default search action
36th INFOCOM 2017: Atlanta, GA, USA
- 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017. IEEE 2017, ISBN 978-1-5090-5336-0
- Chen Tian, Ali Munir, Alex X. Liu, Yingtong Liu, Yanzhao Li, Jiajun Sun, Fan Zhang, Gong Zhang:
Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion control. 1-9 - Ruozhou Yu, Guoliang Xue, Xiang Zhang, Dan Li:
Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers. 1-9 - Yuanwei Lu, Guo Chen, Larry Luo, Kun Tan, Yongqiang Xiong, Xiaoliang Wang, Enhong Chen:
One more queue is enough: Minimizing flow completion time with explicit priority notification. 1-9 - Jinlong E, Yong Cui, Peng Wang, Zhenhua Li, Chaokun Zhang:
CoCloud: Enabling efficient cross-cloud file collaboration based on inefficient web APIs. 1-9 - Chen Chen, Wei Wang, Shengkai Zhang, Bo Li:
Cluster fair queueing: Speeding up data-parallel jobs with delay guarantees. 1-9 - Li Chen, Shuhao Liu, Baochun Li, Bo Li:
Scheduling jobs across geo-distributed datacenters with max-min fairness. 1-9 - Chunguang Li, Dan Feng, Yu Hua, Wen Xia, Leihua Qin, Yue Huang, Yukun Zhou:
BAC: Bandwidth-aware compression for efficient live migration of virtual machines. 1-9 - Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. 1-9 - Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. 1-9 - Xin Li, Qinghan Xue, Mooi Choo Chuah:
CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system. 1-9 - Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. 1-9 - Qian Wang, Shengshan Hu, Minxin Du, Jingjun Wang, Kui Ren:
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. 1-9 - Pan Li, Hoang Dau, Gregory J. Puleo, Olgica Milenkovic:
Motif clustering and overlapping clustering for social network analysis. 1-9 - Guangmo Amo Tong, Weili Wu, Ling Guo, Deying Li, Cong Liu, Bin Liu, Ding-Zhu Du:
An efficient randomized algorithm for rumor blocking in online social networks. 1-9 - Jungseul Ok, Jinwoo Shin, Yung Yi:
Incentivizing strategic users for social diffusion: Quantity or quality? 1-9 - Md. Tanvir Al Amin, Charu C. Aggarwal, Shuochao Yao, Tarek F. Abdelzaher, Lance M. Kaplan:
Unveiling polarization in social networks: A matrix factorization approach. 1-9 - Quan Chen, Hong Gao, Siyao Cheng, Jianzhong Li, Zhipeng Cai:
Distributed non-structure based data aggregation for duty-cycle wireless sensor networks. 1-9 - Kin Sum Liu, Tyler Mayer, Hao-Tsung Yang, Esther M. Arkin, Jie Gao, Mayank Goswami, Matthew P. Johnson, Nirman Kumar, Shan Lin:
Joint sensing duty cycle scheduling for heterogeneous coverage guarantee. 1-9 - Kaibo Fu, Wei Ren, Wei Dong:
Multihop calibration for mobile sensing: K-hop Calibratability and reference sensor deployment. 1-9 - Yibo Wu, Yi Wang, Guohong Cao:
Photo crowdsourcing for area coverage in resource constrained environments. 1-9 - Yiwei Zhuo, Hongzi Zhu, Hua Xue, Shan Chang:
Perceiving accurate CSI phases with commodity WiFi devices. 1-9 - Seongho Byeon, Kangjin Yoon, Changmok Yang, Sunghyun Choi:
STRALE: Mobility-aware PHY rate and frame aggregation length adaptation in WLANs. 1-9 - Sihui Han, Kang G. Shin:
Enhancing wireless performance using reflectors. 1-9 - Alireza Ameli Renani, Jun Huang, Guoliang Xing, Abdol-Hossein Esfahanian:
Harnessing hardware defects for improving wireless link performance: Measurements and applications. 1-9 - Ganesh Chennimala Sankaran, Krishna M. Sivalingam:
Combinatorial approach for network switch design in data center networks. 1-9 - Su Jia, Xin Jin, Golnaz Ghasemiesfeh, Jiaxin Ding, Jie Gao:
Competitive analysis for online scheduling in software-defined optical WAN. 1-9 - Yu Nakayama, Takuya Tsutsumi, Kazuki Maruta, Kaoru Sezaki:
ABSORB: Autonomous base station with optical reflex backhaul to adapt to fluctuating demand. 1-9 - Steven Gay, Renaud Hartert, Stefano Vissicchio:
Expect the unexpected: Sub-second optimization for segment routing. 1-9 - Huanle Xu, Gustavo de Veciana, Wing Cheong Lau:
Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysis. 1-9 - Yipei Niu, Fangming Liu, Xincai Fei, Bo Li:
Handling flash deals with soft guarantee in hybrid cloud. 1-9 - Robert Birke, Juan F. Pérez, Zhan Qiu, Mathias Björkqvist, Lydia Y. Chen:
Power of redundancy: Designing partial replication for multi-tier applications. 1-9 - Zhe Huang, S. Matthew Weinberg, Liang Zheng, Carlee Joe-Wong, Mung Chiang:
Discovering valuations and enforcing truthfulness in a deadline-aware scheduler. 1-9 - Xu Zheng, Zhipeng Cai, Jianzhong Li, Hong Gao:
Location-privacy-aware review publication mechanism for local business service systems. 1-9 - Shaowei Wang, Yiwen Nie, Pengzhan Wang, Hongli Xu, Wei Yang, Liusheng Huang:
Local private ordinal data distribution estimation. 1-9 - Hai Liu, Xinghua Li, Hui Li, Jianfeng Ma, XinDi Ma:
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. 1-9 - Marco Gramaglia, Marco Fiore, Alberto Tarable, Albert Banchs:
Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories. 1-9 - Abhishek Sinha, Eytan H. Modiano:
Optimal control for generalized network-flow problems. 1-9 - Kai Lampka, Steffen Bondorf, Jens B. Schmitt, Nan Guan, Wang Yi:
Generalized finitary real-time calculus. 1-9 - Peng-Jun Wan, Huaqiang Yuan, Xiaohua Jia, Jiliang Wang, Zhu Wang:
Maximum-weighted subset of communication requests schedulable without spectral splitting. 1-9 - Subhashini Krishnasamy, P. T. Akhil, Ari Arapostathis, Sanjay Shakkottai, Rajesh Sundaresan:
Augmenting max-weight with explicit learning for wireless scheduling with switching costs. 1-9 - Yuxiao Hou, Yuanqing Zheng:
PHY assisted tree-based RFID identification. 1-9 - Jia Liu, Feng Zhu, Yanyan Wang, Xia Wang, Qing-feng Pan, Lijun Chen:
RF-scanner: Shelf scanning with robot-assisted RFID systems. 1-9 - Min Chen, Jia Liu, Shigang Chen, Yan Qiao, Yuanqing Zheng:
DBF: A general framework for anomaly detection in RFID systems. 1-9 - Henko Aantjes, Amjad Yousef Majid, Przemyslaw Pawelczak, Jethro Tan, Aaron N. Parks, Joshua R. Smith:
Fast downstream to many (computational) RFIDs. 1-9 - Zhe Chen, Xu Zhang, Sulei Wang, Yuedong Xu, Jie Xiong, Xin Wang:
BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming. 1-9 - Meenupriya Swaminathan, Anna Vizziello, Davy Duong, Pietro Savazzi, Kaushik R. Chowdhury:
Beamforming in the body: Energy-efficient and collision-free communication for implants. 1-9 - Abdul Salam, Mehmet C. Vuran:
Smart underground antenna arrays: A soil moisture adaptive beamforming approach. 1-9 - Joan Palacios, Danilo De Donno, Joerg Widmer:
Tracking mm-Wave channel dynamics: Fast beam training strategies under mobility. 1-9 - Hongli Xu, Zhuolong Yu, Chen Qian, Xiang-Yang Li, Zichun Liu:
Minimizing flow statistics collection cost of SDN using wildcard requests. 1-9 - Wenrui Ma, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou:
Traffic aware placement of interdependent NFV middleboxes. 1-9 - Peng Zhang:
Towards rule enforcement verification for software defined networks. 1-9 - RhongHo Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang:
RFlow+: An SDN-based WLAN monitoring and management framework. 1-9 - Parimal Parag, Archana Bura, Jean-François Chamberland:
Latency analysis for distributed storage. 1-9 - Vaneet Aggarwal, Jingxian Fan, Tian Lan:
Taming tail latency for erasure-coded, distributee storage systems. 1-9 - Shuzhan Wei, Yongkun Li, Yinlong Xu, Si Wu:
DSC: Dynamic stripe construction for asynchronous encoding in clustered file system. 1-9 - Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang:
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. 1-9 - Michael Dinitz, Jeremy T. Fineman, Seth Gilbert, Calvin Newport:
Load balancing with bounded convergence in dynamic networks. 1-9 - Hongli Xu, He Huang, Shigang Chen, Gongming Zhao:
Scalable software-defined networking through hybrid switching. 1-9 - Syed Mohammad Irteza, Hafiz Mohsin Bashir, Talal Anwar, Ihsan Ayyub Qazi, Fahad Rafique Dogar:
Load balancing over symmetric virtual topologies. 1-9 - Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
BD-CAT: Balanced dynamic content addressing in trees. 1-9 - Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:
AccountTrade: Accountable protocols for big data trading against dishonest consumers. 1-9 - Xin Yao, Rui Zhang, Yanchao Zhang, Yaping Lin:
Verifiable social data outsourcing. 1-9 - Prasanna Giridhar, Shiguang Wang, Tarek F. Abdelzaher, Raghu K. Ganti, Lance M. Kaplan, Jemin George:
On localizing urban events with Instagram. 1-9 - Yinghao Yu, Wei Wang, Jun Zhang, Khaled Ben Letaief:
LRC: Dependency-aware cache management for data analytics clusters. 1-9 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
Network anti-spoofing with SDN data plane. 1-9 - Shang Gao, Zhe Peng, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. 1-9 - Anat Bremler-Barr, Eli Brosh, Mor Sides:
DDoS attack on cloud auto-scaling mechanisms. 1-9 - Mathieu Jadin, Gautier Tihon, Olivier Pereira, Olivier Bonaventure:
Securing multipath TCP: Design & implementation. 1-9 - Mark van der Boor, Sem C. Borst, Johan van Leeuwaarden:
Load balancing in large-scale systems with multiple dispatchers. 1-9 - Wasiur R. KhudaBukhsh, Amr Rizk, Alexander Frömmgen, Heinz Koeppl:
Optimizing stochastic scheduling in fork-join queueing models: Bounds and applications. 1-9 - Arjun Anand, Gustavo de Veciana:
Measurement-based scheduler for multi-class QoE optimization in wireless networks. 1-9 - Alex Davydow, Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan:
Throughput optimization with latency constraints. 1-9 - Yu Luo, Lina Pu, Yanxiao Zhao, Guodong Wang, Min Song:
Optimal energy requesting strategy for RF-based energy harvesting wireless communications. 1-9 - Haipeng Dai, Xiaoyu Wang, Alex X. Liu, Huizhen Ma, Guihai Chen:
Optimizing wireless charger placement for directional charging. 1-9 - Fei Wang, Xi Zhang:
Secure resource allocations for polarization-enabled cooperative cognitive radio networks with energy harvesting capability. 1-9 - Li Yan, Haiying Shen, Juanjuan Zhao, Chengzhong Xu, Feng Luo, Chenxi Qiu:
CatCharger: Deploying wireless charging lanes in a metropolitan road network through categorization and clustering of vehicle traffic. 1-9 - Xianjin Xia, ShiNing Li, Yu Zhang, Lin Li, Tao Gu, Yongji Liu, Yan Pan:
Surviving screen-off battery through out-of-band Wi-Fi coordination. 1-9 - Meng Jin, Yuan He, Dingyi Fang, Xiaojiang Chen, Xin Meng, Tianzhang Xing:
iGuard: A real-time anti-theft system for smartphones. 1-9 - Xiangyu Xu, Hang Gao, Jiadi Yu, Yingying Chen, Yanmin Zhu, Guangtao Xue, Minglu Li:
ER: Early recognition of inattentive driving leveraging audio devices on smartphones. 1-9 - Yi Gao, Yang Luo, Daqing Chen, Haocheng Huang, Wei Dong, Mingyuan Xia, Xue Liu, Jiajun Bu:
Every pixel counts: Fine-grained UI rendering analysis for mobile applications. 1-9 - Guanyu Gao, Yonggang Wen, Han Hu:
QDLCoding: QoS-differentiated low-cost video encoding scheme for online video service. 1-9 - Ming Tang, Shou Wang, Lin Gao, Jianwei Huang, Lifeng Sun:
MOMD: A multi-object multi-dimensional auction for crowdsourced mobile video streaming. 1-9 - Kazuhisa Matsuzono, Hitoshi Asaeda, Thierry Turletti:
Low latency low loss streaming using in-network coding and caching. 1-9 - Ahmed Badr, Ashish Khisti, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
FEC for VoIP using dual-delay streaming codes. 1-9 - Guoming Tang, Kui Wu, Richard Brunner:
Rethinking CDN design with distributee time-varying traffic demands. 1-9 - Samta Shukla, Alhussein A. Abouzeid:
Proactive retention aware caching. 1-9 - Li Qiu, Guohong Cao:
Popularity-aware caching increases the capacity of wireless networks. 1-9 - Livia Elena Chatzieleftheriou, Merkourios Karaliopoulos, Iordanis Koutsopoulos:
Caching-aware recommendations: Nudging user preferences towards better caching performance. 1-9 - Mingjun Xiao, Jie Wu, Sheng Zhang, Jiapeng Yu:
Secret-sharing-based secure user recruitment protocol for mobile crowdsensing. 1-9 - Shengzhong Liu, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Guihai Chen:
Context-aware data quality estimation in mobile crowdsensing. 1-9 - Qiang Xu, Rong Zheng:
When data acquisition meets data analytics: A distributed active learning framework for optimal budgeted mobile crowdsensing. 1-9 - Man Hon Cheung, Fen Hou, Jianwei Huang:
Make a difference: Diversity-driven social mobile crowdsensing. 1-9 - Yu Sang, Bo Ji, Gagan Raj Gupta, Xiaojiang Du, Lin Ye:
Provably efficient algorithms for joint placement and allocation of virtual network functions. 1-9 - Rui Han, Fan Zhang, Zhentao Wang:
AccurateML: Information-aggregation-based approximate processing for fast and accurate machine learning on MapReduce. 1-9 - Juan F. Pérez, Robert Birke, Lydia Y. Chen:
On the latency-accuracy tradeoff in approximate MapReduce jobs. 1-9 - Hao Feng, Jaime Llorca, Antonia M. Tulino, Danny Raz, Andreas F. Molisch:
Approximation algorithms for the NFV service distribution problem. 1-9 - János Tapolcai, Lajos Rónyai, Bálazs Vass, Laszlo Gyimothi:
List of shared risk link groups representing regional failures with limited size. 1-9 - Ying Zhang, Wenfei Wu, Sujata Banerjee, Joon-Myung Kang, Mario A. Sánchez:
SLA-verifier: Stateful and quantitative verification for service chaining. 1-9 - Stefano Ciavarella, Novella Bartolini, Hana Khamfroush, Thomas La Porta:
Progressive damage assessment and network recovery after massive failures. 1-9 - Yigal Bejerano, Chandru Raman, Chun-Nam Yu, Varun Gupta, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman:
DyMo: Dynamic monitoring of large scale LTE-Multicast systems. 1-9 - Meng Zhang, Lin Gao, Jianwei Huang, Michael L. Honig:
Cooperative and competitive operator pricing for mobile crowdsourced internet access. 1-9 - Dario Bega, Marco Gramaglia, Albert Banchs, Vincenzo Sciancalepore, Konstantinos Samdanis, Xavier Pérez Costa:
Optimising 5G infrastructure markets: The business of network slicing. 1-9 - Pablo Caballero Garces, Albert Banchs, Gustavo de Veciana, Xavier Pérez Costa:
Network slicing games: Enabling customization in multi-tenant networks. 1-9 - Mao Zou, Richard T. B. Ma, Xin Wang, Yinlong Xu:
On optimal service differentiation in congested network markets. 1-9 - Peshal Nayak, Michele Garetto, Edward W. Knightly:
Multi-user downlink with single-user uplink can starve TCP. 1-9 - Dolvara Gunatilaka, Mo Sha, Chenyang Lu:
Impacts of channel selection on industrial wireless sensor-actuator networks. 1-9 - Andrea Baiocchi, Ilenia Tinnirello, Domenico Garlisi, Alice Lo Valvo:
Random access with repeated contentions for emerging wireless technologies. 1-9 - Chao-Fang Shih, Raghupathy Sivakumar:
Switch: Enabling transmitter and receiver participation in seamless lightweight control. 1-9 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Pilot-based full-duplex spectrum-sensing and multichannel-MAC over non-time-slotted cognitive radio networks. 1-9 - Xingya Liu, Jiang Xie:
A 2D heterogeneous rendezvous protocol for multi-wideband cognitive radio networks. 1-9 - Changhee Joo, Ness B. Shroff:
A novel coupled queueing model to control traffic via QoS-aware collision pricing in cognitive radio networks. 1-9 - Amr Abdelfattah, Naceur Malouch:
Modeling and performance analysis of Wi-Fi networks coexisting with LTE-U. 1-9 - Yanyuan Qin, Ruofan Jin, Shuai Hao, Krishna R. Pattipati, Feng Qian, Subhabrata Sen, Bing Wang, Chaoqun Yue:
A control theoretic approach to ABR video streaming: A fresh look at PID-based rate adaptation. 1-9 - Tong Zhang, Fengyuan Ren, Wenxue Cheng, Xiaohui Luo, Ran Shu, Xiaolan Liu:
Modeling and analyzing the influence of chunk size variation on bitrate adaptation in DASH. 1-9 - Cong Zhang, Qiyun He, Jiangchuan Liu, Zhi Wang:
Beyond the touch: Interaction-aware mobile gamecasting with gazing pattern prediction. 1-9 - Khaled M. Diab, Mohamed Hefeeda:
MASH: A rate adaptation algorithm for multiview video streaming over HTTP. 1-9 - Ian D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua:
Electric grid power flow model camouflage against topology leaking attacks. 1-9 - Zhuo Lu, Mingkui Wei, Xiang Lu:
How they interact? Understanding cyber and physical interactions against fault propagation in smart grid. 1-9 - Xin Lou, Rui Tan, David K. Y. Yau, Peng Cheng:
Cost of differential privacy in demand reporting for smart grid economic dispatch. 1-9 - Ali Sehati, Majid Ghaderi:
Energy-delay tradeoff for request bundling on smartphones. 1-9 - Lorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Botnet protocol inference in the presence of encrypted traffic. 1-9 - Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos:
CCSP: A compressed certificate status protocol. 1-9 - Binghui Wang, Le Zhang, Neil Zhenqiang Gong:
SybilSCAR: Sybil detection in online social networks via local rule based propagation. 1-9 - Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, Raheem A. Beyah:
Password correlation: Quantification, evaluation and application. 1-9 - Alan Kuhnle, Tianyi Pan, Md Abdul Alim, My T. Thai:
Scalable bicriteria algorithms for the threshold activation problem in online social networks. 1-9 - Xiang Li, J. David Smith, Thang N. Dinh, My T. Thai:
Why approximate when you can get the exact? Optimal targeted viral marketing at scale. 1-9 - Zhao Zhang, Yishuo Shi, James Willson, Ding-Zhu Du, Guangmo Tong:
Viral marketing with positive influence. 1-8 - Chul-Ho Lee, Xin Xu, Do Young Eun:
On the rao-blackwellization and its application for graph sampling via neighborhood exploration. 1-9 - Yunlong Wu, Bo Zhang, Shaoshi Yang, Xiaodong Yi, Xuejun Yang:
Energy-efficient joint communication-motion planning for relay-assisted wireless robot surveillance. 1-9 - Tuo Shi, Siyao Cheng, Jianzhong Li, Zhipeng Cai:
Constructing connected dominating sets in battery-free networks. 1-9 - Yi Gao, Wei Dong, Xiaoyu Zhang, Wenbin Wu:
Universal path tracing for large-scale sensor networks. 1-9 - Fujuan Guo, Baofeng Zhou, Mehmet C. Vuran:
CFOSynt: Carrier frequency offset assisted clock syntonization for wireless sensor networks. 1-9 - Xiaojian Lin, Shaowei Wang:
Efficient remote radio head switching scheme in cloud radio access network: A load balancing perspective. 1-9 - David W. Griffith, Aziza Ben Mosbah, Richard Rouil:
Group discovery time in device-to-device (D2D) proximity services (ProSe) networks. 1-9 - Roberto Calvo-Palomino, Domenico Giustiniano, Vincent Lenders, Aymen Fakhreddine:
Crowdsourcing spectrum data decoding. 1-9 - Ying Zhang, Lei Deng, Minghua Chen, Peijian Wang:
Joint bidding and geographical load balancing for datacenters: Is uncertainty a blessing or a curse? 1-9 - Abdul Kabbani, Milad Sharif:
Flier: Flow-level congestion-aware routing for direct-connect data centers. 1-9 - Rui Zhu, Di Niu, Baochun Li, Zongpeng Li:
Optimal multicast in virtualized datacenter networks with software switches. 1-9 - Ziyang Li, Wei Bai, Kai Chen, Dongsu Han, Yiming Zhang, Dongsheng Li, Hongfang Yu:
Rate-aware flow scheduling for commodity data center networks. 1-9 - Yong Li, Wei Gao:
Interconnecting heterogeneous devices in the personal mobile cloud. 1-9 - Liuhua Chen, Haiying Shen:
Considering resource demand misalignments to reduce resource over-provisioning in cloud datacenters. 1-9 - Jaya Prakash Champati, Ben Liang:
Efficient minimization of sum and differential costs on machines with job placement constraints. 1-9 - Wenchao Jiang, Zhimeng Yin, Song Min Kim, Tian He:
Transparent cross-technology communication over data traffic. 1-9 - Jie Ren, Ling Gao, Hai Wang, Zheng Wang:
Optimise web browsing on heterogeneous mobile platforms: A machine learning based approach. 1-9 - Qingjun Xiao, You Zhou, Shigang Chen:
Better with fewer bits: Improving the performance of cardinality estimation of large data streams. 1-9 - Angelo Furno, Marco Fiore, Razvan Stanica:
Joint spatial and temporal classification of mobile traffic demands. 1-9 - Jing Wang, Jian Tang, Zhiyuan Xu, Yanzhi Wang, Guoliang Xue, Xing Zhang, Dejun Yang:
Spatiotemporal modeling and prediction in cellular networks: A big data enabled deep learning approach. 1-9 - Novella Bartolini, Ting He, Hana Khamfroush:
Fundamental limits of failure identifiability by boolean network tomography. 1-9 - Sergey I. Nikolenko, Kirill Kogan, Antonio Fernández Anta:
Network simplification preserving bandwidth and routing capabilities. 1-9 - Josu Doncel, Samuli Aalto, Urtzi Ayesta:
Economies of scale in parallel-server systems. 1-9 - Xinzhe Fu, Zhiying Xu, Qianyang Peng, Luoyi Fu, Xinbing Wang:
Complexity vs. optimality: Unraveling source-destination connection in uncertain graphs. 1-9 - Kongyang Chen, Guang Tan:
SatProbe: Low-energy and fast indoor/outdoor detection based on raw GPS processing. 1-9 - Jin Wang, Nicholas Tan, Jun Luo, Sinno Jialin Pan:
WOLoc: WiFi-only outdoor localization using crowdsensed hotspot labels. 1-9 - Robert Margolies, Richard A. Becker, Simon D. Byers, Supratim Deb, Rittwik Jana, Simon Urbanek, Chris Volinsky:
Can you find me now? Evaluation of network-based localization in a 4G LTE network. 1-9 - Mah-Rukh Fida, Andra Lutu, Mahesh K. Marina, Ozgu Alay:
ZipWeave: Towards efficient and reliable measurement based mobile coverage maps. 1-9 - Jiayao Tan, Cam-Tu Nguyen, Xiaoliang Wang:
SilentTalk: Lip reading through ultrasonic sensing on mobile phones. 1-9 - Yu-Lin Wei, Hsin-I Wu, Han-Chung Wang, Hsin-Mu Tsai, Kate Ching-Ju Lin, Rayana Boubezari, Hoa Le Minh, Zabih Ghassemlooy:
LiCompass: Extracting orientation from polarized light. 1-9 - Huijie Chen, Fan Li, Yu Wang:
EchoTrack: Acoustic device-free hand tracking on smart phones. 1-9 - Han Xu, Zheng Yang, Zimu Zhou, Ke Yi, Chunyi Peng:
TUM: Towards ubiquitous multi-device localization for cross-device interaction. 1-9 - Wenjun Jiang, Jie Wu:
Active opinion-formation in online social networks. 1-9 - Aakas Zhiyuli, Xun Liang, Zhiming Xu:
Learning distributed representations for large-scale dynamic social networks. 1-9 - Weiyu Chen, Christopher G. Brinton, Da Cao, Mung Chiang:
Behavior in social learning networks: Early detection for online short-courses. 1-9 - Guangchi Liu, Qi Chen, Qing Yang, Binhai Zhu, Honggang Wang, Wei Wang:
OpinionWalk: An efficient solution to massive trust assessment in online social networks. 1-9 - Zhimeng Yin, Wenchao Jiang, Song Min Kim, Tian He:
C-Morse: Cross-technology communication with transparent Morse coding. 1-9 - Xiuzhen Guo, Xiaolong Zheng, Yuan He:
WiZig: Cross-technology energy communication over a noisy channel. 1-9 - Zicheng Chi, Zhichuan Huang, Yao Yao, Tiantian Xie, Hongyu Sun, Ting Zhu:
EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices. 1-9 - Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto:
Contact avoidance routing in delay tolerant networks. 1-9 - Haiming Jin, Lu Su, Klara Nahrstedt:
CENTURION: Incentivizing multi-requester mobile crowd sensing. 1-9 - Chao Huang, Dong Wang, Shenglong Zhu:
Where are you from: Home location profiling of crowd sensors from noisy and sparse crowdsourcing data. 1-9 - Ayon Chakraborty, Md. Shaifur Rahman, Himanshu Gupta, Samir R. Das:
SpecSense: Crowdsensing for efficient querying of spectrum occupancy. 1-9 - Chenglin Miao, Lu Su, Wenjun Jiang, Yaliang Li, Miaomiao Tian:
A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. 1-9 - Juan Li, Yanmin Zhu, Jiadi Yu, Chengnian Long, Guangtao Xue, Shiyou Qian:
Online auction for IaaS clouds: Towards elastic user demands and weighted heterogeneous VMs. 1-9 - Haisheng Tan, Zhenhua Han, Xiang-Yang Li, Francis C. M. Lau:
Online job dispatching and scheduling in edge-clouds. 1-9 - Rui Zhu, Di Niu, Zongpeng Li:
Robust web service recommendation via quantile matrix factorization. 1-9 - Xiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimization. 1-9 - Setareh Sharifian, Fuchun Lin, Reihaneh Safavi-Naini:
Secret key agreement using a virtual wiretap channel. 1-9 - Pengwei Wang, Reihaneh Safavi-Naini:
Interactive message transmission over adversarial wiretap channel II. 1-9 - Kai-Wei Jiang, Tao Jing, Zhen Li, Yan Huo, Fan Zhang:
Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver. 1-9 - Matthew Bradbury, Arshad Jhumka:
Understanding source location privacy protocols in sensor networks via perturbation of time series. 1-9 - Liang Zheng, Carlee Joe-Wong, Jiasi Chen, Christopher G. Brinton, Chee Wei Tan, Mung Chiang:
Economic viability of a virtual ISP. 1-9 - Debasis Mitra, Qiong Wang, Ao Hong:
Emerging internet content and service providers' relationships: Models and analyses of engineering, business and policy impact. 1-9 - John Z. F. Pang, Hu Fu, Won I. Lee, Adam Wierman:
The efficiency of open access in platforms for networked cournot markets. 1-9 - Diego Ximenes Mendes, Edmundo de Souza e Silva, Daniel Sadoc Menasché, Rosa Maria Meri Leão, Don Towsley:
An experimental reality check on the scaling laws of swarming systems. 1-9 - Chi-Han Lin, Yi-Ting Chen, Kate Ching-Ju Lin, Wen-Tsuen Chen:
acPad: Enhancing channel utilization for 802.11ac using packet padding. 1-9 - Seongwon Kim, Jaehong Yi, Youngwook Son, Seungmin Yoo, Sunghyun Choi:
Quiet ACK: ACK transmit power control in IEEE 802.11 WLANs. 1-9 - Gyujin Lee, Yeonchul Shin, Jonghoe Koo, Junyoung Choi, Sunghyun Choi:
ACT-AP: ACTivator access point for multicast over WLAN. 1-9 - Ramanujan K. Sheshadri, Dimitrios Koutsonikolas:
On packet loss rates in modern 802.11 networks. 1-9 - Alessio Marcone, Massimiliano Pierobon, Maurizio Magarini:
A parity check analog decoder for molecular communication based on biological circuits. 1-9 - Stefano Basagni, Valerio Di Valerio, Petrika Gjanci, Chiara Petrioli:
Finding MARLIN: Exploiting multi-modal communications for reliable and low-latency underwater networking. 1-9 - Giuseppe Enrico Santagati, Tommaso Melodia:
An implantable low-power ultrasonic platform for the Internet of Medical Things. 1-9 - Zhenghao Zhang, Piyush Kumar:
mEEC: A novel error estimation code with multi-dimensional feature. 1-9 - Heng Pan, Gaogang Xie, Zhenyu Li, Peng He, Laurent Mathy:
FlowConvertor: Enabling portability of SDN applications. 1-9 - Konstantinos Poularakis, George Iosifidis, Georgios Smaragdakis, Leandros Tassiulas:
One step at a time: Optimizing SDN upgrades in ISP networks. 1-9 - Haopei Wang, Abhinav Srivastava, Lei Xu, Sungmin Hong, Guofei Gu:
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds. 1-9 - Hesham Mekky, Fang Hao, Sarit Mukherjee, T. V. Lakshman, Zhi-Li Zhang:
Network function virtualization enablement within SDN data plane. 1-9 - Chase Q. Wu:
Bandwidth scheduling in overlay networks with linear capacity constraints. 1-9 - Parisa Rahimzadeh, Carlee Joe-Wong, Kyuyong Shin, Youngbin Im, Jongdeog Lee, Sangtae Ha:
SVC-TChain: Incentivizing good behavior in layered P2P video streaming. 1-9 - Omer Bilgen, Aaron B. Wagner:
A new stable peer-to-peer protocol with non-persistent peers. 1-9 - Bruce Spang, Anirudh Sabnis, Ramesh K. Sitaraman, Donald F. Towsley, Brian DeCleene:
MON: Mission-optimized overlay networks. 1-9 - László Toka, Balázs Lajtha, Éva Hosszu, Bence Formanek, Daniel Gehberger, János Tapolcai:
A resource-aware and time-critical IoT framework. 1-9 - Demetris Trihinas, George Pallis, Marios D. Dikaiakos:
ADMin: Adaptive monitoring dissemination for the Internet of Things. 1-9 - Jiansong Zhang, Zeyu Wang, Zhice Yang, Qian Zhang:
Proximity based IoT device authentication. 1-9 - So-Yeon Park, Sunil Lim, Dahee Jeong, Jungjin Lee, Joon-Sung Yang, HyungJune Lee:
PUFSec: Device fingerprint-based security architecture for Internet of Things. 1-9 - Kathleen Sucipto, Dimitris Chatzopoulos, Sokol Kosta, Pan Hui:
Keep your nice friends close, but your rich friends closer - Computation offloading using NFC. 1-9 - Sladana Josilo, György Dán:
A game theoretic analysis of selfish mobile computation offloading. 1-9 - Jaya Prakash Champati, Ben Liang:
Single restart with time stamps for computational offloading in a semi-online setting. 1-9 - Meng-Hsi Chen, Ben Liang, Min Dong:
Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point. 1-9 - Yiming Zhang, Dongsheng Li, Tian Tian, Ping Zhong:
CubeX: Leveraging glocality of cube-based networks for RAM-based key-value store. 1-9 - Feng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa:
Towards reliable and lightweight source switching for datacenter networks. 1-9 - Jingyuan Fan, Chaowen Guan, Yangming Zhao, Chunming Qiao:
Availability-aware mapping of service function chains. 1-9 - Hiroshi Saito, Hirotada Honda, Ryoichi Kawahara:
Disaster avoidance control against heavy rainfall. 1-9 - Mahmoud E. Ashour, Jingyao Wang, Constantino Lagoa, Necdet Serhat Aybat, Hao Che:
Non-concave network utility maximization: A distributed optimization approach. 1-9 - Peng-Jun Wan, Fahad Al-dhelaan, Huaqiang Yuan, Sai Ji:
Fractional wireless link scheduling and polynomial approximate capacity regions of wireless networks. 1-9 - Hao Yu, Michael J. Neely:
A new backpressure algorithm for joint rate control and routing with vanishing utility optimality gaps and finite queue lengths. 1-9 - Shay Vargaftik, Isaac Keslassy, Ariel Orda:
Stable user-defined priorities. 1-9 - Jia Liu, Min Chen, Shigang Chen, Qing-feng Pan, Lijun Chen:
Tag-compass: Determining the spatial direction of an object with small dimensions. 1-9 - Shigeng Zhang, Xuan Liu, Jianxin Wang, Jiannong Cao:
Tag size profiling in multiple reader RFID systems. 1-9 - Chunhui Duan, Xing Rao, Lei Yang, Yunhao Liu:
Fusing RFID and computer vision for fine-grained object tracking. 1-9 - Chouchang Yang, Jeremy Gummeson, Alanson P. Sample:
Riding the airways: Ultra-wideband ambient backscatter via commercial broadcast systems. 1-9 - Chao Wu, Yaoxue Zhang, Lan Zhang, Bowen Yang, Xu Chen, Wenwu Zhu, Lili Qiu:
ButterFly: Mobile collaborative rendering over GPU workload migration. 1-9 - Changhua Pei, Zhi Wang, Youjian Zhao, Zihan Wang, Yuan Meng, Dan Pei, Yuanquan Peng, Wenliang Tang, Xiaodong Qu:
Why it takes so long to connect to a WiFi access point. 1-9 - Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan:
Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic. 1-9 - Lei Xue, Xiaobo Ma, Xiapu Luo, Le Yu, Shuai Wang, Ting Chen:
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement. 1-9 - Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang, Feng Xia:
Exploiting social influence for context-aware event recommendation in event-based social networks. 1-9 - Bidisha Samanta, Abir De, Niloy Ganguly:
STRM: A sister tweet reinforcement process for modeling hashtag popularity. 1-9 - Xin Xu, Chul-Ho Lee, Do Young Eun:
Challenging the limits: Sampling online social networks with cost constraints. 1-9 - Qiongzheng Lin, Lei Yang, Yunhao Liu:
TagScreen: Synchronizing social televisions through hidden sound markers. 1-9 - Qingkai Liang, Eytan H. Modiano:
Coflow scheduling in input-queued switches: Optimal delay scaling and algorithms. 1-9 - Wei Wang, Shiyao Ma, Bo Li, Baochun Li:
Coflex: Navigating the fairness-efficiency tradeoff for coflow scheduling. 1-9 - Chang-Heng Wang, Siva Theja Maguluri, Tara Javidi:
Heavy traffic queue length behavior in switches with reconfiguration delay. 1-9 - Sen Yang, Bill Lin, Paul Tune, Jun (Jim) Xu:
A simple re-sequencing load-balanced switch based on analytical packet reordering bounds. 1-9 - Jian Lin, Ming Li, Dejun Yang, Guoliang Xue, Jian Tang:
Sybil-proof incentive mechanisms for crowdsensing. 1-9 - Chun-Chi Liu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie, Jiguo Yu:
Mechanism design games for thwarting malicious behavior in crowdsourcing applications. 1-9 - Fudong Qiu, Zhengxian He, Linghe Kong, Fan Wu:
MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic field. 1-9 - Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou:
Privacy-preserving pattern matching over encrypted genetic data in cloud computing. 1-9 - Qianwen Yin, Jasleen Kaur, F. Donelson Smith:
TCP Rapid: From theory to practice. 1-9 - Thomas Bonald, James W. Roberts, Christian Vitale:
Convergence to multi-resource fairness under end-to-end window control. 1-9 - Danfeng Shan, Fengyuan Ren:
Improving ECN marking scheme with micro-burst traffic in data center networks. 1-9 - Jia Zhao, Jiangchuan Liu, Haiyang Wang, Chi Xu:
Multipath TCP for datacenters: From energy efficiency perspective. 1-9 - Joan Palacios, Paolo Casari, Joerg Widmer:
JADE: Zero-knowledge device localization and environment mapping for millimeter wave systems. 1-9 - Zenghua Zhao, Jiankun Wang, Xingya Zhao, Chunyi Peng, Qian Guo, Bin Wu:
NaviLight: Indoor localization and navigation under arbitrary lights. 1-9 - Xi Chen, Chen Ma, Michel Allegue, Xue Liu:
Taming the inconsistency of Wi-Fi fingerprints for device-free passive indoor localization. 1-9 - Ruipeng Gao, Bing Zhou, Fan Ye, Yizhou Wang:
Knitter: Fast, resilient single-user indoor floor plan construction. 1-9 - Anfu Zhou, Xinyu Zhang, Huadong Ma:
Beam-forecast: Facilitating mobile 60 GHz networks via model-driven beam steering. 1-9 - Quan Chen, Hong Gao, Yingshu Li, Siyao Cheng, Jianzhong Li:
Edge-based beaconing schedule in duty-cycled multihop wireless networks. 1-9 - Sudipta Saha, Mun Choon Chan:
Design and application of a many-to-one communication protocol. 1-9 - Huichen Dai, Bin Liu, Haowei Yuan, Patrick Crowley, Jianyuan Lu:
Analysis of tandem PIT and CS with non-zero download delay. 1-9 - Giovanni Neglia, Damiano Carra, Pietro Michiardi:
Cache policies for linear utility maximization. 1-9 - Minsheng Zhang, Vince Lehman, Lan Wang:
Scalable name-based data synchronization for named data networking. 1-9 - Jaeyoung Choi, Sangwoo Moon, Jiin Woo, Kyunghwan Son, Jinwoo Shin, Yung Yi:
Rumor source detection under querying with untruthful answers. 1-9 - Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher, Constantin Serban:
Stealth migration: Hiding virtual machines on the network. 1-9 - Yong Xiao, Marwan Krunz:
QoE and power efficiency tradeoff for fog computing networks with fog node cooperation. 1-9 - Roy D. Yates, Mehrnaz Tavan, Yi Hu, Dipankar Raychaudhuri:
Timely cloud gaming. 1-9 - Xiumin Wang, Xiaoming Chen, Weiwei Wu:
Towards truthful auction mechanisms for task assignment in mobile device clouds. 1-9 - Chunqiang Hu, Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Carl Sturtivant, Hang Liu:
A secure and verifiable outsourcing scheme for matrix inverse computation. 1-9 - Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra:
A signaling game model for moving target defense. 1-9 - Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue:
Checks and balances: A tripartite public key infrastructure for secure web-based connections. 1-9 - Amit Klein, Haya Schulmann, Michael Waidner:
Internet-wide study of DNS cache injections. 1-9 - Yongli Cheng, Hong Jiang, Fang Wang, Yu Hua, Dan Feng:
BlitzG: Exploiting high-bandwidth networks for fast graph processing. 1-9 - Tong Shu, Chase Q. Wu:
Performance optimization of Hadoop workflows in public clouds through adaptive task partitioning. 1-9 - Xinxin Mei, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li:
Energy efficient real-time task scheduling on CPU-GPU hybrid clusters. 1-9 - Dazhao Cheng, Yuan Chen, Xiaobo Zhou, Daniel Gmach, Dejan S. Milojicic:
Adaptive scheduling of parallel jobs in spark streaming. 1-9 - Wei Wang, Yingjie Chen, Lin Yang, Qian Zhang:
Detecting on-body devices through creeping wave propagation. 1-9 - Xiaonan Guo, Jian Liu, Yingying Chen:
FitCoach: Virtual fitness coach empowered by wearable mobile devices. 1-9 - Lei Xie, Xu Dong, Wei Wang, Dawei Huang:
Meta-activity recognition: A wearable approach for logic cognition-based activity sensing. 1-9 - Xiaohui Liang, Tianlong Yun, Ronald A. Peterson, David Kotz:
LightTouch: Securely connecting wearables to ambient displays with user intent. 1-9 - Zhao Li, Kang G. Shin, Lu Zhen:
When and how much to neutralize interference? 1-9 - Kai-Cheng Hsu, Kate Ching-Ju Lin, Hung-Yu Wei:
Inter-client interference cancellation for full-duplex networks. 1-9 - Tom Vermeulen, Mihir Laghate, Ghaith Hattab, Danijela Cabric, Sofie Pollin:
Towards instantaneous collision and interference detection using in-band full duplex. 1-9 - Gaurang Naik, Jinshan Liu, Jung-Min Park:
Coexistence of Dedicated Short Range Communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance. 1-9 - Ran Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner:
Randomized admission policy for efficient top-k and frequency estimation. 1-9 - Ran Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner:
Optimal elephant flow detection. 1-9 - Gaogang Xie, Kun Xie, Jun Huang, Xin Wang, Yuxiang Chen, Jigang Wen:
Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection. 1-9 - Kun Xie, Can Peng, Xin Wang, Gaogang Xie, Jigang Wen:
Accurate recovery of internet traffic data under dynamic measurements. 1-9 - Fan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, Mo Li:
Large-scale invisible attack on AFC systems with NFC-equipped smartphones. 1-9 - Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, Yanchao Zhang:
Your face your heart: Secure mobile face authentication with photoplethysmograms. 1-9 - Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra:
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications. 1-9 - Yingyuan Yang, Jinyuan Sun:
Energy-efficient W-layer for behavior-based implicit authentication on mobile devices. 1-9 - Rahul Vaze:
Online knapsack problem and budgeted truthful bipartite matching. 1-9 - Jianan Zhang, Eytan H. Modiano:
Robust routing in interdependent networks. 1-9 - Jiguo Yu, Xueli Ning, Yunchuan Sun, Shengling Wang, Yawei Wang:
Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR. 1-9 - Wenzhong Li, Jinggong Zhang, Yanchao Zhao:
Conflict graph embedding for wireless network optimization. 1-9 - Shih-Chun Lin, Ian F. Akyildiz:
Dynamic base station formation for solving NLOS problem in 5G millimeter-wave communication. 1-9 - Sem C. Borst, Aliye Özge Kaya, Doru Calin, Harish Viswanathan:
Dynamic path selection in 5G multi-RAT wireless networks. 1-9 - Jian-Jhih Kuo, Shan-Hsiang Shen, Hongyu Kang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen:
Service chain embedding with maximum flow in software defined network and application to the next-generation cellular network architecture. 1-9 - Vincenzo Sciancalepore, Konstantinos Samdanis, Xavier Pérez Costa, Dario Bega, Marco Gramaglia, Albert Banchs:
Mobile traffic forecasting for maximizing 5G network slicing resource utilization. 1-9 - Swadhin Pradhan, Lili Qiu, Abhinav Parate, Kyu-Han Kim:
Understanding and managing notifications. 1-9 - Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang:
POWERFUL: Mobile app fingerprinting via power analysis. 1-9 - Zhenjiang Li, Mo Li, Prasant Mohapatra, Jinsong Han, Shuaiyu Chen:
iType: Using eye gaze to enhance typing privacy. 1-9 - Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, Steve Romig, Wei Zhao:
On human mobility predictability via WLAN logs. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.