number |
title/author |
P2-1 | A Search Approach Based on Query Similarity in Content-Centric Networks Jiun-Yu Tu, Chih-Lin Hu, Han Hu, |
P2-10 | Network Security Situation Prediction Based on Long Short-Term Memory Network Li Shang, Wei Zhao, Jiaju Zhang, Qiang Fu, Qian Zhao, Yang Yang, |
P2-11 | FLchain: Federated Learning via MEC-enabled Blockchain Network Umer Majeed, Choong Seon Hong, |
P2-12 | DB-Kmeans:An Intrusion Detection Algorithm Based on DBSCAN and K-means Gangsong Dong, Yi Jin, Shiwen Wang, Wencui Li, Zhuo Tao, ShaoYong Guo, |
P2-13 | Improved Secure Computation over Real Numbers and Its Application to Reliability Engineering Takumi Iseki, Masahiro Hayashi, |
P2-14 | Space Weather Data Management System and Monitoring in Decentralized Storage Environment Yoga Andrian, Essaid Maryam, Kim Dae Yong, Soo Hoon Maeng, Hongtaek Ju, |
P2-15 | A Content-Centric Platform for Home Networks Pai-Hui Wang, Tse-Han Wang, Shih-Ting Lin, Pei-Wen Chen, Chien-Chao Tseng, Jiun-Long Huang, |
P2-16 | A Data-Over-Sound Application: Attendance Book Soohyun Kim, Hyunsu Mun, Youngseok Lee, |
P2-17 | Comparison of NVA and RLOWESS Algorithms in Indoor Positioning System Hung-Huan Liu, Wei-Chien Chen, Pin-Chun Hsu, |
P2-18 | ROS-based Robot Development Toward Fully Automated Network Management Takayuki WARABINO, Yusuke SUZUKI, Masanori MIYAZAWA, |
P2-19 | Store-and-Forward Data Transfer using Optimized Intermediate Node Woojin Seok, Jeonghoon Moon, Wontaek Hong, Jaiseung Kwak, Manhee Lee, |
P2-2 | A Monitorable Peer-to-Peer File Sharing Mechanism Wei-Chiao Huang, Lo-Yao Yeh, Jiun-Long Huang, |
P2-20 | SLA Driven Operation - optimizing telecom operation based on SLA - Atsushi TAKADA, Naoyuki TANJI, Toshihiko SEKI, Kyoko YAMAGOE, Yuji SOEJIMA, Mitsuho TAHARA, |
P2-21 | A Fault Prediction Method Based on Load-capacity Model in the Communication Network Xilin Ji, Xiao Liang, Yun Zhou, Yonghua Huo, Xiaodan Shi, Yang Yang, |
P2-22 | An Integrated Network Monitoring System for SDN VPN Yueh-Hsien Lin, Chien-Wen Yang, Ting-Che Chuang, Min Liu, Min-Chia Chang, |
P2-23 | The Design and Simulation of Service Recovery Strategy Based on Recovery Node in Clustering Network Hecun Yuan, Biyao Li, Huilin Liu, Yi Han, Lanlan Rui, Ying Wang, |
P2-24 | Survival Traffic Ratio Analysis for Cascading Failure in Interdependent Networks Hiroshi Yamashita, Masahiro Hayashi, |
P2-25 | Auction Based Resource Trading Using Relation Between Telecommunication Network Failure Rate and Users' Utility Haruo Oishi, Kyoko Yamori, Cheng Zhang, Yoshiaki Tanaka, |
P2-26 | Detecting Road Conditions in Front of The Vehicle Using Off-The-Shelf Camera Shao-Peng Lu, Min-Te Sun, |
P2-3 | Enabling Inference Inside Software Switches Yung-Sheng Lu, Kate Ching-Ju Lin, |
P2-4 | Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB Yuki Fujita, Atsuo Inomata, Hiroki Kashiwazaki, |
P2-5 | Data Provenance for Experiment Management of Scientific Applications on GPU Sejin Kim, Jisun Oh, Yoonhee Kim, |
P2-6 | A Framework for Maritime Anti-Collision Pattern Discovery from AIS Network Po-Ruey Lei, Pei-Rong Yu, Wen-Chih Peng, |
P2-7 | Long-Term Span Traffic Prediction Model Based on STL Decomposition and LSTM Yonghua Huo, Yu Yan, Dan Du, Zhihao Wang, Yixin Zhang, Yang Yang, |
P2-8 | Deep Learning Based Anomaly Detection Scheme in Software-Defined Networking Yang Qin, Junjie Wei, Weihong Yang, |
P2-9 | DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning Ui-Jun Baek, Se-Hyun Ji, Min-Seob Lee, Jun-Sang Park, Myung-Sup Kim, |