default search action
34th INFOCOM 2015: Kowloon, Hong Kong
- 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015. IEEE 2015, ISBN 978-1-4799-8381-0
Multimedia Networking
- Eilwoo Baik, Amit Pande, Chris Stover, Prasant Mohapatra:
Video acuity assessment in mobile devices. 1-9 - Kien A. Hua, Ning Jiang, Jason Kuhns, Vaithiyanathan Sundaram, Cliff C. Zou:
Redundancy control through traffic deduplication. 10-18 - Sangki Yun, Daehyeok Kim, Xiaofan Lu, Lili Qiu:
Optimized layered integrated video encoding. 19-27 - Xiaoli Wang, Jiasi Chen, Aveek Dutta, Mung Chiang:
Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing. 28-36
Device-to-Device and 5G Networks
- Chuan Ma, Weijie Wu, Ying Cui, Xinbing Wang:
On the performance of successive interference cancellation in D2D-enabled cellular networks. 37-45 - Jiajia Liu, Shangwei Zhang, Hiroki Nishiyama, Nei Kato, Jun Guo:
A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks. 46-54 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks. 55-63
Energy Efficiency in Wireless Networks
- Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo:
Energy-efficient transmission with data sharing. 73-81 - Philipp H. Kindt, Han Jing, Nadja Peters, Samarjit Chakraborty:
ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission. 82-90 - Michael J. Neely:
Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs. 91-99 - Swetank Kumar Saha, Pratik Deshpande, Pranav P. Inamdar, Ramanujan K. Sheshadri, Dimitrios Koutsonikolas:
Power-throughput tradeoffs of 802.11n/ac in smartphones. 100-108
Topology and Flow Control in Datacenter Networks
- Márton Csernai, Florin Ciucu, Ralf-Peter Braun, András Gulyás:
Towards 48-fold cabling complexity reduction in large flattened butterfly networks. 109-117 - Danfeng Shan, Wanchun Jiang, Fengyuan Ren:
Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches. 118-126 - Han Zhang, Xingang Shi, Xia Yin, Fengyuan Ren, Zhiliang Wang:
More load, more differentiation - A design principle for deadline-aware congestion control. 127-135 - Jun Duan, Zhiyang Guo, Yuanyuan Yang:
Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs. 136-144
Cognitive Radio Networks 1
- Pei Huang, Chin-Jung Liu, Xi Yang, Li Xiao:
Efficient broadcast on fragmented spectrum in cognitive radio networks. 145-153 - Zhaoquan Gu, Haosen Pu, Qiang-Sheng Hua, Francis C. M. Lau:
Improved rendezvous algorithms for heterogeneous cognitive radio networks. 154-162 - Yi Song:
Optimal secondary user packet size in mobile cognitive radio networks under fading channels. 163-171 - Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, Chi Zhang:
SpecGuard: Spectrum misuse detection in dynamic spectrum access systems. 172-180
Software Defined Networking 1
- Shan-Hsiang Shen, Liang-Hao Huang, De-Nian Yang, Wen-Tsuen Chen:
Reliable multicast routing for software-defined networks. 181-189 - Marco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid:
A distributed and robust SDN control plane for transactional network updates. 190-198 - Zhiming Hu, Jun Luo:
Cracking network monitoring in DCNs with SDN. 199-207 - Di Wu, Dmitri I. Arkhipov, Eskindir Asmare, Zhijing Qin, Julie A. McCann:
UbiFlow: Mobility management in urban-scale software defined IoT. 208-216
Sensor Networks 1
- Jing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao:
Composite event coverage in wireless sensor networks with heterogeneous sensors. 217-225 - Bahram Alinia, Mohammad Hassan Hajiesmaili, Ahmad Khonsari:
On the construction of maximum-quality aggregation trees in deadline-constrained WSNs. 226-234 - Steffen Bondorf, Jens B. Schmitt:
Boosting sensor network calculus by thoroughly bounding cross-traffic. 235-243 - Shuangjuan Li, Hong Shen:
Minimizing the maximum sensor movement for barrier coverage in the plane. 244-252
Security in Wireless Networks
- Zhuo Lu, Yalin Evren Sagduyu, Jason H. Li:
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks. 253-261 - Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du:
Game-theory-based batch identification of invalid signatures in wireless mobile networks. 262-270 - Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen:
Exploiting mobile social behaviors for Sybil detection. 271-279 - Zhuo Lu, Cliff Wang:
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference. 280-288
Overlay and Peer-to-Peer Networks
- Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria:
ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer. 289-297 - Stefanie Roos, Thorsten Strufe:
On the impossibility of efficient self-stabilization in virtual overlays with churn. 298-306 - Bang Liu, Di Niu, Zongpeng Li, H. Vicky Zhao:
Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling. 307-315 - Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou:
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis. 316-324
Hetergeneous Cellular Networks
- Wei Wang, Xiaobing Wu, Lei Xie, Sanglu Lu:
Femto-matching: Efficient traffic offloading in heterogeneous cellular networks. 325-333 - Wei Bao, Ben Liang:
Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective. 334-342 - Hao Zhou, Yusheng Ji, Xiaoyan Wang, Baohua Zhao:
ADMM based algorithm for eICIC configuration in heterogeneous cellular networks. 343-351 - Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan:
Performance analysis for two-tier cellular systems based on probabilistic distance models. 352-360
Mobile and Wireless Network Measurements 1
- Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li:
How bad are the rogues' impact on enterprise 802.11 network performance? 361-369 - Weichao Li, Ricky K. P. Mok, Daoyuan Wu, Rocky K. C. Chang:
On the accuracy of smartphone-based mobile network measurement. 370-378 - Song Min Kim, Shuai Wang, Tian He:
Exploiting causes and effects of wireless link correlation for better performance. 379-387 - Dziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein:
Dissecting packet loss in mobile broadband networks from the edge. 388-396
Routing and Scheduling in Datacenter Networks
- Yousi Zheng, Ness B. Shroff, R. Srikant, Prasun Sinha:
Exploiting large system dynamics for designing simple data center schedulers. 397-405 - Chang-Heng Wang, Tara Javidi, George Porter:
End-to-end scheduling for all-optical data centers. 406-414 - Kai Han, Zhiming Hu, Jun Luo, Liu Xiang:
RUSH: Routing and scheduling for hybrid data center networks. 415-423 - Yangming Zhao, Kai Chen, Wei Bai, Minlan Yu, Chen Tian, Yanhui Geng, Yiming Zhang, Dan Li, Sheng Wang:
Rapier: Integrating routing and scheduling for coflow-aware data center networks. 424-432
Cognitive Radio Networks 2
- Dong-Hoon Shin, Shibo He, Junshan Zhang:
Joint sensing task and subband allocation for large-scale spectrum profiling. 433-441 - Jelena V. Misic, Md. Mizanur Rahman, Vojislav B. Misic:
Priority differentiation in cognitive radio networks. 442-450 - Narendra Anand, Jeongkeun Lee, Sung-Ju Lee, Edward W. Knightly:
Mode and user selection for multi-user MIMO WLANs without CSI. 451-459 - Wei Wang, Yingjie Victor Chen, Zeyu Wang, Jin Zhang, Kaishun Wu, Qian Zhang:
Changing channel without strings: Coordination-free wideband spectrum adaptation. 460-468
Software Defined Networking 2
- Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever:
On the co-existence of distributed and centralized routing control-planes. 469-477 - Xuan Nam Nguyen, Damien Saucez, Chadi Barakat, Thierry Turletti:
OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement. 478-486 - Huandong Wang, Yong Li, Ying Zhang, Depeng Jin:
Virtual machine migration planning in software-defined networks. 487-495 - Calvin Newport, Wenchao Zhou:
The (surprising) computational power of the SDN data plane. 496-504
Sensor Networks 2
- Rahul Singh, Xueying Guo, P. R. Kumar:
Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks. 505-512 - Laura Galluccio, Sebastiano Milardo, Giacomo Morabito, Sergio Palazzo:
SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks. 513-521 - Dora Spenza, Michele Magno, Stefano Basagni, Luca Benini, Mario Paoli, Chiara Petrioli:
Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems. 522-530 - Siyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang:
Drawing dominant dataset from big sensory data in wireless sensor networks. 531-539
Internet and Web Security 1
- Michela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral:
Accelerating regular expression matching over compressed HTTP. 540-548 - Jingyu Hua, Yue Gao, Sheng Zhong:
Differentially private publication of general time-serial trajectory data. 549-557 - Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo:
Detecting distributed signature-based intrusion: The case of multi-path routing attacks. 558-566 - Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song:
JITScope: Protecting web users from control-flow hijacking attacks. 567-575
Cloud Storage Systems
- Jian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li:
Online procurement auctions for resource pooling in client-assisted cloud storage systems. 576-584 - Yin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff:
Provably delay efficient data retrieving in storage clouds. 585-593 - Yanfei Guo, Jia Rao, Dazhao Cheng, Changjun Jiang, Cheng-Zhong Xu, Xiaobo Zhou:
StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters. 594-602 - Boyang Yu, Jianping Pan:
Location-aware associated data placement for geo-distributed data-intensive applications. 603-611
Cognitive Radio Networks 3
- Shimin Gong, Lingjie Duan, Ping Wang:
Robust optimization of cognitive radio networks powered by energy harvesting. 612-620 - Rahul Urgaonkar, Prithwish Basu, Saikat Guha, Ananthram Swami:
Optimal multicast in dense multi-channel multi-radio wireless networks. 621-629 - Jincheng Zhang, Wenjie Zhang, Minghua Chen, Zhi Wang:
WINET: Indoor white space network design. 630-638 - Yanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Danfeng (Daphne) Yao:
MadeCR: Correlation-based malware detection for cognitive radio. 639-647
Routing and Traffic Engineering
- Weiguo Dai, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Francis C. M. Lau:
Minimum control latency of dynamic networks. 648-656 - Randeep Bhatia, Fang Hao, Murali S. Kodialam, T. V. Lakshman:
Optimized network traffic engineering using segment routing. 657-665 - Feng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa:
Compact location encodings for scalable Internet routing. 666-674 - Rowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas A. Dimitropoulos:
Policy-compliant path diversity and bisection bandwidth. 675-683
Sensor Networks 3
- Zuoming Yu, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan:
Local face-view barrier coverage in camera sensor networks. 684-692 - Lin Chen, Ruolin Fan, Kaigui Bian, Lin Chen, Mario Gerla, Tao Wang, Xiaoming Li:
On heterogeneous neighbor discovery in wireless sensor networks. 693-701 - Hao Cai, Tilman Wolf:
On 2-way neighbor discovery in wireless networks with directional antennas. 702-710 - Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
VM-tracking: Visual-motion sensing integration for real-time human tracking. 711-719
Internet and Web Security 2
- Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall:
Original SYN: Finding machines hidden behind firewalls. 720-728 - Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura:
Agile virtualized infrastructure to proactively defend against cyber attacks. 729-737 - Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Adversary-aware IP address randomization for proactive agility against sophisticated attackers. 738-746 - Pengfei Hu, Hongxing Li, Hao Fu, Derya Cansever, Prasant Mohapatra:
Dynamic defense strategy against advanced persistent threat with insiders. 747-755
Joint Source Coding and Network Coding
- Jad Hachem, Nikhil Karamchandani, Suhas N. Diggavi:
Content caching and delivery over heterogeneous wireless networks. 756-764 - Qiao Xiang, Hongwei Zhang, Jianping Wang, Guoliang Xing, Shan Lin, Xue Liu:
On optimal diversity in network-coding-based routing in wireless networks. 765-773 - Fangzhou Chen, Bin Li, Can Emre Koksal:
Low-delay distributed source coding for time-varying sources with unknown statistics. 774-782 - Yuben Qu, Chao Dong, Haipeng Dai, Fan Wu, Shaojie Tang, Hai Wang, Chang Tian:
Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability. 783-791
Next Generation Cellular Networks
- Shubhadip Mitra, Sayan Ranu, Vinay Kolar, Aditya Telang, Arnab Bhattacharya, Ravi Kokku, Sriram Raghavan:
Trajectory aware macro-cell planning for mobile users. 792-800 - François Baccelli, Xinchen Zhang:
A correlated shadowing model for urban wireless networks. 801-809 - Sangki Yun, Lili Qiu:
Supporting WiFi and LTE co-existence. 810-818 - Eugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin:
SPIRO: Turning elephants into mice with efficient RF transport. 819-827
Mobile and Wireless Network Measurements 2
- Sookhyun Yang, Jim Kurose, Simon Heimlicher, Arun Venkataramani:
Measurement and modeling of user transitioning among networks. 828-836 - Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria:
On factors affecting the usage and adoption of a nation-wide TV streaming service. 837-845 - Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos:
A behavior-aware profiling of handheld devices. 846-854 - Shu Wang, Vignesh Venkateswaran, Xinyu Zhang:
Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework. 855-863
Cloud Computing
- Pengfei Zhang, Xi Li, Rui Chu, Huaimin Wang:
HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform. 864-872 - Mohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. S. Eugene Ng, Sanjay G. Rao:
Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing. 873-881 - Jing Fu, Jun Guo, Eric W. M. Wong, Moshe Zukerman:
Energy-efficient heuristics for job assignment in processor-sharing server farms. 882-890 - Zhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang:
Need for speed: CORA scheduler for optimizing completion-times in the cloud. 891-899
Resource Markets in Wireless Networks
- Yuan Luo, Lin Gao, Jianwei Huang:
HySIM: A hybrid spectrum and information market for TV white space networks. 900-908 - Ming Li, Pan Li, Linke Guo, Xiaoxia Huang:
PPER: Privacy-preserving economic-robust spectrum auction in wireless networks. 909-917 - Ruihao Zhu, Kang G. Shin:
Differentially private and strategy-proof spectrum auction with approximate revenue maximization. 918-926 - Yu Wu, Lei Ying:
A cloudlet-based multi-lateral resource exchange framework for mobile users. 927-935
Scheduling and Buffer Management 1
- Mostafa Dehghan, Anand Seetharam, Bo Jiang, Ting He, Theodoros Salonidis, Jim Kurose, Don Towsley, Ramesh K. Sitaraman:
On the complexity of optimal routing and content caching in heterogeneous networks. 936-944 - Felix Poloczek, Florin Ciucu:
Service-martingales: Theory and applications to the delay analysis of random access protocols. 945-953 - Ari Arapostathis, Anup Biswas, Guodong Pang:
Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost. 954-962 - Qiaomin Xie, Yi Lu:
Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality. 963-972
Sensor Networks 4
- Jiguo Yu, Lili Jia, Dongxiao Yu, Guangshun Li, Xiuzhen Cheng:
Minimum connected dominating set construction in wireless networks under the beeping model. 972-980 - Chen Wang, Hongbo Jiang:
SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs. 981-989 - Zhiwei Zhao, Wei Dong, Gaoyang Guan, Jiajun Bu, Tao Gu, Chun Chen:
Modeling link correlation in low-power wireless networks. 990-998 - Lin Chen, Wei Wang, Hua Huang, Shan Lin:
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design. 999-1007
Privacy
- Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang:
Personalized location privacy in mobile networks: A social group utility approach. 1008-1016 - Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Enhancing privacy through caching in location-based services. 1017-1025 - Linke Guo, Yuguang Fang, Ming Li, Pan Li:
Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems. 1026-1034 - Sergio Salinas, Changqing Luo, Xuhui Chen, Pan Li:
Efficient secure outsourcing of large-scale linear systems of equations. 1035-1043