


Остановите войну!
for scientists:


default search action
36th INFOCOM 2017: Atlanta, GA, USA
- 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017. IEEE 2017, ISBN 978-1-5090-5336-0
- Chen Tian, Ali Munir, Alex X. Liu, Yingtong Liu, Yanzhao Li, Jiajun Sun, Fan Zhang, Gong Zhang:
Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion control. 1-9 - Ruozhou Yu
, Guoliang Xue, Xiang Zhang, Dan Li:
Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers. 1-9 - Yuanwei Lu, Guo Chen, Larry Luo, Kun Tan, Yongqiang Xiong, Xiaoliang Wang, Enhong Chen:
One more queue is enough: Minimizing flow completion time with explicit priority notification. 1-9 - Jinlong E, Yong Cui, Peng Wang, Zhenhua Li, Chaokun Zhang:
CoCloud: Enabling efficient cross-cloud file collaboration based on inefficient web APIs. 1-9 - Chen Chen, Wei Wang
, Shengkai Zhang, Bo Li:
Cluster fair queueing: Speeding up data-parallel jobs with delay guarantees. 1-9 - Li Chen, Shuhao Liu, Baochun Li, Bo Li:
Scheduling jobs across geo-distributed datacenters with max-min fairness. 1-9 - Chunguang Li, Dan Feng, Yu Hua, Wen Xia, Leihua Qin, Yue Huang, Yukun Zhou:
BAC: Bandwidth-aware compression for efficient live migration of virtual machines. 1-9 - Ahmed Osama Fathy Atya, Zhiyun Qian
, Srikanth V. Krishnamurthy
, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. 1-9 - Wenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. 1-9 - Xin Li
, Qinghan Xue, Mooi Choo Chuah:
CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system. 1-9 - Lei Yang, Qingji Zheng, Xinxin Fan:
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. 1-9 - Qian Wang
, Shengshan Hu
, Minxin Du, Jingjun Wang, Kui Ren:
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. 1-9 - Pan Li, Hoang Dau
, Gregory J. Puleo, Olgica Milenkovic:
Motif clustering and overlapping clustering for social network analysis. 1-9 - Guangmo Amo Tong, Weili Wu, Ling Guo, Deying Li, Cong Liu, Bin Liu, Ding-Zhu Du:
An efficient randomized algorithm for rumor blocking in online social networks. 1-9 - Jungseul Ok, Jinwoo Shin, Yung Yi:
Incentivizing strategic users for social diffusion: Quantity or quality? 1-9 - Md. Tanvir Al Amin
, Charu C. Aggarwal, Shuochao Yao, Tarek F. Abdelzaher, Lance M. Kaplan:
Unveiling polarization in social networks: A matrix factorization approach. 1-9 - Quan Chen
, Hong Gao, Siyao Cheng, Jianzhong Li, Zhipeng Cai
:
Distributed non-structure based data aggregation for duty-cycle wireless sensor networks. 1-9 - Kin Sum Liu, Tyler Mayer, Hao-Tsung Yang, Esther M. Arkin, Jie Gao, Mayank Goswami, Matthew P. Johnson, Nirman Kumar, Shan Lin:
Joint sensing duty cycle scheduling for heterogeneous coverage guarantee. 1-9 - Kaibo Fu, Wei Ren, Wei Dong:
Multihop calibration for mobile sensing: K-hop Calibratability and reference sensor deployment. 1-9 - Yibo Wu
, Yi Wang, Guohong Cao:
Photo crowdsourcing for area coverage in resource constrained environments. 1-9 - Yiwei Zhuo, Hongzi Zhu, Hua Xue, Shan Chang:
Perceiving accurate CSI phases with commodity WiFi devices. 1-9 - Seongho Byeon, Kangjin Yoon, Changmok Yang, Sunghyun Choi:
STRALE: Mobility-aware PHY rate and frame aggregation length adaptation in WLANs. 1-9 - Sihui Han, Kang G. Shin:
Enhancing wireless performance using reflectors. 1-9 - Alireza Ameli Renani, Jun Huang, Guoliang Xing, Abdol-Hossein Esfahanian:
Harnessing hardware defects for improving wireless link performance: Measurements and applications. 1-9 - Ganesh Chennimala Sankaran, Krishna M. Sivalingam
:
Combinatorial approach for network switch design in data center networks. 1-9 - Su Jia, Xin Jin, Golnaz Ghasemiesfeh, Jiaxin Ding, Jie Gao:
Competitive analysis for online scheduling in software-defined optical WAN. 1-9 - Yu Nakayama
, Takuya Tsutsumi, Kazuki Maruta
, Kaoru Sezaki:
ABSORB: Autonomous base station with optical reflex backhaul to adapt to fluctuating demand. 1-9 - Steven Gay, Renaud Hartert, Stefano Vissicchio:
Expect the unexpected: Sub-second optimization for segment routing. 1-9 - Huanle Xu, Gustavo de Veciana, Wing Cheong Lau:
Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysis. 1-9 - Yipei Niu, Fangming Liu, Xincai Fei, Bo Li:
Handling flash deals with soft guarantee in hybrid cloud. 1-9 - Robert Birke, Juan F. Pérez
, Zhan Qiu, Mathias Björkqvist, Lydia Y. Chen:
Power of redundancy: Designing partial replication for multi-tier applications. 1-9 - Zhe Huang, S. Matthew Weinberg, Liang Zheng, Carlee Joe-Wong, Mung Chiang:
Discovering valuations and enforcing truthfulness in a deadline-aware scheduler. 1-9 - Xu Zheng, Zhipeng Cai
, Jianzhong Li, Hong Gao:
Location-privacy-aware review publication mechanism for local business service systems. 1-9 - Shaowei Wang, Yiwen Nie, Pengzhan Wang, Hongli Xu, Wei Yang, Liusheng Huang:
Local private ordinal data distribution estimation. 1-9 - Hai Liu, Xinghua Li, Hui Li, Jianfeng Ma, XinDi Ma:
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. 1-9 - Marco Gramaglia, Marco Fiore, Alberto Tarable, Albert Banchs:
Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories. 1-9 - Abhishek Sinha, Eytan H. Modiano:
Optimal control for generalized network-flow problems. 1-9 - Kai Lampka, Steffen Bondorf
, Jens B. Schmitt, Nan Guan
, Wang Yi:
Generalized finitary real-time calculus. 1-9 - Peng-Jun Wan, Huaqiang Yuan, Xiaohua Jia, Jiliang Wang, Zhu Wang:
Maximum-weighted subset of communication requests schedulable without spectral splitting. 1-9 - Subhashini Krishnasamy, P. T. Akhil, Ari Arapostathis
, Sanjay Shakkottai, Rajesh Sundaresan:
Augmenting max-weight with explicit learning for wireless scheduling with switching costs. 1-9 - Yuxiao Hou, Yuanqing Zheng:
PHY assisted tree-based RFID identification. 1-9 - Jia Liu, Feng Zhu, Yanyan Wang, Xia Wang, Qing-feng Pan, Lijun Chen:
RF-scanner: Shelf scanning with robot-assisted RFID systems. 1-9 - Min Chen, Jia Liu, Shigang Chen, Yan Qiao, Yuanqing Zheng:
DBF: A general framework for anomaly detection in RFID systems. 1-9 - Henko Aantjes, Amjad Yousef Majid, Przemyslaw Pawelczak, Jethro Tan, Aaron N. Parks, Joshua R. Smith:
Fast downstream to many (computational) RFIDs. 1-9 - Zhe Chen, Xu Zhang, Sulei Wang, Yuedong Xu, Jie Xiong, Xin Wang:
BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming. 1-9 - Meenupriya Swaminathan, Anna Vizziello
, Davy Duong, Pietro Savazzi, Kaushik R. Chowdhury
:
Beamforming in the body: Energy-efficient and collision-free communication for implants. 1-9 - Abdul Salam
, Mehmet C. Vuran
:
Smart underground antenna arrays: A soil moisture adaptive beamforming approach. 1-9 - Joan Palacios, Danilo De Donno
, Joerg Widmer
:
Tracking mm-Wave channel dynamics: Fast beam training strategies under mobility. 1-9 - Hongli Xu, Zhuolong Yu, Chen Qian, Xiang-Yang Li, Zichun Liu:
Minimizing flow statistics collection cost of SDN using wildcard requests. 1-9 - Wenrui Ma, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou:
Traffic aware placement of interdependent NFV middleboxes. 1-9 - Peng Zhang:
Towards rule enforcement verification for software defined networks. 1-9 - RhongHo Jang
, DongGyu Cho, Youngtae Noh, DaeHun Nyang:
RFlow+: An SDN-based WLAN monitoring and management framework. 1-9 - Parimal Parag
, Archana Bura, Jean-François Chamberland
:
Latency analysis for distributed storage. 1-9 - Vaneet Aggarwal
, Jingxian Fan, Tian Lan:
Taming tail latency for erasure-coded, distributee storage systems. 1-9 - Shuzhan Wei, Yongkun Li, Yinlong Xu, Si Wu:
DSC: Dynamic stripe construction for asynchronous encoding in clustered file system. 1-9 - Xuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang:
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. 1-9 - Michael Dinitz
, Jeremy T. Fineman, Seth Gilbert, Calvin Newport:
Load balancing with bounded convergence in dynamic networks. 1-9 - Hongli Xu, He Huang, Shigang Chen, Gongming Zhao:
Scalable software-defined networking through hybrid switching. 1-9 - Syed Mohammad Irteza
, Hafiz Mohsin Bashir, Talal Anwar, Ihsan Ayyub Qazi, Fahad Rafique Dogar:
Load balancing over symmetric virtual topologies. 1-9 - Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:
BD-CAT: Balanced dynamic content addressing in trees. 1-9 - Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:
AccountTrade: Accountable protocols for big data trading against dishonest consumers. 1-9 - Xin Yao, Rui Zhang, Yanchao Zhang, Yaping Lin:
Verifiable social data outsourcing. 1-9 - Prasanna Giridhar, Shiguang Wang, Tarek F. Abdelzaher, Raghu K. Ganti, Lance M. Kaplan, Jemin George:
On localizing urban events with Instagram. 1-9 - Yinghao Yu, Wei Wang
, Jun Zhang
, Khaled Ben Letaief:
LRC: Dependency-aware cache management for data analytics clusters. 1-9 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:
Network anti-spoofing with SDN data plane. 1-9 - Shang Gao
, Zhe Peng
, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. 1-9 - Anat Bremler-Barr, Eli Brosh, Mor Sides:
DDoS attack on cloud auto-scaling mechanisms. 1-9 - Mathieu Jadin, Gautier Tihon, Olivier Pereira, Olivier Bonaventure:
Securing multipath TCP: Design & implementation. 1-9 - Mark van der Boor, Sem C. Borst, Johan van Leeuwaarden:
Load balancing in large-scale systems with multiple dispatchers. 1-9 - Wasiur R. KhudaBukhsh
, Amr Rizk, Alexander Frömmgen, Heinz Koeppl:
Optimizing stochastic scheduling in fork-join queueing models: Bounds and applications. 1-9 - Arjun Anand, Gustavo de Veciana:
Measurement-based scheduler for multi-class QoE optimization in wireless networks. 1-9 - Alex Davydow, Pavel Chuprikov
, Sergey I. Nikolenko
, Kirill Kogan
:
Throughput optimization with latency constraints. 1-9 - Yu Luo, Lina Pu, Yanxiao Zhao, Guodong Wang, Min Song:
Optimal energy requesting strategy for RF-based energy harvesting wireless communications. 1-9 - Haipeng Dai, Xiaoyu Wang, Alex X. Liu, Huizhen Ma, Guihai Chen
:
Optimizing wireless charger placement for directional charging. 1-9 - Fei Wang, Xi Zhang:
Secure resource allocations for polarization-enabled cooperative cognitive radio networks with energy harvesting capability. 1-9 - Li Yan, Haiying Shen, Juanjuan Zhao, Chengzhong Xu
, Feng Luo, Chenxi Qiu:
CatCharger: Deploying wireless charging lanes in a metropolitan road network through categorization and clustering of vehicle traffic. 1-9 - Xianjin Xia
, ShiNing Li, Yu Zhang, Lin Li, Tao Gu
, Yongji Liu, Yan Pan:
Surviving screen-off battery through out-of-band Wi-Fi coordination. 1-9 - Meng Jin, Yuan He, Dingyi Fang, Xiaojiang Chen, Xin Meng, Tianzhang Xing:
iGuard: A real-time anti-theft system for smartphones. 1-9 - Xiangyu Xu
, Hang Gao, Jiadi Yu, Yingying Chen
, Yanmin Zhu, Guangtao Xue, Minglu Li:
ER: Early recognition of inattentive driving leveraging audio devices on smartphones. 1-9 - Yi Gao, Yang Luo, Daqing Chen, Haocheng Huang, Wei Dong, Mingyuan Xia, Xue Liu, Jiajun Bu:
Every pixel counts: Fine-grained UI rendering analysis for mobile applications. 1-9 - Guanyu Gao, Yonggang Wen, Han Hu:
QDLCoding: QoS-differentiated low-cost video encoding scheme for online video service. 1-9 - Ming Tang, Shou Wang, Lin Gao, Jianwei Huang, Lifeng Sun:
MOMD: A multi-object multi-dimensional auction for crowdsourced mobile video streaming. 1-9 - Kazuhisa Matsuzono, Hitoshi Asaeda
, Thierry Turletti:
Low latency low loss streaming using in-network coding and caching. 1-9 - Ahmed Badr, Ashish Khisti, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:
FEC for VoIP using dual-delay streaming codes. 1-9 - Guoming Tang, Kui Wu, Richard Brunner:
Rethinking CDN design with distributee time-varying traffic demands. 1-9 - Samta Shukla, Alhussein A. Abouzeid
:
Proactive retention aware caching. 1-9 - Li Qiu, Guohong Cao:
Popularity-aware caching increases the capacity of wireless networks. 1-9 - Livia Elena Chatzieleftheriou
, Merkourios Karaliopoulos, Iordanis Koutsopoulos:
Caching-aware recommendations: Nudging user preferences towards better caching performance. 1-9 - Mingjun Xiao, Jie Wu, Sheng Zhang, Jiapeng Yu:
Secret-sharing-based secure user recruitment protocol for mobile crowdsensing. 1-9 - Shengzhong Liu, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Guihai Chen
:
Context-aware data quality estimation in mobile crowdsensing. 1-9 - Qiang Xu, Rong Zheng:
When data acquisition meets data analytics: A distributed active learning framework for optimal budgeted mobile crowdsensing. 1-9 - Man Hon Cheung, Fen Hou, Jianwei Huang:
Make a difference: Diversity-driven social mobile crowdsensing. 1-9 - Yu Sang, Bo Ji
, Gagan Raj Gupta, Xiaojiang Du, Lin Ye:
Provably efficient algorithms for joint placement and allocation of virtual network functions. 1-9 - Rui Han, Fan Zhang, Zhentao Wang:
AccurateML: Information-aggregation-based approximate processing for fast and accurate machine learning on MapReduce. 1-9 - Juan F. Pérez
, Robert Birke, Lydia Y. Chen:
On the latency-accuracy tradeoff in approximate MapReduce jobs. 1-9 - Hao Feng, Jaime Llorca
, Antonia Maria Tulino
, Danny Raz, Andreas F. Molisch:
Approximation algorithms for the NFV service distribution problem. 1-9 - János Tapolcai, Lajos Rónyai, Bálazs Vass
, Laszlo Gyimothi:
List of shared risk link groups representing regional failures with limited size. 1-9 - Ying Zhang, Wenfei Wu, Sujata Banerjee
, Joon-Myung Kang
, Mario A. Sánchez:
SLA-verifier: Stateful and quantitative verification for service chaining. 1-9 - Stefano Ciavarella, Novella Bartolini
, Hana Khamfroush, Thomas La Porta:
Progressive damage assessment and network recovery after massive failures. 1-9 - Yigal Bejerano, Chandru Raman, Chun-Nam Yu, Varun Gupta, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman:
DyMo: Dynamic monitoring of large scale LTE-Multicast systems. 1-9 - Meng Zhang, Lin Gao, Jianwei Huang, Michael L. Honig:
Cooperative and competitive operator pricing for mobile crowdsourced internet access. 1-9 - Dario Bega, Marco Gramaglia, Albert Banchs, Vincenzo Sciancalepore
, Konstantinos Samdanis, Xavier Pérez Costa
:
Optimising 5G infrastructure markets: The business of network slicing. 1-9 - Pablo Caballero Garces, Albert Banchs, Gustavo de Veciana, Xavier Pérez Costa
:
Network slicing games: Enabling customization in multi-tenant networks. 1-9 - Mao Zou, Richard T. B. Ma
, Xin Wang, Yinlong Xu:
On optimal service differentiation in congested network markets. 1-9 - Peshal Nayak, Michele Garetto, Edward W. Knightly:
Multi-user downlink with single-user uplink can starve TCP. 1-9 - Dolvara Gunatilaka, Mo Sha, Chenyang Lu:
Impacts of channel selection on industrial wireless sensor-actuator networks. 1-9 - Andrea Baiocchi, Ilenia Tinnirello, Domenico Garlisi
, Alice Lo Valvo
:
Random access with repeated contentions for emerging wireless technologies. 1-9 - Chao-Fang Shih, Raghupathy Sivakumar:
Switch: Enabling transmitter and receiver participation in seamless lightweight control. 1-9 - Wenchi Cheng, Xi Zhang, Hailin Zhang:
Pilot-based full-duplex spectrum-sensing and multichannel-MAC over non-time-slotted cognitive radio networks. 1-9 - Xingya Liu, Jiang Xie:
A 2D heterogeneous rendezvous protocol for multi-wideband cognitive radio networks. 1-9 - Changhee Joo, Ness B. Shroff:
A novel coupled queueing model to control traffic via QoS-aware collision pricing in cognitive radio networks. 1-9 - Amr Abdelfattah, Naceur Malouch:
Modeling and performance analysis of Wi-Fi networks coexisting with LTE-U. 1-9 - Yanyuan Qin, Ruofan Jin, Shuai Hao, Krishna R. Pattipati, Feng Qian, Subhabrata Sen, Bing Wang, Chaoqun Yue:
A control theoretic approach to ABR video streaming: A fresh look at PID-based rate adaptation. 1-9 - Tong Zhang, Fengyuan Ren, Wenxue Cheng, Xiaohui Luo, Ran Shu, Xiaolan Liu:
Modeling and analyzing the influence of chunk size variation on bitrate adaptation in DASH. 1-9 - Cong Zhang, Qiyun He, Jiangchuan Liu, Zhi Wang:
Beyond the touch: Interaction-aware mobile gamecasting with gazing pattern prediction. 1-9 - Khaled M. Diab, Mohamed Hefeeda:
MASH: A rate adaptation algorithm for multiview video streaming over HTTP. 1-9 - Ian D. Markwood,