ICCCN 2018: THE 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

$
$\mathcal{NP}$-hard
5
5G network
A
Access Pattern
Air pollution simulation
Android
Anomaly diagnosis
applications
approximation
B
Backscatter communication
bandwidth preemption
Bandwidth reservation
bandwidth savings
big data
Biometrics
Blockchain technology
Budget Constraint
C
cache
Capacity Estimation
cbench
channel hopping
chirp interference mitigation
chromatic co-occurrence of local binary pattern
classification
Cloud computing
clustering
Coexistence
coflow scheduling
cognitive radio
collaborative
collection
color distortion
color recognition
Complex network
Component-based location
compressive
Computer Security
Conditional privacy
Congestion
congestion control
Contact Duration
Container
Containers
convergence
CoSaMP
COTS RFID
Countermeasures selection
Coverage and Connectivity
Crowdsensing
CS
CVSS
D
Data assimilation
Data Outsourcing
data transfer
datacenter
datacenter network
DDoS attack
DDoS Evaluation
decompression failure
Deep Learning
deep packet inspection
Defense in depth
Delay Outage Probability
Delay Tolerant Networks
Delay-Constrained Throughput
Deployment
distributed approach
Distributed Computing
Distributed denial-of-service
distributed machine learning framework
Distributed Stream Processing Systems
dymamic barcode
dynamic provisioning
E
ECN
Economics
edge computing
Elliptic curve
emergency system
empirical study
Encrypted Database
Energy cost
energy sharing
Enhanced-ARAR tree
Ensemble Parameters
Epidemic Containment Game
F
Failure Recovery
fairness
Fault Tolerance
feature subspace
feature weight
FHSS communication
File sharing
fingerprinting
Flow Entry Eviction
flow rule conflict
flow table
fog computing
Fragmented Data
Fuzzy Control
G
Genetic Algorithm
Genetic Trust
gesture recognition
GMM
graph rigidity
Green network
Green routing protocol
Grid computing
group based
group multicast
H
Hash operation
Heterogeneity
hierarchical decompostion
High Performance User Level Network Stack
hybrid feedbacks
I
In-memory Computing
information centric network
information dissemination
Intel DPDK
Inter-Contact Time
Internal buffer
Internet of Things
Internet-of-Things
intrusion detection
Intrusion Response
isolation
Iterative Application
K
Key derivation encryption
key-value store
Keystroke authentication systems
Keystroke dynamics
L
LAA
LBSN
Link Failure
location robustness
LTE-LAA
LTE-U
LTE-WiFi
M
Machine Learning
malicious account detection
massive MIMO
matrix
membership threshold
Middleware
mininet
mitigation
mobile charger
mobile cloud computing
Mobile device
Mobile Networks
Mobile social networks
Mobility support
Modelling
Monitoring
Multi-Attribute Optimization
Multicast
multiple flow tables
mutual information
N
named data networking
NAND flash memory
NDN
network
network coding
network function virtualization
Network Function Virtualization (NFV)
Network Performance Optimization
Network Protocols
network security
Network Security Attributes
network stack
Network traffic classification
network updates
NFV
node density estimator
non-volatile memory
O
one-class classifier
Online social netowrk
Online Task Allocation
OpenFlow
OpenFlow protocol
OpenStack
operator placement
Optimal checkpoint interval
Orchestration
overflow
P
Passive Measurement
Pattern Privacy
peer-to-peer
Pending Interest Table
Performance
Performance evaluation
Phase noise
Platform Configuration
Positioning
Power
Power consumption
presentation attack detection
Privacy protection
Probabilistic Attack Tree
Probability of Coexistence
Proxy encryption
Q
QoS
Quality
Queueing Theory
R
RACH synchronization
Random Access Channel
ranging noise
Rate Adaptation
rate control
Reader-book interaction
Really Experiment Device
redundancy elimination
regular expression matching
Reliability
rendezvous
Renewable energy
Resource contribution stimulation
resource management
Revocation message
robustness
RogueAPs
Routing
routing and forwarding
rumor source detection
S
Scheduling
Screen-camera communication
SDN
SDN controller
Seamless hand-off
Searchable Encryption
Seastar
Secure deletion
Secure storage
Security
Self-optimization
Semi-supervised learning
sensing
sensor network
service chain
Service Function Chains (SFCs)
services over networks
SGX
Signal
Smart watch
Social networks
Social Sensing
Software Defined Networking
Software-Defined Network
Software-Defined Network (SDN)
software-defined networking
Spark Performance
Spatial evolutionary game theory
Spherical Wave Propagation
Stackelberg strategy
Stateful firewall rules
strange traffic
Switch
Switch Design
switch-controller mapping
Synthetic forgery attack
T
Task Migration
tasks
TCP
ternary content addressable memory
Testbed
The Internet of Things
Threat Situation Assessment
Trust Evaluation
tunable quality
U
UI Hijacking
ultra dense networks
Uncertainty
unidirectional lossy link
Unlicensed bands
Unmanned Aerial Vehicles
unsupervised adversarial domain adaptation
User localization
User revocation
V
vehicular networks
VNF
VoIP spam
W
wear-leveling
Wi-Fi
WiFi
wireless power transfer
wireless rechargeable sensor network
Wireless sensor networks
WLAN
WSN
Z
zero-copy
Zero-day Vulnerability Market