Abstract is missing.
- EDASH: Energy-Aware QoE Optimization for Adaptive Video Delivery over LTE NetworksJian Song, Yong Cui, Zongpeng Li, Yayun Bao, Lanshan Zhang, Yangjun Zhang. 1-9 [doi]
- Enhancing Industrial Video Surveillance over Wireless Mesh NetworksChaofan Yang, Chenshu Wu, Zheng Yang, Tongtong Liu, Zuwei Yin, Yunhao Liu, Xufei Mao. 1-9 [doi]
- We Know What You Are Doing or Going to Do: Towards Accurate Human Activities SensingYulong Gu, Mengjia Feng, Yuan Yao, Weidong Liu 0001, Jiaxing Song. 1-9 [doi]
- Heavy Hitter Detection and Identification in Software Defined NetworkingLiang Yang, Bryan Ng, Winston K. G. Seah. 1-10 [doi]
- ActivityHijacker: Hijacking the Android Activity Component for Sensitive DataZhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue, Yingfei Dong. 1-9 [doi]
- Malware Variant Detection Using Opcode Image Recognition with Small Training SetsJixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Sheng Xiao, Yupeng Hu. 1-9 [doi]
- Security and Privacy in Public IoT SpacesAlbert F. Harris III, Hari Sundaram, Robin Kravets. 1-8 [doi]
- Firebird: Network-Aware Task Scheduling for Spark Using SDNsXin He, Prashant J. Shenoy. 1-10 [doi]
- TCP Inigo: Ambidextrous Congestion ControlAndrew G. Shewmaker, Carlos Maltzahn, Katia Obraczka, Scott A. Brandt, John Bent. 1-10 [doi]
- Programming Large-Scale Multi-Robot System with Timing ConstraintsShan Jiang, Jiannong Cao, Yang Liu, Jinlin Chen, Xuefeng Liu. 1-9 [doi]
- Coordinate Transmissions Centrally: A Cross-Layer Approach for WLANsJunmei Yao, Chao Yang, Wei Lou. 1-9 [doi]
- Message Passing for Analysis and Resilient Design of Self-Healing Interdependent Cyber-Physical NetworksAli Behfarnia, Ali Eslami. 1-6 [doi]
- Power-Aware Wireless Transmission for Computation Offloading in Mobile CloudLei Zhang, Cong Zhang, Jiangchuan Liu, Xiaowen Chu, Ke Xu, Haiyang Wang, Yong Jiang. 1-9 [doi]
- Network-Aware Virtual Request Partitioning Based on Spectral ClusteringLingnan Gao, George N. Rouskas. 1-8 [doi]
- High-Performance Intrusion Response Planning on Many-Core ArchitecturesStefano Iannucci, Qian Chen, Sherif Abdelwahed. 1-6 [doi]
- An Evolutionary General Regression Neural Network Classifier for Intrusion DetectionJames Brown, Mohd Anwar, Gerry V. Dozier. 1-5 [doi]
- Rotatable Sensor Scheduling for Multi-Demands of Coverage in Directional Sensor NetworksChong Han, Lijuan Sun, Jian Guo, Changchao Chen. 1-8 [doi]
- A Joint Duty Cycle and Network Coding MAC Protocol for Underwater Wireless Sensor NetworksZhenquan Qin, Yingxiao Sun, Liang Sun, Lei Shu, Lei Wang 0005, Wenzhe Zhang, Bingxian Lu. 1-9 [doi]
- Unidirectional Quorum-Based Cycle Planning for Efficient Resource Utilization and Fault-ToleranceCory J. Kleinheksel, Arun K. Somani. 1-8 [doi]
- The Highly Insidious Extreme Phishing AttacksRui Zhao, Samantha John, Stacy Karas, Cara Bussell, Jennifer Roberts, Daniel Six, Brandon Gavett, Chuan Yue. 1-10 [doi]
- Tailor: Trimming Coflow Completion Times in Datacenter NetworksJingjie Jiang, Shiyao Ma, Bo Li 0001, Baochun Li. 1-9 [doi]
- The State of Simulation Tools for P2P Networks on Mobile Ad-Hoc and Opportunistic NetworksAhmad Cheraghi, Tobias Amft, Salem Sati, Philipp Hagemeister, Kalman Graffi. 1-7 [doi]
- OpERA: Opportunistic and Efficient Resource Allocation in Hadoop YARN by Harnessing Idle ResourcesYi Yao, Han Gao, Jiayin Wang, Ningfang Mi, Bo Sheng. 1-9 [doi]
- Bid and Time Strategyproof Online Spectrum Auctions with Dynamic User Arrival and Dynamic Spectrum SupplyChowdhury Sayeed Hyder, Thomas D. Jeitschko, Li Xiao. 1-9 [doi]
- Characterizing the Effect of Channel Estimation Error on Distributed Reception with Hard Decision ExchangesSabah Razavi, D. Richard Brown. 1-8 [doi]
- A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart GridXinyu Yang, Xialei Zhang, Jie Lin, Wei Yu 0002, Peng Zhao. 1-9 [doi]
- A Buffer Management Strategy Based on Power-Law Distributed Contacts in Delay Tolerant NetworksTuan Le, Haik Kalantarian, Mario Gerla. 1-8 [doi]
- PhoneHome: Robust Extension of Cellular CoveragePaul Schmitt, Daniel Iland, Elizabeth M. Belding, Mariya Zheleva. 1-8 [doi]
- Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired AlgorithmsBriana Arrington, LiEsa Barnett, Rahmira Rufus, Albert C. Esterline. 1-6 [doi]
- Efficient Online Burst Transmission Scheme for Wireless Sensor NetworksZeeshan Ansar, Jianjun Wen, Waltenegus Dargie. 1-9 [doi]
- WiFO: Hybrid WiFi and Free-Space Optical Communication System with PAM Optimal DecodingYu-Jung Chu, Thinh P. Nguyen, Zachary Neil Stark. 1-6 [doi]
- Consensus in the Cloud: Paxos Systems DemystifiedAilidani Ailijiang, Aleksey Charapko, Murat Demirbas. 1-10 [doi]
- Energy-Aware Trajectory Planning for the Localization of Mobile Devices Using an Unmanned Aerial VehicleOleksandr Artemenko, Omachonu Joshua Dominic, Oleksandr Andryeyev, Andreas Mitschele-Thiel. 1-9 [doi]
- Towards Minimal Tardiness of Data-Intensive Applications in Heterogeneous NetworksTong Li, Ke Xu, Meng Sheng, Haiyang Wang, Kun Yang, Yuchao Zhang. 1-9 [doi]
- Source Authentication and Path Validation in Networks Using Orthogonal SequencesHao Cai, Tilman Wolf. 1-10 [doi]
- Hash-Based Overlay Routing Architecture for Information Centric NetworksAytac Azgin, Ravishankar Ravindran, Guoqiang Wang. 1-9 [doi]
- Profiling Optimization for Big Data Transfer over Dedicated ChannelsDaqing Yun, Chase Q. Wu, Nageswara S. V. Rao, Qiang Liu, Rajkumar Kettimuthu, Eun Sung Jung. 1-9 [doi]
- A System Architecture for Managing Complex Experiments in Wireless Sensor NetworksJianjun Wen, Zeeshan Ansar, Waltenegus Dargie. 1-9 [doi]
- Optimizing Downloads over Random Duration Links in Mobile NetworksAmber Bhargava, Spencer Congero, Timothy Ferrell, Alex Jones, Leo Linsky, Jayashree Mohan, Bhaskar Krishnamachari. 1-9 [doi]
- Denial-of-Service Prevention for Software-Defined Network ControllersTilman Wolf, Jingrui Li. 1-10 [doi]
- A Comprehensive Investigation of User Privacy Leakage to Android ApplicationsYuming Ge, Bo Deng, Yi Sun, Libo Tang, Dajiang Sheng, Yantao Zhao, Gaogang Xie, Kavé Salamatian. 1-6 [doi]
- Ultra-Dense Networks: Survey of State of the Art and Future DirectionsWei Yu 0002, Hansong Xu, Hanlin Zhang, David W. Griffith, Nada Golmie. 1-10 [doi]
- Minimizing the Subscription Aggregation Cost in the Content-Based Pub/Sub SystemNing Wang, Jie Wu 0001. 1-9 [doi]
- Fetching Popular Data from the Nearest Replica in NDNJianxun Cao, Dan Pei, Xiaoping Zhang, Beichuan Zhang, Youjian Zhao. 1-9 [doi]
- Copula Analysis of Latent Dependency Structure for Collaborative Auto-Scaling of Cloud ServicesFang Dong, Kui Wu, Venkatesh Srinivasan, Jianping Wang. 1-8 [doi]
- Voice Pattern Hiding for VoIP CommunicationsJialue Fang, Ye Zhu, Yong Guan. 1-9 [doi]
- Stateless Gateways - Reducing Cellular Traffic for Event Distribution in Mobile Social ApplicationsBjörn Richerzhagen, Nils Richerzhagen, Sophie Schönherr, Rhaban Hark, Ralf Steinmetz. 1-9 [doi]
- Diamond-Shaped Mesh Network Routing with Cross-Layer Design to Explore the Benefits of Multi-Beam Smart AntennasKe Bao, Fei Hu, Elizabeth S. Bentley, Sunil Kumar. 1-5 [doi]
- Energy Scheduling for a Smart Home Applying Stochastic Model Predictive ControlMehdi Rahmani-andebili, Haiying Shen. 1-6 [doi]
- Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined NetworksMeng Shen, Liehuang Zhu, Mingwei Wei, Qiongyu Zhang, Mingzhong Wang, Fan Li. 1-8 [doi]
- Trust-Based Neighbor Unreachability Detection for RPLSila Ozen Guclu, Tanir Ozcelebi, Johan J. Lukkien. 1-6 [doi]
- Understanding the Power of Smartrouter-Based Peer CDN for Video StreamingMing Ma, Zhi Wang, Ke Su, Lifeng Sun. 1-9 [doi]
- AMuSe: Adaptive Multicast Services to Very Large Groups - Project OverviewYigal Bejerano, Varun Gupta, Craig Gutterman, Gil Zussman. 1-9 [doi]
- High-Order Hidden Bivariate Markov Model: A Novel Approach on Spectrum PredictionYanxiao Zhao, Zhiming Hong, Guodong Wang, Jun Huang. 1-7 [doi]
- Lightweight Attribute-Based Encryption for the Internet of ThingsNouha Oualha, Kim Thuat Nguyen. 1-6 [doi]
- Performance of Opportunistic Distributed RF Operations in Uncertain and Challenged Network EnvironmentsDavid Shur, Yow-Jian Lin, Anthony McAuley, John Chapin. 1-6 [doi]
- Towards Cloud-Based Crowd-Augmented Spectrum Mapping for Dynamic Spectrum AccessPrabhu Janakaraj, Pu Wang, Zheng Chen. 1-7 [doi]
- Distributed Faulty Node Detection in DTNsWenjie Li, Laura Galluccio, Michel Kieffer, Francesca Bassi. 1-9 [doi]
- Truthful Online Double Auctions with Real-Time Stochastic Arrival of Demand and SupplyChowdhury Sayeed Hyder, Thomas D. Jeitschko, Li Xiao. 1-9 [doi]
- Secure Fine-Grained Access Control of Mobile User Data through Untrusted CloudKai Zhou, Jian Ren. 1-9 [doi]
- Adaptive Latency-Aware Query Processing on Encrypted Data for the Internet of ThingsReshma Kotamsetty, Manimaran Govindarasu. 1-7 [doi]
- Secure and Connected Telehealth Approach to Mitigating Concussion Risks in Student AthletesMatthew Morrison, George Humphrey, John Daigle, John Ralston, Jason Thibado, Andreas Ralston. 1-9 [doi]
- Analysis of Buffer Management Policies for Opportunistic NetworksSalem Sati, Christopher Probst, Kalman Graffi. 1-8 [doi]
- Relationship Privacy Leakage in Network TrafficsJie Hu, Chuang Lin, Xiangyang Li. 1-9 [doi]
- A Generic Mitigation Framework against Cross-VM Covert ChannelsWen Qi, Jin Wang, Hermine Hovhannisyan, Kejie Lu, Jianping Wang, Junda Zhu. 1-10 [doi]
- Performance Analysis of a Hop-by-Hop Relay Selection Strategy in Multi-Hop NetworksHui Sun, Mort Naraghi-Pour. 1-7 [doi]
- A Simpler Constant Factor Approximation for the k-Connected m-Domination Set Problem in Unit Disk GraphBei Liu, Wei Wang 0032, Donghyun Kim, Yingshu Li, Sung-Sik Kwon. 1-8 [doi]
- A Survey of Mobile Crowdsensing Techniques: A Critical Component for the Internet of ThingsJinwei Liu, Haiying Shen, Xiang Zhang. 1-6 [doi]
- Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair SystemJing He, Amir Atabekov, Hisham M. Haddad. 1-6 [doi]
- We Know Where You Are: Home Location Identification in Location-Based Social NetworksYulong Gu, Yuan Yao, Weidong Liu 0001, Jiaxing Song. 1-9 [doi]
- Foundations for Cyber Zone DefenseRobert Mitchell, Paul Sery, Tom Klitsner. 1-7 [doi]
- Reducing State of OpenFlow Switches in Mobile Core Networks by Flow Rule AggregationRamin Khalili, Wint Yi Poe, Zoran Despotovic, Artur Hecker. 1-9 [doi]
- DCT-Based Adaptive Data Compression in Wireless Sensor NetworksSiguang Chen, Jincheng Liu, Meng Wu, Zhixin Sun. 1-5 [doi]
- CII: A Light-Weight Mechanism for ZigBee Performance Assurance under WiFi InterferenceJunyu Hu, Zhenquan Qin, Yingxiao Sun, Lei Shu, Bingxian Lu, Lei Wang. 1-9 [doi]
- A Connection-Driven Mechanism for Energy Saving of Small-Cell NetworksEn-Hau Yeh, Phone Lin, Yi-Bing Lin, Chia-Peng Lee. 1-8 [doi]
- Active Profiling of Physical Devices at Internet ScaleXuan Feng, Qiang Li, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun. 1-9 [doi]
- Uncoordinated MAC for Adaptive Multi-Beam Directional Networks: Analysis and EvaluationGreg Kuperman, Robert Margolies, Nathaniel M. Jones, Brian Proulx, Aradhana Narula-Tam. 1-10 [doi]
- A Coin-Operated Software-Defined ExchangeJames Griffioen, Tilman Wolf, Kenneth L. Calvert. 1-8 [doi]
- Adversarial Authorship, AuthorWebs, and Entropy-Based Evolutionary ClusteringSiobahn C. Day, James Brown, Zachery Thomas, India Gregory, Lowell Bass, Gerry V. Dozier. 1-6 [doi]
- Trust in Information-Centric Networking: From Theory to PracticeChristian F. Tschudin, Ersin Uzun, Christopher A. Wood. 1-9 [doi]
- A Secure Data Learning Scheme in Big Data ApplicationsShengjie Xu, Yi Qian, Rose Qingyang Hu. 1-9 [doi]
- The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow MigrationKlaus-Tycho Förster, Roger Wattenhofer. 1-9 [doi]
- Cooperative Discovery of Personal Places from Location TracesSudip Vhaduri, Christian Poellabauer. 1-9 [doi]
- Cooperative Routing via Overlapping Coalition Formation Game in Cognitive Radio NetworksChowdhury Sayeed Hyder, Li Xiao. 1-6 [doi]
- Leakage-Resilient Key-Aggregate Cryptosystem with Auxiliary InputZhiwei Wang, Lingyu Zhou. 1-5 [doi]
- Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS LogsSpike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer. 1-6 [doi]
- Enhancing Network Security through Software Defined Networking (SDN)Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu. 1-9 [doi]
- Enhancement of VPN Authentication Using GPS Information with Geo-Privacy ProtectionYong Jin, Masahiko Tomoishi, Satoshi Matsuura. 1-6 [doi]
- QAAC: Quality-Assured Adaptive Data Compression for Sensor DataAseel Basheer, Kewei Sha. 1-6 [doi]
- ELBA: Efficient Layer Based Routing Algorithm in SDNAnkit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti. 1-7 [doi]
- Optimizing MapReduce Framework through Joint Scheduling of Overlapping PhasesHuanyang Zheng, Ziqi Wan, Jie Wu. 1-9 [doi]
- A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy ProtectionJunggab Son, Donghyun Kim, Rahman Tashakkori, Alade O. Tokuta, Heekuck Oh. 1-9 [doi]
- Limiting the Footprint of Monitoring in Dynamic Scenarios through Multi-Dimensional OffloadingNils Richerzhagen, Björn Richerzhagen, Rhaban Hark, Dominik Stingl, Ralf Steinmetz. 1-9 [doi]
- Throughput Bounds for Training-Based Multiuser MIMO SystemsCongmin Fan, Xiaojun Yuan, Ying Jun Zhang. 1-7 [doi]
- Impacts of Soil Type and Moisture on the Capacity of Multi-Carrier Modulation in Internet of Underground ThingsAbdul Salam, Mehmet Can Vuran. 1-9 [doi]
- IP Address Consolidation and Reconfiguration in Enterprise NetworksIbrahim El-Shekeil, Amitangshu Pal, Krishna Kant. 1-9 [doi]
- Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set Based ApproachZhuozhao Li, Haiying Shen, Kang Chen. 1-9 [doi]
- On the Feasibility of Distributed Sampling Rate Adaptation in Heterogeneous and Collaborative Wireless Sensor NetworksAmitangshu Pal, Krishna Kant. 1-9 [doi]
- Long-Term Renewable Energy Usage Maximization in a MicrogridTong Liu, Yanmin Zhu, Hongzi Zhu, Jiadi Yu, Yuanyuan Yang, Fan Ye. 1-8 [doi]
- RoadAware: Learning Personalized Road Information on Daily Routes with SmartphonesKang Chen, Haiying Shen. 1-9 [doi]
- SDNsec: Forwarding Accountability for the SDN Data PlaneTakayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig. 1-10 [doi]
- Link Scheduling in Cooperative Communication with SINR-Based InterferenceChenxi Qiu, Haiying Shen. 1-9 [doi]
- Tasklets: "Better than Best-Effort" ComputingDominik Schäfer, Janick Edinger, Justin Mazzola Paluska, Sebastian VanSyckel, Christian Becker. 1-11 [doi]
- SkySAIL: A Flexible Software-Defined Radio Enabled Micro Aerial VehicleOleksandr Andryeyev, Alina Rubina, Oleg Golokolenko, Oleksandr Artemenko, Andreas Mitschele-Thiel. 1-6 [doi]
- Modeling and Performance Analysis of Information-Centric NetworksVenkatesh Ramaswamy. 1-8 [doi]
- Dependability Analysis of Asynchronous Radio Duty Cycling ProtocolsSalih Serdar Guclu, Tanir Ozcelebi, Johan J. Lukkien. 1-11 [doi]
- Hilbert Transform Based Vertical Preprocessing for Side-Channel AnalysisYuchen Cao, Yongbin Zhou, Hailong Zhang, Wei Yang. 1-7 [doi]
- Demystify Undesired Handoff in Cellular NetworksChunyi Peng, Yuanjie Li. 1-9 [doi]
- Experimental Analysis of the Channel Busy Time in Vehicular Ad-Hoc NetworksTorsten Lorenzen. 1-9 [doi]
- Models for Evaluating Effective Throughputs for File Transfers in Mobile ComputingArmen Dzhagaryan, Aleksandar Milenkovic. 1-9 [doi]
- A Feasibility Study of 60 GHz Indoor WLANsSwetank Kumar Saha, Viral Vijay Vira, Anuj Garg, Dimitrios Koutsonikolas. 1-9 [doi]