Time | Ballroom A | Room 215 | Room 220 | Room 225 |
Tuesday, September 20 |
||||
10:10 am-11:20 am | T1-A: Green Networks | T1-B: Network Architectures | T1-C: Wireless Networks-1 | |
02:20 pm-03:30 pm | T2-A: Internet of Things (IoT) | T2-B: Optical Networks | T2-C: Wireless Networks-2 | |
04:30 pm-06:00 pm | T3: Invited Papers | |||
Wednesday, September 21 |
||||
10:10 am-11:20 am | W1-A: Reliability | W1-B: Security, Privacy and Trust-1 | W1-C: Cognitive Radio Networks | |
02:55 pm-04:25 pm | W2-A: Information-Centric Networks | W2-B: Security, Privacy and Trust-2 |
Tuesday, September 20
Tuesday, September 20, 10:10 – 11:20
T1-A: Green Networks
Room 215
- Downlink Power Control for Latency Aware Grid Energy Savings in Green Cellular Networks
- Modeling Energy Costs and Emissions for Anycast RWA in Optical Data Center Networks
- Sub-Channel Allocation in Green Powered Heterogeneous Cognitive Radio Networks
T1-B: Network Architectures
Room 220
- FPGA-accelerated Simulation of a Hybrid-ARQ System using High Level Synthesis
- Enumerating Single Destination, Policy-Preferred Paths in AS-level Internet Topology Maps
- Language of Choice: On Embedding Choice-related Semantics in a Realizable Protocol
T1-C: Wireless Networks-1
Room 225
- Modeling and Optimization for Programmable Unified Control Plane in Heterogeneous Wireless Networks
- Dynamic Spectrum Leasing Methodology (DSLM): A Game Theoretic Approach
- Designing Optimal Heterogeneous Networks
Tuesday, September 20, 14:20 – 15:30
T2-A: Internet of Things (IoT)
Room 215
- Data management of sensor signals for high bandwidth data streaming to the Cloud
- Smart Wireless Sensor Networks Powered by Remaining Energy Cluster Head Selection Protocol
- Two-target Device-Free Passive Localization by Combining Anomaly Link Selection and Weighted-Link Minimum Error Localization
T2-B: Optical Networks
Room 220
- Transparent Virtual Network Embedding in Elastic Optical Networks
- Dynamic Erasure-coded Data Retrieval in Elastic Optical Data Center Networks
- Analysis of Beam Divergence and Input Bit Rate for Free Space Optical Communication Link
T2-C: Wireless Networks-2
Room 225
- Optimization of LTE Radio Resource Block Allocation for Maritime Channels
- Universal Filtered Multicarrier Systems:Testbed Deployment of a 5G Waveform Candidate
- Distributed Spectrum Monitoring and Surveillance using a Cognitive Radio based Testbed
Tuesday, September 20, 16:30 – 18:00
T3: Invited Papers
Room: Ballroom A
- Market-based Path Service Composition for Software Defined Networks
- Evaluation and Performance Modeling of Two OXC Architectures
- Smart Connected Canines: IoT Design Considerations for the Lab, Home, and Mission-critical Environments
- Using Semantic Technologies to Mine Vehicular Context for Security
Wednesday, September 21
Wednesday, September 21, 10:10 – 11:20
W1-A: Reliability
Room 215
- On The Continuous Coverage Problem for a Swarm of UAVs
- Pepple: Programmable Network Measurement for Troubleshooting Soft Failures
- Kuijia: Traffic Rescaling in Data Center WANs
W1-B: Security, Privacy and Trust-1
Room 220
- Trustworthy and Protected Data Collection for Event Detection Using Networked Sensing Systems
- One-to-All Regularized Logistic Regression-based Classification for WiFi Indoor Localization
- DroidDeepLearner: Identifying Android Malware Using Deep Learning
W1-C: Cognitive Radio Networks
Room 225
- Frame-based Temporal Occupancy Characterization for Compliance Enforcement in Opportunistic Spectrum Access Networks
- Rate Performance of Adaptive Link Selection in Buffer-Aided Cognitive Relay Networks
- Overlay Secondary Spectrum Sharing with Independent Re-attempts in Cognitive Radios
Wednesday, September 21, 14:55 – 16:25
W2-A: Information-Centric Networks
Room 215
- Edge Caching and Nearest Replica Routing in Information-Centric Networking
- Transient Analysis of a Resource-limited Recovery Policy for Epidemics: a Retrial Queueing Approach
- Lowest-Cost Network Node Identification for Data Caching for Information Centric Networks
W2-B: Security, Privacy and Trust-2
Room 220
- A Honeypot System for Wearable Networks
- A Greedy Algorithm for Decentralized Bayesian Detection with Feedback
- A Novel Video Steganography Algorithm in DCT Domain Based on Hamming and BCH Codes
- P2F2: Privacy-Preserving Face Finder