Abstract is missing.
- Scheduling virtual wifi interfaces for high bandwidth video upstreaming using multipath TCPShobhi Maheshwari, Philip Lundrigan, Sneha Kumar Kasera. 1-10 [doi]
- The weakest failure detector to solve the mutual exclusion problem in an unknown dynamic environmentEtienne Mauffret, Denis Jeanneau, Luciana Arantes, Pierre Sens. 11-20 [doi]
- Multi-tenant mobile offloading systems for real-time computer vision applicationsZhou Fang, Jeng-Hau Lin, Mani B. Srivastava, Rajesh K. Gupta 0001. 21-30 [doi]
- Distributed symmetry-breaking with improved vertex-averaged complexityLeonid Barenboim, Yaniv Tzur. 31-40 [doi]
- CONGEST modelParikshit Saikia, Sushanta Karmakar. 41-50 [doi]
- Parallel algorithms for predicate detectionVijay K. Garg, Rohan Garg. 51-60 [doi]
- Improving efficacy of concurrent internal binary search trees using local recoveryArunmoezhi Ramachandran, Neeraj Mittal. 61-70 [doi]
- pDCell: an end-to-end transport protocol for mobile edge computing architecturesClaudio Fiandrino, Antonio de la Oliva, Joerg Widmer, Kirill Kogan. 71-80 [doi]
- Scalable, high-speed on-chip-based NDN name forwarding using FPGADivya Saxena, Suyash Mahar, Vaskar Raychoudhury, Jiannong Cao. 81-89 [doi]
- NOVN: named-object based virtual network architectureFrancesco Bronzino, Sumit Maheshwari, Ivan Seskar, Dipankar Raychaudhuri. 90-99 [doi]
- Session guarantees with raft and hybrid logical clocksMohammad Roohitavaf, Jung-Sang Ahn, Woon-Hak Kang, Kun Ren, Gene Zhang, Sami Ben-romdhane, Sandeep S. Kulkarni. 100-109 [doi]
- Reconfigurable dataflow graphs for processing-in-memoryCharles F. Shelor, Krishna M. Kavi. 110-119 [doi]
- On the hardness of the strongly dependent decision problemMartin Biely, Peter Robinson 0002. 120-123 [doi]
- Exploration and impact of blockchain-enabled adaptive non-binary trust modelsDavid W. Kravitz. 124-133 [doi]
- Cache attacks on blockchain based information centric networks: an experimental evaluationSwapnoneel Roy, Faustina J. Anto Morais, Mehrdad Salimitari, Mainak Chatterjee. 134-142 [doi]
- Defense strategies and expected capacity of high performance computing infrastructuresNageswara S. V. Rao, Neena Imam, Chris Y. T. Ma, Fei He. 143-147 [doi]
- Benefit of self-stabilizing protocols in eventually consistent key-value stores: a case studyDuong N. Nguyen, Sandeep S. Kulkarni, Ajoy K. Datta. 148-157 [doi]
- Silent self-stabilizing scheme for spanning-tree-like constructionsStéphane Devismes, David Ilcinkas, Colette Johnen. 158-167 [doi]
- A simple and practical concurrent non-blocking unbounded graph with linearizable reachability qeriesBapi Chatterjee, Sathya Peri, Muktikanta Sa, Nandini Singhal. 168-177 [doi]
- QoS and performance metrics for container-based virtualization in cloud environmentsIsam Mashhour Al Jawarneh, Paolo Bellavista, Luca Foschini, Giuseppe Martuscelli, Rebecca Montanari, Amedeo Palopoli, Filippo Bosi. 178-182 [doi]
- Measurements and analytics of wide-area file transfers over dedicated connectionsNageswara S. V. Rao, Qiang Liu 0007, Satyabrata Sen, Zhengchun Liu, Rajkumar Kettimuthu, Ian T. Foster. 183-192 [doi]
- pTASC: trustable autonomous secure communicationsPatrícia R. Sousa, André Cirne, João S. Resende, Rolando Martins, Luis Filipe Coelho Antunes. 193-202 [doi]
- Building an emulation environment for cyber security analyses of complex networked systemsFlorin Dragos Tanasache, Mara Sorella, Silvia Bonomi, Raniero Rapone, Davide Meacci. 203-212 [doi]
- HydraDoctor: real-time liquids intake monitoring by collaborative sensingBowen Du, Chris Xiaoxuan Lu, Xuan Kan, Kai Wu, Man Luo, Jianfeng Hou, Kai Li, Salil Kanhere, Yiran Shen, Hongkai Wen. 213-217 [doi]
- Efficient dispersion of mobile robots on graphsAjay D. Kshemkalyani, Faizan Ali. 218-227 [doi]
- Time-optimal uniform scattering in a gridPavan Poudel, Gokarna Sharma. 228-237 [doi]
- Sublinear-time mutual visibility for fat oblivious robotsPavan Poudel, Gokarna Sharma, Aisha Aljohani. 238-247 [doi]
- Odd-even based adaptive two-way routing in mesh NoCs for hotspot mitigationR. S. Reshma Raj, C. Gayathri, Saidalavi Kalady, P. B. Jayaraj. 248-252 [doi]
- Distributed α-fair transmit power adaptation based congestion control in VANETChandrakant Navdeti, Chandan Giri, Indrajit Banerjee. 253-260 [doi]
- Low complexity landmark-node tracing in WSNs using multi-agent random walksSurender Redhu, Rajesh M. Hegde. 261-266 [doi]
- Improving performance of TCP for wireless network using SDNKrishna Vijay Kumar Singh, Sakshi Gupta, Saurabh Verma, Mayank Pandey. 267-276 [doi]
- Dynamic sensor selection for path coverageSimon Shamoun, Tarek F. Abdelzaher, Amotz Bar-Noy. 277-281 [doi]
- Consistify: preserving correctness and SLA under weak consistencySubhajit Sidhanta, Supratik Mukhopadhyay, Wojciech Golab. 282-291 [doi]
- Round efficient computationally secure multi-party computation revisitedLaasya Bangalore, Ashish Choudhury, Gayathri Garimella. 292-301 [doi]
- Perfectly secure message transmission over partially synchronous networksRavi Kishore, Anupriya Inumella, Kannan Srinathan. 302-306 [doi]
- On upper and lower bounds of identifying code set for soccer ball graph with application to satellite deploymentArunabha Sen, Victoria Horan Goliber, Kaustav Basu, Chenyang Zhou, Sumitava Ghosh. 307-316 [doi]
- Detection of beacon transmission denial attack in ITS using temporal auto-correlation and random inspectionsShaheen Sultana, Fahiem Altaf, Mayank K. Aditia, Manohar S. Burra, Chanchal Maurya, Soumyadev Maity. 317-326 [doi]
- Advanced urban public transportation system for Indian scenariosPruthvish Rajput, Manish Chaturvedi, Pankesh Patel. 327-336 [doi]
- A hybrid classifier approach to multivariate sensor data for climate smart agriculture cyber-physical systemsAnkur Pandey, Piyush Tiwary, Sudhir Kumar, Sajal K. Das. 337-341 [doi]
- Majority vote and monopolies in social networksChen Avin, Zvi Lotker, Assaf Mizrachi, David Peleg. 342-351 [doi]
- Compositional structures for streaming applicationsK. Mani Chandy, Julian J. Bunn. 352-361 [doi]
- Fundamentals for IoT networks: secure and low-latency communicationsH. Vincent Poor, Mario Goldenbaum, Wei Yang. 362-364 [doi]
- A novel compression based neuronal architecture for memory encodingAditi Kathpalia, Nithin Nagaraj. 365-370 [doi]
- An accurate missing data prediction method using LSTM based deep learning for health careHemant Verma, Sudhir Kumar. 371-376 [doi]
- Community cloud architecture to improve use accessibility with security compliance in health big data applicationsSamaikya Valluripally, Murugesan Raju, Prasad Calyam, Matthew Chisholm, Sai Swathi Sivarathri, Abu Mosa, Trupti Joshi. 377-380 [doi]
- A study on rumor propagation trends and features in a post disaster situationTamal Mondal, Tunir Roy, Indrajit Bhattacharya, Sourav Bhattacharya, Indranil Das. 381-384 [doi]
- A blockchain based incentive scheme for post disaster opportunistic communication over DTNChandrima Chakrabarti, Souvik Basu. 385-388 [doi]
- Identifying fact-checkable microblogs during disasters: a classification-ranking approachDivyank Barnwal, Siddharth Ghelani, Rohit Krishna, Moumita Basu, Saptarshi Ghosh. 389-392 [doi]
- SURAKSHIT: a smartphone-based application for 'localized' GIS data aggregation in absence of internetPartha Sarathi Paul, Naman Mehta, Aman Kumar Das, Sourav Agarwal, Sujoy Saha, Subrata Nandi. 393-396 [doi]
- Towards energy-efficient and robust disaster response networksVijay K. Shah, Satyaki Roy, Simone Silvestri, Sajal K. Das. 397-400 [doi]
- Sensor node assisted DTN for a post-disaster scenarioAmit Kumar Gupta, Jyotsna Kumar Mandal, Indrajit Bhattacharya. 401-404 [doi]
- Building resilient community using social technologies: a precursory measure for effective disaster managementSneha Bhattacharyya, Priyadarshini Dey, Jayanta Basak, Siuli Roy, Somprakash Bandyopadhyay. 405-408 [doi]
- On designing a fast-deployable 'localized' GIS platform for using 'offline' during post-disaster situationPartha Sarathi Paul, Chandrika Mukherjee, Bishakh Chandra Ghosh, Sudipta Pandit, Sujoy Saha, Subrata Nandi. 409-412 [doi]
- EnTER: an encounter based throwbox deployment strategy for enhancing network reliability in post-disaster scenarios over DTNSuman Bhattacharjee, Sipra Das Bit. 413-416 [doi]
- Designing infrastructure-less disaster networks by leveraging the AllJoyn frameworkSrikant Manas Kala, Vanlin Sathya, Suhel Sajjan Magdum, Tulja Vamshi Kiran Buyakar, Hatim Lokhandwala, Bheemarjuna Reddy Tamma. 417-420 [doi]
- Cslim: automated extraction of IoT functionalities from legacy C codebasesHyogi Sim, Arnab Kumar Paul, Eli Tilevich, Ali Raza Butt, Muhammad Shahzad. 421-426 [doi]
- Optimized CL-PKE with lightweight encryption for resource constrained devicesMayank K. Aditia, Fahiem Altaf, Moirangthem R. Singh, Manohar S. Burra, Chanchal Maurya, Sujit S. Sahoo, Soumyadev Maity. 427-432 [doi]
- STSDB: spatio-temporal sensor database for smart city query processingUtsav Vyas, Parth Panchal, Mayank Patel, Minal Bhise. 433-438 [doi]
- Load balanced transaction scheduling in on-demand computing using cuckoo search-ant colony optimizationDharmendra Prasad Mahato. 439-444 [doi]
- End to end secure anonymous communication for secure directed diffusion in IoTJayasree Sengupta, Sushmita Ruj, Sipra Das Bit. 445-450 [doi]
- An efficient heuristic to minimize number of regenerations in translucent optical network under dynamic scenarioIra Nath, Uma Bhattacharya, Monish Chatterjee. 451-454 [doi]
- COR-HR: an efficient hybrid routing approach using coefficient of restitution in MANETSumana Sinha, Snehanshu Saha, Sudeepta Mishra. 455-459 [doi]
- Flocking along line by autonomous oblivious mobile robotsSruti Gan Chaudhuri. 460-464 [doi]
- iSecure: imperceptible and secure peer-to-peer communication of post-disaster situational data over opportunistic DTNChandrima Chakrabarti, Siuli Roy. 465-468 [doi]
- To protect ecological system from electromagnetic radiation of mobile communicationAvirup Das, Srabani Kundu. 469-473 [doi]
- A percolation-based recovery mechanism for bot infected P2P cloudSanghamitra De, Mridul Sankar Barik, Indrajit Banerjee. 474-479 [doi]
- Evaluating the quality of word representation models for unstructured clinical Text based ICU mortality predictionGokul S. Krishnan, S. Sowmya Kamath. 480-485 [doi]
- Proactive diabetes management: research directionsMerlin George, Anu Chacko, Sudeep Koshy Kurien. 486-491 [doi]
- AyurTourism: a web based recommendation system for medical tourismDileep M. R, Prathyash V, Jithin J. 492-495 [doi]
- Do we have the time for IRM?: service denial attacks and SDN-based defencesRyan Shah, Shishir Nagaraja. 496-501 [doi]
- Effect of sign-bit-flipping trojan on turbo coded communication systemsKarthi Balasubramanian, B. Yamuna, Salija P, Karthikeyan Lingasubramanian, Deepak Mishra. 502-505 [doi]
- A scalable and composable analytics platform for distributed wide-area trackingAakash Khochare, Yogesh Simmhan. 506 [doi]
- Flexible cryptographic access control through proxy re-encryption between groupsGaurav Pareek, Purushothama B. R. 507 [doi]
- Entitling concurrency to smart contracts using optimistic transactional memoryParwat Singh Anjana, Sweta Kumari, Sathya Peri, Sachin Rathor, Archit Somani. 508 [doi]
- An efficient user privacy preserving multi-server private information retrieval: an efficient privacy preserving information storage and retrieval frameworkRadhakrishna Bhat, N. R. Sunitha. 509 [doi]
- A cost-aware algorithm for placement of enterprise applications in federated cloud data centerMoustafa Najm, Venkatesh Tamarapalli. 510 [doi]
- CAN-based networked path-tracking control of a 4WS4WD electric vehicle: selection of sampling period and hardware-in-the-loop simulationArun Kant Singh, Ramprasad Potluri. 511 [doi]
- Channel selection in dynamic networks of unknown sizeRohit Kumar 0003, Sumit Jagdish Darak. 512 [doi]