All Stories

  1. Adaptive Strategies For Reducing The Carbon Footprint of Deep Neural Networks
  2. A Polynomial Commitment-Driven Zero-Knowledge Proof-based Authentication of Autonomous Vehicles in Multi-RSU Broadcast Domains
  3. Recovering Critical Service After Large-Scale Failures With Bayesian Network Tomography
  4. TaMaRA: A Task Management and Routing Algorithm for FANETs
  5. Stop & Offload: Periodic data offloading in UAV networks
  6. On Correlated Stock Market Time Series Generation
  7. SIDE : Self Driving Drones Embrace Uncertainty
  8. A Bayesian Approach to Network Monitoring for Progressive Failure Localization
  9. Drone-Based Delivery Systems: A Survey on Route Planning
  10. Network Identifiability: Advances in Separating Systems and Networking Applications
  11. Distributed Deployment in UAV-Assisted Networks for a Long-Lasting Communication Coverage
  12. Optimal Deployment in Crowdsensing for Plant Disease Diagnosis in Developing Countries
  13. A Multi-Trip Task Assignment for Early Target Inspection in Squads of Aerial Drones
  14. Topology Agnostic Bounds on Minimum Requirements for Network Failure Identification
  15. On Fundamental Bounds on Failure Identifiability by Boolean Network Tomography
  16. On Interference Aware Power Adjustment and Scheduling in Femtocell Networks
  17. Mitigation and Recovery From Cascading Failures in Interdependent Networks Under Uncertainty
  18. On Progressive Network Recovery From Massive Failures Under Uncertainty
  19. Fast Network Configuration in Software Defined Networking
  20. Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge
  21. On Critical Service Recovery After Massive Network Failures
  22. Network recovery from massive failures under uncertain knowledge of damages
  23. Autonomous Mobile Sensor Placement in Complex Environments
  24. Fundamental limits of failure identifiability by boolean network tomography
  25. Progressive damage assessment and network recovery after massive failures
  26. On the Vulnerabilities of Voronoi-Based Approaches to Mobile Sensor Deployment
  27. Mapping sample scenarios to operational models
  28. On Propagation of Phenomena in Interdependent Networks
  29. On Selective Activation in Dense Femtocell Networks
  30. Network Recovery After Massive Failures
  31. Service Placement for Detecting and Localizing Failures Using End-to-End Observations
  32. Power adjustment and scheduling in OFDMA femtocell networks
  33. Energy-Efficient Selective Activation in Femtocell Networks
  34. Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks
  35. On the Vulnerabilities of the Virtual Force Approach to Mobile Sensor Deployment
  36. Voronoi-based deployment of mobile sensors in the face of adversaries
  37. On the security vulnerabilities of the virtual force approach to mobile sensor deployment
  38. Sensor activation and radius adaptation (SARA) in heterogeneous sensor networks
  39. P&P: an asynchronous and distributed protocol for mobile sensor deployment
  40. Autonomous Deployment of Heterogeneous Mobile Sensors
  41. MoNet Special Issue Editorial
  42. On Adaptive Density Deployment to Mitigate the Sink-Hole Problem in Mobile Sensor Networks
  43. Mobile Sensor Deployment in Unknown Fields
  44. Autonomous deployment of heterogeneous mobile sensors
  45. Self-∗ through self-learning: Overload control for distributed web systems
  46. Push & Pull: autonomous deployment of mobile sensors for a complete coverage
  47. P&P protocol
  48. Variable Density Deployment and Topology Control for the Solution of the Sink-Hole Problem
  49. Self-* Overload Control for Distributed Web Systems
  50. An Autonomic Admission Control Policy for Distributed Web Systems
  51. Distributed Server Selection and Admission Control in Replicated Web Systems
  52. Session based access control in geographically replicated Internet services
  53. A performance analysis of context transfer protocols for QoS enabled internet services
  54. Message from the Conference Chairs
  55. Improving call admission control procedures by using hand-off rate information
  56. Snap and Spread: A Self-deployment Algorithm for Mobile Sensor Networks
  57. Session based access control in content delivery networks in presence of congestion
  58. Optimal mobility-aware admission control in content delivery networks
  59. Call admission control in wireless multimedia networks