A unified framework for wireless max-min utility optimization with general monotonic constraints
Yao-Win Peter Hong, Chee Wei Tan, Liang Zheng, Cheng-Lin Hsieh, Chia-Han Lee
|
A unified framework for wireless max-min utility optimization with general monotonic constraints
Details
|
|
Verification:
Authors have
not verified
information
|
Personal clouds: Sharing and integrating networked resources to enhance end user experiences
Minsung Jang, Karsten Schwan, Ketan Bhardwaj, Ada Gavrilovska, Adhyas Avasthi
|
Personal clouds: Sharing and integrating networked resources to enhance end user experiences
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling multicast traffic with deadlines in wireless networks
Kyu Seob Kim, Chih-Ping Li, Eytan Modiano
|
Scheduling multicast traffic with deadlines in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems
Pengfei Chen, Yong Qi, Pengfei Zheng, Di Hou
|
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems
Details
|
|
Verification:
Authors have
not verified
information
|
Efficiently collecting histograms over RFID tags
Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu
|
Efficiently collecting histograms over RFID tags
Details
|
|
Verification:
Authors have
not verified
information
|
Performance-aware energy optimization on mobile devices in cellular network
Yong Cui, Shihan Xiao, Xin Wang, Minming Li, Hongyi Wang, Zeqi Lai
|
Performance-aware energy optimization on mobile devices in cellular network
Details
|
|
Verification:
Authors have
not verified
information
|
A matroid theory approach to multicast network coding
Xunrui Yin, Zongpeng Li, Xin Wang
|
A matroid theory approach to multicast network coding
Details
|
|
Verification:
Authors have
not verified
information
|
On designing neighbor discovery protocols: A code-based approach
Tong Meng, Fan Wu, Guihai Chen
|
On designing neighbor discovery protocols: A code-based approach
Details
|
|
Verification:
Authors have
not verified
information
|
Critical sensing range for mobile heterogeneous camera sensor networks
Yitao Hu, Xinbing Wang, Xiaoying Gan
|
Critical sensing range for mobile heterogeneous camera sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
An optimal data collection technique for improved utility in UAS-aided networks
Ahmed E. A. A. Abdulla, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, Fumie Ono, Ryu Miura
|
An optimal data collection technique for improved utility in UAS-aided networks
Details
|
|
Verification:
Authors have
not verified
information
|
Communication through collisions: Opportunistic utilization of past receptions
Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr
|
Communication through collisions: Opportunistic utilization of past receptions
Details
|
|
Verification:
Authors have
not verified
information
|
Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility
Jiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang
|
Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility
Details
|
|
Verification:
Authors have
not verified
information
|
Improving mobile video streaming with link aware scheduling and client caches
Randeep Bhatia, T. V. Lakshman, Arun N. Netravali, Krishan K. Sabnani
|
Improving mobile video streaming with link aware scheduling and client caches
Details
|
|
Verification:
Authors have
not verified
information
|
Towards ubiquitous indoor localization service leveraging environmental physical features
Yang Tian, Ruipeng Gao, Kaigui Bian, Fan Ye, Tao Wang, Yizhou Wang, Xiaoming Li
|
Towards ubiquitous indoor localization service leveraging environmental physical features
Details
|
|
Verification:
Authors have
not verified
information
|
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks
Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu
|
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Venice: Reliable virtual data center embedding in clouds
Qi Zhang, Mohamed Faten Zhani, Maissa Jabri, Raouf Boutaba
|
Venice: Reliable virtual data center embedding in clouds
Details
|
|
Verification:
Authors have
not verified
information
|
How to identify global trends from local decisions? Event region detection on mobile networks
Andreas Loukas, Marco Zuniga, Ioannis Protonotarios, Jie Gao
|
How to identify global trends from local decisions? Event region detection on mobile networks
Details
|
|
Verification:
Authors have
not verified
information
|
Double auctions for dynamic spectrum allocation
Wei Dong, Swati Rallapalli, Lili Qiu, K. K. Ramakrishnan, Yin Zhang
|
Double auctions for dynamic spectrum allocation
Details
|
|
Verification:
Authors have
not verified
information
|
FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver
Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, Swetha Shivaramaiah
|
FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver
Details
|
|
Verification:
Authors have
not verified
information
|
Ready, Set, Go: Coalesced offloading from mobile devices to the cloud
Liyao Xiang, Shiwen Ye, Yuan Feng, Baochun Li, Bo Li
|
Ready, Set, Go: Coalesced offloading from mobile devices to the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics
Vinay Joseph, Sem C. Borst, Martin I. Reiman
|
Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics
Details
|
|
Verification:
Authors have
not verified
information
|
BlueID: A practical system for Bluetooth device identification
Jun Huang, Wahhab Albazrqaoe, Guoliang Xing
|
BlueID: A practical system for Bluetooth device identification
Details
|
|
Verification:
Authors have
not verified
information
|
Frogeye: Perception of the slightest tag motion
Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li
|
Frogeye: Perception of the slightest tag motion
Details
|
|
Verification:
Authors have
not verified
information
|
Power consumption of virtual machines with network transactions: Measurement and improvements
Ryan Shea, Haiyang Wang, Jiangchuan Liu
|
Power consumption of virtual machines with network transactions: Measurement and improvements
Details
|
|
Verification:
Authors have
not verified
information
|
Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach
Jun Huang, Guoliang Xing, Gang Zhou
|
Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach
Details
|
|
Verification:
Authors have
not verified
information
|
Online load balancing for MapReduce with skewed data input
Yanfang Le, Jiangchuan Liu, Funda Ergün, Dan Wang
|
Online load balancing for MapReduce with skewed data input
Details
|
|
Verification:
Authors have
not verified
information
|
iBeam: Intelligent client-side multi-user beamforming in wireless networks
Yongjiu Du, Ehsan Aryafar, Joseph Camp, Mung Chiang
|
iBeam: Intelligent client-side multi-user beamforming in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Towards a system theoretic approach to wireless network capacity in finite time and space
Florin Ciucu, Ramin Khalili, Yuming Jiang, Liu Yang, Yong Cui
|
Towards a system theoretic approach to wireless network capacity in finite time and space
Details
|
|
Verification:
Authors have
not verified
information
|
Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic
Guangchi Liu, Qing Yang, Honggang Wang, Xiaodong Lin, Mike P. Wittie
|
Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic
Details
|
|
Verification:
Authors have
not verified
information
|
SimCast: Efficient video delivery in MU-MIMO WLANs
Guanhua Wang, Kaishun Wu, Qian Zhang, Lionel M. Ni
|
SimCast: Efficient video delivery in MU-MIMO WLANs
Details
|
|
Verification:
Authors have
not verified
information
|
Fault tolerant barrier coverage for wireless sensor networks
Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang
|
Fault tolerant barrier coverage for wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Analysis and detection of SIMbox fraud in mobility networks
Ilona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia
|
Analysis and detection of SIMbox fraud in mobility networks
Details
|
|
Verification:
Authors have
not verified
information
|
"Wireless networks without edges": Dynamic radio resource clustering and user scheduling
Yuhuan Du, Gustavo de Veciana
|
"Wireless networks without edges": Dynamic radio resource clustering and user scheduling
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
TOC: Localizing wireless rechargeable sensors with time of charge
Yuanchao Shu, Peng Cheng, Yu Gu, Jiming Chen, Tian He
|
TOC: Localizing wireless rechargeable sensors with time of charge
Details
|
|
Verification:
Authors have
not verified
information
|
A stable fountain code mechanism for peer-to-peer content distribution
Cédric Westphal
|
A stable fountain code mechanism for peer-to-peer content distribution
Details
|
|
Verification:
Author has
not verified
information
|
Structure-aware stochastic load management in smart grids
Yu Zhang, Mihaela van der Schaar
|
Structure-aware stochastic load management in smart grids
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed opportunistic scheduling for wireless networks powered by renewable energy sources
Hang Li, Chuan Huang, Shuguang Cui, Junshan Zhang
|
Distributed opportunistic scheduling for wireless networks powered by renewable energy sources
Details
|
|
Verification:
Authors have
not verified
information
|
Geometric evaluation of survivability of disaster-affected network with probabilistic failure
Hiroshi Saito
|
Geometric evaluation of survivability of disaster-affected network with probabilistic failure
Details
|
|
Verification:
Author has
not verified
information
|
Energy efficient Wifi tethering on a smartphone
Kyoung-Hak Jung, Yuepeng Qi, Chansu Yu, Young-Joo Suh
|
Energy efficient Wifi tethering on a smartphone
Details
|
|
Verification:
Authors have
not verified
information
|
Towards performance-centric fairness in datacenter networks
Li Chen, Yuan Feng, Baochun Li, Bo Li
|
Towards performance-centric fairness in datacenter networks
Details
|
|
Verification:
Authors have
not verified
information
|
Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters
Liuhua Chen, Haiying Shen
|
Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters
Details
|
|
Verification:
Authors have
not verified
information
|
A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks
Bo Gao, Yaling Yang, Jung-Min "Jerry" Park
|
A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Robust uncoded video transmission over wireless fast fading channel
Hao Cui, Chong Luo, Chang Wen Chen, Feng Wu
|
Robust uncoded video transmission over wireless fast fading channel
Details
|
|
Verification:
Authors have
not verified
information
|
On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol
Hassan Aboubakr Omar, Weihua Zhuang, Li Li
|
On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol
Details
|
|
Verification:
Authors have
not verified
information
|
Application-level scheduling with deadline constraints
Huasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang
|
Application-level scheduling with deadline constraints
Details
|
|
Verification:
Authors have
not verified
information
|
A high-order Markov chain based scheduling algorithm for low delay in CSMA networks
Jaewook Kwak, Chul-Ho Lee, Do Young Eun
|
A high-order Markov chain based scheduling algorithm for low delay in CSMA networks
Details
|
|
Verification:
Authors have
not verified
information
|
ForeSight: Mapping vehicles in visual domain and electronic domain
Dong Li, Zhixue Lu, Tarun Bansal, Erik Schilling, Prasun Sinha
|
ForeSight: Mapping vehicles in visual domain and electronic domain
Details
|
|
Verification:
Authors have
not verified
information
|
When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds
Shengbo Chen, Yin Sun, Ulas C. Kozat, Longbo Huang, Prasun Sinha, Guanfeng Liang, Xin Liu, Ness B. Shroff
|
When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds
Details
|
|
Verification:
Authors have
not verified
information
|
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li
|
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
GHz-wide sensing and decoding using the sparse Fourier transform
Haitham Hassanieh, Lixin Shi, Omid Abari, Ezzeldin Hamed, Dina Katabi
|
GHz-wide sensing and decoding using the sparse Fourier transform
Details
|
|
Verification:
Authors have
not verified
information
|
LP-relaxation based distributed algorithms for scheduling in wireless networks
Chandramani Singh, Angelia Nedic, R. Srikant
|
LP-relaxation based distributed algorithms for scheduling in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
MIMO-based jamming resilient communication in wireless networks
Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou
|
MIMO-based jamming resilient communication in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
On the design and analysis of Data Center Network architectures for interconnecting dual-port servers
Dawei Li, Jie Wu
|
On the design and analysis of Data Center Network architectures for interconnecting dual-port servers
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal privacy-preserving energy management for smart meters
Lei Yang, Xu Chen, Junshan Zhang, H. Vincent Poor
|
Optimal privacy-preserving energy management for smart meters
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links
Yan Li, Haibo Zhang, Zhiyi Huang, Michael Albert
|
Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links
Details
|
|
Verification:
Authors have
not verified
information
|
Max-flow min-cut theorem and faster algorithms in a circular disk failure model
Yusuke Kobayashi, Kensuke Otsuki
|
Max-flow min-cut theorem and faster algorithms in a circular disk failure model
Details
|
|
Verification:
Authors have
not verified
information
|
Deep packet inspection with DFA-trees and parametrized language overapproximation
Daniel Luchaup, Lorenzo De Carli, Somesh Jha, Eric Bach
|
Deep packet inspection with DFA-trees and parametrized language overapproximation
Details
|
|
Verification:
Authors have
not verified
information
|
Low complexity multi-resource fair queueing with bounded delay
Wei Wang, Ben Liang, Baochun Li
|
Low complexity multi-resource fair queueing with bounded delay
Details
|
|
Verification:
Authors have
not verified
information
|
Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation
Wei Gong, Kebin Liu, Xin Miao, Haoxiang Liu
|
Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation
Details
|
|
Verification:
Authors have
not verified
information
|
Epidemic thresholds with external agents
Siddhartha Banerjee, Avhishek Chatterjee, Sanjay Shakkottai
|
Epidemic thresholds with external agents
Details
|
|
Verification:
Authors have
not verified
information
|
TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing
Zhenni Feng, Yanmin Zhu, Qian Zhang, Lionel M. Ni, Athanasios V. Vasilakos
|
TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing
Details
|
|
Verification:
Authors have
not verified
information
|
Near-pri: Private, proximity based location sharing
Edmund Novak, Qun Li
|
Near-pri: Private, proximity based location sharing
Details
|
|
Verification:
Authors have
not verified
information
|
Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage
Jing Zhang, Xiangke Liao, Shanshan Li, Yu Hua, Xue Liu, Bin Lin
|
Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage
Details
|
|
Verification:
Authors have
not verified
information
|
Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances
Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Gokhan Sahin, Chunming Qiao
|
Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances
Details
|
|
Verification:
Authors have
not verified
information
|
An overlay automata approach to regular expression matching
Alex X. Liu, Eric Torng
|
An overlay automata approach to regular expression matching
Details
|
|
Verification:
Authors have
not verified
information
|
Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach
Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic
|
Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach
Details
|
|
Verification:
Authors have
not verified
information
|
Towards automatic phone-to-phone communication for vehicular networking applications
Shaohan Hu, Hengchang Liu, Lu Su, Hongyan Wang, Tarek F. Abdelzaher, Pan Hui, Wei Zheng, Zhiheng Xie, John A. Stankovic
|
Towards automatic phone-to-phone communication for vehicular networking applications
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient public integrity checking for cloud data sharing with multi-user modification
Jiawei Yuan, Shucheng Yu
|
Efficient public integrity checking for cloud data sharing with multi-user modification
Details
|
|
Verification:
Authors have
not verified
information
|
LiFi: Line-Of-Sight identification with WiFi
Zimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu
|
LiFi: Line-Of-Sight identification with WiFi
Details
|
|
Verification:
Authors have
not verified
information
|
What scale of audience a campaign can reach in what price on Twitter?
Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang
|
What scale of audience a campaign can reach in what price on Twitter?
Details
|
|
Verification:
Authors have
not verified
information
|
Routing games with progressive filling
Tobias Harks, Martin Hoefer, Kevin Schewior, Alexander Skopalik
|
Routing games with progressive filling
Details
|
|
Verification:
Authors have
not verified
information
|
Achieving differential privacy of data disclosure in the smart grid
Jing Zhao, Taeho Jung, Yu Wang, Xiangyang Li
|
Achieving differential privacy of data disclosure in the smart grid
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-lateral privacy-preserving localization in pervasive environments
Tao Shu, Yingying Chen, Jie Yang, Albert Williams
|
Multi-lateral privacy-preserving localization in pervasive environments
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling in a secure wireless network
Xuan Wang, Yi Chen, Lin Cai, Jianping Pan
|
Scheduling in a secure wireless network
Details
|
|
Verification:
Authors have
not verified
information
|
Throughput-efficient channel allocation in multi-channel cognitive vehicular networks
You Han, Eylem Ekici, Haris Kremo, Onur Altintas
|
Throughput-efficient channel allocation in multi-channel cognitive vehicular networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cellular multi-coverage with non-uniform rates
Omer Gurewitz, Yakov Sandomirsky, Gabriel Scalosub
|
Cellular multi-coverage with non-uniform rates
Details
|
|
Verification:
Authors have
not verified
information
|
COLLECTOR: A secure RFID-enabled batch recall protocol
Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu
|
COLLECTOR: A secure RFID-enabled batch recall protocol
Details
|
|
Verification:
Authors have
not verified
information
|
Data-driven traffic flow analysis for vehicular communications
Yang Wang, Liusheng Huang, Tianbo Gu, Hao Wei, Kai Xing, Junshan Zhang
|
Data-driven traffic flow analysis for vehicular communications
Details
|
|
Verification:
Authors have
not verified
information
|
Scalable user selection for MU-MIMO networks
Xiufeng Xie, Xinyu Zhang
|
Scalable user selection for MU-MIMO networks
Details
|
|
Verification:
Authors have
not verified
information
|
Enabling efficient access control with dynamic policy updating for big data in the cloud
Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang
|
Enabling efficient access control with dynamic policy updating for big data in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Electronic frog eye: Counting crowd using WiFi
Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, Zhiping Jiang
|
Electronic frog eye: Counting crowd using WiFi
Details
|
|
Verification:
Authors have
not verified
information
|
Hybrid data pricing for network-assisted user-provided connectivity
Lin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas
|
Hybrid data pricing for network-assisted user-provided connectivity
Details
|
|
Verification:
Authors have
not verified
information
|
Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem
Vikram P. Munishwar, Vinay Kolar, Nael B. Abu-Ghazaleh
|
Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem
Details
|
|
Verification:
Authors have
not verified
information
|
Dominant resource fairness in cloud computing systems with heterogeneous servers
Wei Wang, Baochun Li, Ben Liang
|
Dominant resource fairness in cloud computing systems with heterogeneous servers
Details
|
|
Verification:
Authors have
not verified
information
|
Video delivery over heterogeneous cellular networks: Optimizing cost and performance
Konstantinos Poularakis, George Iosifidis, Antonios Argyriou, Leandros Tassiulas
|
Video delivery over heterogeneous cellular networks: Optimizing cost and performance
Details
|
|
Verification:
Authors have
not verified
information
|
Will cyber-insurance improve network security? A market analysis
Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui
|
Will cyber-insurance improve network security? A market analysis
Details
|
|
Verification:
Authors have
not verified
information
|
Software Defined Monitoring of application protocols
Lukas Kekely, Viktor Pus, Jan Korenek
|
Software Defined Monitoring of application protocols
Details
|
|
Verification:
Authors have
not verified
information
|
kBF: A Bloom Filter for key-value storage with an application on approximate state machines
Sisi Xiong, Yanjun Yao, Qing Cao, Tian He
|
kBF: A Bloom Filter for key-value storage with an application on approximate state machines
Details
|
|
Verification:
Authors have
not verified
information
|
DAWN: Defending against wormhole attacks in wireless network coding systems
Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak
|
DAWN: Defending against wormhole attacks in wireless network coding systems
Details
|
|
Verification:
Authors have
not verified
information
|
Utility-based cooperative decision in cooperative authentication
Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang
|
Utility-based cooperative decision in cooperative authentication
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic pricing and profit maximization for the cloud with geo-distributed data centers
Jian Zhao, Hongxing Li, Chuan Wu, Zongpeng Li, Zhizhong Zhang, Francis C. M. Lau
|
Dynamic pricing and profit maximization for the cloud with geo-distributed data centers
Details
|
|
Verification:
Authors have
not verified
information
|
Minimizing makespan and total completion time in MapReduce-like systems
Yuqing Zhu, Yiwei Jiang, Weili Wu, Ling Ding, Ankur Teredesai, Deying Li, Wonjun Lee
|
Minimizing makespan and total completion time in MapReduce-like systems
Details
|
|
Verification:
Authors have
not verified
information
|
Mining checkins from location-sharing services for client-independent IP geolocation
Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Di Zhang, Xiaoming Fu, K. K. Ramakrishnan
|
Mining checkins from location-sharing services for client-independent IP geolocation
Details
|
|
Verification:
Authors have
not verified
information
|
Automated dynamic offset applied to cell association
Majed Haddad, Habib B. A. Sidi, Piotr Wiecek, Eitan Altman
|
Automated dynamic offset applied to cell association
Details
|
|
Verification:
Authors have
not verified
information
|
Profit-maximizing incentive for participatory sensing
Tie Luo, Hwee-Pink Tan, Lirong Xia
|
Profit-maximizing incentive for participatory sensing
Details
|
|
Author Comments:
We strongly encourage the reader to refer to the journal version (ACM TIST 2016; http://dx.doi.org/10.1145/2837029) of this paper. It is much more digestible yet rigorous, and is thoroughly evaluated.
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Fluctuation analysis of debt based policies for wireless networks with hard delay constraints
Rahul Singh, I-Hong Hou, P. R. Kumar
|
Fluctuation analysis of debt based policies for wireless networks with hard delay constraints
Details
|
|
Verification:
Authors have
not verified
information
|
Keep Forwarding: Towards k-link failure resilient routing
Baohua Yang, Junda Liu, Scott Shenker, Jun Li, Kai Zheng
|
Keep Forwarding: Towards k-link failure resilient routing
Details
|
|
Verification:
Authors have
not verified
information
|
On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks
Ashikur Rahman, Nael B. Abu-Ghazaleh
|
On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic resource provisioning in cloud computing: A randomized auction approach
Linquan Zhang, Zongpeng Li, Chuan Wu
|
Dynamic resource provisioning in cloud computing: A randomized auction approach
Details
|
|
Verification:
Authors have
not verified
information
|
Delay-throughput tradeoff with correlated mobility of ad-hoc networks
Shuochao Yao, Xinbing Wang, Xiaohua Tian, Qian Zhang
|
Delay-throughput tradeoff with correlated mobility of ad-hoc networks
Details
|
|
Verification:
Authors have
not verified
information
|
Detecting malicious HTTP redirections using trees of user browsing activity
Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci
|
Detecting malicious HTTP redirections using trees of user browsing activity
Details
|
|
Verification:
Authors have
not verified
information
|
Packet classification using binary Content Addressable Memory
Alex X. Liu, Chad R. Meiners, Eric Torng
|
Packet classification using binary Content Addressable Memory
Details
|
|
Verification:
Authors have
not verified
information
|
Trade-offs in optimizing the cache deployments of CDNs
Syed Hasan, Sergey Gorinsky, Constantine Dovrolis, Ramesh K. Sitaraman
|
Trade-offs in optimizing the cache deployments of CDNs
Details
|
|
Verification:
Authors have
not verified
information
|
CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks
Tsung Ying Wu, Wanjiun Liao, Cheng-Shang Chang
|
CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Information diffusion in mobile social networks: The speed perspective
Zongqing Lu, Yonggang Wen, Guohong Cao
|
Information diffusion in mobile social networks: The speed perspective
Details
|
|
Verification:
Authors have
not verified
information
|
Beyond the MDS bound in distributed cloud storage
Jian Li, Tongtong Li, Jian Ren
|
Beyond the MDS bound in distributed cloud storage
Details
|
|
Verification:
Authors have
not verified
information
|
Open peering by Internet transit providers: Peer preference or peer pressure?
Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis
|
Open peering by Internet transit providers: Peer preference or peer pressure?
Details
|
|
Verification:
Authors have
not verified
information
|
RIAL: Resource Intensity Aware Load balancing in clouds
Liuhua Chen, Haiying Shen, Karan Sapra
|
RIAL: Resource Intensity Aware Load balancing in clouds
Details
|
|
Verification:
Authors have
not verified
information
|
Interference-aware proportional fairness for multi-rate wireless networks
Douglas M. Blough, Giovanni Resta, Paolo Santi
|
Interference-aware proportional fairness for multi-rate wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Compressive sensing over strongly connected digraph and its application in traffic monitoring
Xiao Qi, Yongcai Wang, Yuexuan Wang, Liwen Xu
|
Compressive sensing over strongly connected digraph and its application in traffic monitoring
Details
|
|
Verification:
Authors have
not verified
information
|
Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes
Liang Zhang, Weijie Wu, Dan Wang
|
Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes
Details
|
|
Verification:
Authors have
not verified
information
|
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices
Jun Shao, Rongxing Lu, Xiaodong Lin
|
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks
Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li
|
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks
Details
|
|
Verification:
Authors have
not verified
information
|
Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel quality
Wei-Cheng Kuo, Chih-Chun Wang
|
Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel quality
Details
|
|
Verification:
Authors have
not verified
information
|
Cooperative repair with minimum-storage regenerating codes for distributed storage
Jun Li, Baochun Li
|
Cooperative repair with minimum-storage regenerating codes for distributed storage
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications
Jeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra
|
Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications
Details
|
|
Verification:
Authors have
not verified
information
|
Signaling free localization of node failures in all-optical networks
János Tapolcai, Lajos Rónyai, Éva Hosszu, Pin-Han Ho, Suresh Subramaniam
|
Signaling free localization of node failures in all-optical networks
Details
|
|
Verification:
Authors have
not verified
information
|
Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach
Dong-Hoon Shin, Shibo He, Junshan Zhang
|
Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach
Details
|
|
Verification:
Authors have
not verified
information
|
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties
Xukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li
|
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient distributed query processing in large RFID-enabled supply chains
Jia Liu, Bin Xiao, Kai Bu, Lijun Chen
|
Efficient distributed query processing in large RFID-enabled supply chains
Details
|
|
Verification:
Authors have
not verified
information
|
INDAPSON: An incentive data plan sharing system based on self-organizing network
Tuo Yu, Zilong Zhou, Da Zhang, Xinbing Wang, Yunxin Liu, Songwu Lu
|
INDAPSON: An incentive data plan sharing system based on self-organizing network
Details
|
|
Verification:
Authors have
not verified
information
|
Interference coordination strategies for content update dissemination in LTE-A
Vincenzo Sciancalepore, Vincenzo Mancuso, Albert Banchs, Shmuel Zaks, Antonio Capone
|
Interference coordination strategies for content update dissemination in LTE-A
Details
|
|
Verification:
Authors have
not verified
information
|
A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves
Markus Forster, Raphaël Frank, Mario Gerla, Thomas Engel
|
A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Stochastic information management for voltage regulation in smart distribution systems
Hao Liang, Atef Abdrabou, Weihua Zhuang
|
Stochastic information management for voltage regulation in smart distribution systems
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling of multicast and unicast services under limited feedback by using rateless codes
Yin Sun, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff
|
Scheduling of multicast and unicast services under limited feedback by using rateless codes
Details
|
|
Verification:
Authors have
not verified
information
|
A college admissions game for uplink user association in wireless small cell networks
Walid Saad, Zhu Han, Rong Zheng, Mérouane Debbah, H. Vincent Poor
|
A college admissions game for uplink user association in wireless small cell networks
Details
|
|
Verification:
Authors have
not verified
information
|
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing
Cong Wang, Bingsheng Zhang, Kui Ren, Janet Meiling Wang Roveda, Chang Wen Chen, Zhen Xu
|
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing
Details
|
|
Verification:
Authors have
not verified
information
|
Spatio-temporal factorization of log data for understanding network events
Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto
|
Spatio-temporal factorization of log data for understanding network events
Details
|
|
Verification:
Authors have
not verified
information
|
Characterizing the achievable throughput in wireless networks with two active RF chains
Yang Yang, Bo Chen, Kannan Srinivasan, Ness B. Shroff
|
Characterizing the achievable throughput in wireless networks with two active RF chains
Details
|
|
Verification:
Authors have
not verified
information
|
Software defined green data center network with exclusive routing
Dan Li, Yunfei Shang, Congjie Chen
|
Software defined green data center network with exclusive routing
Details
|
|
Verification:
Authors have
not verified
information
|
MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission
Jiajue Ou, Yuanqing Zheng, Mo Li
|
MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission
Details
|
|
Verification:
Authors have
not verified
information
|
Achieving k-anonymity in privacy-aware location-based services
Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li
|
Achieving k-anonymity in privacy-aware location-based services
Details
|
|
Verification:
Authors have
not verified
information
|
Safe Charging for wireless power transfer
Haipeng Dai, Yunhuai Liu, Guihai Chen, Xiaobing Wu, Tian He
|
Safe Charging for wireless power transfer
Details
|
|
Verification:
Authors have
not verified
information
|
SBVLC: Secure barcode-based visible light communication for smartphones
Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang
|
SBVLC: Secure barcode-based visible light communication for smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Exploring bundling sale strategy in online service markets with network effects
Weijie Wu, Richard T. B. Ma, John C. S. Lui
|
Exploring bundling sale strategy in online service markets with network effects
Details
|
|
Verification:
Authors have
not verified
information
|
Secure cooperative spectrum sensing and access against intelligent malicious behaviors
Wei Wang, Lin Chen, Kang G. Shin, Lingjie Duan
|
Secure cooperative spectrum sensing and access against intelligent malicious behaviors
Details
|
|
Verification:
Authors have
not verified
information
|
A robust information source estimator with sparse observations
Kai Zhu, Lei Ying
|
A robust information source estimator with sparse observations
Details
|
|
Verification:
Authors have
not verified
information
|
"Can you SEE me now?" A measurement study of mobile video calls
Chenguang Yu, Yang Xu, Bo Liu, Yong Liu
|
"Can you SEE me now?" A measurement study of mobile video calls
Details
|
|
Verification:
Authors have
not verified
information
|
Separating wheat from chaff: Winnowing unintended prefixes using machine learning
Andra Lutu, Marcelo Bagnulo, Jesús Cid-Sueiro, Olaf Maennel
|
Separating wheat from chaff: Winnowing unintended prefixes using machine learning
Details
|
|
Verification:
Authors have
not verified
information
|
Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid
Fanxin Kong, Chuansheng Dong, Xue Liu, Haibo Zeng
|
Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid
Details
|
|
Verification:
Authors have
not verified
information
|
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese
|
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed stochastic optimization via correlated scheduling
Michael J. Neely
|
Distributed stochastic optimization via correlated scheduling
Details
|
|
Verification:
Author has
not verified
information
|
User mobility from the view of cellular data networks
Ying Zhang
|
User mobility from the view of cellular data networks
Details
|
|
Verification:
Author has
not verified
information
|
Enabling crowd-sourced mobile Internet access
George Iosifidis, Lin Gao, Jianwei Huang, Leandros Tassiulas
|
Enabling crowd-sourced mobile Internet access
Details
|
|
Verification:
Authors have
not verified
information
|
Heterogeneity-aware data regeneration in distributed storage systems
Yan Wang, Dongsheng Wei, Xunrui Yin, Xin Wang
|
Heterogeneity-aware data regeneration in distributed storage systems
Details
|
|
Verification:
Authors have
not verified
information
|
Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding
Peng Guo, Jiannong Cao, Kui Zhang, Xuefeng Liu
|
Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding
Details
|
|
Verification:
Authors have
not verified
information
|
Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP)
Mehdi Malboubi, Liyuan Wang, Chen-Nee Chuah, Puneet Sharma
|
Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP)
Details
|
|
Verification:
Authors have
not verified
information
|
R2D2: Embracing device-to-device communication in next generation cellular networks
Tarun Bansal, Karthikeyan Sundaresan, Sampath Rangarajan, Prasun Sinha
|
R2D2: Embracing device-to-device communication in next generation cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
Energy optimization through traffic aggregation in wireless networks
Wenjie Hu, Guohong Cao
|
Energy optimization through traffic aggregation in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
ProWord: An unsupervised approach to protocol feature word extraction
Zhuo Zhang, Zhibin Zhang, Patrick P. C. Lee, Yunjie Liu, Gaogang Xie
|
ProWord: An unsupervised approach to protocol feature word extraction
Details
|
|
Verification:
Authors have
not verified
information
|
PLAM: A privacy-preserving framework for local-area mobile social networks
Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao
|
PLAM: A privacy-preserving framework for local-area mobile social networks
Details
|
|
Verification:
Authors have
not verified
information
|
SAP: Similarity-aware partitioning for efficient cloud storage
Bharath Balasubramanian, Tian Lan, Mung Chiang
|
SAP: Similarity-aware partitioning for efficient cloud storage
Details
|
|
Verification:
Authors have
not verified
information
|
Power grid vulnerability to geographically correlated failures - Analysis and control implications
Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman
|
Power grid vulnerability to geographically correlated failures - Analysis and control implications
Details
|
|
Verification:
Authors have
not verified
information
|
LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams
Qun Huang, Patrick P. C. Lee
|
LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal delay bound for maximum weight scheduling policy in wireless networks
Cem Boyaci, Ye Xia
|
Optimal delay bound for maximum weight scheduling policy in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
A longitudinal analysis of Internet rate limitations
João Taveira Araújo, Raul Landa, Richard G. Clegg, George Pavlou, Kensuke Fukuda
|
A longitudinal analysis of Internet rate limitations
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Multirate multicast: Optimal algorithms and implementation
Georgios S. Paschos, Chih-Ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis
|
Multirate multicast: Optimal algorithms and implementation
Details
|
|
Verification:
Authors have
not verified
information
|
Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks
François Baccelli, Bartlomiej Blaszczyszyn, Chandramani Singh
|
Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks
Details
|
|
Verification:
Authors have
not verified
information
|
A stochastic game for privacy preserving context sensing on mobile phone
Wei Wang, Qian Zhang
|
A stochastic game for privacy preserving context sensing on mobile phone
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed backup scheduling: Modeling and optimization
Peter M. van de Ven, Bo Zhang, Angela Schörgendorfer
|
Distributed backup scheduling: Modeling and optimization
Details
|
|
Verification:
Authors have
not verified
information
|
Towards adaptive continuous scanning in large-scale RFID systems
Haoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, Wenbo He
|
Towards adaptive continuous scanning in large-scale RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
Monitor placement for maximal identifiability in network tomography
Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley
|
Monitor placement for maximal identifiability in network tomography
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed learning for utility maximization over CSMA-based wireless multihop networks
Hyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi
|
Distributed learning for utility maximization over CSMA-based wireless multihop networks
Details
|
|
Verification:
Authors have
not verified
information
|
Restorable logical topology in the face of no or partial traffic demand knowledge
Reuven Cohen, Gabi Nakibly
|
Restorable logical topology in the face of no or partial traffic demand knowledge
Details
|
|
Verification:
Authors have
not verified
information
|
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou
|
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
CityDrive: A map-generating and speed-optimizing driving system
Yiran Zhao, Yang Zhang, Tuo Yu, Tianyuan Liu, Xinbing Wang, Xiaohua Tian, Xue Liu
|
CityDrive: A map-generating and speed-optimizing driving system
Details
|
|
Verification:
Authors have
not verified
information
|
Scaling laws for secrecy capacity in cooperative wireless networks
Mahtab Mirmohseni, Panagiotis Papadimitratos
|
Scaling laws for secrecy capacity in cooperative wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Price of Anarchy in network routing with class based capacity guarantees
Ehsan Monsef, Tricha Anjali, Sanjiv Kapoor
|
Price of Anarchy in network routing with class based capacity guarantees
Details
|
|
Verification:
Authors have
not verified
information
|
Contextual localization through network traffic analysis
Aveek K. Das, Parth H. Pathak, Chen-Nee Chuah, Prasant Mohapatra
|
Contextual localization through network traffic analysis
Details
|
|
Verification:
Authors have
not verified
information
|
A mean field game approach to scheduling in cellular systems
Mayank Manjrekar, Vinod Ramaswamy, Srinivas Shakkottai
|
A mean field game approach to scheduling in cellular systems
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-efficient capacity optimization in wireless networks
Lu Liu, Xianghui Cao, Yu Cheng, Lili Du, Wei Song, Yu Wang
|
Energy-efficient capacity optimization in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
TorWard: Discovery of malicious traffic over Tor
Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu
|
TorWard: Discovery of malicious traffic over Tor
Details
|
|
Verification:
Authors have
not verified
information
|
Bloom tree: A search tree based on Bloom filters for multiple-set membership testing
MyungKeun Yoon, JinWoo Son, Seon-Ho Shin
|
Bloom tree: A search tree based on Bloom filters for multiple-set membership testing
Details
|
|
Verification:
Authors have
not verified
information
|
SoCast: Social ties based cooperative video multicast
Yang Cao, Xu Chen, Tao Jiang, Junshan Zhang
|
SoCast: Social ties based cooperative video multicast
Details
|
|
Verification:
Authors have
not verified
information
|
Bounded stretch geographic homotopic routing in sensor networks
Kan Huang, Chien-Chun Ni, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell
|
Bounded stretch geographic homotopic routing in sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses
Lei Zhang, Boyang Yu, Jianping Pan
|
GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses
Details
|
|
Verification:
Authors have
not verified
information
|
From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks
Peng-Jun Wan, Zhu Wang, Lei Wang, Zhiguo Wan, Sai Ji
|
From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Optimizing offline access to social network content on mobile devices
Ngoc Minh Do, Ye Zhao, Shu-Ting Wang, Cheng-Hsin Hsu, Nalini Venkatasubramanian
|
Optimizing offline access to social network content on mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
IP fast rerouting for multi-link failures
Theodore Elhourani, Abishek Gopalan, Srinivasan Ramasubramanian
|
IP fast rerouting for multi-link failures
Details
|
|
Verification:
Authors have
not verified
information
|
Rippler: Delay injection for service dependency detection
Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel
|
Rippler: Delay injection for service dependency detection
Details
|
|
Verification:
Authors have
not verified
information
|
Secure cloud storage meets with secure network coding
Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow
|
Secure cloud storage meets with secure network coding
Details
|
|
Verification:
Authors have
not verified
information
|
Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective
Marco Chiesa, Guy Kindler, Michael Schapira
|
Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective
Details
|
|
Verification:
Authors have
not verified
information
|
Practical DCB for improved data center networks
Brent Stephens, Alan L. Cox, Ankit Singla, John B. Carter, Colin Dixon, Wes Felter
|
Practical DCB for improved data center networks
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint
Dong Zhao, Xiang-Yang Li, Huadong Ma
|
How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint
Details
|
|
Verification:
Authors have
not verified
information
|
Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying
Liyang Zhang, Zhangyu Guan, Tommaso Melodia
|
Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying
Details
|
|
Verification:
Authors have
not verified
information
|
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks
Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, Wenjing Lou
|
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks
Details
|
|
Verification:
Authors have
not verified
information
|
ShopProfiler: Profiling shops with crowdsourcing data
Xiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu, Siyuan Liu, Lionel M. Ni
|
ShopProfiler: Profiling shops with crowdsourcing data
Details
|
|
Verification:
Authors have
not verified
information
|
New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants
Haiying Shen, Zhuozhao Li
|
New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants
Details
|
|
Verification:
Authors have
not verified
information
|
Loss differentiation: Moving onto high-speed wireless LANs
Ruwaifa Anwar, Kamran Nishat, Mohsin Ali, Zahaib Akhtar, Haseeb Niaz, Ihsan Ayyub Qazi
|
Loss differentiation: Moving onto high-speed wireless LANs
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes
Hongxing Li, Nitin Vaidya
|
Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes
Details
|
|
Verification:
Authors have
not verified
information
|
Probability distribution of spectral hole duration in cognitive networks
Jelena V. Misic, Vojislav B. Misic
|
Probability distribution of spectral hole duration in cognitive networks
Details
|
|
Verification:
Authors have
not verified
information
|
A new efficient physical layer OFDM encryption scheme
Fei Huo, Guang Gong
|
A new efficient physical layer OFDM encryption scheme
Details
|
|
Verification:
Authors have
not verified
information
|
Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle
Stefano Basagni, Ladislau Bölöni, Petrika Gjanci, Chiara Petrioli, Cynthia A. Phillips, Danila Turgut
|
Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle
Details
|
|
Verification:
Authors have
not verified
information
|
Joint power optimization of data center network and servers with correlation analysis
Kuangyu Zheng, Xiaodong Wang, Li Li, Xiaorui Wang
|
Joint power optimization of data center network and servers with correlation analysis
Details
|
|
Verification:
Authors have
not verified
information
|
On the catalyzing effect of randomness on the per-flow throughput in wireless networks
Florin Ciucu, Jens B. Schmitt
|
On the catalyzing effect of randomness on the per-flow throughput in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Improved structures for data collection in wireless sensor networks
Jon Crowcroft, Michael Segal, Liron Levin
|
Improved structures for data collection in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Hello: A generic flexible protocol for neighbor discovery
Wei Sun, Zheng Yang, Keyu Wang, Yunhao Liu
|
Hello: A generic flexible protocol for neighbor discovery
Details
|
|
Verification:
Authors have
not verified
information
|
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
Pengfei Hu, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu
|
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Toward optimal allocation of location dependent tasks in crowdsensing
Shibo He, Dong-Hoon Shin, Junshan Zhang, Jiming Chen
|
Toward optimal allocation of location dependent tasks in crowdsensing
Details
|
|
Verification:
Authors have
not verified
information
|
3D surface localization with terrain model
Yang Yang, Miao Jin, Hongyi Wu
|
3D surface localization with terrain model
Details
|
|
Verification:
Authors have
not verified
information
|
Modeling social network relationships via t-cherry junction trees
Brian Proulx, Junshan Zhang
|
Modeling social network relationships via t-cherry junction trees
Details
|
|
Verification:
Authors have
not verified
information
|
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones
Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu
|
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Greenbench: A benchmark for observing power grid vulnerability under data-centric threats
Mingkui Wei, Wenye Wang
|
Greenbench: A benchmark for observing power grid vulnerability under data-centric threats
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-objective data placement for multi-cloud socially aware services
Lei Jiao, Jun Li, Wei Du, Xiaoming Fu
|
Multi-objective data placement for multi-cloud socially aware services
Details
|
|
Verification:
Authors have
not verified
information
|
EasyBid: Enabling cellular offloading via small players
Zhixue Lu, Prasun Sinha, R. Srikant
|
EasyBid: Enabling cellular offloading via small players
Details
|
|
Verification:
Authors have
not verified
information
|
TideWatch: Fingerprinting the cyclicality of big data workloads
Dan Williams, Shuai Zheng, Xiangliang Zhang, Hani Jamjoom
|
TideWatch: Fingerprinting the cyclicality of big data workloads
Details
|
|
Verification:
Authors have
not verified
information
|
A Parallel Identification Protocol for RFID systems
Linghe Kong, Liang He, Yu Gu, Min-You Wu, Tian He
|
A Parallel Identification Protocol for RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
LBSNSim: Analyzing and modeling location-based social networks
Wei Wei, Xiaojun Zhu, Qun Li
|
LBSNSim: Analyzing and modeling location-based social networks
Details
|
|
Verification:
Authors have
not verified
information
|
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering
Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao
|
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering
Details
|
|
Verification:
Authors have
not verified
information
|
Let's stay together: Towards traffic aware virtual machine placement in data centers
Xin Li, Jie Wu, Shaojie Tang, Sanglu Lu
|
Let's stay together: Towards traffic aware virtual machine placement in data centers
Details
|
|
Verification:
Authors have
not verified
information
|
On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks
Ulas C. Kozat, Guanfeng Liang, Koray Kokten
|
On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks
Details
|
|
Verification:
Authors have
not verified
information
|
Is it worth to be patient? Analysis and optimization of delayed mobile data offloading
Fidan Mehmeti, Thrasyvoulos Spyropoulos
|
Is it worth to be patient? Analysis and optimization of delayed mobile data offloading
Details
|
|
Verification:
Authors have
not verified
information
|
A unified approach to the performance analysis of caching systems
Valentina Martina, Michele Garetto, Emilio Leonardi
|
A unified approach to the performance analysis of caching systems
Details
|
|
Author Comments:
Sharing:
Other
Verification:
Authors have
verified
information
|
Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints
Vinay Setty, Gunnar Kreitz, Guido Urdaneta, Roman Vitenberg, Maarten van Steen
|
Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints
Details
|
|
Verification:
Authors have
not verified
information
|
PS-TRUST: Provably secure solution for truthful double spectrum auctions
Zhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang
|
PS-TRUST: Provably secure solution for truthful double spectrum auctions
Details
|
|
Verification:
Authors have
not verified
information
|
WiSlow: A Wi-Fi network performance troubleshooting tool for end users
Kyung-Hwa Kim, Hyunwoo Nam, Henning Schulzrinne
|
WiSlow: A Wi-Fi network performance troubleshooting tool for end users
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-efficient cooperative broadcast in fading wireless networks
Chenxi Qiu, Haiying Shen, Lei Yu
|
Energy-efficient cooperative broadcast in fading wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Microeconomic analysis of base-station sharing in green cellular networks
Bingjie Leng, Parisa Mansourifard, Bhaskar Krishnamachari
|
Microeconomic analysis of base-station sharing in green cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-dimensional OFDMA scheduling in a wireless network with relay nodes
Reuven Cohen, Guy Grebla
|
Multi-dimensional OFDMA scheduling in a wireless network with relay nodes
Details
|
|
Verification:
Authors have
not verified
information
|
SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments
Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, Minglu Li
|
SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments
Details
|
|
Verification:
Authors have
not verified
information
|
Joint static and dynamic traffic scheduling in data center networks
Zizhong Cao, Murali S. Kodialam, T. V. Lakshman
|
Joint static and dynamic traffic scheduling in data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems
Hanif Rahbari, Marwan Krunz, Loukas Lazos
|
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems
Details
|
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Structured spectrum allocation and user association in heterogeneous cellular networks
Wei Bao, Ben Liang
|
Structured spectrum allocation and user association in heterogeneous cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks
Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, Junshan Zhang
|
SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Approximate multiple count in Wireless Sensor Networks
Xiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li
|
Approximate multiple count in Wireless Sensor Networks
Details
|
|
Verification:
Authors have
not verified
information
|
Learning in hide-and-seek
Qingsi Wang, Mingyan Liu
|
Learning in hide-and-seek
Details
|
|
Verification:
Authors have
not verified
information
|
A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks
Xingya Liu, Jiang Xie
|
A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks
Details
|
|
Verification:
Authors have
not verified
information
|
Achieving privacy preservation in WiFi fingerprint-based localization
Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng
|
Achieving privacy preservation in WiFi fingerprint-based localization
Details
|
|
Verification:
Authors have
not verified
information
|
An approximation algorithm for client assignment in client/server systems
Yuqing Zhu, Weili Wu, James Willson, Ling Ding, Lidong Wu, Deying Li, Wonjun Lee
|
An approximation algorithm for client assignment in client/server systems
Details
|
|
Verification:
Authors have
not verified
information
|
A general framework of hybrid graph sampling for complex network analysis
Xin Xu, Chul-Ho Lee, Do Young Eun
|
A general framework of hybrid graph sampling for complex network analysis
Details
|
|
Verification:
Authors have
not verified
information
|
Provable per-link delay-optimal CSMA for general wireless network topology
Dongmyung Lee, Donggyu Yun, Jinwoo Shin, Yung Yi, Se-Young Yun
|
Provable per-link delay-optimal CSMA for general wireless network topology
Details
|
|
Verification:
Authors have
not verified
information
|
Multiple heterogeneous data ferry trajectory planning in wireless sensor networks
Lirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang, Alade O. Tokuta
|
Multiple heterogeneous data ferry trajectory planning in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions
Tarun Bansal, Bo Chen, Prasun Sinha
|
FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems
Jian-Jhih Kuo, Hsiu-Hsien Yang, Ming-Jer Tsai
|
Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal collaborative access point association in wireless networks
Ouldooz Baghban Karimi, Jiangchuan Liu, Jennifer Rexford
|
Optimal collaborative access point association in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Sojourn time approximations in a multi-class time-sharing server
Ane Izagirre, Urtzi Ayesta, Ina Maria Verloop
|
Sojourn time approximations in a multi-class time-sharing server
Details
|
|
Verification:
Authors have
not verified
information
|
Classifying call profiles in large-scale mobile traffic datasets
Diala Naboulsi, Razvan Stanica, Marco Fiore
|
Classifying call profiles in large-scale mobile traffic datasets
Details
|
|
Verification:
Authors have
not verified
information
|
Anchor-free backscatter positioning for RFID tags with high accuracy
Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu
|
Anchor-free backscatter positioning for RFID tags with high accuracy
Details
|
|
Verification:
Authors have
not verified
information
|
Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users
Riheng Jia, Jinbei Zhang, Xinbing Wang, Xiaohua Tian, Qian Zhang
|
Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users
Details
|
|
Verification:
Authors have
not verified
information
|
Restricted coverage in wireless networks
XiaoHua Xu, Min Song
|
Restricted coverage in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
A deep investigation into network performance in virtual machine based cloud environments
Ryan Shea, Feng Wang, Haiyang Wang, Jiangchuan Liu
|
A deep investigation into network performance in virtual machine based cloud environments
Details
|
|
Verification:
Authors have
not verified
information
|
Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing
Tongjie Zhang, Zongpeng Li, Reihaneh Safavi-Naini
|
Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing
Details
|
|
Verification:
Authors have
not verified
information
|
Delay guaranteed live migration of Virtual Machines
Jiao Zhang, Fengyuan Ren, Chuang Lin
|
Delay guaranteed live migration of Virtual Machines
Details
|
|
Verification:
Authors have
not verified
information
|
Towards zero-time wakeup of line cards in power-aware routers
Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Bin Liu
|
Towards zero-time wakeup of line cards in power-aware routers
Details
|
|
Verification:
Authors have
not verified
information
|
On the geographic patterns of a large-scale mobile video-on-demand system
Zhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Mohamed Ali Kâafar, Kavé Salamatian
|
On the geographic patterns of a large-scale mobile video-on-demand system
Details
|
|
Verification:
Authors have
not verified
information
|
NOVA: QoE-driven optimization of DASH-based video delivery in networks
Vinay Joseph, Gustavo de Veciana
|
NOVA: QoE-driven optimization of DASH-based video delivery in networks
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal Rate Sampling in 802.11 systems
Richard Combes, Alexandre Proutière, Donggyu Yun, Jungseul Ok, Yung Yi
|
Optimal Rate Sampling in 802.11 systems
Details
|
|
Verification:
Authors have
not verified
information
|
Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks
Jiliang Wang, Zhichao Cao, XuFei Mao, Yunhao Liu
|
Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics
Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng
|
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics
Details
|
|
Verification:
Authors have
not verified
information
|
Fast resource scheduling in HetNets with D2D support
Francesco Malandrino, Claudio Casetti, Carla-Fabiana Chiasserini, Zana Limani
|
Fast resource scheduling in HetNets with D2D support
Details
|
|
Verification:
Authors have
not verified
information
|
Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks
Liang He, Peng Cheng, Yu Gu, Jianping Pan, Ting Zhu, Cong Liu
|
Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Twins: Device-free object tracking using passive tags
Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang
|
Twins: Device-free object tracking using passive tags
Details
|
|
Verification:
Authors have
not verified
information
|
Online allocation of virtual machines in a distributed cloud
Fang Hao, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee
|
Online allocation of virtual machines in a distributed cloud
Details
|
|
Verification:
Authors have
not verified
information
|
QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying
Siddhartha Brahma, Melissa Duarte, Ayan Sengupta, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi
|
QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying
Details
|
|
Verification:
Authors have
not verified
information
|
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Christos Tsilopoulos, George Xylomenos, Yannis Thomas
|
Reducing forwarding state in content-centric networks with semi-stateless forwarding
Details
|
|
Verification:
Authors have
not verified
information
|
Rendezvous for heterogeneous spectrum-agile devices
Shan-Hung Wu, Ching-Chan Wu, Wing-Kai Hon, Kang G. Shin
|
Rendezvous for heterogeneous spectrum-agile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal Combined Heat and Power system scheduling in smart grid
Kan Zhou, Jianping Pan, Lin Cai
|
Optimal Combined Heat and Power system scheduling in smart grid
Details
|
|
Verification:
Authors have
not verified
information
|
Scalable Pending Interest Table design: From principles to practice
Haowei Yuan, Patrick Crowley
|
Scalable Pending Interest Table design: From principles to practice
Details
|
|
Verification:
Authors have
not verified
information
|
TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes
Guanfeng Liang, Ulas C. Kozat
|
TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes
Details
|
|
Verification:
Authors have
not verified
information
|
Spectrum-aware data replication in intermittently connected cognitive radio networks
Jing Zhao, Guohong Cao
|
Spectrum-aware data replication in intermittently connected cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction
Peng Lin, Xiaojun Feng, Qian Zhang
|
Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction
Details
|
|
Verification:
Authors have
not verified
information
|
Toward profit-seeking virtual network embedding algorithm via global resource capacity
Long Gong, Yonggang Wen, Zuqing Zhu, Tony Lee
|
Toward profit-seeking virtual network embedding algorithm via global resource capacity
Details
|
|
Verification:
Authors have
not verified
information
|
Fast and simple approximation algorithms for maximum weighted independent set of links
Peng-Jun Wan, Xiaohua Jia, Guojun Dai, Hongwei Du, Ophir Frieder
|
Fast and simple approximation algorithms for maximum weighted independent set of links
Details
|
|
Verification:
Authors have
not verified
information
|
Pandaka: A lightweight cipher for RFID systems
Min Chen, Shigang Chen, Qingjun Xiao
|
Pandaka: A lightweight cipher for RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
Markov chain fingerprinting to classify encrypted traffic
Maciej Korczynski, Andrzej Duda
|
Markov chain fingerprinting to classify encrypted traffic
Details
|
|
Verification:
Authors have
not verified
information
|
3D pipeline contention: Asymmetric full duplex in wireless networks
Shaohe Lv, Xuan Dong, Yong Lu, Xiaoli Du, Xiaodong Wang, Yong Dou, Xingming Zhou
|
3D pipeline contention: Asymmetric full duplex in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
REIN: A fast event matching approach for content-based publish/subscribe systems
Shiyou Qian, Jian Cao, Yanmin Zhu, Minglu Li
|
REIN: A fast event matching approach for content-based publish/subscribe systems
Details
|
|
Verification:
Authors have
not verified
information
|
Meeting service level agreement cost-effectively for video-on-demand applications in the cloud
Yuhong Zhao, Hong Jiang, Ke Zhou, Zhijie Huang, Ping Huang
|
Meeting service level agreement cost-effectively for video-on-demand applications in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Montage: Combine frames with movement continuity for realtime multi-user tracking
Lan Zhang, Kebin Liu, Yonghang Jiang, Xiang-Yang Li, Yunhao Liu, Panlong Yang
|
Montage: Combine frames with movement continuity for realtime multi-user tracking
Details
|
|
Verification:
Authors have
not verified
information
|
TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks
Xiaofei Wang, Min Chen, Zhu Han, Dapeng Oliver Wu, Ted Taekyoung Kwon
|
TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks
Details
|
|
Verification:
Authors have
not verified
information
|
PROMISE: A framework for truthful and profit maximizing spectrum double auctions
Dejun Yang, Xiang Zhang, Guoliang Xue
|
PROMISE: A framework for truthful and profit maximizing spectrum double auctions
Details
|
|
Verification:
Authors have
not verified
information
|
Forwarding redundancy in opportunistic mobile networks: Investigation and elimination
Wei Gao, Qinghua Li, Guohong Cao
|
Forwarding redundancy in opportunistic mobile networks: Investigation and elimination
Details
|
|
Verification:
Authors have
not verified
information
|
Privacy-preserving high-quality map generation with participatory sensing
Xi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, Yunhao Liu
|
Privacy-preserving high-quality map generation with participatory sensing
Details
|
|
Verification:
Authors have
not verified
information
|
Safe routing reconfigurations with route redistribution
Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure
|
Safe routing reconfigurations with route redistribution
Details
|
|
Verification:
Authors have
not verified
information
|
A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring
Xuefeng Liu, Jiannong Cao, Shaojie Tang, Peng Guo
|
A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring
Details
|
|
Verification:
Authors have
not verified
information
|
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Zhuo Lu, Wenye Wang, Cliff Wang
|
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Details
|
|
Verification:
Authors have
not verified
information
|
Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms
Robert Margolies, Ashwin Sridharan, Vaneet Aggarwal, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan, Gil Zussman
|
Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms
Details
|
|
Verification:
Authors have
not verified
information
|
On the effect of forwarding table size on SDN network utilization
Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz
|
On the effect of forwarding table size on SDN network utilization
Details
|
|
Verification:
Authors have
not verified
information
|
DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information
Kang Chen, Haiying Shen
|
DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information
Details
|
|
Verification:
Authors have
not verified
information
|
Read bulk data from computational RFIDs
Yuanqing Zheng, Mo Li
|
Read bulk data from computational RFIDs
Details
|
|
Verification:
Authors have
not verified
information
|
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments
Yi Yuan, Dan Wang, Jiangchuan Liu
|
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments
Details
|
|
Verification:
Authors have
not verified
information
|
Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks
Reza Banirazi, Edmond A. Jonckheere, Bhaskar Krishnamachari
|
Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Connected wireless camera network deployment with visibility coverage
Hua Huang, Chien-Chun Ni, Xiaomeng Ban, Jie Gao, Andrew T. Schneider, Shan Lin
|
Connected wireless camera network deployment with visibility coverage
Details
|
|
Verification:
Authors have
not verified
information
|
Performance evaluation and asymptotics for Content Delivery Networks
Virag Shah, Gustavo de Veciana
|
Performance evaluation and asymptotics for Content Delivery Networks
Details
|
|
Verification:
Authors have
not verified
information
|
EV-sounding: A visual assisted electronic channel sounding system
Gang Li, Jin Teng, Fan Yang, Adam C. Champion, Dong Xuan, Hong Luan, Yuan F. Zheng
|
EV-sounding: A visual assisted electronic channel sounding system
Details
|
|
Verification:
Authors have
not verified
information
|
HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing
Yang Peng, Kai Chen, Guohui Wang, Wei Bai, Zhiqiang Ma, Lin Gu
|
HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing
Details
|
|
Verification:
Authors have
not verified
information
|
Scalable forwarding tables for supporting flexible policies in enterprise networks
Shu Yang, Mingwei Xu, Dan Wang, Gautier Bayzelon, Jianping Wu
|
Scalable forwarding tables for supporting flexible policies in enterprise networks
Details
|
|
Verification:
Authors have
not verified
information
|
Towards a statistical network calculus - Dealing with uncertainty in arrivals
Michael A. Beck, Sebastian A. Henningsen, Simon B. Birnbach, Jens B. Schmitt
|
Towards a statistical network calculus - Dealing with uncertainty in arrivals
Details
|
|
Verification:
Authors have
not verified
information
|
Does full-duplex double the capacity of wireless networks?
Xiufeng Xie, Xinyu Zhang
|
Does full-duplex double the capacity of wireless networks?
Details
|
|
Verification:
Authors have
not verified
information
|
On efficient bandwidth allocation for traffic variability in datacenters
Jian Guo, Fangming Liu, Xiaomeng Huang, John C. S. Lui, Mi Hu, Qiao Gao, Hai Jin
|
On efficient bandwidth allocation for traffic variability in datacenters
Details
|
|
Verification:
Authors have
not verified
information
|
A social group utility maximization framework with applications in database assisted spectrum access
Xu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang
|
A social group utility maximization framework with applications in database assisted spectrum access
Details
|
|
Verification:
Authors have
not verified
information
|
Neptune: Efficient remote communication services for cloud backups
Yu Hua, Xue Liu, Dan Feng
|
Neptune: Efficient remote communication services for cloud backups
Details
|
|
Verification:
Authors have
not verified
information
|
WiFall: Device-free fall detection by wireless networks
Chunmei Han, Kaishun Wu, Yuxi Wang, Lionel M. Ni
|
WiFall: Device-free fall detection by wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Fair energy-efficient sensing task allocation in participatory sensing with smartphones
Qingwen Zhao, Yanmin Zhu, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li
|
Fair energy-efficient sensing task allocation in participatory sensing with smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines
Shizhen Zhao, Xiaojun Lin
|
Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic content allocation for cloud-assisted service of periodic workloads
György Dán, Niklas Carlsson
|
Dynamic content allocation for cloud-assisted service of periodic workloads
Details
|
|
Verification:
Authors have
not verified
information
|
RollCaller: User-friendly indoor navigation system using human-item spatial relation
Yi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu
|
RollCaller: User-friendly indoor navigation system using human-item spatial relation
Details
|
|
Verification:
Authors have
not verified
information
|
Preserving secondary users' privacy in cognitive radio networks
Zhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov
|
Preserving secondary users' privacy in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
RepFlow: Minimizing flow completion times with replicated flows in data centers
Hong Xu, Baochun Li
|
RepFlow: Minimizing flow completion times with replicated flows in data centers
Details
|
|
Verification:
Authors have
not verified
information
|
Physical layer challenge-response authentication in wireless networks with relay
Xianru Du, Dan Shan, Kai Zeng, Lauren M. Huie
|
Physical layer challenge-response authentication in wireless networks with relay
Details
|
|
Verification:
Authors have
not verified
information
|
Online algorithms for uploading deferrable big data to the cloud
Linquan Zhang, Zongpeng Li, Chuan Wu, Minghua Chen
|
Online algorithms for uploading deferrable big data to the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling
Florin Ciucu, Felix Poloczek, Jens B. Schmitt
|
Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling
Details
|
|
Verification:
Authors have
not verified
information
|
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system
Marco Valerio Barbera, Sokol Kosta, Alessandro Mei, Vasile Claudiu Perta, Julinda Stefa
|
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling jobs with dwindling resource requirements in clouds
Sivan Albagli-Kim, Hadas Shachnai, Tami Tamir
|
Scheduling jobs with dwindling resource requirements in clouds
Details
|
|
Verification:
Authors have
not verified
information
|
Cell planning for heterogeneous networks: An approximation algorithm
Wentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu
|
Cell planning for heterogeneous networks: An approximation algorithm
Details
|
|
Verification:
Authors have
not verified
information
|
Hitchhike: Riding control on preambles
Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu
|
Hitchhike: Riding control on preambles
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-Terabyte and multi-Gbps information centric routers
Giuseppe Rossini, Dario Rossi, Michele Garetto, Emilio Leonardi
|
Multi-Terabyte and multi-Gbps information centric routers
Details
|
|
Author Comments:
Sharing:
Other
Verification:
Authors have
verified
information
|
Delay-constrained caching in cognitive radio networks
Jing Zhao, Wei Gao, Yi Wang, Guohong Cao
|
Delay-constrained caching in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed data storage systems with opportunistic repair
Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, Yih-Farn Robin Chen
|
Distributed data storage systems with opportunistic repair
Details
|
|
Verification:
Authors have
not verified
information
|
Suave: Swarm underwater autonomous vehicle localization
Jun Liu, Zhaohui Wang, Zheng Peng, Jun-Hong Cui, Lance Fiondella
|
Suave: Swarm underwater autonomous vehicle localization
Details
|
|
Verification:
Authors have
not verified
information
|
Relax, but Do Not Sleep: A new perspective on Green Wireless Networking
Chenfei Gao, Weiyi Zhang, Jian Tang, Chonggang Wang, Shihong Zou, Sen Su
|
Relax, but Do Not Sleep: A new perspective on Green Wireless Networking
Details
|
|
Verification:
Authors have
not verified
information
|
Sonar inside your body: Prototyping ultrasonic intra-body sensor networks
Giuseppe Enrico Santagati, Tommaso Melodia
|
Sonar inside your body: Prototyping ultrasonic intra-body sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cross-layer path management in multi-path transport protocol for mobile devices
Yeon-sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley, Kang-Won Lee
|
Cross-layer path management in multi-path transport protocol for mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Can mobile cloudlets support mobile applications?
Yujin Li, Wenye Wang
|
Can mobile cloudlets support mobile applications?
Details
|
|
Verification:
Authors have
not verified
information
|
Reliable video multicast over Wi-Fi networks with coordinated multiple APs
Munhwan Choi, Weiping Sun, Jonghoe Koo, Sunghyun Choi, Kang G. Shin
|
Reliable video multicast over Wi-Fi networks with coordinated multiple APs
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Transductive malware label propagation: Find your lineage from your neighbors
Deguang Kong, Guanhua Yan
|
Transductive malware label propagation: Find your lineage from your neighbors
Details
|
|
Verification:
Authors have
not verified
information
|
A reduction-based approach towards scaling up formal analysis of internet configurations
Anduo Wang, Alexander J. T. Gurney, Xianglong Han, Jinyan Cao, Boon Thau Loo, Carolyn L. Talcott, Andre Scedrov
|
A reduction-based approach towards scaling up formal analysis of internet configurations
Details
|
|
Verification:
Authors have
not verified
information
|
Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming
Zhi Wang, Lifeng Sun, Chuan Wu, Wenwu Zhu, Shiqiang Yang
|
Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming
Details
|
|
Verification:
Authors have
not verified
information
|