


default search action
20th ICIN 2017: Paris, France
- Noël Crespi, Antonio Manzalini, Stefano Secci:

20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017, Paris, France, March 7-9, 2017. IEEE 2017, ISBN 978-1-5090-3672-1 - Cristina Perfecto

, Javier Del Ser
, Mehdi Bennis:
On the interplay between scheduling interval and beamwidth selection for low-latency and reliable V2V mmWave communications. 1-8 - Smail Ghoul, Weijia Jia:

Techno-economic analysis and prediction for the deployment of 5G mobile network. 9-16 - Rupesh Singh:

Sub-channel assignment and resource scheduling for non-orthogonal multiple access (NOMA) in downlink coordinated multi-point systems. 17-22 - Mohsin Khalil, Junaid Qadir

, Oluwakayode Onireti, Muhammad Ali Imran
, Shahzad Younis:
Feasibility, architecture and cost considerations of using TVWS for rural Internet access in 5G. 23-30 - Wojciech Kmiecik

, Krzysztof Walkowiak
:
Dynamic overlay multicasting for deadline-driven requests provisioning in elastic optical networks. 31-35 - Charalampos Gavriil Kominos

, Nicolas Seyvet, Konstantinos Vandikas:
Bare-metal, virtual machines and containers in OpenStack. 36-43 - Federico Rizzo, Giovanni Luca Spoto, Paolo Brizzi, Dario Bonino, Giuseppe Di Bella, Pino Castrogiovanni:

Beekup: A distributed and safe P2P storage framework for IoE applications. 44-51 - Pedro Martinez-Julia

, Ved P. Kafle
, Hiroaki Harai:
Achieving the autonomic adaptation of resources in virtualized network environments. 52-59 - Valentin Rakovic

, Aleksandar Ichkov
, Nina Grosheva
, Vladimir Atanasovski
, Liljana Gavrilovska:
Analysis of virtual resource allocation for cloud-RAN based systems. 60-64 - Khaled Salah, Tarek Rahil Sheltami

:
Performance modeling of cloud apps using message queueing as a service (MaaS). 65-71 - Nam H. Do, Tien Van Do

, Xuan Thi Tran
, Lóránt Farkas, Csaba Rotter
:
A scalable routing mechanism for stateful microservices. 72-78 - Ian Oliver, Silke Holtmanns:

Providing for privacy in a network infrastructure protection context. 79-86 - Sowmya Ravidas, Shankar Lal, Ian Oliver, Leo Hippelainen:

Incorporating trust in NFV: Addressing the challenges. 87-91 - Selma Khebbache, Makhlouf Hadji, Djamal Zeghlache

:
Scalable and cost-efficient algorithms for VNF chaining and placement problem. 92-99 - Ruoqiao Li, Xi Xie, Pu Wang, Cong Jin:

Cloud-based moving object detection for mobile devices. 100-102 - Ludovic Noirie, Michel Le Pallec, Nesrine Ammar:

Towards automated IoT service recommendation. 103-106 - Christos Bouras, Anastasia Kollia, Andreas Papazois:

SDN & NFV in 5G: Advancements and challenges. 107-111 - Mojtaba Alizadeh

, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani
, Akram M. Zeki
, Shehzad Ashraf Chaudhry
, Muhammad Khurram Khan
:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". 112-116 - Hassan Bostani, Jean-Charles Grégoire:

Usable authentication systems for real time web-based audio/video communications. 117-121 - Said El Kafhali

, Khaled Salah:
Stochastic modelling and analysis of cloud computing data center. 122-126 - Jaafar Bendriss, Imen Grida Ben Yahia, Djamal Zeghlache

:
Forecasting and anticipating SLO breaches in programmable networks. 127-134 - Joe Mambretti, Jim Hao Chen, Fei Yeh, Robert L. Grossman, Piers Nash, Alison Heath, Renuka Arya, Stuti Agrawal, Zhenyu Zhang

:
Designing and deploying a bioinformatics software-defined network exchange (SDX): Architecture, services, capabilities, and foundation technologies. 135-142 - Olivier Dugeon, Rabah Guedrez, Samer Lahoud

, Géraldine Texier:
Demonstration of Segment Routing with SDN based label stack optimization. 143-145 - Reinhard Behrens, Ali Ahmed

:
Internet of Things: An end-to-end security layer. 146-149 - Fariborz Derakhshan, Horst Roessler, Peter Schefczik, Sabine Randriamasy:

On prediction of resource consumption of service requests in cloud environments. 169-176 - Antoine Auger, Ernesto Exposito

, Emmanuel Lochin
:
Sensor observation streams within cloud-based IoT platforms: Challenges and directions. 177-184 - Tasneem Salah, Mohamed Jamal Zemerly

, Chan Yeob Yeun
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
Performance comparison between container-based and VM-based services. 185-190 - Xiaofeng Qiu, Fangyuan Cheng, Weijia Wang, Gang Zhang, Yangjun Qiu:

A security controller-based software defined security architecture. 191-195 - Rebecca Copeland, Michael Copeland:

Independently Verifiable Identity Scheme (IVIS). 196-198 - Jonathan Vestin

, Andreas Kassler:
SDN enabled resiliency in LTE assisted small cell mmWave backhaul networks. 199-202 - Amina Boubendir, Emmanuel Bertin, Noëmie Simoni:

A VNF-as-a-service design through micro-services disassembling the IMS. 203-210 - Camille Jaggernauth, Douglas Gubbe:

An extended SNMP based IoT context-aware model for dynamic adaptability of embedded systems software. 211-213 - Csaba Rotter

, Janos Illes, Gabor Nyiri, Lóránt Farkas, Gergely Csatári, Gergo Huszty:
Telecom strategies for service discovery in microservice environments. 214-218 - Bruno Chatras

, Steve Tsang Kwong U, Nicolas Bihannic:
NFV enabling network slicing for 5G. 219-225 - Sirisilp Kongsilp, Matthew N. Dailey

:
Communication portals: Immersive communication for everyday life. 226-228 - Ahmed Khalid

, Jason J. Quinlan
, Cormac J. Sreenan:
MiniNAM: A network animator for visualizing real-time packet flows in Mininet. 229-231 - Luigi Atzori, Roberto Girau

, Salvatore Martis, Virginia Pilloni
, Marco Uras:
A SIoT-aware approach to the resource management issue in mobile crowdsensing. 232-237 - Armen Aghasaryan, Makram Bouzid, Dimitre Kostadinov:

Stimulus-based sandbox for learning resource dependencies in virtualized distributed applications. 238-245 - Imen Grida Ben Yahia, Jaafar Bendriss, Alassane Samba, Philippe Dooze:

CogNitive 5G networks: Comprehensive operator use cases with machine learning for management operations. 252-259 - Andrey Tolstikhin, Zeljko Zilic:

Concealed regression for aggregation in low power wireless networks. 260-267 - Ali Saeed Dayem Alfoudi, Mohammed Dighriri, Gyu Myoung Lee, Rubem Pereira, Fung Po Tso

:
Traffic management in LTE-WiFi slicing networks. 268-273 - Jean-Charles Grégoire:

Mediation-based communications. 274-278 - Osamah L. Barakat

, David Koll, Xiaoming Fu
:
Gavel: Software-defined network control with graph databases. 279-286 - David Perez Abreu

, Karima Velasquez
, Alexandre Miguel Pinto, Marília Curado
, Edmundo Monteiro
:
Describing the Internet of Things with an ontology: The SusCity project case study. 294-299 - Matteo Mallus, Giuseppe Colistra, Luigi Atzori, Maurizio Murroni

, Virginia Pilloni
:
A persuasive real-time carpooling service in a smart city: A case-study to measure the advantages in urban area. 300-307 - Sameer G. Kulkarni, Mayutan Arumaithurai, K. K. Ramakrishnan

, Xiaoming Fu
:
Neo-NSH: Towards scalable and efficient dynamic service function chaining of elastic network functions. 308-312 - Shohreh Ahvar, Gabriel Santos

, Nouredine Tamani, Bernard Istasse, Isabel Praça
, Paul-Emmanuel Brun
, Yacine Ghamri-Doudane, Noël Crespi:
Ontology-based model for trusted critical site supervision in FUSE-IT. 313-315 - Jean-Charles Grégoire, Song Nhi Nguyen:

Tell me again, why should i talk to strangers? 316-318 - Cigdem Sengul

:
Privacy, consent and authorization in IoT. 319-321 - Federico Fernandez

, Álvaro Alonso
, Lourdes Marco
, Joaquín Salvachúa:
A model to enable application-scoped access control as a service for IoT using OAuth 2.0. 322-324 - Michele Nitti

, Roberto Girau
, Luigi Atzori, Virginia Pilloni
:
Trustworthiness management in the IoT: The importance of the feedback. 325-327 - Dina Hussein, Emmanuel Bertin, Vincent Frey:

Access control in IoT: From requirements to a candidate vision. 328-330 - Paridhika Kayal, Harry G. Perros:

A comparison of IoT application layer protocols through a smart parking implementation. 331-336 - Lei Miao:

Calibration-free wireless indoor localization (CAFLOC). 337-342 - Hitomi Fuji, Kazuya Tsukamoto, Akira Nagata, Katsuichi Nakamura:

Effective data collection scheme for real-spatial group communication among mobile nodes. 343-348 - Daniel Kümper, Ralf Tönjes, Elke Pulvermüller:

An infrastructure-based interpolation and propagation approach for IoT data analytics. 349-354 - Dan Puiu, Stefan Bischof

, Bogdan Serbanescu, Septimiu Nechifor, Josiane Xavier Parreira
, Herwig Schreiner:
A public transportation journey planner enabled by IoT data analytics. 355-359 - Thu-Le Pham, Stefano Germano

, Alessandra Mileo
, Daniel Kümper, Muhammad Intizar Ali
:
Automatic configuration of smart city applications for user-centric decision support. 360-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














