Abstract is missing.
- Video acuity assessment in mobile devicesEilwoo Baik, Amit Pande, Chris Stover, Prasant Mohapatra. 1-9 [doi]
- Redundancy control through traffic deduplicationKien A. Hua, Ning Jiang, Jason Kuhns, Vaithiyanathan Sundaram, Cliff Zou. 10-18 [doi]
- Optimized layered integrated video encodingSangki Yun, Daehyeok Kim, Xiaofan Lu, Lili Qiu. 19-27 [doi]
- Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharingXiaoli Wang, Jiasi Chen, Aveek Dutta, Mung Chiang. 28-36 [doi]
- On the performance of successive interference cancellation in D2D-enabled cellular networksChuan Ma, Weijie Wu, Ying Cui, Xinbing Wang. 37-45 [doi]
- A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networksJiajia Liu, Shangwei Zhang, Hiroki Nishiyama, Nei Kato, Jun Guo. 46-54 [doi]
- Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networksWenchi Cheng, Xi Zhang, Hailin Zhang. 55-63 [doi]
- Energy-efficient transmission with data sharingWeiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo. 73-81 [doi]
- ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmissionPhilipp Kindt, Han Jing, Nadja Peters, Samarjit Chakraborty. 82-90 [doi]
- Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffsMichael J. Neely. 91-99 [doi]
- Power-throughput tradeoffs of 802.11n/ac in smartphonesSwetank Kumar Saha, Pratik Deshpande, Pranav P. Inamdar, Ramanujan K. Sheshadri, Dimitrios Koutsonikolas. 100-108 [doi]
- Towards 48-fold cabling complexity reduction in large flattened butterfly networksMárton Csernai, Florin Ciucu, Ralf-Peter Braun, András Gulyás. 109-117 [doi]
- Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switchesDanfeng Shan, Wanchun Jiang, Fengyuan Ren. 118-126 [doi]
- More load, more differentiation - A design principle for deadline-aware congestion controlHan Zhang, Xingang Shi, Xia Yin, Fengyuan Ren, Zhiliang Wang. 127-135 [doi]
- Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNsJun Duan, Zhiyang Guo, Yuanyuan Yang. 136-144 [doi]
- Efficient broadcast on fragmented spectrum in cognitive radio networksPei Huang, Chin-Jung Liu, Xi Yang, Li Xiao. 145-153 [doi]
- Improved rendezvous algorithms for heterogeneous cognitive radio networksZhaoquan Gu, Haosen Pu, Qiang-Sheng Hua, Francis C. M. Lau. 154-162 [doi]
- Optimal secondary user packet size in mobile cognitive radio networks under fading channelsYi Song. 163-171 [doi]
- SpecGuard: Spectrum misuse detection in dynamic spectrum access systemsXiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang, Chi Zhang. 172-180 [doi]
- Reliable multicast routing for software-defined networksShan-Hsiang Shen, Liang-Hao Huang, De-Nian Yang, Wen-Tsuen Chen. 181-189 [doi]
- A distributed and robust SDN control plane for transactional network updatesMarco Canini, Petr Kuznetsov, Dan Levin, Stefan Schmid. 190-198 [doi]
- Cracking network monitoring in DCNs with SDNZhiming Hu, Jun Luo. 199-207 [doi]
- UbiFlow: Mobility management in urban-scale software defined IoTDi Wu, Dmitri I. Arkhipov, Eskindir Asmare, Zhijing Qin, Julie A. McCann. 208-216 [doi]
- Composite event coverage in wireless sensor networks with heterogeneous sensorsJing Gao, Jianzhong Li, Zhipeng Cai, Hong Gao. 217-225 [doi]
- On the construction of maximum-quality aggregation trees in deadline-constrained WSNsBahram Alinia, Mohammad Hassan Hajiesmaili, Ahmad Khonsari. 226-234 [doi]
- Boosting sensor network calculus by thoroughly bounding cross-trafficSteffen Bondorf, Jens B. Schmitt. 235-243 [doi]
- Minimizing the maximum sensor movement for barrier coverage in the planeShuangjuan Li, Hong Shen. 244-252 [doi]
- Queuing the trust: Secure backpressure algorithm against insider threats in wireless networksZhuo Lu, Yalin Evren Sagduyu, Jason H. Li. 253-261 [doi]
- Game-theory-based batch identification of invalid signatures in wireless mobile networksJing Chen, Quan Yuan, Guoliang Xue, RuiYing Du. 262-270 [doi]
- Exploiting mobile social behaviors for Sybil detectionKuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, Xuemin Sherman Shen. 271-279 [doi]
- Network anti-inference: A fundamental perspective on proactive strategies to counter flow inferenceZhuo Lu, Cliff Wang. 280-288 [doi]
- ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayerDmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria. 289-297 [doi]
- On the impossibility of efficient self-stabilization in virtual overlays with churnStefanie Roos, Thorsten Strufe. 298-306 [doi]
- Network latency prediction for personal devices: Distance-feature decomposition from 3D samplingBang Liu, Di Niu, Zongpeng Li, H. Vicky Zhao. 307-315 [doi]
- PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysisQiben Yan, Yao Zheng, Tingting Jiang, Wenjing Lou, Y. Thomas Hou. 316-324 [doi]
- Femto-matching: Efficient traffic offloading in heterogeneous cellular networksWei Wang, Xiaobing Wu, Lei Xie, Sanglu Lu. 325-333 [doi]
- Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspectiveWei Bao, Ben Liang. 334-342 [doi]
- ADMM based algorithm for eICIC configuration in heterogeneous cellular networksHao Zhou, Yusheng Ji, Xiaoyan Wang, Baohua Zhao. 343-351 [doi]
- Performance analysis for two-tier cellular systems based on probabilistic distance modelsMaryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan. 352-360 [doi]
- How bad are the rogues' impact on enterprise 802.11 network performance?Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li. 361-369 [doi]
- On the accuracy of smartphone-based mobile network measurementWeichao Li, Ricky K. P. Mok, Daoyuan Wu, Rocky K. C. Chang. 370-378 [doi]
- Exploiting causes and effects of wireless link correlation for better performanceSong Min Kim, Shuai Wang, Tian He. 379-387 [doi]
- Dissecting packet loss in mobile broadband networks from the edgeDziugas Baltrunas, Ahmed Elmokashfi, Amund Kvalbein. 388-396 [doi]
- Exploiting large system dynamics for designing simple data center schedulersYousi Zheng, Ness B. Shroff, R. Srikant, Prasun Sinha. 397-405 [doi]
- End-to-end scheduling for all-optical data centersChang-Heng Wang, Tara Javidi, George Porter. 406-414 [doi]
- RUSH: Routing and scheduling for hybrid data center networksKai Han, Zhiming Hu, Jun Luo, Liu Xiang. 415-423 [doi]
- Rapier: Integrating routing and scheduling for coflow-aware data center networksYangming Zhao, Kai Chen 0005, Wei Bai 0001, Minlan Yu, Chen Tian, Yanhui Geng, Yiming Zhang, Dan Li, Sheng Wang. 424-432 [doi]
- Joint sensing task and subband allocation for large-scale spectrum profilingDong-Hoon Shin, Shibo He, Junshan Zhang. 433-441 [doi]
- Priority differentiation in cognitive radio networksJelena V. Misic, Md. Mizanur Rahman, Vojislav B. Misic. 442-450 [doi]
- Mode and user selection for multi-user MIMO WLANs without CSINarendra Anand, Jeongkeun Lee, Sung-Ju Lee, Edward W. Knightly. 451-459 [doi]
- Changing channel without strings: Coordination-free wideband spectrum adaptationWei Wang 0050, Yingjie Chen, Zeyu Wang, Jin Zhang, Kaishun Wu, Qian Zhang. 460-468 [doi]
- On the co-existence of distributed and centralized routing control-planesStefano Vissicchio, Luca Cittadini, Olivier Bonaventure, Geoffrey G. Xie, Laurent Vanbever. 469-477 [doi]
- OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcementXuan Nam Nguyen, Damien Saucez, Chadi Barakat, Thierry Turletti. 478-486 [doi]
- Virtual machine migration planning in software-defined networksHuandong Wang, Yong Li, Ying Zhang, Depeng Jin. 487-495 [doi]
- The (surprising) computational power of the SDN data planeCalvin Newport, Wenchao Zhou. 496-504 [doi]
- Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networksRahul Singh, Xueying Guo, P. R. Kumar. 505-512 [doi]
- SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networksLaura Galluccio, Sebastiano Milardo, Giacomo Morabito, Sergio Palazzo. 513-521 [doi]
- Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systemsDora Spenza, Michele Magno, Stefano Basagni, Luca Benini, Mario Paoli, Chiara Petrioli. 522-530 [doi]
- Drawing dominant dataset from big sensory data in wireless sensor networksSiyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang. 531-539 [doi]
- Accelerating regular expression matching over compressed HTTPMichela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral. 540-548 [doi]
- Differentially private publication of general time-serial trajectory dataJingyu Hua, Yue Gao, Sheng Zhong. 549-557 [doi]
- Detecting distributed signature-based intrusion: The case of multi-path routing attacksJiefei Ma, Franck Le, Alessandra Russo, Jorge Lobo. 558-566 [doi]
- JITScope: Protecting web users from control-flow hijacking attacksChao Zhang, Mehrdad Niknami, Kevin Zhijie Chen, Chengyu Song, Zhaofeng Chen, Dawn Song. 567-575 [doi]
- Online procurement auctions for resource pooling in client-assisted cloud storage systemsJian Zhao, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li. 576-584 [doi]
- Provably delay efficient data retrieving in storage cloudsYin Sun, Zizhan Zheng, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff. 585-593 [doi]
- StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clustersYanfei Guo, Jia Rao, Dazhao Cheng, Changjun Jiang, Cheng-Zhong Xu, Xiaobo Zhou. 594-602 [doi]
- Location-aware associated data placement for geo-distributed data-intensive applicationsBoyang Yu, Jianping Pan. 603-611 [doi]
- Robust optimization of cognitive radio networks powered by energy harvestingShimin Gong, Lingjie Duan, Ping Wang. 612-620 [doi]
- Optimal multicast in dense multi-channel multi-radio wireless networksRahul Urgaonkar, Prithwish Basu, Saikat Guha, Ananthram Swami. 621-629 [doi]
- WINET: Indoor white space network designJinCheng Zhang, Wenjie Zhang, Minghua Chen, Zhi Wang. 630-638 [doi]
- MadeCR: Correlation-based malware detection for cognitive radioYanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Danfeng (Daphne) Yao. 639-647 [doi]
- Minimum control latency of dynamic networksWeiguo Dai, Zhaoquan Gu, Xiao Lin, Qiang-Sheng Hua, Francis C. M. Lau. 648-656 [doi]
- Optimized network traffic engineering using segment routingRandeep Bhatia, Fang Hao, Murali S. Kodialam, T. V. Lakshman. 657-665 [doi]
- Compact location encodings for scalable Internet routingFeng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa. 666-674 [doi]
- Policy-compliant path diversity and bisection bandwidthRowan Klöti, Vasileios Kotronis, Bernhard Ager, Xenofontas Dimitropoulos. 675-683 [doi]
- Local face-view barrier coverage in camera sensor networksZuoming Yu, Fan Yang, Jin Teng, Adam C. Champion, Dong Xuan. 684-692 [doi]
- On heterogeneous neighbor discovery in wireless sensor networksLin Chen, Ruolin Fan, Kaigui Bian, Lin Chen, Mario Gerla, Tao Wang, Xiaoming Li. 693-701 [doi]
- On 2-way neighbor discovery in wireless networks with directional antennasHao Cai, Tilman Wolf. 702-710 [doi]
- VM-tracking: Visual-motion sensing integration for real-time human trackingQiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao. 711-719 [doi]
- Original SYN: Finding machines hidden behind firewallsXu Zhang, Jeffrey Knockel, Jedidiah R. Crandall. 720-728 [doi]
- Agile virtualized infrastructure to proactively defend against cyber attacksFida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura. 729-737 [doi]
- Adversary-aware IP address randomization for proactive agility against sophisticated attackersJafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan. 738-746 [doi]
- Dynamic defense strategy against advanced persistent threat with insidersPengfei Hu, Hongxing Li, Hao Fu, Derya Cansever, Prasant Mohapatra. 747-755 [doi]
- Content caching and delivery over heterogeneous wireless networksJad Hachem, Nikhil Karamchandani, Suhas N. Diggavi. 756-764 [doi]
- On optimal diversity in network-coding-based routing in wireless networksQiao Xiang, Hongwei Zhang, Jianping Wang, Guoliang Xing, Shan Lin, Xue Liu. 765-773 [doi]
- Low-delay distributed source coding for time-varying sources with unknown statisticsFangzhou Chen, Bin Li, Can Emre Koksal. 774-782 [doi]
- Network coding-based multicast in multi-hop CRNs under uncertain spectrum availabilityYuben Qu, Chao Dong, Haipeng Dai, Fan Wu, ShaoJie Tang, Hai Wang, Chang Tian. 783-791 [doi]
- Trajectory aware macro-cell planning for mobile usersShubhadip Mitra, Sayan Ranu, Vinay Kolar, Aditya Telang, Arnab Bhattacharya 0001, Ravi Kokku, Sriram Raghavan. 792-800 [doi]
- A correlated shadowing model for urban wireless networksFrançois Baccelli, Xinchen Zhang. 801-809 [doi]
- Supporting WiFi and LTE co-existenceSangki Yun, Lili Qiu. 810-818 [doi]
- SPIRO: Turning elephants into mice with efficient RF transportEugene Chai, Kang G. Shin, Sung-Ju Lee, Jeongkeun Lee, Raúl H. Etkin. 819-827 [doi]
- Measurement and modeling of user transitioning among networksSookhyun Yang, Jim Kurose, Simon Heimlicher, Arun Venkataramani. 828-836 [doi]
- On factors affecting the usage and adoption of a nation-wide TV streaming serviceDmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria. 837-845 [doi]
- A behavior-aware profiling of handheld devicesXuetao Wei, Nicholas Valler, Harsha V. Madhyastha, Iulian Neamtiu, Michalis Faloutsos. 846-854 [doi]
- Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic frameworkShu Wang, Vignesh Venkateswaran, Xinyu Zhang. 855-863 [doi]
- HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platformPengfei Zhang, Xi Li, Rui Chu, Huaimin Wang. 864-872 [doi]
- Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testingMohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. S. Eugene Ng, Sanjay G. Rao. 873-881 [doi]
- Energy-efficient heuristics for job assignment in processor-sharing server farmsJing Fu, Jun Guo, Eric W. M. Wong, Moshe Zukerman. 882-890 [doi]
- Need for speed: CORA scheduler for optimizing completion-times in the cloudZhe Huang, Bharath Balasubramanian, Michael Wang, Tian Lan, Mung Chiang, Danny H. K. Tsang. 891-899 [doi]
- HySIM: A hybrid spectrum and information market for TV white space networksYuan Luo, Lin Gao, Jianwei Huang. 900-908 [doi]
- PPER: Privacy-preserving economic-robust spectrum auction in wireless networksMing Li 0006, Pan Li 0001, Linke Guo, Xiaoxia Huang. 909-917 [doi]
- Differentially private and strategy-proof spectrum auction with approximate revenue maximizationRuihao Zhu, Kang G. Shin. 918-926 [doi]
- A cloudlet-based multi-lateral resource exchange framework for mobile usersYu Wu, Lei Ying. 927-935 [doi]
- On the complexity of optimal routing and content caching in heterogeneous networksMostafa Dehghan, Anand Seetharam, Bo Jiang, Ting He, Theodoros Salonidis, Jim Kurose, Don Towsley, Ramesh K. Sitaraman. 936-944 [doi]
- Service-martingales: Theory and applications to the delay analysis of random access protocolsFelix Poloczek, Florin Ciucu. 945-953 [doi]
- Optimal scheduling of a large-scale multiclass parallel server system with ergodic costAri Arapostathis, Anup Biswas, Guodong Pang. 954-962 [doi]
- Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimalityQiaomin Xie, Yi Lu. 963-972 [doi]
- Minimum connected dominating set construction in wireless networks under the beeping modelJiguo Yu, Lili Jia, Dongxiao Yu, Guangshun Li, Xiuzhen Cheng. 972-980 [doi]
- SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNsChen Wang, Hongbo Jiang. 981-989 [doi]
- Modeling link correlation in low-power wireless networksZhiwei Zhao, Wei Dong, Gaoyang Guan, Jiajun Bu, Tao Gu, Chun Chen. 990-998 [doi]
- Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm designLin Chen, Wei Wang, Hua Huang, Shan Lin. 999-1007 [doi]
- Personalized location privacy in mobile networks: A social group utility approachXiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang. 1008-1016 [doi]
- Enhancing privacy through caching in location-based servicesBen Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li 0006. 1017-1025 [doi]
- Verifiable privacy-preserving monitoring for cloud-assisted mHealth systemsLinke Guo, Yuguang Fang, Ming Li 0006, Pan Li 0001. 1026-1034 [doi]
- Efficient secure outsourcing of large-scale linear systems of equationsSergio Salinas, Changqing Luo, Xuhui Chen, Pan Li 0001. 1035-1043 [doi]
- When hybrid cloud meets flash crowd: Towards cost-effective service provisioningYipei Niu, Bin Luo, Fangming Liu, Jiangchuan Liu, Bo Li 0001. 1044-1052 [doi]
- A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioningXiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau. 1053-1061 [doi]
- Capturing resource tradeoffs in fair multi-resource allocationDoron Zarchy, David Hay, Michael Schapira. 1062-1070 [doi]
- Optimization for speculative execution in a MapReduce-like clusterHuanle Xu, Wing Cheong Lau. 1071-1079 [doi]
- Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor networkZhao Zhang, Yishuo Shi. 1080-1085 [doi]
- Congestion-aware single link failure recovery in hybrid SDN networksCing-yu Chu, Kang Xi, Min Luo, H. Jonathan Chao. 1086-1094 [doi]
- iPath: Intelligent and optimal path selection for Byzantine fault tolerant communicationShehla S. Rana, Nitin H. Vaidya. 1095-1103 [doi]
- On sample-path staleness in lazy data replicationXiaoyong Li 0004, Daren B. H. Cline, Dmitri Loguinov. 1104-1112 [doi]
- Optimal scheduling for jobs with progressive deadlinesKristen Gardner, Sem C. Borst, Mor Harchol-Balter. 1113-1121 [doi]
- On multiplexing flows: Does it hurt or not?Florin Ciucu, Felix Poloczek. 1122-1130 [doi]
- The power of slightly more than one sample in randomized load balancingLei Ying, R. Srikant, Xiaohan Kang. 1131-1139 [doi]
- Price of fairness for opportunistic and priority schedulersMalhar Mehta, Veeraruna Kavitha, N. Hemachandra. 1140-1148 [doi]
- Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networksQiao Xiang, Xi Chen, Linghe Kong, Lei Rao, Xue Liu. 1149-1157 [doi]
- A consensus-based approach for platooning with inter-vehicular communicationsStefania Santini, Alessandro Salvi, Antonio Saverio Valente, Antonio Pescapè, Michele Segata, Renato Lo Cigno. 1158-1166 [doi]
- VeRV: A temporal and data-concerned verification framework for the vehicle bus systemsShuo Zhang, Fei He, Ming Gu. 1167-1175 [doi]
- Bridging link power asymmetry in mobile whitespace networksSanjib Sur, Xinyu Zhang. 1176-1184 [doi]
- Energy-aware video streaming on smartphonesWenjie Hu, Guohong Cao. 1185-1193 [doi]
- Fine-grained sleep monitoring: Hearing your breathing with smartphonesYanzhi Ren, Chen Wang, Jie Yang 0003, Yingying Chen. 1194-1202 [doi]
- iSelf: Towards cold-start emotion labeling using transfer learning with smartphonesBoyuan Sun, Qiang Ma, Shanfeng Zhang, Kebin Liu, Yunhao Liu. 1203-1211 [doi]
- All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend modeGe Peng, Gang Zhou, David T. Nguyen, Xin Qi. 1212-1220 [doi]
- The online disjoint set cover problem and its applicationsAshwin Pananjady, Vivek Kumar Bagaria, Rahul Vaze. 1221-1229 [doi]
- Stochastic and fluid index policies for resource allocation problemsMaialen Larrañaga, Urtzi Ayesta, Ina Maria Verloop. 1230-1238 [doi]
- Delay models in ethernet long-reach passive optical networksAbhishek Dixit, Bart Lannoo, Didier Colle, Mario Pickavet, Piet Demeester. 1239-1247 [doi]
- Throughput-optimal broadcast on directed acyclic graphsAbhishek Sinha, Georgios S. Paschos, Chih-Ping Li, Eytan Modiano. 1248-1256 [doi]
- Efficient resource scheduling for a secondary network in shared spectrumMatthew Clark, Konstantinos Psounis. 1257-1265 [doi]
- Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamicsJiasi Chen, Mung Chiang, Jeffrey Erman, Guangzhi Li, K. K. Ramakrishnan, Rakesh K. Sinha. 1266-1274 [doi]
- FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloadingHamzeh Beyranvand, Martin Lévesque, Martin Maier, Jawad A. Salehi. 1275-1283 [doi]
- Mitigating macro-cell outage in LTE-Advanced deploymentsRajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Prasant Mohapatra. 1284-1292 [doi]
- Latency-aware rate adaptation in 802.11n home networksChi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra. 1293-1301 [doi]
- On the universality of age-based scheduling in wireless networksBin Li, Atilla Eryilmaz, R. Srikant. 1302-1310 [doi]
- Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networksLixin Wang, Peng-Jun Wan, Kyle Young. 1311-1319 [doi]
- Provable fairness for TDMA schedulingMarcin Bienkowski, Jaroslaw Byrka, Krzysztof Chrobak, Tomasz Jurdzinski, Dariusz R. Kowalski. 1320-1327 [doi]
- ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placementBo Wang, Jinlei Jiang, Guangwen Yang. 1328-1336 [doi]
- AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplicationYucheng Zhang, Hong Jiang, Dan Feng, Wen Xia, Min Fu, Fangting Huang, Yukun Zhou. 1337-1345 [doi]
- Near optimal placement of virtual network functionsRami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz. 1346-1354 [doi]
- Enhancing reliability and response times via replication in computing clustersZhan Qiu, Juan F. Pérez. 1355-1363 [doi]
- Fault-tolerant coverage with maximum lifetime in wireless sensor networksJames Willson, Zhao Zhang, Weili Wu, Ding-Zhu Du. 1364-1372 [doi]
- GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault toleranceAndrés J. Gonzalez, Bjarne E. Helvik, Prakriti Tiwari, Denis M. Becker, Otto Wittner. 1373-1381 [doi]
- Robust geometric forest routing with tunable load balancingRein Houthooft, Sahel Sahhaf, Wouter Tavernier, Filip De Turck, Didier Colle, Mario Pickavet. 1382-1390 [doi]
- Real-time failure prediction in online servicesMohammed Shatnawi, Mohamed Hefeeda. 1391-1399 [doi]
- Low-complexity multi-resource packet scheduling for network function virtualizationXin Li, Chen Qian. 1400-1408 [doi]
- Performance analysis for overflow loss systems of processor-sharing queuesYin-Chi Chan, Jun Guo, Eric W. M. Wong, Moshe Zukerman. 1409-1417 [doi]
- Priority queueing with multiple packet characteristicsPavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan. 1418-1426 [doi]
- Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffersSucha Supittayapornpong, Michael J. Neely. 1427-1435 [doi]
- Enabling TDMA for today's wireless LANsZhice Yang, Jiansong Zhang, Kun Tan, Qian Zhang, Yongguang Zhang. 1436-1444 [doi]
- Convergence properties of general network selection gamesEhsan Monsef, Alireza Keshavarz-Haddad, Ehsan Aryafar, Jafar Saniie, Mung Chiang. 1445-1453 [doi]
- Outsourcing coordination and management of home wireless access points through an open APIAshish Patro, Suman Banerjee. 1454-1462 [doi]
- CodeRepair: PHY-layer partial packet recovery without the painJun Huang, Guoliang Xing, Jianwei Niu, Shan Lin. 1463-1471 [doi]
- WiGest: A ubiquitous WiFi-based gesture recognition systemHeba Abdel-Nasser, Moustafa Youssef, Khaled A. Harras. 1472-1480 [doi]
- Automatic generation of mobile app signatures from traffic observationsQiang Xu, Yong Liao, Stanislav Miskovic, Zhuoqing Morley Mao, Mario Baldi, Antonio Nucci, Thomas Andrews. 1481-1489 [doi]
- Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systemsShusen Yang, Usman Adeel, Julie A. McCann. 1490-1498 [doi]
- Sponsoring mobile data: An economic analysis of the impact on users and content providersCarlee Joe-Wong, Sangtae Ha, Mung Chiang. 1499-1507 [doi]
- Fast optimal nonconcave resource allocationPan Lai, Rui Fan. 1508-1516 [doi]
- Local detection of infections in heterogeneous networksChris Milling, Constantine Caramanis, Shie Mannor, Sanjay Shakkottai. 1517-1525 [doi]
- Flow-based feasibility test of linear interference alignment with arbitrary interference topologyPeng-Jun Wan, Fahad Al-dhelaan, Sai Ji, Lei Wang, Ophir Frieder. 1526-1534 [doi]
- Copula analysis for statistical network calculusFang Dong, Kui Wu, Venkatesh Srinivasan. 1535-1543 [doi]
- Cliques in hyperbolic random graphsTobias Friedrich, Anton Krohmer. 1544-1552 [doi]
- Construction of simple graphs with a target joint degree matrix and beyondMinas Gjoka, Balint Tillman, Athina Markopoulou. 1553-1561 [doi]
- On the progressive spread over strategic diffusion: Asymptotic and computationJungseul Ok, Jinwoo Shin, Yung Yi. 1562-1570 [doi]
- De-anonymizing scale-free social networks by percolation graph matchingCarla-Fabiana Chiasserini, Michele Garetto, Emilio Leonardi. 1571-1579 [doi]
- Secondary markets for mobile data: Feasibility and benefits of traded data plansLiang Zheng, Carlee Joe-Wong, Chee-Wei Tan, Sangtae Ha, Mung Chiang. 1580-1588 [doi]
- Off-path round trip time measurement via TCP/IP side channelsGeoffrey Alexander, Jedidiah R. Crandall. 1589-1597 [doi]
- Around the web in six weeks: Documenting a large-scale crawlSarker Tanzir Ahmed, Clint Sparkman, Hsin-Tsang Lee, Dmitri Loguinov. 1598-1606 [doi]
- Financial analysis of 4G network deploymentYanjiao Chen, Lingjie Duan, Qian Zhang. 1607-1615 [doi]
- SmartEye: Real-time and efficient cloud image sharing for disaster environmentsYu Hua, Wenbo He, Xue Liu, Dan Feng. 1616-1624 [doi]
- Modeling randomized data streams in caching, data processing, and crawling applicationsSarker Tanzir Ahmed, Dmitri Loguinov. 1625-1633 [doi]
- Temporal update dynamics under blind samplingXiaoyong Li 0004, Daren B. H. Cline, Dmitri Loguinov. 1634-1642 [doi]
- Optimal communication structures for big data aggregationWilliam Culhane, Kirill Kogan, Chamikara Jayalath, Patrick Eugster. 1643-1651 [doi]
- Human object estimation via backscattered radio frequency signalHan Ding, Jinsong Han, Alex X. Liu, Jizhong Zhao, Panlong Yang, Wei Xi, Zhiping Jiang. 1652-1660 [doi]
- Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tagsQiongzheng Lin, Lei Yang, Yuxin Sun, Tianci Liu, Xiang-Yang Li, Yunhao Liu. 1661-1669 [doi]
- TagBooth: Deep shopping data acquisition powered by RFID tagsTianci Liu, Lei Yang, Xiang-Yang Li, Huaiyi Huang, Yunhao Liu. 1670-1678 [doi]
- RFID cardinality estimation with blocker tagsXiulong Liu, Bin Xiao, Keqiu Li, Jie Wu, Alex X. Liu, Heng Qi, Xin Xie. 1679-1687 [doi]
- Comprehensive understanding of TCP Incast problemWen Chen, Fengyuan Ren, Jing Xie, Chuang Lin, Kevin Yin, Fred Baker. 1688-1696 [doi]
- TCPRand: Randomizing TCP payload size for TCP fairness in data center networksSoojeon Lee, Myungjin Lee, Dongman Lee, Hyungsoo Jung, Byoung-Sun Lee. 1697-1705 [doi]
- A new paradigm for multiflow in wireless networks: Theory and applicationsPeng-Jun Wan, Boliu Xu, Lei Wang, Sai Ji, Ophir Frieder. 1706-1714 [doi]
- Distributed network resource allocation for multi-tiered multimedia applicationsGeorgios Tychogiorgos, Athanasios Gkelias, Kin K. Leung. 1715-1723 [doi]
- HybridCast: Joint multicast-unicast design for multiuser MIMO networksBo-Xian Wu, Kate Ching-Ju Lin, Kai-Cheng Hsu, Hung-Yu Wei. 1724-1732 [doi]
- Be responsible: A novel communications scheme for full-duplex MIMO radiosDiep N. Nguyen, Marwan Krunz. 1733-1741 [doi]
- AirShare: Distributed coherent transmission made seamlessOmid Abari, Hariharan Rahul, Dina Katabi, Mondira Pant. 1742-1750 [doi]
- Scaling wireless full-duplex in multi-cell networksMohammad Amir Khojastepour, Karthikeyan Sundaresan, Sampath Rangarajan, Mohammad Farajzadeh-Tehrani. 1751-1759 [doi]
- Formation games of reliable networksEli A. Meirom, Shie Mannor, Ariel Orda. 1760-1768 [doi]
- Work capacity of freelance markets: Fundamental limits and decentralized schemesAvhishek Chatterjee, Lav R. Varshney, Sriram Vishwanath. 1769-1777 [doi]
- Complexities in Internet peering: Understanding the "Black" in the "Black Art"Aemen Lodhi, Nikolaos Laoutaris, Amogh Dhamdhere, Constantine Dovrolis. 1778-1786 [doi]
- Improving learning and adaptation in security games by exploiting information asymmetryXiaofan He, Huaiyu Dai, Peng Ning. 1787-1795 [doi]
- A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decompositionWei Wang 0032, Bei Liu, Donghyun Kim, Deying Li, Jingyi Wang, Yaolin Jiang. 1796-1804 [doi]
- Maximizing network capacity of MPR-capable wireless networksPeng-Jun Wan, Fahad Al-dhelaan, Xiaohua Jia, Baowei Wang, Guowen Xing. 1805-1813 [doi]
- Routing in accumulative multi-hop networksJesús Gómez-Vilardebó. 1814-1821 [doi]
- A new upper bound on the control information required in multiple access communicationsJie Chuai, Victor O. K. Li. 1822-1830 [doi]
- Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stabilityFrançois Baccelli, Avhishek Chatterjee, Sriram Vishwanath. 1831-1839 [doi]
- On the efficiency-optimal Markov chains for distributed networking applicationsChul-Ho Lee, Do Young Eun. 1840-1848 [doi]
- Forming external behaviors by leveraging internal opinionsAmirMahdi Ahmadinejad, Sina Dehghani, MohammadTaghi Hajiaghayi, Hamid Mahini, Saeed Seddighin, Sadra Yazdanbod. 1849-1857 [doi]
- TSearch: Target-oriented low-delay node searching in DTNs with social network propertiesLi Yan, Haiying Shen, Kang Chen. 1858-1866 [doi]
- Online scheduling for delayed mobile offloadingHan Deng, I-Hong Hou. 1867-1875 [doi]
- Code offload with least context migration in the mobile cloudYong Li, Wei Gao. 1876-1884 [doi]
- Dynamic adaptive techniques for learning application delay tolerance for mobile data offloadingOzlem Bilgir Yetim, Margaret Martonosi. 1885-1893 [doi]
- Hermes: Latency optimal task assignment for resource-constrained mobile computingYi-Hsuan Kao, Bhaskar Krishnamachari, Moo-Ryong Ra, Fan Bai. 1894-1902 [doi]
- WaveCube: A scalable, fault-tolerant, high-performance optical data center architectureKai Chen 0005, Xitao Wen, Xingyu Ma, Yan Chen, Yong Xia, Chengchen Hu, Qunfeng Dong. 1903-1911 [doi]
- WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on ChipsFeiyang Liu, Haibo Zhang 0001, Yawen Chen, Zhiyi Huang 0001, Huaxi Gu. 1912-1920 [doi]
- Optimizing throughput in optical networks: The joint routing and power control problemZizhong Cao, Paul Claisse, René-Jean Essiambre, Murali S. Kodialam, T. V. Lakshman. 1921-1929 [doi]
- Blast: Accelerating high-performance data analytics applications by optical multicastYiting Xia, T. S. Eugene Ng, Xiaoye Steven Sun. 1930-1938 [doi]
- Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wildMuhammad Shahzad, Alex X. Liu. 1939-1947 [doi]
- Fast RFID grouping protocolsJia Liu, Bin Xiao, Shigang Chen, Feng Zhu, Lijun Chen. 1948-1956 [doi]
- PLACE: Physical layer cardinality estimation for large-scale RFID systemsYuxiao Hou, Jiajue Ou, Yuanqing Zheng, Mo Li. 1957-1965 [doi]
- Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationshipsLei Yang, Pai Peng, Fan Dang, Cheng Wang, Xiang-Yang Li, Yunhao Liu. 1966-1974 [doi]
- SIEVE: Scalable user grouping for large MU-MIMO systemsWei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan. 1975-1983 [doi]
- Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networksJae-Han Lim, Katsuhiro Naito, Ji-Hoon Yun, Mario Gerla. 1984-1992 [doi]
- 2: A directional full duplex communication system for indoor wireless networksEhsan Aryafar, Alireza Keshavarz-Haddad. 1993-2001 [doi]
- CSMA k-SIC - A class of distributed MAC protocols and their performance evaluationAbishek Sankararaman, François Baccelli. 2002-2010 [doi]
- Scalable clock synchronization in wireless networks with low-duty-cycle radio operationsHao Huang, Jihoon Yun, Ziguo Zhong. 2011-2019 [doi]
- On end-to-end delay minimization in wireless networks under the physical interference modelYuan Li, Antonio Capone, Di Yuan. 2020-2028 [doi]
- Speedup of information exchange using multiple channels in wireless ad hoc networksDongxiao Yu, Yuexuan Wang, Yu Yan, Jiguo Yu, Francis C. M. Lau. 2029-2037 [doi]
- PhaseU: Real-time LOS identification with WiFiChenshu Wu, Zheng Yang, Zimu Zhou, Kun Qian, Yunhao Liu, Mingyan Liu. 2038-2046 [doi]
- Socially-optimal online spectrum auctions for secondary wireless communicationHongxing Li, Chuan Wu, Zongpeng Li. 2047-2055 [doi]
- Resisting three-dimensional manipulations in distributed wireless spectrum auctionsDan Peng, Shuo Yang, Fan Wu, Guihai Chen, ShaoJie Tang, Tie Luo. 2056-2064 [doi]
- ITSEC: An information-theoretically secure framework for truthful spectrum auctionsZhili Chen, Liusheng Huang, Lin Chen. 2065-2073 [doi]
- Truthful online double auctions for dynamic mobile crowdsourcingYueming Wei, Yanmin Zhu, Hongzi Zhu, Qian Zhang, Guangtao Xue. 2074-2082 [doi]
- SEISA: Secure and efficient encrypted image search with access controlJiawei Yuan, Shucheng Yu, Linke Guo. 2083-2091 [doi]
- Inverted index based multi-keyword public-key searchable encryption with strong privacy guaranteeBing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou. 2092-2100 [doi]
- Generalized pattern matching string search on encrypted data in cloud systemsDongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, Ming Xu. 2101-2109 [doi]
- Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud dataWenhai Sun, Xuefeng Liu, Wenjing Lou, Y. Thomas Hou, Hui Li 0006. 2110-2118 [doi]
- Incentivizing sharing in realtime D2D streaming networks: A mean field game perspectiveJian Li, Rajarshi Bhattacharyya, Suman Paul, Srinivas Shakkottai, Vijay Subramanian. 2119-2127 [doi]
- Interference alignment using shadow channelBo Chen, Vivek Yenamandra, Kannan Srinivasan. 2128-2136 [doi]
- VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networksChao Kong, Zengwen Yuan, Xushen Han, Feng Yang, Xinbing Wang, Tao Wang, Songwu Lu. 2137-2145 [doi]
- Bits and coins: Supporting collaborative consumption of mobile internetDimitris Syrivelis, George Iosifidis, Dimosthenis Delimpasis, Konstantinos Chounos, Thanasis Korakis, Leandros Tassiulas. 2146-2154 [doi]
- A coded generalization of selective repeat ARQJason Cloud, Douglas J. Leith, Muriel Médard. 2155-2163 [doi]
- Scheduling in wireless networks with full-duplex cut-through transmissionYang Yang, Ness B. Shroff. 2164-2172 [doi]
- A-DCF: Design and implementation of delay and queue length based wireless MACHojin Lee, Sangwoo Moon, Yung Yi. 2173-2181 [doi]
- Harmony: Content resolution for smart devices using acoustic channelMostafa Uddin, Tamer Nadeem. 2182-2190 [doi]
- On setting-up asynchronous ad hoc wireless networksTomasz Jurdzinski, Dariusz R. Kowalski, Michal Rozanski, Grzegorz Stachowiak. 2191-2199 [doi]
- ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environmentOkhwan Lee, Weiping Sun, Jihoon Kim, Hyuk Lee, Bo Ryu, Jungwoo Lee, Sunghyun Choi. 2200-2208 [doi]
- Capacity analysis of hybrid wireless networks with long-range social contacts behaviorRonghui Hou, Yu Cheng, Jiandong Li, Min Sheng, King-Shan Lui. 2209-2217 [doi]
- Quantized conflict graphs for wireless network optimizationYanchao Zhao, Wenzhong Li, Jie Wu 0001, Sanglu Lu. 2218-2226 [doi]
- Multi-task assignment for crowdsensing in mobile social networksMingjun Xiao, Jie Wu 0001, Liusheng Huang, Yunsheng Wang, Cong Liu. 2227-2235 [doi]
- Crowdsensing Under (Soft) ControlJohn P. Rula, Fabián E. Bustamante. 2236-2244 [doi]
- Contextual-code: Simplifying information pulling from targeted sources in physical worldYang Tian, Kaigui Bian, Guobin Shen, Xiaochen Liu, Xiaoguang Li, Thomas Moscibroda. 2245-2253 [doi]
- User recruitment for mobile crowdsensing over opportunistic networksMerkourios Karaliopoulos, Orestis Telelis, Iordanis Koutsopoulos. 2254-2262 [doi]
- Efficient analysis of caching strategies under dynamic content popularityMichele Garetto, Emilio Leonardi, Stefano Traverso. 2263-2271 [doi]
- Can web pages be classified using anonymized TCP/IP headers?Sean Sanders, Jasleen Kaur. 2272-2280 [doi]
- Least recently used caches under the Shot Noise ModelEmilio Leonardi, Giovanni Luca Torrisi. 2281-2289 [doi]
- BFAST: Unified and scalable index for NDN forwarding architectureHuichen Dai, Jianyuan Lu, Yi Wang 0004, Bin Liu 0001. 2290-2298 [doi]
- MOOC performance prediction via clickstream data and social learning networksChristopher G. Brinton, Mung Chiang. 2299-2307 [doi]
- Timely video popularity forecasting based on social networksJie Xu, Mihaela van der Schaar, Jiangchuan Liu, Haitao Li. 2308-2316 [doi]
- On the efficiency of social recommender networksFelix Ming Fai Wong, Zhenming Liu, Mung Chiang. 2317-2325 [doi]
- Persistence and availability of floating content in a campus environmentShahzad Ali, Gianluca Rizzo, Vincenzo Mancuso, Marco Ajmone Marsan. 2326-2334 [doi]
- Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustificationShizhen Zhao, Xiaojun Lin, Minghua Chen. 2335-2343 [doi]
- 3: Joint optimization of charger placement and power allocation for wireless power transferSheng Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu 0001, Sanglu Lu. 2344-2352 [doi]
- Rate alteration attacks in smart gridSubhankar Mishra, Xiang Li, Alan Kuhnle, My T. Thai, Jungtaek Seo. 2353-2361 [doi]
- Distributed algorithms for content allocation in interconnected content distribution networksValentino Pacifici, György Dán. 2362-2370 [doi]
- Distinct element counting in distributed dynamic data streamsWenji Chen, Yong Guan. 2371-2379 [doi]
- Assessing attack vulnerability in networks with uncertaintyThang N. Dinh, My T. Thai. 2380-2388 [doi]
- Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secureFei Chen, Tao Xiang, Yuanyuan Yang, Cong Wang, Shengyu Zhang. 2389-2397 [doi]
- TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systemsJun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin. 2398-2406 [doi]
- Chirp signal-based aerial acoustic communication for smart devicesHyewon Lee, Tae Hyun Kim 0001, Jun Won Choi, Sunghyun Choi. 2407-2415 [doi]
- Steering with eyes closed: Mm-Wave beam steering without in-band measurementThomas Nitsche, Adriana B. Flores, Edward W. Knightly, Joerg Widmer. 2416-2424 [doi]
- Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate controlZhangyu Guan, Giuseppe Enrico Santagati, Tommaso Melodia. 2425-2433 [doi]
- Dancing with light: Predictive in-frame rate selection for visible light networksJialiang Zhang, Xinyu Zhang, Gang Wu. 2434-2442 [doi]
- Sequential and adaptive sampling for matrix completion in network monitoring systemsKun Xie, Lele Wang, Xin Wang 0001, Gaogang Xie, Guangxing Zhang, Dongliang Xie, Jigang Wen. 2443-2451 [doi]
- Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?Maria Rosário de Oliveira, João C. Neves, Rui Valadas, Paulo Salvador. 2452-2460 [doi]
- Modeling repeating behaviors in packet arrivals: Detection and measurementJianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, Xiaohong Guan. 2461-2469 [doi]
- An empirical mixture model for large-scale RTT measurementsRomain Fontugne, Johan Mazel, Kensuke Fukuda. 2470-2478 [doi]
- Fundamental limits of RSS fingerprinting based indoor localizationYutian Wen, Xiaohua Tian, Xinbing Wang, Songwu Lu. 2479-2487 [doi]
- The collocation of measurement points in large open indoor environmentKaikai Sheng, Zhicheng Gu, Xueyu Mao, Xiaohua Tian, Weijie Wu, Xiaoying Gan, Xinbing Wang. 2488-2496 [doi]
- Static power of mobile devices: Self-updating radio maps for wireless indoor localizationChenshu Wu, Zheng Yang, Chaowei Xiao, Chaofan Yang, Yunhao Liu, Mingyan Liu. 2497-2505 [doi]
- Fusing noisy fingerprints with distance bounds for indoor localizationSuining He, S.-H. Gary Chan, Lei Yu, Ning Liu. 2506-2514 [doi]
- Crowdsourcing with Tullock contests: A new perspectiveTie Luo, Salil S. Kanhere, Hwee Pink Tan, Fan Wu, Hongyi Wu. 2515-2523 [doi]
- Crowdsourced live streaming over the cloudFei Chen, Cong Zhang, Feng Wang, Jiangchuan Liu. 2524-2532 [doi]
- Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&AAifang Xu, Xiaonan Feng, Ye Tian. 2533-2541 [doi]
- High quality participant recruitment in vehicle-based crowdsourcing using predictable mobilityZongjian He, Jiannong Cao, Xuefeng Liu. 2542-2550 [doi]
- TimeFlip: Scheduling network updates with timestamp-based TCAM rangesTal Mizrahi, Ori Rottenstreich, Yoram Moses. 2551-2559 [doi]
- Independent counter estimation bucketsGil Einziger, Benny Fellman, Yaron Kassner. 2560-2568 [doi]
- Tapping into the router's unutilized processing powerMarat Radan, Isaac Keslassy. 2569-2577 [doi]
- Leveraging traffic repetitions for high-speed deep packet inspectionAnat Bremler-Barr, Shimrit Tzur-David, Yotam Harchol, David Hay. 2578-2586 [doi]
- Sampling online social networks via heterogeneous statisticsXin Wang, Richard T. B. Ma, Yinlong Xu, Zhipeng Li. 2587-2595 [doi]
- Unveiling the adoption and cascading process of OSN-based gifting applicationsMohammad Rezaur Rahman, Jinyoung Han, Chen-Nee Chuah. 2596-2604 [doi]
- Information sharing in distributed stochastic banditsSwapna Buccapatnam, Jian Tan, Li Zhang. 2605-2613 [doi]
- DPCP: A protocol for optimal pull coordination in decentralized social networksHuanle Xu, Pili Hu, Wing Cheong Lau, Qiming Zhang, Yang Wu. 2614-2622 [doi]
- Comprehensive understanding of operation cost reduction using energy storage for IDCsHaihang Zhou, Jianguo Yao, Haibing Guan, Xue Liu. 2623-2631 [doi]
- A truthful incentive mechanism for emergency demand response in colocation data centersLinquan Zhang, Shaolei Ren, Chuan Wu, Zongpeng Li. 2632-2640 [doi]
- An online procurement auction for power demand response in storage-assisted smart gridsRuiting Zhou, Zongpeng Li, Chuan Wu. 2641-2649 [doi]
- When smart grid meets geo-distributed cloud: An auction approach to datacenter demand responseZhi Zhou, Fangming Liu, Zongpeng Li, Hai Jin. 2650-2658 [doi]
- Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devicesHelei Cui, Xingliang Yuan, Cong Wang. 2659-2667 [doi]
- SMOC: A secure mobile cloud computing platformZijiang Hao, Yutao Tang, Yifan Zhang, Edmund Novak, Nancy Carter, Qun Li. 2668-2676 [doi]
- Fine-grained data sharing in cloud computing for mobile devicesJun Shao, Rongxing Lu, Xiaodong Lin. 2677-2685 [doi]
- Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devicesYimin Chen, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang. 2686-2694 [doi]
- Adaptive online power-management for Bluetooth Low EnergyPhilipp Kindt, Daniel Yunge, Mathias Gopp, Samarjit Chakraborty. 2695-2703 [doi]
- Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensingKeyu Wang, Zheng Yang, Zimu Zhou, Yunhao Liu, Lionel M. Ni. 2704-2712 [doi]
- Characterizing home wireless performance: The gateway viewIoannis Pefkianakis, Henrik Lundgren, Augustin Soule, Jaideep Chandrashekar, Pascal Le Guyadec, Christophe Diot, Martin May, Karel Van Doorselaer, Koen Van Oost. 2713-2721 [doi]
- VINCE: Exploiting visible light sensing for smartphone-based NFC systemsJianwei Niu, Fei Gu, Ruogu Zhou, Guoliang Xing, Wei Xiang. 2722-2730 [doi]
- A measurement study on TCP behaviors in HSPA+ networks on high-speed railsLi Li, Ke Xu, Dan Wang, Chunyi Peng, Qingyang Xiao, Rashid Mijumbi. 2731-2739 [doi]
- What is wrecking your data plan? A measurement study of mobile web overheadAbner Mendoza, Kapil Singh, Guofei Gu. 2740-2748 [doi]
- Measuring the mixing time of a networkXenofon Foukas, Antonio Carzaniga, Alexander L. Wolf. 2749-2757 [doi]
- Ricci curvature of the Internet topologyChien-Chun Ni, Yu-Yao Lin, Jie Gao, Xianfeng David Gu, Emil Saucan. 2758-2766 [doi]
- Network-side positioning of cellular-band devices with minimal effortAyon Chakraborty, Luis E. Ortiz, Samir R. Das. 2767-2775 [doi]
- A fistful of pings: Accurate and lightweight anycast enumeration and geolocationDanilo Cicalese, Diana Joumblatt, Dario Rossi, Marc-Olivier Buob, Jordan Augé, Timur Friedman. 2776-2784 [doi]
- Fingerprint-free tracking with dynamic enhanced field divisionQingquan Zhang, Ziqiao Zhou, Wei Xu, Jing Qi, Chenxi Guo, Ping Yi, Ting Zhu, Sheng Xiao. 2785-2793 [doi]
- Noise-tolerant localization from incomplete range measurements for wireless sensor networksFu Xiao, Chaoheng Sha, Lei Chen, Lijuan Sun, Ruchuan Wang. 2794-2802 [doi]
- Providing long-term participation incentive in participatory sensingLin Gao, Fen Hou, Jianwei Huang. 2803-2811 [doi]
- Incentivize crowd labeling under budget constraintQi Zhang, Yutian Wen, Xiaohua Tian, Xiaoying Gan, Xinbing Wang. 2812-2820 [doi]
- The importance of being earnest in crowdsourcing systemsAlberto Tarable, Alessandro Nordio, Emilio Leonardi, Marco Ajmone Marsan. 2821-2829 [doi]
- Truthful incentive mechanisms for crowdsourcingXiang Zhang, Guoliang Xue, Ruozhou Yu, Dejun Yang, Jian Tang. 2830-2838 [doi]