IEEE Conference on Computer Communications, INFOCOM 2015


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Truthful online double auctions for dynamic mobile crowdsourcing

Yueming Wei, Yanmin Zhu, Hongzi Zhu, Qian Zhang, Guangtao Xue

Truthful online double auctions for dynamic mobile crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Steering with eyes closed: Mm-Wave beam steering without in-band measurement

Thomas Nitsche, Adriana B. Flores, Edward W. Knightly, Joerg Widmer

Steering with eyes closed: Mm-Wave beam steering without in-band measurement

Details
Discussion Comments: 0
Verification: Authors have not verified information

When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response

Zhi Zhou, Fangming Liu, Zongpeng Li, Hai Jin

When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal secondary user packet size in mobile cognitive radio networks under fading channels

Yi Song

Optimal secondary user packet size in mobile cognitive radio networks under fading channels

Details
Discussion Comments: 0
Verification: Author has not verified information

Efficient secure outsourcing of large-scale linear systems of equations

Sergio Salinas, Changqing Luo, Xuhui Chen, Pan Li

Efficient secure outsourcing of large-scale linear systems of equations

Details
Discussion Comments: 0
Verification: Authors have not verified information

A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioning

Xiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau

A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adversary-aware IP address randomization for proactive agility against sophisticated attackers

Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan

Adversary-aware IP address randomization for proactive agility against sophisticated attackers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting distributed signature-based intrusion: The case of multi-path routing attacks

Jiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo

Detecting distributed signature-based intrusion: The case of multi-path routing attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Forming external behaviors by leveraging internal opinions

AmirMahdi Ahmadinejad, Sina Dehghani, MohammadTaghi Hajiaghayi, Hamid Mahini, Saeed Seddighin, Sadra Yazdanbod

Forming external behaviors by leveraging internal opinions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving learning and adaptation in security games by exploiting information asymmetry

Xiaofan He, Huaiyu Dai, Peng Ning

Improving learning and adaptation in security games by exploiting information asymmetry

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cracking network monitoring in DCNs with SDN

Zhiming Hu, Jun Luo

Cracking network monitoring in DCNs with SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading

Ozlem Bilgir Yetim, Margaret Martonosi

Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems

Dora Spenza, Michele Magno, Stefano Basagni, Luca Benini, Mario Paoli, Chiara Petrioli

Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the progressive spread over strategic diffusion: Asymptotic and computation

Jungseul Ok, Jinwoo Shin, Yung Yi

On the progressive spread over strategic diffusion: Asymptotic and computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Low-complexity multi-resource packet scheduling for network function virtualization

Xin Li, Chen Qian

Low-complexity multi-resource packet scheduling for network function virtualization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Priority queueing with multiple packet characteristics

Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan

Priority queueing with multiple packet characteristics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust geometric forest routing with tunable load balancing

Rein Houthooft, Sahel Sahhaf, Wouter Tavernier, Filip De Turck, Didier Colle, Mario Pickavet

Robust geometric forest routing with tunable load balancing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Latency-aware rate adaptation in 802.11n home networks

Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra

Latency-aware rate adaptation in 802.11n home networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A new paradigm for multiflow in wireless networks: Theory and applications

Peng-Jun Wan, Boliu Xu, Lei Wang, Sai Ji, Ophir Frieder

A new paradigm for multiflow in wireless networks: Theory and applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Human object estimation via backscattered radio frequency signal

Han Ding, Jinsong Han, Alex X. Liu, Jizhong Zhao, Panlong Yang, Wei Xi, Zhiping Jiang

Human object estimation via backscattered radio frequency signal

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling TDMA for today's wireless LANs

Zhice Yang, Jiansong Zhang, Kun Tan, Qian Zhang, Yongguang Zhang

Enabling TDMA for today's wireless LANs

Details
Discussion Comments: 0
Verification: Authors have not verified information

De-anonymizing scale-free social networks by percolation graph matching

Carla-Fabiana Chiasserini, Michele Garetto, Emilio Leonardi

De-anonymizing scale-free social networks by percolation graph matching

Details
Discussion Comments: 0
Verification: Authors have not verified information

An online procurement auction for power demand response in storage-assisted smart grids

Ruiting Zhou, Zongpeng Li, Chuan Wu

An online procurement auction for power demand response in storage-assisted smart grids

Details
Discussion Comments: 0
Verification: Authors have not verified information

Game-theory-based batch identification of invalid signatures in wireless mobile networks

Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du

Game-theory-based batch identification of invalid signatures in wireless mobile networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed algorithms for content allocation in interconnected content distribution networks

Valentino Pacifici, György Dán

Distributed algorithms for content allocation in interconnected content distribution networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Capacity analysis of hybrid wireless networks with long-range social contacts behavior

Ronghui Hou, Yu Cheng, Jiandong Li, Min Sheng, King-Shan Lui

Capacity analysis of hybrid wireless networks with long-range social contacts behavior

Details
Discussion Comments: 0
Verification: Authors have not verified information

Information sharing in distributed stochastic bandits

Swapna Buccapatnam, Jian Tan, Li Zhang

Information sharing in distributed stochastic bandits

Details
Discussion Comments: 0
Verification: Authors have not verified information

High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility

Zongjian He, Jiannong Cao, Xuefeng Liu

High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility

Details
Discussion Comments: 0
Verification: Authors have not verified information

Outsourcing coordination and management of home wireless access points through an open API

Ashish Patro, Suman Banerjee

Outsourcing coordination and management of home wireless access points through an open API

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network

Zhao Zhang, Yishuo Shi

Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network

Details
Discussion Comments: 0
Verification: Authors have not verified information

The (surprising) computational power of the SDN data plane

Calvin Newport, Wenchao Zhou

The (surprising) computational power of the SDN data plane

Details
Discussion Comments: 0
Verification: Authors have not verified information

Noise-tolerant localization from incomplete range measurements for wireless sensor networks

Fu Xiao, Chaoheng Sha, Lei Chen, Lijuan Sun, Ruchuan Wang

Noise-tolerant localization from incomplete range measurements for wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform

Pengfei Zhang, Xi Li, Rui Chu, Huaimin Wang

HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform

Details
Discussion Comments: 0
Verification: Authors have not verified information

Can web pages be classified using anonymized TCP/IP headers?

Sean Sanders, Jasleen Kaur

Can web pages be classified using anonymized TCP/IP headers?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Video acuity assessment in mobile devices

Eilwoo Baik, Amit Pande, Chris Stover, Prasant Mohapatra

Video acuity assessment in mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing home wireless performance: The gateway view

Ioannis Pefkianakis, Henrik Lundgren, Augustin Soule, Jaideep Chandrashekar, Pascal Le Guyadec, Christophe Diot, Martin May, Karel Van Doorselaer, Koen Van Oost

Characterizing home wireless performance: The gateway view

Details
Discussion Comments: 0
Verification: Authors have not verified information

Congestion-aware single link failure recovery in hybrid SDN networks

Cing-yu Chu, Kang Xi, Min Luo, H. Jonathan Chao

Congestion-aware single link failure recovery in hybrid SDN networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Least recently used caches under the Shot Noise Model

Emilio Leonardi, Giovanni Luca Torrisi

Least recently used caches under the Shot Noise Model

Details
Discussion Comments: 0
Verification: Authors have not verified information

On sample-path staleness in lazy data replication

Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov

On sample-path staleness in lazy data replication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable clock synchronization in wireless networks with low-duty-cycle radio operations

Hao Huang, Jihoon Yun, Ziguo Zhong

Scalable clock synchronization in wireless networks with low-duty-cycle radio operations

Details
Discussion Comments: 0
Verification: Authors have not verified information

ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement

Bo Wang, Jinlei Jiang, Guangwen Yang

ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Local detection of infections in heterogeneous networks

Chris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai

Local detection of infections in heterogeneous networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On setting-up asynchronous ad hoc wireless networks

Tomasz Jurdzinski, Dariusz R. Kowalski, Michal Rózanski, Grzegorz Stachowiak

On setting-up asynchronous ad hoc wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimum connected dominating set construction in wireless networks under the beeping model

Jiguo Yu, Lili Jia, Dongxiao Yu, Guangshun Li, Xiuzhen Cheng

Minimum connected dominating set construction in wireless networks under the beeping model

Details
Discussion Comments: 0
Verification: Authors have not verified information

WINET: Indoor white space network design

Jincheng Zhang, Wenjie Zhang, Minghua Chen, Zhi Wang

WINET: Indoor white space network design

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal multicast in dense multi-channel multi-radio wireless networks

Rahul Urgaonkar, Prithwish Basu, Saikat Guha, Ananthram Swami

Optimal multicast in dense multi-channel multi-radio wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Differentially private and strategy-proof spectrum auction with approximate revenue maximization

Ruihao Zhu, Kang G. Shin

Differentially private and strategy-proof spectrum auction with approximate revenue maximization

Details
Discussion Comments: 0
Verification: Authors have not verified information

All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend mode

Ge Peng, Gang Zhou, David T. Nguyen, Xin Qi

All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend mode

Details
Discussion Comments: 0
Verification: Authors have not verified information

Location-aware associated data placement for geo-distributed data-intensive applications

Boyang Yu, Jianping Pan

Location-aware associated data placement for geo-distributed data-intensive applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the impossibility of efficient self-stabilization in virtual overlays with churn

Stefanie Roos, Thorsten Strufe

On the impossibility of efficient self-stabilization in virtual overlays with churn

Details
Discussion Comments: 0
Verification: Authors have not verified information

Routing in accumulative multi-hop networks

Jesús Gómez-Vilardebó

Routing in accumulative multi-hop networks

Details
Discussion Comments: 0
Verification: Author has not verified information

WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture

Kai Chen, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen Hu, Qunfeng Dong

WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

SMOC: A secure mobile cloud computing platform

Zijiang Hao, Yutao Tang, Yifan Zhang, Edmund Novak, Nancy Carter, Qun Li

SMOC: A secure mobile cloud computing platform

Details
Discussion Comments: 0
Verification: Authors have not verified information

The online disjoint set cover problem and its applications

Ashwin Pananjady, Vivek Kumar Bagaria, Rahul Vaze

The online disjoint set cover problem and its applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient analysis of caching strategies under dynamic content popularity

Michele Garetto, Emilio Leonardi, Stefano Traverso

Efficient analysis of caching strategies under dynamic content popularity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tags

Qiongzheng Lin, Lei Yang, Yuxin Sun, Tianci Liu, Xiang-Yang Li, Yunhao Liu

Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems

Shusen Yang, Usman Adeel, Julie A. McCann

Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Accelerating regular expression matching over compressed HTTP

Michela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral

Accelerating regular expression matching over compressed HTTP

Details
Discussion Comments: 0
Verification: Authors have not verified information

PPER: Privacy-preserving economic-robust spectrum auction in wireless networks

Ming Li, Pan Li, Linke Guo, Xiaoxia Huang

PPER: Privacy-preserving economic-robust spectrum auction in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A correlated shadowing model for urban wireless networks

François Baccelli, Xinchen Zhang

A correlated shadowing model for urban wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Assessing attack vulnerability in networks with uncertainty

Thang N. Dinh, My T. Thai

Assessing attack vulnerability in networks with uncertainty

Details
Discussion Comments: 0
Verification: Authors have not verified information

A distributed and robust SDN control plane for transactional network updates

Marco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid

A distributed and robust SDN control plane for transactional network updates

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast RFID grouping protocols

Jia Liu, Bin Xiao, Shigang Chen, Feng Zhu, Lijun Chen

Fast RFID grouping protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Interference alignment using shadow channel

Bo Chen, Vivek Yenamandra, Kannan Srinivasan

Interference alignment using shadow channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supporting WiFi and LTE co-existence

Sangki Yun, Lili Qiu

Supporting WiFi and LTE co-existence

Details
Discussion Comments: 0
Verification: Authors have not verified information

On end-to-end delay minimization in wireless networks under the physical interference model

Yuan Li, Antonio Capone, Di Yuan

On end-to-end delay minimization in wireless networks under the physical interference model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fault-tolerant coverage with maximum lifetime in wireless sensor networks

James Willson, Zhao Zhang, Weili Wu, Ding-Zhu Du

Fault-tolerant coverage with maximum lifetime in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Femto-matching: Efficient traffic offloading in heterogeneous cellular networks

Wei Wang, Xiaobing Wu, Lei Xie, Sanglu Lu

Femto-matching: Efficient traffic offloading in heterogeneous cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

TimeFlip: Scheduling network updates with timestamp-based TCAM ranges

Tal Mizrahi, Ori Rottenstreich, Yoram Moses

TimeFlip: Scheduling network updates with timestamp-based TCAM ranges

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling randomized data streams in caching, data processing, and crawling applications

Sarker Tanzir Ahmed, Dmitri Loguinov

Modeling randomized data streams in caching, data processing, and crawling applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stochastic and fluid index policies for resource allocation problems

Maialen Larrañaga, Urtzi Ayesta, Ina Maria Verloop

Stochastic and fluid index policies for resource allocation problems

Details
Discussion Comments: 0
Verification: Authors have not verified information

TSearch: Target-oriented low-delay node searching in DTNs with social network properties

Li Yan, Haiying Shen, Kang Chen

TSearch: Target-oriented low-delay node searching in DTNs with social network properties

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fundamental limits of RSS fingerprinting based indoor localization

Yutian Wen, Xiaohua Tian, Xinbing Wang, Songwu Lu

Fundamental limits of RSS fingerprinting based indoor localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Composite event coverage in wireless sensor networks with heterogeneous sensors

Jing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao

Composite event coverage in wireless sensor networks with heterogeneous sensors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate control

Zhangyu Guan, Giuseppe Enrico Santagati, Tommaso Melodia

Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate control

Details
Discussion Comments: 0
Verification: Authors have not verified information

What is wrecking your data plan? A measurement study of mobile web overhead

Abner Mendoza, Kapil Singh, Guofei Gu

What is wrecking your data plan? A measurement study of mobile web overhead

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability

Yuben Qu, Chao Dong, Haipeng Dai, Fan Wu, Shaojie Tang, Hai Wang, Chang Tian

Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability

Details
Discussion Comments: 0
Verification: Authors have not verified information

ITSEC: An information-theoretically secure framework for truthful spectrum auctions

Zhili Chen, Liusheng Huang, Lin Chen

ITSEC: An information-theoretically secure framework for truthful spectrum auctions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance analysis for two-tier cellular systems based on probabilistic distance models

Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan

Performance analysis for two-tier cellular systems based on probabilistic distance models

Details
Discussion Comments: 0
Verification: Authors have not verified information

Differentially private publication of general time-serial trajectory data

Jingyu Hua, Yue Gao, Sheng Zhong

Differentially private publication of general time-serial trajectory data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing

Mohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. S. Eugene Ng, Sanjay G. Rao

Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing

Details
Author Comments: The paper motivated and shaped the creation of a cloud computing benchmark driven by Burstorm Inc.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems

Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin

TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Construction of simple graphs with a target joint degree matrix and beyond

Minas Gjoka, Balint Tillman, Athina Markopoulou

Construction of simple graphs with a target joint degree matrix and beyond

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks

Qiao Xiang, Xi Chen, Linghe Kong, Lei Rao, Xue Liu

Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer

Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria

ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer

Details
Discussion Comments: 0
Verification: Authors have not verified information

Temporal update dynamics under blind sampling

Xiaoyong Li, Daren B. H. Cline, Dmitri Loguinov

Temporal update dynamics under blind sampling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crowdsensing Under (Soft) Control

John P. Rula, Fabián E. Bustamante

Crowdsensing Under (Soft) Control

Details
Discussion Comments: 0
Verification: Authors have not verified information

End-to-end scheduling for all-optical data centers

Chang-Heng Wang, Tara Javidi, George Porter

End-to-end scheduling for all-optical data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fusing noisy fingerprints with distance bounds for indoor localization

Suining He, S.-H. Gary Chan, Lei Yu, Ning Liu

Fusing noisy fingerprints with distance bounds for indoor localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient broadcast on fragmented spectrum in cognitive radio networks

Pei Huang, Chin-Jung Liu, Xi Yang, Li Xiao

Efficient broadcast on fragmented spectrum in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

More load, more differentiation - A design principle for deadline-aware congestion control

Han Zhang, Xingang Shi, Xia Yin, Fengyuan Ren, Zhiliang Wang

More load, more differentiation - A design principle for deadline-aware congestion control

Details
Discussion Comments: 0
Verification: Authors have not verified information

SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang, Chi Zhang

SpecGuard: Spectrum misuse detection in dynamic spectrum access systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance analysis for overflow loss systems of processor-sharing queues

Yin-Chi Chan, Jun Guo, Eric W. M. Wong, Moshe Zukerman

Performance analysis for overflow loss systems of processor-sharing queues

Details
Discussion Comments: 0
Verification: Authors have not verified information

iSelf: Towards cold-start emotion labeling using transfer learning with smartphones

Boyuan Sun, Qiang Ma, Shanfeng Zhang, Kebin Liu, Yunhao Liu

iSelf: Towards cold-start emotion labeling using transfer learning with smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

A-DCF: Design and implementation of delay and queue length based wireless MAC

Hojin Lee, Sangwoo Moon, Yung Yi

A-DCF: Design and implementation of delay and queue length based wireless MAC

Details
Discussion Comments: 0
Verification: Authors have not verified information

Contextual-code: Simplifying information pulling from targeted sources in physical world

Yang Tian, Kaigui Bian, Guobin Shen, Xiaochen Liu, Xiaoguang Li, Thomas Moscibroda

Contextual-code: Simplifying information pulling from targeted sources in physical world

Details
Discussion Comments: 0
Verification: Authors have not verified information

A cloudlet-based multi-lateral resource exchange framework for mobile users

Yu Wu, Lei Ying

A cloudlet-based multi-lateral resource exchange framework for mobile users

Details
Discussion Comments: 0
Verification: Authors have not verified information

P3: Joint optimization of charger placement and power allocation for wireless power transfer

Sheng Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu

P3: Joint optimization of charger placement and power allocation for wireless power transfer

Details
Discussion Comments: 0
Verification: Authors have not verified information

A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks

Jiajia Liu, Shangwei Zhang, Hiroki Nishiyama, Nei Kato, Jun Guo

A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks

Laura Galluccio, Sebastiano Milardo, Giacomo Morabito, Sergio Palazzo

SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the efficiency of social recommender networks

Felix Ming Fai Wong, Zhenming Liu, Mung Chiang

On the efficiency of social recommender networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust optimization of cognitive radio networks powered by energy harvesting

Shimin Gong, Lingjie Duan, Ping Wang

Robust optimization of cognitive radio networks powered by energy harvesting

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs

Jun Duan, Zhiyang Guo, Yuanyuan Yang

Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Persistence and availability of floating content in a campus environment

Shahzad Ali, Gianluca Rizzo, Vincenzo Mancuso, Marco Ajmone Marsan

Persistence and availability of floating content in a campus environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Price of fairness for opportunistic and priority schedulers

Malhar Mehta, Veeraruna Kavitha, Nandyala Hemachandra

Price of fairness for opportunistic and priority schedulers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fine-grained data sharing in cloud computing for mobile devices

Jun Shao, Rongxing Lu, Xiaodong Lin

Fine-grained data sharing in cloud computing for mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Copula analysis for statistical network calculus

Fang Dong, Kui Wu, S. Venkatesh

Copula analysis for statistical network calculus

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Joint sensing task and subband allocation for large-scale spectrum profiling

Dong-Hoon Shin, Shibo He, Junshan Zhang

Joint sensing task and subband allocation for large-scale spectrum profiling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fingerprint-free tracking with dynamic enhanced field division

Qingquan Zhang, Ziqiao Zhou, Wei Xu, Jing Qi, Chenxi Guo, Ping Yi, Ting Zhu, Sheng Xiao

Fingerprint-free tracking with dynamic enhanced field division

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework

Shu Wang, Vignesh Venkateswaran, Xinyu Zhang

Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hermes: Latency optimal task assignment for resource-constrained mobile computing

Yi-Hsuan Kao, Bhaskar Krishnamachari, Moo-Ryong Ra, Fan Bai

Hermes: Latency optimal task assignment for resource-constrained mobile computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Agile virtualized infrastructure to proactively defend against cyber attacks

Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura

Agile virtualized infrastructure to proactively defend against cyber attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Capturing resource tradeoffs in fair multi-resource allocation

Doron Zarchy, David Hay, Michael Schapira

Capturing resource tradeoffs in fair multi-resource allocation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal communication structures for big data aggregation

William Culhane, Kirill Kogan, Chamikara Jayalath, Patrick Eugster

Optimal communication structures for big data aggregation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches

Danfeng Shan, Wanchun Jiang, Fengyuan Ren

Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches

Details
Discussion Comments: 0
Verification: Authors have not verified information

JITScope: Protecting web users from control-flow hijacking attacks

Chao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song

JITScope: Protecting web users from control-flow hijacking attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the performance of successive interference cancellation in D2D-enabled cellular networks

Chuan Ma, Weijie Wu, Ying Cui, Xinbing Wang

On the performance of successive interference cancellation in D2D-enabled cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Boosting sensor network calculus by thoroughly bounding cross-traffic

Steffen Bondorf, Jens B. Schmitt

Boosting sensor network calculus by thoroughly bounding cross-traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information

ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission

Philipp Kindt, Han Jing, Nadja Peters, Samarjit Chakraborty

ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission

Details
Discussion Comments: 0
Verification: Authors have not verified information

Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild

Muhammad Shahzad, Alex X. Liu

Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild

Details
Discussion Comments: 0
Verification: Authors have not verified information

ADMM based algorithm for eICIC configuration in heterogeneous cellular networks

Hao Zhou, Yusheng Ji, Xiaoyan Wang, Baohua Zhao

ADMM based algorithm for eICIC configuration in heterogeneous cellular networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive online power-management for Bluetooth Low Energy

Philipp Kindt, Daniel Yunge, Mathias Gopp, Samarjit Chakraborty

Adaptive online power-management for Bluetooth Low Energy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics

Jiasi Chen, Mung Chiang, Jeffrey Erman, Guangzhi Li, K. K. Ramakrishnan, Rakesh K. Sinha

Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Trajectory aware macro-cell planning for mobile users

Shubhadip Mitra, Sayan Ranu, Vinay Kolar, Aditya Telang, Arnab Bhattacharya, Ravi Kokku, Sriram Raghavan

Trajectory aware macro-cell planning for mobile users

Details
Discussion Comments: 0
Verification: Authors have not verified information

On 2-way neighbor discovery in wireless networks with directional antennas

Hao Cai, Tilman Wolf

On 2-way neighbor discovery in wireless networks with directional antennas

Details
Discussion Comments: 0
Verification: Authors have not verified information

BFAST: Unified and scalable index for NDN forwarding architecture

Huichen Dai, Jianyuan Lu, Yi Wang, Bin Liu

BFAST: Unified and scalable index for NDN forwarding architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measurement and modeling of user transitioning among networks

Sookhyun Yang, Jim Kurose, Simon Heimlicher, Arun Venkataramani

Measurement and modeling of user transitioning among networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

User recruitment for mobile crowdsensing over opportunistic networks

Merkourios Karaliopoulos, Orestis Telelis, Iordanis Koutsopoulos

User recruitment for mobile crowdsensing over opportunistic networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quantized conflict graphs for wireless network optimization

Yanchao Zhao, Wenzhong Li, Jie Wu, Sanglu Lu

Quantized conflict graphs for wireless network optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

UbiFlow: Mobility management in urban-scale software defined IoT

Di Wu, Dmitri I. Arkhipov, Eskindir Asmare, Zhijing Qin, Julie A. McCann

UbiFlow: Mobility management in urban-scale software defined IoT

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-aware video streaming on smartphones

Wenjie Hu, Guohong Cao

Energy-aware video streaming on smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secondary markets for mobile data: Feasibility and benefits of traded data plans

Liang Zheng, Carlee Joe-Wong, Chee Wei Tan, Sangtae Ha, Mung Chiang

Secondary markets for mobile data: Feasibility and benefits of traded data plans

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs

Michael J. Neely

Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs

Details
Discussion Comments: 0
Verification: Author has not verified information

TagBooth: Deep shopping data acquisition powered by RFID tags

Tianci Liu, Lei Yang, Xiang-Yang Li, Huaiyi Huang, Yunhao Liu

TagBooth: Deep shopping data acquisition powered by RFID tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the efficiency-optimal Markov chains for distributed networking applications

Chul-Ho Lee, Do Young Eun

On the efficiency-optimal Markov chains for distributed networking applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs

Chen Wang, Hongbo Jiang

SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing

Xiaoli Wang, Jiasi Chen, Aveek Dutta, Mung Chiang

Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Chirp signal-based aerial acoustic communication for smart devices

Hyewon Lee, Tae Hyun Kim, Jun Won Choi, Sunghyun Choi

Chirp signal-based aerial acoustic communication for smart devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Real-time failure prediction in online services

Mohammed Shatnawi, Mohamed Hefeeda

Real-time failure prediction in online services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?

Maria Rosário de Oliveira, João C. Neves, Rui Valadas, Paulo Salvador

Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimizing the maximum sensor movement for barrier coverage in the plane

Shuangjuan Li, Hong Shen

Minimizing the maximum sensor movement for barrier coverage in the plane

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tapping into the router's unutilized processing power

Marat Radan, Isaac Keslassy

Tapping into the router's unutilized processing power

Details
Discussion Comments: 0
Verification: Authors have not verified information

Power-throughput tradeoffs of 802.11n/ac in smartphones

Swetank Kumar Saha, Pratik Deshpande, Pranav P. Inamdar, Ramanujan K. Sheshadri, Dimitrios Koutsonikolas

Power-throughput tradeoffs of 802.11n/ac in smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timely video popularity forecasting based on social networks

Jie Xu, Mihaela van der Schaar, Jiangchuan Liu, Haitao Li

Timely video popularity forecasting based on social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimum control latency of dynamic networks

Weiguo Dai, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Francis C. M. Lau

Minimum control latency of dynamic networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Providing long-term participation incentive in participatory sensing

Lin Gao, Fen Hou, Jianwei Huang

Providing long-term participation incentive in participatory sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

iPath: Intelligent and optimal path selection for Byzantine fault tolerant communication

Shehla S. Rana, Nitin H. Vaidya

iPath: Intelligent and optimal path selection for Byzantine fault tolerant communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

On multiplexing flows: Does it hurt or not?

Florin Ciucu, Felix Poloczek

On multiplexing flows: Does it hurt or not?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling in wireless networks with full-duplex cut-through transmission

Yang Yang, Ness B. Shroff

Scheduling in wireless networks with full-duplex cut-through transmission

Details
Discussion Comments: 0
Verification: Authors have not verified information

VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks

Chao Kong, Zengwen Yuan, Xushen Han, Feng Yang, Xinbing Wang, Tao Wang, Songwu Lu

VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Static power of mobile devices: Self-updating radio maps for wireless indoor localization

Chenshu Wu, Zheng Yang, Chaowei Xiao, Chaofan Yang, Yunhao Liu, Mingyan Liu

Static power of mobile devices: Self-updating radio maps for wireless indoor localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting large system dynamics for designing simple data center schedulers

Yousi Zheng, Ness B. Shroff, R. Srikant, Prasun Sinha

Exploiting large system dynamics for designing simple data center schedulers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networks

Jae-Han Lim, Katsuhiro Naito, Ji-Hoon Yun, Mario Gerla

Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Personalized location privacy in mobile networks: A social group utility approach

Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang

Personalized location privacy in mobile networks: A social group utility approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-efficient heuristics for job assignment in processor-sharing server farms

Jing Fu, Jun Guo, Eric W. M. Wong, Moshe Zukerman

Energy-efficient heuristics for job assignment in processor-sharing server farms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Socially-optimal online spectrum auctions for secondary wireless communication

Hongxing Li, Chuan Wu, Zongpeng Li

Socially-optimal online spectrum auctions for secondary wireless communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical mixture model for large-scale RTT measurements

Romain Fontugne, Johan Mazel, Kensuke Fukuda

An empirical mixture model for large-scale RTT measurements

Details
Discussion Comments: 0
Verification: Authors have not verified information

WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips

Feiyang Liu, Haibo Zhang, Yawen Chen, Zhiyi Huang, Huaxi Gu

WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips

Details
Discussion Comments: 0
Verification: Authors have not verified information

VeRV: A temporal and data-concerned verification framework for the vehicle bus systems

Shuo Zhang, Fei He, Ming Gu

VeRV: A temporal and data-concerned verification framework for the vehicle bus systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

WiGest: A ubiquitous WiFi-based gesture recognition system

Heba Abdelnasser, Moustafa Youssef, Khaled A. Harras

WiGest: A ubiquitous WiFi-based gesture recognition system

Details
Discussion Comments: 0
Verification: Authors have not verified information

Low-delay distributed source coding for time-varying sources with unknown statistics

Fangzhou Chen, Bin Li, Can Emre Koksal

Low-delay distributed source coding for time-varying sources with unknown statistics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networks

Lixin Wang, Peng-Jun Wan, Kyle Young

Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks

Zhuo Lu, Yalin Evren Sagduyu, Jason H. Li

Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the construction of maximum-quality aggregation trees in deadline-constrained WSNs

Bahram Alinia, Mohammad Hassan Hajiesmaili, Ahmad Khonsari

On the construction of maximum-quality aggregation trees in deadline-constrained WSNs

Details
Discussion Comments: 0
Verification: Authors have not verified information

A coded generalization of selective repeat ARQ

Jason Cloud, Douglas J. Leith, Muriel Médard

A coded generalization of selective repeat ARQ

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting mobile social behaviors for Sybil detection

Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen

Exploiting mobile social behaviors for Sybil detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Harmony: Content resolution for smart devices using acoustic channel

Mostafa Uddin, Tamer Nadeem

Harmony: Content resolution for smart devices using acoustic channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Need for speed: CORA scheduler for optimizing completion-times in the cloud

Zhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang

Need for speed: CORA scheduler for optimizing completion-times in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

PLACE: Physical layer cardinality estimation for large-scale RFID systems

Yuxiao Hou, Jiajue Ou, Yuanqing Zheng, Mo Li

PLACE: Physical layer cardinality estimation for large-scale RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

SmartEye: Real-time and efficient cloud image sharing for disaster environments

Yu Hua, Wenbo He, Xue Liu, Dan Feng

SmartEye: Real-time and efficient cloud image sharing for disaster environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

The importance of being earnest in crowdsourcing systems

Alberto Tarable, Alessandro Nordio, Emilio Leonardi, Marco Ajmone Marsan

The importance of being earnest in crowdsourcing systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

SIEVE: Scalable user grouping for large MU-MIMO systems

Wei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan

SIEVE: Scalable user grouping for large MU-MIMO systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flow-based feasibility test of linear interference alignment with arbitrary interference topology

Peng-Jun Wan, Fahad Al-dhelaan, Sai Ji, Lei Wang, Ophir Frieder

Flow-based feasibility test of linear interference alignment with arbitrary interference topology

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sampling online social networks via heterogeneous statistics

Xin Wang, Richard T. B. Ma, Yinlong Xu, Zhipeng Li

Sampling online social networks via heterogeneous statistics

Details
Discussion Comments: 0
Verification: Authors have not verified information

RFID cardinality estimation with blocker tags

Xiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi, Xin Xie

RFID cardinality estimation with blocker tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices

Yimin Chen, Jingchao Sun, Rui Zhang, Yanchao Zhang

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimized network traffic engineering using segment routing

Randeep Bhatia, Fang Hao, Murali S. Kodialam, T. V. Lakshman

Optimized network traffic engineering using segment routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

DPCP: A protocol for optimal pull coordination in decentralized social networks

Huanle Xu, Pili Hu, Wing Cheong Lau, Qiming Zhang, Yang Wu

DPCP: A protocol for optimal pull coordination in decentralized social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-efficient transmission with data sharing

Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo

Energy-efficient transmission with data sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the complexity of optimal routing and content caching in heterogeneous networks

Mostafa Dehghan, Anand Seetharam, Bo Jiang, Ting He, Theodoros Salonidis, Jim Kurose, Don Towsley, Ramesh K. Sitaraman

On the complexity of optimal routing and content caching in heterogeneous networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Original SYN: Finding machines hidden behind firewalls

Xu Zhang, Jeffrey Knockel, Jedidiah R. Crandall

Original SYN: Finding machines hidden behind firewalls

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stability

François Baccelli, Avhishek Chatterjee, Sriram Vishwanath

Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems

Linke Guo, Yuguang Fang, Ming Li, Pan Li

Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks

Rahul Singh, Xueying Guo, P. R. Kumar

Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

PhaseU: Real-time LOS identification with WiFi

Chenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu

PhaseU: Real-time LOS identification with WiFi

Details
Discussion Comments: 0
Verification: Authors have not verified information

OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement

Xuan Nam Nguyen, Damien Saucez, Chadi Barakat, Thierry Turletti

OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling repeating behaviors in packet arrivals: Detection and measurement

Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan

Modeling repeating behaviors in packet arrivals: Detection and measurement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ricci curvature of the Internet topology

Chien-Chun Ni, Yu-Yao Lin, Jie Gao, Xianfeng David Gu, Emil Saucan

Ricci curvature of the Internet topology

Details
Discussion Comments: 0
Verification: Authors have not verified information

A truthful incentive mechanism for emergency demand response in colocation data centers

Linquan Zhang, Shaolei Ren, Chuan Wu, Zongpeng Li

A truthful incentive mechanism for emergency demand response in colocation data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

CSMA k-SIC - A class of distributed MAC protocols and their performance evaluation

Abishek Sankararaman, François Baccelli

CSMA k-SIC - A class of distributed MAC protocols and their performance evaluation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling

Bang Liu, Di Niu, Zongpeng Li, H. Vicky Zhao

Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design

Lin Chen, Wei Wang, Hua Huang, Shan Lin

Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incentivize crowd labeling under budget constraint

Qi Zhang, Yutian Wen, Xiaohua Tian, Xiaoying Gan, Xinbing Wang

Incentivize crowd labeling under budget constraint

Details
Discussion Comments: 0
Verification: Authors have not verified information

VM-tracking: Visual-motion sensing integration for real-time human tracking

Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao

VM-tracking: Visual-motion sensing integration for real-time human tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dissecting packet loss in mobile broadband networks from the edge

Dziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein

Dissecting packet loss in mobile broadband networks from the edge

Details
Discussion Comments: 0
Verification: Authors have not verified information

Comprehensive understanding of TCP Incast problem

Wen Chen, Fengyuan Ren, Jing Xie, Chuang Lin, Kevin Yin, Fred Baker

Comprehensive understanding of TCP Incast problem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Speedup of information exchange using multiple channels in wireless ad hoc networks

Dongxiao Yu, Yuexuan Wang, Yu Yan, Jiguo Yu, Francis C. M. Lau

Speedup of information exchange using multiple channels in wireless ad hoc networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bits and coins: Supporting collaborative consumption of mobile internet

Dimitris Syrivelis, George Iosifidis, Dimosthenis Delimpasis, Konstantinos Chounos, Thanasis Korakis, Leandros Tassiulas

Bits and coins: Supporting collaborative consumption of mobile internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient resource scheduling for a secondary network in shared spectrum

Matthew A. Clark, Konstantinos Psounis

Efficient resource scheduling for a secondary network in shared spectrum

Details
Discussion Comments: 0
Verification: Authors have not verified information

Changing channel without strings: Coordination-free wideband spectrum adaptation

Wei Wang, Yingjie Victor Chen, Zeyu Wang, Jin Zhang, Kaishun Wu, Qian Zhang

Changing channel without strings: Coordination-free wideband spectrum adaptation

Details
Discussion Comments: 0
Verification: Authors have not verified information

CodeRepair: PHY-layer partial packet recovery without the pain

Jun Huang, Guoliang Xing, Jianwei Niu, Shan Lin

CodeRepair: PHY-layer partial packet recovery without the pain

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards 48-fold cabling complexity reduction in large flattened butterfly networks

Márton Csernai, Florin Ciucu, Ralf-Peter Braun, András Gulyás

Towards 48-fold cabling complexity reduction in large flattened butterfly networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Delay models in ethernet long-reach passive optical networks

Abhishek Dixit, Bart Lannoo, Didier Colle, Mario Pickavet, Piet Demeester

Delay models in ethernet long-reach passive optical networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Service-martingales: Theory and applications to the delay analysis of random access protocols

Felix Poloczek, Florin Ciucu

Service-martingales: Theory and applications to the delay analysis of random access protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost

Ari Arapostathis, Anup Biswas, Guodong Pang

Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the co-existence of distributed and centralized routing control-planes

Stefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever

On the co-existence of distributed and centralized routing control-planes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting causes and effects of wireless link correlation for better performance

Song Min Kim, Shuai Wang, Tian He

Exploiting causes and effects of wireless link correlation for better performance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data

Wenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality

Qiaomin Xie, Yi Lu

Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing throughput in optical networks: The joint routing and power control problem

Zizhong Cao, Paul Claisse, René-Jean Essiambre, Murali S. Kodialam, T. V. Lakshman

Optimizing throughput in optical networks: The joint routing and power control problem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A

Aifang Xu, Xiaonan Feng, Ye Tian

Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A

Details
Discussion Comments: 0
Verification: Authors have not verified information

Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective

Wei Bao, Ben Liang

Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Priority differentiation in cognitive radio networks

Jelena V. Misic, Md. Mizanur Rahman, Vojislav B. Misic

Priority differentiation in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sponsoring mobile data: An economic analysis of the impact on users and content providers

Carlee Joe-Wong, Sangtae Ha, Mung Chiang

Sponsoring mobile data: An economic analysis of the impact on users and content providers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference

Zhuo Lu, Cliff Wang

Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Virtual machine migration planning in software-defined networks

Huandong Wang, Yong Li, Ying Zhang, Depeng Jin

Virtual machine migration planning in software-defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Maximizing network capacity of MPR-capable wireless networks

Peng-Jun Wan, Fahad Al-dhelaan, Xiaohua Jia, Baowei Wang, Guowen Xing

Maximizing network capacity of MPR-capable wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

MOOC performance prediction via clickstream data and social learning networks

Christopher G. Brinton, Mung Chiang

MOOC performance prediction via clickstream data and social learning networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

When hybrid cloud meets flash crowd: Towards cost-effective service provisioning

Yipei Niu, Bin Luo, Fangming Liu, Jiangchuan Liu, Bo Li

When hybrid cloud meets flash crowd: Towards cost-effective service provisioning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Content caching and delivery over heterogeneous wireless networks

Jad Hachem, Nikhil Karamchandani, Suhas N. Diggavi

Content caching and delivery over heterogeneous wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crowdsourced live streaming over the cloud

Fei Chen, Cong Zhang, Feng Wang, Jiangchuan Liu

Crowdsourced live streaming over the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks

Wenchi Cheng, Xi Zhang, Hailin Zhang

Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distinct element counting in distributed dynamic data streams

Wenji Chen, Yong Guan

Distinct element counting in distributed dynamic data streams

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mode and user selection for multi-user MIMO WLANs without CSI

Narendra Anand, Jeongkeun Lee, Sung-Ju Lee, Edward W. Knightly

Mode and user selection for multi-user MIMO WLANs without CSI

Details
Discussion Comments: 0
Verification: Authors have not verified information

The collocation of measurement points in large open indoor environment

Kaikai Sheng, Zhicheng Gu, Xueyu Mao, Xiaohua Tian, Weijie Wu, Xiaoying Gan, Xinbing Wang

The collocation of measurement points in large open indoor environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Unveiling the adoption and cascading process of OSN-based gifting applications

Mohammad Rezaur Rahman, Jinyoung Han, Chen-Nee Chuah

Unveiling the adoption and cascading process of OSN-based gifting applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Blast: Accelerating high-performance data analytics applications by optical multicast

Yiting Xia, T. S. Eugene Ng, Xiaoye Steven Sun

Blast: Accelerating high-performance data analytics applications by optical multicast

Details
Discussion Comments: 0
Verification: Authors have not verified information

HybridCast: Joint multicast-unicast design for multiuser MIMO networks

Bo-Xian Wu, Kate Ching-Ju Lin, Kai-Cheng Hsu, Hung-Yu Wei

HybridCast: Joint multicast-unicast design for multiuser MIMO networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A behavior-aware profiling of handheld devices

Xuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos

A behavior-aware profiling of handheld devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

SPIRO: Turning elephants into mice with efficient RF transport

Eugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin

SPIRO: Turning elephants into mice with efficient RF transport

Details
Discussion Comments: 0
Verification: Authors have not verified information

Be responsible: A novel communications scheme for full-duplex MIMO radios

Diep N. Nguyen, Marwan Krunz

Be responsible: A novel communications scheme for full-duplex MIMO radios

Details
Discussion Comments: 0
Verification: Authors have not verified information

Generalized pattern matching string search on encrypted data in cloud systems

Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu

Generalized pattern matching string search on encrypted data in cloud systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimized layered integrated video encoding

Sangki Yun, Daehyeok Kim, Xiaofan Lu, Lili Qiu

Optimized layered integrated video encoding

Details
Discussion Comments: 0
Verification: Authors have not verified information

MadeCR: Correlation-based malware detection for cognitive radio

Yanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Danfeng (Daphne) Yao

MadeCR: Correlation-based malware detection for cognitive radio

Details
Discussion Comments: 0
Verification: Authors have not verified information

Redundancy control through traffic deduplication

Kien A. Hua, Ning Jiang, Jason Kuhns, Vaithiyanathan Sundaram, Cliff C. Zou

Redundancy control through traffic deduplication

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the accuracy of smartphone-based mobile network measurement

Weichao Li, Ricky K. P. Mok, Daoyuan Wu, Rocky K. C. Chang

On the accuracy of smartphone-based mobile network measurement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure

Fei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang

Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure

Details
Discussion Comments: 0
Verification: Authors have not verified information

Truthful incentive mechanisms for crowdsourcing

Xiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang

Truthful incentive mechanisms for crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online procurement auctions for resource pooling in client-assisted cloud storage systems

Jian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li

Online procurement auctions for resource pooling in client-assisted cloud storage systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Independent counter estimation buckets

Gil Einziger, Benny Fellman, Yaron Kassner

Independent counter estimation buckets

Details
Discussion Comments: 0
Verification: Authors have not verified information

FD2: A directional full duplex communication system for indoor wireless networks

Ehsan Aryafar, Alireza Keshavarz-Haddad

FD2: A directional full duplex communication system for indoor wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online scheduling for delayed mobile offloading

Han Deng, I-Hong Hou

Online scheduling for delayed mobile offloading

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Comprehensive understanding of operation cost reduction using energy storage for IDCs

Haihang Zhou, Jianguo Yao, Haibing Guan, Xue Liu

Comprehensive understanding of operation cost reduction using energy storage for IDCs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Provable fairness for TDMA scheduling

Marcin Bienkowski, Jaroslaw Byrka, Krzysztof Chrobak, Tomasz Jurdzinski, Dariusz R. Kowalski

Provable fairness for TDMA scheduling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustification

Shizhen Zhao, Xiaojun Lin, Minghua Chen

Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustification

Details
Discussion Comments: 0
Verification: Authors have not verified information

Off-path round trip time measurement via TCP/IP side channels

Geoffrey Alexander, Jedidiah R. Crandall

Off-path round trip time measurement via TCP/IP side channels

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fast optimal nonconcave resource allocation

Pan Lai, Rui Fan

Fast optimal nonconcave resource allocation

Details
Discussion Comments: 0
Verification: Authors have not verified information

A consensus-based approach for platooning with inter-vehicular communications

Stefania Santini, Alessandro Salvi, Antonio Saverio Valente, Antonio Pescapè, Michele Segata, Renato Lo Cigno

A consensus-based approach for platooning with inter-vehicular communications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

TCPRand: Randomizing TCP payload size for TCP fairness in data center networks

Soojeon Lee, Myungjin Lee, Dongman Lee, Hyungsoo Jung, Byoung-Sun Lee

TCPRand: Randomizing TCP payload size for TCP fairness in data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rate alteration attacks in smart grid

Subhankar Mishra, Xiang Li, Alan Kuhnle, My T. Thai, Jungtaek Seo

Rate alteration attacks in smart grid

Details
Discussion Comments: 0
Verification: Authors have not verified information

On optimal diversity in network-coding-based routing in wireless networks

Qiao Xiang, Hongwei Zhang, Jianping Wang, Guoliang Xing, Shan Lin, Xue Liu

On optimal diversity in network-coding-based routing in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

VINCE: Exploiting visible light sensing for smartphone-based NFC systems

Jianwei Niu, Fei Gu, Ruogu Zhou, Guoliang Xing, Wei Xiang

VINCE: Exploiting visible light sensing for smartphone-based NFC systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

RUSH: Routing and scheduling for hybrid data center networks

Kai Han, Zhiming Hu, Jun Luo, Liu Xiang

RUSH: Routing and scheduling for hybrid data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed network resource allocation for multi-tiered multimedia applications

Georgios Tychogiorgos, Athanasios Gkelias, Kin K. Leung

Distributed network resource allocation for multi-tiered multimedia applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Resisting three-dimensional manipulations in distributed wireless spectrum auctions

Dan Peng, Shuo Yang, Fan Wu, Guihai Chen, Shaojie Tang, Tie Luo

Resisting three-dimensional manipulations in distributed wireless spectrum auctions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliable multicast routing for software-defined networks

Shan-Hsiang Shen, Liang-Hao Huang, De-Nian Yang, Wen-Tsuen Chen

Reliable multicast routing for software-defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crowdsourcing with Tullock contests: A new perspective

Tie Luo, Salil S. Kanhere, Hwee-Pink Tan, Fan Wu, Hongyi Wu

Crowdsourcing with Tullock contests: A new perspective

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Scaling wireless full-duplex in multi-cell networks

Mohammad Amir Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Mohammad Farajzadeh-Tehrani

Scaling wireless full-duplex in multi-cell networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Convergence properties of general network selection games

Ehsan Monsef, Alireza Keshavarz-Haddad, Ehsan Aryafar, Jafar Saniie, Mung Chiang

Convergence properties of general network selection games

Details
Discussion Comments: 0
Verification: Authors have not verified information

AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication

Yucheng Zhang, Hong Jiang, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yukun Zhou

AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mitigating macro-cell outage in LTE-Advanced deployments

Rajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Prasant Mohapatra

Mitigating macro-cell outage in LTE-Advanced deployments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Compact location encodings for scalable Internet routing

Feng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa

Compact location encodings for scalable Internet routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bridging link power asymmetry in mobile whitespace networks

Sanjib Sur, Xinyu Zhang

Bridging link power asymmetry in mobile whitespace networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition

Wei Wang, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Yaolin Jiang

A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition

Details
Discussion Comments: 0
Verification: Authors have not verified information

SEISA: Secure and efficient encrypted image search with access control

Jiawei Yuan, Shucheng Yu, Linke Guo

SEISA: Secure and efficient encrypted image search with access control

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sequential and adaptive sampling for matrix completion in network monitoring systems

Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Guangxing Zhang, Dongliang Xie, Jigang Wen

Sequential and adaptive sampling for matrix completion in network monitoring systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

A measurement study on TCP behaviors in HSPA+ networks on high-speed rails

Li Li, Ke Xu, Dan Wang, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi

A measurement study on TCP behaviors in HSPA+ networks on high-speed rails

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improved rendezvous algorithms for heterogeneous cognitive radio networks

Zhaoquan Gu, Haosen Pu, Qiang-Sheng Hua, Francis C. M. Lau

Improved rendezvous algorithms for heterogeneous cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-task assignment for crowdsensing in mobile social networks

Mingjun Xiao, Jie Wu, Liusheng Huang, Yunsheng Wang, Cong Liu

Multi-task assignment for crowdsensing in mobile social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the universality of age-based scheduling in wireless networks

Bin Li, Atilla Eryilmaz, R. Srikant

On the universality of age-based scheduling in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling link correlation in low-power wireless networks

Zhiwei Zhao, Wei Dong, Gaoyang Guan, Jiajun Bu, Tao Gu, Chun Chen

Modeling link correlation in low-power wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cliques in hyperbolic random graphs

Tobias Friedrich, Anton Krohmer

Cliques in hyperbolic random graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Near optimal placement of virtual network functions

Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz

Near optimal placement of virtual network functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee

Details
Discussion Comments: 0
Verification: Authors have not verified information

AirShare: Distributed coherent transmission made seamless

Omid Abari, Hariharan Rahul, Dina Katabi, Mondira Pant

AirShare: Distributed coherent transmission made seamless

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring the mixing time of a network

Xenofon Foukas, Antonio Carzaniga, Alexander L. Wolf

Measuring the mixing time of a network

Details
Discussion Comments: 0
Verification: Authors have not verified information

Local face-view barrier coverage in camera sensor networks

Zuoming Yu, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan

Local face-view barrier coverage in camera sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Policy-compliant path diversity and bisection bandwidth

Rowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas A. Dimitropoulos

Policy-compliant path diversity and bisection bandwidth

Details
Discussion Comments: 0
Verification: Authors have not verified information

FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloading

Hamzeh Beyranvand, Martin Lévesque, Martin Maier, Jawad A. Salehi

FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloading

Details
Discussion Comments: 0
Verification: Authors have not verified information

On heterogeneous neighbor discovery in wireless sensor networks

Lin Chen, Ruolin Fan, Kaigui Bian, Lin Chen, Mario Gerla, Tao Wang, Xiaoming Li

On heterogeneous neighbor discovery in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffers

Sucha Supittayapornpong, Michael J. Neely

Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffers

Details
Discussion Comments: 0
Verification: Authors have not verified information

A new upper bound on the control information required in multiple access communications

Jie Chuai, Victor O. K. Li

A new upper bound on the control information required in multiple access communications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Throughput-optimal broadcast on directed acyclic graphs

Abhishek Sinha, Georgios S. Paschos, Chih-Ping Li, Eytan Modiano

Throughput-optimal broadcast on directed acyclic graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

On factors affecting the usage and adoption of a nation-wide TV streaming service

Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria

On factors affecting the usage and adoption of a nation-wide TV streaming service

Details
Discussion Comments: 0
Verification: Authors have not verified information

Around the web in six weeks: Documenting a large-scale crawl

Sarker Tanzir Ahmed, Clint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov

Around the web in six weeks: Documenting a large-scale crawl

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dancing with light: Predictive in-frame rate selection for visible light networks

Jialiang Zhang, Xinyu Zhang, Gang Wu

Dancing with light: Predictive in-frame rate selection for visible light networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices

Helei Cui, Xingliang Yuan, Cong Wang

Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rapier: Integrating routing and scheduling for coflow-aware data center networks

Yangming Zhao, Kai Chen, Wei Bai, Minlan Yu, Chen Tian, Yanhui Geng, Yiming Zhang, Dan Li, Sheng Wang

Rapier: Integrating routing and scheduling for coflow-aware data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fine-grained sleep monitoring: Hearing your breathing with smartphones

Yanzhi Ren, Chen Wang, Jie Yang, Yingying Chen

Fine-grained sleep monitoring: Hearing your breathing with smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimization for speculative execution in a MapReduce-like cluster

Huanle Xu, Wing Cheong Lau

Optimization for speculative execution in a MapReduce-like cluster

Details
Discussion Comments: 0
Verification: Authors have not verified information

Provably delay efficient data retrieving in storage clouds

Yin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff

Provably delay efficient data retrieving in storage clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Drawing dominant dataset from big sensory data in wireless sensor networks

Siyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang

Drawing dominant dataset from big sensory data in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensing

Keyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni

Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code offload with least context migration in the mobile cloud

Yong Li, Wei Gao

Code offload with least context migration in the mobile cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

HySIM: A hybrid spectrum and information market for TV white space networks

Yuan Luo, Lin Gao, Jianwei Huang

HySIM: A hybrid spectrum and information market for TV white space networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic generation of mobile app signatures from traffic observations

Qiang Xu, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci, Thomas Andrews

Automatic generation of mobile app signatures from traffic observations

Details
Discussion Comments: 0
Verification: Authors have not verified information

StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters

Yanfei Guo, Jia Rao, Dazhao Cheng, Changjun Jiang, Cheng-Zhong Xu, Xiaobo Zhou

StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters

Details
Discussion Comments: 0
Verification: Authors have not verified information

How bad are the rogues' impact on enterprise 802.11 network performance?

Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li

How bad are the rogues' impact on enterprise 802.11 network performance?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic defense strategy against advanced persistent threat with insiders

Pengfei Hu, Hongxing Li, Hao Fu, Derya Cansever, Prasant Mohapatra

Dynamic defense strategy against advanced persistent threat with insiders

Details
Discussion Comments: 0
Verification: Authors have not verified information

Work capacity of freelance markets: Fundamental limits and decentralized schemes

Avhishek Chatterjee, Lav R. Varshney, Sriram Vishwanath

Work capacity of freelance markets: Fundamental limits and decentralized schemes

Details
Discussion Comments: 0
Verification: Authors have not verified information

ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environment

Okhwan Lee, Weiping Sun, Jihoon Kim, Hyuk Lee, Bo Ryu, Jungwoo Lee, Sunghyun Choi

ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enhancing reliability and response times via replication in computing clusters

Zhan Qiu, Juan F. Pérez

Enhancing reliability and response times via replication in computing clusters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal scheduling for jobs with progressive deadlines

Kristen Gardner, Sem C. Borst, Mor Harchol-Balter

Optimal scheduling for jobs with progressive deadlines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Leveraging traffic repetitions for high-speed deep packet inspection

Anat Bremler-Barr, Shimrit Tzur-David, Yotam Harchol, David Hay

Leveraging traffic repetitions for high-speed deep packet inspection

Details
Discussion Comments: 0
Verification: Authors have not verified information

GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance

Andrés J. Gonzalez, Bjarne E. Helvik, Prakriti Tiwari, Denis M. Becker, Otto J. Wittner

GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Complexities in Internet peering: Understanding the "Black" in the "Black Art"

Aemen Lodhi, Nikolaos Laoutaris, Amogh Dhamdhere, Constantine Dovrolis

Complexities in Internet peering: Understanding the "Black" in the "Black Art"

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships

Lei Yang, Pai Peng, Fan Dang, Cheng Wang, Xiang-Yang Li, Yunhao Liu

Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network-side positioning of cellular-band devices with minimal effort

Ayon Chakraborty, Luis E. Ortiz, Samir R. Das

Network-side positioning of cellular-band devices with minimal effort

Details
Discussion Comments: 0
Verification: Authors have not verified information

Formation games of reliable networks

Eli A. Meirom, Shie Mannor, Ariel Orda

Formation games of reliable networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A fistful of pings: Accurate and lightweight anycast enumeration and geolocation

Danilo Cicalese, Diana Joumblatt, Dario Rossi, Marc-Olivier Buob, Jordan Augé, Timur Friedman

A fistful of pings: Accurate and lightweight anycast enumeration and geolocation

Details
Author Comments: The paper [INFOCOM-15] introduces iGreedy, a methodology for anycast detection, enumeration and geolocation. We make code, dataseta and ground truth available at the above website. Particularlt, results of a thorough validation campaign based on available ground truth (several DNS root servers and CDNs), using multiple measurement infrastructures (PlanetLab, RIPE), introduced in [INFOCOM-15], thorougly analyzed in [JSAC-16] and exhaustively analyzed in [TECHREP-16]) are available. We point out that subsequent research [CoNEXT'15] applied the technique [INFOCOM'15] to the whole Internet, providing the first complete census of IPv4 anycast Internet. Datasets for the censuses are available at the above website as well.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Incentivizing sharing in realtime D2D streaming networks: A mean field game perspective

Jian Li, Rajarshi Bhattacharyya, Suman Paul, Srinivas Shakkottai, Vijay Subramanian

Incentivizing sharing in realtime D2D streaming networks: A mean field game perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Financial analysis of 4G network deployment

Yanjiao Chen, Lingjie Duan, Qian Zhang

Financial analysis of 4G network deployment

Details
Discussion Comments: 0
Verification: Authors have not verified information

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis

Qiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou

PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enhancing privacy through caching in location-based services

Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li

Enhancing privacy through caching in location-based services

Details
Discussion Comments: 0
Verification: Authors have not verified information

The power of slightly more than one sample in randomized load balancing

Lei Ying, R. Srikant, Xiaohan Kang

The power of slightly more than one sample in randomized load balancing

Details
Discussion Comments: 0
Verification: Authors have not verified information