default search action
19th CNSM 2023: Niagara Falls, ON, Canada
- 19th International Conference on Network and Service Management, CNSM 2023, Niagara Falls, ON, Canada, October 30 - Nov. 2, 2023. IEEE 2023, ISBN 978-3-903176-59-1
- Bruno Loureiro Coelho, Alberto E. Schaeffer-Filho:
CrossBal: Data and Control Plane Cooperation for Efficient and Scalable Network Load Balancing. 1-9 - Pooyan Habibi, Morteza Moghaddassian, Shayan Shafaghi, Alberto Leon-Garcia:
Data Fabrics for Multi-Domain Information Systems. 1-5 - José Santos, Miel Verkerken, Laurens D'hooge, Tim Wauters, Bruno Volckaert, Filip De Turck:
Performance Impact of Queue Sorting in Container-Based Application Scheduling. 1-9 - Masoud Taghavian, Yassine Hadjadj Aoul, Géraldine Texier, Nicolas Huin, Philippe Bertin:
A Fair Approach to the Online Placement of the Network Services Over the Edge. 1-7 - Alfred Arouna, Ioana Livadariu, Azan Latif Khanyari, Ahmed Elmokashfi:
On Large-Scale IP Service Disruptions Dependencies. 1-5 - Julian Jimenez, Paola Soto, Danny De Vleeschauwer, Chia-Yu Chang, Yorick De Bock, Steven Latré, Miguel Camelo:
Resource Allocation of Multi-User Workloads in Cloud and Edge Data-Centers Using Reinforcement Learning. 1-5 - Paul Seehofer, Roland Bless, Hendrik Mahrt, Martina Zitterbart:
Scalable and Efficient Link Layer Topology Discovery for Autonomic Networks. 1-9 - Dor Harris, David Naori, Danny Raz:
Online Utilization Maximization in Resource Allocation with Minimum Service Guarantees. 1-9 - Hichem Magnouche, Guillaume Doyen, Caroline Prodhon:
A Lightweight Heuristic for Micro-Services Placement and Chaining in Low Latency Services. 1-9 - Yichong Chen, Manuel Roveri, Shreshth Tuli, Giuliano Casale:
Coupling QoS Co-Simulation with Online Adaptive Arrival Forecasting. 1-9 - Bruck Wubete, Babak Esfandiari, Thomas Kunz:
Leveraging Spatiotemporal Relations for Predicting Potential Link Failures. 1-5 - Nischal Aryal, Fariba Ghaffari, Emmanuel Bertin, Noël Crespi:
Subscription Management for Beyond 5G and 6G Cellular Networks Using Blockchain Technology. 1-7 - Leonardo Alberro, Eduardo Grampín:
BGP Control Plane Overhead in Fat-Trees: An Analytical Approach. 1-7 - Md Mahir Shahriyar, Gourab Saha, Bishwajit Bhattacharjee, Rezwana Reaz:
DEFT: Distributed, Elastic, and Fault-Tolerant State Management of Network Functions. 1-7 - Csaba Hegedüs, Pál Varga:
Tailoring MLOps Techniques for Industry 5.0 Needs. 1-7 - Engin Zeydan, Luis Blanco, Josep Mangues, Suayb S. Arslan, Yekta Turk:
Blockchain-Based Self-Sovereign Identity for Federated Learning in Vehicular Networks. 1-7 - Céline Minh, Kevin Vermeulen, Cédric Lefebvre, Philippe Owezarski, William Ritchie:
An Explainable-by-Design Ensemble Learning System to Detect Unknown Network Attacks. 1-9 - Dániel Ficzere, Gergely Hollósi, Attila Frankó, Pál Varga:
AI Toolbox Concept for the Arrowhead Framework. 1-7 - Henrique D. Moura, Júnia Maísa Oliveira, Daniel Soares, Daniel F. Macedo, Marcos A. M. Vieira:
Improved Video QoE in Wireless Networks Using Deep Reinforcement Learning. 1-7 - Tomás Benes, Jaroslav Pesek, Tomás Cejka:
Look at my Network: An Insight into the ISP Backbone Traffic. 1-7 - Omar Houidi, Oussama Soualah, Ines Houidi, Djamal Zeghlache:
Energy Efficient VNF-FG Embedding via Attention-Based Deep Reinforcement Learning. 1-7 - Mahtab Movahedian, Mahdi Dolati, Majid Ghaderi:
Adaptive Model Aggregation for Decentralized Federated Learning in Vehicular Networks. 1-9 - Marc Koerner:
Vendor Agnostic Network Service Orchestration with Stacked NSO Services. 1-4 - Maria Mushtaq, Morteza Golkarifard, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh:
Optimal Functional Splitting, Placement and Routing for Isolation-Aware Network Slicing in NG-RAN. 1-5 - Md. Shamim Towhid, Nasik Sami Khan, Nashid Shahriar, Massimo Tornatore, Raouf Boutaba, Aladdin Saleh:
A Token-Prioritization Strategy for Handling Data Imbalance in Network-Change Ticket Classification. 1-7 - Engin Zeydan, Luis Blanco, Sergio Barrachina-Muñoz, Farhad Rezazadeh, Luca Vettori, Josep Mangues:
A Marketplace Solution for Distributed Network Management and Orchestration of Slices. 1-6 - Ying Wang, Yufan Cheng, Zhihan Zhuang, Junye Zhang, Peng Yu, Shaoyong Guo, Xuesong Qiu:
Joint Routing and GCL Scheduling Algorithm Based on Tabu Search in TSN. 1-5 - Max Helm, Georg Carle:
Synthesizing and Scaling WAN Topologies Using Permutation-Invariant Graph Generative Models. 1-7 - Kristina Dzeparoska, Jieyu Lin, Ali Tizghadam, Alberto Leon-Garcia:
LLM-Based Policy Generation for Intent-Based Management of Applications. 1-7 - Mays F. Al-Naday, Vasileios Karagiannis, Tom De Block, Bruno Volckaert:
Federated Scheduling of Fog-Native Applications Over Multi-Domain Edge-to-Cloud Ecosystem. 1-7 - Mehdi Nobakht, Arshiya Rezaie Hezaveh:
pUpdate: Priority-Based Scheduling for Continuous and Consistent Network Updates in SDN. 1-7 - Lorenzo Manca, Davide Borsatti, Filippo Poltronieri, Mattia Zaccarini, Domenico Scotece, Gianluca Davoli, Luca Foschini, Genady Ya. Grabarnik, Larisa Shwartz, Cesare Stefanelli, Mauro Tortonesi, Walter Cerroni:
Characterization of Microservice Response Time in Kubernetes: A Mixture Density Network Approach. 1-9 - Thorben Krüger, Clemens Beck, David Hausheer:
Path Oracle: Improving Performance of Path-Aware Applications in SCION. 1-5 - Yoichi Matsuo:
Empirical Analysis of the Fine-Tuning for Unsupervised Anomaly Detection in the ICT System. 1-7 - Nils Höoger, Nils Rodday, Oliver Borchert, Gabi Dreo Rodosek:
Path Plausibility Algorithms in GoBGP. 1-3 - Jorge Baranda, Sergio Barrachina-Muñoz, Rasoul Nikbakht, Miquel Payaró, Josep Mangues-Bafalluy:
Disaggregating a 5G Non-Public Network via On-Demand Cloud-Native UPF Deployments. 1-3 - Tamas Tothfalusi, Eszter Varga, Zoltan Csiszar, Pál Varga:
ML-Based Translation Methods for Protocols and Data Formats. 1-5 - Elham Akbari, Sheikh A. Tahmid, Navid Malekghaini, Mohammad Ali Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stéphane Tuffin:
A Critical Study of Few-Shot Learning for Encrypted Traffic Classification. 1-9 - Attila Frankó, Gergely Hollósi:
Settling Issues in IEEE 802.1AS Networks in PI Based Clock Servos. 1-7 - Ulya Sabeel, Shahram Shah-Heydari, Khalil El-Khatib, Khalid Elgazzar:
Analyzing the Quality of Synthetic Adversarial Cyberattacks. 1-5 - Ali Hassan, Shahram Shah-Heydari:
Enterprise Application Outage Prediction Using XGBoost and LSTM. 1-5 - Solmaz Jaberi, J. William Atwood, Joey Paquet:
ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking. 1-5 - Pegah Golchin, Chengbo Zhou, Pratyush Agnihotri, Mehrdad Hajizadeh, Ralf Kundel, Ralf Steinmetz:
CML-IDS: Enhancing Intrusion Detection in SDN Through Collaborative Machine Learning. 1-9 - Rafael Copstein, Brad Niblett, Andrew Johnston, Jeff Schwartzentruber, Malcolm I. Heywood, Nur Zincir-Heywood:
MIMC: Anomaly Detection in Network Data via Multiple Instances of Micro-Cluster Detection. 1-7 - Satoru Kobayashi, Ryusei Shiiba, Ryosuke Miura, Shinsuke Miwa, Toshiyuki Miyachi, Kensuke Fukuda:
dot2net: A Labeled Graph Approach for Template-Based Configuration of Emulation Networks. 1-9 - Timo Geier, Sebastian Rieger:
Low Impact Tenant Code Updates on Multi-Tenant Programmable Switches. 1-5 - Hiroshi Yamauchi, Tatsuaki Kimura:
Deep Reinforcement Learning Based Command Control System for Automating Fault Diagnosis. 1-5 - Yixing Wang, Yang Xiao, Yuqian Song, Jingli Zhou, Jun Liu:
Deep Reinforcement Learning Based Probabilistic Cognitive Routing: An Empirical Study with OMNeT++ and P4. 1-7 - Vedant Joseph Kumar, Patrick Maillé, Bruno Tuffin:
Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified Model. 1-7 - Amirhossein Sefati, Mahdi Dolati, Majid Ghaderi:
Workload Placement with Bounded Slowdown in Disaggregated Datacenters. 1-9 - Mehdi Nobakht, Frank T. H. den Hartog:
On Integrated Wired and Wireless Time-Sensitive Networking using SDN. 1-5 - Josef Koumar, Karel Hynek, Tomás Cejka:
Network Traffic Classification Based on Single Flow Time Series Analysis. 1-7 - Negar Mohammadi-Koushki, Sanjeev Sondur, Krishna Kant:
Improving System Configurations Using Domain Knowledge Assisted Semi-Supervised Learning. 1-5 - Sukhyun Nam, Euidong Jeong, Jibum Hong, Jae-Hyoung Yoo, James Won-Ki Hong:
Log Analysis and Prediction for Anomaly Detection in Network Switches. 1-7 - Bohan Zhang, Paul Zeinaty, Noura Limam, Raouf Boutaba:
Mitigating Signaling Storms in 5G with Blockchain-assisted 5GAKA. 1-9 - Vinicius Fulber-Garcia, José Wilson Vieira Flauzino, Carlos Raniery Paula dos Santos, Elias P. Duarte:
An ETSI-Compliant Architecture for the Element Management System: The Key for Holistic NFV Management. 1-9 - Kazuaki Akashi, Nobukazu Fukuda, Shunsuke Kanai, Kenichi Tayama:
Deep Reinforcement Learning for Network Service Recovery in Large-Scale Failures. 1-5 - Nan Jiang, Jessie Hui Wang, Jilong Wang, Peiran Wang:
TinyG: Accurate IP Geolocation Using a Tiny Number of Probers. 1-9 - Jonas Brunner, Bruno Rodrigues, Katharina O. E. Müller, Salil S. Kanhere, Burkhard Stiller:
Deciphering DDoS Attacks Through a Global Lens. 1-7 - Manh-Tien-Anh Nguyen, Van Tong, Sondes Bannour Souihi, Sami Souihi:
Deep Learning in NLP for Anomalous HTTP Requests Detection. 1-8 - Justin Kur, Ji Xue, Jingshu Chen, Jun Huang:
Bridging Resource Prediction and System Management: A Case Study in Cloud Systems. 1-5 - Sarah Shah, Yasaman Amannejad, Diwakar Krishnamurthy:
Predicting the Performance of DNNs to Support Efficient Resource Allocation. 1-7 - Sebastian Schmidt, Johannes Zerwas, Wolfgang Kellerer:
AdFAT: Adversarial Flow Arrival Time Generation for Demand-Oblivious Data Center Networks. 1-5 - Abdulhakeem Abdulazeez, Nicola Roberto Zema, Tara Ali-Yahiya, Steven Martin:
Learning-Based Formation Control of UAV-Fleet. 1-7 - Eui-Dong Jeong, Jae-Hyoung Yoo, James Won-Ki Hong:
SDN Lullaby: VM Consolidation for SDN using Transformer-Based Deep Reinforcement Learning. 1-5 - Josef Koumar, Richard Plný, Tomás Cejka:
Enhancing DeCrypto: Finding Cryptocurrency Miners Based on Periodic Behavior. 1-7 - Nils Rodday, Gabi Dreo Rodosek:
BGPEval: Automating Large-Scale Testbed Creation. 1-5 - Benjamin Teyssier, Y A Joarder, Carol J. Fung:
An Empirical Approach to Evaluate the Resilience of QUIC Protocol Against Handshake Flood Attacks. 1-9 - Brigitte Jaumard, Junior Momo Ziazet:
5G E2E Network Slicing Predictable Traffic Generator. 1-7 - Jiaheng Xiong, Qiaolun Zhang, Alberto Gatto, Francesco Musumeci, Raouf Boutaba, Massimo Tornatore:
Adaptive Entanglement Routing for Quantum Networks with Cutoff. 1-5 - Lucas Torrealba Aravena, Pedro Casas, Javier Bustos-Jiménez, Germán Capdehourat, Mislav Findrik:
Dom2Vec - Detecting DGA Domains Through Word Embeddings and AI/ML-Driven Lexicographic Analysis. 1-5 - Alexander Loginov, Jeffrey Adjei, Nur Zincir-Heywood, Srinivas Sampalli, Kevin de Snayer, Terri Dougall:
Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices. 1-5 - Mohamed Abderrahmane Madani, Fen Zhou, Ahmed Meddahi:
Deploying Disaster-Resilient Service Function Chains Using Adaptive Multi-Path Routing. 1-5 - Badre Bousalem, Mohamed Anis Sakka, Vinicius F. Silva, Wael Jaafar, Asma Ben Letaifa, Rami Langar:
DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-Based Approach. 1-5 - Behnam Farzaneh, Nashid Shahriar, Abu Hena Al Muktadir, Md. Shamim Towhid:
DTL-IDS: Deep Transfer Learning-Based Intrusion Detection System in 5G Networks. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.