


default search action
21st WoWMoM 2020: Cork, Ireland
- 21st IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2020, Cork, Ireland, August 31 - September 3, 2020. IEEE 2020, ISBN 978-1-7281-7374-0

Main Conference
Session 1 - LoRaWAN
- Rui Fernandes, Rui Oliveira, Miguel Luís

, Susana Sargento
:
Exploring the Use of Control Packets in LoRa Medium Access: A Scalability Analysis. 1-7 - Joseph Finnegan, Ronan Farrell, Stephen Brown:

Lightweight Timeslot Scheduling Through Periodicity Detection for Increased Scalability of LoRaWAN. 8-15 - Khaled Q. Abdelfadeel, Tom Farrell, David McDonald, Dirk Pesch

:
How to Make Firmware Updates over LoRaWAN Possible. 16-25 - Laurent Chasserat, Nicola Accettura, Pascal Berthou

:
Short: Achieving Energy Efficiency in Dense LoRaWANs through TDMA. 26-29
Session 2 - Network Applications I
- Ahmad El Shoghri, Jessica Liebig, Raja Jurdak

, Lauren Gardner, Salil S. Kanhere
:
Identifying Highly Influential Travellers for Spreading Disease on a Public Transport System. 30-39 - João A. Silva, Pedro Vieira, Hervé Paulino

:
Data Storage and Sharing for Mobile Devices in Multi-region Edge Networks. 40-49 - Gianluca Rizzo, Noelia Pérez Palma, Marco Ajmone Marsan, Vincenzo Mancuso:

A Walk Down Memory Lane: On Storage Capacity in Opportunistic Content Sharing Systems. 50-59
PhD-Forum
- Corina-Stefania Nanau:

MaxDelivery: A New Approach to a DTN Buffer Management. 60-61 - Stanislav Kruglik

:
Security Issues in Distributed Storage Networks. 62-63 - Muhammad Farhan Khan:

An Approach for Optimal Base Station Selection in 5G HetNets for Smart Factories. 64-65 - Yash Madhwal:

Implementation of Tokenised Supply Chain Using Blockchain Technology. 66-67
Session 3 - Security in IoT
- Gioele Carignani, Francesca Righetti

, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi:
Evaluation of Feasibility and Impact of Attacks Against the 6top Protocol in 6TiSCH Networks. 68-77 - Madhumita Mallick, Archan Misra

, Niloy Ganguly, Youngki Lee:
DETECTIF : Unified Detection & Correction of IoT Faults in Smart Homes. 78-87 - Tianbo Gu, Allaukik Abhishek, Hao Fu, Huanle Zhang, Debraj Basu

, Prasant Mohapatra:
Towards Learning-automation IoT Attack Detection through Reinforcement Learning. 88-97
Session 4 - Radio Resource Management
- Luis Fernando Abanto-Leon

, Matthias Hollick, Gek Hong Sim:
HydraWave: Multi-group Multicast Hybrid Precoding and Low-Latency Scheduling for Ubiquitous Industry 4.0 mmWave Communications. 98-107 - Christopher Merlhe, Cédric Gueguen:

Dynamic Cell-Less Radio Access Network Meta-Scheduler for High System Capacity Increase. 108-116 - Verónica Toro-Betancur

, Suzan Bayhan, Piotr Gawlowicz, Mario Di Francesco:
CTC-CEM: Low-Latency Cross-Technology Channel Establishment with Multiple Nodes. 117-126 - Gek Hong Sim, Mahdi Mousavi, Lin Wang, Anja Klein, Matthias Hollick:

Joint Relaying and Spatial Sharing Multicast Scheduling for mmWave Networks. 127-136
Session 5 - Edge Computing
- Simone Bolettieri, Raffaele Bruno

:
Edge-Assisted Resource Management for Data-Centric IoT Applications in Shared Sensor Networks. 137-146 - Hui Lin, Zetao Yang, Zicong Hong, Shenghui Li, Wuhui Chen:

Smart Contract-based Hierarchical Auction Mechanism for Edge Computing in Blockchain-empowered IoT. 147-156 - Apostolos Galanopoulos, Víctor Valls, Douglas J. Leith

, George Iosifidis:
Dynamic Scheduling for IoT Analytics at the Edge. 157-166
Posters
- Marek R. Ogiela, Lidia Ogiela:

Eye Movements as a Key in Cognitive Authentication Protocols. 167-169 - Marcin Hoffmann

, Adrian Kliks
, Pawel Kryszkiewicz
, Georgios P. Koudouridis:
A Reinforcement Learning Approach for Base Station On/Off Switching in Heterogeneous M-MIMO Networks. 170-172 - Lukasz Kulacz, Adrian Kliks

:
Reliability Assessment of Bio-Inspired Ultra-Dense Networks Using Percolation Theory. 173-175 - Karolina Lenarska

, Krzysztof Wesolowski, Michal Sybis
:
Application of Virtual Leaders in Long Vehicle Platoons Operating with Cooperative Adaptive Cruise Control Using IEEE 802.11p Transmission. 176-178 - Pawel Kryszkiewicz

, Adrian Kliks
, Lukasz Kulacz, Bartosz Bossy:
Power Consumption Variation for a Single Technology Wireless Transceivers. 179-181
Demos
- Dimitrios Zorbas

:
A Testbed for Time-Slotted LoRa Communications. 182-184 - John O'Sullivan, Darijo Raca, Jason J. Quinlan

:
Godash 2.0 - The Next Evolution of HAS Evaluation. 185-187 - Sergey Kudryashov, Stanislav Kruglik

, Ivan Maslov, Yury Yanovich
:
Supply-Chain Management System for Plastic Pipes Market Based on Open Blockchain Framework. 188-190 - Amit Hirway

, Yuansong Qiao, Niall Murray:
A QoE and Visual Attention Evaluation on the Influence of Audio in 360° Videos. 191-193 - Chung Xue Er Shamaine, Yuansong Qiao, Niall Murray:

Enabling Human-Robot-Interaction for Remote Robotic Operation via Augmented Reality. 194-196
Session 6 - Network Analysis
- Yatin Sharma, Gourab Ghatak:

A Statistical Characterization of SINR Coverage and Network Throughput with Macro-Diversity. 197-204 - Abin Mathew, Manikantan Srinivasan, C. Siva Ram Murthy:

Network Calculus Based Delay Analysis for Mixed Fronthaul and Backhaul 5G Networks. 205-214 - Giulia Attanasio, Claudio Fiandrino

, Joerg Widmer:
Event-Based Vision: Understanding Network Traffic Characteristics. 215-223 - Yung-Fu Chen, Anish Arora:

Middle-mile Network Optimization in Rural Wireless Meshes. 224-233
Session 7 - Caching
- Gaetano Manzo, Eirini Kalogeiton, Antonio Di Maio

, Torsten Braun
, Maria Rita Palattella
, Ion Turcanu
, Ridha Soua, Gianluca Rizzo:
DeepNDN: Opportunistic Data Replication and Caching in Support of Vehicular Named Data. 234-243 - Dimitra Tsigkari, Thrasyvoulos Spyropoulos:

User-centric Optimization of Caching and Recommendations in Edge Cache Networks. 244-253 - Shanti Chilukuri

, Dirk Pesch
:
Achieving Optimal Cache Utility in Constrained Wireless Networks through Federated Learning. 254-263
Session 8 - Positioning
- Tim Kluge, Christin Groba, Thomas Springer:

Trilateration, Fingerprinting, and Centroid: Taking Indoor Positioning with Bluetooth LE to the Wild. 264-272 - Roberto Calvo-Palomino

, Arani Bhattacharya
, Gérôme Bovet, Domenico Giustiniano
:
Short: LSTM-based GNSS Spoofing Detection Using Low-cost Spectrum Sensors. 273-276 - Steven M. Hernandez

, Eyuphan Bulut:
Lightweight and Standalone IoT Based WiFi Sensing for Active Repositioning and Mobility. 277-286
Session 9 - Network Applications II
- Merkouris Karaliopoulos, Iordanis Koutsopoulos:

Collective Subscriptions: A Novel Funding Tool for Crowdsourced Network Infrastructures. 287-296 - Piotr Gawlowicz, Anatolij Zubow, Suzan Bayhan, Adam Wolisz:

Punched Cards over the Air: Cross-Technology Communication Between LTE-U/LAA and WiFi. 297-306 - Jacopo Bufalino, Maria L. Montoya Freire

, Juho Kannala, Mario Di Francesco:
MAMBA: Adaptive and Bi-directional Data Transfer for Reliable Camera-display Communication. 307-316
Workshops
SWARMNET: 2nd IEEE WoWMoM Workshop on Wireless Networking, Planning, and Computing for UAV Swarms
- Davide Cristiani, Filippo Bottonelli, Angelo Trotta, Marco Di Felice:

Inventory Management through Mini-Drones: Architecture and Proof-of-Concept Implementation. 317-322 - Joannes Sam Mertens, G. M. Milotta, P. Nagaradjane, Giacomo Morabito:

SDN-(UAV)ISE: Applying Software Defined Networking to Wireless Sensor Networks with Data Mules. 323-328 - Ludovico Ferranti, Leonardo Bonati

, Salvatore D'Oro
, Tommaso Melodia
:
SkyCell: A Prototyping Platform for 5G Aerial Base Stations. 329-334 - Qiyuan Huang, Abolfazl Razi, Fatemeh Afghah, Peter Fule

:
Wildfire Spread Modeling with Aerial Image Processing. 335-340
CCNCPS: Communication, Computing, and Networking in Cyber Physical Systems
- Robert E. Gillen

, Laura Ann Anderson, Christopher Craig, Jordan Johnson
, Adam Columbia, Rachel Anderson, Andrew Craig, Stephen L. Scott:
Design and Implementation of Full-Scale Industrial Control System Test Bed for Assessing Cyber-Security Defenses. 341-346 - Simon D. Duque Antón

, Hans D. Schotten:
Intrusion Detection in Binary Process Data: Introducing the Hamming-distance to Matrix Profiles. 347-353 - Neeraj Kumar

, Tanya Dhand, Anish Jindal, Gagangeet Singh Aujla, Haotong Cao, Longxiang Yang:
An Edge-Fog Computing Framework for Cloud of Things in Vehicle to Grid Environment. 354-359 - Robert E. Gillen

, Jason M. Carter
, Christopher Craig, Jordan A. Johnson
, Stephen L. Scott:
Assessing Anomaly-Based Intrusion Detection Configurations for Industrial Control Systems. 360-366 - Jörg Christian Kirchhof

, Martin Serror
, René Glebke, Klaus Wehrle:
Improving MAC Protocols for Wireless Industrial Networks via Packet Prioritization and Cooperation. 367-372 - Haklin Kimm, Jeyaprakash Chelladurai:

Starvation-avoidance CAN Scheduling for Shorter Worst-case Response Time with Priority Queues. 373-378 - Ahlam Althobaiti

, Anish Jindal, Angelos K. Marnerides
:
SCADA-agnostic Power Modelling for Distributed Renewable Energy Sources. 379-384 - Faizan Safdar Ali, Moayad Aloqaily

, Öznur Özkasap, Ouns Bouachir:
Blockchain-assisted Decentralized Virtual Prosumer Grouping for P2P Energy Trading. 385-390 - Mahmoud Said Elsayed, Nhien-An Le-Khac

, Soumyabrata Dev, Anca Delia Jurcut
:
DDoSNet: A Deep-Learning Model for Detecting Network Attacks. 391-396 - Karl Biron, Wael Bazzaza, Khalid Yaqoob, Amjad Gawanmeh, Claude Fachkha:

A Big Data Fusion to Profile CPS Security Threats Against Operational Technology. 397-402
InThings: Intelligent Things and Services
- Abhilash Krishnan, Anderson Augusto Simiscuka, Gabriel-Miro Muntean:

Performance Analysis of an IoT Platform with Virtual Reality and Social Media Integration. 403-408 - Emanuele Giacomini

, Francesco D'Alterio, Andrea Lacava
, Francesca Cuomo:
BLUES: A Self-organizing BLE Mesh-network Paradigm for IoT Environments. 409-414
SC2: Smart Computing for Smart Cities
- Peiying Zhang, Chao Wang, Gagangeet Singh Aujla, Xue Pang:

A Node Probability-based Reinforcement Learning Framework for Virtual Network Embedding. 421-426 - Muhammad Kamran Naeem

, Raouf Abozariba, Md. Asaduzzaman
, Mohammad N. Patwary:
Towards the Mobility Issues of 5G-NOMA Through User Dissociation and Re-association Control. 427-432 - Haotong Cao, Yue Hu, Shengchen Wu, Longxiang Yang:

A Novel and Secure Service Function Chains Embedding Framework for NFV-Enabled Networks. 433-438
NewNets: 2nd Workshop on Emerging Technologies and Trends in Engineering Low-Power Networks
DIPI: Workshop on Data Distribution in Industrial and Pervasive Internet
- Dimitrios Sourailidis, Remous-Aris Koutsiamanis, Georgios Z. Papadopoulos

, Dominique Barthel, Nicolas Montavont:
RFC 6550: On Minimizing the Control Plane Traffic of RPL-based Industrial Networks. 439-444 - Dimitrios Zorbas

:
Improving Delay and Capacity of TS-LoRa with Flexible Guard Times. 445-450

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














