RAM: Radar-based activity monitor
Md Abdullah Al Hafiz Khan, Ruthvik Kukkapalli, Piyush Waradpande, Sekar Kulandaivel, Nilanjan Banerjee, Nirmalya Roy, Ryan Robucci
|
RAM: Radar-based activity monitor
Details
|
|
Verification:
Authors have
not verified
information
|
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems
Thierry Titcheu Chekam, Ennan Zhai, Zhenhua Li, Yong Cui, Kui Ren
|
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-source variable-rate sampled signal reconstructions in vehicular CPS
Andrew Fox, B. V. K. Vijaya Kumar, Fan Bai
|
Multi-source variable-rate sampled signal reconstructions in vehicular CPS
Details
|
|
Verification:
Authors have
not verified
information
|
A utility optimization approach to network cache design
Mostafa Dehghan, Laurent Massoulié, Don Towsley, Daniel S. Menasché, Y. C. Tay
|
A utility optimization approach to network cache design
Details
|
|
Verification:
Authors have
not verified
information
|
BOOST: Base station ON-OFF switching strategy for energy efficient massive MIMO HetNets
Mingjie Feng, Shiwen Mao, Tao Jiang
|
BOOST: Base station ON-OFF switching strategy for energy efficient massive MIMO HetNets
Details
|
|
Verification:
Authors have
not verified
information
|
Detecting and localizing end-to-end performance degradation for cellular data services
Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan
|
Detecting and localizing end-to-end performance degradation for cellular data services
Details
|
|
Verification:
Authors have
not verified
information
|
Sneak-Peek: High speed covert channels in data center networks
Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash
|
Sneak-Peek: High speed covert channels in data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
Profit maximization for multiple products in online social networks
Huiyuan Zhang, Huiling Zhang, Alan Kuhnle, My T. Thai
|
Profit maximization for multiple products in online social networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cooperative data offloading in opportunistic mobile networks
Zongqing Lu, Xiao Sun, Thomas F. La Porta
|
Cooperative data offloading in opportunistic mobile networks
Details
|
|
Verification:
Authors have
not verified
information
|
Placing dynamic content in caches with small population
Mathieu Leconte, Georgios S. Paschos, Lazaros Gkatzikis, Moez Draief, Spyridon Vassilaras, Symeon Chouvardas
|
Placing dynamic content in caches with small population
Details
|
|
Verification:
Authors have
not verified
information
|
DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks
Xueshu Zheng, Shuailing Yang, Naigao Jin, Lei Wang, Mathew L. Wymore, Daji Qiao
|
DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
QoE matters more than QoS: Why people stop watching cat videos
Hyunwoo Nam, Kyung-Hwa Kim, Henning Schulzrinne
|
QoE matters more than QoS: Why people stop watching cat videos
Details
|
|
Verification:
Authors have
not verified
information
|
Measurement-based flow characterization in centrally controlled networks
Zdravko Bozakov, Amr Rizk, Divyashri Bhat, Michael Zink
|
Measurement-based flow characterization in centrally controlled networks
Details
|
|
Verification:
Authors have
not verified
information
|
Survivability in time-varying networks
Qingkai Liang, Eytan Modiano
|
Survivability in time-varying networks
Details
|
|
Verification:
Authors have
not verified
information
|
Understanding sharded caching systems
Lorenzo Saino, Ioannis Psaras, George Pavlou
|
Understanding sharded caching systems
Details
|
|
Verification:
Authors have
not verified
information
|
Inductive coloring: Implementing basic communication primitives with Rayleigh-fading interference
Yuexuan Wang, Dongxiao Yu, Qipeng Liu, Francis C. M. Lau
|
Inductive coloring: Implementing basic communication primitives with Rayleigh-fading interference
Details
|
|
Verification:
Authors have
not verified
information
|
Side-channel information leakage of encrypted video stream in video surveillance systems
Hong Li, Yunhua He, Limin Sun, Xiuzhen Cheng, Jiguo Yu
|
Side-channel information leakage of encrypted video stream in video surveillance systems
Details
|
|
Verification:
Authors have
not verified
information
|
Streaming big data meets backpressure in distributed network computation
Apostolos Destounis, Georgios S. Paschos, Iordanis Koutsopoulos
|
Streaming big data meets backpressure in distributed network computation
Details
|
|
Verification:
Authors have
not verified
information
|
Tracker-assisted rate adaptation for MPEG DASH live streaming
Andrea Detti, Bruno Ricci, Nicola Blefari-Melazzi
|
Tracker-assisted rate adaptation for MPEG DASH live streaming
Details
|
|
Verification:
Authors have
not verified
information
|
Reducing dense virtual networks for fast embedding
Toru Mano, Takeru Inoue, Kimihiro Mizutani, Osamu Akashi
|
Reducing dense virtual networks for fast embedding
Details
|
|
Verification:
Authors have
not verified
information
|
Graph-based privacy-preserving data publication
Xiang-Yang Li, Chunhong Zhang, Taeho Jung, Jianwei Qian, Linlin Chen
|
Graph-based privacy-preserving data publication
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-view coding and routing of local features in Visual Sensor Networks
Alessandro Enrico Redondi, Luca Baroffio, Matteo Cesana, Marco Tagliasacchi
|
Multi-view coding and routing of local features in Visual Sensor Networks
Details
|
|
Verification:
Authors have
not verified
information
|
Detecting driver phone calls in a moving vehicle based on voice features
Tianyi Song, Xiuzhen Cheng, Hongjuan Li, Jiguo Yu, Shengling Wang, Rongfang Bie
|
Detecting driver phone calls in a moving vehicle based on voice features
Details
|
|
Verification:
Authors have
not verified
information
|
Efficiency and optimality of largest deficit first prioritization: Resource allocation for real-time applications
Yuhuan Du, Gustavo de Veciana
|
Efficiency and optimality of largest deficit first prioritization: Resource allocation for real-time applications
Details
|
|
Verification:
Authors have
not verified
information
|
On demand elastic capacity planning for service auto-scaling
Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan
|
On demand elastic capacity planning for service auto-scaling
Details
|
|
Verification:
Authors have
not verified
information
|
A decomposition principle for link and relay selection in dual-hop 60 GHz networks
Zhifeng He, Shiwen Mao
|
A decomposition principle for link and relay selection in dual-hop 60 GHz networks
Details
|
|
Verification:
Authors have
not verified
information
|
How cars talk louder, clearer and fairer: Optimizing the communication performance of connected vehicles via online synchronous control
Xi Chen, Linghe Kong, Xue Liu, Lei Rao, Fan Bai, Qiao Xiang
|
How cars talk louder, clearer and fairer: Optimizing the communication performance of connected vehicles via online synchronous control
Details
|
|
Verification:
Authors have
not verified
information
|
Macro-scale mobile app market analysis using customized hierarchical categorization
Xi Liu, Han Hee Song, Mario Baldi, Pang-Ning Tan
|
Macro-scale mobile app market analysis using customized hierarchical categorization
Details
|
|
Verification:
Authors have
not verified
information
|
The S-Aloha capacity: Beyond the e-1 myth
Luca Barletta, Flaminio Borgonovo, Ilario Filippini
|
The S-Aloha capacity: Beyond the e-1 myth
Details
|
|
Verification:
Authors have
not verified
information
|
Randomized algorithms for scheduling VMs in the cloud
Javad Ghaderi
|
Randomized algorithms for scheduling VMs in the cloud
Details
|
|
Verification:
Author has
not verified
information
|
When group-buying meets cloud computing
Juntao Wang, Xun Xiao, Jianping Wang, Kejie Lu, Xiaotie Deng, Ashwin Gumaste
|
When group-buying meets cloud computing
Details
|
|
Verification:
Authors have
not verified
information
|
Task allocation for distributed stream processing
Raphael Eidenbenz, Thomas Locher
|
Task allocation for distributed stream processing
Details
|
|
Verification:
Authors have
not verified
information
|
Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcing
Lingjun Pu, Xu Chen, Jingdong Xu, Xiaoming Fu
|
Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcing
Details
|
|
Verification:
Authors have
not verified
information
|
Incentivizing spectrum sensing in database-driven dynamic spectrum sharing
Bo Gao, Sudeep Bhattarai, Jung-Min "Jerry" Park, Yaling Yang, Min Liu, Kexiong Curtis Zeng, Yanzhi Dou
|
Incentivizing spectrum sensing in database-driven dynamic spectrum sharing
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling for cloud-based computing systems to support soft real-time applications
Yuhuan Du, Gustavo de Veciana
|
Scheduling for cloud-based computing systems to support soft real-time applications
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design
Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao
|
Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design
Details
|
|
Verification:
Authors have
not verified
information
|
Opportunistic WiFi offloading in a vehicular environment: Waiting or downloading now?
Ning Wang, Jie Wu
|
Opportunistic WiFi offloading in a vehicular environment: Waiting or downloading now?
Details
|
|
Verification:
Authors have
not verified
information
|
Mosaic: A low-cost mobile sensing system for urban air quality monitoring
Yi Gao, Wei Dong, Kai Guo, Xue Liu, Yuan Chen, Xiaojin Liu, Jiajun Bu, Chun Chen
|
Mosaic: A low-cost mobile sensing system for urban air quality monitoring
Details
|
|
Verification:
Authors have
not verified
information
|
Oblivious neighbor discovery for wireless devices with directional antennas
Lin Chen, Yong Li, Athanasios V. Vasilakos
|
Oblivious neighbor discovery for wireless devices with directional antennas
Details
|
|
Verification:
Authors have
not verified
information
|
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen
|
Is every flow on the right track?: Inspect SDN forwarding with RuleScope
Details
|
|
Verification:
Authors have
not verified
information
|
On the modeling and optimization of short-term performance for real-time wireless networks
I-Hong Hou
|
On the modeling and optimization of short-term performance for real-time wireless networks
Details
|
|
Verification:
Author has
not verified
information
|
AMIL: Localizing neighboring mobile devices through a simple gesture
Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak
|
AMIL: Localizing neighboring mobile devices through a simple gesture
Details
|
|
Verification:
Authors have
not verified
information
|
CASE: Cache-assisted stretchable estimator for high speed per-flow measurement
Yang Li, Hao Wu, Tian Pan, Huichen Dai, Jianyuan Lu, Bin Liu
|
CASE: Cache-assisted stretchable estimator for high speed per-flow measurement
Details
|
|
Verification:
Authors have
not verified
information
|
Providing bandwidth guarantees, work conservation and low latency simultaneously in the cloud
Shuihai Hu, Wei Bai, Kai Chen, Chen Tian, Ying Zhang, Haitao Wu
|
Providing bandwidth guarantees, work conservation and low latency simultaneously in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Spice: Socially-driven learning-based mobile media prefetching
Chao Wu, Xu Chen, Yuezhi Zhou, Ningyuan Li, Xiaoming Fu, Yaoxue Zhang
|
Spice: Socially-driven learning-based mobile media prefetching
Details
|
|
Verification:
Authors have
not verified
information
|
HybridCell: Cellular connectivity on the fringes with demand-driven local cells
Paul Schmitt, Daniel Iland, Mariya Zheleva, Elizabeth M. Belding
|
HybridCell: Cellular connectivity on the fringes with demand-driven local cells
Details
|
|
Verification:
Authors have
not verified
information
|
Sketch-based data placement among geo-distributed datacenters for cloud storages
Boyang Yu, Jianping Pan
|
Sketch-based data placement among geo-distributed datacenters for cloud storages
Details
|
|
Verification:
Authors have
not verified
information
|
Social learning networks: Efficiency optimization for MOOC forums
Christopher G. Brinton, Swapna Buccapatnam, Felix Ming Fai Wong, Mung Chiang, H. Vincent Poor
|
Social learning networks: Efficiency optimization for MOOC forums
Details
|
|
Verification:
Authors have
not verified
information
|
Cupid: Congestion-free consistent data plane update in software defined networks
Wen Wang, Wenbo He, Jinshu Su, Yixin Chen
|
Cupid: Congestion-free consistent data plane update in software defined networks
Details
|
|
Verification:
Authors have
not verified
information
|
Privacy-preserving crowdsourced spectrum sensing
Xiaocong Jin, Yanchao Zhang
|
Privacy-preserving crowdsourced spectrum sensing
Details
|
|
Verification:
Authors have
not verified
information
|
Wanda: Securely introducing mobile devices
Timothy J. Pierson, Xiaohui Liang, Ronald A. Peterson, David Kotz
|
Wanda: Securely introducing mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
MaxWeight scheduling: "Smoothness" of the service process
Rahul Singh, Alexander L. Stolyar
|
MaxWeight scheduling: "Smoothness" of the service process
Details
|
|
Verification:
Authors have
not verified
information
|
Software defined networks: It's about time
Tal Mizrahi, Yoram Moses
|
Software defined networks: It's about time
Details
|
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Dynamic control channel MAC for underwater cognitive acoustic networks
Yu Luo, Lina Pu, Zheng Peng, Jun-Hong Cui
|
Dynamic control channel MAC for underwater cognitive acoustic networks
Details
|
|
Verification:
Authors have
not verified
information
|
Pulses in the sand: Impulse response analysis of wireless underground channel
Abdul Salam, Mehmet Can Vuran, Suat Irmak
|
Pulses in the sand: Impulse response analysis of wireless underground channel
Details
|
|
Verification:
Authors have
not verified
information
|
Decoding interfering signals with fewer receiving antennas
Zhao Li, Xiaoqin Dai, Kang G. Shin
|
Decoding interfering signals with fewer receiving antennas
Details
|
|
Verification:
Authors have
not verified
information
|
Panda: Neighbor discovery on a power harvesting budget
Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman
|
Panda: Neighbor discovery on a power harvesting budget
Details
|
|
Verification:
Authors have
not verified
information
|
T-Update: A tree-structured update scheme with top-down transmission in erasure-coded systems
Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu
|
T-Update: A tree-structured update scheme with top-down transmission in erasure-coded systems
Details
|
|
Verification:
Authors have
not verified
information
|
To delay or not: Temporal vaccination games on networks
Abhijin Adiga, Srini Venkat, Anil Vullikanti
|
To delay or not: Temporal vaccination games on networks
Details
|
|
Verification:
Authors have
not verified
information
|
Kraken: Online and elastic resource reservations for multi-tenant datacenters
Carlo Fuerst, Stefan Schmid, P. Lalith Suresh, Paolo Costa
|
Kraken: Online and elastic resource reservations for multi-tenant datacenters
Details
|
|
Verification:
Authors have
not verified
information
|
Rapid convergence versus policy expressiveness in interdomain routing
Alexander J. T. Gurney, Sanjeev Khanna, Yang Li
|
Rapid convergence versus policy expressiveness in interdomain routing
Details
|
|
Verification:
Authors have
not verified
information
|
Localization of LTE measurement records with missing information
Avik Ray, Supratim Deb, Pantelis Monogioudis
|
Localization of LTE measurement records with missing information
Details
|
|
Verification:
Authors have
not verified
information
|
Towards efficient content-aware search over encrypted outsourced data in cloud
Zhangjie Fu, Xingming Sun, Sai Ji, Guowu Xie
|
Towards efficient content-aware search over encrypted outsourced data in cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Estimation method for the delay performance of closed-loop flow control with application to TCP
Ralf Lübben, Markus Fidler
|
Estimation method for the delay performance of closed-loop flow control with application to TCP
Details
|
|
Verification:
Authors have
not verified
information
|
A unified framework for automatic quality-of-experience optimization in mobile video streaming
Yan Liu, Jack Y. B. Lee
|
A unified framework for automatic quality-of-experience optimization in mobile video streaming
Details
|
|
Verification:
Authors have
not verified
information
|
Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests
Adriano Di Luzio, Alessandro Mei, Julinda Stefa
|
Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests
Details
|
|
Verification:
Authors have
not verified
information
|
SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics
Ming Li, Dejun Yang, Jian Lin, Ming Li, Jian Tang
|
SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics
Details
|
|
Verification:
Authors have
not verified
information
|
Aggregation points planning for software-defined network based smart grid communications
Shaowei Wang, Xinxin Huang
|
Aggregation points planning for software-defined network based smart grid communications
Details
|
|
Verification:
Authors have
not verified
information
|
Variability-aware request replication for latency curtailment
Zhan Qiu, Juan F. Pérez, Peter G. Harrison
|
Variability-aware request replication for latency curtailment
Details
|
|
Verification:
Authors have
not verified
information
|
DualSync: Taming clock skew variation for synchronization in low-power wireless networks
Meng Jin, Tianzhang Xing, Xiaojiang Chen, Xin Meng, Dingyi Fang, Yuan He
|
DualSync: Taming clock skew variation for synchronization in low-power wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
CeilingCast: Energy efficient and location-bound broadcast through LED-camera communication
Jie Hao, Yanbing Yang, Jun Luo
|
CeilingCast: Energy efficient and location-bound broadcast through LED-camera communication
Details
|
|
Verification:
Authors have
not verified
information
|
Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel
Mostafa Izz, Zhong Yuan Li, Hongbo Liu, Yingying Chen, Feng Li
|
Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel
Details
|
|
Verification:
Authors have
not verified
information
|
Ubiquitous tagless object locating with ambient harmonic tags
Yunfei Ma, Edwin C. Kan
|
Ubiquitous tagless object locating with ambient harmonic tags
Details
|
|
Verification:
Authors have
not verified
information
|
Leveraging wearables for steering and driver tracking
Çagdas Karatas, Luyang Liu, Hongyu Li, Jian Liu, Yan Wang, Sheng Tan, Jie Yang, Yingying Chen, Marco Gruteser, Richard P. Martin
|
Leveraging wearables for steering and driver tracking
Details
|
|
Verification:
Authors have
not verified
information
|
Hybrid renewable energy routing for ISP networks
Julien Mineraud, Liang Wang, Sasitharan Balasubramaniam, Jussi Kangasharju
|
Hybrid renewable energy routing for ISP networks
Details
|
|
Verification:
Authors have
not verified
information
|
FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings
Jingyu Hua, Xin Ge, Sheng Zhong
|
FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings
Details
|
|
Verification:
Authors have
not verified
information
|
Blending on-demand and spot instances to lower costs for in-memory storage
Zichen Xu, Christopher Stewart, Nan Deng, Xiaorui Wang
|
Blending on-demand and spot instances to lower costs for in-memory storage
Details
|
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
One of the first few papers on studying cost-efficient data services on IaaS with specific constraints
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Random access signaling for network MIMO uplink
Teng Wei, Xinyu Zhang
|
Random access signaling for network MIMO uplink
Details
|
|
Verification:
Authors have
not verified
information
|
NetCodCCN: A network coding approach for content-centric networks
Jonnahtan Saltarin, Eirina Bourtsoulatze, Nikolaos Thomos, Torsten Braun
|
NetCodCCN: A network coding approach for content-centric networks
Details
|
|
Verification:
Authors have
not verified
information
|
Topology optimization for galvanic coupled wireless intra-body communication
Meenupriya Swaminathan, Ufuk Muncuk, Kaushik R. Chowdhury
|
Topology optimization for galvanic coupled wireless intra-body communication
Details
|
|
Author Comments:
This paper presents a comprehensive analysis of the communication link lengths inside body and the energy consumption given the tissue, in which the implant is embedded in. Multiple factors including the node density, distribution, topology, cluster size and battery levels are incorporated in the analysis.
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Optimizing coflow completion times with utility max-min fairness
Li Chen, Wei Cui, Baochun Li, Bo Li
|
Optimizing coflow completion times with utility max-min fairness
Details
|
|
Verification:
Authors have
not verified
information
|
Economics of public Wi-Fi monetization and advertising
Haoran Yu, Man Hon Cheung, Lin Gao, Jianwei Huang
|
Economics of public Wi-Fi monetization and advertising
Details
|
|
Verification:
Authors have
not verified
information
|
Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channels
Ping-Chun Hsieh, I-Hong Hou
|
Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channels
Details
|
|
Verification:
Authors have
not verified
information
|
Using crowdsourced data in location-based social networks to explore influence maximization
Ji Li, Zhipeng Cai, Mingyuan Yan, Yingshu Li
|
Using crowdsourced data in location-based social networks to explore influence maximization
Details
|
|
Verification:
Authors have
not verified
information
|
Contextual, flow-based access control with scalable host-based SDN techniques
Curtis R. Taylor, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue
|
Contextual, flow-based access control with scalable host-based SDN techniques
Details
|
|
Verification:
Authors have
not verified
information
|
Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic
Gyan Ranjan, Alok Tongaonkar, Ruben Torres
|
Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient and flexible crowdsourcing of specialized tasks with precedence constraints
Avhishek Chatterjee, Michael Borokhovich, Lav R. Varshney, Sriram Vishwanath
|
Efficient and flexible crowdsourcing of specialized tasks with precedence constraints
Details
|
|
Verification:
Authors have
not verified
information
|
Quality of video oriented pricing incentive for mobile video offloading
Honghai Wu, Liang Liu, Xi Zhang, Huadong Ma
|
Quality of video oriented pricing incentive for mobile video offloading
Details
|
|
Verification:
Authors have
not verified
information
|
Mean-field-analysis of coding versus replication in cloud storage systems
Bin Li, Aditya Ramamoorthy, R. Srikant
|
Mean-field-analysis of coding versus replication in cloud storage systems
Details
|
|
Verification:
Authors have
not verified
information
|
Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter
Dong Wang, Zhenyu Li, Gaogang Xie, Mohamed Ali Kâafar, Kavé Salamatian
|
Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter
Details
|
|
Verification:
Authors have
not verified
information
|
Interference-aware time-based fairness for multihop wireless networks
Douglas M. Blough, Giovanni Resta, Paolo Santi
|
Interference-aware time-based fairness for multihop wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
TDS: Time-dependent sponsored data plan for wireless data traffic market
Liang Zhang, Weijie Wu, Dan Wang
|
TDS: Time-dependent sponsored data plan for wireless data traffic market
Details
|
|
Verification:
Authors have
not verified
information
|
Battery-free sensing platform for wearable devices: The synergy between two feet
Qianyi Huang, Yan Mei, Wei Wang, Qian Zhang
|
Battery-free sensing platform for wearable devices: The synergy between two feet
Details
|
|
Verification:
Authors have
not verified
information
|
Modeling, performance analysis, and optimization of single hop IEEE 802.11 networks with large propagation delays: Challenges and solutions
Abhijit Bhattacharya, Anurag Kumar
|
Modeling, performance analysis, and optimization of single hop IEEE 802.11 networks with large propagation delays: Challenges and solutions
Details
|
|
Verification:
Authors have
not verified
information
|
Price-based friendly jamming in a MISO interference wiretap channel
Peyman Siyari, Marwan Krunz, Diep N. Nguyen
|
Price-based friendly jamming in a MISO interference wiretap channel
Details
|
|
Verification:
Authors have
not verified
information
|
On consistent migration of flows in SDNs
Sebastian Brandt, Klaus-Tycho Förster, Roger Wattenhofer
|
On consistent migration of flows in SDNs
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Characterizing caching workload of a large commercial Content Delivery Network
M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu
|
Characterizing caching workload of a large commercial Content Delivery Network
Details
|
|
Verification:
Authors have
not verified
information
|
OPTAS: Decentralized flow monitoring and scheduling for tiny tasks
Ziyang Li, Yiming Zhang, Dongsheng Li, Kai Chen, Yuxing Peng
|
OPTAS: Decentralized flow monitoring and scheduling for tiny tasks
Details
|
|
Verification:
Authors have
not verified
information
|
Synergistic policy and virtual machine consolidation in cloud data centers
Lin Cui, Richard Cziva, Fung Po Tso, Dimitrios P. Pezaros
|
Synergistic policy and virtual machine consolidation in cloud data centers
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal wireless power transfer scheduling for delay minimization
Feng Shan, Junzhou Luo, Weiwei Wu, Xiaojun Shen
|
Optimal wireless power transfer scheduling for delay minimization
Details
|
|
Verification:
Authors have
not verified
information
|
Jamming attack on in-band full-duplex communications: Detection and countermeasures
Manjesh Kumar Hanawal, Diep N. Nguyen, Marwan Krunz
|
Jamming attack on in-band full-duplex communications: Detection and countermeasures
Details
|
|
Verification:
Authors have
not verified
information
|
Revisiting congestion control for multipath TCP with shared bottleneck detection
Simone Ferlin, Özgü Alay, Thomas Dreibholz, David A. Hayes, Michael Welzl
|
Revisiting congestion control for multipath TCP with shared bottleneck detection
Details
|
|
Author Comments:
The code made available above relates to the IETF draft version in the paper. As of today, the draft version is different and the algorithm had some tweaks. We would also be interested in evaluations using the kernel-based SBD code, part of the same repository, but available on request. Also, larger experiments than those available in the paper with a constructed testbed are of interested for us as well as for the community.
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Traffic at-a-glance: Time-bounded analytics on large visual traffic data
Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan, Biao Chen
|
Traffic at-a-glance: Time-bounded analytics on large visual traffic data
Details
|
|
Verification:
Authors have
not verified
information
|
Resilient multi-user beamforming WLANs: Mobility, interference, and imperfect CSI
Oscar Bejarano, Roger Pierre Fabris Hoefel, Edward W. Knightly
|
Resilient multi-user beamforming WLANs: Mobility, interference, and imperfect CSI
Details
|
|
Verification:
Authors have
not verified
information
|
Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones
Heba Aly, Moustafa Youssef
|
Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones
Details
|
|
Verification:
Authors have
not verified
information
|
Pop-routing: Centrality-based tuning of control messages for faster route convergence
Leonardo Maccari, Renato Lo Cigno
|
Pop-routing: Centrality-based tuning of control messages for faster route convergence
Details
|
|
Verification:
Authors have
not verified
information
|
Compiling packet forwarding rules for switch pipelined architecture
Salaheddine Hamadi, Khalil Blaiech, Petko Valtchev, Omar Cherkaoui, Radu State
|
Compiling packet forwarding rules for switch pipelined architecture
Details
|
|
Verification:
Authors have
not verified
information
|
Optimizing restoration with segment routing
Fang Hao, Murali S. Kodialam, T. V. Lakshman
|
Optimizing restoration with segment routing
Details
|
|
Verification:
Authors have
not verified
information
|
Mobility-aware real-time scheduling for low-power wireless networks
Behnam Dezfouli, Marjan Radi, Octav Chipara
|
Mobility-aware real-time scheduling for low-power wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient Round-Trip Time monitoring in OpenFlow networks
Alon Atary, Anat Bremler-Barr
|
Efficient Round-Trip Time monitoring in OpenFlow networks
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
An SDR-based experimental study of outband D2D communications
Arash Asadi, Vincenzo Mancuso, Rohit Gupta
|
An SDR-based experimental study of outband D2D communications
Details
|
|
Verification:
Authors have
not verified
information
|
Robust monitor placement for network tomography in dynamic networks
Ting He, Liang Ma, Athanasios Gkelias, Kin K. Leung, Ananthram Swami, Don Towsley
|
Robust monitor placement for network tomography in dynamic networks
Details
|
|
Verification:
Authors have
not verified
information
|
Nullification in the air: Interference neutralization in multi-hop wireless networks
Huacheng Zeng, Xu Yuan, Xiaoqi Qin, Yi Shi, Y. Thomas Hou, Wenjing Lou
|
Nullification in the air: Interference neutralization in multi-hop wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Information source detection in networks: Possibility and impossibility results
Kai Zhu, Lei Ying
|
Information source detection in networks: Possibility and impossibility results
Details
|
|
Verification:
Authors have
not verified
information
|
Secure outsourced skyline query processing via untrusted cloud service providers
Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, Shubo Liu
|
Secure outsourced skyline query processing via untrusted cloud service providers
Details
|
|
Verification:
Authors have
not verified
information
|
Engineering traffic uncertainty in the OpenFlow data plane
Fei Chen, Chunming Wu, Xiaoyan Hong, Zhouhao Lu, Zhouhao Wang, Chang-Ting Lin
|
Engineering traffic uncertainty in the OpenFlow data plane
Details
|
|
Verification:
Authors have
not verified
information
|
Practical and secure nearest neighbor search on encrypted large-scale data
Boyang Wang, Yantian Hou, Ming Li
|
Practical and secure nearest neighbor search on encrypted large-scale data
Details
|
|
Verification:
Authors have
not verified
information
|
BD-ZCS: Multi-cell interference coordination via Zadoff-Chu sequence-based block diagonalization
Xueyuan Zhao, Dario Pompili
|
BD-ZCS: Multi-cell interference coordination via Zadoff-Chu sequence-based block diagonalization
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic power allocation in MIMO fading systems without channel distribution information
Hao Yu, Michael J. Neely
|
Dynamic power allocation in MIMO fading systems without channel distribution information
Details
|
|
Verification:
Authors have
not verified
information
|
Incentive mechanism for proximity-based Mobile Crowd Service systems
Honggang Zhang, Benyuan Liu, Hengky Susanto, Guoliang Xue, Tong Sun
|
Incentive mechanism for proximity-based Mobile Crowd Service systems
Details
|
|
Verification:
Authors have
not verified
information
|
Deadline-aware bandwidth sharing by allocating switch buffer in data center networks
Jiao Zhang
|
Deadline-aware bandwidth sharing by allocating switch buffer in data center networks
Details
|
|
Verification:
Author has
not verified
information
|
On signaling power: Communications over wireless energy
Raul Gomez Cid-Fuentes, M. Yousof Naderi, Stefano Basagni, Kaushik R. Chowdhury, Albert Cabellos-Aparicio, Eduard Alarcón
|
On signaling power: Communications over wireless energy
Details
|
|
Verification:
Authors have
not verified
information
|
Demographics inference through Wi-Fi network traffic analysis
Huaxin Li, Zheyu Xu, Haojin Zhu, Di Ma, Shuai Li, Kai Xing
|
Demographics inference through Wi-Fi network traffic analysis
Details
|
|
Verification:
Authors have
not verified
information
|
Performance-guaranteed strongly connected dominating sets in heterogeneous wireless sensor networks
Chunyan Liu, Hejiao Huang, Hongwei Du, Xiaohua Jia
|
Performance-guaranteed strongly connected dominating sets in heterogeneous wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Demultiplexing activities of daily living in IoT enabled smarthomes
Palanivel A. Kodeswaran, Ravindranath Kokku, Madhumita Mallick, Sayandeep Sen
|
Demultiplexing activities of daily living in IoT enabled smarthomes
Details
|
|
Verification:
Authors have
not verified
information
|
A time-efficient rendezvous algorithm with a full rendezvous degree for heterogeneous cognitive radio networks
Bo Yang, Meng Zheng, Wei Liang
|
A time-efficient rendezvous algorithm with a full rendezvous degree for heterogeneous cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
VADS: Visual attention detection with a smartphone
Zhiping Jiang, Jinsong Han, Chen Qian, Wei Xi, Kun Zhao, Han Ding, Shaojie Tang, Jizhong Zhao, Panlong Yang
|
VADS: Visual attention detection with a smartphone
Details
|
|
Verification:
Authors have
not verified
information
|
FLIP the (Flow) table: Fast lightweight policy-preserving SDN updates
Stefano Vissicchio, Luca Cittadini
|
FLIP the (Flow) table: Fast lightweight policy-preserving SDN updates
Details
|
|
Verification:
Authors have
not verified
information
|
A PTAS to minimize mobile sensor movement for target coverage problem
Zhiyin Chen, Xiaofeng Gao, Fan Wu, Guihai Chen
|
A PTAS to minimize mobile sensor movement for target coverage problem
Details
|
|
Verification:
Authors have
not verified
information
|
A simple congestion-aware algorithm for load balancing in datacenter networks
Mehrnoosh Shafiee, Javad Ghaderi
|
A simple congestion-aware algorithm for load balancing in datacenter networks
Details
|
|
Verification:
Authors have
not verified
information
|
High-precision shortest distance estimation for large-scale social networks
Jie Cheng, Yangyang Zhang, Qiang Ye, Hongwei Du
|
High-precision shortest distance estimation for large-scale social networks
Details
|
|
Verification:
Authors have
not verified
information
|
Nash equilibrium and the price of anarchy in priority based network routing
Benjamin Grimmer, Sanjiv Kapoor
|
Nash equilibrium and the price of anarchy in priority based network routing
Details
|
|
Verification:
Authors have
not verified
information
|
Accurate recovery of Internet traffic data: A tensor completion approach
Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Jigang Wen, Guangxing Zhang
|
Accurate recovery of Internet traffic data: A tensor completion approach
Details
|
|
Verification:
Authors have
not verified
information
|
VSync: Cloud based video streaming service for mobile devices
Eilwoo Baik, Amit Pande, Zizhan Zheng, Prasant Mohapatra
|
VSync: Cloud based video streaming service for mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic SDN controller assignment in data center networks: Stable matching with transfers
Tao Wang, Fangming Liu, Jian Guo, Hong Xu
|
Dynamic SDN controller assignment in data center networks: Stable matching with transfers
Details
|
|
Verification:
Authors have
not verified
information
|
Rot at the roots? Examining public timing infrastructure
Kanthaiah Vijayalayan, Darryl Veitch
|
Rot at the roots? Examining public timing infrastructure
Details
|
|
Verification:
Authors have
not verified
information
|
Timely wireless flows with arbitrary traffic patterns: Capacity region and scheduling algorithms
Lei Deng, Chih-Chun Wang, Minghua Chen, Shizhen Zhao
|
Timely wireless flows with arbitrary traffic patterns: Capacity region and scheduling algorithms
Details
|
|
Verification:
Authors have
not verified
information
|
DAFEE: A Decomposed Approach for energy efficient networking in multi-radio multi-channel wireless networks
Lu Liu, Xianghui Cao, Wenlong Shen, Yu Cheng, Lin X. Cai
|
DAFEE: A Decomposed Approach for energy efficient networking in multi-radio multi-channel wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cloudlet load balancing in wireless metropolitan area networks
Mike Jia, Weifa Liang, Zichuan Xu, Meitian Huang
|
Cloudlet load balancing in wireless metropolitan area networks
Details
|
|
Verification:
Authors have
not verified
information
|
TailCutter: Wisely cutting tail latency in cloud CDN under cost constraints
Zeqi Lai, Yong Cui, Minming Li, Zhenhua Li, Ningwei Dai, Yuchi Chen
|
TailCutter: Wisely cutting tail latency in cloud CDN under cost constraints
Details
|
|
Verification:
Authors have
not verified
information
|
No-cost distance estimation using standard WSN radios
Georg von Zengen, Yannic Schröder, Stephan Rottmann, Felix Büsching, Lars C. Wolf
|
No-cost distance estimation using standard WSN radios
Details
|
|
Verification:
Authors have
not verified
information
|
Controlling flow reconfigurations in SDN
Stefano Paris, Apostolos Destounis, Lorenzo Maggi, Georgios S. Paschos, Jérémie Leguay
|
Controlling flow reconfigurations in SDN
Details
|
|
Verification:
Authors have
not verified
information
|
UrbanEye: An outdoor localization system for public transport
Rohit Verma, Aviral Shrivastava, Bivas Mitra, Sujoy Saha, Niloy Ganguly, Subrata Nandi, Sandip Chakraborty
|
UrbanEye: An outdoor localization system for public transport
Details
|
|
Verification:
Authors have
not verified
information
|
WiFi can be the weakest link of round trip network latency in the wild
Changhua Pei, Youjian Zhao, Guo Chen, Ruming Tang, Yuan Meng, Minghua Ma, Ken Ling, Dan Pei
|
WiFi can be the weakest link of round trip network latency in the wild
Details
|
|
Verification:
Authors have
not verified
information
|
MED: The Monitor-Emulator-Debugger for Software-Defined Networks
Quanquan Zhi, Wei Xu
|
MED: The Monitor-Emulator-Debugger for Software-Defined Networks
Details
|
|
Verification:
Authors have
not verified
information
|
Flowing with the water: On optimal monitoring of water distribution networks by mobile sensors
Rong Du, Carlo Fischione, Ming Xiao
|
Flowing with the water: On optimal monitoring of water distribution networks by mobile sensors
Details
|
|
Verification:
Authors have
not verified
information
|
Incentivizing crowdsourcing systems with network effects
Yanjiao Chen, Baochun Li, Qian Zhang
|
Incentivizing crowdsourcing systems with network effects
Details
|
|
Verification:
Authors have
not verified
information
|
Shadowing and coverage in poisson buildings
Junse Lee, Xinchen Zhang, François Baccelli
|
Shadowing and coverage in poisson buildings
Details
|
|
Verification:
Authors have
not verified
information
|
BOLA: Near-optimal bitrate adaptation for online videos
Kevin Spiteri, Rahul Urgaonkar, Ramesh K. Sitaraman
|
BOLA: Near-optimal bitrate adaptation for online videos
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Successor: Proactive cache warm-up of destination hosts in virtual machine migration contexts
Tao Lu, Ping Huang, Morgan Stuart, Yuhua Guo, Xubin He, Ming Zhang
|
Successor: Proactive cache warm-up of destination hosts in virtual machine migration contexts
Details
|
|
Verification:
Authors have
not verified
information
|
SoftLight: Adaptive visible light communication over screen-camera links
Wan Du, Jansen Christian Liando, Mo Li
|
SoftLight: Adaptive visible light communication over screen-camera links
Details
|
|
Verification:
Authors have
not verified
information
|
Caching and operator cooperation policies for layered video content delivery
Konstantinos Poularakis, George Iosifidis, Antonios Argyriou, Iordanis Koutsopoulos, Leandros Tassiulas
|
Caching and operator cooperation policies for layered video content delivery
Details
|
|
Verification:
Authors have
not verified
information
|
TCP Ordo: The cost of ordered processing in TCP servers
Mohan Kumar, Ada Gavrilovska
|
TCP Ordo: The cost of ordered processing in TCP servers
Details
|
|
Verification:
Authors have
not verified
information
|
Queue-affectance-based scheduling in multi-hop wireless networks under SINR interference constraints
Changhee Joo, Myeongseon Shin
|
Queue-affectance-based scheduling in multi-hop wireless networks under SINR interference constraints
Details
|
|
Verification:
Authors have
not verified
information
|
Anonymous addresses for efficient and resilient routing in F2F overlays
Stefanie Roos, Martin Beck, Thorsten Strufe
|
Anonymous addresses for efficient and resilient routing in F2F overlays
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling jobs with non-uniform demands on multiple servers without interruption
Sungjin Im, Mina Naghshnejad, Mukesh Singhal
|
Scheduling jobs with non-uniform demands on multiple servers without interruption
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters
Lei Yu, Zhipeng Cai
|
Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters
Details
|
|
Verification:
Authors have
not verified
information
|
Capacitated kinetic clustering in mobile networks by optimal transportation theory
Chien-Chun Ni, Zhengyu Su, Jie Gao, Xianfeng David Gu
|
Capacitated kinetic clustering in mobile networks by optimal transportation theory
Details
|
|
Verification:
Authors have
not verified
information
|
Client as a first-class citizen: Practical user-centric network MIMO clustering
Wei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan
|
Client as a first-class citizen: Practical user-centric network MIMO clustering
Details
|
|
Verification:
Authors have
not verified
information
|
L3: Sensing driving conditions for vehicle lane-level localization on highways
Zhichen Wu, Jianda Li, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Minglu Li
|
L3: Sensing driving conditions for vehicle lane-level localization on highways
Details
|
|
Verification:
Authors have
not verified
information
|
FOCUS: Shedding light on the high search response time in the wild
Dapeng Liu, Youjian Zhao, Kaixin Sui, Lei Zou, Dan Pei, Qingqian Tao, Xiyang Chen, Dai Tan
|
FOCUS: Shedding light on the high search response time in the wild
Details
|
|
Verification:
Authors have
not verified
information
|
Experimental evaluation of large scale WiFi multicast rate control
Varun Gupta, Craig Gutterman, Yigal Bejerano, Gil Zussman
|
Experimental evaluation of large scale WiFi multicast rate control
Details
|
|
Verification:
Authors have
not verified
information
|
Deadlock-free local fast failover for arbitrary data center networks
Brent Stephens, Alan L. Cox
|
Deadlock-free local fast failover for arbitrary data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
A novel framework for modeling and mitigating distributed link flooding attacks
Christos Liaskos, Vasileios Kotronis, Xenofontas A. Dimitropoulos
|
A novel framework for modeling and mitigating distributed link flooding attacks
Details
|
|
Verification:
Authors have
not verified
information
|
Flash-Loc: Flashing mobile phones for accurate indoor localization
Fan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda Zhu, Dong Xuan
|
Flash-Loc: Flashing mobile phones for accurate indoor localization
Details
|
|
Verification:
Authors have
not verified
information
|
The impact of unlicensed access on small-cell resource allocation
Cheng Chen, Randall A. Berry, Michael L. Honig, Vijay G. Subramanian
|
The impact of unlicensed access on small-cell resource allocation
Details
|
|
Verification:
Authors have
not verified
information
|
Moving tag detection via physical layer analysis for large-scale RFID systems
Chuyu Wang, Lei Xie, Wei Wang, Tao Xue, Sanglu Lu
|
Moving tag detection via physical layer analysis for large-scale RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
Resource pooling in CDMA cell-based systems through uplink power control
Antonis Dimakis, Spyros Papafragkos
|
Resource pooling in CDMA cell-based systems through uplink power control
Details
|
|
Verification:
Authors have
not verified
information
|
CSMA networks in a many-sources regime: A mean-field approach
Fabio Cecchi, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting
|
CSMA networks in a many-sources regime: A mean-field approach
Details
|
|
Verification:
Authors have
not verified
information
|
Deploying chains of virtual network functions: On the relation between link and server usage
Tung-Wei Kuo, Bang-Heng Liou, Kate Ching-Ju Lin, Ming-Jer Tsai
|
Deploying chains of virtual network functions: On the relation between link and server usage
Details
|
|
Verification:
Authors have
not verified
information
|
Joint optimization for cell configuration and offloading in heterogeneous networks
Chan-Ching Hsu, J. Morris Chang, Yu-Wen Chen
|
Joint optimization for cell configuration and offloading in heterogeneous networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cheetah: An efficient flat addressing scheme for fast query services in cloud computing
Yu Hua
|
Cheetah: An efficient flat addressing scheme for fast query services in cloud computing
Details
|
|
Verification:
Author has
not verified
information
|
Cache increases the capacity of wireless networks
Li Qiu, Guohong Cao
|
Cache increases the capacity of wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
An antithetic coupling approach to multi-chain based CSMA scheduling algorithms
Jaewook Kwak, Do Young Eun
|
An antithetic coupling approach to multi-chain based CSMA scheduling algorithms
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic routing for network throughput maximization in software-defined networks
Meitian Huang, Weifa Liang, Zichuan Xu, Wenzheng Xu, Song Guo, Yinlong Xu
|
Dynamic routing for network throughput maximization in software-defined networks
Details
|
|
Verification:
Authors have
not verified
information
|
CU-LTE: Spectrally-efficient and fair coexistence between LTE and Wi-Fi in unlicensed bands
Zhangyu Guan, Tommaso Melodia
|
CU-LTE: Spectrally-efficient and fair coexistence between LTE and Wi-Fi in unlicensed bands
Details
|
|
Author Comments:
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy
Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren
|
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy
Details
|
|
Verification:
Authors have
not verified
information
|
High-rate flicker-free screen-camera communication with spatially adaptive embedding
Viet Nguyen, Yaqin Tang, Ashwin Ashok, Marco Gruteser, Kristin J. Dana, Wenjun Hu, Eric Wengrowski, Narayan B. Mandayam
|
High-rate flicker-free screen-camera communication with spatially adaptive embedding
Details
|
|
Verification:
Authors have
not verified
information
|
Efficient scheduling algorithms for on-demand wireless data broadcast
Zaixin Lu, Weili Wu, Wei Wayne Li, Miao Pan
|
Efficient scheduling algorithms for on-demand wireless data broadcast
Details
|
|
Verification:
Authors have
not verified
information
|
PSync: Visible light-based time synchronization for Internet of Things (IoT)
Xiang-Fa Guo, Mobashir Mohammad, Sudipta Saha, Mun Choon Chan, Seth Gilbert, Derek Leong
|
PSync: Visible light-based time synchronization for Internet of Things (IoT)
Details
|
|
Author Comments:
It is a really interesting solution, whose algorithm can be used in other fields also. The light based time sync itself has many interesting applications.
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Can the privacy of primary networks in shared spectrum be protected?
Matthew A. Clark, Konstantinos Psounis
|
Can the privacy of primary networks in shared spectrum be protected?
Details
|
|
Verification:
Authors have
not verified
information
|
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas
Liqiong Chang, Xiaojiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang
|
FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas
Details
|
|
Verification:
Authors have
not verified
information
|
Minimum cost seed set for competitive social influence
Yuqing Zhu, Deying Li, Zhao Zhang
|
Minimum cost seed set for competitive social influence
Details
|
|
Verification:
Authors have
not verified
information
|
Cache content-selection policies for streaming video services
Stefan Dernbach, Nina Taft, Jim Kurose, Udi Weinsberg, Christophe Diot, Azin Ashkan
|
Cache content-selection policies for streaming video services
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Multicast traffic engineering for software-defined networks
Liang-Hao Huang, Hsiang-Chun Hsu, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen
|
Multicast traffic engineering for software-defined networks
Details
|
|
Verification:
Authors have
not verified
information
|
BlueAer: A fine-grained urban PM2.5 3D monitoring system using mobile sensing
Yidan Hu, Guojun Dai, Jin Fan, Yifan Wu, Hua Zhang
|
BlueAer: A fine-grained urban PM2.5 3D monitoring system using mobile sensing
Details
|
|
Verification:
Authors have
not verified
information
|
Path computation in multi-layer networks: Complexity and algorithms
Mohamed Lamine Lamali, Nasreddine Fergani, Johanne Cohen, Hélia Pouyllau
|
Path computation in multi-layer networks: Complexity and algorithms
Details
|
|
Verification:
Authors have
not verified
information
|
A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networks
Rajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Rittwik Jana, Prasant Mohapatra
|
A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networks
Details
|
|
Verification:
Authors have
not verified
information
|
Popularity-driven content caching
Suoheng Li, Jie Xu, Mihaela van der Schaar, Weiping Li
|
Popularity-driven content caching
Details
|
|
Verification:
Authors have
not verified
information
|
Dynamic virtual machine management via approximate Markov decision process
Zhenhua Han, Haisheng Tan, Guihai Chen, Rui Wang, Yifan Chen, Francis C. M. Lau
|
Dynamic virtual machine management via approximate Markov decision process
Details
|
|
Verification:
Authors have
not verified
information
|
SCMon: Leveraging segment routing to improve network monitoring
Francois Aubry, David Lebrun, Stefano Vissicchio, Minh Thanh Khong, Yves Deville, Olivier Bonaventure
|
SCMon: Leveraging segment routing to improve network monitoring
Details
|
|
Verification:
Authors have
not verified
information
|
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks
Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta
|
A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks
Details
|
|
Verification:
Authors have
not verified
information
|
Toward real-time and cooperative mobile visual sensing and sharing
Huihui Chen, Bin Guo, Zhiwen Yu, Qi Han
|
Toward real-time and cooperative mobile visual sensing and sharing
Details
|
|
Verification:
Authors have
not verified
information
|
Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks
Tuo Shi, Siyao Cheng, Zhipeng Cai, Jianzhong Li
|
Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics
Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang
|
PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics
Details
|
|
Verification:
Authors have
not verified
information
|
Power adjustment and scheduling in OFDMA femtocell networks
Michael Lin, Novella Bartolini, Thomas F. La Porta
|
Power adjustment and scheduling in OFDMA femtocell networks
Details
|
|
Verification:
Authors have
not verified
information
|
Stochastic geometric analysis of handoffs in user-centric cooperative wireless networks
Wei Bao, Ben Liang
|
Stochastic geometric analysis of handoffs in user-centric cooperative wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
ARS: Cross-layer adaptive request scheduling to mitigate TCP incast in data center networks
Jiawei Huang, Tian He, Yi Huang, Jianxin Wang
|
ARS: Cross-layer adaptive request scheduling to mitigate TCP incast in data center networks
Details
|
|
Verification:
Authors have
not verified
information
|
Flutter: Scheduling tasks closer to data across geo-distributed datacenters
Zhiming Hu, Baochun Li, Jun Luo
|
Flutter: Scheduling tasks closer to data across geo-distributed datacenters
Details
|
|
Verification:
Authors have
not verified
information
|
Enabling secure and effective near-duplicate detection over encrypted in-network storage
Helei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang
|
Enabling secure and effective near-duplicate detection over encrypted in-network storage
Details
|
|
Verification:
Authors have
not verified
information
|
A study of personal information in human-chosen passwords and its security implications
Yue Li, Haining Wang, Kun Sun
|
A study of personal information in human-chosen passwords and its security implications
Details
|
|
Verification:
Authors have
not verified
information
|
An efficient auction mechanism for service chains in the NFV market
Sijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang
|
An efficient auction mechanism for service chains in the NFV market
Details
|
|
Verification:
Authors have
not verified
information
|
Robust network tomography: K-Identifiability and monitor assignment
Wei Ren, Wei Dong
|
Robust network tomography: K-Identifiability and monitor assignment
Details
|
|
Verification:
Authors have
not verified
information
|
GlassGesture: Exploring head gesture interface of smart glasses
Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li
|
GlassGesture: Exploring head gesture interface of smart glasses
Details
|
|
Verification:
Authors have
not verified
information
|
A hierarchical edge cloud architecture for mobile computing
Liang Tong, Yong Li, Wei Gao
|
A hierarchical edge cloud architecture for mobile computing
Details
|
|
Verification:
Authors have
not verified
information
|
Continuous and fine-grained breathing volume monitoring from afar using wireless signals
Phuc Nguyen, Xinyu Zhang, Ann C. Halbower, Tam Vu
|
Continuous and fine-grained breathing volume monitoring from afar using wireless signals
Details
|
|
Verification:
Authors have
not verified
information
|
SAMPO: Online subflow association for multipath TCP with partial flow records
Yang Zhang, Hesham Mekky, Zhi-Li Zhang, Fang Hao, Sarit Mukherjee, T. V. Lakshman
|
SAMPO: Online subflow association for multipath TCP with partial flow records
Details
|
|
Verification:
Authors have
not verified
information
|
Apps on the move: A fine-grained analysis of usage behavior of mobile apps
Lin Yang, Mingxuan Yuan, Wei Wang, Qian Zhang, Jia Zeng
|
Apps on the move: A fine-grained analysis of usage behavior of mobile apps
Details
|
|
Verification:
Authors have
not verified
information
|
Just-in-time WLANs: On-demand interference-managed WLAN infrastructures
Kimin Lee, Yeonkeun Kim, Seokhyun Kim, Jinwoo Shin, Seungwon Shin, Song Chong
|
Just-in-time WLANs: On-demand interference-managed WLAN infrastructures
Details
|
|
Verification:
Authors have
not verified
information
|
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain
Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong
|
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain
Details
|
|
Verification:
Authors have
not verified
information
|
From rateless to sampleless: Wi-Fi connectivity made energy efficient
Wei Wang, Yingjie Chen, Lu Wang, Qian Zhang
|
From rateless to sampleless: Wi-Fi connectivity made energy efficient
Details
|
|
Verification:
Authors have
not verified
information
|
EMIT: An efficient MAC paradigm for the Internet of Things
Arjun Bakshi, Lu Chen, Kannan Srinivasan, Can Emre Koksal, Atilla Eryilmaz
|
EMIT: An efficient MAC paradigm for the Internet of Things
Details
|
|
Verification:
Authors have
not verified
information
|
A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks
Cong Wang, Ji Li, Yuanyuan Yang, Fan Ye
|
A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed spectral decomposition in networks by complex diffusion and quantum random walk
Konstantin Avrachenkov, Philippe Jacquet, Jithin K. Sreedharan
|
Distributed spectral decomposition in networks by complex diffusion and quantum random walk
Details
|
|
Verification:
Authors have
not verified
information
|
Understanding security group usage in a public IaaS cloud
Cheng Jin, Abhinav Srivastava, Zhi-Li Zhang
|
Understanding security group usage in a public IaaS cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks
XiaoHua Xu, Min Song
|
Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks
Details
|
|
Verification:
Authors have
not verified
information
|
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data
Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du
|
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data
Details
|
|
Verification:
Authors have
not verified
information
|
Privacy-preserving deep packet inspection in outsourced middleboxes
Xingliang Yuan, Xinyu Wang, Jianxiong Lin, Cong Wang
|
Privacy-preserving deep packet inspection in outsourced middleboxes
Details
|
|
Verification:
Authors have
not verified
information
|
Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensors
Dahee Jeong, Minkyoung Cho, Omprakash Gnawali, HyungJune Lee
|
Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensors
Details
|
|
Verification:
Authors have
not verified
information
|
Achieving delay rate-function optimality in OFDM downlink with time-correlated channels
Zhenzhi Qian, Bo Ji, Kannan Srinivasan, Ness B. Shroff
|
Achieving delay rate-function optimality in OFDM downlink with time-correlated channels
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed load shedding with minimum energy
Kostas Choumas, Georgios S. Paschos, Thanasis Korakis, Leandros Tassiulas
|
Distributed load shedding with minimum energy
Details
|
|
Verification:
Authors have
not verified
information
|
Symbiosis: Network-aware task scheduling in data-parallel frameworks
Jingjie Jiang, Shiyao Ma, Bo Li, Baochun Li
|
Symbiosis: Network-aware task scheduling in data-parallel frameworks
Details
|
|
Verification:
Authors have
not verified
information
|
Online job allocation with hard allocation ratio requirement
Han Deng, I-Hong Hou
|
Online job allocation with hard allocation ratio requirement
Details
|
|
Verification:
Authors have
not verified
information
|
Tuning by turning: Enabling phased array signal processing for WiFi with inertial sensors
Kun Qian, Chenshu Wu, Zheng Yang, Zimu Zhou, Xu Wang, Yunhao Liu
|
Tuning by turning: Enabling phased array signal processing for WiFi with inertial sensors
Details
|
|
Verification:
Authors have
not verified
information
|
Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing
Gaoqiang Zhuo, Qi Jia, Linke Guo, Ming Li, Pan Li
|
Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing
Details
|
|
Verification:
Authors have
not verified
information
|
Network functions virtualization with soft real-time guarantees
Yang Li, Linh Thi Xuan Phan, Boon Thau Loo
|
Network functions virtualization with soft real-time guarantees
Details
|
|
Verification:
Authors have
not verified
information
|
Reducing access latency in erasure coded cloud storage with local block migration
Yaochen Hu, Di Niu
|
Reducing access latency in erasure coded cloud storage with local block migration
Details
|
|
Verification:
Authors have
not verified
information
|
Node-based service-balanced scheduling for provably guaranteed throughput and evacuation time performance
Bo Ji, Gagan Raj Gupta, Yu Sang
|
Node-based service-balanced scheduling for provably guaranteed throughput and evacuation time performance
Details
|
|
Verification:
Authors have
not verified
information
|
An online mechanism for dynamic virtual cluster provisioning in geo-distributed clouds
Weijie Shi, Chuan Wu, Zongpeng Li
|
An online mechanism for dynamic virtual cluster provisioning in geo-distributed clouds
Details
|
|
Verification:
Authors have
not verified
information
|
F.Live: Towards interactive live broadcast FTV experience
Chien-Nan (Shannon) Chen, Zhenhuan Gao, Klara Nahrstedt
|
F.Live: Towards interactive live broadcast FTV experience
Details
|
|
Verification:
Authors have
not verified
information
|
BattTracker: Enabling energy awareness for smartphone using Li-ion battery characteristics
Jonghoe Koo, KiTaek Lee, Wonbo Lee, Yongseok Park, Sunghyun Choi
|
BattTracker: Enabling energy awareness for smartphone using Li-ion battery characteristics
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Coordinated multi-point transmissions based on interference alignment and neutralization
Zhao Li, Sha Cui, Kang G. Shin, Jun Gu
|
Coordinated multi-point transmissions based on interference alignment and neutralization
Details
|
|
Verification:
Authors have
not verified
information
|
Cluster-aided mobility predictions
Jaeseong Jeong, Mathieu Leconte, Alexandre Proutière
|
Cluster-aided mobility predictions
Details
|
|
Verification:
Authors have
not verified
information
|
Characterizing IPv6 control and data plane stability
Ioana Livadariu, Ahmed Elmokashfi, Amogh Dhamdhere
|
Characterizing IPv6 control and data plane stability
Details
|
|
Verification:
Authors have
not verified
information
|
Practical antenna selection for WLAN AP
Seungmin Yoo, Seongwon Kim, Youngwook Son, Jaehong Yi, Sunghyun Choi
|
Practical antenna selection for WLAN AP
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Murphy loves CI: Unfolding and improving constructive interference in WSNs
Vijay S. Rao, Madhusudan Koppal, R. Venkatesha Prasad, Tamma V. Prabhakar, Chayan Sarkar, Ignas G. Niemegeers
|
Murphy loves CI: Unfolding and improving constructive interference in WSNs
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Listen channel randomization for faster Wi-Fi direct device discovery
Weiping Sun, Changmok Yang, Sunggeun Jin, Sunghyun Choi
|
Listen channel randomization for faster Wi-Fi direct device discovery
Details
|
|
Author Comments:
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
An economical and SLO-guaranteed cloud storage service across multiple cloud service providers
Guoxin Liu, Haiying Shen
|
An economical and SLO-guaranteed cloud storage service across multiple cloud service providers
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed deterministic broadcasting algorithms under the SINR model
Xiang Tian, Jiguo Yu, Liran Ma, Guangshun Li, Xiuzhen Cheng
|
Distributed deterministic broadcasting algorithms under the SINR model
Details
|
|
Verification:
Authors have
not verified
information
|
CamK: A camera-based keyboard for small mobile devices
Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Edmund Novak, Sanglu Lu
|
CamK: A camera-based keyboard for small mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud
Yixin Chen, Wenbo He, Yu Hua, Wen Wang
|
CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Friendly channel-oblivious jamming with error amplification for wireless networks
Zhenghao Zhang, Avishek Mukherjee
|
Friendly channel-oblivious jamming with error amplification for wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Secure fingertip mouse for mobile devices
Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu
|
Secure fingertip mouse for mobile devices
Details
|
|
Verification:
Authors have
not verified
information
|
Application-aware traffic scheduling for workload offloading in mobile clouds
Liang Tong, Wei Gao
|
Application-aware traffic scheduling for workload offloading in mobile clouds
Details
|
|
Verification:
Authors have
not verified
information
|
The quest for resilient (static) forwarding tables
Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, Andrei V. Gurtov, Aleksander Madry, Michael Schapira, Scott Shenker
|
The quest for resilient (static) forwarding tables
Details
|
|
Verification:
Authors have
not verified
information
|
GEM: An analytic geometrical approach to fast event matching for multi-dimensional content-based publish/subscribe services
Wenhao Fan, Yuan'an Liu, Bihua Tang
|
GEM: An analytic geometrical approach to fast event matching for multi-dimensional content-based publish/subscribe services
Details
|
|
Verification:
Authors have
not verified
information
|
Exploiting channel diversity for rate adaptation in backscatter communication networks
Wei Gong, Haoxiang Liu, Kebin Liu, Qiang Ma, Yunhao Liu
|
Exploiting channel diversity for rate adaptation in backscatter communication networks
Details
|
|
Verification:
Authors have
not verified
information
|
Antenna orientation and range assignment in WSNs with directional antennas
Tien Tran, Min Kyung An, Dung T. Huynh
|
Antenna orientation and range assignment in WSNs with directional antennas
Details
|
|
Verification:
Authors have
not verified
information
|
A truthful pricing mechanism for sponsored content in wireless networks
Matthew Andrews, Yue Jin, Martin I. Reiman
|
A truthful pricing mechanism for sponsored content in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Exit equilibrium: Towards understanding voluntary participation in security games
Parinaz Naghizadeh, Mingyan Liu
|
Exit equilibrium: Towards understanding voluntary participation in security games
Details
|
|
Verification:
Authors have
not verified
information
|
EyeVeri: A secure and usable approach for smartphone user authentication
Chen Song, Aosen Wang, Kui Ren, Wenyao Xu
|
EyeVeri: A secure and usable approach for smartphone user authentication
Details
|
|
Verification:
Authors have
not verified
information
|
Terminal-set-enhanced community detection in social networks
Guangmo Tong, Lei Cui, Weili Wu, Cong Liu, Ding-Zhu Du
|
Terminal-set-enhanced community detection in social networks
Details
|
|
Verification:
Authors have
not verified
information
|
On the relative de-anonymizability of graph data: Quantification and evaluation
Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah
|
On the relative de-anonymizability of graph data: Quantification and evaluation
Details
|
|
Verification:
Authors have
not verified
information
|
An approximation algorithm for AP association under user migration cost constraint
Wangkit Wong, Avishek Thakur, S.-H. Gary Chan
|
An approximation algorithm for AP association under user migration cost constraint
Details
|
|
Verification:
Authors have
not verified
information
|
Coordinated caching in planet-scale CDNs: Analysis of feasibility and benefits
Kianoosh Mokhtarian, Hans-Arno Jacobsen
|
Coordinated caching in planet-scale CDNs: Analysis of feasibility and benefits
Details
|
|
Verification:
Authors have
not verified
information
|
Heavy-ball: A new approach to tame delay and convergence in wireless network optimization
Jia Liu, Atilla Eryilmaz, Ness B. Shroff, Elizabeth S. Bentley
|
Heavy-ball: A new approach to tame delay and convergence in wireless network optimization
Details
|
|
Verification:
Authors have
not verified
information
|
Taming collisions for delay reduction in low-duty-cycle wireless sensor networks
Long Cheng, Yu Gu, Jianwei Niu, Ting Zhu, Cong Liu, Qingquan Zhang, Tian He
|
Taming collisions for delay reduction in low-duty-cycle wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Optimal downlink and uplink user association in backhaul-limited HetNets
Nikolaos Sapountzis, Thrasyvoulos Spyropoulos, Navid Nikaein, Umer Salim
|
Optimal downlink and uplink user association in backhaul-limited HetNets
Details
|
|
Verification:
Authors have
not verified
information
|
Cost-aware Targeted Viral Marketing in billion-scale networks
Hung T. Nguyen, Thang N. Dinh, My T. Thai
|
Cost-aware Targeted Viral Marketing in billion-scale networks
Details
|
|
Author Comments:
Sharing:
Other
Verification:
Authors have
verified
information
|
JurCast: Joint user and rate allocation for video multicast over multiple APs
Hui Wang, Wei Tsang Ooi, Mun Choon Chan
|
JurCast: Joint user and rate allocation for video multicast over multiple APs
Details
|
|
Verification:
Authors have
not verified
information
|
Fiber optic vs. wireless sensors in energy-efficient integrated FiWi smart grid networks: An energy-delay and TCO comparison
Dung Pham Van, Bhaskar Prasad Rimal, Martin Maier
|
Fiber optic vs. wireless sensors in energy-efficient integrated FiWi smart grid networks: An energy-delay and TCO comparison
Details
|
|
Verification:
Authors have
not verified
information
|
Temporal correlation of the RSS improves accuracy of fingerprinting localization
Mei Wang, Zhehui Zhang, Xiaohua Tian, Xinbing Wang
|
Temporal correlation of the RSS improves accuracy of fingerprinting localization
Details
|
|
Verification:
Authors have
not verified
information
|
Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity
Zhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang
|
Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity
Details
|
|
Verification:
Authors have
not verified
information
|
Probabilistic demand allocation for cloud service brokerage
Chenxi Qiu, Haiying Shen, Liuhua Chen
|
Probabilistic demand allocation for cloud service brokerage
Details
|
|
Verification:
Authors have
not verified
information
|
Multi-user lax communications: A multi-armed bandit approach
Orly Avner, Shie Mannor
|
Multi-user lax communications: A multi-armed bandit approach
Details
|
|
Verification:
Authors have
not verified
information
|
Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks
Ying Qiu, ShiNing Li, Xiangsen Xu, Zhigang Li
|
Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks
Details
|
|
Verification:
Authors have
not verified
information
|
Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing
Songtao Guo, Bin Xiao, Yuanyuan Yang, Yang Yang
|
Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing
Details
|
|
Verification:
Authors have
not verified
information
|
MobTrack: Locating indoor interfering radios with a single device
Changlai Du, Ruide Zhang, Wenjing Lou, Y. Thomas Hou
|
MobTrack: Locating indoor interfering radios with a single device
Details
|
|
Verification:
Authors have
not verified
information
|
Frugal topology construction for stream aggregation in the cloud
Rachid Guerraoui, Erwan Le Merrer, Rhicheek Patra, Bao Duy Tran
|
Frugal topology construction for stream aggregation in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Libra: Impact assessment of cellular load balancing
Kanthi Nagaraj, Ajay Mahimkar, Zihui Ge, Aman Shaikh, Jia Wang, Kevin Mohr, Mark Stockert
|
Libra: Impact assessment of cellular load balancing
Details
|
|
Verification:
Authors have
not verified
information
|
Augmenting wide-band 802.11 transmissions via unequal packet bit protection
Yaxiong Xie, Zhenjiang Li, Mo Li, Kyle Jamieson
|
Augmenting wide-band 802.11 transmissions via unequal packet bit protection
Details
|
|
Verification:
Authors have
not verified
information
|
Network utility maximization with path cardinality constraints
Yingjie Bi, Chee Wei Tan, Ao Tang
|
Network utility maximization with path cardinality constraints
Details
|
|
Verification:
Authors have
not verified
information
|
DDoS attack detection under SDN context
Yang Xu, Yong Liu
|
DDoS attack detection under SDN context
Details
|
|
Verification:
Authors have
not verified
information
|
On applying fault detectors against false data injection attacks in cyber-physical control systems
Quyen Dinh Vu, Rui Tan, David K. Y. Yau
|
On applying fault detectors against false data injection attacks in cyber-physical control systems
Details
|
|
Verification:
Authors have
not verified
information
|
De-anonymizing social networks and inferring private attributes using knowledge graphs
Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, Linlin Chen
|
De-anonymizing social networks and inferring private attributes using knowledge graphs
Details
|
|
Verification:
Authors have
not verified
information
|
Wind blows, traffic flows: Green Internet routing under renewable energy
Yuan Yang, Dan Wang, Dawei Pan, Mingwei Xu
|
Wind blows, traffic flows: Green Internet routing under renewable energy
Details
|
|
Verification:
Authors have
not verified
information
|
ENCORE: An energy-aware multicell cooperation in heterogeneous networks with content caching
Yi-Han Chiang, Wanjiun Liao
|
ENCORE: An energy-aware multicell cooperation in heterogeneous networks with content caching
Details
|
|
Verification:
Authors have
not verified
information
|
Understanding and diagnosing real-world Femtocell performance problems
Chunyi Peng, Yuanjie Li, Zhuoran Li, Jie Zhao, Jiaqi Xu
|
Understanding and diagnosing real-world Femtocell performance problems
Details
|
|
Verification:
Authors have
not verified
information
|
Smokey: Ubiquitous smoking detection with commercial WiFi infrastructures
Xiaolong Zheng, Jiliang Wang, Longfei Shangguan, Zimu Zhou, Yunhao Liu
|
Smokey: Ubiquitous smoking detection with commercial WiFi infrastructures
Details
|
|
Verification:
Authors have
not verified
information
|
Distributed optimization in energy harvesting sensor networks with dynamic in-network data processing
Shusen Yang, Yad Tahir, Po-Yu Chen, Alan Marshall, Julie A. McCann
|
Distributed optimization in energy harvesting sensor networks with dynamic in-network data processing
Details
|
|
Verification:
Authors have
not verified
information
|
Scheduling with multi-level data locality: Throughput and heavy-traffic optimality
Qiaomin Xie, Ali Yekkehkhany, Yi Lu
|
Scheduling with multi-level data locality: Throughput and heavy-traffic optimality
Details
|
|
Author Comments:
Sharing:
Other
Verification:
Authors have
verified
information
|
MMPTCP: A multipath transport protocol for data centers
Morteza Kheirkhah, Ian Wakeman, George Parisis
|
MMPTCP: A multipath transport protocol for data centers
Details
|
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Online multi-stage decisions for robust power-grid operations under high renewable uncertainty
Shizhen Zhao, Xiaojun Lin, Dionysios Aliprantis, Hugo N. Villegas, Minghua Chen
|
Online multi-stage decisions for robust power-grid operations under high renewable uncertainty
Details
|
|
Verification:
Authors have
not verified
information
|
Wisent: Robust downstream communication and storage for computational RFIDs
Jethro Tan, Przemyslaw Pawelczak, Aaron N. Parks, Joshua R. Smith
|
Wisent: Robust downstream communication and storage for computational RFIDs
Details
|
|
Author Comments:
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Heavy hitters in streams and sliding windows
Ran Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner
|
Heavy hitters in streams and sliding windows
Details
|
|
Verification:
Authors have
not verified
information
|
DESIR: Decoy-enhanced seamless IP randomization
Jianhua Sun, Kun Sun
|
DESIR: Decoy-enhanced seamless IP randomization
Details
|
|
Verification:
Authors have
not verified
information
|
Update or wait: How to keep your data fresh
Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, Can Emre Koksal, Ness B. Shroff
|
Update or wait: How to keep your data fresh
Details
|
|
Verification:
Authors have
not verified
information
|
To live or to die: Encountering conflict information dissemination over simple networks
Jie Wang, Wenye Wang
|
To live or to die: Encountering conflict information dissemination over simple networks
Details
|
|
Verification:
Authors have
not verified
information
|
Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud
Zizhan Zheng, Ness B. Shroff
|
Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud
Details
|
|
Verification:
Authors have
not verified
information
|
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin
|
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis
Details
|
|
Verification:
Authors have
not verified
information
|
Top-k queries for multi-category RFID systems
Xiulong Liu, Keqiu Li, Jie Wu, Alex X. Liu, Xin Xie, Chunsheng Zhu, Weilian Xue
|
Top-k queries for multi-category RFID systems
Details
|
|
Verification:
Authors have
not verified
information
|
Computing network coded data coverage in an opportunistic data dissemination network
Brenton D. Walker
|
Computing network coded data coverage in an opportunistic data dissemination network
Details
|
|
Verification:
Author has
not verified
information
|
iBGP2: A scalable iBGP redistribution mechanism leading to optimal routing
Marc-Olivier Buob, Anthony Lambert, Steve Uhlig
|
iBGP2: A scalable iBGP redistribution mechanism leading to optimal routing
Details
|
|
Verification:
Authors have
not verified
information
|
Radiation constrained wireless charger placement
Haipeng Dai, Yunhuai Liu, Alex X. Liu, Lingtao Kong, Guihai Chen, Tian He
|
Radiation constrained wireless charger placement
Details
|
|
Verification:
Authors have
not verified
information
|
A walk on the client side: Monitoring enterprise Wifi networks using smartphone channel scans
Jinghao Shi, Lei Meng, Aaron Striegel, Chunming Qiao, Dimitrios Koutsonikolas, Geoffrey Challen
|
A walk on the client side: Monitoring enterprise Wifi networks using smartphone channel scans
Details
|
|
Verification:
Authors have
not verified
information
|
Performance-guaranteed approximation algorithm for fault-tolerant connected dominating set in wireless networks
Zhao Zhang, Jiao Zhou, Yuchang Mo, Ding-Zhu Du
|
Performance-guaranteed approximation algorithm for fault-tolerant connected dominating set in wireless networks
Details
|
|
Verification:
Authors have
not verified
information
|
Cyber maintenance policy optimization via adaptive learning
Yue Tan, Cathy H. Xia
|
Cyber maintenance policy optimization via adaptive learning
Details
|
|
Verification:
Authors have
not verified
information
|
Non-asymptotic delay bounds for (k, l) fork-join systems and multi-stage fork-join networks
Markus Fidler, Yuming Jiang
|
Non-asymptotic delay bounds for (k, l) fork-join systems and multi-stage fork-join networks
Details
|
|
Verification:
Authors have
not verified
information
|
An O(1)-competitive online caching algorithm for content centric networking
Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil
|
An O(1)-competitive online caching algorithm for content centric networking
Details
|
|
Verification:
Authors have
not verified
information
|
Accurate WiFi packet delivery rate estimation and applications
Muhammad Owais Khan, Lili Qiu
|
Accurate WiFi packet delivery rate estimation and applications
Details
|
|
Verification:
Authors have
not verified
information
|