Search Results - "Proceedings IEEE Symposium on Computers and Communications"

Refine Results
  1. 1

    A comprehensive investigation and comparison of Machine Learning Techniques in the domain of heart disease by Pouriyeh, Seyedamin, Vahid, Sara, Sannino, Giovanna, De Pietro, Giuseppe, Arabnia, Hamid, Gutierrez, Juan

    “…This paper aims to investigate and compare the accuracy of different data mining classification schemes, employing Ensemble Machine Learning Techniques, for…”
    Get full text
    Conference Proceeding
  2. 2

    SIM: Sub-RTT-based Incast Mitigation in Data Center Networks by Chen, Haoran, Wang, Hang, Chen, Guanglei, Hong, Peilin

    “…Recently, many Remote Direct Memory Access (RDMA) congestion control (CC) algorithms have been proposed to ensure the performance of high-speed Data Center…”
    Get full text
    Conference Proceeding
  3. 3

    Continual Learning in Recurrent Neural Networks for the Internet of Things: A Stochastic Approach by Filho, Josafat Ribeiro Leal, Kocian, Alexander, Frohlich, Antonio Augusto, Chessa, Stefano

    “…In many applications Internet of Things (IoT) supports decision taking on the base of continuous data acquisition. These data, usually streams of sensed data,…”
    Get full text
    Conference Proceeding
  4. 4

    Reluplex made more practical: Leaky ReLU by Xu, Jin, Li, Zishan, Du, Bowen, Zhang, Miaomiao, Liu, Jing

    “…In recent years, Deep Neural Networks (DNNs) have been experiencing rapid development and have been widely used in various fields. However, while DNNs have…”
    Get full text
    Conference Proceeding
  5. 5

    Internet of Things: Security vulnerabilities and challenges by Andrea, Ioannis, Chrysostomou, Chrysostomos, Hadjichristofi, George

    “…Internet of Things (IoT) has been given a lot of emphasis since the 90s when it was first proposed as an idea of interconnecting different electronic devices…”
    Get full text
    Conference Proceeding
  6. 6

    jPBC: Java pairing based cryptography by De Caro, A., Iovino, V.

    “…It has been recently discovered that some cyclic groups that could be used in Cryptography admit a special bilinear pairing map that introduces extra structure…”
    Get full text
    Conference Proceeding
  7. 7

    DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data by Dali Zhu, Hao Jin, Ying Yang, Di Wu, Weiyi Chen

    “…The open nature of Android allows application developers to take full advantage of the system. While the flexibility is brought to developers and users, it may…”
    Get full text
    Conference Proceeding
  8. 8

    CNN based Indoor Localization using RSS Time-Series by Ibrahim, Mai, Torki, Marwan, ElNainay, Mustafa

    “…Indoor localization of mobile nodes is receiving great interest due to the recent advances in mobile devices and the increasing number of location-based…”
    Get full text
    Conference Proceeding
  9. 9

    Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol by Katsikeas, Sotirios, Fysarakis, Konstantinos, Miaoudakis, Andreas, Van Bemten, Amaury, Askoxylakis, Ioannis, Papaefstathiou, Ioannis, Plemenos, Anargyros

    “…Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected computing devices in all aspects of…”
    Get full text
    Conference Proceeding
  10. 10

    Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture by Soyata, T., Muraleedharan, R., Funai, C., Minseok Kwon, Heinzelman, W.

    “…Face recognition applications for airport security and surveillance can benefit from the collaborative coupling of mobile and cloud computing as they become…”
    Get full text
    Conference Proceeding
  11. 11

    Identity-based authentication scheme for the Internet of Things by Salman, Ola, Abdallah, Sarah, Elhajj, Imad H., Chehab, Ali, Kayssi, Ayman

    “…Security and privacy are among the most pressing concerns that have evolved with the Internet. As networks expanded and became more open, security practices…”
    Get full text
    Conference Proceeding
  12. 12

    Real-time path planning to prevent traffic jam through an intelligent transportation system by de Souza, Allan M., Yokoyama, Roberto S., Maia, Guilherme, Loureiro, Antonio, Villas, Leandro

    “…Congestion is a major problem in large cities. One of the main causes of congestion is the sudden increase of vehicle traffic during peak hours. Current…”
    Get full text
    Conference Proceeding
  13. 13

    Multi-User Preemptive Scheduling For Critical Low Latency Communications in 5G Networks by Esswie, Ali A., Pedersen, Klaus I.

    “…5G new radio is envisioned to support three major service classes: enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and…”
    Get full text
    Conference Proceeding
  14. 14

    Flow-based Intrusion Detection System for SDN by Ajaeiya, Georgi A., Adalian, Nareg, Elhajj, Imad H., Kayssi, Ayman, Chehab, Ali

    “…Software-defined networks (SDN) are vulnerable to most of the attacks that traditional networks are vulnerable to. In addition, SDN has introduced new…”
    Get full text
    Conference Proceeding
  15. 15

    Car parking occupancy detection using smart camera networks and Deep Learning by Amato, Giuseppe, Carrara, Fabio, Falchi, Fabrizio, Gennaro, Claudio, Vairo, Claudio

    “…This paper presents an approach for real-time car parking occupancy detection that uses a Convolutional Neural Network (CNN) classifier running on-board of a…”
    Get full text
    Conference Proceeding
  16. 16

    Latency evaluation for MQTT and WebSocket Protocols: an Industry 4.0 perspective by Silva, Diego R. C., Oliveira, Guilherme M. B., Silva, Ivanovitch, Ferrari, Paolo, Sisinni, Emiliano

    “…Internet of things (IoT) is a trend which consists of providing connectivity for many consumer devices. Consequently, a considerable number of applications…”
    Get full text
    Conference Proceeding
  17. 17

    Multi-objective optimization for computation offloading in mobile-edge computing by Liqing Liu, Zheng Chang, Xijuan Guo, Ristaniemi, Tapani

    “…Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and…”
    Get full text
    Conference Proceeding
  18. 18

    Smart-M3 information sharing platform by Honkola, J, Laine, H, Brown, R, Tyrkko, O

    “…We describe the concept, architecture and key design decisions of Smart-M3 interoperability platform. The platform is based on the ideas of space-based…”
    Get full text
    Conference Proceeding
  19. 19

    OAuth-IoT: An access control framework for the Internet of Things based on open standards by Sciancalepore, Savio, Piro, Giuseppe, Caldarola, Daniele, Boggia, Gennaro, Bianchi, Giuseppe

    “…While the Internet of Things is breaking into the market, the controlled access to constrained resources still remains a blocking concern. Unfortunately,…”
    Get full text
    Conference Proceeding
  20. 20

    The Evolution of Bashlite and Mirai IoT Botnets by Marzano, Artur, Alexander, David, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P. C., Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
    Get full text
    Conference Proceeding