default search action
23rd ICCCN 2014: Shanghai, China
- 23rd International Conference on Computer Communication and Networks, ICCCN 2014, Shanghai, China, August 4-7, 2014. IEEE 2014, ISBN 978-1-4799-3572-7
- Junzhao Du, Sicong Liu, Chi Xu, Kai Wang, Hui Liu, Kewei Sha:
Lightweight construction of the information potential field in wireless sensor networks. 1-8 - Sadaf Yasmin, Rao Naveed Bin Rais, Amir Qayyum:
A multi-attribute routing protocol for opportunistic network environments. 1-6 - Qi Liao, Zhen Li, Aaron Striegel:
Is more P2P always bad for ISPs? An analysis of P2P and ISP business models. 1-6 - Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Wenlong Chen:
HSR: Using hybrid source routing to achieve scalable Internet routing. 1-8 - Shenglin Zhang, Ying Liu, Dan Pei:
A measurement study on BGP AS path looping (BAPL) behavior. 1-7 - Jia Lu, Biao Han, Wei Yang, Yuanming Gao, Wenhua Dou:
Smart error estimating coding: Using symbol error structure in wireless networks. 1-7 - Kuien Liu, Yaguang Li, Zhiming Ding, Shuo Shang, Kai Zheng:
Benchmarking big data for trip recommendation. 1-6 - Shuai Gao, Yujing Zeng, Hongbin Luo, Hongke Zhang:
Scalable area-based hierarchical control plane for software defined information centric networking. 1-7 - Xin Su, Jie Zeng, Chiyang Xiao:
Key technologies for SON in next generation radio access networks. 1-8 - Zhongxing Ming, Mingwei Xu, Dan Wang:
Age-based cooperative caching in information-centric networking. 1-8 - Chenguang Kong, Xiaojun Cao:
Semi-controlled authorized information dissemination in content-based social networks. 1-6 - Majid Khonji, Sid Chi-Kin Chau, Khaled M. Elbassioni:
Inapproximability of power allocation with inelastic demands in AC electric systems and networks. 1-6 - Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han:
The store-and-flood distributed reflective denial of service attack. 1-8 - Xiongqi Wu, James Griffioen:
Supporting application-based route selection. 1-8 - Wenbin Tang, Xiaowei Wu, T.-H. Hubert Chan:
An incentive protocol for distributed dynamic P2P video-on-demand streaming. 1-6 - Xiang Wang, Zhi Liu, Jun Li, Baohua Yang, Yaxuan Qi:
Tualatin: Towards network security service provision in cloud datacenters. 1-8 - Kaliappa Ravindran, Michael Iannelli:
SLA evaluation in cloud-based data-centric distributed services. 1-8 - Der-Rong Din, Chih-Wei Chou:
Virtual-topology adaptation for mixed-line-rate optical WDM networks under dynamic traffic. 1-6 - Binzhang Fu, Sheng Xu, Wentao Bao, Guolong Jiang, Mingyu Chen, Lixin Zhang, Yidong Tao, Rui He, Junfeng Zhao:
Dandelion: A locally-high-performance and globally-high-scalability hierarchical data center network. 1-8 - Toru Mano, Takeru Inoue, Dai Ikarashi, Koki Hamada, Kimihiro Mizutani, Osamu Akashi:
Efficient virtual network optimization across multiple domains without revealing private information. 1-8 - Xinming Zhang, Haitao Zhu, Guoqing Qiu:
Optimal physical carrier sensing to defend against exposed terminal problem in wireless ad hoc networks. 1-6 - Kebina Manandhar, Ben Adcock, Xiaojun Cao:
Preserving the Anonymity in MobilityFirst networks. 1-6 - Ashley D. Lloyd, P. H. W. Li, Mario Antonioletti, Terence M. Sloan:
Using global research infrastructure with big (commercial) data: Modelling consumer behaviour in China. 1-6 - Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng:
Feedback-based smartphone strategic sampling for BYOD security. 1-8 - Zane Wei, Da-Qi Ren:
Review of energy aware big data computing measurements, benchmark methods and performance analysis. 1-4 - Thai Duong, Thinh P. Nguyen:
Fast Markov Decision Process for data collection in sensor networks. 1-8 - Mayssaa El Rifai, Pramode K. Verma:
An IEEE 802.11 quantum handshake using the three-stage protocol. 1-6 - Chi-Chung Cheung, Hon-Wai Chu, Sean Shensheng Xu:
A new optimization algorithm for power saving in backbone networks. 1-6 - Waltenegus Dargie:
Estimation of the cost of VM migration. 1-8 - Quangang Li, Jinqiao Shi, Tingwen Liu, Li Guo, Zhiguang Qin:
A probabilistic approach towards modeling email network with realistic features. 1-8 - Hong Zhang, Kaiping Xue, Peilin Hong, Sean Shen:
Congestion exposure enabled TCP with network coding for hybrid wired-wireless network. 1-8 - Joshua A. Alcorn, C. Edward Chow:
A framework for large-scale modeling and simulation of attacks on an OpenFlow network. 1-6 - Yuhao Wen, Zhen Chen, Ge Ma, Junwei Cao, Wenxun Zheng, Guodong Peng, Shiwei Li, Wen-Liang Huang:
SECOMPAX: A bitmap index compression algorithm. 1-7 - Zoran Despotovic, Artur Hecker, Ahsan Naveed Malik, Riccardo Guerzoni, Ishan Vaishnavi, Riccardo Trivisonno, Sergio Beker:
VNetMapper: A fast and scalable approach to virtual networks embedding. 1-6 - Lixing Song, Shaoen Wu:
Cross-layer wireless information security. 1-9 - Panagiotis Georgopoulos, Matthew Broadbent, Bernhard Plattner, Nicholas J. P. Race:
Cache as a service: Leveraging SDN to efficiently and transparently support video-on-demand on the last mile. 1-9 - Kebina Manandhar, Xiaojun Cao:
Attacks/faults detection and isolation in the Smart Grid using Kalman Filter. 1-6 - Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta:
Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors. 1-8 - Xinming Zhang, Zhilong Dai, Haitao Zhu:
Channel reservation based on contention and interference in wireless ad hoc networks. 1-8 - Long Yao, Peilin Hong, Wei Zhou:
Evaluating the controller capacity in software defined networking. 1-6 - Longfei Wu, Xiaojiang Du, Jie Wu:
MobiFish: A lightweight anti-phishing scheme for mobile phones. 1-8 - Rabia Noor Enam, Rehan Qureshi:
An adaptive data aggregation technique for dynamic cluster based Wireless Sensor Networks. 1-7 - Zhe Fu, Kai Wang, Liangwei Cai, Jun Li:
Intelligent grouping algorithms for regular expressions in deep inspection. 1-8 - Xiang Lan, Sanfeng Zhang:
MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN. 1-8 - Guang Yao, Jun Bi, Tao Feng, Peiyao Xiao, Duanqi Zhou:
Performing software defined route-based IP spoofing filtering with SEFA. 1-8 - Xinming Zhang, Bo Yang, Yangyang Ma:
TCP congestion control based on accurate bandwidth-delay product in wireless Ad hoc networks. 1-7 - Lei Xie, Xiaoning Zhang, Sheng Wang:
An energy efficient algorithm based on multi-topology routing in IP networks. 1-8 - Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han:
MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph. 1-7 - Lan Wei, Wenbo Lian, Kuien Liu, Yongji Wang:
Hippo: An enhancement of pipeline-aware in-memory caching for HDFS. 1-5 - Jiangling Yin, Andrew Foran, Xuhong Zhang, Jun Wang:
ScalScheduling: A Scalable Scheduling Architecture for MPI-based interactive analysis programs. 1-8 - Chaozhu Zhang, Nairui Li:
The design and implementation of UAT mode ADS-B signal's RS decoder. 1-6 - Xin Xie, Keqiu Li, Xiulong Liu:
An unknown tag identification protocol based on coded filtering vector in large scale RFID systems. 1-8 - Xuanxia Yao, Xiaoguang Han, Xiaojiang Du:
A light-weight certificate-less public key cryptography scheme based on ECC. 1-8 - Jianjun Yang, Zongming Fei, Bryson Payne, Le Li, Markus A. Hitz, Tongquan Wei:
Location aided energy balancing strategy in green cellular networks. 1-6 - XiaoHua Xu, Min Song:
Stable wireless link scheduling subject to physical interference with power control. 1-8 - Sucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Yi Qian:
A security protocol for wireless sensor networks designed for monitoring smart grid transmission lines. 1-7 - António Furtado, Luis Irio, Rodolfo Oliveira, Luís Bernardo, Rui Dinis:
Characterization of the Spatial False Alarm effect in Cognitive Radio Networks. 1-8 - Zheng Guo, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Yi Qian:
A wireless sensor network for monitoring smart grid transmission lines. 1-6 - Baobao Zhang, Jun Bi, Jianping Wu:
LAS: An effective anti-spoofing method using existing information. 1-8 - Sha Yuan, Ding Tang, Yinlong Liu, Shuotian Bai, Tao Lin, Song Ci:
Context-aware distributed service provisioning based on anycast for information-centric network. 1-7 - Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim:
TCAM-based classification using divide-and-conquer for range expansion. 1-8 - Xiong Wang, Mengchao Ran:
Link weights migration without congestion in IP networks. 1-6 - Yao-Jen Tang, Jian-Jhih Kuo, Ming-Jer Tsai:
Double-ruling-based location-free data replication and retrieval scheme in mobile ad hoc networks. 1-8 - Bin Tang, Neeraj Jaggi, Masaaki Takahashi:
Achieving data K-Availability in intermittently connected sensor networks. 1-8 - Yunlong Song, Min Liu:
Greedy-based distributed algorithms for green traffic routing. 1-8 - Arnaud Kaiser, Michael Boc:
Energy-efficient routing in IPv6 home networks. 1-8 - Uri Verner, Avi Mendelson, Assaf Schuster:
Scheduling periodic real-time communication in multi-GPU systems. 1-8 - Kun-Ting Chen, Chien Chen, Po-Hsiang Wang:
Network aware load-balancing via parallel VM migration for data centers. 1-8 - Kaustubh Dhondge, Baek-Young Choi, Sejun Song, Hyungbae Park:
Optical Wireless authentication for smart devices using an onboard ambient light sensor. 1-8 - Xinjie Guan, Baek-Young Choi, Sejun Song:
Topology and migration-aware energy efficient virtual network embedding for green data centers. 1-8 - Huian Li, Abhishek Reddy Kankanala, Xukai Zou:
A taxonomy and comparison of remote voting schemes. 1-8 - Mayank Raj, Krishna Kant, Sajal K. Das:
E-DARWIN: Energy Aware Disaster Recovery Network using WiFi Tethering. 1-8 - Hengyi Wei, Baocheng Sun, Mingming Jing:
BalancedBoost: A hybrid approach for real-time network traffic classification. 1-6 - Mark Scanlon, Huijie Shen:
An analysis of BitTorrent cross-swarm peer participation and geolocational distribution. 1-6 - Xinming Zhang, Zhigang Duan, Lei Tao, Dan Keun Sung:
Localization algorithms based on a mobile anchor in wireless sensor networks. 1-6 - Jason Richmond, Jinhua Guo:
Pricing the Internet for congestion control and social welfare. 1-6 - Cherry Ye Aung, Peter Han Joo Chong, Ruo Jun Cai:
Hybrid opportunistic routing in highly dynamic MANET. 1-6 - Abderrahmen Mtibaa, Khaled A. Harras, Hussein M. Alnuweiri:
Malicious attacks in Mobile Device Clouds: A data driven risk assessment. 1-8 - Chenxi Zhou, Yuchun Guo, Yishuai Chen, Xiaofei Nie, Wei Zhu:
Characterizing user watching behavior and video quality in mobile devices. 1-6 - Masaki Tagawa, Yutaro Wada, Yuzo Taenaka, Kazuya Tsukamoto:
Network capacity expansion methods based on efficient channel utilization for multi-channel wireless backbone network. 1-6 - Yan Liu, Xin Xu, Xi Ding, Yong Cui:
Localized routing optimization for multi-access Mobile Nodes in PMIPv6. 1-5 - Qian Hu, Yang Wang, Xiaojun Cao:
Virtual network embedding: An optimal decomposition approach. 1-6 - Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li:
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. 1-8 - Kaliappa Ravindran:
Software cybernetics to manage adaptation behavior of complex network systems. 1-8 - Anhua Lin, Jianzhong Zhang, Kai Lu, Wen Zhang:
An efficient outdoor localization method for smartphones. 1-8 - Dan Ni, Kaiping Xue, Peilin Hong, Sean Shen:
Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism for multipath TCP in lossy networks. 1-7 - Xinming Zhang, Fan Yan, Lei Tao, Dan Keun Sung:
Optimal candidate set for opportunistic routing in asynchronous wireless sensor networks. 1-8 - Yanan Liu, Lei Mao, Lein Harn, Yi Wang:
Group key distribution with full-healing property. 1-6 - Jiajun Zhu, Bang Wang:
Sensor placement algorithms for confident information coverage in wireless sensor networks. 1-7 - Kotaro Kataoka, Nitin Agarwal, Aditya V. Kamath:
Scaling a broadcast domain of Ethernet: Extensible transparent filter using SDN. 1-8 - Kewei Sha, Chenguang Xu, Zhiwei Wang:
One-time symmetric key based cloud supported secure smart meter reading. 1-6 - Eunsang Cho, Jaeyoung Choi, Donghyun Kim, Jongsoon Yoon, Ted Taekyoung Kwon, Yanghee Choi:
LOCON: A lookup-based content-oriented networking framework. 1-8 - Qingsong Liu, Yifan Hu:
MicroEye: Visual summary of microblogsphere from the eye of celebrities. 1-6 - Ying Mao, Jiayin Wang, Joseph Paul Cohen, Bo Sheng:
PASA: Passive broadcast for smartphone ad-hoc networks. 1-8 - Feixiong Zhang, Yanyong Zhang, Alex Reznik, Hang Liu, Chen Qian, Chenren Xu:
A transport protocol for content-centric networking with explicit congestion control. 1-8 - Yanan Chang, Xiaohua Jia:
Rate-adaptive broadcast routing and scheduling for video streaming in wireless mesh networks. 1-8 - Ke Liu, Jack Y. B. Lee:
Uplink delay variation compensation in queue length estimation over mobile data networks. 1-8 - Liang Chen, Yipeng Zhou, Dah-Ming Chiu:
A lifetime model of online video popularity. 1-8 - Shuang Liang, Xiaojiang Du, Chiu C. Tan, Wei Yu:
An effective online scheme for detecting Android malware. 1-8 - Xinming Zhang, Kaiheng Chen, Yue Zhang, Dan Keun Sung:
A probabilistic broadcast algorithm based on the connectivity information of predictable rendezvous nodes in mobile ad hoc networks. 1-6 - Chow-Sing Lin, Jhe-Wei Lin:
Streaming videos over BitTorrent by balancing playback continuity and distribution of piece rareness. 1-5 - Kun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin:
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. 1-6 - Shen Li, Lu Su, Yerzhan Suleimenov, Hengchang Liu, Tarek F. Abdelzaher, Guihai Chen:
Centaur: Dynamic message dissemination over online social networks. 1-8 - Xiao Zhao, Hancheng Lu:
Adaptive hybrid digital-analog video transmission in wireless mobile networks. 1-7 - Guangyu Li, Lila Boukhatem:
An Intersection-based Delay sensitive routing for VANETs using ACO algorithm. 1-8 - Jonathan D. Backens, Min Song, Chunsheng Xin:
A transparent spectrum co-access protocol for cognitive radio networks. 1-8 - Wen Wu, Xu Li, Huarui Yin, Guo Wei:
A joint real grassmannian quantization strategy for MIMO interference alignment with limited feedback. 1-6 - Wenzhe Zhang, Zhenquan Qin, Jiajun Xin, Lei Wang, Ming Zhu, Liang Sun, Lei Shu:
UPMAC: A localized load-adaptive MAC protocol for underwater acoustic networks. 1-8 - Cheng Cui, Lin Xue, Chui-Hui Chiu, Praveenkumar Kondikoppa, Seung-Jong Park:
DMCTCP: Desynchronized Multi-Channel TCP for high speed access networks with tiny buffers. 1-8 - Xiaojiang Ren, Weifa Liang, Wenzheng Xu:
Maximizing charging throughput in rechargeable sensor networks. 1-8 - Shouxi Luo, Hongfang Yu, Lemin Li:
Fast incremental flow table aggregation in SDN. 1-8 - Ming Zhu, Dan Li, Ying Liu, Jianping Wu:
CDRDN: Content Driven Routing in Datacenter Network. 1-8 - Alok N. Choudhary, John C. S. Lui, Keith W. Ross:
Keynote speakers: Big data science and social networks - Accelerating insights and building value. 1-3 - Sujie Shao, Shao-Yong Guo, Xuesong Qiu, Luoming Meng:
A random switching traffic scheduling algorithm in wireless smart grid communication network. 1-6 - Ahmad Foroozani, Mohammed Gharib, Ali Mohammad Afshin Hemmatyar, Ali Movaghar:
A novel human mobility model for MANETs based on real data. 1-7 - Zain ul Abidin Jaffri, Yueping Cai:
ZET: Zone and energy threshold based clustering routing protocol for Wireless Sensor Networks. 1-6 - Kyung-Hwa Kim, Hyunwoo Nam, Vishal Kumar Singh, Daniel Song, Henning Schulzrinne:
DYSWIS: Crowdsourcing a home network diagnosis. 1-10 - Hong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang:
Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach. 1-6 - Wenqi Sun, Hewu Li, Jianping Wu:
Channel assignment based on conflict-area for reducing interference in large-scale WLANs. 1-5 - Jiajun Sun, Huadong Ma:
Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets. 1-8 - Soumya Hegde, Raksha Srinivas, Dinil Mon Divakaran, Mohan Gurusamy:
Dynamic embedding of virtual networks in hybrid optical-electrical datacenters. 1-8 - Jun Huang, Yanxiao Zhao, Kazem Sohraby:
Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach. 1-8 - Hao Wang, Yangming Zhao, Haibing Guan:
On pricing schemes in data center network with game theoretic approach. 1-8 - Yimin Zhang, Guizhong Liu:
JCCA resource allocation for video transmission in OFDMA relay system. 1-7 - Sheng Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu:
Leveraging tenant flexibility in resource allocation for virtual networks. 1-8 - Shaoen Wu, Saad Biaz:
Auto bit rate adaptation with transmission failure diagnosis for WLANs. 1-8 - Lei Meng, Shu Liu, Aaron D. Striegel:
Characterizing the utility of smartphone background traffic. 1-5 - Guozi Sun, Siqi Huang, Wan Bao, Yitao Yang, Zhiwei Wang:
A privacy protection policy combined with privacy homomorphism in the Internet of Things. 1-6 - Rui Deng, Guizhong Liu, Jian Yang:
Utility based optimized cross-layer scheduling for real-time video over HSDPA. 1-6 - Hongbin Luo, Jianbo Cui, Gong Chen, Zhe Chen, Hongke Zhang:
On the applicability of software defined networking to large scale networks. 1-6 - Jiapeng Zhang, Yingfei Dong:
Utilizing path dynamics for delay assurance in synchronized multihop scheduling. 1-6 - Levi Malott, Sriram Chellappan:
Investigating the fractal nature of individual user netflow data. 1-6 - Wei Liu, E. K. Park, S. S. Zhu:
e-Health PST (privacy, security and trust) mobile networking infrastructure. 1-6 - Yanxiao Zhao, Md Nashid Anjum, Min Song:
A new interference model for the IEEE 802.22 cognitive WRAN. 1-8 - Ming Zhu, Zhiping Cai, Dong Zhao, Junhui Wang, Ming Xu:
Using multiple unmanned aerial vehicles to maintain connectivity of MANETs. 1-7 - Ji Li, Yuanyuan Yang, Cong Wang:
Mobility Assisted Data Gathering in heterogeneous energy replenishable wireless sensor networks. 1-8 - Georg Wimmer:
Transient magnetic field formulation for solid source conductors with axial symmetry. 1-4 - Quanlong Li, Qing Yang, Shaoen Wu:
Multi-bit sensing based target localization (MSTL) algorithm in wireless sensor networks. 1-7 - Abhishek Parakh, Pramode K. Verma:
Improving the efficiency of entanglement based quantum key exchange. 1-6 - Ruiyun Yu, Pengfei Wang, Zhijie Zhao:
NDI: Node-dependence-based Dynamic gaming Incentive algorithm in opportunistic networks. 1-8 - Sulabh Bhattarai, Stephen Rook, Linqiang Ge, Sixiao Wei, Wei Yu, Xinwen Fu:
On simulation studies of cyber attacks against LTE networks. 1-8 - Min Yao, Chuang Lin:
An online mechanism for dynamic instance allocation in reserved instance marketplace. 1-8 - You Wang, Jun Bi:
A solution for IP mobility support in software defined networks. 1-8 - Aamir Saeed, Jens Myrup Pedersen, Rasmus Løvenstein Olsen:
QoE loss score value for service migration in context aware environment. 1-5 - Dan Liao, Gang Sun, Vishal Anand, Kexiang Xiao, Mao Gan:
Cost efficient survivable multicast virtual network design. 1-7 - Scott T. Rager, Ertugrul N. Ciftcioglu, Thomas F. La Porta:
Performance analysis of practical distributed backpressure protocols. 1-8 - Xiaoli Huan, Bang Wang, Yijun Mo:
Placement of rechargeable routers based on proportional fairness in green mesh networks. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.