default search action
31st SoftCOM 2023: Split, Croatia
- International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023, Split, Croatia, September 21-23, 2023. IEEE 2023, ISBN 979-8-3503-0107-6
- Jakub Nikonowicz, Mieczyslaw Jessa:
Wideband Spectrum Sensing Utilizing Cumulative Distribution Function and Machine Learning. 1-6 - Lars Mehnen, Thomas Mandl, Birgit Pohn, Matthias Blaickner, Isabel Dregely:
Analysis of Student Behaviour on Large Learning Management Systems. 1-6 - Valentin Kirchner, Holger Karl:
Embedding Delay-Constrained VNF Forwarding Graphs into Reconfigurable WDM Optical Networks. 1-6 - Joseph Henry Anajemba, Nedal Ababneh, Yasir Hamid, Atif Chowhan, Otuu Obinna, Emir Vajzovic:
SDN-based Port Hopping Technique for Mitigating Network Attacks. 1-6 - Oskars Ozolins, Armands Ostrovskis, Toms Salgals, Benjamin Krüger, Fabio Pittalà, Mahdieh Joharifar, Richard Schatz, Michael Koenigsmann, Yuchuan Fan, Urban Westergren, Haïk Mardoyan, Lu Zhang, Sandis Spolitis, Xianbin Yu, Markus Gruen, Vjaceslavs Bobrovs, Hadrien Louchet, Xiaodan Pang:
High-Baudrate SiP and InP Modulators for Data Center Interconnects. 1-3 - Stefania Nanni, Massimo Carboni, Gianluca Mazzini:
Flexible, Robust, Scalable Solution to Extract Information from IoT Public Network Sensors. 1-5 - David Cavalcanti, Danny Hughes, Nelson S. Rosa:
An Adaptive Energy Saving Mechanism for Middleware of Things. 1-6 - Rachel Van Campenhout, Michelle W. Clark, Jeffrey S. Dittel, Nick Brown, Richard Benton, Benny G. Johnson:
Exploring Student Persistence with Automatically Generated Practice through Interaction Patterns. 1-6 - Marcelo Rodrigo dos Santos, Demóstenes Zegarra Rodríguez, Renata Lopes Rosa:
A Novel QoE Indicator for Mobile Networks based on Twitter Opinion Ranking. 1-6 - Samuel Nack, Razib Iqbal, Siming Liu:
SeReIn: Smart Home Sensor Relationship Inference. 1-6 - Sinchan Biswas, Fatemeh Akbarian, Maria Kihl:
Implementation of Sequential Detection of Replay Attacks for a Cloud Native Controller. 1-6 - Sarra Khaber, Ryma Boussaha, Yacine Challal:
Service Orchestration in Autonomous Vehicle Networks: Leveraging Vehicular Fog and Edge Computing. 1-6 - Ruben Picek, Lovro Posaric, Darko Androcec:
Extending Functionality of ERP Systems with IoT Data. 1-6 - Danyllo Albuquerque, Everton Guimarães, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich:
Evaluating Interactive Detection of Code Smells on Software Development Activities. 1-6 - Michal Berlinski, Mateusz Rasmus, Zbigniew Kopertowski, Stanislaw Kozdrowski:
Ant Colony Algorithms Application for Telco Networks Performance with Multi-criteria Optimization. 1-3 - Fahad Rahman, Chafiq Titouna, Farid Naït-Abdesselam:
Asymmetric Byzantine Quorum Approach to Resolve Trust Issues in Decentralized Blockchain Oracles. 1-6 - Raoua Chakroun, Thierry Villemur, Kokouvi Bénoît Nougnanke:
Learning-Based Infrastructure To Vehicle Link Quality Estimation. 1-6 - Robert Rozic, Hrvoje Ljubic, Tamara Grujic, Ana Kuzmanic Skelin:
Detection of at-risk Students in Virtual Learning Environment. 1-6 - Haorui Peng, William Tärneberg, Emma Fitzgerald, Maria Kihl:
Performance Evaluation of QUIC Vs. TCP for Cloud Control Systems. 1-6 - Domagoj Steiner, Mario Vranjes, Matija Pul, Marijan Herceg:
Dynamic Images Comparison using Siamese Neural Network. 1-6 - Stella Azevedo Marques, Demóstenes Zegarra Rodríguez, Renata Lopes Rosa:
Use of ChatGPT as Configuration Support Tool and Network Analysis. 1-6 - Emanuel Dantas, Ademar França de Sousa Neto, Thiago Rique, Luiz Antônio, Danyllo Albuquerque, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich:
RiskControl: A Bayesian Network-based Tool to Support Risk Management in Software Projects. 1-6 - Marta Brzynska, Krzysztof Klimaszewski, Krzysztof Martin:
A Localisation and Telemetry LoRa Node for Rockets. 1-6 - Felipe Cunha, Mirko Barbosa Perkusich, Everton Guimarães, Ramon Nóbrega dos Santos, Thiago Rique, Danyllo Albuquerque, Angelo Perkusich, Hyggo O. Almeida, Kyller Costa Gorgônio:
Exploring the Capabilities of Professionals and Agile Teams: An Updated Review. 1-6 - SeyedeZahra Chamideh, William Tärneberg, Maria Kihl:
Enhancing Traffic Flow and Safety in Mixed Vehicle Fleets: Mitigating the Influence of Non-Cooperative Vehicles on Autonomous Intersection Management Systems. 1-6 - Raza Ul-Mustafa, Alan McGibney, Susan Rea:
Trust Analysis to Identify Malicious Nodes in the Social Internet of Things. 1-9 - Rodrigue N'goran, Jean-Louis Tetchueng, Yvon Kermarrec, Aguié Pacôme Bertrand Brou, Olivier Asseu:
Blockchain-based Identity and Access Management in a Community Cloud. 1-6 - Camelia-Florina Andor, Andrei Buiciuc:
Visual Query System Based on Conceptual Graphs for Apache Cassandra. 1-6 - Jan Marius Evang, Tarik Cicic:
Evolved Cold-Potato Routing Practices. 1-6 - Somia Bibi, Chafiq Titouna, Faiza Titouna, Farid Naït-Abdesselam:
An LSTM-Based Outlier Detection Approach for IoT Sensor Data in Hierarchical Edge Computing. 1-6 - Jacopo Marino, Fulvio Risso, Mauro Bighi:
Dynamic Optimization of Provider-Based Scheduling for HPC Workloads. 1-6 - Thomas Dreibholz:
High-Precision Round-Trip Time Measurements in the Internet with HiPerConTracer. 1-7 - Botond L. Márton, Zsolt Kis, László Bacsárdi:
Testing the First Hungarian CV-QKD System on a Real Optical Line. 1-6 - Rebiha Souadih, Fouzi Semchedine:
An Efficient Emergency Messages Dissemination for Hybrid Sensor and Vehicular Networks. 1-6 - Matej Plugel, Domagoj Tolic:
Neural Networks to Predict Software Development/Maintenance Performance and Required Time. 1-6 - Danyllo Albuquerque, Everton Guimarães, Mirko Barbosa Perkusich, Hyggo O. Almeida, Angelo Perkusich:
An Approach for Integrating Interactive Detection of Code Smells on Agile Software Development. 1-6 - Ivan Peraic, Ani Grubisic:
Exploring Student Engagement in Online Programming Courses: A Two-Level K-means Analysis. 1-6 - Ante Lojic Kapetanovic, Dragan Poljak, Hrvoje Dodig:
Automatic Detection of Peak Spatial-Average Power Density on Nonplanar Body Models. 1-5 - Yasmine Chaouche, Éric Renault, Ryma Boussaha:
WEKA-based Real-Time Attack Detection for VANET Simulations. 1-6 - Mladen Sverko, Tihana Galinac Grbac, Darko Huljenic:
Performance Optimization in Transition Toward Open Industrial Control Systems. 1-6 - Ayrat Nurutdinov, Rustam Latypov:
Dynamically Predicting Wi-Fi Coverage Mapping Using Bioinspired Neural Networks. 1-6 - Ksenia Neumann, Damanpreet Singh Walia, Daniel Staegemann, Robert Häusler, Stefan Weidner, Klaus Turowski:
Towards a German National Education Platform. 1-6 - Mario Cvetkovic, Dragan Poljak, Hrvoje Dodig:
Numerical Filtering of Electric Field in Human Head Models Exposed to High-Frequency EMF. 1-6 - Bartlomiej Piotr Grzelak, Slawomir Sujecki, Stanislaw Kozdrowski, Piotr Sliwka:
Analysis of Client Link Utilization for DWDM Networks as a Function of Time. 1-3 - Renato Marinho, Raimir Holanda Filho:
A Framework Proposal for Early Cyber Threat Identification and Profiling. 1-7 - Haytham Khalil, Khalid Elgazzar:
tSIP: A Lightweight SIP-Based Messaging Protocol for Resource-Constrained Embedded Devices. 1-6 - Matheus Wagner, Antônio Augusto Fröhlich:
Securing Cyber-Physical Systems Against GPS Spoofing Attacks Using Confidence Attribution. 1-6 - Mamdouh Muhammad, Abdullah Soliman Alshra'a, Reinhard German:
An IDS for DDoS Attacks in SDN using VGG-Based CNN Architecture. 1-7 - Elisa Benetti, Simone Sapori, Gianluca Mazzini:
Adoption of Two-Factor Authentication in a Pre-Existing Heterogeneous System. 1-6 - Janusz Klink:
QoE-Driven Coding Bitrate Determination for Adaptive Video Streaming to Home Viewers. 1-6 - David Dumancic, David Mijic, Mario Vranjes, Ratko Grbic:
Steering Angle Prediction Algorithm Performance Comparison in Different Simulators for Autonomous Driving. 1-7 - Ayinala Likhith, M. P. R. S. Kiran:
A Novel Distance Estimation Framework for PDR Based Indoor Localization Using RNNs. 1-6 - Chandan Kumar Sheemar, Sumit Kumar, Jorge Querol, Symeon Chatzinotas:
Adaptive Timers and Buffer Optimization for Layer-2 Protocols in 5G Non-Terrestrial Networks. 1-6 - Mirela Kundid Vasic, Josip Gugic, Vladan Papic:
Detection of Small Fruits in Natural Environment Images. 1-6 - Itamar Cohen, Paolo Giaccone, Carla-Fabiana Chiasserini:
Distributed Asynchronous Protocol for Service Provisioning in the Edge-Cloud Continuum. 1-6 - Sina Hojjatinia, Mehrnoosh Monshizadeh, Vikramajeet Khatri:
A Deep Intrusion Detection Model for Network Traffic Payload Analysis. 1-7 - Saber Dakhli, Jean-Marie Floc'h, Hatem Rmili:
Design of Circular Dual-Band Six-Elements Dipole Array for Omnidirectional Radiation Pattern. 1-4 - Ivan Chavdarov, Ivaylo Georgiev, Bozhidar Naydenov, Valentin Nikolov:
Design of a 3D Printed Humanoid Robotic Hand. 1-6 - Oluwatoyin Joy Omole, Renata Lopes Rosa, Demóstenes Zegarra Rodríguez:
Soybean Disease Detection by Deep Learning Algorithms. 1-5 - Maja Skiljo, Marina Udzenija, Zoran Blazevic:
Axial Ratio of Quarter- and Half-wavelength Cloverleaf Antenna for Drone FPV Applications. 1-5 - Fatemeh Akbarian, William Tärneberg, Emma Fitzgerald, Maria Kihl:
Detecting and Mitigating Actuator Attacks on Cloud Control Systems through Digital Twins. 1-6 - Péter Hegyi, Nándor Galambosi, Péter Fazekas:
Performance of Config-as-Code Git Repositories. 1-7 - Chrisa Samara, Eleni Vrochidou, George A. Papakostas:
EEG Signal Analysis Approaches for Epileptic Seizure Event Prediction Using Deep Learning. 1-7 - Harshavardhan Netha Gurram, Hafeez Mohamad, Abhinav Sriram, Anjaneyulu Endurthi:
A Strategy to Improvise Coin-age Selection in the Proof of Stake Consensus Algorithm. 1-4 - Alexandre Ladeira de Sousa, Ogobuchi Daniel Okey, Renata Lopes Rosa, Muhammad Saadi, Demóstenes Zegarra Rodríguez:
A Novel Resource Allocation in Software-Defined Networks for IoT Application. 1-5 - Hadil Ben Amor, Seifeddine Bouallegue, Afef Bohli, Ridha Bouallegue:
Development of a New Dynamic Approach for Facial Recognition and Emotion Detection. 1-6 - Rajesh Rimal, Marijan Herceg, Mario Vranjes, Ratko Grbic:
Driver Monitoring System using an Embedded Computer Platform. 1-7 - Kire Jakimoski:
Automation Improvement in Cyber Risk Management. 1-6 - Salah Zemmoudj, Nabila Bermad:
Securing D2D Therapeutic Hiking Group in 5G Networks for Partial Coverage Scenario. 1-6 - Pranisha Chaturvedi, Maximilian Johenneken, Ahmad Drak, Sebastian Houben, Alexander Asteroth:
Object-Based Tree Stump Detection Fusing RGB and Multispectral Data. 1-6 - Dragan Poljak, Sinisa Antonijevic, Vicko Doric:
Direct Time Domain Calculation of Near Field Generated by a Straight Thin Wire in Free Space. 1-4 - Mohamed Ali Zormati, Hicham Lakhlef:
An Overview of Machine Learning-Enabled Network Softwarization for the Internet of Things. 1-6 - Abdelhammid Bouazza, Hichem Debbi, Hicham Lakhlef, Abdelkarim Smaili:
An Efficient Hierarchical LSTM-based Framework for Intrusion Detection in Internet of Things (IoT) Systems. 1-6 - Julio Diez-Tomillo, José M. Alcaraz-Calero, Qi Wang:
Empirical Comparison of Face Verification Algorithms from UAVs. 1-6 - Gian Paolo Jesi, Andrea Odorizzi, Gianluca Mazzini:
Towards the Adoption of a Plugable Architecture for Network Features Visualization. 1-5 - Lukasz Kulacz:
Spectrum Occupancy Detection Supported by Federated Learning. 1-3 - Raluca Nelega, Romulus Valeriu Flaviu Turcu, Bogdan Belean, Emanuel Puschita:
Radio Frequency-Based Drone Detection and Classification using Deep Learning Algorithms. 1-6 - Artur Balsam, Michal Walkowski, Maciej Roman Nowak, Jacek Oko, Slawomir Sujecki:
Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 Vulnerabilities. 1-3 - Jefferson Jesus Hengles Almeida, Paulo Batista Lopes, Cristiano Akamine:
ATSC 3.0 Constellation Analysis using Computer Vision Combined with AI Decision Tree. 1-5 - Marina Prvan, Arijana Burazin Misura, Vesna Pekic, Josip Music:
The Transfer Learning-Based Approach for Electromagnetic Signal Classification Using Simulated HGCAL Data. 1-6 - Tea Polic, Alan Mutka, Martin Zagar:
Time Series LSTM Prediction of Water Consumption in the Republic of Croatia by Regions. 1-6 - Patrik Burdiak, Lukas Kapicak, Libor Michalek, Emir Dervisevic, Miralem Mehic, Miroslav Voznák:
Demonstration of QKD Integration into 5G Campus Network. 1-4 - Petra Rasic, Zoran Blazevic, Dragan Poljak:
The Influence of HF Wireless Power Transmitter on nearby Thin-Wire Objects: A Simplified Analytical Model. 1-5 - Julian Zobel, Paul Frommelt, Lukas Laufenberg, Régis Fayard, Lukas Wehrstein, Ralf Kundel, Ralf Steinmetz:
LoRaMeter: Signal Mapping in LoRa Networks. 1-6 - Monika Drozdowska, Narcís Cardona:
Guard Interval's Length Prediction in 802.11ay Systems in Indoor Environments. 1-5 - Pritam Jaywant Chaudhari, Satoshi Kaneko, Taku Okamura:
Estimating Power Consumption of Collocated Workloads in a Real-World Data Center. 1-7 - Adam Samorzewski, Adrian Kliks:
5G Networks Supported by UAVs, RESs, and RISs. 1-6 - Mojtaba Mahdavi:
Reordering-Less FFT: A Novel FFT Processor with Parallel Input/Output in Normal Order. 1-6 - Chandan Kumar Sheemar, Jorge Querol, Symeon Chatzinotas:
Signal Processing Based Antenna Pattern Characterization for MIMO Systems. 1-5 - Anett Fekete, Benedek Kovács, Zoltán Porkoláb:
Automatic Dependency Tracking in Microservice-based Systems Using Static Analysis in Helm Charts. 1-7 - Stanislaw Kozdrowski, Pawel Krysztofik:
CD and CDC Technologies in Next-generation Optical Networks. 1-3 - Cezary Adamczyk:
Challenges for Conflict Mitigation in O-RAN's RAN Intelligent Controllers. 1-6 - Alexandre Ladeira de Sousa, Ogobuchi Daniel Okey, Renata Lopes Rosa, Muhammad Saadi, Demóstenes Zegarra Rodríguez:
Unified Approach to Video-Based AI Inference Tasks in Augmented Reality Systems Assisted by Mobile Edge Computing. 1-5 - Jan Marius Evang, Ioana Livadariu:
How Large Is the Gap? Exploring MANRS and ISO27001 Security Management. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.