Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
A Framework for Enabling Security Services Collaboration Across Multiple Domains Daniel Migault, Marcos A. Simplício Jr., Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho |
A Framework for Enabling Security Services Collaboration Across Multiple Domains Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network Ali Li, Rui Wang, Lei Xu |
Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations Md. Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone |
Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards New Abstractions for Implementing Quorum-Based Systems Tormod Erevik Lea, Leander Jehl, Hein Meling |
Towards New Abstractions for Implementing Quorum-Based Systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs Zichuan Xu, Weifa Liang, Meitian Huang, Mike Jia, Song Guo, Alex Galis |
Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Distributed Operating System Network Stack and Device Driver for Multicores Saif Ansary, Antonio Barbalace, Ho-Ren Chuang, Thomas Lazor, Binoy Ravindran |
A Distributed Operating System Network Stack and Device Driver for Multicores Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao |
PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Processing Encrypted and Compressed Time Series Data Matús Harvan, Samuel Kimoto, Thomas Locher, Yvonne Anne Pignolet, Johannes Schneider |
Processing Encrypted and Compressed Time Series Data Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing Hongwei Wang, Song Guo, Jiannong Cao, Minyi Guo |
MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fault-Scalable Virtualized Infrastructure Management Mukil Kesavan, Ada Gavrilovska, Karsten Schwan |
Fault-Scalable Virtualized Infrastructure Management Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Vision for Zero-Hop Networking (ZeN) Mostafa H. Ammar, Ellen W. Zegura, Yimeng Zhao |
A Vision for Zero-Hop Networking (ZeN) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Achieving Strong Privacy in Online Survey You Zhou, Yian Zhou, Shigang Chen, Samuel S. Wu |
Achieving Strong Privacy in Online Survey Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PTrack: Enhancing the Applicability of Pedestrian Tracking with Wearables Yonghang Jiang, Zhenjiang Li, Jianping Wang |
PTrack: Enhancing the Applicability of Pedestrian Tracking with Wearables Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng |
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Framework for Efficient Energy Scheduling of Spark Workloads Stathis Maroulis, Nikos Zacheilas, Vana Kalogeraki |
A Framework for Efficient Energy Scheduling of Spark Workloads Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
REX: Rapid Ensemble Classification System for Landslide Detection Using Social Media Aibek Musaev, De Wang, Jiateng Xie, Calton Pu |
REX: Rapid Ensemble Classification System for Landslide Detection Using Social Media Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Dataflow-Based Graph Accelerator Hai Jin, Pengcheng Yao, Xiaofei Liao, Long Zheng, Xianliang Li |
Towards Dataflow-Based Graph Accelerator Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic Environment Hengky Susanto, Honggang Zhang, Shing-Yip Ho, Benyuan Liu |
Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic Environment Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Fast and Accurate Tracking of Population Dynamics in RFID Systems Muhammad Shahzad, Alex X. Liu |
Fast and Accurate Tracking of Population Dynamics in RFID Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flow Reconnaissance via Timing Attacks on SDN Switches Sheng Liu, Michael K. Reiter, Vyas Sekar |
Flow Reconnaissance via Timing Attacks on SDN Switches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Service Overlay Forest Embedding for Software-Defined Cloud Networks Jian-Jhih Kuo, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen |
Service Overlay Forest Embedding for Software-Defined Cloud Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching Stability Huanyang Zheng, Jie Wu |
Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching Stability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous Invocations Qingyang Wang, Chien-An Lai, Yasuhiko Kanemasa, Shungeng Zhang, Calton Pu |
A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous Invocations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GraphA: Adaptive Partitioning for Natural Graphs Dongsheng Li, Chengfei Zhang, Jinyan Wang, Zhaoning Zhang, Yiming Zhang |
GraphA: Adaptive Partitioning for Natural Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective Weiman Sun, Shengling Wang |
General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-resource Load Balancing for Virtual Network Functions Tao Wang, Hong Xu, Fangming Liu |
Multi-resource Load Balancing for Virtual Network Functions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting Rogue AP with the Crowd Wisdom Tongqing Zhou, Zhiping Cai, Bin Xiao, Yueyue Chen, Ming Xu |
Detecting Rogue AP with the Crowd Wisdom Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography Shangqing Zhao, Zhuo Lu, Cliff Wang |
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Minimizing Cost in IaaS Clouds Via Scheduled Instance Reservation Qiushi Wang, Ming Ming Tan, Xueyan Tang, Wentong Cai |
Minimizing Cost in IaaS Clouds Via Scheduled Instance Reservation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pythia: A System for Online Topic Discovery of Social Media Posts Iouliana Litou, Vana Kalogeraki |
Pythia: A System for Online Topic Discovery of Social Media Posts Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks Jack Kirton, Matthew Bradbury, Arshad Jhumka |
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Speed-Based Location Tracking in Usage-Based Automotive Insurance Lu Zhou, Qingrong Chen, Zutian Luo, Haojin Zhu, Cailian Chen |
Speed-Based Location Tracking in Usage-Based Automotive Insurance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem Chao Yang, Jialong Zhang, Guofei Gu |
Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops Kohei Watabe, Toru Mano, Kimihiro Mizutani, Osamu Akashi, Kenji Nakagawa, Takeru Inoue |
A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Characterizing Performance and Energy-Efficiency of the RAMCloud Storage System Yacine Taleb, Shadi Ibrahim, Gabriel Antoniu, Toni Cortes |
Characterizing Performance and Energy-Efficiency of the RAMCloud Storage System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lipeng Wan, Matthew Wolf, Feiyi Wang, Jong Youl Choi, George Ostrouchov, Scott Klasky |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How Computer Science Risks to Lose Its Innocence, and Should Attempt to Take Responsibility Karl Aberer |
How Computer Science Risks to Lose Its Innocence, and Should Attempt to Take Responsibility Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma |
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter Resources Xin Chen, Liting Hu, Douglas M. Blough, Michael A. Kozuch, Matthew Wolf |
RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter Resources Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations Volker Turau, Gerry Siegemund |
Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Private, Yet Practical, Multiparty Deep Learning Xinyang Zhang, Shouling Ji, Hui Wang, Ting Wang |
Private, Yet Practical, Multiparty Deep Learning Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks Youngbin Im, Jinyoung Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyoung Kwon, Sangtae Ha |
FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources Sudip Saha, Anil Vullikanti, Mahantesh Halappanavar |
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Truthful Online Auction for Cloud Instance Subletting Yifei Zhu, Silvery Fu, Jiangchuan Liu, Yong Cui |
Truthful Online Auction for Cloud Instance Subletting Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Software Defined Cyberinfrastructure Ian T. Foster, Ben Blaiszik, Kyle Chard, Ryan Chard |
Software Defined Cyberinfrastructure Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Networklet: Concept and Deployment Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu |
Networklet: Concept and Deployment Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GBooster: Towards Acceleration of GPU-Intensive Mobile Applications Elliott Wen, Winston K. G. Seah, Bryan Ng, Xue Liu, Jiannong Cao, Xuefeng Liu |
GBooster: Towards Acceleration of GPU-Intensive Mobile Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Caching for Pattern Matching Queries in Time Evolving Graphs: Challenges and Approaches Muhammad Usman Nisar, Sahar Voghoei, Lakshmish Ramaswamy |
Caching for Pattern Matching Queries in Time Evolving Graphs: Challenges and Approaches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Segmentation of Time Series Based on Kinetic Characteristics for Storage Consumption Prediction Beibei Miao, Yu Chen, Xuebo Jin, Bo Wang, Xianping Qu, Shimin Tao, Dong Wang, Zhi Zang |
Segmentation of Time Series Based on Kinetic Characteristics for Storage Consumption Prediction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Approximation Designs for Cooperative Relay Deployment in Wireless Networks Haotian Wang, Shilei Tian, Xiaofeng Gao, Lidong Wu, Guihai Chen |
Approximation Designs for Cooperative Relay Deployment in Wireless Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters Amelie Chi Zhou, Shadi Ibrahim, Bingsheng He |
On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Elastic Paxos: A Dynamic Atomic Multicast Protocol Samuel Benz, Fernando Pedone |
Elastic Paxos: A Dynamic Atomic Multicast Protocol Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A First Look at Information Entropy-Based Data Pricing Xijun Li, Jianguo Yao, Xue Liu, Haibing Guan |
A First Look at Information Entropy-Based Data Pricing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Internet of Things: From Small- to Large-Scale Orchestration Charles Consel, Milan Kabác |
Internet of Things: From Small- to Large-Scale Orchestration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang |
Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen |
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Modeling Mobile Code Acceleration in the Cloud Huber Flores, Xiang Su, Vassilis Kostakos, Jukka Riekki, Eemil Lagerspetz, Sasu Tarkoma, Pan Hui, Yong Li, Jukka Manner |
Modeling Mobile Code Acceleration in the Cloud Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
ReverseCloak: A Reversible Multi-level Location Privacy Protection System Chao Li, Balaji Palanisamy, Aravind Kalaivanan, Sriram Raghunathan |
ReverseCloak: A Reversible Multi-level Location Privacy Protection System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rumor Initiator Detection in Infected Signed Networks Jiawei Zhang, Charu C. Aggarwal, Philip S. Yu |
Rumor Initiator Detection in Infected Signed Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Self-Organizing Distributed and In-Band SDN Control Plane Marco Canini, Iosif Salem, Liron Schiff, Elad Michael Schiller, Stefan Schmid |
A Self-Organizing Distributed and In-Band SDN Control Plane Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
LAVEA: Latency-Aware Video Analytics on Edge Computing Platform Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li |
LAVEA: Latency-Aware Video Analytics on Edge Computing Platform Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Load Balancing in Key-Value Networked Caches Sikder Huq, M. Zubair Shafiq, Sukumar Ghosh, Amir R. Khakpour, Harkeerat Bedi |
Distributed Load Balancing in Key-Value Networked Caches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen |
You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Location Privacy in Mobile Edge Clouds Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan |
Location Privacy in Mobile Edge Clouds Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search Systems Chih-Hsun Chou, Laxmi N. Bhuyan, Shaolei Ren |
TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Long Term Sensing via Battery Health Adaptation Greg Jackson, Zhijin Qin, Julie A. McCann |
Long Term Sensing via Battery Health Adaptation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mahmoud Ismail, Ermias Gebremeskel, Theofilos Kakantousis, Gautier Berthou, Jim Dowling |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Sensor Cloud: A Cloud of Sensor Networks Sanjay Kumar Madria |
Sensor Cloud: A Cloud of Sensor Networks Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Ensuring Network Neutrality for Future Distributed Systems Thiago Garrett, Schahram Dustdar, Luis C. E. Bona, Elias Procópio Duarte Jr. |
Ensuring Network Neutrality for Future Distributed Systems Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Hardware Acceleration Landscape for Distributed Real-Time Analytics: Virtues and Limitations Mohammadreza Najafi, Kaiwen Zhang, Mohammad Sadoghi, Hans-Arno Jacobsen |
Hardware Acceleration Landscape for Distributed Real-Time Analytics: Virtues and Limitations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EnGarde: Mutually-Trusted Inspection of SGX Enclaves Hai Nguyen, Vinod Ganapathy |
EnGarde: Mutually-Trusted Inspection of SGX Enclaves Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Energy-Aware CPU Frequency Scaling for Mobile Video Streaming Wenjie Hu, Guohong Cao |
Energy-Aware CPU Frequency Scaling for Mobile Video Streaming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ying Liu, Xi Guan, Vladimir Vlassov, Seif Haridi |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Scalable and Distributed Approach for NFV Service Chain Cost Minimization Zijun Zhang, Zongpeng Li, Chuan Wu, Chuanhe Huang |
A Scalable and Distributed Approach for NFV Service Chain Cost Minimization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Shortfall-Based Optimal Security Provisioning for Internet of Things Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo |
Shortfall-Based Optimal Security Provisioning for Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications He Huang, Yu-e Sun, Shigang Chen, Hongli Xu, Yian Zhou |
Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Future Networking Challenges: The Case of Mobile Augmented Reality Tristan Braud, Farshid Hassani Bijarbooneh, Dimitris Chatzopoulos, Pan Hui |
Future Networking Challenges: The Case of Mobile Augmented Reality Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Moustafa AbdelBaky, Mengsong Zou, Ali Reza Zamani, Eduard Gibert Renart, Javier Diaz Montes, Manish Parashar |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to Disasters Teruo Higashino, Hirozumi Yamaguchi, Akihito Hiromori, Akira Uchiyama, Keiichi Yasumoto |
Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to Disasters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SRLB: The Power of Choices in Load Balancing with Segment Routing Yoann Desmouceaux, Pierre Pfister, Jerome Tollet, Mark Townsley, Thomas H. Clausen |
SRLB: The Power of Choices in Load Balancing with Segment Routing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Power-Aware Population Protocols Chuan Xu, Janna Burman, Joffroy Beauquier |
Power-Aware Population Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs Huajie Shao, Shiguang Wang, Shen Li, Shuochao Yao, Yiran Zhao, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Lance M. Kaplan |
Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Specifying a Distributed Snapshot Algorithm as a Meta-Program and Model Checking it at Meta-Level Ha Thi Thu Doan, Kazuhiro Ogata, François Bonnet |
Specifying a Distributed Snapshot Algorithm as a Meta-Program and Model Checking it at Meta-Level Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel Computations Chen Chen, Wei Wang, Bo Li |
Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel Computations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Truthful Auctions for User Data Allowance Trading in Mobile Networks Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li |
Truthful Auctions for User Data Allowance Trading in Mobile Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Group Clustering Using Inter-Group Dissimilarities Debessay Fesehaye, Lenin Singaravelu, Chien-Chia Chen, Xiaobo Huang, Amitabha Banerjee, Ruijin Zhou, Rajesh Somasundaran |
Group Clustering Using Inter-Group Dissimilarities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dispersing Social Content in Mobile Crowd through Opportunistic Contacts Lei Zhang, Feng Wang, Jiangchuan Liu |
Dispersing Social Content in Mobile Crowd through Opportunistic Contacts Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Secure Public Directory for Privacy-Preserving Data Sharing Amin Fallahi, Xi Liu, Yuzhe Tang, Shuang Wang, Rui Zhang |
Towards Secure Public Directory for Privacy-Preserving Data Sharing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture Ehsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong, Mung Chiang |
Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation Robertus Nugroho, Weiliang Zhao, Jian Yang, Cécile Paris, Surya Nepal |
The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Isolation in Docker through Layer Encryption Ioannis Giannakopoulos, Konstantinos Papazafeiropoulos, Katerina Doka, Nectarios Koziris |
Isolation in Docker through Layer Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine Zonyin Shae, Jeffrey J. P. Tsai |
On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-Time Situation Awareness Pengfei Zuo, Yu Hua, Xue Liu, Dan Feng, Wen Xia, Shunde Cao, Jie Wu, Yuanyuan Sun, Yuncheng Guo |
BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-Time Situation Awareness Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems Di Wu, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, Julie A. McCann, Amelia C. Regan |
DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Computability of Perpetual Exploration in Highly Dynamic Rings Marjorie Bournat, Swan Dubois, Franck Petit |
Computability of Perpetual Exploration in Highly Dynamic Rings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing Ye Yan, Dong Han, Tao Shu |
Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
E-Android: A New Energy Profiling Tool for Smartphones Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou |
E-Android: A New Energy Profiling Tool for Smartphones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalable Role-Based Data Disclosure Control for the Internet of Things Ali Yavari, Arezou Soltani Panah, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ron G. van Schyndel |
Scalable Role-Based Data Disclosure Control for the Internet of Things Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks Jingya Zhou, Jianxi Fan |
JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Future of the Semantic Web: Prototypes on a Global Distributed Filesystem Michael Cochez, Dominik Hüser, Stefan Decker |
The Future of the Semantic Web: Prototypes on a Global Distributed Filesystem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DuoFS: An Attempt at Energy-Saving and Retaining Reliability of Storage Systems Bing Jiao, Xiaomin Zhu, Xiaojun Ruan, Xiao Qin, Shu Yin |
DuoFS: An Attempt at Energy-Saving and Retaining Reliability of Storage Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
LITMUS: Towards Multilingual Reporting of Landslides Aibek Musaev, Qixuan Hou, Yang Yang, Calton Pu |
LITMUS: Towards Multilingual Reporting of Landslides Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Robust Incentive Tree Design for Mobile Crowdsensing Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang |
Robust Incentive Tree Design for Mobile Crowdsensing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Real-Time Detection of Illegal File Transfers in the Cloud Adam Bowers, Dan Lin, Anna Cinzia Squicciarini, Ali R. Hurson |
Real-Time Detection of Illegal File Transfers in the Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Toward An Integrated Approach to Localizing Failures in Community Water Networks Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian |
Toward An Integrated Approach to Localizing Failures in Community Water Networks Details |
Author Comments:
CNS-0958520
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections Shen Li, Md. Tanvir Al Amin, Raghu K. Ganti, Mudhakar Srivatsa, Shanhao Hu, Yiran Zhao, Tarek F. Abdelzaher |
Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Energy Proportional Servers: Where Are We in 2016? Congfeng Jiang, Yumei Wang, Dongyang Ou, Bing Luo, Weisong Shi |
Energy Proportional Servers: Where Are We in 2016? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fuzzy Extractors for Biometric Identification Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal |
Fuzzy Extractors for Biometric Identification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Supporting Data Analytics Applications Which Utilize Cognitive Services Arun Iyengar |
Supporting Data Analytics Applications Which Utilize Cognitive Services Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Distributed QR Decomposition Framework for Training Support Vector Machines Jyotikrishna Dass, V. N. S. Prithvi Sakuru, Vivek Sarin, Rabi N. Mahapatra |
Distributed QR Decomposition Framework for Training Support Vector Machines Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Scalable and Dynamic Social Sensing Using A Distributed Computing Framework Daniel Yue Zhang, Chao Zheng, Dong Wang, Douglas Thain, Xin Mu, Greg Madey, Chao Huang |
Towards Scalable and Dynamic Social Sensing Using A Distributed Computing Framework Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Corey E. Baker, Allen Starke, Tanisha G. Hill-Jarrett, Janise McNair |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs Amy Babay, Emily Wagner, Michael Dinitz, Yair Amir |
Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access Chaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang |
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Multi-agent Parallel Approach to Analyzing Large Climate Data Sets Jason Woodring, Matthew Sell, Munehiro Fukuda, Hazeline U. Asuncion, Eric Salathe |
A Multi-agent Parallel Approach to Analyzing Large Climate Data Sets Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Dela - Sharing Large Datasets between Hadoop Clusters Alexandru A. Ormenisan, Jim Dowling |
Dela - Sharing Large Datasets between Hadoop Clusters Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
City-Hunter: Hunting Smartphones in Urban Areas Xuefeng Liu, Jiaqi Wen, Shaojie Tang, Jiannong Cao, Jiaxing Shen |
City-Hunter: Hunting Smartphones in Urban Areas Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
High Performance Recovery for Parallel State Machine Replication Odorico Machado Mendizabal, Fernando Luís Dotti, Fernando Pedone |
High Performance Recovery for Parallel State Machine Replication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics Consideration Liuwang Kang, Haiying Shen, Ankur Sarker |
Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics Consideration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FADEWICH: Fast Deauthentication Over the Wireless Channel Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik |
FADEWICH: Fast Deauthentication Over the Wireless Channel Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile Devices Yongshu Bai, Yifan Zhang |
StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Toward Vehicle Sensing: An Integrated Application with Sparse Video Vameras and Intelligent Taxicabs Yang Wang, Wuji Chen, Wei Zheng, He Huang, Wen Zhang, Hengchang Liu |
Toward Vehicle Sensing: An Integrated Application with Sparse Video Vameras and Intelligent Taxicabs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs Sagar Sharma, Keke Chen |
PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Multi-stage Hierarchical Window Model with Application to Real-Time Graph Analysis Sachini Jayasekara, Shanika Karunasekera, Aaron Harwood |
A Multi-stage Hierarchical Window Model with Application to Real-Time Graph Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Keddah: Capturing Hadoop Network Behaviour Jie Deng, Gareth Tyson, Félix Cuadrado, Steve Uhlig |
Keddah: Capturing Hadoop Network Behaviour Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of Millibottlenecks Tao Zhu, Jack Li, Josh Kimball, Junhee Park, Chien-An Lai, Calton Pu, Qingyang Wang |
Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of Millibottlenecks Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Automated Performance Evaluation for Multi-tier Cloud Service Systems Subject to Mixed Workloads Xudong Zhao, Jiwei Huang, Lei Liu, Shijun Liu, Calton Pu, Lizhen Cui |
Automated Performance Evaluation for Multi-tier Cloud Service Systems Subject to Mixed Workloads Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy Implications of DNSSEC Look-Aside Validation Aziz Mohaisen, Zhongshu Gu, Kui Ren |
Privacy Implications of DNSSEC Look-Aside Validation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Lightweight Recommendation Framework for Mobile User's Link Selection in Dense Network Ji Wang, Xiaomin Zhu, Weidong Bao, Guanlin Wu |
A Lightweight Recommendation Framework for Mobile User's Link Selection in Dense Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags Han Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao |
RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Joint Request Balancing and Content Aggregation in Crowdsourced CDN Ming Ma, Zhi Wang, Kun Yi, Jiangchuan Liu, Lifeng Sun |
Joint Request Balancing and Content Aggregation in Crowdsourced CDN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wenxin Li, Xiaobo Zhou, Keqiu Li, Heng Qi, Deke Guo |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering Pranita Dewan, Raghu K. Ganti, Mudhakar Srivatsa |
SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improving Efficiency of Link Clustering on Multi-core Machines Guanhua Yan |
Improving Efficiency of Link Clustering on Multi-core Machines Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Unseen Activity Recognitions: A Hierarchical Active Transfer Learning Approach Mohammad Arif Ul Alam, Nirmalya Roy |
Unseen Activity Recognitions: A Hierarchical Active Transfer Learning Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-representation Based Data Processing Architecture for IoT Applications Vaibhav Arora, Faisal Nawab, Divyakant Agrawal, Amr El Abbadi |
Multi-representation Based Data Processing Architecture for IoT Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Xiulin Li, Li Pan, Jiwei Huang, Shijun Liu, Yuliang Shi, Li-zhen Cui, Calton Pu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimization of Full-View Barrier Coverage with Rotatable Camera Sensors Xiaofeng Gao, Rui Yang, Fan Wu, Guihai Chen, Jinguang Zhou |
Optimization of Full-View Barrier Coverage with Rotatable Camera Sensors Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The Millibottleneck Theory of Performance Bugs, and Its Experimental Verification Calton Pu, Joshua Kimball, Chien-An Lai, Tao Zhu, Jack Li, Junhee Park, Qingyang Wang, Deepal Jayasinghe, PengCheng Xiong, Simon Malkowski, Qinyi Wu, Gueyoung Jung, Younggyun Koh, Galen S. Swint |
The Millibottleneck Theory of Performance Bugs, and Its Experimental Verification Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Nosayba El-Sayed, Hongyu Zhu, Bianca Schroeder |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants Weipeng Lin, Ke Wang, Zhilin Zhang, Hong Chen |
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Complete Tolerance Relation Based Filling Algorithm Using Spark Jingling Yuan, Yao Xiang, Xian Zhong, Mincheng Chen, Tao Li |
Complete Tolerance Relation Based Filling Algorithm Using Spark Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Timed-Release of Self-Emerging Data Using Distributed Hash Tables Chao Li, Balaji Palanisamy |
Timed-Release of Self-Emerging Data Using Distributed Hash Tables Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Selective Traffic Offloading on the Fly: A Machine Learning Approach Zaiyang Tang, Peng Li, Song Guo, Xiaofei Liao, Hai Jin, Daqing Zhang |
Selective Traffic Offloading on the Fly: A Machine Learning Approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Proactively Secure Cloud-Enabled Storage Karim Eldefrawy, Sky Faber, Tyler Kaczmarek |
Proactively Secure Cloud-Enabled Storage Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities Amir Sinaeepourfard, Jordi Garcia, Xavier Masip-Bruin, Eva Marín-Tordera |
A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Optimization Framework for Online Ride-Sharing Markets Yongzheng Jia, Wei Xu, Xue Liu |
An Optimization Framework for Online Ride-Sharing Markets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Oak: User-Targeted Web Performance Marcel Flores, Alexander Wenzel, Aleksandar Kuzmanovic |
Oak: User-Targeted Web Performance Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds Eve M. Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, Moreno Ambrosin |
An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Profiling Users by Modeling Web Transactions Radek Tomsu, Samuel Marchal, N. Asokan |
Profiling Users by Modeling Web Transactions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tracking Information Flow in Cyber-Physical Systems Stefan Gries, Marc Hesenius, Volker Gruhn |
Tracking Information Flow in Cyber-Physical Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and Writes Dejun Teng, Lei Guo, Rubao Lee, Feng Chen, Siyuan Ma, Yanfeng Zhang, Xiaodong Zhang |
LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and Writes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment Juan F. Pérez, Robert Birke, Mathias Björkqvist, Lydia Y. Chen |
Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems Zhuojun Duan, Wei Li, Zhipeng Cai |
Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Retrospective Lightweight Distributed Snapshots Using Loosely Synchronized Clocks Aleksey Charapko, Ailidani Ailijiang, Murat Demirbas, Sandeep S. Kulkarni |
Retrospective Lightweight Distributed Snapshots Using Loosely Synchronized Clocks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs Raziel Carvajal Gómez, Inti Y. Gonzalez-Herrera, Yérom-David Bromberg, Laurent Réveillère, Etienne Riviere |
Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS Quanlu Zhang, Zhenhua Li, Zhi Yang, Shenglong Li, Shouyang Li, Yangze Guo, Yafei Dai |
DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Making Smartphone Smart on Demand for Longer Battery Life Marco Brocanelli, Xiaorui Wang |
Making Smartphone Smart on Demand for Longer Battery Life Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Communication-Aware Container Re-Distribution Approach for High Performance VNFs Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Minghui Li, Xuan Cao, Qingqing Liang |
A Communication-Aware Container Re-Distribution Approach for High Performance VNFs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Event-Level Abstraction for Achieving Efficiency and Fairness in Network Update Ting Qu, Deke Guo, Xiaomin Zhu, Jie Wu, Xiaolei Zhou, Zhong Liu |
An Event-Level Abstraction for Achieving Efficiency and Fairness in Network Update Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ning Liu, Zhe Li, Jielong Xu, Zhiyuan Xu, Sheng Lin, Qinru Qiu, Jian Tang, Yanzhi Wang |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BIG Cache Abstraction for Cache Networks Eman Ramadan, Arvind Narayanan, Zhi-Li Zhang, Runhui Li, Gong Zhang |
BIG Cache Abstraction for Cache Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Maxim Filatov, Verena Kantere, Iluju Kiringa |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributively Computing Random Walk Betweenness Centrality in Linear Time Qiang-Sheng Hua, Ming Ai, Hai Jin, Dongxiao Yu, Xuanhua Shi |
Distributively Computing Random Walk Betweenness Centrality in Linear Time Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Toward an Integrated Approach to Localizing Failures in Community Water Networks (DEMO) Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian |
Toward an Integrated Approach to Localizing Failures in Community Water Networks (DEMO) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Load Prediction for Energy-Aware Scheduling for Cloud Computing Platforms Alexandre Dambreville, Joanna Tomasik, Johanne Cohen, Fabien Dufoulon |
Load Prediction for Energy-Aware Scheduling for Cloud Computing Platforms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta |
On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes Yu Zhao, Huazhe Wang, Xin Lin, Tingting Yu, Chen Qian |
Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers Qiuxiang Dong, Dijiang Huang |
Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy Preserving User-Based Recommender System Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino |
Privacy Preserving User-Based Recommender System Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Performance Driven Resource Sharing Markets for the Small Cloud Sung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik |
Performance Driven Resource Sharing Markets for the Small Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques Jingxuan Wang, Wenting Tu, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang |
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs Balaji Palanisamy, Chao Li, Prashant Krishnamurthy |
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang |
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Voyager: Complete Container State Migration Shripad Nadgowda, Sahil Suneja, Nilton Bila, Canturk Isci |
Voyager: Complete Container State Migration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Virtualized Network Coding Functions on the Internet Linquan Zhang, Shangqi Lai, Chuan Wu, Zongpeng Li, Chuanxiong Guo |
Virtualized Network Coding Functions on the Internet Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MultiPub: Latency and Cost-Aware Global-Scale Cloud Publish/Subscribe Julien Gascon-Samson, Jörg Kienzle, Bettina Kemme |
MultiPub: Latency and Cost-Aware Global-Scale Cloud Publish/Subscribe Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Virtual Machine Power Accounting with Shapley Value Weixiang Jiang, Fangming Liu, Guoming Tang, Kui Wu, Hai Jin |
Virtual Machine Power Accounting with Shapley Value Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wei Ai, Kenli Li, Cen Chen, Jiwu Peng, Keqin Li |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Model-Driven Domain-Specific Middleware Fábio M. Costa, Karl A. Morris, Fabio Kon, Peter J. Clarke |
Model-Driven Domain-Specific Middleware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks Shaojun Zou, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He |
Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Evaluation of Deep Learning Frameworks Over Different HPC Architectures Shayan Shams, Richard Platania, Kisung Lee, Seung-Jong Park |
Evaluation of Deep Learning Frameworks Over Different HPC Architectures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Seontae Kim, Nguyen Pham, Woongki Baek, Young-ri Choi |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Right-Sizing Geo-distributed Data Centers for Availability and Latency Iyswarya Narayanan, Aman Kansal, Anand Sivasubramaniam |
Right-Sizing Geo-distributed Data Centers for Availability and Latency Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adopting SDN Switch Buffer: Benefits Analysis and Mechanism Design Fuliang Li, Jiannong Cao, Xingwei Wang, Yinchu Sun, Tian Pan, Xuefeng Liu |
Adopting SDN Switch Buffer: Benefits Analysis and Mechanism Design Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
JeCache: Just-Enough Data Caching with Just-in-Time Prefetching for Big Data Applications Yifeng Luo, Jia Shi, Shuigeng Zhou |
JeCache: Just-Enough Data Caching with Just-in-Time Prefetching for Big Data Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Distributed Coordination at WAN-Scale Ailidani Ailijiang, Aleksey Charapko, Murat Demirbas, Bekir O. Turkkan, Tevfik Kosar |
Efficient Distributed Coordination at WAN-Scale Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Calvin Constrained - A Framework for IoT Applications in Heterogeneous Environments Amardeep Mehta, Rami Baddour, Fredrik Svensson, Harald Gustafsson, Erik Elmroth |
Calvin Constrained - A Framework for IoT Applications in Heterogeneous Environments Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing Munindar P. Singh, Amit K. Chopra |
The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimistic Causal Consistency for Geo-Replicated Key-Value Stores Kristina Spirovska, Diego Didona, Willy Zwaenepoel |
Optimistic Causal Consistency for Geo-Replicated Key-Value Stores Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma |
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Fault Tolerant Linear System Solvers Based on Erasure Coding Xuejiao Kang, David F. Gleich, Ahmed H. Sameh, Ananth Grama |
Distributed Fault Tolerant Linear System Solvers Based on Erasure Coding Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao |
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
Evaluating Connection Resilience for the Overlay Network Kademlia Henner Heck, Olga Kieselmann, Arno Wacker |
Evaluating Connection Resilience for the Overlay Network Kademlia Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Influence Maximization in a Many Cascades World Iouliana Litou, Vana Kalogeraki, Dimitrios Gunopulos |
Influence Maximization in a Many Cascades World Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Energy-Efficient Congestion Control for Multipath TCP Jia Zhao, Jiangchuan Liu, Haiyang Wang |
On Energy-Efficient Congestion Control for Multipath TCP Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs) Anja Feldmann, Manfred Hauswirth, Volker Markl |
Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Incremental Topology Transformation for Publish/Subscribe Systems Using Integer Programming Pooya Salehi, Kaiwen Zhang, Hans-Arno Jacobsen |
Incremental Topology Transformation for Publish/Subscribe Systems Using Integer Programming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Learning Privacy Habits of PDS Owners Bikash Chandra Singh, Barbara Carminati, Elena Ferrari |
Learning Privacy Habits of PDS Owners Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Federating Consistency for Partition-Prone Networks Benjamin Bengfort, Pete Keleher |
Federating Consistency for Partition-Prone Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Data Integrity for Collaborative Applications over Hosted Services Ertem Esiner, Anwitaman Datta |
Data Integrity for Collaborative Applications over Hosted Services Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Leveraging Target k-Coverage in Wireless Rechargeable Sensor Networks Pengzhan Zhou, Cong Wang, Yuanyuan Yang |
Leveraging Target k-Coverage in Wireless Rechargeable Sensor Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lateral Thinking for Trustworthy Apps Hermann Härtig, Michael Roitzsch, Carsten Weinhold, Adam Lackorzynski |
Lateral Thinking for Trustworthy Apps Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points Chen Wang, Chuyu Wang, Yingying Chen, Lei Xie, Sanglu Lu |
Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Multilingual Automated Classification Systems Aibek Musaev, Calton Pu |
Towards Multilingual Automated Classification Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Machine to Machine Trust in Smart Cities Margaret L. Loper, Brian Paul Swenson |
Machine to Machine Trust in Smart Cities Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu |
Performance of Cognitive Wireless Charger for Near-Field Wireless Charging Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Eyes of the Swarm: Streamers' Detection in BT Daniel Vasconcelos Correa da Silva, Antônio Augusto de Aragão Rocha |
Eyes of the Swarm: Streamers' Detection in BT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web Services Chien-An Lai, Josh Kimball, Tao Zhu, Qingyang Wang, Calton Pu |
milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li |
Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch Shanhe Yi, Zhengrui Qin, Nancy Carter, Qun Li |
WearLock: Unlocking Your Phone via Acoustics Using Smartwatch Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Uncovering the Useful Structures of Complex Networks in Socially-Rich and Dynamic Environments Jie Wu |
Uncovering the Useful Structures of Complex Networks in Socially-Rich and Dynamic Environments Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
EdgeOS_H: A Home Operating System for Internet of Everything Jie Cao, Lanyu Xu, Raef Abdallah, Weisong Shi |
EdgeOS_H: A Home Operating System for Internet of Everything Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda |
Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi |
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoT Tarek F. Abdelzaher, Md. Tanvir Al Amin, Amotz Bar-Noy, William Dron, Ramesh Govindan, Reginald L. Hobbs, Shaohan Hu, Jung-Eun Kim, Jongdeog Lee, Kelvin Marcus, Shuochao Yao, Yiran Zhao |
Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software Mohammad Alhowaidi, Byrav Ramamurthy, Brian Bockelman, David Swanson |
The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sangeetha Seshadri, Paul Muench, Lawrence Chiu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Job Scheduling without Prior Information in Big Data Processing Systems Zhiming Hu, Baochun Li, Zheng Qin, Rick Siow Mong Goh |
Job Scheduling without Prior Information in Big Data Processing Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Task-aware TCP in Data Center Networks Sen Liu, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He |
Task-aware TCP in Data Center Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SunChase: Energy-Efficient Route Planning for Solar-Powered EVs Landu Jiang, Yu Hua, Chen Ma, Xue Liu |
SunChase: Energy-Efficient Route Planning for Solar-Powered EVs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exacution: Enhancing Scientific Data Management for Exascale Scott Klasky, Eric Suchyta, Mark Ainsworth, Qing Liu, Ben Whitney, Matthew Wolf, Jong Youl Choi, Ian T. Foster, Mark Kim, Jeremy Logan, Kshitij Mehta, Todd Munson, George Ostrouchov, Manish Parashar, Norbert Podhorszki, David Pugmire, Lipeng Wan |
Exacution: Enhancing Scientific Data Management for Exascale Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices Surat Teerapittayanon, Bradley McDanel, H. T. Kung |
Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Local and Low-Cost White Space Detection Ahmed Saeed, Khaled A. Harras, Ellen W. Zegura, Mostafa H. Ammar |
Local and Low-Cost White Space Detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Subscription Covering for Relevance-Based Filtering in Content-Based Publish/Subscribe Systems Kaiwen Zhang, Vinod Muthusamy, Mohammad Sadoghi, Hans-Arno Jacobsen |
Subscription Covering for Relevance-Based Filtering in Content-Based Publish/Subscribe Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Giuliano Losa, Antonio Barbalace, Yuzhong Wen, Ho-Ren Chuang, Binoy Ravindran |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mitigating Nesting-Agnostic Hypervisor Policies in Derivative Clouds Chandra Prakash, Prashanth, Purushottam Kulkarni, Umesh Bellur |
Mitigating Nesting-Agnostic Hypervisor Policies in Derivative Clouds Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Buffer-Based Reinforcement Learning for Adaptive Streaming Yue Zhang, Yao Liu |
Buffer-Based Reinforcement Learning for Adaptive Streaming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Crazy Crowd Sourcing to Mitigate Resource Scarcity Nova Ahmed, Mahfuzur Rahman Siddiquee, Refaya Karim, Mohsina Zaman, Sayed Mahmudul Alam, Syed Fahim Ashram |
Crazy Crowd Sourcing to Mitigate Resource Scarcity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels Jun Zhao |
Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
JointCloud: A Cross-Cloud Cooperation Architecture for Integrated Internet Service Customization Huaimin Wang, Peichang Shi, Yiming Zhang |
JointCloud: A Cross-Cloud Cooperation Architecture for Integrated Internet Service Customization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang |
iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Location Privacy Breach: Apps Are Watching You in Background Dachuan Liu, Xing Gao, Haining Wang |
Location Privacy Breach: Apps Are Watching You in Background Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Energy Efficient Object Detection in Camera Sensor Networks Tuan Dao, Karim Khalil, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy, Lance M. Kaplan |
Energy Efficient Object Detection in Camera Sensor Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
S3: Joint Scheduling and Source Selection for Background Traffic in Erasure-Coded Storage Shijing Li, Tian Lan, Moo-Ryong Ra, Rajesh Krishna Panta |
S3: Joint Scheduling and Source Selection for Background Traffic in Erasure-Coded Storage Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks Chin-Jung Liu, Li Xiao |
k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Parallel Algorithm for Core Maintenance in Dynamic Graphs Na Wang, Dongxiao Yu, Hai Jin, Chen Qian, Xia Xie, Qiang-Sheng Hua |
Parallel Algorithm for Core Maintenance in Dynamic Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Robust Indoor Wireless Localization Using Sparse Recovery Wei Gong, Jiangchuan Liu |
Robust Indoor Wireless Localization Using Sparse Recovery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Fast Heuristic Attribute Reduction Algorithm Using Spark Mincheng Chen, Jingling Yuan, Lin Li, Dongling Liu, Tao Li |
A Fast Heuristic Attribute Reduction Algorithm Using Spark Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Chronus: Consistent Data Plane Updates in Timed SDNs Jiaqi Zheng, Guihai Chen, Stefan Schmid, Haipeng Dai, Jie Wu |
Chronus: Consistent Data Plane Updates in Timed SDNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching Xiang Li, J. David Smith, My T. Thai |
Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Boosting The Benefits of Hybrid SDN Wen Wang, Wenbo He, Jinshu Su |
Boosting The Benefits of Hybrid SDN Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Preventive Auto-Parallelization Approach for Elastic Stream Processing Roland Kotto Kombi, Nicolas Lumineau, Philippe Lamarre |
A Preventive Auto-Parallelization Approach for Elastic Stream Processing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A Mechanism for Cooperative Demand-Side Management Guangchao Yuan, Chung-Wei Hang, Michael N. Huhns, Munindar P. Singh |
A Mechanism for Cooperative Demand-Side Management Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Steffen Staab |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANs Bing Feng, Jianqing Liu, Chi Zhang, Yuguang Fang |
Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Android Malware Detection Using Complex-Flows Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek |
Android Malware Detection Using Complex-Flows Details |
Author Comments:
http://blueseal.cse.buffalo.edu/sourcecode.html for direct links to source code and datasets
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Cache Potentiality of MONs: A Prime Peiyan Yuan, Honghai Wu, Xiaoyan Zhao, Zhengnan Dong |
Cache Potentiality of MONs: A Prime Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Elisa Bertino, Seraphin B. Calo, Maroun Touma, Dinesh C. Verma, Christopher Williams, Brian Rivera |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coordinating Distributed Speaking Objects Marco Lippi, Marco Mamei, Stefano Mariani, Franco Zambonelli |
Coordinating Distributed Speaking Objects Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Locally Self-Adjusting Skip Graphs Sikder Huq, Sukumar Ghosh |
Locally Self-Adjusting Skip Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D Forwarding Yanqi Jin, Fangming Liu, Xiaomeng Yi, Minghua Chen |
Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D Forwarding Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ankur Sarker, Zhuozhao Li, William Kolodzey, Haiying Shen |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs Kambiz Ghoorchian, Sarunas Girdzijauskas, Fatemeh Rahimian |
DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control Chenxi Qiu, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, James Caverlee |
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Phoenix: A Constraint-Aware Scheduler for Heterogeneous Datacenters Prashanth Thinakaran, Jashwant Raj Gunasekaran, Bikash Sharma, Mahmut Taylan Kandemir, Chita R. Das |
Phoenix: A Constraint-Aware Scheduler for Heterogeneous Datacenters Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing Xiaomei Zhang, Yibo Wu, Lifu Huang, Heng Ji, Guohong Cao |
Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SPHINX: A Password Store that Perfectly Hides Passwords from Itself Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena |
SPHINX: A Password Store that Perfectly Hides Passwords from Itself Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OPPay: Design and Implementation of a Payment System for Opportunistic Data Services Fengrui Shi, Zhijin Qin, Julie A. McCann |
OPPay: Design and Implementation of a Payment System for Opportunistic Data Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference Gonglong Chen, Wei Dong, Zhiwei Zhao, Tao Gu |
Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Category Information Collection in RFID Systems Jia Liu, Shigang Chen, Bin Xiao, Yanyan Wang, Lijun Chen |
Category Information Collection in RFID Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Serverless Programming (Function as a Service) Paul C. Castro, Vatche Ishakian, Vinod Muthusamy, Aleksander Slominski |
Serverless Programming (Function as a Service) Details |
Author Comments:
Other related artifacts https://www.serverlesscomputing.org/workshops/
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Dong Han, Ye Yan, Tao Shu, Liuqing Yang, Shuguang Cui |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Agar: A Caching System for Erasure-Coded Data Raluca Halalai, Pascal Felber, Anne-Marie Kermarrec, François Taïani |
Agar: A Caching System for Erasure-Coded Data Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Masaru Kitsuregawa |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Real-Time Power Cycling in Video on Demand Data Centres Using Online Bayesian Prediction Vicent Sanz Marco, Zheng Wang, Barry Porter |
Real-Time Power Cycling in Video on Demand Data Centres Using Online Bayesian Prediction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization Yongbo Li, Yurong Chen, Tian Lan, Guru Venkataramani |
MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ACTiCLOUD: Enabling the Next Generation of Cloud Applications Georgios I. Goumas, Konstantinos Nikas, Ewnetu Bayuh Lakew, Christos Kotselidis, Andrew Attwood, Erik Elmroth, Michail Flouris, Nikos Foutris, John Goodacre, Davide Grohmann, Vasileios Karakostas, Panagiotis Koutsourakis, Martin L. Kersten, Mikel Luján, Einar Rustad, John Thomson, Luis Tomás, Atle Vesterkjaer, Jim Webber, Ying Zhang, Nectarios Koziris |
ACTiCLOUD: Enabling the Next Generation of Cloud Applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Optimizing Shuffle in Wide-Area Data Analytics Shuhao Liu, Hao Wang, Baochun Li |
Optimizing Shuffle in Wide-Area Data Analytics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks Ai-Chun Pang, Wei-Ho Chung, Te-Chuan Chiu, Junshan Zhang |
Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Networked Stochastic Multi-armed Bandits with Combinatorial Strategies Shaojie Tang, Yaqin Zhou, Kai Han, Zhao Zhang, Jing Yuan, Weili Wu |
Networked Stochastic Multi-armed Bandits with Combinatorial Strategies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anonymous Routing to Maximize Delivery Rates in DTNs Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu |
Anonymous Routing to Maximize Delivery Rates in DTNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Directional Neighbor Discovery in mmWave Networks Yu Wang, Shiwen Mao, Theodore S. Rappaport |
On Directional Neighbor Discovery in mmWave Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Data-Driven Serendipity Navigation in Urban Places Xiaoyu Ge, Ameya Daphalapurkar, Manali Shimpi, Darpun Kohli, Konstantinos Pelechrinis, Panos K. Chrysanthis, Demetrios Zeinalipour-Yazti |
Data-Driven Serendipity Navigation in Urban Places Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data Workloads Dipti Shankar, Xiaoyi Lu, Dhabaleswar K. Panda |
High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data Workloads Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Networked Drone Cameras for Sports Streaming Xiaoli Wang, Aakanksha Chowdhery, Mung Chiang |
Networked Drone Cameras for Sports Streaming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System Adriano Di Luzio, Alessandro Mei, Julinda Stefa |
Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Distributed Access Control System for Cloud Federations Shorouq Alansari, Federica Paci, Vladimiro Sassone |
A Distributed Access Control System for Cloud Federations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Modeling and Analyzing Latency in the Memcached system Wenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang |
Modeling and Analyzing Latency in the Memcached system Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices Xuyu Wang, Chao Yang, Shiwen Mao |
PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Content Centric Peer Data Sharing in Pervasive Edge Computing Environments Xintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li |
Content Centric Peer Data Sharing in Pervasive Edge Computing Environments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things Daniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino |
Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud Hui Chen, Qingyang Wang, Balaji Palanisamy, Pengcheng Xiong |
DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Structured Overlay Networks for a New Generation of Internet Services Amy Babay, Claudiu Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, Jonathan Robert Stanton, Thomas Tantillo, Yair Amir |
Structured Overlay Networks for a New Generation of Internet Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fast and Flexible Networking for Message-Oriented Middleware Lars Kroll, Alexandru A. Ormenisan, Jim Dowling |
Fast and Flexible Networking for Message-Oriented Middleware Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Optimal Resource Allocation for Multi-user Video Streaming over mmWave Networks Zhifeng He, Shiwen Mao |
Optimal Resource Allocation for Multi-user Video Streaming over mmWave Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A General Purpose Testbed for Mobile Data Gathering in Wireless Sensor Networks and a Case Study Ji Li, Cong Wang, Yuanyuan Yang |
A General Purpose Testbed for Mobile Data Gathering in Wireless Sensor Networks and a Case Study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Incremental Elasticity for NoSQL Data Stores Antonis Papaioannou, Kostas Magoutis |
Incremental Elasticity for NoSQL Data Stores Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Adversary-Centric Behavior Modeling of DDoS Attacks An Wang, Aziz Mohaisen, Songqing Chen |
An Adversary-Centric Behavior Modeling of DDoS Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Straggler Mitigation for Distributed Behavioral Simulation Eman Bin Khunayn, Shanika Karunasekera, Hairuo Xie, Kotagiri Ramamohanarao |
Straggler Mitigation for Distributed Behavioral Simulation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards a RISC Framework for Efficient Contextualisation in the IoT Dimitrios Georgakopoulos, Ali Yavari, Prem Prakash Jayaraman, Rajiv Ranjan |
Towards a RISC Framework for Efficient Contextualisation in the IoT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Self-Evolving Subscriptions for Content-Based Publish/Subscribe Systems César Cañas, Kaiwen Zhang, Bettina Kemme, Jörg Kienzle, Hans-Arno Jacobsen |
Self-Evolving Subscriptions for Content-Based Publish/Subscribe Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Feasibility of Inter-Domain Routing via a Small Broker Set Dong Lin, David Shui Wing Hui, Weijie Wu, Tingwei Liu, Yating Yang, Yi Wang, John C. S. Lui, Gong Zhang, Yingtao Li |
On the Feasibility of Inter-Domain Routing via a Small Broker Set Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Distributed Event-Centric Collaborative Workflows Development System for IoT Application Yong-Yang Cheng, Shuai Zhao, Bo Cheng, Shou-lu Hou, Xiulei Zhang, Junliang Chen |
A Distributed Event-Centric Collaborative Workflows Development System for IoT Application Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rain or Shine? - Making Sense of Cloudy Reliability Data Iyswarya Narayanan, Bikash Sharma, Di Wang, Sriram Govindan, Laura Caulfield, Anand Sivasubramaniam, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid |
Rain or Shine? - Making Sense of Cloudy Reliability Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dependable Cloud Resources with Guardian Bara Abusalah, Derek Schatzlein, Julian James Stephen, Masoud Saeida Ardekani, Patrick Eugster |
Dependable Cloud Resources with Guardian Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Supporting Resource Control for Actor Systems in Akka Ahmed Abdel Moamen, Dezhong Wang, Nadeem Jamali |
Supporting Resource Control for Actor Systems in Akka Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On Data Parallelism of Erasure Coding in Distributed Storage Systems Jun Li, Baochun Li |
On Data Parallelism of Erasure Coding in Distributed Storage Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CRESON: Callable and Replicated Shared Objects over NoSQL Pierre Sutra, Etienne Riviere, Cristian Cotes, Marc Sánchez Artigas, Pedro García López, Emmanuel Bernard, William Burns, Galder Zamarreno |
CRESON: Callable and Replicated Shared Objects over NoSQL Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds Lin Wang, Lei Jiao, Jun Li, Max Mühlhäuser |
Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Incentive Mechanism for Data-Centric Message Delivery in Delay Tolerant Networks Himanshu Jethawa, Sanjay Madria |
Incentive Mechanism for Data-Centric Message Delivery in Delay Tolerant Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TagBreathe: Monitor Breathing with Commodity RFID Systems Yuxiao Hou, Yanwen Wang, Yuanqing Zheng |
TagBreathe: Monitor Breathing with Commodity RFID Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Limits of Subsampling of Location Traces Mudhakar Srivatsa, Raghu K. Ganti, Prasant Mohapatra |
On the Limits of Subsampling of Location Traces Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Z-Order Encoding Based Multi-Modal Data Compression in WSNs Xiaofei Cao, Sanjay Kumar Madria, Takahiro Hara |
Efficient Z-Order Encoding Based Multi-Modal Data Compression in WSNs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction Peng Xu, Jinyang Li, Xiaoshan Sun, Wei Zheng, Hengchang Liu |
Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies Zhongjie Ba, Kui Ren |
Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing Tong Li, Chathura M. Sarathchandra Magurawalage, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang |
On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization Qixia Zhang, Yikai Xiao, Fangming Liu, John C. S. Lui, Jian Guo, Tao Wang |
Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scaling k-Nearest Neighbours Queries (The Right Way) Atoshum Cahsai, Nikos Ntarmos, Christos Anagnostopoulos, Peter Triantafillou |
Scaling k-Nearest Neighbours Queries (The Right Way) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards a Complete Virtual Data Center Embedding Algorithm Using Hybrid Strategy Malayam Parambath Gilesh, S. D. Madhu Kumar, Lillykutty Jacob, Umesh Bellur |
Towards a Complete Virtual Data Center Embedding Algorithm Using Hybrid Strategy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cachier: Edge-Caching for Recognition Applications Utsav Drolia, Katherine Guo, Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan |
Cachier: Edge-Caching for Recognition Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks Derek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal |
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Parallelizing Big De Bruijn Graph Construction on Heterogeneous Processors Shuang Qiu, Qiong Luo |
Parallelizing Big De Bruijn Graph Construction on Heterogeneous Processors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mechanism Design for Mobile Crowdsensing with Execution Uncertainty Zhenzhe Zheng, Zhaoxiong Yang, Fan Wu, Guihai Chen |
Mechanism Design for Mobile Crowdsensing with Execution Uncertainty Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dynamic Control of Flow Completion Time for Power Efficiency of Data Center Networks Kuangyu Zheng, Xiaorui Wang |
Dynamic Control of Flow Completion Time for Power Efficiency of Data Center Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scaling and Load Testing Location-Based Publish and Subscribe Bertil Chapuis, Benoît Garbinato |
Scaling and Load Testing Location-Based Publish and Subscribe Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Strong Link Graph for Enhancing Sybil Defenses Suhendry Effendy, Roland H. C. Yap |
The Strong Link Graph for Enhancing Sybil Defenses Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Robust Multi-tenant Server Consolidation in the Cloud for Data Analytics Workloads Joseph Mate, Khuzaima Daudjee, Shahin Kamali |
Robust Multi-tenant Server Consolidation in the Cloud for Data Analytics Workloads Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren |
Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reachability in Binary Multithreaded Programs Is Polynomial Alexander Malkis, Steffen Borgwardt |
Reachability in Binary Multithreaded Programs Is Polynomial Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Learn-as-You-Go with Megh: Efficient Live Migration of Virtual Machines Debabrota Basu, Xiayang Wang, Yang Hong, Haibo Chen, Stéphane Bressan |
Learn-as-You-Go with Megh: Efficient Live Migration of Virtual Machines Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|