Abstract is missing.
- Timely, Reliable, and Cost-Effective Internet Transport Service Using Dissemination GraphsAmy Babay, Emily Wagner, Michael Dinitz, Yair Amir. 1-12 [doi]
- Pronto: Efficient Test Packet Generation for Dynamic Network Data PlanesYu Zhao, Huazhe Wang, Xin Lin, Tingting Yu, Chen Qian. 13-22 [doi]
- Agar: A Caching System for Erasure-Coded DataRaluca Halalai, Pascal Felber, Anne-Marie Kermarrec, François Taïani. 23-33 [doi]
- High Performance Recovery for Parallel State Machine ReplicationOdorico Machado Mendizabal, Fernando Luís Dotti, Fernando Pedone. 34-44 [doi]
- On Data Parallelism of Erasure Coding in Distributed Storage SystemsJun Li, Baochun Li. 45-56 [doi]
- MeteorShower: Minimizing Request Latency for Majority Quorum-Based Data Consistency Algorithms in Multiple Data CentersYing Liu, Xi Guan, Vladimir Vlassov, Seif Haridi. 57-67 [doi]
- LSbM-tree: Re-Enabling Buffer Caching in Data Management for Mixed Reads and WritesDejun Teng, Lei Guo, Rubao Lee, Feng Chen, Siyuan Ma, Yanfeng Zhang, Xiaodong Zhang. 68-79 [doi]
- Incremental Topology Transformation for Publish/Subscribe Systems Using Integer ProgrammingPooya Salehi, Kaiwen Zhang 0001, Hans-Arno Jacobsen. 80-91 [doi]
- milliScope: A Fine-Grained Monitoring Framework for Performance Debugging of n-Tier Web ServicesChien-An Lai, Josh Kimball, Tao Zhu, Qingyang Wang, Calton Pu. 92-102 [doi]
- Stark: Optimizing In-Memory Computing for Dynamic Dataset CollectionsShen Li, Md. Tanvir Al Amin, Raghu K. Ganti, Mudhakar Srivatsa, Shanhao Hu, Yiran Zhao, Tarek F. Abdelzaher. 103-114 [doi]
- CRESON: Callable and Replicated Shared Objects over NoSQLPierre Sutra, Etienne Riviere, Cristian Cotes, Marc Sánchez Artigas, Pedro García López, Emmanuel Bernard, William Burns, Galder Zamarreno. 115-128 [doi]
- Virtualized Network Coding Functions on the InternetLinquan Zhang, Shangqi Lai, Chuan Wu, Zongpeng Li, Chuanxiong Guo. 129-139 [doi]
- Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange SystemAdriano Di Luzio, Alessandro Mei, Julinda Stefa. 140-150 [doi]
- Learning Privacy Habits of PDS OwnersBikash Chandra Singh, Barbara Carminati, Elena Ferrari. 151-161 [doi]
- City-Hunter: Hunting Smartphones in Urban AreasXuefeng Liu, Jiaqi Wen, ShaoJie Tang, Jiannong Cao, Jiaxing Shen. 162-171 [doi]
- When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network TomographyShangqing Zhao, Zhuo Lu, Cliff Wang. 172-182 [doi]
- You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on SmartphonesSi Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen. 183-195 [doi]
- Flow Reconnaissance via Timing Attacks on SDN SwitchesSheng Liu, Michael K. Reiter, Vyas Sekar. 196-206 [doi]
- A Study of Long-Tail Latency in n-Tier Systems: RPC vs. Asynchronous InvocationsQingyang Wang, Chien-An Lai, Yasuhiko Kanemasa, Shungeng Zhang, Calton Pu. 207-217 [doi]
- Rain or Shine? - Making Sense of Cloudy Reliability DataIyswarya Narayanan, Bikash Sharma, Di Wang, Sriram Govindan, Laura Caulfield, Anand Sivasubramaniam, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid. 218-229 [doi]
- Right-Sizing Geo-distributed Data Centers for Availability and LatencyIyswarya Narayanan, Aman Kansal, Anand Sivasubramaniam. 230-240 [doi]
- Performance Driven Resource Sharing Markets for the Small CloudSung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik. 241-251 [doi]
- Fault-Scalable Virtualized Infrastructure ManagementMukil Kesavan, Ada Gavrilovska, Karsten Schwan. 252-263 [doi]
- DeltaCFS: Boosting Delta Sync for Cloud Storage Services by Learning from NFSQuanlu Zhang, Zhenhua Li, Zhi Yang, Shenglong Li, Shouyang Li, Yangze Guo, Yafei Dai. 264-275 [doi]
- Cachier: Edge-Caching for Recognition ApplicationsUtsav Drolia, Katherine Guo, Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan. 276-286 [doi]
- Content Centric Peer Data Sharing in Pervasive Edge Computing EnvironmentsXintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li. 287-297 [doi]
- FLARE: Coordinated Rate Adaptation for HTTP Adaptive Streaming in Cellular NetworksYoungbin Im, Jinyoung Han, Ji Hoon Lee, Yoon Kwon, Carlee Joe-Wong, Ted Taekyoung Kwon, Sangtae Ha. 298-307 [doi]
- Networked Drone Cameras for Sports StreamingXiaoli Wang, Aakanksha Chowdhery, Mung Chiang. 308-318 [doi]
- Chronus: Consistent Data Plane Updates in Timed SDNsJiaqi Zheng, Guihai Chen, Stefan Schmid, Haipeng Dai, Jie Wu 0001. 319-327 [doi]
- Distributed Deep Neural Networks Over the Cloud, the Edge and End DevicesSurat Teerapittayanon, Bradley McDanel, H. T. Kung. 328-339 [doi]
- Dynamic Control of Flow Completion Time for Power Efficiency of Data Center NetworksKuangyu Zheng, Xiaorui Wang. 340-350 [doi]
- On Energy-Efficient Congestion Control for Multipath TCPJia Zhao, Jiangchuan Liu, Haiyang Wang. 351-360 [doi]
- A Mechanism for Cooperative Demand-Side ManagementGuangchao Yuan, Chung-Wei Hang, Michael N. Huhns, Munindar P. Singh. 361-371 [doi]
- A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement LearningNing Liu, Zhe Li, Jielong Xu, Zhiyuan Xu, Sheng Lin, Qinru Qiu, Jian Tang, Yanzhi Wang. 372-382 [doi]
- SunChase: Energy-Efficient Route Planning for Solar-Powered EVsLandu Jiang, Yu Hua, Chen Ma, Xue Liu. 383-393 [doi]
- Persistent Traffic Measurement Through Vehicle-to-Infrastructure CommunicationsHe Huang, Yu-e Sun, Shigang Chen, Hongli Xu, Yian Zhou. 394-403 [doi]
- TagBreathe: Monitor Breathing with Commodity RFID SystemsYuxiao Hou, Yanwen Wang, Yuanqing Zheng. 404-413 [doi]
- Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply ChainSaiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Jianfeng Ma, Yong Qi. 414-424 [doi]
- Towards Accurate Corruption Estimation in ZigBee Under Cross-Technology InterferenceGonglong Chen, Wei Dong, Zhiwei Zhao, Tao Gu. 425-435 [doi]
- Unseen Activity Recognitions: A Hierarchical Active Transfer Learning ApproachMohammad Arif Ul Alam, Nirmalya Roy. 436-446 [doi]
- RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive TagsHan Ding, Chen Qian, Jinsong Han, Ge Wang, Wei Xi, Kun Zhao, Jizhong Zhao. 447-457 [doi]
- Robust Incentive Tree Design for Mobile CrowdsensingXiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang. 458-468 [doi]
- WearLock: Unlocking Your Phone via Acoustics Using SmartwatchShanhe Yi, Zhengrui Qin, Nancy Carter, Qun Li. 469-479 [doi]
- Modeling Mobile Code Acceleration in the CloudHuber Flores, Xiang Su, Vassilis Kostakos, Jukka Riekki, Eemil Lagerspetz, Sasu Tarkoma, Pan Hui, Yong Li, Jukka Manner. 480-491 [doi]
- E-Android: A New Energy Profiling Tool for SmartphonesXing Gao, Dachuan Liu, Daiping Liu, Haining Wang, Angelos Stavrou. 492-502 [doi]
- Local and Low-Cost White Space DetectionAhmed Saeed 0001, Khaled A. Harras, Ellen W. Zegura, Mostafa H. Ammar. 503-516 [doi]
- General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game PerspectiveWeiman Sun, Shengling Wang 0001. 517-526 [doi]
- High-Performance and Resilient Key-Value Store with Online Erasure Coding for Big Data WorkloadsDipti Shankar, Xiaoyi Lu, Dhabaleswar K. Panda. 527-537 [doi]
- Modeling and Analyzing Latency in the Memcached systemWenxue Cheng, Fengyuan Ren, Wanchun Jiang, Tong Zhang. 538-548 [doi]
- Speculative Slot Reservation: Enforcing Service Isolation for Dependent Data-Parallel ComputationsChen Chen, Wei Wang, Bo Li. 549-559 [doi]
- Optimizing Shuffle in Wide-Area Data AnalyticsShuhao Liu, Hao Wang, Baochun Li. 560-571 [doi]
- Job Scheduling without Prior Information in Big Data Processing SystemsZhiming Hu, Baochun Li, Zheng Qin, Rick Siow Mong Goh. 572-582 [doi]
- Distributed Load Balancing in Key-Value Networked CachesSikder Huq, M. Zubair Shafiq, Sukumar Ghosh, Amir R. Khakpour, Harkeerat Bedi. 583-593 [doi]
- Cognitive Context-Aware Distributed Storage Optimization in Mobile Cloud Computing: A Stable Matching Based ApproachDong Han, Ye Yan, Tao Shu, Liuqing Yang, Shuguang Cui. 594-604 [doi]
- Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing EnvironmentsYaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, Xiaoming Li. 605-614 [doi]
- Latency-Driven Cooperative Task Computing in Multi-user Fog-Radio Access NetworksAi-Chun Pang, Wei-Ho Chung, Te-Chuan Chiu, Junshan Zhang. 615-624 [doi]
- Approximation and Online Algorithms for NFV-Enabled Multicasting in SDNsZichuan Xu, Weifa Liang, Meitian Huang, Mike Jia, Song Guo, Alex Galis. 625-634 [doi]
- Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing SystemsZhuojun Duan, Wei Li, Zhipeng Cai. 635-644 [doi]
- Effective Mobile Data Trading in Secondary Ad-hoc Market with Heterogeneous and Dynamic EnvironmentHengky Susanto, Honggang Zhang, Shing-Yip Ho, Benyuan Liu. 645-655 [doi]
- Kalis - A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of ThingsDaniele Midi, Antonino Rullo, Anand Mudgerikar, Elisa Bertino. 656-666 [doi]
- Fuzzy Extractors for Biometric IdentificationNan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal. 667-677 [doi]
- Smartphone Privacy Leakage of Social Relationships and Demographics from Surrounding Access PointsChen Wang, Chuyu Wang, Yingying Chen, Lei Xie, Sanglu Lu. 678-688 [doi]
- EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient SurveillanceGang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao. 689-698 [doi]
- Adaptive Reconnaissance Attacks with Near-Optimal Parallel BatchingXiang Li, J. David Smith, My T. Thai. 699-709 [doi]
- Achieving Strong Privacy in Online SurveyYou Zhou, Yian Zhou, Shigang Chen, Samuel S. Wu. 710-719 [doi]
- Service Overlay Forest Embedding for Software-Defined Cloud NetworksJian-Jhih Kuo, Shan-Hsiang Shen, Ming-Hong Yang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen. 720-730 [doi]
- Joint Optimization of Chain Placement and Request Scheduling for Network Function VirtualizationQixia Zhang, Yikai Xiao, Fangming Liu, John C. S. Lui, Jian Guo, Tao Wang. 731-741 [doi]
- BIG Cache Abstraction for Cache NetworksEman Ramadan, Arvind Narayanan, Zhi-Li Zhang, Runhui Li, Gong Zhang. 742-752 [doi]
- Distributed QR Decomposition Framework for Training Support Vector MachinesJyotikrishna Dass, V. N. S. Prithvi Sakuru, Vivek Sarin, Rabi N. Mahapatra. 753-763 [doi]
- Distributively Computing Random Walk Betweenness Centrality in Linear TimeQiang-Sheng Hua, Ming Ai, Hai Jin, Dongxiao Yu, Xuanhua Shi. 764-774 [doi]
- DeGPar: Large Scale Topic Detection Using Node-Cut Partitioning on Dense Weighted GraphsKambiz Ghoorchian, Sarunas Girdzijauskas, Fatemeh Rahimian. 775-785 [doi]
- Networked Stochastic Multi-armed Bandits with Combinatorial StrategiesShaoJie Tang, Yaqin Zhou, Kai Han, Zhao Zhang, Jing Yuan, Weili Wu. 786-793 [doi]
- Computability of Perpetual Exploration in Highly Dynamic RingsMarjorie Bournat, Swan Dubois, Franck Petit. 794-804 [doi]
- Locally Self-Adjusting Skip GraphsSikder Huq, Sukumar Ghosh. 805-815 [doi]
- Online to Offline Business: Urban Taxi Dispatching with Passenger-Driver Matching StabilityHuanyang Zheng, Jie Wu 0001. 816-825 [doi]
- An Optimization Framework for Online Ride-Sharing MarketsYongzheng Jia, Wei Xu, Xue Liu. 826-835 [doi]
- Fast and Accurate Tracking of Population Dynamics in RFID SystemsMuhammad Shahzad, Alex X. Liu. 836-846 [doi]
- Robust Indoor Wireless Localization Using Sparse RecoveryWei Gong, Jiangchuan Liu. 847-856 [doi]
- Max-Min Fair Resource Allocation in HetNets: Distributed Algorithms and Hybrid ArchitectureEhsan Aryafar, Alireza Keshavarz-Haddad, Carlee Joe-Wong, Mung Chiang. 857-869 [doi]
- Optimization of Full-View Barrier Coverage with Rotatable Camera SensorsXiaofeng Gao, Rui Yang, Fan Wu, Guihai Chen, Jinguang Zhou. 870-879 [doi]
- Communication through Symbol Silence: Towards Free Control Messages in Indoor WLANsBing Feng, Jianqing Liu, Chi Zhang, Yuguang Fang. 880-888 [doi]
- Secure Connectivity of Wireless Sensor Networks Under Key Predistribution with on/off ChannelsJun Zhao. 889-899 [doi]
- iUpdater: Low Cost RSS Fingerprints Updating for Device-Free LocalizationLiqiong Chang, Jie Xiong, Yu Wang, XiaoJiang Chen, Junhao Hu, Dingyi Fang. 900-910 [doi]
- Influence Maximization in a Many Cascades WorldIouliana Litou, Vana Kalogeraki, Dimitrios Gunopulos. 911-921 [doi]
- Expertise-Aware Truth Analysis and Task Allocation in Mobile CrowdsourcingXiaomei Zhang, Yibo Wu, Lifu Huang, Heng Ji, Guohong Cao. 922-932 [doi]
- MELODY: A Long-Term Dynamic Quality-Aware Incentive Mechanism for CrowdsourcingHongwei Wang, Song Guo, Jiannong Cao, Minyi Guo. 933-943 [doi]
- The Strong Link Graph for Enhancing Sybil DefensesSuhendry Effendy, Roland H. C. Yap. 944-954 [doi]
- Mechanism Design for Mobile Crowdsensing with Execution UncertaintyZhenzhe Zheng, Zhaoxiong Yang, Fan Wu, Guihai Chen. 955-965 [doi]
- Towards Scalable and Dynamic Social Sensing Using A Distributed Computing FrameworkDaniel Yue Zhang, Chao Zheng, Dong Wang, Douglas Thain, Xin Mu, Greg Madey, Chao Huang. 966-976 [doi]
- Phoenix: A Constraint-Aware Scheduler for Heterogeneous DatacentersPrashanth Thinakaran, Jashwant Raj Gunasekaran, Bikash Sharma, Mahmut Taylan Kandemir, Chita R. Das. 977-987 [doi]
- Dual Scaling VMs and Queries: Cost-Effective Latency CurtailmentJuan F. Pérez, Robert Birke, Mathias Björkqvist, Lydia Y. Chen. 988-998 [doi]
- A Framework for Enabling Security Services Collaboration Across Multiple DomainsDaniel Migault, Marcos A. Simplicio, Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho. 999-1010 [doi]
- Group Clustering Using Inter-Group DissimilaritiesDebessay Fesehaye, Lenin Singaraveluy, Chien-Chia Chen, Xiaobo Huang, Amitabha Banerjee, Ruijin Zhou, Rajesh Somasundaran. 1011-1021 [doi]
- Comprehensive Measurement and Analysis of the User-Perceived I/O Performance in a Production Leadership-Class Storage SystemLipeng Wan, Matthew Wolf, Feiyi Wang, Jong Youl Choi, George Ostrouchov, Scott Klasky. 1022-1031 [doi]
- On the Limits of Subsampling of Location TracesMudhakar Srivatsa, Raghu K. Ganti, Prasant Mohapatra. 1032-1041 [doi]
- SOM-TC: Self-Organizing Map for Hierarchical Trajectory ClusteringPranita Dewan, Raghu Ganti, Mudhakar Srivatsa. 1042-1052 [doi]
- Processing Encrypted and Compressed Time Series DataMat>ús Harvan, Samuel Kimoto, Thomas Locher, Yvonne Anne Pignolet, Johannes Schneider. 1053-1062 [doi]
- Calvin Constrained - A Framework for IoT Applications in Heterogeneous EnvironmentsAmardeep Mehta, Rami Baddour, Fredrik Svensson, Harald Gustafsson, Erik Elmroth. 1063-1073 [doi]
- Privacy Preserving User-Based Recommender SystemShahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino. 1074-1083 [doi]
- Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud ComputingYe Yan, Dong Han, Tao Shu. 1084-1093 [doi]
- SPHINX: A Password Store that Perfectly Hides Passwords from ItselfMaliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena. 1094-1104 [doi]
- When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum AccessChaowen Guan, Aziz Mohaisen, Zhi Sun, Lu Su, Kui Ren, Yaling Yang. 1105-1115 [doi]
- Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its VariantsWeipeng Lin, Ke Wang, Zhilin Zhang, Hong Chen. 1116-1125 [doi]
- An Adversary-Centric Behavior Modeling of DDoS Attacksan Wang, Aziz Mohaisen, Songqing Chen. 1126-1136 [doi]
- Anti-Malicious Crowdsourcing Using the Zero-Determinant StrategyQin Hu, Shengling Wang 0001, Liran Ma, Rongfang Bie, Xiuzhen Cheng. 1137-1146 [doi]
- JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social NetworksJingya Zhou, Jianxi Fan. 1147-1156 [doi]
- Optimizing Source Selection in Social Sensing in the Presence of Influence GraphsHuajie Shao, ShiGuang Wang, Shen Li, Shuochao Yao, Yiran Zhao, Md. Tanvir Al Amin, Tarek F. Abdelzaher, Lance M. Kaplan. 1157-1167 [doi]
- Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality ControlChenxi Qiu, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, James Caverlee. 1168-1177 [doi]
- Joint Request Balancing and Content Aggregation in Crowdsourced CDNMing Ma, Zhi Wang, Kun Yi, Jiangchuan Liu, Lifeng Sun. 1178-1188 [doi]
- Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social NetworkAli Li, Rui Wang, Lei Xu. 1189-1196 [doi]
- Opportunistic Energy Sharing Between Power Grid and Electric Vehicles: A Game Theory-Based Pricing PolicyAnkur Sarker, Zhuozhao Li, William Kolodzey, Haiying Shen. 1197-1207 [doi]
- Energy Efficient Object Detection in Camera Sensor NetworksTuan Dao, Karim Khalil, Amit K. Roy Chowdhury, Srikanth V. Krishnamurthy, Lance M. Kaplan. 1208-1218 [doi]
- DeepOpp: Context-Aware Mobile Access to Social Media Content on Underground Metro SystemsDi Wu 0002, Dmitri I. Arkhipov, Thomas Przepiorka, Qiang Liu, Julie A. McCann, Amelia C. Regan. 1219-1229 [doi]
- PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi DevicesXuyu Wang, Chao Yang, Shiwen Mao. 1230-1239 [doi]
- REX: Rapid Ensemble Classification System for Landslide Detection Using Social MediaAibek Musaev, De Wang, Jiateng Xie, Calton Pu. 1240-1249 [doi]
- Toward An Integrated Approach to Localizing Failures in Community Water NetworksQing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian. 1250-1260 [doi]
- MobiQoR: Pushing the Envelope of Mobile Edge Computing Via Quality-of-Result OptimizationYongbo Li, Yurong Chen, Tian Lan, Guru Venkataramani. 1261-1270 [doi]
- Truthful Auctions for User Data Allowance Trading in Mobile NetworksZhongxing Ming, Mingwei Xu, Ning Wang, Bingjie Gao, Qi Li. 1271-1280 [doi]
- Online Resource Allocation for Arbitrary User Mobility in Distributed Edge CloudsLin Wang, Lei Jiao, Jun Li, Max Mühlhäuser. 1281-1290 [doi]
- Leveraging Target k-Coverage in Wireless Rechargeable Sensor NetworksPengzhan Zhou, Cong Wang, Yuanyuan Yang. 1291-1300 [doi]
- Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D ForwardingYanqi Jin, Fangming Liu, Xiaomeng Yi, Minghua Chen. 1301-1311 [doi]
- k-Protected Routing Protocol in Multi-hop Cognitive Radio NetworksChin-Jung Liu, Li Xiao. 1312-1321 [doi]
- Multi-resource Load Balancing for Virtual Network FunctionsTao Wang, Hong Xu, Fangming Liu. 1322-1332 [doi]
- Learning from Failure Across Multiple Clusters: A Trace-Driven Approach to Understanding, Predicting, and Mitigating Job TerminationsNosayba El-Sayed, Hongyu Zhu, Bianca Schroeder. 1333-1344 [doi]
- RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter ResourcesXin Chen, Liting Hu, Douglas M. Blough, Michael A. Kozuch, Matthew Wolf. 1345-1355 [doi]
- Task-aware TCP in Data Center NetworksSen Liu, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He. 1356-1366 [doi]
- Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of MillibottlenecksTao Zhu, Jack Li, Josh Kimball, Junhee Park, Chien-An Lai, Calton Pu, Qingyang Wang. 1367-1377 [doi]
- Performance Analysis of Cloud Computing Centers Serving Parallelizable Rendering Jobs Using M/M/c/r Queuing SystemsXiulin Li, Li Pan, Jiwei Huang, Shijun Liu, Yuliang Shi, Li-zhen Cui, Calton Pu. 1378-1388 [doi]
- Evaluation of Deep Learning Frameworks Over Different HPC ArchitecturesShayan Shams, Richard Platania, Kisung Lee, Seung-Jong Park. 1389-1396 [doi]
- On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed DatacentersAmelie Chi Zhou, Shadi Ibrahim, Bingsheng He. 1397-1407 [doi]
- GBooster: Towards Acceleration of GPU-Intensive Mobile ApplicationsElliott Wen, Winston K. G. Seah, Bryan Ng, Xue Liu, Jiannong Cao, Xuefeng Liu. 1408-1418 [doi]
- Scaling k-Nearest Neighbours Queries (The Right Way)Atoshum Cahsai, Nikos Ntarmos, Christos Anagnostopoulos, Peter Triantafillou. 1419-1430 [doi]
- Parallelizing Big De Bruijn Graph Construction on Heterogeneous ProcessorsShuang Qiu, Qiong Luo. 1431-1441 [doi]
- Private, Yet Practical, Multiparty Deep LearningXinyang Zhang, Shouling Ji, Hui Wang, Ting Wang. 1442-1452 [doi]
- Fast and Flexible Networking for Message-Oriented MiddlewareLars Kroll, Alexandru A. Ormenisan, Jim Dowling. 1453-1464 [doi]
- TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search SystemsChih-Hsun Chou, Laxmi N. Bhuyan, Shaolei Ren. 1465-1475 [doi]
- StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile DevicesYongshu Bai, Yifan Zhang. 1476-1487 [doi]
- Characterizing Performance and Energy-Efficiency of the RAMCloud Storage SystemYacine Taleb, Shadi Ibrahim, Gabriel Antoniu, Toni Cortes. 1488-1498 [doi]
- Proactively Secure Cloud-Enabled StorageKarim Eldefrawy, Sky Faber, Tyler Kaczmarek. 1499-1509 [doi]
- BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-Time Situation AwarenessPengfei Zuo, Yu Hua, Xue Liu, Dan Feng, Wen Xia, Shunde Cao, Jie Wu, Yuanyuan Sun, Yuncheng Guo. 1510-1520 [doi]
- Transparent Fault-Tolerance Using Intra-Machine Full-Software-Stack Replication on Commodity Multicore HardwareGiuliano Losa, Antonio Barbalace, Yuzhong Wen, Ho-Ren Chuang, Binoy Ravindran. 1521-1531 [doi]
- A Preventive Auto-Parallelization Approach for Elastic Stream ProcessingRoland Kotto Kombi, Nicolas Lumineau, Philippe Lamarre. 1532-1542 [doi]
- Dependable Cloud Resources with GuardianBara Abusalah, Derek Schatzlein, Julian James Stephen, Masoud Saeida Ardekani, Patrick Eugster. 1543-1554 [doi]
- A Communication-Aware Container Re-Distribution Approach for High Performance VNFsYuchao Zhang, Yusen Li, Ke Xu, Dan Wang, Minghui Li, Xuan Cao, Qingqing Liang. 1555-1564 [doi]
- Minimizing Cost in IaaS Clouds Via Scheduled Instance ReservationQiushi Wang, Ming Ming Tan, Xueyan Tang, Wentong Cai. 1565-1574 [doi]
- Efficient Distributed Coordination at WAN-ScaleAilidani Ailijiang, Aleksey Charapko, Murat Demirbas, Bekir O. Turkkan, Tevfik Kosar. 1575-1585 [doi]
- Specifying a Distributed Snapshot Algorithm as a Meta-Program and Model Checking it at Meta-LevelHa Thi Thu Doan, Kazuhiro Ogata, François Bonnet. 1586-1596 [doi]
- Self-Evolving Subscriptions for Content-Based Publish/Subscribe SystemsCésar Cañas, Kaiwen Zhang 0001, Bettina Kemme, Jörg Kienzle, Hans-Arno Jacobsen. 1597-1607 [doi]
- Scalable Routing for Topic-Based Publish/Subscribe Systems Under FluctuationsVolker Turau, Gerry Siegemund. 1608-1617 [doi]
- OPPay: Design and Implementation of a Payment System for Opportunistic Data ServicesFengrui Shi, Zhijin Qin, Julie A. McCann. 1618-1628 [doi]
- Optimal Resource Allocation for Multi-user Video Streaming over mmWave NetworksZhifeng He, Shiwen Mao. 1629-1638 [doi]
- A Multi-agent Parallel Approach to Analyzing Large Climate Data SetsJason Woodring, Matthew Sell, Munehiro Fukuda, Hazeline Asuncion, Eric Salathe. 1639-1648 [doi]
- Energy Proportional Servers: Where Are We in 2016?Congfeng Jiang, Yumei Wang, Dongyang Ou, Bing Luo, Weisong Shi. 1649-1660 [doi]
- Are HTTP/2 Servers Ready Yet?Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao. 1661-1671 [doi]
- Data Integrity for Collaborative Applications over Hosted ServicesErtem Esiner, Anwitaman Datta. 1672-1682 [doi]
- Virtual Machine Power Accounting with Shapley ValueWeixiang Jiang, Fangming Liu, Guoming Tang, Kui Wu, Hai Jin. 1683-1693 [doi]
- A General Purpose Testbed for Mobile Data Gathering in Wireless Sensor Networks and a Case StudyJi Li, Cong Wang, Yuanyuan Yang. 1694-1703 [doi]
- On Directional Neighbor Discovery in mmWave NetworksYu Wang, Shiwen Mao, Theodore S. Rappaport. 1704-1713 [doi]
- Observable-by-DesignMasaru Kitsuregawa. 1714-1716 [doi]
- An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and CloudsEve M. Schooler, David Zage, Jeff Sedayao, Hassnaa Moustafa, Andrew Brown, Moreno Ambrosin. 1717-1728 [doi]
- Edge Computing and IoT Based Research for Building Safe Smart Cities Resistant to DisastersTeruo Higashino, Hirozumi Yamaguchi, Akihito Hiromori, Akira Uchiyama, Keiichi Yasumoto. 1729-1737 [doi]
- The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed ComputingMunindar P. Singh, Amit K. Chopra. 1738-1747 [doi]
- Internet of Things: From Small- to Large-Scale OrchestrationCharles Consel, Milan Kabác. 1748-1755 [doi]
- EdgeOS_H: A Home Operating System for Internet of EverythingJie Cao, Lanyu Xu, Raef Abdallah, Weisong Shi. 1756-1764 [doi]
- A Vision for Zero-Hop Networking (ZeN)Mostafa H. Ammar, Ellen W. Zegura, Yimeng Zhao. 1765-1770 [doi]
- Structured Overlay Networks for a New Generation of Internet ServicesAmy Babay, Claudiu Danilov, John Lane, Michal Miskin-Amir, Daniel Obenshain, John L. Schultz, Jonathan Robert Stanton, Thomas Tantillo, Yair Amir. 1771-1779 [doi]
- Ensuring Network Neutrality for Future Distributed SystemsThiago Garrett, Schahram Dustdar, Luis C. E. Bona, Elias Procópio Duarte Jr.. 1780-1786 [doi]
- Uncovering the Useful Structures of Complex Networks in Socially-Rich and Dynamic EnvironmentsJie Wu. 1787-1795 [doi]
- Future Networking Challenges: The Case of Mobile Augmented RealityTristan Braud, Farshid Hassani Bijarbooneh, Dimitris Chatzopoulos, Pan Hui. 1796-1807 [doi]
- Software Defined CyberinfrastructureIan T. Foster, Ben Blaiszik, Kyle Chard, Ryan Chard. 1808-1814 [doi]
- Computing in the Continuum: Combining Pervasive Devices and Services to Support Data-Driven ApplicationsMoustafa AbdelBaky, Mengsong Zou, Ali Reza Zamani, Eduard Renart, Javier Diaz Montes, Manish Parashar. 1815-1824 [doi]
- Decision-Driven Execution: A Distributed Resource Management Paradigm for the Age of IoTTarek F. Abdelzaher, Md. Tanvir Al Amin, Amotz Bar-Noy, William Dron, Ramesh Govindan, Reginald Hobbs, Shaohan Hu, Jung-Eun Kim, Jongdeog Lee, Kelvin Marcus, Shuochao Yao, Yiran Zhao. 1825-1835 [doi]
- ACTiCLOUD: Enabling the Next Generation of Cloud ApplicationsGeorgios I. Goumas, Konstantinos Nikas, Ewnetu Bayuh Lakew, Christos Kotselidis, Andrew Attwood, Erik Elmroth, Michail Flouris, Nikos Foutris, John Goodacre, Davide Grohmann, Vasileios Karakostas, Panagiotis Koutsourakis, Martin L. Kersten, Mikel Luján, Einar Rustad, John Thomson, Luis Tomás, Atle Vesterkjaer, Jim Webber, Ying Zhang, Nectarios Koziris. 1836-1845 [doi]
- JointCloud: A Cross-Cloud Cooperation Architecture for Integrated Internet Service CustomizationHuaimin Wang, Peichang Shi, Yiming Zhang. 1846-1855 [doi]
- Supporting Data Analytics Applications Which Utilize Cognitive ServicesArun Iyengar. 1856-1864 [doi]
- Trillion Operations Key-Value Storage Engine: Revisiting the Mission Critical Analytics Storage Software StackSangeetha Seshadri, Paul Muench, Lawrence Chiu. 1865-1872 [doi]
- How Computer Science Risks to Lose Its Innocence, and Should Attempt to Take ResponsibilityKarl Aberer. 1873-1875 [doi]
- A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research DirectionsElisa Bertino, Seraphin B. Calo, Maroun Toma, Dinesh C. Verma, Christopher Williams, Brian Rivera. 1876-1886 [doi]
- Machine to Machine Trust in Smart CitiesMargaret L. Loper, Brian Paul Swenson. 1887-1889 [doi]
- Lateral Thinking for Trustworthy AppsHermann Härtig, Michael Roitzsch, Carsten Weinhold, Adam Lackorzynski. 1890-1899 [doi]
- Rumor Initiator Detection in Infected Signed NetworksJiawei Zhang, Charu C. Aggarwal, Philip S. Yu. 1900-1909 [doi]
- Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted TechnologiesZhongjie Ba, Kui Ren. 1910-1914 [doi]
- Enabling Wide Area Data Analytics with Collaborative Distributed Processing Pipelines (CDPPs)Anja Feldmann, Manfred Hauswirth, Volker Markl. 1915-1918 [doi]
- The Millibottleneck Theory of Performance Bugs, and Its Experimental VerificationCalton Pu, Joshua Kimball, Chien-An Lai, Tao Zhu, Jack Li, Junhee Park, Qingyang Wang, Deepal Jayasinghe, PengCheng Xiong, Simon Malkowski, Qinyi Wu, Gueyoung Jung, Younggyun Koh, Galen S. Swint. 1919-1926 [doi]
- Exacution: Enhancing Scientific Data Management for ExascaleScott Klasky, Eric Suchyta, Mark Ainsworth, Qing Liu, Ben Whitney, Matthew Wolf, Jong Youl Choi, Ian T. Foster, Mark Kim, Jeremy Logan, Kshitij Mehta, Todd Munson, George Ostrouchov, Manish Parashar, Norbert Podhorszki, David Pugmire, Lipeng Wan. 1927-1937 [doi]
- Hardware Acceleration Landscape for Distributed Real-Time Analytics: Virtues and LimitationsMohammadreza Najafi, Kaiwen Zhang 0001, Mohammad Sadoghi, Hans-Arno Jacobsen. 1938-1948 [doi]
- Coordinating Distributed Speaking ObjectsMarco Lippi, Marco Mamei, Stefano Mariani 0001, Franco Zambonelli. 1949-1960 [doi]
- Model-Driven Domain-Specific MiddlewareFábio M. Costa, Karl A. Morris, Fabio Kon, Peter J. Clarke. 1961-1971 [doi]
- On the Design of a Blockchain Platform for Clinical Trial and Precision MedicineZonyin Shae, Jeffrey J. P. Tsai. 1972-1980 [doi]
- Towards Dataflow-Based Graph AcceleratorHai Jin, Pengcheng Yao, Xiaofei Liao, Long Zheng, Xianliang Li. 1981-1992 [doi]
- Towards a RISC Framework for Efficient Contextualisation in the IoTDimitrios Georgakopoulos, Ali Yavari, Prem Prakash Jayaraman, Rajiv Ranjan. 1993-1996 [doi]
- The Future of the Semantic Web: Prototypes on a Global Distributed FilesystemMichael Cochez, Dominik Huser, Stefan Decker. 1997-2006 [doi]
- On Broad Big DataSteffen Staab. 2007-2010 [doi]
- SRLB: The Power of Choices in Load Balancing with Segment RoutingYoann Desmouceaux, Pierre Pfister, Jerome Tollet, Mark Townsley, Thomas Clausen. 2011-2016 [doi]
- Improving Efficiency of Link Clustering on Multi-core MachinesGuanhua Yan. 2017-2024 [doi]
- S3: Joint Scheduling and Source Selection for Background Traffic in Erasure-Coded StorageShijing Li, Tian Lan, Moo-Ryong Ra, Rajesh Krishna Panta. 2025-2030 [doi]
- On the Feasibility of Inter-Domain Routing via a Small Broker SetDong Lin, David Shui Wing Hui, Weijie Wu, Tingwei Liu, Yating Yang, Yi Wang, John C. S. Lui, Gong Zhang, Yingtao Li. 2031-2038 [doi]
- Subscription Covering for Relevance-Based Filtering in Content-Based Publish/Subscribe SystemsKaiwen Zhang 0001, Vinod Muthusamy, Mohammad Sadoghi, Hans-Arno Jacobsen. 2039-2044 [doi]
- Workflow Optimization in PAWMaxim Filatov, Verena Kantere, Iluju Kiringa. 2045-2052 [doi]
- A First Look at Information Entropy-Based Data PricingXijun Li, Jianguo Yao, Xue Liu, Haibing Guan. 2053-2060 [doi]
- Retrospective Lightweight Distributed Snapshots Using Loosely Synchronized ClocksAleksey Charapko, Ailidani Ailijiang, Murat Demirbas, Sandeep S. Kulkarni. 2061-2066 [doi]
- Power-Aware Population ProtocolsChuan Xu, Janna Burman, Joffroy Beauquier. 2067-2074 [doi]
- MultiPub: Latency and Cost-Aware Global-Scale Cloud Publish/SubscribeJulien Gascon-Samson, Jörg Kienzle, Bettina Kemme. 2075-2082 [doi]
- Reachability in Binary Multithreaded Programs Is PolynomialAlexander Malkis, Steffen Borgwardt. 2083-2088 [doi]
- An Event-Level Abstraction for Achieving Efficiency and Fairness in Network UpdateTing Qu, Deke Guo, Xiaomin Zhu, Jie Wu, Xiaolei Zhou, Zhong Liu. 2089-2096 [doi]
- DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in CloudHui Chen, Qingyang Wang, Balaji Palanisamy, PengCheng Xiong. 2097-2104 [doi]
- More Peak, Less Differentiation: Towards A Pricing-aware Online Control Framework for Inter-Datacenter TransfersWenxin Li, Xiaobo Zhou, Keqiu Li, Heng Qi, Deke Guo. 2105-2110 [doi]
- Robust Multi-tenant Server Consolidation in the Cloud for Data Analytics WorkloadsJoseph Mate, Khuzaima Daudjee, Shahin Kamali. 2111-2118 [doi]
- Flow-Aware Adaptive Pacing to Mitigate TCP Incast in Data Center NetworksShaojun Zou, Jiawei Huang, Yutao Zhou, Jianxin Wang, Tian He. 2119-2124 [doi]
- Real-Time Power Cycling in Video on Demand Data Centres Using Online Bayesian PredictionVicent Sanz Marco, Zheng Wang, Barry Porter. 2125-2130 [doi]
- A Distributed Access Control System for Cloud FederationsShorouq Alansari, Federica Paci, Vladimiro Sassone. 2131-2136 [doi]
- Voyager: Complete Container State MigrationShripad Nadgowda, Sahil Suneja, Nilton Bila, Canturk Isci. 2137-2142 [doi]
- Keddah: Capturing Hadoop Network BehaviourJie Deng, Gareth Tyson, Félix Cuadrado, Steve Uhlig. 2143-2150 [doi]
- A Scalable and Distributed Approach for NFV Service Chain Cost MinimizationZijun Zhang, Zongpeng Li, Chuan Wu, Chuanhe Huang. 2151-2156 [doi]
- Elastic Paxos: A Dynamic Atomic Multicast ProtocolSamuel Benz, Fernando Pedone. 2157-2164 [doi]
- Boosting The Benefits of Hybrid SDNWen Wang, Wenbo He, Jinshu Su. 2165-2170 [doi]
- Adopting SDN Switch Buffer: Benefits Analysis and Mechanism DesignFuliang Li, Jiannong Cao, Xingwei Wang, Yinchu Sun, Tian Pan, Xuefeng Liu. 2171-2176 [doi]
- IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoTMarkus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma. 2177-2184 [doi]
- Efficient Z-Order Encoding Based Multi-Modal Data Compression in WSNsXiaofei Cao, Sanjay Kumar Madria, Takahiro Hara. 2185-2192 [doi]
- PTrack: Enhancing the Applicability of Pedestrian Tracking with WearablesYonghang Jiang, Zhenjiang Li, Jianping Wang. 2193-2199 [doi]
- Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor NetworksJack Kirton, Matthew Bradbury, Arshad Jhumka. 2200-2205 [doi]
- Velocity Optimization of Pure Electric Vehicles with Traffic Dynamics ConsiderationLiuwang Kang, Haiying Shen, Ankur Sarker. 2206-2211 [doi]
- PIANO: Proximity-Based User Authentication on Voice-Powered Internet-of-Things DevicesNeil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn Song, Hongxia Jin, Xuan Bao. 2212-2219 [doi]
- Category Information Collection in RFID SystemsJia Liu, Shigang Chen, Bin Xiao, Yanyan Wang, Lijun Chen. 2220-2225 [doi]
- Scalable Role-Based Data Disclosure Control for the Internet of ThingsAli Yavari, Arezou Soltani Panah, Dimitrios Georgakopoulos, Prem Prakash Jayaraman, Ron G. van Schyndel. 2226-2233 [doi]
- Multi-representation Based Data Processing Architecture for IoT ApplicationsVaibhav Arora, Faisal Nawab, Divyakant Agrawal, Amr El Abbadi. 2234-2239 [doi]
- Long Term Sensing via Battery Health AdaptationGreg Jackson, Zhijin Qin, Julie A. McCann. 2240-2245 [doi]
- Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning TechniquesJingxuan Wang, Wenting Tu, Lucas C. K. Hui, S. M. Yiu, Eric Ke Wang. 2246-2251 [doi]
- Speed-Based Location Tracking in Usage-Based Automotive InsuranceLu Zhou, Qingrong Chen, Zutian Luo, Haojin Zhu, Cailian Chen. 2252-2257 [doi]
- On Efficient Offloading Control in Cloud Radio Access Network with Mobile Edge ComputingTong Li, Chathura M. Sarathchandra Magurawalage, Kezhi Wang, Ke Xu, Kun Yang, Haiyang Wang. 2258-2263 [doi]
- Location Privacy in Mobile Edge CloudsTing He, Ertugrul N. Ciftcioglu, Shiqiang Wang, Kevin S. Chan. 2264-2269 [doi]
- Approximation Designs for Cooperative Relay Deployment in Wireless NetworksHaotian Wang, Shilei Tian, Xiaofeng Gao, Lidong Wu, Guihai Chen. 2270-2275 [doi]
- Dispersing Social Content in Mobile Crowd through Opportunistic ContactsLei Zhang, Feng Wang, Jiangchuan Liu. 2276-2281 [doi]
- A Lightweight Recommendation Framework for Mobile User's Link Selection in Dense NetworkJi Wang, Xiaomin Zhu, Weidong Bao, Guanlin Wu. 2282-2287 [doi]
- Making Smartphone Smart on Demand for Longer Battery LifeMarco Brocanelli, Xiaorui Wang. 2288-2293 [doi]
- FADEWICH: Fast Deauthentication Over the Wireless ChannelMauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik. 2294-2301 [doi]
- Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control For Near-Field Wireless ChargingSang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu. 2302-2307 [doi]
- Density and Mobility-Driven Evaluation of Broadcast Algorithms for MANETsRaziel Carvajal Gómez, Inti Y. Gonzalez-Herrera, Yérom-David Bromberg, Laurent Réveillère, Etienne Riviere. 2308-2313 [doi]
- Energy-Aware CPU Frequency Scaling for Mobile Video StreamingWenjie Hu, Guohong Cao. 2314-2321 [doi]
- Crazy Crowd Sourcing to Mitigate Resource ScarcityNova Ahmed, Mahfuzur Rahman Siddiquee, Refaya Karim, Mohsina Zaman, Sayed Mahmudul Alam, Syed Fahim Ashram. 2322-2326 [doi]
- Detecting Rogue AP with the Crowd WisdomTongqing Zhou, Zhiping Cai, Bin Xiao, Yueyue Chen, Ming Xu. 2327-2332 [doi]
- Towards Multilingual Automated Classification SystemsAibek Musaev, Calton Pu. 2333-2337 [doi]
- The Joint Effects of Tweet Content Similarity and Tweet Interactions for Topic DerivationRobertus Nugroho, Weiliang Zhao, Jian Yang, Cécile Paris, Surya Nepal. 2338-2343 [doi]
- Timed-Release of Self-Emerging Data Using Distributed Hash TablesChao Li, Balaji Palanisamy. 2344-2351 [doi]
- Caching for Pattern Matching Queries in Time Evolving Graphs: Challenges and ApproachesMuhammad Usman Nisar, Sahar Voghoei, Lakshmish Ramaswamy. 2352-2357 [doi]
- GraphA: Adaptive Partitioning for Natural GraphsDongsheng Li, Chengfei Zhang, Jinyan Wang, Zhaoning Zhang, Yiming Zhang. 2358-2365 [doi]
- Parallel Algorithm for Core Maintenance in Dynamic GraphsNa Wang, Dongxiao Yu, Hai Jin, Chen Qian, Xia Xie, Qiang-Sheng Hua. 2366-2371 [doi]
- DHCRF: A Distributed Conditional Random Field Algorithm on a Heterogeneous CPU-GPU Cluster for Big DataWei Ai, Kenli Li, Cen Chen, Jiwu Peng, Keqin Li. 2372-2379 [doi]
- Towards New Abstractions for Implementing Quorum-Based SystemsTormod Erevik Lea, Leander Jehl, Hein Meling. 2380-2385 [doi]
- Selective Traffic Offloading on the Fly: A Machine Learning ApproachZaiyang Tang, Peng Li, Song Guo, Xiaofei Liao, Hai Jin, Daqing Zhang. 2386-2392 [doi]
- A Fast Heuristic Attribute Reduction Algorithm Using SparkMincheng Chen, Jingling Yuan, Lin Li, Dongling Liu, Tao Li. 2393-2398 [doi]
- Profiling Users by Modeling Web TransactionsRadek Tomsu, Samuel Marchal, N. Asokan. 2399-2404 [doi]
- JeCache: Just-Enough Data Caching with Just-in-Time Prefetching for Big Data ApplicationsYifeng Luo, Jia Shi, Shuigeng Zhou. 2405-2410 [doi]
- Proximity Awareness Approach to Enhance Propagation Delay on the Bitcoin Peer-to-Peer NetworkMuntadher Fadhil Sallal, Gareth Owenson, Mo Adda. 2411-2416 [doi]
- Catch Me If You Can: Detecting Compromised Users Through Partial Observation on NetworksDerek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal. 2417-2422 [doi]
- Location Privacy Breach: Apps Are Watching You in BackgroundDachuan Liu, Xing Gao, Haining Wang. 2423-2429 [doi]
- Android Malware Detection Using Complex-FlowsFeng Shen, Justin Del Vecchio, Aziz Mohaisen, Steven Y. Ko, Lukasz Ziarek. 2430-2437 [doi]
- Privacy Implications of DNSSEC Look-Aside ValidationAziz Mohaisen, Zhongshu Gu, Kui Ren. 2438-2443 [doi]
- FlipNet: Modeling Covert and Persistent Attacks on Networked ResourcesSudip Saha, Anil Vullikanti, Mahantesh Halappanavar. 2444-2451 [doi]
- Understanding the Market-Level and Network-Level Behaviors of the Android Malware EcosystemChao Yang, Jialong Zhang, Guofei Gu. 2452-2457 [doi]
- EnGarde: Mutually-Trusted Inspection of SGX EnclavesHai Nguyen, Vinod Ganapathy. 2458-2465 [doi]
- Truthful Online Auction for Cloud Instance SublettingYifei Zhu, Silvery Fu, Jiangchuan Liu, Yong Cui. 2466-2471 [doi]
- On the Power of Weaker Pairwise Interaction: Fault-Tolerant Simulation of Population ProtocolsGiuseppe Antonio Di Luna, Paola Flocchini, Taisuke Izumi, Tomoko Izumi, Nicola Santoro, Giovanni Viglietta. 2472-2477 [doi]
- Distributed Fault Tolerant Linear System Solvers Based on Erasure CodingXuejiao Kang, David F. Gleich, Ahmed H. Sameh, Ananth Grama. 2478-2485 [doi]
- Preserving Incumbent Users' Privacy in Exclusion-Zone-Based Spectrum Access SystemsYanzhi Dou, He Li, Kexiong Curtis Zeng, Jinshan Liu, Yaling Yang, Bo Gao, Kui Ren. 2486-2493 [doi]
- LITMUS: Towards Multilingual Reporting of LandslidesAibek Musaev, Qixuan Hou, Yang Yang, Calton Pu. 2494-2496 [doi]
- Pythia: A System for Online Topic Discovery of Social Media PostsIouliana Litou, Vana Kalogeraki. 2497-2500 [doi]
- Data-Driven Serendipity Navigation in Urban PlacesXiaoyu Ge, Ameya Daphalapurkar, Manali Shimpi, Darpun Kohli, Konstantinos Pelechrinis, Panos K. Chrysanthis, Demetrios Zeinalipour-Yazti. 2501-2504 [doi]
- Toward an Integrated Approach to Localizing Failures in Community Water Networks (DEMO)Qing Han, Phu Nguyen, Ronald T. Eguchi, Kuo-Lin Hsu, Nalini Venkatasubramanian. 2505-2506 [doi]
- PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted GraphsSagar Sharma, Keke Chen. 2507-2510 [doi]
- IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoTMarkus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma. 2511-2514 [doi]
- Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11nRhongHo Jang, Jeonil Kang, Aziz Mohaisen, DaeHun Nyang. 2515-2520 [doi]
- ReverseCloak: A Reversible Multi-level Location Privacy Protection SystemChao Li, Balaji Palanisamy, Aravind Kalaivanan, Sriram Raghunathan. 2521-2524 [doi]
- Hopsworks: Improving User Experience and Development on Hadoop with Scalable, Strongly Consistent MetadataMahmoud Ismail, Ermias Gebremeskel, Theofilos Kakantousis, Gautier Berthou, Jim Dowling. 2525-2528 [doi]
- Isolation in Docker through Layer EncryptionIoannis Giannakopoulos, Konstantinos Papazafeiropoulos, Katerina Doka, Nectarios Koziris. 2529-2532 [doi]
- Dela - Sharing Large Datasets between Hadoop ClustersAlexandru A. Ormenisan, Jim Downling. 2533-2536 [doi]
- In Vivo Evaluation of the Secure Opportunistic Schemes Middleware Using a Delay Tolerant Social NetworkCorey E. Baker, Allen Starke, Tanisha G. Hill-Jarrett, Janise McNair. 2537-2542 [doi]
- Scaling and Load Testing Location-Based Publish and SubscribeBertil Chapuis, Benoît Garbinato. 2543-2546 [doi]
- A Distributed Event-Centric Collaborative Workflows Development System for IoT ApplicationYong-Yang Cheng, Shuai Zhao, Bo Cheng, Shou-lu Hou, Xiulei Zhang, Junliang Chen. 2547-2550 [doi]
- Incentive Mechanism for Data-Centric Message Delivery in Delay Tolerant NetworksHimanshu Jethawa, Sanjay Madria. 2551-2554 [doi]
- Performance of Cognitive Wireless Charger for Near-Field Wireless ChargingSang-Yoon Chang, Sristi Lakshmi Sravana Kumar, Yih-Chun Hu. 2555-2556 [doi]
- Toward Vehicle Sensing: An Integrated Application with Sparse Video Vameras and Intelligent TaxicabsYang Wang, Wuji Chen, Wei Zheng He Huang, Wen Zhang, Hengchang Liu. 2557-2558 [doi]
- Segmentation of Time Series Based on Kinetic Characteristics for Storage Consumption PredictionBeibei Miao, Yu Chen, Xuebo Jin, Bo Wang, Xianping Qu, Shimin Tao, Dong Wang, Zhi Zang. 2559-2560 [doi]
- A Multi-stage Hierarchical Window Model with Application to Real-Time Graph AnalysisSachini Jayasekara, Shanika Karunasekera, Aaron Harwood. 2561-2564 [doi]
- Dynamic Pricing at Electric Vehicle Charging Stations for Queueing Delay ReductionPeng Xu, Jinyang Li, Xiaoshan Sun, Wei Zheng, Hengchang Liu. 2565-2566 [doi]
- Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget ConstraintsChangjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang. 2567-2568 [doi]
- Buffer-Based Reinforcement Learning for Adaptive StreamingYue Zhang, Yao Liu. 2569-2570 [doi]
- The Case for Using Content-Centric Networking for Distributing High-Energy Physics SoftwareMohammad Alhowaidi, Byrav Ramamurthy, Brian Bockelman, David Swanson. 2571-2572 [doi]
- LAVEA: Latency-Aware Video Analytics on Edge Computing PlatformShanhe Yi, Zijiang Hao, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li. 2573-2574 [doi]
- Complete Tolerance Relation Based Filling Algorithm Using SparkJingling Yuan, Yao Xiang, Xian Zhong, Mincheng Chen, Tao Li. 2575-2576 [doi]
- Towards Secure Public Directory for Privacy-Preserving Data SharingAmin Fallahi, Xi Liu, Yuzhe Tang, Shuang Wang, Rui Zhang. 2577-2578 [doi]
- Anonymous Routing to Maximize Delivery Rates in DTNsKazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu. 2579-2580 [doi]
- Evaluating Connection Resilience for the Overlay Network KademliaHenner Heck, Olga Kieselmann, Arno Wacker. 2581-2584 [doi]
- Shortfall-Based Optimal Security Provisioning for Internet of ThingsAntonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo. 2585-2586 [doi]
- Group Differential Privacy-Preserving Disclosure of Multi-level Association GraphsBalaji Palanisamy, Chao Li, Prashant Krishnamurthy. 2587-2588 [doi]
- Tracking Information Flow in Cyber-Physical SystemsStefan Gries, Marc Hesenius, Volker Gruhn. 2589-2590 [doi]
- Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted ServersQiuxiang Dong, Dijiang Huang. 2591-2592 [doi]
- You've Been Tricked! A User Study of the Effectiveness of Typosquatting TechniquesJeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen. 2593-2596 [doi]
- Real-Time Detection of Illegal File Transfers in the CloudAdam Bowers, Dan Lin, Anna Cinzia Squicciarini, Ali R. Hurson. 2597-2600 [doi]
- Eyes of the Swarm: Streamers' Detection in BTDaniel Vasconcelos Correa da Silva, Antonio Augusto de Aragão Rocha. 2601-2603 [doi]
- Load Prediction for Energy-Aware Scheduling for Cloud Computing PlatformsAlexandre Dambreville, Joanna Tomasik, Johanne Cohen, Fabien Dufoulon. 2604-2607 [doi]
- Learn-as-You-Go with Megh: Efficient Live Migration of Virtual MachinesDebabrota Basu, Xiayang Wang, Yang Hong, Haibo Chen, Stéphane Bressan. 2608-2609 [doi]
- Machine-Learning Based Performance Estimation for Distributed Parallel Applications in Virtualized Heterogeneous ClustersSeontae Kim, Nguyen Pham, Woongki Baek, Young-ri Choi. 2610-2611 [doi]
- Incremental Elasticity for NoSQL Data StoresAntonis Papaioannou, Kostas Magoutis. 2612-2613 [doi]
- A Framework for Efficient Energy Scheduling of Spark WorkloadsStathis Maroulis, Nikos Zacheilas, Vana Kalogeraki. 2614-2615 [doi]
- Towards a Complete Virtual Data Center Embedding Algorithm Using Hybrid StrategyM. P. Gilesh, S. D. Madhu Kumar, Lillykutty Jacob, Umesh Bellur. 2616-2617 [doi]
- Federating Consistency for Partition-Prone NetworksBenjamin Bengfort, Pete Keleher. 2618-2619 [doi]
- Mitigating Nesting-Agnostic Hypervisor Policies in Derivative CloudsChandra Prakash, Prashanth, Purushottam Kulkarni, Umesh Bellur. 2620-2621 [doi]
- A Novel Architecture for Efficient Fog to Cloud Data Management in Smart CitiesAmir Sinaeepourfard, Jordi Garcia, Xavier Masip-Bruin, Eva Marín-Tordera. 2622-2623 [doi]
- Networklet: Concept and DeploymentSheng Zhang, Yu Liang, Zhuzhong Qian, Mingjun Xiao, Jie Wu, Fanyu Kong, Sanglu Lu. 2624-2625 [doi]
- Optimistic Causal Consistency for Geo-Replicated Key-Value StoresKristina Spirovska, Diego Didona, Willy Zwaenepoel. 2626-2629 [doi]
- Automated Performance Evaluation for Multi-tier Cloud Service Systems Subject to Mixed WorkloadsXudong Zhao, Jiwei Huang, Lei Liu, Shijun Liu, Calton Pu, LiZhen Cui. 2630-2631 [doi]
- Decentralised Runtime Monitoring for Access Control Systems in Cloud FederationsMd. Sadek Ferdous, Andrea Margheri, Federica Paci, Mu Yang, Vladimiro Sassone. 2632-2633 [doi]
- DuoFS: An Attempt at Energy-Saving and Retaining Reliability of Storage SystemsBing Jiao, Xiaomin Zhu, Xiaojun Ruan, Xiao Qin, Shu Yin. 2634-2635 [doi]
- A Proposal of an Efficient Traffic Matrix Estimation Under Packet DropsKohei Watabe, Toru Mano, Kimihiro Mizutani, Osamu Akashi, Kenji Nakagawa, Takeru Inoue. 2636-2637 [doi]
- Straggler Mitigation for Distributed Behavioral SimulationEman Bin Khunayn, Shanika Karunasekera, Hairuo Xie, Kotagiri Ramamohanarao. 2638-2641 [doi]
- Supporting Resource Control for Actor Systems in AkkaAhmed Abdel Moamen, Dezhong Wang, Nadeem Jamali. 2642-2645 [doi]
- A Distributed Operating System Network Stack and Device Driver for MulticoresSaif Ansary, Antonio Barbalace, Ho-Ren Chuang, Thomas Lazor, Binoy Ravindran. 2646-2649 [doi]
- Cache Potentiality of MONs: A PrimePeiyan Yuan, Honghai Wu, Xiaoyan Zhao, Zhengnan Dong. 2650-2653 [doi]
- Oak: User-Targeted Web PerformanceMarcel Flores, Alexander Wenzel, Aleksandar Kuzmanovic. 2654-2655 [doi]
- A Self-Organizing Distributed and In-Band SDN Control PlaneMarco Canini, Iosif Salem, Liron Schiff, Elad Michael Schiller, Stefan Schmid. 2656-2657 [doi]
- Serverless Programming (Function as a Service)Paul C. Castro, Vatche Ishakian, Vinod Muthusamy, Aleksander Slominski. 2658-2659 [doi]
- Sensor Cloud: A Cloud of Sensor NetworksSanjay Kumar Madria. 2660-2661 [doi]