default search action
18th Q2SWinet 2022: Montreal, Quebec, Canada
- Azzedine Boukerche, Peng Sun:
Proceedings of the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks on 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2022, Montreal, Quebec, Canada, October 24-28, 2022. ACM 2022, ISBN 978-1-4503-9481-9 - Daniela Sousa, Susana Sargento, Miguel Luís:
A Simulation Environment for Software Defined Wireless Networks with Legacy Devices. 1-10 - Amina Fellan, Christopher Hobelsberger, Christian Schellenberger, Daniel Lindenschmitt, Hans D. Schotten:
Electromagnetic Field Strength Measurements in a Private 5G Campus Network. 11-17 - Harish V. Mekali, Anurag Agarwal, Manvendra Singh, Jobish John, Gaurav S. Kasbekar, Maryam Shojaei Baghini:
Experimental Analysis of LoRa Transmission Parameters. 19-26 - Fidan Mehmeti, Wolfgang Kellerer:
Max-min Fair Resource Allocation in SD-RAN. 27-35 - Vegard Edvardsen, Gard Spreemann, Jeriek Van den Abeele:
FORLORN: A Framework for Comparing Offline Methods and Reinforcement Learning for Optimization of RAN Parameters. 37-44 - Anna Prado, Dennis Gölitz, Fidan Mehmeti, Wolfgang Kellerer:
Proportionally Fair Resource Allocation Considering Geometric Blockage Modeling for Improved Mobility Management in 5G. 45-53 - Khalil Guibene, Nadhir Messai, Marwane Ayaida, Lyes Khoukhi:
A Data Mining-based Intrusion Detection System for Cyber Physical Power Systems. 55-62 - Andressa A. Cunha, João B. Borges Neto, Antonio A. F. Loureiro:
Classification of Botnet Attacks in IoT Using a Convolutional Neural Network. 63-70 - Omar Elghalhoud, Kshirasagar Naik, Marzia Zaman, Nishith Goel:
Data Balancing and Hyper-parameter Optimization for Machine Learning Algorithms for Secure IoT Networks. 71-78 - Weiyang Qian, Rodolfo W. L. Coutinho:
Performance Evaluation of Edge Computing-Aided IoT Augmented Reality Systems. 79-86 - Amit Dua, Tomasz Jastrzab, Zbigniew J. Czech, Pavel Krömer:
A Randomized Algorithm for Wireless Sensor Network Lifetime Optimization. 87-93 - M. Surendra Kumar, Gaurav S. Kasbekar, Arnab Maity:
Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers. 95-104 - Merkouris Karaliopoulos, Iordanis Koutsopoulos:
Empowering Synergies of Communities with Service Providers for the Bottom-up Deployment of Network Infrastructures. 105-114 - Diego S. Wistuba La-Torre, Sandra Céspedes, Javier Bustos-Jiménez:
Modeling SCHC ACK-on-Error Fragment Delivery over Sigfox. 115-119 - Behnaz Merikhi, Mohammad Reza Soleymani:
Cache-Aided Delivery Network in a Shared Cache Framework with Correlated Sources. 121-129 - Ishfaq Bashir Sofi, Rodolfo W. L. Coutinho, M. Reza Soleymani:
Modeling of Edge Server Cache-Reservation for Virtual Reality Applications. 131-138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.