


default search action
37th INFOCOM 2018: Honolulu, HI, USA
- 2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, April 16-19, 2018. IEEE 2018, ISBN 978-1-5386-4128-6

- Wasiur R. KhudaBukhsh

, Bastian Alt
, Sounak Kar
, Amr Rizk, Heinz Koeppl:
Collaborative Uploading in Heterogeneous Networks: Optimal and Adaptive Strategies. 1-9 - Zhuotao Liu, Kai Chen, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang:

Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding. 1-9 - You Zhou, Yian Zhou, Shigang Chen, Youlin Zhang:

Highly Compact Virtual Active Counters for Per-flow Traffic Measurement. 1-9 - Francesco De Pellegrini, Lorenzo Maggi, Antonio Massaro, Damien Saucez, Jeremie Leguay, Eitan Altman:

Blind, Adaptive and Robust Flow Segmentation in Datacenters. 10-18 - Haoyu Wang, Haiying Shen:

Proactive Incast Congestion Control in a Datacenter Serving Web Applications. 19-27 - Zhenzhe Zheng, R. Srikant, Guihai Chen

:
Pricing for Revenue Maximization in Inter-DataCenter Networks. 28-36 - Sowndarya Sundar, Ben Liang

:
Offloading Dependent Tasks with Communication Delay and Deadline Constraint. 37-45 - Yeli Geng, Yi Yang, Guohong Cao:

Energy-Efficient Computation Offloading for Multicore-Based Mobile Devices. 46-54 - Shuang Jiang, Dong He

, Chenxi Yang, Chenren Xu, Guojie Luo, Yang Chen
, Yunlu Liu, Jiangwei Jiang:
Accelerating Mobile Applications at the Network Edge with Software-Programmable FPGAs. 55-62 - Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, Kevin Chan:

When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning. 63-71 - Soteris Demetriou

, Puneet Jain, Kyu-Han Kim:
CoDrive: Improving Automobile Positioning via Collaborative Driving. 72-80 - Luca Bedogni

, Marco Fiore, Christian Glacet:
Temporal Reachability in Vehicular Networks. 81-89 - Daxin Tian, Jianshan Zhou, Min Chen

, Zhengguo Sheng, Qiang Ni
, Victor C. M. Leung:
Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization. 90-98 - Chi Lin, Zhiyuan Wang, Jing Deng, Lei Wang, Jiankang Ren, Guowei Wu:

mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles. 99-107 - Tuo Shi

, Jianzhong Li, Hong Gao, Zhipeng Cai
:
Coverage in Battery-Free Wireless Sensor Networks. 108-116 - Quan Chen

, Hong Gao, Zhipeng Cai
, Lianglun Cheng, Jianzhong Li:
Energy-Collision Aware Data Aggregation Scheduling for Energy Harvesting Sensor Networks. 117-125 - Huiqi Liu, Xiangyang Li, Lan Zhang, Yaochen Xie, Zhenan Wu, Qian Dai, Ge Chen, Chunxiao Wan:

Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor Fingerprint. 126-134 - Bin Tang:

DAO2: Overcoming Overall Storage Overflow in Intermittently Connected Sensor Networks. 135-143 - Piotr Gawlowicz, Anatolij Zubow, Adam Wolisz:

Enabling Cross-technology Communication between LTE Unlicensed and WiFi. 144-152 - Yongrui Chen, Zhijun Li, Tian He:

TwinBee: Reliable Physical-Layer Cross-Technology Communication with Symbol-Level Coding. 153-161 - Zhijun Li, Tian He:

LongBee: Enabling Long-Range Cross-Technology Communication. 162-170 - Xiaolong Zheng, Yuan He, Xiuzhen Guo:

StripComm: Interference-Resilient Cross-Technology Communication in Coexisting Environments. 171-179 - Yinggen Xu, Wei Chen, Shaoqi Wang, Xiaobo Zhou, Changjun Jiang:

Improving Utilization and Parallelism of Hadoop Cluster by Elastic Containers. 180-188 - Kun Suo, Yong Zhao, Wei Chen, Jia Rao:

An Analysis and Empirical Study of Container Networks. 189-197 - Yipei Niu

, Fangming Liu, Zongpeng Li:
Load Balancing Across Microservices. 198-206 - Jie Xu

, Lixing Chen, Pan Zhou:
Joint Service Caching and Task Offloading for Mobile Edge Computing in Dense Networks. 207-215 - Sourav Mondal

, Goutam Das, Elaine Wong:
CCOMPASSION: A Hybrid Cloudlet Placement Framework Over Passive Optical Access Networks. 216-224 - Mohammad Noormohammadpour

, Cauligi S. Raghavendra, Srikanth Kandula, Sriram Rao:
QuickCast: Fast and Efficient Inter-Datacenter Transfers Using Forwarding Tree Cohorts. 225-233 - Mathieu Leconte, Apostolos Destounis, Georgios S. Paschos:

Traffic Engineering with Precomputed Pathbooks. 234-242 - Balázs Sonkoly

, Marton Szabo, Balázs Németh, András Majdán, Gergely Pongrácz, László Toka:
FERO: Fast and Efficient Resource Orchestrator for a Data Plane Built on Docker and DPDK. 243-251 - Wangkit Wong, S.-H. Gary Chan:

Distributed Joint AP Grouping and User Association for MU-MIMO Networks. 252-260 - Ehsan Aryafar, Alireza Keshavarz-Haddad:

PAFD: Phased Array Full-Duplex. 261-269 - Xin Tan, Zhi Sun, Dimitrios Koutsonikolas, Josep Miquel Jornet

:
Enabling Indoor Mobile Millimeter-wave Networks Based on Smart Reflect-arrays. 270-278 - Kaidong Wang, Konstantinos Psounis:

Scheduling and Resource Allocation in 802.11ax. 279-287 - Arpan Mukhopadhyay, Nidhi Hegde, Marc Lelarge:

Optimal Content Replication and Request Matching in Large Caching Systems. 288-296 - Xin Liu, Lei Ying

:
On Achieving Zero Delay with Power-of-d-Choices Load Balancing. 297-305 - Mingyan Li, Xinping Guan, Cunqing Hua, Cailian Chen, Ling Lyu:

Predictive Pre-allocation for Low-latency Uplink Access in Industrial Wireless Networks. 306-314 - Yanbing Yang

, Jun Luo
:
Boosting the Throughput of LED-Camera VLC via Composite Light Emission. 315-323 - Hao Cai, Tilman Wolf:

Self-Adapting Quorum-Based Neighbor Discovery in Wireless Sensor Networks. 324-332 - Tien Tran, Dung T. Huynh:

Symmetric Connectivity Algotirthms in Multiple Directional Antennas Wireless Sensor Networks. 333-341 - Johnny Verhoeff, S. N. Akshay Uttama Nambi, Marco Antonio Zúñiga Zamalloa

, Bontor Humala:
Monitoring LED Lights with Current Signatures. 342-350 - Viet Nguyen, Mohamed Ibrahim

, Siddharth Rupavatharam
, Minitha Jawahar, Marco Gruteser, Richard E. Howard:
Eyelight: Light-and-Shadow-Based Occupancy Estimation and Room Activity Recognition. 351-359 - Xiuzhen Guo, Yuan He, Xiaolong Zheng, Liangcheng Yu, Omprakash Gnawali:

ZIGFI: Harnessing Channel State Information for Cross-Technology Communication. 360-368 - Wei Wang

, Tiantian Xie, Xin Liu, Ting Zhu:
ECT: Exploiting Cross-Technology Concurrent Transmission for Reducing Packet Delivery Delay in IoT Networks. 369-377 - Haipeng Dai, Yang Zhao, Guihai Chen

, Wanchun Dou, Chen Tian, Xiaobing Wu, Tian He:
Robustly Safe Charging for Wireless Power Transfer. 378-386 - Nan Yu, Haipeng Dai

, Alex X. Liu, Bingchuan Tian:
Placement of Connected Wireless Chargers. 387-395 - Kai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang

, Xing Li, Shigeng Zhang:
FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking. 396-404 - Andreas Blenk

, Patrick Kalmbach, Johannes Zerwas, Michael Jarschel, Stefan Schmid
, Wolfgang Kellerer
:
NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding Algorithm. 405-413 - Sheng-Hao Chiang, Jian-Jhih Kuo

, Shan-Hsiang Shen, De-Nian Yang
, Wen-Tsuen Chen:
Online Multicast Traffic Engineering for Software-Defined Networks. 414-422 - Hao Li

, Kaiyue Chen, Tian Pan
, Yadong Zhou, Kun Qian, Kai Zheng, Bin Liu, Peng Zhang, Yazhe Tang, Chengchen Hu:
CORA: Conflict Razor for Policies in SDN. 423-431 - Giuliano Casale

:
Analyzing Replacement Policies in List-Based Caches with Non-Uniform Access Costs. 432-440 - Jian Li, Truong Khoa Phan, Wei Koong Chai, Daphné Tuncer, George Pavlou, David Griffin, Miguel Rio:

DR-Cache: Distributed Resilient Caching with Latency Guarantees. 441-449 - Kaiyi Ji, Guocong Quan, Jian Tan:

Asymptotic Miss Ratio of LRU Caching with Consistent Hashing. 450-458 - Guocong Quan, Kaiyi Ji, Jian Tan:

LRU Caching with Dependent Competing Requests. 459-467 - Lin Wang, Lei Jiao

, Ting He, Jun Li, Max Mühlhäuser:
Service Entity Placement for Social Virtual Reality Applications in Edge Computing. 468-476 - Wang Zhang, Xiaokang Hu

, Jian Li, Haibing Guan:
CoINT: Proactive Coordinator for Avoiding Interruptability Holder Preemption Problem in VSMP Environment. 477-485 - Xincai Fei, Fangming Liu, Hong Xu

, Hai Jin:
Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction. 486-494 - Yixin Bao, Yanghua Peng, Chuan Wu

, Zongpeng Li:
Online Job Scheduling in Distributed Machine Learning Clusters. 495-503 - Chen Chen, Wei Wang

, Bo Li:
Performance-Aware Fair Scheduling: Exploiting Demand Elasticity of Data Analytics Jobs. 504-512 - Xiaoda Zhang, Zhuzhong Qian, Sheng Zhang, Xiangbo Li, Xiaoliang Wang, Sanglu Lu:

COBRA: Toward Provably Efficient Semi-Clairvoyant Scheduling in Data Analytics Systems. 513-521 - Liang Bao, Chase Q. Wu, Haiyang Qi, Weizhao Chen, Xin Zhang, Weina Han, Wei Wei, En Tail, Hao Wang, Jiahao Zhai, Xiang Chen:

LAS: Logical-Block Affinity Scheduling in Big Data Analytics Systems. 522-530 - Shuhao Liu, Li Chen, Baochun Li, Aiden Carnegie:

A Hierarchical Synchronous Parallel Model for Wide-Area Graph Analytics. 531-539 - Harsh Gupta, Atilla Eryilmaz, R. Srikant:

Low-Complexity, Low-Regret Link Rate Selection in Rapidly-Varying Wireless Channels. 540-548 - Jing Chen, Feilong Tang, Heteng Zhang, Laurence T. Yang:

Lightweight Retransmission for Random Access in Satellite Networks. 549-557 - Hongzhi Guo, Zhi Sun:

Full-Duplex Metamaterial-Enabled Magnetic Induction Networks in Extreme Environments. 558-566 - Avinash Mohan, Aditya Gopalan, Anurag Kumar

:
Reduced-State, Optimal Medium Access Control for Wireless Data Collection Networks. 567-575 - Tingjun Chen

, Jelena Diakonikolas, Javad Ghaderi, Gil Zussman:
Hybrid Scheduling in Heterogeneous Half-and Full-Duplex Wireless Networks. 576-584 - Paolo Castagno, Vincenzo Mancuso, Matteo Sereno, Marco Ajmone Marsan:

Closed form Expressions for the Performance Metrics of Data Services in Cellular Networks. 585-593 - Qingkai Liang, Eytan H. Modiano:

Network Utility Maximization in Adversarial Environments. 594-602 - Kun Chen, Longbo Huang:

Timely-Throughput Optimal Scheduling with Prediction. 603-611 - Linqi Guo, John Z. T. Pang, Anwar Walid:

Joint Placement and Routing of Network Function Chains in Data Centers. 612-620 - Garegin Grigoryan

, Yaoqing Liu, Michael Leczinsky, Jun Li:
VeriTable: Fast Equivalence Verification of Multiple Large Forwarding Tables. 621-629 - Long Luo, Hongfang Yu, Zilong Ye, Xiaojiang Du:

Online Deadline-Aware Bulk Transfer Over Inter-Datacenter WANs. 630-638 - Vasanta G. Chaganti, James F. Kurose, Arun Venkataramani:

A Cross-Architectural Quantitative Evaluation of Mobility Approaches. 639-647 - Jiancheng Ye

, Ka-Cheong Leung, Victor O. K. Li, Steven H. Low:
Combating Bufferbloat in Multi-Bottleneck Networks: Equilibrium, Stability, and Algorithms. 648-656 - Yongshu Bai, Pengzhan Hao, Yifan Zhang:

A Case for Web Service Bandwidth Reduction on Mobile Devices with Edge-Hosted Personal Services. 657-665 - Gayane Vardoyan

, C. V. Hollot, Don Towsley
:
Towards Stability Analysis of Data Transport Mechanisms: A Fluid Model and an Application. 666-674 - Ahmed Mohamed Abdelmoniem

, Brahim Bensaou:
Curbing Timeouts for TCP-Incast in Data Centers via A Cross-Layer Faster Recovery Mechanism. 675-683 - Qiaofeng Qin, Konstantinos Poularakis, George Iosifidis

, Leandros Tassiulas:
SDN Controller Placement at the Edge: Optimizing Delay and Overheads. 684-692 - Richard Cziva, Christos Anagnostopoulos

, Dimitrios P. Pezaros:
Dynamic, Latency-Optimal vNF Placement at the Network Edge. 693-701 - Yi Ren

, Tzu-Ming Huang, Kate Ching-Ju Lin
, Yu-Chee Tseng:
On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable Entries. 702-710 - Christopher Leet, Xin Wang, Yang Richard Yang, James Aspnes:

Toward the First SDN Programming Capacity Theorem on Realizing High-Level Programs on Low-Level Datapaths. 711-719 - Kai Gao, Jingxuan Zhang, Yang Richard Yang, Jun Bi:

Prophet: Fast Accurate Model-Based Throughput Prediction for Reactive Flow in DC Networks. 720-728 - Colton Harper

, Massimiliano Pierobon
, Maurizio Magarini:
Estimating Information Exchange Performance of Engineered Cell-to-cell Molecular Communications: A Computational Approach. 729-737 - Yan Qiao:

Robust Loss Inference in the Presence of Noisy Measurements. 738-746 - Alfonso Iacovazzi

, Sanat Sarda, Yuval Elovici:
Inflow: Inverse Network Flow Watermarking for Detecting Hidden Servers. 747-755 - Qiang Liu, Siqi Huang, Johnson Opadere, Tao Han:

An Edge Network Orchestrator for Mobile Augmented Reality. 756-764 - Chaobing Zeng, Fangming Liu, Shutong Chen

, Weixiang Jiang, Miao Li:
Demystifying the Performance Interference of Co-Located Virtual Network Functions. 765-773 - Andrea Tomassilli, Frédéric Giroire, Nicolas Huin, Stéphane Pérennes:

Provably Efficient Algorithms for Placement of Service Function Chains with Ordering Constraints. 774-782 - Ruozhou Yu

, Guoliang Xue, Xiang Zhang:
Application Provisioning in FOG Computing-enabled Internet-of-Things: A Network Perspective. 783-791 - Shengshan Hu

, Chengjun Cai
, Qian Wang
, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. 792-800 - Wenhai Sun

, Ruide Zhang, Wenjing Lou, Y. Thomas Hou
:
REARGUARD: Secure Keyword Search Using Trusted Hardware. 801-809 - Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:

Differentially Private Access Patterns for Searchable Symmetric Encryption. 810-818 - Xiangyu Wang

, Jianfeng Ma, Yinbin Miao, Ruikang Yang
, Yijia Chang:
EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System. 819-827 - Han Ding, Jinsong Han, Chen Qian, Fu Xiao, Ge Wang, Nan Yang, Wei Xi, Jian Xiao:

Trio: Utilizing Tag Interference for Refined Localization of Passive RFID. 828-836 - Yanling Bu, Lei Xie, Yinyin Gong, Chuyu Wang, Lei Yang, Jia Liu, Sanglu Lu:

RF-Dial: An RFID-based 2D Human-Computer Interaction via Tag Array. 837-845 - Youlin Zhang, Shigang Chen, You Zhou, Yuguang Fang

:
Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag Sets. 846-854 - Chunhui Duan, Lei Yang

, Huanyu Jia, Qiongzheng Lin
, Yunhao Liu, Lei Xie:
Robust Spinning Sensing with Dual-RFID-Tags in Noisy Settings. 855-863 - Bingchuan Tian

, Chen Tian, Haipeng Dai
, Bingquan Wang:
Scheduling Coflows of Multi-stage Jobs to Minimize the Total Weighted Job Completion Time. 864-872 - Wenxin Li, Xu Yuan, Keqiu Li, Heng Qi, Xiaobo Zhou:

Leveraging Endpoint Flexibility when Scheduling Coflows across Geo-distributed Datacenters. 873-881 - Shih-Hao Tseng, Bo Bai, John C. S. Lui:

Hybrid Circuit/Packet Network Scheduling with Multiple Composite Paths. 882-890 - Luping Wang, Wei Wang

, Bo Li:
Utopia: Near-optimal Coflow Scheduling with Isolation Guarantee. 891-899 - Yongce Chen, Yan Huang, Yi Shi

, Y. Thomas Hou
, Wenjing Lou, Sastry Kompella
:
A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient Channels. 900-907 - Gam D. Nguyen, Sastry Kompella

, Clement Kam, Jeffrey E. Wieselthier, Anthony Ephremides:
Information Freshness Over an Interference Channel: A Game Theoretic View. 908-916 - Zhanzhan Zhang, Yin Sun, Ashutosh Sabharwal, Zhiyong Chen:

Impact of Channel State Misreporting on Multi-user Massive MIMO Scheduling Performance. 917-925 - Subhramoy Mohanti, Elif Bozkaya

, M. Yousof Naderi, Berk Canberk
, Kaushik R. Chowdhury
:
WiFED: WiFi Friendly Energy Delivery with Distributed Beamforming. 926-934 - Giacomo Calvigioni, Ramon Aparicio-Pardo, Lucile Sassatelli, Jeremie Leguay, Paolo Medagliani, Stefano Paris:

Quality of Experience-based Routing of Video Traffic for Overlay and ISP Networks. 935-943 - Diego N. da Hora, Karel Van Doorselaer, Koen Van Oost, Renata Teixeira:

Predicting the effect of home Wi-Fi quality on QoE. 944-952 - Mengbai Xiao, Chao Zhou, Viswanathan Swaminathan, Yao Liu, Songqing Chen:

BAS-360°: Exploring Spatial and Temporal Adaptability in 360-degree Videos over HTTP/2. 953-961 - Chao Zhou, Mengbai Xiao, Yao Liu:

ClusTile: Toward Minimizing Bandwidth in 360-degree Video Streaming. 962-970 - Bing Leng, Liusheng Huang, Chunming Qiao, Hongli Xu:

A Light-weight Approach to Obtaining NF State Information in SDN+NFV Networks. 971-979 - Jaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin:

Barista: An Event-centric NOS Composition Framework for Software-Defined Networks. 980-988 - Roberto Irajá Tavares da Costa Filho, William Lautenschlager, Nicolas Kagami, Marcelo Caggiani Luizelli, Valter Roesler, Luciano Paschoal Gaspary:

Scalable QoE-aware Path Selection in SDN-based Mobile Networks. 989-997 - Chunhui He, Xinyu Feng:

POMP: Protocol Oblivious SDN Programming with Automatic Multi-Table Pipelining. 998-1006 - Xinyu Wu, Xiaohua Tian, Xinbing Wang:

Large-scale Wireless Fingerprints Prediction for Cellular Network Positioning. 1007-1015 - Suining He

, Kang G. Shin:
Steering Crowdsourced Signal Map Construction via Bayesian Compressive Sensing. 1016-1024 - Sihua Shao

, Abdallah Khreishah
, Issa Khalil
:
RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices. 1025-1033 - Tao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:

Secure Crowdsourced Indoor Positioning Systems. 1034-1042 - Angelo Trotta

, Fabio D'Andreagiovanni, Marco Di Felice, Enrico Natalizio
, Kaushik Roy Chowdhury
:
When UAVs Ride A Bus: Towards Energy-efficient City-scale Video Surveillance. 1043-1051 - Linsong Cheng, Jiliang Wang:

ViTrack: Efficient Tracking on the Edge for Commodity Video Surveillance Systems. 1052-1060 - Lin Yang, Wei Wang, Zeyu Wang, Qian Zhang:

Rainbow: Preventing Mobile-Camera-based Piracy in the Physical World. 1061-1069 - Cheng Zhang

, Fan Yang, Gang Li, Qiang Zhai, Yi Jiang, Dong Xuan:
MV-Sports: A Motion and Vision Sensor Integration-Based Sports Analysis System. 1070-1078 - Jianwei Qian, Feng Han, Jiahui Hou, Chunhong Zhang, Yu Wang, Xiang-Yang Li:

Towards Privacy-Preserving Speech Data Publishing. 1079-1087 - Shaowei Wang, Liusheng Huang, Yiwen Nie, Pengzhan Wang, Hongli Xu, Wei Yang:

PrivSet: Set-Valued Data Analyses with Locale Differential Privacy. 1088-1096 - Ning Zhang, Kun Sun

, Deborah Shands, Wenjing Lou, Y. Thomas Hou
:
TruSense: Information Leakage from TrustZone. 1097-1105 - Jinxue Zhang, Jingchao Sun, Rui Zhang

, Yanchao Zhang, Xia Hu:
Privacy-Preserving Social Media Data Outsourcing. 1106-1114 - Han Ding, Jinsong Han, Yanyong Zhang, Fu Xiao, Wei Xi, Ge Wang, Zhiping Jiang:

Preventing Unauthorized Access on Passive Tags. 1115-1123 - Xiulong Liu, Jiannong Cao, Keqiu Li, Jia Liu, Xin Xie

:
Range Queries for Sensor-augmented RFID Systems. 1124-1132 - Jihong Yu, Wei Gong, Jiangchuan Liu, Lin Chen:

Fast and Reliable Tag Search in Large-Scale RFID Systems: A Probabilistic Tree-based Approach. 1133-1141 - Ziling Zhou, Binbin Chen

:
RFID Counting over Time-Varying Channels. 1142-1150 - Xinyu Wu, Zhongzhao Hu, Xinzhe Fu, Luoyi Fu, Xinbing Wang, Songwu Lu:

Social Network De-anonymization with Overlapping Communities: Analysis, Algorithm and Experiments. 1151-1159 - Yuqing Zhu, Deying Li:

Host Profit Maximization for Competitive Viral Marketing in Billion-Scale Networks. 1160-1168 - Vineeth S. Varma, Irinel-Constantin Morarescu

, Yezekael Hayel:
Continuous time opinion dynamics of agents with multi-leveled opinions and binary actions. 1169-1177 - Jing Tang

, Xueyan Tang, Junsong Yuan
:
Towards Profit Maximization for Online Social Network Providers. 1178-1186 - Chaojie Gu, Rui Tan, Xin Lou, Dusit Niyato

:
One-Hop Out-of-Band Control Planes for Low-Power Multi-Hop Wireless Networks. 1187-1195 - Dongxiao Yu, Yong Zhang, Yuyao Huang, Hai Jin, Jiguo Yu, Qiang-Sheng Hua:

Exact Implementation of Abstract MAC Layer via Carrier Sensing. 1196-1204 - Dingwen Yuan, Hsuan-Yin Lin, Jörg Widmer

, Matthias Hollick
:
Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular Networks. 1205-1213 - Fan Zhou, M. Yousof Naderi

, Kunal Sankhe, Kaushik R. Chowdhury
:
Making the Right Connections: Multi-AP Association and Flow Control in 60GHz Band. 1214-1222 - Zheng Yang

, Kimmo Järvinen:
The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption. 1223-1231 - Yang Liu

, Zhenjiang Li:
aLeak: Privacy Leakage through Context - Free Wearable Side-Channel. 1232-1240 - Shams Zawoad, Ragib Hasan

, Mohammad Kamrul Islam:
SECProv: Trustworthy and Efficient Provenance Management in the Cloud. 1241-1249 - Xuhui Gong, Qiang-Sheng Hua, Lixiang Qian, Dongxiao Yu, Hai Jin:

Communication-Efficient and Privacy-Preserving Data Aggregation without Trusted Authority. 1250-1258 - Wei Gong, Si Chen, Jiangchuan Liu, Zhi Wang:

MobiRate: Mobility-Aware Rate Adaptation Using PHY Information for Backscatter Networks. 1259-1267 - Taekyung Kim, Wonjun Lee:

Exploiting Residual Channel for Implicit Wi-Fi Backscatter Networks. 1268-1276 - Wei Wang, Shiyue He, Lin Yang, Qian Zhang, Tao Jiang:

Wi-Fi Teeter-Totter: Overclocking OFDM for Internet of Things. 1277-1285 - Ali Sehati, Majid Ghaderi:

Online Energy Management in IoT Applications. 1286-1294 - Jiaqi Liu, Qi Lian, Luoyi Fu, Xinbing Wang:

Who to Connect to? Joint Recommendations in Cross-layer Social Networks. 1295-1303 - Zhibo Wang, Yongquan Zhang, Honglong Chen, Zhetao Li, Feng Xia:

Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks. 1304-1312 - Fan Zhou, Lei Liu, Kunpeng Zhang

, Goce Trajcevski, Jin Wu
, Ting Zhong:
DeepLink: A Deep Learning Approach for User Identity Linkage. 1313-1321 - Tsung-Yen Yang, Christopher G. Brinton

, Carlee Joe-Wong:
Predicting Learner Interactions in Social Learning Networks. 1322-1330 - M. Hammad Mazhar

, Zubair Shafiq:
Real-time Video Quality of Experience Monitoring for HTTPS and QUIC. 1331-1339 - Chenhong Cao, Wei Gong, Wei Dong, Jihong Yu, Chun Chen, Jiangchuan Liu:

Network Measurement in Multihop Wireless Networks with Lossy and Correlated Links. 1340-1348 - Xiang Li, J. David Smith, Thang N. Dinh

, My T. Thai:
Adaptive Crawling with Multiple Bots: A Matroid Intersection Approach. 1349-1357 - Di Xiao, Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov:

Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling. 1358-1366 - Sunjung Kang, Changhee Joo:

Low-Complexity Learning for Dynamic Spectrum Access in Multi-User Multi-Channel Networks. 1367-1375 - Moinul Hossain, Jiang Xie:

Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh Networks. 1376-1384 - Sigit Aryo Pambudi, Wenye Wang, Cliff Wang:

Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability. 1385-1393 - Xu Wang, Randall A. Berry

:
The Impact of Bundling Licensed and Unlicensed Wireless Service. 1394-1402 - Haipeng Dai

, Meng Li, Alex X. Liu:
Finding Persistent Items in Distributed Datasets. 1403-1411 - Sándor Z. Kiss, Éva Hosszu, János Tapolcai, Lajos Rónyai, Ori Rottenstreich:

Bloom Filter with a False Positive Free Zone. 1412-1420 - Xukan Ran, Haoliang Chen, Xiaodan Zhu, Zhenming Liu, Jiasi Chen

:
DeepDecision: A Mobile Deep Learning Framework for Edge Video Analytics. 1421-1429 - Zongqing Lu, Kevin S. Chan, Thomas La Porta:

A Computing Platform for Video Crowdprocessing Using Deep Learning. 1430-1438 - Qianyi Huang, Zhice Yang

, Qian Zhang:
Smart-U: Smart Utensils Know what You Eat. 1439-1447 - Haishi Du, Ping Li, Hao Zhou, Wei Gong, Gan Luo, Panlong Yang:

WordRecorder: Accurate Acoustic-based Handwriting Recognition Using Deep Learning. 1448-1456 - Tianming Zhao

, Jian Liu, Yan Wang
, Hongbo Liu, Yingying Chen
:
PPG-based Finger-level Gesture Recognition Leveraging Wearables. 1457-1465 - Li Lu

, Jiadi Yu, Yingying Chen
, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li:
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals. 1466-1474 - Shuangshuang Xue, Lan Zhang, Anran Li, Xiang-Yang Li, Chaoyi Ruan, Wenchao Huang:

AppDNA: App Behavior Profiling via Graph-based Deep Learning. 1475-1483 - Ting Chen, Yuxiao Zhu, Zihao Li

, Jiachi Chen
, Xiaoqi Li
, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. 1484-1492 - Yizhen Jia, Yinhao Xiao, Jiguo Yu, Xiuzhen Cheng, Zhenkai Liang, Zhiguo Wan:

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT. 1493-1501 - Kun Xie, Xiaocan Li

, Xin Wang, Gaogang Xie, Jigang Wen, Dafang Zhang:
Graph based Tensor Recovery for Accurate Internet Anomaly Detection. 1502-1510 - Tran Viet Xuan Phuong, Rui Ning, Chunsheng Xin, Hongyi Wu:

Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things. 1511-1519 - Zhen Ling, Junzhou Luo, Yaowen Liu, Ming Yang, Kui Wu, Xinwen Fu

:
SecTap: Secure Back of Device Input System for Mobile Devices. 1520-1528 - Nirnimesh Ghose, Loukas Lazos, Ming Li:

SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless Devices. 1529-1537 - Jiaxi Gu, Jiliang Wang, Zhiwen Yu

, Kele Shen:
Walls Have Ears: Traffic-based Side-channel Attack in Video Streaming. 1538-1546 - Kunal Sankhe, Ufuk Muncuk

, M. Yousof Naderi
, Kaushik R. Chowdhury
:
Talking When No One is Listening: Piggybacking City-scale IoT Control Signals Over LTE. 1547-1555 - Chuang Hu

, Wei Bao
, Dan Wang
:
IoT Communication Sharing: Scenarios, Algorithms and Implementation. 1556-1564 - Yilun Zheng, Yuan He, Meng Jin, Xiaolong Zheng, Yunhao Liu:

RED: RFID-based Eccentricity Detection for High-speed Rotating Machinery. 1565-1573 - Kun Qian

, Chenshu Wu, Fu Xiao, Yue Zheng, Yi Zhang, Zheng Yang, Yunhao Liu:
Acousticcardiogram: Monitoring Heartbeats using Acoustic Signals on Smart Devices. 1574-1582 - Diala Naboulsi, Assia Mermouri, Razvan Stanica, Hervé Rivano

, Marco Fiore:
On User Mobility in Dynamica Cloud Radio Access Networks. 1583-1591 - Hanif Rahbari

, Peyman Siyari
, Marwan Krunz, Jung-Min "Jerry" Park:
Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors. 1592-1600 - Junse Lee, François Baccelli:

On the Effect of Shadowing Correlation on Wireless Network Performance. 1601-1609 - Amrit S. Bedi, Ketan Rajawat, Marceau Coupechoux:

An Online Approach to D2D Trajectory Utility Maximization Problem. 1610-1618 - Foivos Michelinakis, Hossein Doroud, Abbas Razaghpanah

, Andra Lutu, Narseo Vallina-Rodriguez
, Phillipa Gill, Joerg Widmer
:
The Cloud that Runs the Mobile Internet: A Measurement Study of Mobile Cloud Services. 1619-1627 - Haibo Wang, Jilong Wang, Weizhen Dang, Jing'an Xue, Fenghua Li:

Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless Network. 1628-1636 - Babak Alipour, Leonardo Tonetto, Aaron Yi Ding, Roozbeh Ketabi, Jörg Ott, Ahmed Helmy

:
Flutes vs. Cellos: Analyzing Mobility-Traffic Correlations in Large WLAN Traces. 1637-1645 - Yue Li, Haining Wang, Kun Sun

:
Email as a Master Key: Analyzing Account Recovery in the Wild. 1646-1654 - Seongho Byeon, Hwijae Kwon, Youngwook Son

, Changmok Yang, Sunghyun Choi:
RECONN: Receiver-Driven Operating Channel Width Adaptation in IEEE 802.11ac WLANs. 1655-1663 - Yanjiao Chen, Long Lin, Guiyan Cao, Zhenzhong Chen, Baochun Li:

Stable Combinatorial Spectrum Matching. 1664-1672 - Mariya Zheleva, Petko Bogdanov, Timothy LaRock, Paul Schmitt:

AirVIEW: Unsupervised transmitter detection for next generation spectrum sensing. 1673-1681 - Ayon Chakraborty, Arani Bhattacharya

, Snigdha Kamal, Samir R. Das, Himanshu Gupta, Petar M. Djuric
:
Spectrum Patrolling with Crowdsourced Spectrum Sensors. 1682-1690 - Chuyu Wang, Jian Liu, Yingying Chen

, Hongbo Liu, Lei Xie, Wei Wang, Bingbing He, Sanglu Lu:
Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFID. 1691-1699 - Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian

, Sheng Zhong:
Accurate and Efficient Wireless Device Fingerprinting Using Channel State Information. 1700-1708 - Yunting Zhang, Jiliang Wang, Weiyi Wang, Zhao Wang, Yunhao Liu:

Vernier: Accurate and Fast Acoustic Motion Tracking Using Mobile Devices. 1709-1717 - Yao Yao, Yan Li, Xin Liu

, Zicheng Chi, Wei Wang
, Tiantian Xie, Ting Zhu:
Aegis: An Interference-Negligible RF Sensing Shield. 1718-1726 - Luca Baldesi

, Carter T. Butts, Athina Markopoulou
:
Spectral Graph Forge: Graph Generation Targeting Modularity. 1727-1735 - Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem A. Beyah

:
Quantifying Graph Anonymity, Utility, and De-anonymity. 1736-1744 - Joseph Lubars, R. Srikant:

Correcting the Output of Approximate Graph Matching Algorithms. 1745-1753 - Joffroy Beauquier, Janna Burman, Fabien Dufoulon

, Shay Kutten:
Fast Beeping Protocols for Deterministic MIS and (Δ + 1)-Coloring in Sparse Graphs. 1754-1762 - Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian

, Srikanth V. Krishnamurthy
, Thomas La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
A Framework for MIMO-based Packet Header Obfuscation. 1763-1771 - Qian Zhou

, Mohammed Elbadry, Fan Ye, Yuanyuan Yang
:
Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise Environments. 1772-1780 - Xiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han:

Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming. 1781-1789 - Kaiming Xiao

, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, Weiming Zhang:
Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems. 1790-1798 - Stefan Schmid

, Jirí Srba
:
Polynomial-Time What-If Analysis for Prefix-Manipulating MPLS Networks. 1799-1807 - Xiaoyang Zhang, Yuchong Hu, Patrick P. C. Lee

, Pan Zhou:
Toward Optimal Storage Scaling via Network Coding: From Theory to Practice. 1808-1816 - Masaaki Nishino, Takeru Inoue, Norihito Yasuda, Shin-ichi Minato, Masaaki Nagata:

Optimizing Network Reliability via Best-First Search over Decision Diagrams. 1817-1825 - Yi Cao, Darryl Veitch:

Network Timing, Weathering the 2016 Leap Second. 1826-1834 - Ming Shi, Xiaojun Lin, Sonia Fahmy

, Dong-Hoon Shin:
Competitive Online Convex Optimization with Switching Costs and Ramp Constraints. 1835-1843 - Igor Kadota

, Abhishek Sinha, Eytan H. Modiano:
Optimizing Age of Information in Wireless Networks with Throughput Constraints. 1844-1852 - Hao Yu, Michael J. Neely:

Learning Aided Optimization for Energy Harvesting Devices with Outdated State Information. 1853-1861 - Jia Liu:

High-Order Momentum: Improving Latency and Convergence for Wireless Network Optimization. 1862-1870 - Zhiyuan Xu, Jian Tang, Jingsong Meng, Weiyi Zhang, Yanzhi Wang, Chi Harold Liu

, Dejun Yang
:
Experience-driven Networking: A Deep Reinforcement Learning based Approach. 1871-1879 - Jianan Zhang

, Abhishek Sinha, Jaime Llorca
, Antonia M. Tulino
, Eytan H. Modiano:
Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows. 1880-1888 - He Huang, Yu-e Sun, Shigang Chen, Shaojie Tang, Kai Han, Jing Yuan

, Wenjian Yang:
You Can Drop but You Can't Hide: K-persistent Spread Estimation in High-speed Networks. 1889-1897 - Kehao Wang, Lin Chen, Jihong Yu

, Moe Z. Win:
Opportunistic Multichannel Access with Imperfect Observation: A Fixed Point Analysis on Indexability and Index-based Policy. 1898-1906 - Ting Deng, Jianguo Yao, Haibing Guan:

Maximizing Profit of Cloud Service Brokerage with Economic Demand Response. 1907-1915 - Gueyoung Jung, Parisa Rahimzadeh, Zhang Liu, Sangtae Ha, Kaustubh Joshi, Matti A. Hiltunen:

Virtual Redundancy for Active-Standby Cloud Applications. 1916-1924 - Yining Zhu, Randall A. Berry

:
Contracts as Investment Barriers in Unlicensed Spectrum. 1925-1933 - Haoran Yu, George Iosifidis

, Biying Shou, Jianwei Huang:
Market Your Venue with Mobile Applications: Collaboration of Online and Offline Businesses. 1934-1942 - Satyam Agarwal, Francesco Malandrino

, Carla-Fabiana Chiasserini
, Swades De:
Joint VNF Placement and CPU Allocation in 5G. 1943-1951 - Xiaoda Jiang, Hancheng Lu, Chang Wen Chen

:
Enabling Quality-Driven Scalable Video Transmission over Multi-User NOMA System. 1952-1960 - Arash Asadi

, Sabrina Müller, Gek Hong Sim, Anja Klein, Matthias Hollick
:
FML: Fast Machine Learning for 5G mmWave Vehicular Communications. 1961-1969 - Arjun Anand, Gustavo de Veciana, Sanjay Shakkottai:

Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless Networks. 1970-1978 - Tongqing Zhou, Bin Xiao

, Zhiping Cai, Ming Xu, Xuan Liu:
From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile Crowdsensing. 1979-1987 - Xiaoting Tang, Cong Wang, Xingliang Yuan, Qian Wang

:
Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing Applications. 1988-1996 - Qiuxi Zhu

, Md. Yusuf Sarwar Uddin
, Nalini Venkatasubramanian, Cheng-Hsin Hsu:
Spatiotemporal Scheduling for Crowd Augmented Urban Sensing. 1997-2005 - Kechao Cai, Xutong Liu, Yu-Zhen Janice Chen

, John C. S. Lui:
An Online Learning Approach to Network Application Optimization with Guarantee. 2006-2014 - Yuchi Chen, Wei Gong, Jiangchuan Liu, Yong Cui:

I Can Hear More: Pushing the Limit of Ultrasound Sensing on Off-the-Shelf Mobile Devices. 2015-2023 - Ning Xiao, Panlong Yang, Yubo Yan, Hao Zhou, Xiang-Yang Li:

Motion-Fi: Recognizing and Counting Repetitive Motions with Passive Wireless Backscattering. 2024-2032 - Shimon Bitton, Yuval Emek, Shay Kutten:

Efficient Jobs Dispatching in Emerging Clouds. 2033-2041 - Sungjin Im, Maryam Shadloo, Zizhan Zheng:

Online Partial Throughput Maximization for Multidimensional Coflow. 2042-2050 - Pinghui Wang, Peng Jia, Jing Tao, Xiaohong Guan:

Mining Long-Term Stealthy User Behaviors on High Speed Links. 2051-2059 - Jing Chen, Shixiong Yao

, Quan Yuan, Kun He, Shouling Ji, Ruiying Du:
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. 2060-2068 - Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall

:
ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path. 2069-2077 - Abhishek Roy, Charles A. Kamhoua, Prasant Mohapatra:

Game Theoretic Characterization of Collusive Behavior Among Attackers. 2078-2086 - Lingchen Zhao, Lihao Ni, Shengshan Hu

, Yanjiao Chen, Pan Zhou, Fu Xiao, Libing Wu
:
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy. 2087-2095 - Yossi Kanizo, Ori Rottenstreich, Itai Segall, Jose Yallouz:

Designing Optimal Middlebox Recovery Schemes with Performance Guarantees. 2096-2104 - János Tapolcai, Bálazs Vass

, Zalán Heszberger, József Bíró, David Hay, Fernando A. Kuipers, Lajos Rónyai:
A Tractable Stochastic Model of Correlated Link Failures Caused by Disasters. 2105-2113 - Subhendu Khatuya, Niloy Ganguly

, Jayanta Basak, Madhumita Bharde, Bivas Mitra:
ADELE: Anomaly Detection from Event Log Empiricism. 2114-2122 - Qingyu Liu, Lei Deng

, Haibo Zeng, Minghua Chen
:
A Tale of Two Metrics in Network Delay Optimization. 2123-2131 - Gamal Sallam, Gagan Raj Gupta, Bin Li

, Bo Ji
:
Shortest Path and Maximum Flow Problems Under Service Function Chaining Constraints. 2132-2140 - Rongwei Yang, Cuiying Feng

, Luning Wang, Weiwei Wu, Kui Wu, Jianping Wang, Yinlong Xu:
On the Optimal Monitor Placement for Inferring Additive Metrics of Interested Paths. 2141-2149 - Marcelo Caggiani Luizelli, Danny Raz, Yaniv Sa'ar:

Optimizing NFV Chain Deployment through Minimizing the Cost of Virtual Switching. 2150-2158 - Rahul Vaze:

Online Knapsack Problem Under Expected Capacity Constraint. 2159-2167 - Zhiwei Zhao, Wei Dong, Geyong Min, Gonglong Chen, Tao Gu

, Jiajun Bu:
Towards Repeatable Wireless Network Simulation Using Performance Aware Markov Model. 2168-2176 - Mathieu Leconte, Georgios S. Paschos, Panayotis Mertikopoulos, Ulas C. Kozat:

A Resource Allocation Framework for Network Slicing. 2177-2185 - Jin-Hee Cho, Terrence J. Moore

:
Percolation-based Network Adaptability Under Correlated Failures. 2186-2194 - Cong Liu

, Yong Cui, Kun Tan, Quan Fan, Kui Ren, Jianping Wu:
Building Generic Scalable Middlebox Services Over Encrypted Protocols. 2195-2203 - Eran Assaf, Ran Ben-Basat, Gil Einziger, Roy Friedman:

Pay for a Sliding Bloom Filter and Get Counting, Distinct Elements, and Entropy for Free. 2204-2212 - Kaiping Xue

, Xiang Zhang, Qiudong Xia, David S. L. Wei, Hao Yue
, Feng Wu:
SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric Networking. 2213-2221 - Minghui Li

, Mingxue Zhang, Qian Wang
, Sherman S. M. Chow
, Minxin Du
, Yanjiao Chen, Chenliang Li:
InstantCryptoGram: Secure Image Retrieval Service. 2222-2230 - Agustin Formoso, Josiah Chavula

, Amreesh Phokeer
, Arjuna Sathiaseelan, Gareth Tyson:
Deep Diving into Africa's Inter-Country Latencies. 2231-2239 - Jianfeng Li, Xiaobo Ma, Guodong Li, Xiapu Luo, Junjie Zhang, Wei Li, Xiaohong Guan:

Can We Learn what People are Doing from Raw DNS Queries? 2240-2248 - Ioana Livadariu, Karyn Benson, Ahmed Elmokashfi, Amogh Dhamdhere, Alberto Dainotti

:
Inferring Carrier-Grade NAT Deployment in the Wild. 2249-2257 - Minglai Shao, Jianxin Li, Feng Chen, Xunxun Chen

:
An Efficient Framework for Detecting Evolving Anomalous Subgraphs in Dynamic Networks. 2258-2266 - Fei Wu, Yin Sun, Lu Chen, Jackie Xu, Kannan Srinivasan, Ness B. Shroff:

High Throughput Low Delay Wireless Multicast via Multi-Channel Moving Window Codes. 2267-2275 - Zhichao Cao, Jiliang Wang, Daibo Liu, Xin Miao, Qiang Ma, XuFei Mao:

Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle Networks. 2276-2284 - Yahia Shabara, C. Emre Koksal, Eylem Ekici

:
Linear Block Coding for Efficient Beam Discovery in Millimeter Wave Communication Networks. 2285-2293 - Jinbin Hu, Jiawei Huang, Wenjun Lv, Yutao Zhou, Jianxin Wang, Tian He:

CAPS: Coding-based Adaptive Packet Spraying to Reduce Flow Completion Time in Data Center. 2294-2302 - Lingnan Gao, George N. Rouskas:

Virtual Network Reconfiguration with Load Balancing and Migration Cost Considerations. 2303-2311 - Peng-Jun Wan, Huaqiang Yuan, Jiliang Wang, Ju Ren, Yaoxue Zhang:

Joint Selection and Scheduling of Communication Requests in Multi-Channel Wireless Networks under SINR Model. 2312-2320 - Riccardo Cavallari, Stavros Toumpis, Roberto Verdone:

Analysis of Hybrid Geographic/Delay-Tolerant Routing Protocols for Wireless Mobile Networks. 2321-2329 - Hamideh Ramezani, Tooba Khan, Özgür B. Akan:

Information Theoretical Analysis of Synaptic Communication for Nanonetworks. 2330-2338 - Zhenhua Han, Haisheng Tan, Rui Wang

, Shaojie Tang, Francis C. M. Lau:
Online Learning based Uplink Scheduling in HetNets with Limited Backhaul Capacity. 2348-2356 - Nishant Budhdev

, Mun Choon Chan, Tulika Mitra
:
PR3: Power Efficient and Low Latency Baseband Processing for LTE Femtocells. 2357-2365 - Andres Garcia-Saavedra, Xavier Costa-Pérez

, Douglas J. Leith
, George Iosifidis
:
FluidRAN: Optimized vRAN/MEC Orchestration. 2366-2374 - Anfu Zhou, Leilei Wu, Shaoqing Xu, Huadong Ma, Teng Wei, Xinyu Zhang:

Following the Shadow: Agile 3-D Beam-Steering for 60 GHz Wireless Networks. 2375-2383 - Guillermo Bielsa, Joan Palacios, Adrian Loch, Daniel Steinmetzer, Paolo Casari

, Joerg Widmer
:
Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access Points. 2384-2392 - Morteza Hashemi

, Ashutosh Sabharwal, C. Emre Koksal, Ness B. Shroff:
Efficient Beam Alignment in Millimeter Wave Systems Using Contextual Bandits. 2393-2401 - Joan Palacios, Guillermo Bielsa, Paolo Casari

, Joerg Widmer
:
Communication-Driven Localization and Mapping for Millimeter Wave Networks. 2402-2410 - Shuo Yang, Kunyan Han, Zhenzhe Zheng, Shaojie Tang, Fan Wu:

Towards Personalized Task Matching in Mobile Crowdsensing via Fine-Grained User Profiling. 2411-2419 - Xiong Wang, Riheng Jia, Xiaohua Tian, Xiaoying Gan:

Dynamic Task Assignment in Crowdsensing with Location Awareness and Location Diversity. 2420-2428 - Huajie Shao, Shuochao Yao, Yiran Zhao, Chao Zhang

, Jinda Han, Lance M. Kaplan, Lu Su, Tarek F. Abdelzaher:
A Constrained Maximum Likelihood Estimator for Unguided Social Sensing. 2429-2437 - Jian Lin, Ming Li, Dejun Yang

, Guoliang Xue:
Sybil-Proof Online Incentive Mechanisms for Crowdsensing. 2438-2446 - Bainan Xia, Srinivas Shakkottai, Vijay G. Subramanian

:
Small-Scale Markets for Bilateral Resource Trading in the Sharing Economy. 2447-2455 - Xiaoxi Zhang, Chuan Wu

, Zhiyi Huang
, Zongpeng Li:
Occupation-Oblivious Pricing of Cloud Jobs via Online Learning. 2456-2464 - Boyuan He, Haitao Xu, Ling Jin, Guanyu Guo, Yan Chen, Guangyao Weng:

An Investigation into Android In-App Ad Practice: Implications for App Developers. 2465-2473 - Liang Zheng, Carlee Joe-Wong, Matthew Andrews, Mung Chiang:

Optimizing Data Plans: Usage Dynamics in Mobile Data Networks. 2474-2482 - Yihan Zou, Xiaojun Lin, Dionysios Aliprantis, Minghua Chen

:
Robust Multi-stage Power Grid Operations with Energy Storage. 2483-2491 - Yongmin Zhang, Jiayi Chen, Lin Cai

, Jianping Pan
:
EV Charging Network Design with Transportation and Power Grid Constraints. 2492-2500 - Mingkui Wei, Zhuo Lu, Yufei Tang, Xiang Lu:

How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure? 2501-2509 - Jose Cordova-Garcia, Dongliang Xie, Xin Wang:

Restricting Involuntary Extension of Failures in Smart Grids using Social Network Metrics. 2510-2518 - Haitao Xu, Shuai Hao, Alparslan Sari

, Haining Wang:
Privacy Risk Assessment on Email Tracking. 2519-2527 - Ruomu Hou, Irvan Jahja, Loi Luu, Prateek Saxena, Haifeng Yu:

Randomized View Reconciliation in Permissionless Distributed Systems. 2528-2536 - Qiang Li

, Xuan Feng, Haining Wang, Zhi Li, Limin Sun:
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices. 2537-2545 - Nikolaos Papadis

, Sem C. Borst, Anwar Walid, Mohamed Grissa, Leandros Tassiulas:
Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis. 2546-2554 - Yuanxing Zhang

, Chengliang Gao, Yangze Guo, Kaigui Bian, Xin Jin, Zhi Yang, Lingyang Song, Jiangang Cheng, Hu Tuo, Xiaoming Li:
Proactive Video Push for Optimizing Bandwidth Consumption in Hybrid CDN-P2P VoD Systems. 2555-2563 - Xin Wang, Yinlong Xu, Richard T. B. Ma

:
Paid Peering, Settlement-Free Peering, or Both? 2564-2572 - Vamseedhar R. Reddyvari, Parimal Parag

, Srinivas Shakkottai:
Mode-Suppression: A Simple and Provably Stable Chunk-Sharing Algorithm for P2P Networks. 2573-2581 - Leonardo Maccari

, Lorenzo Ghiro, Alessio Guerrieri, Alberto Montresor
, Renato Lo Cigno
:
On the Distributed Computation of Load Centrality and its Application to DV Routing. 2582-2590 - Paolo Castagno, Vincenzo Mancuso, Matteo Sereno, Marco Ajmone Marsan:

A Simple Model of MTC in Smart Factories. 2591-2599 - Mingyue Ji, Rong-Rong Chen:

Fundamental Limits of Wireless Distributed Computing Networks. 2600-2608 - Madhumitha Harishankar, Nagarjun Srinivasan, Carlee Joe-Wong, Patrick Tague:

To Accept or Not to Accept: The Question of Supplemental Discount Offers in Mobile Data Plans. 2609-2617 - Rashid Tahir

, Ali Raza
, Faizan Ahmad, Jehangir Kazi, Fareed Zaffar, Chris Kanich, Matthew Caesar
:
It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting. 2618-2626 - Tong Yang, Alex X. Liu, Yulong Shen, Qiaobin Fu, Dagang Li

, Xiaoming Li:
Fast OpenFlow Table Lookup with Fast Update. 2636-2644 - Wenjun Li, Xianfeng Li, Hui Li

, Gaogang Xie:
CutSplit: A Decision-Tree Combining Cutting and Splitting for Scalable Packet Classification. 2645-2653 - James Daly, Eric Torng:

ByteCuts: Fast Packet Classification by Interior Bit Extraction. 2654-2662 - Pranav Madadi, François Baccelli, Gustavo de Veciana:

On Spatial and Temporal Variations in Ultra Dense Wireless Networks. 2663-2671 - Fabio Cecchi

, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting:
Optimal Activation Rates in Ultra-Dense Wireless Networks with Intermittent Traffic Sources. 2672-2680 - Nikolaos Sapountzis, Thrasyvoulos Spyropoulos, Navid Nikaein, Umer Salim:

Joint Optimization of User Association and Dynamic TDD for Ultra-Dense Networks. 2681-2689 - Nikolaos Liakopoulos, Georgios S. Paschos, Thrasyvoulos Spyropoulos:

Robust User Association for Ultra Dense Networks. 2690-2698 - Qiulin Lin

, Lei Deng
, Jingzhou Sun, Minghua Chen
:
Optimal Demand-Aware Ride-Sharing Routing. 2699-2707 - Takuma Oda

, Carlee Joe-Wong:
MOVI: A Model-Free Approach to Dynamic Fleet Management. 2708-2716 - Jianhui Zhang, Pengqian Lu

, Zhi Li, Jiayu Gan:
Distributed Trip Selection Game for Public Bike System with Crowdsourcing. 2717-2725 - Yulong Tian, Wei Wei, Qun Li

, Fengyuan Xu, Sheng Zhong:
MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks. 2726-2734 - Lan Zhang, Yannan Li, Xiang Xiao, Xiang-Yang Li, Junjun Wang, Anxin Zhou, Qiang Li:

CrowdBuy: Privacy-friendly Image Dataset Purchasing via Crowdsourcing. 2735-2743 - Jonatan Krolikowski, Anastasios Giovanidis

, Marco Di Renzo:
Optimal Cache Leasing from a Mobile Network Operator to a Content Provider. 2744-2752 - Hao Ge, Randall A. Berry

:
Dominant Strategy Allocation of Divisible Network Resources with Limited Information Exchange. 2753-2761 - Mikhail Khodak, Liang Zheng, Andrew S. Lan, Carlee Joe-Wong, Mung Chiang:

Learning Cloud Dynamics to Optimize Spot Instance Bidding Strategies. 2762-2770

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














