IEEE Conference on Computer Communications, INFOCOM 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

RAM: Radar-based activity monitor

Md Abdullah Al Hafiz Khan, Ruthvik Kukkapalli, Piyush Waradpande, Sekar Kulandaivel, Nilanjan Banerjee, Nirmalya Roy, Ryan Robucci

RAM: Radar-based activity monitor

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems

Thierry Titcheu Chekam, Ennan Zhai, Zhenhua Li, Yong Cui, Kui Ren

On the synchronization bottleneck of OpenStack Swift-like cloud storage systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-source variable-rate sampled signal reconstructions in vehicular CPS

Andrew Fox, B. V. K. Vijaya Kumar, Fan Bai

Multi-source variable-rate sampled signal reconstructions in vehicular CPS

Details
Discussion Comments: 0
Verification: Authors have not verified information

A utility optimization approach to network cache design

Mostafa Dehghan, Laurent Massoulié, Don Towsley, Daniel S. Menasché, Y. C. Tay

A utility optimization approach to network cache design

Details
Discussion Comments: 0
Verification: Authors have not verified information

BOOST: Base station ON-OFF switching strategy for energy efficient massive MIMO HetNets

Mingjie Feng, Shiwen Mao, Tao Jiang

BOOST: Base station ON-OFF switching strategy for energy efficient massive MIMO HetNets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting and localizing end-to-end performance degradation for cellular data services

Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan

Detecting and localizing end-to-end performance degradation for cellular data services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sneak-Peek: High speed covert channels in data center networks

Rashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash

Sneak-Peek: High speed covert channels in data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Profit maximization for multiple products in online social networks

Huiyuan Zhang, Huiling Zhang, Alan Kuhnle, My T. Thai

Profit maximization for multiple products in online social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cooperative data offloading in opportunistic mobile networks

Zongqing Lu, Xiao Sun, Thomas F. La Porta

Cooperative data offloading in opportunistic mobile networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Placing dynamic content in caches with small population

Mathieu Leconte, Georgios S. Paschos, Lazaros Gkatzikis, Moez Draief, Spyridon Vassilaras, Symeon Chouvardas

Placing dynamic content in caches with small population

Details
Discussion Comments: 0
Verification: Authors have not verified information

DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks

Xueshu Zheng, Shuailing Yang, Naigao Jin, Lei Wang, Mathew L. Wymore, Daji Qiao

DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

QoE matters more than QoS: Why people stop watching cat videos

Hyunwoo Nam, Kyung-Hwa Kim, Henning Schulzrinne

QoE matters more than QoS: Why people stop watching cat videos

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measurement-based flow characterization in centrally controlled networks

Zdravko Bozakov, Amr Rizk, Divyashri Bhat, Michael Zink

Measurement-based flow characterization in centrally controlled networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Survivability in time-varying networks

Qingkai Liang, Eytan Modiano

Survivability in time-varying networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding sharded caching systems

Lorenzo Saino, Ioannis Psaras, George Pavlou

Understanding sharded caching systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inductive coloring: Implementing basic communication primitives with Rayleigh-fading interference

Yuexuan Wang, Dongxiao Yu, Qipeng Liu, Francis C. M. Lau

Inductive coloring: Implementing basic communication primitives with Rayleigh-fading interference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Side-channel information leakage of encrypted video stream in video surveillance systems

Hong Li, Yunhua He, Limin Sun, Xiuzhen Cheng, Jiguo Yu

Side-channel information leakage of encrypted video stream in video surveillance systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Streaming big data meets backpressure in distributed network computation

Apostolos Destounis, Georgios S. Paschos, Iordanis Koutsopoulos

Streaming big data meets backpressure in distributed network computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tracker-assisted rate adaptation for MPEG DASH live streaming

Andrea Detti, Bruno Ricci, Nicola Blefari-Melazzi

Tracker-assisted rate adaptation for MPEG DASH live streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reducing dense virtual networks for fast embedding

Toru Mano, Takeru Inoue, Kimihiro Mizutani, Osamu Akashi

Reducing dense virtual networks for fast embedding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Graph-based privacy-preserving data publication

Xiang-Yang Li, Chunhong Zhang, Taeho Jung, Jianwei Qian, Linlin Chen

Graph-based privacy-preserving data publication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-view coding and routing of local features in Visual Sensor Networks

Alessandro Enrico Redondi, Luca Baroffio, Matteo Cesana, Marco Tagliasacchi

Multi-view coding and routing of local features in Visual Sensor Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting driver phone calls in a moving vehicle based on voice features

Tianyi Song, Xiuzhen Cheng, Hongjuan Li, Jiguo Yu, Shengling Wang, Rongfang Bie

Detecting driver phone calls in a moving vehicle based on voice features

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficiency and optimality of largest deficit first prioritization: Resource allocation for real-time applications

Yuhuan Du, Gustavo de Veciana

Efficiency and optimality of largest deficit first prioritization: Resource allocation for real-time applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

On demand elastic capacity planning for service auto-scaling

Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan

On demand elastic capacity planning for service auto-scaling

Details
Discussion Comments: 0
Verification: Authors have not verified information

A decomposition principle for link and relay selection in dual-hop 60 GHz networks

Zhifeng He, Shiwen Mao

A decomposition principle for link and relay selection in dual-hop 60 GHz networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

How cars talk louder, clearer and fairer: Optimizing the communication performance of connected vehicles via online synchronous control

Xi Chen, Linghe Kong, Xue Liu, Lei Rao, Fan Bai, Qiao Xiang

How cars talk louder, clearer and fairer: Optimizing the communication performance of connected vehicles via online synchronous control

Details
Discussion Comments: 0
Verification: Authors have not verified information

Macro-scale mobile app market analysis using customized hierarchical categorization

Xi Liu, Han Hee Song, Mario Baldi, Pang-Ning Tan

Macro-scale mobile app market analysis using customized hierarchical categorization

Details
Discussion Comments: 0
Verification: Authors have not verified information

The S-Aloha capacity: Beyond the e-1 myth

Luca Barletta, Flaminio Borgonovo, Ilario Filippini

The S-Aloha capacity: Beyond the e-1 myth

Details
Discussion Comments: 0
Verification: Authors have not verified information

Randomized algorithms for scheduling VMs in the cloud

Javad Ghaderi

Randomized algorithms for scheduling VMs in the cloud

Details
Discussion Comments: 0
Verification: Author has not verified information

When group-buying meets cloud computing

Juntao Wang, Xun Xiao, Jianping Wang, Kejie Lu, Xiaotie Deng, Ashwin Gumaste

When group-buying meets cloud computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Task allocation for distributed stream processing

Raphael Eidenbenz, Thomas Locher

Task allocation for distributed stream processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcing

Lingjun Pu, Xu Chen, Jingdong Xu, Xiaoming Fu

Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incentivizing spectrum sensing in database-driven dynamic spectrum sharing

Bo Gao, Sudeep Bhattarai, Jung-Min "Jerry" Park, Yaling Yang, Min Liu, Kexiong Curtis Zeng, Yanzhi Dou

Incentivizing spectrum sensing in database-driven dynamic spectrum sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling for cloud-based computing systems to support soft real-time applications

Yuhuan Du, Gustavo de Veciana

Scheduling for cloud-based computing systems to support soft real-time applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design

Jin Wang, Kejie Lu, Jianping Wang, Chunming Qiao

Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design

Details
Discussion Comments: 0
Verification: Authors have not verified information

Opportunistic WiFi offloading in a vehicular environment: Waiting or downloading now?

Ning Wang, Jie Wu

Opportunistic WiFi offloading in a vehicular environment: Waiting or downloading now?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mosaic: A low-cost mobile sensing system for urban air quality monitoring

Yi Gao, Wei Dong, Kai Guo, Xue Liu, Yuan Chen, Xiaojin Liu, Jiajun Bu, Chun Chen

Mosaic: A low-cost mobile sensing system for urban air quality monitoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

Oblivious neighbor discovery for wireless devices with directional antennas

Lin Chen, Yong Li, Athanasios V. Vasilakos

Oblivious neighbor discovery for wireless devices with directional antennas

Details
Discussion Comments: 0
Verification: Authors have not verified information

Is every flow on the right track?: Inspect SDN forwarding with RuleScope

Kai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen

Is every flow on the right track?: Inspect SDN forwarding with RuleScope

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the modeling and optimization of short-term performance for real-time wireless networks

I-Hong Hou

On the modeling and optimization of short-term performance for real-time wireless networks

Details
Discussion Comments: 0
Verification: Author has not verified information

AMIL: Localizing neighboring mobile devices through a simple gesture

Hao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak

AMIL: Localizing neighboring mobile devices through a simple gesture

Details
Discussion Comments: 0
Verification: Authors have not verified information

CASE: Cache-assisted stretchable estimator for high speed per-flow measurement

Yang Li, Hao Wu, Tian Pan, Huichen Dai, Jianyuan Lu, Bin Liu

CASE: Cache-assisted stretchable estimator for high speed per-flow measurement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Providing bandwidth guarantees, work conservation and low latency simultaneously in the cloud

Shuihai Hu, Wei Bai, Kai Chen, Chen Tian, Ying Zhang, Haitao Wu

Providing bandwidth guarantees, work conservation and low latency simultaneously in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spice: Socially-driven learning-based mobile media prefetching

Chao Wu, Xu Chen, Yuezhi Zhou, Ningyuan Li, Xiaoming Fu, Yaoxue Zhang

Spice: Socially-driven learning-based mobile media prefetching

Details
Discussion Comments: 0
Verification: Authors have not verified information

HybridCell: Cellular connectivity on the fringes with demand-driven local cells

Paul Schmitt, Daniel Iland, Mariya Zheleva, Elizabeth M. Belding

HybridCell: Cellular connectivity on the fringes with demand-driven local cells

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sketch-based data placement among geo-distributed datacenters for cloud storages

Boyang Yu, Jianping Pan

Sketch-based data placement among geo-distributed datacenters for cloud storages

Details
Discussion Comments: 0
Verification: Authors have not verified information

Social learning networks: Efficiency optimization for MOOC forums

Christopher G. Brinton, Swapna Buccapatnam, Felix Ming Fai Wong, Mung Chiang, H. Vincent Poor

Social learning networks: Efficiency optimization for MOOC forums

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cupid: Congestion-free consistent data plane update in software defined networks

Wen Wang, Wenbo He, Jinshu Su, Yixin Chen

Cupid: Congestion-free consistent data plane update in software defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-preserving crowdsourced spectrum sensing

Xiaocong Jin, Yanchao Zhang

Privacy-preserving crowdsourced spectrum sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Wanda: Securely introducing mobile devices

Timothy J. Pierson, Xiaohui Liang, Ronald A. Peterson, David Kotz

Wanda: Securely introducing mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

MaxWeight scheduling: "Smoothness" of the service process

Rahul Singh, Alexander L. Stolyar

MaxWeight scheduling: "Smoothness" of the service process

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software defined networks: It's about time

Tal Mizrahi, Yoram Moses

Software defined networks: It's about time

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Dynamic control channel MAC for underwater cognitive acoustic networks

Yu Luo, Lina Pu, Zheng Peng, Jun-Hong Cui

Dynamic control channel MAC for underwater cognitive acoustic networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pulses in the sand: Impulse response analysis of wireless underground channel

Abdul Salam, Mehmet Can Vuran, Suat Irmak

Pulses in the sand: Impulse response analysis of wireless underground channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decoding interfering signals with fewer receiving antennas

Zhao Li, Xiaoqin Dai, Kang G. Shin

Decoding interfering signals with fewer receiving antennas

Details
Discussion Comments: 0
Verification: Authors have not verified information

Panda: Neighbor discovery on a power harvesting budget

Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman

Panda: Neighbor discovery on a power harvesting budget

Details
Discussion Comments: 0
Verification: Authors have not verified information

T-Update: A tree-structured update scheme with top-down transmission in erasure-coded systems

Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu

T-Update: A tree-structured update scheme with top-down transmission in erasure-coded systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

To delay or not: Temporal vaccination games on networks

Abhijin Adiga, Srini Venkat, Anil Vullikanti

To delay or not: Temporal vaccination games on networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Kraken: Online and elastic resource reservations for multi-tenant datacenters

Carlo Fuerst, Stefan Schmid, P. Lalith Suresh, Paolo Costa

Kraken: Online and elastic resource reservations for multi-tenant datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rapid convergence versus policy expressiveness in interdomain routing

Alexander J. T. Gurney, Sanjeev Khanna, Yang Li

Rapid convergence versus policy expressiveness in interdomain routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Localization of LTE measurement records with missing information

Avik Ray, Supratim Deb, Pantelis Monogioudis

Localization of LTE measurement records with missing information

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards efficient content-aware search over encrypted outsourced data in cloud

Zhangjie Fu, Xingming Sun, Sai Ji, Guowu Xie

Towards efficient content-aware search over encrypted outsourced data in cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Estimation method for the delay performance of closed-loop flow control with application to TCP

Ralf Lübben, Markus Fidler

Estimation method for the delay performance of closed-loop flow control with application to TCP

Details
Discussion Comments: 0
Verification: Authors have not verified information

A unified framework for automatic quality-of-experience optimization in mobile video streaming

Yan Liu, Jack Y. B. Lee

A unified framework for automatic quality-of-experience optimization in mobile video streaming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests

Adriano Di Luzio, Alessandro Mei, Julinda Stefa

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests

Details
Discussion Comments: 0
Verification: Authors have not verified information

SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics

Ming Li, Dejun Yang, Jian Lin, Ming Li, Jian Tang

SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statistics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Aggregation points planning for software-defined network based smart grid communications

Shaowei Wang, Xinxin Huang

Aggregation points planning for software-defined network based smart grid communications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Variability-aware request replication for latency curtailment

Zhan Qiu, Juan F. Pérez, Peter G. Harrison

Variability-aware request replication for latency curtailment

Details
Discussion Comments: 0
Verification: Authors have not verified information

DualSync: Taming clock skew variation for synchronization in low-power wireless networks

Meng Jin, Tianzhang Xing, Xiaojiang Chen, Xin Meng, Dingyi Fang, Yuan He

DualSync: Taming clock skew variation for synchronization in low-power wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

CeilingCast: Energy efficient and location-bound broadcast through LED-camera communication

Jie Hao, Yanbing Yang, Jun Luo

CeilingCast: Energy efficient and location-bound broadcast through LED-camera communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel

Mostafa Izz, Zhong Yuan Li, Hongbo Liu, Yingying Chen, Feng Li

Uber-in-light: Unobtrusive visible light communication leveraging complementary color channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ubiquitous tagless object locating with ambient harmonic tags

Yunfei Ma, Edwin C. Kan

Ubiquitous tagless object locating with ambient harmonic tags

Details
Discussion Comments: 0
Verification: Authors have not verified information

Leveraging wearables for steering and driver tracking

Çagdas Karatas, Luyang Liu, Hongyu Li, Jian Liu, Yan Wang, Sheng Tan, Jie Yang, Yingying Chen, Marco Gruteser, Richard P. Martin

Leveraging wearables for steering and driver tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hybrid renewable energy routing for ISP networks

Julien Mineraud, Liang Wang, Sasitharan Balasubramaniam, Jussi Kangasharju

Hybrid renewable energy routing for ISP networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings

Jingyu Hua, Xin Ge, Sheng Zhong

FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settings

Details
Discussion Comments: 0
Verification: Authors have not verified information

Blending on-demand and spot instances to lower costs for in-memory storage

Zichen Xu, Christopher Stewart, Nan Deng, Xiaorui Wang

Blending on-demand and spot instances to lower costs for in-memory storage

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments: One of the first few papers on studying cost-efficient data services on IaaS with specific constraints
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Random access signaling for network MIMO uplink

Teng Wei, Xinyu Zhang

Random access signaling for network MIMO uplink

Details
Discussion Comments: 0
Verification: Authors have not verified information

NetCodCCN: A network coding approach for content-centric networks

Jonnahtan Saltarin, Eirina Bourtsoulatze, Nikolaos Thomos, Torsten Braun

NetCodCCN: A network coding approach for content-centric networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Topology optimization for galvanic coupled wireless intra-body communication

Meenupriya Swaminathan, Ufuk Muncuk, Kaushik R. Chowdhury

Topology optimization for galvanic coupled wireless intra-body communication

Details
Author Comments: This paper presents a comprehensive analysis of the communication link lengths inside body and the energy consumption given the tissue, in which the implant is embedded in. Multiple factors including the node density, distribution, topology, cluster size and battery levels are incorporated in the analysis.
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Optimizing coflow completion times with utility max-min fairness

Li Chen, Wei Cui, Baochun Li, Bo Li

Optimizing coflow completion times with utility max-min fairness

Details
Discussion Comments: 0
Verification: Authors have not verified information

Economics of public Wi-Fi monetization and advertising

Haoran Yu, Man Hon Cheung, Lin Gao, Jianwei Huang

Economics of public Wi-Fi monetization and advertising

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channels

Ping-Chun Hsieh, I-Hong Hou

Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channels

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using crowdsourced data in location-based social networks to explore influence maximization

Ji Li, Zhipeng Cai, Mingyuan Yan, Yingshu Li

Using crowdsourced data in location-based social networks to explore influence maximization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Contextual, flow-based access control with scalable host-based SDN techniques

Curtis R. Taylor, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue

Contextual, flow-based access control with scalable host-based SDN techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic

Gyan Ranjan, Alok Tongaonkar, Ruben Torres

Approximate matching of persistent LExicon using search-engines for classifying Mobile app traffic

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient and flexible crowdsourcing of specialized tasks with precedence constraints

Avhishek Chatterjee, Michael Borokhovich, Lav R. Varshney, Sriram Vishwanath

Efficient and flexible crowdsourcing of specialized tasks with precedence constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quality of video oriented pricing incentive for mobile video offloading

Honghai Wu, Liang Liu, Xi Zhang, Huadong Ma

Quality of video oriented pricing incentive for mobile video offloading

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mean-field-analysis of coding versus replication in cloud storage systems

Bin Li, Aditya Ramamoorthy, R. Srikant

Mean-field-analysis of coding versus replication in cloud storage systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter

Dong Wang, Zhenyu Li, Gaogang Xie, Mohamed Ali Kâafar, Kavé Salamatian

Adwords management for third-parties in SEM: An optimisation model and the potential of Twitter

Details
Discussion Comments: 0
Verification: Authors have not verified information

Interference-aware time-based fairness for multihop wireless networks

Douglas M. Blough, Giovanni Resta, Paolo Santi

Interference-aware time-based fairness for multihop wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

TDS: Time-dependent sponsored data plan for wireless data traffic market

Liang Zhang, Weijie Wu, Dan Wang

TDS: Time-dependent sponsored data plan for wireless data traffic market

Details
Discussion Comments: 0
Verification: Authors have not verified information

Battery-free sensing platform for wearable devices: The synergy between two feet

Qianyi Huang, Yan Mei, Wei Wang, Qian Zhang

Battery-free sensing platform for wearable devices: The synergy between two feet

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling, performance analysis, and optimization of single hop IEEE 802.11 networks with large propagation delays: Challenges and solutions

Abhijit Bhattacharya, Anurag Kumar

Modeling, performance analysis, and optimization of single hop IEEE 802.11 networks with large propagation delays: Challenges and solutions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Price-based friendly jamming in a MISO interference wiretap channel

Peyman Siyari, Marwan Krunz, Diep N. Nguyen

Price-based friendly jamming in a MISO interference wiretap channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

On consistent migration of flows in SDNs

Sebastian Brandt, Klaus-Tycho Förster, Roger Wattenhofer

On consistent migration of flows in SDNs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Characterizing caching workload of a large commercial Content Delivery Network

M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu

Characterizing caching workload of a large commercial Content Delivery Network

Details
Discussion Comments: 0
Verification: Authors have not verified information

OPTAS: Decentralized flow monitoring and scheduling for tiny tasks

Ziyang Li, Yiming Zhang, Dongsheng Li, Kai Chen, Yuxing Peng

OPTAS: Decentralized flow monitoring and scheduling for tiny tasks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Synergistic policy and virtual machine consolidation in cloud data centers

Lin Cui, Richard Cziva, Fung Po Tso, Dimitrios P. Pezaros

Synergistic policy and virtual machine consolidation in cloud data centers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal wireless power transfer scheduling for delay minimization

Feng Shan, Junzhou Luo, Weiwei Wu, Xiaojun Shen

Optimal wireless power transfer scheduling for delay minimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Jamming attack on in-band full-duplex communications: Detection and countermeasures

Manjesh Kumar Hanawal, Diep N. Nguyen, Marwan Krunz

Jamming attack on in-band full-duplex communications: Detection and countermeasures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revisiting congestion control for multipath TCP with shared bottleneck detection

Simone Ferlin, Özgü Alay, Thomas Dreibholz, David A. Hayes, Michael Welzl

Revisiting congestion control for multipath TCP with shared bottleneck detection

Details
Author Comments: The code made available above relates to the IETF draft version in the paper. As of today, the draft version is different and the algorithm had some tweaks. We would also be interested in evaluations using the kernel-based SBD code, part of the same repository, but available on request. Also, larger experiments than those available in the paper with a constructed testbed are of interested for us as well as for the community.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Traffic at-a-glance: Time-bounded analytics on large visual traffic data

Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan, Biao Chen

Traffic at-a-glance: Time-bounded analytics on large visual traffic data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Resilient multi-user beamforming WLANs: Mobility, interference, and imperfect CSI

Oscar Bejarano, Roger Pierre Fabris Hoefel, Edward W. Knightly

Resilient multi-user beamforming WLANs: Mobility, interference, and imperfect CSI

Details
Discussion Comments: 0
Verification: Authors have not verified information

Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones

Heba Aly, Moustafa Youssef

Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pop-routing: Centrality-based tuning of control messages for faster route convergence

Leonardo Maccari, Renato Lo Cigno

Pop-routing: Centrality-based tuning of control messages for faster route convergence

Details
Discussion Comments: 0
Verification: Authors have not verified information

Compiling packet forwarding rules for switch pipelined architecture

Salaheddine Hamadi, Khalil Blaiech, Petko Valtchev, Omar Cherkaoui, Radu State

Compiling packet forwarding rules for switch pipelined architecture

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing restoration with segment routing

Fang Hao, Murali S. Kodialam, T. V. Lakshman

Optimizing restoration with segment routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mobility-aware real-time scheduling for low-power wireless networks

Behnam Dezfouli, Marjan Radi, Octav Chipara

Mobility-aware real-time scheduling for low-power wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Round-Trip Time monitoring in OpenFlow networks

Alon Atary, Anat Bremler-Barr

Efficient Round-Trip Time monitoring in OpenFlow networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

An SDR-based experimental study of outband D2D communications

Arash Asadi, Vincenzo Mancuso, Rohit Gupta

An SDR-based experimental study of outband D2D communications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust monitor placement for network tomography in dynamic networks

Ting He, Liang Ma, Athanasios Gkelias, Kin K. Leung, Ananthram Swami, Don Towsley

Robust monitor placement for network tomography in dynamic networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nullification in the air: Interference neutralization in multi-hop wireless networks

Huacheng Zeng, Xu Yuan, Xiaoqi Qin, Yi Shi, Y. Thomas Hou, Wenjing Lou

Nullification in the air: Interference neutralization in multi-hop wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Information source detection in networks: Possibility and impossibility results

Kai Zhu, Lei Ying

Information source detection in networks: Possibility and impossibility results

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure outsourced skyline query processing via untrusted cloud service providers

Wenxin Chen, Mengjun Liu, Rui Zhang, Yanchao Zhang, Shubo Liu

Secure outsourced skyline query processing via untrusted cloud service providers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Engineering traffic uncertainty in the OpenFlow data plane

Fei Chen, Chunming Wu, Xiaoyan Hong, Zhouhao Lu, Zhouhao Wang, Chang-Ting Lin

Engineering traffic uncertainty in the OpenFlow data plane

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical and secure nearest neighbor search on encrypted large-scale data

Boyang Wang, Yantian Hou, Ming Li

Practical and secure nearest neighbor search on encrypted large-scale data

Details
Discussion Comments: 0
Verification: Authors have not verified information

BD-ZCS: Multi-cell interference coordination via Zadoff-Chu sequence-based block diagonalization

Xueyuan Zhao, Dario Pompili

BD-ZCS: Multi-cell interference coordination via Zadoff-Chu sequence-based block diagonalization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic power allocation in MIMO fading systems without channel distribution information

Hao Yu, Michael J. Neely

Dynamic power allocation in MIMO fading systems without channel distribution information

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incentive mechanism for proximity-based Mobile Crowd Service systems

Honggang Zhang, Benyuan Liu, Hengky Susanto, Guoliang Xue, Tong Sun

Incentive mechanism for proximity-based Mobile Crowd Service systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deadline-aware bandwidth sharing by allocating switch buffer in data center networks

Jiao Zhang

Deadline-aware bandwidth sharing by allocating switch buffer in data center networks

Details
Discussion Comments: 0
Verification: Author has not verified information

On signaling power: Communications over wireless energy

Raul Gomez Cid-Fuentes, M. Yousof Naderi, Stefano Basagni, Kaushik R. Chowdhury, Albert Cabellos-Aparicio, Eduard Alarcón

On signaling power: Communications over wireless energy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Demographics inference through Wi-Fi network traffic analysis

Huaxin Li, Zheyu Xu, Haojin Zhu, Di Ma, Shuai Li, Kai Xing

Demographics inference through Wi-Fi network traffic analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance-guaranteed strongly connected dominating sets in heterogeneous wireless sensor networks

Chunyan Liu, Hejiao Huang, Hongwei Du, Xiaohua Jia

Performance-guaranteed strongly connected dominating sets in heterogeneous wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Demultiplexing activities of daily living in IoT enabled smarthomes

Palanivel A. Kodeswaran, Ravindranath Kokku, Madhumita Mallick, Sayandeep Sen

Demultiplexing activities of daily living in IoT enabled smarthomes

Details
Discussion Comments: 0
Verification: Authors have not verified information

A time-efficient rendezvous algorithm with a full rendezvous degree for heterogeneous cognitive radio networks

Bo Yang, Meng Zheng, Wei Liang

A time-efficient rendezvous algorithm with a full rendezvous degree for heterogeneous cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

VADS: Visual attention detection with a smartphone

Zhiping Jiang, Jinsong Han, Chen Qian, Wei Xi, Kun Zhao, Han Ding, Shaojie Tang, Jizhong Zhao, Panlong Yang

VADS: Visual attention detection with a smartphone

Details
Discussion Comments: 0
Verification: Authors have not verified information

FLIP the (Flow) table: Fast lightweight policy-preserving SDN updates

Stefano Vissicchio, Luca Cittadini

FLIP the (Flow) table: Fast lightweight policy-preserving SDN updates

Details
Discussion Comments: 0
Verification: Authors have not verified information

A PTAS to minimize mobile sensor movement for target coverage problem

Zhiyin Chen, Xiaofeng Gao, Fan Wu, Guihai Chen

A PTAS to minimize mobile sensor movement for target coverage problem

Details
Discussion Comments: 0
Verification: Authors have not verified information

A simple congestion-aware algorithm for load balancing in datacenter networks

Mehrnoosh Shafiee, Javad Ghaderi

A simple congestion-aware algorithm for load balancing in datacenter networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

High-precision shortest distance estimation for large-scale social networks

Jie Cheng, Yangyang Zhang, Qiang Ye, Hongwei Du

High-precision shortest distance estimation for large-scale social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nash equilibrium and the price of anarchy in priority based network routing

Benjamin Grimmer, Sanjiv Kapoor

Nash equilibrium and the price of anarchy in priority based network routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Accurate recovery of Internet traffic data: A tensor completion approach

Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Jigang Wen, Guangxing Zhang

Accurate recovery of Internet traffic data: A tensor completion approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

VSync: Cloud based video streaming service for mobile devices

Eilwoo Baik, Amit Pande, Zizhan Zheng, Prasant Mohapatra

VSync: Cloud based video streaming service for mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic SDN controller assignment in data center networks: Stable matching with transfers

Tao Wang, Fangming Liu, Jian Guo, Hong Xu

Dynamic SDN controller assignment in data center networks: Stable matching with transfers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Rot at the roots? Examining public timing infrastructure

Kanthaiah Vijayalayan, Darryl Veitch

Rot at the roots? Examining public timing infrastructure

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timely wireless flows with arbitrary traffic patterns: Capacity region and scheduling algorithms

Lei Deng, Chih-Chun Wang, Minghua Chen, Shizhen Zhao

Timely wireless flows with arbitrary traffic patterns: Capacity region and scheduling algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

DAFEE: A Decomposed Approach for energy efficient networking in multi-radio multi-channel wireless networks

Lu Liu, Xianghui Cao, Wenlong Shen, Yu Cheng, Lin X. Cai

DAFEE: A Decomposed Approach for energy efficient networking in multi-radio multi-channel wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cloudlet load balancing in wireless metropolitan area networks

Mike Jia, Weifa Liang, Zichuan Xu, Meitian Huang

Cloudlet load balancing in wireless metropolitan area networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

TailCutter: Wisely cutting tail latency in cloud CDN under cost constraints

Zeqi Lai, Yong Cui, Minming Li, Zhenhua Li, Ningwei Dai, Yuchi Chen

TailCutter: Wisely cutting tail latency in cloud CDN under cost constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

No-cost distance estimation using standard WSN radios

Georg von Zengen, Yannic Schröder, Stephan Rottmann, Felix Büsching, Lars C. Wolf

No-cost distance estimation using standard WSN radios

Details
Discussion Comments: 0
Verification: Authors have not verified information

Controlling flow reconfigurations in SDN

Stefano Paris, Apostolos Destounis, Lorenzo Maggi, Georgios S. Paschos, Jérémie Leguay

Controlling flow reconfigurations in SDN

Details
Discussion Comments: 0
Verification: Authors have not verified information

UrbanEye: An outdoor localization system for public transport

Rohit Verma, Aviral Shrivastava, Bivas Mitra, Sujoy Saha, Niloy Ganguly, Subrata Nandi, Sandip Chakraborty

UrbanEye: An outdoor localization system for public transport

Details
Discussion Comments: 0
Verification: Authors have not verified information

WiFi can be the weakest link of round trip network latency in the wild

Changhua Pei, Youjian Zhao, Guo Chen, Ruming Tang, Yuan Meng, Minghua Ma, Ken Ling, Dan Pei

WiFi can be the weakest link of round trip network latency in the wild

Details
Discussion Comments: 0
Verification: Authors have not verified information

MED: The Monitor-Emulator-Debugger for Software-Defined Networks

Quanquan Zhi, Wei Xu

MED: The Monitor-Emulator-Debugger for Software-Defined Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flowing with the water: On optimal monitoring of water distribution networks by mobile sensors

Rong Du, Carlo Fischione, Ming Xiao

Flowing with the water: On optimal monitoring of water distribution networks by mobile sensors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Incentivizing crowdsourcing systems with network effects

Yanjiao Chen, Baochun Li, Qian Zhang

Incentivizing crowdsourcing systems with network effects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shadowing and coverage in poisson buildings

Junse Lee, Xinchen Zhang, François Baccelli

Shadowing and coverage in poisson buildings

Details
Discussion Comments: 0
Verification: Authors have not verified information

BOLA: Near-optimal bitrate adaptation for online videos

Kevin Spiteri, Rahul Urgaonkar, Ramesh K. Sitaraman

BOLA: Near-optimal bitrate adaptation for online videos

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Successor: Proactive cache warm-up of destination hosts in virtual machine migration contexts

Tao Lu, Ping Huang, Morgan Stuart, Yuhua Guo, Xubin He, Ming Zhang

Successor: Proactive cache warm-up of destination hosts in virtual machine migration contexts

Details
Discussion Comments: 0
Verification: Authors have not verified information

SoftLight: Adaptive visible light communication over screen-camera links

Wan Du, Jansen Christian Liando, Mo Li

SoftLight: Adaptive visible light communication over screen-camera links

Details
Discussion Comments: 0
Verification: Authors have not verified information

Caching and operator cooperation policies for layered video content delivery

Konstantinos Poularakis, George Iosifidis, Antonios Argyriou, Iordanis Koutsopoulos, Leandros Tassiulas

Caching and operator cooperation policies for layered video content delivery

Details
Discussion Comments: 0
Verification: Authors have not verified information

TCP Ordo: The cost of ordered processing in TCP servers

Mohan Kumar, Ada Gavrilovska

TCP Ordo: The cost of ordered processing in TCP servers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Queue-affectance-based scheduling in multi-hop wireless networks under SINR interference constraints

Changhee Joo, Myeongseon Shin

Queue-affectance-based scheduling in multi-hop wireless networks under SINR interference constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Anonymous addresses for efficient and resilient routing in F2F overlays

Stefanie Roos, Martin Beck, Thorsten Strufe

Anonymous addresses for efficient and resilient routing in F2F overlays

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling jobs with non-uniform demands on multiple servers without interruption

Sungjin Im, Mina Naghshnejad, Mukesh Singhal

Scheduling jobs with non-uniform demands on multiple servers without interruption

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters

Lei Yu, Zhipeng Cai

Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Capacitated kinetic clustering in mobile networks by optimal transportation theory

Chien-Chun Ni, Zhengyu Su, Jie Gao, Xianfeng David Gu

Capacitated kinetic clustering in mobile networks by optimal transportation theory

Details
Discussion Comments: 0
Verification: Authors have not verified information

Client as a first-class citizen: Practical user-centric network MIMO clustering

Wei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan

Client as a first-class citizen: Practical user-centric network MIMO clustering

Details
Discussion Comments: 0
Verification: Authors have not verified information

L3: Sensing driving conditions for vehicle lane-level localization on highways

Zhichen Wu, Jianda Li, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Minglu Li

L3: Sensing driving conditions for vehicle lane-level localization on highways

Details
Discussion Comments: 0
Verification: Authors have not verified information

FOCUS: Shedding light on the high search response time in the wild

Dapeng Liu, Youjian Zhao, Kaixin Sui, Lei Zou, Dan Pei, Qingqian Tao, Xiyang Chen, Dai Tan

FOCUS: Shedding light on the high search response time in the wild

Details
Discussion Comments: 0
Verification: Authors have not verified information

Experimental evaluation of large scale WiFi multicast rate control

Varun Gupta, Craig Gutterman, Yigal Bejerano, Gil Zussman

Experimental evaluation of large scale WiFi multicast rate control

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deadlock-free local fast failover for arbitrary data center networks

Brent Stephens, Alan L. Cox

Deadlock-free local fast failover for arbitrary data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A novel framework for modeling and mitigating distributed link flooding attacks

Christos Liaskos, Vasileios Kotronis, Xenofontas A. Dimitropoulos

A novel framework for modeling and mitigating distributed link flooding attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flash-Loc: Flashing mobile phones for accurate indoor localization

Fan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda Zhu, Dong Xuan

Flash-Loc: Flashing mobile phones for accurate indoor localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

The impact of unlicensed access on small-cell resource allocation

Cheng Chen, Randall A. Berry, Michael L. Honig, Vijay G. Subramanian

The impact of unlicensed access on small-cell resource allocation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Moving tag detection via physical layer analysis for large-scale RFID systems

Chuyu Wang, Lei Xie, Wei Wang, Tao Xue, Sanglu Lu

Moving tag detection via physical layer analysis for large-scale RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Resource pooling in CDMA cell-based systems through uplink power control

Antonis Dimakis, Spyros Papafragkos

Resource pooling in CDMA cell-based systems through uplink power control

Details
Discussion Comments: 0
Verification: Authors have not verified information

CSMA networks in a many-sources regime: A mean-field approach

Fabio Cecchi, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting

CSMA networks in a many-sources regime: A mean-field approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deploying chains of virtual network functions: On the relation between link and server usage

Tung-Wei Kuo, Bang-Heng Liou, Kate Ching-Ju Lin, Ming-Jer Tsai

Deploying chains of virtual network functions: On the relation between link and server usage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Joint optimization for cell configuration and offloading in heterogeneous networks

Chan-Ching Hsu, J. Morris Chang, Yu-Wen Chen

Joint optimization for cell configuration and offloading in heterogeneous networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cheetah: An efficient flat addressing scheme for fast query services in cloud computing

Yu Hua

Cheetah: An efficient flat addressing scheme for fast query services in cloud computing

Details
Discussion Comments: 0
Verification: Author has not verified information

Cache increases the capacity of wireless networks

Li Qiu, Guohong Cao

Cache increases the capacity of wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

An antithetic coupling approach to multi-chain based CSMA scheduling algorithms

Jaewook Kwak, Do Young Eun

An antithetic coupling approach to multi-chain based CSMA scheduling algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic routing for network throughput maximization in software-defined networks

Meitian Huang, Weifa Liang, Zichuan Xu, Wenzheng Xu, Song Guo, Yinlong Xu

Dynamic routing for network throughput maximization in software-defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

CU-LTE: Spectrally-efficient and fair coexistence between LTE and Wi-Fi in unlicensed bands

Zhangyu Guan, Tommaso Melodia

CU-LTE: Spectrally-efficient and fair coexistence between LTE and Wi-Fi in unlicensed bands

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy

Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

High-rate flicker-free screen-camera communication with spatially adaptive embedding

Viet Nguyen, Yaqin Tang, Ashwin Ashok, Marco Gruteser, Kristin J. Dana, Wenjun Hu, Eric Wengrowski, Narayan B. Mandayam

High-rate flicker-free screen-camera communication with spatially adaptive embedding

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient scheduling algorithms for on-demand wireless data broadcast

Zaixin Lu, Weili Wu, Wei Wayne Li, Miao Pan

Efficient scheduling algorithms for on-demand wireless data broadcast

Details
Discussion Comments: 0
Verification: Authors have not verified information

PSync: Visible light-based time synchronization for Internet of Things (IoT)

Xiang-Fa Guo, Mobashir Mohammad, Sudipta Saha, Mun Choon Chan, Seth Gilbert, Derek Leong

PSync: Visible light-based time synchronization for Internet of Things (IoT)

Details
Author Comments: It is a really interesting solution, whose algorithm can be used in other fields also. The light based time sync itself has many interesting applications.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Can the privacy of primary networks in shared spectrum be protected?

Matthew A. Clark, Konstantinos Psounis

Can the privacy of primary networks in shared spectrum be protected?

Details
Discussion Comments: 0
Verification: Authors have not verified information

FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas

Liqiong Chang, Xiaojiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang

FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areas

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimum cost seed set for competitive social influence

Yuqing Zhu, Deying Li, Zhao Zhang

Minimum cost seed set for competitive social influence

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cache content-selection policies for streaming video services

Stefan Dernbach, Nina Taft, Jim Kurose, Udi Weinsberg, Christophe Diot, Azin Ashkan

Cache content-selection policies for streaming video services

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Multicast traffic engineering for software-defined networks

Liang-Hao Huang, Hsiang-Chun Hsu, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen

Multicast traffic engineering for software-defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

BlueAer: A fine-grained urban PM2.5 3D monitoring system using mobile sensing

Yidan Hu, Guojun Dai, Jin Fan, Yifan Wu, Hua Zhang

BlueAer: A fine-grained urban PM2.5 3D monitoring system using mobile sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Path computation in multi-layer networks: Complexity and algorithms

Mohamed Lamine Lamali, Nasreddine Fergani, Johanne Cohen, Hélia Pouyllau

Path computation in multi-layer networks: Complexity and algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networks

Rajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Rittwik Jana, Prasant Mohapatra

A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Popularity-driven content caching

Suoheng Li, Jie Xu, Mihaela van der Schaar, Weiping Li

Popularity-driven content caching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dynamic virtual machine management via approximate Markov decision process

Zhenhua Han, Haisheng Tan, Guihai Chen, Rui Wang, Yifan Chen, Francis C. M. Lau

Dynamic virtual machine management via approximate Markov decision process

Details
Discussion Comments: 0
Verification: Authors have not verified information

SCMon: Leveraging segment routing to improve network monitoring

Francois Aubry, David Lebrun, Stefano Vissicchio, Minh Thanh Khong, Yves Deville, Olivier Bonaventure

SCMon: Leveraging segment routing to improve network monitoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

Xiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta

A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward real-time and cooperative mobile visual sensing and sharing

Huihui Chen, Bin Guo, Zhiwen Yu, Qi Han

Toward real-time and cooperative mobile visual sensing and sharing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks

Tuo Shi, Siyao Cheng, Zhipeng Cai, Jianzhong Li

Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics

Jingchao Sun, Rui Zhang, Jinxue Zhang, Yanchao Zhang

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Power adjustment and scheduling in OFDMA femtocell networks

Michael Lin, Novella Bartolini, Thomas F. La Porta

Power adjustment and scheduling in OFDMA femtocell networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stochastic geometric analysis of handoffs in user-centric cooperative wireless networks

Wei Bao, Ben Liang

Stochastic geometric analysis of handoffs in user-centric cooperative wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

ARS: Cross-layer adaptive request scheduling to mitigate TCP incast in data center networks

Jiawei Huang, Tian He, Yi Huang, Jianxin Wang

ARS: Cross-layer adaptive request scheduling to mitigate TCP incast in data center networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flutter: Scheduling tasks closer to data across geo-distributed datacenters

Zhiming Hu, Baochun Li, Jun Luo

Flutter: Scheduling tasks closer to data across geo-distributed datacenters

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Helei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang

Enabling secure and effective near-duplicate detection over encrypted in-network storage

Details
Discussion Comments: 0
Verification: Authors have not verified information

A study of personal information in human-chosen passwords and its security implications

Yue Li, Haining Wang, Kun Sun

A study of personal information in human-chosen passwords and its security implications

Details
Discussion Comments: 0
Verification: Authors have not verified information

An efficient auction mechanism for service chains in the NFV market

Sijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang

An efficient auction mechanism for service chains in the NFV market

Details
Discussion Comments: 0
Verification: Authors have not verified information

Robust network tomography: K-Identifiability and monitor assignment

Wei Ren, Wei Dong

Robust network tomography: K-Identifiability and monitor assignment

Details
Discussion Comments: 0
Verification: Authors have not verified information

GlassGesture: Exploring head gesture interface of smart glasses

Shanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li

GlassGesture: Exploring head gesture interface of smart glasses

Details
Discussion Comments: 0
Verification: Authors have not verified information

A hierarchical edge cloud architecture for mobile computing

Liang Tong, Yong Li, Wei Gao

A hierarchical edge cloud architecture for mobile computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Continuous and fine-grained breathing volume monitoring from afar using wireless signals

Phuc Nguyen, Xinyu Zhang, Ann C. Halbower, Tam Vu

Continuous and fine-grained breathing volume monitoring from afar using wireless signals

Details
Discussion Comments: 0
Verification: Authors have not verified information

SAMPO: Online subflow association for multipath TCP with partial flow records

Yang Zhang, Hesham Mekky, Zhi-Li Zhang, Fang Hao, Sarit Mukherjee, T. V. Lakshman

SAMPO: Online subflow association for multipath TCP with partial flow records

Details
Discussion Comments: 0
Verification: Authors have not verified information

Apps on the move: A fine-grained analysis of usage behavior of mobile apps

Lin Yang, Mingxuan Yuan, Wei Wang, Qian Zhang, Jia Zeng

Apps on the move: A fine-grained analysis of usage behavior of mobile apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Just-in-time WLANs: On-demand interference-managed WLAN infrastructures

Kimin Lee, Yeonkeun Kim, Seokhyun Kim, Jinwoo Shin, Seungwon Shin, Song Chong

Just-in-time WLANs: On-demand interference-managed WLAN infrastructures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain

Yuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong

Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain

Details
Discussion Comments: 0
Verification: Authors have not verified information

From rateless to sampleless: Wi-Fi connectivity made energy efficient

Wei Wang, Yingjie Chen, Lu Wang, Qian Zhang

From rateless to sampleless: Wi-Fi connectivity made energy efficient

Details
Discussion Comments: 0
Verification: Authors have not verified information

EMIT: An efficient MAC paradigm for the Internet of Things

Arjun Bakshi, Lu Chen, Kannan Srinivasan, Can Emre Koksal, Atilla Eryilmaz

EMIT: An efficient MAC paradigm for the Internet of Things

Details
Discussion Comments: 0
Verification: Authors have not verified information

A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks

Cong Wang, Ji Li, Yuanyuan Yang, Fan Ye

A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed spectral decomposition in networks by complex diffusion and quantum random walk

Konstantin Avrachenkov, Philippe Jacquet, Jithin K. Sreedharan

Distributed spectral decomposition in networks by complex diffusion and quantum random walk

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding security group usage in a public IaaS cloud

Cheng Jin, Abhinav Srivastava, Zhi-Li Zhang

Understanding security group usage in a public IaaS cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks

XiaoHua Xu, Min Song

Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data

Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-preserving deep packet inspection in outsourced middleboxes

Xingliang Yuan, Xinyu Wang, Jianxiong Lin, Cong Wang

Privacy-preserving deep packet inspection in outsourced middleboxes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensors

Dahee Jeong, Minkyoung Cho, Omprakash Gnawali, HyungJune Lee

Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving delay rate-function optimality in OFDM downlink with time-correlated channels

Zhenzhi Qian, Bo Ji, Kannan Srinivasan, Ness B. Shroff

Achieving delay rate-function optimality in OFDM downlink with time-correlated channels

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed load shedding with minimum energy

Kostas Choumas, Georgios S. Paschos, Thanasis Korakis, Leandros Tassiulas

Distributed load shedding with minimum energy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Symbiosis: Network-aware task scheduling in data-parallel frameworks

Jingjie Jiang, Shiyao Ma, Bo Li, Baochun Li

Symbiosis: Network-aware task scheduling in data-parallel frameworks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online job allocation with hard allocation ratio requirement

Han Deng, I-Hong Hou

Online job allocation with hard allocation ratio requirement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tuning by turning: Enabling phased array signal processing for WiFi with inertial sensors

Kun Qian, Chenshu Wu, Zheng Yang, Zimu Zhou, Xu Wang, Yunhao Liu

Tuning by turning: Enabling phased array signal processing for WiFi with inertial sensors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing

Gaoqiang Zhuo, Qi Jia, Linke Guo, Ming Li, Pan Li

Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network functions virtualization with soft real-time guarantees

Yang Li, Linh Thi Xuan Phan, Boon Thau Loo

Network functions virtualization with soft real-time guarantees

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reducing access latency in erasure coded cloud storage with local block migration

Yaochen Hu, Di Niu

Reducing access latency in erasure coded cloud storage with local block migration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Node-based service-balanced scheduling for provably guaranteed throughput and evacuation time performance

Bo Ji, Gagan Raj Gupta, Yu Sang

Node-based service-balanced scheduling for provably guaranteed throughput and evacuation time performance

Details
Discussion Comments: 0
Verification: Authors have not verified information

An online mechanism for dynamic virtual cluster provisioning in geo-distributed clouds

Weijie Shi, Chuan Wu, Zongpeng Li

An online mechanism for dynamic virtual cluster provisioning in geo-distributed clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

F.Live: Towards interactive live broadcast FTV experience

Shannon Chen, Zhenhuan Gao, Klara Nahrstedt

F.Live: Towards interactive live broadcast FTV experience

Details
Discussion Comments: 0
Verification: Authors have not verified information

BattTracker: Enabling energy awareness for smartphone using Li-ion battery characteristics

Jonghoe Koo, KiTaek Lee, Wonbo Lee, Yongseok Park, Sunghyun Choi

BattTracker: Enabling energy awareness for smartphone using Li-ion battery characteristics

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Coordinated multi-point transmissions based on interference alignment and neutralization

Zhao Li, Sha Cui, Kang G. Shin, Jun Gu

Coordinated multi-point transmissions based on interference alignment and neutralization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cluster-aided mobility predictions

Jaeseong Jeong, Mathieu Leconte, Alexandre Proutière

Cluster-aided mobility predictions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing IPv6 control and data plane stability

Ioana Livadariu, Ahmed Elmokashfi, Amogh Dhamdhere

Characterizing IPv6 control and data plane stability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical antenna selection for WLAN AP

Seungmin Yoo, Seongwon Kim, Youngwook Son, Jaehong Yi, Sunghyun Choi

Practical antenna selection for WLAN AP

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Murphy loves CI: Unfolding and improving constructive interference in WSNs

Vijay S. Rao, M. Koppal, R. Venkatesha Prasad, Tamma V. Prabhakar, Chayan Sarkar, Ignas G. Niemegeers

Murphy loves CI: Unfolding and improving constructive interference in WSNs

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Listen channel randomization for faster Wi-Fi direct device discovery

Weiping Sun, Changmok Yang, Sunggeun Jin, Sunghyun Choi

Listen channel randomization for faster Wi-Fi direct device discovery

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

An economical and SLO-guaranteed cloud storage service across multiple cloud service providers

Guoxin Liu, Haiying Shen

An economical and SLO-guaranteed cloud storage service across multiple cloud service providers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed deterministic broadcasting algorithms under the SINR model

Xiang Tian, Jiguo Yu, Liran Ma, Guangshun Li, Xiuzhen Cheng

Distributed deterministic broadcasting algorithms under the SINR model

Details
Discussion Comments: 0
Verification: Authors have not verified information

CamK: A camera-based keyboard for small mobile devices

Yafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Edmund Novak, Sanglu Lu

CamK: A camera-based keyboard for small mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud

Yixin Chen, Wenbo He, Yu Hua, Wen Wang

CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Friendly channel-oblivious jamming with error amplification for wireless networks

Zhenghao Zhang, Avishek Mukherjee

Friendly channel-oblivious jamming with error amplification for wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure fingertip mouse for mobile devices

Zhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu, Xinwen Fu

Secure fingertip mouse for mobile devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application-aware traffic scheduling for workload offloading in mobile clouds

Liang Tong, Wei Gao

Application-aware traffic scheduling for workload offloading in mobile clouds

Details
Discussion Comments: 0
Verification: Authors have not verified information

The quest for resilient (static) forwarding tables

Marco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, Andrei V. Gurtov, Aleksander Madry, Michael Schapira, Scott Shenker

The quest for resilient (static) forwarding tables

Details
Discussion Comments: 0
Verification: Authors have not verified information

GEM: An analytic geometrical approach to fast event matching for multi-dimensional content-based publish/subscribe services

Wenhao Fan, Yuan'an Liu, Bihua Tang

GEM: An analytic geometrical approach to fast event matching for multi-dimensional content-based publish/subscribe services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploiting channel diversity for rate adaptation in backscatter communication networks

Wei Gong, Haoxiang Liu, Kebin Liu, Qiang Ma, Yunhao Liu

Exploiting channel diversity for rate adaptation in backscatter communication networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Antenna orientation and range assignment in WSNs with directional antennas

Tien Tran, Min Kyung An, Dung T. Huynh

Antenna orientation and range assignment in WSNs with directional antennas

Details
Discussion Comments: 0
Verification: Authors have not verified information

A truthful pricing mechanism for sponsored content in wireless networks

Matthew Andrews, Yue Jin, Martin I. Reiman

A truthful pricing mechanism for sponsored content in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exit equilibrium: Towards understanding voluntary participation in security games

Parinaz Naghizadeh, Mingyan Liu

Exit equilibrium: Towards understanding voluntary participation in security games

Details
Discussion Comments: 0
Verification: Authors have not verified information

EyeVeri: A secure and usable approach for smartphone user authentication

Chen Song, Aosen Wang, Kui Ren, Wenyao Xu

EyeVeri: A secure and usable approach for smartphone user authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Terminal-set-enhanced community detection in social networks

Guangmo Tong, Lei Cui, Weili Wu, Cong Liu, Ding-Zhu Du

Terminal-set-enhanced community detection in social networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the relative de-anonymizability of graph data: Quantification and evaluation

Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah

On the relative de-anonymizability of graph data: Quantification and evaluation

Details
Discussion Comments: 0
Verification: Authors have not verified information

An approximation algorithm for AP association under user migration cost constraint

Wangkit Wong, Avishek Thakur, S.-H. Gary Chan

An approximation algorithm for AP association under user migration cost constraint

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coordinated caching in planet-scale CDNs: Analysis of feasibility and benefits

Kianoosh Mokhtarian, Hans-Arno Jacobsen

Coordinated caching in planet-scale CDNs: Analysis of feasibility and benefits

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heavy-ball: A new approach to tame delay and convergence in wireless network optimization

Jia Liu, Atilla Eryilmaz, Ness B. Shroff, Elizabeth S. Bentley

Heavy-ball: A new approach to tame delay and convergence in wireless network optimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Taming collisions for delay reduction in low-duty-cycle wireless sensor networks

Long Cheng, Yu Gu, Jianwei Niu, Ting Zhu, Cong Liu, Qingquan Zhang, Tian He

Taming collisions for delay reduction in low-duty-cycle wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimal downlink and uplink user association in backhaul-limited HetNets

Nikolaos Sapountzis, Thrasyvoulos Spyropoulos, Navid Nikaein, Umer Salim

Optimal downlink and uplink user association in backhaul-limited HetNets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cost-aware Targeted Viral Marketing in billion-scale networks

Hung T. Nguyen, Thang N. Dinh, My T. Thai

Cost-aware Targeted Viral Marketing in billion-scale networks

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

JurCast: Joint user and rate allocation for video multicast over multiple APs

Hui Wang, Wei Tsang Ooi, Mun Choon Chan

JurCast: Joint user and rate allocation for video multicast over multiple APs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fiber optic vs. wireless sensors in energy-efficient integrated FiWi smart grid networks: An energy-delay and TCO comparison

Dung Pham Van, Bhaskar Prasad Rimal, Martin Maier

Fiber optic vs. wireless sensors in energy-efficient integrated FiWi smart grid networks: An energy-delay and TCO comparison

Details
Discussion Comments: 0
Verification: Authors have not verified information

Temporal correlation of the RSS improves accuracy of fingerprinting localization

Mei Wang, Zhehui Zhang, Xiaohua Tian, Xinbing Wang

Temporal correlation of the RSS improves accuracy of fingerprinting localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity

Zhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Probabilistic demand allocation for cloud service brokerage

Chenxi Qiu, Haiying Shen, Liuhua Chen

Probabilistic demand allocation for cloud service brokerage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-user lax communications: A multi-armed bandit approach

Orly Avner, Shie Mannor

Multi-user lax communications: A multi-armed bandit approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks

Ying Qiu, ShiNing Li, Xiangsen Xu, Zhigang Li

Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing

Songtao Guo, Bin Xiao, Yuanyuan Yang, Yang Yang

Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

MobTrack: Locating indoor interfering radios with a single device

Changlai Du, Ruide Zhang, Wenjing Lou, Y. Thomas Hou

MobTrack: Locating indoor interfering radios with a single device

Details
Discussion Comments: 0
Verification: Authors have not verified information

Frugal topology construction for stream aggregation in the cloud

Rachid Guerraoui, Erwan Le Merrer, Rhicheek Patra, Bao Duy Tran

Frugal topology construction for stream aggregation in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Libra: Impact assessment of cellular load balancing

Kanthi Nagaraj, Ajay Mahimkar, Zihui Ge, Aman Shaikh, Jia Wang, Kevin Mohr, Mark Stockert

Libra: Impact assessment of cellular load balancing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Augmenting wide-band 802.11 transmissions via unequal packet bit protection

Yaxiong Xie, Zhenjiang Li, Mo Li, Kyle Jamieson

Augmenting wide-band 802.11 transmissions via unequal packet bit protection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Network utility maximization with path cardinality constraints

Yingjie Bi, Chee Wei Tan, Ao Tang

Network utility maximization with path cardinality constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

DDoS attack detection under SDN context

Yang Xu, Yong Liu

DDoS attack detection under SDN context

Details
Discussion Comments: 0
Verification: Authors have not verified information

On applying fault detectors against false data injection attacks in cyber-physical control systems

Quyen Dinh Vu, Rui Tan, David K. Y. Yau

On applying fault detectors against false data injection attacks in cyber-physical control systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

De-anonymizing social networks and inferring private attributes using knowledge graphs

Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, Linlin Chen

De-anonymizing social networks and inferring private attributes using knowledge graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Wind blows, traffic flows: Green Internet routing under renewable energy

Yuan Yang, Dan Wang, Dawei Pan, Mingwei Xu

Wind blows, traffic flows: Green Internet routing under renewable energy

Details
Discussion Comments: 0
Verification: Authors have not verified information

ENCORE: An energy-aware multicell cooperation in heterogeneous networks with content caching

Yi-Han Chiang, Wanjiun Liao

ENCORE: An energy-aware multicell cooperation in heterogeneous networks with content caching

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding and diagnosing real-world Femtocell performance problems

Chunyi Peng, Yuanjie Li, Zhuoran Li, Jie Zhao, Jiaqi Xu

Understanding and diagnosing real-world Femtocell performance problems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Smokey: Ubiquitous smoking detection with commercial WiFi infrastructures

Xiaolong Zheng, Jiliang Wang, Longfei Shangguan, Zimu Zhou, Yunhao Liu

Smokey: Ubiquitous smoking detection with commercial WiFi infrastructures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Distributed optimization in energy harvesting sensor networks with dynamic in-network data processing

Shusen Yang, Yad Tahir, Po-Yu Chen, Alan Marshall, Julie A. McCann

Distributed optimization in energy harvesting sensor networks with dynamic in-network data processing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scheduling with multi-level data locality: Throughput and heavy-traffic optimality

Qiaomin Xie, Ali Yekkehkhany, Yi Lu

Scheduling with multi-level data locality: Throughput and heavy-traffic optimality

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

MMPTCP: A multipath transport protocol for data centers

Morteza Kheirkhah, Ian Wakeman, George Parisis

MMPTCP: A multipath transport protocol for data centers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Online multi-stage decisions for robust power-grid operations under high renewable uncertainty

Shizhen Zhao, Xiaojun Lin, Dionysios Aliprantis, Hugo N. Villegas, Minghua Chen

Online multi-stage decisions for robust power-grid operations under high renewable uncertainty

Details
Discussion Comments: 0
Verification: Authors have not verified information

Wisent: Robust downstream communication and storage for computational RFIDs

Jethro Tan, Przemyslaw Pawelczak, Aaron N. Parks, Joshua R. Smith

Wisent: Robust downstream communication and storage for computational RFIDs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Heavy hitters in streams and sliding windows

Ran Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner

Heavy hitters in streams and sliding windows

Details
Discussion Comments: 0
Verification: Authors have not verified information

DESIR: Decoy-enhanced seamless IP randomization

Jianhua Sun, Kun Sun

DESIR: Decoy-enhanced seamless IP randomization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Update or wait: How to keep your data fresh

Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, Can Emre Koksal, Ness B. Shroff

Update or wait: How to keep your data fresh

Details
Discussion Comments: 0
Verification: Authors have not verified information

To live or to die: Encountering conflict information dissemination over simple networks

Jie Wang, Wenye Wang

To live or to die: Encountering conflict information dissemination over simple networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud

Zizhan Zheng, Ness B. Shroff

Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis

Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Top-k queries for multi-category RFID systems

Xiulong Liu, Keqiu Li, Jie Wu, Alex X. Liu, Xin Xie, Chunsheng Zhu, Weilian Xue

Top-k queries for multi-category RFID systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Computing network coded data coverage in an opportunistic data dissemination network

Brenton D. Walker

Computing network coded data coverage in an opportunistic data dissemination network

Details
Discussion Comments: 0
Verification: Author has not verified information

iBGP2: A scalable iBGP redistribution mechanism leading to optimal routing

Marc-Olivier Buob, Anthony Lambert, Steve Uhlig

iBGP2: A scalable iBGP redistribution mechanism leading to optimal routing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Radiation constrained wireless charger placement

Haipeng Dai, Yunhuai Liu, Alex X. Liu, Lingtao Kong, Guihai Chen, Tian He

Radiation constrained wireless charger placement

Details
Discussion Comments: 0
Verification: Authors have not verified information

A walk on the client side: Monitoring enterprise Wifi networks using smartphone channel scans

Jinghao Shi, Lei Meng, Aaron Striegel, Chunming Qiao, Dimitrios Koutsonikolas, Geoffrey Challen

A walk on the client side: Monitoring enterprise Wifi networks using smartphone channel scans

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance-guaranteed approximation algorithm for fault-tolerant connected dominating set in wireless networks

Zhao Zhang, Jiao Zhou, Yuchang Mo, Ding-Zhu Du

Performance-guaranteed approximation algorithm for fault-tolerant connected dominating set in wireless networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cyber maintenance policy optimization via adaptive learning

Yue Tan, Cathy H. Xia

Cyber maintenance policy optimization via adaptive learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Non-asymptotic delay bounds for (k, l) fork-join systems and multi-stage fork-join networks

Markus Fidler, Yuming Jiang

Non-asymptotic delay bounds for (k, l) fork-join systems and multi-stage fork-join networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

An O(1)-competitive online caching algorithm for content centric networking

Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil

An O(1)-competitive online caching algorithm for content centric networking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Accurate WiFi packet delivery rate estimation and applications

Muhammad Owais Khan, Lili Qiu

Accurate WiFi packet delivery rate estimation and applications

Details
Discussion Comments: 0
Verification: Authors have not verified information