Search Results - "2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium)"

Refine Results
  1. 1

    A Longitudinal Analysis of Online Ad-Blocking Blacklists by Hashmi, Saad Sajid, Ikram, Muhammad, Kaafar, Mohamed Ali

    “…Websites employ third-party ads and tracking services leveraging cookies and JavaScript code, to deliver ads and track users' behavior, causing privacy…”
    Get full text
    Conference Proceeding
  2. 2

    Location Embedding and Deep Convolutional Neural Networks for Next Location Prediction by Sassi, Abdessamed, Brahimi, Mohammed, Bechkit, Walid, Bachir, Abdelmalik

    “…We focus in this work on predicting the next location of mobile users by analyzing large data sets of the history of their movements. We make use of past…”
    Get full text
    Conference Proceeding
  3. 3

    A Privacy Framework for Charging Connected Electric Vehicles Using Blockchain and Zero Knowledge Proofs by Gabay, David, Akkaya, Kemal, Cebe, Mumin

    “…With the increasing interest in connected vehicles along with electrification opportunities, there is an ongoing effort to automate the charging process of…”
    Get full text
    Conference Proceeding
  4. 4

    A New Approach for Path Loss Prediction in Wireless Underground Sensor Networks by Sambo, Damien Wohwe, Forster, Anna, Yenke, Blaise Omer, Sarr, Idrissa

    “…The Wireless Underground Sensor Networks (WUSNs) become an attractive field due to its applications. On these applications, links between nodes are made…”
    Get full text
    Conference Proceeding
  5. 5

    Scalable Transport Mechanisms for Blockchain IoT Applications by Schiller, Eryk, Niya, Sina Rafati, Surbeck, Timo, Stiller, Burkhard

    “…This paper studies various methods that improve the performance of Blockchain systems integrated with the Internet of Things (BIoT) using the LoRaWAN access…”
    Get full text
    Conference Proceeding
  6. 6

    Making our networking stack truly extensible by Bonaventure, Olivier

    “…BPF is a simple virtual machine that was designed to facilitate packet filtering. It was later extended and attached to the Linux kernel where it provides a…”
    Get full text
    Conference Proceeding
  7. 7

    White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane by Khorsandroo, Sajad, Tosun, Ali Saman

    “…Today's virtual switches not only support legacy network protocols and standard network management interfaces, but also become adapted to OpenFlow as a…”
    Get full text
    Conference Proceeding
  8. 8

    μvIMS: A Finer-Scalable Architecture Based on Microservices by Orduz, Juan S., Orozco, Gabriel D., Tobar-Arteaga, Carlos H., Rendon, Oscar Mauricio Caicedo

    “…The steps toward all over IP have defined to the IP Multimedia Subsystem (IMS) as the de facto technology for end-to-end multimedia service provisioning in 5G…”
    Get full text
    Conference Proceeding
  9. 9

    On the importance of TCP splitting proxies for future 5G mmWave communications by Hayes, David A., Ros, David, Alay, Ozgu

    “…5G mmWave technology promises capacities 10 to 100 times that of 4G. However, mmWave links are very sensitive to having direct line of sight between sender and…”
    Get full text
    Conference Proceeding
  10. 10

    An Effective Table-Overflow Attack and Defense in Software-Defined Networking by Xu, Jianfeng, Wang, Liming, Song, Chen, Xu, Zhen

    “…With the increasing prominence of Software-Defined Networking (SDN), new attacks have been demonstrated which can exhaust the SDN switch's flow tables. These…”
    Get full text
    Conference Proceeding
  11. 11

    FQ-PIE Queue Discipline in the Linux Kernel: Design, Implementation and Challenges by Ramakrishnan, Gautam, Bhasi, Mohit, Saicharan, V., Monis, Leslie, Patil, Sachin D., Tahiliani, Mohit P.

    “…Proportional Integral controller Enhanced (PIE) is an Active Queue Management (AQM) mechanism to address the bufferbloat problem. AQM mechanisms tackle…”
    Get full text
    Conference Proceeding
  12. 12

    Is Link-Layer Anycast Scheduling Relevant for IEEE 802.15.4-TSCH Networks? by Hermeto, Rodrigo Teles, Gallais, Antoine, Theoleyre, Fabrice

    “…With the wide adoption of low-power wireless transmissions, industrial networks have started to incorporate wireless devices in their communication…”
    Get full text
    Conference Proceeding
  13. 13

    Onion: An Efficient Heuristic for Designing Routerless Network-on-Chip by Xiao, Jie, Yeung, Kwan L.

    “…In routerless network-on-chip (NoC), any pair of cores are directly connected via at least one isolated ring, such that high-cost routers can be entirely…”
    Get full text
    Conference Proceeding
  14. 14

    Izzy: A Distributed Routing Protocol for In-band SDN Control Channel Connectivity by Holzmann, Polina, Zitterbart, Martina

    “…Software-defined networking proposes to physically separate control and data plane. This raises the question on how these two planes communicate, especially if…”
    Get full text
    Conference Proceeding
  15. 15

    FitSDN: Flexible Integrated Transactional SDN by Curic, Maja, Despotovic, Zoran, Hecker, Artur, Carle, Georg

    “…Extremely popular with the research community, the SDN has indeed matured and mostly resolved the original performance doubts. The next frontier is to make it…”
    Get full text
    Conference Proceeding
  16. 16

    Protection Against Side-Channel Attacks on Multifusion Zero-Permission Sensors using Differential Privacy by Abdallah, Mina, ElMougy, Amr

    “…The last decade has witnessed significant growth in Mobile Crowdsensing (MCS) applications. These applications exploit the variety of embedded sensors in our…”
    Get full text
    Conference Proceeding
  17. 17

    Adaptive Data Center Network Traffic Management for Distributed High Speed Storage by Ray, Madhurima, Biswas, Joyanta, Pal, Amitangshu, Kant, Krishna

    “…The emerging high-speed storage technologies and the ever-growing need for data storage are placing increasing pressure on data center networks. In this paper,…”
    Get full text
    Conference Proceeding
  18. 18

    Predictive Resource Management for Opportunistic Public Sensing Networks Using Fuzzy Logic by Younes, Gina, ElMougy, Amr

    “…As the number of deployed sensor networks globally increased to billions, data collection from these networks became quite a challenging task. The wide…”
    Get full text
    Conference Proceeding
  19. 19

    Preemptive Two-Stage Update Mechanism for Software-Defined Networks by Akanbi, Oluwatobi, Aljaedi, Amer, Zhou, Xiaobo, Alharbi, Adel R.

    “…Network configurations and policy updates are common operations carried out by the network operating system. However, the frequency of these network updates…”
    Get full text
    Conference Proceeding
  20. 20

    The Case for Session Sharing: Relieving Clients from TLS Handshake Overheads by Hiller, Jens, Henze, Martin, Zimmermann, Torsten, Hohlfeld, Oliver, Wehrle, Klaus

    “…In recent years, the amount of traffic protected with Transport Layer Security (TLS) has significantly increased and new protocols such as HTTP/2 and QUIC…”
    Get full text
    Conference Proceeding