Abstract is missing.
- Effective and scalable repackaged application detection based on user interfaceMeiqi Lin, Dafang Zhang, Xin Su, Tinghao Yu. 1-6 [doi]
- A federated cloud computing framework for adaptive cyber defense and distributed computingOlumide Malomo, Danda B. Rawat, Moses Garuba. 1-6 [doi]
- FuzzyDP: Fuzzy-based big data publishing against inquiry attacksYouyang Qu, Shui Yu, Longxiang Gao, Sancheng Peng, Yong Xiang, Liang Xiao. 7-12 [doi]
- Intrusion and attacks over mobile networks and cloud health systemsLo'ai Ali Tawalbeh, Hala Tawalbeh, Houbing Song, Yaser Jararweh. 13-17 [doi]
- TextDroid: Semantics-based detection of mobile malware using network flowsShanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti. 18-23 [doi]
- Directory service for mobile IoT applicationsVed P. Kafle, Yusuke Fukushima, Pedro Martinez-Julia, Hiroaki Harai. 24-29 [doi]
- Heterogeneous wireless sensor networks using CoAP and SMS to predict natural disastersRaihan Ul Islam, Karl Andersson, Mohammad Shahadat Hossain. 30-35 [doi]
- A simple, cost-effective addressing and routing architecture for fat-tree based datacenter networksAqun Zhao, Zhiyu Liu, Jianping Pan, Mangui Liang. 36-41 [doi]
- On power consumption profiles for data intensive workloads in virtualized hadoop clustersBasit Qureshi, S. Alwehaibi, Anis Koubaa. 42-47 [doi]
- Efficient and fair scheduling of placement constrained threads on heterogeneous multi-processorsJalal Khamse-Ashari, George Kesidis, Ioannis Lambadaris, Bhuvan Urgaonkar, Yiqiang Q. Zhao. 48-53 [doi]
- Simulated annealing for edge partitioningHlib Mykhailenko, Giovanni Neglia, Fabrice Huet. 54-59 [doi]
- UAV-assisted edge infrastructure for challenged networksMamta Narang, Simon Xiang, William Liu, Jairo A. Gutiérrez, Luca Chiaraviglio, Arjuna Sathiaseelan, Arvind Merwaday. 60-65 [doi]
- Realistic network simulation in the UB-ANC aerial vehicle network emulatorJalil Modares, Nicholas Mastronarde, Karthik Dantu. 66-71 [doi]
- Explicit topology management for continental-scale airborne networksBen Newton, Jay Aikat, Kevin Jeffay. 72-77 [doi]
- Thoreau: A subterranean wireless sensing network for agriculture and the environmentXufeng Zhang, Arseniy Andreyev, Colleen Zumpf, Maria Cristina Negri, Supratik Guha, Monisha Ghosh. 78-84 [doi]
- Improving the energy performance of GPS receivers for location tracking applicationsKongyang Chen, Guang Tan, Mingming Lu. 85-90 [doi]
- Efficient topology discovery and routing in thick wireless Linear Sensor NetworksImad Jawhar, Sheng Zhang 0001, Jie Wu, Nader Mohamed, Mohammad M. Masud. 91-96 [doi]
- An attribute-based reliable multicast-over-broadcast protocol for firmware updates in smart meter networksSamet Tonyali, Kemal Akkaya, Nico Saputro. 97-102 [doi]
- Timely information dissemination with distributed storage in delay tolerant mobile sensor networksAashish Dhungana, Eyuphan Bulut. 103-108 [doi]
- An adaptable replication scheme in mobile online system for mobile-edge cloud computingWan-Chi Chang, Pi-Chung Wang. 109-114 [doi]
- Computation offloading considering fronthaul and backhaul in small-cell networks integrated with MECHeli Zhang, Jun Guo, Lichao Yang, Xi Li, Hong Ji. 115-120 [doi]
- Energy-efficient resource allocation in software-defined mobile networks with mobile edge computing and cachingChengchao Liang, Ying He, F. Richard Yu, Nan Zhao. 121-126 [doi]
- Distributed mobile devices caching over edge computing wireless networksXi Zhang, Qixuan Zhu. 127-132 [doi]
- Pervasive edge data sharing in MANETXintong Song, Yaodong Huang, Qian Zhou, Fan Ye, Yuanyuan Yang, Xiaoming Li. 133-138 [doi]
- An LTE-based optimal resource allocation scheme for delay-sensitive M2M deployments coexistent with H2H usersMohammed Y. Abdelsadek, Yasser Gadallah, Mohamed Hossam Ahmed. 139-144 [doi]
- Energy efficient resource allocation for machine-to-machine communications with NOMA and energy harvestingZhaohui Yang, Yi-Jin Pan, Wei Xu, Rui Guan, Yinlu Wang, Ming Chen. 145-150 [doi]
- Optimal distributed channel assignment in D2D networks using learning in noisy potential gamesMohd. Shabbir Ali, Pierre Coucheney, Marceau Coupechoux. 151-156 [doi]
- Duplex mode selection for device-to-device communications underlaying the cellular uplinkLiang Han, Weixia Zou, Ganlin Zhao. 157-162 [doi]
- Virtual resource allocation for heterogeneous services in full duplex-enabled small cell networks with cache and MECZhiyuan Tan, F. Richard Yu, Xi Li, Hong Ji, Victor C. M. Leung. 163-168 [doi]
- Provisioning low latency, resilient mobile edge clouds for 5GRussell Ford, Ashwin Sridharan, Robert Margolies, Rittwik Jana, Sundeep Rangan. 169-174 [doi]
- On-path collaborative in-network caching for information-centric networksLemei Huang, Yu Guan, Xinggong Zhang, Zongming Guo. 175-180 [doi]
- Information-aware access network selectionKonstantinos V. Katsaros, Denis Shtefan, Vasilis Sourlas, Ioannis Psaras, Sergi Rene, George Pavlou. 181-186 [doi]
- StorageFlow: SDN-enabled efficient data regeneration for distributed storage systemsSujoy Saha, Corey Morrison, Alex Sprintson. 187-192 [doi]
- Hey network, can you understand me?Azzam Alsudais, Eric Keller. 193-198 [doi]
- A cooperative Raman spectrum reconstruction platform for real-time in-vivo nano-biosensingHongzhi Guo, Zhi Sun, Josep Miquel Jornet. 199-204 [doi]
- Routing in multi-modal underwater networks: A throughput-optimal approachRoee Diamant, Paolo Casari, Filippo Campagnaro, Michele Zorzi. 205-210 [doi]
- Resource allocation for a multichannel ultrasonic through-wall communication systemJonathan D. Ashdown, Lingjia Liu, Gary J. Saulnier, Kyle R. Wilt. 211-216 [doi]
- On environment-aware channel estimation for wireless sensor networks using Magnetic InductionXin Tan, Zhi Sun. 217-222 [doi]
- Doppler warp correction for wideband burst communicationsAvik Dayal, A. A. Louis Beex. 223-228 [doi]
- Mobile core network redimensioning for efficient resource utilizationEyuphan Bulut, Abhimanyu Gosain. 231-234 [doi]
- Virtual resource allocation for information-centric heterogeneous networks with mobile edge computingYuchen Zhou, F. Richard Yu, Jian Chen, Yonghong Kuo. 235-240 [doi]
- A hybrid-timeout mechanism to handle rule dependencies in software defined networksDingmin Wang, Qing Li, Lei Wang, Richard O. Sinnott, Yong Jiang. 241-246 [doi]
- FlowTable pipeline misconfigurations in Software Defined NetworksSaeed Al-Haj, William J. Tolone. 247-252 [doi]
- Reconstruction of control plane of distributed SDN against large-scale disruption and restorationTakahiro Hirayama, Takaya Miyazawa, Hideaki Furukawa, Hiroaki Harai. 253-258 [doi]
- Creating complex testbed networks to explore SDN-based all-campus science DMZsP. Sergio Rivera, Jacob Chappell, Mami Hayashida, Andrew Groenewold, Peter Oostema, Caleb Voss, Hussamuddin Nasir, Charles Carpenter, Yongwook Song, Zongming Fei, James Griffioen. 259-264 [doi]
- Virtual network migration on the GENI wide-area SDN-enabled infrastructureYimeng Zhao, Samantha Lo, Ellen W. Zegura, Mostafa H. Ammar, Niky Riga. 265-270 [doi]
- Exploiting opportunities in V2V transmissions with RSU-assisted backward deliveryChao Song, Jie Wu, Wei-Shih Yang, Ming Liu, Imad Jawhar, Nader Mohamed. 271-276 [doi]
- Message dissemination scheduling for multiple cooperative drivingsDongyao Jia, Bingyi Liu, Haibo Chen, Jingyuan Fan, Chunming Qiao, Jianping Wang, Libing Wu. 277-282 [doi]
- Assessing the performance of hearing aids using surveys and audio data collected in situSyed Shabih Hasan, Ryan Brummet, Octav Chipara, Yu-Hsiang Wu. 283-288 [doi]
- NFC-enabled attack on cyber physical systems: A practical case studyFan Dang, Pengfei Zhou, Zhenhua Li, Yunhao Liu. 289-294 [doi]
- Automated density-based clustering of spatial urban data for interactive data explorationErica Rosalina, Flora Dilys Salim, Timos Sellis. 295-300 [doi]
- A real-subject evaluation trial for location-aware smart buildingsMahdi Inaya, Michael Meli, Dimitrios Sikeridis, Michael Devetsikiotis. 301-306 [doi]
- Energy efficient data collection in opportunistic mobile crowdsensing architectures for smart citiesAndrea Capponi, Claudio Fiandrino, Dzmitry Kliazovich, Pascal Bouvry. 307-312 [doi]
- Location-centric flow flux for improved indoor mobility modelsMimonah Al Qathrady, Ahmed Helmy. 313-318 [doi]
- Timeout Strategy-based Mobility Management for Software Defined Satellite NetworksTaixin Li, Huachun Zhou, Hongbin Luo, Wei Quan, Qi Xu, Guanwen Li, Guanglei Li. 319-324 [doi]
- Leveraging frame aggregation to improve access point selectionLixing Song, Aaron Striegel. 325-330 [doi]
- SPCN: Providing smart support for proactive caching in mobile scenarioZhongbai Jiang, Jianfeng Guan, Yang Liu, Xinshu Li, Changqiao Xu. 331-336 [doi]
- Location-assisted precoding for three-dimension massive MIMO in air-to-ground transmissionYurong Wang, Xiaochen Xia, Kui Xu 0001, Youyun Xu, Aijun Liu. 337-342 [doi]
- TCP in 5G mmWave networks: Link level retransmissions and MP-TCPMichele Polese, Rittwik Jana, Michele Zorzi. 343-348 [doi]
- Channel estimation and signal reconstruction for massive MIMO with non-orthogonal pilotsPengxiang Li. 349-353 [doi]
- Outage analysis of massive MIMO systemGanlin Zhao, Qilian Liang. 354-359 [doi]
- Risk analysis of information-leakage through interest packets in NDNDaishi Kondo, Thomas Silverston, Hideki Tode, Tohru Asami, Olivier Perrin. 360-365 [doi]
- CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in namesYuwei Xu, Siyan Yao, Changhai Wang, Jingdong Xu. 366-371 [doi]
- Optimal placement algorithm (OPA) for IoT over ICNHatem Ibn-Khedher, Hossam Afifi, Hassnaa Moustafa. 372-377 [doi]
- Extracting mobile user behavioral similarity via cell-level location traceJin Cao, Sining Chen, W. Sean Kennedy, Nicolas Kim, Lisa Zhang. 378-383 [doi]
- On active queue management in cellular networksJoseph D. Beshay, Afshin Taghavi Nasrabadi, Ravi Prakash, Andrea Francini. 384-389 [doi]
- An empirical study of the WeChat mobile instant messaging serviceQian Deng, Zhenyu Li, Qinghua Wu, Chuan Xu, Gaogang Xie. 390-395 [doi]
- Composing middlebox and traffic engineering policies in SDNsYiyang Chang, Gustavo Petri, Sanjay G. Rao, Tiark Rompf. 396-401 [doi]
- MBBrick: Unified middlebox design anc deployment in software defined networkXin He, Qing Li, Mingwei Xu, Yong Jiang, Lei Wang. 402-407 [doi]
- One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDNJulian Chimaobi Chukwu, Ashraf Matrawy, Dimitrios Makrakis. 408-413 [doi]
- Scalable path provision in software defined networksLong Luo, Hongfang Yu, Shouxi Luo. 414-419 [doi]
- Statistical network behavior based threat detectionJin Cao, Lawrence M. Drabeck, Ran He. 420-425 [doi]
- A image texture and BP neural network basec malicious files detection technique for cloud storage systemsGuanchao Wen, Yupeng Hu, Chen Jiang, Na Cao, Zheng Qin. 426-431 [doi]
- Application interference analysis: Towards energy-efficient workload management on heterogeneous micro-server architecturesMarkus Hähnel, Frehiwot Melak Arega, Waltenegus Dargie, Robert Khasanov, Jerónimo Castrillón. 432-437 [doi]
- Effect of optimizing Java deployment artifacts on AWS LambdaHussachai Puripunpinyo, M. H. Samadzadeh. 438-443 [doi]
- Bridging the digital divide between research and home networksCaleb Smith-Salzberg, Fraida Fund, Shivendra S. Panwar. 444-449 [doi]
- PopperCI: Automated reproducibility validationIvo Jimenez, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Jay F. Lofstead, Carlos Maltzahn, Kathryn Mohror, Robert Ricci. 450-455 [doi]
- A delay-aware caching algorithm for wireless D2D caching networksYi Li, Mustafa Cenk Gursoy, Senem Velipasalar. 456-461 [doi]
- Collaborative hierarchical caching in cloud radio access networksXiuhua Li, Peiran Wu, Xiaofei Wang, Keqiu Li, Zhu Han, Victor C. M. Leung. 462-467 [doi]
- Energy-efficient cooperative coded caching for heterogeneous small cell networksQingmin Jia, Renchao Xie, Tao Huang, Jiang Liu, Yunjie Liu. 468-473 [doi]
- Fog computing based content-aware taxonomy for caching optimization in information-centric networksMeng Wang, Jun Wu, Gaolei Li, Jianhua Li, Qiang Li. 474-475 [doi]
- Popularity based probabilistic caching strategy design for named data networkingRan Zhang, Jiang Liu, Tao Huang, Renchao Xie. 476-481 [doi]
- The problem of privacy in cooperative intelligent transportation systems (C-ITS)Djibrilla Amadou Kountché, Jean-Marie Bonnin, Houda Labiod. 482-486 [doi]
- App behavioral analysis using system callsPrajit Kumar Das, Anupam Joshi, Tim Finin. 487-492 [doi]
- Random projection data perturbation based privacy protection in WSNsZhao Ming, Wu Zheng-jiang, Hui Liu. 493-498 [doi]
- Security analysis of Internet-of-Things: A case study of august smart lockMengmei Ye, Nan Jiang, Hao Yang, Qiben Yan. 499-504 [doi]
- Context-aware QoE-price equilibrium for wireless multimedia relay communications using stackelberg gameShuan He, Wei Wang 0015. 506-511 [doi]
- Context-resilient capacity-achieving rateless code for OFDM channels with frequency diversityAnfu Zhou, Liang Liu, Huadong Ma, Gang Wang. 512-516 [doi]
- Practical MU-MIMO experiments using SDRsTejashri Kuber, Gokul Sridharan, Dola Saha, Ivan Seskar. 517-522 [doi]
- Optimization of ultra-narrowband wireless communication: An experimental case studyTomaz Solc, Timotej Gale, Carolina Fortuna. 523-528 [doi]
- Coexistence between IEEE802.15.4 and IEEE802.11 through cross-technology signalingJan Bauwens, Bart Jooris, Peter Ruckebusch, Domenico Garlisi, Joseph Szurley, Marc Moonen, Spilios Giannoulis, Ingrid Moerman, Eli De Poorter. 529-534 [doi]
- Impact of fog and cloud computing on an IoT service running over an optical/wireless network testbedAloizio P. Silva, Bernardo A. Abreu, Erik B. Silva, Marcos Carvalho, Matheus Nunes, Marcelo Antonio Marotta, Ali Hammad, Carlos F. M. Silva, Joao F. N. Pinheiro, Cristiano Bonato Both, Johann Márquez-Barja, Luiz A. DaSilva. 535-540 [doi]
- Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threatsDongjin Xu, Liang Xiao 0003, Narayan B. Mandayam, H. Vincent Poor. 541-546 [doi]
- Efficient privacy-preserving decentralized ABE supporting expressive access structuresLiangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan. 547-552 [doi]
- Robust authentication and data storage with perfect secrecySebastian Baur, Holger Boche. 553-558 [doi]
- Characterizing and classifying IoT traffic in smart cities and campusesArunan Sivanathan, Daniel Sherratt, Hassan Habibi Gharakheili, Adam Radford, Chamith Wijenayake, Arun Vishwanath, Vijay Sivaraman. 559-564 [doi]
- Communication-based collision avoidance between vulnerable road users and carsMichele Segata, Romas Vijeikis, Renato Lo Cigno. 565-570 [doi]
- BLESS: Bluetooth low energy service switching using SDNMostafa Uddin, Sarit Mukherjee, Hyunseok Chang, T. V. Lakshman. 571-576 [doi]
- On optimizing power allocation and power splitting for MISO SWIPT systems with heterogeneous usersHaizhen Liu, Yanrong Peng, Desheng Wang, Xiaoqiang Ma, Yang Yang, Yanyan Wu, Cong Zhang. 577-582 [doi]
- Location-aware network selection mechanism in heterogeneous wireless networksTing Bi, Gabriel-Miro Muntean. 583-588 [doi]
- Coordination mechanisms for floating content in realistic vehicular scenarioGaetano Manzo, Ridha Soua, Antonio Di Maio, Thomas Engel 0001, Maria Rita Palattella, Gianluca Rizzo. 589-594 [doi]
- IP-based seamless handover scheme using ANDSF in an untrusted environmentFang-Yie Leu, Po-Yu Tsai, Ilsun You, Hsing-Chung Chen. 595-600 [doi]
- Game theoretic approach for wireless virtualization with coverage and QoS constraintsDanda B. Rawat. 601-606 [doi]
- LMMSE-based interference mitigation method for compressive signalLongmei Zhou, Zhuo Sun, Na Wu, Wenbo Wang. 607-612 [doi]
- Exploiting wideband spectrum occupancy heterogeneity for weighted compressive spectrum sensingBassem Khalfi, Bechir Hamdaoui, Mohsen Guizani, Nizar Zorba. 613-618 [doi]
- Load-aware user-centric virtual cell design in Ultra-Dense NetworkQian Liu, Gang Chuai, Weidong Gao, Kaisa Zhang. 619-624 [doi]
- In defence of NATs: An opinionGeoff Huston. 625-628 [doi]
- A framework for flexible interdomain routing in transit ISPsTrung Truong, Ian Welch, Bryan Ng. 629-634 [doi]
- Comparative analysis of internet topology data setsMuhammed Abdullah Canbaz, Jay Thom, Mehmet Hadi Gunes. 635-640 [doi]
- Smart parking pricing: A machine learning approachEran Simhon, Christopher Liao, David Starobinski. 641-646 [doi]
- Pricing and bidding strategies for cloud computing spot instancesJiayi Song, Roch Guérin. 647-653 [doi]
- Multicommodity games in public-cloud markets considering subadditive resource demandsGeorge Kesidis, Neda Nasiriani, Yuquan Shan, Bhuvan Urgaonkar, Ioannis Lambadaris. 654-658 [doi]
- Volume-based pricing with guaranteed data rateBehdad Heidarpour, Zbigniew Dziong, Wing Cheong Lau. 659-664 [doi]
- Dynamic segment size selection in HTTP based adaptive video streamingLuca Bedogni, Marco Di Felice, Luciano Bononi. 665-670 [doi]
- HTTP adaptive streaming with indoors-outdoors detection in mobile networksSami Mekki, Theodoros Karagkioules, Stefan Valentin. 671-676 [doi]
- When HTTP/2 rescues DASH: Video frame multiplexingMariem Ben Yahia, Yannick Le Louédec, Loutfi Nuaymi, Gwendal Simon. 677-682 [doi]
- Traffic model for HTTP-based adaptive streamingSilvio Waldmann, Konstantin Miller, Adam Wolisz. 683-688 [doi]
- How flexible is dynamic SDN control plane?Mu He, Arsany Basta, Andreas Blenk, Wolfgang Kellerer. 689-694 [doi]
- Virtualized control plane placement problem: Provisioning the control paths and architecturesIshan Vaishnavi, Wint Yi Poe. 695-700 [doi]
- Using simulated annealing for improved video bandwidth predictionAthina Kalampogia, Polychronis Koutsakis. 701-705 [doi]
- WiLiTV: A low-cost wireless framework for live TV servicesRajeev Kumar, Robert S. Margolies, Rittwik Jana, Yong Liu, Shivendra S. Panwar. 706-711 [doi]
- Passive assessment of QoS in a WLAN for Sudden Onset Disasters (SODs)Eyal Berliner, Avi Herbon, Yuval Hadas, Boaz Ben-Moshe, Amit Dvir. 712-717 [doi]
- Aerial UAV-IoT sensing for ubiquitous immersive communication and virtual human teleportationJacob Chakareski. 718-723 [doi]
- Calantha: Content distribution across geo-distributed datacentersYangyang Li, Linchao Zhang, Yue Jia, Yong Liao, Haiyong Xie. 724-729 [doi]
- A multi-step model for migration and resource reallocation in virtualized network infrastructuresNguyen Tuan Khai, Andreas Baumgartner, Thomas Bauschert. 730-735 [doi]
- Slice-based network transit service: Inter-domain L2 networking on ExoGENIYuanjun Yao, Qiang Cao, Jeffrey S. Chase, Paul Ruth, Ilya Baldin, Yufeng Xin, Anirban Mandal. 736-741 [doi]
- IRMS: An intelligent rule management scheme for software defined networkingLei Wang, Qing Li, Yong Jiang, Yu Wang, Richard O. Sinnott, Jianping Wu. 742-747 [doi]
- Traffic offloading for 5G: L-LTE or Wi-FiIbrahim Elgendi, Kumudu S. Munasinghe, Abbas Jamalipour. 748-753 [doi]
- Redundancy elimination might be overrated: A quantitative study on wireless trafficXueheng Hu, Aaron Striegel. 754-759 [doi]
- Statistical QoS-driven power adaptation for distributed caching based mobile offloading over 5G wireless networksXi Zhang, Jingqing Wang. 760-765 [doi]
- Telco asks transp: Can you give me a ride in the era of big data?Rashmi Munjal, William Liu, Xue Jun Li, Jairo A. Gutiérrez, Peter Han Joo Chong. 766-771 [doi]
- A new lightweight key exchange protocol with provable security for securing cloud-assistec. Mobile communicationsJun Liu. 772-777 [doi]
- Adaptive scheduling mechanism based on self-similarity for duty cycle opportunistic mobile networksFeng Zeng, Yueyue Dou, Zhigang Chen, Hui Liu 0008. 778-783 [doi]
- Initial trust establishment for personal space IoT systemsTham Nguyen, Doan Hoang, Diep Nguyen, Aruna Seneviratne. 784-789 [doi]
- Ranking most informative apps for effective identification of legitimate smartphone ownersAbdulaziz Alzubaidi, Swarup Roy, Jugal Kalita. 790-795 [doi]
- Edge-assisted content and computation-driven dynamic network selection for real-time services in the urban IoTSabur Baidya, Marco Levorato. 796-801 [doi]
- Preventing collusion between SDN defenders anc attackers using a game theoretical approachMehrdad Nojoumian, Arash Golchubian, Nico Saputro, Kemal Akkaya. 802-807 [doi]
- PCD: A privacy-preserving predictive clinical decision scheme with E-health big data based on RNNJiaping Lin, Jianwei Niu, Hui Li. 808-813 [doi]
- A data-driven preprocessing scheme on anomaly detection in big data applicationsShengjie Xu, Yi Qian, Rose Qingyang Hu. 814-819 [doi]
- A preference-aware trajectory privacy-preserving scheme in location-based social networksLiang Zhu, Changqiao Xu, Jianfeng Guan, Yang Liu, Hongke Zhang. 820-825 [doi]
- Incentive design for ad-sponsored content: Results from a randomized trialSoumya Sen, Gordon Burtch, Alok Gupta, Rüdiger Rill. 826-831 [doi]
- Contracts as entry barriers for unlicensed spectrumYining Zhu, Randall A. Berry. 832-838 [doi]
- En route: Towards vehicular mobility scenario generation at scaleRoozbeh Ketabi, Babak Alipour, Ahmed Helmy. 839-844 [doi]
- Fine-grained ultrasound range finding for mobile devices: Sensing way beyond the 24 kHz limit of built-in microphonesYuchi Chen, Wei Gong, Jiangchuan Liu, Yong Cui 0001. 845-850 [doi]
- Online anomalous vehicle detection at the edge using multidimensional SSANing Chen, Zekun Yang, Yu Chen 0002, Aleksey Polunchenko. 851-856 [doi]
- Modeling urban trip demands in cloud-commuting system: A holistic approachGuanxiong Liu, Menghai Pan, Yanhua Li, Zhi-Li Zhang, Jun Luo. 857-862 [doi]
- OSTPC: Oblique space-time-polarization precoding for dual-polarized MIMO systems over Ricean-K fading channelChenggui Lou, Bin Cao 0003, Shaohua Wu, Qinyu Zhang. 863-868 [doi]
- Peak to average power ratio suppression method joint orthogonal and non-orthogonal schemeMin Jia, Zhiying Wu, Qing Guo, Xuemai Gu, Naitong Zhang. 869-873 [doi]
- A PCA-based modeling method for wireless MIMO channelXiaochuan Ma, Jianhua Zhang, Yuxiang Zhang, Zhanyu Ma, Yu Zhang. 874-879 [doi]
- Speed dating: A ferformance-enhancec rendezvous circuit for TorMoritz von Wedel-Farlow, Florian Tschorsch, Björn Scheuermann. 880-885 [doi]
- Characterizing the effects of TCP's initial windowRuna Barik, Dinil Mon Divakaran, Michael Welzl. 886-891 [doi]
- A multiple APs cooperation access scheme for energy efficiency in UUDN with NOMAYiming Liu, Xi Li, Hong Ji, Heli Zhang. 892-897 [doi]
- Topology inference of multilayer networksPanagiotis A. Traganitis, Yanning Shen, Georgios B. Giannakis. 898-903 [doi]
- Multiple graph abstractions for parallel routing over virtual topologiesAhmet Soran, Murat Yuksel, Mehmet Hadi Gunes. 904-909 [doi]
- Re-mapping the internet: Bring the IXPs into play: www.inspire.edu.gr/ixp-mapGeorge Nomikos, Pavlos Sermpezis, Xenofontas A. Dimitropoulos. 910-915 [doi]
- Model-based analytics for profiling workloads in virtual network functionsRoberto Bruschi, Franco Davoli, Paolo Lago, Jane Frances Pajo. 916-921 [doi]
- Modular network function virtualizationDennis M. Volpano. 922-927 [doi]
- On the "familiar stranger" phenomenon in a large-scale VoD systemChen Zhang, Yuedong Xu, Yipeng Zhou, Xiaoming Fu. 928-933 [doi]
- Controlled growth of simplicial complex networksAlexey Nikolaev, Saad Mneimneh, Amotz Bar-Noy, Ram Ramanathan. 934-939 [doi]
- Predicted max degree sampling: Sampling in directed networks to maximize node coverage through crawlingRicky Laishram, Katchaguy Areekijseree, Sucheta Soundarajan. 940-945 [doi]
- Demo abstract: RPiaaS: A raspberry pi testbed for validation of cloud resource management strategiesPieter-Jan Maenhaut, Bruno Volckaert, Veerle Ongenae, Filip De Turck. 946-947 [doi]
- Demo abstract: Cross-technology TDMA synchronization using energy pattern beaconsJan Bauwens, Bart Jooris, Peter Ruckebusch, Domenico Garlisi, Joseph Szurley, Marc Moonen, Spilios Giannoulis, Ingrid Moerman, Eli De Poorter. 948-949 [doi]
- Demo abstract: Assessing the impact of fog and cloud computing on an IoT service running over an optical/wireless network-An experimental approachAloizio P. Silva, Bernardo A. Abreu, Erik de Britto e Silva, Marcos Carvalho, Matheus Nunes, Marcelo Antonio Marotta, Ali Rammad, Carlos F. M. Silva, Joao F. N. Pinheiro, Cristiano Bonato Both, Johann Márquez-Barja, Luiz A. DaSilva. 950-951 [doi]
- Demo abstract: PopperCI: Automated reproducibility validationIvo Jimenez, Sina Hamedian, Jay F. Lofstead, Carlos Maltzahn, Kathryn Mohror, Remzi H. Arpaci-Dusseau, Andrea C. Arpaci-Dusseau, Robert Ricci. 952-953 [doi]
- Demo abstract: Enabling high-throughput big data transfers across campus networksP. Sergio Rivera, Jacob Chappell, Mami Hayashida, Andrew Groenewold, Peter Oostema, Caleb Voss, Hussamuddin Nasir, Charles Carpenter, Yongwook Song, Zongming Fei, James Griffioen. 954-955 [doi]
- Rapid development of IoT applications with TinyLinkGaoyang Guan, Kaibo Fu, Zhihao Cheng, Yi Gao, Wei Dong 0001. 956-957 [doi]
- Demo abstract: CDMA-based IoT services with shared band operation of LTE in 5GSiddarth Mathur, Shweta S. Sagari, Syed Obaid Amin, Ravishankar Ravindran, Dola Saha, Ivan Seskar, Dipankar Raychaudhuri, Guoqiang Wang. 958-959 [doi]
- HyDRA: A hypervisor for software defined radios to enable radio virtualization in mobile networksMaicon Kist, Juergen Rochol, Luiz A. DaSilva, Cristiano Bonato Both. 960-961 [doi]
- 2I communication system for underground and underwater networksHongzhi Guo, Zhi Sun. 962-963 [doi]
- Demo abstract: An integrated tool of applying stochastic network calculus for network performance analysisMichael A. Beck, Sebastian A. Henningsen, Qian Xu, Jianping Wang, Kui Wu, Xian Liu. 964-965 [doi]
- Demo abstract: An open source toolchain for planning and visualizing highly directional mm-wave cellular networks in the 5G eraLjiljana Simic, Janne Riihijärvi, Amulya Venkatesh, Petri Mähönen. 966-967 [doi]
- Demo abstract: An intent solver for enabling intent-based SDNHaodi Zhang, Yu Wang, Xiangtong Qi, Weiping Xu, Tao Peng, Shucheng Liu. 968-969 [doi]
- Demo abstract: Telco localization techniquesPeng Zhao, Chenxi Zhang, Yukun Huang, Weixiong Rao, Fangzhou Zhu, Ning Liu, Jie Geng, Mingxuan Yuan, Jia Zeng. 970-971 [doi]
- Demo abstract: Full-duplex with a compact frequency domain equalization-based RF cancellerTingjun Chen, Jin Zhou, Mahmood Baraani Dastjerdi, Jelena Diakonikolas, Harish Krishnaswamy, Gil Zussman. 972-973 [doi]
- Demo abstract: Evaluating video delivery over wireless multicastVarun Gupta, Andy Lianghua Xu, Bohan Wu, Craig Gutterman, Yigal Bejerano, Gil Zussman. 974-975 [doi]
- Demo abstract: Stemflow: Inter-datacenter overlay as a serviceShuhao Liu, Baochun Li. 976-977 [doi]
- Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networksCorey E. Baker, Allen Starke, Shitong Xing, Janise McNair. 978-979 [doi]
- Demo abstract: Clock syntonization using CFO information in Wireless Sensor NetworksBaofeng Zhou, Fujuan Guo, Mehmet C. Vuran. 980-981 [doi]
- Demo abstract an ultrasonic intra body area network for ehealth applicationsLaura Galluccio, Sebastiano Milardo, Elisabetta Sciacca. 982-983 [doi]
- Demo abstract: Sender-triggered selective wake-up receiver for low-power sensor networksJohannes Blobel, Falko Dressler. 984-985 [doi]
- Demo abstract: MExR: Mobile edge resource management for mixed reality applicationsQiang Liu, Siqi Huang, Yang Deng, Tao Han. 986-987 [doi]
- Context-aware adaptive video streaming for mobile usersSami Mekki, Theodoros Karagkioules, Stefan Valentin. 988-989 [doi]
- Automated offloading of android applications for computation/energy optimizationsAlessandro Zanni, Se-Young Yu, Stefano Secci, Rami Langar, Paolo Bellavista, Daniel F. Macedo. 990-991 [doi]
- Demo abstract: An experimentation facility enabling flexible network control for the Internet of ThingsGeorge E. Violettas, Tryfon Theodorou, Sophia G. Petridou, Antonios Tsioukas, Lefteris Mamatas. 992-993 [doi]
- Demo abstract: Alzimio: A mobile app with geofencing, activity-recognition and safety features for dementia patientsJad Helmy, Ahmed Helmy. 994-995 [doi]
- Poster abstract TAMOR a thermal-aware multihop routing protocol for ultrasonic Intra Body Area NetworksLaura Galluccio, Sebastiano Milardo, Elisabetta Sciacca. 996-997 [doi]
- Lightweight flow management for software-defined wireless sensor networks with link fault in data planeMithun Mukherjee 0001, Lei Shu, Teng Zhao, Di Wang, Haihui Wang. 998-999 [doi]
- Poster abstract: MicroBrain: Compressing deep neural networks for energy-efficient visual inference serviceShiming Ge, Zhao Luo, Qiting Ye, Xiaoyu Zhang. 1000-1001 [doi]
- Poster abstract: Feasibility of floating content in VANETsGaetano Manzo, Gianluca Antonio Rizzo. 1002-1003 [doi]
- A trust evaluation framework using in a vehicular social environmentXiao Chen 0003, Liangmin Wang. 1004-1005 [doi]
- Poster abstract: A synchronized wireless sensor network for monitoring the structural healthDeepa Phanish, Randal T. Abler, Edward J. Coyle. 1006-1007 [doi]
- A fog computing-based framework to reduce traffic overhead in large-scale industrial applicationsMithun Mukherjee 0001, Lei Shu 0001, Di Wang, Kailiang Li, Yu Chen. 1008-1009 [doi]
- Poster abstract: Traffic flow prediction with big data: A deep learning based time series modelYuanfang Chen, Lei Shu, Lei Wang. 1010-1011 [doi]
- Poster abstract: A sliding counting bloom filterRan Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner. 1012-1013 [doi]
- Local voting: Optimal distributed node scheduling algorithm for multihop wireless networksDimitrios J. Vergados, Natalia Amelina, Yuming Jiang, Katina Kralevska, Oleg N. Granichin. 1014-1015 [doi]
- Poster abstract: Streamlined anomaly detection in web requests using recurrent neural networksArne Bochem, Hang Zhang, Dieter Hogrefe. 1016-1017 [doi]
- Poster abstract: Resource allocation with service availability & QoS constraints in mobile fog networksNader Daneshfar, Nikolaos Pappas, Vangelis Angelakis. 1018-1019 [doi]
- Poster abstract: En route towards trace-based simulation of vehicular mobilityRoozbeh Ketabi, Babak Alipour, Ahmed Helmy. 1020-1021 [doi]
- Poster abstract: SDN-based handover management in enterprise networked femtocells with X2-forwarding schemeTewelde Degefa Assefa, Rashedul Hoque, Elias Z. Tragos, Xenofontas A. Dimitropoulos. 1022-1023 [doi]
- Poster abstract: Location-centric relationship graph for indoor mobility using WLANsMimonah Al Qathrady, Ahmed Helmy. 1024-1025 [doi]