Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISCC
ISCC 2018
Generate Citations
2018 IEEE Symposium on Computers and Communications (ISCC)
June 25 2018 to June 28 2018
Natal, Brazil
Table of Contents
ISCC 2018 Author Information Page
Freely available from IEEE.
pp. 43-64
ISCC 2018 Committees
Freely available from IEEE.
pp. 31-32
[Copyright notice]
Freely available from IEEE.
pp. 1-1
Table of contents
Freely available from IEEE.
pp. 3-30
ISCC 2018 Technical Program Committee
Freely available from IEEE.
pp. 33-42
ISCC 2018 Welcome
Freely available from IEEE.
pp. 2-2
MSHCS-MAC: A MAC protocol for Multi-hop cognitive radio networks based on Slow Hopping and Cooperative Sensing approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Nhat Pham
,
Kiwoong Kwon
,
Daeyoung Kim
Evaluating container-based virtualization overhead on the general-purpose IoT platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 8-11
by
Wagner dos Santos Marques
,
Paulo Silas Severo de Souza
,
Fábio Diniz Rossi
,
Guilherme da Cunha Rodrigues
,
Rodrigo N. Calheiros
,
Marcelo da Silva Conterato
,
Tiago Coelho Ferreto
Users-Fogs association within a cache context in 5G networks:Coalition game model
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-19
by
Amine Abouaomar
,
Mouna Elmachkour
,
Abdellatif Kobbane
,
Hamidou Tembine
,
Marwane Ayaida
LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Chang Liu
,
Zigang Cao
,
Zhen Li
,
Gang Xiong
Analysis of gap filling algorithms to smart surveillance environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-29
by
Maycon Peixoto
,
Igo Souza
,
Matheus Barbosa
,
Gabriel Lecomte
,
Dionisio Leite
,
Bruno Guazzelli
,
Bruno Tardiole
An Energy-aware Task Scheduler Based in Ownership Fairness Applied to Federated Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-27
by
Cássio H. V. Forte
,
Aleardo Manacero
,
Renata S. Lobato
,
Roberta Spolon
Security and Privacy in Extensible Distributed Coordination
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-31
by
Edson Floriano
,
Eduardo Alchieri
,
Diego F. Aranha
,
Priscila Solis
A High-Performance Round-Robin Regular Expression Matching Architecture Based on FPGA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jiajia Yang
,
Lei Jiang
,
Xu Bai
,
Huailiang Peng
,
Qiong Dai
QUIC and TCP: A Performance Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-41
by
Késsia Nepomuceno
,
Igor Nogueira de Oliveira
,
Rafael Roque Aschoff
,
Daniel Bezerra
,
Maria Silvia Ito
,
Wesley Melo
,
Djamel Sadok
,
Géza Szabó
Secure Transmission Against Pilot Contamination: A Cooperative Scheme with Multiple Antennas
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Rengyong Wu
,
Shenglan Yuan
,
Chao Yuan
Koordinator: A Service Approach for Replicating Docker Containers in Kubernetes
Full-text access may be available. Sign in or learn about subscription options.
pp. 58-51
by
Hylson Vescovi Netto
,
Aldelir Fernando Luiz
,
Miguel Correia
,
Luciana de Oliveira Rech
,
Caio Pereira Oliveira
Parallel Polar Encoding in 5G Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-69
by
Yang Guo
,
Shaolin Xie
,
Zijun Liu
,
Lei Yang
,
Donglin Wang
BGCC: a Bloom Filter-based Grouped-Chunk Caching Approach for Information-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-59
by
Jiang Zhi
,
Jun Li
,
aibo Wu
Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-63
by
Siye Wang
,
Shaoyi Zhu
,
Yanfang Zhang
Driver Authentication in VANETs based on Intra-Vehicular Sensor Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-83
by
Paulo H. L. Rettore
,
Andre B. Campolina
,
Artur Souza
,
Guilherme Maia
,
Leandro A. Villas
,
Antonio A. F. Loureiro
B-Cache: A Behavior-Level Caching Framework for the Programmable Data Plane
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-90
by
Cheng Zhang
,
Jun Bi
,
Yu Zhou
,
Keyao Zhang
,
Zijun Ma
Improving Feature Point Detection in High Dynamic Range Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-96
by
Welerson Augusto Lino Jesus de Melo
,
Jusley Arley Oliveira de Tavares
,
Daniel Oliveira Dantas
,
Beatriz Trinchao Andrade
RWAC: A Self-contained Read and Write Access Control Scheme for Group Collaboration
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-67
by
Jinmiao Wang
,
Bo Lang
,
Ruijin Zhu
QoS Guaranteed Batch Scheduling for Optical Switches Based on Unequal Weight Sequence
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-109
by
Yan Guan
,
Bin Wu
,
Zhipeng Zhao
,
Boyu Li
,
Shu Fu
Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Mingming Guo
,
Kianoosh G. Boroojeni
,
Niki Pissinou
,
Kia Makki
,
Jerry Miller
,
Sitharama Iyengar
Pseudo Downlink Channel Scheme for Eavesdroppers to Work Against Two-way Training DCE in Non-reciprocal MIMO Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-82
by
Keke Hu
,
Ying Wang
,
Zhongfang Wang
,
Shunliang Zhang
,
Yongming Wang
A Feasibility Study of Watchdogs on Opportunistic Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-128
by
Diogo Soares
,
Bruno Matthaus
,
Edjair S. Mota
,
Celso B. Carvalho
Comprehensive Behavior Profiling Model for Malware Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-93
by
Jianguo Jiang
,
Qilei Yin
,
Zhixin Shi
,
Meimei Li
Multi-User Preemptive Scheduling For Critical Low Latency Communications in 5G Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-97
by
Ali A. Esswie
,
Klaus I. Pedersen
Reducing multi-hop communication latency of schedule-based asynchronous duty cycle mechanisms through low-resolution synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-103
by
André Saraiva
,
Diego Passos
,
Célio Albuquerque
,
Ricardo Carrano
Increasing LoRaWAN Application-Layer Message Delivery Success Rates
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-107
by
Shie-Yuan Wang
,
Tzu-Yang Chen
EFM: Improving DCNs throughput using the transmission rates of elephant flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-111
by
André Luiz B. Rocha
,
Fábio L. Verdi
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-115
by
Rafael C. R. Condé
,
Carlos A. Maziero
,
Newton C. Will
Management Framework for Future Internet Service Providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-119
by
Rafael L. Gomes
,
Francisco R. P. da Ponte
,
Eduardo C. Cerqueira
,
Luiz F. Bittencourt
,
Edmundo R. M. Madeira
,
Mario Gerla
IoT Device Programmable Language Customization for Home Automation
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Francisco R. P. da Ponte
,
Rafael L. Gomes
,
Joaquim Celestino
,
Edmundo R. M. Madeira
,
Ahmed Patel
I2oTegrator: a Service-Oriented IoT Middleware for Intelligent Object Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-179
by
Jauberth Abijaude
,
Hellan Viana
,
Levy Marlon Santiago
,
Pericles de Lima Sobreira
,
Fabiola Greve
Sparse Detection for Spatial Modulation in Multiple Access Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Yuliang Tu
,
Lin Gui
,
Qibo Qin
,
Hong Wen
An Application-aware QoS Routing Algorithm for SDN-based IoT Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-191
by
Guo-Cin Deng
,
Kuochen Wang
mTSL: Making mTCP Stack Transparent to Network Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-197
by
Dong Liu
,
Xiaohui Luo
,
Fengyuan Ren
Multi-agent Communication with Attentional and Recurrent Message Integration
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-131
by
Zhaoqing Peng
,
Libo Zhang
,
Tiejian Luo
Using Probabilistic Data Structures for Monitoring of Multi-tenant P4-based Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-135
by
Regis F. T. Martins
,
Fábio L. Verdi
,
Rodolfo Villaça
,
Luis Fernando U. Garcia
A Virtual Prototype Semihosting Approach for Early Simulation of Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-139
by
Bruno Prado
,
Daniel Dantas
,
Kalil Bispo
,
Thiago Fontes
,
Gabriel Santana
,
Rafael Silva
High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yongwei Meng
,
Tao Qin
,
Yukun Liu
,
Chao He
A Method to Verify Data Integrity in Graph Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-147
by
Fábio Reina
,
Hylson Vescovi Netto
,
Luciana Rech
,
Aldelir Fernando Luiz
A Crowdsensing Campaign and Data Analytics for Assisting Urban Mobility Pattern Determination
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-229
by
Marcelo de Almeida Buosi
,
Marco Cilloni
,
Antonio Corradi
,
Carlos Roberto De Rolt
,
Julio da Silva Dias
,
Luca Foschini
,
Rebecca Montanari
,
Piero Zito
Dynamic Bandwidth Allocation with Multi-ONU Customer Support for Ethernet Passive Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Oscar J. Ciceri
,
Carlos A. Astudillo
,
Nelson L.S. da Fonseca
RM-KVStore: New MXNet KVStore to Accelerate Transfer Performancewith RDMA
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-162
by
Baocai Lv
,
Bing Liu
,
Fang Liu
,
Nong Xiao
,
Zhiguang Chen
On the Use of a Measurement Correlation Service for Measurement Federations
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-248
by
Jeferson Campos Nobre
,
Leandro Lisboa Penz
,
Muriel Figueredo Franco
,
Lisandro Zambenedetti Granville
Tail Latency Optimized Resource Allocation in Fogbased 5G Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-172
by
Shaowen Zheng
,
Zhenxiang Gao
,
Xu Shan
,
Weihua Zhou
,
Yongming Wang
A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-177
by
Ali Marandi
,
Torsten Braun
,
Kavé Salamatian
,
Nikolaos Thomos
A Broker-guided Trust Calculation Model for Mobile Devices of D2D Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jie Yuan
,
Xiaoyong Li
FDDS-MAC: Enhancing Spectrum Usage on Full-Duplex Communications in 5G Mobile Wireless networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-187
by
Lucas Melo de Guimarães
,
Jacir Luiz Bordim
Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-191
by
Chalee Vorakulpipat
,
Takeshi Takahashi
,
Ekkachan Rattanalerdnusorn
,
Phithak Thaenkaew
,
Daisuke Inoue
Multi-Factor Dynamic Channel Assignment approach for Wi-Fi networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Laura Ribeiro
,
Eduardo Souto
,
Leandro Buss Becker
A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-291
by
Fabiao Miao
,
Liming Wang
,
Zailong Wu
A Social-Based Approach to Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Dimitri Belli
,
Stefano Chessa
,
Luca Foschini
,
Michele Girolami
On Efficient and Social-Aware Object Allocation in Named Data Networks Using Matching Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-195
by
Mahsa Ehsanpour
,
Siavash Bayat
,
Ali Mohammad Afshin Hemmatyar
An efficient approach for device identification and traffic classification in IoT ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-309
by
Matias R. P. Santos
,
Rossana M. C. Andrade
,
Danielo G. Gomes
,
Arthur C. Callado
MPP: A Join-dividing Method for Multi-table Privacy Preservation
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Weiqing Huang
,
Jianfeng Xia
,
Min Yu
,
Chao Liu
Dynamic Network Function Chain Composition for Mitigating Network Latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Wajdi Hajji
,
Thiago A. L. Genez
,
Fung Po Tso
,
Lin Cui
,
Iain Phillips
COPPER: Increasing Underwater Sensor Network Performance Through Nodes Cooperation
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Lucas S. Cerqueira
,
Alex B. Vieira
,
Luiz F. M. Vieira
,
Marcos A. M. Vieira
,
José A. M. Nacif
REPO: A Microservices Elastic Management System for Cost Reduction in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-219
by
Alex Magalhaes
,
Luciana Rech
,
Ricardo Moraes
,
Francisco Vasques
Scalable Fogbed for Fog Computing Emulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
Antonio Coutinho
,
Heitor Rodrigues
,
Cássio Prazeres
,
Fabíola Greve
Ballistic Skip Graph: A Skip Graph-Style Constant-Degree Structured Overlay
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-230
by
Yusuke Aoki
,
Masaaki Ohnishi
,
Kazuyuki Shudo
ECTCP: An Explicit Centralized Congestion Avoidance for TCP in SDN-based Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-235
by
Jiannan Bao
,
Jingyu Wang
,
Qi Qi
,
Jianxin Liao
PhantomSFC: A Fully Virtualized and Agnostic Service Function Chaining Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-359
by
Matheus S. Castanho
,
Cristina K. Dominicini
,
Rodolfo S. Villacça
,
Magnos Martinello
,
R. N. Moises Ribeiro
On the Effectiveness of the Block Two-Level Erdős-Rényi Generative Network Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Felipe Grando
,
Luís C. Lamb
Energy-efficient Offloading Policy for Resource Allocation in Distributed Mobile Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-250
by
Chang Wang
,
Chongwu Dong
,
Jinghui Qin
,
Xiaoxing Yang
,
Wushao Wen
Dynamic Bandwidth Allocation for Home and SOHO Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-254
by
Julio Cesar T. Guimarães
,
Henrique D. Moura
,
Jonas R. A. Borges
,
Marcos A. M. Vieira
,
Luiz F. M. Vieira
,
Daniel Fernandes Macedo
SPES Methodology and MARTE Constraints in Architectural Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-383
by
C. Fabíola Gonçalves Ribeiro
,
Achim Rettbergy
,
Carlos E. Pereira
,
Charles Steinmetz
,
Michel S. Soares
Tensor coding for three-hop MIMO relay systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-389
by
Danilo S. Rocha
,
Gérard Favier
,
C. Alexandre R. Fernandes
A Mobility Management Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 390-396
by
Jianjun Wen
,
Waltenegus Dargie
Cognitive Management of Bandwidth Allocation Models with Case-Based Reasoning - Evidences Towards Dynamic BAM Reconfiguration
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-259
by
Eliseu M. Oliveira
,
Rafael Freitas Reale
,
Joberto S. B. Martins
Handover Initiation Comparison in Virtualised SDN-based Flow Mobility Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-409
by
Flávio Meneses
,
Carlos Guimarães
,
Daniel Corujo
,
Rui L. Aguiar
Market Design for IoT Data and Services the Emergent 21Th Century Commodities
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-269
by
Luiz Guilherme Pitta
,
Markus Endler
Modeling the availability of an e-health system integrated with edge, fog and cloud infrastructures
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-273
by
Matheus Felipe Ferreira da Silva Lisboa Tigre
,
Guto Leoni Santos
,
Theo Lynn
,
Djamel Sadok
,
Judith Kelner
,
Patricia Takako Endo
IMMS: IoT Management and Monitoring System
Full-text access may be available. Sign in or learn about subscription options.
pp. 
00422
-
00425

by
João Victor Lucena do Monte
,
Vinícius Matos da Silveira Fraga
,
Andrea Maria Nogueira Cavalcanti Ribeiro
,
Djamel Sadok
,
Judith Kelner
Social Pre-caching for Location-dependent Requests in Vehicular Information-Centric Ad-hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-281
by
Felipe Modesto
,
Azzedine Boukerche
Using NFV and Reinforcement Learning for Anomalies Detection and Mitigation in SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-287
by
Lauren S. R. Sampaio
,
Pedro H. A. Faustini
,
Anderson S. Silva
,
Lisandro Z. Granville
,
Alberto Schaeffer-Filho
GMOA: Streaming Delivery in Infrastructure-Based Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-291
by
Cristiano M. Silva
,
Leonardo A. A. Pereira
,
Mateus C. Luciano
,
Larissa L. Mariz
,
Bruna V. Ramos
,
Cristiano G. Pitangui
,
Luiz Henrique Andrade Correia
Statistical Energy Neutrality in IoT Hybrid Energy-Harvesting Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-449
by
Soledad Escolar
,
Antonio Caruso
,
Stefano Chessa
,
Xavier del Toro
,
Félix J. Villanueva
,
Juan C. López
Performance of Data Mining, Media, and Financial Applications under Private Cloud Conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-302
by
Dalvan Griebler
,
Adriano Vogel
,
Carlos A. F. Maron
,
Anderson M. Maliszewski
,
Claudio Schepke
,
Luiz Gustavo Fernandes
Update Cost-Aware Cache Replacement for Wildcard Rules in Software-Defined Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Zixuan Ding
,
Xinxin Fan
,
Jinping Yu
,
Jingping Bi
Enriching Traffic Information with a Spatiotemporal Model based on Social Media
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-469
by
Bruno P. Santos
,
Paulo H. L. Rettore
,
Heitor S. Ramos
,
Luiz F. M. Vieira
,
Antonio A. F. Loureiro
Towards a Hybrid Storage Architecture for IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 312-315
by
L. D. C. Braulio
,
Edward David Moreno
,
Douglas D. J. de Macedo
,
Diego Kreutz
,
Mario A. R. Dantas
Affinity-Based User Clustering for Efficient Edge Caching in Content-Centric Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-479
by
Adriana Viriato Ribeiro
,
Leobino N. Sampaio
,
Artur Ziviani
Wireless Channel Assignment in Smart Home
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-485
by
Francisco R. P. da Ponte
,
Kílvia L. A. de Almeida
,
Rafael L. Gomes
,
Joaquim Celestino
,
Walisson F. Pereira
,
Nelson L. S. da Fonseca
Towards an Accurate Bandwidth Estimation Tool for 802.11n Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-491
by
Diego Azevedo
,
Michel Bonfim
,
Leonidas Lima
,
Stenio Fernandes
FROG: A Packet Hop Count based DDoS Countermeasure in NDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-497
by
Yoshimichi Nakatsuka
,
Janaka L. Wijekoon
,
Hiroaki Nishi
Redundant Packet Scheduling by Uncorrelated Paths in Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-323
by
Benevid Felix
,
Igor Steuck
,
Aldri Santos
,
Stefano Secci
,
Michele Nogueira
Reducing the Variability in Routing Decisions in Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-327
by
Bruno Silva
,
Diego Passos
,
Célio Albuquerque
Combining ABCD Rule, Texture Features and Transfer Learning in Automatic Diagnosis of Melanoma
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-331
by
Nayara Moura
,
Rodrigo Veras
,
Kelson Aires
,
Vinícius Machado
,
Romuere Silva
,
Flávio Araújo
,
Maíla Claro
Evaluating, Estimating, and Improving Network Performance in Container-based Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-336
by
Cassiano Rista
,
Marcelo Teixeira
,
Dalvan Griebler
,
Luiz Gustavo Fernandes
Energy-Efficient VPON Formation and Wavelength Dimensioning in Cloud-Fog RAN over TWDM-PON
Full-text access may be available. Sign in or learn about subscription options.
pp. 521-526
by
Rodrigo Izidoro Tinini
,
Daniel Macêdo Batista
,
Gustavo Bittencourt Figueiredo
Ultra Reliable Communication for Robot Mobility enabled by SDN Splitting of WiFi Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-344
by
Víctor M. García Martínez
,
Ricardo C. Mello
,
Pedro Hasse
,
Moises R. N. Ribeiro
,
Magnos Martinello
,
Rafael S. Guimarães
,
Valerio Frascolla
ETArch-SG - A SDN-based Architecture to Support the Communication Requirements of Future Smart Grids
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Alex Dias
,
Flávio de Oliveira Silva
,
Pedro Frosi Rosa
,
Rui Aguiar
Tuning the Winternitz hash-based digital signature scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-354
by
Lucas Pandolfo Perin
,
Gustavo Zambonin
,
Douglas Marcelino Beppler Martins
,
Ricardo Custódio
,
Jean Everson Martina
Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Dalton Cézane Gomes Valadares
,
Matteus Sthefano Leite da Silva
,
Andrey Elísio Monteiro Brito
,
Ewerton Monteiro Salvador
SM3-MAC: a Multichannel Collision-Free MAC Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Gilson M. Júnior
,
Luiz H. A. Correia
Showing 100 out of 231
Load More
Load All