default search action
34th INFOCOM 2015: Kowloon, Hong Kong
- 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015. IEEE 2015, ISBN 978-1-4799-8381-0
Multimedia Networking
- Eilwoo Baik, Amit Pande, Chris Stover, Prasant Mohapatra:
Video acuity assessment in mobile devices. 1-9 - Kien A. Hua, Ning Jiang, Jason Kuhns, Vaithiyanathan Sundaram, Cliff C. Zou:
Redundancy control through traffic deduplication. 10-18 - Sangki Yun, Daehyeok Kim, Xiaofan Lu, Lili Qiu:
Optimized layered integrated video encoding. 19-27 - Xiaoli Wang, Jiasi Chen, Aveek Dutta, Mung Chiang:
Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing. 28-36
Device-to-Device and 5G Networks
- Chuan Ma, Weijie Wu, Ying Cui, Xinbing Wang:
On the performance of successive interference cancellation in D2D-enabled cellular networks. 37-45 - Jiajia Liu, Shangwei Zhang, Hiroki Nishiyama, Nei Kato, Jun Guo:
A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks. 46-54 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks. 55-63
Energy Efficiency in Wireless Networks
- Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo:
Energy-efficient transmission with data sharing. 73-81 - Philipp H. Kindt, Han Jing, Nadja Peters, Samarjit Chakraborty:
ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission. 82-90 - Michael J. Neely:
Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs. 91-99 - Swetank Kumar Saha, Pratik Deshpande, Pranav P. Inamdar, Ramanujan K. Sheshadri, Dimitrios Koutsonikolas:
Power-throughput tradeoffs of 802.11n/ac in smartphones. 100-108
Topology and Flow Control in Datacenter Networks
- Márton Csernai, Florin Ciucu, Ralf-Peter Braun, András Gulyás:
Towards 48-fold cabling complexity reduction in large flattened butterfly networks. 109-117 - Danfeng Shan, Wanchun Jiang, Fengyuan Ren:
Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches. 118-126 - Han Zhang, Xingang Shi, Xia Yin, Fengyuan Ren, Zhiliang Wang:
More load, more differentiation - A design principle for deadline-aware congestion control. 127-135 - Jun Duan, Zhiyang Guo, Yuanyuan Yang:
Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs. 136-144
Cognitive Radio Networks 1
- Pei Huang, Chin-Jung Liu, Xi Yang, Li Xiao:
Efficient broadcast on fragmented spectrum in cognitive radio networks. 145-153 - Zhaoquan Gu, Haosen Pu, Qiang-Sheng Hua, Francis C. M. Lau:
Improved rendezvous algorithms for heterogeneous cognitive radio networks. 154-162 - Yi Song:
Optimal secondary user packet size in mobile cognitive radio networks under fading channels. 163-171 - Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, Chi Zhang:
SpecGuard: Spectrum misuse detection in dynamic spectrum access systems. 172-180
Software Defined Networking 1
- Shan-Hsiang Shen, Liang-Hao Huang, De-Nian Yang, Wen-Tsuen Chen:
Reliable multicast routing for software-defined networks. 181-189 - Marco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid:
A distributed and robust SDN control plane for transactional network updates. 190-198 - Zhiming Hu, Jun Luo:
Cracking network monitoring in DCNs with SDN. 199-207 - Di Wu, Dmitri I. Arkhipov, Eskindir Asmare, Zhijing Qin, Julie A. McCann:
UbiFlow: Mobility management in urban-scale software defined IoT. 208-216
Sensor Networks 1
- Jing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao:
Composite event coverage in wireless sensor networks with heterogeneous sensors. 217-225 - Bahram Alinia, Mohammad Hassan Hajiesmaili, Ahmad Khonsari:
On the construction of maximum-quality aggregation trees in deadline-constrained WSNs. 226-234 - Steffen Bondorf, Jens B. Schmitt:
Boosting sensor network calculus by thoroughly bounding cross-traffic. 235-243 - Shuangjuan Li, Hong Shen:
Minimizing the maximum sensor movement for barrier coverage in the plane. 244-252
Security in Wireless Networks
- Zhuo Lu, Yalin Evren Sagduyu, Jason H. Li:
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks. 253-261 - Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du:
Game-theory-based batch identification of invalid signatures in wireless mobile networks. 262-270 - Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen:
Exploiting mobile social behaviors for Sybil detection. 271-279 - Zhuo Lu, Cliff Wang:
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. 280-288
Overlay and Peer-to-Peer Networks
- Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria:
ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer. 289-297 - Stefanie Roos, Thorsten Strufe:
On the impossibility of efficient self-stabilization in virtual overlays with churn. 298-306 - Bang Liu, Di Niu, Zongpeng Li, H. Vicky Zhao:
Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling. 307-315 - Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis. 316-324
Hetergeneous Cellular Networks
- Wei Wang, Xiaobing Wu, Lei Xie, Sanglu Lu:
Femto-matching: Efficient traffic offloading in heterogeneous cellular networks. 325-333 - Wei Bao, Ben Liang:
Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective. 334-342 - Hao Zhou, Yusheng Ji, Xiaoyan Wang, Baohua Zhao:
ADMM based algorithm for eICIC configuration in heterogeneous cellular networks. 343-351 - Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan:
Performance analysis for two-tier cellular systems based on probabilistic distance models. 352-360
Mobile and Wireless Network Measurements 1
- Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li:
How bad are the rogues' impact on enterprise 802.11 network performance? 361-369 - Weichao Li, Ricky K. P. Mok, Daoyuan Wu, Rocky K. C. Chang:
On the accuracy of smartphone-based mobile network measurement. 370-378 - Song Min Kim, Shuai Wang, Tian He:
Exploiting causes and effects of wireless link correlation for better performance. 379-387 - Dziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein:
Dissecting packet loss in mobile broadband networks from the edge. 388-396
Routing and Scheduling in Datacenter Networks
- Yousi Zheng, Ness B. Shroff, R. Srikant, Prasun Sinha:
Exploiting large system dynamics for designing simple data center schedulers. 397-405 - Chang-Heng Wang, Tara Javidi, George Porter:
End-to-end scheduling for all-optical data centers. 406-414 - Kai Han, Zhiming Hu, Jun Luo, Liu Xiang:
RUSH: Routing and scheduling for hybrid data center networks. 415-423 - Yangming Zhao, Kai Chen, Wei Bai, Minlan Yu, Chen Tian, Yanhui Geng, Yiming Zhang, Dan Li, Sheng Wang:
Rapier: Integrating routing and scheduling for coflow-aware data center networks. 424-432
Cognitive Radio Networks 2
- Dong-Hoon Shin, Shibo He, Junshan Zhang:
Joint sensing task and subband allocation for large-scale spectrum profiling. 433-441 - Jelena V. Misic, Md. Mizanur Rahman, Vojislav B. Misic:
Priority differentiation in cognitive radio networks. 442-450 - Narendra Anand, Jeongkeun Lee, Sung-Ju Lee, Edward W. Knightly:
Mode and user selection for multi-user MIMO WLANs without CSI. 451-459 - Wei Wang, Yingjie Victor Chen, Zeyu Wang, Jin Zhang, Kaishun Wu, Qian Zhang:
Changing channel without strings: Coordination-free wideband spectrum adaptation. 460-468
Software Defined Networking 2
- Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever:
On the co-existence of distributed and centralized routing control-planes. 469-477 - Xuan Nam Nguyen, Damien Saucez, Chadi Barakat, Thierry Turletti:
OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement. 478-486 - Huandong Wang, Yong Li, Ying Zhang, Depeng Jin:
Virtual machine migration planning in software-defined networks. 487-495 - Calvin Newport, Wenchao Zhou:
The (surprising) computational power of the SDN data plane. 496-504
Sensor Networks 2
- Rahul Singh, Xueying Guo, P. R. Kumar:
Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks. 505-512 - Laura Galluccio, Sebastiano Milardo, Giacomo Morabito, Sergio Palazzo:
SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. 513-521 - Dora Spenza, Michele Magno, Stefano Basagni, Luca Benini, Mario Paoli, Chiara Petrioli:
Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems. 522-530 - Siyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang:
Drawing dominant dataset from big sensory data in wireless sensor networks. 531-539
Internet and Web Security 1
- Michela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral:
Accelerating regular expression matching over compressed HTTP. 540-548 - Jingyu Hua, Yue Gao, Sheng Zhong:
Differentially private publication of general time-serial trajectory data. 549-557 - Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo:
Detecting distributed signature-based intrusion: The case of multi-path routing attacks. 558-566 - Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song:
JITScope: Protecting web users from control-flow hijacking attacks. 567-575
Cloud Storage Systems
- Jian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li:
Online procurement auctions for resource pooling in client-assisted cloud storage systems. 576-584 - Yin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff:
Provably delay efficient data retrieving in storage clouds. 585-593 - Yanfei Guo, Jia Rao, Dazhao Cheng, Changjun Jiang, Cheng-Zhong Xu, Xiaobo Zhou:
StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters. 594-602 - Boyang Yu, Jianping Pan:
Location-aware associated data placement for geo-distributed data-intensive applications. 603-611
Cognitive Radio Networks 3
- Shimin Gong, Lingjie Duan, Ping Wang:
Robust optimization of cognitive radio networks powered by energy harvesting. 612-620 - Rahul Urgaonkar, Prithwish Basu, Saikat Guha, Ananthram Swami:
Optimal multicast in dense multi-channel multi-radio wireless networks. 621-629 - Jincheng Zhang, Wenjie Zhang, Minghua Chen, Zhi Wang:
WINET: Indoor white space network design. 630-638 - Yanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Danfeng (Daphne) Yao:
MadeCR: Correlation-based malware detection for cognitive radio. 639-647
Routing and Traffic Engineering
- Weiguo Dai, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Francis C. M. Lau:
Minimum control latency of dynamic networks. 648-656 - Randeep Bhatia, Fang Hao, Murali S. Kodialam, T. V. Lakshman:
Optimized network traffic engineering using segment routing. 657-665 - Feng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa:
Compact location encodings for scalable Internet routing. 666-674 - Rowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas A. Dimitropoulos:
Policy-compliant path diversity and bisection bandwidth. 675-683
Sensor Networks 3
- Zuoming Yu, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan:
Local face-view barrier coverage in camera sensor networks. 684-692 - Lin Chen, Ruolin Fan, Kaigui Bian, Lin Chen, Mario Gerla, Tao Wang, Xiaoming Li:
On heterogeneous neighbor discovery in wireless sensor networks. 693-701 - Hao Cai, Tilman Wolf:
On 2-way neighbor discovery in wireless networks with directional antennas. 702-710 - Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
VM-tracking: Visual-motion sensing integration for real-time human tracking. 711-719
Internet and Web Security 2
- Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
Original SYN: Finding machines hidden behind firewalls. 720-728 - Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura:
Agile virtualized infrastructure to proactively defend against cyber attacks. 729-737 - Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Adversary-aware IP address randomization for proactive agility against sophisticated attackers. 738-746 - Pengfei Hu, Hongxing Li, Hao Fu, Derya Cansever, Prasant Mohapatra:
Dynamic defense strategy against advanced persistent threat with insiders. 747-755
Joint Source Coding and Network Coding
- Jad Hachem, Nikhil Karamchandani, Suhas N. Diggavi:
Content caching and delivery over heterogeneous wireless networks. 756-764 - Qiao Xiang, Hongwei Zhang, Jianping Wang, Guoliang Xing, Shan Lin, Xue Liu:
On optimal diversity in network-coding-based routing in wireless networks. 765-773 - Fangzhou Chen, Bin Li, Can Emre Koksal:
Low-delay distributed source coding for time-varying sources with unknown statistics. 774-782 - Yuben Qu, Chao Dong, Haipeng Dai, Fan Wu, Shaojie Tang, Hai Wang, Chang Tian:
Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability. 783-791
Next Generation Cellular Networks
- Shubhadip Mitra, Sayan Ranu, Vinay Kolar, Aditya Telang, Arnab Bhattacharya, Ravi Kokku, Sriram Raghavan:
Trajectory aware macro-cell planning for mobile users. 792-800 - François Baccelli, Xinchen Zhang:
A correlated shadowing model for urban wireless networks. 801-809 - Sangki Yun, Lili Qiu:
Supporting WiFi and LTE co-existence. 810-818 - Eugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin:
SPIRO: Turning elephants into mice with efficient RF transport. 819-827
Mobile and Wireless Network Measurements 2
- Sookhyun Yang, Jim Kurose, Simon Heimlicher, Arun Venkataramani:
Measurement and modeling of user transitioning among networks. 828-836 - Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria:
On factors affecting the usage and adoption of a nation-wide TV streaming service. 837-845 - Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos:
A behavior-aware profiling of handheld devices. 846-854 - Shu Wang, Vignesh Venkateswaran, Xinyu Zhang:
Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework. 855-863
Cloud Computing
- Pengfei Zhang, Xi Li, Rui Chu, Huaimin Wang:
HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform. 864-872 - Mohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. S. Eugene Ng, Sanjay G. Rao:
Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing. 873-881 - Jing Fu, Jun Guo, Eric W. M. Wong, Moshe Zukerman:
Energy-efficient heuristics for job assignment in processor-sharing server farms. 882-890 - Zhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang:
Need for speed: CORA scheduler for optimizing completion-times in the cloud. 891-899
Resource Markets in Wireless Networks
- Yuan Luo, Lin Gao, Jianwei Huang:
HySIM: A hybrid spectrum and information market for TV white space networks. 900-908 - Ming Li, Pan Li, Linke Guo, Xiaoxia Huang:
PPER: Privacy-preserving economic-robust spectrum auction in wireless networks. 909-917 - Ruihao Zhu, Kang G. Shin:
Differentially private and strategy-proof spectrum auction with approximate revenue maximization. 918-926 - Yu Wu, Lei Ying:
A cloudlet-based multi-lateral resource exchange framework for mobile users. 927-935
Scheduling and Buffer Management 1
- Mostafa Dehghan, Anand Seetharam, Bo Jiang, Ting He, Theodoros Salonidis, Jim Kurose, Don Towsley, Ramesh K. Sitaraman:
On the complexity of optimal routing and content caching in heterogeneous networks. 936-944 - Felix Poloczek, Florin Ciucu:
Service-martingales: Theory and applications to the delay analysis of random access protocols. 945-953 - Ari Arapostathis, Anup Biswas, Guodong Pang:
Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost. 954-962 - Qiaomin Xie, Yi Lu:
Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality. 963-972
Sensor Networks 4
- Jiguo Yu, Lili Jia, Dongxiao Yu, Guangshun Li, Xiuzhen Cheng:
Minimum connected dominating set construction in wireless networks under the beeping model. 972-980 - Chen Wang, Hongbo Jiang:
SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs. 981-989 - Zhiwei Zhao, Wei Dong, Gaoyang Guan, Jiajun Bu, Tao Gu, Chun Chen:
Modeling link correlation in low-power wireless networks. 990-998 - Lin Chen, Wei Wang, Hua Huang, Shan Lin:
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design. 999-1007
Privacy
- Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang:
Personalized location privacy in mobile networks: A social group utility approach. 1008-1016 - Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Enhancing privacy through caching in location-based services. 1017-1025 - Linke Guo, Yuguang Fang, Ming Li, Pan Li:
Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems. 1026-1034 - Sergio Salinas, Changqing Luo, Xuhui Chen, Pan Li:
Efficient secure outsourcing of large-scale linear systems of equations. 1035-1043
Resource Provisioning in Cloud Computing
- Yipei Niu, Bin Luo, Fangming Liu, Jiangchuan Liu, Bo Li:
When hybrid cloud meets flash crowd: Towards cost-effective service provisioning. 1044-1052 - Xiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau:
A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioning. 1053-1061 - Doron Zarchy, David Hay, Michael Schapira:
Capturing resource tradeoffs in fair multi-resource allocation. 1062-1070 - Huanle Xu, Wing Cheong Lau:
Optimization for speculative execution in a MapReduce-like cluster. 1071-1079
Fault Tolerance and Survivability 1
- Zhao Zhang, Yishuo Shi:
Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network. 1080-1085 - Cing-yu Chu, Kang Xi, Min Luo, H. Jonathan Chao:
Congestion-aware single link failure recovery in hybrid SDN networks. 1086-1094 - Shehla S. Rana, Nitin H. Vaidya:
iPath: Intelligent and optimal path selection for Byzantine fault tolerant communication. 1095-1103 - Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov:
On sample-path staleness in lazy data replication. 1104-1112
Scheduling and Buffer Management 2
- Kristen Gardner, Sem C. Borst, Mor Harchol-Balter:
Optimal scheduling for jobs with progressive deadlines. 1113-1121 - Florin Ciucu, Felix Poloczek:
On multiplexing flows: Does it hurt or not? 1122-1130 - Lei Ying, R. Srikant, Xiaohan Kang:
The power of slightly more than one sample in randomized load balancing. 1131-1139 - Malhar Mehta, Veeraruna Kavitha, Nandyala Hemachandra:
Price of fairness for opportunistic and priority schedulers. 1140-1148
Vehicular Networks
- Qiao Xiang, Xi Chen, Linghe Kong, Lei Rao, Xue Liu:
Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks. 1149-1157 - Stefania Santini, Alessandro Salvi, Antonio Saverio Valente, Antonio Pescapè, Michele Segata, Renato Lo Cigno:
A consensus-based approach for platooning with inter-vehicular communications. 1158-1166 - Shuo Zhang, Fei He, Ming Gu:
VeRV: A temporal and data-concerned verification framework for the vehicle bus systems. 1167-1175 - Sanjib Sur, Xinyu Zhang:
Bridging link power asymmetry in mobile whitespace networks. 1176-1184
Smartphones
- Wenjie Hu, Guohong Cao:
Energy-aware video streaming on smartphones. 1185-1193 - Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen:
Fine-grained sleep monitoring: Hearing your breathing with smartphones. 1194-1202 - Boyuan Sun, Qiang Ma, Shanfeng Zhang, Kebin Liu, Yunhao Liu:
iSelf: Towards cold-start emotion labeling using transfer learning with smartphones. 1203-1211 - Ge Peng, Gang Zhou, David T. Nguyen, Xin Qi:
All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend mode. 1212-1220
Theoretical Foundations in Networking Problems 1
- Ashwin Pananjady, Vivek Kumar Bagaria, Rahul Vaze:
The online disjoint set cover problem and its applications. 1221-1229 - Maialen Larrañaga, Urtzi Ayesta, Ina Maria Verloop:
Stochastic and fluid index policies for resource allocation problems. 1230-1238 - Abhishek Dixit, Bart Lannoo, Didier Colle, Mario Pickavet, Piet Demeester:
Delay models in ethernet long-reach passive optical networks. 1239-1247 - Abhishek Sinha, Georgios S. Paschos, Chih-Ping Li, Eytan H. Modiano:
Throughput-optimal broadcast on directed acyclic graphs. 1248-1256
LTE Networks
- Matthew A. Clark, Konstantinos Psounis:
Efficient resource scheduling for a secondary network in shared spectrum. 1257-1265 - Jiasi Chen, Mung Chiang, Jeffrey Erman, Guangzhi Li, K. K. Ramakrishnan, Rakesh K. Sinha:
Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics. 1266-1274 - Hamzeh Beyranvand, Martin Lévesque, Martin Maier, Jawad A. Salehi:
FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloading. 1275-1283 - Rajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Prasant Mohapatra:
Mitigating macro-cell outage in LTE-Advanced deployments. 1284-1292
Scheduling in Wireless Networks
- Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra:
Latency-aware rate adaptation in 802.11n home networks. 1293-1301 - Bin Li, Atilla Eryilmaz, R. Srikant:
On the universality of age-based scheduling in wireless networks. 1302-1310 - Lixin Wang, Peng-Jun Wan, Kyle Young:
Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networks. 1311-1319 - Marcin Bienkowski, Jaroslaw Byrka, Krzysztof Chrobak, Tomasz Jurdzinski, Dariusz R. Kowalski:
Provable fairness for TDMA scheduling. 1320-1327
Cloud Performance
- Bo Wang, Jinlei Jiang, Guangwen Yang:
ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement. 1328-1336 - Yucheng Zhang, Hong Jiang, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yukun Zhou:
AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication. 1337-1345 - Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz:
Near optimal placement of virtual network functions. 1346-1354 - Zhan Qiu, Juan F. Pérez:
Enhancing reliability and response times via replication in computing clusters. 1355-1363
Fault Tolerance and Survivability 2
- James Willson, Zhao Zhang, Weili Wu, Ding-Zhu Du:
Fault-tolerant coverage with maximum lifetime in wireless sensor networks. 1364-1372 - Andrés J. Gonzalez, Bjarne E. Helvik, Prakriti Tiwari, Denis M. Becker, Otto J. Wittner:
GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance. 1373-1381 - Rein Houthooft, Sahel Sahhaf, Wouter Tavernier, Filip De Turck, Didier Colle, Mario Pickavet:
Robust geometric forest routing with tunable load balancing. 1382-1390 - Mohammed Shatnawi, Mohamed Hefeeda:
Real-time failure prediction in online services. 1391-1399
Scheduling and Buffer Management 3
- Xin Li, Chen Qian:
Low-complexity multi-resource packet scheduling for network function virtualization. 1400-1408 - Yin-Chi Chan, Jun Guo, Eric W. M. Wong, Moshe Zukerman:
Performance analysis for overflow loss systems of processor-sharing queues. 1409-1417 - Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan:
Priority queueing with multiple packet characteristics. 1418-1426 - Sucha Supittayapornpong, Michael J. Neely:
Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffers. 1427-1435
Wireless Access Networks
- Zhice Yang, Jiansong Zhang, Kun Tan, Qian Zhang, Yongguang Zhang:
Enabling TDMA for today's wireless LANs. 1436-1444 - Ehsan Monsef, Alireza Keshavarz-Haddad, Ehsan Aryafar, Jafar Saniie, Mung Chiang:
Convergence properties of general network selection games. 1445-1453 - Ashish Patro, Suman Banerjee:
Outsourcing coordination and management of home wireless access points through an open API. 1454-1462 - Jun Huang, Guoliang Xing, Jianwei Niu, Shan Lin:
CodeRepair: PHY-layer partial packet recovery without the pain. 1463-1471
Mobile Applications and Economics
- Heba Abdelnasser, Moustafa Youssef, Khaled A. Harras:
WiGest: A ubiquitous WiFi-based gesture recognition system. 1472-1480 - Qiang Xu, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci, Thomas Andrews:
Automatic generation of mobile app signatures from traffic observations. 1481-1489 - Shusen Yang, Usman Adeel, Julie A. McCann:
Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems. 1490-1498 - Carlee Joe-Wong, Sangtae Ha, Mung Chiang:
Sponsoring mobile data: An economic analysis of the impact on users and content providers. 1499-1507
Theoretical Foundations in Networking Problems 2
- Pan Lai, Rui Fan:
Fast optimal nonconcave resource allocation. 1508-1516 - Chris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai:
Local detection of infections in heterogeneous networks. 1517-1525 - Peng-Jun Wan, Fahad Al-dhelaan, Sai Ji, Lei Wang, Ophir Frieder:
Flow-based feasibility test of linear interference alignment with arbitrary interference topology. 1526-1534 - Fang Dong, Kui Wu, S. Venkatesh:
Copula analysis for statistical network calculus. 1535-1543
Theoretical Foundations in Social Networks 1
- Tobias Friedrich, Anton Krohmer:
Cliques in hyperbolic random graphs. 1544-1552 - Minas Gjoka, Balint Tillman, Athina Markopoulou:
Construction of simple graphs with a target joint degree matrix and beyond. 1553-1561 - Jungseul Ok, Jinwoo Shin, Yung Yi:
On the progressive spread over strategic diffusion: Asymptotic and computation. 1562-1570 - Carla-Fabiana Chiasserini, Michele Garetto, Emilio Leonardi:
De-anonymizing scale-free social networks by percolation graph matching. 1571-1579
The Mobile Internet: Measurements and Economics
- Liang Zheng, Carlee Joe-Wong, Chee Wei Tan, Sangtae Ha, Mung Chiang:
Secondary markets for mobile data: Feasibility and benefits of traded data plans. 1580-1588 - Geoffrey Alexander, Jedidiah R. Crandall:
Off-path round trip time measurement via TCP/IP side channels. 1589-1597 - Sarker Tanzir Ahmed, Clint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov:
Around the web in six weeks: Documenting a large-scale crawl. 1598-1606 - Yanjiao Chen, Lingjie Duan, Qian Zhang:
Financial analysis of 4G network deployment. 1607-1615
Big Data Processing
- Yu Hua, Wenbo He, Xue Liu, Dan Feng:
SmartEye: Real-time and efficient cloud image sharing for disaster environments. 1616-1624 - Sarker Tanzir Ahmed, Dmitri Loguinov:
Modeling randomized data streams in caching, data processing, and crawling applications. 1625-1633 - Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov:
Temporal update dynamics under blind sampling. 1634-1642 - William Culhane, Kirill Kogan, Chamikara Jayalath, Patrick Eugster:
Optimal communication structures for big data aggregation. 1643-1651
RFID 1
- Han Ding, Jinsong Han, Alex X. Liu, Jizhong Zhao, Panlong Yang, Wei Xi, Zhiping Jiang:
Human object estimation via backscattered radio frequency signal. 1652-1660 - Qiongzheng Lin, Lei Yang, Yuxin Sun, Tianci Liu, Xiang-Yang Li, Yunhao Liu:
Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tags. 1661-1669 - Tianci Liu, Lei Yang, Xiang-Yang Li, Huaiyi Huang, Yunhao Liu:
TagBooth: Deep shopping data acquisition powered by RFID tags. 1670-1678 - Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi, Xin Xie:
RFID cardinality estimation with blocker tags. 1679-1687
Flow and Congestion Control
- Wen Chen, Fengyuan Ren, Jing Xie, Chuang Lin, Kevin Yin, Fred Baker:
Comprehensive understanding of TCP Incast problem. 1688-1696 - Soojeon Lee, Myungjin Lee, Dongman Lee, Hyungsoo Jung, Byoung-Sun Lee:
TCPRand: Randomizing TCP payload size for TCP fairness in data center networks. 1697-1705 - Peng-Jun Wan, Boliu Xu, Lei Wang, Sai Ji, Ophir Frieder:
A new paradigm for multiflow in wireless networks: Theory and applications. 1706-1714 - Georgios Tychogiorgos, Athanasios Gkelias, Kin K. Leung:
Distributed network resource allocation for multi-tiered multimedia applications. 1715-1723
MIMO Networks
- Bo-Xian Wu, Kate Ching-Ju Lin, Kai-Cheng Hsu, Hung-Yu Wei:
HybridCast: Joint multicast-unicast design for multiuser MIMO networks. 1724-1732 - Diep N. Nguyen, Marwan Krunz:
Be responsible: A novel communications scheme for full-duplex MIMO radios. 1733-1741 - Omid Abari, Hariharan Rahul, Dina Katabi, Mondira Pant:
AirShare: Distributed coherent transmission made seamless. 1742-1750 - Mohammad Amir Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Mohammad Farajzadeh-Tehrani:
Scaling wireless full-duplex in multi-cell networks. 1751-1759
Network Economics and Pricing
- Eli A. Meirom, Shie Mannor, Ariel Orda:
Formation games of reliable networks. 1760-1768 - Avhishek Chatterjee, Lav R. Varshney, Sriram Vishwanath:
Work capacity of freelance markets: Fundamental limits and decentralized schemes. 1769-1777 - Aemen Lodhi, Nikolaos Laoutaris, Amogh Dhamdhere, Constantine Dovrolis:
Complexities in Internet peering: Understanding the "Black" in the "Black Art". 1778-1786 - Xiaofan He, Huaiyu Dai, Peng Ning:
Improving learning and adaptation in security games by exploiting information asymmetry. 1787-1795
Theoretical Foundations in Networking Problems 3
- Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Yaolin Jiang:
A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition. 1796-1804 - Peng-Jun Wan, Fahad Al-dhelaan, Xiaohua Jia, Baowei Wang, Guowen Xing:
Maximizing network capacity of MPR-capable wireless networks. 1805-1813 - Jesús Gómez-Vilardebó:
Routing in accumulative multi-hop networks. 1814-1821 - Jie Chuai, Victor O. K. Li:
A new upper bound on the control information required in multiple access communications. 1822-1830
Theoretical Foundations in Social Networks 2
- François Baccelli, Avhishek Chatterjee, Sriram Vishwanath:
Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stability. 1831-1839 - Chul-Ho Lee, Do Young Eun:
On the efficiency-optimal Markov chains for distributed networking applications. 1840-1848 - AmirMahdi Ahmadinejad, Sina Dehghani, MohammadTaghi Hajiaghayi, Hamid Mahini, Saeed Seddighin, Sadra Yazdanbod:
Forming external behaviors by leveraging internal opinions. 1849-1857 - Li Yan, Haiying Shen, Kang Chen:
TSearch: Target-oriented low-delay node searching in DTNs with social network properties. 1858-1866
Mobile Offloading
- Han Deng, I-Hong Hou:
Online scheduling for delayed mobile offloading. 1867-1875 - Yong Li, Wei Gao:
Code offload with least context migration in the mobile cloud. 1876-1884 - Ozlem Bilgir Yetim, Margaret Martonosi:
Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading. 1885-1893 - Yi-Hsuan Kao, Bhaskar Krishnamachari, Moo-Ryong Ra, Fan Bai:
Hermes: Latency optimal task assignment for resource-constrained mobile computing. 1894-1902
Optical Networking and its Applications in Datacenters
- Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen Hu, Qunfeng Dong:
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture. 1903-1911 - Feiyang Liu, Haibo Zhang, Yawen Chen, Zhiyi Huang, Huaxi Gu:
WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips. 1912-1920 - Zizhong Cao, Paul Claisse, René-Jean Essiambre, Murali S. Kodialam, T. V. Lakshman:
Optimizing throughput in optical networks: The joint routing and power control problem. 1921-1929 - Yiting Xia, T. S. Eugene Ng, Xiaoye Steven Sun:
Blast: Accelerating high-performance data analytics applications by optical multicast. 1930-1938
RFID 2
- Muhammad Shahzad, Alex X. Liu:
Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild. 1939-1947 - Jia Liu, Bin Xiao, Shigang Chen, Feng Zhu, Lijun Chen:
Fast RFID grouping protocols. 1948-1956 - Yuxiao Hou, Jiajue Ou, Yuanqing Zheng, Mo Li:
PLACE: Physical layer cardinality estimation for large-scale RFID systems. 1957-1965 - Lei Yang, Pai Peng, Fan Dang, Cheng Wang, Xiang-Yang Li, Yunhao Liu:
Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships. 1966-1974
Medium Access Control 1
- Wei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan:
SIEVE: Scalable user grouping for large MU-MIMO systems. 1975-1983 - Jae-Han Lim, Katsuhiro Naito, Ji-Hoon Yun, Mario Gerla:
Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networks. 1984-1992 - Ehsan Aryafar, Alireza Keshavarz-Haddad:
FD2: A directional full duplex communication system for indoor wireless networks. 1993-2001 - Abishek Sankararaman, François Baccelli:
CSMA k-SIC - A class of distributed MAC protocols and their performance evaluation. 2002-2010
Wireless Mesh and Ad Hoc Networks 1
- Hao Huang, Jihoon Yun, Ziguo Zhong:
Scalable clock synchronization in wireless networks with low-duty-cycle radio operations. 2011-2019 - Yuan Li, Antonio Capone, Di Yuan:
On end-to-end delay minimization in wireless networks under the physical interference model. 2020-2028 - Dongxiao Yu, Yuexuan Wang, Yu Yan, Jiguo Yu, Francis C. M. Lau:
Speedup of information exchange using multiple channels in wireless ad hoc networks. 2029-2037 - Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu:
PhaseU: Real-time LOS identification with WiFi. 2038-2046
Auctions
- Hongxing Li, Chuan Wu, Zongpeng Li:
Socially-optimal online spectrum auctions for secondary wireless communication. 2047-2055 - Dan Peng, Shuo Yang, Fan Wu, Guihai Chen, Shaojie Tang, Tie Luo:
Resisting three-dimensional manipulations in distributed wireless spectrum auctions. 2056-2064 - Zhili Chen, Liusheng Huang, Lin Chen:
ITSEC: An information-theoretically secure framework for truthful spectrum auctions. 2065-2073 - Yueming Wei, Yanmin Zhu, Hongzi Zhu, Qian Zhang, Guangtao Xue:
Truthful online double auctions for dynamic mobile crowdsourcing. 2074-2082
Secure Search in Cloud Computing
- Jiawei Yuan, Shucheng Yu, Linke Guo:
SEISA: Secure and efficient encrypted image search with access control. 2083-2091 - Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou:
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee. 2092-2100 - Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu:
Generalized pattern matching string search on encrypted data in cloud systems. 2101-2109 - Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. 2110-2118
Cooperative Networking
- Jian Li, Rajarshi Bhattacharyya, Suman Paul, Srinivas Shakkottai, Vijay G. Subramanian:
Incentivizing sharing in realtime D2D streaming networks: A mean field game perspective. 2119-2127 - Bo Chen, Vivek Yenamandra, Kannan Srinivasan:
Interference alignment using shadow channel. 2128-2136 - Chao Kong, Zengwen Yuan, Xushen Han, Feng Yang, Xinbing Wang, Tao Wang, Songwu Lu:
VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks. 2137-2145 - Dimitris Syrivelis, George Iosifidis, Dimosthenis Delimpasis, Konstantinos Chounos, Thanasis Korakis, Leandros Tassiulas:
Bits and coins: Supporting collaborative consumption of mobile internet. 2146-2154
Medium Access Control 2
- Jason Cloud, Douglas J. Leith, Muriel Médard:
A coded generalization of selective repeat ARQ. 2155-2163 - Yang Yang, Ness B. Shroff:
Scheduling in wireless networks with full-duplex cut-through transmission. 2164-2172 - Hojin Lee, Sangwoo Moon, Yung Yi:
A-DCF: Design and implementation of delay and queue length based wireless MAC. 2173-2181 - Mostafa Uddin, Tamer Nadeem:
Harmony: Content resolution for smart devices using acoustic channel. 2182-2190
Wireless Mesh and Ad Hoc Networks 2
- Tomasz Jurdzinski, Dariusz R. Kowalski, Michal Rózanski, Grzegorz Stachowiak:
On setting-up asynchronous ad hoc wireless networks. 2191-2199 - Okhwan Lee, Weiping Sun, Jihoon Kim, Hyuk Lee, Bo Ryu, Jungwoo Lee, Sunghyun Choi:
ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environment. 2200-2208 - Ronghui Hou, Yu Cheng, Jiandong Li, Min Sheng, King-Shan Lui:
Capacity analysis of hybrid wireless networks with long-range social contacts behavior. 2209-2217 - Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu:
Quantized conflict graphs for wireless network optimization. 2218-2226
Crowdsensing
- Mingjun Xiao, Jie Wu, Liusheng Huang, Yunsheng Wang, Cong Liu:
Multi-task assignment for crowdsensing in mobile social networks. 2227-2235 - John P. Rula, Fabián E. Bustamante:
Crowdsensing Under (Soft) Control. 2236-2244 - Yang Tian, Kaigui Bian, Guobin Shen, Xiaochen Liu, Xiaoguang Li, Thomas Moscibroda:
Contextual-code: Simplifying information pulling from targeted sources in physical world. 2245-2253 - Merkourios Karaliopoulos, Orestis Telelis, Iordanis Koutsopoulos:
User recruitment for mobile crowdsensing over opportunistic networks. 2254-2262
Content Centric and Named Data Networking
- Michele Garetto, Emilio Leonardi, Stefano Traverso:
Efficient analysis of caching strategies under dynamic content popularity. 2263-2271 - Sean Sanders, Jasleen Kaur:
Can web pages be classified using anonymized TCP/IP headers? 2272-2280 - Emilio Leonardi, Giovanni Luca Torrisi:
Least recently used caches under the Shot Noise Model. 2281-2289 - Huichen Dai, Jianyuan Lu, Yi Wang, Bin Liu:
BFAST: Unified and scalable index for NDN forwarding architecture. 2290-2298
Real World Social Networks
- Christopher G. Brinton, Mung Chiang:
MOOC performance prediction via clickstream data and social learning networks. 2299-2307 - Jie Xu, Mihaela van der Schaar, Jiangchuan Liu, Haitao Li:
Timely video popularity forecasting based on social networks. 2308-2316 - Felix Ming Fai Wong, Zhenming Liu, Mung Chiang:
On the efficiency of social recommender networks. 2317-2325 - Shahzad Ali, Gianluca Rizzo, Vincenzo Mancuso, Marco Ajmone Marsan:
Persistence and availability of floating content in a campus environment. 2326-2334
Charging, Smart Grids, and Content Distribution
- Shizhen Zhao, Xiaojun Lin, Minghua Chen:
Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustification. 2335-2343 - Sheng Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu:
P3: Joint optimization of charger placement and power allocation for wireless power transfer. 2344-2352 - Subhankar Mishra, Xiang Li, Alan Kuhnle, My T. Thai, Jungtaek Seo:
Rate alteration attacks in smart grid. 2353-2361 - Valentino Pacifici, György Dán:
Distributed algorithms for content allocation in interconnected content distribution networks. 2362-2370
Security in Cloud Computing
- Wenji Chen, Yong Guan:
Distinct element counting in distributed dynamic data streams. 2371-2379 - Thang N. Dinh, My T. Thai:
Assessing attack vulnerability in networks with uncertainty. 2380-2388 - Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang:
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure. 2389-2397 - Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin:
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. 2398-2406
Short Range Wireless Technologies 1
- Hyewon Lee, Tae Hyun Kim, Jun Won Choi, Sunghyun Choi:
Chirp signal-based aerial acoustic communication for smart devices. 2407-2415 - Thomas Nitsche, Adriana B. Flores, Edward W. Knightly, Joerg Widmer:
Steering with eyes closed: Mm-Wave beam steering without in-band measurement. 2416-2424 - Zhangyu Guan, Giuseppe Enrico Santagati, Tommaso Melodia:
Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate control. 2425-2433 - Jialiang Zhang, Xinyu Zhang, Gang Wu:
Dancing with light: Predictive in-frame rate selection for visible light networks. 2434-2442
Internet Monitoring and Measurement 1
- Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Guangxing Zhang, Dongliang Xie, Jigang Wen:
Sequential and adaptive sampling for matrix completion in network monitoring systems. 2443-2451 - Maria Rosário de Oliveira, João Neves, Rui Valadas, Paulo Salvador:
Do we need a perfect ground-truth for benchmarking Internet traffic classifiers? 2452-2460 - Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan:
Modeling repeating behaviors in packet arrivals: Detection and measurement. 2461-2469 - Romain Fontugne, Johan Mazel, Kensuke Fukuda:
An empirical mixture model for large-scale RTT measurements. 2470-2478
Indoor Localization
- Yutian Wen, Xiaohua Tian, Xinbing Wang, Songwu Lu:
Fundamental limits of RSS fingerprinting based indoor localization. 2479-2487 - Kaikai Sheng, Zhicheng Gu, Xueyu Mao, Xiaohua Tian, Weijie Wu, Xiaoying Gan, Xinbing Wang:
The collocation of measurement points in large open indoor environment. 2488-2496 - Chenshu Wu, Zheng Yang, Chaowei Xiao, Chaofan Yang, Yunhao Liu, Mingyan Liu:
Static power of mobile devices: Self-updating radio maps for wireless indoor localization. 2497-2505 - Suining He, S.-H. Gary Chan, Lei Yu, Ning Liu:
Fusing noisy fingerprints with distance bounds for indoor localization. 2506-2514
Crowdsourcing
- Tie Luo, Salil S. Kanhere, Hwee-Pink Tan, Fan Wu, Hongyi Wu:
Crowdsourcing with Tullock contests: A new perspective. 2515-2523 - Fei Chen, Cong Zhang, Feng Wang, Jiangchuan Liu:
Crowdsourced live streaming over the cloud. 2524-2532 - Aifang Xu, Xiaonan Feng, Ye Tian:
Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A. 2533-2541 - Zongjian He, Jiannong Cao, Xuefeng Liu:
High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility. 2542-2550
Router and Switch Design
- Tal Mizrahi, Ori Rottenstreich, Yoram Moses:
TimeFlip: Scheduling network updates with timestamp-based TCAM ranges. 2551-2559 - Gil Einziger, Benny Fellman, Yaron Kassner:
Independent counter estimation buckets. 2560-2568 - Marat Radan, Isaac Keslassy:
Tapping into the router's unutilized processing power. 2569-2577 - Anat Bremler-Barr, Shimrit Tzur-David, Yotam Harchol, David Hay:
Leveraging traffic repetitions for high-speed deep packet inspection. 2578-2586
Online Social Networks
- Xin Wang, Richard T. B. Ma, Yinlong Xu, Zhipeng Li:
Sampling online social networks via heterogeneous statistics. 2587-2595 - Mohammad Rezaur Rahman, Jinyoung Han, Chen-Nee Chuah:
Unveiling the adoption and cascading process of OSN-based gifting applications. 2596-2604 - Swapna Buccapatnam, Jian Tan, Li Zhang:
Information sharing in distributed stochastic bandits. 2605-2613 - Huanle Xu, Pili Hu, Wing Cheong Lau, Qiming Zhang, Yang Wu:
DPCP: A protocol for optimal pull coordination in decentralized social networks. 2614-2622
Demand Response in Smart Grids
- Haihang Zhou, Jianguo Yao, Haibing Guan, Xue Liu:
Comprehensive understanding of operation cost reduction using energy storage for IDCs. 2623-2631 - Linquan Zhang, Shaolei Ren, Chuan Wu, Zongpeng Li:
A truthful incentive mechanism for emergency demand response in colocation data centers. 2632-2640 - Ruiting Zhou, Zongpeng Li, Chuan Wu:
An online procurement auction for power demand response in storage-assisted smart grids. 2641-2649 - Zhi Zhou, Fangming Liu, Zongpeng Li, Hai Jin:
When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response. 2650-2658
Security in Mobile Cloud Computing
- Helei Cui, Xingliang Yuan, Cong Wang:
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices. 2659-2667 - Zijiang Hao, Yutao Tang, Yifan Zhang, Edmund Novak, Nancy J. Carter, Qun Li:
SMOC: A secure mobile cloud computing platform. 2668-2676 - Jun Shao, Rongxing Lu, Xiaodong Lin:
Fine-grained data sharing in cloud computing for mobile devices. 2677-2685 - Yimin Chen, Jingchao Sun, Rui Zhang, Yanchao Zhang:
Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices. 2686-2694
Short Range Wireless Technologies 2
- Philipp H. Kindt, Daniel Yunge, Mathias Gopp, Samarjit Chakraborty:
Adaptive online power-management for Bluetooth Low Energy. 2695-2703 - Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni:
Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensing. 2704-2712 - Ioannis Pefkianakis, Henrik Lundgren, Augustin Soule, Jaideep Chandrashekar, Pascal Le Guyadec, Christophe Diot, Martin May, Karel Van Doorselaer, Koen Van Oost:
Characterizing home wireless performance: The gateway view. 2713-2721 - Jianwei Niu, Fei Gu, Ruogu Zhou, Guoliang Xing, Wei Xiang:
VINCE: Exploiting visible light sensing for smartphone-based NFC systems. 2722-2730
Internet Monitoring and Measurement 2
- Li Li, Ke Xu, Dan Wang, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi:
A measurement study on TCP behaviors in HSPA+ networks on high-speed rails. 2731-2739 - Abner Mendoza, Kapil Singh, Guofei Gu:
What is wrecking your data plan? A measurement study of mobile web overhead. 2740-2748 - Xenofon Foukas, Antonio Carzaniga, Alexander L. Wolf:
Measuring the mixing time of a network. 2749-2757 - Chien-Chun Ni, Yu-Yao Lin, Jie Gao, Xianfeng David Gu, Emil Saucan:
Ricci curvature of the Internet topology. 2758-2766
Localization
- Ayon Chakraborty, Luis E. Ortiz, Samir R. Das:
Network-side positioning of cellular-band devices with minimal effort. 2767-2775 - Danilo Cicalese, Diana Joumblatt, Dario Rossi, Marc-Olivier Buob, Jordan Augé, Timur Friedman:
A fistful of pings: Accurate and lightweight anycast enumeration and geolocation. 2776-2784 - Qingquan Zhang, Ziqiao Zhou, Wei Xu, Jing Qi, Chenxi Guo, Ping Yi, Ting Zhu, Sheng Xiao:
Fingerprint-free tracking with dynamic enhanced field division. 2785-2793 - Fu Xiao, Chaoheng Sha, Lei Chen, Lijuan Sun, Ruchuan Wang:
Noise-tolerant localization from incomplete range measurements for wireless sensor networks. 2794-2802
Incentives and Reputation in Crowdsourcing
- Lin Gao, Fen Hou, Jianwei Huang:
Providing long-term participation incentive in participatory sensing. 2803-2811 - Qi Zhang, Yutian Wen, Xiaohua Tian, Xiaoying Gan, Xinbing Wang:
Incentivize crowd labeling under budget constraint. 2812-2820 - Alberto Tarable, Alessandro Nordio, Emilio Leonardi, Marco Ajmone Marsan:
The importance of being earnest in crowdsourcing systems. 2821-2829 - Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang:
Truthful incentive mechanisms for crowdsourcing. 2830-2838
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.