IEEE International Conference on Distributed Computing Systems, ICDCS 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

A Framework for Enabling Security Services Collaboration Across Multiple Domains

Daniel Migault, Marcos A. Simplício Jr., Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho

A Framework for Enabling Security Services Collaboration Across Multiple Domains

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network

Ali Li, Rui Wang, Lei Xu

Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations

Md. Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone

Decentralised Runtime Monitoring for Access Control Systems in Cloud Federations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards New Abstractions for Implementing Quorum-Based Systems

Tormod Erevik Lea, Leander Jehl, Hein Meling

Towards New Abstractions for Implementing Quorum-Based Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs

Zichuan Xu, Weifa Liang, Meitian Huang, Mike Jia, Song Guo, Alex Galis

Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Distributed Operating System Network Stack and Device Driver for Multicores

Saif Ansary, Antonio Barbalace, Ho-Ren Chuang, Thomas Lazor, Binoy Ravindran

A Distributed Operating System Network Stack and Device Driver for Multicores

Details
Discussion Comments: 0
Verification: Authors have not verified information

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices

Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao

PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Processing Encrypted and Compressed Time Series Data

Matús Harvan, Samuel Kimoto, Thomas Locher, Yvonne Anne Pignolet, Johannes Schneider

Processing Encrypted and Compressed Time Series Data

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing

Hongwei Wang, Song Guo, Jiannong Cao, Minyi Guo

MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for Crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fault-Scalable Virtualized Infrastructure Management

Mukil Kesavan, Ada Gavrilovska, Karsten Schwan

Fault-Scalable Virtualized Infrastructure Management

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Vision for Zero-Hop Networking (ZeN)

Mostafa H. Ammar, Ellen W. Zegura, Yimeng Zhao

A Vision for Zero-Hop Networking (ZeN)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving Strong Privacy in Online Survey

You Zhou, Yian Zhou, Shigang Chen, Samuel S. Wu

Achieving Strong Privacy in Online Survey

Details
Discussion Comments: 0
Verification: Authors have not verified information

PTrack: Enhancing the Applicability of Pedestrian Tracking with Wearables

Yonghang Jiang, Zhenjiang Li, Jianping Wang

PTrack: Enhancing the Applicability of Pedestrian Tracking with Wearables

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy

Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng

Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Framework for Efficient Energy Scheduling of Spark Workloads

Stathis Maroulis, Nikos Zacheilas, Vana Kalogeraki

A Framework for Efficient Energy Scheduling of Spark Workloads

Details
Discussion Comments: 0
Verification: Authors have not verified information

REX: Rapid Ensemble Classification System for Landslide Detection Using Social Media

Aibek Musaev, De Wang, Jiateng Xie, Calton Pu

REX: Rapid Ensemble Classification System for Landslide Detection Using Social Media

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Dataflow-Based Graph Accelerator

Hai Jin, Pengcheng Yao, Xiaofei Liao, Long Zheng, Xianliang Li

Towards Dataflow-Based Graph Accelerator

Details
Discussion Comments: 0
Verification: Authors have not verified information

Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic Environment

Hengky Susanto, Honggang Zhang, Shing-Yip Ho, Benyuan Liu

Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic Environment

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Fast and Accurate Tracking of Population Dynamics in RFID Systems

Muhammad Shahzad, Alex X. Liu

Fast and Accurate Tracking of Population Dynamics in RFID Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flow Reconnaissance via Timing Attacks on SDN Switches

Sheng Liu, Michael K. Reiter, Vyas Sekar

Flow Reconnaissance via Timing Attacks on SDN Switches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Service Overlay Forest Embedding for Software-Defined Cloud Networks

Jian-Jhih Kuo, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen

Service Overlay Forest Embedding for Software-Defined Cloud Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching Stability

Huanyang Zheng, Jie Wu

Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching Stability

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous Invocations

Qingyang Wang, Chien-An Lai, Yasuhiko Kanemasa, Shungeng Zhang, Calton Pu

A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous Invocations

Details
Discussion Comments: 0
Verification: Authors have not verified information

GraphA: Adaptive Partitioning for Natural Graphs

Dongsheng Li, Chengfei Zhang, Jinyan Wang, Zhaoning Zhang, Yiming Zhang

GraphA: Adaptive Partitioning for Natural Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective

Weiman Sun, Shengling Wang

General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-resource Load Balancing for Virtual Network Functions

Tao Wang, Hong Xu, Fangming Liu

Multi-resource Load Balancing for Virtual Network Functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting Rogue AP with the Crowd Wisdom

Tongqing Zhou, Zhiping Cai, Bin Xiao, Yueyue Chen, Ming Xu

Detecting Rogue AP with the Crowd Wisdom

Details
Discussion Comments: 0
Verification: Authors have not verified information

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography

Shangqing Zhao, Zhuo Lu, Cliff Wang

When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimizing Cost in IaaS Clouds Via Scheduled Instance Reservation

Qiushi Wang, Ming Ming Tan, Xueyan Tang, Wentong Cai

Minimizing Cost in IaaS Clouds Via Scheduled Instance Reservation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pythia: A System for Online Topic Discovery of Social Media Posts

Iouliana Litou, Vana Kalogeraki

Pythia: A System for Online Topic Discovery of Social Media Posts

Details
Discussion Comments: 0
Verification: Authors have not verified information

Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks

Jack Kirton, Matthew Bradbury, Arshad Jhumka

Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Speed-Based Location Tracking in Usage-Based Automotive Insurance

Lu Zhou, Qingrong Chen, Zutian Luo, Haojin Zhu, Cailian Chen

Speed-Based Location Tracking in Usage-Based Automotive Insurance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem

Chao Yang, Jialong Zhang, Guofei Gu

Understanding the Market-Level and Network-Level Behaviors of the Android Malware Ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops

Kohei Watabe, Toru Mano, Kimihiro Mizutani, Osamu Akashi, Kenji Nakagawa, Takeru Inoue

A Proposal of an Efficient Traffic Matrix Estimation Under Packet Drops

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing Performance and Energy-Efficiency of the RAMCloud Storage System

Yacine Taleb, Shadi Ibrahim, Gabriel Antoniu, Toni Cortes

Characterizing Performance and Energy-Efficiency of the RAMCloud Storage System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Comprehensive Measurement and Analysis of the User-Perceived I/O Performance in a Production Leadership-Class Storage System

Lipeng Wan, Matthew Wolf, Feiyi Wang, Jong Youl Choi, George Ostrouchov, Scott Klasky

Comprehensive Measurement and Analysis of the User-Perceived I/O Performance in a Production Leadership-Class Storage System

Details
Discussion Comments: 0
Verification: Authors have not verified information

How Computer Science Risks to Lose Its Innocence, and Should Attempt to Take Responsibility

Karl Aberer

How Computer Science Risks to Lose Its Innocence, and Should Attempt to Take Responsibility

Details
Discussion Comments: 0
Verification: Author has not verified information

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma

IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information

RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter Resources

Xin Chen, Liting Hu, Douglas M. Blough, Michael A. Kozuch, Matthew Wolf

RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter Resources

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations

Volker Turau, Gerry Siegemund

Scalable Routing for Topic-Based Publish/Subscribe Systems Under Fluctuations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Private, Yet Practical, Multiparty Deep Learning

Xinyang Zhang, Shouling Ji, Hui Wang, Ting Wang

Private, Yet Practical, Multiparty Deep Learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks

Youngbin Im, Jinyoung Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyoung Kwon, Sangtae Ha

FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

FlipNet: Modeling Covert and Persistent Attacks on Networked Resources

Sudip Saha, Anil Vullikanti, Mahantesh Halappanavar

FlipNet: Modeling Covert and Persistent Attacks on Networked Resources

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Truthful Online Auction for Cloud Instance Subletting

Yifei Zhu, Silvery Fu, Jiangchuan Liu, Yong Cui

Truthful Online Auction for Cloud Instance Subletting

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software Defined Cyberinfrastructure

Ian T. Foster, Ben Blaiszik, Kyle Chard, Ryan Chard

Software Defined Cyberinfrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

Networklet: Concept and Deployment

Sheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu

Networklet: Concept and Deployment

Details
Discussion Comments: 0
Verification: Authors have not verified information

GBooster: Towards Acceleration of GPU-Intensive Mobile Applications

Elliott Wen, Winston K. G. Seah, Bryan Ng, Xue Liu, Jiannong Cao, Xuefeng Liu

GBooster: Towards Acceleration of GPU-Intensive Mobile Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Caching for Pattern Matching Queries in Time Evolving Graphs: Challenges and Approaches

Muhammad Usman Nisar, Sahar Voghoei, Lakshmish Ramaswamy

Caching for Pattern Matching Queries in Time Evolving Graphs: Challenges and Approaches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Segmentation of Time Series Based on Kinetic Characteristics for Storage Consumption Prediction

Beibei Miao, Yu Chen, Xuebo Jin, Bo Wang, Xianping Qu, Shimin Tao, Dong Wang, Zhi Zang

Segmentation of Time Series Based on Kinetic Characteristics for Storage Consumption Prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximation Designs for Cooperative Relay Deployment in Wireless Networks

Haotian Wang, Shilei Tian, Xiaofeng Gao, Lidong Wu, Guihai Chen

Approximation Designs for Cooperative Relay Deployment in Wireless Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters

Amelie Chi Zhou, Shadi Ibrahim, Bingsheng He

On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Elastic Paxos: A Dynamic Atomic Multicast Protocol

Samuel Benz, Fernando Pedone

Elastic Paxos: A Dynamic Atomic Multicast Protocol

Details
Discussion Comments: 0
Verification: Authors have not verified information

A First Look at Information Entropy-Based Data Pricing

Xijun Li, Jianguo Yao, Xue Liu, Haibing Guan

A First Look at Information Entropy-Based Data Pricing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Internet of Things: From Small- to Large-Scale Orchestration

Charles Consel, Milan Kabác

Internet of Things: From Small- to Large-Scale Orchestration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

RhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

Details
Discussion Comments: 0
Verification: Authors have not verified information

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones

Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling Mobile Code Acceleration in the Cloud

Huber Flores, Xiang Su, Vassilis Kostakos, Jukka Riekki, Eemil Lagerspetz, Sasu Tarkoma, Pan Hui, Yong Li, Jukka Manner

Modeling Mobile Code Acceleration in the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

ReverseCloak: A Reversible Multi-level Location Privacy Protection System

Chao Li, Balaji Palanisamy, Aravind Kalaivanan, Sriram Raghunathan

ReverseCloak: A Reversible Multi-level Location Privacy Protection System

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rumor Initiator Detection in Infected Signed Networks

Jiawei Zhang, Charu C. Aggarwal, Philip S. Yu

Rumor Initiator Detection in Infected Signed Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Self-Organizing Distributed and In-Band SDN Control Plane

Marco Canini, Iosif Salem, Liron Schiff, Elad Michael Schiller, Stefan Schmid

A Self-Organizing Distributed and In-Band SDN Control Plane

Details
Discussion Comments: 0
Verification: Authors have not verified information

LAVEA: Latency-Aware Video Analytics on Edge Computing Platform

Shanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li

LAVEA: Latency-Aware Video Analytics on Edge Computing Platform

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Load Balancing in Key-Value Networked Caches

Sikder Huq, M. Zubair Shafiq, Sukumar Ghosh, Amir R. Khakpour, Harkeerat Bedi

Distributed Load Balancing in Key-Value Networked Caches

Details
Discussion Comments: 0
Verification: Authors have not verified information

You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques

Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen

You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

Location Privacy in Mobile Edge Clouds

Ting He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan

Location Privacy in Mobile Edge Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search Systems

Chih-Hsun Chou, Laxmi N. Bhuyan, Shaolei Ren

TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Long Term Sensing via Battery Health Adaptation

Greg Jackson, Zhijin Qin, Julie A. McCann

Long Term Sensing via Battery Health Adaptation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hopsworks: Improving User Experience and Development on Hadoop with Scalable, Strongly Consistent Metadata

Mahmoud Ismail, Ermias Gebremeskel, Theofilos Kakantousis, Gautier Berthou, Jim Dowling

Hopsworks: Improving User Experience and Development on Hadoop with Scalable, Strongly Consistent Metadata

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sensor Cloud: A Cloud of Sensor Networks

Sanjay Kumar Madria

Sensor Cloud: A Cloud of Sensor Networks

Details
Discussion Comments: 0
Verification: Author has not verified information

Ensuring Network Neutrality for Future Distributed Systems

Thiago Garrett, Schahram Dustdar, Luis C. E. Bona, Elias Procópio Duarte Jr.

Ensuring Network Neutrality for Future Distributed Systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Hardware Acceleration Landscape for Distributed Real-Time Analytics: Virtues and Limitations

Mohammadreza Najafi, Kaiwen Zhang, Mohammad Sadoghi, Hans-Arno Jacobsen

Hardware Acceleration Landscape for Distributed Real-Time Analytics: Virtues and Limitations

Details
Discussion Comments: 0
Verification: Authors have not verified information

EnGarde: Mutually-Trusted Inspection of SGX Enclaves

Hai Nguyen, Vinod Ganapathy

EnGarde: Mutually-Trusted Inspection of SGX Enclaves

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-Aware CPU Frequency Scaling for Mobile Video Streaming

Wenjie Hu, Guohong Cao

Energy-Aware CPU Frequency Scaling for Mobile Video Streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

MeteorShower: Minimizing Request Latency for Majority Quorum-Based Data Consistency Algorithms in Multiple Data Centers

Ying Liu, Xi Guan, Vladimir Vlassov, Seif Haridi

MeteorShower: Minimizing Request Latency for Majority Quorum-Based Data Consistency Algorithms in Multiple Data Centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Scalable and Distributed Approach for NFV Service Chain Cost Minimization

Zijun Zhang, Zongpeng Li, Chuan Wu, Chuanhe Huang

A Scalable and Distributed Approach for NFV Service Chain Cost Minimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shortfall-Based Optimal Security Provisioning for Internet of Things

Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo

Shortfall-Based Optimal Security Provisioning for Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications

He Huang, Yu-e Sun, Shigang Chen, Hongli Xu, Yian Zhou

Persistent Traffic Measurement Through Vehicle-to-Infrastructure Communications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Future Networking Challenges: The Case of Mobile Augmented Reality

Tristan Braud, Farshid Hassani Bijarbooneh, Dimitris Chatzopoulos, Pan Hui

Future Networking Challenges: The Case of Mobile Augmented Reality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Computing in the Continuum: Combining Pervasive Devices and Services to Support Data-Driven Applications

Moustafa AbdelBaky, Mengsong Zou, Ali Reza Zamani, Eduard Gibert Renart, Javier Diaz Montes, Manish Parashar

Computing in the Continuum: Combining Pervasive Devices and Services to Support Data-Driven Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to Disasters

Teruo Higashino, Hirozumi Yamaguchi, Akihito Hiromori, Akira Uchiyama, Keiichi Yasumoto

Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to Disasters

Details
Discussion Comments: 0
Verification: Authors have not verified information

SRLB: The Power of Choices in Load Balancing with Segment Routing

Yoann Desmouceaux, Pierre Pfister, Jerome Tollet, Mark Townsley, Thomas H. Clausen

SRLB: The Power of Choices in Load Balancing with Segment Routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Power-Aware Population Protocols

Chuan Xu, Janna Burman, Joffroy Beauquier

Power-Aware Population Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs

Huajie Shao, Shiguang Wang, Shen Li, Shuochao Yao, Yiran Zhao, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Lance M. Kaplan

Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Specifying a Distributed Snapshot Algorithm as a Meta-Program and Model Checking it at Meta-Level

Ha Thi Thu Doan, Kazuhiro Ogata, François Bonnet

Specifying a Distributed Snapshot Algorithm as a Meta-Program and Model Checking it at Meta-Level

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel Computations

Chen Chen, Wei Wang, Bo Li

Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel Computations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Truthful Auctions for User Data Allowance Trading in Mobile Networks

Zhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li

Truthful Auctions for User Data Allowance Trading in Mobile Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Group Clustering Using Inter-Group Dissimilarities

Debessay Fesehaye, Lenin Singaravelu, Chien-Chia Chen, Xiaobo Huang, Amitabha Banerjee, Ruijin Zhou, Rajesh Somasundaran

Group Clustering Using Inter-Group Dissimilarities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dispersing Social Content in Mobile Crowd through Opportunistic Contacts

Lei Zhang, Feng Wang, Jiangchuan Liu

Dispersing Social Content in Mobile Crowd through Opportunistic Contacts

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Secure Public Directory for Privacy-Preserving Data Sharing

Amin Fallahi, Xi Liu, Yuzhe Tang, Shuang Wang, Rui Zhang

Towards Secure Public Directory for Privacy-Preserving Data Sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture

Ehsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong, Mung Chiang

Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid Architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation

Robertus Nugroho, Weiliang Zhao, Jian Yang, Cécile Paris, Surya Nepal

The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic Derivation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Isolation in Docker through Layer Encryption

Ioannis Giannakopoulos, Konstantinos Papazafeiropoulos, Katerina Doka, Nectarios Koziris

Isolation in Docker through Layer Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine

Zonyin Shae, Jeffrey J. P. Tsai

On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine

Details
Discussion Comments: 0
Verification: Authors have not verified information

BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-Time Situation Awareness

Pengfei Zuo, Yu Hua, Xue Liu, Dan Feng, Wen Xia, Shunde Cao, Jie Wu, Yuanyuan Sun, Yuncheng Guo

BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-Time Situation Awareness

Details
Discussion Comments: 0
Verification: Authors have not verified information

DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems

Di Wu, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, Julie A. McCann, Amelia C. Regan

DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Computability of Perpetual Exploration in Highly Dynamic Rings

Marjorie Bournat, Swan Dubois, Franck Petit

Computability of Perpetual Exploration in Highly Dynamic Rings

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing

Ye Yan, Dong Han, Tao Shu

Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

E-Android: A New Energy Profiling Tool for Smartphones

Xing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou

E-Android: A New Energy Profiling Tool for Smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable Role-Based Data Disclosure Control for the Internet of Things

Ali Yavari, Arezou Soltani Panah, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ron G. van Schyndel

Scalable Role-Based Data Disclosure Control for the Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks

Jingya Zhou, Jianxi Fan

JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Future of the Semantic Web: Prototypes on a Global Distributed Filesystem

Michael Cochez, Dominik Hüser, Stefan Decker

The Future of the Semantic Web: Prototypes on a Global Distributed Filesystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

DuoFS: An Attempt at Energy-Saving and Retaining Reliability of Storage Systems

Bing Jiao, Xiaomin Zhu, Xiaojun Ruan, Xiao Qin, Shu Yin

DuoFS: An Attempt at Energy-Saving and Retaining Reliability of Storage Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

LITMUS: Towards Multilingual Reporting of Landslides

Aibek Musaev, Qixuan Hou, Yang Yang, Calton Pu

LITMUS: Towards Multilingual Reporting of Landslides

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust Incentive Tree Design for Mobile Crowdsensing

Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang

Robust Incentive Tree Design for Mobile Crowdsensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Real-Time Detection of Illegal File Transfers in the Cloud

Adam Bowers, Dan Lin, Anna Cinzia Squicciarini, Ali R. Hurson

Real-Time Detection of Illegal File Transfers in the Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward An Integrated Approach to Localizing Failures in Community Water Networks

Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian

Toward An Integrated Approach to Localizing Failures in Community Water Networks

Details
Author Comments: CNS-0958520
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections

Shen Li, Md. Tanvir Al Amin, Raghu K. Ganti, Mudhakar Srivatsa, Shanhao Hu, Yiran Zhao, Tarek F. Abdelzaher

Stark: Optimizing In-Memory Computing for Dynamic Dataset Collections

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy Proportional Servers: Where Are We in 2016?

Congfeng Jiang, Yumei Wang, Dongyang Ou, Bing Luo, Weisong Shi

Energy Proportional Servers: Where Are We in 2016?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fuzzy Extractors for Biometric Identification

Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal

Fuzzy Extractors for Biometric Identification

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supporting Data Analytics Applications Which Utilize Cognitive Services

Arun Iyengar

Supporting Data Analytics Applications Which Utilize Cognitive Services

Details
Discussion Comments: 0
Verification: Author has not verified information

Distributed QR Decomposition Framework for Training Support Vector Machines

Jyotikrishna Dass, V. N. S. Prithvi Sakuru, Vivek Sarin, Rabi N. Mahapatra

Distributed QR Decomposition Framework for Training Support Vector Machines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Scalable and Dynamic Social Sensing Using A Distributed Computing Framework

Daniel Yue Zhang, Chao Zheng, Dong Wang, Douglas Thain, Xin Mu, Greg Madey, Chao Huang

Towards Scalable and Dynamic Social Sensing Using A Distributed Computing Framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network

Corey E. Baker, Allen Starke, Tanisha G. Hill-Jarrett, Janise McNair

In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs

Amy Babay, Emily Wagner, Michael Dinitz, Yair Amir

Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are HTTP/2 Servers Ready Yet?

Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao

Are HTTP/2 Servers Ready Yet?

Details
Discussion Comments: 0
Verification: Authors have not verified information

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access

Chaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang

When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Multi-agent Parallel Approach to Analyzing Large Climate Data Sets

Jason Woodring, Matthew Sell, Munehiro Fukuda, Hazeline U. Asuncion, Eric Salathe

A Multi-agent Parallel Approach to Analyzing Large Climate Data Sets

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Dela - Sharing Large Datasets between Hadoop Clusters

Alexandru A. Ormenisan, Jim Dowling

Dela - Sharing Large Datasets between Hadoop Clusters

Details
Discussion Comments: 0
Verification: Authors have not verified information

City-Hunter: Hunting Smartphones in Urban Areas

Xuefeng Liu, Jiaqi Wen, Shaojie Tang, Jiannong Cao, Jiaxing Shen

City-Hunter: Hunting Smartphones in Urban Areas

Details
Discussion Comments: 0
Verification: Authors have not verified information

High Performance Recovery for Parallel State Machine Replication

Odorico Machado Mendizabal, Fernando Luís Dotti, Fernando Pedone

High Performance Recovery for Parallel State Machine Replication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics Consideration

Liuwang Kang, Haiying Shen, Ankur Sarker

Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics Consideration

Details
Discussion Comments: 0
Verification: Authors have not verified information

FADEWICH: Fast Deauthentication Over the Wireless Channel

Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik

FADEWICH: Fast Deauthentication Over the Wireless Channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile Devices

Yongshu Bai, Yifan Zhang

StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward Vehicle Sensing: An Integrated Application with Sparse Video Vameras and Intelligent Taxicabs

Yang Wang, Wuji Chen, Wei Zheng, He Huang, Wen Zhang, Hengchang Liu

Toward Vehicle Sensing: An Integrated Application with Sparse Video Vameras and Intelligent Taxicabs

Details
Discussion Comments: 0
Verification: Authors have not verified information

PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs

Sagar Sharma, Keke Chen

PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Multi-stage Hierarchical Window Model with Application to Real-Time Graph Analysis

Sachini Jayasekara, Shanika Karunasekera, Aaron Harwood

A Multi-stage Hierarchical Window Model with Application to Real-Time Graph Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Keddah: Capturing Hadoop Network Behaviour

Jie Deng, Gareth Tyson, Félix Cuadrado, Steve Uhlig

Keddah: Capturing Hadoop Network Behaviour

Details
Discussion Comments: 0
Verification: Authors have not verified information

Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of Millibottlenecks

Tao Zhu, Jack Li, Josh Kimball, Junhee Park, Chien-An Lai, Calton Pu, Qingyang Wang

Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of Millibottlenecks

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Automated Performance Evaluation for Multi-tier Cloud Service Systems Subject to Mixed Workloads

Xudong Zhao, Jiwei Huang, Lei Liu, Shijun Liu, Calton Pu, Lizhen Cui

Automated Performance Evaluation for Multi-tier Cloud Service Systems Subject to Mixed Workloads

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy Implications of DNSSEC Look-Aside Validation

Aziz Mohaisen, Zhongshu Gu, Kui Ren

Privacy Implications of DNSSEC Look-Aside Validation

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Lightweight Recommendation Framework for Mobile User's Link Selection in Dense Network

Ji Wang, Xiaomin Zhu, Weidong Bao, Guanlin Wu

A Lightweight Recommendation Framework for Mobile User's Link Selection in Dense Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags

Han Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao

RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint Request Balancing and Content Aggregation in Crowdsourced CDN

Ming Ma, Zhi Wang, Kun Yi, Jiangchuan Liu, Lifeng Sun

Joint Request Balancing and Content Aggregation in Crowdsourced CDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

More Peak, Less Differentiation: Towards A Pricing-aware Online Control Framework for Inter-Datacenter Transfers

Wenxin Li, Xiaobo Zhou, Keqiu Li, Heng Qi, Deke Guo

More Peak, Less Differentiation: Towards A Pricing-aware Online Control Framework for Inter-Datacenter Transfers

Details
Discussion Comments: 0
Verification: Authors have not verified information

SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering

Pranita Dewan, Raghu K. Ganti, Mudhakar Srivatsa

SOM-TC: Self-Organizing Map for Hierarchical Trajectory Clustering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving Efficiency of Link Clustering on Multi-core Machines

Guanhua Yan

Improving Efficiency of Link Clustering on Multi-core Machines

Details
Discussion Comments: 0
Verification: Author has not verified information

Unseen Activity Recognitions: A Hierarchical Active Transfer Learning Approach

Mohammad Arif Ul Alam, Nirmalya Roy

Unseen Activity Recognitions: A Hierarchical Active Transfer Learning Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-representation Based Data Processing Architecture for IoT Applications

Vaibhav Arora, Faisal Nawab, Divyakant Agrawal, Amr El Abbadi

Multi-representation Based Data Processing Architecture for IoT Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance Analysis of Cloud Computing Centers Serving Parallelizable Rendering Jobs Using M/M/c/r Queuing Systems

Xiulin Li, Li Pan, Jiwei Huang, Shijun Liu, Yuliang Shi, Li-zhen Cui, Calton Pu

Performance Analysis of Cloud Computing Centers Serving Parallelizable Rendering Jobs Using M/M/c/r Queuing Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimization of Full-View Barrier Coverage with Rotatable Camera Sensors

Xiaofeng Gao, Rui Yang, Fan Wu, Guihai Chen, Jinguang Zhou

Optimization of Full-View Barrier Coverage with Rotatable Camera Sensors

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Millibottleneck Theory of Performance Bugs, and Its Experimental Verification

Calton Pu, Joshua Kimball, Chien-An Lai, Tao Zhu, Jack Li, Junhee Park, Qingyang Wang, Deepal Jayasinghe, PengCheng Xiong, Simon Malkowski, Qinyi Wu, Gueyoung Jung, Younggyun Koh, Galen S. Swint

The Millibottleneck Theory of Performance Bugs, and Its Experimental Verification

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Learning from Failure Across Multiple Clusters: A Trace-Driven Approach to Understanding, Predicting, and Mitigating Job Terminations

Nosayba El-Sayed, Hongyu Zhu, Bianca Schroeder

Learning from Failure Across Multiple Clusters: A Trace-Driven Approach to Understanding, Predicting, and Mitigating Job Terminations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants

Weipeng Lin, Ke Wang, Zhilin Zhang, Hong Chen

Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Complete Tolerance Relation Based Filling Algorithm Using Spark

Jingling Yuan, Yao Xiang, Xian Zhong, Mincheng Chen, Tao Li

Complete Tolerance Relation Based Filling Algorithm Using Spark

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timed-Release of Self-Emerging Data Using Distributed Hash Tables

Chao Li, Balaji Palanisamy

Timed-Release of Self-Emerging Data Using Distributed Hash Tables

Details
Discussion Comments: 0
Verification: Authors have not verified information

Selective Traffic Offloading on the Fly: A Machine Learning Approach

Zaiyang Tang, Peng Li, Song Guo, Xiaofei Liao, Hai Jin, Daqing Zhang

Selective Traffic Offloading on the Fly: A Machine Learning Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proactively Secure Cloud-Enabled Storage

Karim Eldefrawy, Sky Faber, Tyler Kaczmarek

Proactively Secure Cloud-Enabled Storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities

Amir Sinaeepourfard, Jordi Garcia, Xavier Masip-Bruin, Eva Marín-Tordera

A Novel Architecture for Efficient Fog to Cloud Data Management in Smart Cities

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Optimization Framework for Online Ride-Sharing Markets

Yongzheng Jia, Wei Xu, Xue Liu

An Optimization Framework for Online Ride-Sharing Markets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Oak: User-Targeted Web Performance

Marcel Flores, Alexander Wenzel, Aleksandar Kuzmanovic

Oak: User-Targeted Web Performance

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds

Eve M. Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, Moreno Ambrosin

An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Profiling Users by Modeling Web Transactions

Radek Tomsu, Samuel Marchal, N. Asokan

Profiling Users by Modeling Web Transactions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tracking Information Flow in Cyber-Physical Systems

Stefan Gries, Marc Hesenius, Volker Gruhn

Tracking Information Flow in Cyber-Physical Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and Writes

Dejun Teng, Lei Guo, Rubao Lee, Feng Chen, Siyuan Ma, Yanfeng Zhang, Xiaodong Zhang

LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and Writes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment

Juan F. Pérez, Robert Birke, Mathias Björkqvist, Lydia Y. Chen

Dual Scaling VMs and Queries: Cost-Effective Latency Curtailment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems

Zhuojun Duan, Wei Li, Zhipeng Cai

Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Retrospective Lightweight Distributed Snapshots Using Loosely Synchronized Clocks

Aleksey Charapko, Ailidani Ailijiang, Murat Demirbas, Sandeep S. Kulkarni

Retrospective Lightweight Distributed Snapshots Using Loosely Synchronized Clocks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs

Raziel Carvajal Gómez, Inti Y. Gonzalez-Herrera, Yérom-David Bromberg, Laurent Réveillère, Etienne Riviere

Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETs

Details
Discussion Comments: 0
Verification: Authors have not verified information

DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS

Quanlu Zhang, Zhenhua Li, Zhi Yang, Shenglong Li, Shouyang Li, Yangze Guo, Yafei Dai

DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFS

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making Smartphone Smart on Demand for Longer Battery Life

Marco Brocanelli, Xiaorui Wang

Making Smartphone Smart on Demand for Longer Battery Life

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Communication-Aware Container Re-Distribution Approach for High Performance VNFs

Yuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Minghui Li, Xuan Cao, Qingqing Liang

A Communication-Aware Container Re-Distribution Approach for High Performance VNFs

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Event-Level Abstraction for Achieving Efficiency and Fairness in Network Update

Ting Qu, Deke Guo, Xiaomin Zhu, Jie Wu, Xiaolei Zhou, Zhong Liu

An Event-Level Abstraction for Achieving Efficiency and Fairness in Network Update

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning

Ning Liu, Zhe Li, Jielong Xu, Zhiyuan Xu, Sheng Lin, Qinru Qiu, Jian Tang, Yanzhi Wang

A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

BIG Cache Abstraction for Cache Networks

Eman Ramadan, Arvind Narayanan, Zhi-Li Zhang, Runhui Li, Gong Zhang

BIG Cache Abstraction for Cache Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Workflow Optimization in PAW

Maxim Filatov, Verena Kantere, Iluju Kiringa

Workflow Optimization in PAW

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributively Computing Random Walk Betweenness Centrality in Linear Time

Qiang-Sheng Hua, Ming Ai, Hai Jin, Dongxiao Yu, Xuanhua Shi

Distributively Computing Random Walk Betweenness Centrality in Linear Time

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward an Integrated Approach to Localizing Failures in Community Water Networks (DEMO)

Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian

Toward an Integrated Approach to Localizing Failures in Community Water Networks (DEMO)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Load Prediction for Energy-Aware Scheduling for Cloud Computing Platforms

Alexandre Dambreville, Joanna Tomasik, Johanne Cohen, Fabien Dufoulon

Load Prediction for Energy-Aware Scheduling for Cloud Computing Platforms

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols

Giuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta

On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes

Yu Zhao, Huazhe Wang, Xin Lin, Tingting Yu, Chen Qian

Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers

Qiuxiang Dong, Dijiang Huang

Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy Preserving User-Based Recommender System

Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino

Privacy Preserving User-Based Recommender System

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Performance Driven Resource Sharing Markets for the Small Cloud

Sung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik

Performance Driven Resource Sharing Markets for the Small Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques

Jingxuan Wang, Wenting Tu, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs

Balaji Palanisamy, Chao Li, Prashant Krishnamurthy

Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints

Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang

Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Voyager: Complete Container State Migration

Shripad Nadgowda, Sahil Suneja, Nilton Bila, Canturk Isci

Voyager: Complete Container State Migration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Virtualized Network Coding Functions on the Internet

Linquan Zhang, Shangqi Lai, Chuan Wu, Zongpeng Li, Chuanxiong Guo

Virtualized Network Coding Functions on the Internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

MultiPub: Latency and Cost-Aware Global-Scale Cloud Publish/Subscribe

Julien Gascon-Samson, Jörg Kienzle, Bettina Kemme

MultiPub: Latency and Cost-Aware Global-Scale Cloud Publish/Subscribe

Details
Discussion Comments: 0
Verification: Authors have not verified information

Virtual Machine Power Accounting with Shapley Value

Weixiang Jiang, Fangming Liu, Guoming Tang, Kui Wu, Hai Jin

Virtual Machine Power Accounting with Shapley Value

Details
Discussion Comments: 0
Verification: Authors have not verified information

DHCRF: A Distributed Conditional Random Field Algorithm on a Heterogeneous CPU-GPU Cluster for Big Data

Wei Ai, Kenli Li, Cen Chen, Jiwu Peng, Keqin Li

DHCRF: A Distributed Conditional Random Field Algorithm on a Heterogeneous CPU-GPU Cluster for Big Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Model-Driven Domain-Specific Middleware

Fábio M. Costa, Karl A. Morris, Fabio Kon, Peter J. Clarke

Model-Driven Domain-Specific Middleware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks

Shaojun Zou, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He

Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Evaluation of Deep Learning Frameworks Over Different HPC Architectures

Shayan Shams, Richard Platania, Kisung Lee, Seung-Jong Park

Evaluation of Deep Learning Frameworks Over Different HPC Architectures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Machine-Learning Based Performance Estimation for Distributed Parallel Applications in Virtualized Heterogeneous Clusters

Seontae Kim, Nguyen Pham, Woongki Baek, Young-ri Choi

Machine-Learning Based Performance Estimation for Distributed Parallel Applications in Virtualized Heterogeneous Clusters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Right-Sizing Geo-distributed Data Centers for Availability and Latency

Iyswarya Narayanan, Aman Kansal, Anand Sivasubramaniam

Right-Sizing Geo-distributed Data Centers for Availability and Latency

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adopting SDN Switch Buffer: Benefits Analysis and Mechanism Design

Fuliang Li, Jiannong Cao, Xingwei Wang, Yinchu Sun, Tian Pan, Xuefeng Liu

Adopting SDN Switch Buffer: Benefits Analysis and Mechanism Design

Details
Discussion Comments: 0
Verification: Authors have not verified information

JeCache: Just-Enough Data Caching with Just-in-Time Prefetching for Big Data Applications

Yifeng Luo, Jia Shi, Shuigeng Zhou

JeCache: Just-Enough Data Caching with Just-in-Time Prefetching for Big Data Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Distributed Coordination at WAN-Scale

Ailidani Ailijiang, Aleksey Charapko, Murat Demirbas, Bekir O. Turkkan, Tevfik Kosar

Efficient Distributed Coordination at WAN-Scale

Details
Discussion Comments: 0
Verification: Authors have not verified information

Calvin Constrained - A Framework for IoT Applications in Heterogeneous Environments

Amardeep Mehta, Rami Baddour, Fredrik Svensson, Harald Gustafsson, Erik Elmroth

Calvin Constrained - A Framework for IoT Applications in Heterogeneous Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing

Munindar P. Singh, Amit K. Chopra

The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimistic Causal Consistency for Geo-Replicated Key-Value Stores

Kristina Spirovska, Diego Didona, Willy Zwaenepoel

Optimistic Causal Consistency for Geo-Replicated Key-Value Stores

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging

Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless Charging

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Fault Tolerant Linear System Solvers Based on Erasure Coding

Xuejiao Kang, David F. Gleich, Ahmed H. Sameh, Ananth Grama

Distributed Fault Tolerant Linear System Solvers Based on Erasure Coding

Details
Discussion Comments: 0
Verification: Authors have not verified information

EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance

Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao

EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Evaluating Connection Resilience for the Overlay Network Kademlia

Henner Heck, Olga Kieselmann, Arno Wacker

Evaluating Connection Resilience for the Overlay Network Kademlia

Details
Discussion Comments: 0
Verification: Authors have not verified information

Influence Maximization in a Many Cascades World

Iouliana Litou, Vana Kalogeraki, Dimitrios Gunopulos

Influence Maximization in a Many Cascades World

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Energy-Efficient Congestion Control for Multipath TCP

Jia Zhao, Jiangchuan Liu, Haiyang Wang

On Energy-Efficient Congestion Control for Multipath TCP

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs)

Anja Feldmann, Manfred Hauswirth, Volker Markl

Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incremental Topology Transformation for Publish/Subscribe Systems Using Integer Programming

Pooya Salehi, Kaiwen Zhang, Hans-Arno Jacobsen

Incremental Topology Transformation for Publish/Subscribe Systems Using Integer Programming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Learning Privacy Habits of PDS Owners

Bikash Chandra Singh, Barbara Carminati, Elena Ferrari

Learning Privacy Habits of PDS Owners

Details
Discussion Comments: 0
Verification: Authors have not verified information

Federating Consistency for Partition-Prone Networks

Benjamin Bengfort, Pete Keleher

Federating Consistency for Partition-Prone Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data Integrity for Collaborative Applications over Hosted Services

Ertem Esiner, Anwitaman Datta

Data Integrity for Collaborative Applications over Hosted Services

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Leveraging Target k-Coverage in Wireless Rechargeable Sensor Networks

Pengzhan Zhou, Cong Wang, Yuanyuan Yang

Leveraging Target k-Coverage in Wireless Rechargeable Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lateral Thinking for Trustworthy Apps

Hermann Härtig, Michael Roitzsch, Carsten Weinhold, Adam Lackorzynski

Lateral Thinking for Trustworthy Apps

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points

Chen Wang, Chuyu Wang, Yingying Chen, Lei Xie, Sanglu Lu

Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access Points

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Multilingual Automated Classification Systems

Aibek Musaev, Calton Pu

Towards Multilingual Automated Classification Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Machine to Machine Trust in Smart Cities

Margaret L. Loper, Brian Paul Swenson

Machine to Machine Trust in Smart Cities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging

Sang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging

Details
Discussion Comments: 0
Verification: Authors have not verified information

Eyes of the Swarm: Streamers' Detection in BT

Daniel Vasconcelos Correa da Silva, Antônio Augusto de Aragão Rocha

Eyes of the Swarm: Streamers' Detection in BT

Details
Discussion Comments: 0
Verification: Authors have not verified information

milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web Services

Chien-An Lai, Josh Kimball, Tao Zhu, Qingyang Wang, Calton Pu

milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments

Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li

Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

WearLock: Unlocking Your Phone via Acoustics Using Smartwatch

Shanhe Yi, Zhengrui Qin, Nancy Carter, Qun Li

WearLock: Unlocking Your Phone via Acoustics Using Smartwatch

Details
Discussion Comments: 0
Verification: Authors have not verified information

Uncovering the Useful Structures of Complex Networks in Socially-Rich and Dynamic Environments

Jie Wu

Uncovering the Useful Structures of Complex Networks in Socially-Rich and Dynamic Environments

Details
Discussion Comments: 0
Verification: Author has not verified information

EdgeOS_H: A Home Operating System for Internet of Everything

Jie Cao, Lanyu Xu, Raef Abdallah, Weisong Shi

EdgeOS_H: A Home Operating System for Internet of Everything

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network

Muntadher Fadhil Sallal, Gareth Owenson, Mo Adda

Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain

Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoT

Tarek F. Abdelzaher, Md. Tanvir Al Amin, Amotz Bar-Noy, William Dron, Ramesh Govindan, Reginald L. Hobbs, Shaohan Hu, Jung-Eun Kim, Jongdeog Lee, Kelvin Marcus, Shuochao Yao, Yiran Zhao

Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software

Mohammad Alhowaidi, Byrav Ramamurthy, Brian Bockelman, David Swanson

The Case for Using Content-Centric Networking for Distributing High-Energy Physics Software

Details
Discussion Comments: 0
Verification: Authors have not verified information

Trillion Operations Key-Value Storage Engine: Revisiting the Mission Critical Analytics Storage Software Stack

Sangeetha Seshadri, Paul Muench, Lawrence Chiu

Trillion Operations Key-Value Storage Engine: Revisiting the Mission Critical Analytics Storage Software Stack

Details
Discussion Comments: 0
Verification: Authors have not verified information

Job Scheduling without Prior Information in Big Data Processing Systems

Zhiming Hu, Baochun Li, Zheng Qin, Rick Siow Mong Goh

Job Scheduling without Prior Information in Big Data Processing Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Task-aware TCP in Data Center Networks

Sen Liu, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He

Task-aware TCP in Data Center Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

SunChase: Energy-Efficient Route Planning for Solar-Powered EVs

Landu Jiang, Yu Hua, Chen Ma, Xue Liu

SunChase: Energy-Efficient Route Planning for Solar-Powered EVs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exacution: Enhancing Scientific Data Management for Exascale

Scott Klasky, Eric Suchyta, Mark Ainsworth, Qing Liu, Ben Whitney, Matthew Wolf, Jong Youl Choi, Ian T. Foster, Mark Kim, Jeremy Logan, Kshitij Mehta, Todd Munson, George Ostrouchov, Manish Parashar, Norbert Podhorszki, David Pugmire, Lipeng Wan

Exacution: Enhancing Scientific Data Management for Exascale

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices

Surat Teerapittayanon, Bradley McDanel, H. T. Kung

Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Local and Low-Cost White Space Detection

Ahmed Saeed, Khaled A. Harras, Ellen W. Zegura, Mostafa H. Ammar

Local and Low-Cost White Space Detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Subscription Covering for Relevance-Based Filtering in Content-Based Publish/Subscribe Systems

Kaiwen Zhang, Vinod Muthusamy, Mohammad Sadoghi, Hans-Arno Jacobsen

Subscription Covering for Relevance-Based Filtering in Content-Based Publish/Subscribe Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Transparent Fault-Tolerance Using Intra-Machine Full-Software-Stack Replication on Commodity Multicore Hardware

Giuliano Losa, Antonio Barbalace, Yuzhong Wen, Ho-Ren Chuang, Binoy Ravindran

Transparent Fault-Tolerance Using Intra-Machine Full-Software-Stack Replication on Commodity Multicore Hardware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mitigating Nesting-Agnostic Hypervisor Policies in Derivative Clouds

Chandra Prakash, Prashanth, Purushottam Kulkarni, Umesh Bellur

Mitigating Nesting-Agnostic Hypervisor Policies in Derivative Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Buffer-Based Reinforcement Learning for Adaptive Streaming

Yue Zhang, Yao Liu

Buffer-Based Reinforcement Learning for Adaptive Streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crazy Crowd Sourcing to Mitigate Resource Scarcity

Nova Ahmed, Mahfuzur Rahman Siddiquee, Refaya Karim, Mohsina Zaman, Sayed Mahmudul Alam, Syed Fahim Ashram

Crazy Crowd Sourcing to Mitigate Resource Scarcity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels

Jun Zhao

Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off Channels

Details
Discussion Comments: 0
Verification: Author has not verified information

JointCloud: A Cross-Cloud Cooperation Architecture for Integrated Internet Service Customization

Huaimin Wang, Peichang Shi, Yiming Zhang

JointCloud: A Cross-Cloud Cooperation Architecture for Integrated Internet Service Customization

Details
Discussion Comments: 0
Verification: Authors have not verified information

iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization

Liqiong Chang, Jie Xiong, Yu Wang, Xiaojiang Chen, Junhao Hu, Dingyi Fang

iUpdater: Low Cost RSS Fingerprints Updating for Device-Free Localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Location Privacy Breach: Apps Are Watching You in Background

Dachuan Liu, Xing Gao, Haining Wang

Location Privacy Breach: Apps Are Watching You in Background

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy Efficient Object Detection in Camera Sensor Networks

Tuan Dao, Karim Khalil, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy, Lance M. Kaplan

Energy Efficient Object Detection in Camera Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

S3: Joint Scheduling and Source Selection for Background Traffic in Erasure-Coded Storage

Shijing Li, Tian Lan, Moo-Ryong Ra, Rajesh Krishna Panta

S3: Joint Scheduling and Source Selection for Background Traffic in Erasure-Coded Storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks

Chin-Jung Liu, Li Xiao

k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Parallel Algorithm for Core Maintenance in Dynamic Graphs

Na Wang, Dongxiao Yu, Hai Jin, Chen Qian, Xia Xie, Qiang-Sheng Hua

Parallel Algorithm for Core Maintenance in Dynamic Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust Indoor Wireless Localization Using Sparse Recovery

Wei Gong, Jiangchuan Liu

Robust Indoor Wireless Localization Using Sparse Recovery

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Fast Heuristic Attribute Reduction Algorithm Using Spark

Mincheng Chen, Jingling Yuan, Lin Li, Dongling Liu, Tao Li

A Fast Heuristic Attribute Reduction Algorithm Using Spark

Details
Discussion Comments: 0
Verification: Authors have not verified information

Chronus: Consistent Data Plane Updates in Timed SDNs

Jiaqi Zheng, Guihai Chen, Stefan Schmid, Haipeng Dai, Jie Wu

Chronus: Consistent Data Plane Updates in Timed SDNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching

Xiang Li, J. David Smith, My T. Thai

Adaptive Reconnaissance Attacks with Near-Optimal Parallel Batching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Boosting The Benefits of Hybrid SDN

Wen Wang, Wenbo He, Jinshu Su

Boosting The Benefits of Hybrid SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Preventive Auto-Parallelization Approach for Elastic Stream Processing

Roland Kotto Kombi, Nicolas Lumineau, Philippe Lamarre

A Preventive Auto-Parallelization Approach for Elastic Stream Processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Mechanism for Cooperative Demand-Side Management

Guangchao Yuan, Chung-Wei Hang, Michael N. Huhns, Munindar P. Singh

A Mechanism for Cooperative Demand-Side Management

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Broad Big Data

Steffen Staab

On Broad Big Data

Details
Discussion Comments: 0
Verification: Author has not verified information

Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANs

Bing Feng, Jianqing Liu, Chi Zhang, Yuguang Fang

Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Android Malware Detection Using Complex-Flows

Feng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek

Android Malware Detection Using Complex-Flows

Details
Author Comments: http://blueseal.cse.buffalo.edu/sourcecode.html for direct links to source code and datasets
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Cache Potentiality of MONs: A Prime

Peiyan Yuan, Honghai Wu, Xiaoyan Zhao, Zhengnan Dong

Cache Potentiality of MONs: A Prime

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions

Elisa Bertino, Seraphin B. Calo, Maroun Touma, Dinesh C. Verma, Christopher Williams, Brian Rivera

A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coordinating Distributed Speaking Objects

Marco Lippi, Marco Mamei, Stefano Mariani, Franco Zambonelli

Coordinating Distributed Speaking Objects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Locally Self-Adjusting Skip Graphs

Sikder Huq, Sukumar Ghosh

Locally Self-Adjusting Skip Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D Forwarding

Yanqi Jin, Fangming Liu, Xiaomeng Yi, Minghua Chen

Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D Forwarding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Opportunistic Energy Sharing Between Power Grid and Electric Vehicles: A Game Theory-Based Pricing Policy

Ankur Sarker, Zhuozhao Li, William Kolodzey, Haiying Shen

Opportunistic Energy Sharing Between Power Grid and Electric Vehicles: A Game Theory-Based Pricing Policy

Details
Discussion Comments: 0
Verification: Authors have not verified information

DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs

Kambiz Ghoorchian, Sarunas Girdzijauskas, Fatemeh Rahimian

DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted Graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control

Chenxi Qiu, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, James Caverlee

Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control

Details
Discussion Comments: 0
Verification: Authors have not verified information

Phoenix: A Constraint-Aware Scheduler for Heterogeneous Datacenters

Prashanth Thinakaran, Jashwant Raj Gunasekaran, Bikash Sharma, Mahmut Taylan Kandemir, Chita R. Das

Phoenix: A Constraint-Aware Scheduler for Heterogeneous Datacenters

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing

Xiaomei Zhang, Yibo Wu, Lifu Huang, Heng Ji, Guohong Cao

Expertise-Aware Truth Analysis and Task Allocation in Mobile Crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

SPHINX: A Password Store that Perfectly Hides Passwords from Itself

Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena

SPHINX: A Password Store that Perfectly Hides Passwords from Itself

Details
Discussion Comments: 0
Verification: Authors have not verified information

OPPay: Design and Implementation of a Payment System for Opportunistic Data Services

Fengrui Shi, Zhijin Qin, Julie A. McCann

OPPay: Design and Implementation of a Payment System for Opportunistic Data Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference

Gonglong Chen, Wei Dong, Zhiwei Zhao, Tao Gu

Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology Interference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Category Information Collection in RFID Systems

Jia Liu, Shigang Chen, Bin Xiao, Yanyan Wang, Lijun Chen

Category Information Collection in RFID Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Serverless Programming (Function as a Service)

Paul C. Castro, Vatche Ishakian, Vinod Muthusamy, Aleksander Slominski

Serverless Programming (Function as a Service)

Details
Author Comments: Other related artifacts https://www.serverlesscomputing.org/workshops/
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Cognitive Context-Aware Distributed Storage Optimization in Mobile Cloud Computing: A Stable Matching Based Approach

Dong Han, Ye Yan, Tao Shu, Liuqing Yang, Shuguang Cui

Cognitive Context-Aware Distributed Storage Optimization in Mobile Cloud Computing: A Stable Matching Based Approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Agar: A Caching System for Erasure-Coded Data

Raluca Halalai, Pascal Felber, Anne-Marie Kermarrec, François Taïani

Agar: A Caching System for Erasure-Coded Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Observable-by-Design

Masaru Kitsuregawa

Observable-by-Design

Details
Discussion Comments: 0
Verification: Author has not verified information

Real-Time Power Cycling in Video on Demand Data Centres Using Online Bayesian Prediction

Vicent Sanz Marco, Zheng Wang, Barry Porter

Real-Time Power Cycling in Video on Demand Data Centres Using Online Bayesian Prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information

MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization

Yongbo Li, Yurong Chen, Tian Lan, Guru Venkataramani

MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result Optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

ACTiCLOUD: Enabling the Next Generation of Cloud Applications

Georgios I. Goumas, Konstantinos Nikas, Ewnetu Bayuh Lakew, Christos Kotselidis, Andrew Attwood, Erik Elmroth, Michail Flouris, Nikos Foutris, John Goodacre, Davide Grohmann, Vasileios Karakostas, Panagiotis Koutsourakis, Martin L. Kersten, Mikel Luján, Einar Rustad, John Thomson, Luis Tomás, Atle Vesterkjaer, Jim Webber, Ying Zhang, Nectarios Koziris

ACTiCLOUD: Enabling the Next Generation of Cloud Applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Optimizing Shuffle in Wide-Area Data Analytics

Shuhao Liu, Hao Wang, Baochun Li

Optimizing Shuffle in Wide-Area Data Analytics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks

Ai-Chun Pang, Wei-Ho Chung, Te-Chuan Chiu, Junshan Zhang

Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Networked Stochastic Multi-armed Bandits with Combinatorial Strategies

Shaojie Tang, Yaqin Zhou, Kai Han, Zhao Zhang, Jing Yuan, Weili Wu

Networked Stochastic Multi-armed Bandits with Combinatorial Strategies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anonymous Routing to Maximize Delivery Rates in DTNs

Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu

Anonymous Routing to Maximize Delivery Rates in DTNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Directional Neighbor Discovery in mmWave Networks

Yu Wang, Shiwen Mao, Theodore S. Rappaport

On Directional Neighbor Discovery in mmWave Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data-Driven Serendipity Navigation in Urban Places

Xiaoyu Ge, Ameya Daphalapurkar, Manali Shimpi, Darpun Kohli, Konstantinos Pelechrinis, Panos K. Chrysanthis, Demetrios Zeinalipour-Yazti

Data-Driven Serendipity Navigation in Urban Places

Details
Discussion Comments: 0
Verification: Authors have not verified information

High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data Workloads

Dipti Shankar, Xiaoyi Lu, Dhabaleswar K. Panda

High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data Workloads

Details
Discussion Comments: 0
Verification: Authors have not verified information

Networked Drone Cameras for Sports Streaming

Xiaoli Wang, Aakanksha Chowdhery, Mung Chiang

Networked Drone Cameras for Sports Streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System

Adriano Di Luzio, Alessandro Mei, Julinda Stefa

Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Distributed Access Control System for Cloud Federations

Shorouq Alansari, Federica Paci, Vladimiro Sassone

A Distributed Access Control System for Cloud Federations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling and Analyzing Latency in the Memcached system

Wenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang

Modeling and Analyzing Latency in the Memcached system

Details
Discussion Comments: 0
Verification: Authors have not verified information

PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices

Xuyu Wang, Chao Yang, Shiwen Mao

PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Content Centric Peer Data Sharing in Pervasive Edge Computing Environments

Xintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li

Content Centric Peer Data Sharing in Pervasive Edge Computing Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things

Daniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino

Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud

Hui Chen, Qingyang Wang, Balaji Palanisamy, Pengcheng Xiong

DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Structured Overlay Networks for a New Generation of Internet Services

Amy Babay, Claudiu Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, Jonathan Robert Stanton, Thomas Tantillo, Yair Amir

Structured Overlay Networks for a New Generation of Internet Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast and Flexible Networking for Message-Oriented Middleware

Lars Kroll, Alexandru A. Ormenisan, Jim Dowling

Fast and Flexible Networking for Message-Oriented Middleware

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Optimal Resource Allocation for Multi-user Video Streaming over mmWave Networks

Zhifeng He, Shiwen Mao

Optimal Resource Allocation for Multi-user Video Streaming over mmWave Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A General Purpose Testbed for Mobile Data Gathering in Wireless Sensor Networks and a Case Study

Ji Li, Cong Wang, Yuanyuan Yang

A General Purpose Testbed for Mobile Data Gathering in Wireless Sensor Networks and a Case Study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incremental Elasticity for NoSQL Data Stores

Antonis Papaioannou, Kostas Magoutis

Incremental Elasticity for NoSQL Data Stores

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Adversary-Centric Behavior Modeling of DDoS Attacks

An Wang, Aziz Mohaisen, Songqing Chen

An Adversary-Centric Behavior Modeling of DDoS Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Straggler Mitigation for Distributed Behavioral Simulation

Eman Bin Khunayn, Shanika Karunasekera, Hairuo Xie, Kotagiri Ramamohanarao

Straggler Mitigation for Distributed Behavioral Simulation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a RISC Framework for Efficient Contextualisation in the IoT

Dimitrios Georgakopoulos, Ali Yavari, Prem Prakash Jayaraman, Rajiv Ranjan

Towards a RISC Framework for Efficient Contextualisation in the IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information

Self-Evolving Subscriptions for Content-Based Publish/Subscribe Systems

César Cañas, Kaiwen Zhang, Bettina Kemme, Jörg Kienzle, Hans-Arno Jacobsen

Self-Evolving Subscriptions for Content-Based Publish/Subscribe Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Feasibility of Inter-Domain Routing via a Small Broker Set

Dong Lin, David Shui Wing Hui, Weijie Wu, Tingwei Liu, Yating Yang, Yi Wang, John C. S. Lui, Gong Zhang, Yingtao Li

On the Feasibility of Inter-Domain Routing via a Small Broker Set

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Distributed Event-Centric Collaborative Workflows Development System for IoT Application

Yong-Yang Cheng, Shuai Zhao, Bo Cheng, Shou-lu Hou, Xiulei Zhang, Junliang Chen

A Distributed Event-Centric Collaborative Workflows Development System for IoT Application

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rain or Shine? - Making Sense of Cloudy Reliability Data

Iyswarya Narayanan, Bikash Sharma, Di Wang, Sriram Govindan, Laura Caulfield, Anand Sivasubramaniam, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid

Rain or Shine? - Making Sense of Cloudy Reliability Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dependable Cloud Resources with Guardian

Bara Abusalah, Derek Schatzlein, Julian James Stephen, Masoud Saeida Ardekani, Patrick Eugster

Dependable Cloud Resources with Guardian

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supporting Resource Control for Actor Systems in Akka

Ahmed Abdel Moamen, Dezhong Wang, Nadeem Jamali

Supporting Resource Control for Actor Systems in Akka

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Data Parallelism of Erasure Coding in Distributed Storage Systems

Jun Li, Baochun Li

On Data Parallelism of Erasure Coding in Distributed Storage Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

CRESON: Callable and Replicated Shared Objects over NoSQL

Pierre Sutra, Etienne Riviere, Cristian Cotes, Marc Sánchez Artigas, Pedro García López, Emmanuel Bernard, William Burns, Galder Zamarreno

CRESON: Callable and Replicated Shared Objects over NoSQL

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds

Lin Wang, Lei Jiao, Jun Li, Max Mühlhäuser

Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incentive Mechanism for Data-Centric Message Delivery in Delay Tolerant Networks

Himanshu Jethawa, Sanjay Madria

Incentive Mechanism for Data-Centric Message Delivery in Delay Tolerant Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

TagBreathe: Monitor Breathing with Commodity RFID Systems

Yuxiao Hou, Yanwen Wang, Yuanqing Zheng

TagBreathe: Monitor Breathing with Commodity RFID Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Limits of Subsampling of Location Traces

Mudhakar Srivatsa, Raghu K. Ganti, Prasant Mohapatra

On the Limits of Subsampling of Location Traces

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Z-Order Encoding Based Multi-Modal Data Compression in WSNs

Xiaofei Cao, Sanjay Kumar Madria, Takahiro Hara

Efficient Z-Order Encoding Based Multi-Modal Data Compression in WSNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction

Peng Xu, Jinyang Li, Xiaoshan Sun, Wei Zheng, Hengchang Liu

Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay Reduction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies

Zhongjie Ba, Kui Ren

Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing

Tong Li, Chathura M. Sarathchandra Magurawalage, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang

On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization

Qixia Zhang, Yikai Xiao, Fangming Liu, John C. S. Lui, Jian Guo, Tao Wang

Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scaling k-Nearest Neighbours Queries (The Right Way)

Atoshum Cahsai, Nikos Ntarmos, Christos Anagnostopoulos, Peter Triantafillou

Scaling k-Nearest Neighbours Queries (The Right Way)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a Complete Virtual Data Center Embedding Algorithm Using Hybrid Strategy

Malayam Parambath Gilesh, S. D. Madhu Kumar, Lillykutty Jacob, Umesh Bellur

Towards a Complete Virtual Data Center Embedding Algorithm Using Hybrid Strategy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cachier: Edge-Caching for Recognition Applications

Utsav Drolia, Katherine Guo, Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan

Cachier: Edge-Caching for Recognition Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks

Derek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Parallelizing Big De Bruijn Graph Construction on Heterogeneous Processors

Shuang Qiu, Qiong Luo

Parallelizing Big De Bruijn Graph Construction on Heterogeneous Processors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mechanism Design for Mobile Crowdsensing with Execution Uncertainty

Zhenzhe Zheng, Zhaoxiong Yang, Fan Wu, Guihai Chen

Mechanism Design for Mobile Crowdsensing with Execution Uncertainty

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic Control of Flow Completion Time for Power Efficiency of Data Center Networks

Kuangyu Zheng, Xiaorui Wang

Dynamic Control of Flow Completion Time for Power Efficiency of Data Center Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scaling and Load Testing Location-Based Publish and Subscribe

Bertil Chapuis, Benoît Garbinato

Scaling and Load Testing Location-Based Publish and Subscribe

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Strong Link Graph for Enhancing Sybil Defenses

Suhendry Effendy, Roland H. C. Yap

The Strong Link Graph for Enhancing Sybil Defenses

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust Multi-tenant Server Consolidation in the Cloud for Data Analytics Workloads

Joseph Mate, Khuzaima Daudjee, Shahin Kamali

Robust Multi-tenant Server Consolidation in the Cloud for Data Analytics Workloads

Details
Discussion Comments: 0
Verification: Authors have not verified information

Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems

Yanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren

Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reachability in Binary Multithreaded Programs Is Polynomial

Alexander Malkis, Steffen Borgwardt

Reachability in Binary Multithreaded Programs Is Polynomial

Details
Discussion Comments: 0
Verification: Authors have not verified information

Learn-as-You-Go with Megh: Efficient Live Migration of Virtual Machines

Debabrota Basu, Xiayang Wang, Yang Hong, Haibo Chen, Stéphane Bressan

Learn-as-You-Go with Megh: Efficient Live Migration of Virtual Machines

Details
Discussion Comments: 0
Verification: Authors have not verified information