default search action
33rd INFOCOM 2014: Toronto, Canada
- 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014. IEEE 2014, ISBN 978-14799-3360-0
CC1: Cloud Computing 1
- Long Gong, Yonggang Wen, Zuqing Zhu, Tony Lee:
Toward profit-seeking virtual network embedding algorithm via global resource capacity. 1-9 - Fang Hao, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee:
Online allocation of virtual machines in a distributed cloud. 10-18 - Yang Peng, Kai Chen, Guohui Wang, Wei Bai, Zhiqiang Ma, Lin Gu:
HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing. 19-27 - Lei Jiao, Jun Li, Wei Du, Xiaoming Fu:
Multi-objective data placement for multi-cloud socially aware services. 28-36
LO1: Localization 1
- Edmund Novak, Qun Li:
Near-pri: Private, proximity based location sharing. 37-45 - Yang Yang, Miao Jin, Hongyi Wu:
3D surface localization with terrain model. 46-54 - Yang Tian, Ruipeng Gao, Kaigui Bian, Fan Ye, Tao Wang, Yizhou Wang, Xiaoming Li:
Towards ubiquitous indoor localization service leveraging environmental physical features. 55-63 - Jun Liu, Zhaohui Wang, Zheng Peng, Jun-Hong Cui, Lance Fiondella:
Suave: Swarm underwater autonomous vehicle localization. 64-72
MN1: Multimedia networking 1
- Hao Cui, Chong Luo, Chang Wen Chen, Feng Wu:
Robust uncoded video transmission over wireless fast fading channel. 73-81 - Vinay Joseph, Gustavo de Veciana:
NOVA: QoE-driven optimization of DASH-based video delivery in networks. 82-90 - Zhi Wang, Lifeng Sun, Chuan Wu, Wenwu Zhu, Shiqiang Yang:
Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming. 91-99 - Randeep Bhatia, T. V. Lakshman, Arun N. Netravali, Krishan K. Sabnani:
Improving mobile video streaming with link aware scheduling and client caches. 100-108
NE1: Network economics and pricing 1
- Dejun Yang, Xiang Zhang, Guoliang Xue:
PROMISE: A framework for truthful and profit maximizing spectrum double auctions. 109-117 - Jian Zhao, Hongxing Li, Chuan Wu, Zongpeng Li, Zhizhong Zhang, Francis C. M. Lau:
Dynamic pricing and profit maximization for the cloud with geo-distributed data centers. 118-126 - Tie Luo, Hwee-Pink Tan, Lirong Xia:
Profit-maximizing incentive for participatory sensing. 127-135 - Xukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li:
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties. 136-144
RF1: RFID 1
- Lei Xie, Hao Han, Qun Li, Jie Wu, Sanglu Lu:
Efficiently collecting histograms over RFID tags. 145-153 - Linghe Kong, Liang He, Yu Gu, Min-You Wu, Tian He:
A Parallel Identification Protocol for RFID systems. 154-162 - Jia Liu, Bin Xiao, Kai Bu, Lijun Chen:
Efficient distributed query processing in large RFID-enabled supply chains. 163-171 - Min Chen, Shigang Chen, Qingjun Xiao:
Pandaka: A lightweight cipher for RFID systems. 172-180
RS: Router and switch design
- Giuseppe Rossini, Dario Rossi, Michele Garetto, Emilio Leonardi:
Multi-Terabyte and multi-Gbps information centric routers. 181-189 - Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Bin Liu:
Towards zero-time wakeup of line cards in power-aware routers. 190-198 - Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure:
Safe routing reconfigurations with route redistribution. 199-207 - Shu Yang, Mingwei Xu, Dan Wang, Gautier Bayzelon, Jianping Wu:
Scalable forwarding tables for supporting flexible policies in enterprise networks. 208-216
SP1: Security and privacy 1
- Qingsi Wang, Mingyan Liu:
Learning in hide-and-seek. 217-225 - Wenhai Sun, Shucheng Yu, Wenjing Lou, Y. Thomas Hou, Hui Li:
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. 226-234 - Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui:
Will cyber-insurance improve network security? A market analysis. 235-243 - Jun Shao, Rongxing Lu, Xiaodong Lin:
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. 244-252
WN1: Wireless networks 1
- Xiufeng Xie, Xinyu Zhang:
Does full-duplex double the capacity of wireless networks? 253-261 - Yang Yang, Bo Chen, Kannan Srinivasan, Ness B. Shroff:
Characterizing the achievable throughput in wireless networks with two active RF chains. 262-270 - Chunmei Han, Kaishun Wu, Yuxi Wang, Lionel M. Ni:
WiFall: Device-free fall detection by wireless networks. 271-279 - Hyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi:
Distributed learning for utility maximization over CSMA-based wireless multihop networks. 280-288
CC2: Cloud Computing 2
- Qi Zhang, Mohamed Faten Zhani, Maissa Jabri, Raouf Boutaba:
Venice: Reliable virtual data center embedding in clouds. 289-297 - Yuhong Zhao, Hong Jiang, Ke Zhou, Zhijie Huang, Ping Huang:
Meeting service level agreement cost-effectively for video-on-demand applications in the cloud. 298-306 - Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS bound in distributed cloud storage. 307-315 - Jun Li, Baochun Li:
Cooperative repair with minimum-storage regenerating codes for distributed storage. 316-324
FC: Flow and congestion control
- Reza Banirazi, Edmond A. Jonckheere, Bhaskar Krishnamachari:
Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks. 325-333 - Peng-Jun Wan, Zhu Wang, Lei Wang, Zhiguo Wan, Sai Ji:
From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks. 334-342 - Georgios S. Paschos, Chih-Ping Li, Eytan H. Modiano, Kostas Choumas, Thanasis Korakis:
Multirate multicast: Optimal algorithms and implementation. 343-351 - Tobias Harks, Martin Hoefer, Kevin Schewior, Alexander Skopalik:
Routing games with progressive filling. 352-360
LO2: Localization 2
- Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, Zhiping Jiang:
Electronic frog eye: Counting crowd using WiFi. 361-369 - Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones. 370-378 - Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu:
Anchor-free backscatter positioning for RFID tags with high accuracy. 379-387 - Yuanchao Shu, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
TOC: Localizing wireless rechargeable sensors with time of charge. 388-396
MN2: Multimedia networking 2
- Zhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Mohamed Ali Kâafar, Kavé Salamatian:
On the geographic patterns of a large-scale mobile video-on-demand system. 397-405 - Vinay Joseph, Sem C. Borst, Martin I. Reiman:
Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics. 406-414 - Yang Cao, Xu Chen, Tao Jiang, Junshan Zhang:
SoCast: Social ties based cooperative video multicast. 415-423 - Munhwan Choi, Weiping Sun, Jonghoe Koo, Sunghyun Choi, Kang G. Shin:
Reliable video multicast over Wi-Fi networks with coordinated multiple APs. 424-432
NE2: Network economics and pricing 2
- Linquan Zhang, Zongpeng Li, Chuan Wu:
Dynamic resource provisioning in cloud computing: A randomized auction approach. 433-441 - Weijie Wu, Richard T. B. Ma, John C. S. Lui:
Exploring bundling sale strategy in online service markets with network effects. 442-450 - George Iosifidis, Lin Gao, Jianwei Huang, Leandros Tassiulas:
Enabling crowd-sourced mobile Internet access. 451-459 - Syed Hasan, Sergey Gorinsky, Constantine Dovrolis, Ramesh K. Sitaraman:
Trade-offs in optimizing the cache deployments of CDNs. 460-468
RF2: RFID 2
- Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang:
Twins: Device-free object tracking using passive tags. 469-476 - Wei Gong, Kebin Liu, Xin Miao, Haoxiang Liu:
Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation. 477-485 - Haoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, Wenbo He:
Towards adaptive continuous scanning in large-scale RFID systems. 486-494 - Yuanqing Zheng, Mo Li:
Read bulk data from computational RFIDs. 495-503
SP2: Security and privacy 2
- Jing Zhao, Taeho Jung, Yu Wang, Xiangyang Li:
Achieving differential privacy of data disclosure in the smart grid. 504-512 - Lei Yang, Xu Chen, Junshan Zhang, H. Vincent Poor:
Optimal privacy-preserving energy management for smart meters. 513-521 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. 522-530 - Daniel Luchaup, Lorenzo De Carli, Somesh Jha, Eric Bach:
Deep packet inspection with DFA-trees and parametrized language overapproximation. 531-539
WN2: Wireless networks 2
- Wei Sun, Zheng Yang, Keyu Wang, Yunhao Liu:
Hello: A generic flexible protocol for neighbor discovery. 540-548 - Liyang Zhang, Zhangyu Guan, Tommaso Melodia:
Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying. 549-557 - XiaoHua Xu, Min Song:
Restricted coverage in wireless networks. 558-564 - Cem Boyaci, Ye Xia:
Optimal delay bound for maximum weight scheduling policy in wireless networks. 565-573
CC3: Cloud computing 3
- Jiao Zhang, Fengyuan Ren, Chuang Lin:
Delay guaranteed live migration of Virtual Machines. 574-582 - Wei Wang, Baochun Li, Ben Liang:
Dominant resource fairness in cloud computing systems with heterogeneous servers. 583-591 - Bharath Balasubramanian, Tian Lan, Mung Chiang:
SAP: Similarity-aware partitioning for efficient cloud storage. 592-600 - Sivan Albagli-Kim, Hadas Shachnai, Tami Tamir:
Scheduling jobs with dwindling resource requirements in clouds. 601-609
IM1: Internet monitoring and measurement 1
- Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto:
Spatio-temporal factorization of log data for understanding network events. 610-618 - Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Di Zhang, Xiaoming Fu, K. K. Ramakrishnan:
Mining checkins from location-sharing services for client-independent IP geolocation. 619-627 - Alex X. Liu, Chad R. Meiners, Eric Torng:
Packet classification using binary Content Addressable Memory. 628-636 - Anduo Wang, Alexander J. T. Gurney, Xianglong Han, Jinyan Cao, Boon Thau Loo, Carolyn L. Talcott, Andre Scedrov:
A reduction-based approach towards scaling up formal analysis of internet configurations. 637-645
NC: Network coding
- Xunrui Yin, Zongpeng Li, Xin Wang:
A matroid theory approach to multicast network coding. 646-654 - Wei-Cheng Kuo, Chih-Chun Wang:
Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel quality. 655-663 - Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:
DAWN: Defending against wormhole attacks in wireless network coding systems. 664-672 - Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure cloud storage meets with secure network coding. 673-681
NE3: Network economics and pricing 3
- Lin Gao, George Iosifidis, Jianwei Huang, Leandros Tassiulas:
Hybrid data pricing for network-assisted user-provided connectivity. 682-690 - Zhixue Lu, Prasun Sinha, R. Srikant:
EasyBid: Enabling cellular offloading via small players. 691-699 - Liang Zhang, Weijie Wu, Dan Wang:
Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes. 700-708 - Wei Dong, Swati Rallapalli, Lili Qiu, K. K. Ramakrishnan, Yin Zhang:
Double auctions for dynamic spectrum allocation. 709-717
SN1: Sensor networks 1
- Xuefeng Liu, Jiannong Cao, Shaojie Tang, Peng Guo:
A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring. 718-726 - Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen, Jie Yang, Yanmin Zhu, Guangtao Xue, Minglu Li:
SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments. 727-735 - Ahmed E. A. A. Abdulla, Zubair Md. Fadlullah, Hiroki Nishiyama, Nei Kato, Fumie Ono, Ryu Miura:
An optimal data collection technique for improved utility in UAS-aided networks. 736-744 - Shibo He, Dong-Hoon Shin, Junshan Zhang, Jiming Chen:
Toward optimal allocation of location dependent tasks in crowdsensing. 745-753
SP3: Security and privacy 3
- Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Achieving k-anonymity in privacy-aware location-based services. 754-762 - Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao:
PLAM: A privacy-preserving framework for local-area mobile social networks. 763-771 - Zhengrui Qin, Shanhe Yi, Qun Li, Dmitry Zamkov:
Preserving secondary users' privacy in cognitive radio networks. 772-780 - Maciej Korczynski, Andrzej Duda:
Markov chain fingerprinting to classify encrypted traffic. 781-789
WN3: Wireless networks 3
- Shaohe Lv, Xuan Dong, Yong Lu, Xiaoli Du, Xiaodong Wang, Yong Dou, Xingming Zhou:
3D pipeline contention: Asymmetric full duplex in wireless networks. 790-798 - Lan Zhang, Kebin Liu, Yonghang Jiang, Xiang-Yang Li, Yunhao Liu, Panlong Yang:
Montage: Combine frames with movement continuity for realtime multi-user tracking. 799-807 - Xiufeng Xie, Xinyu Zhang:
Scalable user selection for MU-MIMO networks. 808-816 - Yongjiu Du, Ehsan Aryafar, Joseph Camp, Mung Chiang:
iBeam: Intelligent client-side multi-user beamforming in wireless networks. 817-825
CC4: Cloud computing 4
- Guanfeng Liang, Ulas C. Kozat:
TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes. 826-834 - Haiying Shen, Zhuozhao Li:
New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants. 835-843 - Yu Hua, Xue Liu, Dan Feng:
Neptune: Efficient remote communication services for cloud backups. 844-852 - György Dán, Niklas Carlsson:
Dynamic content allocation for cloud-assisted service of periodic workloads. 853-861
CNE: Cooperative networking
- Kyung-Hwa Kim, Hyunwoo Nam, Henning Schulzrinne:
WiSlow: A Wi-Fi network performance troubleshooting tool for end users. 862-870 - Riheng Jia, Jinbei Zhang, Xinbing Wang, Xiaohua Tian, Qian Zhang:
Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users. 871-879 - Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou, Wenjing Lou:
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks. 880-888
EE1: Energy efficiency in wireless networks 1
- Ashikur Rahman, Nael B. Abu-Ghazaleh:
On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks. 889-897 - Hang Li, Chuan Huang, Shuguang Cui, Junshan Zhang:
Distributed opportunistic scheduling for wireless networks powered by renewable energy sources. 898-906 - Chenfei Gao, Weiyi Zhang, Jian Tang, Chonggang Wang, Shihong Zou, Sen Su:
Relax, but Do Not Sleep: A new perspective on Green Wireless Networking. 907-915 - Wenjie Hu, Guohong Cao:
Energy optimization through traffic aggregation in wireless networks. 916-924
IM2: Internet monitoring and measurement 2
- Aveek K. Das, Parth H. Pathak, Chen-Nee Chuah, Prasant Mohapatra:
Contextual localization through network traffic analysis. 925-933 - Mehdi Malboubi, Liyuan Wang, Chen-Nee Chuah, Puneet Sharma:
Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP). 934-942 - Andra Lutu, Marcelo Bagnulo, Jesús Cid-Sueiro, Olaf Maennel:
Separating wheat from chaff: Winnowing unintended prefixes using machine learning. 943-951 - Alex X. Liu, Eric Torng:
An overlay automata approach to regular expression matching. 952-960
SN2: Sensor networks 2
- Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu:
Walking down the STAIRS: Efficient collision resolution for wireless sensor networks. 961-969 - Yitao Hu, Xinbing Wang, Xiaoying Gan:
Critical sensing range for mobile heterogeneous camera sensor networks. 970-978 - Kan Huang, Chien-Chun Ni, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell:
Bounded stretch geographic homotopic routing in sensor networks. 979-987 - Stefano Basagni, Ladislau Bölöni, Petrika Gjanci, Chiara Petrioli, Cynthia A. Phillips, Danila Turgut:
Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle. 988-996
WS1: Wireless security and privacy 1
- Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, Junshan Zhang:
SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks. 997-1005 - Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang:
Utility-based cooperative decision in cooperative authentication. 1006-1014 - Hanif Rahbari, Marwan Krunz, Loukas Lazos:
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. 1015-1023 - Fei Huo, Guang Gong:
A new efficient physical layer OFDM encryption scheme. 1024-1032
CC5: Cloud computing 5
- Liuhua Chen, Haiying Shen:
Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters. 1033-1041 - Shengbo Chen, Yin Sun, Ulas C. Kozat, Longbo Huang, Prasun Sinha, Guanfeng Liang, Xin Liu, Ness B. Shroff:
When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds. 1042-1050 - Ryan Shea, Haiyang Wang, Jiangchuan Liu:
Power consumption of virtual machines with network transactions: Measurement and improvements. 1051-1059 - Yujin Li, Wenye Wang:
Can mobile cloudlets support mobile applications? 1060-1068
CN1: Cellular networks 1
- Wei Bao, Ben Liang:
Structured spectrum allocation and user association in heterogeneous cellular networks. 1069-1077 - Konstantinos Poularakis, George Iosifidis, Antonios Argyriou, Leandros Tassiulas:
Video delivery over heterogeneous cellular networks: Optimizing cost and performance. 1078-1086 - Wentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu:
Cell planning for heterogeneous networks: An approximation algorithm. 1087-1095 - Walid Saad, Zhu Han, Rong Zheng, Mérouane Debbah, H. Vincent Poor:
A college admissions game for uplink user association in wireless small cell networks. 1096-1104
EE2: Energy efficiency in wireless networks 2
- Haipeng Dai, Yunhuai Liu, Guihai Chen, Xiaobing Wu, Tian He:
Safe Charging for wireless power transfer. 1105-1113 - Chenxi Qiu, Haiying Shen, Lei Yu:
Energy-efficient cooperative broadcast in fading wireless networks. 1114-1122 - Yong Cui, Shihan Xiao, Xin Wang, Minming Li, Hongyi Wang, Zeqi Lai:
Performance-aware energy optimization on mobile devices in cellular network. 1123-1131 - Bingjie Leng, Parisa Mansourifard, Bhaskar Krishnamachari:
Microeconomic analysis of base-station sharing in green cellular networks. 1132-1140
IM3: Internet monitoring and measurement 3
- Ouldooz Baghban Karimi, Jiangchuan Liu, Jennifer Rexford:
Optimal collaborative access point association in wireless networks. 1141-1149 - Sisi Xiong, Yanjun Yao, Qing Cao, Tian He:
kBF: A Bloom Filter for key-value storage with an application on approximate state machines. 1150-1158 - Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci:
Detecting malicious HTTP redirections using trees of user browsing activity. 1159-1167 - Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang:
What scale of audience a campaign can reach in what price on Twitter? 1168-1176
SN3: Sensor networks 3
- Andreas Loukas, Marco Zuniga, Ioannis Protonotarios, Jie Gao:
How to identify global trends from local decisions? Event region detection on mobile networks. 1177-1185 - Jiliang Wang, Zhichao Cao, XuFei Mao, Yunhao Liu:
Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks. 1186-1194 - Liang He, Peng Cheng, Yu Gu, Jianping Pan, Ting Zhu, Cong Liu:
Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks. 1195-1203 - Hua Huang, Chien-Chun Ni, Xiaomeng Ban, Jie Gao, Andrew T. Schneider, Shan Lin:
Connected wireless camera network deployment with visibility coverage. 1204-1212
US: Urban sensing and environmental monitoring
- Dong Zhao, Xiang-Yang Li, Huadong Ma:
How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. 1213-1221 - Xiao Qi, Yongcai Wang, Yuexuan Wang, Liwen Xu:
Compressive sensing over strongly connected digraph and its application in traffic monitoring. 1222-1230 - Zhenni Feng, Yanmin Zhu, Qian Zhang, Lionel M. Ni, Athanasios V. Vasilakos:
TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. 1231-1239 - Xiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu, Siyuan Liu, Lionel M. Ni:
ShopProfiler: Profiling shops with crowdsourcing data. 1240-1248
WS2: Wireless security and privacy 2
- Zhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang:
PS-TRUST: Provably secure solution for truthful double spectrum auctions. 1249-1257 - Pengfei Hu, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu:
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks. 1258-1266 - Wei Wang, Lin Chen, Kang G. Shin, Lingjie Duan:
Secure cooperative spectrum sensing and access against intelligent malicious behaviors. 1267-1275 - Xianru Du, Dan Shan, Kai Zeng, Lauren M. Huie:
Physical layer challenge-response authentication in wireless networks with relay. 1276-1284
CC6: Clound computing 6
- Ryan Shea, Feng Wang, Haiyang Wang, Jiangchuan Liu:
A deep investigation into network performance in virtual machine based cloud environments. 1285-1293 - Liuhua Chen, Haiying Shen, Karan Sapra:
RIAL: Resource Intensity Aware Load balancing in clouds. 1294-1302 - Jian-Jhih Kuo, Hsiu-Hsien Yang, Ming-Jer Tsai:
Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems. 1303-1311 - Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Gokhan Sahin, Chunming Qiao:
Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances. 1312-1320
CN2: Cellular networks 2
- Yuhuan Du, Gustavo de Veciana:
"Wireless networks without edges": Dynamic radio resource clustering and user scheduling. 1321-1329 - Omer Gurewitz, Yakov Sandomirsky, Gabriel Scalosub:
Cellular multi-coverage with non-uniform rates. 1330-1338 - Robert Margolies, Ashwin Sridharan, Vaneet Aggarwal, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan, Gil Zussman:
Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms. 1339-1347 - Ying Zhang:
User mobility from the view of cellular data networks. 1348-1356
EE3: Energy efficiency in wireless networks 3
- Kyoung-Hak Jung, Yuepeng Qi, Chansu Yu, Young-Joo Suh:
Energy efficient Wifi tethering on a smartphone. 1357-1365 - Qingwen Zhao, Yanmin Zhu, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li:
Fair energy-efficient sensing task allocation in participatory sensing with smartphones. 1366-1374 - Jon Crowcroft, Michael Segal, Liron Levin:
Improved structures for data collection in wireless sensor networks. 1375-1383 - Lu Liu, Xianghui Cao, Yu Cheng, Lili Du, Wei Song, Yu Wang:
Energy-efficient capacity optimization in wireless networks. 1384-1392
FN: Firewalls and network intrusion detection
- Zhuo Zhang, Zhibin Zhang, Patrick P. C. Lee, Yunjie Liu, Gaogang Xie:
ProWord: An unsupervised approach to protocol feature word extraction. 1393-1401 - Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu, Xinwen Fu:
TorWard: Discovery of malicious traffic over Tor. 1402-1410 - Deguang Kong, Guanhua Yan:
Transductive malware label propagation: Find your lineage from your neighbors. 1411-1419 - Qun Huang, Patrick P. C. Lee:
LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams. 1420-1428
IM4: Internet monitoring and measurement 4
- MyungKeun Yoon, JinWoo Son, Seon-Ho Shin:
Bloom tree: A search tree based on Bloom filters for multiple-set membership testing. 1429-1437 - João Taveira Araújo, Raul Landa, Richard G. Clegg, George Pavlou, Kensuke Fukuda:
A longitudinal analysis of Internet rate limitations. 1438-1446 - Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley:
Monitor placement for maximal identifiability in network tomography. 1447-1455 - Chenguang Yu, Yang Xu, Bo Liu, Yong Liu:
"Can you SEE me now?" A measurement study of mobile video calls. 1456-1464
SN4: Sensor networks 4
- Yan Li, Haibo Zhang, Zhiyi Huang, Michael H. Albert:
Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links. 1465-1473 - Xiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li:
Approximate multiple count in Wireless Sensor Networks. 1474-1482 - Gang Li, Jin Teng, Fan Yang, Adam C. Champion, Dong Xuan, Hong Luan, Yuan F. Zheng:
EV-sounding: A visual assisted electronic channel sounding system. 1483-1491 - Vikram P. Munishwar, Vinay Kolar, Nael B. Abu-Ghazaleh:
Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem. 1492-1500
WS3: wireless ecurity and privacy 3
- Zhuo Lu, Wenye Wang, Cliff Wang:
How can botnets cause storms? Understanding the evolution and impact of mobile botnets. 1501-1509 - Saiyu Qi, Yuanqing Zheng, Mo Li, Li Lu, Yunhao Liu:
COLLECTOR: A secure RFID-enabled batch recall protocol. 1510-1518 - Ilona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia:
Analysis and detection of SIMbox fraud in mobility networks. 1519-1526 - Mahtab Mirmohseni, Panagiotis Papadimitratos:
Scaling laws for secrecy capacity in cooperative wireless networks. 1527-1535
CN3: Cellular networks 3
- Francesco Malandrino, Claudio Casetti, Carla-Fabiana Chiasserini, Zana Limani:
Fast resource scheduling in HetNets with D2D support. 1536-1544 - Tuo Yu, Zilong Zhou, Da Zhang, Xinbing Wang, Yunxin Liu, Songwu Lu:
INDAPSON: An incentive data plan sharing system based on self-organizing network. 1545-1553 - Mayank Manjrekar, Vinod Ramaswamy, Srinivas Shakkottai:
A mean field game approach to scheduling in cellular systems. 1554-1562 - Tarun Bansal, Karthikeyan Sundaresan, Sampath Rangarajan, Prasun Sinha:
R2D2: Embracing device-to-device communication in next generation cellular networks. 1563-1571
DC1: Data center networking 1
- Jian Guo, Fangming Liu, Xiaomeng Huang, John C. S. Lui, Mi Hu, Qiao Gao, Hai Jin:
On efficient bandwidth allocation for traffic variability in datacenters. 1572-1580 - Hong Xu, Baochun Li:
RepFlow: Minimizing flow completion times with replicated flows in data centers. 1581-1589 - Marco Chiesa, Guy Kindler, Michael Schapira:
Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective. 1590-1598 - Li Chen, Yuan Feng, Baochun Li, Bo Li:
Towards performance-centric fairness in datacenter networks. 1599-1607
FT1: Fault tolerance and survivability 1
- Hiroshi Saito:
Geometric evaluation of survivability of disaster-affected network with probabilistic failure. 1608-1616 - Baohua Yang, Junda Liu, Scott Shenker, Jun Li, Kai Zheng:
Keep Forwarding: Towards k-link failure resilient routing. 1617-1625 - Reuven Cohen, Gabi Nakibly:
Restorable logical topology in the face of no or partial traffic demand knowledge. 1626-1634 - Yusuke Kobayashi, Kensuke Otsuki:
Max-flow min-cut theorem and faster algorithms in a circular disk failure model. 1635-1643
SB1: Scheduling and buffer management 1
- Peter M. van de Ven, Bo Zhang, Angela Schörgendorfer:
Distributed backup scheduling: Modeling and optimization. 1644-1652 - Peng-Jun Wan, Xiaohua Jia, Guojun Dai, Hongwei Du, Ophir Frieder:
Fast and simple approximation algorithms for maximum weighted independent set of links. 1653-1661 - Jaewook Kwak, Chul-Ho Lee, Do Young Eun:
A high-order Markov chain based scheduling algorithm for low delay in CSMA networks. 1662-1670 - Yin Sun, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff:
Scheduling of multicast and unicast services under limited feedback by using rateless codes. 1671-1679
SC1: Social computing and networks 1
- Wei Wei, Xiaojun Zhu, Qun Li:
LBSNSim: Analyzing and modeling location-based social networks. 1680-1688 - Tong Meng, Fan Wu, Guihai Chen:
On designing neighbor discovery protocols: A code-based approach. 1689-1697 - Guangchi Liu, Qing Yang, Honggang Wang, Xiaodong Lin, Mike P. Wittie:
Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic. 1698-1706 - Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. 1707-1715
SD: Software defined networking
- Ulas C. Kozat, Guanfeng Liang, Koray Kokten:
On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks. 1716-1724 - Lukas Kekely, Viktor Pus, Jan Korenek:
Software Defined Monitoring of application protocols. 1725-1733 - Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz:
On the effect of forwarding table size on SDN network utilization. 1734-1742 - Dan Li, Yunfei Shang, Congjie Chen:
Software defined green data center network with exclusive routing. 1743-1751
VN1: Vehicular Networks 1
- Shaohan Hu, Hengchang Liu, Lu Su, Hongyan Wang, Tarek F. Abdelzaher, Pan Hui, Wei Zheng, Zhiheng Xie, John A. Stankovic:
Towards automatic phone-to-phone communication for vehicular networking applications. 1752-1760 - Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li:
POST: Exploiting dynamic sociality for mobile advertising in vehicular networks. 1761-1769 - Hassan Aboubakr Omar, Weihua Zhuang, Li Li:
On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol. 1770-1778 - Lei Zhang, Boyang Yu, Jianping Pan:
GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses. 1779-1787
CN4: Cellular networks 4
- Majed Haddad, Habib B. A. Sidi, Piotr Wiecek, Eitan Altman:
Automated dynamic offset applied to cell association. 1788-1796 - Vincenzo Sciancalepore, Vincenzo Mancuso, Albert Banchs, Shmuel Zaks, Antonio Capone:
Interference coordination strategies for content update dissemination in LTE-A. 1797-1805 - Diala Naboulsi, Razvan Stanica, Marco Fiore:
Classifying call profiles in large-scale mobile traffic datasets. 1806-1814 - Yeon-Sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley, Kang-Won Lee:
Cross-layer path management in multi-path transport protocol for mobile devices. 1815-1823
DC2: Data center networking 2
- Brent E. Stephens, Alan L. Cox, Ankit Singla, John B. Carter, Colin Dixon, Wes Felter:
Practical DCB for improved data center networks. 1824-1832 - Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, Yih-Farn Robin Chen:
Distributed data storage systems with opportunistic repair. 1833-1841 - Xin Li, Jie Wu, Shaojie Tang, Sanglu Lu:
Let's stay together: Towards traffic aware virtual machine placement in data centers. 1842-1850 - Dawei Li, Jie Wu:
On the design and analysis of Data Center Network architectures for interconnecting dual-port servers. 1851-1859
FT2: Fault tolerance and survivability 2
- János Tapolcai, Lajos Rónyai, Éva Hosszu, Pin-Han Ho, Suresh Subramaniam:
Signaling free localization of node failures in all-optical networks. 1860-1868 - Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang:
Fault tolerant barrier coverage for wireless sensor networks. 1869-1877 - Yan Wang, Dongsheng Wei, Xunrui Yin, Xin Wang:
Heterogeneity-aware data regeneration in distributed storage systems. 1878-1886 - Pengfei Chen, Yong Qi, Pengfei Zheng, Di Hou:
CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems. 1887-1895
SB2: Scheduling and buffer management 2
- Florin Ciucu, Felix Poloczek, Jens B. Schmitt:
Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling. 1896-1904 - Chandramani Singh, Angelia Nedic, R. Srikant:
LP-relaxation based distributed algorithms for scheduling in wireless networks. 1905-1913 - Wei Wang, Ben Liang, Baochun Li:
Low complexity multi-resource fair queueing with bounded delay. 1914-1922 - Shizhen Zhao, Xiaojun Lin:
Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines. 1923-1931
SC2: Social computing and networks 2
- Zongqing Lu, Yonggang Wen, Guohong Cao:
Information diffusion in mobile social networks: The speed perspective. 1932-1940 - Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic:
Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach. 1941-1949 - Ngoc Minh Do, Ye Zhao, Shu-Ting Wang, Cheng-Hsin Hsu, Nalini Venkatasubramanian:
Optimizing offline access to social network content on mobile devices. 1950-1958 - Xu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang:
A social group utility maximization framework with applications in database assisted spectrum access. 1959-1967
VN2: Vehicular networks 2
- Markus Forster, Raphaël Frank, Mario Gerla, Thomas Engel:
A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves. 1968-1976 - Yang Wang, Liusheng Huang, Tianbo Gu, Hao Wei, Kai Xing, Junshan Zhang:
Data-driven traffic flow analysis for vehicular communications. 1977-1985 - Yiran Zhao, Yang Zhang, Tuo Yu, Tianyuan Liu, Xinbing Wang, Xiaohua Tian, Xue Liu:
CityDrive: A map-generating and speed-optimizing driving system. 1986-1994 - Dong Li, Zhixue Lu, Tarun Bansal, Erik Schilling, Prasun Sinha:
ForeSight: Mapping vehicles in visual domain and electronic domain. 1995-2003
DB: Big Data
- Yanfang Le, Jiangchuan Liu, Funda Ergün, Dan Wang:
Online load balancing for MapReduce with skewed data input. 2004-2012 - Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, Liusheng Huang:
Enabling efficient access control with dynamic policy updating for big data in the cloud. 2013-2021 - Linquan Zhang, Zongpeng Li, Chuan Wu, Minghua Chen:
Online algorithms for uploading deferrable big data to the cloud. 2022-2030 - Dan Williams, Shuai Zheng, Xiangliang Zhang, Hani Jamjoom:
TideWatch: Fingerprinting the cyclicality of big data workloads. 2031-2039
CNB: Content/name based networking
- Valentina Martina, Michele Garetto, Emilio Leonardi:
A unified approach to the performance analysis of caching systems. 2040-2048 - Haowei Yuan, Patrick Crowley:
Scalable Pending Interest Table design: From principles to practice. 2049-2057 - Shiyou Qian, Jian Cao, Yanmin Zhu, Minglu Li:
REIN: A fast event matching approach for content-based publish/subscribe systems. 2058-2066 - Christos Tsilopoulos, George Xylomenos, Yannis Thomas:
Reducing forwarding state in content-centric networks with semi-stateless forwarding. 2067-2075
CR1: Cognitive radio networks 1
- Yao-Win Peter Hong, Chee Wei Tan, Liang Zheng, Cheng-Lin Hsieh, Chia-Han Lee:
A unified framework for wireless max-min utility optimization with general monotonic constraints. 2076-2084 - Xingya Liu, Jiang Xie:
A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks. 2085-2093 - Jing Zhao, Wei Gao, Yi Wang, Guohong Cao:
Delay-constrained caching in cognitive radio networks. 2094-2102 - Jelena V. Misic, Vojislav B. Misic:
Probability distribution of spectral hole duration in cognitive networks. 2103-2111
CS: Cloud security and privacy
- Bing Wang, Shucheng Yu, Wenjing Lou, Y. Thomas Hou:
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. 2112-2120 - Jiawei Yuan, Shucheng Yu:
Efficient public integrity checking for cloud data sharing with multi-user modification. 2121-2129 - Cong Wang, Bingsheng Zhang, Kui Ren, Janet Meiling Wang Roveda, Chang Wen Chen, Zhen Xu:
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. 2130-2138
FT3: Fault tolerancy and survivability 3
- Jing Zhang, Xiangke Liao, Shanshan Li, Yu Hua, Xue Liu, Bin Lin:
Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage. 2139-2147 - Theodore Elhourani, Abishek Gopalan, Srinivasan Ramasubramanian:
IP fast rerouting for multi-link failures. 2148-2156 - Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:
Rippler: Delay injection for service dependency detection. 2157-2165
SB3: Scheduling and buffer management 3
- Yuqing Zhu, Yiwei Jiang, Weili Wu, Ling Ding, Ankur Teredesai, Deying Li, Wonjun Lee:
Minimizing makespan and total completion time in MapReduce-like systems. 2166-2174 - Yi Yuan, Dan Wang, Jiangchuan Liu:
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments. 2175-2183 - Xuan Wang, Yi Chen, Lin Cai, Jianping Pan:
Scheduling in a secure wireless network. 2184-2192 - Kyu Seob Kim, Chih-Ping Li, Eytan H. Modiano:
Scheduling multicast traffic with deadlines in wireless networks. 2193-2201
SC3: Social computing and networks 3
- Siddhartha Banerjee, Avhishek Chatterjee, Sanjay Shakkottai:
Epidemic thresholds with external agents. 2202-2210 - Kai Zhu, Lei Ying:
A robust information source estimator with sparse observations. 2211-2219 - Minsung Jang, Karsten Schwan, Ketan Bhardwaj, Ada Gavrilovska, Adhyas Avasthi:
Personal clouds: Sharing and integrating networked resources to enhance end user experiences. 2220-2228 - Brian Proulx, Junshan Zhang:
Modeling social network relationships via t-cherry junction trees. 2229-2237
CR2: Cognitive radio networks 2
- Jing Zhao, Guohong Cao:
Spectrum-aware data replication in intermittently connected cognitive radio networks. 2238-2246 - Shan-Hung Wu, Ching-Chan Wu, Wing-Kai Hon, Kang G. Shin:
Rendezvous for heterogeneous spectrum-agile devices. 2247-2255 - Haitham Hassanieh, Lixin Shi, Omid Abari, Ezzeldin Hamed, Dina Katabi:
GHz-wide sensing and decoding using the sparse Fourier transform. 2256-2264 - Peng Lin, Xiaojun Feng, Qian Zhang:
Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction. 2265-2273
DT: Delay tolerant networks
- Lirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang, Alade O. Tokuta:
Multiple heterogeneous data ferry trajectory planning in wireless sensor networks. 2274-2282 - Kang Chen, Haiying Shen:
DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information. 2283-2291 - Jeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra:
Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications. 2292-2300 - Wei Gao, Qinghua Li, Guohong Cao:
Forwarding redundancy in opportunistic mobile networks: Investigation and elimination. 2301-2309
LL: Localization and location privacy
- Xi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, Yunhao Liu:
Privacy-preserving high-quality map generation with participatory sensing. 2310-2318 - Tao Shu, Yingying Chen, Jie Yang, Albert Williams:
Multi-lateral privacy-preserving localization in pervasive environments. 2319-2327 - Wei Wang, Qian Zhang:
A stochastic game for privacy preserving context sensing on mobile phone. 2328-2336 - Hong Li, Limin Sun, Haojin Zhu, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. 2337-2345
MD: Mobile Data Offloading
- Xiaofei Wang, Min Chen, Zhu Han, Dapeng Oliver Wu, Ted Taekyoung Kwon:
TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks. 2346-2354 - Marco Valerio Barbera, Sokol Kosta, Alessandro Mei, Vasile Claudiu Perta, Julinda Stefa:
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system. 2355-2363 - Fidan Mehmeti, Thrasyvoulos Spyropoulos:
Is it worth to be patient? Analysis and optimization of delayed mobile data offloading. 2364-2372 - Liyao Xiang, Shiwen Ye, Yuan Feng, Baochun Li, Bo Li:
Ready, Set, Go: Coalesced offloading from mobile devices to the cloud. 2373-2381
PA1: Performance analysis and modelling 1
- Michael A. Beck, Sebastian A. Henningsen, Simon B. Birnbach, Jens B. Schmitt:
Towards a statistical network calculus - Dealing with uncertainty in arrivals. 2382-2390 - Florin Ciucu, Ramin Khalili, Yuming Jiang, Liu Yang, Yong Cui:
Towards a system theoretic approach to wireless network capacity in finite time and space. 2391-2399 - Rahul Singh, I-Hong Hou, P. R. Kumar:
Fluctuation analysis of debt based policies for wireless networks with hard delay constraints. 2400-2408 - Ehsan Monsef, Tricha Anjali, Sanjiv Kapoor:
Price of Anarchy in network routing with class based capacity guarantees. 2409-2417
SB4: Scheduling and buffer management 4
- Michael J. Neely:
Distributed stochastic optimization via correlated scheduling. 2418-2426 - Reuven Cohen, Guy Grebla:
Multi-dimensional OFDMA scheduling in a wireless network with relay nodes. 2427-2435 - Huasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang:
Application-level scheduling with deadline constraints. 2436-2444 - Zizhong Cao, Murali S. Kodialam, T. V. Lakshman:
Joint static and dynamic traffic scheduling in data center networks. 2445-2453
WL: Wireless LANs
- Guanhua Wang, Kaishun Wu, Qian Zhang, Lionel M. Ni:
SimCast: Efficient video delivery in MU-MIMO WLANs. 2454-2462 - Ruwaifa Anwar, Kamran Nishat, Mohsin Ali, Zahaib Akhtar, Haseeb Niaz, Ihsan Ayyub Qazi:
Loss differentiation: Moving onto high-speed wireless LANs. 2463-2471 - Jiajue Ou, Yuanqing Zheng, Mo Li:
MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission. 2472-2480 - Jun Huang, Guoliang Xing, Gang Zhou:
Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach. 2481-2489
CR3: Cognitive radio networks 3
- Tongjie Zhang, Zongpeng Li, Reihaneh Safavi-Naini:
Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing. 2490-2498 - Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu:
Hitchhike: Riding control on preambles. 2499-2507 - Siddhartha Brahma, Melissa Duarte, Ayan Sengupta, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi:
QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying. 2508-2516 - Tarun Bansal, Bo Chen, Prasun Sinha:
FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions. 2517-2525
MA1: Medium access control 1
- Hongxing Li, Nitin H. Vaidya:
Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes. 2526-2534 - Dongmyung Lee, Donggyu Yun, Jinwoo Shin, Yung Yi, Se-Young Yun:
Provable per-link delay-optimal CSMA for general wireless network topology. 2535-2543 - François Baccelli, Bartlomiej Blaszczyszyn, Chandramani Singh:
Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks. 2544-2552 - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:
Communication through collisions: Opportunistic utilization of past receptions. 2553-2561
OP: Overlay and peer-to-peer networks
- Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis:
Open peering by Internet transit providers: Peer preference or peer pressure? 2562-2570 - Cédric Westphal:
A stable fountain code mechanism for peer-to-peer content distribution. 2571-2579 - Vinay Setty, Gunnar Kreitz, Guido Urdaneta, Roman Vitenberg, Maarten van Steen:
Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints. 2580-2588
PA2: Performance analysis and modelling 2
- Shuochao Yao, Xinbing Wang, Xiaohua Tian, Qian Zhang:
Delay-throughput tradeoff with correlated mobility of ad-hoc networks. 2589-2597 - Kuangyu Zheng, Xiaodong Wang, Li Li, Xiaorui Wang:
Joint power optimization of data center network and servers with correlation analysis. 2598-2606 - Virag Shah, Gustavo de Veciana:
Performance evaluation and asymptotics for Content Delivery Networks. 2607-2615 - Florin Ciucu, Jens B. Schmitt:
On the catalyzing effect of randomness on the per-flow throughput in wireless networks. 2616-2624
SG1: Smart Grid 1
- Mingkui Wei, Wenye Wang:
Greenbench: A benchmark for observing power grid vulnerability under data-centric threats. 2625-2633 - Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman:
Power grid vulnerability to geographically correlated failures - Analysis and control implications. 2634-2642 - Yu Zhang, Mihaela van der Schaar:
Structure-aware stochastic load management in smart grids. 2643-2651 - Hao Liang, Atef Abdrabou, Weihua Zhuang:
Stochastic information management for voltage regulation in smart distribution systems. 2652-2660
SR1: Short range wireless technologies 1
- Bingsheng Zhang, Kui Ren, Guoliang Xing, Xinwen Fu, Cong Wang:
SBVLC: Secure barcode-based visible light communication for smartphones. 2661-2669 - Lei Yang, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li:
Frogeye: Perception of the slightest tag motion. 2670-2678 - Giuseppe Enrico Santagati, Tommaso Melodia:
Sonar inside your body: Prototyping ultrasonic intra-body sensor networks. 2679-2687 - Zimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu:
LiFi: Line-Of-Sight identification with WiFi. 2688-2696
CR4: Cognitive radio networks 4
- Qiben Yan, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou:
MIMO-based jamming resilient communication in wireless networks. 2697-2706 - Tsung Ying Wu, Wanjiun Liao, Cheng-Shang Chang:
CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks. 2706-2714 - Bo Gao, Yaling Yang, Jung-Min "Jerry" Park:
A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks. 2715-2723 - You Han, Eylem Ekici, Haris Kremo, Onur Altintas:
Throughput-efficient channel allocation in multi-channel cognitive vehicular networks. 2724-2732
MA2: Medium access control 2
- Douglas M. Blough, Giovanni Resta, Paolo Santi:
Interference-aware proportional fairness for multi-rate wireless networks. 2733-2741 - Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, Swetha Shivaramaiah:
FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver. 2742-2750 - Adrian Ogierman, Andréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang:
Competitive MAC under adversarial SINR. 2751-2759 - Richard Combes, Alexandre Proutière, Donggyu Yun, Jungseul Ok, Yung Yi:
Optimal Rate Sampling in 802.11 systems. 2760-2767
PA3: Performance analysis and modelling 3
- Jiajia Liu, Hiroki Nishiyama, Nei Kato, Jianfeng Ma, Xiaohong Jiang:
Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility. 2768-2776 - Yuqing Zhu, Weili Wu, James Willson, Ling Ding, Lidong Wu, Deying Li, Wonjun Lee:
An approximation algorithm for client assignment in client/server systems. 2777-2785 - Ane Izagirre, Urtzi Ayesta, Ina Maria Verloop:
Sojourn time approximations in a multi-class time-sharing server. 2786-2794 - Xin Xu, Chul-Ho Lee, Do Young Eun:
A general framework of hybrid graph sampling for complex network analysis. 2795-2803
SG2: Smart Grid 2
- Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao:
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering. 2804-2812 - Fanxin Kong, Chuansheng Dong, Xue Liu, Haibo Zeng:
Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid. 2813-2821 - Dong-Hoon Shin, Shibo He, Junshan Zhang:
Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach. 2822-2830 - Kan Zhou, Jianping Pan, Lin Cai:
Optimal Combined Heat and Power system scheduling in smart grid. 2831-2839
SR2: Short range wireless technologies 2
- Yi Guo, Lei Yang, Bowen Li, Tianci Liu, Yunhao Liu:
RollCaller: User-friendly indoor navigation system using human-item spatial relation. 2840-2848 - Jun Huang, Wahhab Albazrqaoe, Guoliang Xing:
BlueID: A practical system for Bluetooth device identification. 2849-2857 - Peng Guo, Jiannong Cao, Kui Zhang, Xuefeng Liu:
Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding. 2858-2866
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.