Login / Signup
NCA
2001
2006
2016
2022
2001
2022
Keyphrases
Publications
2022
Shlomi Dolev
,
Alexander Fok
,
Michael Segal
Swarming with (Visual) Secret (Shared) Mission.
NCA
(2022)
Hajer Nabli
,
Ines Regaig
,
Raoudha Ben Djemaa
,
Layth Sliman
Never Alone: a Quality of Context-aware Monitoring System for Aging in Place Smart Home.
NCA
(2022)
Yotam Ashkenazi
,
Shlomi Dolev
Distributed Coordination Based on Quantum Entanglement (Work in Progress).
NCA
(2022)
Erick Petersen
,
Jorge López
,
Natalia Kushik
,
Claude Poletti
,
Djamal Zeghlache
On using Cellular Automata for Modeling the Evolution of Dynamic-Link Network Parameters.
NCA
(2022)
Ricardo Grade
,
Samih Eisa
,
Miguel L. Pardal
Bluetooth Peer-to-Peer Location Certification with a Gamified Mobile Application.
NCA
(2022)
Sridevi S
,
Jacob Augustine
,
Shankar K. Ghosh
An analytic hierarchy process (AHP) based UAV selection mechanism for beyond 5G networks.
NCA
(2022)
Andrea Venturi
,
Dario Stabili
,
Francesco Pollicino
,
Emanuele Bianchi
,
Mirco Marchetti
Comparison of Machine Learning-based anomaly detectors for Controller Area Network.
NCA
(2022)
Kadir Korkmaz
,
Joachim Bruneau-Queyreix
,
Sonia Ben Mokhtar
,
Laurent Réveillère
ALDER: Unlocking blockchain performance by multiplexing consensus protocols.
NCA
(2022)
Lorenzo Rossi
,
Luca Ferretti
WebDHT: browser-compatible distributed hash table for decentralized Web applications.
NCA
(2022)
André Bento
,
João Soares
,
António Ferreira
,
João Durães
,
José Ferreira
,
Rita Carreira
,
Filipe Araújo
,
Raul Barbosa
Bi-objective optimization of availability and cost for cloud services.
NCA
(2022)
Rafael Figueiredo
,
Samih Eisa
,
Miguel L. Pardal
SureRepute: Reputation System for Crowdsourced Location Witnesses.
NCA
(2022)
Ibtissem Brahmi
,
Monia Hamdi
,
Ines Rahmany
,
Faouzi Zarai
Deep Reinforcement Learning for Downlink Resource Allocation in Vehicular Small Cell Networks.
NCA
(2022)
21st IEEE International Symposium on Network Computing and Applications, NCA 2022, Boston, MA, USA, December 14-16, 2022
NCA
(2022)
Richard von Seck
,
Filip Rezabek
,
Benedikt Jaeger
,
Sebastian Gallenmüller
,
Georg Carle
BFT-Blocks: The Case for Analyzing Networking in Byzantine Fault Tolerant Consensus.
NCA
(2022)
Ziran Min
,
Shashank Shekhar
,
Charif Mahmoudi
,
Valerio Formicola
,
Swapna S. Gokhale
,
Aniruddha Gokhale
Software-defined Dynamic 5G Network Slice Management for Industrial Internet of Things.
NCA
(2022)
Anshuman Misra
,
Ajay D. Kshemkalyani
Detecting Causality in the Presence of Byzantine Processes: There is No Holy Grail.
NCA
(2022)
Fadoua Debbabi
,
Raouia Taktak
,
Rihab Jmal
,
Lamia Chaari Fourati
,
Rui L. Aguiar
Inter-slice B5G Bandwidth Resource Allocation.
NCA
(2022)
Imene Ben Hafaiedh
Formal models for the verification, performance evaluation, and comparison of IoT communication protocols.
NCA
(2022)
Yuri Santo
,
Bruno Lopes Dalmazo
,
Roger Immich
,
André Riker
On the Performance of Machine Learning at the Network Edge to Detect Industrial IoT Faults.
NCA
(2022)
Souvik Deb
,
Shankar Kumar Ghosh
,
Sasthi C. Ghosh
MAB based Network Selection mechanism for URLLC users in RIS assisted network.
NCA
(2022)
Priyanka Kamboj
,
Sujata Pal
Energy-Aware Routing in SDN Enabled Data Center Network.
NCA
(2022)
Anshuman Misra
,
Ajay D. Kshemkalyani
Byzantine Fault-Tolerant Causal Broadcast on Incomplete Graphs.
NCA
(2022)
Giovanni Merlino
,
Rafael Asorey-Cacheda
,
Luca D'Agati
,
Francesco Longo
,
Antonio-Javier García-Sánchez
,
Joan García-Haro
,
Antonio Puliafito
Infrastructure-centric, NetworkServer-agnostic LoRaWAN Roaming.
NCA
(2022)
Ramesh Singh
,
Radhika Sukapuram
,
Suchetana Chakraborty
Mobility-aware Multi-Access Edge Computing for Multiplayer Augmented and Virtual Reality Gaming.
NCA
(2022)
Lucas H. Vicente
,
Samih Eisa
,
Miguel L. Pardal
LoCaaS: Location-Certification-as-a-Service.
NCA
(2022)
Samira Afzal
,
Zahra Najafabadi Samani
,
Narges Mehran
,
Christian Timmerer
,
Radu Prodan
MPEC2: Multilayer and Pipeline Video Encoding on the Computing Continuum.
NCA
(2022)
Gabriele Gambigliani Zoccoli
,
Francesco Pollicino
,
Dario Stabili
,
Mirco Marchetti
SixPack v2: enhancing SixPack to avoid last generation misbehavior detectors in VANETs.
NCA
(2022)
Michel Neves
,
André Riker
,
Jéferson Campos Nobre
,
Antônio J. G. Abelém
,
Bruno Lopes Dalmazo
Modularized and Contract-Based Prediction Models in Programmable Networks.
NCA
(2022)
Andrea Venturi
,
Claudio Zanasi
,
Mirco Marchetti
,
Michele Colajanni
Robustness Evaluation of Network Intrusion Detection Systems based on Sequential Machine Learning.
NCA
(2022)
Anshuman Misra
,
Ajay D. Kshemkalyani
Causal Ordering Properties of Byzantine Reliable Broadcast Primitives.
NCA
(2022)
Towhidul Islam
,
Asif Ahmed
,
Raihan Tanvir
,
Rezwana Reaz
Enforcing delay-aware fog-cloud based IoT firewall (Work In Progress).
NCA
(2022)
Shlomi Dolev
,
Yaniv Kleinman
Multiplicative Partially Homomorphic CRT Secret Sharing : (Preliminary Version).
NCA
(2022)
Mehrzad Lavassani
,
Johan Åkerberg
,
Mats Björkman
Data-driven Method for In-band Network Telemetry Monitoring of Aggregated Traffic.
NCA
(2022)
Maya Kapoor
,
Siddharth Krishnan
,
Thomas Moyer
Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing.
NCA
(2022)
Aymeric Agon-Rambosson
,
Jonathan Lejeune
,
Julien Sopena
,
Pierre Sens
Alternating MPR: a balanced broadcast algorithm for MANETs.
NCA
(2022)
Slim Abbes
,
Slim Rekhis
Reinforcement Learning-based Virtual Sensors Provision in Internet of Vehicles (IoV).
NCA
(2022)
Kadir Korkmaz
,
Joachim Bruneau-Queyreix
,
Stéphane Delbruel
,
Sonia Ben Mokhtar
,
Laurent Réveillère
In-depth analysis of the IDA-Gossip protocol.
NCA
(2022)
Muhong Huang
,
Runchao Han
,
Zhiqiang Du
,
Yanfang Fu
,
Liangxin Liu
Reputation-based state machine replication.
NCA
(2022)
Claudio Zanasi
,
Federico Magnanini
,
Silvio Russo
,
Michele Colajanni
A Zero Trust approach for the cybersecurity of Industrial Control Systems.
NCA
(2022)
2021
Sameh Khalfaoui
,
Jean Leneutre
,
Arthur Villard
,
Ivan Gazeau
,
Jingxuan Ma
,
Jean-Luc Danger
,
Pascal Urien
Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking.
NCA
(2021)
Souvik Deb
,
Shankar Kumar Ghosh
,
Sasthi C. Ghosh
A Multi-Arm-Bandit Based Resource Block Allocation in RIS Assisted Wireless Network.
NCA
(2021)
Tanaya Roy
,
Jit Gupta
,
Krishna Kant
,
Amitangshu Pal
,
Dave Minturn
: Emulating Predictable Latency Mode in Regular SSDs.
NCA
(2021)
Souvik Deb
,
Sasthi C. Ghosh
An RIS Deployment Strategy to Overcome Static Obstacles in Millimeter Wave D2D Communication.
NCA
(2021)
Tapadhir Das
,
Raj Mani Shukla
,
Shamik Sengupta
The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks.
NCA
(2021)
Dobrin Dobrev
,
Dimiter Avresky
DDoS attack identification based on SDN.
NCA
(2021)
Shlomi Dolev
,
Arseni Kalma
Verifiable Computing Using Computation Fingerprints Within FHE.
NCA
(2021)
Alexander Vaskevich
,
Thilini Dahanayaka
,
Guillaume Jourjon
,
Suranga Seneviratne
SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting.
NCA
(2021)
Lukasz Krzywiecki
,
Adam Polubek
,
Hannes Salin
Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case.
NCA
(2021)
Maya Kapoor
,
Garrett Fuchs
,
Jonathan Quance
RExACtor: Automatic Regular Expression Signature Generation for Stateless Packet Inspection.
NCA
(2021)
Miguel C. Francisco
,
Samih Eisa
,
Miguel L. Pardal
Secure protocol buffers for Bluetooth Low-Energy communication with wearable devices.
NCA
(2021)