Truthful online double auctions for dynamic mobile crowdsourcing
Yueming Wei, Yanmin Zhu, Hongzi Zhu, Qian Zhang, Guangtao Xue
|
Truthful online double auctions for dynamic mobile crowdsourcing
Details
|
|
Verification:
Authors have
not verified
information
|
Steering with eyes closed: Mm-Wave beam steering without in-band measurement
Thomas Nitsche, Adriana B. Flores, Edward W. Knightly, Joerg Widmer
|
Steering with eyes closed: Mm-Wave beam steering without in-band measurement
Details
|
|
Verification:
Authors have
not verified
information
|
When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response
Zhi Zhou, Fangming Liu, Zongpeng Li, Hai Jin
|
When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal secondary user packet size in mobile cognitive radio networks under fading channels
Yi Song
|
Optimal secondary user packet size in mobile cognitive radio networks under fading channels
Details
|
|
Verification:
Author has
not verified
information
|
Efficient secure outsourcing of large-scale linear systems of equations
Sergio Salinas, Changqing Luo, Xuhui Chen, Pan Li
|
Efficient secure outsourcing of large-scale linear systems of equations
Details
|
|
Verification:
Authors have
not verified
information
|
A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioning
Xiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau
|
A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioning
Details
|
|
Verification:
Authors have
not verified
information
|
Adversary-aware IP address randomization for proactive agility against sophisticated attackers
Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan
|
Adversary-aware IP address randomization for proactive agility against sophisticated attackers
Details
|
|
Verification:
Authors have
not verified
information
|
Detecting distributed signature-based intrusion: The case of multi-path routing attacks
Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo
|
Detecting distributed signature-based intrusion: The case of multi-path routing attacks
Details
|
|
Verification:
Authors have
not verified
information
|
Forming external behaviors by leveraging internal opinions
AmirMahdi Ahmadinejad, Sina Dehghani, MohammadTaghi Hajiaghayi, Hamid Mahini, Saeed Seddighin, Sadra Yazdanbod
|
Forming external behaviors by leveraging internal opinions
Details
|
|
Verification:
Authors have
not verified
information
|
Improving learning and adaptation in security games by exploiting information asymmetry
Xiaofan He, Huaiyu Dai, Peng Ning
|
Improving learning and adaptation in security games by exploiting information asymmetry
Details
|
|
Verification:
Authors have
not verified
information
|
Cracking network monitoring in DCNs with SDN
Zhiming Hu, Jun Luo
|
Cracking network monitoring in DCNs with SDN
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading
Ozlem Bilgir Yetim, Margaret Martonosi
|
Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading
Details
|
|
Verification:
Authors have
not verified
information
|
Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems
Dora Spenza, Michele Magno, Stefano Basagni, Luca Benini, Mario Paoli, Chiara Petrioli
|
Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems
Details
|
|
Verification:
Authors have
not verified
information
|
On the progressive spread over strategic diffusion: Asymptotic and computation
Jungseul Ok, Jinwoo Shin, Yung Yi
|
On the progressive spread over strategic diffusion: Asymptotic and computation
Details
|
|
Verification:
Authors have
not verified
information
|
Low-complexity multi-resource packet scheduling for network function virtualization
Xin Li, Chen Qian
|
Low-complexity multi-resource packet scheduling for network function virtualization
Details
|
|
Verification:
Authors have
not verified
information
|
Priority queueing with multiple packet characteristics
Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan
|
Priority queueing with multiple packet characteristics
Details
|
|
Verification:
Authors have
not verified
information
|
Robust geometric forest routing with tunable load balancing
Rein Houthooft, Sahel Sahhaf, Wouter Tavernier, Filip De Turck, Didier Colle, Mario Pickavet
|
Robust geometric forest routing with tunable load balancing
Details
|
|
Verification:
Authors have
not verified
information
|
Latency-aware rate adaptation in 802.11n home networks
Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra
|
Latency-aware rate adaptation in 802.11n home networks
Details
|
|
Verification:
Authors have
not verified
information
|
A new paradigm for multiflow in wireless networks: Theory and applications
Peng-Jun Wan, Boliu Xu, Lei Wang, Sai Ji, Ophir Frieder
|
A new paradigm for multiflow in wireless networks: Theory and applications
Details
|
|
Verification:
Authors have
not verified
information
|
Human object estimation via backscattered radio frequency signal
Han Ding, Jinsong Han, Alex X. Liu, Jizhong Zhao, Panlong Yang, Wei Xi, Zhiping Jiang
|
Human object estimation via backscattered radio frequency signal
Details
|
|
Verification:
Authors have
not verified
information
|
Enabling TDMA for today's wireless LANs
Zhice Yang, Jiansong Zhang, Kun Tan, Qian Zhang, Yongguang Zhang
|
Enabling TDMA for today's wireless LANs
Details
|
|
Verification:
Authors have
not verified
information
|
De-anonymizing scale-free social networks by percolation graph matching
Carla-Fabiana Chiasserini, Michele Garetto, Emilio Leonardi
|
De-anonymizing scale-free social networks by percolation graph matching
Details
|
|
Verification:
Authors have
not verified
information
|
An online procurement auction for power demand response in storage-assisted smart grids
Ruiting Zhou, Zongpeng Li, Chuan Wu
|
An online procurement auction for power demand response in storage-assisted smart grids
Details
|
|
Verification:
Authors have
not verified
information
|
Game-theory-based batch identification of invalid signatures in wireless mobile networks
Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du
|
Game-theory-based batch identification of invalid signatures in wireless mobile networks
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed algorithms for content allocation in interconnected content distribution networks
Valentino Pacifici, György Dán
|
Distributed algorithms for content allocation in interconnected content distribution networks
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Capacity analysis of hybrid wireless networks with long-range social contacts behavior
Ronghui Hou, Yu Cheng, Jiandong Li, Min Sheng, King-Shan Lui
|
Capacity analysis of hybrid wireless networks with long-range social contacts behavior
Details
|
|
Verification:
Authors have
not verified
information
|
Information sharing in distributed stochastic bandits
Swapna Buccapatnam, Jian Tan, Li Zhang
|
Information sharing in distributed stochastic bandits
Details
|
|
Verification:
Authors have
not verified
information
|
High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility
Zongjian He, Jiannong Cao, Xuefeng Liu
|
High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility
Details
|
|
Verification:
Authors have
not verified
information
|
Outsourcing coordination and management of home wireless access points through an open API
Ashish Patro, Suman Banerjee
|
Outsourcing coordination and management of home wireless access points through an open API
Details
|
|
Verification:
Authors have
not verified
information
|
Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network
Zhao Zhang, Yishuo Shi
|
Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network
Details
|
|
Verification:
Authors have
not verified
information
|
The (surprising) computational power of the SDN data plane
Calvin Newport, Wenchao Zhou
|
The (surprising) computational power of the SDN data plane
Details
|
|
Verification:
Authors have
not verified
information
|
Noise-tolerant localization from incomplete range measurements for wireless sensor networks
Fu Xiao, Chaoheng Sha, Lei Chen, Lijuan Sun, Ruchuan Wang
|
Noise-tolerant localization from incomplete range measurements for wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform
Pengfei Zhang, Xi Li, Rui Chu, Huaimin Wang
|
HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform
Details
|
|
Verification:
Authors have
not verified
information
|
Can web pages be classified using anonymized TCP/IP headers?
Sean Sanders, Jasleen Kaur
|
Can web pages be classified using anonymized TCP/IP headers?
Details
|
|
Verification:
Authors have
not verified
information
|
Video acuity assessment in mobile devices
Eilwoo Baik, Amit Pande, Chris Stover, Prasant Mohapatra
|
Video acuity assessment in mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Characterizing home wireless performance: The gateway view
Ioannis Pefkianakis, Henrik Lundgren, Augustin Soule, Jaideep Chandrashekar, Pascal Le Guyadec, Christophe Diot, Martin May, Karel Van Doorselaer, Koen Van Oost
|
Characterizing home wireless performance: The gateway view
Details
|
|
Verification:
Authors have
not verified
information
|
Congestion-aware single link failure recovery in hybrid SDN networks
Cing-yu Chu, Kang Xi, Min Luo, H. Jonathan Chao
|
Congestion-aware single link failure recovery in hybrid SDN networks
Details
|
|
Verification:
Authors have
not verified
information
|
Least recently used caches under the Shot Noise Model
Emilio Leonardi, Giovanni Luca Torrisi
|
Least recently used caches under the Shot Noise Model
Details
|
|
Verification:
Authors have
not verified
information
|
On sample-path staleness in lazy data replication
Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov
|
On sample-path staleness in lazy data replication
Details
|
|
Verification:
Authors have
not verified
information
|
Scalable clock synchronization in wireless networks with low-duty-cycle radio operations
Hao Huang, Jihoon Yun, Ziguo Zhong
|
Scalable clock synchronization in wireless networks with low-duty-cycle radio operations
Details
|
|
Verification:
Authors have
not verified
information
|
ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement
Bo Wang, Jinlei Jiang, Guangwen Yang
|
ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement
Details
|
|
Verification:
Authors have
not verified
information
|
Local detection of infections in heterogeneous networks
Chris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai
|
Local detection of infections in heterogeneous networks
Details
|
|
Verification:
Authors have
not verified
information
|
On setting-up asynchronous ad hoc wireless networks
Tomasz Jurdzinski, Dariusz R. Kowalski, Michal Rózanski, Grzegorz Stachowiak
|
On setting-up asynchronous ad hoc wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Minimum connected dominating set construction in wireless networks under the beeping model
Jiguo Yu, Lili Jia, Dongxiao Yu, Guangshun Li, Xiuzhen Cheng
|
Minimum connected dominating set construction in wireless networks under the beeping model
Details
|
|
Verification:
Authors have
not verified
information
|
WINET: Indoor white space network design
Jincheng Zhang, Wenjie Zhang, Minghua Chen, Zhi Wang
|
WINET: Indoor white space network design
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal multicast in dense multi-channel multi-radio wireless networks
Rahul Urgaonkar, Prithwish Basu, Saikat Guha, Ananthram Swami
|
Optimal multicast in dense multi-channel multi-radio wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Differentially private and strategy-proof spectrum auction with approximate revenue maximization
Ruihao Zhu, Kang G. Shin
|
Differentially private and strategy-proof spectrum auction with approximate revenue maximization
Details
|
|
Verification:
Authors have
not verified
information
|
All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend mode
Ge Peng, Gang Zhou, David T. Nguyen, Xin Qi
|
All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend mode
Details
|
|
Verification:
Authors have
not verified
information
|
Location-aware associated data placement for geo-distributed data-intensive applications
Boyang Yu, Jianping Pan
|
Location-aware associated data placement for geo-distributed data-intensive applications
Details
|
|
Verification:
Authors have
not verified
information
|
On the impossibility of efficient self-stabilization in virtual overlays with churn
Stefanie Roos, Thorsten Strufe
|
On the impossibility of efficient self-stabilization in virtual overlays with churn
Details
|
|
Verification:
Authors have
not verified
information
|
Routing in accumulative multi-hop networks
Jesús Gómez-Vilardebó
|
Routing in accumulative multi-hop networks
Details
|
|
Verification:
Author has
not verified
information
|
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture
Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen Hu, Qunfeng Dong
|
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture
Details
|
|
Verification:
Authors have
not verified
information
|
SMOC: A secure mobile cloud computing platform
Zijiang Hao, Yutao Tang, Yifan Zhang, Edmund Novak, Nancy Carter, Qun Li
|
SMOC: A secure mobile cloud computing platform
Details
|
|
Verification:
Authors have
not verified
information
|
The online disjoint set cover problem and its applications
Ashwin Pananjady, Vivek Kumar Bagaria, Rahul Vaze
|
The online disjoint set cover problem and its applications
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient analysis of caching strategies under dynamic content popularity
Michele Garetto, Emilio Leonardi, Stefano Traverso
|
Efficient analysis of caching strategies under dynamic content popularity
Details
|
|
Verification:
Authors have
not verified
information
|
Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tags
Qiongzheng Lin, Lei Yang, Yuxin Sun, Tianci Liu, Xiang-Yang Li, Yunhao Liu
|
Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tags
Details
|
|
Verification:
Authors have
not verified
information
|
Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems
Shusen Yang, Usman Adeel, Julie A. McCann
|
Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems
Details
|
|
Verification:
Authors have
not verified
information
|
Accelerating regular expression matching over compressed HTTP
Michela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral
|
Accelerating regular expression matching over compressed HTTP
Details
|
|
Verification:
Authors have
not verified
information
|
PPER: Privacy-preserving economic-robust spectrum auction in wireless networks
Ming Li, Pan Li, Linke Guo, Xiaoxia Huang
|
PPER: Privacy-preserving economic-robust spectrum auction in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
A correlated shadowing model for urban wireless networks
François Baccelli, Xinchen Zhang
|
A correlated shadowing model for urban wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Assessing attack vulnerability in networks with uncertainty
Thang N. Dinh, My T. Thai
|
Assessing attack vulnerability in networks with uncertainty
Details
|
|
Verification:
Authors have
not verified
information
|
A distributed and robust SDN control plane for transactional network updates
Marco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid
|
A distributed and robust SDN control plane for transactional network updates
Details
|
|
Verification:
Authors have
not verified
information
|
Fast RFID grouping protocols
Jia Liu, Bin Xiao, Shigang Chen, Feng Zhu, Lijun Chen
|
Fast RFID grouping protocols
Details
|
|
Verification:
Authors have
not verified
information
|
Interference alignment using shadow channel
Bo Chen, Vivek Yenamandra, Kannan Srinivasan
|
Interference alignment using shadow channel
Details
|
|
Verification:
Authors have
not verified
information
|
Supporting WiFi and LTE co-existence
Sangki Yun, Lili Qiu
|
Supporting WiFi and LTE co-existence
Details
|
|
Verification:
Authors have
not verified
information
|
On end-to-end delay minimization in wireless networks under the physical interference model
Yuan Li, Antonio Capone, Di Yuan
|
On end-to-end delay minimization in wireless networks under the physical interference model
Details
|
|
Verification:
Authors have
not verified
information
|
Fault-tolerant coverage with maximum lifetime in wireless sensor networks
James Willson, Zhao Zhang, Weili Wu, Ding-Zhu Du
|
Fault-tolerant coverage with maximum lifetime in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Femto-matching: Efficient traffic offloading in heterogeneous cellular networks
Wei Wang, Xiaobing Wu, Lei Xie, Sanglu Lu
|
Femto-matching: Efficient traffic offloading in heterogeneous cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
TimeFlip: Scheduling network updates with timestamp-based TCAM ranges
Tal Mizrahi, Ori Rottenstreich, Yoram Moses
|
TimeFlip: Scheduling network updates with timestamp-based TCAM ranges
Details
|
|
Verification:
Authors have
not verified
information
|
Modeling randomized data streams in caching, data processing, and crawling applications
Sarker Tanzir Ahmed, Dmitri Loguinov
|
Modeling randomized data streams in caching, data processing, and crawling applications
Details
|
|
Verification:
Authors have
not verified
information
|
Stochastic and fluid index policies for resource allocation problems
Maialen Larrañaga, Urtzi Ayesta, Ina Maria Verloop
|
Stochastic and fluid index policies for resource allocation problems
Details
|
|
Verification:
Authors have
not verified
information
|
TSearch: Target-oriented low-delay node searching in DTNs with social network properties
Li Yan, Haiying Shen, Kang Chen
|
TSearch: Target-oriented low-delay node searching in DTNs with social network properties
Details
|
|
Verification:
Authors have
not verified
information
|
Fundamental limits of RSS fingerprinting based indoor localization
Yutian Wen, Xiaohua Tian, Xinbing Wang, Songwu Lu
|
Fundamental limits of RSS fingerprinting based indoor localization
Details
|
|
Verification:
Authors have
not verified
information
|
Composite event coverage in wireless sensor networks with heterogeneous sensors
Jing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao
|
Composite event coverage in wireless sensor networks with heterogeneous sensors
Details
|
|
Verification:
Authors have
not verified
information
|
Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate control
Zhangyu Guan, Giuseppe Enrico Santagati, Tommaso Melodia
|
Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate control
Details
|
|
Verification:
Authors have
not verified
information
|
What is wrecking your data plan? A measurement study of mobile web overhead
Abner Mendoza, Kapil Singh, Guofei Gu
|
What is wrecking your data plan? A measurement study of mobile web overhead
Details
|
|
Verification:
Authors have
not verified
information
|
Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability
Yuben Qu, Chao Dong, Haipeng Dai, Fan Wu, Shaojie Tang, Hai Wang, Chang Tian
|
Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability
Details
|
|
Verification:
Authors have
not verified
information
|
ITSEC: An information-theoretically secure framework for truthful spectrum auctions
Zhili Chen, Liusheng Huang, Lin Chen
|
ITSEC: An information-theoretically secure framework for truthful spectrum auctions
Details
|
|
Verification:
Authors have
not verified
information
|
Performance analysis for two-tier cellular systems based on probabilistic distance models
Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan
|
Performance analysis for two-tier cellular systems based on probabilistic distance models
Details
|
|
Verification:
Authors have
not verified
information
|
Differentially private publication of general time-serial trajectory data
Jingyu Hua, Yue Gao, Sheng Zhong
|
Differentially private publication of general time-serial trajectory data
Details
|
|
Verification:
Authors have
not verified
information
|
Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing
Mohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. S. Eugene Ng, Sanjay G. Rao
|
Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing
Details
|
|
Author Comments:
The paper motivated and shaped the creation of a cloud computing benchmark driven by Burstorm Inc.
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems
Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin
|
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems
Details
|
|
Verification:
Authors have
not verified
information
|
Construction of simple graphs with a target joint degree matrix and beyond
Minas Gjoka, Balint Tillman, Athina Markopoulou
|
Construction of simple graphs with a target joint degree matrix and beyond
Details
|
|
Verification:
Authors have
not verified
information
|
Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks
Qiao Xiang, Xi Chen, Linghe Kong, Lei Rao, Xue Liu
|
Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks
Details
|
|
Verification:
Authors have
not verified
information
|
ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer
Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria
|
ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer
Details
|
|
Verification:
Authors have
not verified
information
|
Temporal update dynamics under blind sampling
Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov
|
Temporal update dynamics under blind sampling
Details
|
|
Verification:
Authors have
not verified
information
|
Crowdsensing Under (Soft) Control
John P. Rula, Fabián E. Bustamante
|
Crowdsensing Under (Soft) Control
Details
|
|
Verification:
Authors have
not verified
information
|
End-to-end scheduling for all-optical data centers
Chang-Heng Wang, Tara Javidi, George Porter
|
End-to-end scheduling for all-optical data centers
Details
|
|
Verification:
Authors have
not verified
information
|
Fusing noisy fingerprints with distance bounds for indoor localization
Suining He, S.-H. Gary Chan, Lei Yu, Ning Liu
|
Fusing noisy fingerprints with distance bounds for indoor localization
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient broadcast on fragmented spectrum in cognitive radio networks
Pei Huang, Chin-Jung Liu, Xi Yang, Li Xiao
|
Efficient broadcast on fragmented spectrum in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
More load, more differentiation - A design principle for deadline-aware congestion control
Han Zhang, Xingang Shi, Xia Yin, Fengyuan Ren, Zhiliang Wang
|
More load, more differentiation - A design principle for deadline-aware congestion control
Details
|
|
Verification:
Authors have
not verified
information
|
SpecGuard: Spectrum misuse detection in dynamic spectrum access systems
Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, Chi Zhang
|
SpecGuard: Spectrum misuse detection in dynamic spectrum access systems
Details
|
|
Verification:
Authors have
not verified
information
|
Performance analysis for overflow loss systems of processor-sharing queues
Yin-Chi Chan, Jun Guo, Eric W. M. Wong, Moshe Zukerman
|
Performance analysis for overflow loss systems of processor-sharing queues
Details
|
|
Verification:
Authors have
not verified
information
|
iSelf: Towards cold-start emotion labeling using transfer learning with smartphones
Boyuan Sun, Qiang Ma, Shanfeng Zhang, Kebin Liu, Yunhao Liu
|
iSelf: Towards cold-start emotion labeling using transfer learning with smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
A-DCF: Design and implementation of delay and queue length based wireless MAC
Hojin Lee, Sangwoo Moon, Yung Yi
|
A-DCF: Design and implementation of delay and queue length based wireless MAC
Details
|
|
Verification:
Authors have
not verified
information
|
Contextual-code: Simplifying information pulling from targeted sources in physical world
Yang Tian, Kaigui Bian, Guobin Shen, Xiaochen Liu, Xiaoguang Li, Thomas Moscibroda
|
Contextual-code: Simplifying information pulling from targeted sources in physical world
Details
|
|
Verification:
Authors have
not verified
information
|
A cloudlet-based multi-lateral resource exchange framework for mobile users
Yu Wu, Lei Ying
|
A cloudlet-based multi-lateral resource exchange framework for mobile users
Details
|
|
Verification:
Authors have
not verified
information
|
P3: Joint optimization of charger placement and power allocation for wireless power transfer
Sheng Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu
|
P3: Joint optimization of charger placement and power allocation for wireless power transfer
Details
|
|
Verification:
Authors have
not verified
information
|
A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks
Jiajia Liu, Shangwei Zhang, Hiroki Nishiyama, Nei Kato, Jun Guo
|
A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks
Laura Galluccio, Sebastiano Milardo, Giacomo Morabito, Sergio Palazzo
|
SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks
Details
|
|
Verification:
Authors have
not verified
information
|
On the efficiency of social recommender networks
Felix Ming Fai Wong, Zhenming Liu, Mung Chiang
|
On the efficiency of social recommender networks
Details
|
|
Verification:
Authors have
not verified
information
|
Robust optimization of cognitive radio networks powered by energy harvesting
Shimin Gong, Lingjie Duan, Ping Wang
|
Robust optimization of cognitive radio networks powered by energy harvesting
Details
|
|
Verification:
Authors have
not verified
information
|
Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs
Jun Duan, Zhiyang Guo, Yuanyuan Yang
|
Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs
Details
|
|
Verification:
Authors have
not verified
information
|
Persistence and availability of floating content in a campus environment
Shahzad Ali, Gianluca Rizzo, Vincenzo Mancuso, Marco Ajmone Marsan
|
Persistence and availability of floating content in a campus environment
Details
|
|
Verification:
Authors have
not verified
information
|
Price of fairness for opportunistic and priority schedulers
Malhar Mehta, Veeraruna Kavitha, Nandyala Hemachandra
|
Price of fairness for opportunistic and priority schedulers
Details
|
|
Verification:
Authors have
not verified
information
|
Fine-grained data sharing in cloud computing for mobile devices
Jun Shao, Rongxing Lu, Xiaodong Lin
|
Fine-grained data sharing in cloud computing for mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Copula analysis for statistical network calculus
Fang Dong, Kui Wu, S. Venkatesh
|
Copula analysis for statistical network calculus
Details
|
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Joint sensing task and subband allocation for large-scale spectrum profiling
Dong-Hoon Shin, Shibo He, Junshan Zhang
|
Joint sensing task and subband allocation for large-scale spectrum profiling
Details
|
|
Verification:
Authors have
not verified
information
|
Fingerprint-free tracking with dynamic enhanced field division
Qingquan Zhang, Ziqiao Zhou, Wei Xu, Jing Qi, Chenxi Guo, Ping Yi, Ting Zhu, Sheng Xiao
|
Fingerprint-free tracking with dynamic enhanced field division
Details
|
|
Verification:
Authors have
not verified
information
|
Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework
Shu Wang, Vignesh Venkateswaran, Xinyu Zhang
|
Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework
Details
|
|
Verification:
Authors have
not verified
information
|
Hermes: Latency optimal task assignment for resource-constrained mobile computing
Yi-Hsuan Kao, Bhaskar Krishnamachari, Moo-Ryong Ra, Fan Bai
|
Hermes: Latency optimal task assignment for resource-constrained mobile computing
Details
|
|
Verification:
Authors have
not verified
information
|
Agile virtualized infrastructure to proactively defend against cyber attacks
Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura
|
Agile virtualized infrastructure to proactively defend against cyber attacks
Details
|
|
Verification:
Authors have
not verified
information
|
Capturing resource tradeoffs in fair multi-resource allocation
Doron Zarchy, David Hay, Michael Schapira
|
Capturing resource tradeoffs in fair multi-resource allocation
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal communication structures for big data aggregation
William Culhane, Kirill Kogan, Chamikara Jayalath, Patrick Eugster
|
Optimal communication structures for big data aggregation
Details
|
|
Verification:
Authors have
not verified
information
|
Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches
Danfeng Shan, Wanchun Jiang, Fengyuan Ren
|
Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches
Details
|
|
Verification:
Authors have
not verified
information
|
JITScope: Protecting web users from control-flow hijacking attacks
Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song
|
JITScope: Protecting web users from control-flow hijacking attacks
Details
|
|
Verification:
Authors have
not verified
information
|
On the performance of successive interference cancellation in D2D-enabled cellular networks
Chuan Ma, Weijie Wu, Ying Cui, Xinbing Wang
|
On the performance of successive interference cancellation in D2D-enabled cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
Boosting sensor network calculus by thoroughly bounding cross-traffic
Steffen Bondorf, Jens B. Schmitt
|
Boosting sensor network calculus by thoroughly bounding cross-traffic
Details
|
|
Verification:
Authors have
not verified
information
|
ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission
Philipp Kindt, Han Jing, Nadja Peters, Samarjit Chakraborty
|
ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission
Details
|
|
Verification:
Authors have
not verified
information
|
Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild
Muhammad Shahzad, Alex X. Liu
|
Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild
Details
|
|
Verification:
Authors have
not verified
information
|
ADMM based algorithm for eICIC configuration in heterogeneous cellular networks
Hao Zhou, Yusheng Ji, Xiaoyan Wang, Baohua Zhao
|
ADMM based algorithm for eICIC configuration in heterogeneous cellular networks
Details
|
|
Verification:
Authors have
not verified
information
|
Adaptive online power-management for Bluetooth Low Energy
Philipp Kindt, Daniel Yunge, Mathias Gopp, Samarjit Chakraborty
|
Adaptive online power-management for Bluetooth Low Energy
Details
|
|
Verification:
Authors have
not verified
information
|
Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics
Jiasi Chen, Mung Chiang, Jeffrey Erman, Guangzhi Li, K. K. Ramakrishnan, Rakesh K. Sinha
|
Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics
Details
|
|
Verification:
Authors have
not verified
information
|
Trajectory aware macro-cell planning for mobile users
Shubhadip Mitra, Sayan Ranu, Vinay Kolar, Aditya Telang, Arnab Bhattacharya, Ravi Kokku, Sriram Raghavan
|
Trajectory aware macro-cell planning for mobile users
Details
|
|
Verification:
Authors have
not verified
information
|
On 2-way neighbor discovery in wireless networks with directional antennas
Hao Cai, Tilman Wolf
|
On 2-way neighbor discovery in wireless networks with directional antennas
Details
|
|
Verification:
Authors have
not verified
information
|
BFAST: Unified and scalable index for NDN forwarding architecture
Huichen Dai, Jianyuan Lu, Yi Wang, Bin Liu
|
BFAST: Unified and scalable index for NDN forwarding architecture
Details
|
|
Verification:
Authors have
not verified
information
|
Measurement and modeling of user transitioning among networks
Sookhyun Yang, Jim Kurose, Simon Heimlicher, Arun Venkataramani
|
Measurement and modeling of user transitioning among networks
Details
|
|
Verification:
Authors have
not verified
information
|
User recruitment for mobile crowdsensing over opportunistic networks
Merkourios Karaliopoulos, Orestis Telelis, Iordanis Koutsopoulos
|
User recruitment for mobile crowdsensing over opportunistic networks
Details
|
|
Verification:
Authors have
not verified
information
|
Quantized conflict graphs for wireless network optimization
Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu
|
Quantized conflict graphs for wireless network optimization
Details
|
|
Verification:
Authors have
not verified
information
|
UbiFlow: Mobility management in urban-scale software defined IoT
Di Wu, Dmitri I. Arkhipov, Eskindir Asmare, Zhijing Qin, Julie A. McCann
|
UbiFlow: Mobility management in urban-scale software defined IoT
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-aware video streaming on smartphones
Wenjie Hu, Guohong Cao
|
Energy-aware video streaming on smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Secondary markets for mobile data: Feasibility and benefits of traded data plans
Liang Zheng, Carlee Joe-Wong, Chee Wei Tan, Sangtae Ha, Mung Chiang
|
Secondary markets for mobile data: Feasibility and benefits of traded data plans
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs
Michael J. Neely
|
Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs
Details
|
|
Verification:
Author has
not verified
information
|
TagBooth: Deep shopping data acquisition powered by RFID tags
Tianci Liu, Lei Yang, Xiang-Yang Li, Huaiyi Huang, Yunhao Liu
|
TagBooth: Deep shopping data acquisition powered by RFID tags
Details
|
|
Verification:
Authors have
not verified
information
|
On the efficiency-optimal Markov chains for distributed networking applications
Chul-Ho Lee, Do Young Eun
|
On the efficiency-optimal Markov chains for distributed networking applications
Details
|
|
Verification:
Authors have
not verified
information
|
SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs
Chen Wang, Hongbo Jiang
|
SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs
Details
|
|
Verification:
Authors have
not verified
information
|
Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing
Xiaoli Wang, Jiasi Chen, Aveek Dutta, Mung Chiang
|
Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing
Details
|
|
Verification:
Authors have
not verified
information
|
Chirp signal-based aerial acoustic communication for smart devices
Hyewon Lee, Tae Hyun Kim, Jun Won Choi, Sunghyun Choi
|
Chirp signal-based aerial acoustic communication for smart devices
Details
|
|
Verification:
Authors have
not verified
information
|
Real-time failure prediction in online services
Mohammed Shatnawi, Mohamed Hefeeda
|
Real-time failure prediction in online services
Details
|
|
Verification:
Authors have
not verified
information
|
Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?
Maria Rosário de Oliveira, João C. Neves, Rui Valadas, Paulo Salvador
|
Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?
Details
|
|
Verification:
Authors have
not verified
information
|
Minimizing the maximum sensor movement for barrier coverage in the plane
Shuangjuan Li, Hong Shen
|
Minimizing the maximum sensor movement for barrier coverage in the plane
Details
|
|
Verification:
Authors have
not verified
information
|
Tapping into the router's unutilized processing power
Marat Radan, Isaac Keslassy
|
Tapping into the router's unutilized processing power
Details
|
|
Verification:
Authors have
not verified
information
|
Power-throughput tradeoffs of 802.11n/ac in smartphones
Swetank Kumar Saha, Pratik Deshpande, Pranav P. Inamdar, Ramanujan K. Sheshadri, Dimitrios Koutsonikolas
|
Power-throughput tradeoffs of 802.11n/ac in smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Timely video popularity forecasting based on social networks
Jie Xu, Mihaela van der Schaar, Jiangchuan Liu, Haitao Li
|
Timely video popularity forecasting based on social networks
Details
|
|
Verification:
Authors have
not verified
information
|
Minimum control latency of dynamic networks
Weiguo Dai, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Francis C. M. Lau
|
Minimum control latency of dynamic networks
Details
|
|
Verification:
Authors have
not verified
information
|
Providing long-term participation incentive in participatory sensing
Lin Gao, Fen Hou, Jianwei Huang
|
Providing long-term participation incentive in participatory sensing
Details
|
|
Verification:
Authors have
not verified
information
|
iPath: Intelligent and optimal path selection for Byzantine fault tolerant communication
Shehla S. Rana, Nitin H. Vaidya
|
iPath: Intelligent and optimal path selection for Byzantine fault tolerant communication
Details
|
|
Verification:
Authors have
not verified
information
|
On multiplexing flows: Does it hurt or not?
Florin Ciucu, Felix Poloczek
|
On multiplexing flows: Does it hurt or not?
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling in wireless networks with full-duplex cut-through transmission
Yang Yang, Ness B. Shroff
|
Scheduling in wireless networks with full-duplex cut-through transmission
Details
|
|
Verification:
Authors have
not verified
information
|
VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks
Chao Kong, Zengwen Yuan, Xushen Han, Feng Yang, Xinbing Wang, Tao Wang, Songwu Lu
|
VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Static power of mobile devices: Self-updating radio maps for wireless indoor localization
Chenshu Wu, Zheng Yang, Chaowei Xiao, Chaofan Yang, Yunhao Liu, Mingyan Liu
|
Static power of mobile devices: Self-updating radio maps for wireless indoor localization
Details
|
|
Verification:
Authors have
not verified
information
|
Exploiting large system dynamics for designing simple data center schedulers
Yousi Zheng, Ness B. Shroff, R. Srikant, Prasun Sinha
|
Exploiting large system dynamics for designing simple data center schedulers
Details
|
|
Verification:
Authors have
not verified
information
|
Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networks
Jae-Han Lim, Katsuhiro Naito, Ji-Hoon Yun, Mario Gerla
|
Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Personalized location privacy in mobile networks: A social group utility approach
Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang
|
Personalized location privacy in mobile networks: A social group utility approach
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-efficient heuristics for job assignment in processor-sharing server farms
Jing Fu, Jun Guo, Eric W. M. Wong, Moshe Zukerman
|
Energy-efficient heuristics for job assignment in processor-sharing server farms
Details
|
|
Verification:
Authors have
not verified
information
|
Socially-optimal online spectrum auctions for secondary wireless communication
Hongxing Li, Chuan Wu, Zongpeng Li
|
Socially-optimal online spectrum auctions for secondary wireless communication
Details
|
|
Verification:
Authors have
not verified
information
|
An empirical mixture model for large-scale RTT measurements
Romain Fontugne, Johan Mazel, Kensuke Fukuda
|
An empirical mixture model for large-scale RTT measurements
Details
|
|
Verification:
Authors have
not verified
information
|
WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips
Feiyang Liu, Haibo Zhang, Yawen Chen, Zhiyi Huang, Huaxi Gu
|
WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips
Details
|
|
Verification:
Authors have
not verified
information
|
VeRV: A temporal and data-concerned verification framework for the vehicle bus systems
Shuo Zhang, Fei He, Ming Gu
|
VeRV: A temporal and data-concerned verification framework for the vehicle bus systems
Details
|
|
Verification:
Authors have
not verified
information
|
WiGest: A ubiquitous WiFi-based gesture recognition system
Heba Abdelnasser, Moustafa Youssef, Khaled A. Harras
|
WiGest: A ubiquitous WiFi-based gesture recognition system
Details
|
|
Verification:
Authors have
not verified
information
|
Low-delay distributed source coding for time-varying sources with unknown statistics
Fangzhou Chen, Bin Li, Can Emre Koksal
|
Low-delay distributed source coding for time-varying sources with unknown statistics
Details
|
|
Verification:
Authors have
not verified
information
|
Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networks
Lixin Wang, Peng-Jun Wan, Kyle Young
|
Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks
Zhuo Lu, Yalin Evren Sagduyu, Jason H. Li
|
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
On the construction of maximum-quality aggregation trees in deadline-constrained WSNs
Bahram Alinia, Mohammad Hassan Hajiesmaili, Ahmad Khonsari
|
On the construction of maximum-quality aggregation trees in deadline-constrained WSNs
Details
|
|
Verification:
Authors have
not verified
information
|
A coded generalization of selective repeat ARQ
Jason Cloud, Douglas J. Leith, Muriel Médard
|
A coded generalization of selective repeat ARQ
Details
|
|
Verification:
Authors have
not verified
information
|
Exploiting mobile social behaviors for Sybil detection
Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen
|
Exploiting mobile social behaviors for Sybil detection
Details
|
|
Verification:
Authors have
not verified
information
|
Harmony: Content resolution for smart devices using acoustic channel
Mostafa Uddin, Tamer Nadeem
|
Harmony: Content resolution for smart devices using acoustic channel
Details
|
|
Verification:
Authors have
not verified
information
|
Need for speed: CORA scheduler for optimizing completion-times in the cloud
Zhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang
|
Need for speed: CORA scheduler for optimizing completion-times in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
PLACE: Physical layer cardinality estimation for large-scale RFID systems
Yuxiao Hou, Jiajue Ou, Yuanqing Zheng, Mo Li
|
PLACE: Physical layer cardinality estimation for large-scale RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
SmartEye: Real-time and efficient cloud image sharing for disaster environments
Yu Hua, Wenbo He, Xue Liu, Dan Feng
|
SmartEye: Real-time and efficient cloud image sharing for disaster environments
Details
|
|
Verification:
Authors have
not verified
information
|
The importance of being earnest in crowdsourcing systems
Alberto Tarable, Alessandro Nordio, Emilio Leonardi, Marco Ajmone Marsan
|
The importance of being earnest in crowdsourcing systems
Details
|
|
Verification:
Authors have
not verified
information
|
SIEVE: Scalable user grouping for large MU-MIMO systems
Wei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan
|
SIEVE: Scalable user grouping for large MU-MIMO systems
Details
|
|
Verification:
Authors have
not verified
information
|
Flow-based feasibility test of linear interference alignment with arbitrary interference topology
Peng-Jun Wan, Fahad Al-dhelaan, Sai Ji, Lei Wang, Ophir Frieder
|
Flow-based feasibility test of linear interference alignment with arbitrary interference topology
Details
|
|
Verification:
Authors have
not verified
information
|
Sampling online social networks via heterogeneous statistics
Xin Wang, Richard T. B. Ma, Yinlong Xu, Zhipeng Li
|
Sampling online social networks via heterogeneous statistics
Details
|
|
Verification:
Authors have
not verified
information
|
RFID cardinality estimation with blocker tags
Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi, Xin Xie
|
RFID cardinality estimation with blocker tags
Details
|
|
Verification:
Authors have
not verified
information
|
Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices
Yimin Chen, Jingchao Sun, Rui Zhang, Yanchao Zhang
|
Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Optimized network traffic engineering using segment routing
Randeep Bhatia, Fang Hao, Murali S. Kodialam, T. V. Lakshman
|
Optimized network traffic engineering using segment routing
Details
|
|
Verification:
Authors have
not verified
information
|
DPCP: A protocol for optimal pull coordination in decentralized social networks
Huanle Xu, Pili Hu, Wing Cheong Lau, Qiming Zhang, Yang Wu
|
DPCP: A protocol for optimal pull coordination in decentralized social networks
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-efficient transmission with data sharing
Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo
|
Energy-efficient transmission with data sharing
Details
|
|
Verification:
Authors have
not verified
information
|
On the complexity of optimal routing and content caching in heterogeneous networks
Mostafa Dehghan, Anand Seetharam, Bo Jiang, Ting He, Theodoros Salonidis, Jim Kurose, Don Towsley, Ramesh K. Sitaraman
|
On the complexity of optimal routing and content caching in heterogeneous networks
Details
|
|
Verification:
Authors have
not verified
information
|
Original SYN: Finding machines hidden behind firewalls
Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall
|
Original SYN: Finding machines hidden behind firewalls
Details
|
|
Verification:
Authors have
not verified
information
|
Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stability
François Baccelli, Avhishek Chatterjee, Sriram Vishwanath
|
Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stability
Details
|
|
Verification:
Authors have
not verified
information
|
Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems
Linke Guo, Yuguang Fang, Ming Li, Pan Li
|
Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems
Details
|
|
Verification:
Authors have
not verified
information
|
Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks
Rahul Singh, Xueying Guo, P. R. Kumar
|
Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
PhaseU: Real-time LOS identification with WiFi
Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu
|
PhaseU: Real-time LOS identification with WiFi
Details
|
|
Verification:
Authors have
not verified
information
|
OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement
Xuan Nam Nguyen, Damien Saucez, Chadi Barakat, Thierry Turletti
|
OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement
Details
|
|
Verification:
Authors have
not verified
information
|
Modeling repeating behaviors in packet arrivals: Detection and measurement
Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan
|
Modeling repeating behaviors in packet arrivals: Detection and measurement
Details
|
|
Verification:
Authors have
not verified
information
|
Ricci curvature of the Internet topology
Chien-Chun Ni, Yu-Yao Lin, Jie Gao, Xianfeng David Gu, Emil Saucan
|
Ricci curvature of the Internet topology
Details
|
|
Verification:
Authors have
not verified
information
|
A truthful incentive mechanism for emergency demand response in colocation data centers
Linquan Zhang, Shaolei Ren, Chuan Wu, Zongpeng Li
|
A truthful incentive mechanism for emergency demand response in colocation data centers
Details
|
|
Verification:
Authors have
not verified
information
|
CSMA k-SIC - A class of distributed MAC protocols and their performance evaluation
Abishek Sankararaman, François Baccelli
|
CSMA k-SIC - A class of distributed MAC protocols and their performance evaluation
Details
|
|
Verification:
Authors have
not verified
information
|
Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling
Bang Liu, Di Niu, Zongpeng Li, H. Vicky Zhao
|
Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling
Details
|
|
Verification:
Authors have
not verified
information
|
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design
Lin Chen, Wei Wang, Hua Huang, Shan Lin
|
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design
Details
|
|
Verification:
Authors have
not verified
information
|
Incentivize crowd labeling under budget constraint
Qi Zhang, Yutian Wen, Xiaohua Tian, Xiaoying Gan, Xinbing Wang
|
Incentivize crowd labeling under budget constraint
Details
|
|
Verification:
Authors have
not verified
information
|
VM-tracking: Visual-motion sensing integration for real-time human tracking
Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
|
VM-tracking: Visual-motion sensing integration for real-time human tracking
Details
|
|
Verification:
Authors have
not verified
information
|
Dissecting packet loss in mobile broadband networks from the edge
Dziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein
|
Dissecting packet loss in mobile broadband networks from the edge
Details
|
|
Verification:
Authors have
not verified
information
|
Comprehensive understanding of TCP Incast problem
Wen Chen, Fengyuan Ren, Jing Xie, Chuang Lin, Kevin Yin, Fred Baker
|
Comprehensive understanding of TCP Incast problem
Details
|
|
Verification:
Authors have
not verified
information
|
Speedup of information exchange using multiple channels in wireless ad hoc networks
Dongxiao Yu, Yuexuan Wang, Yu Yan, Jiguo Yu, Francis C. M. Lau
|
Speedup of information exchange using multiple channels in wireless ad hoc networks
Details
|
|
Verification:
Authors have
not verified
information
|
Bits and coins: Supporting collaborative consumption of mobile internet
Dimitris Syrivelis, George Iosifidis, Dimosthenis Delimpasis, Konstantinos Chounos, Thanasis Korakis, Leandros Tassiulas
|
Bits and coins: Supporting collaborative consumption of mobile internet
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient resource scheduling for a secondary network in shared spectrum
Matthew A. Clark, Konstantinos Psounis
|
Efficient resource scheduling for a secondary network in shared spectrum
Details
|
|
Verification:
Authors have
not verified
information
|
Changing channel without strings: Coordination-free wideband spectrum adaptation
Wei Wang, Yingjie Victor Chen, Zeyu Wang, Jin Zhang, Kaishun Wu, Qian Zhang
|
Changing channel without strings: Coordination-free wideband spectrum adaptation
Details
|
|
Verification:
Authors have
not verified
information
|
CodeRepair: PHY-layer partial packet recovery without the pain
Jun Huang, Guoliang Xing, Jianwei Niu, Shan Lin
|
CodeRepair: PHY-layer partial packet recovery without the pain
Details
|
|
Verification:
Authors have
not verified
information
|
Towards 48-fold cabling complexity reduction in large flattened butterfly networks
Márton Csernai, Florin Ciucu, Ralf-Peter Braun, András Gulyás
|
Towards 48-fold cabling complexity reduction in large flattened butterfly networks
Details
|
|
Verification:
Authors have
not verified
information
|
Delay models in ethernet long-reach passive optical networks
Abhishek Dixit, Bart Lannoo, Didier Colle, Mario Pickavet, Piet Demeester
|
Delay models in ethernet long-reach passive optical networks
Details
|
|
Verification:
Authors have
not verified
information
|
Service-martingales: Theory and applications to the delay analysis of random access protocols
Felix Poloczek, Florin Ciucu
|
Service-martingales: Theory and applications to the delay analysis of random access protocols
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost
Ari Arapostathis, Anup Biswas, Guodong Pang
|
Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost
Details
|
|
Verification:
Authors have
not verified
information
|
On the co-existence of distributed and centralized routing control-planes
Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever
|
On the co-existence of distributed and centralized routing control-planes
Details
|
|
Verification:
Authors have
not verified
information
|
Exploiting causes and effects of wireless link correlation for better performance
Song Min Kim, Shuai Wang, Tian He
|
Exploiting causes and effects of wireless link correlation for better performance
Details
|
|
Verification:
Authors have
not verified
information
|
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li
|
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data
Details
|
|
Verification:
Authors have
not verified
information
|
Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality
Qiaomin Xie, Yi Lu
|
Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality
Details
|
|
Verification:
Authors have
not verified
information
|
Optimizing throughput in optical networks: The joint routing and power control problem
Zizhong Cao, Paul Claisse, René-Jean Essiambre, Murali S. Kodialam, T. V. Lakshman
|
Optimizing throughput in optical networks: The joint routing and power control problem
Details
|
|
Verification:
Authors have
not verified
information
|
Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A
Aifang Xu, Xiaonan Feng, Ye Tian
|
Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A
Details
|
|
Verification:
Authors have
not verified
information
|
Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective
Wei Bao, Ben Liang
|
Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective
Details
|
|
Verification:
Authors have
not verified
information
|
Priority differentiation in cognitive radio networks
Jelena V. Misic, Md. Mizanur Rahman, Vojislav B. Misic
|
Priority differentiation in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Sponsoring mobile data: An economic analysis of the impact on users and content providers
Carlee Joe-Wong, Sangtae Ha, Mung Chiang
|
Sponsoring mobile data: An economic analysis of the impact on users and content providers
Details
|
|
Verification:
Authors have
not verified
information
|
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference
Zhuo Lu, Cliff Wang
|
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference
Details
|
|
Verification:
Authors have
not verified
information
|
Virtual machine migration planning in software-defined networks
Huandong Wang, Yong Li, Ying Zhang, Depeng Jin
|
Virtual machine migration planning in software-defined networks
Details
|
|
Verification:
Authors have
not verified
information
|
Maximizing network capacity of MPR-capable wireless networks
Peng-Jun Wan, Fahad Al-dhelaan, Xiaohua Jia, Baowei Wang, Guowen Xing
|
Maximizing network capacity of MPR-capable wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
MOOC performance prediction via clickstream data and social learning networks
Christopher G. Brinton, Mung Chiang
|
MOOC performance prediction via clickstream data and social learning networks
Details
|
|
Verification:
Authors have
not verified
information
|
When hybrid cloud meets flash crowd: Towards cost-effective service provisioning
Yipei Niu, Bin Luo, Fangming Liu, Jiangchuan Liu, Bo Li
|
When hybrid cloud meets flash crowd: Towards cost-effective service provisioning
Details
|
|
Verification:
Authors have
not verified
information
|
Content caching and delivery over heterogeneous wireless networks
Jad Hachem, Nikhil Karamchandani, Suhas N. Diggavi
|
Content caching and delivery over heterogeneous wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Crowdsourced live streaming over the cloud
Fei Chen, Cong Zhang, Feng Wang, Jiangchuan Liu
|
Crowdsourced live streaming over the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks
Wenchi Cheng, Xi Zhang, Hailin Zhang
|
Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks
Details
|
|
Verification:
Authors have
not verified
information
|
Distinct element counting in distributed dynamic data streams
Wenji Chen, Yong Guan
|
Distinct element counting in distributed dynamic data streams
Details
|
|
Verification:
Authors have
not verified
information
|
Mode and user selection for multi-user MIMO WLANs without CSI
Narendra Anand, Jeongkeun Lee, Sung-Ju Lee, Edward W. Knightly
|
Mode and user selection for multi-user MIMO WLANs without CSI
Details
|
|
Verification:
Authors have
not verified
information
|
The collocation of measurement points in large open indoor environment
Kaikai Sheng, Zhicheng Gu, Xueyu Mao, Xiaohua Tian, Weijie Wu, Xiaoying Gan, Xinbing Wang
|
The collocation of measurement points in large open indoor environment
Details
|
|
Verification:
Authors have
not verified
information
|
Unveiling the adoption and cascading process of OSN-based gifting applications
Mohammad Rezaur Rahman, Jinyoung Han, Chen-Nee Chuah
|
Unveiling the adoption and cascading process of OSN-based gifting applications
Details
|
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Blast: Accelerating high-performance data analytics applications by optical multicast
Yiting Xia, T. S. Eugene Ng, Xiaoye Steven Sun
|
Blast: Accelerating high-performance data analytics applications by optical multicast
Details
|
|
Verification:
Authors have
not verified
information
|
HybridCast: Joint multicast-unicast design for multiuser MIMO networks
Bo-Xian Wu, Kate Ching-Ju Lin, Kai-Cheng Hsu, Hung-Yu Wei
|
HybridCast: Joint multicast-unicast design for multiuser MIMO networks
Details
|
|
Verification:
Authors have
not verified
information
|
A behavior-aware profiling of handheld devices
Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos
|
A behavior-aware profiling of handheld devices
Details
|
|
Verification:
Authors have
not verified
information
|
SPIRO: Turning elephants into mice with efficient RF transport
Eugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin
|
SPIRO: Turning elephants into mice with efficient RF transport
Details
|
|
Verification:
Authors have
not verified
information
|
Be responsible: A novel communications scheme for full-duplex MIMO radios
Diep N. Nguyen, Marwan Krunz
|
Be responsible: A novel communications scheme for full-duplex MIMO radios
Details
|
|
Verification:
Authors have
not verified
information
|
Generalized pattern matching string search on encrypted data in cloud systems
Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu
|
Generalized pattern matching string search on encrypted data in cloud systems
Details
|
|
Verification:
Authors have
not verified
information
|
Optimized layered integrated video encoding
Sangki Yun, Daehyeok Kim, Xiaofan Lu, Lili Qiu
|
Optimized layered integrated video encoding
Details
|
|
Verification:
Authors have
not verified
information
|
MadeCR: Correlation-based malware detection for cognitive radio
Yanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Danfeng (Daphne) Yao
|
MadeCR: Correlation-based malware detection for cognitive radio
Details
|
|
Verification:
Authors have
not verified
information
|
Redundancy control through traffic deduplication
Kien A. Hua, Ning Jiang, Jason Kuhns, Vaithiyanathan Sundaram, Cliff C. Zou
|
Redundancy control through traffic deduplication
Details
|
|
Verification:
Authors have
not verified
information
|
On the accuracy of smartphone-based mobile network measurement
Weichao Li, Ricky K. P. Mok, Daoyuan Wu, Rocky K. C. Chang
|
On the accuracy of smartphone-based mobile network measurement
Details
|
|
Verification:
Authors have
not verified
information
|
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure
Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang
|
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure
Details
|
|
Verification:
Authors have
not verified
information
|
Truthful incentive mechanisms for crowdsourcing
Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang
|
Truthful incentive mechanisms for crowdsourcing
Details
|
|
Verification:
Authors have
not verified
information
|
Online procurement auctions for resource pooling in client-assisted cloud storage systems
Jian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li
|
Online procurement auctions for resource pooling in client-assisted cloud storage systems
Details
|
|
Verification:
Authors have
not verified
information
|
Independent counter estimation buckets
Gil Einziger, Benny Fellman, Yaron Kassner
|
Independent counter estimation buckets
Details
|
|
Verification:
Authors have
not verified
information
|
FD2: A directional full duplex communication system for indoor wireless networks
Ehsan Aryafar, Alireza Keshavarz-Haddad
|
FD2: A directional full duplex communication system for indoor wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Online scheduling for delayed mobile offloading
Han Deng, I-Hong Hou
|
Online scheduling for delayed mobile offloading
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Comprehensive understanding of operation cost reduction using energy storage for IDCs
Haihang Zhou, Jianguo Yao, Haibing Guan, Xue Liu
|
Comprehensive understanding of operation cost reduction using energy storage for IDCs
Details
|
|
Verification:
Authors have
not verified
information
|
Provable fairness for TDMA scheduling
Marcin Bienkowski, Jaroslaw Byrka, Krzysztof Chrobak, Tomasz Jurdzinski, Dariusz R. Kowalski
|
Provable fairness for TDMA scheduling
Details
|
|
Verification:
Authors have
not verified
information
|
Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustification
Shizhen Zhao, Xiaojun Lin, Minghua Chen
|
Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustification
Details
|
|
Verification:
Authors have
not verified
information
|
Off-path round trip time measurement via TCP/IP side channels
Geoffrey Alexander, Jedidiah R. Crandall
|
Off-path round trip time measurement via TCP/IP side channels
Details
|
|
Verification:
Authors have
not verified
information
|
Fast optimal nonconcave resource allocation
Pan Lai, Rui Fan
|
Fast optimal nonconcave resource allocation
Details
|
|
Verification:
Authors have
not verified
information
|
A consensus-based approach for platooning with inter-vehicular communications
Stefania Santini, Alessandro Salvi, Antonio Saverio Valente, Antonio Pescapè, Michele Segata, Renato Lo Cigno
|
A consensus-based approach for platooning with inter-vehicular communications
Details
|
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
TCPRand: Randomizing TCP payload size for TCP fairness in data center networks
Soojeon Lee, Myungjin Lee, Dongman Lee, Hyungsoo Jung, Byoung-Sun Lee
|
TCPRand: Randomizing TCP payload size for TCP fairness in data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
Rate alteration attacks in smart grid
Subhankar Mishra, Xiang Li, Alan Kuhnle, My T. Thai, Jungtaek Seo
|
Rate alteration attacks in smart grid
Details
|
|
Verification:
Authors have
not verified
information
|
On optimal diversity in network-coding-based routing in wireless networks
Qiao Xiang, Hongwei Zhang, Jianping Wang, Guoliang Xing, Shan Lin, Xue Liu
|
On optimal diversity in network-coding-based routing in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
VINCE: Exploiting visible light sensing for smartphone-based NFC systems
Jianwei Niu, Fei Gu, Ruogu Zhou, Guoliang Xing, Wei Xiang
|
VINCE: Exploiting visible light sensing for smartphone-based NFC systems
Details
|
|
Verification:
Authors have
not verified
information
|
RUSH: Routing and scheduling for hybrid data center networks
Kai Han, Zhiming Hu, Jun Luo, Liu Xiang
|
RUSH: Routing and scheduling for hybrid data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed network resource allocation for multi-tiered multimedia applications
Georgios Tychogiorgos, Athanasios Gkelias, Kin K. Leung
|
Distributed network resource allocation for multi-tiered multimedia applications
Details
|
|
Verification:
Authors have
not verified
information
|
Resisting three-dimensional manipulations in distributed wireless spectrum auctions
Dan Peng, Shuo Yang, Fan Wu, Guihai Chen, Shaojie Tang, Tie Luo
|
Resisting three-dimensional manipulations in distributed wireless spectrum auctions
Details
|
|
Verification:
Authors have
not verified
information
|
Reliable multicast routing for software-defined networks
Shan-Hsiang Shen, Liang-Hao Huang, De-Nian Yang, Wen-Tsuen Chen
|
Reliable multicast routing for software-defined networks
Details
|
|
Verification:
Authors have
not verified
information
|
Crowdsourcing with Tullock contests: A new perspective
Tie Luo, Salil S. Kanhere, Hwee-Pink Tan, Fan Wu, Hongyi Wu
|
Crowdsourcing with Tullock contests: A new perspective
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Scaling wireless full-duplex in multi-cell networks
Mohammad Amir Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Mohammad Farajzadeh-Tehrani
|
Scaling wireless full-duplex in multi-cell networks
Details
|
|
Verification:
Authors have
not verified
information
|
Convergence properties of general network selection games
Ehsan Monsef, Alireza Keshavarz-Haddad, Ehsan Aryafar, Jafar Saniie, Mung Chiang
|
Convergence properties of general network selection games
Details
|
|
Verification:
Authors have
not verified
information
|
AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication
Yucheng Zhang, Hong Jiang, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yukun Zhou
|
AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication
Details
|
|
Verification:
Authors have
not verified
information
|
Mitigating macro-cell outage in LTE-Advanced deployments
Rajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Prasant Mohapatra
|
Mitigating macro-cell outage in LTE-Advanced deployments
Details
|
|
Verification:
Authors have
not verified
information
|
Compact location encodings for scalable Internet routing
Feng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa
|
Compact location encodings for scalable Internet routing
Details
|
|
Verification:
Authors have
not verified
information
|
Bridging link power asymmetry in mobile whitespace networks
Sanjib Sur, Xinyu Zhang
|
Bridging link power asymmetry in mobile whitespace networks
Details
|
|
Verification:
Authors have
not verified
information
|
A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition
Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Yaolin Jiang
|
A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition
Details
|
|
Verification:
Authors have
not verified
information
|
SEISA: Secure and efficient encrypted image search with access control
Jiawei Yuan, Shucheng Yu, Linke Guo
|
SEISA: Secure and efficient encrypted image search with access control
Details
|
|
Verification:
Authors have
not verified
information
|
Sequential and adaptive sampling for matrix completion in network monitoring systems
Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Guangxing Zhang, Dongliang Xie, Jigang Wen
|
Sequential and adaptive sampling for matrix completion in network monitoring systems
Details
|
|
Verification:
Authors have
not verified
information
|
A measurement study on TCP behaviors in HSPA+ networks on high-speed rails
Li Li, Ke Xu, Dan Wang, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi
|
A measurement study on TCP behaviors in HSPA+ networks on high-speed rails
Details
|
|
Verification:
Authors have
not verified
information
|
Improved rendezvous algorithms for heterogeneous cognitive radio networks
Zhaoquan Gu, Haosen Pu, Qiang-Sheng Hua, Francis C. M. Lau
|
Improved rendezvous algorithms for heterogeneous cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-task assignment for crowdsensing in mobile social networks
Mingjun Xiao, Jie Wu, Liusheng Huang, Yunsheng Wang, Cong Liu
|
Multi-task assignment for crowdsensing in mobile social networks
Details
|
|
Verification:
Authors have
not verified
information
|
On the universality of age-based scheduling in wireless networks
Bin Li, Atilla Eryilmaz, R. Srikant
|
On the universality of age-based scheduling in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Modeling link correlation in low-power wireless networks
Zhiwei Zhao, Wei Dong, Gaoyang Guan, Jiajun Bu, Tao Gu, Chun Chen
|
Modeling link correlation in low-power wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cliques in hyperbolic random graphs
Tobias Friedrich, Anton Krohmer
|
Cliques in hyperbolic random graphs
Details
|
|
Verification:
Authors have
not verified
information
|
Near optimal placement of virtual network functions
Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz
|
Near optimal placement of virtual network functions
Details
|
|
Verification:
Authors have
not verified
information
|
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee
Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou
|
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee
Details
|
|
Verification:
Authors have
not verified
information
|
AirShare: Distributed coherent transmission made seamless
Omid Abari, Hariharan Rahul, Dina Katabi, Mondira Pant
|
AirShare: Distributed coherent transmission made seamless
Details
|
|
Verification:
Authors have
not verified
information
|
Measuring the mixing time of a network
Xenofon Foukas, Antonio Carzaniga, Alexander L. Wolf
|
Measuring the mixing time of a network
Details
|
|
Verification:
Authors have
not verified
information
|
Local face-view barrier coverage in camera sensor networks
Zuoming Yu, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan
|
Local face-view barrier coverage in camera sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Policy-compliant path diversity and bisection bandwidth
Rowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas A. Dimitropoulos
|
Policy-compliant path diversity and bisection bandwidth
Details
|
|
Verification:
Authors have
not verified
information
|
FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloading
Hamzeh Beyranvand, Martin Lévesque, Martin Maier, Jawad A. Salehi
|
FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloading
Details
|
|
Verification:
Authors have
not verified
information
|
On heterogeneous neighbor discovery in wireless sensor networks
Lin Chen, Ruolin Fan, Kaigui Bian, Lin Chen, Mario Gerla, Tao Wang, Xiaoming Li
|
On heterogeneous neighbor discovery in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffers
Sucha Supittayapornpong, Michael J. Neely
|
Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffers
Details
|
|
Verification:
Authors have
not verified
information
|
A new upper bound on the control information required in multiple access communications
Jie Chuai, Victor O. K. Li
|
A new upper bound on the control information required in multiple access communications
Details
|
|
Verification:
Authors have
not verified
information
|
Throughput-optimal broadcast on directed acyclic graphs
Abhishek Sinha, Georgios S. Paschos, Chih-Ping Li, Eytan Modiano
|
Throughput-optimal broadcast on directed acyclic graphs
Details
|
|
Verification:
Authors have
not verified
information
|
On factors affecting the usage and adoption of a nation-wide TV streaming service
Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria
|
On factors affecting the usage and adoption of a nation-wide TV streaming service
Details
|
|
Verification:
Authors have
not verified
information
|
Around the web in six weeks: Documenting a large-scale crawl
Sarker Tanzir Ahmed, Clint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov
|
Around the web in six weeks: Documenting a large-scale crawl
Details
|
|
Verification:
Authors have
not verified
information
|
Dancing with light: Predictive in-frame rate selection for visible light networks
Jialiang Zhang, Xinyu Zhang, Gang Wu
|
Dancing with light: Predictive in-frame rate selection for visible light networks
Details
|
|
Verification:
Authors have
not verified
information
|
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices
Helei Cui, Xingliang Yuan, Cong Wang
|
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Rapier: Integrating routing and scheduling for coflow-aware data center networks
Yangming Zhao, Kai Chen, Wei Bai, Minlan Yu, Chen Tian, Yanhui Geng, Yiming Zhang, Dan Li, Sheng Wang
|
Rapier: Integrating routing and scheduling for coflow-aware data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen
|
Fine-grained sleep monitoring: Hearing your breathing with smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Optimization for speculative execution in a MapReduce-like cluster
Huanle Xu, Wing Cheong Lau
|
Optimization for speculative execution in a MapReduce-like cluster
Details
|
|
Verification:
Authors have
not verified
information
|
Provably delay efficient data retrieving in storage clouds
Yin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff
|
Provably delay efficient data retrieving in storage clouds
Details
|
|
Verification:
Authors have
not verified
information
|
Drawing dominant dataset from big sensory data in wireless sensor networks
Siyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang
|
Drawing dominant dataset from big sensory data in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensing
Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni
|
Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensing
Details
|
|
Verification:
Authors have
not verified
information
|
Code offload with least context migration in the mobile cloud
Yong Li, Wei Gao
|
Code offload with least context migration in the mobile cloud
Details
|
|
Verification:
Authors have
not verified
information
|
HySIM: A hybrid spectrum and information market for TV white space networks
Yuan Luo, Lin Gao, Jianwei Huang
|
HySIM: A hybrid spectrum and information market for TV white space networks
Details
|
|
Verification:
Authors have
not verified
information
|
Automatic generation of mobile app signatures from traffic observations
Qiang Xu, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci, Thomas Andrews
|
Automatic generation of mobile app signatures from traffic observations
Details
|
|
Verification:
Authors have
not verified
information
|
StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters
Yanfei Guo, Jia Rao, Dazhao Cheng, Changjun Jiang, Cheng-Zhong Xu, Xiaobo Zhou
|
StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters
Details
|
|
Verification:
Authors have
not verified
information
|
How bad are the rogues' impact on enterprise 802.11 network performance?
Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li
|
How bad are the rogues' impact on enterprise 802.11 network performance?
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic defense strategy against advanced persistent threat with insiders
Pengfei Hu, Hongxing Li, Hao Fu, Derya Cansever, Prasant Mohapatra
|
Dynamic defense strategy against advanced persistent threat with insiders
Details
|
|
Verification:
Authors have
not verified
information
|
Work capacity of freelance markets: Fundamental limits and decentralized schemes
Avhishek Chatterjee, Lav R. Varshney, Sriram Vishwanath
|
Work capacity of freelance markets: Fundamental limits and decentralized schemes
Details
|
|
Verification:
Authors have
not verified
information
|
ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environment
Okhwan Lee, Weiping Sun, Jihoon Kim, Hyuk Lee, Bo Ryu, Jungwoo Lee, Sunghyun Choi
|
ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environment
Details
|
|
Verification:
Authors have
not verified
information
|
Enhancing reliability and response times via replication in computing clusters
Zhan Qiu, Juan F. Pérez
|
Enhancing reliability and response times via replication in computing clusters
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal scheduling for jobs with progressive deadlines
Kristen Gardner, Sem C. Borst, Mor Harchol-Balter
|
Optimal scheduling for jobs with progressive deadlines
Details
|
|
Verification:
Authors have
not verified
information
|
Leveraging traffic repetitions for high-speed deep packet inspection
Anat Bremler-Barr, Shimrit Tzur-David, Yotam Harchol, David Hay
|
Leveraging traffic repetitions for high-speed deep packet inspection
Details
|
|
Verification:
Authors have
not verified
information
|
GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance
Andrés J. Gonzalez, Bjarne E. Helvik, Prakriti Tiwari, Denis M. Becker, Otto J. Wittner
|
GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance
Details
|
|
Verification:
Authors have
not verified
information
|
Complexities in Internet peering: Understanding the "Black" in the "Black Art"
Aemen Lodhi, Nikolaos Laoutaris, Amogh Dhamdhere, Constantine Dovrolis
|
Complexities in Internet peering: Understanding the "Black" in the "Black Art"
Details
|
|
Verification:
Authors have
not verified
information
|
Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships
Lei Yang, Pai Peng, Fan Dang, Cheng Wang, Xiang-Yang Li, Yunhao Liu
|
Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships
Details
|
|
Verification:
Authors have
not verified
information
|
Network-side positioning of cellular-band devices with minimal effort
Ayon Chakraborty, Luis E. Ortiz, Samir R. Das
|
Network-side positioning of cellular-band devices with minimal effort
Details
|
|
Verification:
Authors have
not verified
information
|
Formation games of reliable networks
Eli A. Meirom, Shie Mannor, Ariel Orda
|
Formation games of reliable networks
Details
|
|
Verification:
Authors have
not verified
information
|
A fistful of pings: Accurate and lightweight anycast enumeration and geolocation
Danilo Cicalese, Diana Joumblatt, Dario Rossi, Marc-Olivier Buob, Jordan Augé, Timur Friedman
|
A fistful of pings: Accurate and lightweight anycast enumeration and geolocation
Details
|
|
Author Comments:
The paper [INFOCOM-15] introduces iGreedy, a methodology for anycast detection, enumeration and geolocation. We make code, dataseta and ground truth available at the above website. Particularlt, results of a thorough validation campaign based on available ground truth (several DNS root servers and CDNs), using multiple measurement infrastructures (PlanetLab, RIPE), introduced in [INFOCOM-15], thorougly analyzed in [JSAC-16] and exhaustively analyzed in [TECHREP-16]) are available.
We point out that subsequent research [CoNEXT'15] applied the technique [INFOCOM'15] to the whole Internet, providing the first complete census of IPv4 anycast Internet. Datasets for the censuses are available at the above website as well.
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Incentivizing sharing in realtime D2D streaming networks: A mean field game perspective
Jian Li, Rajarshi Bhattacharyya, Suman Paul, Srinivas Shakkottai, Vijay Subramanian
|
Incentivizing sharing in realtime D2D streaming networks: A mean field game perspective
Details
|
|
Verification:
Authors have
not verified
information
|
Financial analysis of 4G network deployment
Yanjiao Chen, Lingjie Duan, Qian Zhang
|
Financial analysis of 4G network deployment
Details
|
|
Verification:
Authors have
not verified
information
|
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis
Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou
|
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis
Details
|
|
Verification:
Authors have
not verified
information
|
Enhancing privacy through caching in location-based services
Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li
|
Enhancing privacy through caching in location-based services
Details
|
|
Verification:
Authors have
not verified
information
|
The power of slightly more than one sample in randomized load balancing
Lei Ying, R. Srikant, Xiaohan Kang
|
The power of slightly more than one sample in randomized load balancing
Details
|
|
Verification:
Authors have
not verified
information
|