The 20th Asia-Pacific Network Operations and Management Symposium

number title/author
P2-1A Search Approach Based on Query Similarity in Content-Centric Networks
Jiun-Yu Tu, Chih-Lin Hu, Han Hu,
P2-10Network Security Situation Prediction Based on Long Short-Term Memory Network
Li Shang, Wei Zhao, Jiaju Zhang, Qiang Fu, Qian Zhao, Yang Yang,
P2-11FLchain: Federated Learning via MEC-enabled Blockchain Network
Umer Majeed, Choong Seon Hong,
P2-12DB-Kmeans:An Intrusion Detection Algorithm Based on DBSCAN and K-means
Gangsong Dong, Yi Jin, Shiwen Wang, Wencui Li, Zhuo Tao, ShaoYong Guo,
P2-13Improved Secure Computation over Real Numbers and Its Application to Reliability Engineering
Takumi Iseki, Masahiro Hayashi,
P2-14Space Weather Data Management System and Monitoring in Decentralized Storage Environment
Yoga Andrian, Essaid Maryam, Kim Dae Yong, Soo Hoon Maeng, Hongtaek Ju,
P2-15A Content-Centric Platform for Home Networks
Pai-Hui Wang, Tse-Han Wang, Shih-Ting Lin, Pei-Wen Chen, Chien-Chao Tseng, Jiun-Long Huang,
P2-16A Data-Over-Sound Application: Attendance Book
Soohyun Kim, Hyunsu Mun, Youngseok Lee,
P2-17Comparison of NVA and RLOWESS Algorithms in Indoor Positioning System
Hung-Huan Liu, Wei-Chien Chen, Pin-Chun Hsu,
P2-18ROS-based Robot Development Toward Fully Automated Network Management
Takayuki WARABINO, Yusuke SUZUKI, Masanori MIYAZAWA,
P2-19Store-and-Forward Data Transfer using Optimized Intermediate Node
Woojin Seok, Jeonghoon Moon, Wontaek Hong, Jaiseung Kwak, Manhee Lee,
P2-2A Monitorable Peer-to-Peer File Sharing Mechanism
Wei-Chiao Huang, Lo-Yao Yeh, Jiun-Long Huang,
P2-20SLA Driven Operation - optimizing telecom operation based on SLA -
Atsushi TAKADA, Naoyuki TANJI, Toshihiko SEKI, Kyoko YAMAGOE, Yuji SOEJIMA, Mitsuho TAHARA,
P2-21A Fault Prediction Method Based on Load-capacity Model in the Communication Network
Xilin Ji, Xiao Liang, Yun Zhou, Yonghua Huo, Xiaodan Shi, Yang Yang,
P2-22An Integrated Network Monitoring System for SDN VPN
Yueh-Hsien Lin, Chien-Wen Yang, Ting-Che Chuang, Min Liu, Min-Chia Chang,
P2-23The Design and Simulation of Service Recovery Strategy Based on Recovery Node in Clustering Network
Hecun Yuan, Biyao Li, Huilin Liu, Yi Han, Lanlan Rui, Ying Wang,
P2-24Survival Traffic Ratio Analysis for Cascading Failure in Interdependent Networks
Hiroshi Yamashita, Masahiro Hayashi,
P2-25Auction Based Resource Trading Using Relation Between Telecommunication Network Failure Rate and Users' Utility
Haruo Oishi, Kyoko Yamori, Cheng Zhang, Yoshiaki Tanaka,
P2-26Detecting Road Conditions in Front of The Vehicle Using Off-The-Shelf Camera
Shao-Peng Lu, Min-Te Sun,
P2-3Enabling Inference Inside Software Switches
Yung-Sheng Lu, Kate Ching-Ju Lin,
P2-4Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB
Yuki Fujita, Atsuo Inomata, Hiroki Kashiwazaki,
P2-5Data Provenance for Experiment Management of Scientific Applications on GPU
Sejin Kim, Jisun Oh, Yoonhee Kim,
P2-6A Framework for Maritime Anti-Collision Pattern Discovery from AIS Network
Po-Ruey Lei, Pei-Rong Yu, Wen-Chih Peng,
P2-7Long-Term Span Traffic Prediction Model Based on STL Decomposition and LSTM
Yonghua Huo, Yu Yan, Dan Du, Zhihao Wang, Yixin Zhang, Yang Yang,
P2-8Deep Learning Based Anomaly Detection Scheme in Software-Defined Networking
Yang Qin, Junjie Wei, Weihong Yang,
P2-9DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning
Ui-Jun Baek, Se-Hyun Ji, Min-Seob Lee, Jun-Sang Park, Myung-Sup Kim,