Abstract is missing.
- BOLA: Near-optimal bitrate adaptation for online videosKevin Spiteri, Rahul Urgaonkar, Ramesh K. Sitaraman. 1-9 [doi]
- Task allocation for distributed stream processingRaphael Eidenbenz, Thomas Locher. 1-9 [doi]
- MaxWeight scheduling: "Smoothness" of the service processRahul Singh, Alexander L. Stolyar. 1-9 [doi]
- SAMPO: Online subflow association for multipath TCP with partial flow recordsYang Zhang, Hesham Mekky, Zhi-Li Zhang, Fang Hao, Sarit Mukherjee, T. V. Lakshman. 1-9 [doi]
- Price-based friendly jamming in a MISO interference wiretap channelPeyman Siyari, Marwan Krunz, Diep N. Nguyen. 1-9 [doi]
- Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcingGaoqiang Zhuo, Qi Jia, Linke Guo, Ming Li, Pan Li. 1-9 [doi]
- On the relative de-anonymizability of graph data: Quantification and evaluationShouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah. 1-9 [doi]
- Flash-Loc: Flashing mobile phones for accurate indoor localizationFan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda Zhu, Dong Xuan. 1-9 [doi]
- Online job allocation with hard allocation ratio requirementHan Deng, I-Hong Hou. 1-9 [doi]
- Traffic at-a-glance: Time-bounded analytics on large visual traffic dataXinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan, Biao Chen. 1-9 [doi]
- Continuous and fine-grained breathing volume monitoring from afar using wireless signalsPhuc Nguyen, Xinyu Zhang, Ann C. Halbower, Tam Vu. 1-9 [doi]
- Top-k queries for multi-category RFID systemsXiulong Liu, Keqiu Li, Jie Wu, Alex X. Liu, Xin Xie, Chunsheng Zhu, Weilian Xue. 1-9 [doi]
- Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requestsAdriano Di Luzio, Alessandro Mei, Julinda Stefa. 1-9 [doi]
- Optimizing restoration with segment routingFang Hao, Murali S. Kodialam, T. V. Lakshman. 1-9 [doi]
- On consistent migration of flows in SDNsSebastian Brandt, Klaus-Tycho Förster, Roger Wattenhofer. 1-9 [doi]
- FitLoc: Fine-grained and low-cost device-free localization for multiple targets over various areasLiqiong Chang, XiaoJiang Chen, Yu Wang, Dingyi Fang, Ju Wang, Tianzhang Xing, Zhanyong Tang. 1-9 [doi]
- PSync: Visible light-based time synchronization for Internet of Things (IoT)Xiang-Fa Guo, Mobashir Mohammad, Sudipta Saha, Mun Choon Chan, Seth Gilbert, Derek Leong. 1-9 [doi]
- Non-asymptotic delay bounds for (k, l) fork-join systems and multi-stage fork-join networksMarkus Fidler, Yuming Jiang. 1-9 [doi]
- Contextual, flow-based access control with scalable host-based SDN techniquesCurtis R. Taylor, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue. 1-9 [doi]
- SCMon: Leveraging segment routing to improve network monitoringFrancois Aubry, David Lebrun, Stefano Vissicchio, Minh Thanh Khong, Yves Deville, Olivier Bonaventure. 1-9 [doi]
- Information source detection in networks: Possibility and impossibility resultsKai Zhu, Lei Ying. 1-9 [doi]
- Exploiting channel diversity for rate adaptation in backscatter communication networksWei Gong, Haoxiang Liu, Kebin Liu, Qiang Ma, Yunhao Liu. 1-9 [doi]
- Mosaic: A low-cost mobile sensing system for urban air quality monitoringYi Gao, Wei Dong, Kai Guo, Xue Liu, Yuan Chen, Xiaojin Liu, Jiajun Bu, Chun Chen. 1-9 [doi]
- FOUM: A flow-ordered consistent update mechanism for software-defined networking in adversarial settingsJingyu Hua, Xin Ge, Sheng Zhong. 1-9 [doi]
- Optimal local data exchange in fiber-wireless access network: A joint network coding and device association designJin Wang, Kejie Lu, Jianping Wang, Chunming Qiao. 1-9 [doi]
- Scheduling for cloud-based computing systems to support soft real-time applicationsYuhuan Du, Gustavo de Veciana. 1-9 [doi]
- MED: The Monitor-Emulator-Debugger for Software-Defined NetworksQuanquan Zhi, Wei Xu. 1-9 [doi]
- Heavy-traffic analysis of QoE optimality for on-demand video streams over fading channelsPing-Chun Hsieh, I-Hong Hou. 1-9 [doi]
- DDoS attack detection under SDN contextYang Xu, Yong Liu. 1-9 [doi]
- Kraken: Online and elastic resource reservations for multi-tenant datacentersCarlo Fuerst, Stefan Schmid, P. Lalith Suresh, Paolo Costa. 1-9 [doi]
- Apps on the move: A fine-grained analysis of usage behavior of mobile appsLin Yang, Mingxuan Yuan, Wei Wang, Qian Zhang, Jia Zeng. 1-9 [doi]
- Node-based service-balanced scheduling for provably guaranteed throughput and evacuation time performanceBo Ji, Gagan Raj Gupta, Yu Sang. 1-9 [doi]
- Moving tag detection via physical layer analysis for large-scale RFID systemsChuyu Wang, Lei Xie, Wei Wang 0002, Tao Xue, Sanglu Lu. 1-9 [doi]
- GEM: An analytic geometrical approach to fast event matching for multi-dimensional content-based publish/subscribe servicesWenhao Fan, Yuan'an Liu, Bihua Tang. 1-9 [doi]
- A unified framework for automatic quality-of-experience optimization in mobile video streamingYan Liu, Jack Y. B. Lee. 1-9 [doi]
- Compiling packet forwarding rules for switch pipelined architectureSalaheddine Hamadi, Khalil Blaiech, Petko Valtchev, Omar Cherkaoui, Radu State. 1-9 [doi]
- Proactive patrol dispatch surveillance system by inferring mobile trajectories of multiple intruders using binary proximity sensorsDahee Jeong, Minkyoung Cho, Omprakash Gnawali, HyungJune Lee. 1-9 [doi]
- Inductive coloring: Implementing basic communication primitives with Rayleigh-fading interferenceYuexuan Wang, Dongxiao Yu, Qipeng Liu, Francis C. M. Lau. 1-9 [doi]
- Optimal wireless power transfer scheduling for delay minimizationFeng Shan, Junzhou Luo, Weiwei Wu, Xiaojun Shen. 1-9 [doi]
- Side-channel information leakage of encrypted video stream in video surveillance systemsHong Li, Yunhua He, Limin Sun, Xiuzhen Cheng, Jiguo Yu. 1-9 [doi]
- Network utility maximization with path cardinality constraintsYingjie Bi, Chee-Wei Tan, Ao Tang. 1-9 [doi]
- Accurate recovery of Internet traffic data: A tensor completion approachKun Xie, Lele Wang, Xin Wang 0001, Gaogang Xie, Jigang Wen, Guangxing Zhang. 1-9 [doi]
- RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacyQian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren. 1-9 [doi]
- Caching and operator cooperation policies for layered video content deliveryKonstantinos Poularakis, George Iosifidis, Antonios Argyriou, Iordanis Koutsopoulos, Leandros Tassiulas. 1-9 [doi]
- Tracker-assisted rate adaptation for MPEG DASH live streamingAndrea Detti, Bruno Ricci, Nicola Blefari-Melazzi. 1-9 [doi]
- AMIL: Localizing neighboring mobile devices through a simple gestureHao Han, Shanhe Yi, Qun Li, Guobin Shen, Yunxin Liu, Edmund Novak. 1-9 [doi]
- Dynamic routing for network throughput maximization in software-defined networksMeitian Huang, Weifa Liang, Zichuan Xu, Wenzheng Xu, Song Guo, Yinlong Xu. 1-9 [doi]
- Toward real-time and cooperative mobile visual sensing and sharingHuihui Chen, Bin Guo, Zhiwen Yu, Qi Han. 1-9 [doi]
- Resilient multi-user beamforming WLANs: Mobility, interference, and imperfect CSIOscar Bejarano, Roger Pierre Fabris Hoefel, Edward W. Knightly. 1-9 [doi]
- Localization of LTE measurement records with missing informationAvik Ray, Supratim Deb, Pantelis Monogioudis. 1-9 [doi]
- An efficient auction mechanism for service chains in the NFV marketSijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang. 1-9 [doi]
- The quest for resilient (static) forwarding tablesMarco Chiesa, Ilya Nikolaevskiy, Slobodan Mitrovic, Aurojit Panda, Andrei V. Gurtov, Aleksander Maidry, Michael Schapira, Scott Shenker. 1-9 [doi]
- No-cost distance estimation using standard WSN radiosGeorg von Zengen, Yannic Schröder, Stephan Rottmann, Felix Büsching, Lars C. Wolf. 1-9 [doi]
- Heavy-ball: A new approach to tame delay and convergence in wireless network optimizationJia Liu, Atilla Eryilmaz, Ness B. Shroff, Elizabeth S. Bentley. 1-9 [doi]
- Heavy hitters in streams and sliding windowsRan Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner. 1-9 [doi]
- Probabilistic demand allocation for cloud service brokerageChenxi Qiu, Haiying Shen, Liuhua Chen. 1-9 [doi]
- Wind blows, traffic flows: Green Internet routing under renewable energyYuan Yang, Dan Wang, Dawei Pan, Mingwei Xu. 1-9 [doi]
- Flowing with the water: On optimal monitoring of water distribution networks by mobile sensorsRong Du, Carlo Fischione, Ming Xiao. 1-9 [doi]
- A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networksXiaofan He, Huaiyu Dai, Peng Ning, Rudra Dutta. 1-9 [doi]
- Aggregation points planning for software-defined network based smart grid communicationsShaowei Wang, Xinxin Huang. 1-9 [doi]
- Smokey: Ubiquitous smoking detection with commercial WiFi infrastructuresXiaolong Zheng, Jiliang Wang, Longfei Shangguan, Zimu Zhou, Yunhao Liu. 1-9 [doi]
- Shadowing and coverage in poisson buildingsJunse Lee, Xinchen Zhang, François Baccelli. 1-9 [doi]
- Leveraging wearables for steering and driver trackingÇagdas Karatas, Luyang Liu, HongYu Li, Jian Liu, Yan Wang, Sheng Tan, Jie Yang 0003, Yingying Chen, Marco Gruteser, Richard P. Martin. 1-9 [doi]
- Coordinated caching in planet-scale CDNs: Analysis of feasibility and benefitsKianoosh Mokhtarian, Hans-Arno Jacobsen. 1-9 [doi]
- DAFEE: A Decomposed Approach for energy efficient networking in multi-radio multi-channel wireless networksLu Liu, Xianghui Cao, Wenlong Shen, Yu Cheng, Lin X. Cai. 1-9 [doi]
- A truthful pricing mechanism for sponsored content in wireless networksMatthew Andrews, Yue Jin, Martin I. Reiman. 1-9 [doi]
- DESIR: Decoy-enhanced seamless IP randomizationJianhua Sun, Kun Sun. 1-9 [doi]
- Jamming attack on in-band full-duplex communications: Detection and countermeasuresManjesh Kumar Hanawal, Diep N. Nguyen, Marwan Krunz. 1-9 [doi]
- A time-efficient rendezvous algorithm with a full rendezvous degree for heterogeneous cognitive radio networksBo Yang, Meng Zheng, Wei Liang. 1-9 [doi]
- Deadline-aware bandwidth sharing by allocating switch buffer in data center networksJiao Zhang. 1-9 [doi]
- Privacy-preserving crowdsourced spectrum sensingXiaocong Jin, Yanchao Zhang. 1-9 [doi]
- RAM: Radar-based activity monitorMd Abdullah Al Hafiz Khan, Ruthvik Kukkapalli, Piyush Waradpande, Sekar Kulandaivel, Nilanjan Banerjee, Nirmalya Roy, Ryan Robucci. 1-9 [doi]
- Graph-based privacy-preserving data publicationXiang-Yang Li, Chunhong Zhang, Taeho Jung, Jianwei Qian, Linlin Chen. 1-9 [doi]
- Is every flow on the right track?: Inspect SDN forwarding with RuleScopeKai Bu, Xitao Wen, Bo Yang, Yan Chen, Li Erran Li, Xiaolin Chen. 1-9 [doi]
- Spice: Socially-driven learning-based mobile media prefetchingChao Wu, Xu Chen, Yuezhi Zhou, Ningyuan Li, Xiaoming Fu, Yaoxue Zhang. 1-9 [doi]
- Wanda: Securely introducing mobile devicesTimothy J. Pierson, Xiaohui Liang, Ronald A. Peterson, David Kotz. 1-9 [doi]
- Secure outsourced skyline query processing via untrusted cloud service providersWenxin Chen, Mengjun Liu, Rui Zhang 0007, Yanchao Zhang, Shubo Liu. 1-9 [doi]
- Zephyr: Ubiquitous accurate multi-sensor fusion-based respiratory rate estimation using smartphonesHeba Aly, Moustafa Youssef. 1-9 [doi]
- TCP Ordo: The cost of ordered processing in TCP serversMohan Kumar, Ada Gavrilovska. 1-9 [doi]
- FLIP the (Flow) table: Fast lightweight policy-preserving SDN updatesStefano Vissicchio, Luca Cittadini. 1-9 [doi]
- Multi-user lax communications: A multi-armed bandit approachOrly Avner, Shie Mannor. 1-9 [doi]
- On demand elastic capacity planning for service auto-scalingPavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan. 1-9 [doi]
- Can the privacy of primary networks in shared spectrum be protected?Matthew Clark, Konstantinos Psounis. 1-9 [doi]
- iBGP2: A scalable iBGP redistribution mechanism leading to optimal routingMarc-Olivier Buob, Anthony Lambert, Steve Uhlig. 1-9 [doi]
- The S-Aloha capacity: Beyond the e-1 mythLuca Barletta, Flaminio Borgonovo, Ilario Filippini. 1-9 [doi]
- Providing bandwidth guarantees, work conservation and low latency simultaneously in the cloudShuihai Hu, Wei Bai 0001, Kai Chen 0005, Chen Tian, Ying Zhang, Haitao Wu. 1-9 [doi]
- Robust network tomography: K-Identifiability and monitor assignmentWei Ren, Wei Dong. 1-9 [doi]
- Deploying chains of virtual network functions: On the relation between link and server usageTung-Wei Kuo, Bang-Heng Liou, Kate Ching-Ju Lin, Ming-Jer Tsai. 1-9 [doi]
- Cloudlet load balancing in wireless metropolitan area networksMike Jia, Weifa Liang, Zichuan Xu, Meitian Huang. 1-9 [doi]
- A study of personal information in human-chosen passwords and its security implicationsYue Li, Haining Wang, Kun Sun. 1-9 [doi]
- A walk on the client side: Monitoring enterprise Wifi networks using smartphone channel scansJinghao Shi, Lei Meng, Aaron Striegel, Chunming Qiao, Dimitrios Koutsonikolas, Geoffrey Challen. 1-9 [doi]
- Approximation algorithms for wireless opportunistic spectrum scheduling in cognitive radio networksXiaoHua Xu, Min Song. 1-7 [doi]
- Optimizing coflow completion times with utility max-min fairnessLi Chen, Wei Cui, Baochun Li, Bo Li 0001. 1-9 [doi]
- Cyber maintenance policy optimization via adaptive learningYue Tan, Cathy H. Xia. 1-9 [doi]
- Anonymous addresses for efficient and resilient routing in F2F overlaysStefanie Roos, Martin Beck, Thorsten Strufe. 1-9 [doi]
- Mean-field-analysis of coding versus replication in cloud storage systemsBin Li, Aditya Ramamoorthy, R. Srikant. 1-9 [doi]
- Dynamic virtual machine management via approximate Markov decision processZhenhua Han, Haisheng Tan, Guihai Chen, Rui Wang, Yifan Chen, Francis C. M. Lau. 1-9 [doi]
- Panda: Neighbor discovery on a power harvesting budgetRobert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman. 1-9 [doi]
- An SDR-based experimental study of outband D2D communicationsArash Asadi, Vincenzo Mancuso, Rohit Gupta 0001. 1-9 [doi]
- Detecting and localizing end-to-end performance degradation for cellular data servicesFaraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan. 1-9 [doi]
- Cheetah: An efficient flat addressing scheme for fast query services in cloud computingYu Hua. 1-9 [doi]
- Social learning networks: Efficiency optimization for MOOC forumsChristopher G. Brinton, Swapna Buccapatnam, Felix Ming Fai Wong, Mung Chiang, H. Vincent Poor. 1-9 [doi]
- Detecting driver phone calls in a moving vehicle based on voice featuresTianyi Song, Xiuzhen Cheng, Hongjuan Li, Jiguo Yu, Shengling Wang, Rongfang Bie. 1-9 [doi]
- NetCodCCN: A network coding approach for content-centric networksJonnahtan Saltarin, Eirina Bourtsoulatze, Nikolaos Thomos, Torsten Braun. 1-9 [doi]
- Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image dataQian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du. 1-9 [doi]
- Successor: Proactive cache warm-up of destination hosts in virtual machine migration contextsTao Lu, Ping Huang, Morgan Stuart, Yuhua Guo, Xubin He, Ming Zhang. 1-9 [doi]
- Synergistic policy and virtual machine consolidation in cloud data centersLin Cui, Richard Cziva, Fung Po Tso, Dimitrios P. Pezaros. 1-9 [doi]
- L3: Sensing driving conditions for vehicle lane-level localization on highwaysZhichen Wu, Jianda Li, Jiadi Yu, Yanmin Zhu, Guangtao Xue, Minglu Li. 1-9 [doi]
- Performance-guaranteed strongly connected dominating sets in heterogeneous wireless sensor networksChunyan Liu, Hejiao Huang, Hongwei Du, Xiaohua Jia. 1-9 [doi]
- Scheduling with multi-level data locality: Throughput and heavy-traffic optimalityQiaomin Xie, Ali Yekkehkhany, Yi Lu. 1-9 [doi]
- Efficient Round-Trip Time monitoring in OpenFlow networksAlon Atary, Anat Bremler-Barr. 1-9 [doi]
- VADS: Visual attention detection with a smartphoneZhiping Jiang, Jinsong Han, Chen Qian, Wei Xi, Kun Zhao, Han Ding, ShaoJie Tang, Jizhong Zhao, Panlong Yang. 1-9 [doi]
- On signaling power: Communications over wireless energyRaul Gomez Cid-Fuentes, M. Yousof Naderi, Stefano Basagni, Kaushik R. Chowdhury, Albert Cabellos-Aparicio, Eduard AlarcĂłn. 1-9 [doi]
- Just-in-time WLANs: On-demand interference-managed WLAN infrastructuresKimin Lee, Yeonkeun Kim, Seokhyun Kim, Jinwoo Shin, Seungwon Shin, Song Chong. 1-9 [doi]
- BD-ZCS: Multi-cell interference coordination via Zadoff-Chu sequence-based block diagonalizationXueyuan Zhao, Dario Pompili. 1-9 [doi]
- QoE matters more than QoS: Why people stop watching cat videosHyunwoo Nam, Kyung-Hwa Kim, Henning Schulzrinne. 1-9 [doi]
- Dynamic SDN controller assignment in data center networks: Stable matching with transfersTao Wang, Fangming Liu, Jian Guo, Hong Xu. 1-9 [doi]
- A simple congestion-aware algorithm for load balancing in datacenter networksMehrnoosh Shafiee, Javad Ghaderi. 1-9 [doi]
- BattTracker: Enabling energy awareness for smartphone using Li-ion battery characteristicsJonghoe Koo, KiTaek Lee, Wonbo Lee, Yongseok Park, Sunghyun Choi. 1-9 [doi]
- Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximityZhihong Liu, Jiajia Liu, Nei Kato, Jianfeng Ma, Qiping Huang. 1-9 [doi]
- Macro-scale mobile app market analysis using customized hierarchical categorizationXi Liu, Han Hee Song, Mario Baldi, Pang-Ning Tan. 1-9 [doi]
- Queue-affectance-based scheduling in multi-hop wireless networks under SINR interference constraintsChanghee Joo, Myeongseon Shin. 1-9 [doi]
- A decomposition principle for link and relay selection in dual-hop 60 GHz networksZhifeng He, Shiwen Mao. 1-9 [doi]
- GlassGesture: Exploring head gesture interface of smart glassesShanhe Yi, Zhengrui Qin, Edmund Novak, Yafeng Yin, Qun Li. 1-9 [doi]
- Joint optimization for cell configuration and offloading in heterogeneous networksChan-Ching Hsu, J. Morris Chang, Yu-Wen Chen. 1-9 [doi]
- Privacy-preserving deep packet inspection in outsourced middleboxesXingliang Yuan, Xinyu Wang, Jianxiong Lin, Cong Wang. 1-9 [doi]
- A hierarchical edge cloud architecture for mobile computingLiang Tong, Yong Li, Wei Gao. 1-9 [doi]
- Efficient scheduling algorithms for on-demand wireless data broadcastZaixin Lu, Weili Wu, Wei Wayne Li, Miao Pan. 1-9 [doi]
- Measurement-based flow characterization in centrally controlled networksZdravko Bozakov, Amr Rizk, Divyashri Bhat, Michael Zink. 1-9 [doi]
- Sneak-Peek: High speed covert channels in data center networksRashid Tahir, Mohammad Taha Khan, Xun Gong, Adnan Ahmed, AmirEmad Ghassami, Hasanat Kazmi, Matthew Caesar, Fareed Zaffar, Negar Kiyavash. 1-9 [doi]
- Cost-aware Targeted Viral Marketing in billion-scale networksHung T. Nguyen, Thang N. Dinh, My T. Thai. 1-9 [doi]
- On the synchronization bottleneck of OpenStack Swift-like cloud storage systemsThierry Titcheu Chekam, Ennan Zhai, Zhenhua Li, Yong Cui, Kui Ren. 1-9 [doi]
- Placing dynamic content in caches with small populationMathieu Leconte, Georgios S. Paschos, Lazaros Gkatzikis, Moez Draief, Spyridon Vassilaras, Symeon Chouvardas. 1-9 [doi]
- Path computation in multi-layer networks: Complexity and algorithmsMohamed Lamine Lamali, Nasreddine Fergani, Johanne Cohen, HĂ©lia Pouyllau. 1-9 [doi]
- Deadlock-free local fast failover for arbitrary data center networksBrent Stephens, Alan L. Cox. 1-9 [doi]
- Enabling secure and effective near-duplicate detection over encrypted in-network storageHelei Cui, Xingliang Yuan, Yifeng Zheng, Cong Wang. 1-9 [doi]
- Streaming big data meets backpressure in distributed network computationApostolos Destounis, Georgios S. Paschos, Iordanis Koutsopoulos. 1-9 [doi]
- Achieving delay rate-function optimality in OFDM downlink with time-correlated channelsZhenzhi Qian, Bo Ji, Kannan Srinivasan, Ness B. Shroff. 1-9 [doi]
- Demultiplexing activities of daily living in IoT enabled smarthomesPalanivel A. Kodeswaran, Ravindranath Kokku, Madhumita Mallick, Sayandeep Sen. 1-9 [doi]
- Quality of video oriented pricing incentive for mobile video offloadingHonghai Wu, Liang Liu, Xi Zhang, Huadong Ma. 1-9 [doi]
- Scheduling jobs with non-uniform demands on multiple servers without interruptionSungjin Im, Mina Naghshnejad, Mukesh Singhal. 1-9 [doi]
- To delay or not: Temporal vaccination games on networksAbhijin Adiga, Srini Venkat, Anil Vullikanti. 1-9 [doi]
- De-anonymizing social networks and inferring private attributes using knowledge graphsJianwei Qian, Xiang-Yang Li, Chunhong Zhang, Linlin Chen. 1-9 [doi]
- F.Live: Towards interactive live broadcast FTV experienceShannon Chen, Zhenhuan Gao, Klara Nahrstedt. 1-9 [doi]
- MobTrack: Locating indoor interfering radios with a single deviceChanglai Du, Ruide Zhang, Wenjing Lou, Y. Thomas Hou. 1-9 [doi]
- Variability-aware request replication for latency curtailmentZhan Qiu, Juan F. PĂ©rez, Peter G. Harrison. 1-9 [doi]
- PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statisticsJingchao Sun, Rui Zhang 0007, Jinxue Zhang, Yanchao Zhang. 1-9 [doi]
- Towards efficient content-aware search over encrypted outsourced data in cloudZhangjie Fu, Xingming Sun, Sai Ji, Guowu Xie. 1-9 [doi]
- Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gainYuan Zhang, Siyuan Tang, Tingting Chen, Sheng Zhong. 1-9 [doi]
- Uber-in-light: Unobtrusive visible light communication leveraging complementary color channelMostafa Izz, Zhong Yuan Li, Hongbo Liu, Yingying Chen, Feng Li. 1-9 [doi]
- An O(1)-competitive online caching algorithm for content centric networkingAmmar Gharaibeh, Abdallah Khreishah, Issa Khalil. 1-9 [doi]
- Controlling flow reconfigurations in SDNStefano Paris, Apostolos Destounis, Lorenzo Maggi, Georgios S. Paschos, Jérémie Leguay. 1-9 [doi]
- An economical and SLO-guaranteed cloud storage service across multiple cloud service providersGuoxin Liu, Haiying Shen. 1-9 [doi]
- Dynamic control channel MAC for underwater cognitive acoustic networksYu Luo, Lina Pu, Zheng Peng, Jun-Hong Cui. 1-9 [doi]
- Augmenting wide-band 802.11 transmissions via unequal packet bit protectionYaxiong Xie, Zhenjiang Li, Mo Li, Kyle Jamieson. 1-9 [doi]
- Antenna orientation and range assignment in WSNs with directional antennasTien Tran, Min Kyung An, Dung T. Huynh. 1-9 [doi]
- SoftLight: Adaptive visible light communication over screen-camera linksWan Du, Jansen Christian Liando, Mo Li. 1-9 [doi]
- SpecWatch: Adversarial spectrum usage monitoring in CRNs with unknown statisticsMing Li, Dejun Yang, Jian Lin, Ming Li, Jian Tang. 1-9 [doi]
- UrbanEye: An outdoor localization system for public transportRohit Verma, Aviral Shrivastava, Bivas Mitra, Sujoy Saha, Niloy Ganguly, Subrata Nandi, Sandip Chakraborty. 1-9 [doi]
- OPTAS: Decentralized flow monitoring and scheduling for tiny tasksZiyang Li, Yiming Zhang, Dongsheng Li, Kai Chen 0005, Yuxing Peng. 1-9 [doi]
- Incentive mechanism for proximity-based Mobile Crowd Service systemsHonggang Zhang, Benyuan Liu, Hengky Susanto, Guoliang Xue, Tong Sun. 1-9 [doi]
- Opportunistic WiFi offloading in a vehicular environment: Waiting or downloading now?Ning Wang, Jie Wu. 1-9 [doi]
- Distributed load shedding with minimum energyKostas Choumas, Georgios S. Paschos, Thanasis Korakis, Leandros Tassiulas. 1-9 [doi]
- Battery-free sensing platform for wearable devices: The synergy between two feetQianyi Huang, Yan Mei, Wei Wang, Qian Zhang. 1-9 [doi]
- Distributed deterministic broadcasting algorithms under the SINR modelXiang Tian, Jiguo Yu, Liran Ma, Guangshun Li, Xiuzhen Cheng. 1-9 [doi]
- BlueAer: A fine-grained urban PM2.5 3D monitoring system using mobile sensingYidan Hu, Guojun Dai, Jin Fan, Yifan Wu, Hua Zhang. 1-9 [doi]
- Cooperative data offloading in opportunistic mobile networksZongqing Lu, Xiao Sun, Thomas F. La Porta. 1-9 [doi]
- Blending on-demand and spot instances to lower costs for in-memory storageZichen Xu, Christopher Stewart, Nan Deng, Xiaorui Wang. 1-9 [doi]
- Stochastic geometric analysis of handoffs in user-centric cooperative wireless networksWei Bao, Ben Liang. 1-9 [doi]
- Secure fingertip mouse for mobile devicesZhen Ling, Junzhou Luo, Qi Chen, Qinggang Yue, Ming Yang, Wei Yu 0002, Xinwen Fu. 1-9 [doi]
- Understanding security group usage in a public IaaS cloudCheng Jin, Abhinav Srivastava, Zhi-Li Zhang. 1-9 [doi]
- A utility optimization approach to network cache designMostafa Dehghan, Laurent Massoulié, Don Towsley, Daniel S. Menasché, Y. C. Tay. 1-9 [doi]
- Incentivizing spectrum sensing in database-driven dynamic spectrum sharingBo Gao, Sudeep Bhattarai, Jung-Min "Jerry" Park, Yaling Yang, Min Liu, Kexiong Curtis Zeng, Yanzhi Dou. 1-9 [doi]
- Symbiosis: Network-aware task scheduling in data-parallel frameworksJingjie Jiang, Shiyao Ma, Bo Li 0001, Baochun Li. 1-9 [doi]
- Experimental evaluation of large scale WiFi multicast rate controlVarun Gupta, Craig Gutterman, Yigal Bejerano, Gil Zussman. 1-9 [doi]
- Modeling, performance analysis, and optimization of single hop IEEE 802.11 networks with large propagation delays: Challenges and solutionsAbhijit Bhattacharya, Anurag Kumar 0001. 1-9 [doi]
- Murphy loves CI: Unfolding and improving constructive interference in WSNsVijay S. Rao, M. Koppal, R. Venkatesha Prasad, Tamma V. Prabhakar, Chayan Sarkar, Ignas G. Niemegeers. 1-9 [doi]
- WiFi can be the weakest link of round trip network latency in the wildChanghua Pei, Youjian Zhao, Guo Chen, Ruming Tang, Yuan Meng, Minghua Ma, Ken Ling, Dan Pei. 1-9 [doi]
- A PTAS to minimize mobile sensor movement for target coverage problemZhiyin Chen, Xiaofeng Gao, Fan Wu, Guihai Chen. 1-9 [doi]
- Cache increases the capacity of wireless networksLi Qiu, Guohong Cao. 1-9 [doi]
- Radiation constrained wireless charger placementHaipeng Dai, Yunhuai Liu, Alex X. Liu, Lingtao Kong, Guihai Chen, Tian He. 1-9 [doi]
- Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacentersLei Yu, Zhipeng Cai. 1-9 [doi]
- Power adjustment and scheduling in OFDMA femtocell networksMichael Lin, Novella Bartolini, Thomas F. La Porta. 1-9 [doi]
- A QoS-enabled holistic optimization framework for LTE-Advanced heterogeneous networksRajarajan Sivaraj, Ioannis Broustis, N. K. Shankaranarayanan, Vaneet Aggarwal, Rittwik Jana, Prasant Mohapatra. 1-9 [doi]
- Tuning by turning: Enabling phased array signal processing for WiFi with inertial sensorsKun Qian, Chenshu Wu, Zheng Yang, Zimu Zhou, Xu Wang, Yunhao Liu. 1-9 [doi]
- Multi-view coding and routing of local features in Visual Sensor NetworksAlessandro Enrico Redondi, Luca Baroffio, Matteo Cesana, Marco Tagliasacchi. 1-9 [doi]
- T-Update: A tree-structured update scheme with top-down transmission in erasure-coded systemsXiaoqiang Pei, Yijie Wang, Xingkong Ma, Fangliang Xu. 1-9 [doi]
- Optimal downlink and uplink user association in backhaul-limited HetNetsNikolaos Sapountzis, Thrasyvoulos Spyropoulos, Navid Nikaein, Umer Salim. 1-9 [doi]
- When group-buying meets cloud computingJuntao Wang, Xun Xiao, Jianping Wang, Kejie Lu, Xiaotie Deng, Ashwin Gumaste. 1-9 [doi]
- Decoding interfering signals with fewer receiving antennasZhao Li, Xiaoqin Dai, Kang G. Shin. 1-9 [doi]
- On applying fault detectors against false data injection attacks in cyber-physical control systemsQuyen Dinh Vu, Rui Tan, David K. Y. Yau. 1-9 [doi]
- ARS: Cross-layer adaptive request scheduling to mitigate TCP incast in data center networksJiawei Huang, Tian He, Yi Huang, Jianxin Wang. 1-9 [doi]
- Client as a first-class citizen: Practical user-centric network MIMO clusteringWei-Liang Shen, Kate Ching-Ju Lin, Ming-Syan Chen, Kun Tan. 1-9 [doi]
- On the modeling and optimization of short-term performance for real-time wireless networksI-Hong Hou. 1-9 [doi]
- An online mechanism for dynamic virtual cluster provisioning in geo-distributed cloudsWeijie Shi, Chuan Wu, Zongpeng Li. 1-9 [doi]
- An antithetic coupling approach to multi-chain based CSMA scheduling algorithmsJaewook Kwak, Do Young Eun. 1-9 [doi]
- Adaptive connected dominating set discovering algorithm in energy-harvest sensor networksTuo Shi, Siyao Cheng, Zhipeng Cai, Jianzhong Li. 1-9 [doi]
- To live or to die: Encountering conflict information dissemination over simple networksJie Wang, Wenye Wang. 1-9 [doi]
- JurCast: Joint user and rate allocation for video multicast over multiple APsHui Wang, Wei Tsang Ooi, Mun Choon Chan. 1-9 [doi]
- CeilingCast: Energy efficient and location-bound broadcast through LED-camera communicationJie Hao, Yanbing Yang, Jun Luo. 1-9 [doi]
- CompoundEyes: Near-duplicate detection in large scale online video systems in the cloudYixin Chen, Wenbo He, Yu Hua, Wen Wang. 1-9 [doi]
- Demographics inference through Wi-Fi network traffic analysisHuaxin Li, Zheyu Xu, Haojin Zhu, Di Ma, Shuai Li, Kai Xing. 1-9 [doi]
- Online multi-resource allocation for deadline sensitive jobs with partial values in the cloudZizhan Zheng, Ness B. Shroff. 1-9 [doi]
- Rot at the roots? Examining public timing infrastructureKanthaiah Vijayalayan, Darryl Veitch. 1-9 [doi]
- Practical antenna selection for WLAN APSeungmin Yoo, Seongwon Kim, Youngwook Son, Jaehong Yi, Sunghyun Choi. 1-9 [doi]
- Resource pooling in CDMA cell-based systems through uplink power controlAntonis Dimakis, Spyros Papafragkos. 1-9 [doi]
- CU-LTE: Spectrally-efficient and fair coexistence between LTE and Wi-Fi in unlicensed bandsZhangyu Guan, Tommaso Melodia. 1-9 [doi]
- Friendly channel-oblivious jamming with error amplification for wireless networksZhenghao Zhang, Avishek Mukherjee. 1-9 [doi]
- Crowdlet: Optimal worker recruitment for self-organized mobile crowdsourcingLingjun Pu, Xu Chen, Jingdong Xu, Xiaoming Fu. 1-9 [doi]
- Distributed optimization in energy harvesting sensor networks with dynamic in-network data processingShusen Yang, Yad Tahir, Po-Yu Chen, Alan Marshall, Julie A. McCann. 1-9 [doi]
- Cluster-aided mobility predictionsJaeseong Jeong, Mathieu Leconte, Alexandre Proutière. 1-9 [doi]
- DualSync: Taming clock skew variation for synchronization in low-power wireless networksMeng Jin, Tianzhang Xing, XiaoJiang Chen, Xin Meng, Dingyi Fang, Yuan He. 1-9 [doi]
- Interference-aware time-based fairness for multihop wireless networksDouglas M. Blough, Giovanni Resta, Paolo Santi. 1-9 [doi]
- Efficient and flexible crowdsourcing of specialized tasks with precedence constraintsAvhishek Chatterjee, Michael Borokhovich, Lav R. Varshney, Sriram Vishwanath. 1-9 [doi]
- MMPTCP: A multipath transport protocol for data centersMorteza Kheirkhah, Ian Wakeman, George Parisis. 1-9 [doi]
- Survivability in time-varying networksQingkai Liang, Eytan Modiano. 1-9 [doi]
- Topology optimization for galvanic coupled wireless intra-body communicationMeenupriya Swaminathan, Ufuk Muncuk, Kaushik R. Chowdhury. 1-9 [doi]
- DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networksXueshu Zheng, Shuailing Yang, Naigao Jin, Lei Wang 0005, Mathew L. Wymore, Daji Qiao. 1-9 [doi]
- Dynamic power allocation in MIMO fading systems without channel distribution informationHao Yu, Michael J. Neely. 1-9 [doi]
- Ubiquitous tagless object locating with ambient harmonic tagsYunfei Ma, Edwin C. Kan. 1-9 [doi]
- Software defined networks: It's about timeTal Mizrahi, Yoram Moses. 1-9 [doi]
- CamK: A camera-based keyboard for small mobile devicesYafeng Yin, Qun Li, Lei Xie, Shanhe Yi, Edmund Novak, Sanglu Lu. 1-9 [doi]
- Characterizing IPv6 control and data plane stabilityIoana Livadariu, Ahmed Elmokashfi, Amogh Dhamdhere. 1-9 [doi]
- Multicast traffic engineering for software-defined networksLiang-Hao Huang, Hsiang-Chun Hsu, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen. 1-9 [doi]
- Taming collisions for delay reduction in low-duty-cycle wireless sensor networksLong Cheng, Yu Gu 0001, Jianwei Niu, Ting Zhu, Cong Liu, Qingquan Zhang, Tian He. 1-9 [doi]
- Revisiting congestion control for multipath TCP with shared bottleneck detectionSimone Ferlin, Ă–zgĂĽ Alay, Thomas Dreibholz, David A. Hayes, Michael Welzl. 1-9 [doi]
- Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysisJialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin. 1-9 [doi]
- Using crowdsourced data in location-based social networks to explore influence maximizationJi Li, Zhipeng Cai, Mingyuan Yan, Yingshu Li. 1-9 [doi]
- Profit maximization for multiple products in online social networksHuiyuan Zhang, Huiling Zhang, Alan Kuhnle, My T. Thai. 1-9 [doi]
- Performance-guaranteed approximation algorithm for fault-tolerant connected dominating set in wireless networksZhao Zhang, Jiao Zhou, Yuchang Mo, Ding-Zhu Du. 1-8 [doi]
- CASE: Cache-assisted stretchable estimator for high speed per-flow measurementYang Li, Hao Wu, Tian Pan, Huichen Dai, Jianyuan Lu, Bin Liu. 1-9 [doi]
- Popularity-driven content cachingSuoheng Li, Jie Xu 0001, Mihaela van der Schaar, Weiping Li. 1-9 [doi]
- Oblivious neighbor discovery for wireless devices with directional antennasLin Chen 0002, Yong Li, Athanasios V. Vasilakos. 1-9 [doi]
- High-rate flicker-free screen-camera communication with spatially adaptive embeddingViet Nguyen, Yaqin Tang, Ashwin Ashok, Marco Gruteser, Kristin J. Dana, Wenjun Hu, Eric Wengrowski, Narayan B. Mandayam. 1-9 [doi]
- Cache content-selection policies for streaming video servicesStefan Dernbach, Nina Taft, Jim Kurose, Udi Weinsberg, Christophe Diot, Azin Ashkan. 1-9 [doi]
- Accurate WiFi packet delivery rate estimation and applicationsMuhammad Owais Khan, Lili Qiu. 1-9 [doi]
- Rapid convergence versus policy expressiveness in interdomain routingAlexander J. T. Gurney, Sanjeev Khanna, Yang Li. 1-9 [doi]
- From rateless to sampleless: Wi-Fi connectivity made energy efficientWei Wang, Yingjie Chen, Lu Wang, Qian Zhang. 1-9 [doi]
- Practical and secure nearest neighbor search on encrypted large-scale dataBoyang Wang, Yantian Hou, Ming Li. 1-9 [doi]
- Energy-efficient dynamic offloading and resource scheduling in mobile cloud computingSongtao Guo, Bin Xiao, Yuanyuan Yang, Yang Yang. 1-9 [doi]
- Wisent: Robust downstream communication and storage for computational RFIDsJethro Tan, Przemyslaw Pawelczak, Aaron N. Parks, Joshua R. Smith. 1-9 [doi]
- Estimation method for the delay performance of closed-loop flow control with application to TCPRalf LĂĽbben, Markus Fidler. 1-9 [doi]
- Incentivizing crowdsourcing systems with network effectsYanjiao Chen, Baochun Li, Qian Zhang. 1-9 [doi]
- EyeVeri: A secure and usable approach for smartphone user authenticationChen Song, Aosen Wang, Kui Ren, Wenyao Xu. 1-9 [doi]
- TDS: Time-dependent sponsored data plan for wireless data traffic marketLiang Zhang, Weijie Wu, Dan Wang. 1-9 [doi]
- The impact of unlicensed access on small-cell resource allocationCheng Chen, Randall A. Berry, Michael L. Honig, Vijay G. Subramanian. 1-9 [doi]
- Capacitated kinetic clustering in mobile networks by optimal transportation theoryChien-Chun Ni, Zhengyu Su, Jie Gao, Xianfeng David Gu. 1-9 [doi]
- Terminal-set-enhanced community detection in social networksGuangmo Tong, Lei Cui, Weili Wu, Cong Liu, Ding-Zhu Du. 1-9 [doi]
- Multi-source variable-rate sampled signal reconstructions in vehicular CPSAndrew Fox, B. V. K. Vijaya Kumar, Fan Bai. 1-9 [doi]
- Pulses in the sand: Impulse response analysis of wireless underground channelAbdul Salam, Mehmet Can Vuran, Suat Irmak. 1-9 [doi]
- Adwords management for third-parties in SEM: An optimisation model and the potential of TwitterDong Wang, Zhenyu Li, Gaogang Xie, Mohamed Ali Kâafar, Kavé Salamatian. 1-9 [doi]
- Efficiency and optimality of largest deficit first prioritization: Resource allocation for real-time applicationsYuhuan Du, Gustavo de Veciana. 1-9 [doi]
- BOOST: Base station ON-OFF switching strategy for energy efficient massive MIMO HetNetsMingjie Feng, Shiwen Mao, Tao Jiang 0002. 1-9 [doi]
- Economics of public Wi-Fi monetization and advertisingHaoran Yu, Man Hon Cheung, Lin Gao, Jianwei Huang. 1-9 [doi]
- How cars talk louder, clearer and fairer: Optimizing the communication performance of connected vehicles via online synchronous controlXi Chen, Linghe Kong, Xue Liu, Lei Rao, Fan Bai, Qiao Xiang. 1-9 [doi]
- Application-aware traffic scheduling for workload offloading in mobile cloudsLiang Tong, Wei Gao. 1-9 [doi]
- A novel framework for modeling and mitigating distributed link flooding attacksChristos Liaskos, Vasileios Kotronis, Xenofontas Dimitropoulos. 1-9 [doi]
- Temporal correlation of the RSS improves accuracy of fingerprinting localizationMei Wang, Zhehui Zhang, Xiaohua Tian, Xinbing Wang. 1-9 [doi]
- Network functions virtualization with soft real-time guaranteesYang Li, Linh Thi Xuan Phan, Boon Thau Loo. 1-9 [doi]
- Distributed spectral decomposition in networks by complex diffusion and quantum random walkKonstantin Avrachenkov, Philippe Jacquet, Jithin K. Sreedharan. 1-9 [doi]
- Update or wait: How to keep your data freshYin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, Can Emre Koksal, Ness B. Shroff. 1-9 [doi]
- Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networksYing Qiu, ShiNing Li, Xiangsen Xu, Zhigang Li. 1-9 [doi]
- VSync: Cloud based video streaming service for mobile devicesEilwoo Baik, Amit Pande, Zizhan Zheng, Prasant Mohapatra. 1-9 [doi]
- Randomized algorithms for scheduling VMs in the cloudJavad Ghaderi. 1-9 [doi]
- Nash equilibrium and the price of anarchy in priority based network routingBenjamin Grimmer, Sanjiv Kapoor. 1-9 [doi]
- Listen channel randomization for faster Wi-Fi direct device discoveryWeiping Sun, Changmok Yang, Sunggeun Jin, Sunghyun Choi. 1-9 [doi]
- TailCutter: Wisely cutting tail latency in cloud CDN under cost constraintsZeqi Lai, Yong Cui, Minming Li, Zhenhua Li, Ningwei Dai, Yuchi Chen. 1-9 [doi]
- Fiber optic vs. wireless sensors in energy-efficient integrated FiWi smart grid networks: An energy-delay and TCO comparisonDung Pham Van, Bhaskar prasad Rimal, Martin Maier. 1-9 [doi]
- Minimum cost seed set for competitive social influenceYuqing Zhu, Deying Li, Zhao Zhang. 1-9 [doi]
- A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networksCong Wang, Ji Li, Yuanyuan Yang, Fan Ye. 1-9 [doi]
- Exit equilibrium: Towards understanding voluntary participation in security gamesParinaz Naghizadeh, Mingyan Liu. 1-9 [doi]
- Pop-routing: Centrality-based tuning of control messages for faster route convergenceLeonardo Maccari, Renato Lo Cigno. 1-9 [doi]
- EMIT: An efficient MAC paradigm for the Internet of ThingsArjun Bakshi, Lu Chen, Kannan Srinivasan, Can Emre Koksal, Atilla Eryilmaz. 1-9 [doi]
- Online multi-stage decisions for robust power-grid operations under high renewable uncertaintyShizhen Zhao, Xiaojun Lin, Dionysios Aliprantis, Hugo N. Villegas, Minghua Chen. 1-9 [doi]
- HybridCell: Cellular connectivity on the fringes with demand-driven local cellsPaul Schmitt, Daniel Iland, Mariya Zheleva, Elizabeth M. Belding. 1-9 [doi]
- Flutter: Scheduling tasks closer to data across geo-distributed datacentersZhiming Hu, Baochun Li, Jun Luo. 1-9 [doi]
- Reducing access latency in erasure coded cloud storage with local block migrationYaochen Hu, Di Niu. 1-9 [doi]
- Computing network coded data coverage in an opportunistic data dissemination networkBrenton Walker. 1-9 [doi]
- Understanding sharded caching systemsLorenzo Saino, Ioannis Psaras, George Pavlou. 1-9 [doi]
- Frugal topology construction for stream aggregation in the cloudRachid Guerraoui, Erwan Le Merrer, Rhicheek Patra, Bao Duy Tran. 1-9 [doi]
- Coordinated multi-point transmissions based on interference alignment and neutralizationZhao Li, Sha Cui, Kang G. Shin, Jun Gu. 1-9 [doi]
- Timely wireless flows with arbitrary traffic patterns: Capacity region and scheduling algorithmsLei Deng, Chih-Chun Wang, Minghua Chen, Shizhen Zhao. 1-9 [doi]
- Mobility-aware real-time scheduling for low-power wireless networksBehnam Dezfouli, Marjan Radi, Octav Chipara. 1-9 [doi]
- High-precision shortest distance estimation for large-scale social networksJie Cheng, Yangyang Zhang, Qiang Ye, Hongwei Du. 1-9 [doi]
- Characterizing caching workload of a large commercial Content Delivery NetworkM. Zubair Shafiq, Amir R. Khakpour, Alex X. Liu. 1-9 [doi]
- An approximation algorithm for AP association under user migration cost constraintWangkit Wong, Avishek Thakur, S.-H. Gary Chan. 1-9 [doi]
- Random access signaling for network MIMO uplinkTeng Wei, Xinyu Zhang. 1-9 [doi]
- ENCORE: An energy-aware multicell cooperation in heterogeneous networks with content cachingYi-Han Chiang, Wanjiun Liao. 1-9 [doi]
- Reducing dense virtual networks for fast embeddingToru Mano, Takeru Inoue, Kimihiro Mizutani, Osamu Akashi. 1-9 [doi]
- Understanding and diagnosing real-world Femtocell performance problemsChunyi Peng, Yuanjie Li, Zhuoran Li, Jie Zhao, Jiaqi Xu. 1-9 [doi]
- Libra: Impact assessment of cellular load balancingKanthi Nagaraj, Ajay Mahimkar, Zihui Ge, Aman Shaikh, Jia Wang, Kevin Mohr, Mark Stockert. 1-9 [doi]
- Hybrid renewable energy routing for ISP networksJulien Mineraud, Liang Wang, Sasitharan Balasubramaniam, Jussi Kangasharju. 1-9 [doi]
- FOCUS: Shedding light on the high search response time in the wildDapeng Liu, Youjian Zhao, Kaixin Sui, Lei Zou, Dan Pei, Qingqian Tao, Xiyang Chen, Dai Tan. 1-9 [doi]
- Robust monitor placement for network tomography in dynamic networksTing He, Liang Ma, Athanasios Gkelias, Kin K. Leung, Ananthram Swami, Don Towsley. 1-9 [doi]
- Engineering traffic uncertainty in the OpenFlow data planeFei Chen, Chunming Wu, Xiaoyan Hong, Zhouhao Lu, Zhouhao Wang, Chang-Ting Lin. 1-9 [doi]
- CSMA networks in a many-sources regime: A mean-field approachFabio Cecchi, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting. 1-9 [doi]
- Cupid: Congestion-free consistent data plane update in software defined networksWen Wang, Wenbo He, Jinshu Su, Yixin Chen. 1-9 [doi]
- Sketch-based data placement among geo-distributed datacenters for cloud storagesBoyang Yu, Jianping Pan. 1-9 [doi]
- Nullification in the air: Interference neutralization in multi-hop wireless networksHuacheng Zeng, Xu Yuan, Xiaoqi Qin, Yi Shi, Y. Thomas Hou, Wenjing Lou. 1-9 [doi]
- Approximate matching of persistent LExicon using search-engines for classifying Mobile app trafficGyan Ranjan, Alok Tongaonkar, Ruben Torres. 1-9 [doi]