


Остановите войну!
for scientists:


default search action
38th INFOCOM 2019: Paris, France
- 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019. IEEE 2019, ISBN 978-1-7281-0515-4
- Bahman Abolhassani, John Tadrous, Atilla Eryilmaz:
Wireless Multicasting for Content Distribution: Stability and Delay Gain Analysis. 1-9 - Konstantinos Poularakis, Jaime Llorca
, Antonia Maria Tulino
, Ian J. Taylor, Leandros Tassiulas:
Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing Networks. 10-18 - Wei Wang
, Xin Liu, Yao Yao, Yan Pan, Zicheng Chi, Ting Zhu:
CRF: Coexistent Routing and Flooding using WiFi Packets in Heterogeneous IoT Networks. 19-27 - Itamar Cohen
, Gil Einziger, Roy Friedman, Gabriel Scalosub:
Access Strategies for Network Caching. 28-36 - Jaya Prakash Champati, Hussein Al-Zubaidy, James Gross:
On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* Systems: Exact Expressions and Bounds. 37-45 - Mengxue Liu, Andréa W. Richa, Matthias Rost, Stefan Schmid:
A Constant Approximation for Maximum Throughput Multicommodity Routing And Its Application to Delay-Tolerant Network Scheduling. 46-54 - Bin Han
, Vincenzo Sciancalepore
, Di Feng, Xavier Costa-Pérez
, Hans D. Schotten:
A Utility-Driven Multi-Queue Admission Control Solution for Network Slicing. 55-63 - Stanislav Lange, Leonardo Linguaglossa, Stefan Geissler, Dario Rossi, Thomas Zinner:
Discrete-Time Modeling of NFV Accelerators that Exploit Batched Processing. 64-72 - Tao Wu, Panlong Yang, Haipeng Dai, Wanru Xu, Mingxue Xu:
Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSNs. 73-81 - Xi Zhang, Qixuan Zhu:
D2D Offloading for Statistical QoS Provisionings Over 5G Multimedia Mobile Wireless Networks. 82-90 - Saadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla:
Enhancing Cellular Performance via Vehicular-based Opportunistic Relaying and Load Balancing. 91-99 - Zhao Li, Jie Chen, Kang G. Shin, Jia Liu:
Interference Recycling: Exploiting Interfering Signals to Enhance Data Transmission. 100-108 - Bo Yin, Shuai Zhang, Yu Cheng
, Lin X. Cai, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Only Those Requested Count: Proactive Scheduling Policies for Minimizing Effective Age-of-Information. 109-117 - Chengzhang Li, Shaoran Li, Y. Thomas Hou:
A General Model for Minimizing Age of Information at Network Edge. 118-126 - Antonio Massaro, Francesco De Pellegrini, Lorenzo Maggi:
Optimal Trunk-Reservation by Policy Learning. 127-135 - Isfar Tariq, Rajat Sen, Gustavo de Veciana, Sanjay Shakkottai:
Online Channel-state Clustering And Multiuser Capacity Learning For Wireless Scheduling. 136-144 - Bruna Soares Peres, Otavio Augusto de Oliveira Souza, Olga Goussevskaia, Chen Avin, Stefan Schmid:
Distributed Self-Adjusting Tree Networks. 145-153 - Fenghua Li, Zhe Sun
, Ang Li, Ben Niu, Hui Li, Guohong Cao:
HideMe: Privacy-Preserving Photo Sharing on Social Networks. 154-162 - Prasanna Karthik Vairam
, Gargi Mitra, Vignesh Manoharan, Chester Rebeiro, Byrav Ramamurthy, Kamakoti Veezhinathan:
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption. 163-171 - Shaohuai Shi
, Xiaowen Chu
, Bo Li:
MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD Algorithms. 172-180 - Shuyu Shi, Yaxiong Xie
, Mo Li
, Alex X. Liu, Jun Zhao
:
Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic Environments. 181-189 - Pengfei Liu, Panlong Yang, Wen-Zhan Song
, Yubo Yan, Xiang-Yang Li:
Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features. 190-198 - Tianhang Zheng, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. 199-207 - Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu, Yu Cheng
:
A Unified Sampling and Scheduling Approach for Status Update in Multiaccess Wireless Networks. 208-216 - Milad Mahdian, Armin Moharrer, Stratis Ioannidis, Edmund Yeh:
Kelly Cache Networks. 217-225 - Pariya Babaie, Eman Ramadan
, Zhi-Li Zhang:
Cache Network Management Using BIG Cache Abstraction. 226-234 - Georgios S. Paschos, Apostolos Destounis, Luigi Vigneri, George Iosifidis
:
Learning to Cache With No Regrets. 235-243 - Haisheng Tan, Shaofeng H.-C. Jiang
, Zhenhua Han, Liuyan Liu, Kai Han, Qinglin Zhao:
Camul: Online Caching on Multiple Caches with Relaying and Bypassing. 244-252 - Ruirong Chen, Wei Gao:
Enabling Cross-Technology Coexistence for Extremely Weak Wireless Devices. 253-261 - Taekyung Kim, Wonjun Lee:
Channel Independent Wi-Fi Backscatter Networks. 262-270 - Zihan Wang, Yuan Zhuang, Zhi Wang, Xin Wu:
Individual Data Plan in Virtual Network Operation: A Proactive Matching Approach. 271-279 - Dario Bega, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Pérez
:
DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning. 280-288 - Peng-Jun Wan, Zhu Wang, Huaqiang Yuan, Jinling Zhang, XuFei Mao:
Fair Rate Allocation over A Generalized Symmetric Polymatroid with Box Constraints. 289-297 - Ruozhou Yu
, Vishnu Teja Kilari, Guoliang Xue, Dejun Yang
:
Load Balancing for Interdependent IoT Microservices. 298-306 - Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu, Jianping Wu:
Octans: Optimal Placement of Service Function Chains in Many-Core Systems. 307-315 - Cuiying Feng
, Luning Wang, Kui Wu, Jianping Wang:
Bound-based Network Tomography with Additive Metrics. 316-324 - Djob Mvondo, Boris Teabe, Alain Tchana, Daniel Hagimont, Noel De Palma:
Memory flipping: a threat to NUMA virtual machines in the Cloud. 325-333 - Bin Shi, Haiying Shen:
Memory/Disk Operation Aware Lightweight VM Live Migration Across Data-centers with Low Performance Impact. 334-342 - Dinuni Fernando, Jonathan Terner, Kartik Gopalan, Ping Yang:
Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live Migration. 343-351 - Jian Li, Jianmin Qian, Haibing Guan:
A Holistic Model for Performance Prediction and Optimization on NUMA-based Virtualized Systems. 352-360 - Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Huacheng Zeng:
EE-IoT: An Energy-Efficient IoT Communication Scheme for WLANs. 361-369 - Kunal Sankhe, Mauro Belgiovine, Fan Zhou, Shamnaz Riyaz, Stratis Ioannidis, Kaushik R. Chowdhury
:
ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks. 370-378 - Mingyu Yang
, Li-Xuan Chuo, Karan Suri, Lu Liu, Hao Zheng, Hun-Seok Kim:
iLPS: Local Positioning System with Simultaneous Localization and Wireless Communication. 379-387 - Kai Lei, Meng Qin, Bo Bai, Gong Zhang, Min Yang:
GCN-GAN: A Non-linear Temporal Link Prediction Model for Weighted Dynamic Networks. 388-396 - Qingkai Liang, Eytan H. Modiano:
Optimal Network Control in Partially-Controllable Networks. 397-405 - Chaoqun You:
Hierarchical Multi-resource Fair Queueing for Network Function Virtualization. 406-414 - Paolo Laffranchini, Luís E. T. Rodrigues, Marco Canini
, Balachander Krishnamurthy:
Measurements As First-class Artifacts. 415-423 - Sandeep Kumar Singh
, Admela Jukan:
Computing Blocking Probabilities in Elastic Optical Networks with Spectrum Defragmentation. 424-432 - Ahmed Khalid
, Ahmed H. Zahran, Cormac J. Sreenan:
RTOP: Optimal User Grouping and SFN Clustering for Multiple eMBMS Video Sessions. 433-441 - Salvatore D'Oro
, Francesco Restuccia, Alessandro Talamonti, Tommaso Melodia:
The Slice Is Served: Enforcing Radio Access Network Slicing in Virtualized 5G Systems. 442-450 - Lou Salaun, Marceau Coupechoux, Chung Shue Chen:
Weighted Sum-Rate Maximization in Multi-Carrier NOMA with Cellular Power Constraint. 451-459 - Pu Wang, Ning Wang, Monireh Dabaghchian
, Kai Zeng, Zheng Yan
:
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise. 460-468 - Klaus-Tycho Foerster
, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
CASA: Congestion and Stretch Aware Static Fast Rerouting. 469-477 - Huanle Xu, Yang Liu, Wing Cheong Lau, Jun Guo, Alex X. Liu:
Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability. 478-486 - Tian Pan
, Enge Song, Zizheng Bian, Xingchen Lin, Xiaoyu Peng, Jiao Zhang, Tao Huang, Bin Liu, Yunjie Liu:
INT-path: Towards Optimal Path Planning for In-band Network-Wide Telemetry. 487-495 - Sisi Xiong, Qing Cao, Weisheng Si:
Adaptive Path Tracing with Programmable Bloom Filters in Software-Defined Networks. 496-504 - Yixin Bao, Yanghua Peng, Chuan Wu
:
Deep Learning-based Job Placement in Distributed Machine Learning Clusters. 505-513 - Stephen Pasteris, Shiqiang Wang, Mark Herbster, Ting He:
Service Placement with Provable Guarantees in Heterogeneous Edge Computing Systems. 514-522 - Gamal Sallam, Bo Ji
:
Joint Placement and Allocation of Virtual Network Functions with Budget and Capacity Constraints. 523-531 - Chen Chen, Wei Wang, Bo Li:
Round-Robin Synchronization: Mitigating Communication Bottlenecks in Parameter Servers. 532-540 - Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. 541-549 - Mohannad Alhanahnah, Qiben Yan
, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. 550-558 - Liyao Xiang, Jingbo Yang, Baochun Li:
Differentially-Private Deep Learning from an optimization Perspective. 559-567 - Chaoyue Niu, Zhenzhe Zheng, Shaojie Tang, Xiaofeng Gao, Fan Wu:
Making Big Money from Small Sensors: Trading Time-Series Data under Pufferfish Privacy. 568-576 - Zicheng Chi, Yan Li, Zhichuan Huang, Hongyu Sun, Ting Zhu:
Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data Stream. 577-585 - Vijay K. Shah, Simone Silvestri, Brian Luciano, Sajal K. Das:
X-CHANT: A Diverse DSA based Architecture for Next-generation Challenged Networks. 586-594 - Ali Rahmati, Xiaofan He, Ismail Güvenç, Huaiyu Dai:
Dynamic Mobility-Aware Interference Avoidance for Aerial Base Stations in Cognitive Radio Networks. 595-603 - Minh Vu, Lisong Xu, Sebastian G. Elbaum, Wei Sun, Kevin Qiao:
Efficient systematic testing of network protocols with temporal uncertain events. 604-612 - Moinul Hossain, Jiang Xie:
Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio Networks. 613-621 - Parinaz Naghizadeh
, Maria Gorlatova, Andrew S. Lan, Mung Chiang:
Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent Learning. 622-630 - Debasis Mitra, Abhinav Sridhar:
Consortiums of ISP-Content Providers Formed by Nash Bargaining for Internet Content Delivery. 631-639 - Costas Courcoubetis, Antonis Dimakis:
Throughput and Pricing of Ridesharing Systems. 640-648 - Shi Su, Wai-Tian Tan, Xiaoqing Zhu, Rob Liston:
Client Pre-Screening for MU-MIMO in Commodity 802.11ac Networks via Online Learning. 649-657 - Junyang Shi, Mo Sha:
Parameter Self-Configuration and Self-Adaptation in Industrial Wireless Sensor-Actuator Networks. 658-666 - Vincenzo Mancuso, Paolo Castagno, Matteo Sereno, Marco Ajmone Marsan:
Slicing Cell Resources: The Case of HTC and MTC Coexistence. 667-675 - Amit Sheoran
, Sonia Fahmy
, Chunyi Peng, Navin Modi:
Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation. 676-684 - Damiano Carra, Giovanni Neglia, Pietro Michiardi:
TTL-based Cloud Caches. 685-693 - Guocong Quan, Jian Tan, Atilla Eryilmaz:
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels. 694-702 - Rashid Tahir
, Sultan Durrani, Faizan Ahmed, Hammas Saeed, Fareed Zaffar, Muhammad Saqib Ilyas:
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web. 703-711 - Lailong Luo, Deke Guo, Ori Rottenstreich, Richard T. B. Ma
, Xueshan Luo, Bangbang Ren:
The Consistent Cuckoo Filter. 712-720 - Amjad Yousef Majid, Michel Jansen, Guillermo Ortas Delgado, Kasim Sinan Yildirim
, Przemyslaw Pawelczak:
Multi-hop Backscatter Tag-to-Tag Networks. 721-729 - Marcelo Pizzutti, Alberto E. Schaeffer Filho:
Adaptive Multipath Routing based on Hybrid Data and Control Plane Operation. 730-738 - Harsh Gupta, Atilla Eryilmaz, R. Srikant:
Link Rate Selection using Constrained Thompson Sampling. 739-747 - Lixing Chen, Jie Xu
:
Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed Feedback. 748-756 - Suining He
, Kang G. Shin:
Crowd-Flow Graph Construction and Identification with Spatio-Temporal Signal Feature Fusion. 757-765 - Daniel Yue Zhang, Dong Wang:
An Integrated Top-down and Bottom-up Task Allocation Approach in Social Sensing based Edge Computing Systems. 766-774 - Li Lu
, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu
, Guangtao Xue, Minglu Li:
KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals. 775-783 - Pranvera Kortoçi, Liang Zheng, Carlee Joe-Wong, Mario Di Francesco, Mung Chiang:
Fog-based Data Offloading in Urban IoT Scenarios. 784-792 - Jian-Jhih Kuo
, Sheng-Hao Chiang, Shan-Hsiang Shen, De-Nian Yang
, Wen-Tsuen Chen:
Dynamic Multicast Traffic Engineering with Efficient Rerouting for Software-Defined Networks. 793-801 - Subhrendu Chattopadhyay
, Soumyajit Chatterjee, Sukumar Nandi
, Sandip Chakraborty:
Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications. 802-810 - Gengbiao Shen, Qing Li, Shuo Ai, Yong Jiang, Mingwei Xu, Xuya Jia:
How Powerful Switches Should be Deployed: A Precise Estimation Based on Queuing Theory. 811-819 - Junjie Xie, Chen Qian, Deke Guo, Minmei Wang, Shouqian Shi, Honghui Chen:
Efficient Indexing Mechanism for Unstructured Data Sharing Systems in Edge Computing. 820-828 - Shengling Wang, Chenyu Wang, Qin Hu:
Corking by Forking: Vulnerability Analysis of Blockchain. 829-837 - Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. 838-846 - Minmei Wang, Chen Qian, Xin Li, Shouqian Shi:
Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. 847-855 - Chi Lin, Zhi Shang, Wan Du, Jiankang Ren, Lei Wang, Guowei Wu:
CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge. 856-864 - Chuyu Wang, Lei Xie, Keyan Zhang, Wei Wang, Yanling Bu, Sanglu Lu:
Spin-Antenna: 3D Motion Tracking for Tag Array Labeled Objects via Spinning Antenna. 865-873 - Jia Liu, Xingyu Chen, Shigang Chen, Xiulong Liu, Yanyan Wang, Lijun Chen:
TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag Matrix. 874-882 - Junchen Guo, Ting Wang, Yuan He, Meng Jin, Chengkun Jiang, Yunhao Liu:
TwinLeak: RFID-based Liquid Leakage Detection in Industrial Environments. 883-891 - Ping Li, Zhenlin An, Lei Yang
, Panlong Yang:
Towards Physical-Layer Vibration Sensing with RFIDs. 892-900 - Xu Wang, Randall A. Berry
:
Price Competition with LTE-U and WiFi. 901-909 - Fangxin Wang, Cong Zhang, Feng Wang, Jiangchuan Liu, Yifei Zhu, Haitian Pang, Lifeng Sun:
Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoE. 910-918 - Meng Zhang, Jianwei Huang:
Mechanism Design for Network Utility Maximization with Private Constraint Information. 919-927 - Yunpeng Li, Costas Courcoubetis, Lingjie Duan:
Recommending Paths: Follow or Not Follow? 928-936 - Yi Zhao, Zimu Zhou, Xu Wang, Tongtong Liu, Yunhao Liu, Zheng Yang:
CellTradeMap: Delineating Trade Areas for Urban Commercial Districts with Cellular Networks. 937-945 - Ran He, Jin Cao, Lisa Zhang, Denny Lee:
Statistical Enrichment Models for Activity Inference from Imprecise Location Data. 946-954 - Mohammed Alasmar, George Parisis
, Richard G. Clegg, Nickolay Zakhleniuk:
On the Distribution of Traffic Volumes in the Internet and its Implications. 955-963 - Weili Chen, Jun Wu, Zibin Zheng
, Chuan Chen, Yuren Zhou:
Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network. 964-972 - Kyoungjun Park, Myungchul Kim:
EVSO: Environment-aware Video Streaming optimization of Power Consumption. 973-981 - Xiaoda Jiang, Hancheng Lu, Chang Wen Chen
, Feng Wu:
Receiver-driven Video Multicast over NOMA Systems in Heterogeneous Environments. 982-990 - Haitian Pang, Cong Zhang, Fangxin Wang, Jiangchuan Liu, Lifeng Sun:
Towards Low Latency Multi-viewpoint 360° Interactive Video: A Multimodal Deep Reinforcement Learning Approach. 991-999 - Bastian Alt
, Trevor Ballard, Ralf Steinmetz, Heinz Koeppl, Amr Rizk:
CBA: Contextual Quality Adaptation for Adaptive Bitrate Video Streaming. 1000-1008 - Fabien Geyer, Steffen Bondorf
:
DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural Networks. 1009-1017 - Kunyi Chen, Hong Gao, Zhipeng Cai
, Quan Chen
, Jianzhong Li:
Distributed Energy-Adaptive Aggregation Scheduling with Coverage Guarantee For Battery-Free Wireless Sensor Networks. 1018-1026 - Yifei Zou, Dongxiao Yu, Libing Wu
, Jiguo Yu, Yu Wu, Qiang-Sheng Hua, Francis C. M. Lau:
Fast Distributed Backbone Construction Despite Strong Adversarial Jamming. 1027-1035 - Boaz Patt-Shamir, Will Rosenbaum
:
Space-Optimal Packet Routing on Trees. 1036-1044