


default search action
16th CNSM 2020: Izmir, Turkey
- Nur Zincir-Heywood, Mehmet Ulema, Müge Sayit, Stuart Clayman, Myung-Sup Kim, Cihat Cetinkaya:

16th International Conference on Network and Service Management, CNSM 2020, Izmir, Turkey, November 2-6, 2020. IEEE 2020, ISBN 978-3-903176-31-7 - Stefan Schneider

, Lars Dietrich Klenner, Holger Karl:
Every Node for Itself: Fully Distributed Service Coordination. 1-9 - Muriel Figueredo Franco

, Bruno Rodrigues
, Eder John Scheid
, Arthur Selle Jacobs
, Christian Killer, Lisandro Zambenedetti Granville
, Burkhard Stiller:
SecBot: a Business-Driven Conversational Agent for Cybersecurity Planning and Management. 1-7 - Wejdene Saied, Adel Bouhoula

:
A Formal Approach for Automatic Detection and Correction of SDN Switch Misconfigurations. 1-5 - Robert Kuceba, Grzegorz Chmielarz:

Experimental Model of the System for Intelligent Power Plant Management. 1-5 - Karima Khadir, Nawal Guermouche, Thierry Monteil, Amal Guittoum:

Towards avatar-based discovery for IoT services using social networking and clustering mechanisms. 1-7 - Michael Seufert

, Nikolas Wehner, Viktoria Wieser, Pedro Casas
, Germán Capdehourat
:
Mind the (QoE) Gap: On the Incompatibility of Web and Video QoE Models in the Wild. 1-5 - Alper Kaan Sarica, Pelin Angin:

A Novel SDN Dataset for Intrusion Detection in IoT Networks. 1-5 - Samier Barguil, Óscar González de Dios, Víctor López, Roque Gagliano, Ignacio Carretero, Ricard Vilalta:

Experimental validation of L3 VPN Network Model for improving VPN service design and provisioning. 1-5 - Linna Fan

, Shize Zhang, Yichao Wu
, Zhiliang Wang, Chenxin Duan, Jia Li, Jiahai Yang:
An IoT Device Identification Method based on Semi-supervised Learning. 1-7 - Mark Szalay

, Péter Mátray, László Toka:
AnnaBellaDB: Key-Value Store Made Cloud Native. 1-5 - Suman Pandey, James W. Hong, Jae-Hyoung Yoo:

Environment Aware Adaptive Q-Learning to Deploy SFC on Edge Computing. 1-5 - Farnaz Hassanzadeh, Ertan Onur

:
Content Placement Problem in a Hierarchical Collaborative Caching method for 5G networks (CPP-HCC). 1-7 - Satoru Kobayashi

, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda:
amulog: A General Log Analysis Framework for Diverse Template Generation Methods. 1-5 - Salim Mohamed, Osama Mohammed:

Understanding Hop Characteristics for Enhanced Relay Services. 1-5 - Lyla Naghipour Vijouyeh

, Masoud Sabaei, José Santos
, Tim Wauters, Bruno Volckaert, Filip De Turck
:
Efficient Application Deployment in Fog-enabled Infrastructures. 1-9 - Jiyoon Lim, Sukhyun Nam, Jae-Hyoung Yoo, James Won-Ki Hong:

Best nexthop Load Balancing Algorithm with Inband network telemetry. 1-7 - Rasoul Behravesh, Daniel F. Perez-Ramirez

, Akhila Rao, Davit Harutyunyan, Roberto Riggio, Rebecca Steinert:
ML-Driven DASH Content Pre-Fetching in MEC-Enabled Mobile Networks. 1-7 - Rafael Copstein, Nur Zincir-Heywood:

Temporal Representations for Detecting BGP Blackjack Attacks. 1-7 - Tahajjat Begum, Israat Haque

, Vlado Keselj
:
Deep Learning Models for Gesture-controlled Drone Operation. 1-7 - Andrés F. Ocampo, Mah-Rukh Fida, Ahmed Elmokashfi, Haakon Bryhni:

Evaluating the Cloud-RAN architecture: functional splitting and switched Ethernet Xhaul. 1-5 - Kensuke Takahashi, Tomoki Ikegaya, Ryota Katayanagi, Satoshi Kondoh, Tsuyoshi Toyoshima:

A Workflow-less Autonomous System Architecture for Assurance Operations using Choreography Architecture. 1-5 - Adyson Magalhães Maia, Yacine Ghamri-Doudane, Dario Vieira

, Miguel Franklin de Castro
:
Dynamic Service Placement and Load Distribution in Edge Computing. 1-9 - Nguyen Tuan Khai, Andreas Baumgartner, Thomas Bauschert:

A Synchronous Multi-Step Algorithm for Flexible and Efficient Virtual Network Reconfiguration. 1-7 - Onur Ugurlu, Vahid Khalilpour Akram, Deniz Türsel Eliiyi:

A Distributed Depth First Search based Algorithm for Edge Connectivity Estimation. 1-6 - Rafael de Jesus Martins, Ariel Galante Dalla-Costa

, Juliano Araújo Wickboldt, Lisandro Zambenedetti Granville
:
SWEETEN: Automated Network Management Provisioning for 5G Microservices-Based Virtual Network Functions. 1-9 - Paola Soto

, Miguel Camelo
, Jaron Fontaine, Merkebu Girmay
, Adnan Shahid, Vasilis Maglogiannis
, Eli De Poorter, Ingrid Moerman, Juan Felipe Botero, Steven Latré:
Augmented Wi-Fi: An AI-based Wi-Fi Management Framework for Wi-Fi/LTE Coexistence. 1-9 - Ismael Castell-Uroz

, Théo Poissonnier, Pierre Manneback, Pere Barlet-Ros:
URL-based Web Tracking Detection Using Deep Learning. 1-5 - Xiaoxuan Wang, Forough Shahab Samani, Rolf Stadler:

Online feature selection for rapid, low-overhead learning in networked systems. 1-7 - Khulan Batbayar, Roc Meseguer

, Ramin Sadre, Suresh Subramaniam
:
GateSelect: A novel Internet gateway selection algorithm for client nodes. 1-9 - Shaohan Huang, Yi Liu, Carol J. Fung, Rong He, Yining Zhao, Hailong Yang, Zhongzhi Luan:

Transfer Log-based Anomaly Detection with Pseudo Labels. 1-5 - Van Tong, Sami Souihi, Hai Anh Tran, Abdelhamid Mellouk:

Service-centric Segment Routing Mechanism using Reinforcement Learning for Encrypted Traffic. 1-5 - Ryo Nakamura, Noriaki Kamiyama:

Analysis of Content Availability at Network Failure in Information-Centric Networking. 1-7 - Christoph Hardegen

, Sebastian Rieger:
Prediction-based Flow Routing in Programmable Networks with P4. 1-5 - Joseph McNamara

, Liam Fallon, Enda Fallon
:
A Mechanism for Intent Driven Adaptive Policy Decision Making. 1-3 - Ahmad Abboud, Rémi Garcia

, Abdelkader Lahmadi, Michaël Rusinowitch, Adel Bouhoula
:
R2-D2: Filter Rule set Decomposition and Distribution in Software Defined Networks. 1-4 - Angelo Tulumello, Andrea Mayer, Marco Bonola

, Paolo Lungaroni
, Carmine Scarpitta
, Stefano Salsano, Ahmed Abdelsalam, Pablo Camarillo, Darren Dukes, François Clad, Clarence Filsfils:
Micro SIDs: a solution for Efficient Representation of Segment IDs in SRv6 Networks. 1-10 - Pedro Reviriego

, Ori Rottenstreich:
Pollution Attacks on Counting Bloom Filters for Black Box Adversaries. 1-7 - Ximun Castoreo, Patrick Maillé, Bruno Tuffin:

Weaknesses and Challenges of Network Neutrality Measurement Tools. 1-5 - Nicholas Gray, Katharina Dietz, Tobias Hoßfeld

:
Simulative Evaluation of KPIs in SDN for Topology Classification and Performance Prediction Models. 1-9 - Alessandro Piccoli, Marc-Oliver Pahl

, Steffen Fries, Tolga Sel:
Ensuring Consistency for Asynchronous Group-Key Management in the Industrial IoT. 1-5 - Nilupulee Anuradha Gunathilake

, Ahmed Al-Dubai
, William J. Buchanan:
Recent Advances and Trends in Lightweight Cryptography for IoT Security. 1-5 - Bita Kheibari, Müge Sayit:

Quality estimation for DASH clients by using Deep Recurrent Neural Networks. 1-8 - Heegon Kim, Suhyun Park, DongNyeong Heo, Stanislav Lange, Heeyoul Choi, Jae-Hyoung Yoo, James Won-Ki Hong:

Graph Neural Network-based Virtual Network Function Deployment Prediction. 1-7 - Othmane Belmoukadam, Chadi Barakat

:
From Encrypted Video Traces to Viewport Classification. 1-9 - Stefan Schneider

, Adnan Manzoor, Haydar Qarawlus
, Rafael Schellenberg
, Holger Karl, Ramin Khalili, Artur Hecker
:
Self-Driving Network and Service Coordination Using Deep Reinforcement Learning. 1-9 - Guto Leoni Santos, Judith Kelner, Djamel Sadok, Patricia Takako Endo

:
Using Reinforcement Learning to Allocate and Manage SFC in Cellular Networks. 1-5 - Müge Erel Ozcevik

, Ferdi Tekçe
, Fuat Kayapinar:
Analytical Delay Model of virtual CPE for 5G eMBB services in SD-CDN. 1-5 - Atsushi Takada, Naoki Hayashi, Mizuto Nakamura, Toshihiko Seki, Kyoko Yamagoe:

Topology Discovery Method using Network Equipment Alarms. 1-5 - Kim Hammar, Rolf Stadler:

Finding Effective Security Strategies through Reinforcement Learning and Self-Play. 1-9 - Gábor Soós, Dániel Ficzere, Pál Varga:

Investigating the network traffic of Industry 4.0 applications - methodology and initial results. 1-6 - Ismael Castell-Uroz

, Josep Solé-Pareta, Pere Barlet-Ros:
Demystifying Content-blockers: A Large-scale Study of Actual Performance Gains. 1-7 - Sarah Wassermann, Pedro Casas

, Zied Ben-Houidi, Alexis Huet, Michael Seufert
, Nikolas Wehner, Joshua Schüler, Shengming Cai, Hao Shi, Jinchun Xu, Tobias Hoßfeld, Dario Rossi:
Are you on Mobile or Desktop? On the Impact of End-User Device on Web QoE Inference from Encrypted Traffic. 1-9 - Shubham Jain

, Amy de Buitléir
, Enda Fallon
:
Unsupervised Noise Detection in Unstructured data for Automatic Parsing. 1-5 - Marat Zhanikeev:

Modeling Components for Cut-Through Performance Analysis of Network Switches. 1-5 - Hanhimnara Choi, Syed M. Raza

, Moonseong Kim, Hyunseung Choo:
UDP Flow Entry Eviction Strategy Using Q-Learning in Software Defined Networking. 1-7 - José Jurandir Alves Esteves, Amina Boubendir, Fabrice Guillemin

, Pierre Sens:
Heuristic for Edge-enabled Network Slicing Optimization using the "Power of Two Choices". 1-9 - Jibum Hong, Suhyun Park, Jae-Hyoung Yoo, James Won-Ki Hong:

Machine Learning based SLA-Aware VNF Anomaly Detection for Virtual Network Management. 1-7 - Hardeep Kaur Dhalla:

A Performance Analysis of Native JSON Parsers in Java, Python, MS.NET Core, JavaScript, and PHP. 1-5 - Leandro Marcio Bertholdo

, João M. Ceron, Lisandro Zambenedetti Granville
, Giovane C. M. Moura, Cristian Hesselman, Roland van Rijswijk-Deij
:
BGP Anycast Tuner: Intuitive Route Management for Anycast Services. 1-7 - Grzegorz Chmielarz, Arnold Pabian

:
AI development and application of AI-based solutions in the area of information and data management in Poland. 1-8 - Yasaman Amannejad:

Building and Evaluating Federated Models for Edge Computing. 1-5 - Wesley da Silva Coelho, Amal Benhamiche, Nancy Perrot

, Stefano Secci:
On the impact of novel function mappings, sharing policies, and split settings in network slice design. 1-9 - Doyoung Lee, Jae-Hyoung Yoo, James Won-Ki Hong:

Deep Q-Networks based Auto-scaling for Service Function Chaining. 1-9 - Ashima Chawla

, Paul Jacob, Saman Feghhi, Devashish Rughwani, Sven van der Meer, Sheila Fallon
:
Interpretable Unsupervised Anomaly Detection For RAN Cell Trace Analysis. 1-5 - Nguyen Van Tu, Jae-Hyoung Yoo, James Won-Ki Hong:

Measuring End-to-end Packet Processing Time in Service Function Chaining. 1-9 - Carol J. Fung, Bill McCormick:

An Effective Policy Sharing Mechanism for Smart Home Networks. 1-7 - Raza Ul-Mustafa

, Md. Tariqul Islam, Christian Esteve Rothenberg
, Simone Ferlin
, Darijo Raca, Jason J. Quinlan
:
DASH QoE Performance Evaluation Framework with 5G Datasets. 1-6 - Mohammad A. Salahuddin, Md. Faizul Bari, Hyame Assem Alameddine, Vahid Pourahmadi, Raouf Boutaba:

Time-based Anomaly Detection using Autoencoder. 1-9 - Ioannis Papakonstantinou, Sarantis Kalafatidis

, Lefteris Mamatas:
A Techno-Economic Assessment of Microservices. 1-5 - J. J. Garcia-Luna-Aceves, Abdulazaz Ali Albalawi

:
Connection-Free Reliable and Efficient Transport Services in the IP Internet. 1-7 - Yekta Turk, Engin Zeydan, Zeki Bilgin, Baris Berk Zorba

:
Network Coding Aware User Plane for Mobile Networks. 1-5 - Shiyam Alalmaei, Yehia Elkhatib

, Mehdi Bezahaf
, Matthew Broadbent
, Nicholas J. P. Race
:
SDN Heading North: Towards a Declarative Intent-based Northbound Interface. 1-5 - Meysam Shojaee, Miguel C. Neves, Israat Haque

:
SafeGuard: Congestion and Memory-aware Failure Recovery in SD-WAN. 1-7 - Gilson Miranda Jr., Daniel Fernandes Macedo

, Johann M. Márquez-Barja
:
A QoE Inference Method for DASH Video Using ICMP Probing. 1-5 - Zakaria Alomari, Mohamed Faten Zhani

, Moayad Aloqaily
, Ouns Bouachir:
On Minimizing Synchronization Cost in NFV-based Environments. 1-9 - Xiaofan Yu, Xueyang Song, Ludmila Cherkasova, Tajana Simunic Rosing:

Reliability-Driven Deployment in Energy-Harvesting Sensor Networks. 1-9 - Kazuki Tanabe

, Tatsuya Fukuda, Takayuki Kuroda:
Automated Performance Evaluation of Intent-based Virtual Network Systems. 1-7 - Wejdene Saied, Faouzi Jaïdi

, Adel Bouhoula
:
A Comprehensive Solution for the Analysis, Validation and Optimization of SDN Data-Plane Configurations. 1-7 - Daniel King, Adrian Farrel:

A PCE-Based Framework for Future Internet Deterministic and Time-Sensitive Networks. 1-7 - Mahzabeen Emu, Salimur Choudhury:

Ensemble Deep Learning Aided VNF Deployment for IoT Services. 1-7 - Alexis Huet, Zied Ben-Houidi, Bertrand Mathieu, Dario Rossi:

Detecting Degradation of Web Browsing Quality of Experience. 1-7 - Farzad Habibi

, Mahdi Dolati
, Ahmad Khonsari, Majid Ghaderi:
Accelerating Virtual Network Embedding with Graph Neural Networks. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














