218-221 - Hideyuki Saito, Kenji Kanai, Hidenori Nakazato:

Development and Evaluation of Information-Centric Service Mesh Using NDN Function Chaining. 222-227 - Yohei Namba, Ryo Morishima, Hiroaki Nishi:

Network-Transparent Load Balancing and Migration for Edge Computing. 228-233 - Ivan D. Zyrianoff

, Leonardo Montecchiari
, Angelo Trotta, Lorenzo Gigli, Carlos Kamienski
, Marco Di Felice:
Proactive Caching in the Edge-Cloud Continuum with Federated Learning. 234-240 - Daiki Kodama, Kenji Ohira

, Hideyuki Shimonishi, Toshiro Nakahira, Daisuke Murayama, Tomoaki Ogawa:
Enhancing Indoor Millimeter Radio Communication: A Probabilistic Approach to RSS Map Estimation. 241-247 - Shoki Ohta, Cheng Chen

, Takayuki Nishio
:
Proactive Millimeter-Wave Link Quality Prediction Utilizing Out-of-Band CSI Fingerprinting and Supervised Learning: An Experimental Study. 248-253 - Natsuki Ikuo, Sorachi Kato

, Takuma Matsukawa, Tomoki Murakami, Takuya Fujihashi, Takashi Watanabe, Shunsuke Saruwatari:
CSI2PC: 3D Point Cloud Reconstruction Using CSI. 254-259 - Madeleine Miller, Hany Habbak, Mahmoud M. Badr

, Mohamed Baza, Mohamed Mahmoud, Mostafa M. Fouda:
Electricity Theft Detection Approach Using One-Class Classification for AMI. 260-265 - Nathan Dillbary, Roi Yozevitch, Amit Dvir, Ran Dubin, Chen Hajaj:

Hidden in Time, Revealed in Frequency: Spectral Features and Multiresolution Analysis for Encrypted Internet Traffic Classification. 266-271 - Simone Marasi, Stefano Ferretti:

Anti-Money Laundering in Cryptocurrencies Through Graph Neural Networks: A Comparative Study. 272-277 - Roberto Cavicchioli, Jia-Cheng Hu, Marco Furini:

On Using Artificial Intelligence to Predict Music Playlist Success. 278-283 - Andreas Ingo Grohmann, Frank Peters, David Kuss, Mauri Seidel, Frank H. P. Fitzek

:
HYDRAted - High Yield Dense Robotic Arms Technically Evolved Demonstrator. 282-283 - Davide Paolillo

, Bryan Corradino
, Gianni Tumedei, Mariagrazia Benassi, Catia Prandi:
On developing a procedural level generator based on the Model Synthesis algorithm in the context of serious games. 284-289 - Maria Mengozzi, Manuel Andruccioli, Silvia Mirri, Giovanni Delnevo

, Roberto Girau:
Enhancing Road Safety Through Fitness-to-Drive Metrics: The NextPerception Project on Driver Behavior Analysis and Gamification. 290-295 - Srinivas Tenneti, Romika Jakhar, Khaled Harfoush:

Reactive Jamming of the Helium Network. 296-301 - Mohamed Anis Fekih, Walid Bechkit, Hervé Rivano:

Route Selection in Low-Cost Participatory Mobile Sensing of Air Quality. 302-310 - Lorenzo Gigli, Federico Montori, Mirko Zichichi, Luca Bedogni, Stefano Ferretti, Marco Di Felice:

On the Decentralization of Mobile Crowdsensing in Distributed Ledgers: An Architectural Vision. 311-317 - Arzoo Miglani, Neeraj Kumar:

Maximized Content Offloading for Content Centric V2G Networks. 318-323 - Mart Keizer, Savio Sciancalepore

, Gabriele Oligeri:
GhostBuster: Detecting Misbehaving Remote ID-Enabled Drones. 324-332 - Islam Elgarhy

, Ahmed T. El-Toukhy, Mahmoud M. Badr
, Mohamed Mahmoud, Mostafa M. Fouda, Maazen Alsabaan, Hisham A. Kholidy:
Secured Cluster-Based Electricity Theft Detectors Against Blackbox Evasion Attacks. 333-338 - Taishi Nishiyama, Atsutoshi Kumagai, Akinori Fujino, Kazunori Kamiya:

Malicious Log Detection Using Machine Learning to Maximize the Partial AUC. 339-344 - Ignacio Astaburuaga

, Shamik Sengupta:
Introduction to Quantum Systems and Security Vulnerabilities. 345-351 - Jingwen Wang, Peilong Li, Ethan Weitkamp, Yusuke Satani, Adam Omundsen:

MalBuster: Scalable, Real-Time, and Concept Drift-Adaptive Malware Detection for Smart Environments. 352-355 - Takahiro Ohtani, Ryo Yamamoto, Satoshi Ohzahata:

Detecting Zero-Day Attack with Federated Learning Using Autonomously Extracted Anomalies in IoT. 356-359 - Ayub Shah, Roberto Passerone:

Architectural Exploration and Design for Ultra-Reliable Low-Latency Indoor Robotics Systems. 360-363 - Khanh Nam Nguyen, Kenichi Takizawa:

Deep Learning-Based Proactive Physical Layer Handover using Cameras for Indoor Environment. 364-367 - Nathan Thom, Jay Thom, Batyr Charyyev, Emily M. Hand, Shamik Sengupta:

FlexHash - Hybrid Locality Sensitive Hashing for IoT Device Identification. 368-371 - Chiara Brunelli, Gianmarco Pappacoda

, Ivan D. Zyrianoff
, Luciano Bononi
, Marco Di Felice:
Water Wastage Detection in Smart Homes Through IoT and Machine Learning. 372-375 - Silvia Corpino, Matteo Anedda

, Mauro Fadda, Daniele D. Giusto, Roberto Girau:
Enabling a Scalable and Adaptive Cloud Infrastructure for Virtual Users in the Social Internet of Things. 376-379 - Salah Eddine Merzougui

, Xhulio Limani, Andreas Gavrielides
, Philippe Reiter, Claudio E. Palazzi, Johann Marquez-Barja
:
Leveraging Edge Computing and Orchestration Platform for Enhanced Pedestrian Safety Application: The DEDICAT-6G Approach. 380-383 - Muhammad Mansoor Ashraf

, Saadi Boudjit:
Distributed Framework of WSN-Assisted UAV Network for Highway Surveillance. 384-387 - Xing Liu, Wei Yu

, Cheng Qian
, David W. Griffith, Nada Golmie:
Deep Reinforcement Learning for Channel State Information Prediction in Internet of Vehicles. 388-391 - Nivin Madawalage, Tharani Thalgahagoda, Inushi Gunatilake, Pramitha Fernando

, Geeth P. Wijesiri, Chatura Seneviratne, Madhusanka Liyanage
:
Blockchain-Enabled RF Radiation Exposure Level Measurement in Wireless Mobile Networks. 392-395 - Patrick McEnroe

, Shen Wang, Madhusanka Liyanage
:
Towards Faster DRL Training: An Edge AI Approach for UAV Obstacle Avoidance by Splitting Complex Environments. 396-399 - Itsuki Takada, Daiki Nitto, Yoshihiro Midoh, Noriyuki Miura, Jun Shiomi, Ryoichi Shinkuma:

Edge-Oriented Point Cloud Compression by Moving Object Detection for Realtime Smart Monitoring. 400-405 - Ren-Hung Hwang, Yuan-Cheng Lai, Ying-Dar Lin:

Queue-Length-Based Offloading for Delay Sensitive Applications in Federated Cloud-Edge-Fog Systems. 406-411 - Luca Bedogni, Marco Picone

, Marcello Pietri
, Marco Mamei, Franco Zambonelli:
Fluid Computing in the Internet of Things: A Digital Twin Approach. 412-418 - Jyotirmoy Karjee, Karan Raj Kakwani, Kartik Anand, Praveen S. Naik:

Lightweight Multimodal Fusion Computing Model for Emotional Streaming in Edge Platform. 419-424 - Kaushik Dey, Satheesh K. Perepu, Abir Das:

Goals are Enough: Inducing AdHoc Cooperation Among Unseen Multi-Agent Systems in IMFs. 425-432 - Ting-Hui Wang, Li-Hsiang Shen

, Kai-Ten Feng:
Distributed Multi-Agent Deep Q-Learning for Fast Roaming in IEEE 802.11ax Wi-Fi Systems. 433-438 - Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, Kasun De Zoysa:

SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace. 439-445 - Yifeng Peng, Xinyi Li, Jingda Yang, Sudhanshu Arya, Ying Wang:

RAFT: A Real-Time Framework for Root Cause Analysis in 5G and Beyond Vulnerability Detection. 446-454 - Tatsuya Fukui, Kousuke Morita, Hiroki Ishiduka, Yuki Sakaue, Satoshi Narikawa:

Burst Collision Reduction Scheme for Low-Latency Video Transmission in 5G Uplink Systems. 455-459 - Alexander F. K. Janus

, Steffen Moser, Frank Slomka:
Cost-Effective Network Packet Manipulation and Error-Detection Device. 460-465 - Ayano Higuchi, Yu Nakayama:

Cipher Modulation for Optical Camera Communication with Digital Signage. 466-471 - Gustavo Flores, Ani Nahapetian:

Keyboardless Keyboard: Smart Phone Gyroscope for Improved User Interface. 472-477 - Neminath Hubballi, Pankaj Chaudhary, Sameer G. Kulkarni:

PePC: Popularity Based Early Predictive Caching in Named Data Networks. 478-483 - Haoting Zhang, Hiroshi Yamamoto:

Lifelog Mesh Sensor Network System Supporting Wake-Up Control Function Based on States of Power Generation. 484-489 - Zahraa Khais Shahid, Saguna Saguna

, Christer Åhlund:
Recognizing Seasonal Sleep Patterns of Elderly in Smart Homes Using Clustering. 490-498 - Alyssa Yu, Cheng Qian

, Yifan Guo:
A Real-Time Hand Gesture Recognition System on Raspberry Pi: A Deep Learning-Based Approach. 499-506 - Igor Fontes, Arthur Melo, Alejandro C. Frery, André L. L. de Aquino:

Sensor Sound Classification in Neonatal Intensive Care Units Based on Multiple Features and Neural Networks. 507-512 - Farzad Veisi, Julien Montavont, Fabrice Theoleyre

:
Energy Efficient and Reliable Maintenance for SDN-Based Scheduled Wireless Networks. 513-518 - Simeon Wuthier

, Nazmus Sakib, Sang-Yoon Chang:
Positive Reputation Score for Bitcoin P2P Network. 519-524 - Alvin Kuruvilla, Rojanaye Daley, Rajesh Kumar

:
Spotting Fake Profiles in Social Networks via Keystroke Dynamics. 525-533 - Nihal Poredi, Deeraj Nagothu, Yu Chen:

Authenticating AI-Generated Social Media Images Using Frequency Domain Analysis. 534-539 - Mohammad Ebrahimabadi, Javad Bahrami, Mohamed Younis, Naghmeh Karimi:

Digital Twin Integrity Protection in Distributed Control Systems. 540-545 - Vinay Kumar Shrivastava, Sriganesh Rajendran, Aby Kanneath Abraham, Rajavelsamy Rajadurai:

Enhanced Scheduling Strategy and Energy Efficiency for Extended Reality in 5G Advanced. 546-549 - Henrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis, Niclas Örgen, Per Johansson:

Objective QoE Models for Cloud-Based First Person Shooter Game over Mobile Networks. 550-553 - Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango:

Securing MQTT-M2M Communications in a Food Retail Distribution. 554-557 - Yesin Sahraoui, Chaker Abdelaziz Kerrache, Carlos T. Calafate, Pietro Manzoni:

FedRx: Federated Distillation-Based Solution for Preventing Hospitals Overcrowding During Seasonal Diseases Using MEC. 558-561 - Midhun Nair, Obeng Lydia Dede

, Soumadeep De
, Renny Edwin Fernandez:
Digital Twin for Bruise Detection in Precision Agriculture. 562-565 - JeongJun Park

, Lusungu Josh Mwasinga
, Huigyu Yang
, Syed M. Raza, Duc-Tai Le, Moonseong Kim, Min Young Chung, Hyunseung Choo:
Regional Correlation Aided Mobile Traffic Prediction with Spatiotemporal Deep Learning. 566-569 - Xuheng Cao

, Noriaki Kamiyama:
Dynamic Mirror Placement for Reducing Inter-AS Traffic in NDN. 570-573 - Dazhou Liu, Younghee Park:

A Real-Time Anonymous Traffic Detection Based on Reinforcement Learning. 574-577 - Ryouhei Tsugami, Tatsuya Fukui, Satoshi Narikawa:

RDMA Transmission Control Method: Using Network Resource Allocation For Wide-Area Data Collection. 578-581 - Raúl Cuervo Bello

, Nina Slamnik-Krijestorac, Johann M. Márquez-Barja
:
Zero-touch Service Management for 6G verticals: Smart Traffic Management Case Study. 582-585 - Natsuki Natori, Masayuki Mikuriya, Fumitoshi Ogino, Yu Nakayama:

RGB-D Camera-Based Object Grounding Surface Estimation System. 586-589 - Jyotirmoy Karjee, Praveen S. Naik, Kartik Anand, Utkash Sharma, Abhay Thakur:

Multi-Channel Transport Scheduler for Extended Reality in Distributed Computing. 590-593 - Brent Anderson, Razib Iqbal:

Word Embedding with Emotionally Relevant Keyword Search for Context Detection from Smart Home Voice Commands. 594-595 - Omar Otoniel Flores-Cortez

:
A Low-Cost IoT System for Water Quality Monitoring in Developing Countries. 596-597 - Khaled Chikh, Chinmay Satish Shrivastav, Roberto Cavicchioli:

Collaborative Misbehaviour Response System for Improving Road Safety. 600-601 - Yang Lou

, Hideyuki Shimonishi, Masayuki Murata, Nattaon Techasarntikul:
Energy Optimization of Distributed Video Processing System in Dynamic Environment. 602-603 - Noor Khial, Alaa Awad Abdellatif

, Amr Mohamed, Aiman Erbad, Carla-Fabiana Chiasserini:
Edge-Assisted Opportunistic Federated Learning for Distributed IoT Systems. 604-605 - Mingyu Ma, Hidenori Nakazato:

An Application of Named Data Network on InterPlanetary File System. 606-607 - Farha Masroor, Rishab Khanna, Neena Goveas:

Task Allocation in the Edge Cloud Scenario Incorporating Customized Requirements. 608-609 - Shota Ono, Taku Yamazaki, Takumi Miyoshi, Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki:

Experimental Evaluation Toward Mobility-Driven Model Integration Between Edges. 610-611 - Kohei Ogawa, Sumiko Miyata:

Heterogeneous Edge Server and Job Allocation Based on k-means++ and Transfer Probability. 612-613 - Truc Duong, Anna Wisniewska, Nirnimesh Ghose:

Reciprocal Altruism as a Rogue Node Detection Mechanism in Dynamic Spectrum Access Networks. 614-615 - Ryuto Maeda, Masayuki Kinoshita, Koji Kamakura, Takaya Yamazato:

Superimposed Iterative Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light Communication. 616-617 - Hironao Abe, Hideo Kawata, Yuhei Kawakami, Shinichi Yoshihara, Tomoaki Yoshida:

TAS Rescheduling Using Different Amounts of Allowable Jitter. 618-619 - Kennedy A. Lee, John R. Barry:

Outage Analysis for All the Satellites in a Randomly Distributed Constellation. 620-621 - Behzad Mozaffari Tazehkand, Fatemeh Asghari Azhiri, Reza Abdolee, Vida Vakilian

:
On the Theoretical BER Performance of STCM-MIMO Systems. 622-623 - Fan-Shuo Tseng, Tsang-Yi Wang, Pin-Chu Yu:

Untrained Deep Learning Techniques for Channel Estimation With Limited Pilots in RIS-Enhanced SIMO-OFDM Systems. 624-625 - Matthew Boeding

, Paul Scalise, Michael Hempel
, Hamid Sharif:
Evaluating the Latency Impact for Time-Critical Operational Technology Applications of Transitioning IEC-61850 GOOSE Operations to 5G. 626-627 - Sota Yamamoto, Jin Nakazato, Gia Khanh Tran:

Study on the Coverage Extension of Millimeter Wave UAV BS Networks by Using IRS. 628-629 - Sridhar Kondabathini, Lalit Pathak, Kiran Bynam, Jyotirmov Karjee:

A Novel Framework to Reduce the Initial Access Latency by Utilizing Multi Resolution Angle of Arrival Estimation in 6G. 630-631 - Bikash Chandra Singh, Sachin Shetty, Praneet Chivate, David Wright, Alex Alenberg, Peter Woodward:

Performance Analysis of Indoor 5G NR Systems. 632-633 - Kentaro Morise, Tokimasa Toyohara, Hiroaki Nishi:

Proposal of Differential Privacy Anonymization for IoT Applications Using MQTT Broker. 634-635 - Sabrina Ahmed, Mohammed Zamshed Ali:

Application-Specific Security in IoT Network. 636-637 - Miyu Matsuda, Jiang Liu, Taka-aki Nakada, Shigeru Shimamoto:

Estimation of Systolic and Diastolic Blood Pressure in a Non-Contact Method Using Microwaves. 638-639 - Tarun Vihar Tumati, Xunfei Jiang, Yun Tian:

SBTCert: A Soulbound Token Certificate Verification System. 640-641 - Obeng Lydia Dede

, Harikrishnan Muraleedharan Jalajamony
, Renny Edwin Fernandez:
Image Transmission over LoRa-Based Networks: A Performance Study Using Image Compression and Reconstruction Methods. 642-643 - Ekramul Haque, Kamrul Hasan

, Imtiaz Ahmed
, Md. Sahabul Alam, Tariqul Islam:
Towards an Interpretable AI Framework for Advanced Classification of Unmanned Aerial Vehicles (UAVs). 644-645 - Yasuhiro Mori, Hiroshi Yamamoto, Yojiro Suyama, Tatsuya Izumi, Hirofumi Urayama, Shiho Kobayashi, Hideaki Tani:

Automated Design System of Automotive Ethernet Utilizing Simulation-Based Machine Learning. 646-647 - Nisha Kumari Barsha, Neminath Hubballi:

Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution Comparison. 648-649 - Peter Foytik, Safdar Hussain Bouk, Gustave Anderson

, Sachin Shetty:
Self-Sovereign Identity Management in Ship-Based 5G-Devices Use Case. 650-651 - Akito Ohshima, Kosuke Sanada, Hiroyuki Hatano, Kazuo Mori:

Enhanced SB-SPS Scheme to Mitigate Half Duplex Problem for Relay Transmission in Vehicle Platooning. 654-655 - Thanh Trung Nguyen, Minh Hai Vu

, Thi Ha Ly Dinh, Phi Le Nguyen, Kien Nguyen:
MuLeS: A Multi-Client Learning-Based MPQUIC Scheduler. 656-661 - Christo Kurisummoottil Thomas, Emilio Calvanese Strinati, Walid Saad:

Reasoning with the Theory of Mind for Pragmatic Semantic Communication. 662-668 - Gianluca Perna, Martino Trevisan, Danilo Giordano, Daniel Perdices, Marco Mellia

:
Monitoring Web QoE in Satellite Networks from Passive Measurements. 669-676 - Tomás Hüttebräucker, Mohamed Sana, Emilio Calvanese Strinati:

Pragmatic Goal-Oriented Communications Under Semantic-Effectiveness Channel Errors. 683-689 - Takuma Kobayashi, Takumi Takahashi, Shinsuke Ibi, Seiichi Sampei:

Concatenated Structure of EP and Turbo Equalizer for Overloaded Massive MIMO Detection. 690-695 - Shunsuke Kamiwatari, Masaaki Ito

, Issei Kanno, Kengo Ando, Koji Ishibashi:
Interference-Aware Analog Beam Selection for Cell-Free Massive MIMO With Hybrid Beamforming Over Millimeter-Wave Channels. 696-701 - Nariman Torkzaban, Mohammad Ali Khojastepour, John S. Baras:

Enabling Cooperative Hybrid Beamforming in TDD-Based Distributed MIMO Systems. 702-707 - Ahmed T. El-Toukhy, Mohamed Mahmoud, Atef H. Bondok, Mostafa M. Fouda

, Maazen Alsabaan:
Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach. 708-713 - Pranay Chowdary Jasti, Henry Griffith, Heena Rathore:

A Multi-Level Dempster-Shafer and Reinforcement Learning-Based Reputation System for Connected Vehicle Security. 714-720 - Anthony Jairam, Yong Wang:

Community-Sourced Bluetooth Low Energy Device Fingerprinting Based on Link Layer Packets. 721-729 - Ignacio Astaburuaga

, Shamik Sengupta:
Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework. 730-735 - Marco Picone

, Stefano Mariani, Roberto Cavicchioli, Paolo Burgio, Arslane Hamza Cherif
:
The Degree of Entanglement: Cyber-Physical Awareness in Digital Twin Applications. 736-744 - Luca Sciullo, Angelo Trotta, Sara Bosi, Luciano Bononi

, Marco Di Felice:
Digital Shadow Sensor Framework for Smart Agriculture: Time Series Prediction Through Data Segmentation and Clustering. 745-751 - Ion Turcanu

, German Castignani, Sébastien Faye:
On the Integration of Digital Twin Networks into City Digital Twins: Benefits and Challenges. 752-758 - Giacomo Cabri, Alireza Rahimi:

Exploitation of Digital Twins in Smart Manufacturing. 759-764 - Takamasa Higuchi, Seyhan Ucar, Chunghan Lee, Onur Altintas:

Link Setup Latency in Vehicle-to-Vehicle WLANs: A Comparative Study. 765-770 - Constance Hendrix, Gedare Bloom:

Platoon Vulnerability due to Network Topology and Targeted Vehicle. 771-776 - Shubhangi Bhadauria, Klea Plaku, Yash Deshpande, Wolfgang Kellerer:

Evaluation of NR-Sidelink for Cooperative Industrial AGVs. 777-783 - Mohammad Shah Alamgir

, Brian Kelley:
On the Analysis of AI-Optimized Aerial Cell-Free Massive MIMO. 784-791 - Michael R. Jones

, Soufiene Djahel
, Kristopher Welsh:
A Cyclic Hyper-parameter Selection Approach for Reinforcement Learning-based UAV Path Planning. 792-798 - Matthew Smith

, Luke Zhao, Jonathan Cordova, Xunfei Jiang
, Mahdi Ebrahimi:
Machine Learning-Based Energy-efficient Workload Management for Data Centers. 799-802 - Kai Vogelgesang, Phillip Raffeck, Peter Wägemann, Thorsten Herfet, Wolfgang Schröder-Preikschat:

WIP: Towards a Transactional Network Stack for Power-Failure Resilience. 803-806 - Shusuke Narieda

, Takeo Fujii:
On Execution at End Devices for Energy Detection Based Carrier Sense in LPWAN. 807-810 - Norimasa Yafune, Kazuto Yano, Keiichiro Mori, Toshikazu Sakano:

Evaluation of RoCE Protocol in Backhaul Systems for Ultra-High-Speed THz Wireless LAN. 811-814 - Takahide Murakami, Naoki Aihara, Yu Tsukamoto, Akio Ikami, Hiroyuki Shinbo, Yoshiaki Amano:

Analysis of Clock Distribution in User-centric Radio Access Network for Cell-Free Massive MIMO. 815-818 - Amato Otsuki, Daichi Kominami, Hideyuki Shimonishi, Masayuki Murata, Tatsuya Otoshi

:
Adaptive Network Slicing Control Method for Unpredictable Network Variations Using Quality-Diversity Algorithms. 819-822 - Haoxuan Xie, Lam Chi Hou, Lap Tou Chau, Lei Ka Weng, Xichen Wang, Yuxuan Guo, Giovanni Delnevo

, Chiara Ceccarini, Chan-Tong Lam, Su-Kit Tang
:
Multimodal Interface for Games: A Case Study with TinyML. 823-826 - Gabriele Oligeri, Savio Sciancalepore

, Alireza Sadighian:
FadePrint - Satellite Spoofing Detection via Fading Fingerprinting. 827-830 - Shammi A. Doly, Alex R. Chiriyath, Andrew Herschfelt, Md. Ali Azam, Shankarachary Ragi, Daniel W. Bliss:

Decentralized Waveform Co-Design for Integrated Sensing and Communications Systems via Approximate Dynamic Programming. 831-834 - Pratik Abhijeet Bendre, Shashwat Kumar, A. Antony Franklin:

Enhancing 360- Degree Video Streaming via Selective Inpainting for Bandwidth Optimization. 835-838 - Kotaro Shimamura, Shinya Takamaeda-Yamazaki:

FS-Boost: Communication-Efficient Federated Subtree-Based Gradient Boosting Decision Trees. 839-842 - Nann Win Moe Thet

, Kenichi Takizawa:
Low Latency Self-Interference Suppression in In-Band Full-Duplex Relay. 843-846 - Stefan Aust:

Measurement Study of IEEE 802.11ah Sub-1 GHz Wireless Channel Performance. 847-850 - Hayato Yamakata, Yosuke Tanigawa, Hideki Tode:

Selective OFDMA Transmission Method Based on Downlink Communication Quality Requirements in IEEE 802.11ax Wireless LANs. 851-856 - Anan Sawabe, Yusuke Shinohara, Takanori Iwai:

Congestion State Estimation via Packet-Level RTT Gradient Analysis with Gradual RTT Smoothing. 857-862 - Anan Sawabe, Yusuke Shinohara, Takanori Iwai:

Revisiting TCP Pacing for Throughput Performance Enhancement Over TDD Band in Private Mobile Networks. 863-868 - Kazuaki Hanazawa, Yuto Hama, Hideki Ochiai:

Performance Comparison of Clipped and Filtered OFDM/QAM and SC/APSK with BICM. 869-874 - Suneel Kumar

, Eduard Garcia Villegas, Daniel Camps-Mur
:
SLA-MLO: Congestion-Aware SLA-Based Scheduling of Multiple Links in IEEE 802.11 be. 875-880 - Taisuke Nogami, Shinsuke Ibi, Takumi Takahashi, Hisato Iwai:

Data-Driven Tuning of Deep Unfolding-Aided Blind Signal Separation for Short Data Length. 881-886 - Kengo Furuta, Takumi Takahashi, Kenta Ito, Shinsuke Ibi:

Joint Channel and Data Estimation via Bayesian Parametric Bilinear Inference for OTFS Transmission. 887-892 - Zahraa El Attar

, Yassine Hadjadj-Aoul, Géraldine Texier:
Monitoring Network Slices with a Genetic Algorithm Approach. 893-898 - Elmahedi Mahalal

, Muhammad Ismail, Zi-Yang Wu, Mostafa M. Fouda, Zubair Md Fadlullah
, Nei Kato:
Robust Deep Learning-Based Secret Key Generation in Dynamic LiFi Networks Against Concept Drift. 899-904 - Siang-Jhen Wu, Chien Chen, Jyh-Cheng Chen:

Design and Implementation of Data Plane Supporting Time-Sensitive Networking in 5G Networks. 905-911 - Masahiro Takigawa, Ryochi Kataoka, Issei Kanno, Yoji Kishi:

Antenna Design for Robust Millimeter Wave LoS-MIMO Link in Mobile Analog Repeater Achieving Low Latency and High Capacity. 912-917 - Israt Ara

, Brian Kelley
:
Natively Secure 6G IoT Using Intelligent Physical Layer Security. 918-924 - Naoki Aihara, Akio Ikami, Yu Tsukamoto, Takahide Murakami, Hiroyuki Shinbo, Yoshiaki Amano:

Multi-Homing AP Connection for Cell-Free Massive MIMO in Distributed CPU Environment. 925-930 - Cong Pu, Kim-Kwang Raymond Choo, Image Bhattarai

:
Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks. 931-936 - Prateek Sethi, Tri Nguyen, Mayukh Roy Chowdhury, Susanna Pirttikangas, Aloizio P. Silva

:
Fair Consensus in Blockchain with Heterogeneous Miners using Reinforcement Learning aided Adaptive Proof-of-Work. 937-942 - Rukayat Olapojoye

, Mohamed Baza, Tara Salman
:
On the Analysis of Model Poisoning Attacks Against Blockchain-Based Federated Learning. 943-949 - Rashmi Thennakoon, Arosha Wanigasundara, Sanjaya Weerasinghe, Chatura Seneviratne, Yushan Siriwardhana, Madhusanka Liyanage

:
Decentralized Defense: Leveraging Blockchain against Poisoning Attacks in Federated Learning Systems. 950-955 - Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage

, Samuel Marchal
, Mika Ylianttila
:
Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications. 956-962 - Atef H. Bondok, Mohamed Mahmoud, Mahmoud M. Badr

, Mostafa M. Fouda, Maazen Alsabaan:
A Distillation-Based Attack Against Adversarial Training Defense for Smart Grid Federated Learning. 963-968 - Mohamed I. Ibrahem, Mostafa M. Fouda, Zubair Md Fadlullah

:
FedSafe-No KDC Needed: Decentralized Federated Learning with Enhanced Security and Efficiency. 969-975 - Sultan Almutairi, Yogev Neumann, Khaled Harfoush:

Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model. 976-981 - Uttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua:

A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain. 982-985 - Sogo Pierre Sanon, Rekha Reddy, Christoph Lipps, Hans Dieter Schotten:

DDoS Attacks in Communication: Analysis and Mitigation of Unreliable Clients in Federated Learning. 986-989 - Francesco Salatino, Mattia Giovanni Spina, Mauro Tropea, Floriano De Rango:

Detecting DDoS Attacks Through AI driven SDN Intrusion Detection System. 990-993 - Francesco Apollonio, Luca Bedogni, Giacomo Gori

, Andrea Melis, Marco Prandini:
On the Trade-Off Between Privacy and Information Quality in Location Based Services. 994-997 - Fetulhak Abdurahman Shewajo, Abdelwahab Boualouache

, Sidi Mohammed Senouci
, Inès El Korbi, Bouziane Brik, Kinde Anlay Fante
:
Integrating Blockchain Technology with PKI for Secure and Interoperable Communication in 5G and Beyond Vehicular Networks. 998-1001 - Kouichi Genda:

Autonomous Multi-Hop Network Using PSO-based Mobile Robot Swarm with the Moving Target Technique. 1002-1005 - Tushar Vrind

, Chandar Kumar, Debabrata Das:
ACADEME: Aerial Cell-Assisted Device-Edge coinference ModEl in 6G Wireless Network. 1006-1009 - S. Ram Aditya, Shyamal Dhua, Animesh Kumar, Vimal Bastin Edwin Joseph, R. Rajavelsamy:

Deep Reinforcement Learning Based Bandwidth Part Assignment in 5G NR-U. 1010-1013 - Siddhesh Pratim Sovitkar, Shwetha Vittal, A. Antony Franklin:

Evaluating CAP Theorem on a Stateless 5G Core. 1014-1017 - Hendrik Schippers, Christian Wietfeld:

Data-Driven Energy Profiling for Resource-Efficient 5G Vertical Services. 1018-1021 - Nobutaka Kawaguchi, Charlie Hart:

On the Deployment Control and Runtime Monitoring of Containers Based on Consumer Side SBOMs. 1022-1025 - Sudharshan Paindi Jayakumar, Alberto Conte:

Framework: Clustering-Driven Approach for Base Station Parameter Optimization and Automation (CeDA-BatOp). 1026-1029 - Nathan Dai, Suleyman Uludag

:
Performance Tradeoff in ML-Based Intrusion Detection Systems: Efficacy vs. Resource Usage. 1030-1031 - Yi-Wei Chen, Min-Je Tsai, Henry Horng-Shing Lu, Kai-Ten Feng, Ta-Sung Lee, Jih-Chuan Lan:

Efficient TIS Sensitivity Measurement With Machine Learning Approach and 5G Dataset. 1032-1033 - Francesco Colosimo, Floriano De Rango:

Distance-Statistical Based Byzantine-Robust Algorithms in Federated Learning. 1034-1035 - Elies Gherbi, Hamza Khemissa, Mohammed Lamine Bouchouia, Maxime Ayrault:

A Study of AI-Based In-Vehicle Intrusion Detection Systems. 1036-1037 - Kota Maejima, Takayuki Nishio, Asato Yamazaki, Yuko Hara-Azumi:

Tram-FL: Routing-based Model Training for Decentralized Federated Learning. 1038-1039 - Takahiro Shindo, Taiju Watanabe, Kein Yamada, Hiroshi Watanabe

:
Image Coding for Machines with Object Region Learning. 1040-1041 - Mayuko Inoue, Tomoaki Ohtsuki:

Source CSI Dataset for Multi-Task CSI Feedback. 1042-1043 - Ayesha Siddiqua

, Siming Liu
, Razib Iqbal, Fahim Ahmed Irfan, Logan Ross, Brian Zweerink:
TIM-MARL: Information Sharing for Multi-Agent Reinforcement Learning in Smart Environments. 1044-1045 - Ronald Petrlic, David Stiegler:

Towards Transparency in Email Security. 1046-1047 - Ethan Berei, Muhammad Ajmal Khan, Ahmed Oun

:
Machine Learning Algorithms for DoS and DDoS Cyberattacks Detection in Real-Time Environment. 1048-1049 - Eri Hosonuma, Taku Yamazaki, Takumi Miyoshi, Akihito Taya, Yuuki Nishiyama, Kaoru Sezaki:

Exploiting Spatial and Descriptive Information for Generative Compression. 1050-1051 - Taku Yamazaki, Tomoyuki Yokoyama, Takumi Miyoshi, Ryo Yamamoto:

Backoff-Based Opportunistic Routing with Concurrent Transmission. 1052-1053 - Faisal Haque Bappy

, Tariqul Islam, Tarannum Shaila Zaman, Md Sajidul Islam Sajid
, Mir Mehedi Ahsan Pritom:
ConChain: A Scheme for Contention-Free and Attack Resilient BlockChain. 1054-1055 - Safdar Hussain Bouk, Babatunji Omoniwa, Sachin Shetty:

Predicting Downlink Retransmissions in 5G Networks Using Deep Learning. 1056-1057 - Taku Yamazaki, Naoki Maeda, Takumi Miyoshi, Takuya Asaka:

Wireless Point Cloud Streaming Experiment Using IEEE 802.11ax. 1058-1059 - Changi Hong, Jung Hyuk Lee, Moongu Jeon, Hong Kook Kim

:
Optimization for Low-Resource Speaker Adaptation in End-to-End Text-to-Speech. 1060-1061 - Shusaku Umeda, Kazuaki Ishioka, Kota Nakamura, Michiya Hayama, Akinori Taira, Akihiro Okazaki:

Heartbeat Interval Estimation Method Using Sub-Terahertz Sensing. 1062-1063 - Ei Tanaka, Yuichi Kawamoto, Nei Kato, Masashi Iwabuchi, Riku Ohmiya, Tomoki Murakami:

Frequency Resource Allocation for IRS-Aided Communication Using Beam Squint Approach. 1064-1065 - Siya Bao, Yiqun Jin:

BERT-Based Prediction Model of Management Sales Forecast Error Using Japanese Firms' Earnings Meeting Transcripts. 1066-1067 - Junichiro Yamada, Katsuya Suto

:
Deep Joint Source-Channel Coding with Optimal Compression Rate for mmWave Mobile Image Transmission. 1068-1069 - Yuki Sasaki, Sojin Ozawa, Kabuto Arai, Jin Nakazato, Manabu Tsukada, Kazuki Maruta:

Location-Based Broad-Range Null-Steering in V2X Multiuser MIMO Transmission. 1070-1071 - Yuta Sone, Katsuki Teraoka, Kenta Azuma, Ryoichi Shinkuma, Gabriele Trovato, Koichi Nihei, Takanori Iwai:

Calibration of Real-Time LIDAR Data with Static 3D Image. 1072-1073 - Keita Fukushima, Keiichi Mizutani, Hiroshi Harada:

A Study on Open-Loop Transmit Power Control for Scalable Cell-Free Networks. 1074-1075 - Ju Yeong Baek, Young-Seok Lee, Bang Chul Jung:

Downlink RIS-NOMA with Constellation Adjustment for 6G Wireless Communication Systems. 1076-1077 - Masaaki Miura, Katsuya Suto

:
Performance Analysis for IRS-Assisted SWIPT with Geometry-Based Phase Shift. 1078-1079 - Futo Noda, Gia Khanh Tran:

Proposal of LEO Based Population Estimation System Using Smartphone Emitted WLAN signals. 1080-1081 - Minkyu Oh, Young-Seok Lee, Jeong-Bong Lim, Chang-Ok Kang, Bang Chul Jung:

Hierarchical MUSIC Technique for Direction Finding of Multiple Signal Sources. 1082-1083 - Akihito Noda:

Underwater Large-Area Non-Contact Power Transfer Using Two-Dimensional Waveguide. 1084-1085 - Kotaro Uchida, Mikiya Yoshida, Hiroyuki Koga:

A Study on Semi-Reliable Communications for Real-Time Data Stream Services. 1086-1087 - Ryo Iwaki, Jin Nakazato, Muhammad Asad

, Ehsan Javanmardi
, Kazuki Maruta, Manabu Tsukada, Hideya Ochiai, Hiroshi Esaki:
Optimizing mmWave Beamforming for High-Speed Connected Autonomous Vehicles: An Adaptive Approach. 1088-1089 - Abiola Adegboyega

:
Cloud Storage Workload Characterization: An Approach with Time-Series Analysis. 1090-1091 - Takayuki Nishio

, Kojin Yorita, Shoki Ohta, Kota Maejima, Kanare Kodera, Yutaro Horikawa, Kozo Fukui:
Demo: Split Computing-Based Privacy-Preserving Image Classification and Object Detection. 1092-1093 - Kakyeom Jeon, Howon Lee:

Hierarchical Distributed Q-Learning-Based Resource Allocation and UBS Control in SATIN. 1094-1095 - Yerin Lee, Howon Lee:

Resource Allocation and Placement for Tethered Flying Platform-Aided IAB Network: Distributed DQN Approach. 1096-1097 - Jimin Jeon, Howon Lee:

Performance Improvement of Laser-Charged Multi-UAV Networks Based on a DQN Approach. 1098-1099 - Taketo Yasuyama, Mikiya Yoshida, Hiroyuki Koga:

A Study on Bloom Filter-Based Routing Scheme to Reduce Network Overhead in ICN. 1100-1101 - Rikuto Tanaka, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga, Goshi Sato, Kenichi Takizawa:

Dynamic Transmission Parameter Settings Based on Data Transmission and Reception Performance for 920MHz LoRa Communication. 1102-1103 - Yusuke Takeuchi, Daiki Nobayashi, Takeshi Ikenaga:

Performance Evaluation of the Impact Between IEEE 802.11ah and Private LoRa Using 920 MHz Band. 1104-1105 - Fitsum Debebe Tilahun, Chung G. Kang:

Attention Mechanism-Empowered MADDPG for Distributed Resource Allocation in Cell-Free Mobile Edge Computing. 1106-1107 - Toshiki Koga, Daiki Nobayashi, Takeshi Ikenaga:

Accuracy Improvement Method for Malicious Domain Detection Using Machine Learning. 1108-1109 - Kazuma Nonomura, Kui Wang

, Gunhee Cho, Hiroki Matsuo, Jin Nakazato, Zongdian Li, Tao Yu, Kei Sakaguchi:
Proof-of-Concept of Digital Twin for Road Safety Assisted by B5G Heterogeneous MEC Network. 1110-1111 - Naoki Tanaka, Daiki Nobayashi, Kazuya Tsukamoto, Takeshi Ikenaga:

Packet Recovery Method with Redundant Packets for Large Spatio-Temporal Data Retention. 1110-1111 - Sifat Rezwan, Juan A. Cabrera, Frank H. P. Fitzek

:
Balancing Beyond-Shannon: Demonstration of Functional Compression Using a Balancing Robot. 1112-1113 - Achim Schade, Vu Nguyen, Cansu Gencoglu, Giang T. Nguyen

, Frank H. P. Fitzek
:
Intuitive Robot Control with Data Gloves for Industrial Use Cases. 1114-1115 - Ren Goto, Kazushige Matama, Ryouta Aihata, Michiyo Suda, Hidekazu Suzuki, Katsuhiro Naito:

CYPHONIC Adapter: Enabling Secure P2P Connectivity for Diverse IoT Devices. 1116-1117 - Christopher Lehmann, Yijun Zhu, Andreas Ingo Grohmann, Frank H. P. Fitzek

:
Demonstration of Wireless Multi-Path Communication to Improve Reliability. 1118-1119 - Henrique Souza Rossi, Karan Mitra, Christer Åhlund, Irina Cotanis:

A Demonstration of ALTRUIST for Conducting QoE Subjective Tests in Immersive Systems. 1120-1121 - Xhulio Limani, Nina Slamnik-Krijestorac, Gilson Miranda, Ali Bostani

, Xiaoman Shen, Chun Pan, Xingfeng Jiang, Chi Zhang, Johann M. Márquez-Barja
:
Demonstrating Wi-Fi Slicing Capabilities for Enhancing Performance of Industrial Applications. 1122-1123 - Vincent Charpentier

, Nina Slamnik-Krijestorac, Juan Brenes, Johann M. Márquez-Barja
:
Showcasing 5G SA Experimentation Capabilities for Vertical Industries. 1124-1125 - Pascal Urien:

Demonstration of Innovative Trusted TLS-IM Multi-Factor Authentication Token. 1126-1127

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














