Poster Session
Guideline for Poster Session Presenter
|
Poster Session 1: Chair: Prof. Cheng-Hsin Hsu (National Tsing Hua University, Taiwan) |
| 1-1 |
The Exploration of Machine Learning for Abnormal Prediction Model of Telecom Business Support System |
| 1-2 |
Using Kernel Density Estimation to Target Customer Complaint Handling Service |
| 1-3 |
Orchestration of NFV Virtual Applications Based on TOSCA Data Models |
| 1-4 |
Effect of the penalty on the QoS received by multihomed clients |
| 1-5 |
Load Balancing for Multiple Controllers in SDN Based on Switches Group |
| 1-6 |
Classification-Based Elephant Flow Detection Method using Application Round on SDN Environments |
| 1-7 |
Design and Implement a Mobile Badminton Stroke Classification System |
| 1-8 |
Location-aware Dynamic Network Provisioning |
| 1-9 |
Suspicious Traffic Detection Based on Edge Gateway Sampling Method |
| 1-10 |
Could We Beat A New Mimicking Attack? |
| 1-11 |
File Transfer Framework with Multipath Transfer in Heterogeneous Networks for Disaster Recovery |
| 1-12 |
Evaluating Scheduling Strategies in LOD Based Application |
| 1-13 |
Sky-Scope : Skype Application Traffic Identification System |
| 1-14 |
High-Reliable WDM Optical Access Network Expanding by Double Fiber-Tangent-Ring Topology |
| 1-15 |
Experimental evaluation of a path switching function to avoid delay spikes in wireless LANs |
| 1-16 |
Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools |
| 1-17 |
Feasibility Study for Simulating Community Based Content Caching on CCN Network Using ndnSIM Simulator |
| 1-18 |
Design and Implementation of a Service-Oriented Network Provisioning System for Network as a Service |
| 1-19 |
Topology Design for Multihop Cellular Network |
| 1-20 |
Dynamic Reordering Bloom Filter |
| 1-21 |
Sliced NFV Service Chaining in Mobile Edge Clouds |
| 1-22 |
The Implementation and Evaluation for Automatic Platform Failure Test System Using CMDB From Automation Script |
| 1-23 |
Forwarding Path Discovery with Software Defined Networking |
| 1-24 |
FERA: A Caching Scheme in CCN using File-Extension and Regression Analysis |
| 1-25 |
iToy: A LEGO-like Solution for Small Scale IoT Applications |
| 1-26 |
A3N: Agile Application-Awareness in Software-Defined Networks He Cai, Jun Deng*, Yuhua Zhang*, and Xiaofei Wang*, Sangheon Pack** (*Tianjin University, Tianjin, China, **Korea University, Seoul, Korea) |
|
Poster Session 2: Chair: Prof. Hong-Taek Ju (Keimyung University, Korea) |
| 2-1 |
Application-aware Traffic Engineering in Software-Defined Network |
| 2-2 |
Reliable Vehicle Selection Algorithm with Dynamic Mobility of Vehicle in Vehicular Cloud System |
| 2-3 |
Performance Analysis of H.264, H.265, VP9 and AV1 Video Encoders |
| 2-4 |
Structured Whitelist Generation in SCADA Network using PrefixSpan Algorithm |
| 2-5 |
Enhancing Service Resiliency in the Next Generation EPC System |
| 2-6 |
Parallel and Local Diagnostic Algorithm for Wireless Sensor Networks |
| 2-7 |
A Hybrid Live Streaming Model for a Reliable Service |
| 2-8 |
User Clustering based on Correlation in 5G using Semidefinite Programming |
| 2-9 |
Downlink Power Allocation in Virtualized Wireless Networks |
| 2-10 |
SigManager: Automatic Payload Signature Management System for the Classification of Dynamically Changing Internet Applications |
| 2-11 |
An Approach of Cost Optimized Influence Maximization in Social Networks |
| 2-12 |
Browser’s ”search form” issues and countermeasures |
| 2-13 |
Access Point Selection Algorithm for Providing Optimal AP in SDN-based Wireless Network |
| 2-14 |
Collaborative Cache Allocation and Computation Offloading in Mobile Edge Computing |
| 2-15 |
Infrastructure-assisted Hybrid Road-aware Routing and QoS Provisioning in VANETs |
| 2-16 |
Mobile charger billing system using lightweight Blockchain |
| 2-17 |
Reliable Smart Energy IoT-Cloud Service Operation with Container Orchestration |
| 2-18 |
Probabilistic k-Weighted Coverage Placement in Wireless Sensor Networks |
| 2-19 |
A Traffic Grouping Method using the Correlation Model of Network Flow |
| 2-20 |
Classification of Application Traffic Using Tensorflow Machine Learning |
| 2-21 |
Power Allocation Games for Cooperative Coordinated Multipoint Transmission Scheme |
| 2-22 |
Information Fusion based Agile Streaming Telemetry for Intelligent Traffic Analytics of Softwarized Network |
| 2-23 |
An Ontology-based Hybrid Approach for Accurate Context Reasoning |
| 2-24 |
Application Identification System for SDN QoS based on Machine Learning and DNS Responses |
| 2-25 |
The Unique Reliable Identity System of Enabling Lightweight Device Management in NMS Mechanism for the U-IoT |

