The Community for Technology Leaders
2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (2017)
Cambridge, MA, USA
Oct. 30, 2017 to Nov. 1, 2017
ISBN: 978-1-5386-1466-2
TABLE OF CONTENTS

[Front cover] (PDF)

pp. 1-2

[Title page] (PDF)

pp. 1

Advanced interest flooding attacks in named-data networking (Abstract)

Salvatore Signorello , SnT, University of Luxembourg
Samuel Marchal , Aalto University, Finland
Jerome Francois , Inria Nancy Grand Est, France
Olivier Festor , Inria Nancy Grand Est, France
Radu State , SnT, University of Luxembourg
pp. 1-10

Identifying malicious hosts involved in periodic communications (Abstract)

Giovanni Apruzzese , Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Modena, Italy
Mirco Marchetti , Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Modena, Italy
Michele Colajanni , Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Modena, Italy
Gabriele Gambigliani Zoccoli , Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Modena, Italy
Alessandro Guido , Department of Engineering “Enzo Ferrari”, University of Modena and Reggio Emilia, Modena, Italy
pp. 1-8

Diversity with intrusion detection systems: An empirical study (Abstract)

Areej Algaith , Centre for Software Reliability, City, University of London, UK
Ivano Alessandro Elia , University of Coimbra, Portugal
Ilir Gashi , Centre for Software Reliability, City, University of London, UK
Marco Vieira , University of Coimbra, Portugal
pp. 1-5

Towards secure energy internet communication scheme: An identity-based key bootstrapping protocol supporting unicast and multicast (Abstract)

Abubakar Sadiq Sani , Faculty of Engineering and Information Technologies, The University of Sydney, Sydney, Australia
Dong Yuan , Faculty of Engineering and Information Technologies, The University of Sydney, Sydney, Australia
Wei Bao , Faculty of Engineering and Information Technologies, The University of Sydney, Sydney, Australia
Zhao Yang Dong , School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, Australia
pp. 1-5

Reducing communication cost of encrypted data search with compressed bloom filters (Abstract)

Muhammad Umer , NUST-SEECS Islamabad, Pakistan
Tahir Azim , École Polytechnique Fédérale de Lausanne Lausanne, Switzerland
Zeeshan Pervez , University of the West of Scotland Paisley, Scotland PA1 2BE
pp. 1-4

Constant stretch and load balanced routing protocol for bypassing multiple holes in wireless sensor networks (Abstract)

Phi-Le Nguyen , Department of Informatics, SOKENDAI (The Graduate University for Advanced Studies), Tokyo, Japan
Yusheng Ji , Department of Informatics, SOKENDAI (The Graduate University for Advanced Studies), Tokyo, Japan
Nguyen Thanh Trung , School of Information and Communication Technology, Hanoi University of Science and Technology, Hanoi, Vietnam
Nguyen Thanh Hung , School of Information and Communication Technology, Hanoi University of Science and Technology, Hanoi, Vietnam
pp. 1-9

Towards reliable broadcast in practical sensor networks (Abstract)

Lewis Tseng , Computer Science, Boston College Boston, USA
pp. 1-8

TQOR: Trust-based QoS-oriented routing in cognitive MANETs (Abstract)

Shima Asaadi , Faculty of Computer Science, Technische Universität Dresden, Dresden, Germany 01062
Kiana Alikhademi , Computer and Information Science and Engineering, University of Florida, Gainesville, Florida 32611-612
Farshad Eshghi , Electrical and Computer Engineering Dept., Faculty of Eng., Kharazmi University, Tehran, Iran 15719-14911
Juan E. Gilbert , Computer and Information Science and Engineering, University of Florida, Gainesville, Florida 32611-612
pp. 1-8

Centrality-based data dissemination protocol for vehicular ad hoc networks (Abstract)

Joahannes Costa , Federal University of Pará (UFPA), Belém, Brazil
Wellington Lobato , Federal University of Pará (UFPA), Belém, Brazil
Allan M. de Souza , Institute of Computing (IC), University of Campinas (UNICAMP), Campinas, Brazil
Denis Rosario , Federal University of Pará (UFPA), Belém, Brazil
Leandro A. Villas , Institute of Computing (IC), University of Campinas (UNICAMP), Campinas, Brazil
Eduardo Cerqueira , Federal University of Pará (UFPA), Belém, Brazil
pp. 1-4

Applying egocentric betweenness measure in vehicular ad hoc networks (Abstract)

Ademar T. Akabane , Institute of Computing, University of Campinas, Brazil
Richard W. Pazzi , University of Ontario, Institute of Technology, Canada
Edmundo R. M. Madeira , Institute of Computing, University of Campinas, Brazil
Leandro A. Villas , Institute of Computing, University of Campinas, Brazil
pp. 1-4

Combined sensing, performance and security trade-offs in cognitive radio networks (Abstract)

Chuku Ejike , School of Electrical Engineering and Computer Science, University of Bradford
Demetres Kouvatsos , School of Electrical Engineering and Computer Science, University of Bradford
pp. 1-4

Augure: Proactive reconfiguration of cloud applications using heterogeneous resources (Abstract)

Richard Gil Martinez , INESC-ID, IST, Universidade de Lisboa, Lisbon, Portugal
Zhongmiao Li , INESC-ID, IST, Universidade de Lisboa, Lisbon, Portugal
Antonia Lopes , LASIGE, FC, Universidade de Lisboa, Lisbon, Portugal
Luis Rodrigues , INESC-ID, IST, Universidade de Lisboa, Lisbon, Portugal
pp. 1-8

Connectivity graph reconstruction for networking cloud infrastructures (Abstract)

Pernelle Mensah , Cybersecurity Paris Saclay, Nokia Bell Labs, Nozay, France
Samuel Dubus , Cybersecurity Paris Saclay, Nokia Bell Labs, Nozay, France
Wael Kanoun , Cybersecurity Paris Saclay, Nokia Bell Labs, Nozay, France
Christine Morin , Myriads, Inria, Rennes, France
Guillaume Piolle , CIDRE, CentraleSupélec, Cesson-Sévigné, France
Eric Totel , CIDRE, CentraleSupélec, Cesson-Sévigné, France
pp. 1-9

LIFE: A predictive approach for VM placement in cloud environments (Abstract)

Deafallah Alsadie , RMIT University, School of Science, Australia
Zahir Tari , RMIT University, School of Science, Australia
Eidah J. Alzahrani , RMIT University, School of Science, Australia
Albert Y. Zomaya , The University of Sydney, School of Information Technologies, Australia
pp. 1-8

Energy-efficient tailoring of VM size and tasks in cloud data centers (Abstract)

Deafallah Alsadie , RMIT University, School of Science, Australia
Zahir Tari , RMIT University, School of Science, Australia
Eidah J. Alzahrani , RMIT University, School of Science, Australia
Albert Y. Zomaya , The University of Sydney, School of Information Technologies, Australia
pp. 1-5

Data migration algorithms in heterogeneous storage systems: A comparative performance evaluation (Abstract)

Gary Roberts , School of Engineering and Computer Science, University of the Pacific
Sixia Chen , Department of Computer Science, Central Connecticut State University
Chadi Kari , School of Engineering and Computer Science, University of the Pacific
Vivek Pallipuram , School of Engineering and Computer Science, University of the Pacific
pp. 1-4

Stochastic delay forecasts for edge traffic engineering via Bayesian Networks (Abstract)

Mary Hogan , Computer Science Department, Saint Louis University, USA
Flavio Esposito , Computer Science Department, Saint Louis University, USA
pp. 1-4

The concept of workload delay as a quality-of-service metric for consolidated cloud environments with deadline requirements (Abstract)

Evangelos Tasoulas , Oslo and Akershus University College of Applied Sciences, Norway
Hugo Lewi Hammer , Oslo and Akershus University College of Applied Sciences, Norway
Harek Haugerud , Oslo and Akershus University College of Applied Sciences, Norway
Anis Yazidi , Oslo and Akershus University College of Applied Sciences, Norway
Alfred Bratterud , Oslo and Akershus University College of Applied Sciences, Norway
Boning Feng , Oslo and Akershus University College of Applied Sciences, Norway
pp. 1-5

Client-side black-box monitoring for web sites (Abstract)

Ricardo Filipe , CISUC, Dept. of Informatics Engineering, University of Coimbra, Coimbra, Portugal
Rui Pedro Paiva , CISUC, Dept. of Informatics Engineering, University of Coimbra, Coimbra, Portugal
Filipe Araujo , CISUC, Dept. of Informatics Engineering, University of Coimbra, Coimbra, Portugal
pp. 1-5

Increasing reliability of a TSCH network for the industry 4.0 (Abstract)

Pascale Minet , Inria, 2 rue Simone Iff, CS 42112, 75589 Paris Cedex 12, France
Ines Khoufi , Inria, 2 rue Simone Iff, CS 42112, 75589 Paris Cedex 12, France
Anis Laouiti , SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, 9 rue Charles Fourier 91011 Evry, France
pp. 1-10

Aggregation protocols in light of reliable communication (Abstract)

Ziad Kassam , HASLab, INESC TEC & Minho University, Portugal
Ali Shoker , HASLab, INESC TEC & Minho University, Portugal
Paulo Sergio Almeida , HASLab, INESC TEC & Minho University, Portugal
Carlos Baquero , HASLab, INESC TEC & Minho University, Portugal
pp. 1-4

Programming reflexes (Extended abstract) (Abstract)

Shlomi Dolev , Ben-Gurion University of the Negev, Israel
Roman Manevich , Ben-Gurion University of the Negev, Israel
Amit Rokach , Ben-Gurion University of the Negev, Israel
pp. 1-4

Prompt application-transparent transaction revalidation in software transactional memory (Abstract)

Simone Economo , DIAG - Sapienza University of Rome, Rome, Italy
Emiliano Silvestri , DIAG - Sapienza University of Rome, Rome, Italy
Pierangelo Di Sanzo , DIAG - Sapienza University of Rome, Rome, Italy
Alessandro Pellegrini , DIAG - Sapienza University of Rome, Rome, Italy
Francesco Quaglia , DICII - University of Rome Tor Vergata, Rome, Italy
pp. 1-6

Distributed deep learning on edge-devices: Feasibility via adaptive compression (Abstract)

Corentin Hardy , Technicolor, Inria Rennes, France
Erwan Le Merrer , Technicolor Rennes, France
Bruno Sericola , Inria Rennes, France
pp. 1-8

Is Intel high performance analytics toolkit a good alternative to Apache Spark? (Abstract)

Rafael Aquino de Carvalho , Institute of Mathematic and Statistic (IME), University of São Paulo (USP), São Paulo, Brazil
Alfredo Goldman , Institute of Mathematic and Statistic (IME), University of São Paulo (USP), São Paulo, Brazil
Gerson Geraldo H. Cavalheiro , Graduate Program in Computer Science (PPGC), Universidade Federal de Pelotas (UFPel), Pelotas, Brazil
pp. 1-8

Machine learning-based management of cloud applications in hybrid clouds: A Hadoop case study (Abstract)

D. R. Avresky , IRIANC Munich, Germany / Boston, MA, USA
Alessandro Pellegrini , Sapienza, University of Rome, Rome, Italy
Pierangelo Di Sanzo , Sapienza, University of Rome, Rome, Italy
pp. 1-5

On-demand self-adaptive data analytics in large-scale decentralized networks (Abstract)

Evangelos Pournaras , Professorship of Computational Social Science, ETH Zurich, Zurich, Switzerland
Jovan Nikolic , Professorship of Computational Social Science, ETH Zurich, Zurich, Switzerland
pp. 1-10

Sentiment analysis of the correlation between regular tweets and retweets (Abstract)

Jundong Chen , Department of Math and Computer Science, Dickinson State University, ND 58601, USA
He Li , School of Communication and Electronic Engineering, Qingdao University of Technology, China
Zeju Wu , School of Communication and Electronic Engineering, Qingdao University of Technology, China
Md Shafaeat Hossain , Computer Science Department, Southern Connecticut State University, New Haven, CT 06515, USA
pp. 1-5

Enhancing and evaluating an architecture for privacy in the integration of Internet of Things and cloud computing (Abstract)

Luis Alberto B. Pacheco , Computer Science Department - University of Brasília - Brasília, Brazil
Eduardo Alchieri , Computer Science Department - University of Brasília - Brasília, Brazil
Priscila A. Solis Barreto , Computer Science Department - University of Brasília - Brasília, Brazil
pp. 1-8

Niflheim: An end-to-end middleware for applications on a multi-tier IoT infrastructure (Abstract)

Nicolas Small , imec-DistriNet, KU Leuven Celestijnenlaan 200A, 3001, Leuven, Belgium
Sven Akkermans , imec-DistriNet, KU Leuven Celestijnenlaan 200A, 3001, Leuven, Belgium
Wouter Joosen , imec-DistriNet, KU Leuven Celestijnenlaan 200A, 3001, Leuven, Belgium
Danny Hughes , imec-DistriNet, KU Leuven Celestijnenlaan 200A, 3001, Leuven, Belgium
pp. 1-8

Privacy preserving data access scheme for IoT devices (Abstract)

Mosarrat Jahan , UNSW Sydney, Australia, NSW 2052
Suranga Seneviratne , University of Sydney, Australia, NSW 2006
Ben Chu , UNSW Sydney, Australia, NSW 2052
Aruna Seneviratne , UNSW Sydney, Australia, NSW 2052
Sanjay Jha , UNSW Sydney, Australia, NSW 2052
pp. 1-10

Child-observation system with wide area networks of IoT child observation using information terminal bus stops in Nonoichi city (Abstract)

Mikiko Sode Tanaka , Global Information and Management, Kanazawa Technical College, Kanazawa, Japan
Takahiro Katoh , NEC Solution Innovator, Osaka, Japan
Kazuo Ishida , NEC Solution Innovator, Osaka, Japan
pp. 1-4

Efficient green solution for a balanced energy consumption and delay in the IoT-Fog-Cloud computing (Abstract)

Adila Mebrek , ERA/ICD - UMR CNRS 6281, University of Technology of Troyes, 12 rue Marie Curie CS 42060, 10004 TROYES CEDEX, France
Leila Merghem-Boulahia , ERA/ICD - UMR CNRS 6281, University of Technology of Troyes, 12 rue Marie Curie CS 42060, 10004 TROYES CEDEX, France
Moez Esseghir , ERA/ICD - UMR CNRS 6281, University of Technology of Troyes, 12 rue Marie Curie CS 42060, 10004 TROYES CEDEX, France
pp. 1-4

Link reliable and trust aware RPL routing protocol for Internet of Things (Abstract)

Asma Lahbib , SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, 9 rue Charles Fourier 91011 Evry, France
Khalifa Toumi , SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, 9 rue Charles Fourier 91011 Evry, France
Sameh Elleuch , École nationale des sciences de l'informatique, Campus Universitaire de la Manouba, 2010 Manouba, Tunisie
Anis Laouiti , SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, 9 rue Charles Fourier 91011 Evry, France
Steven Martin , LRI, Université Paris-Sud, 15 Rue Georges Clemenceau, 91400 Orsay, France
pp. 1-5

Real-time communication for manufacturing cyber-physical systems (Abstract)

Ngoc-Tu Nguyen , Department of Mechanical and Aerospace Engineering, Missouri University of Science and Technology
Ming C. Leu , Department of Mechanical and Aerospace Engineering, Missouri University of Science and Technology
Xiaoqing Frank Liu , Department of Computer Science and Computer Engineering, University of Arkansas
pp. 1-4

adCFS: Adaptive completely fair scheduling policy for containerised workflows systems (Abstract)

Eidah J. Alzahrani , RMIT University, School of Science, Australia
Zahir Tari , RMIT University, School of Science, Australia
Young Choon Lee , Macquarie University, Department of Computing, Australia
Deafallah Alsadie , RMIT University, School of Science, Australia
Albert Y. Zomaya , The University of Sydney, School of Information Technologies, Australia
pp. 1-8

ACDC: Advanced consolidation for dynamic containers (Abstract)

Damien Carver , Magency, 60, Rue de Wattignies, 75012 Paris, France
Julien Sopena , LIP6 - Laboratoire d'Informatique de Paris 6, 4, Place Jussieu, 75252 Paris Cedex 5, France
Sebastien Monnet , Polytech' Annecy-Chambéry/LISTIC, 5, chemin de bellevue, 74944 Annecy-Le-Vieux
pp. 1-8

Enhancing throughput of partially replicated state machines via multi-partition operation scheduling (Abstract)

Zhongmiao Li , Université catholique de Louvain
Peter Van Roy , Université catholique de Louvain
Paolo Romano , Instituto Superior Técnico, Lisboa & INESC-ID
pp. 1-10

QoS-aware resource allocation for stream processing engines using priority channels (Abstract)

Yidan Wang , RMIT University, School of Science, Melbourne, Australia
Zahir Tari , RMIT University, School of Science, Melbourne, Australia
M. Reza HoseinyFarahabady , The University of Sydney, Centre for Distributed & High Performance Computing, School of IT, Australia
Albert Y. Zomaya , The University of Sydney, Centre for Distributed & High Performance Computing, School of IT, Australia
pp. 1-9

A resource allocation controller for key-value data stores (Abstract)

Young Ki Kim , The University of Sydney, Center for Distributed and High Performance Computing, School of IT, Australia
F. M. Reza Hoseiny , The University of Sydney, Center for Distributed and High Performance Computing, School of IT, Australia
Young Choon Lee , Department of Computing, Macquarie University, Sydney, Australia
Albert Y. Zomaya , The University of Sydney, Center for Distributed and High Performance Computing, School of IT, Australia
pp. 1-4

PAS-CA: A cloud computing auto-scalability method for high-demand web systems (Abstract)

Marcelo Cerqueira de Abranches , Departamento de Ciência da Computação - Universidade de Brasília
Priscila Solis , Departamento de Ciência da Computação - Universidade de Brasília
Eduardo Alchieri , Departamento de Ciência da Computação - Universidade de Brasília
pp. 1-4

Resource demand aware scheduling for workflows in clouds (Abstract)

Khaled Almi'ani , Princess Sumaya University for Technology, Sabbatical Leave: Al-Hussein Bin Talal University, Jordan
Young Choon Lee , Department of Computing, Macquarie University, Australia
Bernard Mans , Department of Computing, Macquarie University, Australia
pp. 1-5

Deduplication overlay network (Abstract)

Kutalmis Akpinar , Department of Computer Science, University of Central Florida, Orlando, Florida 32826, USA
Kien A. Hua , Department of Computer Science, University of Central Florida, Orlando, Florida 32826, USA
pp. 1-9

Optimising packet forwarding in multi-tenant networks using rule compilation (Abstract)

Stefan Hommes , SnT / University of Luxembourg, Luxembourg
Petko Valtchev , Université du Québec à Montréal (UQAM), Canada
Khalil Blaiech , Université du Québec à Montréal (UQAM), Canada
Salaheddine Hamadi , Université du Québec à Montréal (UQAM), Canada
Omar Cherkaoui , Université du Québec à Montréal (UQAM), Canada
Radu State , SnT / University of Luxembourg, Luxembourg
pp. 1-9

Probabilistic analysis of counting protocols in large-scale asynchronous and anonymous systems (Abstract)

Yves Mocquard , Université de Rennes 1/IRISA
Bruno Sericola , INRIA Rennes - Bretagne Atlantique
Emmanuelle Anceaume , CNRS/IRISA
pp. 1-8

Summary prefix tree: An over DHT indexing data structure for efficient superset search (Abstract)

Bassirou Ngom , Sorbonne Universités, UPMC Univ Paris 06, CNRS, INRIA - LIP6, Paris, France
Mesaac Makpangou , Sorbonne Universités, UPMC Univ Paris 06, CNRS, INRIA - LIP6, Paris, France
pp. 1-5

Tools for managing network traffic flows: A comparative analysis (Abstract)

Diego Fernandez , University of A Coruna, Campus de Elvina, s/n 15071, A Coruna, Spain
Hugo Lorenzo , University of A Coruna, Campus de Elvina, s/n 15071, A Coruna, Spain
Francisco J. Novoa , University of A Coruna, Campus de Elvina, s/n 15071, A Coruna, Spain
Fidel Cacheda , University of A Coruna, Campus de Elvina, s/n 15071, A Coruna, Spain
Victor Carneiro , University of A Coruna, Campus de Elvina, s/n 15071, A Coruna, Spain
pp. 1-5

Trade-off analysis of a service-oriented and hierarchical queuing mechanism (Abstract)

Roberto Rigolin F. Lopes , Fraunhofer FKIE, Bonn, Germany
Antti Viidanoja , Patria, Tampere, Finland
Maximilien Lhotellier , Thales, Gennevilliers, France
Michal Mazurkiewicz , ITTI, Poznan, Poland
Giampaolo Melis , Leonardo Company, Genova, Italy
Anne Diefenbach , Fraunhofer FKIE, Bonn, Germany
Tobias Ginzler , Fraunhofer FKIE, Bonn, Germany
Norman Jansen , Fraunhofer FKIE, Bonn, Germany
pp. 1-4

Virtual cut-through routing in toroidal interconnection networks (Abstract)

Yelena Rykalova , Department of Computer Science, UMass Lowell, USA
Lev B. Levitin , ECE Department, Boston University, USA
pp. 1-4

A first look at mobile Ad-Blocking apps (Abstract)

Muhammad Ikram , Data61, CSIRO
Mohamed Ali Kaafar , Data61, CSIRO
pp. 1-8

Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid (Abstract)

Sileshi Demesie Yalew , INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, Portugal
Gerald Q. Maguire , School of Information and Communication Technology, KTH Royal Institute of Technology, Sweden
Seif Haridi , School of Information and Communication Technology, KTH Royal Institute of Technology, Sweden
Miguel Correia , INESC-ID, Instituto Superior Técnico, Universidade de Lisboa, Portugal
pp. 1-8

Securing communication between service providers and road side units in a connected vehicle infrastructure (Abstract)

Sami S. Albouq , Oakland University, Rochester Hills, MI, USA
Erik M. Fredericks , Oakland University, Rochester Hills, MI, USA
pp. 1-5

AVAMAT: AntiVirus and malware analysis tool (Abstract)

Pasha Shahegh , University of Maryland, College Park, MD, USA
Tommy Dietz , University of Maryland, College Park, MD, USA
Michel Cukier , University of Maryland, College Park, MD, USA
Areej Algaith , Centre for Software Reliability, City, University of London, UK
Attila Brozik , Centre for Software Reliability, City, University of London, UK
Ilir Gashi , Centre for Software Reliability, City, University of London, UK
pp. 1-4

Relationship of Jaccard and edit distance in malware clustering and online identification (Extended abstract) (Abstract)

Shlomi Dolev , Department of Computer Science, Ben-Gurion University of the Negev, Israel
Mohammad Ghanayim , Department of Computer Science, Ben-Gurion University of the Negev, Israel
Alexander Binun , Department of Computer Science, Ben-Gurion University of the Negev, Israel
Sergey Frenkel , The Institute of Informatics Problems of FRC IC, Russian Academy of Sciences, Russia
Yeali S. Sun , Department of Information Management, National Taiwan University, Taiwan
pp. 1-5

Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers (Abstract)

Zainab Abaid , School of Computer Science and Engineering, University of New South Wales, Australia
Mohamed Ali Kaafar , Computing Department, Macquarie University, Australia
Sanjay Jha , School of Computer Science and Engineering, University of New South Wales, Australia
pp. 1-10

Blockchain abbreviation: Implemented by message passing and shared memory (Extended abstract) (Abstract)

Maxim Amelchenko , Ben Gurion University of the Negev
Shlomi Dolev , Ben Gurion University of the Negev
pp. 1-7

Sustainable blockchain through proof of exercise (Abstract)

Ali Shoker , HASLab, INESC TEC & Minho University, Braga, Portugal
pp. 1-9

A blockchain-based data usage auditing architecture with enhanced privacy and availability (Abstract)

Nesrine Kaaniche , SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, France, Member of the Chair Values and Policies of Personal Information
Maryline Laurent , SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay, France, Member of the Chair Values and Policies of Personal Information
pp. 1-5

The effect of a blockchain-supported, privacy-preserving system on disclosure of personal data (Abstract)

Remo Manuel Frey , ETH Zurich, Zurich, Switzerland
Pascal Buhler , University of St. Gallen, St. Gallen, Switzerland
Alexander Gerdes , Karlsruhe Institue of Technology, Karlsruhe, Germany
Thomas Hardjono , Massachusetts Institute of Technology (MIT), Cambridge, MA, USA
Klaus Ludwig Fuchs , ETH Zurich, Zurich, Switzerland
Alexander Ilic , ETH Zurich, Zurich, Switzerland
pp. 1-5

Dependence graph and master switch for seamless dependent routes replacement in SDN (extended abstract) (Abstract)

Yefim Dinitz , Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel
Shlomi Dolev , Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel
Daniel Khankin , Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel
pp. 1-7

Predicting and choosing alternatives of route updates per QoS VNF in SDN (Abstract)

Sergei Frenkel , Institute of Informatics Problems of FRC “Computer Science and Control”, Russian Academy of Sciences, Moscow, Russia
Daniel Khankin , Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel
Alona Kutsyy , Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel
pp. 1-6

SDS2: A novel software-defined security service for protecting cloud computing infrastructure (Abstract)

Sara Farahmandian , Faculty of Engineering and Information Technology, University of Technology Sydney Sydney, Australia
Doan B. Hoang , Faculty of Engineering and Information Technology, University of Technology Sydney Sydney, Australia
pp. 1-8

A novel software-defined network based approach for charging station allocation to plugged-in electric vehicles (Abstract)

Raj Mani Shukla , Department of Computer Science and Engineering, University of Nevada, Reno, USA
Shamik Sengupta , Department of Computer Science and Engineering, University of Nevada, Reno, USA
pp. 1-5

Employing SDN to control video streaming applications in military mobile networks (Abstract)

Iulisloi Zacarias , Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil
Janaina Schwarzrock , Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil
Luciano P. Gaspary , Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil
Anderson Kohl , Brazilian Army
Ricardo Q. A. Fernandes , Brazilian Army
Jorgito M. Stocchero , Brazilian Army
Edison P. de Freitas , Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil
pp. 1-4

NFV orchestrator placement for geo-distributed systems (Abstract)

Mohammad Abu-Lebdeh , Concordia University, Montreal, Canada
Diala Naboulsi , Concordia University, Montreal, Canada
Roch Glitho , Concordia University, Montreal, Canada
Constant Wette Tchouati , Ericsson Montreal, Canada
pp. 1-5

Preserving confidentiality during the migration of virtual SDN topologies: A formal approach (Abstract)

Fabien Charmet , CNRS SAMOVAR UMR 5157, Télécom SudParis, Institut Mines-Télécom, Evry, France
Richard Waldinger , Articifical Intelligence Center, SRI International, Menlo Park, CA, US
Gregory Blanc , CNRS SAMOVAR UMR 5157, Télécom SudParis, Institut Mines-Télécom, Evry, France
Christophe Kiennert , CNRS SAMOVAR UMR 5157, Télécom SudParis, Institut Mines-Télécom, Evry, France
Khalifa Toumi , CNRS SAMOVAR UMR 5157, Télécom SudParis, Institut Mines-Télécom, Evry, France
pp. 1-5

A distributed algorithm for D2D communication in 5G using stochastic model (Abstract)

Durgesh Singh , Advanced Computing & Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India
Sasthi C. Ghosh , Advanced Computing & Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India
pp. 1-8

5G accessibility optimization in high interference environments (Abstract)

Hussein Al Dorai , RF Engineer, Boston, USA
Luay Alirkhis , EE Eng. Dep., Wright State University, USA
Riyadh Ali Al-Essawi , Comp. Comm. Eng., AlRafiedain University, Iraq
pp. 1-5

A predictive handoff mechanism for 5G ultra dense networks (Abstract)

Shankar K. Ghosh , Advanced Computing & Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India
Sasthi C. Ghosh , Advanced Computing & Microelectronics Unit, Indian Statistical Institute, Kolkata 700108, India
pp. 1-5

Radio resource management in LTE femtocell networks (Abstract)

Sultan Alotaibi , College of Engineering, University of North Texas, Denton, TX 76203
Robert Akl , College of Engineering, University of North Texas, Denton, TX 76203
pp. 1-5

Towards fog-based slice-defined WLAN infrastructures to cope with future 5G use cases (Abstract)

Maxweel S. Carmo , Universidade Federal do Rio Grande do Norte (UFRN), Natal-RN, Brazil
Sandino Jardim , Universidade Federal do Rio Grande do Norte (UFRN), Natal-RN, Brazil
Augusto V. Neto , Universidade Federal do Rio Grande do Norte (UFRN), Natal-RN, Brazil
Rui Aguiar , Instituto de Telecomunicações, Aveiro, Portugal
Daniel Corujo , Instituto de Telecomunicações, Aveiro, Portugal
pp. 1-5

Index of authors (PDF)

pp. 1-3
95 ms
(Ver 3.3 (11022016))