Abstract is missing.
- CatCharge: Deploying wireless charging lane in metropolitan scale through categorization and clustering of vehicle mobilityLi Yan, Juanjuan Zhao, Haiying Shen, Cheng-Zhong Xu, Feng Luo. 1-2 [doi]
- Measurement-based performance profiles and dynamics of UDT over dedicated connectionsQiang Liu, Nageswara S. V. Rao, Chase Q. Wu, Daqing Yun, Rajkumar Kettimuthu, Ian T. Foster. 1-10 [doi]
- Harmony: Exploiting coarse-grained received signal strength from IoT devices for human activity recognitionZicheng Chi, Yao Yao, Tiantian Xie, Zhichuan Huang, Michael Hammond, Ting Zhu. 1-10 [doi]
- Role-based campus network slicingChien-Hsin Chen, Chien Chen, Ssu-Hsuan Lu, Chien-Chao Tseng. 1-6 [doi]
- Reconciling task assignment and scheduling in mobile edge cloudsLin Wang, Lei Jiao, Dzmitry Kliazovich, Pascal Bouvry. 1-6 [doi]
- LocP: An efficient Localized Polling Protocol for large-scale RFID systemsBinbin Li, Yuan He, Wenyuan Liu, Lin Wang, Hongyan Wang. 1-10 [doi]
- Enhanced telemetry for encrypted threat analyticsDavid A. McGrew, Blake Anderson. 1-6 [doi]
- Traffic-aware virtual machine migration in topology-adaptive DCNShihan Xiao, Yong Cui, Xin Wang, Zhenjie Yang, Shenghui Yan, Liu Yang. 1-10 [doi]
- Real-time update with joint optimization of route selection and update scheduling for SDNsHongli Xu, Zhuolong Yu, Xiang-Yang Li, Chen Qian, Liusheng Huang, Taeho Jung. 1-10 [doi]
- Optimal link-disjoint node-"somewhat disjoint" pathsJose Yallouz, Ori Rottenstreich, Péter Babarczi, Avi Mendelson, Ariel Orda. 1-10 [doi]
- Machine Learning in Software Defined Networks: Data collection and traffic classificationPedro Amaral, João Dinis, Paulo Pinto, Luis Bernardo, Joao Tavares, Henrique S. Mamede. 1-5 [doi]
- Bringing execution assurances of pattern matching in outsourced middleboxesXingliang Yuan, Huayi Duan, Cong Wang. 1-10 [doi]
- Poster abstract: Long-term observation with passive Wi-Fi scanningXiang-Fa Guo, Hande Hong, Mun Choon Chan, Li-Shiuan Peh. 1-2 [doi]
- GUIDE: Graphical user interface fingerprints physical devicesQiang Li, Xuan Feng, Zhi Li 0018, Haining Wang, Limin Sun. 1-2 [doi]
- A sorted partitioning approach to high-speed and fast-update OpenFlow classificationSorrachai Yingchareonthawornchai, James Daly, Alex X. Liu, Eric Torng. 1-10 [doi]
- ASCEND: A search engine for online industrial control devicesXuan Feng, Qiang Li, Haining Wang, Limin Sun. 1-2 [doi]
- Profit maximization for viral marketing in Online Social NetworksJing Tang, Xueyan Tang, Junsong Yuan. 1-10 [doi]
- Optimizing Internet transit routing for content delivery networksFaraz Ahmed, M. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu. 1-10 [doi]
- Exploring mobile users and their effects in online social networks: A Twitter case studyKonglin Zhu, Wenting Zhi, Lin Zhang. 1-6 [doi]
- Optimization-based network flow deadline schedulingAndrey Gushchin, Shih-Hao Tseng, Ao Tang. 1-10 [doi]
- Name-based geographical routing/forwarding support for location-based IoT servicesKai Ryu, Yuki Koizumi, Toru Hasegawa. 1-6 [doi]
- Estimating the rumor source with anti-rumor in social networksJaeyoung Choi, Sangwoo Moon, Jinwoo Shin, Yung Yi. 1-6 [doi]
- msocket: System support for mobile, multipath, and middlebox-agnostic applicationsAditya Yadav, Arun Venkataramani. 1-10 [doi]
- Considerations for re-designing the cellular infrastructure exploiting software-based networksAli Mohammadkhan, K. K. Ramakrishnan, Ashok Sunder Rajan, Christian Maciocco. 1-6 [doi]
- SDIG: Toward Software-Defined IPsec GatewayWei Li, Fengxu Lin, Guanchao Sun. 1-8 [doi]
- Redactor: Reconcile network control with declarative control programs In SDNWen Wang, Wenbo He, Jinshu Su. 1-10 [doi]
- PPCU: Proportional per-packet consistent updates for Software Defined NetworksRadhika Sukapuram, Gautam Barua. 1-2 [doi]
- FIB efficiency in distributed platformsKirill Kogan, Sergey I. Nikolenko, Patrick Th. Eugster, Alexander Shalimov, Ori Rottenstreich. 1-10 [doi]
- A communication model for stateless networked tagsJia Liu, Youlin Zhang, Min Chen, Shigang Chen, Lijun Chen. 1-2 [doi]
- We've got you covered: Failure recovery with backup tunnels in traffic engineeringJiaqi Zheng, Hong Xu, Xiaojun Zhu 0001, Guihai Chen, Yanhui Geng. 1-10 [doi]
- NeSMA: Enabling network-level state-aware applications in SDNChen Sun, Jun Bi, Hongxin Hu, Zhilong Zheng. 1-7 [doi]
- Chase: Taming concurrent broadcast for flooding in asynchronous duty cycle networksZhichao Cao, Jiliang Wang, Daibo Liu, Xiaolong Zheng. 1-10 [doi]
- Fit the elephant in a box - towards IP lookup at on-chip memory access speedTong Yang, Alex X. Liu, Qiaobin Fu, Dongsheng Yang, Steve Uhlig, Xiaoming Li. 1-2 [doi]
- Let's work together: Fast tag identification by interference elimination for multiple RFID readersXuan Liu, Bin Xiao, Feng Zhu, Shigeng Zhang. 1-10 [doi]
- FairCache: Introducing fairness to ICN cachingLiang Wang, Gareth Tyson, Jussi Kangasharju, Jon Crowcroft. 1-10 [doi]
- Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacentersChen Tian, Junhua Yan, Alex X. Liu, Yizhou Tang, Yuankun Zhong, Zi Li. 1-2 [doi]
- Boosting powerline communications for ubiquitous connectivity in enterprisesKamran Ali, Ioannis Pefkianakis, Alex X. Liu, Kyu-Han Kim. 1-2 [doi]
- SliM: Enabling efficient, seamless NFV state migrationLeonhard Nobach, Ivica Rimac, Volker Hilt, David Hausheer. 1-2 [doi]
- Characterizing industrial control system devices on the InternetXuan Feng, Qiang Li, Haining Wang, Limin Sun. 1-10 [doi]
- Online flow size prediction for improved network routingPascal Poupart, Zhitang Chen, Priyank Jaini, Fred Fung, Hengky Susanto, Yanhui Geng, Li Chen, Kai Chen 0005, Hao Jin. 1-6 [doi]
- Friends or foes: Revisiting strategy-proofness in cloud network sharingWei Wang, A.-Long Jin. 1-10 [doi]
- Gavel: Towards a graph database Defined NetworkOsamah L. Barakat, David Koll, Xiaoming Fu 0001. 1-2 [doi]
- Predicting future traffic using Hidden Markov ModelsZhitang Chen, Jiayao Wen, Yanhui Geng. 1-6 [doi]
- Communication based on per-packet One-Time AddressesTaeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig. 1-10 [doi]
- ORSAP: Abstracting routing state on demandKai Gao, Chen Gu, Qiao Xiang, Xin Wang, Yang Richard Yang, Jun Bi. 1-2 [doi]
- CTCV: A protocol for Coordinated Transport of Correlated Video in Smart Camera NetworksVinay Kolar, Israat Tanzeena Haque, Vikram P. Munishwar, Nael B. Abu-Ghazaleh. 1-10 [doi]
- Decentralized search in expert networks: Generic models and performance boundsLiang Ma, Mudhakar Srivatsa, Derya Cansever, Xifeng Yan, Sue Kase, Michelle Vanni. 1-10 [doi]
- Stream: Decentralized opportunistic inter-coflow scheduling for datacenter networksHengky Susanto, Hao Jin, Kai Chen 0005. 1-10 [doi]
- Efficient anonymous category-level joint Tag estimationMin Chen, Jia Liu, Shigang Chen, Qingjun Xiao. 1-10 [doi]
- How sustainable is social based mobile crowdsensing? An experimental studyCarlos Bermejo, Dimitris Chatzopoulos, Pan Hui. 1-6 [doi]
- Trading routing diversity for better network performanceXiaoyu Zhang, Wei Dong, Wei Ren. 1-10 [doi]
- RMIP: Resource management with interference precancellation in heterogeneous cellular networksChin-Jung Liu, Li Xiao. 1-10 [doi]
- Limitations of IEC62351-3's public key managementJames G. Wright, Stephen D. Wolthusen. 1-6 [doi]
- Models of TCP in high-BDP environments and their experimental validationGayane Vardoyan, Nageswara S. V. Rao, Don Towsley. 1-10 [doi]
- Anomaly detection in diurnal CPS monitoring data using a local density approachPratik Narang, Biplab Sikdar. 1-5 [doi]
- OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxesChen Tian, Alex X. Liu, Ali Munir, Jie Yang. 1-2 [doi]
- NSFA: Nested Scale-Free Architecture for scalable publish/subscribe over P2P networksHuanyang Zheng, Jie Wu 0001. 1-10 [doi]
- Fast shortest-path queries on large-scale graphsQiongwen Xu, Xu Zhang, Jin Zhao, Xin Wang, Tilman Wolf. 1-10 [doi]
- Maximizing container-based network isolation in parallel computing clustersShiyao Ma, Jingjie Jiang, Bo Li 0001, Baochun Li. 1-10 [doi]
- Towards verifiable outsourced middleboxesXingliang Yuan, Huayi Duan, Cong Wang. 1-2 [doi]
- Luopan: Sampling based load balancing in data center networksPeng Wang, George Trimponias, Hong Xu, Hongyuan Liu, Yanhui Geng. 1-2 [doi]
- Viewing 360 degree videos: Motion prediction and bandwidth optimizationYanan Bao, Huasen Wu, Albara Ah Ramli, Bradley Wang, Xin Liu. 1-2 [doi]
- Transparent flow migration for NFVYang Wang, Gaogang Xie, Zhenyu Li, Peng He, Kavé Salamatian. 1-10 [doi]
- R-Cloud: A cloud framework for enabling Radio-as-a-Service over a wireless substrateChenfei Gao, Gozde Ozcan, Jian Tang, Mustafa Cenk Gursoy, Weiyi Zhang. 1-10 [doi]
- Consistent replication protocol for Named Data NetworkingLijing Wang, Wentao Shang, Wenbo He, Dongsheng Wang. 1-2 [doi]
- Cache contention aware Virtual Machine placement and migration in cloud datacentersLiuhua Chen, Haiying Shen, Stephen Platt. 1-10 [doi]
- Omnidirectional chargability with directional antennasHaipeng Dai, Xiaoyu Wang, Alex X. Liu, Fengmin Zhang, Yang Zhao, Guihai Chen. 1-10 [doi]
- Distributed privacy-protecting DTN routing: Concealing the information indispensable in routingKang Chen, Haiying Shen. 1-2 [doi]
- Topological ordering based iterative TCAM rule compression using bi-partite graphsRui Li, Wenjie Li, Bruhadeshwar Bezawada, Zheng Qin. 1-2 [doi]
- MS-LSTM: A multi-scale LSTM model for BGP anomaly detectionMin Cheng, Qian Xu, Jianming Lv, Wenyin Liu, Qing Li, Jianping Wang. 1-6 [doi]
- Enabling router-assisted congestion control on the InternetMarcel Flores, Alexander Wenzel, Aleksandar Kuzmanovic. 1-10 [doi]
- Piggyback game: Efficient event stream dissemination in Online Social Network systemsFan Zhang, Hanhua Chen, Hai Jin. 1-10 [doi]
- Smoggy-Link: Fingerprinting interference for predictable wireless concurrencyMeng Jin, Yuan He, Xiaolong Zheng, Dingyi Fang, Dan Xu, Tianzhang Xing, XiaoJiang Chen. 1-10 [doi]
- Scheduling dynamic wireless networks with limited operationsHaoyang Lu, Wei Gao. 1-10 [doi]
- Rules in play: On the complexity of routing tables and firewallsH. B. Acharya, Satyam Kumar, Mohit Wadhwa, Ayush Shah. 1-10 [doi]
- On-demand video processing in wireless networksZongqing Lu, Kevin S. Chan, Rahul Urgaonkar, Thomas F. La Porta. 1-10 [doi]
- A template approach to group key establishment in dynamic ad-hoc groupsBruhadeshwar Bezawada, Xiaojiang Liang, Alex X. Liu, Rui Li. 1-2 [doi]
- DEME: Decouple packet marking from enqueuing for multiple services in data center networksChengxi Gao, Victor C. S. Lee. 1-2 [doi]
- Deadline-sensitive User Recruitment for mobile crowdsensing with probabilistic collaborationMingjun Xiao, Jie Wu 0001, He Huang, Liusheng Huang, Chang Hu. 1-10 [doi]
- Optimizing virtual backup allocation for middleboxesYossi Kanizo, Ori Rottenstreich, Itai Segall, Jose Yallouz. 1-10 [doi]
- Application of evolutionary mechanism to dynamic Virtual Network Function PlacementMari Otokura, Kenji Leibnitz, Yuki Koizumi, Daichi Kominami, Tetsuya Shimokawa, Masayuki Murata. 1-6 [doi]
- Towards rapid and cost-effective prototyping of IoT platformsGaoyang Guan, Wei Dong, Yi Gao, Jiajun Bu. 1-5 [doi]
- Compressing backoff in CSMA networksMahanth Gowda, Nirupam Roy, Romit Roy Choudhury, Srihari Nelakuditi. 1-10 [doi]
- An efficient framework for data-plane verification with geometric windowing queriesTakeru Inoue, Richard Chen, Toru Mano, Kimihiro Mizutani, Hisashi Nagata, Osamu Akashi. 1-10 [doi]
- Dynamic Service Function Chaining in SDN-enabled networks with middleboxesLinqi Guo, John Pang, Anwar Walid. 1-10 [doi]