


default search action
27th IWQoS 2019: Phoenix, AZ, USA
- Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019. ACM 2019, ISBN 978-1-4503-6778-3

- Zehua Guo

, Wendi Feng
, Sen Liu, Wenchao Jiang, Yang Xu
, Zhi-Li Zhang:
RetroFlow: maintaining control resiliency and flow programmability for software-defined WANs. 1:1-1:10 - Xiong Wang, Linghe Kong

, Jintao Wu, Xiaofeng Gao, Hang Wang, Guihai Chen
:
mmHandover: a pre-connection based handover protocol for 5G millimeter wave vehicular networks. 2:1-2:10 - Chunyu Qiao, Gen Li, Jiliang Wang, Yunhao Liu:

NEIVA: environment identification based video bitrate adaption in cellular networks. 3:1-3:10 - Shiwei Zhang, Weichao Li, Daoyuan Wu

, Bo Jin
, Rocky K. C. Chang, Debin Gao
, Yi Wang, Ricky K. P. Mok:
An empirical study of mobile network behavior and application performance in the wild. 4:1-4:10 - Yu Zhou, Jun Bi, Yunsenxiao Lin, Yangyang Wang, Dai Zhang, Zhaowei Xi, Jiamin Cao, Chen Sun:

P4Tester: efficient runtime rule fault detection for programmable data planes. 5:1-5:10 - Tian Pan

, Xingchen Lin, Jiao Zhang, Hao Li
, Jianhui Lv, Tao Huang
, Bin Liu, Beichuan Zhang:
NB-cache: non-blocking in-network caching for high-speed content routers. 6:1-6:10 - Jiahui Hou, Jianwei Qian, Yu Wang, Xiang-Yang Li, Haohua Du, Linlin Chen:

ML defense: against prediction API threats in cloud-based machine learning service. 7:1-7:10 - Juan Li, Jie Wu, Yanmin Zhu:

Selecting optimal mobile users for long-term environmental monitoring by crowdsourcing. 8:1-8:10 - Yu Qiao, Jun Wu, Lei Zhang, Chongjun Wang:

Mechanism design for cross-market task crowdsourcing. 9:1-9:10 - Jiaqi Zheng, Qiufang Ma, Chen Tian, Haipeng Dai

, Wei Zhang, Guihai Chen
, Gong Zhang:
Orchestrating service chain deployment with plutus in next generation cellular core. 10:1-10:10 - Zichen Xu, Christopher Stewart

, Jiacheng Huang
:
Elastic, geo-distributed RAFT. 11:1-11:9 - Gengbiao Shen, Qing Li, Yong Jiang, Richard O. Sinnott, Dong Lin, Zehua Guo

, Yi Wang:
Chunk-level request-grant-transfer mode for QoE-sensitive video delivery in CDN. 12:1-12:10 - Ya Su, Youjian Zhao, Wentao Xia, Rong Liu, Jiahao Bu, Jing Zhu, Yuanpu Cao, Haibin Li

, Chenhao Niu, Yiyin Zhang, Zhaogang Wang, Dan Pei
:
CoFlux: robustly correlating KPIs by fluctuations for service troubleshooting. 13:1-13:10 - Jing'an Xue, Weizhen Dang, Haibo Wang, Jilong Wang, Hui Wang:

Evaluating performance and inefficient routing of an anycast CDN. 14:1-14:10 - Heyi Tang, Yong Cui, Jianping Wu, Xiaowei Yang, Zhenjie Yang:

Trigger relationship aware mobile traffic classification. 15:1-15:10 - Wanxin Shi

, Qing Li, Chao Wang, Gengbiao Shen, Weichao Li, Yu Wu, Yong Jiang:
LEAP: learning-based smart edge with caching and prefetching for adaptive video streaming. 16:1-16:10 - Jiajie Shen, Yi Li, Yangfan Zhou, Xin Wang:

Understanding I/O performance of IPFS storage: a client's perspective. 17:1-17:10 - Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, Yiting Liu:

Encrypted traffic classification of decentralized applications on ethereum using feature fusion. 18:1-18:10 - Fangxin Wang, Jiangchuan Liu, Wei Gong:

WiCAR: wifi-based in-car activity recognition with multi-adversarial domain adaptation. 19:1-19:10 - Liuyan Liu, Haisheng Tan, Shaofeng H.-C. Jiang

, Zhenhua Han, Xiang-Yang Li, Hong Huang:
Dependent task placement and scheduling with function configuration in edge computing. 20:1-20:10 - Yikai Xiao, Qixia Zhang

, Fangming Liu, Jia Wang
, Miao Zhao, Zhongxing Zhang, Jiaxing Zhang
:
NFVdeep: adaptive online service function chain deployment with deep reinforcement learning. 21:1-21:10 - Lu Zhang, Chao Li, Pengyu Wang

, Yunxin Liu, Yang Hu, Quan Chen, Minyi Guo:
Characterizing and orchestrating NFV-ready servers for efficient edge data processing. 22:1-22:10 - Yi Zhao, Hui Su, Liang Zhang, Dan Wang

, Ke Xu:
Variety matters: a new model for the wireless data market under sponsored data plans. 23:1-23:10 - Mahdi Dolati

, Majid Ghaderi, Ahmad Khonsari:
Proactive inter-datacenter multicast with realtime and bulk transfers. 24:1-24:10 - Hui Cai

, Fan Ye, Yuanyuan Yang
, Yanmin Zhu, Jie Li:
Towards privacy-preserving data trading for web browsing history. 25:1-25:10 - Lei Liu, Song Xu, Jia Hu, Lizhen Cui, Geyong Min:

Balancing of the quality-of-service, energy and revenue of base stations in wireless networks via tullock contests. 26:1-26:8 - Yuchuan Luo, Xiaohua Jia, Huayi Duan

, Cong Wang, Ming Xu, Shaojing Fu:
pRide: private ride request for online ride hailing service with secure hardware enclave. 27:1-27:10 - Long Luo, Klaus-Tycho Foerster

, Stefan Schmid
, Hongfang Yu:
DaRTree: deadline-aware multicast transfers in reconfigurable wide-area networks. 28:1-28:10 - Ruoyang Guo, Bo Qin, Yuncheng Wu, Ruixuan Liu, Hong Chen, Cuiping Li:

MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud. 29:1-29:10 - Yifan Gong, Baochun Li, Ben Liang

, Zheng Zhan:
Chic: experience-driven scheduling in machine learning clusters. 30:1-30:10 - Yutong Liu, Linghe Kong

, Muhammad Hassan, Long Cheng, Guangtao Xue, Guihai Chen
:
Litedge: towards light-weight edge computing for efficient wireless surveillance system. 31:1-31:10 - Xiangrui Yang, Zhigang Sun, Junnan Li, Jinli Yan, Tao Li, Wei Quan, Donglai Xu, Gianni Antichi

:
FAST: enabling fast software/hardware prototype for network experimentation. 32:1-32:10 - Yunzhi Li

, Yidan Hu
, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Secure indoor positioning against signal strength attacks via optimized multi-voting. 33:1-33:10 - Xianghao Xu, Fang Wang, Hong Jiang, Yongli Cheng, Yu Hua, Dan Feng, Yongxuan Zhang:

LOSC: efficient out-of-core graph processing with locality-optimized subgraph construction. 34:1-34:10 - Xi Huang, Simeng Bian, Ziyu Shao, Hong Xu

:
Predictive switch-controller association and control devolution for SDN systems. 35:1-35:10 - Zhiyao Hu, Dongsheng Li, Yiming Zhang, Deke Guo, Ziyang Li:

Branch scheduling: dag-aware scheduling for speeding up data-parallel jobs. 36:1-36:10 - Kuai Xu

, Yinxin Wan, Guoliang Xue, Feng Wang
:
Multidimensional behavioral profiling of internet-of-things in edge networks. 37:1-37:10 - Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li:

ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples. 38:1-38:10 - Jing Guo, Zihao Chang

, Sa Wang, Haiyang Ding, Yihui Feng, Liang Mao, Yungang Bao:
Who limits the resource efficiency of my datacenter: an analysis of Alibaba datacenter traces. 39:1-39:10 - Ang Li, Tao Li, Yan Zhang, Lili Zhang, Yanchao Zhang:

SocialDistance: how far are you from verified users in online social media? 40:1-40:10 - Qin Hu, Shengling Wang, Xiuzhen Cheng:

A game theoretic analysis on block withholding attacks using the zero-determinant strategy. 41:1-41:10 - Chong Xiang

, Xinyu Wang, Qingrong Chen, Minhui Xue, Zhaoyu Gao, Haojin Zhu
, Cailian Chen, Qiuhua Fan:
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization. 42:1-42:10

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














