Abstract is missing.
- One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storageXuefeng Liu, Wenhai Sun, Wenjing Lou, Qingqi Pei, Yuqing Zhang. 1-9 [doi]
- On the rao-blackwellization and its application for graph sampling via neighborhood explorationChul-Ho Lee, Xin Xu, Do Young Eun. 1-9 [doi]
- Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysisHuanle Xu, Gustavo de Veciana, Wing Cheong Lau. 1-9 [doi]
- Conflict graph embedding for wireless network optimizationWenzhong Li, Jinggong Zhang, Yanchao Zhao. 1-9 [doi]
- Competitive analysis for online scheduling in software-defined optical WANSu Jia, Xin Jin, Golnaz Ghasemiesfeh, Jiaxin Ding, Jie Gao. 1-9 [doi]
- Low latency low loss streaming using in-network coding and cachingKazuhisa Matsuzono, Hitoshi Asaeda, Thierry Turletti. 1-9 [doi]
- Complexity vs. optimality: Unraveling source-destination connection in uncertain graphsXinzhe Fu, Zhiying Xu, Qianyang Peng, Luoyi Fu, Xinbing Wang. 1-9 [doi]
- Secure resource allocations for polarization-enabled cooperative cognitive radio networks with energy harvesting capabilityFei Wang, Xi Zhang. 1-9 [doi]
- Tag-compass: Determining the spatial direction of an object with small dimensionsJia Liu, Min Chen, Shigang Chen, Qing-feng Pan, Lijun Chen. 1-9 [doi]
- MASH: A rate adaptation algorithm for multiview video streaming over HTTPKhaled M. Diab, Mohamed Hefeeda. 1-9 [doi]
- Spatiotemporal modeling and prediction in cellular networks: A big data enabled deep learning approachJing Wang, Jian Tang, Zhiyuan Xu, Yanzhi Wang, Guoliang Xue, Xing Zhang, Dejun Yang. 1-9 [doi]
- Popularity-aware caching increases the capacity of wireless networksLi Qiu, Guohong Cao. 1-9 [doi]
- Unveiling polarization in social networks: A matrix factorization approachMd. Tanvir Al Amin, Charu Aggarwal, Shuochao Yao, Tarek F. Abdelzaher, Lance M. Kaplan. 1-9 [doi]
- Cluster fair queueing: Speeding up data-parallel jobs with delay guaranteesChen Chen, Wei Wang, Shengkai Zhang, Bo Li 0001. 1-9 [doi]
- Checks and balances: A tripartite public key infrastructure for secure web-based connectionsJing Chen 0003, Shixiong Yao, Quan Yuan, RuiYing Du, Guoliang Xue. 1-9 [doi]
- Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectoriesMarco Gramaglia, Marco Fiore, Alberto Tarable, Albert Banchs. 1-9 [doi]
- Group discovery time in device-to-device (D2D) proximity services (ProSe) networksDavid W. Griffith, Aziza Ben Mosbah, Richard Rouil. 1-9 [doi]
- Towards instantaneous collision and interference detection using in-band full duplexTom Vermeulen, Mihir Laghate, Ghaith Hattab, Danijela Cabric, Sofie Pollin. 1-9 [doi]
- Fractional wireless link scheduling and polynomial approximate capacity regions of wireless networksPeng-Jun Wan, Fahad Al-dhelaan, Huaqiang Yuan, Sai Ji. 1-9 [doi]
- +: An SDN-based WLAN monitoring and management frameworkRhongHo Jang, DongGyu Cho, Youngtae Noh, DaeHun Nyang. 1-9 [doi]
- Learning distributed representations for large-scale dynamic social networksAakas Zhiyuli, Xun Liang, Zhiming Xu. 1-9 [doi]
- Energy-delay tradeoff for request bundling on smartphonesAli Sehati, Majid Ghaderi. 1-9 [doi]
- TCP Rapid: From theory to practiceQianwen Yin, Jasleen Kaur, F. Donelson Smith. 1-9 [doi]
- ZipWeave: Towards efficient and reliable measurement based mobile coverage mapsMah-Rukh Fida, Andra Lutu, Mahesh K. Marina, Ozgu Alay. 1-9 [doi]
- Load balancing in large-scale systems with multiple dispatchersMark van der Boor, Sem C. Borst, Johan van Leeuwaarden. 1-9 [doi]
- Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion controlChen Tian, Ali Munir, Alex X. Liu, Yingtong Liu, Yanzhao Li, Jiajun Sun, Fan Zhang, Gong Zhang. 1-9 [doi]
- Stealth migration: Hiding virtual machines on the networkStefan Achleitner, Thomas F. La Porta, Patrick D. McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher, Constantin Serban. 1-9 [doi]
- Edge-based beaconing schedule in duty-cycled multihop wireless networksQuan Chen, Hong Gao, Yingshu Li, Siyao Cheng, Jianzhong Li. 1-9 [doi]
- Randomized admission policy for efficient top-k and frequency estimationRan Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner. 1-9 [doi]
- OpinionWalk: An efficient solution to massive trust assessment in online social networksGuangchi Liu, Qi Chen, Qing Yang 0003, Binhai Zhu, Honggang Wang, Wei Wang. 1-9 [doi]
- Better with fewer bits: Improving the performance of cardinality estimation of large data streamsQingjun Xiao, You Zhou, Shigang Chen. 1-9 [doi]
- Secret-sharing-based secure user recruitment protocol for mobile crowdsensingMingjun Xiao, Jie Wu 0001, Sheng Zhang, Jiapeng Yu. 1-9 [doi]
- Fusing RFID and computer vision for fine-grained object trackingChunhui Duan, Xing Rao, Lei Yang, Yunhao Liu. 1-9 [doi]
- Considering resource demand misalignments to reduce resource over-provisioning in cloud datacentersLiuhua Chen, Haiying Shen. 1-9 [doi]
- The efficiency of open access in platforms for networked cournot marketsJohn Z. F. Pang, Hu Fu, Won I. Lee, Adam Wierman. 1-9 [doi]
- A 2D heterogeneous rendezvous protocol for multi-wideband cognitive radio networksXingya Liu, Jiang Xie. 1-9 [doi]
- Network anti-spoofing with SDN data planeYehuda Afek, Anat Bremler-Barr, Lior Shafir. 1-9 [doi]
- On human mobility predictability via WLAN logsPaul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, Steve Romig, Wei Zhao 0001. 1-9 [doi]
- Detecting on-body devices through creeping wave propagationWei Wang 0050, Yingjie Chen, Lin Yang, Qian Zhang 0001. 1-9 [doi]
- Scalable bicriteria algorithms for the threshold activation problem in online social networksAlan Kuhnle, Tianyi Pan, Md Abdul Alim, My T. Thai. 1-9 [doi]
- Tracking mm-Wave channel dynamics: Fast beam training strategies under mobilityJoan Palacios, Danilo De Donno, Joerg Widmer. 1-9 [doi]
- LRC: Dependency-aware cache management for data analytics clustersYinghao Yu, Wei Wang, Jun Zhang, Khaled Ben Letaief. 1-9 [doi]
- Transparent cross-technology communication over data trafficWenchao Jiang, Zhimeng Yin, Song Mim Kim, Tian He. 1-9 [doi]
- A new stable peer-to-peer protocol with non-persistent peersOmer Bilgen, Aaron B. Wagner. 1-9 [doi]
- Towards reliable and lightweight source switching for datacenter networksFeng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa. 1-9 [doi]
- Online auction for IaaS clouds: Towards elastic user demands and weighted heterogeneous VMsJuan Li, Yanmin Zhu, Jiadi Yu, Chengnian Long, Guangtao Xue, Shiyou Qian. 1-9 [doi]
- Timely cloud gamingRoy D. Yates, Mehrnaz Tavan, Yi Hu, Dipankar Raychaudhuri. 1-9 [doi]
- DyMo: Dynamic monitoring of large scale LTE-Multicast systemsYigal Bejerano, Chandru Raman, Chun-Nam Yu, Varun Gupta, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman. 1-9 [doi]
- Fundamental limits of failure identifiability by boolean network tomographyNovella Bartolini, Ting He, Hana Khamfroush. 1-9 [doi]
- Beam-forecast: Facilitating mobile 60 GHz networks via model-driven beam steeringAnfu Zhou, Xinyu Zhang, Huadong Ma. 1-9 [doi]
- Traffic aware placement of interdependent NFV middleboxesWenrui Ma, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou. 1-9 [doi]
- BD-CAT: Balanced dynamic content addressing in treesStefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strafe. 1-9 [doi]
- SilentTalk: Lip reading through ultrasonic sensing on mobile phonesJiayao Tan, Cam-Tu Nguyen, Xiaoliang Wang. 1-9 [doi]
- MON: Mission-optimized overlay networksB. Spang, Anirudh Sabnis, Ramesh K. Sitaraman, Donald F. Towsley, Brian DeCleene. 1-9 [doi]
- Switch: Enabling transmitter and receiver participation in seamless lightweight controlChao-Fang Shih, Raghupathy Sivakumar. 1-9 [doi]
- Load balancing with bounded convergence in dynamic networksMichael Dinitz, Jeremy T. Fineman, Seth Gilbert, Calvin Newport. 1-9 [doi]
- mEEC: A novel error estimation code with multi-dimensional featureZhenghao Zhang, Piyush Kumar. 1-9 [doi]
- CENTURION: Incentivizing multi-requester mobile crowd sensingHaiming Jin, Lu Su, Klara Nahrstedt. 1-9 [doi]
- FEC for VoIP using dual-delay streaming codesAhmed Badr, Ashish Khisti, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos. 1-9 [doi]
- Sybil-proof incentive mechanisms for crowdsensingJian Lin, Ming Li, Dejun Yang, Guoliang Xue, Jian Tang. 1-9 [doi]
- Universal path tracing for large-scale sensor networksYi Gao, Wei Dong, Xiaoyu Zhang, Wenbin Wu. 1-9 [doi]
- Analysis of tandem PIT and CS with non-zero download delayHuichen Dai, Bin Liu 0001, Haowei Yuan, Patrick Crowley, Jianyuan Lu. 1-9 [doi]
- QDLCoding: QoS-differentiated low-cost video encoding scheme for online video serviceGuanyu Gao, Yonggang Wen, Han Hu. 1-9 [doi]
- ABSORB: Autonomous base station with optical reflex backhaul to adapt to fluctuating demandYu Nakayama, Takuya Tsutsumi, Kazuki Maruta, Kaoru Sezaki. 1-9 [doi]
- ER: Early recognition of inattentive driving leveraging audio devices on smartphonesXiangyu Xu, Hang Gao, Jiadi Yu, Yingying Chen 0001, Yanmin Zhu, Guangtao Xue, Minglu Li. 1-9 [doi]
- Economic viability of a virtual ISPLiang Zheng, Carlee Joe-Wong, Jiasi Chen, Christopher G. Brinton, Chee-Wei Tan, Mung Chiang. 1-9 [doi]
- Exploiting social influence for context-aware event recommendation in event-based social networksZhibo Wang, YongQuan Zhang, Yijie Li, Qian Wang 0002, Feng Xia. 1-9 [doi]
- Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centersRuozhou Yu, Guoliang Xue, Xiang Zhang 0005, Dan Li 0001. 1-9 [doi]
- On the latency-accuracy tradeoff in approximate MapReduce jobsJuan F. Pérez, Robert Birke, Lydia Y. Chen. 1-9 [doi]
- Optimising 5G infrastructure markets: The business of network slicingDario Bega, Marco Gramaglia, Albert Banchs, Vincenzo Sciancalepore, Konstantinos Samdanis, Xavier Pérez Costa. 1-9 [doi]
- Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINRJiguo Yu, Xueli Ning, Yunchuan Sun, Shengling Wang 0001, Yawei Wang. 1-9 [doi]
- Emerging internet content and service providers' relationships: Models and analyses of engineering, business and policy impactDebasis Mitra 0001, Qiong Wang, Ao Hong. 1-9 [doi]
- Measurement-based scheduler for multi-class QoE optimization in wireless networksArjun Anand, Gustavo de Veciana. 1-9 [doi]
- A parity check analog decoder for molecular communication based on biological circuitsAlessio Marcone, Massimiliano Pierobon, Maurizio Magarini. 1-9 [doi]
- Optimise web browsing on heterogeneous mobile platforms: A machine learning based approachJie Ren, Ling Gao, Hai Wang, Zheng Wang. 1-9 [doi]
- Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrievalQian Wang 0002, Shengshan Hu, Minxin Du, Jingjun Wang, Kui Ren 0001. 1-9 [doi]
- Energy-efficient joint communication-motion planning for relay-assisted wireless robot surveillanceYunlong Wu, Bo Zhang 0007, Shaoshi Yang, Xiaodong Yi, Xuejun Yang. 1-9 [doi]
- Performance optimization of Hadoop workflows in public clouds through adaptive task partitioningTong Shu, Chase Q. Wu. 1-9 [doi]
- Service chain embedding with maximum flow in software defined network and application to the next-generation cellular network architectureJian-Jhih Kuo, Shan-Hsiang Shen, Hongyu Kang, De-Nian Yang, Ming-Jer Tsai, Wen-Tsuen Chen. 1-9 [doi]
- Understanding source location privacy protocols in sensor networks via perturbation of time seriesMatthew Bradbury, Arshad Jhumka. 1-9 [doi]
- Design and application of a many-to-one communication protocolSudipta Saha, Mun Choon Chan. 1-9 [doi]
- CatCharger: Deploying wireless charging lanes in a metropolitan road network through categorization and clustering of vehicle trafficLi Yan, Haiying Shen, Juanjuan Zhao, Chengzhong Xu, Feng Luo, Chenxi Qiu. 1-9 [doi]
- Interconnecting heterogeneous devices in the personal mobile cloudYong Li, Wei Gao. 1-9 [doi]
- Mobile traffic forecasting for maximizing 5G network slicing resource utilizationVincenzo Sciancalepore, Konstantinos Samdanis, Xavier Pérez Costa, Dario Bega, Marco Gramaglia, Albert Banchs. 1-9 [doi]
- Riding the airways: Ultra-wideband ambient backscatter via commercial broadcast systemsChouchang Yang, Jeremy Gummeson, Alanson P. Sample. 1-9 [doi]
- Multihop calibration for mobile sensing: K-hop Calibratability and reference sensor deploymentKaibo Fu, Wei Ren, Wei Dong. 1-9 [doi]
- Beamforming in the body: Energy-efficient and collision-free communication for implantsMeenupriya Swaminathan, Anna Vizziello, Davy Duong, Pietro Savazzi, Kaushik R. Chowdhury. 1-9 [doi]
- Location-privacy-aware review publication mechanism for local business service systemsXu Zheng, Zhipeng Cai, Jianzhong Li, Hong Gao. 1-9 [doi]
- Your face your heart: Secure mobile face authentication with photoplethysmogramsYimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang 0007, Yanchao Zhang. 1-9 [doi]
- Crowdsourcing spectrum data decodingRoberto Calvo-Palomino, Domenico Giustiniano, Vincent Lenders, Aymen Fakhreddine. 1-9 [doi]
- On localizing urban events with InstagramPrasanna Giridhar, ShiGuang Wang, Tarek F. Abdelzaher, Raghu K. Ganti, Lance M. Kaplan, Jemin George. 1-9 [doi]
- Pilot-based full-duplex spectrum-sensing and multichannel-MAC over non-time-slotted cognitive radio networksWenchi Cheng, Xi Zhang, Hailin Zhang. 1-9 [doi]
- Scheduling jobs across geo-distributed datacenters with max-min fairnessLi Chen, Shuhao Liu, Baochun Li, Bo Li 0001. 1-9 [doi]
- iGuard: A real-time anti-theft system for smartphonesMeng Jin, Yuan He, Dingyi Fang, XiaoJiang Chen, Xin Meng, Tianzhang Xing. 1-9 [doi]
- QoE and power efficiency tradeoff for fog computing networks with fog node cooperationYong Xiao, Marwan Krunz. 1-9 [doi]
- Robust web service recommendation via quantile matrix factorizationRui Zhu, Di Niu, Zongpeng Li. 1-9 [doi]
- Accurate recovery of internet traffic data under dynamic measurementsKun Xie, Can Peng, Xin Wang 0001, Gaogang Xie, Jigang Wen. 1-9 [doi]
- Rethinking CDN design with distributee time-varying traffic demandsGuoming Tang, Kui Wu, Richard Brunner. 1-9 [doi]
- Energy-efficient W-layer for behavior-based implicit authentication on mobile devicesYingyuan Yang, Jinyuan Sun. 1-9 [doi]
- Network slicing games: Enabling customization in multi-tenant networksPablo Caballero Garces, Albert Banchs, Gustavo de Veciana, Xavier Pérez Costa. 1-9 [doi]
- Flier: Flow-level congestion-aware routing for direct-connect data centersAbdul Kabbani, Milad Sharif. 1-9 [doi]
- Verifiable social data outsourcingXin Yao 0002, Rui Zhang, Yanchao Zhang, Yaping Lin. 1-9 [doi]
- Harnessing hardware defects for improving wireless link performance: Measurements and applicationsAlireza Ameli Renani, Jun Huang, Guoliang Xing, Abdol-Hossein Esfahanian. 1-9 [doi]
- Stable user-defined prioritiesShay Vargaftik, Isaac Keslassy, Ariel Orda. 1-9 [doi]
- Optimal control for generalized network-flow problemsAbhishek Sinha, Eytan Modiano. 1-9 [doi]
- One more queue is enough: Minimizing flow completion time with explicit priority notificationYuanwei Lu, Guo Chen, Larry Luo, Kun Tan, Yongqiang Xiong, Xiaoliang Wang, Enhong Chen. 1-9 [doi]
- Multipath TCP for datacenters: From energy efficiency perspectiveJia Zhao, Jiangchuan Liu, Haiyang Wang, Chi Xu. 1-9 [doi]
- Minimizing flow statistics collection cost of SDN using wildcard requestsHongli Xu, Zhuolong Yu, Chen Qian 0001, Xiang-Yang Li, Zichun Liu. 1-9 [doi]
- SybilSCAR: Sybil detection in online social networks via local rule based propagationBinghui Wang, Le Zhang, Neil Zhenqiang Gong. 1-9 [doi]
- Efficient minimization of sum and differential costs on machines with job placement constraintsJaya Prakash Champati, Ben Liang. 1-9 [doi]
- Availability-aware mapping of service function chainsJingyuan Fan, Chaowen Guan, Yangming Zhao, Chunming Qiao. 1-9 [doi]
- Modeling and performance analysis of Wi-Fi networks coexisting with LTE-UAmr Abdelfattah, Naceur Malouch. 1-9 [doi]
- Keep your nice friends close, but your rich friends closer - Computation offloading using NFCKathleen Sucipto, Dimitris Chatzopoulos, Sokol Kosta, Pan Hui. 1-9 [doi]
- PHY assisted tree-based RFID identificationYuxiao Hou, Yuanqing Zheng. 1-9 [doi]
- An implantable low-power ultrasonic platform for the Internet of Medical ThingsGiuseppe Enrico Santagati, Tommaso Melodia. 1-9 [doi]
- Proactive retention aware cachingSamta Shukla, Alhussein A. Abouzeid. 1-9 [doi]
- Joint offloading and resource allocation for computation and communication in mobile cloud with computing access pointMeng-Hsi Chen, Ben Liang, Min Dong. 1-9 [doi]
- Knitter: Fast, resilient single-user indoor floor plan constructionRuipeng Gao, Bing Zhou, Fan Ye, Yizhou Wang. 1-9 [doi]
- Expect the unexpected: Sub-second optimization for segment routingSteven Gay, Renaud Hartert, Stefano Vissicchio. 1-9 [doi]
- Online job dispatching and scheduling in edge-cloudsHaisheng Tan, Zhenhua Han, Xiang-Yang Li, Francis C. M. Lau 0001. 1-9 [doi]
- STRALE: Mobility-aware PHY rate and frame aggregation length adaptation in WLANsSeongho Byeon, Kangjin Yoon, Changmok Yang, Sunghyun Choi. 1-9 [doi]
- Impacts of channel selection on industrial wireless sensor-actuator networksDolvara Gunatilaka, Mo Sha, Chenyang Lu. 1-9 [doi]
- WiZig: Cross-technology energy communication over a noisy channelXiuzhen Guo, Xiaolong Zheng, Yuan He 0004. 1-9 [doi]
- When data acquisition meets data analytics: A distributed active learning framework for optimal budgeted mobile crowdsensingQiang Xu, Rong Zheng. 1-9 [doi]
- Botnet protocol inference in the presence of encrypted trafficLorenzo De Carli, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha. 1-9 [doi]
- SatProbe: Low-energy and fast indoor/outdoor detection based on raw GPS processingKongyang Chen, Guang Tan. 1-9 [doi]
- CubeX: Leveraging glocality of cube-based networks for RAM-based key-value storeYiming Zhang, Dongsheng Li, Tian Tian, Ping Zhong. 1-9 [doi]
- Taming tail latency for erasure-coded, distributee storage systemsVaneet Aggarwal, Jingxian Fan, Tian Lan. 1-9 [doi]
- Malicious co-residency on the cloud: Attacks and defenseAhmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta, Patrick D. McDaniel, Lisa M. Marvel. 1-9 [doi]
- Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimizationXiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C. M. Lau 0001. 1-9 [doi]
- Convergence to multi-resource fairness under end-to-end window controlThomas Bonald, James W. Roberts, Christian Vitale. 1-9 [doi]
- STRM: A sister tweet reinforcement process for modeling hashtag popularityBidisha Samanta, Abir De, Niloy Ganguly. 1-9 [doi]
- Smart underground antenna arrays: A soil moisture adaptive beamforming approachAbdul Salam, Mehmet C. Vuran. 1-9 [doi]
- Mechanism design games for thwarting malicious behavior in crowdsourcing applicationsChun-Chi Liu, Shengling Wang 0001, Liran Ma, Xiuzhen Cheng, Rongfang Bie, Jiguo Yu. 1-9 [doi]
- ButterFly: Mobile collaborative rendering over GPU workload migrationChao Wu, Yaoxue Zhang, Lan Zhang, Bowen Yang, Xu Chen, Wenwu Zhu 0001, Lili Qiu. 1-9 [doi]
- Coexistence of Dedicated Short Range Communications (DSRC) and Wi-Fi: Implications to Wi-Fi performanceGaurang Naik, Jinshan Liu, Jung-Min Park 0001. 1-9 [doi]
- A game theoretic analysis of selfish mobile computation offloadingSladana Josilo, György Dán. 1-9 [doi]
- A simple re-sequencing load-balanced switch based on analytical packet reordering boundsSen Yang, Bill Lin, Paul Tune, Jun Jim Xu. 1-9 [doi]
- Rate-aware flow scheduling for commodity data center networksZiyang Li, Wei Bai 0001, Kai Chen 0005, Dongsu Han, Yiming Zhang, Dongsheng Li, Hongfang Yu. 1-9 [doi]
- Latency analysis for distributed storageParimal Parag, Archana Bura, Jean-François Chamberland. 1-9 [doi]
- Provably efficient algorithms for joint placement and allocation of virtual network functionsYu Sang, Bo Ji, Gagan Raj Gupta, Xiaojiang Du, Lin Ye. 1-9 [doi]
- Scalable name-based data synchronization for named data networkingMinsheng Zhang, Vince Lehman, Lan Wang. 1-9 [doi]
- Why approximate when you can get the exact? Optimal targeted viral marketing at scaleXiang Li, J. David Smith, Thang N. Dinh, My T. Thai. 1-9 [doi]
- Active opinion-formation in online social networksWenjun Jiang, Jie Wu 0001. 1-9 [doi]
- Discovering valuations and enforcing truthfulness in a deadline-aware schedulerZhe Huang, S. Matthew Weinberg, Liang Zheng, Carlee Joe-Wong, Mung Chiang. 1-9 [doi]
- List of shared risk link groups representing regional failures with limited sizeJános Tapolcai, Lajos Rónyai, Balazs Vass, Laszlo Gyimothi. 1-9 [doi]
- iType: Using eye gaze to enhance typing privacyZhenjiang Li, Mo Li, Prasant Mohapatra, Jinsong Han, Shuaiyu Chen. 1-9 [doi]
- Efficient remote radio head switching scheme in cloud radio access network: A load balancing perspectiveXiaojian Lin, Shaowei Wang. 1-9 [doi]
- Optimal energy requesting strategy for RF-based energy harvesting wireless communicationsYu Luo, Lina Pu, Yanxiao Zhao, Guodong Wang, Min Song 0002. 1-9 [doi]
- Single restart with time stamps for computational offloading in a semi-online settingJaya Prakash Champati, Ben Liang. 1-9 [doi]
- Adaptive scheduling of parallel jobs in spark streamingDazhao Cheng, Yuan Chen, Xiaobo Zhou, Daniel Gmach, Dejan S. Milojicic. 1-9 [doi]
- Taming the inconsistency of Wi-Fi fingerprints for device-free passive indoor localizationXi Chen, Chen Ma, Michel Allegue, Xue Liu. 1-9 [doi]
- Approximation algorithms for the NFV service distribution problemHao Feng, Jaime Llorca, Antonia Maria Tulino, Danny Raz, Andreas F. Molisch. 1-9 [doi]
- Network simplification preserving bandwidth and routing capabilitiesSergey I. Nikolenko, Kirill Kogan, Antonio Fernández Anta. 1-9 [doi]
- A new backpressure algorithm for joint rate control and routing with vanishing utility optimality gaps and finite queue lengthsHao Yu, Michael J. Neely. 1-9 [doi]
- POWERFUL: Mobile app fingerprinting via power analysisYimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang. 1-9 [doi]
- BAC: Bandwidth-aware compression for efficient live migration of virtual machinesChunguang Li, Dan Feng, Yu Hua, Wen Xia, Leihua Qin, Yue Huang, Yukun Zhou. 1-9 [doi]
- Multi-user downlink with single-user uplink can starve TCPPeshal Nayak, Michele Garetto, Edward W. Knightly. 1-9 [doi]
- Behavior in social learning networks: Early detection for online short-coursesWeiyu Chen, Christopher G. Brinton, Da Cao, Mung Chiang. 1-9 [doi]
- TUM: Towards ubiquitous multi-device localization for cross-device interactionHan Xu, Zheng Yang, Zimu Zhou, Ke Yi, Chunyi Peng. 1-9 [doi]
- Caching-aware recommendations: Nudging user preferences towards better caching performanceLivia Elena Chatzieleftheriou, Merkourios Karaliopoulos, Iordanis Koutsopoulos. 1-9 [doi]
- ADMin: Adaptive monitoring dissemination for the Internet of ThingsDemetris Trihinas, George Pallis, Marios D. Dikaiakos. 1-9 [doi]
- Enhancing wireless performance using reflectorsSihui Han, Kang G. Shin. 1-9 [doi]
- Throughput optimization with latency constraintsAlex Davydow, Pavel Chuprikov, Sergey I. Nikolenko, Kirill Kogan. 1-9 [doi]
- Joint sensing duty cycle scheduling for heterogeneous coverage guaranteeKin Sum Liu, Tyler Mayer, Hao-Tsung Yang, Esther M. Arkin, Jie Gao, Mayank Goswami, Matthew P. Johnson, Nirman Kumar, Shan Lin. 1-9 [doi]
- A secure and verifiable outsourcing scheme for matrix inverse computationChunqiang Hu, Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Carl Sturtivant, Hang Liu. 1-9 [doi]
- AccountTrade: Accountable protocols for big data trading against dishonest consumersTaeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su. 1-9 [doi]
- Proximity based IoT device authenticationJiansong Zhang, Zeyu Wang, Zhice Yang, Qian Zhang 0001. 1-9 [doi]
- Robust routing in interdependent networksJianan Zhang, Eytan Modiano. 1-9 [doi]
- Is what you measure what you expect? Factors affecting smartphone-based mobile network measurementLei Xue, Xiaobo Ma, Xiapu Luo, Le Yu, Shuai Wang, Ting Chen. 1-9 [doi]
- Improving ECN marking scheme with micro-burst traffic in data center networksDanfeng Shan, Fengyuan Ren. 1-9 [doi]
- Incentivizing strategic users for social diffusion: Quantity or quality?Jungseul Ok, Jinwoo Shin, Yung Yi. 1-9 [doi]
- Network function virtualization enablement within SDN data planeHesham Mekky, Fang Hao, Sarit Mukherjee, T. V. Lakshman, Zhi-Li Zhang. 1-9 [doi]
- Dynamic path selection in 5G multi-RAT wireless networksSem C. Borst, Aliye Özge Kaya, Doru Calin, Harish Viswanathan. 1-9 [doi]
- SpecSense: Crowdsensing for efficient querying of spectrum occupancyAyon Chakraborty, Md. Shaifur Rahman, Himanshu Gupta, Samir R. Das. 1-9 [doi]
- C-Morse: Cross-technology communication with transparent Morse codingZhimeng Yin, Wenchao Jiang, Song Min Kim, Tian He. 1-9 [doi]
- Cache policies for linear utility maximizationGiovanni Neglia, Damiano Carra, Pietro Michiardi. 1-9 [doi]
- Motif clustering and overlapping clustering for social network analysisPan Li, Hoang Dau, Gregory J. Puleo, Olgica Milenkovic. 1-9 [doi]
- Random access with repeated contentions for emerging wireless technologiesAndrea Baiocchi, Ilenia Tinnirello, Domenico Garlisi, Alice Lo Valvo. 1-9 [doi]
- Energy efficient real-time task scheduling on CPU-GPU hybrid clustersXinxin Mei, Xiaowen Chu, Hai Liu, Yiu-Wing Leung, Zongpeng Li. 1-9 [doi]
- A framework for evaluating physical-layer network coding gains in multi-hop wireless networksRaphael Naves, Hicham Khalife, Gentian Jakllari, Vania Conan, André-Luc Beylot. 1-9 [doi]
- Every pixel counts: Fine-grained UI rendering analysis for mobile applicationsYi Gao, Yang Luo, Daqing Chen, Haocheng Huang, Wei Dong, Mingyuan Xia, Xue Liu, Jiajun Bu. 1-9 [doi]
- RF-scanner: Shelf scanning with robot-assisted RFID systemsJia Liu, Feng Zhu, Yanyan Wang, Xia Wang, Qing-feng Pan, Lijun Chen. 1-9 [doi]
- EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devicesZicheng Chi, Zhichuan Huang, Yao Yao, Tiantian Xie, Hongyu Sun, Ting Zhu. 1-9 [doi]
- Large-scale invisible attack on AFC systems with NFC-equipped smartphonesFan Dang, Pengfei Zhou, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, Mo Li. 1-9 [doi]
- How they interact? Understanding cyber and physical interactions against fault propagation in smart gridZhuo Lu, Mingkui Wei, Xiang Lu. 1-9 [doi]
- Finding MARLIN: Exploiting multi-modal communications for reliable and low-latency underwater networkingStefano Basagni, Valerio Di Valerio, Petrika Gjanci, Chiara Petrioli. 1-9 [doi]
- DSC: Dynamic stripe construction for asynchronous encoding in clustered file systemShuzhan Wei, Yongkun Li, Yinlong Xu, Si Wu. 1-9 [doi]
- A novel coupled queueing model to control traffic via QoS-aware collision pricing in cognitive radio networksChanghee Joo, Ness B. Shroff. 1-9 [doi]
- Securing multipath TCP: Design & implementationMathieu Jadin, Gautier Tihon, Olivier Pereira, Olivier Bonaventure. 1-9 [doi]
- CCSP: A compressed certificate status protocolAntonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos. 1-9 [doi]
- Beyond the touch: Interaction-aware mobile gamecasting with gazing pattern predictionCong Zhang, Qiyun He, Jiangchuan Liu, Zhi Wang. 1-9 [doi]
- Load balancing over symmetric virtual topologiesSyed Mohammad Irteza, Hafiz Mohsin Bashir, Talal Anwar, Ihsan Ayyub Qazi, Fahad Rafique Dogar. 1-9 [doi]
- CFOSynt: Carrier frequency offset assisted clock syntonization for wireless sensor networksFujuan Guo, Baofeng Zhou, Mehmet C. Vuran. 1-9 [doi]
- A control theoretic approach to ABR video streaming: A fresh look at PID-based rate adaptationYanyuan Qin, Ruofan Jin, Shuai Hao, Krishna R. Pattipati, Feng Qian, Subhabrata Sen, Bing Wang, Chaoqun Yue. 1-9 [doi]
- Coflow scheduling in input-queued switches: Optimal delay scaling and algorithmsQingkai Liang, Eytan Modiano. 1-9 [doi]
- RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networksLei Yang, Qingji Zheng, Xinxin Fan. 1-9 [doi]
- When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic dataWenhai Sun, Ning Zhang, Wenjing Lou, Y. Thomas Hou. 1-9 [doi]
- CoCloud: Enabling efficient cross-cloud file collaboration based on inefficient web APIsJinlong E, Yong Cui, Peng Wang, Zhenhua Li, Chaokun Zhang. 1-9 [doi]
- FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacksShang Gao, Zhe Peng, Bin Xiao 0001, Aiqun Hu, Ren Kui. 1-9 [doi]
- Context-aware data quality estimation in mobile crowdsensingShengzhong Liu, Zhenzhe Zheng, Fan Wu, ShaoJie Tang, Guihai Chen. 1-9 [doi]
- WOLoc: WiFi-only outdoor localization using crowdsensed hotspot labelsJin Wang, Nicholas Tan, Jun Luo, Sinno Jialin Pan. 1-9 [doi]
- Viral marketing with positive influenceZhao Zhang 0002, Yishuo Shi, James Willson, Ding-Zhu Du, Guangmo Tong. 1-8 [doi]
- Monitoring quality-of-experience for operational cellular networks using machine-to-machine trafficFaraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan. 1-9 [doi]
- DDoS attack on cloud auto-scaling mechanismsAnat Bremler-Barr, Eli Brosh, Mor Sides. 1-9 [doi]
- Towards rule enforcement verification for software defined networksPeng Zhang. 1-9 [doi]
- Understanding and managing notificationsSwadhin Pradhan, Lili Qiu, Abhinav Parate, Kyu-Han Kim. 1-9 [doi]
- Augmenting max-weight with explicit learning for wireless scheduling with switching costsSubhashini Krishnasamy, P. T. Akhil, Ari Arapostathis, Sanjay Shakkottai, Rajesh Sundaresan. 1-9 [doi]
- Bandwidth scheduling in overlay networks with linear capacity constraintsChase Q. Wu. 1-9 [doi]
- FlowConvertor: Enabling portability of SDN applicationsHeng Pan, Gaogang Xie, Zhenyu Li, Peng He, Laurent Mathy. 1-9 [doi]
- Economies of scale in parallel-server systemsJosu Doncel, Samuli Aalto, Urtzi Ayesta. 1-9 [doi]
- An experimental reality check on the scaling laws of swarming systemsDiego Ximenes Mendes, Edmundo de Souza e Silva, Daniel Sadoc Menasché, Rosa Maria Meri Leão, Don Towsley. 1-9 [doi]
- Scalable software-defined networking through hybrid switchingHongli Xu, He Huang, Shigang Chen, Gongming Zhao. 1-9 [doi]
- Towards truthful auction mechanisms for task assignment in mobile device cloudsXiumin Wang, Xiaoming Chen 0001, Weiwei Wu. 1-9 [doi]
- LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applicationsHao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra. 1-9 [doi]
- Combinatorial approach for network switch design in data center networksGanesh Chennimala Sankaran, Krishna M. Sivalingam. 1-9 [doi]
- Rumor source detection under querying with untruthful answersJaeyoung Choi, Sangwoo Moon, Jiin Woo, Kyunghwan Son, Jinwoo Shin, Yung Yi. 1-9 [doi]
- Can you find me now? Evaluation of network-based localization in a 4G LTE networkRobert Margolies, Richard A. Becker, Simon Byers, Supratim Deb, Rittwik Jana, Simon Urbanek, Chris Volinsky. 1-9 [doi]
- LiCompass: Extracting orientation from polarized lightYu-Lin Wei, Hsin-I Wu, Han-Chung Wang, Hsin-Mu Tsai, Kate Ching-Ju Lin, Rayana Boubezari, Hoa Le Minh, Zabih Ghassemlooy. 1-9 [doi]
- Contact avoidance routing in delay tolerant networksTomoya Osuki, Kazuya Sakai, Satoshi Fukumoto. 1-9 [doi]
- TagScreen: Synchronizing social televisions through hidden sound markersQiongzheng Lin, Lei Yang, Yunhao Liu. 1-9 [doi]
- Generalized finitary real-time calculusKai Lampka, Steffen Bondorf, Jens B. Schmitt, Nan Guan, Wang Yi 0001. 1-9 [doi]
- Inter-client interference cancellation for full-duplex networksKai-Cheng Hsu, Kate Ching-Ju Lin, Hung-Yu Wei. 1-9 [doi]
- Coflex: Navigating the fairness-efficiency tradeoff for coflow schedulingWei Wang, Shiyao Ma, Bo Li, Baochun Li. 1-9 [doi]
- Non-concave network utility maximization: A distributed optimization approachMahmoud Ashour, Jingyao Wang, Constantino Lagoa, Necdet Serhat Aybat, Hao Che. 1-9 [doi]
- Challenging the limits: Sampling online social networks with cost constraintsXin Xu, Chul-Ho Lee, Do Young Eun. 1-9 [doi]
- Optimizing wireless charger placement for directional chargingHaipeng Dai, Xiaoyu Wang, Alex X. Liu, Huizhen Ma, Guihai Chen. 1-9 [doi]
- JADE: Zero-knowledge device localization and environment mapping for millimeter wave systemsJoan Palacios, Paolo Casari, Joerg Widmer. 1-9 [doi]
- Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based servicesHai Liu, Xinghua Li, Hui Li 0006, Jianfeng Ma, XinDi Ma. 1-9 [doi]
- Heavy traffic queue length behavior in switches with reconfiguration delayChang-Heng Wang, Siva Theja Maguluri, Tara Javidi. 1-9 [doi]
- PUFSec: Device fingerprint-based security architecture for Internet of ThingsSo-Yeon Park, Sunil Lim, Dahee Jeong, Jungjin Lee, Joon-Sung Yang, HyungJune Lee. 1-9 [doi]
- Meta-activity recognition: A wearable approach for logic cognition-based activity sensingLei Xie, Xu Dong, Wei Wang, Dawei Huang. 1-9 [doi]
- Perceiving accurate CSI phases with commodity WiFi devicesYiwei Zhuo, Hongzi Zhu, Hua Xue, Shan Chang. 1-9 [doi]
- Joint bidding and geographical load balancing for datacenters: Is uncertainty a blessing or a curse?Ying Zhang, Lei Deng, Minghua Chen, Peijian Wang. 1-9 [doi]
- MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic fieldFudong Qiu, Zhengxian He, Linghe Kong, Fan Wu. 1-9 [doi]
- Progressive damage assessment and network recovery after massive failuresStefano Ciavarella, Novella Bartolini, Hana Khamfroush, Thomas F. La Porta. 1-9 [doi]
- On optimal service differentiation in congested network marketsMao Zou, Richard T. B. Ma, Xin Wang, Yinlong Xu. 1-9 [doi]
- Fast downstream to many (computational) RFIDsHenko Aantjes, Amjad Yousef Majid, Przemyslaw Pawelczak, Jethro Tan, Aaron N. Parks, Joshua R. Smith. 1-9 [doi]
- Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detectionGaogang Xie, Kun Xie, Jun Huang, Xin Wang 0001, Yuxiang Chen, Jigang Wen. 1-9 [doi]
- Bring your own controller: Enabling tenant-defined SDN apps in IaaS cloudsHaopei Wang, Abhinav Srivastava, Lei Xu, Sungmin Hong, Guofei Gu. 1-9 [doi]
- Local private ordinal data distribution estimationShaowei Wang, Yiwen Nie, Pengzhan Wang, Hongli Xu, Wei Yang, Liusheng Huang. 1-9 [doi]
- acPad: Enhancing channel utilization for 802.11ac using packet paddingChi-Han Lin, Yi-Ting Chen, Kate Ching-Ju Lin, Wen-Tsuen Chen. 1-9 [doi]
- Cooperative and competitive operator pricing for mobile crowdsourced internet accessMeng Zhang, Lin Gao, Jianwei Huang, Michael L. Honig. 1-9 [doi]
- On packet loss rates in modern 802.11 networksRamanujan K. Sheshadri, Dimitrios Koutsonikolas. 1-9 [doi]
- Dynamic base station formation for solving NLOS problem in 5G millimeter-wave communicationShih-Chun Lin, Ian F. Akyildiz. 1-9 [doi]
- NaviLight: Indoor localization and navigation under arbitrary lightsZenghua Zhao, Jiankun Wang, Xingya Zhao, Chunyi Peng, Qian Guo, Bin Wu. 1-9 [doi]
- Modeling and analyzing the influence of chunk size variation on bitrate adaptation in DASHTong Zhang, Fengyuan Ren, Wenxue Cheng, Xiaohui Luo, Ran Shu, Xiaolan Liu. 1-9 [doi]
- Electric grid power flow model camouflage against topology leaking attacksIan D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua. 1-9 [doi]
- Joint spatial and temporal classification of mobile traffic demandsAngelo Fumo, Marco Fiore, Razvan Stanica. 1-9 [doi]
- EchoTrack: Acoustic device-free hand tracking on smart phonesHuijie Chen, Fan Li, Yu Wang. 1-9 [doi]
- Optimal multicast in virtualized datacenter networks with software switchesRui Zhu, Di Niu, Baochun Li, Zongpeng Li. 1-9 [doi]
- One step at a time: Optimizing SDN upgrades in ISP networksKonstantinos Poularakis, George Iosifidis, Georgios Smaragdakis, Leandros Tassiulas. 1-9 [doi]
- BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamformingZhe Chen, Xu Zhang, Sulei Wang, Yuedong Xu, Jie Xiong, Xin Wang. 1-9 [doi]
- DBF: A general framework for anomaly detection in RFID systemsMin Chen, Jia Liu, Shigang Chen, Yan Qiao, Yuanqing Zheng. 1-9 [doi]
- A signaling game model for moving target defenseXiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra. 1-9 [doi]
- Surviving screen-off battery through out-of-band Wi-Fi coordinationXianjin Xia, ShiNing Li, Yu Zhang, Lin Li, Tao Gu, Yongji Liu, Yan Pan. 1-9 [doi]
- SLA-verifier: Stateful and quantitative verification for service chainingYing Zhang, Wenfei Wu, Sujata Banerjee, Joon-Myung Kang, Mario A. Sánchez. 1-9 [doi]
- When and how much to neutralize interference?Zhao Li, Kang G. Shin, Lu Zhen. 1-9 [doi]
- SVC-TChain: Incentivizing good behavior in layered P2P video streamingParisa Rahimzadeh, Carlee Joe-Wong, Kyuyong Shin, Youngbin Im, Jongdeog Lee, Sangtae Ha. 1-9 [doi]
- Password correlation: Quantification, evaluation and applicationShouling Ji, Shukun Yang, Anupam Das, Xin Hu, Raheem A. Beyah. 1-9 [doi]
- Where are you from: Home location profiling of crowd sensors from noisy and sparse crowdsourcing dataChao Huang, Dong Wang 0002, Shenglong Zhu. 1-9 [doi]
- Why it takes so long to connect to a WiFi access pointChanghua Pei, Zhi Wang, Youjian Zhao, Zihan Wang, Yuan Meng, Dan Pei, Yuanquan Peng, Wenliang Tang, Xiaodong Qu. 1-9 [doi]
- Internet-wide study of DNS cache injectionsAmit Klein, Haya Shulman, Michael Waidner. 1-9 [doi]
- Tag size profiling in multiple reader RFID systemsShigeng Zhang, Xuan Liu 0001, Jianxin Wang, Jiannong Cao. 1-9 [doi]
- CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval systemXin Li, Qinghan Xue, Mooi Choo Chuah. 1-9 [doi]
- Secret key agreement using a virtual wiretap channelSetareh Sharifian, Fuchun Lin, Reihaneh Safavi-Naini. 1-9 [doi]
- Maximum-weighted subset of communication requests schedulable without spectral splittingPeng-Jun Wan, Huaqiang Yuan, Xiaohua Jia, Jiliang Wang, Zhu Wang. 1-9 [doi]
- Disaster avoidance control against heavy rainfallHiroshi Saito, Hirotada Honda, Ryoichi Kawahara. 1-9 [doi]
- Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiverKai-Wei Jiang, Tao Jing, Zhen Li, Yan Huo, Fan Zhang. 1-9 [doi]
- Quiet ACK: ACK transmit power control in IEEE 802.11 WLANsSeongwon Kim, Jaehong Yi, Youngwook Son, Seungmin Yoo, Sunghyun Choi. 1-9 [doi]
- Interactive message transmission over adversarial wiretap channel IIPengwei Wang, Reihaneh Safavi-Naini. 1-9 [doi]
- Online knapsack problem and budgeted truthful bipartite matchingRahul Vaze. 1-9 [doi]
- Optimal elephant flow detectionRan Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner. 1-9 [doi]
- BlitzG: Exploiting high-bandwidth networks for fast graph processingYongli Cheng, Hong Jiang, Fang Wang, Yu Hua, Dan Feng. 1-9 [doi]
- ACT-AP: ACTivator access point for multicast over WLANGyujin Lee, Yeonchul Shin, Jonghoe Koo, Junyoung Choi, Sunghyun Choi. 1-9 [doi]
- Cost of differential privacy in demand reporting for smart grid economic dispatchXin Lou, Rui Tan, David K. Y. Yau, Peng Cheng. 1-9 [doi]
- A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systemsChenglin Miao, Lu Su, Wenjun Jiang, Yaliang Li, Miaomiao Tian. 1-9 [doi]
- A resource-aware and time-critical IoT frameworkLászló Toka, Balázs Lajtha, Éva Hosszu, Bence Formanek, Daniel Gehberger, János Tapolcai. 1-9 [doi]
- Photo crowdsourcing for area coverage in resource constrained environmentsYibo Wu, Yi Wang, Guohong Cao. 1-9 [doi]
- Optimizing stochastic scheduling in fork-join queueing models: Bounds and applicationsWasiur R. KhudaBukhsh, Amr Rizk, Alexander Frömmgen, Heinz Koeppl. 1-9 [doi]
- Handling flash deals with soft guarantee in hybrid cloudYipei Niu, Fangming Liu, Xincai Fei, Bo Li 0001. 1-9 [doi]
- Power of redundancy: Designing partial replication for multi-tier applicationsRobert Birke, Juan F. Pérez, Zhan Qiu, Mathias Björkqvist, Lydia Y. Chen. 1-9 [doi]
- FitCoach: Virtual fitness coach empowered by wearable mobile devicesXiaonan Guo, Jian Liu 0001, Yingying Chen 0001. 1-9 [doi]
- LightTouch: Securely connecting wearables to ambient displays with user intentXiaohui Liang, Tianlong Yun, Ronald A. Peterson, David Kotz. 1-9 [doi]
- AccurateML: Information-aggregation-based approximate processing for fast and accurate machine learning on MapReduceRui Han, Fan Zhang, Zhentao Wang. 1-9 [doi]
- Distributed non-structure based data aggregation for duty-cycle wireless sensor networksQuan Chen, Hong Gao, Siyao Cheng, Jianzhong Li, Zhipeng Cai. 1-9 [doi]
- MOMD: A multi-object multi-dimensional auction for crowdsourced mobile video streamingMing Tang, Shou Wang, Lin Gao, Jianwei Huang, Lifeng Sun. 1-9 [doi]
- Privacy-preserving pattern matching over encrypted genetic data in cloud computingBing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou. 1-9 [doi]
- Make a difference: Diversity-driven social mobile crowdsensingMan Hon Cheung, Fen Hou, Jianwei Huang. 1-9 [doi]
- Constructing connected dominating sets in battery-free networksTuo Shi, Siyao Cheng, Jianzhong Li, Zhipeng Cai. 1-9 [doi]
- An efficient randomized algorithm for rumor blocking in online social networksGuangmo Amo Tong, Weili Wu, Ling Guo, Deying Li, Cong Liu 0005, Bin Liu, Ding-Zhu Du. 1-9 [doi]