Abstract is missing.
- Distinguished invited talk - IOT: The promises and the challengesRobin Hillary Kravets. [doi]
- Network-Aware Instance Scheduling in OpenStackMichael Scharf, Manuel Stein, Thomas Voith, Volker Hilt. 1-6 [doi]
- Siesta: Software-Defined Energy Efficient Base Station Control for Green Cellular NetworksSunae Shin, Baek-Young Choi, Sejun Song. 1-8 [doi]
- A New MPLS-Based Quality of Service Architecture for Wireless Mesh NetworksGiovanni Di Stasi, Stefano Avallone. 1-6 [doi]
- HAECubie: A Highly Adaptive and Energy-Efficient Computing DemonstratorFranz Eichhorn, Waltenegus Dargie, Christoph Möbius, Kateryna Rybina. 1-8 [doi]
- Mitigating SDN Controller Performance BottlenecksCosmin Caba, José Soler. 1-6 [doi]
- SCmesh: Solar-Powered Wireless Smart Camera Mesh NetworkLeland Miller, Kevin Abas, Katia Obraczka. 1-8 [doi]
- pcp: Internet Latency Estimation Using CDN ReplicasSamuel Micka, Utkarsh Goel, Hanlu Ye, Mike P. Wittie, Brendan Mumey. 1-8 [doi]
- NDN Live Video Broadcasting over Wireless LANMenghan Li, Dan Pei, Xiaoping Zhang, Beichuan Zhang, Ke Xu. 1-7 [doi]
- Snowballing Effects in Preferential Attachment: The Impact of the Initial LinksHuanyang Zheng, Jie Wu 0001. 1-8 [doi]
- Community and Social Feature-Based Multicast in Opportunistic Mobile Social NetworksCharles Shang, Britney Wong, Xiao Chen, Wenzhong Li, Suho Oh. 1-8 [doi]
- User Experience Driven Multi-Layered Video Based ApplicationsHengky Susanto, Byung-Guk Kim, Benyuan Liu. 1-8 [doi]
- Exploiting Active Sub-Areas for Multi-Copy Routing in VDTNsBo Wu, Haiying Shen, Kang Chen. 1-8 [doi]
- Adaptive Monitoring for Mobile Networks in Challenging EnvironmentsNils Richerzhagen, Dominik Stingl, Björn Richerzhagen, Andreas Mauthe, Ralf Steinmetz. 1-8 [doi]
- Disseminating Authorized Content in Interest-Centric Opportunistic Social NetworksChenguang Kong, Xiaojun Cao. 1-8 [doi]
- AnonAD: Privacy-Aware Micro-Targeted Mobile Advertisements without ProxiesChristopher Buckley, Parth H. Pathak, Aveek K. Das, Chen-Nee Chuah, Prasant Mohapatra. 1-8 [doi]
- Network Connectivity Graph for Malicious Traffic DissectionEnrico Bocchi, Luigi Grimaudo, Marco Mellia, Elena Baralis, Sabyasachi Saha, Stanislav Miskovic, Gaspar Modelo-Howard, Sung-Ju Lee. 1-9 [doi]
- parkITsmart: Minimization of Cruising for ParkingChristos Tsiaras, Livio Hobi, Fabian Hofstetter, Samuel Liniger, Burkhard Stiller. 1-8 [doi]
- QoE-Based Interworking Call Admission, Handoff, and Packet Scheduling System for Multimedia Streaming Services over LTE NetworkWan Kim, Kiseok Park, Hwangjun Song. 1-6 [doi]
- Energy-Efficient Opportunistic Network Coding Algorithms for Wireless NetworksKi-sung Koo, Manimaran Govindarasu. 1-7 [doi]
- An Experimental Platform for Quantified CrowdMateusz Grabowski, Michal Marschall, Wojciech Sirko, Maciej Debski, Marcin Ziombski, Przemyslaw Horban, Szymon Acedanski, Marcin Peczarski, Dominik Batorski, Konrad Iwanicki. 1-6 [doi]
- An AIFSN Prediction Scheme for Multimedia Wireless CommunicationsEstefania Coronado, José Villalón, Luis de la Ossa, Antonio Garrido. 1-8 [doi]
- InfoMax: An Information Maximizing Transport Layer Protocol for Named Data NetworksJongdeog Lee, Akash Kapoor, Md. Tanvir Al Amin, Zhehao Wang, Zeyuan Zhang, Radhika Goyal, Tarek F. Abdelzaher. 1-10 [doi]
- Towards Effective Intra-Flow Network Coding in Software Defined Wireless Mesh NetworksDonghai Zhu, Xinyu Yang, Peng Zhao, Wei Yu. 1-8 [doi]
- Using Ethernet Commodity Switches to Build a Switch Fabric in RoutersMahmoud Mohamed Bahnasy, Andre Beliveau, Brian Alleyne, Bochra Boughzala, Chakri Padala, Karim Idoudi, Halima Elbiaze. 1-8 [doi]
- Extending Software Defined Networking to End User DevicesMarvin Moser, Fabio Jaramillo. 1-8 [doi]
- Road Network-Aware Anonymization in Mobile Systems with Reciprocity SupportBhuvan Bamba, Ling Liu, Emre Yigitoglu. 1-8 [doi]
- Inferring Network Topologies in MANETs Applied to Service RedeploymentSimone Silvestri, Brett Holbert, P. Novotny, Tom La Porta, A. Wolf, Ananthram Swami. 1-8 [doi]
- METhoD: A Framework for the Emulation of a Delay Tolerant Network Scenario for Media-Content Distribution in Under-Served RegionsSandra Siby, Adriano Galati, Theodoros Bourchas, Maria Olivares, Thomas R. Gross, Stefan Mangold. 1-9 [doi]
- Optimal Deployment of Wireless Sensor Networks for Air Pollution MonitoringAhmed Boubrima, Frederic Matigot, Walid Bechkit, Hervé Rivano, Anne Ruas. 1-7 [doi]
- Spectrum Sensing for a Subdivided Band in Cognitive Radio NetworksProsanta Paul, Chunsheng Xin, Min Song, Yanxiao Zhao. 1-8 [doi]
- Design and Implementation of an Autonomous Wireless Sensor-Based Smart HomeChristopher Osiegbu, Seifemichael B. Amsalu, Fatemeh Afghah, Daniel B. Limbrick, Abdollah Homaifar. 1-7 [doi]
- Mynah: Enabling Lightweight Data Plane Authentication for SDN ControllersJin Won Kang, Sae Hyong Park, Jaeho You. 1-6 [doi]
- Demonstrating the Threat of Hardware Trojans in Wireless Sensor NetworksMaryam Jalalitabar, Marco Valero, Anu G. Bourgeois. 1-8 [doi]
- Distributed Beamforming Relay Selection to Increase Base Station Anonymity in Wireless Ad Hoc NetworksJon R. Ward, Mohamed F. Younis. 1-8 [doi]
- Controlled Spectrum Sensing and Scheduling under Resource ConstraintsNicolò Michelusi, Urbashi Mitra. 1-6 [doi]
- On Effectiveness of Smart Grid Applications Using Co-SimulationPaul Moulema, Wei Yu, David W. Griffith, Nada Golmie. 1-8 [doi]
- Throughput and Delay Scaling of Cognitive Radio Networks with Heterogeneous Mobile UsersPengyuan Du, Mario Gerla, Xinbing Wang. 1-8 [doi]
- Tight Bounds on Localized Sensor Self-Deployment for Focused CoverageGokarna Sharma, Hari Krishnan. 1-7 [doi]
- Cost Minimization Online Energy Management for Microgrids with Power and Thermal StoragesXiaoxian Ou, Yiren Shen, Zhipeng Zeng, Guanglin Zhang, Lin Wang. 1-6 [doi]
- Truthful Auction for Resource Allocation in Cooperative Cognitive Radio NetworksXinglong Wang, Liusheng Huang, Hongli Xu, He Huang. 1-8 [doi]
- DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric DetectionMaciej Korczynski, Ali Hamieh, Jun Ho Huh, Henrik Holm, S. Raj Rajagopalan, Nina H. Fefferman. 1-8 [doi]
- REduce: Removing Redundancy from Regular Expression Matching in Network SecurityVictor C. Valgenti, Min Sik Kim, Sung-il Oh, Inbok Lee. 1-10 [doi]
- Security-Aware Resource Allocation for Mobile Cloud Computing SystemsYanchen Liu, Myung J. Lee. 1-8 [doi]
- Privacy Sensitive Resource Access Monitoring for Android SystemsLeah Zhao, Neil Wong Hon Chan, Shanchieh Jay Yang, Roy W. Melton. 1-6 [doi]
- DST: Leveraging Delay-Insensitive Workload in Cloud Storage for Smart Home NetworkSuiming Guo, Liang Chen, Dah-Ming Chiu. 1-8 [doi]
- Building and Evaluating COTS Based Optical Interlinks for NanosatellitesTarek Idriss, Magdy A. Bayoumi. 1-6 [doi]
- Robust Energy-Aware Routing with Uncertain Traffic DemandsHeng Lin, Mingwei Xu, Yuan Yang. 1-8 [doi]
- Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual MachinesXiongwei Xie, Weichao Wang, Tuanfa Qin. 1-8 [doi]
- HAEP: Hospital Assignment for Emergency Patients in a Big CityPeng Liu, Biao Xu, Zhen Jiang, Jie Wu. 1-8 [doi]
- Modeling and Analysis of Availability in Multi-Tenant SaaSWenbo Su, Qu Liu, Chuang Lin, Sherman Shen. 1-8 [doi]
- Novel Applications and Experiments on Programmable InfrastructuresYuki Minami, Kazuhisa Yamada. 1-6 [doi]
- EAFR: An Energy-Efficient Adaptive File Replication System in Data-Intensive ClustersYuhua Lin, Haiying Shen. 1-8 [doi]
- Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNsXiang Cao, Yingfei Dong, David Hung-Chang Du. 1-8 [doi]
- Implementing Physical Layer Security Using Transmitters with Constellation ShapingPaulo Montezuma, Rui Dinis. 1-4 [doi]
- RobustGeo: A Disruption-Tolerant Geo-Routing ProtocolRuolin Fan, Yu-Ting Yu, Mario Gerla. 1-8 [doi]
- TinySet - An Access Efficient Self Adjusting Bloom Filter ConstructionGil Einziger, Roy Friedman. 1-9 [doi]
- Minimizing Bandwidth Cost of CCN: A Coordinated In-Network Caching ApproachYuemei Xu, Zihou Wang, Yang Li, Tao Lin, Wei An, Song Ci. 1-7 [doi]
- Making Dense Networks Work for YouFarhana Ashraf, Robin Hillary Kravets. 1-8 [doi]
- OpenRouteFlow: Enable Legacy Router as a Software-Defined Routing Service for Hybrid SDNTao Feng, Jun Bi. 1-8 [doi]
- A Framework for Security-Aware Virtual Network EmbeddingYang Wang, Phanvu Chau, Fuyu Chen. 1-7 [doi]
- A More Scalable Approach to Content Centric NetworkingJ. J. Garcia-Luna-Aceves. 1-8 [doi]
- Optimizing Load Schedule for Building Energy Management in Smart GridsKebina Manandhar, Xiaojun Cao. 1-7 [doi]
- A Fast Implementation of MPC-KSA Side-Channel DistinguisherChao Zheng, Yongbin Zhou, Yingxian Zheng. 1-7 [doi]
- Enabling Distributed Mobility Management: A Unified Wireless Network Architecture Based on Virtualized Core NetworkJyotirmoy Banik, Marco Tacca, Andrea Fumagalli, Behçet Sarikaya, Li Xue. 1-6 [doi]
- Combo-Pre: A Combination Link Prediction Method in Opportunistic NetworksYin Li, Sanfeng Zhang. 1-6 [doi]
- Toward Latency-Aware Dynamic Middlebox SchedulingPengfei Duan, Qing Li, Yong Jiang, Shu-Tao Xia. 1-8 [doi]
- Efficient Location Privacy for Moving Clients in Database-Driven Dynamic Spectrum AccessErald Troja, Spiridon Bakiras. 1-8 [doi]
- FCell: Towards the Tradeoffs in Designing Data Center Network ArchitecturesDawei Li, Jie Wu. 1-8 [doi]
- Energy Minimization for Cellular Network Interfaces with Dynamic Link QualityXiao Lei, Zaiyang Tang, Peng Li, Hai Jin, Song Guo, Xiaofei Liao, Feng Lu. 1-7 [doi]
- Software Defined Network Inference with Passive/Active Evolutionary-Optimal pRobing (SNIPER)Mehdi Malboubi, Yanlei Gong, Wang Xiong, Chen-Nee Chuah, Puneet Sharma. 1-8 [doi]
- An Agent Based Data Collection Scheme for Vehicular Sensor NetworksHui Huang, Lavy Libman, Glenn Geers. 1-9 [doi]
- Clustered Spatio-Temporal Compression Design for Wireless Sensor NetworksSiguang Chen, Chuanxin Zhao, Meng Wu, Zhixin Sun, Jian Jin. 1-6 [doi]
- Quantifying Benefits of Lossless Compression Utilities on Modern SmartphonesArmen Dzhagaryan, Aleksandar Milenkovic, Martin Burtscher. 1-9 [doi]
- An Effective Policy Relocation Scheme for VM Migration in Software-Defined NetworksKun Xu, Chuang Lin, Zhen Chen, Kun Meng, Mourad Hakmaoui. 1-8 [doi]
- Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCamAli Tekeoglu, Ali Saman Tosun. 1-6 [doi]
- Comparison of OXC Node Architectures for WDM and Flex-Grid Optical NetworksJingxin Wu, Suresh Subramaniam, Hiroshi Hasegawa. 1-8 [doi]
- Adaptive Forward Error Correction for ECG Signal Transmission for Emotional Stress AssessmentHansong Xu, Kun Hua, Guang-Chong Zhu, Jun Huang. 1-7 [doi]
- Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary TransmitterLong Chen, Liusheng Huang, Hongli Xu, Chenkai Yang, Zehao Sun, Xinglong Wang. 1-6 [doi]
- Multi-Authority Attribute Based Encryption Scheme with RevocationXiaofang Huang, Qi Tao, Baodong Qin, Zhiqin Liu. 1-5 [doi]
- Task Allocation for Mobile Cloud Computing in Heterogeneous Wireless NetworksZongqing Lu, Jing Zhao, Yibo Wu, Guohong Cao. 1-9 [doi]
- On the Benefits of Clustered Capillary Networks for Congestion Control in Machine Type Communications over LTERachaen M. Huq, Kevin P. Moreno, Hui Zhu, Jue Zhang, Oscar Ohlsson, Mohammad Istiak Hossain. 1-7 [doi]
- Collaborative Heterogeneous Sensing: An Application to Contamination Detection in Water Distribution NetworksAmitangshu Pal, Krishna Kant. 1-8 [doi]
- Towards a New Quasigroup Block Cipher for a Single-Chip FPGA ImplementationWilliam Mahoney, Abhishek Parakh. 1-6 [doi]
- Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspot in PSNEn Wang, Yongjian Yang, Jie Wu 0001. 1-8 [doi]
- Multiple Service Providers with IP Flow Mobility: From an Economic PerspectiveJun Huang, Yi Sun, Fang Fang, Cong-Cong Xing, Yanxiao Zhao, Kun Hua. 1-8 [doi]
- MAC Protocol Design Using Evolvable State-MachinesFaezeh Hajiaghajani, Subir Biswas. 1-6 [doi]
- OpenFlow Accelerator: A Decomposition-Based Hashing Approach for Flow ProcessingHai Sun, Yan Lindsay Sun, Victor C. Valgenti, Min Sik Kim. 1-10 [doi]
- Coalition Formation Towards Energy-Efficient Collaborative Mobile ComputingLiyao Xiang, Baochun Li, Bo Li. 1-8 [doi]
- A General Analytical Model for Spatial and Temporal Performance of Bitmap Index Compression Algorithms in Big DataYinjun Wu, Zhen Chen, Yuhao Wen, Junwei Cao, Wenxun Zheng, Ge Ma. 1-10 [doi]
- Enhancing and Implementing Fully Transparent Internet VotingKevin Butterfield, Huian Li, Xukai Zou, Feng Li. 1-6 [doi]
- Faster Web through Client-Assisted CDN Server SelectionUtkarsh Goel, Mike P. Wittie, Moritz Steiner. 1-10 [doi]
- An Adaptive Reservation Scheme for Effective QoS Provisioning in the Cloud SDN StackAbiola Adegboyega. 1-6 [doi]
- A Robust Diffusion Adaptive Network Based on the Maximum Correntropy CriterionWael M. Bazzi, Amir Rastegarnia, Azam Khalili. 1-4 [doi]
- IPv6 Transition for the Other BillionsGuoliang Han, CongXiao Bao, Xing Li, Shuo Liu. 1-10 [doi]
- Impact of Network Performance on Cloud Speech RecognitionMehdi Assefi, Mike P. Wittie, Allan Knight. 1-6 [doi]
- Adaptive Sleep-Time Management Model for WSNsEyuel D. Ayele, Jianjun Wen, Zeeshan Ansar, Waltenegus Dargie. 1-7 [doi]
- D2CS: Dynamic Duty Cycle Scheme in an Opportunistic Routing Sensor NetworkBingxin Niu, Heng Qi, Keqiu Li, Xiulong Liu, Weilian Xue. 1-8 [doi]
- Discovering the Densest Subgraph in MapReduce for Assortative Big Natural GraphsBo Wu, Haiying Shen. 1-6 [doi]
- SocialQ&A: An Online Social Network Based Question and Answer SystemHaiying Shen, Guoxin Liu, Nikhil Vithlani. 1-8 [doi]
- Padded-Dyck-Path-Based Rendezvous Algorithms for Heterogeneous Cognitive Radio NetworksBo Yang, Meng Zheng, Wei Liang. 1-8 [doi]
- WiG: WiFi-Based Gesture Recognition SystemWenfeng He, Kaishun Wu, Yongpan Zou, Zhong Ming. 1-7 [doi]
- Utility-Based Uploading Strategy in Cloud ScenariosZiqi Wan, Jie Wu 0001, Huanyang Zheng. 1-8 [doi]
- Attribute-Based Online/Offline Encryption in Smart GridZhiwei Wang, Feng Chen, Aidong Xia. 1-5 [doi]
- Spectrum Assignment in Mesh Elastic Optical NetworksMahmoud Fayez, Iyad Katib, George N. Rouskas, H. M. Faheem. 1-6 [doi]
- DOVE: Data Offloading through Spatio-Temporal Rendezvous in Vehicular NetworksMunyoung Lee, Jung Hwan Song, Jaehoon Jeong, Ted Kwon. 1-8 [doi]
- RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P NetworksXing Jin, MingChu Li, Guanghai Cui, Jia Liu, Cheng Guo, Yongli Gao, Bo Wang, Xing Tan. 1-8 [doi]
- Optimizing the Loads of Multi-Player Online Game Servers Using Markov ChainsAamir Saeed, Rasmus Løvenstein Olsen, Jens Myrup Pedersen. 1-5 [doi]