Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 10 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees
Abstract

The storage requirement for distributed tracing can be reduced significantly by sampling only the anomalous or interesting traces that occur rarely at runtime. In this paper, we introduce an unsupervised sampling pipeline for distributed tracing ...

research-article
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation
Abstract

Intent-Based Networking (IBN) is an important step towards achieving network automation. Many challenges of today’s complex network management systems can be tackled by the solutions proposed by IBN. However, although IBN has gained a lot of ...

research-article
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing
Abstract

With the improvement of service delay and quality requirements for new applications such as unmanned driving, internet of vehicles, and virtual reality, the deployment of network services is gradually moving from the cloud to the edge. This ...

research-article
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network
Abstract

VANET routing has become a very popular area of research as it lays the foundation for the intelligent transportation system (ITS). In VANET, the mobility of the vehicle is high hence the network is dynamic. Therefore, the connectivity between the ...

research-article
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding
Abstract

Virtual network embedding (VNE) is the process of allocating resources in a substrate (i.e. physical) network to support virtual networks optimally. The VNE problem is an NP-hard problem that has been studied for more than a decade in the ...

research-article
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization
Abstract

With the introduction of 5 G technology, various communication services are becoming integrated into more sophisticated systems, such as Ultra-Reliable Low-Latency Communications (URLLC) and Massive Machine-Type Communications (mMTC). The goal is ...

research-article
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches
Abstract

Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the ...

research-article
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios
Abstract

Yearly, the rates of Internet penetration are on the rise, surpassing 80% in developed nations. Despite this progress, over two billion individuals in rural and low-income regions face a complete absence of Internet access. This lack of ...

research-article
Economic Alternatives for the Provision of URLLC and eMBB Services Over a 5G Network
Abstract

This research work analyzes economic alternatives for the provision of ultra-reliable low latency communication (URLLC) and enhanced mobile broadband (eMBB) services by mobile network operators over the same fifth-generation (5G) network. Two ...

research-article
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations
Abstract

Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication between vehicles and road side units (RSU) to exchange safety and alert messages required for the successful implementation of VANET applications. However, ...

research-article
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications
Abstract

In the fog computing-based Internet of Things (IoT) architecture, the sensor devices represent the basic elements needed to sense the surrounding environment. They gather and send a huge amount of data to the fog gateway and then to the cloud due ...

research-article
AI-Based Intrusion Detection for a Secure Internet of Things (IoT)
Abstract

The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things (IoT). The IoT is a set of devices connected via the internet that cooperate to achieve a specific ...

research-article
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution
Abstract

Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service provisioning. This is accomplished by decoupling the network functions from the physical environment within ...

research-article
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation
Abstract

Large Language Models (LLM) continue to demonstrate their utility in a variety of emergent capabilities in different fields. An area that could benefit from effective language understanding in cybersecurity is the analysis of log files. This work ...

research-article
Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain
Abstract

Smart contracts are decentralized applications that hold a pivotal role in blockchain-based systems. Smart contracts are composed of error-prone programming languages, so it is affected by many vulnerabilities (e.g., time dependence, outdated ...

research-article
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach
Abstract

Wireless power transfer (WPT) technology enables the replenishment of rechargeable battery energy by the sensor nodes (SNs) in wireless rechargeable sensor networks (WRSNs). The deployment of unmanned aerial vehicles (UAVs) as flying chargers to ...

research-article
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement
Abstract

This work describes an approach to enhance container orchestration platforms with an autonomous and dynamic rescheduling system that aims at improving application service time by co-locating highly interdependent containers for network delay ...

research-article
Enhancing Cloud Gaming QoE Estimation by Stacking Learning
Abstract

The Cloud Gaming sector is burgeoning with an estimated annual growth of more than 50%, poised to reach a market value of $22 billion by 2030, and notably, GeForce Now, launched in 2020, reached 20 million users by August 2022. Cloud gaming ...

research-article
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks
Abstract

Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive Networking (TSN)-enabled Ethernet. Furthermore, attempts have been made to bring TSN features into ...

research-article
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels
Abstract

In this work, we investigate Reconfigurable Intelligent Surface (RIS)-aided Full-Duplex (FD)-Simultaneous Wireless Information Power Transfer (SWIPT)-Cooperative non-Orthogonal Multiple Access (C-NOMA) consisting of two paired devices. The device ...

research-article
Distributed AgriFood Supply Chains
Abstract

In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT devices to monitor conditions such as temperature and humidity throughout the supply chain. However, ...

Comments