Abstract is missing.
- A Look at Basics of Distributed ComputingMichel Raynal. 1-11 [doi]
- Cognitive Technologies for Smarter CitiesMartin G. Kienzle. 12-21 [doi]
- Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric ComputingAlberto Montresor. 22-23 [doi]
- Software-Based Networks: Leveraging High-Performance NFV Platforms to Meet Future Communication ChallengesK. K. Ramakrishnan. 24 [doi]
- INSPECTOR: Data Provenance Using Intel Processor Trace (PT)Jörg Thalheim, Pramod Bhatotia, Christof Fetzer. 25-34 [doi]
- PAG: Private and Accountable GossipJeremie Decouchant, Sonia Ben Mokhtar, Albin Petit, Vivien Quéma. 35-44 [doi]
- Practical Intrusion-Tolerant NetworksDaniel Obenshain, Thomas Tantillo, Amy Babay, John L. Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, Cristina Nita-Rotaru. 45-56 [doi]
- Gremlin: Systematic Resilience Testing of MicroservicesVictor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar. 57-66 [doi]
- CRONets: Cloud-Routed Overlay NetworksChris X. Cai, Franck Le, Xin Sun 0002, Geoffrey G. Xie, Hani Jamjoom, Roy H. Campbell. 67-77 [doi]
- Riptide: Jump-Starting Back-Office Connections in Cloud SystemsMarcel Flores, Amir R. Khakpour, Harkeerat Bedi. 78-87 [doi]
- The Internet is for Porn: Measurement and Analysis of Online Adult TrafficFaraz Ahmed, M. Zubair Shafiq, Alex X. Liu. 88-97 [doi]
- Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data CenterJiawei Huang, Jianxin Wang, Tao Zhang, Jianer Chen, Yi Pan. 98-107 [doi]
- A Performance Analysis of Incentive Mechanisms for Cooperative ComputingCarlee Joe-Wong, Youngbin Im, Kyuyong Shin, Sangtae Ha. 108-117 [doi]
- GrapH: Heterogeneity-Aware Graph Computation with Adaptive PartitioningChristian Mayer, Muhammad Adnan Tariq, Chen Li, Kurt Rothermel. 118-128 [doi]
- Minimum-Cost Cloud Storage Service Across Multiple Cloud ProvidersGuoxin Liu, Haiying Shen. 129-138 [doi]
- A Realistic and Optimized V2V Communication System for TaxicabsYang Wang 0015, Erkun Yang, Wei Zheng, Liusheng Huang, Hengchang Liu, Binxin Liang. 139-148 [doi]
- Optimal Marching of Autonomous Networked RobotsBuri Ban, Miao Jin, Hongyi Wu. 149-158 [doi]
- RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile UsersMd. Yusuf Sarwar Uddin, Vinay Setty, Ye Zhao, Roman Vitenberg, Nalini Venkatasubramanian. 159-168 [doi]
- Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive SensingKun Xie, Wang Luo, Xin Wang, Dongliang Xie, Jiannong Cao, Jigang Wen, Gaogang Xie. 169-178 [doi]
- RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN SwitchesXitao Wen, Bo Yang, Yan Chen, Li Erran Li, Kai Bu, Peng Zheng, Yang Yang, Chengchen Hu. 179-188 [doi]
- RITM: Revocation in the MiddlePawel Szalachowski, Laurent Chuat, Taeho Lee, Adrian Perrig. 189-200 [doi]
- A Distributed Auctioneer for Resource Allocation in Decentralized SystemsAmin M. Khan, Xavier Vilaça, Luis Rodrigues, Felix Freitag. 201-210 [doi]
- Datacomp: Locally Independent Adaptive Compression for Real-World SystemsPeter A. H. Peterson, Peter L. Reiher. 211-220 [doi]
- Hybrid Content-Based Routing Using Network and Application Layer FilteringSukanya Bhowmik, Muhammad Adnan Tariq, Lobna Hegazy, Kurt Rothermel. 221-231 [doi]
- Exploiting Causality to Engineer Elastic Distributed SoftwareK. R. Jayaram. 232-241 [doi]
- RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared CloudsZhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang. 242-251 [doi]
- The Same Speed Timer in Population ProtocolsYuichi Sudo, Toshimitsu Masuzawa, Ajoy Kumar Datta, Lawrence L. Larmore. 252-261 [doi]
- Interactive Wireless Charging for Energy BalanceSotiris E. Nikoletseas, Theofanis P. Raptis, Christoforos Raptopoulos. 262-270 [doi]
- Nearly Optimal Distributed Algorithm for Computing Betweenness CentralityQiang-Sheng Hua, Haoqiang Fan, Ming Ai, Lixiang Qian, Yangyang Li, Xuanhua Shi, Hai Jin. 271-280 [doi]
- An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional ListDeli Zhang, Damian Dechev. 281-292 [doi]
- Characterizing the Computational Power of Anonymous Mobile RobotsMattia D'Emidio, Daniele Frigioni, Alfredo Navarra. 293-302 [doi]
- CryptoLock (and Drop It): Stopping Ransomware Attacks on User DataNolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler. 303-312 [doi]
- Amnesia: A Bilateral Generative Password ManagerLuren Wang, Yue Li, Kun Sun. 313-322 [doi]
- Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their TargetsSamuel Marchal, Kalle Saari, Nidhi Singh, N. Asokan. 323-333 [doi]
- BotMeter: Charting DGA-Botnet Landscapes in Large NetworksTing Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor. 334-343 [doi]
- Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing SystemsHaiming Jin, Lu Su, Bolin Ding, Klara Nahrstedt, Nikita Borisov. 344-353 [doi]
- Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile CrowdsensingJing Wang, Jian Tang, Dejun Yang, Erica Wang, Guoliang Xue. 354-363 [doi]
- Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary GameNa Ruan, Lei Gao, Haojin Zhu, Weijia Jia, Xiang Li, Qi Hu. 364-373 [doi]
- Resource-Aware Photo Crowdsourcing Through Disruption Tolerant NetworksYibo Wu, Yi Wang 0014, Wenjie Hu, Xiaomei Zhang, Guohong Cao. 374-383 [doi]
- Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-DesignSajjad Rizvi, Xi Li, Bernard Wong, Fiodar Kazhamiaka, Benjamin Cassell. 384-394 [doi]
- A Parity-Based Data Outsourcing Model for Query Authentication and CorrectionShixin Tian, Ying Cai, Zhenbi Hu. 395-404 [doi]
- Cure: Strong Semantics Meets High Availability and Low LatencyDeepthi Devaki Akkoorath, Alejandro Z. Tomsic, Manuel Bravo, Zhongmiao Li, Tyler Crain, Annette Bieniusa, Nuno M. Preguiça, Marc Shapiro. 405-414 [doi]
- Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic PricingXiaomeng Yi, Fangming Liu, Zongpeng Li, Hai Jin. 415-424 [doi]
- SpotLight: An Information Service for the CloudXue Ouyang, David Irwin, Prashant Shenoy. 425-436 [doi]
- Routing and Scheduling of Social Influence Diffusion in Online Social NetworksHui-Ju Hung, De-Nian Yang, Wang-Chien Lee. 437-446 [doi]
- Social Graph Publishing with Privacy GuaranteesFaraz Ahmed, Alex X. Liu, Rong Jin. 447-456 [doi]
- ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched NetworksDouglas McGeehan, Dan Lin, Sanjay Madria. 457-466 [doi]
- On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error BoundsShuochao Yao, Shaohan Hu, Shen Li, Yiran Zhao, Lu Su, Lance M. Kaplan, Aylin Yener, Tarek F. Abdelzaher. 467-476 [doi]
- Efficient Top-k Result Diversification for Mobile Sensor DataMasahiro Yokoyama, Takahiro Hara. 477-486 [doi]
- Energy Minimization for Quality-Constrained Video with Multipath TCP over Heterogeneous Wireless NetworksJiyan Wu, Bo Cheng, Ming Wang. 487-496 [doi]
- Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction ApproachRichard T. B. Ma. 497-508 [doi]
- HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone EnergyGe Peng, Gang Zhou, David T. Nguyen, Xin Qi, Shan Lin. 509-518 [doi]
- Accurate Spatial Calibration of RFID Antennas via Spinning TagsChunhui Duan, Lei Yang, Yunhao Liu. 519-528 [doi]
- WiLocator: WiFi-Sensing Based Real-Time Bus Tracking and Arrival Time Prediction in Urban EnvironmentsWenPing Liu, Jiangchuan Liu, Hongbo Jiang, Bicheng Xu, Hongzhi Lin, Guoyin Jiang, Jing Xing. 529-538 [doi]
- CACE: Exploiting Behavioral Interactions for Improved Activity Recognition in Multi-inhabitant Smart HomesMohammad Arif Ul Alam, Nirmalya Roy, Archan Misra, Joseph Taylor. 539-548 [doi]
- Overlay Design for Topic-Based Publish/Subscribe under Node Degree ConstraintsChen Chen, Yoav Tock, Hans-Arno Jacobsen. 549-559 [doi]
- Service Placement for Detecting and Localizing Failures Using End-to-End ObservationsTing He, Novella Bartolini, Hana Khamfroush, Injung Kim, Liang Ma, Tom La Porta. 560-569 [doi]
- Live Exploration of Dynamic RingsGiuseppe Antonio Di Luna, Stefan Dobrev, Paola Flocchini, Nicola Santoro. 570-579 [doi]
- Randomized Load Balancing in Finite RegimesAntonie S. Godtschalk, Florin Ciucu. 580-589 [doi]
- Spectrum MatchingYanjiao Chen, Linshan Jiang, Haofan Cai, Jin Zhang, Baochun Li. 590-599 [doi]
- CACA: Link-Based Channel Allocation Exploiting Capture Effect for Channel Reuse in Wireless Sensor NetworksJung-Hyun Jun, Solchan Yeon, Titir Kundu, Dharma P. Agrawal, Jaehoon Jeong. 600-608 [doi]
- An Analysis of Onion-Based Anonymous Routing for Delay Tolerant NetworksKazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, Faisal S. Alanazi. 609-618 [doi]
- Directional Beam Alignment for Millimeter Wave Cellular SystemsJie Zhao, Xin Wang, Harish Viswanathan. 619-628 [doi]
- Measurement, Modeling, and Analysis of TCP in High-Speed Mobility ScenariosQingfang Liu, Ke Xu, Haiyang Wang, Meng Shen, Li Li, Qingyang Xiao. 629-638 [doi]
- Backlog-Aware SRPT Flow Scheduling in Data Center NetworksTong Zhang, Fengyuan Ren, Ran Shu. 639-648 [doi]
- An NFV Orchestration Framework for Interference-Free Policy EnforcementXin Li, Chen Qian. 649-658 [doi]
- Bandwidth-Greedy Hashing for Massive-Scale Concurrent FlowsTian Pan, Bin Liu 0001, Xiaoyu Guo, Yang Li, Haoyu Song. 659-668 [doi]
- Fast Total Ordering for Modern Data CentersAmy Babay, Yair Amir. 669-679 [doi]
- A De-compositional Approach to Regular Expression Matching for Network Security ApplicationsEric Norige, Alex X. Liu. 680-689 [doi]
- Privacy-Preserving Data Classification and Similarity Evaluation for Distributed SystemsQi Jia, Linke Guo, Zhanpeng Jin, Yuguang Fang. 690-699 [doi]
- Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature ExtractorQian Wang, Shengshan Hu, Jingjun Wang, Kui Ren. 700-710 [doi]
- D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting SystemNikos Chondros, Bingsheng Zhang, Thomas Zacharias 0001, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos. 711-720 [doi]
- Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile CrowdsensingMingjun Xiao, Jie Wu, He Huang, Liusheng Huang, Chang Hu. 721-722 [doi]
- RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality SystemsJianqiang Sun, Lei Xie, Qingliang Cai, Chuyu Wang, Jie Wu, Sanglu Lu. 723-724 [doi]
- OmniFlow: Coupling Load Balancing with Flow Control in Datacenter NetworksKaiyuan Wen, Zhuzhong Qian, Sheng Zhang, Sanglu Lu. 725-726 [doi]
- Approximate Agreement under Mobile Byzantine FaultsSilvia Bonomi, Antonella Del Pozzo, Maria Potop-Butucaru, Sébastien Tixeuil. 727-728 [doi]
- Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access SystemsYanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren. 729-730 [doi]
- On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud ComputingYang Wang, Cheng-Zhong Xu, Shuibing He, Xian-He Sun. 731-732 [doi]
- On the Efficiency of Decentralized Search in Expert NetworksLiang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni. 733-734 [doi]
- Virtual Machine Level Temperature Profiling and Prediction in Cloud DatacentersZhaohui Wu, Xiang Li, Peter Garraghan, Xiaohong Jiang, Kejiang Ye, Albert Y. Zomaya. 735-736 [doi]
- Strategic Security Resource Allocation for Internet of ThingsAntonino Rullo, Daniele Midi, Edoardo Serra, Elisa Bertino. 737-738 [doi]
- FSQCN: Fast and Simple Quantized Congestion Notification in Data Center EthernetChang Ruan, Jianxin Wang, Wanchun Jiang. 739-740 [doi]
- Practical Concurrent Wireless Charging Scheduling for Sensor NetworksPeng Guo, Xuefeng Liu, Tingfang Tang, ShaoJie Tang, Jiannong Cao. 741-742 [doi]
- A Geometric Windowing Algorithm in Network Data-Plane VerificationRichard Chen, Toru Mano, Takeru Inoue, Kimihiro Mizutani, Hisashi Nagata, Osamu Akashi. 743-744 [doi]
- Dslash: Managing Data in Overloaded Batch Streaming SystemsRobert Birke, Mathias Björkqvist, Evangelia Kalyvianaki, Lydia Y. Chen. 745-746 [doi]
- Distributed Online Data Aggregation in Dynamic GraphsQuentin Bramas, Toshimitsu Masuzawa, Sébastien Tixeuil. 747-748 [doi]
- Efficient Free-Rider Detection Using Symmetric OverlaysJoão Bruno Rodrigues Roque e Silva, Xavier Vilaça, Hugo Miranda, Luís E. T. Rodrigues. 749-750 [doi]
- Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the InternetXiaozhe Shao, Feng Wang, Lixin Gao, Kenji Fujikawa, Hiroaki Harai. 751-752 [doi]
- Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded StorageVaneet Aggarwal, Yih-Farn Robin Chen, Tian Lan, Yu Xiang. 753-754 [doi]
- UDS: A Unified Approach to Deterministic MultithreadingFranz J. Hauck, Jörg Domaschka. 755-756 [doi]
- DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo)Ertem Esiner, Shun Hanli Hanley, Anwitaman Datta. 757-758 [doi]
- Milk Carton: A Face Recognition-Based FTR System Using Opportunistic Clustered ComputingEdgar Marko Trono, Manato Fujimoto, Hirohiko Suwa, Yutaka Arakawa, Keiichi Yasumoto. 759-760 [doi]
- Memory Efficient One-Sided Communucation Library "ACP" in Globary Memory on Raspberry Pi 2Yoshiyuki Morie, Hiroaki Honda, Takeshi Nanri, Taizo Kobayashi, Hidetomo Shibamura, Ryutaro Susukita, Yuichiro Ajima. 761-762 [doi]
- An SDN-Based Multipath GridFTP for High-Speed Data TransferChe Huang, Chawanat Nakasan, Kohei Ichikawa, Hajimu Iida. 763-764 [doi]
- An Endpoint Communication Profiling Tool for Distributed Computing FrameworksAndrea Rosà, Lydia Y. Chen, Walter Binder. 765-766 [doi]
- Cruisers: A Public Automotive Sensing Platform for Smart CitiesYin Chen, Jin Nakazawa, Takuro Yonezawa, Takafumi Kawesaki, Hideyuki Tokuda. 767-768 [doi]
- DL-Store: A Distributed Hybrid OLTP and OLAP Data Processing EngineKaiwen Zhang 0001, Mohammad Sadoghi, Hans-Arno Jacobsen. 769-770 [doi]
- Middleware for Proximity Distributed Real-Time Processing of IoT Data FlowsYugo Nakamura, Hirohiko Suwa, Yutaka Arakawa, Hirozumi Yamaguchi, Keiichi Yasumoto. 771-772 [doi]
- Federation of Private IaaS Cloud Providers through the Barter of ResourcesFrancisco Vilar Brasileiro, Eduardo De Lucena Falcão. 773-774 [doi]
- Publish/Subscribe for Mobile Applications Using Shared Dictionary CompressionChristoph Doblander, Kaiwen Zhang 0001, Hans-Arno Jacobsen. 775-776 [doi]
- Real-Time Client-Side Phishing Prevention Add-OnGiovanni Armano, Samuel Marchal, N. Asokan. 777-778 [doi]