Search Results - "Proceedings IEEE Symposium on Computers and Communications"
-
1
A comprehensive investigation and comparison of Machine Learning Techniques in the domain of heart disease
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…This paper aims to investigate and compare the accuracy of different data mining classification schemes, employing Ensemble Machine Learning Techniques, for…”
Get full text
Conference Proceeding -
2
SIM: Sub-RTT-based Incast Mitigation in Data Center Networks
Published in Proceedings - IEEE Symposium on Computers and Communications (26-06-2024)“…Recently, many Remote Direct Memory Access (RDMA) congestion control (CC) algorithms have been proposed to ensure the performance of high-speed Data Center…”
Get full text
Conference Proceeding -
3
Continual Learning in Recurrent Neural Networks for the Internet of Things: A Stochastic Approach
Published in Proceedings - IEEE Symposium on Computers and Communications (26-06-2024)“…In many applications Internet of Things (IoT) supports decision taking on the base of continuous data acquisition. These data, usually streams of sensed data,…”
Get full text
Conference Proceeding -
4
Reluplex made more practical: Leaky ReLU
Published in 2020 IEEE Symposium on Computers and Communications (ISCC) (01-07-2020)“…In recent years, Deep Neural Networks (DNNs) have been experiencing rapid development and have been widely used in various fields. However, while DNNs have…”
Get full text
Conference Proceeding -
5
Internet of Things: Security vulnerabilities and challenges
Published in 2015 IEEE Symposium on Computers and Communication (ISCC) (01-07-2015)“…Internet of Things (IoT) has been given a lot of emphasis since the 90s when it was first proposed as an idea of interconnecting different electronic devices…”
Get full text
Conference Proceeding -
6
jPBC: Java pairing based cryptography
Published in 2011 IEEE Symposium on Computers and Communications (ISCC) (01-06-2011)“…It has been recently discovered that some cyclic groups that could be used in Cryptography admit a special bilinear pairing map that introduces extra structure…”
Get full text
Conference Proceeding -
7
DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…The open nature of Android allows application developers to take full advantage of the system. While the flexibility is brought to developers and users, it may…”
Get full text
Conference Proceeding -
8
CNN based Indoor Localization using RSS Time-Series
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Indoor localization of mobile nodes is receiving great interest due to the recent advances in mobile devices and the increasing number of location-based…”
Get full text
Conference Proceeding -
9
Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…Massive advancements in computing and communication technologies have enabled the ubiquitous presence of interconnected computing devices in all aspects of…”
Get full text
Conference Proceeding -
10
Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture
Published in 2012 IEEE Symposium on Computers and Communications (ISCC) (01-07-2012)“…Face recognition applications for airport security and surveillance can benefit from the collaborative coupling of mobile and cloud computing as they become…”
Get full text
Conference Proceeding -
11
Identity-based authentication scheme for the Internet of Things
Published in 2016 IEEE Symposium on Computers and Communication (ISCC) (01-06-2016)“…Security and privacy are among the most pressing concerns that have evolved with the Internet. As networks expanded and became more open, security practices…”
Get full text
Conference Proceeding -
12
Real-time path planning to prevent traffic jam through an intelligent transportation system
Published in 2016 IEEE Symposium on Computers and Communication (ISCC) (01-06-2016)“…Congestion is a major problem in large cities. One of the main causes of congestion is the sudden increase of vehicle traffic during peak hours. Current…”
Get full text
Conference Proceeding -
13
Multi-User Preemptive Scheduling For Critical Low Latency Communications in 5G Networks
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…5G new radio is envisioned to support three major service classes: enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and…”
Get full text
Conference Proceeding -
14
Flow-based Intrusion Detection System for SDN
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…Software-defined networks (SDN) are vulnerable to most of the attacks that traditional networks are vulnerable to. In addition, SDN has introduced new…”
Get full text
Conference Proceeding -
15
Car parking occupancy detection using smart camera networks and Deep Learning
Published in 2016 IEEE Symposium on Computers and Communication (ISCC) (01-06-2016)“…This paper presents an approach for real-time car parking occupancy detection that uses a Convolutional Neural Network (CNN) classifier running on-board of a…”
Get full text
Conference Proceeding -
16
Latency evaluation for MQTT and WebSocket Protocols: an Industry 4.0 perspective
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Internet of things (IoT) is a trend which consists of providing connectivity for many consumer devices. Consequently, a considerable number of applications…”
Get full text
Conference Proceeding -
17
Multi-objective optimization for computation offloading in mobile-edge computing
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…Mobile-edge cloud computing is a new cloud platform to provide pervasive and agile computation augmenting services for mobile devices (MDs) at anytime and…”
Get full text
Conference Proceeding -
18
Smart-M3 information sharing platform
Published in The IEEE symposium on Computers and Communications (01-06-2010)“…We describe the concept, architecture and key design decisions of Smart-M3 interoperability platform. The platform is based on the ideas of space-based…”
Get full text
Conference Proceeding -
19
OAuth-IoT: An access control framework for the Internet of Things based on open standards
Published in 2017 IEEE Symposium on Computers and Communications (ISCC) (01-07-2017)“…While the Internet of Things is breaking into the market, the controlled access to constrained resources still remains a blocking concern. Unfortunately,…”
Get full text
Conference Proceeding -
20
The Evolution of Bashlite and Mirai IoT Botnets
Published in 2018 IEEE Symposium on Computers and Communications (ISCC) (01-06-2018)“…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
Get full text
Conference Proceeding