Search Results - "2022 IEEE 23rd International Conference on High Performance Switching and Routing (HPSR)"

Refine Results
  1. 1

    How does 5G NR V2X Mode 2 Handle Aperiodic Packets and Variable Packet Sizes? by Molina-Galan, Alejandro, Coll-Perales, Baldomero, Lusvarghi, Luca, Gozalvez, Javier, Merani, Maria Luisa

    “…5G NR V2X complements LTE V2X to support advanced V2X services for connected and automated driving. 5G NR V2X introduces novel features at the MAC layer that…”
    Get full text
    Conference Proceeding
  2. 2

    Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis by Wang, Ying, Jere, Shashank, Banerjee, Soumya, Liu, Lingjia, Shetty, Sachin, Dayekh, Shehadi

    “…Jamming and intrusion detection are some of the most important research domains in 5G that aim to maintain use-case reliability, prevent degradation of user…”
    Get full text
    Conference Proceeding
  3. 3

    A Traffic Scheduling Scheme for Load Balancing in SDN-Based Space-Air-Ground Integrated Networks by Tao, Jing, Liu, Shidong, Liu, Chuan

    “…The deployment of Low-Earth-Orbit (LEO) constellations and Unmanned Aerial Vehicles (UAV) is an emerging trend for future network construction to improve…”
    Get full text
    Conference Proceeding
  4. 4

    Storage-Enabled Adaptive Multi-Path Scheduling Method for Data Transfers in Task Offloading by Lin, Xiao, Ji, Shuo, Yue, Shengnan, Li, Jun, Chen, Feng

    “…The delay-sensitive and resource-limited natures of multi-access edge computing (MEC) applications make it necessary to offload local tasks to nearby MEC…”
    Get full text
    Conference Proceeding
  5. 5

    Joint Routing and Scheduling for Deterministic Networking: A Segment Routing Approach by Li, Tianchi, Cai, Yueping

    “…Deterministic networking (DetNet) provides guaranteed transmission services for the time-sensitive traffic. However, how to route and schedule the traffic to…”
    Get full text
    Conference Proceeding
  6. 6

    C-LSTM: CNN and LSTM Based Offloading Prediction Model in Mobile Edge Computing (MEC) by Zhao, Ming, Li, Yixiang, Asif, Sohaib, Zhu, Yusen, Tang, Fengxiao

    “…In the face of intensive computing tasks with massive data, cloud computing is difficult to provide high-quality services. Edge computing extends cloud…”
    Get full text
    Conference Proceeding
  7. 7

    Modeling and Analysis of Multi-UAV Networks Using Matérn Hard-Core Point Process by Zhu, Yajie, Zhang, Shangwei

    “…Multiple unmanned aerial vehicles (UAVs) can function as aerial base stations to provide flexible and reliable communication services for massive ground…”
    Get full text
    Conference Proceeding
  8. 8

    Age of Information Minimization in Wireless Powered NOMA Communication Networks by Jin, Weiwei, Huang, Liang, Chi, Kaikai

    “…For real-time monitoring applications, the age of information (AoI) is used as a key metric to quantify the freshness of updated information. In this paper, we…”
    Get full text
    Conference Proceeding
  9. 9

    Programmable Data Plane for New IP using eXpress Data Path (XDP) in Linux by Kataria, Bhaskar, M P, Rohit, Monis, Leslie, Tahiliani, Mohit P., Makhijani, Kiran

    “…This paper demonstrates a new dimension in packet programming and processing by leveraging New IP technology since applications are sensitive to different…”
    Get full text
    Conference Proceeding
  10. 10

    Incremental Learning Assisted Dynamic Driver Identification: A New Perspective by Guo, Wei, Qin, Junman, Xun, Yijie

    “…With the popularity of intelligent and connected vehicles, driver identification based on driver behaviors, which has great significance in driving safety,…”
    Get full text
    Conference Proceeding
  11. 11

    Regenerator-Aware Inter-Core and Inter-Mode Crosstalk-Avoided Resource Allocation for Spectrally-Spatially Elastic Optical Networks by Halder, Joy, Oki, Eiji, Chatterjee, Bijoy Chand

    “…Optical regenerators are beneficial in resource utilization as they provide additional functionalities, such as modulation format (MF) and spectrum conversion,…”
    Get full text
    Conference Proceeding
  12. 12

    Communication-aware Fairness in Blockchain Transaction Ordering by Nassar, Mohammad, Rottenstreich, Ori, Orda, Ariel

    “…Blockchain leader-based protocols elect leaders for proposing the next block of transactions. Proposed blocks need to pass a validation routine in order to be…”
    Get full text
    Conference Proceeding
  13. 13

    A Deep Reinforcement Learning Approach for Deploying SDN Switches in ISP Networks from the Perspective of Traffic Engineering by Guo, Yingya, Chen, Jianshan, Huang, Kai, Wu, Jianping

    “…Nowadays, a hybrid Software-Defined Network (hybrid SDN), which combines the robustness of the distributed network and the flexibility of the centralized…”
    Get full text
    Conference Proceeding
  14. 14

    Support Green Internet Via New IP by Dong, Lijun, ElBakoury, Hesham, Li, Richard

    “…The Information and Communication Technology (ICT) industry constitutes roughly 5-9% of the overall energy consumption, and may quickly grow to as high as 20%…”
    Get full text
    Conference Proceeding
  15. 15

    The Effects of Packet Wash on SVC Video in Limited Bandwidth Environments by Clayman, Stuart, Sayit, Muge

    “…This paper describes the effects of the Packet Wash process on the transmission of layered SVC video streams. We show how the packet size is adapted when using…”
    Get full text
    Conference Proceeding
  16. 16

    Trajectory Planning in UAV-Assisted Wireless Networks via Reinforcement Learning by He, Simeng, Zhang, Shangwei

    “…The development of the fifth-generation (5G) communication technology and various emerging Internet of Things (IoT) applications have brought in great…”
    Get full text
    Conference Proceeding
  17. 17

    RPQ: Resilient-Priority Queue Scheduling for Delay-Sensitive Applications by Li, Xinqiao, Liu, Mingyuan, Cheng, Nan, Liu, Kang, Quan, Wei, Guo, Liang, Qin, Yajuan

    “…With the continuous development of autonomous vehicles, telemedicine, digital media and other time-sensitive applications, a soaring number of network services…”
    Get full text
    Conference Proceeding
  18. 18

    Performance Analysis of Vehicle Platoon Communication in C-V2X Autonomous Mode by Ning, Ruirui, Zhang, Xiaokang, Feng, Weiyang, Zhang, Ning, Lin, Siyu

    “…As one of the essential application scenarios of autonomous driving, vehicle platoon has remarkable advantages in enhancing traffic capacity and reducing fuel…”
    Get full text
    Conference Proceeding
  19. 19

    A Comparison Study on Different Data sets for Span-level QoT Regression in EONs by Arpanaei, Farhad, Alberto Hernandez, Jose, Martinez Ruiz de Arcaute, Gonzalo, Larrabeiti, David

    “…In this paper, we have generated and examined three different datasets based on the symbol rate and traffic load of the link states to estimate the quality of…”
    Get full text
    Conference Proceeding
  20. 20

    Test Case Filtering based on Generative Adversarial Networks by Liu, Zhijuan, Zhang, Li, Wu, Xuangou, Zhao, Wei

    “…Fuzzing is a popular technique for finding soft-ware vulnerabilities. Despite their success, the state-of-art fuzzers will inevitably produce a large number of…”
    Get full text
    Conference Proceeding