default search action
28th CAMAD 2023: Edinburgh, UK
- 28th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks , CAMAD 2023, Edinburgh, United Kingdom, November 6-8, 2023. IEEE 2023, ISBN 979-8-3503-0349-0
- Eren Deniz, Gokcan Cantali, Ozcan Ozay, Onur Yildirim, Gürkan Gür, Fatih Alagöz:
Towards Data Analytics Based PIM Detection in Wireless Networks. 1-6 - Sana Hafeez, Habib Ullah Manzoor, Lina S. Mohjazi, Ahmed Zoha, Muhammad Ali Imran, Yao Sun:
Blockchain-Empowered Immutable and Reliable Delivery Service (BIRDS) Using UAV Networks. 7-12 - Apostolos Siokis, Kostas Ramantas, George Margetis, Stefania Stamou, Ryan McCloskey, Martin Tolan, Christos V. Verikoukis:
5GMediaHUB QoS/QoE Monitoring Engine. 13-18 - Juan Carlos De Luna Ducoing, Konstantinos Nikitopoulos:
Scalable MU-MIMO User Scheduling for Next-Generation Wireless Networks. 19-24 - Stuart Clayman, Emre Karakis, Mustafa Tüker, Elif Ak, Berk Canberk, Müge Sayit:
Dynamic Packet Content Construction and Processing for End-to-End Streaming in 6G. 25-30 - Fangqing Xiao, Zilu Zhao, Dirk Slock:
Power Delay Profile Based Ranging via Approximate EM-ReVAMP. 31-36 - Andreas Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos K. Markakis:
Intelligent Node Deployment in Smart Spaces to Optimize Sensor Signal and Data Acquisition. 37-42 - Athanasios Vasileios Grammatopoulos, Ioannis Stylianou, Katarzyna Barud, Clara Saillant, Ilias Politis:
TRUSTEE's Framework for DPIAs: Safeguarding personal information in the Digital Era. 43-48 - Athanasios Vasileios Grammatopoulos, Ioannis Stylianou, Eneko Gómez Ramos, Iván Gutiérrez-Agüero, Cristina Regueiro, Ilias Politis:
Architectural Insights into TRUSTEE's Authentication Manager: Leveraging SSI and eIDAS. 49-54 - Muhammad Asad, Adriana Fernández-Fernández, Hatim Chergui, Maxime Compastié, Mario Montagud, Sergi Fernández, Shuaib Siddiqui:
6GENABLERS: A Holistic Approach to Establish Pervasive Trust in 6G Networks. 55-60 - Elli Kartsakli, Jordi Pérez-Romero, Nikolaos G. Bartzoudis, Oriol Sallent, Oluwatayo Y. Kolawole, Xin Tao, Swarup Kumar Mohalik, Tomasz Mach, Sige Liu, Yansha Deng, Gianluca Mandò, Angelos Antonopoulos, Valerio Frascolla, Semiha Kosu, Gökhan Kalem, Fred Buining, Eduardo Quiñones:
An Evolutionary Edge Computing Architecture for the Beyond 5G Era. 61-67 - Sana Hafeez, Lina S. Mohjazi, Muhammad Ali Imran, Yao Sun:
Blockchain-enabled Clustered and Scalable Federated Learning (BCS-FL) Framework in UAV Networks. 68-73 - Dávid Gábor Uzonyi, Nikolaos Pitropakis, Sean McKeown, Ilias Politis:
OPSEC VS Leaked Credentials: Password reuse in Large-Scale Data Leaks. 74-79 - Apostolos P. Fournaris, Christos Tselios, Evangelos Haleplidis, Elias Athanasopoulos, Antreas Dionysiou, Dimitrios Mitropoulos, Panos Louridas, Georgios Christou, Manos Athanatos, George Hatzivasilis, Konstantinos Georgopoulos, Costas Kalogeros, Christos Kotselidis, Simon Vogl, François Hamon, Sotiris Ioannidis:
Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach. 80-86 - Alessandro Buratto, Leonardo Badia:
Analysis of Age of Information in Slotted ALOHA Networks With Different Strategic Backoff Schemes. 87-92 - Isam Mashhour Al Jawarneh, Luca Foschini, Antonio Corradi:
Efficient Generation of Approximate Region-based Geo-maps from Big Geotagged Data. 93-98 - Alberto Zancanaro, Giulia Cisotto, Andrea Munari, Leonardo Badia:
Impact of Transmission Delays Over Age of Information Under Finite Horizon Scheduling. 99-104 - Juan Luis Herrera, Jaime Galán-Jiménez, Javier Berrocal, Paolo Bellavista, Luca Foschini:
Energy-Efficient QoS-Aware Application and Network Configuration for Next-Gen IoT. 105-110 - Dario Guiao, Petros Spachos:
Genetic Algorithm for Energy Efficiency in Wireless Sensor Networks. 111-116 - Müge Erel-Özçevik, Yusuf Özçevik, Elif Bozkaya, Tugçe Bilen:
Optimal Location Assignment for Data-Driven Warehouse Towards Digital Supply Chain Twin. 117-122 - Lal Verda Çakir, Sarah Al-Shareeda, Sema F. Oktug, Mehmet Özdem, Matthew Broadbent, Berk Canberk:
How to synchronize Digital Twins? A Communication Performance Analysis. 123-127 - Alessandro Calvio, Anish Jindal, Armir Bujari, Gagangeet Singh Aujla, Luca Foschini:
A Simulation-based Decision Support System for Urban Traffic Management. 128-133 - Axel Grönland, Bleron Klaiqi, Xavier Gelabert:
Learning-Based Latency-Constrained Fronthaul Compression Optimization in C-RAN. 134-139 - Tomás Lestayo-Martínez, Manuel Fernández-Veiga:
Source-Coded Multicast for Efficient Content Delivery. 140-145 - Emre Gures, Ibraheem Shayea, Ibrahim Yazici, Ayman A. El-Saleh, Sawsan Ali Saad:
A Novel Self-Optimization Algorithm for 5G HetNets Using Automatic Weight Function and TOPSIS. 146-151 - Chathuranga M. Wijerathna Basnayaka, Dushantha Nalin K. Jayakody, Marko Beko:
Semantics-Empowered UAV-assisted Wireless Communication System for Wildfire Detection. 152-157 - Khaled Walid Elgammal, Berke Can Turan, Oguz Bedir, Hasari Celebi, Marwa K. Qaraqe, Mehmet Kemal Özdemir:
Theoretical Limits of SoOP TDOA Localization of Unmanned Systems with Imperfect Synchronization. 158-163 - Zeynep Betül Arslanbenzer, Büsra Bayram, Talip Tolga Sari, Gökhan Seçinti:
Utilizing LoRa for Control Link in Software-defined Aerial Networks: Analysis and Implementation. 164-169 - Andrew Thaeler, Yagmur Yigit, Leandros Maglaras, William J. Buchanan, Naghmeh Moradpoor, Gordon Russell:
Enhancing Mac OS Malware Detection through Machine Learning and Mach-O File Analysis. 170-175 - Konstantinos Lampropoulos, Nikos Kyriakoulis, Giorgos Georgakakos, Spyros G. Denazis:
Identity Management through a global Discovery System based on Decentralized Identities. 176-181 - Sam Grierson, William J. Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl:
Scalable Multi-domain Trust Infrastructures for Segmented Networks. 182-187 - Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan:
PermutEx: Feature-Extraction-Based Permutation - A New Diffusion Scheme for Image Encryption Algorithms. 188-193 - Sam Grierson, Konstantinos Chalkias, William J. Buchanan, Leandros Maglaras:
Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations. 194-199 - Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh:
PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. 200-205 - Luca Barbieri, Stefano Savazzi, Sanaz Kianoush, Monica Nicoli, Luigi Serio:
A Carbon Tracking Model for Federated Learning: Impact of Quantization and Sparsification. 213-218 - Christian Bauer, Narges Mehran, Radu Prodan, Dragi Kimovski:
Machine Learning Based Resource Utilization Prediction in the Computing Continuum. 219-224 - Roberto Morabito, Mallik Tatipamula, Sasu Tarkoma, Mung Chiang:
Edge AI Inference in Heterogeneous Constrained Computing: Feasibility and Opportunities. 225-232 - Hakan Gökcesu, Özgür Erçetin, Gökhan Kalem:
Enhancing QoE Assessment in FWA: Leveraging Network KPIs and User Feedback Analysis. 233-239 - Aaditya Suri, Binod Vaidya, Hussein T. Mouftah:
Assessment of Adversarial Attacks on Traffic Sign Detection for Connected and Autonomous Vehicles. 240-245 - Carlos Rubio Garcia, Abraham Cano Aguilera, Juan Jose Vegas Olmos, Idelfonso Tafur Monroy, Simon Rommel:
Quantum-Resistant TLS 1.3: A Hybrid Solution Combining Classical, Quantum and Post-Quantum Cryptography. 246-251 - Utku Ozmat, Mehmet Akif Yazici, Mehmet Fatih Demirkol:
Secure Multi-Point Coordinated Beamforming using Deep Learning in 5G and Beyond Networks. 252-257 - Ali Gökhan Avran, Elif Ak, Kübra Duran, Gökhan Yurdakul, Gökhan Seçinti:
Securing Southbound Interface in SDNs: Utilizing Support Vector Machines for OpenFlow Packet Classification. 258-263 - Fahad Ayaz, Basim Alhumaily, Sajjad Hussain, Muhammad Ali Imran, Ahmed Zoha:
VMD Integrated FMCW Radar System for Non-Invasive Pediatric Vital Sign Estimation. 264-269 - José Jorge Figueroa Figueroa, Hao Shen, Hamed Ahmadi, Berk Canberk:
A distributed user-oriented IoT-based Air Pollution Monitoring. 270-275 - Kevin Coyle, Craig Thomson, Isam Wadhaj, Baraq Ghaleb:
A Comparative Study of VANET Routing Protocols for Safety Applications. 276-282 - Joshua Teddy Ibibo:
Emerging Challenges and Solutions in RPL Protocol: Research Review. 283-289 - Tan Do-Duy, Dang Van-Huynh, Emi Garcia-Palacios, Tuan-Vu Cao, Vishal Sharma, Trung Q. Duong:
Joint Computation and Communication Resource Allocation for Unmanned Aerial Vehicle NOMA Systems. 290-295 - Yan Zhang, Yuming Jiang, Songwei Fu:
Service Modeling and Delay Analysis of Packet Delivery over a Wireless Link. 296-301 - Simon Sundberg, Johan Garcia, Anna Brunström:
Characterizing Wireless Link Throughput with eBPF and Hardware Timestamps. 302-308 - Mahmoud Mojarrad Kiasaraei, Rahim Tafazolli, Konstantinos Nikitopoulos:
A DigiLogue Receiver Design for Tbps Wireless Transmissions over Flat-Fading Channels. 309-314
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.