


default search action
39th INFOCOM 2020: Toronto, ON, Canada
- 39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, July 6-9, 2020. IEEE 2020, ISBN 978-1-7281-6412-0

- Jian Liu, Yingying Chen, Yudi Dong

, Yan Wang
, Tianming Zhao
, Yu-Dong Yao:
Continuous User Verification via Respiratory Biometrics. 1-10 - Zijuan Liu, Xiulong Liu, Keqiu Li:

Deeper Exercise Monitoring for Smart Gym using Fused RFID and CV Data. 11-19 - Nidhi Pathak, Anandarup Mukherjee

, Sudip Misra
:
Reconfigure and Reuse: Interoperable Wearables for Healthcare IoT. 20-29 - Tianming Zhao

, Yan Wang
, Jian Liu, Yingying Chen, Jerry Cheng, Jiadi Yu:
TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based Biometrics. 30-39 - Michael J. Neely:

A Converse Result on Convergence Time for Opportunistic Wireless Scheduling. 40-48 - Sherif ElAzzouni, Eylem Ekici

, Ness B. Shroff:
Is Deadline Oblivious Scheduling Efficient for Controlling Real-Time Traffic in Cellular Downlink Systems? 49-58 - Christos Tsanikidis, Javad Ghaderi:

On the Power of Randomization for Scheduling Real-Time Traffic in Wireless Networks. 59-68 - Seungbeom Jeong, Hyung-Sin Kim, Jeongyeup Paek

, Saewoong Bahk:
OST: On-Demand TSCH Scheduling with Traffic-Awareness. 69-78 - Todd Arnold

, Ege Gürmeriçliler, Georgia Essig, Arpit Gupta, Matt Calder, Vasileios Giotsas
, Ethan Katz-Bassett:
(How Much) Does a Private WAN Improve Cloud Performance? 79-88 - Jiapeng Zhang, Luoyi Fu, Xinbing Wang, Songwu Lu:

De-anonymization of Social Networks: the Power of Collectiveness. 89-98 - Hui Cai

, Fan Ye, Yuanyuan Yang, Yanmin Zhu, Jie Li:
Towards Correlated Queries on Trading of Private Web Browsing History. 99-108 - Zhibo Wang, Wenxin Liu, Xiaoyi Pang, Ju Ren, Zhe Liu, Yongle Chen:

Towards Pattern-aware Privacy-preserving Real-time Data Collection. 109-118 - Jie Ren, Lu Yuan, Petteri Nurmi

, Xiaoming Wang, Miao Ma, Ling Gao, Zhanyong Tang, Jie Zheng, Zheng Wang
:
Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions. 119-128 - Nabeel Akhtar, Ali Raza

, Vatche Ishakian, Ibrahim Matta
:
COSE: Configuring Serverless Functions using Statistical Learning. 129-138 - Xiaoxi Zhang, Jianyu Wang, Gauri Joshi, Carlee Joe-Wong:

Machine Learning on Volatile Instances. 139-148 - Tingwei Liu

, Hong Xie, John C. S. Lui:
Optimizing Mixture Importance Sampling Via Online Learning: Algorithms and Applications. 149-158 - Zhida Qin, Xiaoying Gan, Jia Liu, Hongqiu Wu, Haiming Jin, Luoyi Fu:

Exploring Best Arm with Top Reward-Cost Ratio in Stochastic Bandits. 159-168 - Yi-Hsuan Kao, Kwame-Lante Wright, Po-Han Huang, Bhaskar Krishnamachari, Fan Bai:

MABSTA: Collaborative Computing over Heterogeneous Devices in Dynamic Environments. 169-178 - Guoju Gao, Jie Wu, Mingjun Xiao, Guoliang Chen:

Combinatorial Multi-Armed Bandit Based Unknown Worker Recruitment in Heterogeneous Crowdsensing. 179-188 - Arun Verma, Manjesh Kumar Hanawal:

Stochastic Network Utility Maximization with Unknown Utilities: Multi-Armed Bandits Approach. 189-198 - Chi Harold Liu

, Chengzhe Piao
, Jian Tang:
Energy-Efficient UAV Crowdsensing with Multiple Charging Stations by Deep Learning. 199-208 - Shengkai Zhang

, Wei Wang, Ning Zhang, Tao Jiang:
RF Backscatter-based State Estimation for Micro Aerial Vehicles. 209-217 - Md. Tahmid Rashid

, Daniel Yue Zhang, Dong Wang:
SocialDrone: An Integrated Social Media and Drone Sensing System for Reliable Disaster Response. 218-227 - Weiwei Chen, Zhou Su, Qichao Xu, Tom H. Luan

, Ruidong Li
:
VFC-Based Cooperative UAV Computation Task Offloading for Post-disaster Rescue. 228-236 - Kwang Taik Kim, Carlee Joe-Wong, Mung Chiang:

Coded Edge Computing. 237-246 - Shijing Li, Tian Lan:

HotDedup: Managing Hot Data Storage at Network Edge through Optimal Distributed Deduplication. 247-256 - Can Wang, Sheng Zhang, Yu Chen, Zhuzhong Qian, Jie Wu, Mingjun Xiao:

Joint Configuration Adaptation and Bandwidth Allocation for Edge-based Real-time Video Analytics. 257-266 - Panpan Jin, Xincai Fei, Qixia Zhang

, Fangming Liu, Bo Li:
Latency-aware VNF Chain Deployment with Efficient Resource Reuse at Network Edge. 267-276 - Ge Wang, Chen Qian, Kaiyan Cui, Xiaofeng Shi, Han Ding, Wei Xi, Jizhong Zhao, Jinsong Han:

A Universal Method to Combat Multipaths for RFID Sensing. 277-286 - Taekyung Kim, Wonjun Lee:

AnyScatter: Eliminating Technology Dependency in Ambient Backscatter Systems. 287-296 - Panlong Yang, Yuanhao Feng, Jie Xiong

, Ziyang Chen, Xiang-Yang Li:
RF-Ear: Contactless Multi-device Vibration Sensing and Identification Using COTS RFID. 297-306 - Ziyang Chen, Panlong Yang, Jie Xiong

, Yuanhao Feng, Xiang-Yang Li:
TagRay: Contactless Sensing and Tracking of Mobile Objects using COTS RFID Devices. 307-316 - Xin Zhang, Jia Liu, Zhengyuan Zhu

, Elizabeth S. Bentley:
Communication-Efficient Network-Distributed Optimization with Differential-Coded Compressors. 317-326 - Derya Malak, Alejandro Cohen, Muriel Médard:

How to Distribute Computation in Networks. 327-336 - Pierluigi Crescenzi

, Pierre Fraigniaud, Ami Paz
:
Simple and Fast Distributed Computation of Betweenness Centrality. 337-346 - Yijia Chang

, Xi Huang
, Longxiulin Deng, Ziyu Shao, Junshan Zhang:
Systematic Topology Design for Large-Scale Networks: A Unified Framework. 347-356 - Juchuan Zhang, Xiaoyu Ji, Wenyuan Xu, Yi-Chao Chen, Yuting Tang, Gang Qu:

MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding. 357-366 - Cho-Chun Chiu, Ting He:

Stealthy DGoS Attack: DeGrading of Service under the Watch of Network Tomography. 367-376 - Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang

, Brandon Falk, Haojin Zhu
:
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home. 377-386 - Jinyang Li, Zhenyu Li, Gareth Tyson, Gaogang Xie:

Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service. 387-396 - Jielun Zhang

, Fuhao Li
, Feng Ye, Hongyu Wu:
Autonomous Unknown-Application Filtering and Labeling for DL-based Traffic Classifier Update. 397-405 - Shaohuai Shi

, Qiang Wang
, Xiaowen Chu
, Bo Li, Yang Qin, Ruihao Liu, Xinxiao Zhao:
Communication-Efficient Distributed Deep Learning with Merged Gradient Sparsification on GPUs. 406-415 - Matthew Andrews, Sem C. Borst, Jeongran Lee, Enrique Martin-Lopez, Karina Palyutina:

Tracking the State of Large Dynamic Networks via Reinforcement Learning. 416-425 - Hua Shao, Li Chen, Youjian Zhao:

Unsupervised and Network-Aware Diagnostics for Latent Issues in Network Information Databases. 426-435 - Chengzhang Li, Shaoran Li, Yongce Chen, Y. Thomas Hou

, Wenjing Lou:
AoI Scheduling with Maximum Thresholds. 436-445 - Zhenzhi Qian, Fei Wu, Jiayu Pan, Kannan Srinivasan, Ness B. Shroff:

Minimizing Age of Information in Multi-channel Time-sensitive Information Update Systems. 446-455 - Jaya Prakash Champati, Ramana R. Avula

, Tobias J. Oechtering, James Gross:
On the Minimum Achievable Age of Information for General Service-Time Distributions. 456-465 - Cho-Hsin Tsai, Chih-Chun Wang:

Unifying AoI Minimization and Remote Estimation - Optimal Sensor/Controller Coordination with Random Two-way Delay. 466-475 - Jiadong Lou, Xu Yuan, Sastry Kompella

, Nian-Feng Tzeng:
AoI and Throughput Tradeoffs in Routing-aware Multi-hop Wireless Networks. 476-485 - Prithwish Basu, Theodoros Salonidis, Brent Kraczek, Sayed M. Saghaian N. E., Ali Sydney, Bongjun Ko, Tom La Porta, Kevin S. Chan:

Decentralized placement of data and analytics in wireless networks for energy-efficient execution. 486-495 - Jia Zhang, Xiuzhen Guo, Haotian Jiang, Xiaolong Zheng, Yuan He:

Link Quality Estimation of Cross-Technology Communication. 496-505 - Zhuqing Xu

, Junzhou Luo, Zhimeng Yin, Tian He, Fang Dong:
S-MAC: Achieving High Scalability via Adaptive Scheduling in LPWAN. 506-515 - Ehab Ghabashneh, Sanjay G. Rao:

Exploring the interplay between CDN caching and video streaming performance. 516-525 - Michele Garetto, Emilio Leonardi, Giovanni Neglia:

Similarity Caching: Theory and Algorithms. 526-535 - Ying Wan

, Haoyu Song
, Yang Xu
, Yilun Wang, Tian Pan
, Chuwen Zhang, Bin Liu:
T-cache: Dependency-free Ternary Rule Cache for Policy-based Forwarding. 536-545 - Yuanyuan Li, Stratis Ioannidis

:
Universally Stable Cache Networks. 546-555 - Xun Wang

, Ke Sun
, Ting Zhao, Wei Wang, Qing Gu:
Dynamic Speed Warping: Similarity-Based One-shot Learning for Device-free Gesture Signals. 556-565 - Yanwen Wang

, Jiaxing Shen
, Yuanqing Zheng:
Push the Limit of Acoustic Gesture Recognition. 566-575 - Jinyang Huang

, Bin Liu, Pengfei Liu, Chao Chen, Ning Xiao, Yu Wu, Chi Zhang, Nenghai Yu:
Towards Anti-interference WiFi-based Activity Recognition System Using Interference-Independent Phase Component. 576-585 - Chenning Li

, Manni Liu, Zhichao Cao:
WiHF: Enable User Identified Gesture Recognition with WiFi. 586-595 - Tongxin Zhu

, Jianzhong Li, Zhipeng Cai
, Yingshu Li
, Hong Gao:
Computation Scheduling for Wireless Powered Mobile Edge Computing Networks. 596-605 - Dian Shen, Junzhou Luo, Fang Dong, Xiaolin Guo, Kai Wang, John C. S. Lui:

Distributed and Optimal RDMA Resource Scheduling in Shared Data Center Networks. 606-615 - Jinli Yan, Wei Quan, Xuyan Jiang, Zhigang Sun:

Injection Time Planning: Making CQF Practical in Time-Sensitive Networking. 616-625 - Yixin Bao, Yanghua Peng, Yangrui Chen, Chuan Wu

:
Preemptive All-reduce Scheduling for Expediting Distributed DNN Training. 626-635 - Yue Zhang

, Jian Weng
, Zhen Ling, Bryan Pearson, Xinwen Fu
:
BLESS: A BLE Application Security Scanning Framework. 636-645 - Amani Al-Shawabka

, Francesco Restuccia, Salvatore D'Oro
, Tong Jian, Bruno Costa Rendon, Nasim Soltani, Jennifer G. Dy, Stratis Ioannidis
, Kaushik R. Chowdhury
, Tommaso Melodia
:
Exposing the Fingerprint: Dissecting the Impact of the Wireless Channel on Radio Fingerprinting. 646-655 - Lixing Chen, Zhuo Lu, Pan Zhou, Jie Xu

:
Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks. 656-665 - Kang Ling, Yuntang Liu, Ke Sun

, Wei Wang, Lei Xie, Qing Gu:
SpiderMon: Towards Using Cell Towers as Illuminating Sources for Keystroke Monitoring. 666-675 - Salma Emara

, Baochun Li, Yanjiao Chen:
Eagle: Refining Congestion Control by Learning from the Experts. 676-685 - Fan Zhou, Chengtai Cao

, Goce Trajcevski, Kunpeng Zhang, Ting Zhong, Ji Geng:
Fast Network Alignment via Graph Meta-Learning. 686-695 - Lanqing Yang

, Yi-Chao Chen, Hao Pan, Dian Ding, Guangtao Xue, Linghe Kong
, Jiadi Yu, Minglu Li:
MagPrint: Deep Learning Based User Fingerprinting Using Electromagnetic Signals. 696-705 - Huan Wang, Kui Wu, Jianping Wang, Guoming Tang:

Rldish: Edge-Assisted QoE Optimization of HTTP Live Streaming with Reinforcement Learning. 706-715 - Shegufta Bakht Ahsan, Indranil Gupta:

A New Fully-Distributed Arbitration-Based Membership Protocol. 716-725 - Zai Shi, Atilla Eryilmaz:

A Zeroth-Order ADMM Algorithm for Stochastic Optimization over Distributed Processing Networks. 726-735 - Liangliang Xu, Min Lv, Zhipeng Li, Cheng Li, Yinlong Xu:

PDL: A Data Layout towards Fast Failure Recovery for Erasure-coded Distributed Storage Systems. 736-745 - Ajay Badita

, Parimal Parag
, Vaneet Aggarwal
:
Sequential addition of coded sub-tasks for straggler mitigation. 746-755 - Aliye Özge Kaya, Harish Viswanathan:

Dense Distributed Massive MIMO: Precoding and Power Control. 756-763 - Jongjin Jeong, Sung Hoon Lim, Yujae Song, Sang-Woon Jeon:

Online Learning for Joint Beam Tracking and Pattern Optimization in Massive MIMO Systems. 764-773 - Narayan Prasad, Xiao-Feng Qi, Arkady Molev-Shteiman:

Optimizing Resolution-Adaptive Massive MIMO Networks. 774-783 - Dong Ma

, Yuezhong Wu, Ming Ding, Mahbub Hassan, Wen Hu:
Skin-MIMO: Vibration-based MIMO Communication over Human Skin. 784-793 - Dario Bega, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Pérez

:
AZTEC: Anticipatory Capacity Allocation for Zero-Touch Network Slicing. 794-803 - Jorge Martín-Pérez

, Francesco Malandrino, Carla-Fabiana Chiasserini, Carlos Jesus Bernardos
:
OKpi: All-KPI Network Slicing Through Efficient Resource Allocation. 804-813 - Max Alaluna, Nuno Neves

, Fernando M. V. Ramos:
Elastic Network Virtualization. 814-823 - Marcel Blöcher

, Ramin Khalili, Lin Wang, Patrick Eugster:
Letting off STEAM: Distributed Runtime Traffic Scheduling for Service Function Chaining. 824-833 - Yakun Huang, Xiuquan Qiao, Jian Tang, Pei Ren

, Ling Liu, Calton Pu, Junliang Chen:
DeepAdapter: A Collaborative Deep Learning Framework for the Mobile Web Using Context-Aware Network Pruning. 834-843 - Francesco Restuccia, Tommaso Melodia

:
DeepWiERL: Bringing Deep Reinforcement Learning to the Internet of Self-Adaptive Things. 844-853 - Thaha Mohammed

, Carlee Joe-Wong, Rohit Babbar
, Mario Di Francesco:
Distributed Inference Acceleration with Adaptive DNN Partitioning and Offloading. 854-863 - Yongyong Wei, Rong Zheng:

Informative Path Planning for Mobile Sensing with Reinforcement Learning. 864-873 - Yinxin Wan, Kuai Xu

, Guoliang Xue, Feng Wang
:
IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes. 874-883 - Tianbo Gu, Zheng Fang, Allaukik Abhishek, Hao Fu, Pengfei Hu

, Prasant Mohapatra:
IoTGaze: IoT Security Enforcement via Wireless Context Analysis. 884-893 - Xiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li, Xiaohong Guan:

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting. 894-903 - JinYi Yoon

, HyungJune Lee
:
RUEGAN: Embracing a Self-Adversarial Agent for Building a Defensible Edge Security Architecture. 904-913 - Wanyu Lin

, Zhaolin Gao
, Baochun Li:
Guardian: Evaluating Trust in Online Social Networks with Graph Convolutional Networks. 914-923 - Shan Qu, Ziqi Zhao, Luoyi Fu, Xinbing Wang, Jun Xu:

Joint Inference on Truth/Rumor and Their Sources in Social Networks. 924-933 - Guocheng Liao, Xu Chen, Jianwei Huang:

Privacy Policy in Online Social Network with Targeted Advertising Business. 934-943 - Zhixuan Fang, Jianwei Huang:

When Reputation Meets Subsidy: How to Build High Quality On Demand Service Platforms. 944-953 - Minchen Yu, Yinghao Yu, Yunchuan Zheng, Baichen Yang

, Wei Wang:
RepBun: Load-Balanced, Shuffle-Free Cluster Caching for Structured Data. 954-963 - Ruiyun Yu, Dezhi Ye, Jie Li:

RePiDeM: A Refined POI Demand Modeling based on Multi-Source Data*. 964-973 - Qingjun Xiao, Zhiying Tang, Shigang Chen:

Universal Online Sketch for Tracking Heavy Hitters and Estimating Moments of Data Streams. 974-983 - Yichen Ruan, Carlee Joe-Wong:

On the Economic Value of Mobile Caching. 984-993 - Carlos M. Pérez-Penichet, Dilushi Piumwardane, Christian Rohner, Thiemo Voigt:

A Fast Carrier Scheduling Algorithm for Battery-free Sensor Tags in Commodity Wireless Networks. 994-1003 - Zhenlin An

, Qiongzheng Lin, Lei Yang, Lei Xie:
Activating Wireless Voice for E-Toll Collection Systems with Zero Start-up Cost. 1004-1013 - Weiwei Chen, Zhimeng Yin, Tian He:

Global Cooperation for Heterogeneous Networks. 1014-1023 - Xiaoyuan Ma

, Peilin Zhang, Ye Liu
, Carlo Alberto Boano, Hyung-Sin Kim, Jianming Wei, Jun Huang
:
Harmony: Saving Concurrent Transmissions from Harsh RF Interference. 1024-1033 - Hsueh-Hong Kang, Chi-Hsiang Hung, Charles H.-P. Wen

:
SAFCast: Smart Inter-Datacenter Multicast Transfer with Deadline Guarantee by Store-And-Forwarding. 1034-1042 - Michael Dinitz

, Benjamin Moseley:
Scheduling for Weighted Flow and Completion Times in Reconfigurable Networks. 1043-1052 - Zhenhua Han, Haisheng Tan, Shaofeng H.-C. Jiang

, Xiaoming Fu
, Wanli Cao, Francis C. M. Lau:
Scheduling Placement-Sensitive BSP Jobs with Inaccurate Execution Time Estimation. 1053-1062 - Markus Fidler, Brenton D. Walker, Stefan Bora:

Tiny Tasks - A Remedy for Synchronization Constraints in Multi-Server Systems. 1063-1072 - Trinh Viet Doan

, Vaibhav Bajpai
, Sam Crawford:
A Longitudinal View of Netflix: Content Delivery over IPv6 and Content Cache Deployments. 1073-1082 - Hongbo Liu, Zhihua Li, Yucheng Xie, Ruizhe Jiang, Yan Wang

, Xiaonan Guo, Yingying Chen:
LiveScreen: Video Chat Liveness Detection Leveraging Skin Reflection. 1083-1092 - Ziyi Wang

, Yong Cui, Xiaoyu Hu, Xin Wang, Wei Tsang Ooi, Yi Li:
MultiLive: Adaptive Bitrate Control for Low-delay Multi-party Interactive Live Streaming. 1093-1102 - Yushuo Guan, Yuanxing Zhang, Bingxuan Wang, Kaigui Bian, Xiaoliang Xiong, Lingyang Song:

PERM: Neural Adaptive Video Streaming with Multi-path Transmission. 1103-1112 - Wenbin Liu, Yongjian Yang, En Wang, Jie Wu:

Dynamic User Recruitment with Truthful Pricing for Mobile CrowdSensing. 1113-1122 - Chi Harold Liu

, Zipeng Dai, Haoming Yang, Jian Tang:
Multi-Task-Oriented Vehicular Crowdsensing: A Deep Learning Approach. 1123-1132 - Peng Sun, Zhibo Wang, Yunhe Feng, Liantao Wu

, Yanjun Li, Hairong Qi, Zhi Wang:
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Crowdsourced Binary-Choice Question Answering. 1133-1142 - Cong Zhang, Jiangchuan Liu, Zhi Wang, Lifeng Sun:

Look Ahead at the First-mile in Livecast with Crowdsourced Highlight Prediction. 1143-1152 - Nouman Khan

, Mehrdad Moharrami
, Vijay G. Subramanian
:
Stable and Efficient Piece-Selection in Multiple Swarm BitTorrent-like Peer-to-Peer Networks. 1153-1162 - Zhiyao Hu, Dongsheng Li, Dongxiang Zhang, Yixin Chen:

ReLoca: Optimize Resource Allocation for Data-parallel Jobs using Deep Learning. 1163-1171 - Patrick Brown, Salah-Eddine Elayoubi

:
Semi-distributed Contention-based Resource Allocation for Ultra Reliable Low Latency Communications. 1172-1180 - Feng Lyu

, Ju Ren, Peng Yang, Nan Cheng, Yaoxue Zhang, Xuemin Sherman Shen
:
SoSA: Socializing Static APs for Edge Resource Pooling in Large-Scale WiFi System. 1181-1190 - Zhengguang Zhang

, Hanif Rahbari
, Marwan Krunz:
Expanding the Role of Preambles to Support User-defined Functionality in MIMO-based WLANs. 1191-1200 - Wei Xiong, Lin Zhang, Maxwell McNeil, Petko Bogdanov, Mariya Zheleva:

Exploiting Self-Similarity for Under-Determined MIMO Modulation Recognition. 1201-1210 - Juncheng Wang

, Min Dong
, Ben Liang
, Gary Boudreau:
Online Precoding Design for Downlink MIMO Wireless Network Virtualization with Imperfect CSI. 1211-1220 - Tao Huang, Baoliu Ye, Zhihao Qu, Bin Tang, Lei Xie, Sanglu Lu:

Physical-Layer Arithmetic for Federated Learning in Uplink MU-MIMO Enabled Wireless Networks. 1221-1230 - Tong Yun, Bin Liu:

A Deep Analysis on General Approximate Counters. 1231-1240 - Bohan Zhao, Rui Li, Jin Zhao, Tilman Wolf:

Efficient and Consistent TCAM Updates. 1241-1250 - Ran Ben Basat, Gil Einziger, Michael Mitzenmacher, Shay Vargaftik:

Faster and More Accurate Measurement through Additive-Error Counters. 1251-1260 - Gyeongsik Yang

, Heesang Jin, Minkoo Kang, Gi Jun Moon, Chuck Yoo:
Network Monitoring for SDN Virtual Networks. 1261-1270 - Shasha Li, Mustafa Y. Arslan, Amir Khojastepour, Srikanth V. Krishnamurthy

, Sampath Rangarajan:
DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail Spaces. 1271-1280 - Chunhui Duan, Wenlei Shi, Fan Dang

, Xuan Ding:
Enabling RFID-Based Tracking for Multi-Objects with Visual Aids: A Calibration-Free Solution. 1281-1290 - Maolin Zhang, Jia Zhao, Si Chen, Wei Gong:

Reliable Backscatter with Commodity BLE. 1291-1299 - Guochao Song, Hang Yang, Wei Wang, Tao Jiang:

Reliable Wide-Area Backscatter via Channel Polarization. 1300-1308 - Yongquan Fu

, Dongsheng Li, Siqi Shen, Yiming Zhang, Kai Chen:
Clustering-preserving Network Flow Sketching. 1309-1318 - Wenxin Li, Xu Yuan, Wenyu Qu, Heng Qi, Xiaobo Zhou, Sheng Chen, Renhai Xu:

Efficient Coflow Transmission for Distributed Stream Processing. 1319-1328 - Víctor Valls, George Iosifidis

, Geeth de Mel, Leandros Tassiulas
:
Online Network Flow Optimization for Multi-Grade Service Chains. 1329-1338 - Rhongho Jang

, DaeHong Min, Seongkwang Moon, David Mohaisen
, DaeHun Nyang:
SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event. 1339-1348 - I-Hong Hou, Narges Zarnaghi Naghsh, Sibendu Paul

, Y. Charlie Hu, Atilla Eryilmaz:
Predictive Scheduling for Virtual Reality. 1349-1358 - Tengpeng Li, Son Nam Nguyen, Xiaoqian Zhang, Teng Wang, Bo Sheng

:
PROMAR: Practical Reference Object-based Multi-user Augmented Reality. 1359-1368 - Shuang Jiang, Zhiyao Ma, Xiao Zeng, Chenren Xu, Mi Zhang, Chen Zhang

, Yunxin Liu:
SCYLLA: QoE-aware Continuous Mobile Vision with FPGA-based Dynamic Deep Neural Network Reconfiguration. 1369-1378 - Haoxin Wang, Jiang (Linda) Xie:

User Preference Based Energy-Aware Mobile AR System with Edge Computing. 1379-1388 - Wenzheng Xu, Zichuan Xu, Jian Peng, Weifa Liang

, Tang Liu, Xiaohua Jia, Sajal K. Das:
Approximation Algorithms for the Team Orienteering Problem. 1389-1398 - Pengzhan Zhou, Cong Wang, Yuanyuan Yang:

Design and Optimization of Electric Autonomous Vehicles with Renewable Energy Source for Smart Cities. 1399-1408 - Ceyhun D. Ozkaptan, Eylem Ekici

, Onur Altintas:
Enabling Communication via Automotive Radars: An Adaptive Joint Waveform Design Approach. 1409-1418 - Zhiyuan Jiang, Zixu Cao, Siyu Fu

, Fei Peng, Shan Cao, Shunqing Zhang, Shugong Xu
:
Revealing Much While Saying Less: Predictive Wireless for Status Update. 1419-1428 - Lorenzo Bertizzolo, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia

:
CoBeam: Beamforming-based Spectrum Sharing With Zero Cross-Technology Signaling for 5G Wireless Networks. 1429-1438 - Xuewen Dong, Qiao Kang, Qingsong Yao, Di Lu, Yang Xu, Jia Liu:

Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access. 1439-1448 - Muhammad Anjum Qureshi

, Cem Tekin:
Online Bayesian Learning for Rate Selection in Millimeter Wave Cognitive Radio Networks. 1449-1458 - Rui Zou, Wenye Wang:

U-CIMAN: Uncover Spectrum and User Information in LTE Mobile Access Networks. 1459-1468 - Irmak Aykin, Berk Akgun, Mingjie Feng, Marwan Krunz:

MAMBA: A Multi-armed Bandit Framework for Beam Tracking in Millimeter-wave Systems. 1469-1478 - Francesco Devoti, Vincenzo Sciancalepore, Ilario Filippini, Xavier Costa-Pérez

:
PASID: Exploiting Indoor mmWave Deployments for Passive Intrusion Detection. 1479-1488 - Yongce Chen, Yan Huang, Chengzhang Li, Y. Thomas Hou

, Wenjing Lou:
Turbo-HB: A Novel Design and Implementation to Achieve Ultra-Fast Hybrid Beamforming. 1489-1498 - Keerthi Priya Dasala, Josep Miquel Jornet

, Edward W. Knightly:
SIMBA: Single RF Chain Multi-User Beamforming in 60 GHz WLANs. 1499-1508 - Xin He, Jiaqi Zheng, Haipeng Dai

, Chong Zhang
, Wajid Rafique
, Geng Li, Wanchun Dou, Qiang Ni
:
Coeus: Consistent and Continuous Network Update in Software-Defined Networks. 1509-1518 - Mingli Yu, Ting He, Patrick Drew McDaniel, Quinn K. Burke:

Flow Table Security in SDN: Adversarial Reconnaissance and Intelligent Attacks. 1519-1528 - Qiao Xiang, Jingxuan Zhang, Kai Gao, Yeon-Sup Lim, Franck Le, Geng Li, Yang Richard Yang:

Toward Optimal Software-Defined Interdomain Routing. 1529-1538 - Danyang Zheng, Chengzong Peng, Xueting Liao, Ling Tian, Guangchun Luo, Xiaojun Cao

:
Towards Latency Optimization in Hybrid Service Function Chain Composition and Embedding. 1539-1548 - Stella Banou

, Kai Li, Kaushik R. Chowdhury
:
MAGIC: Magnetic Resonant Coupling for Intra-body Communication. 1549-1558 - Feilong Tang:

Dynamically Adaptive Cooperation Transmission among Satellite-Ground Integrated Networks. 1559-1568 - Yue Li

, Yingjian Liu, Yu Wang, Zhongwen Guo, Haoyu Yin, Hao Teng:
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking. 1569-1578 - Zhao Zhao

, Chunfeng Liu, Wenyu Qu, Tao Yu:
An Energy Efficiency Multi-Level Transmission Strategy based on underwater multimodal communication in UWSNs. 1579-1587 - Huikang Li, Yi Gao, Wei Dong, Chun Chen:

Bound-based Network Tomography for Inferring Interesting Link Metrics. 1588-1597 - Tao Hou, Zhe Qu, Tao Wang, Zhuo Lu, Yao Liu:

ProTO: Proactive Topology Obfuscation Against Adversarial Network Topology Inference. 1598-1607 - Lu Tang, Qun Huang, Patrick P. C. Lee:

SpreadSketch: Toward Invertible and Network-Wide Detection of Superspreaders. 1608-1617 - Fan Zhou, Xovee Xu

, Kunpeng Zhang, Goce Trajcevski, Ting Zhong:
Variational Information Diffusion for Probabilistic Cascades Prediction. 1618-1627 - Yidan Hu

, Rui Zhang, Yanchao Zhang:
KV-Fresh: Freshness Authentication for Outsourced Multi-Version Key-Value Stores. 1638-1647 - Yang Xiao

, Ning Zhang, Wenjing Lou, Y. Thomas Hou
:
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain. 1648-1657 - Wencong You, Lei Jiao

, Jun Li, Ruiting Zhou:
Scheduling DDoS Cloud Scrubbing in ISP Networks via Randomized Online Auctions. 1658-1667 - Yang Li, Zhenhua Han, Quanlu Zhang, Zhenhua Li, Haisheng Tan:

Automating Cloud Deployment for Deep Learning Inference of Real-time Online Services. 1668-1677 - Shuai Wang, Dan Li, Jinkun Geng:

Geryon: Accelerating Distributed CNN Training by Network-Level Flow Scheduling. 1678-1687 - Kun Xie, Huali Lu, Xin Wang, Gaogang Xie, Yong Ding

, Dongliang Xie, Jigang Wen, Dafang Zhang:
Neural Tensor Completion for Accurate Network Monitoring. 1688-1697 - Hao Wang, Zakhary Kaplan, Di Niu, Baochun Li:

Optimizing Federated Learning on Non-IID Data with Reinforcement Learning. 1698-1707 - Ke Cheng, Liangmin Wang

, Yulong Shen, Yangyang Liu, Yongzhi Wang
, Lele Zheng:
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees. 1708-1717 - Yaodong Huang, Yiming Zeng, Fan Ye, Yuanyuan Yang:

Fair and Protected Profit Sharing for Data Trading in Pervasive Edge Computing Environments. 1718-1727 - Peng Li, Toshiaki Miyazaki, Wanlei Zhou

:
Secure Balance Planning of Off-blockchain Payment Channel Networks. 1728-1737 - Zhiyuan Wang

, Lin Gao, Jianwei Huang:
Travel with Your Mobile Data Plan: A Location-Flexible Data Service. 1738-1747 - Tatsuaki Kimura, Masaki Ogura:

Distributed Collaborative 3D-Deployment of UAV Base Stations for On-Demand Coverage. 1748-1757 - Feng Shan, Junzhou Luo, Runqun Xiong, Wenjia Wu, Jiashuo Li:

Looking before Crossing: An Optimal Algorithm to Minimize UAV Energy by Speed Scheduling with a Practical Flight Energy Model. 1758-1767 - Lorenzo Bertizzolo, Salvatore D'Oro

, Ludovico Ferranti, Leonardo Bonati
, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia
, Scott Pudlewski
:
SwarmControl: An Automated Distributed Control Framework for Self-Optimizing Drone Networks. 1768-1777 - Pei-Yuan Hong, Chi-Yu Li

, Hong-Rong Chang, YuanHao Hsueh, Kuochen Wang:
WBF-PS: WiGig Beam Fingerprinting for UAV Positioning System in GPS-denied Environments. 1778-1787 - Seungsoo Lee, Seungwon Woo, Jinwoo Kim

, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin:
AudiSDN: Automated Detection of Network Policy Inconsistencies in Software-Defined Networks. 1788-1797 - Youngjoo Shin

, Dongyoung Koo, Junbeom Hur:
Inferring Firewall Rules by Cache Side-channel Analysis in Network Function Virtualization. 1798-1807 - Chih-Hang Wang

, Sheng-Hao Chiang, Shan-Hsiang Shen, De-Nian Yang
, Wen-Tsuen Chen:
Multicast Traffic Engineering with Segment Trees in Software-Defined Networks. 1808-1817 - Dinuni K. Fernando, Ping Yang, Hui Lu:

SDN-based Order-aware Live Migration of Virtual Machines. 1818-1827 - Jingao Xu, Hao Cao

, Danyang Li, Kehong Huang, Chen Qian, Longfei Shangguan, Zheng Yang:
Edge Assisted Mobile Semantic Visual SLAM. 1828-1837 - Dolores García, Jesus Omar Lacruz

, Pablo Jiménez Mateo, Joerg Widmer:
POLAR: Passive object localization with IEEE 802.11ad using phased antenna arrays. 1838-1847 - Linsong Cheng, Zhao Wang, Yunting Zhang, Weiyi Wang, Weimin Xu, Jiliang Wang:

AcouRadar: Towards Single Source based Acoustic Localization. 1848-1856 - Kevin Jiokeng

, Gentian Jakllari
, Alain Tchana, André-Luc Beylot:
When FTM Discovered MUSIC: Accurate WiFi-based Ranging in the Presence of Multipath. 1857-1866 - Zhiying Xu, Shuyu Shi, Alex X. Liu, Jun Zhao

, Lin Chen:
An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning. 1867-1876 - Xiaoli Zhang, Fengting Li, Zeyu Zhang, Qi Li, Cong Wang, Jianping Wu:

Enabling Execution Assurance of Federated Learning at Untrusted Participants. 1877-1886 - Chengjun Cai

, Lei Xu
, Anxin Zhou
, Ruochen Wang, Cong Wang, Qian Wang
:
EncELC: Hardening and Enriching Ethereum Light Clients with Trusted Enclaves. 1887-1896 - Dimitris Chatzopoulos

, Sujit Gujar, Boi Faltings, Pan Hui:
Mneme: A Mobile Distributed Ledger. 1897-1906 - Zhiyuan Lv, Youjian Zhao, Chao Zhang, Haibin Li

:
DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural Networks. 1907-1916 - Yetong Cao, Qian Zhang, Fan Li, Song Yang, Yu Wang:

PPGPass: Nonintrusive and Secure Mobile Two-Factor Authentication via Wearables. 1917-1926 - Yanjun Pan

, Yao Zheng
, Ming Li:
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. 1927-1936 - Joseph P. Verburg, H. J. C. Kroep, Vineet Gokhale, R. Venkatesha Prasad

, Vijay S. Rao:
Setting the Yardstick: A Quantitative Metric for Effectively Measuring Tactile Internet. 1937-1946 - Tianxiang Tan, Guohong Cao:

FastVA: Deep Learning Video Analytics Through Edge Processing and NPU in Mobile. 1947-1956 - Yinjie Zhang, Yuanxing Zhang, Yi Wu, Yu Tao

, Kaigui Bian, Pan Zhou, Lingyang Song, Hu Tuo:
Improving Quality of Experience by Adaptive Video Streaming with Super-Resolution. 1957-1966 - Tianchi Huang, Chao Zhou, Rui-Xiao Zhang, Chenglei Wu, Xin Yao, Lifeng Sun:

Stick: A Harmonious Fusion of Buffer-based and Learning-based Approach for Adaptive Streaming. 1967-1976 - Mallesham Dasari, Arani Bhattacharya

, Santiago Vargas
, Pranjal Sahu, Aruna Balasubramanian, Samir R. Das:
Streaming 360-Degree Videos Using Super-Resolution. 1977-1986 - Rafael Almeida, Ítalo Cunha, Renata Teixeira, Darryl Veitch, Christophe Diot:

Classification of Load Balancing in the Internet. 1987-1996 - Gongming Zhao, Hongli Xu, Yangming Zhao, Chunming Qiao, Liusheng Huang:

Offloading Dependent Tasks in Mobile Edge Computing with Service Caching. 1997-2006 - Wei Bai, Shuihai Hu, Kai Chen, Kun Tan, Yongqiang Xiong:

One More Config is Enough: Saving (DC)TCP for High-speed Extremely Shallow-buffered Datacenters. 2007-2016 - Xiaodong Dong, Wenxin Li, Xiaobo Zhou, Keqiu Li, Heng Qi:

TINA: A Fair Inter-datacenter Transmission Mechanism with Deadline Guarantee. 2017-2025 - Tang Liu, Baijun Wu, Shihao Zhang, Jian Peng, Wenzheng Xu:

An Effective Multi-node Charging Scheme for Wireless Rechargeable Sensor Networks. 2026-2035 - Ali Hosseini-Fahraji, Pedram Loghmannia, Kexiong Curtis Zeng, Xiaofan Li, Sihan Yu, Sihao Sun, Dong Wang, Yaling Yang, Majid Manteghi

, Lei Zuo:
Energy Harvesting Long-Range Marine Communication. 2036-2045 - Chi Lin, Feng Gao, Haipeng Dai

, Jiankang Ren, Lei Wang, Guowei Wu:
Maximizing Charging Utility with Obstacles through Fresnel Diffraction Model. 2046-2055 - Haipeng Dai

, Chaofeng Wu, Xiaoyu Wang, Wanchun Dou, Yunhuai Liu:
Placing Wireless Chargers with Limited Mobility. 2056-2065 - Zichuan Xu, Lizhen Zhou, Sid Chi-Kin Chau

, Weifa Liang
, Qiufen Xia, Pan Zhou:
Collaborate or Separate? Distributed Service Caching in Mobile Edge Clouds. 2066-2075 - Xiao Ma, Ao Zhou, Shan Zhang, Shangguang Wang

:
Cooperative Service Caching and Workload Scheduling in Mobile Edge Computing. 2076-2085 - Junghoon Kim, Taejoon Kim, Morteza Hashemi

, Christopher G. Brinton
, David J. Love:
Joint Optimization of Signal Design and Resource Allocation in Wireless D2D Edge Computing. 2086-2095 - Xiaojun Shang, Yaodong Huang, Zhenhua Liu, Yuanyuan Yang:

Reducing the Service Function Chain Backup Cost over the Edge and Cloud by a Self-adapting Scheme. 2096-2105 - Tie Qiu, Zilong Lu, Keqiu Li, Guoliang Xue, Dapeng Oliver Wu

:
An Adaptive Robustness Evolution Algorithm with Self-Competition for Scale-Free Internet of Things. 2106-2115 - François Baccelli, Sanket S. Kalamkar:

Bandwidth Allocation and Service Differentiation in D2D Wireless Networks. 2116-2125 - Yihan Zou, Kwang Taik Kim, Xiaojun Lin, Mung Chiang, Zhi Ding, Risto Wichman

, Jyri Hämäläinen:
Low-Overhead Joint Beam-Selection and Random-Access Schemes for Massive Internet-of-Things with Non-Uniform Channel and Load. 2126-2135 - Jie Liu, Mamta Agiwal, Miao Qu, Hu Jin:

Online Control of Preamble Groups with Priority in Cellular IoT Networks. 2136-2144 - Rasmus Vestergaard, Daniel E. Lucani

, Qi Zhang
:
A Randomly Accessible Lossless Compression Scheme for Time-Series Data. 2145-2154 - Si Wu

, Zhirong Shen, Patrick P. C. Lee:
On the Optimal Repair-Scaling Trade-off in Locally Repairable Codes. 2155-2164 - Huiba Li, Yiming Zhang, Haonan Wang, Ping Zhong

:
URSAL: Ultra-Efficient, Reliable, Scalable, and Available Block Storage at Low Cost. 2165-2174 - Chen Avin, Iosif Salem

, Stefan Schmid
:
Working Set Theorems for Routing in Self-Adjusting Skip List Networks. 2175-2184 - Yong Huang, Wei Wang, Yiyuan Wang, Tao Jiang, Qian Zhang

:
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation. 2185-2193 - Jiawei Li, Chuyu Wang, Ang Li, Dianqi Han, Yan Zhang, Jinhang Zuo, Rui Zhang, Lei Xie, Yanchao Zhang:

RF-Rhythm: Secure and Usable Two-Factor RFID Authentication. 2194-2203 - Xiao Wang, Hongzi Zhu, Shan Chang, Xudong Wang:

SeVI: Boosting Secure Voice Interactions with Smart Devices. 2204-2212 - Siyuan Cao, Habiba Farrukh, He Wang:

Towards Context Address for Camera-to-Human Communication. 2213-2222 - Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu:

Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering. 2223-2232 - Abhirup Ghosh

, Jiaxin Ding, Rik Sarkar, Jie Gao:
Differentially Private Range Counting in Planar Graphs for Spatial Sensing. 2233-2242 - Stephan Kleber

, Rens W. van der Heijden, Frank Kargl:
Message Type Identification of Binary Network Protocols using Continuous Segment Similarity. 2243-2252 - Xiangyu Wang

, Jianfeng Ma, Ximeng Liu, Robert H. Deng
, Yinbin Miao, Dan Zhu, Zhuoran Ma:
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data. 2253-2262 - Qingyu Liu, Haibo Zeng, Minghua Chen

, Lingjia Liu:
Cost Minimization in Multi-Path Communication under Throughput and Maximum Delay Constraints. 2263-2272 - Klaus Schneider, Beichuan Zhang, Lotfi Benmohamed:

Hop-by-Hop Multipath Routing: Choosing the Right Nexthop Set. 2273-2282 - Hao Zhou, Wenxiong Hua, Jialin Deng, Xiang Cui, Xiang-Yang Li, Panlong Yang:

Joint Power Routing and Current Scheduling in Multi-Relay Magnetic MIMO WPT System. 2283-2292 - Xiaozhe Shao, Lixin Gao:

Verifying Policy-based Routing at Internet Scale. 2293-2302 - Shuai Tong, Zhenqiang Xu, Jiliang Wang:

CoLoRa: Enabling Multi-Packet Reception in LoRa. 2303-2311 - Yinghui Li, Jing Yang, Jiliang Wang:

DyLoRa: Towards Energy Efficient Dynamic LoRa Transmission Control. 2312-2320 - Xianjin Xia

, Yuanqing Zheng, Tao Gu
:
LiteNap: Downclocking LoRa Reception. 2321-2330 - Zhe Wang, Linghe Kong

, Kangjie Xu, Liang He, Kaishun Wu
, Guihai Chen
:
Online Concurrent Transmissions at LoRa Gateway. 2331-2340 - Gongming Zhao, Hongli Xu, Jingyuan Fan, Liusheng Huang, Chunming Qiao:

HiFi: Hybrid Rule Placement for Fine-Grained Flow Management in SDNs. 2341-2350 - Diman Zad Tootaghaj, Faraz Ahmed, Puneet Sharma, Mihalis Yannakakis:

Homa: An Efficient Topology and Route Management Approach in SD-WAN Overlays. 2351-2360 - Jianchun Liu, Hongli Xu, Gongming Zhao, Chen Qian, Xingpeng Fan, Liusheng Huang:

Incremental Server Deployment for Scalable NFV-enabled Networks. 2361-2370 - Qiaofeng Qin, Nakjung Choi

, Muntasir Raihan Rahman, Marina Thottan, Leandros Tassiulas:
Network Slicing in Heterogeneous Software-defined RANs. 2371-2380 - Shukai Fan, Yongzhi Wu, Chong Han, Xudong Wang:

A Structured Bidirectional LSTM Deep Learning Method For 3D Terahertz Indoor Localization. 2381-2390 - Paramasiven Appavoo, Mun Choon Chan, Anand Bhojan:

MagB: Repurposing the Magnetometer for Fine-Grained Localization of IoT Devices. 2391-2399 - Chenshu Wu, Feng Zhang, Beibei Wang, K. J. Ray Liu

:
mmTrack: Passive Multi-Person Localization Using Commodity Millimeter Wave Radio. 2400-2409 - Arani Bhattacharya

, Caitao Zhan
, Himanshu Gupta, Samir R. Das, Petar M. Djuric:
Selection of Sensors for Efficient Transmitter Localization. 2410-2419 - Nengwen Zhao, Panshi Jin, Lixin Wang, Xiaoqin Yang, Rong Liu, Wenchi Zhang, Kaixin Sui, Dan Pei

:
Automatically and Adaptively Identifying Severe Alerts for Online Service Systems. 2420-2429 - Yuriy Zacchia Lun

, Claudia Rinaldi
, Amal Alrish, Alessandro D'Innocenzo
, Fortunato Santucci:
On the impact of accurate radio link modeling on the performance of WirelessHART control networks. 2430-2439 - Yu-e Sun, He Huang, Chaoyi Ma, Shigang Chen, Yang Du, Qingjun Xiao:

Online Spread Estimation with Non-duplicate Sampling. 2440-2448 - Yali Yuan, Sripriya Srikant Adhatarao, Mingkai Lin

, Yachao Yuan, Zheli Liu, Xiaoming Fu
:
ADA: Adaptive Deep Log Anomaly Detector. 2449-2458 - Ahmed Abusnaina, Rhongho Jang

, Aminollah Khormali, DaeHun Nyang, David Mohaisen:
DFD: Adversarial Learning-based Approach to Defend Against Website Fingerprinting. 2459-2468 - Yun Lin, Haojun Zhao, Ya Tu, Shiwen Mao, Zheng Dou:

Threats of Adversarial Attacks in DNN-Based Modulation Recognition. 2469-2478 - Ruming Tang, Zheng Yang, Zeyan Li

, Weibin Meng, Haixin Wang
, Qi Li, Yongqian Sun, Dan Pei
, Tao Wei, Yanfei Xu, Yan Liu:
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks. 2479-2488 - Yufeng Zhan, Jiang Zhang:

An Incentive Mechanism Design for Efficient Edge Learning by Deep Reinforcement Learning Approach. 2489-2498 - Fangxin Wang, Feng Wang, Jiangchuan Liu, Ryan Shea, Lifeng Sun:

Intelligent Video Caching at Network Edge: A Multi-Agent Deep Reinforcement Learning Approach. 2499-2508 - Yuwei Tu, Yichen Ruan, Satyavrat Wagle, Christopher G. Brinton

, Carlee Joe-Wong:
Network-Aware Optimization of Distributed Learning for Fog Computing. 2509-2518 - Shibo Wang, Shusen Yang, Cong Zhao:

SurveilEdge: Real-time Video Query based on Collaborative Cloud-Edge Deep Learning. 2519-2528 - Thad Benjaponpitak, Meatasit Karakate, Kunwadee Sripanidkulchai:

Enabling Live Migration of Containerized Applications Across Clouds. 2529-2538 - David Naori, Danny Raz:

Online Placement of Virtual Machines with Prior Data. 2539-2548 - Hugo Flores, Vincent Tran, Bin Tang:

PAM & PAL: Policy-Aware Virtual Machine Migration and Placement in Dynamic Cloud Data Centers. 2549-2558 - Long Luo, Klaus-Tycho Foerster, Stefan Schmid

, Hongfang Yu:
SplitCast: Optimizing Multicast Flows in Reconfigurable Datacenter Networks. 2559-2568 - Shuwei Qiu, Xiaowen Chu

, Yiu-Wing Leung, Joseph Kee-Yin Ng:
Joint Access Point Placement and Power-Channel-Resource-Unit Assignment for 802.11ax-Based Dense WiFi with QoS Requirements. 2569-2578 - Ning Wang, Long Jiao, Pu Wang, Weiwei Li, Kai Zeng

:
Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks. 2579-2588 - Xin Yang, Jian Liu, Yingying Chen, Xiaonan Guo, Yucheng Xie:

MU-ID: Multi-user Identification Through Gaits Using Millimeter Wave Radios. 2589-2598 - Raja Karmakar, Samiran Chattopadhyay

, Sandip Chakraborty:
SmartBond: A Deep Probabilistic Machinery for Smart Channel Bonding in IEEE 802.11ac. 2599-2608 - Junjie Xie, Deke Guo, Xiaofeng Shi, Haofan Cai, Chen Qian, Honghui Chen:

A Fast Hybrid Data Sharing Framework for Hierarchical Mobile Edge Computing. 2609-2618 - Zhaofeng Zhang, Sen Lin

, Mehmet Dedeoglu, Kemi Ding, Junshan Zhang:
Data-driven Distributionally Robust Optimization for Edge Intelligence. 2619-2628 - Xiaowen Gong:

Delay-Optimal Distributed Edge Computing in Wireless Edge Networks. 2629-2638 - Ahmed H. Helmy, Amiya Nayak

:
Fog Integration with Optical Access Networks from an Energy Efficiency Perspective. 2639-2647

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














