Filters








13 Hits in 8.7 sec

A Hybrid Approach to Assess the Network Awareness of P2P-TV Applications

Dario Rossi, Paolo Veglia
2010 International Journal of Digital Multimedia Broadcasting  
may provide a nonnegligible level of geographical clustering among peers as a beneficial side effect.  ...  As an interesting case study, we then apply this methodology to PPLive, one of the most popular P2P-TV systems nowadays.  ...  , "A Fistful of Pings: Accurate and Lightweight Anycast Enumeration and Geolocation", IEEE INFOCOM, Hong Kong, China, , 2015 [C89] Cicalese, Danilo,Joumblatt, Diana,Rossi, Dario,Buob, Marc-Olivier  ... 
doi:10.1155/2010/826351 fatcat:ugfl56oaszattmgsn4bjispznm

Energy Efficient Optimization for Wireless Virtualized Small Cell Networks With Large-Scale Multiple Antenna

Zheng Chang, Zhu Han, Tapani Ristaniemi
2017 IEEE Transactions on Communications  
IEEE INFOCOM 2015 Workshop on Mobile Cloud and Virtualization, Hong Kong, April 26-May 1, 2015. 28. Z. Chang, T. RistaniemiΛ and Z.  ...  IEEE INFOCOM Workshop on Green Cognitive Communications and Computing Networks, Toronto, Canada, April 27 -May 2, 2014. 40. Z. Chang and T.  ... 
doi:10.1109/tcomm.2017.2666182 fatcat:6plxmq45urbq5fnideivv64mia

Nebula: Reliable Low-latency Video Transmission for Mobile Cloud Gaming [article]

Ahmad Alhilal
2022 arXiv   pre-print
Nebula relies on an end-to-end distortion model adapting the video source rate and the amount of frame-level redundancy based on the measured network conditions.  ...  Mobile cloud gaming enables high-end games on constrained devices by streaming the game content from powerful servers through mobile networks.  ...  In IEEE INFOCOM 2014 - IEEE Conference on Computer [35] Pengyuan Zhou, Wenxiao Zhang, Tristan Braud, Pan Hui, and Jussi Kangasharju. Communications.  ... 
arXiv:2201.07738v1 fatcat:cjysjbadb5dazmhs6a5ivv42ee

A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Chaeyeon Oh, Joonseo Ha, Heejun Roh
2021 Applied Sciences  
To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios  ...  Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis  ...  In Proceedings of the 33rd IEEE Interna- tional Conference on Computer Communications (IEEE INFOCOM), Toronto, ON, Canada, 27 April–2 May 2014. [CrossRef] 91.  ... 
doi:10.3390/app12010155 fatcat:kdkvmdkbareb7cxgy7er7ncday

The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [chapter]

2015 Network Security and Communication Engineering  
No part of this publication or the information contained herein may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying, recording  ...  IEEE Transactions on Aerospace and Electronic System, 1973, 9(2): 237-252.  ...  ., Shamir, A. 1986 The research on the space-time statistic characteristics of moving Sonar reverberation and its simulation method [1] Brennan L E, Reed I S. Theory of Adaptive Radar.  ... 
doi:10.1201/b18660-165 fatcat:jzfm3mzjp5eodi5gltayr4i544

Survey on Ranging Sensors and Cooperative Techniques for Relative Positioning of Vehicles

Fabian de Ponte Müller
2017 Sensors  
In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), Hong Kong, China, 31 May–7 June 2014; pp. 1836–1843. 138. Vu, T.D.; Aycard, O.; Tango, F.  ...  In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Anchorage, AK, USA, 23–28 June 2008; pp. 1–6.  ... 
doi:10.3390/s17020271 pmid:28146129 pmcid:PMC5335929 fatcat:utrccettrjhfvhhs3kdffepgsu

A QoS-Aware Machine Learning-Based Framework for AMI Applications in Smart Grids

Asfandyar Khan, Arif Iqbal Umar, Arslan Munir, Syed Hamad Shirazi, Muazzam A. Khan, Muhammad Adnan
2021 Energies  
Furthermore, the performance of the proposed framework is evaluated and validated on the CloudSim simulator.  ...  Further, we develop a queuing model in which different priorities are assigned to each item of the critical and normal AMI traffic based on its latency and packet size.  ...  In Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence  ... 
doi:10.3390/en14238171 fatcat:7hhw2vzzj5dbbdqrc55jnxjfs4

Users First: User-Centric Cluster Formation for Interference-Mitigation in Visible-Light Networks

Xuan Li, Fan Jin, Rong Zhang, Jiaheng Wang, Zhengyuan Xu, Lajos Hanzo
2016 IEEE Transactions on Wireless Communications  
Visible light communication (VLC) combined with 5 advanced illumination may be expected to become an integral 6 part of next-generation heterogeneous networks.  ...  Our simulation results demonstrate that the proposed 24 greedy MUS algorithm combined with the UC-VT cluster forma-25 tion is capable of providing an average user throughput of about 26 90% of the optimal  ...  April 9, 2015; revised July 20, 2015; accepted August 3, 2015.  ... 
doi:10.1109/twc.2015.2466539 fatcat:dchze6htdvaovoli4na3koptjm

Edge Intelligence: Architectures, Challenges, and Applications [article]

Dianlei Xu, Tong Li, Yong Li, Xiang Su, Sasu Tarkoma, Tao Jiang, Jon Crowcroft, Pan Hui
2020 arXiv   pre-print
In this paper, we present a thorough and comprehensive survey on the literature surrounding edge intelligence.  ...  Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence.  ...  top conferences including ACM WWW, ACM SIGCOMM, ACM Mobisys, ACM MobiCom, ACM CoNext, IEEE Infocom, IEEE ICNP, IEEE ICDCS, IJCAI, AAAI, and ICWSM.  ... 
arXiv:2003.12172v2 fatcat:xbrylsvb7bey5idirunacux6pe

Annual Report 2018
国立情報学研究所 平成30年度(2018年度)年報

電子情報通信学会英文論文誌 B IEICE Transactions on Communications 編集委員 2017 年 5 月-継続中 2) 電子情報通信学会英文論文誌 B 小特集, "Special Section on Communication Quality in Wireless 3) IEEE INFOCOM IoT4Health workshop 実行委員 2018 年 11  ...  (SIAM-ALA18),SIAM,Hong Kong Baptist University(2018.05) 2) Sugihara, K.  ... 
doi:10.20736/0000001316 fatcat:ag6okeeknjeoxglo6j6yylm55y

Annual Report 2017
国立情報学研究所 平成29年度(2017年度)年報

Wasa: "Efficient Enumeration of Maximal k-Degenerate Subgraphs in a Chordal Graph ", Computing and Combinatorics -23rd International Conference, COCOON 2017, Hong Kong, China, August 3-5, 2017, Proceedings  ...  Berg 他 [The 28th International Symposium on Algorithms and Computation] (ISAAC 2017), [volume 92 of Leibniz International Proceedings in Informatics, pages 26:1-26:13] Combinatorics Conference (COCOON  ... 
doi:10.20736/0000001218 fatcat:fybrqh7tifb3liogikv27kztca

HUSO 2017 The Third International Conference on Human and Social Analytics HUSO 2017 Technical Program Committee

Hong Technology, Jin Kong Xiaolong
Institute of Computing Technology (ICT) | Chinese Academy of Sciences (CAS), China Mirko Kämpf   unpublished
computing.  ...  behavior, both on personal and collective contexts.  ...  Liu, "Predicting flu trends using twitter data," in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on. IEEE, 2011, pp. 702-707. [8] A. A.  ... 
fatcat:ec7aaikaangnvctq3z77i5evye

Struktur und Mitglieder 2021

:None, MyCoRe Community, Gerald Haug
2021
Visiting professorships at the University of Florence (Italy), at the Polytechnic University and Hong Kong University (China) and Yonsei University in Seoul (South Korea) are a testament to your international  ...  AEU -International Journal of Electronics and Communications und von 2006 zum Thema "Hybrid Optical Network Architectures: Bringing Packets and Circuits Together" im IEEE Communications Magazine hinweisen  ...  " (1955) ], the medal with the effigy of Matthias Jacob Schleiden (1804 -1881) is conferred every two years on a researcher for significant achievements in the field of cell research.  ... 
doi:10.26164/leopoldina_06_00411 fatcat:cpzoygp4uzbobozzti6xbsee5m