


default search action
ICDCN 2025: Hyderabad, India
- Amos Korman, Sandip Chakraborty, Sathya Peri, Chiara Boldrini, Peter Robinson:

Proceedings of the 26th International Conference on Distributed Computing and Networking, ICDCN 2025, Hyderabad, India, January 4-7, 2025. ACM 2025, ISBN 979-8-4007-1062-9 - Shameem Raj Nadaf

, Sai Bhavadeesh Yarlagadda
, Hemant Kumar Rath
, Garima Mishra
:
A Cognitive Resource Aware Orchestration of Network Services for 5G and beyond. 1-10 - Aviroop Ghosh

, Saleh Yousefi
, Thomas Kunz
:
Multi-Stream TSN Gate Control Scheduling in the Presence of Clock Synchronization. 11-20 - Rohit Kumar

, Joy Chandra Mukherjee
:
On-demand Multi-Node Partial Charging Scheme using Multiple Wireless Charging Vehicles in WRSN. 21-30 - Preetham N

, Sourav Kanti Addya
, Keerthan Kumar T. G.
, Saumya Hegde
:
LitE: Load Balanced Virtual Data Center Embedding for Energy Efficiency in Data Centers. 31-35 - Yaqiao Li

, Mahtab Masoori
, Lata Narayanan
, Denis Pankratov
:
Renting Servers for Multi-Parameter Jobs in the Cloud. 36-45 - Arindam Khanda

, Anurag Satpathy
, Anusha Vangala
, Sajal K. Das
:
SMEVCA: Stable Matching-based EV Charging Assignment in Subscription-Based Models. 46-55 - Elisabeth Permatasari

, Abusayeed Saifullah
, Haibo Zhang
:
Jamming-Resilient Channel Hopping for WirelessHART Networks. 56-65 - Ali Nadim Alhaj

, Wilson Naik Bhukya
, Rajendra Prasad Lal
:
Advanced Method for Flow Frequency Estimation and Top-k Heavy Hitters Detection in SDN Leveraging Programmable Switch. 66-72 - Agrima Khanna

, Fangqi Liu
, Samir Gupta
, Sophie Pavia
, Ayan Mukhopadhyay
, Abhishek Dubey
:
PDPTW-DB: MILP-Based Offline Route Planning for PDPTW with Driver Breaks. 73-83 - Anoop Kumar Pandey

, Bheemarjuna Reddy Tamma
, M. V. Panduranga Rao
:
Mixing Entanglement Swapping and Hop-by-Hop Transmission On Heterogeneous Quantum Networks. 84-93 - Anil Kumar Chillara

, Paresh Saxena
, Rajib Ranjan Maiti
:
Transformer-based GAN-augmented Defender for Adversarial USB Keystroke Injection Attacks. 94-103 - Kevin Kostage

, Rohan Adepu
, Jenaya Monroe
, Trevontae Haughton
, Juan Mogollon
, Saketh Poduvu
, Kannappan Palaniappan
, Chengyi Qu
, Prasad Calyam
, Reshmi Mitra
:
Federated Learning-enabled Network Incident Anomaly Detection Optimization for Drone Swarms. 104-114 - Subhash Bhagat

, Andrzej Pelc
:
Deterministic Collision-Free Exploration of Unknown Anonymous Graphs. 115-124 - Easwar Kilari

, Sriram Kailasam
:
Distributed Computation of Skyline Probability over Uncertain Preferences. 125-133 - John Augustine

, Mohit Daga
:
Distributed Small Cuts using Semigroups. 134-143 - Hongyan Ji

, Shreyas Pai
, Sriram V. Pemmaraju
, Joshua Z. Sobel
:
Faster Set Cover in the MPC Model. 144-151 - Hongyan Ji

, Kishore Kothapalli
, Sriram V. Pemmaraju
, Ajitanshu Singh
:
Fast Deterministic Massively Parallel Ruling Sets Algorithms. 152-160 - Sajal K. Das

, Amit Kumar Dhar
, Barun Gorain
, Madhuri Mahawar
:
Collision-free Exploration by Mobile Agents Using Pebbles. 161-170 - Ashish Saxena

, Kaushik Mondal
:
Path Connected Dynamic Graphs with a Study of Efficient Dispersion. 171-180 - Ahmad Hossein Yazdani

, Arnab K. Paul
, Ahmad Maroof Karimi
, Feiyi Wang
, Ali Raza Butt
:
User-based I/O Profiling for Leadership Scale HPC Workloads. 181-190 - Ravi Kishore

:
Perfectly Secure Message Transmission Tolerating Omission Faults - Possibility Feasibility, and Optimality. 191-200 - Vincent Kowalski

, Achour Mostéfaoui
, Matthieu Perrin
, Sinchan Sengupta
:
Byzantine-Tolerant Privacy-Preserving Atomic Register. 201-210 - Kalash

, Bishakh Chandra Ghosh
, Sourav Kanti Addya
:
Enhancing Security in Smart Contract Wallets : An OTP Based 2-Factor Authentication Approach. 211-220 - Tanvir Kaur

, Ashish Saxena
, Partha Sarathi Mandal
, Kaushik Mondal
:
Black Hole Search in Dynamic Graphs. 221-230 - Avisek Sharma

, Pritam Goswami
, Buddhadeb Sau
:
Computational Power of Mobile Robots: Discrete Version. 231-238 - Ajay D. Kshemkalyani

, Manaswini Piduguralla
, Sathya Peri
, Anshuman Misra
:
On Constructing a Byzantine Linearizable SWMR Atomic Register from SWSR Atomic Registers. 239-243 - Bhargavi Sriram

, John Augustine
:
Fair and Representative Jury Selection for Decentralized Justice. 244-248 - Raja Das

, Pritam Goswami
, Brati Mondal
, Buddhadeb Sau
:
Rectangle Enclosed Triangular Grid Exploration with Myopic Luminous Robots. 249-253 - Rik Banerjee

, Manish Kumar
, Anisur Rahaman Molla
:
Optimal Fault-Tolerant Dispersion on Oriented Grids. 254-258 - Brati Mondal

, Pritam Goswami
, Buddhadeb Sau
:
Time Optimal Distance-k-Dispersion on Dynamic Ring. 259-263 - Raja Das

, Buddhadeb Sau
:
Exploration of Infinite Triangular Grid by Myopic Robots without Chirality. 264-268 - Ashish Saxena

, Tanvir Kaur
, Kaushik Mondal
:
Dispersion on Time Varying Graphs. 269-273 - Amit Garu

, Arya Tanmay Gupta
, Duong Ngoc Nguyen
, Sandeep S. Kulkarni
:
Quantitative characterization of consistency violating faults at individual distributed computing processes. 274-275 - Priyanka Ashok Birajdar

, Harsha V
, Anurag Satpathy
, Sourav Kanti Addya
:
Adaptive Workload Management for Enhanced Function Performance in Serverless Computing. 276-277 - Irshad Ali

, Basant Subba
:
PhishURLDetect: A parameter efficient fine-tuning of LLMs using LoRA for detection of phishing URLs. 278-279 - Raaghav Ravishankar

, Sandeep S. Kulkarni
, Sathya Peri
, Gokarna Sharma
:
Distributing Context-Aware Shared Memory Data Structures: A Case Study on Singly-Linked Lists. 280-281 - Nasit S. Sony

, Xianzhong Ding
:
A Committee Based Optimal Asynchronous Byzantine Agreement Protocol W.P. 1. 282-283 - Aruna Devi B

, Karthik N
:
Postprandial Blood Glucose Level Prediction through combined Machine Learning, Meta-Learning and XAI. 284-286 - Subhajit Pramanick

, Partha Sarathi Mandal
:
MIS Filling and Mutual Visibility with Luminous Robot Swarm. 287-288 - Arnab Majumder

, Shahnaz Warsi
, Junaid Alam
, Soumyadev Maity
:
Algebraic Signature based Trusted Execution Environment for Remote Computation. 289-294 - Prasad D. Devkar

, Nalini Ajwani
, Sudarshan Malla
, Aasttha Bhatt
, Mahiman Dave
, Neha Sharma
, Mrityunjoy Panday
, Chittaranjan S. Yajnik
:
Topological Analysis of Dermatoglyphic Patterns using Synthetic and Real Data. 295-301 - Amritanjali

, Ragav Gupta
:
Federated Learning for Privacy Preserving Intelligent Healthcare Application to Breast Cancer Detection. 302-306 - Saikat Chandra Bakshi

, Gopal Chandra Roy
, Eravelli Saicharan
, E. Parvathi
:
On Underground Mine Communication Systems. 307-312 - Isha Ganguli

, Meet Nakum
, Bhashwatee Das
, Nancy Kshetrimayum
:
Comprehensive Analysis of Air Quality Trends in India Using Machine Learning and Deep Learning Models. 313-318 - Aqsa Ashraf Makhdomi

, Iqra Altaf Gillani
:
Decentralized Ridesharing: Overcoming Scalability Issues with Layer 2 Solution. 319-324 - Sagar Gupta

, Aman Gupta
:
Advancing Carbon-Efficient Software Development: A Sustainable Path Forward. 325-330 - Jay Barach

:
Towards Zero Trust Security in SDN: A Multi-Layered Defense Strategy. 331-339 - Sai Venkata Jaswant Kolupuri

, Ananya Paul
, Rajat Subhra Bhowmick
, Isha Ganguli
:
Scams and Frauds in the Digital Age: ML-Based Detection and Prevention Strategies. 340-345 - Mitali Sinha

, Padmalochan Bera
, Manoranjan Satpathy
:
SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDN. 346-351 - Saikat Chandra Bakshi

, Ankita Pramanik
, Gopal Chandra Roy
, Eravelli Saicharan
:
On IoT based Underground Mine Environment Monitoring Systems. 352-357 - Amritesh Kumar

, Nitin Bhatia
, Debasis Das
:
Grouping nodes based PBFT for Preventing Fake Educational Certificates Verification. 358-363 - Arnab Mallick

, Rajesh P. Barnwal
:
A Scalable Framework for Multi-cloud IoT Data Synchronization. 364-369 - Rangin Lahiri

, Saikat Chakrabarti
, Subrata Saha
:
Non-Fungible Tokens (NFTs): A Systematic Study of Trust Criteria. 370-376 - Alekhya Gorrela

, Nikumani Choudhury
:
Faster Convergence of Adaptive Data Rate in Dynamic LoRa-based IoT Network Applications. 377-382 - Yash Ganar

, Vinay Kumar
, Shraddha Dulera
, Ram Narayan Yadav
:
Optimizing Autonomous Intersection Control Using Single Agent Reinforcement Learning. 383-389 - Kasturi Routray

, Padmalochan Bera
:
Secure and Expressive Authorized Keyword Search in Cloud-Assisted Cyber-Physical Systems. 390-395 - Ankit Dixit

, Ravi Bhandari
, Pallab Maji
:
RoadEye: A Framework For Detecting Traffic Rule Violations. 396-401 - Prianshu Jha

, Gurpreet Singh
, Amit Kumar
, Dewesh Agrawal
, Yashwant Singh Patel
, Javad Forough
:
NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy. 402-407 - Babli Kumari

, Renu Dhir
, Siddhartha Chatterjee
, Suchi Jain
:
Automated Identification of Traffic Accidents in Images and Videos Employing Advanced Deep Learning Methods. 408-413 - Pushpak Shukla

, Shailendra Shukla
:
Unmanned Aerial Vehicle (UAV) Based Disaster Detection and Crowd Sensing Using Deep Learning Models. 414-419 - Suman Das

, Pankaj Kumar Keserwani
, Mahesh Chandra Govil
:
Detecting Adversarial Samples using Kernel Density Feature Extractor in Medical Image. 420-425 - Koteswararao Kondepu

, Bheemarjuna Reddy Tamma
, Venkateswarlu Gudepu
:
O-RIDE: Open-RAN Innovation and Deployments Exploration. 426-429 - Bapi Chatterjee

, Sathya Peri
:
Concurrent and Learned Data Structures. 430-434

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














