Abstract is missing.
- Deep Learning Technique for Improving Data Reception in Optical Camera Communication-Based V2IDong Nyeok Choi, Sung Yooun Jin, Juhee Lee, Byung Wook Kim. 1-2 [doi]
- When Blockchain Takes Care of the OLSR NetworkMay Thura Lwin, Young-Bae Ko, Dohyung Kim. 1-2 [doi]
- Design and Implementation of Sensing System for Quality Analysis of 802.11 Wireless LinksMorihiko Tamai, Akio Hasegawa, Hiroyuki Yokoyama. 1-2 [doi]
- MAYOR: Machine Learning and Analytics for Automated Operations and RecoveryRashid Mijumbi, Abhaya Asthana, Carlos Bernal, Manuel Castejón. 1-9 [doi]
- A Data Distribution Service in a Hierarchical SDN Architecture: Implementation and EvaluationAlejandro Llorens-Carrodeguas, Cristina Cervello-Pastor, Irian Leyva-Pupo. 1-9 [doi]
- What Do Patients Tell Doctors on the Internet? Ask AI How to Valorize Online Medical ConversationsLuca Casini, Giovanni Delnevo, Silvia Mirri, Lorenzo Monti, Catia Prandi, Marco Roccetti, Paola Salomoni. 1-6 [doi]
- DUE Distribution and Pairing in D2D CommunicationWeifeng Lu, Xiaoqiang Ren, Jia Xu, Siguang Chen, Lijun Yang, Jian Xu. 1-8 [doi]
- Flow-Based Network Slicing: Mapping the Future Mobile Radio Access NetworksEstefania Coronado, Roberto Riggio. 1-9 [doi]
- An Actor-Critic Reinforcement Learning Approach for Energy Harvesting Communications SystemsAla'eddin Masadeh, Zhengdao Wang, Ahmed E. Kamal. 1-6 [doi]
- Characterizing the Performance of WiFi in Dense IoT DeploymentsAnirudh Ganji, Griffin Page, Muhammad Shahzad. 1-9 [doi]
- Improving TCP Performance and Reducing Self-Induced Congestion with Receive Window ModulationFrancesco Ciaccia, Oriol Arcas-Abella, Diego Montero, Ivan Romero, Rodolfo A. Milito, René Serral-Gracià, Mario Nemirovsky. 1-6 [doi]
- Towards EDISON: An Edge-Native Approach to Distributed Interpolation of Environmental DataLauri Lovén, Ella Peltonen, Abhinay Pandya, Teemu Leppänen, Ekaterina Gilman, Susanna Pirttikangas, Jukka Riekki. 1-6 [doi]
- Towards Building Low Power Magnetic Communication Protocols for Challenging EnvironmentsAmitangshu Pal, Rajpreet Kaur Gulati, Krishna Kant. 1-9 [doi]
- Optimizing Order Dispatch for Ride-Sharing SystemsYubin Duan, Ning Wang, Jie Wu. 1-9 [doi]
- Exploiting Social Media for Recommending New LocationsCarmela Comito. 1-6 [doi]
- Data Mining at the IoT EdgeClaudio Savaglio, Pietro Gerace, Giuseppe Di Fatta, Giancarlo Fortino. 1-6 [doi]
- A Distributed SDN Application for Cross-Institution Data AccessShafaq Chaudhry, Eyuphan Bulut, Murat Yuksel. 1-9 [doi]
- OpenStack Generalization for Hardware Accelerated CloudsAhmet Erol, Alper Yazar, Ece Guran Schmidt. 1-8 [doi]
- Update Method for Controller Placement Problem in Software-Defined Satellite NetworkingShuai Wu, Xianfeng Liu, Quan Chen, Jianming Guo, Lei Yang, Yong Zhao, Chengguang Fan. 1-7 [doi]
- CORR: Centralized Opportunistic Reactive Routing for Mobile Multi-Hop Wireless NetworksAyush Dusia, Ram Ramanathan, Adarshpal S. Sethi. 1-6 [doi]
- A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT ApplicationsJoonYoung Lee, MyeongHyun Kim, SungJin Yu, Kisung Park, Youngho Park. 1-2 [doi]
- Combining Sentiment Analysis and Social Network Analysis to Explore Twitter Opinion SpreadingDomenico De Stefano, Francesco Santelli. 1-6 [doi]
- Joint Optimization of Gain and Beaconing for First Order Consensus under Rayleigh FadingDaniel Schneider, Hannes Frey. 1-8 [doi]
- A General Approach to Fuzzy Community Detection in Social NetworksAlfonso Niño, Sebastián Reyes, Jose Angel Martin-Baos, Camelia Muñoz-Caro. 1-8 [doi]
- A Reference Architecture Based on Edge and Cloud Computing for Smart ManufacturingJohannes Vater, Lars Harscheidt, Alois Knoll. 1-7 [doi]
- An IoT System for Monitoring and Data Collection of Residential Water End-Use ConsumptionAnna Di Mauro, Armando Di Nardo, Giovanni Francesco Santonastaso, Salvatore Venticinque. 1-6 [doi]
- New Energy-Efficient Hierarchical Clustering Approach Based on Neighbor Rotation for Edge Computing of IoTDe-gan Zhang, Jianning Qiu, Ting Zhang, Hao Wu. 1-2 [doi]
- Vehicle Routing Trifecta: Data-Driven Route Recommendation SystemAnkur Sarker, Haiying Shen, Bryant Murphy, Roman Wang, Mac Devine, Andrew J. Rindos. 1-9 [doi]
- Binary MDS Array Codes with Asymptotically Optimal Repair for All ColumnsHanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee. 1-9 [doi]
- Data Management in Supply Chain Using Blockchain: Challenges and a Case StudyHanqing Wu, Jiannong Cao, Yanni Yang, Cheung Leong Tung, Shan Jiang 0005, Bin Tang, Yang Liu, Xiaoqing Wang, Yuming Deng. 1-8 [doi]
- User Authentication for Smart Home Networks Based on Mobile Apps UsageYosef Ashibani, Qusay H. Mahmoud. 1-6 [doi]
- Bio Inspired Strategy for Improving Platoon Management in the Future Autonomous Electrical VANET EnvironmentFloriano De Rango, Mauro Tropea, Pierfrancesco Raimondo, Amilcare Francesco Santamaria, Peppino Fazio. 1-7 [doi]
- Detection of Satiric News on Social Media: Analysis of the Phenomenon with a French DatasetZhan Liu, Shaban Shabani, Nicole Glassey Balet, Maria Sokhn. 1-6 [doi]
- Disaggregated Cloud Management for Edge ComputingRafael Moreno-Vozmediano, Eduardo Huedo, Rubén S. Montero, Ignacio Martín Llorente. 1-6 [doi]
- Location Aware Clustering and Epidemic Trust Management in Mobile Ad Hoc NetworkMichail Chatzidakis, Stathes Hadjiefthymiades. 1-7 [doi]
- Generating Client Side Policies for Cyber-Physical SafetyDinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa. 1-8 [doi]
- Joint Optimization of Computing Resources and Data Allocation for Mobile Edge Computing (MEC): An Online ApproachXun Shao, Go Hasegawa, Noriaki Kamiyama, Zhi Liu 0006, Hiroshi Masui, Yusheng Ji. 1-9 [doi]
- An Improved Maximum Flow Routing Algorithm for Multi-Homing in Information-Centric NetworkingPufang Ma, Jinlin Wang 0001, Jiali You. 1-8 [doi]
- Tracking Criminal Events through IoT Devices and an Edge Computing ApproachAndrea Tundis, Humayun Kaleem, Max Mühlhäuser. 1-6 [doi]
- SDN_Based Secure Healthcare Monitoring System(SDN-SHMS)Mohamad Khayat, Ezedin Barka, Farag Sallabi. 1-7 [doi]
- Error Recovery of RDMA Packets in Data Center NetworksYi Wang, Kexin Liu, Chen Tian, Bo Bai 0001, Gong Zhang. 1-8 [doi]
- No More Free Riders: Sharing WiFi Secrets with Acoustic SignalsLi Zhang, Xiaojun Zhu 0001, Xiaobing Wu. 1-8 [doi]
- Malicious Word Document Detection Based on Multi-View Features LearningXiaofeng Lu, Fei Wang, Zifeng Shu. 1-6 [doi]
- CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud StorageChuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang. 1-8 [doi]
- Hierarchical Duty-Cycling of Wireless SensorsJinhwan Jung, Kien Pham, Joohyun Kang, Junehwa Song, Sung-Ju Lee, Yung Yi. 1-9 [doi]
- Distributed Artificial Intelligence with Multi-Agent Systems for MECTeemu Leppänen. 1-8 [doi]
- CollabDrone: A Collaborative Spatiotemporal-Aware Drone Sensing System Driven by Social Sensing SignalsMd. Tahmid Rashid, Daniel Zhang, Zhiyu Liu, Hai Lin, Dong Wang. 1-9 [doi]
- Adaptive Gradient Time Synchronization Protocol in Wireless Ad-Hoc NetworksYong Jeong Kim, Linh-An Phan, Taejoon Kim, Taehong Kim, JaeSeang Lee, Jae-Hyun Ham. 1-2 [doi]
- MPTCP Performance over Heterogenous SubpathsVivek Adarsh, Paul Schmitt, Elizabeth M. Belding. 1-9 [doi]
- Data-Centric Video for Mixed RealityPeter Gusev, Jeff Thompson, Jeff Burke. 1-11 [doi]
- A Secure Authentication and Key Establishment Scheme for Wearable DevicesMyeongHyun Kim, JoonYoung Lee, SungJin Yu, Kisung Park, YoHan Park, Youngho Park 0005. 1-2 [doi]
- Efficient 3D Placement of UAVs with QoS Assurance in Ad Hoc Wireless NetworksBhanukiran Perabathini, Kiranteja Tummuri, Achal Agrawal, Vineeth S. Varma. 1-6 [doi]
- A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data NetworkingAhmed Benmoussa, Abdou El Karim Tahari, Nasreddine Lagraa, Abderrahmane Lakas, Farhan Ahmad, Rasheed Hussain, Chaker Abdelaziz Kerrache, Fatih Kurugollu. 1-6 [doi]
- TS-TCP: Two-Stage Congestion Control Algorithm for High Concurrency TCPs in Data Center NetworksYifei Lu, Yan Li. 1-9 [doi]
- Cost-Minimum Charger Placement for Wireless Power TransferXingjian Ding, Guodong Sun, Yongcai Wang, Chuanwen Luo, Deying Li, Wenping Chen, Qian Hu. 1-9 [doi]
- Location-Aware Targeted Influence Blocking Maximization in Social NetworksWenlong Zhu, Wu Yang 0001, Shichang Xuan, Dapeng Man, Wei Wang 0076, Jiguang Lv. 1-9 [doi]
- Protecting against Inference Attacks on Co-Location DataRitesh Ahuja, Gabriel Ghinita, Nithin Krishna, Cyrus Shahabi. 1-11 [doi]
- Distributed Vehicle Trajectory Tracking for Efficient Routing in VDTNsBo Wu 0010, Haiying Shen. 1-9 [doi]
- Resource Allocation for Minimized Power Consumption in Hardware Accelerated CloudsNazim Umut Ekici, Klaus Werner Schmidt, Alper Yazar, Ece Guran Schmidt. 1-8 [doi]
- Predicting Friendship Pairs from BLE Beacons Using Dining Hall VisitsRachael Purta, Aaron Striegel. 1-9 [doi]
- A Massively Multi-Tenant Virtualized Network Intrusion Prevention Service on NFV PlatformHaiyang Jiang, Ye Yang, Hongtao Guan, Gaogang Xie, Kavé Salamatian. 1-9 [doi]
- SPARC: Towards a Scalable Distributed Control Plane Architecture for Protocol-Oblivious SDN NetworksMingzheng Li, Xiaodong Wang, Haojie Tong, Tong Liu, Ye Tian 0004. 1-9 [doi]
- Suppression of the EMI from Co-Site VHF Radio to Satellite Communication NetworkWanning Zhou, Feng Wang, Zhiguo Zhao, Xie Ma. 1-2 [doi]
- Identification of Resource Utilisation Patterns in Data Centers Using Tensor DecompositionWaltenegus Dargie. 1-6 [doi]
- Estimating Socioeconomic Status via Temporal-Spatial Mobility Analysis - A Case Study of Smart Card DataShichang Ding, Hong Huang 0001, Tao Zhao, Xiaoming Fu 0001. 1-9 [doi]
- Approximate Range Emptiness in Constant Time for IoT Data Streams over Sliding WindowsXiujun Wang, Zhi Liu 0006, Yangzhao Yang, Xun Shao, Yu Gu 0003, Susumu Ishihara. 1-10 [doi]
- On the Construction of Optimal Embedding Problems for Delay-Sensitive Service Function ChainsAndreas Fischer, Deval Bhamare, Andreas Kassler. 1-10 [doi]
- Supervised Machine Learning Techniques for Efficient Network Intrusion DetectionNada Aboueata, Sara Alrasbi, Aiman Erbad, Andreas Kassler, Deval Bhamare. 1-8 [doi]
- Designing Highly-Available Service Provider Networks with NFV ComponentsSidharth Sharma, Aniruddha Kushwaha, Arun K. Somani, Ashwin Gumaste. 1-9 [doi]
- Price-Driven Economic Cache Content Nash Bargaining Game in Wireless Multimedia Resource AllocationShuan He, Wei Wang 0015. 1-8 [doi]
- When Social Sensing Meets Edge Computing: Vision and ChallengesDaniel Zhang, Nathan Vance, Dong Wang. 1-9 [doi]
- Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth SystemsPeng Zhao 0001, Dekui Quan, Wei Yu 0002, Xinyu Yang, Xinwen Fu. 1-9 [doi]
- Enhancing the NS-3 Simulator by Introducing Electric Vehicles FeaturesJulio A. Sanguesa, Samuel Salvatella, Francisco J. Martinez, Johann M. Márquez-Barja, Manuel P. Ricardo. 1-7 [doi]
- Towards Online Deep Learning-Based Energy ForecastingFan Liang, William Grant Hatcher, Guobin Xu, James H. Nguyen, Weixian Liao, Wei Yu 0002. 1-9 [doi]
- Acceleration of Packet Classification Using Adjacency List of RulesTakashi Fuchino, Takashi Harada, Ken Tanaka, Kenji Mikawa. 1-9 [doi]
- Publish-Subscribe Communication in Building Management Systems over Named Data NetworkingWentao Shang, Ashlesh Gawande, Minsheng Zhang, Alexander Afanasyev, Jeffrey A. Burke, Lan Wang, Lixia Zhang 0001. 1-10 [doi]
- An Analytical Model for Virtual Cut-Through RoutingLev B. Levitin, Yelena Rykalova. 1-7 [doi]
- IoT-HC: A Novel IoT Architecture for the Hybrid CloudCarmine De Napoli, Agostino Forestiero, Giancarlo Fortino, Andrea Giordano, Antonio Guerrieri, Demetrio Laganà, Giovanni Lupi, Carlo Mastroianni, Leonardo Spataro. 1-6 [doi]
- Improved Clock Synchronization Algorithms for the Controller Area Network (CAN)Murat Akpinar, Klaus Werner Schmidt, Ece Guran Schmidt. 1-8 [doi]
- Accelerating Big Data Analytics Using Scale-Up/Out Heterogeneous ClustersZhuozhao Li, Haiying Shen, Lee Ward. 1-9 [doi]
- Simulation Evaluation of Fuel-Saving Systems in the City of ChicagoYiran Zhao, Shuochao Yao, Dongxin Liu, Huajie Shao, Shengzhong Liu, Tarek F. Abdelzaher. 1-9 [doi]
- Enabling Shared Control and Trust in Hybrid SDN/Legacy NetworksPinyi Shi, P. Sergio Rivera, Lowell Pike, Zongming Fei, James Griffioen, Kenneth L. Calvert. 1-9 [doi]
- New Method of the Best Path Selection with Length Priority Based on Reinforcement Learning StrategyXiao Huan Liu, De-gan Zhang, Ting Zhang, Yu-ya Cui. 1-6 [doi]
- A Client-Biased Cooperative Search Scheme in Blockchain-Based Data MarketsSuhan Jiang, Yubin Duan, Jie Wu 0001. 1-9 [doi]
- Software-Defined Wide Area Network (SD-WAN): Architecture, Advances and OpportunitiesZhenjie Yang, Yong Cui 0001, Baochun Li, Yadong Liu, Yi Xu. 1-9 [doi]
- Random Access Congestion Control for Periodic Safety Messages in Dense Traffic NetworksTae-Hoon Kwon, Wonwoo Jo, Jong-yul Lee, Hyo-Seung Seo, Minjin Baek, Sang Sun Lee. 1-4 [doi]
- The Progressive Mapping System Architecture for Global Resources ManagementJordi Garcia, Xavi Masip-Bruin, Yunsong Lu. 1-8 [doi]
- Multi-Hop D2D Assisted Real-Time Video Streaming Transmission System in Infrastructure-Less NetworksJie Li, Tengfei Li, Fuliang Li, Tao Hong, Xingwei Wang 0001. 1-6 [doi]
- Accurate Measurement Technique of Packet Loss Rate in Parallel Flow MonitoringKohei Watabe, Norinosuke Murai, Shintaro Hirakawa, Kenji Nakagawa. 1-2 [doi]
- WiWrite: Wi-Fi Based Handwriting Recognition like Playing LegoJiang Xiao, Huichuwu Li, Yuxiang Liu. 1-9 [doi]
- A Hybrid Model for Optimal Defense Strategy GenerationSu Yang, Weiqiang Xie, Chensi Wu, Wenjie Wang, Yuqing Zhang. 1-6 [doi]
- Characterizing Interference Mitigation Techniques in Dense 60 GHz mmWave WLANsDing Zhang, Panneer Selvam Santhalingam, Parth H. Pathak, Zizhan Zheng. 1-9 [doi]
- Optimizing 5G Performance by Reallocating Unused ResourcesFidan Mehmeti, Thomas F. La Porta. 1-9 [doi]
- EMPTCP: An ECN Based Approach to Detect Shared Bottleneck in MPTCPJin Ye, Renzhang Liu, Ziqi Xie, Luting Feng, Sen Liu. 1-10 [doi]
- Distributed TDMA Scheduling Using Topological Ordering in Wireless Sensor NetworksThanh Tung Nguyen, Linh-An Phan, Taejoon Kim, Taehong Kim, JaeSeang Lee, Jae-Hyun Ham. 1-2 [doi]
- An UAV Swarm Coordination Protocol Supporting Planned MissionsFrancisco Fabra, Willian Zamora, Pablo Reyes, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni, Enrique Hernández-Orallo. 1-9 [doi]
- Smart Home Security: A Distributed Identity-Based Security Protocol for Authentication and Key ExchangeM. Mazhar Rathore, Elmahdi Bentafat, Spiridon Bakiras. 1-9 [doi]
- Towards Reducing Last-Level-Cache Interference of Co-Located Virtual Network FunctionsRaphael Durner, Christian Sieber, Wolfgang Kellerer. 1-9 [doi]
- A Reaction-Based Approach to Information Cascade AnalysisJames Flamino, Boleslaw K. Szymanski. 1-9 [doi]
- DISC: A Novel Distributed On-Demand Clustering Protocol for Internet of Multimedia ThingsAmrita Ghosal, Subir Halder, Mauro Conti. 1-9 [doi]
- Blockchain-Based Mobility-as-a-ServiceTri Hong Nguyen, Juha Partala, Susanna Pirttikangas. 1-6 [doi]
- Probabilistic Partitioning for Edge Server Assignment with Time-Varying WorkloadQuynh Vo, Duc A. Tran. 1-8 [doi]
- A User-Centric Mobility Management Scheme for High-Density Fog Computing DeploymentsZeineb Rejiba, Xavier Masip-Bruin, Eva Marín-Tordera. 1-8 [doi]
- Multi-Task Sensing for Multiple Crowdsourcers: A Dynamic Game Based Pricing ModelHafiz Muhammad Azeem Akram. 1-9 [doi]
- Architecture and Use Case for an IoT Deployment with SDN at the Edge and Dual Physical and Virtual GatewayJara Suarez de Puga, Carlos E. Palau Salvador, Andreu Belsa Pellicer. 1-6 [doi]
- RDMA Load Balancing via Data PartitionYi Wang, Ya-nan Jiang, Qiufang Ma, Chen Tian, Bo Bai 0001, Gong Zhang. 1-8 [doi]
- A Game-Based Combinatorial Double Auction Model for Cloud Resource AllocationQihui Li, Chuanhe Huang, Haizhou Bao, Bin Fu, Xiaohua Jia. 1-8 [doi]
- Diabetes: What Are Italian Twitter Users Talking About?Stefano Ferretti, Marco Furini, Manuela Montangero. 1-6 [doi]
- A Hybrid Online Offline System for Network Anomaly DetectionMurugaraj Odiathevar, Winston K. G. Seah, Marcus Frean. 1-9 [doi]
- Designing Security-Aware Service Requests for NFV-Enabled NetworksHouda Jmila, Gregory Blanc. 1-9 [doi]
- Ad-Hoc Edge Cloud: A Framework for Dynamic Creation of Edge Computing InfrastructuresAna Juan Ferrer, Joan Manuel Marquès, Josep Jorba. 1-7 [doi]
- Employee Attitudes and (Digital) Collaboration Data: A Preliminary Analysis in the HRM FieldTommaso Fabbri, Federica Mandreoli, Riccardo Martoglia, Anna Chiara Scapolan. 1-6 [doi]
- On Predicting the Success of Political Tweets Using Psycho-Linguistic CategoriesMarco Furini, Manuela Montangero. 1-6 [doi]
- TuSoW: Tuple Spaces for Edge ComputingGiovanni Ciatto, Lorenzo Rizzato, Andrea Omicini, Stefano Mariani 0001. 1-6 [doi]
- CoFilter: A High-Performance Switch-Accelerated Stateful Packet Filter for Bare-Metal ServersJiamin Cao, Ying Liu, Yu Zhou, Chen Sun, Yangyang Wang, Jun Bi. 1-9 [doi]
- The Price Is (Not) Right: Reflections on Pricing for Transient Cloud ServersDavid W. Irwin, Prashant J. Shenoy, Pradeep Ambati, Prateek Sharma, Supreeth Shastri, Ahmed Ali-Eldin. 1-9 [doi]
- ODVR: A Unifying Approach to On-Demand and Proactive Loop-Free Routing in Ad-Hoc NetworksJ. J. Garcia-Luna-Aceves, Ehsan Hemmati. 1-11 [doi]
- Assessing Social Aspects of Urban Vehicular Scenarios for Improving Message DiffusionEnrique Hernández-Orallo, Leonardo Chancay-Garcia, Pietro Manzoni, Carlos Miguel Tavares Calafate, Juan-Carlos Cano. 1-9 [doi]
- On the Importance of Container Image Placement for Service Provisioning in the EdgeJad Darrous, Thomas Lambert, Shadi Ibrahim. 1-9 [doi]
- A Novel IoT Protocol Architecture: Efficiency through Data and Functionality Sharing across LayersVinicius Galvao Guimaraes, Renato Mariz de Moraes, Katia Obraczka, Adolfo Bauchspiess. 1-9 [doi]
- Similarity Analysis of Criminals on Social Networks: An Example on TwitterAndrea Tundis, Archit Jain, Gaurav Bhatia, Max Mühlhäuser. 1-9 [doi]
- The Effect of Mobility on Delayed Data OffloadingXiaoyi Zhou, Tong Ye, Tony T. Lee. 1-6 [doi]
- MobiAmbulance: Optimal Scheduling of Emergency Vehicles in Catastrophic SituationsLi Yan 0004, Shohaib Mahmud, Haiying Shen, Natasha Zhang Foutz, Donald E. Brown, Wie Yusuf, Derek Loftis, Lucas Lyons, Jonathan L. Goodall, Joshua Anton. 1-9 [doi]
- BEAM: BEhavior-Based Access Control Mechanism for SDN ApplicationsBhavesh Toshniwal, Kalpana D. Joshi, Pragati Shrivastava, Kotaro Kataoka. 1-2 [doi]
- Advances in Reliable File-Stream Multicasting over Multi-Domain Software Defined Networks (SDN)Yuanlong Tan, Shuoshuo Chen, Steve Emmerson, Yizhe Zhang, Malathi Veeraraghavan. 1-11 [doi]