TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
| $ | |
| $\mathcal{NP}$-hard | |
| 5 | |
| 5G network | |
| A | |
| Access Pattern | |
| Air pollution simulation | |
| Android | |
| Anomaly diagnosis | |
| applications | |
| approximation | |
| B | |
| Backscatter communication | |
| bandwidth preemption | |
| Bandwidth reservation | |
| bandwidth savings | |
| big data | |
| Biometrics | |
| Blockchain technology | |
| Budget Constraint | |
| C | |
| cache | |
| Capacity Estimation | |
| cbench | |
| channel hopping | |
| chirp interference mitigation | |
| chromatic co-occurrence of local binary pattern | |
| classification | |
| Cloud computing | |
| clustering | |
| Coexistence | |
| coflow scheduling | |
| cognitive radio | |
| collaborative | |
| collection | |
| color distortion | |
| color recognition | |
| Complex network | |
| Component-based location | |
| compressive | |
| Computer Security | |
| Conditional privacy | |
| Congestion | |
| congestion control | |
| Contact Duration | |
| Container | |
| Containers | |
| convergence | |
| CoSaMP | |
| COTS RFID | |
| Countermeasures selection | |
| Coverage and Connectivity | |
| Crowdsensing | |
| CS | |
| CVSS | |
| D | |
| Data assimilation | |
| Data Outsourcing | |
| data transfer | |
| datacenter | |
| datacenter network | |
| DDoS attack | |
| DDoS Evaluation | |
| decompression failure | |
| Deep Learning | |
| deep packet inspection | |
| Defense in depth | |
| Delay Outage Probability | |
| Delay Tolerant Networks | |
| Delay-Constrained Throughput | |
| Deployment | |
| distributed approach | |
| Distributed Computing | |
| Distributed denial-of-service | |
| distributed machine learning framework | |
| Distributed Stream Processing Systems | |
| dymamic barcode | |
| dynamic provisioning | |
| E | |
| ECN | |
| Economics | |
| edge computing | |
| Elliptic curve | |
| emergency system | |
| empirical study | |
| Encrypted Database | |
| Energy cost | |
| energy sharing | |
| Enhanced-ARAR tree | |
| Ensemble Parameters | |
| Epidemic Containment Game | |
| F | |
| Failure Recovery | |
| fairness | |
| Fault Tolerance | |
| feature subspace | |
| feature weight | |
| FHSS communication | |
| File sharing | |
| fingerprinting | |
| Flow Entry Eviction | |
| flow rule conflict | |
| flow table | |
| fog computing | |
| Fragmented Data | |
| Fuzzy Control | |
| G | |
| Genetic Algorithm | |
| Genetic Trust | |
| gesture recognition | |
| GMM | |
| graph rigidity | |
| Green network | |
| Green routing protocol | |
| Grid computing | |
| group based | |
| group multicast | |
| H | |
| Hash operation | |
| Heterogeneity | |
| hierarchical decompostion | |
| High Performance User Level Network Stack | |
| hybrid feedbacks | |
| I | |
| In-memory Computing | |
| information centric network | |
| information dissemination | |
| Intel DPDK | |
| Inter-Contact Time | |
| Internal buffer | |
| Internet of Things | |
| Internet-of-Things | |
| intrusion detection | |
| Intrusion Response | |
| isolation | |
| Iterative Application | |
| K | |
| Key derivation encryption | |
| key-value store | |
| Keystroke authentication systems | |
| Keystroke dynamics | |
| L | |
| LAA | |
| LBSN | |
| Link Failure | |
| location robustness | |
| LTE-LAA | |
| LTE-U | |
| LTE-WiFi | |
| M | |
| Machine Learning | |
| malicious account detection | |
| massive MIMO | |
| matrix | |
| membership threshold | |
| Middleware | |
| mininet | |
| mitigation | |
| mobile charger | |
| mobile cloud computing | |
| Mobile device | |
| Mobile Networks | |
| Mobile social networks | |
| Mobility support | |
| Modelling | |
| Monitoring | |
| Multi-Attribute Optimization | |
| Multicast | |
| multiple flow tables | |
| mutual information | |
| N | |
| named data networking | |
| NAND flash memory | |
| NDN | |
| network | |
| network coding | |
| network function virtualization | |
| Network Function Virtualization (NFV) | |
| Network Performance Optimization | |
| Network Protocols | |
| network security | |
| Network Security Attributes | |
| network stack | |
| Network traffic classification | |
| network updates | |
| NFV | |
| node density estimator | |
| non-volatile memory | |
| O | |
| one-class classifier | |
| Online social netowrk | |
| Online Task Allocation | |
| OpenFlow | |
| OpenFlow protocol | |
| OpenStack | |
| operator placement | |
| Optimal checkpoint interval | |
| Orchestration | |
| overflow | |
| P | |
| Passive Measurement | |
| Pattern Privacy | |
| peer-to-peer | |
| Pending Interest Table | |
| Performance | |
| Performance evaluation | |
| Phase noise | |
| Platform Configuration | |
| Positioning | |
| Power | |
| Power consumption | |
| presentation attack detection | |
| Privacy protection | |
| Probabilistic Attack Tree | |
| Probability of Coexistence | |
| Proxy encryption | |
| Q | |
| QoS | |
| Quality | |
| Queueing Theory | |
| R | |
| RACH synchronization | |
| Random Access Channel | |
| ranging noise | |
| Rate Adaptation | |
| rate control | |
| Reader-book interaction | |
| Really Experiment Device | |
| redundancy elimination | |
| regular expression matching | |
| Reliability | |
| rendezvous | |
| Renewable energy | |
| Resource contribution stimulation | |
| resource management | |
| Revocation message | |
| robustness | |
| RogueAPs | |
| Routing | |
| routing and forwarding | |
| rumor source detection | |
| S | |
| Scheduling | |
| Screen-camera communication | |
| SDN | |
| SDN controller | |
| Seamless hand-off | |
| Searchable Encryption | |
| Seastar | |
| Secure deletion | |
| Secure storage | |
| Security | |
| Self-optimization | |
| Semi-supervised learning | |
| sensing | |
| sensor network | |
| service chain | |
| Service Function Chains (SFCs) | |
| services over networks | |
| SGX | |
| Signal | |
| Smart watch | |
| Social networks | |
| Social Sensing | |
| Software Defined Networking | |
| Software-Defined Network | |
| Software-Defined Network (SDN) | |
| software-defined networking | |
| Spark Performance | |
| Spatial evolutionary game theory | |
| Spherical Wave Propagation | |
| Stackelberg strategy | |
| Stateful firewall rules | |
| strange traffic | |
| Switch | |
| Switch Design | |
| switch-controller mapping | |
| Synthetic forgery attack | |
| T | |
| Task Migration | |
| tasks | |
| TCP | |
| ternary content addressable memory | |
| Testbed | |
| The Internet of Things | |
| Threat Situation Assessment | |
| Trust Evaluation | |
| tunable quality | |
| U | |
| UI Hijacking | |
| ultra dense networks | |
| Uncertainty | |
| unidirectional lossy link | |
| Unlicensed bands | |
| Unmanned Aerial Vehicles | |
| unsupervised adversarial domain adaptation | |
| User localization | |
| User revocation | |
| V | |
| vehicular networks | |
| VNF | |
| VoIP spam | |
| W | |
| wear-leveling | |
| Wi-Fi | |
| WiFi | |
| wireless power transfer | |
| wireless rechargeable sensor network | |
| Wireless sensor networks | |
| WLAN | |
| WSN | |
| Z | |
| zero-copy | |
| Zero-day Vulnerability Market | |