The 22 nd IEEE Symposium on Computers and Communications
03 - 06 July 2017, Heraklion, Crete, Greece
ICSS 2017 Technical Program

The ISCC 2017 printable program version is available here. Please notice that it is not finallized yet.

Guidelines

  1. Presentations will be only oral with the support of slides. PCs will be available in the rooms.
  2. Presenting author will have 20 minutes for his/her presentation for each paper including Questions and Answers.
  3. Presenting authors should be in the room 10-15 minutes before session start to meet their session chair and to check the equipment.
  4. Presenting author should prepare beforehand a few lines about them and provide them to the session chair before their session starts.
  5. Papers without a presenting author will not be included in the IEEE proceedings.
Time Room: MINOS I Room: MINOS II Room: PASIPHAE I Room: PASIPHAE II Room: APOLLON

Monday, July 3

09:00-10:45 w1.1: DENVECT Session I w1.2: ISUT Session I w1.3: PEDISWESA Session I w1.4: ICTS4eHealth Session I t1.5: CIPSEC Project Tutorial: Session I
10:45-11:15 Coffee Break
11:15-13:00 w2.1: DENVECT Session II w2.2: ISUT Session II w2.3: PEDISWESA Session II w2.4: ICTS4eHealth Session II t2.5: CIPSEC Project Tutorial: Session II
13:00-14:00 Lunch Break
14:00-15:45 w3.1: SmartIoT Session I     w3.4: ICTS4eHealth Session III t3.5: CIPSEC Project Tutorial: Session III
15:45-16:15 Coffee Break
16:15-18:00 w4.1: SmartIoT Session II     w4.4: ICTS4eHealth Session IV t4.5: CIPSEC Project Tutorial: Session IV
20:00-23:00 Welcome Drink

Tuesday, July 4

08:45-09:15 Welcome
09:15-10:15   k1.2: Keynote #1      
10:15-10:45 Coffee Break
10:45-12:30 s1.1: Routing and Multicast I s1.2: QoS, QoE, and Resource Management I s1.3: Vehicular Networks I s1.4: SDN and Overlay Networks I t5.5: Tutorial #2, Session I
12:30-13:45 Lunch Break
13:45-15:15 s2.1: Security, Crypto, and Privacy I s2.2: IoT and Wireless Sensors Networks I s2.3: Physical layer and Media Access I s2.4: Multimedia t6.5: Tutorial #2, Session II
15:15-15:45 Coffee Break
15:45-17:15 s3.1: Security, Crypto, and Privacy II s3.2: QoS, QoE, and Resource Management II s3.3: Physical Layer and Media Access II s3.4: Cloud and Virtualization I s3.5: Routing and Multicast II
17:45-19:45 Visit to Knossos archeological site.
20:00-23:00 Gala Dinner

Wednesday, July 5

09:00-10:00   k2.2: Keynote #2      
10:00-10:30 Coffee Break
10:30-12:00 s4.1: Security, Crypto, and Privacy III s4.2: Physical Layer and Media Access III s4.3: Cloud and Virtualization II s4.4: Cognitive Radio Networks and SDR t7.5: Tutorial #3, Session I
12:00-13:30 Lunch Break
13:30-15:00 s5.1: Security, Crypto, and Privacy IV s5.2: IoT and Wireless Sensors Networks II s5.3: Cloud and Virtualization III s5.4: Big Data and Data Mining I t8.5: Tutorial #3, Session II
15:00-15:30 Coffee Break
15:30-17:00 s6.1: Security, Crypto, and Privacy V s6.2: Physical Layer and Media Access IV s6.3: Biological and Molecular Communications s6.4: SDN and Overlay Networks II s6.5: Mobile and Crowd Sensing
17:00-18:00   k3.2: Keynote #3      

Thursday, July 6

09:00-10:00   k4.2: Keynote #4      
10:00-10:30 Coffee Break
10:30-12:15 s7.1: Security, Crypto, and Privacy VI s7.2: QoS, QoE, and Resource Management III s7.3: Vehicular Networks II s7.4: Wireless, Cellular, and Mobile Communications t9.5: Tutorial #4, Session I
12:15-13:45 Lunch Break
13:45-15:30 s8.1: Smart and Distributed Systems s8.2: Big Data and Data Mining II s8.3: IoT and Wireless Sensors Networks III s8.4: Social Networks and Cloud Sourcing t10.5: Tutorial #4, Session II
15:30-16:00 Coffee Break
16:00-17:45 s9.1: Security, Crypto, and Privacy VII s9.2: QoS, QoE, and Resource Management IV s9.3: IoT and Wireless Sensors Networks IV s9.4: SDN and Overlay Networks III s9.5: Sound Image and Signal Processing


Monday, July 3, 09:00 - 10:45

w1.1: DENVECT Session Igo to top

Room: MINOS I
Chair: Alessandro Amoroso (University of Bologna, Italy)
A Blue Monday? Try Walking on a Yellow Path
Silvia Mirri, Marco Roccetti and Paola Salomoni (University of Bologna, Italy); Catia Prandi (Madeira Interactive Technologies Institute)
Affective Impact of Social Presence in Immersive 3D Virtual Worlds
Elena Dzardanova, Vlasios Kasapakis and Damianos Gavalas (University of the Aegean, Greece)
Believable Group Behaviours for NPCs in FPS Games
Laura Anna Ripamonti (University of Milano, Italy); Silvio Gratani (Università di Milano, Italy); Dario Maggiorini (University of Milano, Italy); Davide Gadia (University of Milan, Italy); Armir Bujari (University of Padua, Italy)
I Want to Ride My Bicycle: a Microservice-Based Use Case for a MaaS Architecture
Franco Callegati (Universita` di Bologna, Italy); Giovanni Delnevo (Università di Bologna, Italy); Andrea Melis, Silvia Mirri, Marco Prandini and Paola Salomoni (University of Bologna, Italy)
Multipong: a Multiplayer Ad-Hoc Version of Pong
Marco Begolo (University of Padua, Italy); Sebastiano Valle (Università degli Studi di Padova, Italy); Marco Zanella, Armir Bujari, Ombretta Gaggi and Claudio E. Palazzi (University of Padua, Italy)

w1.2: ISUT Session Igo to top

Room: MINOS II
Chair: Damianos Gavalas (University of the Aegean, Greece)
A Learning Algorithm to Minimize the Expectation Time of Finding a Parking Place in Urban Area
Asma Houissa (Université de Versailles Saint Quentin & Institut VEDECOM, France); Dominique Barth (UVSQ, France); Nadege Faul (Institut VEDECOM, France); Thierry Mautor (University of Versailles, France)
Cooperative Data Muling from Ground Sensors to Base Stations Using UAVs
Emmanuel Tuyishimire and Antoine Bagula (University of the Western Cape, South Africa); Slim Rekhis (University of Carthage & Communication Networks and Security Research Lab., Tunisia); Noureddine Boudriga (Communication Networks and Security Research Lab., University of Carthage, Tunisia)
Dynamic Timetable Information in Smart Cities
Kalliopi Giannakopoulou (Univesrity of Patras, Greece); Sotiris E. Nikoletseas (University of Patras and Computer Technology Institute, Greece); Andreas Paraskevopoulos and Christos Zaroliagis (University of Patras, Greece)
Flow-Aware WPT k-Nearest Neighbours Regression for Short-Term Traffic Prediction
Bin Sun (Blekinge Institute of Technology, Sweden); Wei Cheng (Kunming University of Science and Technology, P.R. China); Prashant Goswami and Guohua Bai (Blekinge Institute of Technology, Sweden)

w1.3: PEDISWESA Session Igo to top

Room: PASIPHAE I
Chair: Angelos Michalas (Technological Education Institute of Western Macedonia, Greece)
A Cooperative Location Service for VANETs
Tawfiq Nebbou (Université de Tlemecen, France); Hacene Fouchal (Université de Reims Champagne-Ardenne, France); Mohamed Lehsaini (University of Tlemcen, Algeria); Marwane Ayaida (University of Reims Champagne-Ardenne, France)
An Efficient and Dynamic Pseudonyms Change System for Privacy in VANET
Walid Bouksani and Amar Bensaber Boucif (University of Quebec, Trois Rivieres, Canada)
Analysis of Checkpointing Algorithms for Primary-Backup Replication
Berkin Güler and Oznur Ozkasap (Koc University, Turkey)
Application-Network Collaboration Using SDN for Ultra-Low Delay Teleorchestras
Emmanouil Lakiotakis (Foundation for Research and Technology - Hellas (FORTH) & Institute of Computer Science (ICS), Greece); Christos Liaskos (Institute of Computer Science, Foundation of Research and Technology, Hellas, Greece); Xenofontas Dimitropoulos (FORTH-ICS, Greece)
Compressed Incremental Checkpointing for Efficient Replicated Key-Value Stores
Berkin Güler and Oznur Ozkasap (Koc University, Turkey)

w1.4: ICTS4eHealth Session Igo to top

Room: PASIPHAE II
Chair: Ivanoe De Falco (CNR, Italy)
A Big Data Architecture for Knowledge Discovery in Pubmed Articles
Francesco Gargiulo and Stefano Silvestri (Institute for High Performance Computing and Networking, ICAR-CNR, Italy); Mario Ciampi (Institute of High Performance Computing and Networking (ICAR-CNR), Italy)
Implementing Private K-Means Clustering Using a LWE-based Cryptosystem
Anastasia Theodouli, Konstantinos Draziotis and Anastasios Gounaris (Aristotle University of Thessaloniki, Greece)
An Approach to Share MRI Data over the Cloud Preserving Patients' Privacy
Antonino Galletta (University of Messina, Italy); Lilla Bonanno (IRCSS Centro Neurolesi Bonino Pulejo, Italy); Antonio Celesti (University of Messina, Italy); Silvia Marino (IRCSS Centro Neurolesi Bonino Pulejo, Italy); Placido Bramanti (IRCCS Centro Neurolesi Bonino Pulejo, Italy); Massimo Villari (University of Messina, Italy)
DiDiER - Digitized Services in Dietary Counselling for People with Increased Health Risks Related to Malnutrition and Food Allergies
Patrick Elfert and Marco Eichelberg (OFFIS-Institut für Informatik, Germany); Johannes Tröger, Jochen Alexander Britz and Jan Alexandersson (DFKI GmbH, Germany); Ludwig Kuhn and Martin Thielen (EUROKEY, Germany); Daniel Bieber (Institut für Sozialforschung und Sozialwirtschaft, Germany); Jürgen Bauer (Agaplesion Bethanien Krankenhaus Heidelberg gGmbH, Germany); Susanne Teichmann (DAAB German Allergy and Asthma Association, Germany); Janina Sauer, Alexander Münzberg and Norbert Rösch (University of Applied Science Kaiserslautern, Germany); Julia Wojzischke, Rebecca Diekmann and Andreas Hein (Universität Oldenburg, Germany)
Cyber-Healthcare Cloud Computing Interoperability Using the HL7-CDA Standard
Bigomokero Antoine Bagula (University of the Western Cape & ISAT Laboratory, South Africa)

t1.5: CIPSEC Project Tutorial: Session Igo to top

CIPSEC Critical Infrastructure Protection
Room: APOLLON

Course #1: Securing Critical Infrastructures through hardware means: Strong points and weaknesses of Hardware security tokens – UOP

Description: In this Lecture, an overview of the most important hardware based technologies that are currently used in order to protect security sensitive devices is made and the most important security gaps that such technologies may have are discussed. The focus points of such technologies are primarily focused on security tokens that can be physically associated to a host device to provide security services like smart cards or Trusted Platform Modules (TPMs). The overall architecture of such modules is presented and the design challenges to realize them are highlighted. Also, the cryptography/security services that they can provide is discussed. Furthermore, in the lecture, possible vulnerabilities that may exist in a security module are presented. More specifically, the lecture is focused on side channel analysis attacks and fault injection analysis attacks, showing how such attacks can be mounted and how they can compromise the most important assets of a Security token i.e. its cryptography keys. Side channel attacks exploit the information leaking from the physical characteristics of a Hardware or software security/cryptography implementation (power consumption, timing, electromagnetic emission, etc.) and can be easily mounted on a badly implemented Security token. The most widely used applied countermeasures for such attacks are described in the lecture. Finally, the hardware security token (the University of Patras Hardware Security Module) design approach followed in the CIPSEC project is presented and the overall security services it provides is presented

Target Audience: Generic and experts
Security Areas Covered: Hardware Security
Duration 45’
Presenter(s): Apostolos P. Fournaris (University of Patras) Adjunct Assistant Professor, Senior Researcher.


Course #2: Honeypots

Description: This course aims to help attenders to understand the concept of honeypots and their role in the protection of critical infrastructures in the context of the CIPSEC project. In the first part, the course will start with a general presentation on honeypots to inform the audience on how this security mechanism operates in order to detect potential network threats. The first part will conclude by summarizing the benefits of using honeypots in the context of the CIPSEC framework in order to enhance the security of critical infrastructures. In the second part of the course, FORTH will demonstrate the Honeypot VMs tool which will be used in the CIPSEC project. This tool automates the process of honeypot deployment and configuration and provides visualization of results and alerting mechanisms for administrators. It is based on the Dionaea low interaction honeypot, and the Kippo medium-interaction honeypot. The first is a general-purpose honeypot which offers multiple emulators for network services, while the second is specialized in the SSH protocol. Through the course, the audience will have the opportunity to see how this infrastructure is operated through a web based control panel and how a specific attack can be performed and captured in real time.

Target Audience: IT practitioners Security
Security Areas Covered: Network traffic anomaly detection
Duration 45’
Presenter(s): Antonis Krithinakis (FORTH), Christos Papachristos (FORTH), Manos Athanatos (FORTH)

Monday, July 3, 11:15 - 13:00

w2.1: DENVECT Session IIgo to top

Room: MINOS I
Chair: Armir Bujari (University of Padua, Italy)
On the Design of an App for Foreign Languages Incidental Learning
Silvia Mirri, Paola Salomoni, Marco Roccetti and Antonella Valva (University of Bologna, Italy); Giacomo Mambelli (Università di Bologna, Italy)
Preliminary Considerations on Approaching Computer Forensic
Alessandro Amoroso (University of Bologna, Italy)
TagLecture: The Gamification of Video Lecture Indexing Through Quality-based Tags
Marco Furini (University of Modena and Reggio Emilia, Italy); Silvia Mirri (University of Bologna, Italy); Manuela Montangero (University of Modena and Reggio Emilia, Italy)
TV Commercials: Improving Viewers Engagement Through Gamification and Second Screen
Roberta De Michele and Marco Furini (University of Modena and Reggio Emilia, Italy)

w2.2: ISUT Session IIgo to top

Room: MINOS II
Chair: Grammati Pantziou (Technological Educational Institution of Athens & Computer Technology Institute and Press Diophantus, Greece)
Location of Stations in a One-Way Electric Car Sharing System
Hatice Calik and Bernard Fortz (Université Libre de Bruxelles, Belgium)
Reducing Logistic Vehicle Kilometers in a City Area Based on Network Changes
Pieter Vansteenwegen (KU Leuven, Belgium); Corrinne Luteyn (KU Leuven Mobility Research Center, Belgium)
Service Availability Analysis of a Multimodal Travel Planner Using Stochastic Automata
Spyridon C Evangelatos (Inlecom Systems Ltd); Zannis Kalampoukis (CLMS Ltd, United Kingdom (Great Britain)); Ioanna Fergadioti (Inlecom Systems Ltd); Stelios Christofi (eBOS Technologies, Cyprus); Bill Karakostas (VLTN, Belgium); Yannis Zorgios (CLMS Ltd, United Kingdom (Great Britain))
The Impact of Quick Charging Stations on the Route Planning of Electric Vehicles
Bülent Çatay and Merve Keskin (Sabanci University, Turkey)

w2.3: PEDISWESA Session IIgo to top

Room: PASIPHAE I
Chair: Shie-Yuan Wang (National Chiao Tung University, Taiwan)
Dealing with User Constraints in MCDM Based Web Service Selection
Walid Serrai (USTHB University, Algeria); Abdelkrim Abdelli (USTHB University- Algiers, Algeria); Lynda Mokdad (Université de Paris 12 & Laboratoire LACL, France); Ashraf Serrai (USTHB University, Algeria)
Evaluation of Cyclic Prefix Length in OFDM System Based for Rayleigh Fading Channels Under Different Modulation Schemes
Hamid Nourollahi (Faculty of Electrical Engineering, Yadegar-e-Imam Khomeini (RAH) Branch, Islamic Azad University, Iran); Saeed Ghazi Maghrebi (Yadegar-e-Imam Khomeini (RAH) Branch, Islamic Azad University, Iran)
Multi-agent Architecture for Reliable Cyber-Physical Systems (CPS)
Teodora Sanislav (Technical University of Cluj-Napoca, Romania); Sherali Zeadally (University of Kentucky, USA); George Mois (Technical University of Cluj-Napoca, Romania); Hacene Fouchal (Université de Reims Champagne-Ardenne, France)
Queuing and Service Management for Congestion Control in Wireless Sensor Networks Using Markov Chains
Samy Hafidi (University of Sciences and Technology Houari Boumediene, Algeria); Nawel Gharbi (University of Sciences and Technology USTHB, Algeria); Lynda Mokdad (Université de Paris 12 & Laboratoire LACL, France)

w2.4: ICTS4eHealth Session IIgo to top

Room: PASIPHAE II
Chair: Pedro Brandão (University of Porto, Portugal)
A Novel System for the Automatic Extraction of a Patient Problem Summary
Maria Mercorella, Crescenzo Diomaiuta, Mario Ciampi and Giuseppe De Pietro (Institute of High Performance Computing and Networking (ICAR-CNR), Italy)
Usability Evaluation of a Geolocation Technology: Safemate
Santiago Martinez, Berglind Smaradottir and Torunn Vatnoy (University of Agder, Norway); Marius Bjonness (Safemate Co., Norway)
The Study of the Implementation and the Extension of the ISO/IEEE-11073 Standards
Yi Tang (Chongqing University, P.R. China); Xiaolian Duan (Chongqing Academy of Science and, P.R. China); Ting Fan (Chongqing University, P.R. China); Hailing Feng (Chongqing University & UTECH CO., LTD., P.R. China); Wei Jin and Bozhi Shi (Chongqing University, P.R. China)
Interval Coded Scoring Extensions for Larger Problems
Lieven Billiet and Sabine Van Huffel (KU Leuven, ESAT-STADIUS & imec Leuven); Vanya Van Belle (KU Leuven, ESAT-STADIUS)
A Comprehensive Investigation and Comparison of Machine Learning Techniques in the Domain of Heart Disease
Seyedamin Pouriyeh (University of Georgia, USA); Giovanna Sannino (Institute of High Performance Computing and Networking National Research Council of Italy, Italy); Hamid R Arabnia (University, USA); Juan B. Gutierrez and Sara Vahid (University of Georgia, USA); Giuseppe De Pietro (Institute of High Performance Computing and Networking (ICAR-CNR), Italy)

t2.5: CIPSEC Project Tutorial: Session IIgo to top

CIPSEC Critical Infrastructure Protection
Room: APOLLON

Course #3: DDoS attacks on critical infrastructures – COMSEC

Description: Large-scale distributed denial of service (DDoS) attacks on government sites have been relatively few, but there is evidence to suggest that trend may be changing for the worse. This spate of attacks has raised questions and concerns; if the Internet is vulnerable to DDoS, how reliable is our critical infrastructure, such as utility systems?

DDoS attacks are increasingly fueled by the millions of devices connected to the Internet of Things (IoT) and it is a threat because the grid is vast and constantly evolving, with some new technologies that are connected to the IoT.

This course aims to help attenders to understand the concept of the DoS & DDoS (Distributed Denial of Service) attacks and their implementation in the critical infrastructures area in the context of the CIPSEC project.

In the first part, the course will start with a general explanation on DDoS attacks in order to inform the audience how this attack take place as well as trends regarding to DDoS.

The second part dedicated to different DDoS scenarios, divided into 3 main groups:

  • Infrastructure Level DDoS
  • Application Level DDoS
  • Special DDoS Attacks
  • Finally, we will present the DDoS service attacks provided by Comsec and how we will implement this test technique as part of the CIPSEC framework and services for critical infrastructures.

    Target Audience: IT practitioners Security
    Security Areas Covered: Network and communication security
    Duration 45’
    Presenter(s): Omri Sagron, Cyber Security Consultant @ COMSEC

    Monday, July 3, 14:00 - 15:45

    w3.1: SmartIoT Session Igo to top

    Room: MINOS I
    Chair: Antonino Galletta (University of Messina, Italy)
    Eco-aware Vehicle Routing in Urban Environments
    Julian Dibbelt (Karlsruhe Institute of Technology, Germany); Damianos Gavalas (University of the Aegean, Greece); Kalliopi Giannakopoulou (University of Patras); Dionysios Kehagias (Centre for Research and Technology Hellas (CERTH), Greece); Charalampos Konstantopoulos (University of Piraeus, Greece); Spyros C. Kontogiannis (University of Ioannina, Greece); Grammati Pantziou (Technological Educational Institution of Athens & Computer Technology Institute and Press Diophantus, Greece); Dorothea Wagner (Karlsruhe Institute of Technology (KIT), Germany); Christos Zaroliagis (University of Patras, Greece)
    Multimodal Route and Tour Planning in Urban Environments
    Julian Dibbelt (Karlsruhe Institute of Technology, Germany); Damianos Gavalas and Vlasios Kasapakis (University of the Aegean, Greece); Charalampos Konstantopoulos (University of Piraeus, Greece); Spyros C. Kontogiannis (University of Ioannina, Greece); Grammati Pantziou (Technological Educational Institution of Athens & Computer Technology Institute and Press Diophantus, Greece); Dorothea Wagner (Karlsruhe Institute of Technology (KIT), Germany); Christos Zaroliagis (University of Patras, Greece)
    Introducing TLS/DTLS Secure Access Modules for IoT Frameworks: Concepts and Experiments
    Pascal Urien (Télécom ParisTech, France)
    Contextual Approach for Identifying Malicious Inter-Component Privacy Leaks in Android Apps
    Daojuan Zhang, Yuanfang Guo, Dianjie Guo and Rui Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Guangming Yu (Tsinghua University, P.R. China)

    w3.4: ICTS4eHealth Session IIIgo to top

    Room: PASIPHAE II
    Chair: Giovanna Sannino (Institute of High Performance Computing and Networking National Research Council of Italy, Italy)
    Analysis of LVAD Log Files for the Early Detection of Pump Thrombosis
    Jenny I Röbesaat and Frerk Müller-von Aschwege (OFFIS Institute for Information Technology, Germany); Nils Reiss and Thomas Schmidt (Schüchtermann-Klinik Bad Rothenfelde, Germany); Christina Feldmann, Ezin Deniz and Jan D Schmitto (Hannover Medical School, Germany); Andreas Hein (University of Oldenburg & OFFIS Institute for Information Technology, Germany)
    The Use of Predictive Models in Dynamic Treatment Planning
    Saemundur Haraldsson (University of Stirling & Janus Rehabilitation, United Kingdom (Great Britain)); Ragnheidur Brynjolfsdottir (Janus Rehabilitation, Iceland); John Woodward (University of Stirling, United Kingdom (Great Britain)); Kristin Siggeirsdottir and Vilmundur Gudnason (The Icelandic Heart Association, Iceland)
    Evaluation of Touchscreen Assistive Technology for Visually Disabled Users
    Berglind Smaradottir and Santiago Martinez (University of Agder, Norway); Jarle Håland (Kongsgård School Centre)
    A Use Case Based Requirements Specification Approach to Support the Development of a Rehabilitation System for CVD Patients: The PATH WAY Project
    Deirdre Walsh (Dublin City University, MedEx Research Group, Ireland); Paolo Zampognaro (Engineering Ingegneria Informatica S.p.A., Italy); Roselien Buys (KU Leuven, Belgium); Catherine Woods (University of Limerick, Ireland); Fabio Melillo (Engineering Ingegneria Informatica S.p.A.)
    Usability Assessment of a Health Kiosk
    João Silva (Instituto de Telecomunicações, Portugal); Pedro Brandão (University of Porto, Portugal); Rui Prior (Instituto de Telecomunicações, Universidade do Porto, Portugal)

    t3.5: CIPSEC Project Tutorial: Session IIIgo to top

    CIPSEC Critical Infrastructure Protection
    Room: APOLLON

    Course #4: Digital Forensics – AEGIS

    Description: When a crime is committed, there are important steps to be taken in order to collect evidence, preserve evidence so that they can be used in a court of law later on, analyse evidence, and draw conclusions which may range from an analysis of the MO of the perpetrators to recommendations to prevent the recurrence of the specific crime. This talk will take the audience through all the steps (Collection, Examination, Analysis, Reporting) of an effective forensic investigation using a sample case study as an example. In addition, examples from old cases will be used to give the audience an opportunity to consider the ethical, legal, procedural and financial considerations that may influence the course a forensic investigation.

    Target Audience: IT Security, Law Enforcement
    Security Areas Covered: Digital Forensics
    Duration 45’
    Presenter(s): Vassilis Prevelakis, Professor of Embedded Systems Security, TU Braunschweig, Germany.

    Monday, July 3, 16:15 - 18:00

    w4.1: SmartIoT Session IIgo to top

    Room: MINOS I
    Chair: Mario A R Dantas (UFSC, Brazil)
    CityCare: Crowdsourcing Daily Life Issue Reports in Smart Cities
    Athanasios Bousios (Hellenic Open University, Greece); Damianos Gavalas (University of the Aegean, Greece); Lambros Lambrinos (Cyprus University of Technology, Cyprus)
    Dynamic Strategies for the Optimal Embedding of Virtual Infrastructures
    Joao Monteiro Soares (Ericsson Research, Sweden); Susana Sargento and João Aparício (Instituto de Telecomunicações, Universidade de Aveiro, Portugal)
    Sensing the Cities with Social-Aware Unmanned Aerial Vehicles
    Michele Girolami (CNR- ISTI, Italy); Fabio Mavilia (CNR-ISTI, Italy); Stefano Chessa (Universita' di Pisa, Italy); Pericle Perazzo, Gianluca Dini and Marco Rasori (University of Pisa, Italy)

    w4.4: ICTS4eHealth Session IVgo to top

    Room: PASIPHAE II
    Chair: Antoine Bagula (University of the Western Cape, South Africa)
    Accurate Estimate of Blood Glucose Through Interstitial Glucose by Genetic Programming
    Ivanoe De Falco (CNR, Italy); Antonio Della Cioppa (University of Salerno, Italy); Umberto Scafuri and Ernesto Tarantino (Institute of High Performance Computing and Networking, ICAR-CNR, Italy)
    Biologically Relevant Simulations for Validating Risk Models Under Small-Sample Conditions
    Alex F Bokov (UT Health Science Center at San Antonio & Sam and Ann Barshop Institute for Aging and Longevity Studies, USA); Scott Pletcher (University of Michigan Medical School, USA); Alfredo Tirado-Ramos, Laura S Manuel and Jonathan Gelfond (UT Health Science Center at San Antonio, USA)
    Managing Diabetes: Pattern Discovery and Counselling Supported by User Data in a Mobile Platform
    Diogo Machado (Faculdade de Ciências da Universidade do Porto & Instituto de Telecomunicações, Portugal); Tiago Paiva (Faculdade de Ciências da Universidade do Porto, Portugal); Inês Dutra (University of Porto, Portugal); Vítor Costa (Universidade do Porto, Portugal); Pedro Brandão (University of Porto, Portugal)
    An Agent Model to Support Social Network-Based Palliative Care
    Nima Moradianzadeh, Pooya Moradian Zadeh, Ziad Kobti and Kathryn Pfaff (University of Windsor, Canada)
    Big Data Analytics in Genomics: The Point on Deep Learning Solutions
    Fabrizio Celesti and Antonio Celesti (University of Messina, Italy); Lorenzo Carnevale (University of Messina & IRCSS Centro Neurolesi Bonino Pulejo, Italy); Antonino Galletta, Salvatore Campo and Agata Romano (University of Messina, Italy); Placido Bramanti (IRCCS Centro Neurolesi Bonino Pulejo, Italy); Massimo Villari (University of Messina, Italy)

    t4.5: CIPSEC Project Tutorial: Session IVgo to top

    CIPSEC Critical Infrastructure Protection
    Room: APOLLON

    Course #5: A gentle introduction to advanced anonymization of databases – UPC

    Description: This presentation deals with new trends in data privacy, providing a quick glance at some of the privacy challenges and solutions in modern information technologies, with emphasis on the benefits in CIPSEC’s critical infrastructures. The first part of the presentation begins with a general overview of big-data technologies and challenges, and concludes with k-anonymous microaggregation as a privacy mechanism. The second part will discuss the cost effectiveness in advanced privacy technologies. Finally, our Data Privacy Tool will be presented.

    Target Audience: General audience
    Security Areas Covered: Statistical disclosure control
    Duration 45’
    Presenter(s): Ahmad Mezher, UPC

    Monday, July 3, 20:00 - 23:00

    Welcome Drinkgo to top

    Welcome drink @Aquila Atlantis Hotel Terrace (6th floor)

    Tuesday, July 4, 09:15 - 10:15

    k1.2: Keynote #1go to top

    Big Data: Challenges and Algorithms
    Prof. Sanguthevar Rajasekaran, Univ. of Connecticut, USA
    Room: MINOS II
    Chair: Sartaj Sahni (University of Florida, USA)

    Abstract: We live in an era of big data. Voluminous datasets are generated and have to be processed in every area of science and engineering. Efficient techniques are needed to process these data. In particular, we need tools to extract useful information from massive data sets. Society at large can benefit immensely from advances in this arena. For example, information extracted from biological data can result in gene identification, diagnosis for diseases, drug design, etc. Market-data information can be used for custom-designed catalogues for customers, supermarket shelving, and so on. Weather prediction and protecting the environment from pollution are possible with the analysis of atmospheric data. In this talk we present some challenges existing in processing big data in various disciplines. We also provide an overview of some basic techniques. In particular, we will summarize various data processing and reduction techniques.

    Tuesday, July 4, 10:45 - 12:30

    s1.1: Routing and Multicast Igo to top

    Room: MINOS I
    Chair: Dimitrios Efstathiou (Technological Educational Institute of Central Macedonia, Serres, Greece)
    Two-Aggregator Topology Optimization Without Splitting in Data Center Networks
    Soham Das and Sartaj Sahni (University of Florida, USA)
    A Steiner Tree Based Approach for the Efficient Support of Multipoint Communications in a Multi-Domain Context
    Lunde Chen (LAAS-CNRS, France); Slim Abdellatif (CNRS/LAAS & Université de Toulouse, INSA, LAAS, France); Thierry Gayraud (LAAS-CNRS, Université de Toulouse, France); Pascal Berthou (CNRS/LAAS - Université de Toulouse, France)
    Improving the Behaviour of Interconnection Networks by Using Multiple Internal Paths and Fan Outs
    Eleftherios Stergiou (ATEI of Epirus, Greece); John Garofalakis (University of Patras, Greece); Dimitrios Liarokapis (Lectuter, Greece)
    A Markov Chain-based Approximation of CCN Caching Systems
    Hamza Ben Ammar (University of Rennes 1, France); Soraya Ait Chellouche (IRISA Lab - University of Rennes 1, France); Yassine Hadjadj-Aoul (University of Rennes 1, France)
    On the Impact of Traffic Rerouting and Set-up Delay Tolerance on Connection Provisioning in Dynamic WDM Transparent Networks with QoT Constraints
    Naama Amdouni (Sys'Com Laboratory - ENIT- Tunisia, Tunisia); Taoufik Aguili (ENIT, Tunisia)

    s1.2: QoS, QoE, and Resource Management Igo to top

    Room: MINOS II
    Chair: Sergey Gorinsky (IMDEA Networks Institute, Spain)
    Experimental Comparison of Machine Learning-Based Available Bandwidth Estimation Methods over Operational LTE Networks
    Natsuhiko Sato (The University of Tokyo, Japan); Takashi Oshiba, Kousuke Nogami, Anan Sawabe and Kozo Satoda (NEC Corporation, Japan)
    Flexible Bandwidth Allocation for Big Data Transfer with Deadline Constraints
    Srinikethan Madapuzi Srinivasan, Tram Truong-Huu and Mohan Gurusamy (National University of Singapore, Singapore)
    Balancing Overhead-Minimization Objectives in Network Probing-Path Selection
    Saw Lin, Vijay Ramachandran and Tinotenda Zinyama (Colgate University, USA)
    On Expected Transmissions for Wireless Random Linear Coding
    Jalaluddin Qureshi (National University of Computer & Emerging Sciences, Pakistan); Adeel Malik (Namal College, Mianwali, Pakistan); Chuan Heng Foh (University of Surrey, United Kingdom (Great Britain))
    The Socket Store: An App Model for the Application-Network Interaction
    Christos Liaskos (Institute of Computer Science, Foundation of Research and Technology, Hellas, Greece); Ageliki Tsioliaridou (FORTH, Greece); Sotiris Ioannidis (Foundation for Research and Technology - Hellas, Greece)

    s1.3: Vehicular Networks Igo to top

    Room: PASIPHAE I
    Chair: Lucas Guardalben (University of Aveiro & Instituto de Telecomunicações, Portugal)
    A Vertical Handover Management Scheme for VANET Cloud Computing Systems
    Emmanouil Skondras (UNIPI, Greece); Angelos Michalas (Technological Education Institute of Western Macedonia, Greece); Angeliki Sgora (University of Piraeus, Greece); Dimitrios D. Vergados (University of Piraeus - Hellenic Telecommunications and Post Commission (EETT), Greece)
    A Novel Urban Traffic Management Mechanism Based on FOG
    Celso Brennand (Universidade de Campinas - UNICAMP & Universidade Federal Rural de Pernambuco - UFRPE, Brazil); Azzedine Boukerche (University of Ottawa, Canada); Rodolfo Meneguette (Instituto Federal de Educação, Ciência e Tecnologia de São Paulo, Brazil); Leandro Aparecido Villas (UNICAMP, Brazil)
    Every Dog Has Its Day: a Comparative Study of Clustering Algorithms in VANETs
    Jun Zhang (Telecom ParisTech, France); Mengying Ren (University of Technology of Troyes, France); Houda Labiod (TELECOM ParisTech (ex: ENST), France); Lyes Khoukhi (University of Technology of Troyes, France)
    Content Distribution in Vehicular Networks Through Information Filtering
    Daniel Inácio and Carlos Senna (Instituto de Telecomunicações, Portugal); Susana Sargento (Instituto de Telecomunicações, Universidade de Aveiro, Portugal)
    A Cooperative and Adaptive Resource Scheduling for Vehicular Cloud
    Rodolfo Meneguette (Instituto Federal de Educação, Ciência e Tecnologia de São Paulo, Brazil); Azzedine Boukerche (University of Ottawa, Canada)

    s1.4: SDN and Overlay Networks Igo to top

    Room: PASIPHAE II
    Chair: Stavros Souravlas (University of Macedonia, Greece)
    A Software-Defined Address Resolution Proxy
    Jun Li (Computer Network Information Center, Chinese Academy of Sciences, P.R. China); Zeping Gu (Computer Network Information Center, Chinese Academy of Sciences & University of Chinese Academy of Sciences, P.R. China); Yongmao Ren and Haibo Wu (Computer Network Information Center, Chinese Academy of Sciences, P.R. China); Shanshan Shi (Computer Network Information Center, Chinese Academy of Sciences & University of Chinese Academy of Sciences, P.R. China)
    NERV: A Constraint-Free Network Resources Manager for Virtualized Environments
    Mauro Moura and Flavio de Oliveira Silva (Federal University of Uberlândia, Brazil); Pedro Frosi Rosa (Federal University of Uberlandia & Faculty of Computing, Brazil); Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal)
    An Autonomic QoS Management Architecture for Software-Defined Networking Environments
    Felipe Volpato (Univiversidade Federal de Santa Catarina, Brazil); Madalena Pereira da Silva and Alexandre Gonçalves (Federal University of Santa Catarina (UFSC), Brazil); Mario A R Dantas (UFSC, Brazil)
    Message Bundling on Structured Overlays
    Kazuyuki Shudo (Tokyo Institute of Technology, Japan)
    CREDENCE: A Carrier Grade Software Defined Networking Control Environment Based on the JAIN SLEE Component Model
    Jhon Martinez Alegria and Caio Ferreira (Federal University of Uberlandia, Brazil); Pedro Bispo (University of Aveiro, Brazil); Flavio de Oliveira Silva (Federal University of Uberlândia, Brazil); Pedro Frosi Rosa (Federal University of Uberlandia & Faculty of Computing, Brazil); Daniel Corujo (Instituto de Telecomunicações Aveiro & Universidade de Aveiro, Portugal); Rui L Aguiar (University of Aveiro & Instituto de Telecomunicações, Portugal)

    t5.5: Tutorial #2, Session Igo to top

    From Participatory to Opportunistic Mobile Crowd Sensing: Techniques and Research Challenges
    Luca Foschini (University of Bologna, Italy), and Michele Girolami (CNR-ISTI, Italy)
    Room: APOLLON

    Mobile Crowd Sensing (MCS) enables collective data harvesting actions by coordinating citizens willing to contribute data collected via their sensor-rich smartphones that represent sources of valuable sensing information in urban environments nowadays. One of the biggest challenges in a real long-running MCS system lies in the capacity not only to attract new volunteers, but also, and most importantly, to leverage existing social ties between volunteers to keep them involved to build long-lasting MCS communities. The goal of this tutorial session is to introduce the audience to MCS techniques with a holistic approach. The first part of the tutorial will cover some key-concepts of MCS, while the second part will focus on two of the predominant MCS paradigms, namely participatory and opportunistic approaches. The tutorial will finally conclude with some of the most challenging barriers to MCS campaigns as well as some research challenges.

    LUCA FOSCHINI (luca.foschini@unibo.it) graduated from the University of Bologna, Italy, where he received a Ph.D. degree in computer engineering in 2007. He is now an assistant professor of computer engineering at the University of Bologna. His interests include distributed systems and solutions for system and service management, management of cloud computing, context data distribution platforms for smart city scenarios, context-aware session control and adaptive mobile services, and mobile crowd sensing and crowdsourcing.

    MICHELE GIROLAMI (michele.girolami@isti.cnr.it) graduated from the University of Pisa, where he received a Ph.D. degree in computer science in 2015. Currently, he is a member of research staff at CNR-ISTI with the Wireless Network Laboratory. His research interests include data forwarding and service discovery in mobile social networks, crowd sensing techniques, and context-aware middleware for smart environments.

    Tuesday, July 4, 13:45 - 15:15

    s2.1: Security, Crypto, and Privacy Igo to top

    Room: MINOS I
    Chair: Konstantinos P. Tsoukatos (TEI of Thessaly, Greece)
    DeepFlow: Deep Learning-Based Malware Detection by Mining Android Application for Abnormal Usage of Sensitive Data
    Dali Zhu, Hao Jin, Di Wu and Ying Yang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Weiyi Chen (Institute of Optoelectronics, Chinese Academy of Sciences, P.R. China)
    Large-Scale Discovery and Empirical Analysis for I2P EepSites
    Yue Gao (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Qingfeng Tan (Institute of Information Engineering, Chinese Academy of Sciences & Graduated University, Chinese Academy of Sciences, P.R. China); Jinqiao Shi, Xuebin Wang and Muqian Chen (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)
    Secure the Commodity Applications Against Address Exposure Attacks
    Xiaoguang Wang and Yong Qi (Xi'an Jiaotong University, P.R. China)
    You Can Run but You Cannot Hide from Memory: Extracting IM Evidence of Android Apps
    Antonia Nisioti, Alexios Mylonas and Vasilios Katos (Bournemouth University, United Kingdom (Great Britain)); Paul Yoo (BU Data Science Institute & University of Sydney, United Kingdom (Great Britain)); Anargyros Chryssanthou (Hellenic Data Protection Authority, Greece)

    s2.2: IoT and Wireless Sensors Networks Igo to top

    Room: MINOS II
    Chair: Dimitrios Zorbas (Univ. of La Rochelle, France)
    A Control-theoretic Approach for Duty Cycle Adaptation in Dynamic Wireless Sensor Networks
    Raja Al Kiyumi and Chuan Heng Foh (University of Surrey, United Kingdom (Great Britain)); Serdar Vural (University of Surrey & Institute for Communication Systems, United Kingdom (Great Britain)); Rahim Tafazolli (University of Surrey, United Kingdom (Great Britain))
    Shooter Localization in Wireless Acoustic Sensor Networks
    Andrea Simone Pinna (Italian Navy, Italy); Giuseppe Portaluri and Stefano Giordano (University of Pisa, Italy)
    Neutral Operation of the Minimum Energy Node in Energy-Harvesting Environments
    André Riker, Marilia Curado and Edmundo Monteiro (University of Coimbra, Portugal)
    Fault Tolerant Protocol for Data Collecting in Wireless Sensor Networks
    Jacek Bronisław Cichoń (Wroclaw University of Science and Technology & Faculty of Fundamental Problems of Technology, Poland); Maciej Gębala (Wrocław University of Science and Technology, Poland); Marcin Zawada (Wroclaw University of Technology, Poland)

    s2.3: Physical layer and Media Access Igo to top

    Room: PASIPHAE I
    Chair: Alexandre Wagemakers (Universidad Rey Juan Carlos, Spain)
    A TDMA Data-Buffering Technique That Provides Minimum Throughput Delays While Allowing Time-Slot Reassignments Without Data-Transfer Interruptions
    Edward Chandler (Milwaukee School of Engineering & ARP & Associates, Inc., USA)
    Max-SINR Scheduling in Full-Duplex OFDMA Cellular Networks with Dynamic Arrivals
    Hassan Fawaz (Saint Joseph University, Lebanon); Samer Lahoud (ESIB, Saint-Joseph University of Beirut, Lebanon); Marc Ibrahim (Saint Joseph University & Saint Joseph University - ESIB, Lebanon); Melhem El Helou (Saint Joseph University of Beirut, Lebanon)
    Waterfilling-based Resource Allocation Techniques in Downlink Non-Orthogonal Multiple Access (NOMA) with Single-User MIMO
    Marie-Josepha Youssef (Virginia Tech, USA); Joumana Farah (Lebanese University, Faculty of Engineering, Lebanon); Charbel Abdel Nour and Catherine Douillard (IMT Atlantique, France)
    Mm-Wave STSK-aided Single Carrier Block Transmission for Broadband Networking
    Talha Faizur Rahman (University of Trento, Italy); Aamir Habib (Institute of Space Technology, Pakistan); Claudio Sacchi (University of Trento, Italy); Mohammed El-Hajjar (University of Southampton, United Kingdom (Great Britain))

    s2.4: Multimediago to top

    Room: PASIPHAE II
    Chair: Damianos Gavalas (University of the Aegean, Greece)
    Content-Aware Prefetching in Over-The-Top Wireless Networks
    José Silva and André Dias (Instituto de Telecomunicações-IT, Aveiro, Portugal); João Nogueira (University of Aveiro, PT Inovação e Sistemas, SA, Portugal); Lucas Guardalben (University of Aveiro & Instituto de Telecomunicações, Portugal); Susana Sargento (Instituto de Telecomunicações, Universidade de Aveiro, Portugal)
    Cloud-based Adaptive Video Streaming: Content Storage vs. Transcoding Optimization Methods
    Konrad Karolewicz and Andrzej Beben (Warsaw University of Technology, Poland)
    Flaneur: Augmented Exploration of the Architectural Urbanscape
    Anastasia Ioannidi, Damianos Gavalas and Vlasios Kasapakis (University of the Aegean, Greece)
    A Mobile Edge Computing-assisted Video Delivery Architecture for Wireless Heterogeneous Networks
    Yue LI (University of Rennes 1 & Orange Labs, France); Pantelis A. Frangoudis (EURECOM, France); Yassine Hadjadj-Aoul (University of Rennes 1, France); Philippe Bertin (Orange Labs & Bcom, France)

    t6.5: Tutorial #2, Session IIgo to top

    From Participatory to Opportunistic Mobile Crowd Sensing: Techniques and Research Challenges
    Luca Foschini (University of Bologna, Italy), and Michele Girolami (CNR-ISTI, Italy)
    Room: APOLLON

    Mobile Crowd Sensing (MCS) enables collective data harvesting actions by coordinating citizens willing to contribute data collected via their sensor-rich smartphones that represent sources of valuable sensing information in urban environments nowadays. One of the biggest challenges in a real long-running MCS system lies in the capacity not only to attract new volunteers, but also, and most importantly, to leverage existing social ties between volunteers to keep them involved to build long-lasting MCS communities. The goal of this tutorial session is to introduce the audience to MCS techniques with a holistic approach. The first part of the tutorial will cover some key-concepts of MCS, while the second part will focus on two of the predominant MCS paradigms, namely participatory and opportunistic approaches. The tutorial will finally conclude with some of the most challenging barriers to MCS campaigns as well as some research challenges.

    LUCA FOSCHINI (luca.foschini@unibo.it) graduated from the University of Bologna, Italy, where he received a Ph.D. degree in computer engineering in 2007. He is now an assistant professor of computer engineering at the University of Bologna. His interests include distributed systems and solutions for system and service management, management of cloud computing, context data distribution platforms for smart city scenarios, context-aware session control and adaptive mobile services, and mobile crowd sensing and crowdsourcing.

    MICHELE GIROLAMI (michele.girolami@isti.cnr.it) graduated from the University of Pisa, where he received a Ph.D. degree in computer science in 2015. Currently, he is a member of research staff at CNR-ISTI with the Wireless Network Laboratory. His research interests include data forwarding and service discovery in mobile social networks, crowd sensing techniques, and context-aware middleware for smart environments.

    Tuesday, July 4, 15:45 - 17:15

    s3.1: Security, Crypto, and Privacy IIgo to top

    Room: MINOS I
    Chair: Vasileios A Karyotis (Institute of Communication and Computer Systems (ICCS) & National Technical University of Athens, Greece)
    Enhancing Secrecy by Full-Duplex Antenna Selection in Cognitive Networks
    Gaojie Chen and Justin P Coon (University of Oxford, United Kingdom (Great Britain))
    Enhancement of Transmission Security for OFDM Based Systems
    Dimitrios Efstathiou (Technological Educational Institute of Central Macedonia, Serres, Greece); Despoina Tsipouridou (Technical University of Crete, Greece); George Papadopoulos and Fotini-Niovi Pavlidou (Aristotle University of Thessaloniki, Greece)
    Using Repeated Game for Maximizing High Priority Data Trustworthiness in Wireless Sensor Networks
    Mohamed S. Abdalzaher (Egypt Japan University of Science and Technology & National Research Institute of Astronomy and Geophysics, Egypt); Karim G Seddik (American University in Cairo, Egypt); Osamu Muta (Kyushu University, Japan)
    SecRoute: End-to-End Secure Communications for Wireless Ad-hoc Networks
    George Hatzivasilis and Ioannis Papaefstathiou (Technical University of Crete, Greece); Konstantinos Fysarakis and Ioannis Askoxylakis (FORTH-ICS, Greece)

    s3.2: QoS, QoE, and Resource Management IIgo to top

    Room: MINOS II
    Chair: Eirini Eleni Tsiropoulou (University of Maryland, USA)
    A Cloudlet-based Task-centric Offloading to Enable Energy-efficient Mobile Applications
    Shichao Guan, Robson De Grande and Azzedine Boukerche (University of Ottawa, Canada)
    5G Wholesale Services and Pricing
    Manos Dramitinos and George Stamoulis (Athens University of Economics and Business, Greece); Håkon Lønsethagen (Telenor Research, Norway)
    Modeling Profit of Sliced 5G Networks for Advanced Network Resource Management and Slice Implementation
    Bin Han (University of Kaiserslautern, Germany); Shreya Tayade (Technische Universität Kaiserslautern, Germany); Hans D. Schotten (University of Kaiserslautern, Germany)
    An Advertising Revenue Model for Access ISPs
    Pradeep Bangera and Syed Hasan (PriceFlier); Sergey Gorinsky (IMDEA Networks Institute)

    s3.3: Physical Layer and Media Access IIgo to top

    Room: PASIPHAE I
    Chair: Dimitrios P Pezaros (University of Glasgow, United Kingdom (Great Britain))
    Boundary-enabled Fair Scheduling in Downlink Multi-Carrier Multiple-Access Networks
    Ting Yang, Fabien Héliot, Chuan Heng Foh and Klaus Moessner (University of Surrey, United Kingdom (Great Britain))
    Practical Loss Inference in Uncertain Networks
    Xinlei Yu, Yuqi Ye and Jing Wang (Anhui Agriculture University, P.R. China); Yan Qiao (Anhui Agricultural University & School of Information and Computer, P.R. China)
    Communication with Partial Noisy Feedback
    Gang Wang (University of Connecticut, USA); Marten van Dijk (University of Conneticut, USA); Chengjuan Chang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China)
    Real-time Interference Mitigation by Randomized Convex Approximation
    Konstantinos P. Tsoukatos (TEI of Thessaly, Greece)

    s3.4: Cloud and Virtualization Igo to top

    Room: PASIPHAE II
    Chair: Mario Dantas (Federal University of Santa Catarina, Brazil)
    A Joint Bloom Filter and Cross-encoding for Data Verification and Recovery in Cloud
    Shengjun Zhang and Hang Zhou (Peking University, P.R. China); Yahui Yang (School of Software and Microeclectronics, Peking University, P.R. China); Zhonghai Wu (Peking University, P.R. China)
    Re-optimizing the Embedding of Virtual Infrastructures
    Joao Monteiro Soares (Ericsson Research, Sweden); Susana Sargento (Instituto de Telecomunicações, Universidade de Aveiro, Portugal)
    Comparing the Performance of OS-level Virtualization Tools in SoC-based Systems: The Case of I/O-bound Applications
    David Beserra (Universidade Federal de Sergipe, Brazil & Université Paris 1 Panthéon-Sorbonne, France); Manuele Kirsch Pinheiro and Carine Souveyet (Université Paris 1 - Panthéon Sorbonne, France); Luiz Angelo Steffenel (Université de Reims Champagne-Ardenne, France); Edward David Moreno (UFS - Federal University of Sergipe, Brazil)
    Deployment Orchestration of Microservices with Geographical Constraints for Edge Computing
    Massimo Villari, Antonio Celesti, Giuseppe Tricomi, Antonino Galletta and Maria Fazio (University of Messina, Italy)

    s3.5: Routing and Multicast IIgo to top

    Room: APOLLON
    Chair: Edward Chandler (Milwaukee School of Engineering & ARP & Associates, Inc., USA)
    Resource-constrained P2P Streaming Overlay Construction for Efficient Joining Under Flash Crowds
    Eliseu C Miguel (Universidade Federal de Alfenas, Brazil); Italo Cunha (Universidade Federal de Minas Gerais, Brazil); Cristiano M. Silva (Universidade Federal de São João Del-Rei, Brazil); Fernando Carvalho (Universidade Federal de Minas Gerais, Brazil); Sergio Campos (Federal University of Minas Gerais, Brazil)
    JLPR: Joint Range-Based Localization Using Trilateration and Packet Routing in Wireless Sensor Networks with Mobile Sinks
    Maurício Bertanha and Richard W. Pazzi (University of Ontario Institute of Technology, Canada)
    On Communication Cost vs. Load Balancing in Content Delivery Networks
    Mahdi Jafari Siavoshani (Sharif University of Technology, Iran); Seyed Pooya Shariatpanahi (Institute for Research in Fundamental Sciences (IPM), Iran); Hamid Ghasemi (Sharif University of Technology, Iran); Ali Pourmiri (School of Computer Science, Institute for Research in Fundamental Sciences, Tehran, Irans, Iran)
    HLAF: Heterogeneous-Latency Adaptive Forwarding Strategy for Peer-Assisted Video Streaming in NDN
    Yuhang Ye, Brian Lee, Ronan Flynn, Niall Murray and Yuansong Qiao (Athlone Institute of Technology, Ireland)

    Tuesday, July 4, 17:45 - 19:45

    Visit to Knossos archeological site.go to top

    There will be Busses to take us to Knossos Palace. The departure point is at Leoforos dimokratias 21 (venizelos statue). It is 6 minuntes walk from the ISCC Venue.

    Directiions here

    Your ISCC badge is the ticket for the event.

    Tuesday, July 4, 20:00 - 23:00

    Gala Dinnergo to top

    The Gala Diner will take place at Almyra, that is located Agia Pelagia 23 km west of Heraklion City. The buses will take us there will depart from Knossos at about 19:30.

    Wednesday, July 5, 09:00 - 10:00

    k2.2: Keynote #2go to top

    Murphy Loves Constructive Interference
    Dr. R Venkatesha Prasad, Delft University of Technology, NL
    Room: MINOS II
    Chair: Massimo Villari (University of Messina, Italy)

    The power of the Constructive Interference (CI) phenomenon was exploited for the first time by Ferrari et al. through their Glossy paper in IPSN 2011. Instead of avoiding interference by neighboring nodes, the Glossy protocol deliberately orchestrates simultaneous transmissions to achieve fast and efficient network-wide flooding. That insight of "embracing interference" prompted many researchers to go back to the drawing board. However, from the previous studies, there appears to be an inconsistent and often contradicting picture about the working of CI. In this keynote I will sketch the main developments around Constructive Interference over the last 5 years. Further, I will present not only the understanding of CI with theory and rigorous experimentation, but also question its actual existence.

    Wednesday, July 5, 10:30 - 12:00

    s4.1: Security, Crypto, and Privacy IIIgo to top

    Room: MINOS I
    Chair: Nicolas Kourtellis (Telefonica I+D, Spain)
    A Reactive Security Framework for Operational Wind Parks Using Service Function Chaining
    Konstantinos Fysarakis (FORTH-ICS, Greece); Nikolaos E. Petroulakis (Foundation for Research and Technology - Hellas, Greece); Andreas Roos (Deutsche Telekom AG, Germany); Khawar Abbasi (Intel, Ireland); Petra Vizarreta (Technical University of Munich, Germany); George Petropoulos (Intracom SA Telecom Solutions, Greece); Ermin Sakic (Siemens AG, Germany); George Spanoudakis (City University London, United Kingdom (Great Britain)); Ioannis Askoxylakis (FORTH-ICS, Greece)
    SDNScore: A Statistical Defense Mechanism Against DDoS Attacks in SDN Environment
    Kübra Kalkan (Boğaziçi University & Telematics and Informatics Research Center (TAM), Turkey); Gurkan Gur and Fatih Alagoz (Bogazici University, Turkey)
    OAuth-IoT: An Access Control Framework for the Internet of Things Based on Open Standards
    Savio Sciancalepore, Giuseppe Piro, Daniele Caldarola and Gennaro Boggia (Politecnico di Bari, Italy); Giuseppe Bianchi (University of Rome "Tor Vergata", Italy)
    Acceleration of RSA Processes Based on Hybrid ARM-FPGA Cluster
    Xu Bai, Lei Jiang and Qiong Dai (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Jia Jia Yang (University of Chinese Academy of Sciences & Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Jianlong Tan (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China)

    s4.2: Physical Layer and Media Access IIIgo to top

    Room: MINOS II
    Chair: Giuseppe Di Modica (University of Catania, Italy)
    Optimised CSMA/CA Protocol for Safety Messages in Vehicular Ad-Hoc Networks
    Giorgia V Rossi (Imperial College London, United Kingdom (Great Britain)); Kin K. Leung (Imperial College, United Kingdom (Great Britain))
    Optimization and Resource Management in NOMA Wireless Networks Supporting Real and Non-real Time Service Bundling
    Panagiotis Vamvakas (National Technical University of Athens, Greece); Eirini Eleni Tsiropoulou (University of Maryland, USA); Symeon Papavassiliou (National Technical University of Athens, Greece); John Baras (University of Maryland, College Park, USA)
    Selective Overlay Mode Operation for D2D Communication in Dense 5G Cellular Networks
    Divija Swetha Gadiraju (IIIT-H, India); Rama Garimella (IIIT Hyderabad, India)
    Enhanced Spread in Time On-Off Keying Technique for Dense Terahertz Nanonetworks
    Hakim Mabed (UFC/FEMTO-ST Institute, France)

    s4.3: Cloud and Virtualization IIgo to top

    Room: PASIPHAE I
    Chair: Massimo Villari (University of Messina, Italy)
    Analyzing the IT Subsystem Failure Impact on Availability of Cloud Services
    Guto Leoni (Federal University of Pernambuco, Brazil); Patricia Takako Endo (University of Pernambuco, Brazil); Glauco Estácio Gonçalves (Federal Rural University of Pernambuco, Brazil); Daniel Rosendo, Demis Gomes, Judith Kelner and Djamel Hadj Sadok (Federal University of Pernambuco, Brazil); Mozhgan Mahloo (Ericsson Research, Sweden)
    Designing Resilient WDM Data Center Networks for Dynamic Lightpath Demands
    Saja Al Mamoori, Arunita Jaekel and Subir Bandyopadhyay (University of Windsor, Canada)
    Towards an Application Level Elasticity by Middleware
    Tércio de Morais (Federal University of Alagoas, Brazil); Nelson Souto Rosa (Federal University of Pernambuco, Brazil)
    Evaluating the Cooling Subsystem Availability on a Cloud Data Center
    Demis Gomes (Federal University of Pernambuco, Brazil); Patricia Takako Endo (University of Pernambuco, Brazil); Glauco Estácio Gonçalves (Federal Rural University of Pernambuco, Brazil); Daniel Rosendo, Guto Leoni, Judith Kelner and Djamel Hadj Sadok (Federal University of Pernambuco, Brazil); Mozhgan Mahloo (Ericsson Research, Sweden)

    s4.4: Cognitive Radio Networks and SDRgo to top

    Room: PASIPHAE II
    Chair: Fung Po Tso (Loughborough University, United Kingdom (Great Britain))
    Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio Networks
    Mohammad Aghababaie Alavijeh (University of Tehran, Iran); Behrouz Maham (Nazarbayev University, Kazakhstan); Zhu Han (University of Houston, USA); Walid Saad (Virginia Tech, USA)
    Software-Defined Radio Proof-of-Concept for Chaos-Based Coded Modulations
    Alexandre Wagemakers (Universidad Rey Juan Carlos, Spain); Francisco J. Escribano (Universidad de Alcalá, Spain)
    A Distributed Cooperative Spectrum Resource Allocation in Smart Home Cognitive Wireless Sensor Networks
    Aroua Sabrine (University of la Rochelle & ENSI, France); Inès El Korbi (University of Manouba, Tunisia); Yacine Ghamri-Doudane (University of la Rochelle, France); Leila Azzouz Saidane (Lab CRISTAL- ENSI, University Manouba, Tunisia)
    Dynamic Role Assignment in Software-Defined Wireless Networks
    Pablo Graubner and Markus Sommer (University of Marburg, Germany); Matthias Hollick (Technische Universität Darmstadt & Secure Mobile Networking Lab, Germany); Bernd Freisleben (Philipps-Universität Marburg, Germany)

    t7.5: Tutorial #3, Session Igo to top

    Wireless Communications and Networking with Unmanned Aerial Vehicles
    Walid Saad (ECE, Virginia Tech, USA)
    Room: APOLLON

    Unmanned aerial vehicles (UAVs) are expected to become an integral component of future smart cities as they will be widely and massively deployed for a variety of critical applications that include surveillance, package delivery, disaster and recovery, remote sensing, and transportation, among others. More recently, in the telecom arena, flying drones are now envisioned by operators to help provide broadband access to under-developed areas, to support existing cellular networks, or to provide hotspot coverage during sporting events. These flying base station drones will introduce a unique capability of providing a rapidly deployable, highly flexible, wireless communication architecture that can strongly complement existing cellular networks. UAVs can provide "on-demand" densification, help push content closer to the end-user at a reduced cost and be made autonomous to a large extent. Clearly, UAVs will revolutionize the wireless industry thus creating a pertinent need to understand the potential and challenges of wireless communications using UAVs. To this end, the goal of this tutorial is to provide a comprehensive introduction to wireless communications using UAVs while delineating the potential opportunities, roadblocks, and challenges facing the widespread deployment of UAVs for communication purposes. First, the tutorial will shed light on the intrinsic properties of the air-to-ground and air-to-air channel models while pinpointing how such channels differ from classical wireless terrestrial channels. Second, we will introduce the fundamental performance metrics and limitations of UAV-based communications. In particular, using tools from communication theory and stochastic geometry, we will provide insights on the quality-of-service that can be provided by UAV-based wireless communications, in the presence of various types of ground and terrestrial networks as well as in the presence of strict flight time constraints. Subsequently, having laid the fundamental performance metrics, we will introduce the analytical and theoretical tools needed to understand how to optimally deploy and operate UAVs for communication purposes. In particular, we will study several specific UAV deployment and mobility scenarios and we will provide new mathematical techniques, from optimization, game, and probability theory that can enable one to dynamically deploy and move UAVs for optimizing wireless communications. Moreover, we will study, in detail, the challenges of resource allocation in networks that rely on UAV-based communications with a focus on the use of UAVs as proactive caching base stations, in the sky. Throughout this tutorial, we will highlight the various performance tradeoffs pertaining to UAV communications ranging from energy efficiency to mobility and coverage. The tutorial concludes with an overview on future opportunities and challenges in this area.

    Walid Saad (S'07, M'10, SM'15) received his Ph.D degree from the University of Oslo in 2010. Currently, he is an Associate Professor at the Department of Electrical and Computer Engineering at Virginia Tech, where he leads the Network Science, Wireless, and Security (NetSciWiS) laboratory, within the Wireless@VT research group. His research interests include wireless networks, game theory, cybersecurity, unmanned aerial vehicles, and cyber-physical systems. Dr. Saad is the recipient of the NSF CAREER award in 2013, the AFOSR summer faculty fellowship in 2014, and the Young Investigator Award from the Office of Naval Research (ONR) in 2015. He was the author/co-author of five conference best paper awards at WiOpt in 2009, ICIMP in 2010, IEEE WCNC in 2012, IEEE PIMRC in 2015, and IEEE SmartGridComm in 2015. He is the recipient of the 2015 Fred W. Ellersick Prize from the IEEE Communications Society. In 2017, Dr. Saad was named College of Engineering Faculty Fellow at Virginia Tech. From 2015 - 2017, Dr. Saad was named the Steven O. Lane Junior Faculty Fellow at Virginia Tech. He currently serves as an editor for the IEEE Transactions on Wireless Communications, IEEE Transactions on Communications, and IEEE Transactions on Information Forensics and Security.

    Wednesday, July 5, 13:30 - 15:00

    s5.1: Security, Crypto, and Privacy IVgo to top

    Room: MINOS I
    Chair: Mina Sheikhalishahi (IIT-CNR, Italy)
    Two Layers Multi-class Detection Method for Network Intrusion Detection System
    Yali Yuan (University of Goettingen, Germany); Liuwei Huo (Northeastern University, P.R. China); Dieter Hogrefe (University of Goettingen, Germany)
    Stream Learning and Anomaly-based Intrusion Detection in the Adversarial Settings
    Eduardo Viegas (PUCPR, Brazil); Altair O. Santin (Pontifical Catholic University of Parana (PUCPR), Brazil); Vilmar Abreu (PUCPR, Brazil); Luiz E. S. Oliveira (Federal University of Parana, Brazil)
    CEFF: An Efficient Approach for Traffic Anomaly Detection and Classification
    Geng Tian, Zhiliang Wang and Xia Yin (Tsinghua University, P.R. China); Jun Chen (China Telecom, Beijing, P.R. China); Xingang Shi (Tsinghua University, P.R. China); Chao Zhou (Cisco Systems, Inc., P.R. China); Li Zimu and Yingya Guo (Tsinghua University, P.R. China)
    Flow-Based Intrusion Detection System for SDN
    Georgi A. Ajaeiya, Nareg Adalian, Imad H Elhajj, Ayman Kayssi and Ali Chehab (American University of Beirut, Lebanon)

    s5.2: IoT and Wireless Sensors Networks IIgo to top

    Room: MINOS II
    Chair: Manos Dramitinos (Athens University of Economics and Business, Greece)
    A Mechanism to Control the Congestion in Machine-to-Machine Communication in LTE-A Networks
    David Aragão (Universidade Federal do Ceará, Brazil); Dario Vieira (EFREI, France); Miguel Franklin de Castro (Federal University of Ceará, Brazil)
    Link Quality and Path Based Clustering in IEEE802.15.4-2015 TSCH Networks
    Alexandros Mavromatis (University of Bristol, United Kingdom (Great Britain)); Georgios Z. Papadopoulos (IMT Atlantique, France); Xenofon Fafoutis, Angelos Goulianos and George Oikonomou (University of Bristol, United Kingdom (Great Britain)); Periklis Chatzimisios (Alexander TEI of Thessaloniki, Greece); Theo Tryfonas (University of Bristol, United Kingdom (Great Britain))
    Non-linear Barrier Coverage Using Mobile Wireless Sensors
    Ashutosh Baheti and Arobinda Gupta (Indian Institute of Technology, Kharagpur, India)
    Long Range Communications in Urban and Rural Environments
    Rúben Oliveira (Instituto de Telecomunicações - Aveiro & University of Aveiro, Portugal); Lucas Guardalben (University of Aveiro & Instituto de Telecomunicações, Portugal); Susana Sargento (Instituto de Telecomunicações, Universidade de Aveiro, Portugal)

    s5.3: Cloud and Virtualization IIIgo to top

    Room: PASIPHAE I
    Chair: Pedro Brandão (University of Porto, Portugal)
    MiniWorld: Resource-aware Distributed Network Emulation via Full Virtualization
    Nils Schmidt, Lars Baumgärtner and Patrick Lampe (University of Marburg, Germany); Kurt Geihs (University of Kassel, Germany); Bernd Freisleben (Philipps-Universität Marburg, Germany)
    Building Cost Efficient Cloud Data Centers via Geographical Load Balancing
    Yi Xu (Southeast University, P.R. China); Yong Zhan and Du Xu (University of Electronic Science and Technology of China, P.R. China)
    Multi-objective Optimization for Computation Offloading in Mobile-edge Computing
    LiQing Liu (Yanshan University, P.R. China); Zheng Chang (University of Jyväskylä, Finland); Xijuan Guo (Yan Shan University, P.R. China); Tapani Ristaniemi (University of Jyväskylä, Finland)
    Real-Time Task Scheduling for Joint Energy Efficiency Optimization in Data Centers
    Youshi Wang and Fa Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Rui Wang (The Hong Kong University of Science and Technology, Hong Kong); Yangguang Shi (Technion - Israel Institute of Technology, Israel); Hua Guo (State Grid Jingzhou Electric Power Company, Jingzhou, Hubei, P.R. China); Zhiyong Liu (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China)

    s5.4: Big Data and Data Mining Igo to top

    Room: PASIPHAE II
    Chair: Antonino Galletta (University of Messina, Italy)
    Spark-based Streamlined Metablocking
    Tiago Brasileiro Araújo and Carlos Pires (Federal University of Campina Grande (UFCG), Brazil); Thiago Nóbrega (Paraíba State University, Brazil)
    Efficient Spark-Based Framework for Big Geospatial Data Query Processing and Analysis
    Isam Mashhour Aljawarneh and Paolo Bellavista (University of Bologna, Italy); Antonio Corradi (University of Bologna & CIRI ICT, Italy); Luca Foschini, Rebecca Montanari and Andrea Zanotti (University of Bologna, Italy)
    How to Enable Clinical Workflows to Integrate Big Healthcare Data
    Lorenzo Carnevale (University of Messina & IRCSS Centro Neurolesi Bonino Pulejo, Italy); Antonio Celesti and Maria Fazio (University of Messina, Italy); Placido Bramanti (IRCCS Centro Neurolesi Bonino Pulejo, Italy); Massimo Villari (University of Messina, Italy)
    Probe Sharing: A Simple Technique to Improve on Sparrow
    Wenzhuo Li and Chuang Lin (Tsinghua University, P.R. China); Puheng Zhang (Tsinghua University & Logistical Scientific Research Institute, P.R. China); Mao Miao (Tsinghua University, P.R. China)

    t8.5: Tutorial #3, Session IIgo to top

    Wireless Communications and Networking with Unmanned Aerial Vehicles
    Walid Saad (ECE, Virginia Tech, USA)
    Room: APOLLON

    Unmanned aerial vehicles (UAVs) are expected to become an integral component of future smart cities as they will be widely and massively deployed for a variety of critical applications that include surveillance, package delivery, disaster and recovery, remote sensing, and transportation, among others. More recently, in the telecom arena, flying drones are now envisioned by operators to help provide broadband access to under-developed areas, to support existing cellular networks, or to provide hotspot coverage during sporting events. These flying base station drones will introduce a unique capability of providing a rapidly deployable, highly flexible, wireless communication architecture that can strongly complement existing cellular networks. UAVs can provide "on-demand" densification, help push content closer to the end-user at a reduced cost and be made autonomous to a large extent. Clearly, UAVs will revolutionize the wireless industry thus creating a pertinent need to understand the potential and challenges of wireless communications using UAVs. To this end, the goal of this tutorial is to provide a comprehensive introduction to wireless communications using UAVs while delineating the potential opportunities, roadblocks, and challenges facing the widespread deployment of UAVs for communication purposes. First, the tutorial will shed light on the intrinsic properties of the air-to-ground and air-to-air channel models while pinpointing how such channels differ from classical wireless terrestrial channels. Second, we will introduce the fundamental performance metrics and limitations of UAV-based communications. In particular, using tools from communication theory and stochastic geometry, we will provide insights on the quality-of-service that can be provided by UAV-based wireless communications, in the presence of various types of ground and terrestrial networks as well as in the presence of strict flight time constraints. Subsequently, having laid the fundamental performance metrics, we will introduce the analytical and theoretical tools needed to understand how to optimally deploy and operate UAVs for communication purposes. In particular, we will study several specific UAV deployment and mobility scenarios and we will provide new mathematical techniques, from optimization, game, and probability theory that can enable one to dynamically deploy and move UAVs for optimizing wireless communications. Moreover, we will study, in detail, the challenges of resource allocation in networks that rely on UAV-based communications with a focus on the use of UAVs as proactive caching base stations, in the sky. Throughout this tutorial, we will highlight the various performance tradeoffs pertaining to UAV communications ranging from energy efficiency to mobility and coverage. The tutorial concludes with an overview on future opportunities and challenges in this area.

    Walid Saad (S'07, M'10, SM'15) received his Ph.D degree from the University of Oslo in 2010. Currently, he is an Associate Professor at the Department of Electrical and Computer Engineering at Virginia Tech, where he leads the Network Science, Wireless, and Security (NetSciWiS) laboratory, within the Wireless@VT research group. His research interests include wireless networks, game theory, cybersecurity, unmanned aerial vehicles, and cyber-physical systems. Dr. Saad is the recipient of the NSF CAREER award in 2013, the AFOSR summer faculty fellowship in 2014, and the Young Investigator Award from the Office of Naval Research (ONR) in 2015. He was the author/co-author of five conference best paper awards at WiOpt in 2009, ICIMP in 2010, IEEE WCNC in 2012, IEEE PIMRC in 2015, and IEEE SmartGridComm in 2015. He is the recipient of the 2015 Fred W. Ellersick Prize from the IEEE Communications Society. In 2017, Dr. Saad was named College of Engineering Faculty Fellow at Virginia Tech. From 2015 - 2017, Dr. Saad was named the Steven O. Lane Junior Faculty Fellow at Virginia Tech. He currently serves as an editor for the IEEE Transactions on Wireless Communications, IEEE Transactions on Communications, and IEEE Transactions on Information Forensics and Security.

    Wednesday, July 5, 15:30 - 17:00

    s6.1: Security, Crypto, and Privacy Vgo to top

    Room: MINOS I
    Chair: Dr. Konstantinos Fysarakis (FORTH, Greece)
    Locating Victims of Destructive Targeted Attacks Based on Suspicious Activity Spike Train
    Nobutaka Kawaguchi, Hideyuki Tomimura and Tetsutoshi Komiyama (Hitachi, ltd., Japan); Kosuke Kubota and Mamoru Tsuichihara (Hitachi Advanced Systems Corporation, Japan)
    Which Secure Transport Protocol for a Reliable HTTP/2-based Web Service: TLS or QUIC ?
    Antoine Saverimoutou (Orange, France); Bertrand Mathieu (Orange Labs, France); Sandrine Vaton (IMT Atlantique, France)
    Anomaly Detection Approach to Keystroke Dynamics Based User Authentication
    Elena Ivannikova (University of Jyväskylä, Finland); Gil David (University of Jyvaskyla, Finland); Timo Hämäläinen (University of Jyväskylä, Finland)
    Privacy-Preserving Text Mining as a Service
    Gianpiero Costantino (IIT - CNR, Italy); Antonio La Marra (IIT-CNR, Italy); Fabio Martinelli (CNR-IIT, Italy); Andrea Saracino (Istituto di Informatica e Telematica, Italy); Mina Sheikhalishahi (IIT-CNR, Italy)

    s6.2: Physical Layer and Media Access IVgo to top

    Room: MINOS II
    Chair: Antonio A.F. Loureiro (Federal University of Minas Gerais, Brazil)
    A Survey on Decoding Schedules of LDPC Convolutional Codes and Associated Hardware Architectures
    Hayfa Ben Thameur (Higher School Of Communications Of Tunis (SUP'COM), University Of Carthage, Tunisia); Bertrand Le Gal (University of Bordeaux, France); Nadia Khouja (CIRTA'COM Laboratory Sup'Com Tunis, Tunisia); Fethi Tlili (Ecole Supérieure de Communications de Tunis, Tunisia); Christophe Jego (IMS CNRS Laboratory & IPB ENSEIRB-MATMECA, France)
    Renovate High Performance User-level Stacks' Innovation Utilizing Commodity Network Adaptors
    Mao Miao, Xiaohui Luo, Fengyuan Ren, Wenxue Cheng, Jing Xie, Wenzhuo Li and Xiaolan Liu (Tsinghua University, P.R. China)
    Widely Linear Equalizer Performance with Multiple Independent Interferences
    Hayfa Fhima (Conservatoire National des arts et Metiers & Ecole Superieure des Communications de Tunis, France); Rafik Zayani (Innov'COM, Sup'Com, Tunisia); Hmaied Shaiek (CNAM, France); Daniel Roviras (Cnam, France); Bruno Chang (Federal University of Technology - Paraná, Brazil); Ridha Bouallegue (Innov'COM @ Sup'Com., Tunisia)
    RCBurst: a Mechanism to Mitigate the Impact of Hidden Terminals in Home WLANs
    Mustafa Al-Bado, Cormac J. Sreenan and Kenneth N Brown (University College Cork, Ireland)

    s6.3: Biological and Molecular Communicationsgo to top

    Room: PASIPHAE I
    Chair: Chuan Heng Foh (University of Surrey, United Kingdom (Great Britain))
    An Efficient CNN-based Classification on G-protein Coupled Receptors Using TF-IDF and N-gram
    Cheng Ling, Man Li and Jingyang Gao (Beijing University of Chemical Technology, P.R. China)
    Error Probability Analysis of Neuro-Spike Communication Channel
    Keyvan Aghababaiyan (University of Tehran, Iran); Behrouz Maham (Nazarbayev University, Kazakhstan)
    2-D Channel Transfer Function for Molecular Communication with an Absorbing Receiver
    Bayram Akdeniz, Ali E. Pusane and Tuna Tugcu (Bogazici University, Turkey)
    Weighted Graph Constraint and Group Centric Non-negative Matrix Factorization for Gene-phenotype Association Prediction
    Yaogong Zhang (NanKai University, P.R. China); Yuan Wang (Tianjin University of Science and Technology, P.R. China); Jiahui Liu (NanKai University, P.R. China); Yalou Huang and Maoqiang Xie (Nankai University, P.R. China)

    s6.4: SDN and Overlay Networks IIgo to top

    Room: PASIPHAE II
    Chair: Dr. Sotiris Ioannidis (FORTH, Greece)
    OpenFlow-compliant Topology Management for SDN-enabled Information Centric Networks
    George Petropoulos (Intracom SA Telecom Solutions, Greece); Konstantinos V. Katsaros and Maria-Evgenia Xezonaki (Intracom S.A. Telecom Solutions, Greece)
    Design and Implementation of a Packet-in Buffer System for SDN Switches
    Shie-Yuan Wang, Chun-Hao Chang and Yi-Hsuan Hsieh (National Chiao Tung University, Taiwan); Chih-Liang Chou (EstiNet Technologies Inc., Taiwan)
    Performance Evaluation of OpenFlow Scheduled Bundles for Consistent Updates
    Shie-Yuan Wang and Chen Jhong (National Chiao Tung University, Taiwan); Chih-Liang Chou (EstiNet Technologies Inc., Taiwan)
    CRAFT: A Cache Reduction Architecture for Flow Tables in Software-Defined Networks
    Xianfeng Li and Wencong Xie (Peking University, P.R. China)

    s6.5: Mobile and Crowd Sensinggo to top

    Room: APOLLON
    Chair: Catherine Douillard (IMT Atlantique, France)
    A Path-based Recommendations Approach for Online Systems via Hyperbolic Network Embedding
    Nikolaos Papadis (National Technical University of Athens); Eleni G Stai (Ecole Polytechnique Fédérale de Lausanne (EPFL), Switzerland); Vasileios A Karyotis (Institute of Communication and Computer Systems (ICCS) & National Technical University of Athens, Greece)
    PIE: A Personalized Incentive for Location-aware Mobile Crowd Sensing
    Yao Wu, Yuncheng Wu, Juru Zeng, Hong Chen and Cuiping Li (Renmin University of China, P.R. China)
    Planning and Execution of Heterogeneous Service Compositions
    Alexis Huf, Ivan Salvadori and Frank Siqueira (Federal University of Santa Catarina, Brazil)
    Competence-based Mobile Community Response Networks
    Danilo Hasse (Universidade Federal de Santa Catarina - UFSC, Brazil & University of Bologna, Italy); Rebecca Montanari and Luca Foschini (University of Bologna, Italy); Carlos Roberto De Rolt (Universidade do Estado de Santa Catarina - UDESC, Italy); Fernando Gauthier (Universidade Federal de Santa Catarina - UFSC, Brazil)

    Wednesday, July 5, 17:00 - 18:00

    k3.2: Keynote #3go to top

    Chair: Mario A R Dantas (UFSC, Brazil)
    Performance, Energy and Thermal Aware Algorithms for Hybrid Multicore Processors
    Prof. Sanjay Ranka, University of Florida, USA
    Room: MINOS II

    Multi-core processors are poised to dominate the landscape of next generation computing for both desktops and exascale machines. Allocating tasks to cores remains a key challenge on these processors that is increasingly compounding for several reasons. First, with an escalating number of cores, these processors are becoming progressively complex and heterogeneous in nature. Second, the aggressive scalability of these designs can lead to significant power and heat dissipation, making the adjustment of the voltage and frequency of cores as essential considerations in scheduling. Third, efficient and effective chip-level power and performance optimization requires management of the memory usage, multi-level caches in conjunction with utilizing the cores. In this talk, I will present my research on simultaneously optimizing the goals of energy minimization and performance maximization while taking into account constraints due to thermal constraints and/or targeting multiple architectural elements such as cores and caches. Experimental results on actual machines for a variety of data parallel and task parallel applications will be presented.

    Thursday, July 6, 09:00 - 10:00

    k4.2: Keynote #4go to top

    NOMA-A Paradigm Shift in Multiple Access for Next Generation Wireless Networks
    Prof. Zhiguo Ding, Lancaster University, UK
    Room: MINOS II
    Chair: Ioannis Askoxylakis (FORTH, Greece)

    Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth generation (5G) wireless networks to meet the heterogeneous demands on low latency, high reliability, massive connectivity, improved fairness, and high throughput. The key idea behind NOMA is to serve multiple users in the same resource block, such as a time slot, subcarrier, or spreading code. The NOMA principle is a general framework, where several recently proposed 5G multiple access techniques can be viewed as special cases. Recent demonstrations by industry show that the use of NOMA can significantly improve the spectral efficiency of mobile networks. Because of its superior performance, NOMA has been also recently proposed for downlink transmission in 3rd generation partnership project long-term evolution (3GPP-LTE) systems, where the considered technique was termed multiuser superposition transmission (MUST). In addition, NOMA has been included into the next generation digital TV standard, e.g. ATSC (Advanced Television Systems Committee) 3.0, where it was termed Layered Division Multiplexing (LDM). This keynote talk is to provide an overview of the latest research results and innovations in NOMA technologies as well as their applications. Future research challenges regarding NOMA in 5G and beyond are also presented

    Thursday, July 6, 10:30 - 12:15

    s7.1: Security, Crypto, and Privacy VIgo to top

    Room: MINOS I
    Chair: Rudrapatna K Shyamasundar (Indian Institute of Technology Bombay, India)
    Efficient Attack Plan Recognition Using Automated Planning
    Adam Amos-Binks, Joshua Clark, Kirk Weston, Michael Winters and Khaled Harfoush (North Carolina State University, USA)
    Realizing Software Vault on Android Through Information-Flow Control
    Rudrapatna K Shyamasundar, Nelabhotla Narendra Kumar and Priyanka Teltumde (Indian Institute of Technology Bombay, India)
    Mitigating the ACK Counterfeiting Attack in Delay and Disruption Tolerant Networks
    Juliano Fischer Naves (Universidade Federal Fluminense & Instituto Federal de Rondônia, Brazil); Igor Monteiro Moraes (Universidade Federal Fluminense, Brazil)
    Security in Heterogeneous Distributed Storage Systems: a Practically Achievable Information-Theoretic Approach
    Marco Baldi, Franco Chiaraluce, Linda Senigagliesi, Luca Spalazzi and Francesco Spegni (Università Politecnica delle Marche, Italy)
    Randomness Testing and Comparison of Classical and Quantum Bit Generators
    Serdar Boztas (RMIT University, Australia); Benjamin Burton (The University of Queensland, Australia)

    s7.2: QoS, QoE, and Resource Management IIIgo to top

    Room: MINOS II
    Chair: Reda Ammar (University of Connecticut, USA)
    Delay-Sensitive Resource Allocation for Relay-Aided M2M Communication over LTE-Advanced Networks
    Mohammad Reza Mardani and Salman Mohebi (University of Tehran, Iran); Behrouz Maham (Nazarbayev University, Kazakhstan); Mehdi Bennis (Centre of Wireless Communications, University of Oulu, Finland)
    SloMo: An Implicit Cross-Layer Mechanism for a Better Experience on Mobile Networks
    William Diego, Isabelle Hamchaoui and Fabrice M. Guillemin (Orange Labs, France)
    Improving Video Content Access with Proactive D2D Caching and Online Social Networking
    Fausto Moraes and Kleber V Cardoso (Universidade Federal de Goiás, Brazil); Vinicius Cunha Martins Borges (Federal University of Goiás, Brazil)
    Routing Algorithm with Smart Energy Management on VCSEL Interconnected Networks
    Ilias Gravalos (University of Patras, Greece); Apostolos Siokis (Universiy of Patras, Greece); Panagiotis Kokkinos (University of Patras, Greece); Emmanouel Varvarigos (University of Patras & Computer Technology Institute, Greece)
    New Efficient Energy-Saving Techniques for Resource Allocation in Downlink OFDMA Transmission Systems
    Joumana Farah and Elie Sfeir (Lebanese University, Faculty of Engineering, Lebanon); Charbel Abdel Nour and Catherine Douillard (IMT Atlantique, France)

    s7.3: Vehicular Networks IIgo to top

    Room: PASIPHAE I
    Chair: Christos Douligeris (University of Piraeus, Greece)
    Measurement and Comparison of Sub-1GHz and IEEE 802.11p in Vehicular Networks
    Jingbang Wu and Huimei Lu (Beijing Institute of Technology, P.R. China); Yong Xiang (Tsinghua University, P.R. China)
    SuPRANO: On the Localization of Connected Vehicles in Hostile Environments: a Semi-Supervised Manifold Learning Technique
    Ahmed Soua (INRIA, France); Ridha Soua (IEEE Member, Luxembourg)
    D-Hop: a Dynamic and Distributed Protocol for Vehicle Routing
    Mariana Ramos de Brito and Fatima de Lima Procopio Duarte-Figueiredo (Pontifical Catholic University of Minas Gerais, Brazil)
    LEPR: Link Stability Estimation-based Preemptive Routing Protocol for Flying Ad Hoc Networks
    Xianfeng Li and Jiaojiao Yan (Peking University, P.R. China)
    Efficient Encounter-based Event Dissemination Protocol (E-BED) for Urban and Highway Vehicular Ad Hoc Networks
    Tomo Nikolovski and Richard W. Pazzi (University of Ontario Institute of Technology, Canada); Ademar Takeo Akabane (University of Campinas, Brazil); Leandro Aparecido Villas (UNICAMP, Brazil)

    s7.4: Wireless, Cellular, and Mobile Communicationsgo to top

    Room: PASIPHAE II
    Chair: Gaojie Chen (University of Oxford, United Kingdom (Great Britain))
    Centralized and Distributed RRH Clustering in Cloud Radio Access Networks
    Hussein Taleb (Université Saint Joseph & Ex-team Network, Lebanon); Kinda Khawam (Université de Versailles, France); Samer Lahoud (ESIB, Saint-Joseph University of Beirut, Lebanon); Melhem El Helou (Saint Joseph University of Beirut, Lebanon); Steven Martin (Paris-Sud University, France)
    Understanding the Role of Mobility in Real Mobile Ad-Hoc Networks Connectivity
    Leonardo Cotta (Universidade Federal de Minas Gerais, Brazil); Pedro O. S. Vaz de Melo and Antonio A.F. Loureiro (Federal University of Minas Gerais, Brazil)
    Outage Performance Analysis of Multicarrier Relay Selection for Cooperative Networks
    Shuping Dang, Justin P Coon, Gaojie Chen and David Simmons (University of Oxford, United Kingdom (Great Britain))
    iScan: Efficient WiFi Scan for Mobile Device Based on Client and Network Behavior Learning
    Xiaokang Sang, Qian Wu and Hewu Li (Tsinghua University, P.R. China)

    t9.5: Tutorial #4, Session Igo to top

    Demand Response in Smart Grids: a Cooperative Perspective
    John Vardakas (Iquadrat Informatica S.L., Spain) and Christos Verikoukis (Telecommunications Technological Centre of Catalonia, Spain)
    Room: APOLLON

    The major challenges that urban living faces over the last years, as a result of the increasing population density, have triggered the discussion for the development of effective solutions that target the economic, social, and environmental sustainability of urban areas. In addition, environmental concerns have stressed the need for the development of innovative solutions for the effective and flexible utilization of the renewable energy. To this end, Demand Response (DR) is considered as an effective and reliable solution that target to alter electricity consumers' demand profile in order to match the supply, while aiming at the efficient incorporation of renewable energy resources. In this Tutorial, we aim to present a comprehensive review of the emerging DR solutions that have been proposed or even become available over the last years. Moreover, we cover the new trend on energy management in cities that is based on the cooperation of buildings as an alternative solution for the optimum management of the energy generated, stored and consumed in urban buildings. Since the issue of energy consumption management is of extreme interest both from the research community as well as industry, the proposed tutorial surely covers a timely topic, and it can provide useful hints to researchers on available research lines and industrial developer on most recent and promising advances in the fields.

    John Vardakas received the Dipl.-Eng. degree in electrical and computer engineering from Democritus University of Thrace, Xanthi, Greece, in 2004 and the Ph.D. degree from the University of Patras, Patras, Greece in 2012. He is currently a Senior Researcher with Iquadrat Informatica, Barcelona, Spain. He has published more than 80 papers in journals and international conferences (h-index 15). Dr. Vardakas has participated in more than 10 competitive projects (ICT, Marie-Curie, ENIAC). He is also a regular reviewer in a number of international journals and conferences, while he has participated in the organization of several conferences. His research interests include performance analysis and simulation of communication networks and smart grids. Dr. Vardakas is a member of the IEEE, the Optical Society of America, and the Technical Chamber of Greece (TEE).

    Christos Verikoukis got his Ph.D. from the Technical University of Catalonia in 2000. He is currently a Fellow Researcher at CTTC (Head of the SMARTECH department) and an adjunct professor at Barcelona University (Electronics Department). He has published 106 journal papers and over 170 conference papers (h-index 23). He is also co-author in 3 books, 16 chapters in different books and he has filled 3 patents. He has supervised 15 Ph.D. students and 5 Post Docs researchers since 2004. Dr.Verikoukis has participated in more than 30 competitive projects while he has serve as the Principal investigator in national projects in Greece and Spain. He served as the technical manager of the ITNGREENET and the CELTIC-GREEN-T and LOOP projects. Dr.Verikoukis received the best paper award of the Communication QoS, Reliability &Modeling Symposium (CQRM) symposium in the IEEE ICC 2011 & ICC 2014 conference, of the Selected Areas in Communications Symposium in the IEEE GLOBECOM 2014 conference, of the EUCNC 2016 conference and the EURASIP 2013 Best Paper Award for the Journal on Advances in Signal Processing. He was the general Chair of the 17th, 18th and 19th IEEE Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD), and the TPC Co-Chair of the 15th IEEE International Conference on eHealth Networking, Application & Services (Healthcom) and the 7th IEEE Latincom Conference. He has also served as the symposium co-chair of the CQRM symposium in the IEEE ICC 2015 & 2016 conference. He is currently the Chair of the IEEE ComSoc Technical Committee on Communication Systems Integration and Modeling (CSIM).

    Thursday, July 6, 13:45 - 15:30

    s8.1: Smart and Distributed Systemsgo to top

    Room: MINOS I
    Chair: Vijay Ramachandran (Colgate University, USA)
    FMR-PDP: Flexible Multiple-Replica Provable Data Possession in Cloud Storage
    Limin Li (Peking University, P.R. China); Yahui Yang (School of Software and Microeclectronics, Peking University, P.R. China); Zhonghai Wu (Peking Univerisity, P.R. China)
    A Method of Eco-Driving Based on Intra-Vehicular Sensor Data
    Paulo Henrique Rettore and André Campolina (Federal University of Minas Gerais, Brazil); Leandro Aparecido Villas (UNICAMP, Brazil); Antonio A.F. Loureiro (Federal University of Minas Gerais, Brazil)
    Virtual Tether Search: a Self-Constraining Search Algorithm for Swarms in an Open Ocean
    Sherif Tolba and Reda Ammar (University of Connecticut, USA)
    EAalo: Enhanced Coflow Scheduling Without Prior Knowledge in a Datacenter Network
    Zhaogeng Li and Jun Bi (Tsinghua University, P.R. China); Yiran Zhang (Beijing University of Posts and Telecommunications, P.R. China); Chuang Wang (Huawei Corporation, P.R. China)
    Design and Analysis of A New Distributed Scheduling Approach
    Wenzhuo Li, Chuang Lin and Chao Xue (Tsinghua University, P.R. China)

    s8.2: Big Data and Data Mining IIgo to top

    Room: MINOS II
    Chair: Dario Vieira (EFREI, France)
    Multi-job Hadoop Scheduling to Process Geo-distributed Big Data
    Marco Cavallo, Giuseppe Di Modica, Carmelo Polito and Orazio Tomarchio (University of Catania, Italy)
    Changing IP Geolocation from Arbitrary Database Query Towards Multi-Databases Fusion
    Han Li (CNCERT/CC, P.R. China); Pei Zhang (Beijing University of Posts and Telecommunications, P.R. China); Zhanfeng Wang (PLA University of Science and Technology, P.R. China); Fei Du (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Ye Kuang and Ying An (Beijing University of Posts and Telecommunications, P.R. China)
    iDPL: A Scalable and Flexible Inter-continental Testbed for Data Placement Research and Experiment
    Guang Wei (Beihang University, P.R. China); Hailong Yang (Beihang University & Sino-German Joint Software Institute, P.R. China); Zhongzhi Luan and Depei Qian (Beihang University, P.R. China)
    Data Mining Approach for Estimating Cloud-Covered Areas in MODIS Satellite Images
    Mahdi Saleh, Sami Serbey and Bouchra Fahs (American University of Beirut, Lebanon)
    Improving Collaborative Filtering's Rating Prediction Quality in Dense Datasets, by Pruning Old Ratings
    Dionisis Margaris (University of Athens, Greece); Costas Vassilakis (University of Peloponnese, Greece)

    s8.3: IoT and Wireless Sensors Networks IIIgo to top

    Room: PASIPHAE I
    Chair: Nikolaos E. Petroulakis (FORTH, Greece)
    Efficient IoT Data Aggregation for Connected Health Applications
    Konstantinos Karamitsios and Theofanis G. Orphanoudakis (Hellenic Open University, Greece)
    Comparison of CoAP and CoCoA+ Congestion Control Mechanisms for Different IoT Application Scenarios
    Emilio Ancillotti (Italian National Research Council, Italy); Raffaele Bruno (IIT-CNR, Italy)
    Lightweight & Secure Industrial IoT Communications via the MQ Telemetry Transport Protocol
    Sotirios Katsikeas (Technical University of Crete, Greece); Konstantinos Fysarakis and Andreas Miaoudakis (FORTH-ICS, Greece); Amaury Van Bemten (Technical University of Munich, Germany); Ioannis Askoxylakis (FORTH-ICS, Greece); Ioannis Papaefstathiou (Technical University of Crete, Greece); Anargyros Plemenos (FORTH-ICS, Greece)
    Analytical Model for Adaptive QoS Management at the Middleware Level in IoT
    Yassine Banouar (LAAS-CNRS & Université de Toulouse - UPS, France); Thierry Monteil (LAAS-CNRS, University of Toulouse, France); Christophe Chassot (LAAS-CNRS, Université de Toulouse & INSA Toulouse, France)
    LiteSense: An Adaptive Sensing Scheme for WSNs
    João Marco C. Silva (HASLab, INESC TEC & Universidade do Minho); Kalil A Bispo (Departamento de Computação, Universidade Federal de Sergipe); Paulo Carvalho (Centro Algoritmi, Universidade do Minho, Portugal); Solange Rito Lima (Centro Algoritmi, Universidade do Minho)

    s8.4: Social Networks and Cloud Sourcinggo to top

    Room: PASIPHAE II
    Chair: Mozhgan Mahloo (Ericsson Research, Sweden)
    Performance Evaluation of WiFi Direct for Data Dissemination in Mobile Social Networks
    Zhifei Mao (Norwegian University of Science and Technology (NTNU), Norway); Jing Ma (Shanghai Jiao Tong University, P.R. China); Yuming Jiang (Norwegian University of Science and Technology (NTNU), Norway); Bin Yao (Shanghai Jiao Tong University, P.R. China)
    From Online to Offline: Charactering User's Online Music Listening Behavior for Efficacious Offline Radio Program Arrangement
    Tao Qin (Xi'an Jiaotong Uinversity, P.R. China); Yukun Liu and Chenxu Wang (Xi'an Jiaotong University, P.R. China); Tao Yang (Northwestern Polytechnical University, P.R. China); Chao He (Xi'an Jiaotong University, P.R. China)
    Spam Comments Detection with Self-Extensible Dictionary and Text-Based Features
    Qiang Zhang (Peking University, P.R. China); Chenwei Liu (Shenzhen Graduate School of Peking University, P.R. China); Shangru Zhong and Kai Lei (Peking University, P.R. China)
    Opinion Dynamics: A Study of the Relation Between Status and Communicability
    Cristhiana C Albert (Universidade do Vale do Rio dos Sinos - UNISINOS, Brazil); Luiz Paulo de Oliveira (UNISINOS, Brazil); Marta Becker Villamil (Universidade do Vale do Rio dos Sinos - UNISINOS, Brazil)

    t10.5: Tutorial #4, Session IIgo to top

    Demand Response in Smart Grids: a Cooperative Perspective
    John Vardakas (Iquadrat Informatica S.L., Spain) and Christos Verikoukis (Telecommunications Technological Centre of Catalonia, Spain)
    Room: APOLLON

    The major challenges that urban living faces over the last years, as a result of the increasing population density, have triggered the discussion for the development of effective solutions that target the economic, social, and environmental sustainability of urban areas. In addition, environmental concerns have stressed the need for the development of innovative solutions for the effective and flexible utilization of the renewable energy. To this end, Demand Response (DR) is considered as an effective and reliable solution that target to alter electricity consumers' demand profile in order to match the supply, while aiming at the efficient incorporation of renewable energy resources. In this Tutorial, we aim to present a comprehensive review of the emerging DR solutions that have been proposed or even become available over the last years. Moreover, we cover the new trend on energy management in cities that is based on the cooperation of buildings as an alternative solution for the optimum management of the energy generated, stored and consumed in urban buildings. Since the issue of energy consumption management is of extreme interest both from the research community as well as industry, the proposed tutorial surely covers a timely topic, and it can provide useful hints to researchers on available research lines and industrial developer on most recent and promising advances in the fields.

    John Vardakas received the Dipl.-Eng. degree in electrical and computer engineering from Democritus University of Thrace, Xanthi, Greece, in 2004 and the Ph.D. degree from the University of Patras, Patras, Greece in 2012. He is currently a Senior Researcher with Iquadrat Informatica, Barcelona, Spain. He has published more than 80 papers in journals and international conferences (h-index 15). Dr. Vardakas has participated in more than 10 competitive projects (ICT, Marie-Curie, ENIAC). He is also a regular reviewer in a number of international journals and conferences, while he has participated in the organization of several conferences. His research interests include performance analysis and simulation of communication networks and smart grids. Dr. Vardakas is a member of the IEEE, the Optical Society of America, and the Technical Chamber of Greece (TEE).

    Christos Verikoukis got his Ph.D. from the Technical University of Catalonia in 2000. He is currently a Fellow Researcher at CTTC (Head of the SMARTECH department) and an adjunct professor at Barcelona University (Electronics Department). He has published 106 journal papers and over 170 conference papers (h-index 23). He is also co-author in 3 books, 16 chapters in different books and he has filled 3 patents. He has supervised 15 Ph.D. students and 5 Post Docs researchers since 2004. Dr.Verikoukis has participated in more than 30 competitive projects while he has serve as the Principal investigator in national projects in Greece and Spain. He served as the technical manager of the ITNGREENET and the CELTIC-GREEN-T and LOOP projects. Dr.Verikoukis received the best paper award of the Communication QoS, Reliability &Modeling Symposium (CQRM) symposium in the IEEE ICC 2011 & ICC 2014 conference, of the Selected Areas in Communications Symposium in the IEEE GLOBECOM 2014 conference, of the EUCNC 2016 conference and the EURASIP 2013 Best Paper Award for the Journal on Advances in Signal Processing. He was the general Chair of the 17th, 18th and 19th IEEE Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD), and the TPC Co-Chair of the 15th IEEE International Conference on eHealth Networking, Application & Services (Healthcom) and the 7th IEEE Latincom Conference. He has also served as the symposium co-chair of the CQRM symposium in the IEEE ICC 2015 & 2016 conference. He is currently the Chair of the IEEE ComSoc Technical Committee on Communication Systems Integration and Modeling (CSIM).

    Thursday, July 6, 16:00 - 17:45

    s9.1: Security, Crypto, and Privacy VIIgo to top

    Room: MINOS I
    Chair: Panos Chatziadam (FORTH, Greece)
    Privacy Preserving Clustering over Horizontal and Vertical Partitioned Data
    Mina Sheikhalishahi (IIT-CNR, Italy); Fabio Martinelli (CNR-IIT, Italy)
    Bayesian Diagnosis and Reliability Analysis of Private Mobile Radio Networks
    Salma Ktari (UPMC FRANCE, France); Stefano Secci (University Pierre et Marie Curie - Paris 6, France); Damien Lavaux (Thales Communications, France)
    Secure Self-Seeding with Power-Up SRAM States
    Konrad-Felix Krentz (Hasso Plattner Institute, Germany); Christoph Meinel (Hasso-Plattner-Institute, Germany); Hendrik Graupner (Hasso Plattner Institute, University of Potsdam, Germany)
    An Effective Stackelberg Game for High-Assurance of Data Trustworthiness in WSNs
    Mohamed S. Abdalzaher (Egypt Japan University of Science and Technology & National Research Institute of Astronomy and Geophysics, Egypt); Karim G Seddik (American University in Cairo, Egypt); Osamu Muta (Kyushu University, Japan)
    Non-Recursive Computation of the Probability of More than Two People Having the Same Birthday
    Michael E. Kounavis, Sergej Deutsch, David Durham and Saeedeh Komijani (Intel Corporation, USA)

    s9.2: QoS, QoE, and Resource Management IVgo to top

    Room: MINOS II
    Chair: Dr. Kostas Kolomvatsos (University of Thessaly, Greece)
    Understanding Viewing Engagement and Video Quality in a Large-scale Mobile Video System
    Zitao Chen (Tsinghua University, P.R. China); Laizhong Cui (Shenzhen University, P.R. China); Yong Jiang (Graduate School at Shenzhen, Tsinghua University, P.R. China); Zhi Wang (Tsinghua University, P.R. China)
    Robust Traffic Differentiation with Intra-AC Prioritization in Multirate IEEE 802.11aa Networks
    Lukasz Prasnal and Marek Natkaniec (AGH University of Science and Technology, Poland)
    Uncertainty-driven Ensemble Forecasting of QoS in Software Defined Networks
    Kostas Kolomvatsos (University of Thessaly, Greece); Christos Anagnostopoulos (University of Glasgow, United Kingdom (Great Britain)); Angelos K. Marnerides (Lancaster University & Lancaster University, United Kingdom (Great Britain)); Qiang Ni (Lancaster University, United Kingdom (Great Britain)); Stathes Hadjiefthymiades (University of Athens, Greece); Dimitrios P Pezaros (University of Glasgow, United Kingdom (Great Britain))
    Masking Lossy Networks by TCP Tunnel with Network Coding
    Nguyen Viet Ha, Kazumi Kumazoe, Kazuya Tsukamoto and Masato Tsuru (Kyushu Institute of Technology, Japan)
    On Minimizing Memory and Computation Overheads for Binary-Tree Based Data Replication
    Stavros Souravlas and Angelo Sifaleras (University of Macedonia, Greece)

    s9.3: IoT and Wireless Sensors Networks IVgo to top

    Room: PASIPHAE I
    Chair: Dimitrios Zorbas (Univ of La Rochelle, France)
    ST-Drop: A Novel Buffer Management Strategy for D2D Opportunistic Networks
    Michael Silva (Universidade Federal de Minas Gerais, Brazil); Ivan Nunes (University of California, Irvine, USA); Raquel A. F. Mini (PUC Minas, Brazil); Antonio A.F. Loureiro (Federal University of Minas Gerais, Brazil)
    Construction of a Minimum Energy Broadcast Backbone with Bounded Delay in Heterogeneous Wireless Sensor Networks
    Karla Breschi (Université de Franche Comté, France); Julien Bernard (Université de Franche-Comté, France)
    On the Optimal Number of Chargers in Battery-Less Wirelessly Powered Sensor Networks
    Dimitrios Zorbas (Univ of La Rochelle, France); Patrice Raveneau (Univ La Rochelle, L3i, France); Yacine Ghamri-Doudane (University of la Rochelle, France); Christos Douligeris (University of Piraeus, Greece)
    Extracting Usage Patterns of Home IoT Devices
    Gevorg Poghosyan (Insight Centre for Data Analytics & University College Dublin, Ireland); Ioannis Pefkianakis (Hewlett Packard Labs, USA); Pascal Le Guyadec (Technicolor, France); Vassilis Christophides (ICS-FORTH, Greece)
    Wireless Sensor Networks for Monitoring Gas Turbine Engines During Development
    Hassan Hakim Khalili and Peter Green (University of Manchester, United Kingdom (Great Britain)); Danielle George (University of Manchester, Malaysia); Graham Watson and Werner Schiffers (Rolls-Royce, United Kingdom (Great Britain))

    s9.4: SDN and Overlay Networks IIIgo to top

    Room: PASIPHAE II
    Chair: Manos Dramitinos (Athens University of Economics and Business, Greece)
    Worst-Case Attacker Models for Two-Layered Networks Based on the Minimum Overlay Cut
    Martin Backhaus (Technical University of Ilmenau, Germany); Guenter Schaefer (Technische Universitaet Ilmenau, Germany)
    Experimental Evaluation of SDN-Controlled, Joint Consolidation of Policies and Virtual Machines
    Wajdi Hajji (Liverpool John Moores University, United Kingdom (Great Britain)); Fung Po Tso (Loughborough University, United Kingdom (Great Britain)); Lin Cui (Jinan University, P.R. China); Dimitrios P Pezaros (University of Glasgow, United Kingdom (Great Britain))
    A Programmable Controller for Unified Management of Virtualized Network Infrastructures
    Mohamad Yassin, Karine Guillouard, Meryem Ouzzif, Roland Picard and Denis Aluze (Orange Labs, France)
    Mitigating Elephant Flows in SDN-Based IXP Networks
    Luis Knob (PUCRS & Instituto Federal do Rio Grande do Sul, Brazil); Rafael Esteves (IFRS, Brazil); Lisandro Z Granville and Liane Margarida Rockenbach Tarouco (Federal University of Rio Grande do Sul, Brazil)
    SDN Management Based on Hierarchical Task Network and Network Functions Virtualization
    Mario Gironza-Ceron and William Villota-Jacome (University of Cauca, Colombia); Armando Ordonez (Foundation University of Popayan, Colombia); Felipe Estrada-Solano and Oscar Mauricio Caicedo Rendon (University of Cauca, Colombia)

    s9.5: Sound Image and Signal Processinggo to top

    Room: APOLLON
    Chair: Serdar Boztas (RMIT University, Australia)
    A Novel Framework for Enhancement of the Low Lighting Video
    Jianhua Pang (Tsinghua University, P.R. China); Sheng Zhang (Tsinghua university, P.R. China); Wencang Bai (Tsinghua University, P.R. China)
    Reconfigurable Underwater Embedded Systems Architectures
    Hussain Albarakati and Abdelfattah Amamra (University of Connecticut, USA); Raafat Elfouly (Rhode Island College, USA); Reda Ammar (University of Connecticut, USA)
    Random Sparse Representation for Thermal to Visible Face Recognition
    Samira Reihanian (University of Tehran, Iran); Ehsan Arbabi (Iran, Iran); Behrouz Maham (Nazarbayev University, Kazakhstan)