Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Accurate Spatial Calibration of RFID Antennas via Spinning Tags Chunhui Duan, Lei Yang, Yunhao Liu |
Accurate Spatial Calibration of RFID Antennas via Spinning Tags Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cognitive Technologies for Smarter Cities Martin G. Kienzle |
Cognitive Technologies for Smarter Cities Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Cure: Strong Semantics Meets High Availability and Low Latency Deepthi Devaki Akkoorath, Alejandro Z. Tomsic, Manuel Bravo, Zhongmiao Li, Tyler Crain, Annette Bieniusa, Nuno M. Preguiça, Marc Shapiro |
Cure: Strong Semantics Meets High Availability and Low Latency Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Service Placement for Detecting and Localizing Failures Using End-to-End Observations Ting He, Novella Bartolini, Hana Khamfroush, InJung Kim, Liang Ma, Tom La Porta |
Service Placement for Detecting and Localizing Failures Using End-to-End Observations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Interactive Wireless Charging for Energy Balance Sotiris E. Nikoletseas, Theofanis P. Raptis, Christoforos L. Raptopoulos |
Interactive Wireless Charging for Energy Balance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Bandwidth-Greedy Hashing for Massive-Scale Concurrent Flows Tian Pan, Bin Liu, Xiaoyu Guo, Yang Li, Haoyu Song |
Bandwidth-Greedy Hashing for Massive-Scale Concurrent Flows Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing the Computational Power of Anonymous Mobile Robots Mattia D'Emidio, Daniele Frigioni, Alfredo Navarra |
Characterizing the Computational Power of Anonymous Mobile Robots Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems Haiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, Nikita Borisov |
Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Amnesia: A Bilateral Generative Password Manager Luren Wang, Yue Li, Kun Sun |
Amnesia: A Bilateral Generative Password Manager Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios Qingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao |
Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploiting Causality to Engineer Elastic Distributed Software K. R. Jayaram |
Exploiting Causality to Engineer Elastic Distributed Software Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Live Exploration of Dynamic Rings Giuseppe Antonio Di Luna, Stefan Dobrev, Paola Flocchini, Nicola Santoro |
Live Exploration of Dynamic Rings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BotMeter: Charting DGA-Botnet Landscapes in Large Networks Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor |
BotMeter: Charting DGA-Botnet Landscapes in Large Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
UDS: A Unified Approach to Deterministic Multithreading Franz J. Hauck, Jörg Domaschka |
UDS: A Unified Approach to Deterministic Multithreading Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile Users Md. Yusuf Sarwar Uddin, Vinay Setty, Ye Zhao, Roman Vitenberg, Nalini Venkatasubramanian |
RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Jung Hyun Jun, Solchan Yeon, Titir Kundu, Dharma P. Agrawal, Jaehoon Jeong |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Geometric Windowing Algorithm in Network Data-Plane Verification Richard Chen, Toru Mano, Takeru Inoue, Kimihiro Mizutani, Hisashi Nagata, Osamu Akashi |
A Geometric Windowing Algorithm in Network Data-Plane Verification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A De-compositional Approach to Regular Expression Matching for Network Security Applications Eric Norige, Alex X. Liu |
A De-compositional Approach to Regular Expression Matching for Network Security Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Online Data Aggregation in Dynamic Graphs Quentin Bramas, Toshimitsu Masuzawa, Sébastien Tixeuil |
Distributed Online Data Aggregation in Dynamic Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data Center Jiawei Huang, Jianxin Wang, Tao Zhang, Jianer Chen, Yi Pan |
Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data Center Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic Pricing Xiaomeng Yi, Fangming Liu, Zongpeng Li, Hai Jin |
Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic Pricing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimal Marching of Autonomous Networked Robots Buri Ban, Miao Jin, Hongyi Wu |
Optimal Marching of Autonomous Networked Robots Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional List Deli Zhang, Damian Dechev |
An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional List Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Jiyan Wu, Bo Cheng, Ming Wang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds Shuochao Yao, Shaohan Hu, Shen Li, Yiran Zhao, Lu Su, Lance M. Kaplan, Aylin Yener, Tarek F. Abdelzaher |
On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Gremlin: Systematic Resilience Testing of Microservices Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar |
Gremlin: Systematic Resilience Testing of Microservices Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Privacy-Preserving Data Classification and Similarity Evaluation for Distributed Systems Qi Jia, Linke Guo, Zhanpeng Jin, Yuguang Fang |
Privacy-Preserving Data Classification and Similarity Evaluation for Distributed Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric Computing Alberto Montresor |
Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric Computing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, Chengchen Hu |
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wenping Liu, Jiangchuan Liu, Hongbo Jiang, Bicheng Xu, Hongzhi Lin, Guoyin Jiang, Jing Xing |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Datacomp: Locally Independent Adaptive Compression for Real-World Systems Peter A. H. Peterson, Peter L. Reiher |
Datacomp: Locally Independent Adaptive Compression for Real-World Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos |
D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Backlog-Aware SRPT Flow Scheduling in Data Center Networks Tong Zhang, Fengyuan Ren, Ran Shu |
Backlog-Aware SRPT Flow Scheduling in Data Center Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Xiaozhe Shao, Feng Wang, Lixin Gao, Kenji Fujikawa, Hiroaki Harai |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mohammad Arif Ul Alam, Nirmalya Roy, Archan Misra, Joseph Taylor |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GrapH: Heterogeneity-Aware Graph Computation with Adaptive Partitioning Christian Mayer, Muhammad Adnan Tariq, Chen Li, Kurt Rothermel |
GrapH: Heterogeneity-Aware Graph Computation with Adaptive Partitioning Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Same Speed Timer in Population Protocols Yuichi Sudo, Toshimitsu Masuzawa, Ajoy Kumar Datta, Lawrence L. Larmore |
The Same Speed Timer in Population Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Efficiency of Decentralized Search in Expert Networks Liang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni |
On the Efficiency of Decentralized Search in Expert Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Memory Efficient One-Sided Communucation Library "ACP" in Globary Memory on Raspberry Pi 2 Yoshiyuki Morie, Hiroaki Honda, Takeshi Nanri, Taizo Kobayashi, Hidetomo Shibamura, Ryutaro Susukita, Yuichiro Ajima |
Memory Efficient One-Sided Communucation Library "ACP" in Globary Memory on Raspberry Pi 2 Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Directional Beam Alignment for Millimeter Wave Cellular Systems Jie Zhao, Xin Wang, Harish Viswanathan |
Directional Beam Alignment for Millimeter Wave Cellular Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Approximate Agreement under Mobile Byzantine Faults Silvia Bonomi, Antonella Del Pozzo, Maria Potop-Butucaru, Sébastien Tixeuil |
Approximate Agreement under Mobile Byzantine Faults Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fast Total Ordering for Modern Data Centers Amy Babay, Yair Amir |
Fast Total Ordering for Modern Data Centers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler |
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets Samuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan |
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Distributed Auctioneer for Resource Allocation in Decentralized Systems Amin M. Khan, Xavier Vilaça, Luís E. T. Rodrigues, Felix Freitag |
A Distributed Auctioneer for Resource Allocation in Decentralized Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Milk Carton: A Face Recognition-Based FTR System Using Opportunistic Clustered Computing Edgar Marko Trono, Manato Fujimoto, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto |
Milk Carton: A Face Recognition-Based FTR System Using Opportunistic Clustered Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hybrid Content-Based Routing Using Network and Application Layer Filtering Sukanya Bhowmik, Muhammad Adnan Tariq, Lobna Hegazy, Kurt Rothermel |
Hybrid Content-Based Routing Using Network and Application Layer Filtering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An NFV Orchestration Framework for Interference-Free Policy Enforcement Xin Li, Chen Qian |
An NFV Orchestration Framework for Interference-Free Policy Enforcement Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Performance Analysis of Incentive Mechanisms for Cooperative Computing Carlee Joe-Wong, Youngbin Im, Kyuyong Shin, Sangtae Ha |
A Performance Analysis of Incentive Mechanisms for Cooperative Computing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CRONets: Cloud-Routed Overlay Networks Chris X. Cai, Franck Le, Xin Sun, Geoffrey G. Xie, Hani Jamjoom, Roy H. Campbell |
CRONets: Cloud-Routed Overlay Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Parity-Based Data Outsourcing Model for Query Authentication and Correction Shixin Tian, Ying Cai, Zhenbi Hu |
A Parity-Based Data Outsourcing Model for Query Authentication and Correction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An SDN-Based Multipath GridFTP for High-Speed Data Transfer Che Huang, Chawanat Nakasan, Kohei Ichikawa, Hajimu Iida |
An SDN-Based Multipath GridFTP for High-Speed Data Transfer Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Intrusion-Tolerant Networks Daniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru |
Practical Intrusion-Tolerant Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared Clouds Zhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang |
RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared Clouds Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-Design Sajjad Rizvi, Xi Li, Bernard Wong, Fiodar Kazhamiaka, Benjamin Cassell |
Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-Design Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile Crowdsensing Jing Wang, Jian Tang, Dejun Yang, Erica Wang, Guoliang Xue |
Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile Crowdsensing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dslash: Managing Data in Overloaded Batch Streaming Systems Robert Birke, Mathias Björkqvist, Evangelia Kalyvianaki, Lydia Y. Chen |
Dslash: Managing Data in Overloaded Batch Streaming Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game Na Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu |
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
K. K. Ramakrishnan |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing Kun Xie, Wang Luo, Xin Wang, Dongliang Xie, Jiannong Cao, Jigang Wen, Gaogang Xie |
Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers Guoxin Liu, Haiying Shen |
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yanjiao Chen, Linshan Jiang, Haofan Cai, Jin Zhang, Baochun Li |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction Approach Richard T. B. Ma |
Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction Approach Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
PAG: Private and Accountable Gossip Jeremie Decouchant, Sonia Ben Mokhtar, Albin Petit, Vivien Quéma |
PAG: Private and Accountable Gossip Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks Yibo Wu, Yi Wang, Wenjie Hu, Xiaomei Zhang, Guohong Cao |
Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Riptide: Jump-Starting Back-Office Connections in Cloud Systems Marcel Flores, Amir R. Khakpour, Harkeerat Bedi |
Riptide: Jump-Starting Back-Office Connections in Cloud Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RITM: Revocation in the Middle Pawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig |
RITM: Revocation in the Middle Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DL-Store: A Distributed Hybrid OLTP and OLAP Data Processing Engine Kaiwen Zhang, Mohammad Sadoghi, Hans-Arno Jacobsen |
DL-Store: A Distributed Hybrid OLTP and OLAP Data Processing Engine Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Nearly Optimal Distributed Algorithm for Computing Betweenness Centrality Qiang-Sheng Hua, Haoqiang Fan, Ming Ai, Lixiang Qian, Yangyang Li, Xuanhua Shi, Hai Jin |
Nearly Optimal Distributed Algorithm for Computing Betweenness Centrality Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cruisers: A Public Automotive Sensing Platform for Smart Cities Yin Chen, Jin Nakazawa, Takuro Yonezawa, Takafumi Kawesaki, Hideyuki Tokuda |
Cruisers: A Public Automotive Sensing Platform for Smart Cities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Middleware for Proximity Distributed Real-Time Processing of IoT Data Flows Yugo Nakamura, Hirohiko Suwa, Yutaka Arakawa, Hirozumi Yamaguchi, Keiichi Yasumoto |
Middleware for Proximity Distributed Real-Time Processing of IoT Data Flows Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Strategic Security Resource Allocation for Internet of Things Antonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino |
Strategic Security Resource Allocation for Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded Storage Vaneet Aggarwal, Yih-Farn Robin Chen, Tian Lan, Yu Xiang |
Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded Storage Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Real-Time Client-Side Phishing Prevention Add-On Giovanni Armano, Samuel Marchal, N. Asokan |
Real-Time Client-Side Phishing Prevention Add-On Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Social Graph Publishing with Privacy Guarantees Faraz Ahmed, Alex X. Liu, Rong Jin |
Social Graph Publishing with Privacy Guarantees Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Top-k Result Diversification for Mobile Sensor Data Masahiro Yokoyama, Takahiro Hara |
Efficient Top-k Result Diversification for Mobile Sensor Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Virtual Machine Level Temperature Profiling and Prediction in Cloud Datacenters Zhaohui Wu, Xiang Li, Peter Garraghan, Xiaohong Jiang, Kejiang Ye, Albert Y. Zomaya |
Virtual Machine Level Temperature Profiling and Prediction in Cloud Datacenters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing Mingjun Xiao, Jie Wu, He Huang, Liusheng Huang, Chang Hu |
Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Realistic and Optimized V2V Communication System for Taxicabs Yang Wang, Erkun Yang, Wei Zheng, Liusheng Huang, Hengchang Liu, Binxin Liang |
A Realistic and Optimized V2V Communication System for Taxicabs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Endpoint Communication Profiling Tool for Distributed Computing Frameworks Andrea Rosà, Lydia Y. Chen, Walter Binder |
An Endpoint Communication Profiling Tool for Distributed Computing Frameworks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Look at Basics of Distributed Computing Michel Raynal |
A Look at Basics of Distributed Computing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Randomized Load Balancing in Finite Regimes Antonie S. Godtschalk, Florin Ciucu |
Randomized Load Balancing in Finite Regimes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor Qian Wang, Shengshan Hu, Jingjun Wang, Kui Ren |
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Concurrent Wireless Charging Scheduling for Sensor Networks Peng Guo, Xuefeng Liu, Tingfang Tang, Shaojie Tang, Jiannong Cao |
Practical Concurrent Wireless Charging Scheduling for Sensor Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Free-Rider Detection Using Symmetric Overlays João Bruno Rodrigues Roque e Silva, Xavier Vilaça, Hugo Miranda, Luís E. T. Rodrigues |
Efficient Free-Rider Detection Using Symmetric Overlays Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Overlay Design for Topic-Based Publish/Subscribe under Node Degree Constraints Chen Chen, Yoav Tock, Hans-Arno Jacobsen |
Overlay Design for Topic-Based Publish/Subscribe under Node Degree Constraints Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OmniFlow: Coupling Load Balancing with Flow Control in Datacenter Networks Kaiyuan Wen, Zhuzhong Qian, Sheng Zhang, Sanglu Lu |
OmniFlow: Coupling Load Balancing with Flow Control in Datacenter Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Publish/Subscribe for Mobile Applications Using Shared Dictionary Compression Christoph Doblander, Kaiwen Zhang, Hans-Arno Jacobsen |
Publish/Subscribe for Mobile Applications Using Shared Dictionary Compression Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SpotLight: An Information Service for the Cloud Xue Ouyang, David E. Irwin, Prashant J. Shenoy |
SpotLight: An Information Service for the Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, Faisal S. Alanazi |
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan, Dan Lin, Sanjay Madria |
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Federation of Private IaaS Cloud Providers through the Barter of Resources Francisco Vilar Brasileiro, Eduardo De Lucena Falcão |
Federation of Private IaaS Cloud Providers through the Barter of Resources Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
FSQCN: Fast and Simple Quantized Congestion Notification in Data Center Ethernet Chang Ruan, Jianxin Wang, Wanchun Jiang |
FSQCN: Fast and Simple Quantized Congestion Notification in Data Center Ethernet Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud Computing Yang Wang, Cheng-Zhong Xu, Shuibing He, Xian-He Sun |
On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo) Ertem Esiner, Shun Hanli Hanley, Anwitaman Datta |
DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo) Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Routing and Scheduling of Social Influence Diffusion in Online Social Networks Hui-Ju Hung, De-Nian Yang, Wang-Chien Lee |
Routing and Scheduling of Social Influence Diffusion in Online Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Internet is for Porn: Measurement and Analysis of Online Adult Traffic Faraz Ahmed, M. Zubair Shafiq, Alex X. Liu |
The Internet is for Porn: Measurement and Analysis of Online Adult Traffic Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy Ge Peng, Gang Zhou, David T. Nguyen, Xin Qi, Shan Lin |
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality Systems Jianqiang Sun, Lei Xie, Qingliang Cai, Chuyu Wang, Jie Wu, Sanglu Lu |
RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
INSPECTOR: Data Provenance Using Intel Processor Trace (PT) Jörg Thalheim, Pramod Bhatotia, Christof Fetzer |
INSPECTOR: Data Provenance Using Intel Processor Trace (PT) Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren |
Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|