TALK KEYWORD INDEX
This page contains an index consisting of author-provided keywords.
$ | |
$\mathcal{NP}$-hard | |
5 | |
5G network | |
A | |
Access Pattern | |
Air pollution simulation | |
Android | |
Anomaly diagnosis | |
applications | |
approximation | |
B | |
Backscatter communication | |
bandwidth preemption | |
Bandwidth reservation | |
bandwidth savings | |
big data | |
Biometrics | |
Blockchain technology | |
Budget Constraint | |
C | |
cache | |
Capacity Estimation | |
cbench | |
channel hopping | |
chirp interference mitigation | |
chromatic co-occurrence of local binary pattern | |
classification | |
Cloud computing | |
clustering | |
Coexistence | |
coflow scheduling | |
cognitive radio | |
collaborative | |
collection | |
color distortion | |
color recognition | |
Complex network | |
Component-based location | |
compressive | |
Computer Security | |
Conditional privacy | |
Congestion | |
congestion control | |
Contact Duration | |
Container | |
Containers | |
convergence | |
CoSaMP | |
COTS RFID | |
Countermeasures selection | |
Coverage and Connectivity | |
Crowdsensing | |
CS | |
CVSS | |
D | |
Data assimilation | |
Data Outsourcing | |
data transfer | |
datacenter | |
datacenter network | |
DDoS attack | |
DDoS Evaluation | |
decompression failure | |
Deep Learning | |
deep packet inspection | |
Defense in depth | |
Delay Outage Probability | |
Delay Tolerant Networks | |
Delay-Constrained Throughput | |
Deployment | |
distributed approach | |
Distributed Computing | |
Distributed denial-of-service | |
distributed machine learning framework | |
Distributed Stream Processing Systems | |
dymamic barcode | |
dynamic provisioning | |
E | |
ECN | |
Economics | |
edge computing | |
Elliptic curve | |
emergency system | |
empirical study | |
Encrypted Database | |
Energy cost | |
energy sharing | |
Enhanced-ARAR tree | |
Ensemble Parameters | |
Epidemic Containment Game | |
F | |
Failure Recovery | |
fairness | |
Fault Tolerance | |
feature subspace | |
feature weight | |
FHSS communication | |
File sharing | |
fingerprinting | |
Flow Entry Eviction | |
flow rule conflict | |
flow table | |
fog computing | |
Fragmented Data | |
Fuzzy Control | |
G | |
Genetic Algorithm | |
Genetic Trust | |
gesture recognition | |
GMM | |
graph rigidity | |
Green network | |
Green routing protocol | |
Grid computing | |
group based | |
group multicast | |
H | |
Hash operation | |
Heterogeneity | |
hierarchical decompostion | |
High Performance User Level Network Stack | |
hybrid feedbacks | |
I | |
In-memory Computing | |
information centric network | |
information dissemination | |
Intel DPDK | |
Inter-Contact Time | |
Internal buffer | |
Internet of Things | |
Internet-of-Things | |
intrusion detection | |
Intrusion Response | |
isolation | |
Iterative Application | |
K | |
Key derivation encryption | |
key-value store | |
Keystroke authentication systems | |
Keystroke dynamics | |
L | |
LAA | |
LBSN | |
Link Failure | |
location robustness | |
LTE-LAA | |
LTE-U | |
LTE-WiFi | |
M | |
Machine Learning | |
malicious account detection | |
massive MIMO | |
matrix | |
membership threshold | |
Middleware | |
mininet | |
mitigation | |
mobile charger | |
mobile cloud computing | |
Mobile device | |
Mobile Networks | |
Mobile social networks | |
Mobility support | |
Modelling | |
Monitoring | |
Multi-Attribute Optimization | |
Multicast | |
multiple flow tables | |
mutual information | |
N | |
named data networking | |
NAND flash memory | |
NDN | |
network | |
network coding | |
network function virtualization | |
Network Function Virtualization (NFV) | |
Network Performance Optimization | |
Network Protocols | |
network security | |
Network Security Attributes | |
network stack | |
Network traffic classification | |
network updates | |
NFV | |
node density estimator | |
non-volatile memory | |
O | |
one-class classifier | |
Online social netowrk | |
Online Task Allocation | |
OpenFlow | |
OpenFlow protocol | |
OpenStack | |
operator placement | |
Optimal checkpoint interval | |
Orchestration | |
overflow | |
P | |
Passive Measurement | |
Pattern Privacy | |
peer-to-peer | |
Pending Interest Table | |
Performance | |
Performance evaluation | |
Phase noise | |
Platform Configuration | |
Positioning | |
Power | |
Power consumption | |
presentation attack detection | |
Privacy protection | |
Probabilistic Attack Tree | |
Probability of Coexistence | |
Proxy encryption | |
Q | |
QoS | |
Quality | |
Queueing Theory | |
R | |
RACH synchronization | |
Random Access Channel | |
ranging noise | |
Rate Adaptation | |
rate control | |
Reader-book interaction | |
Really Experiment Device | |
redundancy elimination | |
regular expression matching | |
Reliability | |
rendezvous | |
Renewable energy | |
Resource contribution stimulation | |
resource management | |
Revocation message | |
robustness | |
RogueAPs | |
Routing | |
routing and forwarding | |
rumor source detection | |
S | |
Scheduling | |
Screen-camera communication | |
SDN | |
SDN controller | |
Seamless hand-off | |
Searchable Encryption | |
Seastar | |
Secure deletion | |
Secure storage | |
Security | |
Self-optimization | |
Semi-supervised learning | |
sensing | |
sensor network | |
service chain | |
Service Function Chains (SFCs) | |
services over networks | |
SGX | |
Signal | |
Smart watch | |
Social networks | |
Social Sensing | |
Software Defined Networking | |
Software-Defined Network | |
Software-Defined Network (SDN) | |
software-defined networking | |
Spark Performance | |
Spatial evolutionary game theory | |
Spherical Wave Propagation | |
Stackelberg strategy | |
Stateful firewall rules | |
strange traffic | |
Switch | |
Switch Design | |
switch-controller mapping | |
Synthetic forgery attack | |
T | |
Task Migration | |
tasks | |
TCP | |
ternary content addressable memory | |
Testbed | |
The Internet of Things | |
Threat Situation Assessment | |
Trust Evaluation | |
tunable quality | |
U | |
UI Hijacking | |
ultra dense networks | |
Uncertainty | |
unidirectional lossy link | |
Unlicensed bands | |
Unmanned Aerial Vehicles | |
unsupervised adversarial domain adaptation | |
User localization | |
User revocation | |
V | |
vehicular networks | |
VNF | |
VoIP spam | |
W | |
wear-leveling | |
Wi-Fi | |
WiFi | |
wireless power transfer | |
wireless rechargeable sensor network | |
Wireless sensor networks | |
WLAN | |
WSN | |
Z | |
zero-copy | |
Zero-day Vulnerability Market |