Abstract is missing.
- The Sticking Heartbeat Aperture Resynchronization ProtocolSantiago Gonzalez, Tracy Camp, Katia Jaffrès-Runser. 1-8 [doi]
- A Sensor Network for Real-Time Volcano Tomography: System Design and DeploymentDennis E. Phillips, Mohammad-Mahdi Moazzami, Guoliang Xing, Jonathan M. Lees. 1-9 [doi]
- Fault-Tolerant and Secure Data Transmission Using Random Linear Network CodingPouya Ostovari, Jie Wu 0001. 1-9 [doi]
- An Android ITS Driving Safety Application Based on Vehicle-to-Vehicle (V2V) CommunicationsSeilendria A. Hadiwardoyo, Subhadeep Patra, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni. 1-6 [doi]
- RealDroid: Large-Scale Evasive Malware Detection on "Real Devices"Lang Liu, Yacong Gu, Qi Li, Purui Su. 1-8 [doi]
- Securing PKI Requests for C-ITS SystemsJean Philippe Monteuuis, Badis Hammi, Eduardo Salles, Houda Labiod, Remi Blancher, Erwan Abalea, Brigitte Lonc. 1-8 [doi]
- Mean Holding Time in Sync of Lossy IEEE 802.15.4e TSCH Networks for Industrial IOT ApplicationsHo-Ting Wu, Kai-Wei Ke, Po-Hung Chen, Chun-Ting Lin, Ming-Che Chen. 1-2 [doi]
- A QoE-Driven Spectrum Decision Scheme for Multimedia Transmissions over Cognitive Radio NetworksLing Wang, Junjie Yang, Xiaojun Song. 1-5 [doi]
- Application of Learning Using Privileged Information(LUPI): Botnet DetectionAngelo Sapello, Constantin Serban, Ritu Chadha, Rauf Izmailov. 1-8 [doi]
- LB-MAP: Load-Balanced Middlebox Assignment in Policy-Driven Data CentersManar Alqarni, Alexander Ing, Bin Tang. 1-9 [doi]
- BASIC Codes for Distributed Storage SystemsHanxu Hou, Yunghsiang S. Han. 1-9 [doi]
- Analysis of the Scope of Dynamic Power Management in Emerging Server ArchitecturesMarkus Hähnel, Waltenegus Dargie, Alexander Schill. 1-6 [doi]
- Augmenting Security of Internet-of-Things Using Programmable Network-Centric Approaches: A Position PaperHammad Iqbal, Jamie Ma, Qing Mu, Venkatesh Ramaswamy, Gabby Raymond, Daniel Vivanco, John Zuena. 1-6 [doi]
- Unveiling Access Point Signal Instability in WiFi-Based Passive SensingGiuseppe Bianchi, Simone Di Domenico, Mauro De Sanctis, Laura Liberati, Valerio Perrotta, Ernestina Cianca. 1-9 [doi]
- The Design of Cyber Threat Hunting Games: A Case StudyMd. Nazmus Sakib Miazi, Mir Mehedi A. Pritom, Mohamed Shehab, Bill Chu, Jinpeng Wei. 1-6 [doi]
- Service Placement in Complex Active NetworksHatem Ibn-Khedher, Hossam Afifi, Ahmed E. Kamal. 1-9 [doi]
- Energy-Efficient Load-Balanced Heterogeneous Mobile CloudChien-An Chen, Radu Stoleru, Geoffrey G. Xie. 1-9 [doi]
- Stability Analysis of Slotted Aloha Protocol for Cognitive Radio Users Using TUAInoussa Ns. Mouiche, Maher Bouidani. 1-2 [doi]
- TANDEM: Prioritizing Wireless Communication for Robust Industrial Process ControlRoman Naumann, Stefan Dietzel, Laura Wartschinski, Ben Schumacher, Björn Scheuermann. 1-9 [doi]
- A Highly Adaptive and Energy-Efficient Optical Interconnect for On-Board Server CommunicationsWaltenegus Dargie, David Schoeniger, László Szilágyi, Xin An, Ronny Henker, Frank Ellinger. 1-8 [doi]
- Big RF Data Assisted Cognitive Radio Network Coexistence in 3.5GHz BandOluwaseyi Omotere, Lijun Qian, Riku Jäntti, Miao Pan, Zhu Han. 1-8 [doi]
- Preventing Misuse of Duplicate Certificates in IoT/M2M SystemsYu-Hao Hsu, Fuchun Joseph Lin. 1-8 [doi]
- Optimising DASH over AQM-Enabled Gateways Using Intra-Chunk Parallel Retrieval (Chunklets)Jonathan Kua, Grenville Armitage. 1-9 [doi]
- Service-Concatenation Routing with Applications to Network Functions VirtualizationShireesh Bhat, George N. Rouskas. 1-9 [doi]
- Internet of Vehicles and Autonomous Connected Car - Privacy and Security IssuesJoshua Joy, Mario Gerla. 1-9 [doi]
- The Financialization of Cloud Computing: Opportunities and ChallengesDavid E. Irwin, Prateek Sharma, Supreeth Shastri, Prashant J. Shenoy. 1-11 [doi]
- GLFR: A Generalized LFR Benchmark for Testing Community Detection AlgorithmsBa Dung Le, Hung X. Nguyen, Hong Shen, Nickolas J. G. Falkner. 1-9 [doi]
- Automated Labeling of Unknown Contracts in EthereumRobert Norvill, Beltran Borja Fiz Pontiveros, Radu State, Irfan Awan, Andrea J. Cullen. 1-6 [doi]
- A Study and Comparison of Human and Deep Learning Recognition Performance under Visual DistortionsSamuel F. Dodge, Lina J. Karam. 1-7 [doi]
- Incentive Mechanism Design in Mobile Crowd Sensing Systems with Budget Restriction and Capacity LimitYu Zhou, Yuan Zhang, Sheng Zhong. 1-9 [doi]
- Secure and Anonymous Vehicle Access Control System to Traffic-Restricted Urban AreasJordi Castellà-Roca, Macià Mut Puigserver, Magdalena Payeras-Capellà, Alexandre Viejo, Carles Angles-Tafalla. 1-7 [doi]
- A Bloom Filter-Based Dual-Layer Routing Scheme in Large-Scale Mobile NetworksWeichao Gao, James Nguyen, Yalong Wu, William G. Hatcher, Wei Yu 0002. 1-9 [doi]
- Enhanced AODV: Detection and Avoidance of Black Hole Attack in Smart Meter NetworkMd Raqibull Hasan, Yanxiao Zhao, Guodong Wang, Yu Luo, Robb M. Winter. 1-6 [doi]
- Hybrid Indoor Tracking Using Crowdsourced MeasurementsZafer Vatansever, Maïté Brandt-Pearce. 1-7 [doi]
- Design of a Heterogeneous Cellular Network with a Wireless BackhaulMeghana Bande, Venugopal V. Veeravalli. 1-7 [doi]
- Hands-On Learning for Computer Network Security with Mobile DevicesKai Qian, Yong Shi, Lixin Tao, Ying Qian. 1-6 [doi]
- Browsing an Augmented Reality with Named Data NetworkingJeff Burke. 1-9 [doi]
- Proximity-Aware IaaS for Edge Computing EnvironmentHiroaki Yamanaka, Eiji Kawai, Yuuichi Teranishi, Hiroaki Harai. 1-10 [doi]
- Validation of a New Model-Free Signal Processing Method for Gait Feature Extraction Using Inertial Measurement Units to Diagnose and Quantify the Severity of Parkinson's DiseaseAli Akbari, Richard B. Dewey, Roozbeh Jafari. 1-5 [doi]
- Incremental SDN-Enabled Switch Deployment for Hybrid Software-Defined NetworksMeitian Huang, Weifa Liang. 1-6 [doi]
- Optimize Routing in Hybrid SDN Network with Changing TrafficYingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu. 1-8 [doi]
- On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social NetworksSigit Aryo Pambudi, Wenye Wang, Cliff Wang. 1-9 [doi]
- It's about Time: Securing Broadcast Time Synchronization with Data Origin AuthenticationRobert Annessi, Joachim Fabini, Tanja Zseby. 1-11 [doi]
- Over-The-Air TV Detection Using Mobile DevicesMohamed Ibrahim, Marco Gruteser, Khaled A. Harras, Moustafa Youssef. 1-9 [doi]
- User Association Algorithm for Throughput Improvement in High-Density Wireless NetworksOmneya Issa, Ying Ge, Aizaz U. Chaudhry, Bernard Doray. 1-8 [doi]
- An Overview of Access Control Mechanisms for Internet of ThingsMousa Alramadhan, Kewei Sha. 1-6 [doi]
- Connectivity-Aware Task Outsourcing and Scheduling in D2D NetworksZhen Hong, Zehua Wang, Wei Cai, Victor C. M. Leung. 1-9 [doi]
- Towards High Fidelity Network EmulationLianjie Cao, Xiangyu Bu, Sonia Fahmy, Siyuan Cao. 1-11 [doi]
- An Incentive-Based Mixed QoE Framework for Content Delivery to Smart HomesSuiming Guo, Liang Chen, Dah-Ming Chiu. 1-9 [doi]
- PASS: Content Pre-Staging through Provider Accessible Storage ServiceXueheng Hu, Aaron Striegel. 1-8 [doi]
- WiTraffic: Low-Cost and Non-Intrusive Traffic Monitoring System Using WiFiMyounggyu Won, Shaohu Zhang, Sang Hyuk Son. 1-9 [doi]
- Enhancing Usability for the Wireless Charging Vehicle SimulatorShuo-Han Chen, I-Ju Wang, Tseng-Yi Chen, Hsin-Wen Wei, Tsan-sheng Hsu, Wei Kuan Shih. 1-2 [doi]
- Comparison of Virtualization Algorithms and Topologies for Data Center NetworksHanene Ben Yedder, Qingye Ding, Umme Zakia, Zhida Li, Soroush Haeri, Ljiljana Trajkovic. 1-6 [doi]
- The Computer for the 21st Century: Security & Privacy Challenges after 25 YearsLeonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Jie Liu. 1-10 [doi]
- Wireless Interference Prediction for Embedded Health DevicesJiangmin Yu, Michael Farcasin, Eric Chan-Tin. 1-6 [doi]
- Realistic Models for Characterizing the Performance of Unmanned Aerial VehiclesKen Goss, Riccardo Musmeci, Simone Silvestri. 1-9 [doi]
- NDNS: A DNS-Like Name Service for NDNAlexander Afanasyev, Xiaoke Jiang, Yingdi Yu, Jiewen Tan, Yumin Xia, Allison Mankin, Lixia Zhang 0001. 1-9 [doi]
- AutoPath: Harnessing Parallel Execution Paths for Efficient Resource Allocation in Multi-Stage Big Data FrameworksHan Gao, Zhengyu Yang, Janki Bhimani, Teng Wang, Jiayin Wang, Bo Sheng, Ningfang Mi. 1-9 [doi]
- Quantifying the Scalability of Software Defined Networks with Dynamic TopologyVenkatesh Ramaswamy. 1-7 [doi]
- Evaluating Different Pricing Algorithms for a Flexible Optical Choice-Based NetworkRobinson Udechukwu, Rudra Dutta, Takaya Miyazawa, Hiroaki Harai. 1-2 [doi]
- Experiments and Analyses of Data Transfers over Wide-Area Dedicated ConnectionsNageswara S. V. Rao, Qiang Liu, Satyabrata Sen, Jesse Hanley, Ian T. Foster, Rajkumar Kettimuthu, Chase Q. Wu, Daqing Yun, Don Towsley, Gayane Vardoyan. 1-9 [doi]
- EvilDirect: A New Wi-Fi Direct Hijacking Attack and CountermeasuresAla Altaweel, Radu Stoleru, Guofei Gu. 1-11 [doi]
- Constant Time Weighted Frequency Estimation for Virtual Network FunctionalitiesGil Einziger, Marcelo Caggiani Luizelli, Erez Waisbard. 1-9 [doi]
- Achieving Spectrum Efficient Communication under Cross-Technology InterferenceShuai Wang, Zhimeng Yin, Song Min Kim, Tian He. 1-8 [doi]
- An Efficient Privacy-Preserving Localization Algorithm for Pervasive ComputingGuanghui Wang, Jianping Pan, Jianping He, Subin Shen. 1-9 [doi]
- Anomaly Free on Demand Stateful Software Defined FirewallingZainul Din, Jaudelice de Oliveira. 1-9 [doi]
- nTorrent: Peer-to-Peer File Sharing in Named Data NetworkingSpyridon Mastorakis, Alexander Afanasyev, Yingdi Yu, Lixia Zhang 0001. 1-10 [doi]
- ForestStream: Accurate Measurement of Cascades in Online Social NetworksLong Gong, Lanxi Huang, Paul Tune, Jinyoung Han, Chen-Nee Chuah, Matthew Roughan, Jun (Jim) Xu. 1-9 [doi]
- Legally Speaking: Smart Contracts, Archival Bonds, and Linked Data in the BlockchainDarra L. Hofman. 1-4 [doi]
- Separating Communication Policies and Mechanisms to Make Protocol Layering ClearerHiroki Watanabe, Takao Kondo, Kunitake Kaneko, Fumio Teraoka. 1-9 [doi]
- Effects of GPS Error on Geographic RoutingJustin P. Rohrer. 1-2 [doi]
- Decision Support for Computational Offloading by Probing Unknown ServicesChristian Meurisch, Julien Gedeon, The An Binh Nguyen, Fabian Kaup, Max Mühlhäuser. 1-9 [doi]
- Performance Analysis of Private Blockchain Platforms in Varying WorkloadsSuporn Pongnumkul, Chaiyaphum Siripanpornchana, Suttipong Thajchayapong. 1-6 [doi]
- Disseminating Large Data in Vehicular Ad Hoc NetworksD. P. Tejas, Chinmaya Pancholi, Arobinda Gupta. 1-6 [doi]
- Leveraging Wireless Virtualization for Network Capacity Optimization in HetNetsDanda B. Rawat, Taylor White, Min Song 0002, Chongqing Zhang. 1-6 [doi]
- Coverage Algorithms for WiFO: A Hybrid FSO-WiFi Femtocell Communication SystemYang Zhang, Yu-Jung Chu, Thinh P. Nguyen. 1-6 [doi]
- Upgrading Wireless Home Routers as Emergency Cloudlet and Secure DTN Communication BridgeChristian Meurisch, The An Binh Nguyen, Julien Gedeon, Florian Kohnhäuser, Milan Schmittner, Stefan Niemczyk, Stefan Wullkotte, Max Mühlhäuser. 1-2 [doi]
- Energy and Delay-Aware Traffic Control and Management in Large Scale NetworksQun Yu, Taieb Znati. 1-8 [doi]
- Monotonic Optimization for Power Assignment in Two-Way Cognitive Radio Networks with Shared-Band Amplify-and-Forward RelaysUdit Pareek, Daniel C. Lee 0001. 1-6 [doi]
- How Much Are Your Neighbors Interfering with Your WiFi Delay?Changhua Pei, Youjian Zhao, Guo Chen, Yuan Meng, Yang Liu, Ya Su, Yaodong Zhang, Ruming Tang, Dan Pei. 1-9 [doi]
- SonarBeat: Sonar Phase for Breathing Beat Monitoring with SmartphonesXuyu Wang, Runze Huang, Shiwen Mao. 1-8 [doi]
- CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information FusionVidyasagar Sadhu, Dario Pompili, Saman A. Zonouz, Vincent Sritapan. 1-9 [doi]
- GreenWay: Joint VM Placement and Topology Adaption for Green Data Center NetworkingShenghui Yan, Shihan Xiao, Yuchi Chen, Yong Cui, Jiangchuan Liu. 1-9 [doi]
- Optimal PPDU Duration Algorithm for VHT MU-MIMO SystemsAitizaz Uddin Syed, Mohsin Iftikhar, Ljiljana Trajkovic. 1-2 [doi]
- Enjoy the Silence: Noise Control with SmartphonesTaesik Gong, Jun Hyuk Chang, Joon-Gyum Kim, Soowon Kang, Donghwi Kim, Sung-Ju Lee. 1-9 [doi]
- The Application of Blockchain Technology in E-Government in ChinaHeng Hou. 1-4 [doi]
- Friend Recommendation in Online Social Networks: Perspective of Social Influence MaximizationHuanyang Zheng, Jie Wu 0001. 1-9 [doi]
- Privacy Risks for Multi-Criteria Collaborative Filtering SystemsAlper Yargic, Alper Bilge. 1-6 [doi]
- TupleMerge: Building Online Packet Classifiers by Omitting BitsJames Daly, Eric Torng. 1-10 [doi]
- Joint Optimization of Task Placement and Routing in Minimizing Inter-DC Coflow Completion TimeYingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu. 1-2 [doi]
- Memento: An Emotion Driven Lifelogging System with WearablesShiqi Jiang, Pengfei Zhou, Zhenjiang Li, Mo Li. 1-9 [doi]
- Improving WiFi Network Performance under MPTCP UsersMijanur Rahaman Palash, Kang Chen. 1-2 [doi]
- Selection and Aggregation of Location Information Provisioning ServicesFilip Lemic, Vlado Handziski, Mladen Miksa, Jan M. Rabaey, John Wawrzynek, Adam Wolisz. 1-9 [doi]
- Tars: Timeliness-Aware Adaptive Replica Selection for Key-Value StoresWanchun Jiang, Liyuan Fang, HaiMing Xie, Xiangqian Zhou, Jianxin Wang. 1-9 [doi]
- Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User NetworksLongfei Wu, Xiaojiang Du, Jie Wu 0001, Bin Song. 1-9 [doi]
- Lightweight Framework for Reliable Job Scheduling in Heterogeneous CloudsMuhammed Abdulazeez, Pawel Garncarek, Prudence W. H. Wong. 1-6 [doi]
- Lilliput: A Storage Service for Lightweight Peer-to-Peer Online Social NetworksThomas Paul, Niklas Lochschmidt, Hani Salah, Anwitaman Datta, Thorsten Strufe. 1-10 [doi]
- LASER: A Deep Learning Approach for Speculative Execution and Replication of Deadline-Critical Jobs in CloudMaotong Xu, Sultan Alamro, Tian Lan, Suresh Subramaniam. 1-8 [doi]
- Long-Term Public Blockchain: Resilience against Compromise of Underlying CryptographyMasashi Sato, Shin'ichiro Matsuo. 1-8 [doi]
- CoC: Secure Supply Chain Management System Based on Public LedgerLei Xu, Lin Chen, Zhimin Gao, Yang Lu, Weidong Shi. 1-6 [doi]
- Context-Aware Task Offloading for Wearable DevicesYi Yang, Yeli Geng, Li Qiu, Wenjie Hu, Guohong Cao. 1-9 [doi]
- Uniform Circle Formation by Asynchronous Robots: A Fully-Distributed ApproachShan Jiang, Jiannong Cao, Jia Wang, Milos Stojmenovic, Julien Bourgeois. 1-9 [doi]
- DisVis 2.0: Decision Support for Rescue Missions Using Predictive Disaster Simulations with Human-Centric ModelsChristian Meurisch, The An Binh Nguyen, Martin Kromm, Andrea Ortiz, Ragnar Mogk, Max Mühlhäuser. 1-2 [doi]
- EDOS: Edge Assisted Offloading System for Mobile DevicesHank H. Harvey, Ying Mao, Yantian Hou, Bo Sheng. 1-9 [doi]
- Security Analysis Based on Petri Net for Separation Mechanisms in Smart Identifier NetworkLinyuan Yao, Ping Dong, Xiaojiang Du, Hongke Zhang. 1-6 [doi]
- Efficient Parallelization of Regular Expression Matching for Deep InspectionZhe Fu, Zhi Liu, Jun Li. 1-9 [doi]
- High Availability for VM Placement and a Stochastic Model for Multiple KnapsackBochao Shen, Ravi Sundaram, Alexander Russell, Srinivas Aiyar, Karan Gupta, Abhinay Nagpal, Aditya Ramesh, Himanshu Shukla. 1-9 [doi]
- An Attribute & Network Coding-Based Secure Multicast Protocol for Firmware Updates in Smart Grid AMI NetworksSamet Tonyali, Kemal Akkaya, Nico Saputro, Xiuzhen Cheng. 1-9 [doi]
- Closing the Floodgate with Stateless Content-Centric NetworkingCesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood. 1-10 [doi]
- Detecting Link Fabrication Attacks in Software-Defined NetworksDylan Smyth, Seán McSweeney, Donna O'Shea, Victor Cionca. 1-8 [doi]
- Wireless VR/AR with Edge/Cloud ComputingXueshi Hou, Yao Lu, Sujit Dey. 1-8 [doi]
- A Simple Solution to Scale-Free Internet Host MobilityJ. J. Garcia-Luna-Aceves, Spencer Sevilla. 1-9 [doi]
- Downlink Channel Estimation in Massive MIMO FDD Systems Using Block-ADMMAli Cagatay Cirik, Naveen Mysore Balasubramanya, Lutz Lampe. 1-6 [doi]
- An Approach for Reducing Energy Consumption in Dependable Virtual Network EmbeddingVictor Lira, Eduardo Tavares, Meuse N. Oliveira Jr.. 1-9 [doi]
- Channel Assignment in Cognitive Radio Networks: A Joint Utility and Stable Matching ApproachSayantan Chowdhury, Jianping Pan. 1-9 [doi]
- A Study on Log Analysis Approaches Using Sandia DatasetMir Mehedi A. Pritom, Chuqin Li, Bill Chu, Xi Niu. 1-6 [doi]
- A Secure Mobile Cloud Photo Storage SystemDavid Schwab, Li Yang, Katherine Winters, Matthew Jallouk, Emile Smith, Adam Claiborne. 1-5 [doi]
- Bio-Inspired on Demand Routing Protocol for Unmanned Aerial VehiclesNour El Houda Bahloul, Saadi Boudjit, Marwen Abdennebi, Djallel Eddine Boubiche. 1-6 [doi]
- NACID: A Neighborhood Aware Caching and Interest Dissemination in Content Centric NetworksAmitangshu Pal, Krishna Kant. 1-9 [doi]
- CityScape: A Metro-Area Spectrum ObservatoryS. Roy, K. Shin, A. Ashok, M. McHenry, G. Vigil, S. Kannam, D. Aragon. 1-9 [doi]
- Benefits of FlowQueue-Based Active Queue Management for Interactive Online GamesGrenville Armitage, Russell Collom. 1-9 [doi]
- Power-Aware Lightpath Management for SDN-Based Elastic Optical NetworksYu Xiong, Jin Shi, Yi Lv, George N. Rouskas. 1-9 [doi]
- Channel Quality Correlation Based Channel Probing in Multiple ChannelsYu Zhao, Tingting Yu. 1-9 [doi]
- Syscoin: A Peer-to-Peer Electronic Cash System with Blockchain-Based Services for E-BusinessJagdeep Sidhu. 1-6 [doi]
- Fade Duration Based Sleep Mode Activation in Dense Femtocell Cluster NetworksAklilu Assefa Gebremichail, Cory Beard. 1-6 [doi]
- A Bridging VPN for Connecting Wireless Sensor Networks to Data CentersHiroaki Hata. 1-6 [doi]
- VIP Lanes: High-Speed Custom Communication Paths for Authorized FlowsJames Griffioen, Kenneth L. Calvert, Zongming Fei, P. Sergio Rivera, Jacob Chappell, Mami Hayashida, Charles Carpenter, Yongwook Song, Hussamuddin Nasir. 1-9 [doi]
- Dynamically Reconfigurable Architecture for Fault-Tolerant 2D Networks-on-ChipPoona Bahrebar, Azarakhsh Jalalvand, Dirk Stroobandt. 1-7 [doi]
- Private Information Diffusion Control in Cyber Physical Systems: A Game Theory PerspectiveJingjing Wang, Chunxiao Jiang, Zhu Han, Tony Q. S. Quek, Yong Ren. 1-10 [doi]
- Video Streaming Schemes for Industrial IoTHajime Kanzaki, Kevin Schubert, Nicholas Bambos. 1-7 [doi]
- Safeguarding Building Automation Networks: THE-Driven Anomaly Detector Based on Traffic AnalysisZhiyuan Zheng, A. L. Narasimha Reddy. 1-11 [doi]
- Mobility of Everything (MoE): An Integrated and Distributed Mobility ManagementSangyup Han, Jaehyun Park, Haeun Kim, Jaehee Ha, Seungwon Shin, Sungwon Kang, Myungchul Kim. 1-11 [doi]
- Periodic Scheduling of Deadline-Constrained Variable Slot-Bandwidth Reservations for Scientific CollaborationYongqiang Wang, Chase Q. Wu, Aiqin Hou. 1-9 [doi]
- Cider: A Case for Block Level Variable Redundancy on a Distributed Flash ArraySharath Chandrashekhara, Madhusudhan R. Kumar, Mahesh Venkataramaiah, Vipin Chaudhary. 1-9 [doi]
- Two-Stage Mixed Queuing Model for Web Security Gateway Performance EvaluationShichang Xuan, Dapeng Man, Wei Wang, Jiangchuan Zhang, Wu Yang, Xiaojiang Du. 1-7 [doi]
- Robust Controller Placement and Assignment in Software-Defined Cellular NetworksMohammad J. Abdel-Rahman, EmadelDin A. Mazied, Kory Teague, Allen B. MacKenzie, Scott F. Midkiff. 1-9 [doi]
- Balancer: A Traffic-Aware Hybrid Rule Allocation Scheme in Software Defined NetworksDingmin Wang, Qing Li, Yong Jiang, Mingwei Xu, Guangwu Hu. 1-9 [doi]
- Analyzing Android Application in Real-Time at Kernel LevelHao Ruan, Xiao Fu, Xuanyu Liu, Xiaojiang Du, Bin Luo. 1-9 [doi]
- A New Approach to Online, Multivariate Network Traffic AnalysisJinoh Kim, Alex Sim. 1-6 [doi]
- On the Data Aggregation Point Placement in Smart Meter NetworksGuodong Wang, Yanxiao Zhao, Jun Huang, Robb M. Winter. 1-6 [doi]
- QoS-Oriented Management of Automobile Cruise Control ProcessesArun Adiththan, Kaliappa Ravindran. 1-6 [doi]
- Building a Lightweight Testbed Using Devices in Personal Area NetworksQiaozhi Xu, Junxing Zhang. 1-2 [doi]
- Identifying the Social Signals That Drive Online Discussions: A Case Study of Reddit CommunitiesBenjamin D. Horne, Sibel Adali, Sujoy Sikdar. 1-9 [doi]
- Replacing Free-Ranging Robots with Alternative Mobile NodesHugues Smeets, Matteo Ceriotti, Eduardo Ferrera, Pedro José Marrón. 1-9 [doi]
- Fault and Performance Management in Multi-Cloud Based NFV Using Shallow and Deep Predictive StructuresLav Gupta, Mohammed Samaka, Raj Jain, Aiman Erbad, Deval Bhamare, H. Anthony Chan. 1-8 [doi]
- Fair Work-Conserving Bandwidth Guarantees in Datacenters Using MPTCPBaraa Saeed Ali, Kang Chen. 1-9 [doi]
- Dynamic Small Cell Management for Connected Cars CommunicationsJulio A. Sanguesa, Johann Márquez-Barja, Piedad Garrido, Francisco J. Martinez. 1-6 [doi]
- A Comparison of Distributed Machine Learning PlatformsKuo Zhang, Salem Alqahtani, Murat Demirbas. 1-9 [doi]
- Equivalence Checking of Java Methods: Toward Ensuring IoT DependabilityKozo Okano, Satoshi Harauchi, Toshifusa Sekizawa, Shinpei Ogata, Shin Nakashima. 1-6 [doi]
- LazyAS: Client-Transparent Access Selection in Dual-Band WiFiJun Zhang, Guangxing Zhang, Qinghua Wu, Lei Song, Gaogang Xie. 1-9 [doi]
- Adaptive Burst Transmission Scheme for WSNsZeeshan Ansar, Waltenegus Dargie. 1-7 [doi]
- Improving Optimization-Based Rate Adaptation in DASH SystemBo Wang, Xiaohui Luo, Ping Hu, Fengyuan Ren. 1-9 [doi]
- Towards Automated Intelligence in 5G SystemsHaotian Deng, Qianru Li, Yuanjie Li, Songwu Lu, Chunyi Peng, Taqi Raza, Zhaowei Tan, Zengwen Yuan, Zhehui Zhang. 1-9 [doi]
- Multi-Mode Low-Latency Software-Defined Error Correction for Data CentersFakhreddine Ghaffari, Ali Akoglu, Bane Vasic, David Declercq. 1-8 [doi]
- Game Theoretic D2D Content Sharing: Joint Participants Selection, Routing and PricingYujian Fang, Yuezhi Zhou, Xiaohong Jiang, Di Zhang, Yaoxue Zhang. 1-9 [doi]
- Concatenating Unprotected Internet of Things Network Event-Driven Data to Obtain End-User InformationRahmira Rufus, Albert C. Esterline. 1-7 [doi]
- MEET-IP: Memory and Energy Efficient TCAM-Based IP LookupWenjun Li, Xianfeng Li, Hui Li. 1-8 [doi]
- EA2S2: An Efficient Application-Aware Storage System for Big Data Processing in Heterogeneous ClustersTeng Wang, Jiayin Wang, Son Nam Nguyen, Zhengyu Yang, Ningfang Mi, Bo Sheng. 1-9 [doi]
- HyperV: A High Performance Hypervisor for Virtualization of the Programmable Data PlaneCheng Zhang, Jun Bi, Yu Zhou, Abdul Basit Dogar, Jianping Wu. 1-9 [doi]
- Machine-Learning Classifiers for Security in Connected Medical DevicesSida Gao, Geethapriya Thamilarasu. 1-5 [doi]
- A Perspective on Blockchain Smart Contracts: Reducing Uncertainty and Complexity in Value ExchangeHenry M. Kim, Marek Laskowski. 1-6 [doi]
- Online Algorithm for Wireless Backhaul HetNets with Advanced Small Cell BufferingTri Minh Nguyen, Wessam Ajib, Chadi Assi. 1-9 [doi]
- Bounds on the Age of Information for Global Channel State Dissemination in Fully-Connected NetworksShahab Farazi, Andrew G. Klein, D. Richard Brown. 1-7 [doi]
- Resource Allocation for Pragmatically-Assisted Quality of Information-Aware NetworkingJames Edwards 0002, Rebecca J. Passonneau, Taylor Cassidy, Thomas F. La Porta. 1-10 [doi]
- Machine-Learning Based Threat-Aware System in Software Defined NetworksChungsik Song, Younghee Park, Keyur Golani, Youngsoo Kim, Kalgi Bhatt, Kunal Goswami. 1-9 [doi]
- Clock Drift Prediction for Fast Rejoin in 802.15.4e TSCH NetworksTimothy Claeys, Franck Rousseau, Bernard Tourancheau, Andrzej Duda. 1-9 [doi]