Abstract is missing.
- Collaborative Uploading in Heterogeneous Networks: Optimal and Adaptive StrategiesWasiur R. KhudaBukhsh, Bastian Alt, Sounak Kar, Amr Rizk, Heinz Koeppl. 1-9 [doi]
- Highly Compact Virtual Active Counters for Per-flow Traffic MeasurementYou Zhou 0003, Yian Zhou, Shigang Chen, Youlin Zhang. 1-9 [doi]
- Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue BindingZhuotao Liu, Kai Chen 0005, Haitao Wu, Shuihai Hu, Yih-Chun Hu, Yi Wang, Gong Zhang. 1-9 [doi]
- Blind, Adaptive and Robust Flow Segmentation in DatacentersFrancesco De Pellegrini, Lorenzo Maggi, Antonio Massaro, Damien Saucez, Jeremie Leguay, Eitan Altman. 10-18 [doi]
- Proactive Incast Congestion Control in a Datacenter Serving Web ApplicationsHaoyu Wang, Haiying Shen. 19-27 [doi]
- Pricing for Revenue Maximization in Inter-DataCenter NetworksZhenzhe Zheng, R. Srikant, Guihai Chen. 28-36 [doi]
- Offloading Dependent Tasks with Communication Delay and Deadline ConstraintSowndarya Sundar, Ben Liang. 37-45 [doi]
- Energy-Efficient Computation Offloading for Multicore-Based Mobile DevicesYeli Geng, Yi Yang 0005, Guohong Cao. 46-54 [doi]
- Accelerating Mobile Applications at the Network Edge with Software-Programmable FPGAsShuang Jiang, Dong He, Chenxi Yang, Chenren Xu, Guojie Luo, Yang Chen, Yunlu Liu, Jiangwei Jiang. 55-62 [doi]
- When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine LearningShiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He 0001, Kevin Chan 0001. 63-71 [doi]
- CoDrive: Improving Automobile Positioning via Collaborative DrivingSoteris Demetriou, Puneet Jain, Kyu-Han Kim. 72-80 [doi]
- Temporal Reachability in Vehicular NetworksLuca Bedogni, Marco Fiore, Christian Glacet. 81-89 [doi]
- Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust OptimizationDaxin Tian, Jianshan Zhou, Min Chen, Zhengguo Sheng, Qiang Ni, Victor C. M. Leung. 90-98 [doi]
- mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple VehiclesChi Lin, Zhiyuan Wang, Jing Deng, Lei Wang, Jiankang Ren, Guowei Wu. 99-107 [doi]
- Coverage in Battery-Free Wireless Sensor NetworksTuo Shi, Jianzhong Li, Hong Gao, Zhipeng Cai. 108-116 [doi]
- Energy-Collision Aware Data Aggregation Scheduling for Energy Harvesting Sensor NetworksQuan Chen 0003, Hong Gao, Zhipeng Cai, Lianglun Cheng, Jianzhong Li. 117-125 [doi]
- Finding the Stars in the Fireworks: Deep Understanding of Motion Sensor FingerprintHuiqi Liu, Xiangyang Li, Lan Zhang, Yaochen Xie, Zhenan Wu, Qian Dai, Ge Chen, Chunxiao Wan. 126-134 [doi]
- 2: Overcoming Overall Storage Overflow in Intermittently Connected Sensor NetworksBin Tang. 135-143 [doi]
- Enabling Cross-technology Communication between LTE Unlicensed and WiFiPiotr Gawlowicz, Anatolij Zubow, Adam Wolisz. 144-152 [doi]
- TwinBee: Reliable Physical-Layer Cross-Technology Communication with Symbol-Level CodingYongrui Chen, Zhijun Li, Tian He 0001. 153-161 [doi]
- LongBee: Enabling Long-Range Cross-Technology CommunicationZhijun Li, Tian He 0001. 162-170 [doi]
- StripComm: Interference-Resilient Cross-Technology Communication in Coexisting EnvironmentsXiaolong Zheng 0002, Yuan He 0004, Xiuzhen Guo. 171-179 [doi]
- Improving Utilization and Parallelism of Hadoop Cluster by Elastic ContainersYinggen Xu, Wei Chen 0038, Shaoqi Wang, Xiaobo Zhou, Changjun Jiang. 180-188 [doi]
- An Analysis and Empirical Study of Container NetworksKun Suo, Yong Zhao, Wei Chen 0038, Jia Rao. 189-197 [doi]
- Load Balancing Across MicroservicesYipei Niu, Fangming Liu, Zongpeng Li. 198-206 [doi]
- Joint Service Caching and Task Offloading for Mobile Edge Computing in Dense NetworksJie Xu, Lixing Chen, Pan Zhou. 207-215 [doi]
- CCOMPASSION: A Hybrid Cloudlet Placement Framework Over Passive Optical Access NetworksSourav Mondal, Goutam Das, Elaine Wong 0001. 216-224 [doi]
- QuickCast: Fast and Efficient Inter-Datacenter Transfers Using Forwarding Tree CohortsMohammad Noormohammadpour, Cauligi S. Raghavendra, Srikanth Kandula, Sriram Rao. 225-233 [doi]
- Traffic Engineering with Precomputed PathbooksMathieu Leconte, Apostolos Destounis, Georgios S. Paschos. 234-242 [doi]
- FERO: Fast and Efficient Resource Orchestrator for a Data Plane Built on Docker and DPDKBalázs Sonkoly, Marton Szabo, Balázs Németh, András Majdán, Gergely Pongrácz, László Toka. 243-251 [doi]
- Distributed Joint AP Grouping and User Association for MU-MIMO NetworksWangkit Wong, S.-H. Gary Chan. 252-260 [doi]
- PAFD: Phased Array Full-DuplexEhsan Aryafar, Alireza Keshavarz-Haddad. 261-269 [doi]
- Enabling Indoor Mobile Millimeter-wave Networks Based on Smart Reflect-arraysXin Tan, Zhi Sun, Dimitrios Koutsonikolas, Josep Miquel Jornet. 270-278 [doi]
- Scheduling and Resource Allocation in 802.11axKaidong Wang, Konstantinos Psounis. 279-287 [doi]
- Optimal Content Replication and Request Matching in Large Caching SystemsArpan Mukhopadhyay, Nidhi Hegde, Marc Lelarge. 288-296 [doi]
- On Achieving Zero Delay with Power-of-d-Choices Load BalancingXin Liu, Lei Ying. 297-305 [doi]
- Predictive Pre-allocation for Low-latency Uplink Access in Industrial Wireless NetworksMingyan Li, Xinping Guan, Cunqing Hua, Cailian Chen, Ling Lyu. 306-314 [doi]
- Boosting the Throughput of LED-Camera VLC via Composite Light EmissionYanbing Yang, Jun Luo. 315-323 [doi]
- Self-Adapting Quorum-Based Neighbor Discovery in Wireless Sensor NetworksHao Cai, Tilman Wolf. 324-332 [doi]
- Symmetric Connectivity Algotirthms in Multiple Directional Antennas Wireless Sensor NetworksTien Tran, Dung T. Huynh. 333-341 [doi]
- Monitoring LED Lights with Current SignaturesJohnny Verhoeff, S. N. Akshay Uttama Nambi, Marco Zuniga Zamalloa, Bontor Humala. 342-350 [doi]
- Eyelight: Light-and-Shadow-Based Occupancy Estimation and Room Activity RecognitionViet Nguyen, Mohamed Ibrahim, Siddharth Rupavatharam, Minitha Jawahar, Marco Gruteser, Richard E. Howard. 351-359 [doi]
- ZIGFI: Harnessing Channel State Information for Cross-Technology CommunicationXiuzhen Guo, Yuan He 0004, Xiaolong Zheng 0002, Liangcheng Yu, Omprakash Gnawali. 360-368 [doi]
- ECT: Exploiting Cross-Technology Concurrent Transmission for Reducing Packet Delivery Delay in IoT NetworksWei Wang, Tiantian Xie, Xin Liu, Ting Zhu. 369-377 [doi]
- Robustly Safe Charging for Wireless Power TransferHaipeng Dai, Yang Zhao, Guihai Chen, Wanchun Dou, Chen Tian, Xiaobing Wu, Tian He 0001. 378-386 [doi]
- Placement of Connected Wireless ChargersNan Yu, Haipeng Dai, Alex X. Liu, Bingchuan Tian. 387-395 [doi]
- FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined NetworkingKai Bu, Yutian Yang, Zixuan Guo, Yuanyuan Yang, Xing Li, Shigeng Zhang. 396-404 [doi]
- NeuroViNE: A Neural Preprocessor for Your Virtual Network Embedding AlgorithmAndreas Blenk, Patrick Kalmbach, Johannes Zerwas, Michael Jarschel, Stefan Schmid 0001, Wolfgang Kellerer. 405-413 [doi]
- Online Multicast Traffic Engineering for Software-Defined NetworksSheng-Hao Chiang, Jian-Jhih Kuo, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen. 414-422 [doi]
- CORA: Conflict Razor for Policies in SDNHao Li 0011, Kaiyue Chen, Tian Pan, Yadong Zhou, Kun Qian, Kai Zheng 0003, Bin Liu 0001, Peng Zhang, Yazhe Tang, Chengchen Hu. 423-431 [doi]
- Analyzing Replacement Policies in List-Based Caches with Non-Uniform Access CostsGiuliano Casale. 432-440 [doi]
- DR-Cache: Distributed Resilient Caching with Latency GuaranteesJian Li, Truong Khoa Phan, Wei Koong Chai, Daphné Tuncer, George Pavlou, David Griffin 0001, Miguel Rio. 441-449 [doi]
- Asymptotic Miss Ratio of LRU Caching with Consistent HashingKaiyi Ji, Guocong Quan, Jian Tan. 450-458 [doi]
- LRU Caching with Dependent Competing RequestsGuocong Quan, Kaiyi Ji, Jian Tan. 459-467 [doi]
- Service Entity Placement for Social Virtual Reality Applications in Edge ComputingLin Wang, Lei Jiao, Ting He, Jun Li, Max Mühlhäuser. 468-476 [doi]
- CoINT: Proactive Coordinator for Avoiding Interruptability Holder Preemption Problem in VSMP EnvironmentWang Zhang, Xiaokang Hu, Jian Li 0021, Haibing Guan. 477-485 [doi]
- Adaptive VNF Scaling and Flow Routing with Proactive Demand PredictionXincai Fei, Fangming Liu, Hong Xu, Hai Jin 0001. 486-494 [doi]
- Online Job Scheduling in Distributed Machine Learning ClustersYixin Bao, Yanghua Peng, Chuan Wu, Zongpeng Li. 495-503 [doi]
- Performance-Aware Fair Scheduling: Exploiting Demand Elasticity of Data Analytics JobsChen Chen 0015, Wei Wang 0030, Bo Li 0001. 504-512 [doi]
- COBRA: Toward Provably Efficient Semi-Clairvoyant Scheduling in Data Analytics SystemsXiaoda Zhang, Zhuzhong Qian, Sheng Zhang 0001, Xiangbo Li, Xiaoliang Wang, Sanglu Lu. 513-521 [doi]
- LAS: Logical-Block Affinity Scheduling in Big Data Analytics SystemsLiang Bao, Chase Q. Wu, Haiyang Qi, Weizhao Chen, Xin Zhang, Weina Han, Wei Wei, En Tail, Hao Wang, Jiahao Zhai, Xiang Chen. 522-530 [doi]
- A Hierarchical Synchronous Parallel Model for Wide-Area Graph AnalyticsShuhao Liu, Li Chen 0019, Baochun Li, Aiden Carnegie. 531-539 [doi]
- Low-Complexity, Low-Regret Link Rate Selection in Rapidly-Varying Wireless ChannelsHarsh Gupta, Atilla Eryilmaz, R. Srikant. 540-548 [doi]
- Lightweight Retransmission for Random Access in Satellite NetworksJing Chen, Feilong Tang, Heteng Zhang, Laurence T. Yang. 549-557 [doi]
- Full-Duplex Metamaterial-Enabled Magnetic Induction Networks in Extreme EnvironmentsHongzhi Guo, Zhi Sun. 558-566 [doi]
- Reduced-State, Optimal Medium Access Control for Wireless Data Collection NetworksAvinash Mohan, Aditya Gopalan, Anurag Kumar 0001. 567-575 [doi]
- Hybrid Scheduling in Heterogeneous Half-and Full-Duplex Wireless NetworksTingjun Chen, Jelena Diakonikolas, Javad Ghaderi, Gil Zussman. 576-584 [doi]
- Closed form Expressions for the Performance Metrics of Data Services in Cellular NetworksPaolo Castagno, Vincenzo Mancuso, Matteo Sereno, Marco Ajmone Marsan. 585-593 [doi]
- Network Utility Maximization in Adversarial EnvironmentsQingkai Liang, Eytan Modiano. 594-602 [doi]
- Timely-Throughput Optimal Scheduling with PredictionKun Chen, Longbo Huang. 603-611 [doi]
- Joint Placement and Routing of Network Function Chains in Data CentersLinqi Guo, John Z. T. Pang, Anwar Walid. 612-620 [doi]
- VeriTable: Fast Equivalence Verification of Multiple Large Forwarding TablesGaregin Grigoryan, Yaoqing Liu, Michael Leczinsky, Jun Li. 621-629 [doi]
- Online Deadline-Aware Bulk Transfer Over Inter-Datacenter WANsLong Luo, Hongfang Yu, Zilong Ye, Xiaojiang Du. 630-638 [doi]
- A Cross-Architectural Quantitative Evaluation of Mobility ApproachesVasanta G. Chaganti, James F. Kurose, Arun Venkataramani. 639-647 [doi]
- Combating Bufferbloat in Multi-Bottleneck Networks: Equilibrium, Stability, and AlgorithmsJiancheng Ye, Ka-Cheong Leung, Victor O. K. Li, Steven H. Low. 648-656 [doi]
- A Case for Web Service Bandwidth Reduction on Mobile Devices with Edge-Hosted Personal ServicesYongshu Bai, Pengzhan Hao, Yifan Zhang 0002. 657-665 [doi]
- Towards Stability Analysis of Data Transport Mechanisms: A Fluid Model and an ApplicationGayane Vardoyan, C. V. Hollot, Don Towsley. 666-674 [doi]
- Curbing Timeouts for TCP-Incast in Data Centers via A Cross-Layer Faster Recovery MechanismAhmed M. Abdelmoniem, Brahim Bensaou. 675-683 [doi]
- SDN Controller Placement at the Edge: Optimizing Delay and OverheadsQiaofeng Qin, Konstantinos Poularakis, George Iosifidis, Leandros Tassiulas. 684-692 [doi]
- Dynamic, Latency-Optimal vNF Placement at the Network EdgeRichard Cziva, Christos Anagnostopoulos, Dimitrios P. Pezaros. 693-701 [doi]
- On Scalable Service Function Chaining with $\mathcal{O}(1)$ Flowtable EntriesYi Ren 0001, Tzu-Ming Huang, Kate Ching-Ju Lin, Yu-Chee Tseng. 702-710 [doi]
- Toward the First SDN Programming Capacity Theorem on Realizing High-Level Programs on Low-Level DatapathsChristopher Leet, Xin Wang, Y. Richard Yang, James Aspnes. 711-719 [doi]
- Prophet: Fast Accurate Model-Based Throughput Prediction for Reactive Flow in DC NetworksKai Gao, Jingxuan Zhang, Y. Richard Yang, Jun Bi. 720-728 [doi]
- Estimating Information Exchange Performance of Engineered Cell-to-cell Molecular Communications: A Computational ApproachColton Harper, Massimiliano Pierobon, Maurizio Mazarini. 729-737 [doi]
- Robust Loss Inference in the Presence of Noisy MeasurementsYan Qiao. 738-746 [doi]
- Inflow: Inverse Network Flow Watermarking for Detecting Hidden ServersAlfonso Iacovazzi, Sanat Sarda, Yuval Elovici. 747-755 [doi]
- An Edge Network Orchestrator for Mobile Augmented RealityQiang Liu, Siqi Huang, Johnson Opadere, Tao Han. 756-764 [doi]
- Demystifying the Performance Interference of Co-Located Virtual Network FunctionsChaobing Zeng, Fangming Liu, Shutong Chen, Weixiang Jiang, Miao Li. 765-773 [doi]
- Provably Efficient Algorithms for Placement of Service Function Chains with Ordering ConstraintsAndrea Tomassilli, Frédéric Giroire, Nicolas Huin, Stéphane Pérennes. 774-782 [doi]
- Application Provisioning in FOG Computing-enabled Internet-of-Things: A Network PerspectiveRuozhou Yu, Guoliang Xue, Xiang Zhang 0005. 783-791 [doi]
- Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair RealizationShengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren 0001. 792-800 [doi]
- REARGUARD: Secure Keyword Search Using Trusted HardwareWenhai Sun, Ruide Zhang, Wenjing Lou, Y. Thomas Hou. 801-809 [doi]
- Differentially Private Access Patterns for Searchable Symmetric EncryptionGuoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang. 810-818 [doi]
- EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis SystemXiangyu Wang, Jianfeng Ma, Yinbin Miao, Ruikang Yang, Yijia Chang. 819-827 [doi]
- Trio: Utilizing Tag Interference for Refined Localization of Passive RFIDHan Ding, Jinsong Han, Chen Qian 0001, Fu Xiao, Ge Wang, Nan Yang, Wei Xi, Jian Xiao. 828-836 [doi]
- RF-Dial: An RFID-based 2D Human-Computer Interaction via Tag ArrayYanling Bu, Lei Xie, Yinyin Gong, Chuyu Wang, Lei Yang, Jia Liu, Sanglu Lu. 837-845 [doi]
- Anonymous Temporal-Spatial Joint Estimation at Category Level Over Multiple Tag SetsYoulin Zhang, Shigang Chen, You Zhou 0003, Yuguang Fang. 846-854 [doi]
- Robust Spinning Sensing with Dual-RFID-Tags in Noisy SettingsChunhui Duan, Lei Yang, Huanyu Jia, Qiongzheng Lin, Yunhao Liu, Lei Xie. 855-863 [doi]
- Scheduling Cofiows of Multi-stage Jobs to Minimize the Total Weighted Job Completion TimeBingchuan Tian, Chen Tian, Haipeng Dai, Bingquan Wang. 864-872 [doi]
- Leveraging Endpoint Flexibility when Scheduling Coflows across Geo-distributed DatacentersWenxin Li, Xu Yuan, Keqiu Li, Heng Qi, Xiaobo Zhou 0003. 873-881 [doi]
- Hybrid Circuit/Packet Network Scheduling with Multiple Composite PathsShih-Hao Tseng, Bo Bait, John C. S. Lui. 882-890 [doi]
- Utopia: Near-optimal Coflow Scheduling with Isolation GuaranteeLuPing Wang, Wei Wang 0030, Bo Li 0001. 891-899 [doi]
- A General Model for DoF-based Interference Cancellation in MIMO Networks With Rank-Deficient ChannelsYongce Chen, Yan Huang, Yi Shi 0001, Y. Thomas Hou, Wenjing Lou, Sastry Kompella. 900-907 [doi]
- Information Freshness Over an Interference Channel: A Game Theoretic ViewGam D. Nguyen, Sastry Kompella, Clement Kam, Jeffrey E. Wieselthier, Anthony Ephremides. 908-916 [doi]
- Impact of Channel State Misreporting on Multi-user Massive MIMO Scheduling PerformanceZhanzhan Zhang, Yin Sun, Ashutosh Sabharwal, Zhiyong Chen 0002. 917-925 [doi]
- WiFED: WiFi Friendly Energy Delivery with Distributed BeamformingSubhramoy Mohanti, Elif Bozkaya, M. Yousof Naderi, Berk Canberk, Kaushik R. Chowdhury. 926-934 [doi]
- Quality of Experience-based Routing of Video Traffic for Overlay and ISP NetworksGiacomo Calvigioni, Ramon Aparicio-Pardo, Lucile Sassatelli, Jeremie Leguay, Paolo Medagliani, Stefano Paris. 935-943 [doi]
- Predicting the effect of home Wi-Fi quality on QoEDiego N. da Hora, Karel Van Doorselaer, Koen Van Oost, Renata Teixeira. 944-952 [doi]
- BAS-360°: Exploring Spatial and Temporal Adaptability in 360-degree Videos over HTTP/2Mengbai Xiao, Chao Zhou, Viswanathan Swaminathan, Yao Liu 0001, Songqing Chen. 953-961 [doi]
- ClusTile: Toward Minimizing Bandwidth in 360-degree Video StreamingChao Zhou, Mengbai Xiao, Yao Liu 0001. 962-970 [doi]
- A Light-weight Approach to Obtaining NF State Information in SDN+NFV NetworksBing Leng, Liusheng Huang, Chunming Qiao, Hongli Xu. 971-979 [doi]
- Barista: An Event-centric NOS Composition Framework for Software-Defined NetworksJaehyun Nam, Hyeonseong Jo, Yeonkeun Kim, Phillip A. Porras, Vinod Yegneswaran, Seungwon Shin. 980-988 [doi]
- Scalable QoE-aware Path Selection in SDN-based Mobile NetworksRoberto Iraja Tavares da Costa Filho, William Lautenschlager, Nicolas Kagami, Marcelo Caggiani Luizelli, Valter Roesler, Luciano Paschoal Gaspary. 989-997 [doi]
- POMP: Protocol Oblivious SDN Programming with Automatic Multi-Table PipeliningChunhui He, Xinyu Feng. 998-1006 [doi]
- Large-scale Wireless Fingerprints Prediction for Cellular Network PositioningXinyu Wu, Xiaohua Tian, Xinbing Wang. 1007-1015 [doi]
- Steering Crowdsourced Signal Map Construction via Bayesian Compressive SensingSuining He, Kang G. Shin. 1016-1024 [doi]
- RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT DevicesSihua Shao, Abdallah Khreishah, Issa Khalil. 1025-1033 [doi]
- Secure Crowdsourced Indoor Positioning SystemsTao Li, Yimin Chen, Rui Zhang, Yanchao Zhang, Terri Hedgpeth. 1034-1042 [doi]
- When UAVs Ride A Bus: Towards Energy-efficient City-scale Video SurveillanceAngelo Trotta, Fabio D'Andreagiovanni, Marco Di Felice, Enrico Natalizio, Kaushik Roy Chowdhury. 1043-1051 [doi]
- ViTrack: Efficient Tracking on the Edge for Commodity Video Surveillance SystemsLinsong Cheng, Jiliang Wang. 1052-1060 [doi]
- Rainbow: Preventing Mobile-Camera-based Piracy in the Physical WorldLin Yang, Wei Wang, Zeyu Wang, Qian Zhang. 1061-1069 [doi]
- MV-Sports: A Motion and Vision Sensor Integration-Based Sports Analysis SystemCheng Zhang, Fan Yang, Gang Li, Qiang Zhai, Yi Jiang, Dong Xuan. 1070-1078 [doi]
- Towards Privacy-Preserving Speech Data PublishingJianwei Qian, Feng Han, Jiahui Hou, Chunhong Zhang, Yu Wang 0003, Xiang-Yang Li 0001. 1079-1087 [doi]
- PrivSet: Set-Valued Data Analyses with Locale Differential PrivacyShaowei Wang 0003, Liusheng Huang, Yiwen Nie, Pengzhan Wang, Hongli Xu, Wei Yang. 1088-1096 [doi]
- TruSense: Information Leakage from TrustZoneNing Zhang 0017, Kun Sun 0001, Deborah Shands, Wenjing Lou, Y. Thomas Hou. 1097-1105 [doi]
- Privacy-Preserving Social Media Data OutsourcingJinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, Xia Hu. 1106-1114 [doi]
- Preventing Unauthorized Access on Passive TagsHan Ding, Jinsong Han, Yanyong Zhang, Fu Xiao, Wei Xi, Ge Wang, Zhiping Jiang. 1115-1123 [doi]
- Range Queries for Sensor-augmented RFID SystemsXiulong Liu, Jiannong Cao, Keqiu Li, Jia Liu 0008, Xin Xie. 1124-1132 [doi]
- Fast and Reliable Tag Search in Large-Scale RFID Systems: A Probabilistic Tree-based ApproachJihong Yu, Wei Gong, Jiangchuan Liu, Lin Chen. 1133-1141 [doi]
- RFID Counting over Time-Varying ChannelsZiling Zhou, Binbin Chen. 1142-1150 [doi]
- Social Network De-anonymization with Overlapping Communities: Analysis, Algorithm and ExperimentsXinyu Wu, Zhongzhao Hu, Xinzhe Fu, Luoyi Fu, Xinbing Wang, Songwu Lu. 1151-1159 [doi]
- Host Profit Maximization for Competitive Viral Marketing in Billion-Scale NetworksYuqing Zhu, Deying Li. 1160-1168 [doi]
- Continuous time opinion dynamics of agents with multi-leveled opinions and binary actionsVineeth S. Varma, Irinel-Constantin Morarescu, Yezekael Hayel. 1169-1177 [doi]
- Towards Profit Maximization for Online Social Network ProvidersJing Tang 0004, Xueyan Tang, Junsong Yuan. 1178-1186 [doi]
- One-Hop Out-of-Band Control Planes for Low-Power Multi-Hop Wireless NetworksChaojie Gu, Rui Tan, Xin Lou, Dusit Niyato. 1187-1195 [doi]
- Exact Implementation of Abstract MAC Layer via Carrier SensingDongxiao Yu, Yong Zhang, Yuyao Huang, Hai Jin 0001, Jiguo Yu, Qiang-Sheng Hua. 1196-1204 [doi]
- Optimal Joint Routing and Scheduling in Millimeter-Wave Cellular NetworksDingwen Yuan, Hsuan-Yin Lin, Jörg Widmer, Matthias Hollick. 1205-1213 [doi]
- Making the Right Connections: Multi-AP Association and Flow Control in 60GHz BandFan Zhou, M. Yousof Naderi, Kunal Sankhe, Kaushik Chowdhury. 1214-1222 [doi]
- The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier EncryptionZheng Yang, Kimmo Järvinen 0001. 1223-1231 [doi]
- aLeak: Privacy Leakage through Context - Free Wearable Side-ChannelYang Liu 0101, Zhenjiang Li. 1232-1240 [doi]
- SECProv: Trustworthy and Efficient Provenance Management in the CloudShams Zawoad, Ragib Hasan, Mohammad Kamrul Islam. 1241-1249 [doi]
- Communication-Efficient and Privacy-Preserving Data Aggregation without Trusted AuthorityXuhui Gong, Qiang-Sheng Hua, Lixiang Qian, Dongxiao Yu, Hai Jin 0001. 1250-1258 [doi]
- MobiRate: Mobility-Aware Rate Adaptation Using PHY Information for Backscatter NetworksWei Gong, Si Chen, Jiangchuan Liu, Zhi Wang. 1259-1267 [doi]
- Exploiting Residual Channel for Implicit Wi-Fi Backscatter NetworksTaekyung Kim, Wonjun Lee. 1268-1276 [doi]
- Wi-Fi Teeter-Totter: Overclocking OFDM for Internet of ThingsWei Wang, Shiyue He, Lin Yang, Qian Zhang, Tao Jian. 1277-1285 [doi]
- Online Energy Management in IoT ApplicationsAli Sehati, Majid Ghaderi. 1286-1294 [doi]
- Who to Connect to? Joint Recommendations in Cross-layer Social NetworksJiaqi Liu, Qi Lian, Luoyi Fu, Xinbing Wang. 1295-1303 [doi]
- Deep User Modeling for Content-based Event Recommendation in Event-based Social NetworksZhibo Wang, YongQuan Zhang, Honglong Chen, Zhetao Li, Feng Xia 0001. 1304-1312 [doi]
- DeepLink: A Deep Learning Approach for User Identity LinkageFan Zhou 0002, Lei Liu, Kunpeng Zhang, Goce Trajcevski, Jin Wu, Ting Zhong. 1313-1321 [doi]
- Predicting Learner Interactions in Social Learning NetworksTsung-Yen Yang, Christopher G. Brinton, Carlee Joe-Wong. 1322-1330 [doi]
- Real-time Video Quality of Experience Monitoring for HTTPS and QUICM. Hammad Mazhar, Zubair Shafiq. 1331-1339 [doi]
- Network Measurement in Multihop Wireless Networks with Lossy and Correlated LinksChenhong Cao, Wei Gong, Wei Dong 0001, Jihong Yu, Chun Chen, Jiangchuan Liu. 1340-1348 [doi]
- Adaptive Crawling with Multiple Bots: A Matroid Intersection ApproachXiang Li 0016, J. David Smith, Thang N. Dinh, My T. Thai. 1349-1357 [doi]
- Estimation of DNS Source and Cache Dynamics under Interval-Censored Age SamplingDi Xiao, Xiaoyong Li 0004, Daren B. H. Cline, Dmitri Loguinov. 1358-1366 [doi]
- Low-Complexity Learning for Dynamic Spectrum Access in Multi-User Multi-Channel NetworksSunjung Kang, Changhee Joo. 1367-1375 [doi]
- Off-sensing and Route Manipulation Attack: A Cross-Layer Attack in Cognitive Radio based Wireless Mesh NetworksMoinul Hossain, Jiang Xie. 1376-1384 [doi]
- Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping CapabilitySigit Aryo Pambudi, Wenye Wang, Cliff Wang. 1385-1393 [doi]
- The Impact of Bundling Licensed and Unlicensed Wireless ServiceXu Wang, Randall A. Berry. 1394-1402 [doi]
- Finding Persistent Items in Distributed DatasetsHaipeng Dai, Meng Li, Alex Liu. 1403-1411 [doi]
- Bloom Filter with a False Positive Free ZoneSándor Z. Kiss, Éva Hosszu, János Tapolcai, Lajos Rónyai, Ori Rottenstreich. 1412-1420 [doi]
- DeepDecision: A Mobile Deep Learning Framework for Edge Video AnalyticsXukan Ran, Haoliang Chen, Xiaodan Zhu, Zhenming Liu, Jiasi Chen. 1421-1429 [doi]
- A Computing Platform for Video Crowdprocessing Using Deep LearningZongqing Lu, Kevin S. Chan, Thomas F. La Porta. 1430-1438 [doi]
- Smart-U: Smart Utensils Know what You EatQianyi Huang, Zhice Yang, Qian Zhang. 1439-1447 [doi]
- WordRecorder: Accurate Acoustic-based Handwriting Recognition Using Deep LearningHaishi Du, Ping Li, Hao Zhou, Wei Gong, Gan Luo, Panlong Yang. 1448-1456 [doi]
- PPG-based Finger-level Gesture Recognition Leveraging WearablesTianming Zhao, Jian Liu, Yan Wang, Hongbo Liu, Yingying Chen. 1457-1465 [doi]
- LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic SignalsLi Lu 0001, Jiadi Yu, Yingying Chen, Hongbo Liu, Yanmin Zhu, Yunfei Liu, Minglu Li 0001. 1466-1474 [doi]
- AppDNA: App Behavior Profiling via Graph-based Deep LearningShuangshuang Xu, Lan Zhang, Anran Li, Xiang-Yang Li, Chaoyi Ruan, Wenchao Huang. 1475-1483 [doi]
- Understanding Ethereum via Graph AnalysisTing Chen 0002, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang. 1484-1492 [doi]
- A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoTYizhen Jia, Yinhao Xiao, Jiguo Yu, Xiuzhen Cheng, Zhenkai Liang, Zhiguo Wan. 1493-1501 [doi]
- Graph based Tensor Recovery for Accurate Internet Anomaly DetectionKun Xie, Xiaocan Li, Xin Wang, Gaogang Xie, Jigang Wen, Dafang Zhang. 1502-1510 [doi]
- Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of ThingsTran Viet Xuan Phuong, Rui Ning, Chunsheng Xin, Hongyi Wu. 1511-1519 [doi]
- SecTap: Secure Back of Device Input System for Mobile DevicesZhen Ling, Junzhou Luo, Yaowen Liu, Ming Yang 0001, Kui Wu 0001, Xinwen Fu. 1520-1528 [doi]
- SFIRE: Secret-Free-in-band Trust Establishment for COTS Wireless DevicesNirnimesh Ghose, Loukas Lazos, Ming Li. 1529-1537 [doi]
- Walls Have Ears: Traffic-based Side-channel Attack in Video StreamingJiaxi Gu, Jiliang Wang, Zhiwen Yu, Kele Shen. 1538-1546 [doi]
- Talking When No One is Listening: Piggybacking City-scale IoT Control Signals Over LTEKunal Sankhe, Ufuk Muncuk, M. Yousof Naderi, Kaushik Chowdhury. 1547-1555 [doi]
- IoT Communication Sharing: Scenarios, Algorithms and ImplementationChuang Hu, Wei Bao, Dan Wang. 1556-1564 [doi]
- RED: RFID-based Eccentricity Detection for High-speed Rotating MachineryYilun Zheng, Yuan He, Meng Jin, Xiaolong Zheng 0002, Yunhao Liu. 1565-1573 [doi]
- Acousticcardiogram: Monitoring Heartbeats using Acoustic Signals on Smart DevicesKun Qian 0004, Chenshu Wu, Fu Xiao, Yue Zheng, Yi Zhang, Zheng Yang, Yunhao Liu. 1574-1582 [doi]
- On User Mobility in Dynamica Cloud Radio Access NetworksDiala Naboulsi, Assia Mermouri, Razvan Stanica, Hervé Rivano, Marco Fiore. 1583-1591 [doi]
- Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation ErrorsHanif Rahbari, Peyman Siyari, Marwan Krunz, Jung-Min "Jerry" Park. 1592-1600 [doi]
- On the Effect of Shadowing Correlation on Wireless Network PerformanceJunse Lee, François Baccelli. 1601-1609 [doi]
- An Online Approach to D2D Trajectory Utility Maximization ProblemAmrit S. Bedi, Ketan Rajawat, Marceau Coupechoux. 1610-1618 [doi]
- The Cloud that Runs the Mobile Internet: A Measurement Study of Mobile Cloud ServicesFoivos Michelinakis, Hossein Doroud, Abbas Razaghpanah, Andra Lutu, Narseo Vallina-Rodriguez, Phillipa Gill, Joerg Widmer. 1619-1627 [doi]
- Squeezing the Gap: An Empirical Study on DHCP Performance in a Large-scale Wireless NetworkHaibo Wang, Jilong Wang, Weizhen Dang, Jing'an Xue, FengHua Li. 1628-1636 [doi]
- Flutes vs. Cellos: Analyzing Mobility-Traffic Correlations in Large WLAN TracesBabak Alipour, Leonardo Tonetto, Aaron Yi Ding, Roozbeh Ketabi, Jörg Ott, Ahmed Helmy. 1637-1645 [doi]
- Email as a Master Key: Analyzing Account Recovery in the WildYue Li 0002, Haining Wang, Kun Sun. 1646-1654 [doi]
- RECONN: Receiver-Driven Operating Channel Width Adaptation in IEEE 802.11ac WLANsSeongho Byeon, Hwijae Kwon, Youngwook Son, Changmok Yang, Sunghyun Choi. 1655-1663 [doi]
- Stable Combinatorial Spectrum MatchingYanjiao Chen, Long Lin, Guiyan Cao, Zhenzhong Chen, Baochun Li. 1664-1672 [doi]
- AirVIEW: Unsupervised transmitter detection for next generation spectrum sensingMariya Zheleva, Petko Bogdanov, Timothy LaRock, Paul Schmitt. 1673-1681 [doi]
- Spectrum Patrolling with Crowdsourced Spectrum SensorsAyon Chakraborty, Arani Bhattacharya, Snigdha Kamal, Samir R. Das, Himanshu Gupta, Petar M. Djuric. 1682-1690 [doi]
- Multi - Touch in the Air: Device-Free Finger Tracking and Gesture Recognition via COTS RFIDChuyu Wang, Jian Liu, Yingying Chen, Hongbo Liu, Lei Xie, Wei Wang, Bingbing He, Sanglu Lu. 1691-1699 [doi]
- Accurate and Efficient Wireless Device Fingerprinting Using Channel State InformationJingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, Sheng Zhong. 1700-1708 [doi]
- Vernier: Accurate and Fast Acoustic Motion Tracking Using Mobile DevicesYunting Zhang, Jiliang Wang, Weiyi Wang, Zhao Wang, Yunhao Liu. 1709-1717 [doi]
- Aegis: An Interference-Negligible RF Sensing ShieldYao Yao, Yan Li, Xin Liu, Zicheng Chi, Wei Wang, Tiantian Xie, Ting Zhu. 1718-1726 [doi]
- Spectral Graph Forge: Graph Generation Targeting ModularityLuca Baldesi, Carter T. Butts, Athina Markopoulou. 1727-1735 [doi]
- Quantifying Graph Anonymity, Utility, and De-anonymityShouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem A. Beyah. 1736-1744 [doi]
- Correcting the Output of Approximate Graph Matching AlgorithmsJoseph Lubars, R. Srikant. 1745-1753 [doi]
- Fast Beeping Protocols for Deterministic MIS and (Δ + 1)-Coloring in Sparse GraphsJoffroy Beauquier, Janna Burman, Fabien Dufoulon, Shay Kutten. 1754-1762 [doi]
- A Framework for MIMO-based Packet Header ObfuscationYue Cao, Ahmed Osama Fathy Atya, Shailendra Singh 0004, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta, Prashant Krishnamurthy, Lisa M. Marvel. 1763-1771 [doi]
- Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise EnvironmentsQian Zhou, Mohammed Elbadry, Fan Ye 0003, Yuanyuan Yang. 1772-1780 [doi]
- Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed BeamformingXiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E, Howard, Zhu Han. 1781-1789 [doi]
- Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical SystemsKaiming Xiao, Cheng Zhu, Junjie Xie, Yun Zhou 0001, Xianqiang Zhu, Weiming Zhang. 1790-1798 [doi]
- Polynomial-Time What-If Analysis for Prefix-Manipulating MPLS NetworksStefan Schmid 0001, Jirí Srba. 1799-1807 [doi]
- Toward Optimal Storage Scaling via Network Coding: From Theory to PracticeXiaoyang Zhang, Yuchong Hu, Patrick P. C. Lee, Pan Zhou. 1808-1816 [doi]
- Optimizing Network Reliability via Best-First Search over Decision DiagramsMasaaki Nishino, Takeru Inoue, Norihito Yasuda, Shin-ichi Minato, Masaaki Nagata. 1817-1825 [doi]
- Network Timing, Weathering the 2016 Leap SecondYi Cao, Darryl Veitch. 1826-1834 [doi]
- Competitive Online Convex Optimization with Switching Costs and Ramp ConstraintsMing Shit, Xiaojun Lin, Sonia Fahmy, Dong-Hoon Shin. 1835-1843 [doi]
- Optimizing Age of Information in Wireless Networks with Throughput ConstraintsIgor Kadota, Abhishek Sinha, Eytan Modiano. 1844-1852 [doi]
- Learning Aided Optimization for Energy Harvesting Devices with Outdated State InformationHao Yu 0002, Michael J. Neely. 1853-1861 [doi]
- High-Order Momentum: Improving Latency and Convergence for Wireless Network OptimizationJia Liu. 1862-1870 [doi]
- Experience-driven Networking: A Deep Reinforcement Learning based ApproachZhiyuan Xu, Jian Tang 0008, Jingsong Meng, Weiyi Zhang, Yanzhi Wang, Chi Harold Liu, Dejun Yang. 1871-1879 [doi]
- Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic FlowsJianan Zhang, Abhishek Sinha, Jaime Llorca, Antonia Maria Tulino, Eytan Modiano. 1880-1888 [doi]
- You Can Drop but You Can't Hide: K-persistent Spread Estimation in High-speed NetworksHe Huang, Yu-e Sun, Shigang Chen, ShaoJie Tang, Kai Han, Jing Yuan 0002, Wenjian Yang. 1889-1897 [doi]
- Opportunistic Multichannel Access with Imperfect Observation: A Fixed Point Analysis on Indexability and Index-based PolicyKehao Wang, Lin Chen, Jihong Yu, Moe Win. 1898-1906 [doi]
- Maximizing Profit of Cloud Service Brokerage with Economic Demand ResponseTing Deng, Jianguo Yao, Haibing Guan. 1907-1915 [doi]
- Virtual Redundancy for Active-Standby Cloud ApplicationsGueyoung Jung, Parisa Rahimzadeh, Zhang Liu, Sangtae Ha, Kaustubh Joshi, Matti A. Hiltunen. 1916-1924 [doi]
- Contracts as Investment Barriers in Unlicensed SpectrumYining Zhu, Randall A. Berry. 1925-1933 [doi]
- Market Your Venue with Mobile Applications: Collaboration of Online and Offline BusinessesHaoran Yu, George Iosifidis, Biying Shou, Jianwei Huang. 1934-1942 [doi]
- Joint VNF Placement and CPU Allocation in 5GSatyam Agarwal, Francesco Malandrino, Carla-Fabiana Chiasserini, Swades De. 1943-1951 [doi]
- Enabling Quality-Driven Scalable Video Transmission over Multi-User NOMA SystemXiaoda Jiang, Hancheng Lu, Chang Wen Chen. 1952-1960 [doi]
- FML: Fast Machine Learning for 5G mmWave Vehicular CommunicationsArash Asadi, Sabrina Müller, Gek Hong Sim, Anja Klein 0002, Matthias Hollick. 1961-1969 [doi]
- Joint Scheduling of URLLC and eMBB Traffic in 5G Wireless NetworksArjun Anand, Gustavo de Veciana, Sanjay Shakkottai. 1970-1978 [doi]
- From Uncertain Photos to Certain Coverage: a Novel Photo Selection Approach to Mobile CrowdsensingTongqing Zhou, Bin Xiao, Zhiping Cai, Ming Xu, Xuan Liu. 1979-1987 [doi]
- Non-Interactive Privacy-Preserving Truth Discovery in Crowd Sensing ApplicationsXiaoting Tang, Cong Wang, Xingliang Yuan, Qian Wang. 1988-1996 [doi]
- Spatiotemporal Scheduling for Crowd Augmented Urban SensingQiuxi Zhu, Md. Yusuf Sarwar Uddin, Nalini Venkatasubramanian, Cheng-Hsin Hsu. 1997-2005 [doi]
- An Online Learning Approach to Network Application Optimization with GuaranteeKechao Cai, Xutong Liu, Yu-Zhen Janice Chen, John C. S. Lui. 2006-2014 [doi]
- I Can Hear More: Pushing the Limit of Ultrasound Sensing on Off-the-Shelf Mobile DevicesYuchi Chen, Wei Gong, Jiangchuan Liu, Yong Cui 0001. 2015-2023 [doi]
- Motion-Fi: Recognizing and Counting Repetitive Motions with Passive Wireless BackscatteringNing Xiao, Panlong Yang, Yubo Yan, Hao Zhou, Xiang-Yang Li. 2024-2032 [doi]
- Efficient Jobs Dispatching in Emerging CloudsShimon Bitton, Yuval Emek, Shay Kutten. 2033-2041 [doi]
- Online Partial Throughput Maximization for Multidimensional CoflowSungjin Im, Maryam Shadloo, Zizhan Zheng. 2042-2050 [doi]
- Mining Long-Term Stealthy User Behaviors on High Speed LinksPinghui Wang, Peng Jia, Jing Tao, Xiaohong Guan. 2051-2059 [doi]
- CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS ConnectionsJing Chen, Shixiong Yao, Quan Yuan 0003, Kun He 0008, Shouling Ji, RuiYing Du. 2060-2068 [doi]
- ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-PathXu Zhang, Jeffrey Knockel, Jedidiah R. Crandall. 2069-2077 [doi]
- Game Theoretic Characterization of Collusive Behavior Among AttackersAbhishek Roy, Charles A. Kamhoua, Prasant Mohapatra. 2078-2086 [doi]
- InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential PrivacyLingchen Zhao, Lihao Ni, Shengshan Hu, Yanjiao Chen, Pan Zhou, Fu Xiao, Libing Wu. 2087-2095 [doi]
- Designing Optimal Middlebox Recovery Schemes with Performance GuaranteesYossi Kanizo, Ori Rottenstreich, Itai Segall, Jose Yallouz. 2096-2104 [doi]
- A Tractable Stochastic Model of Correlated Link Failures Caused by DisastersJános Tapolcai, Balazs Vass, Zalán Heszberger, József Bíró, David Hay, Fernando A. Kuipers, Lajos Rónyai. 2105-2113 [doi]
- ADELE: Anomaly Detection from Event Log EmpiricismSubhendu Khatuya, Niloy Ganguly, Jayanta Basak, Madhumita Bharde, Bivas Mitra. 2114-2122 [doi]
- A Tale of Two Metrics in Network Delay OptimizationQingyu Liu, Lei Deng, Haibo Zeng, Minghua Chen. 2123-2131 [doi]
- Shortest Path and Maximum Flow Problems Under Service Function Chaining ConstraintsGamal Sallam, Gagan Ray Gupta, Bin Li, Bo Ji. 2132-2140 [doi]
- On the Optimal Monitor Placement for Inferring Additive Metrics of Interested PathsRongwei Yang, Cuiying Feng, Luning Wang, Weiwei Wu, Kui Wu 0001, Jianping Wang, Yinlong Xu. 2141-2149 [doi]
- Optimizing NFV Chain Deployment through Minimizing the Cost of Virtual SwitchingMarcelo Caggiani Luizelli, Danny Raz, Yaniv Sa'ar. 2150-2158 [doi]
- Online Knapsack Problem Under Expected Capacity ConstraintRahul Vaze. 2159-2167 [doi]
- Towards Repeatable Wireless Network Simulation Using Performance Aware Markov ModelZhiwei Zhao, Wei Dong 0001, Geyong Min, Gonglong Chen, Tao Gu, Jiajun Bu. 2168-2176 [doi]
- A Resource Allocation Framework for Network SlicingMathieu Leconte, Georgios S. Paschos, Panayotis Mertikopoulos, Ulas C. Kozat. 2177-2185 [doi]
- Percolation-based Network Adaptability Under Correlated FailuresJin-Hee Cho, Terrence J. Moore. 2186-2194 [doi]
- Building Generic Scalable Middlebox Services Over Encrypted ProtocolsCong Liu, Yong Cui 0001, Kun Tan, Quan Fan, Kui Ren 0001, Jianping Wu. 2195-2203 [doi]
- Pay for a Sliding Bloom Filter and Get Counting, Distinct Elements, and Entropy for FreeEran Assaf, Ran Ben-Basat, Gil Einziger, Roy Friedman. 2204-2212 [doi]
- SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric NetworkingKaiping Xue, Xiang Zhang, Qiudong Xia, David S. L. Wei, Hao Yue, Feng Wu. 2213-2221 [doi]
- InstantCryptoGram: Secure Image Retrieval ServiceMinghui Li, Mingxue Zhang, Qian Wang, Sherman S. M. Chow, Minxin Du, Yanjiao Chen, Chenliang Li. 2222-2230 [doi]
- Deep Diving into Africa's Inter-Country LatenciesAgustin Formoso, Josiah Chavula, Amreesh Phokeer, Arjuna Sathiaseelan, Gareth Tyson. 2231-2239 [doi]
- Can We Learn what People are Doing from Raw DNS Queries?Jianfeng Li, Xiaobo Ma, Li Guodong, Xiapu Luo, Junjie Zhang, Wei Li, Xiaohong Guan. 2240-2248 [doi]
- Inferring Carrier-Grade NAT Deployment in the WildIoana Livadariu, Karyn Benson, Ahmed Elmokashfi, Amogh Dhamdhere, Alberto Dainotti. 2249-2257 [doi]
- An Efficient Framework for Detecting Evolving Anomalous Subgraphs in Dynamic NetworksMinglai Shao, Jianxin Li, Feng Chen 0001, Xunxun Chen. 2258-2266 [doi]
- High Throughput Low Delay Wireless Multicast via Multi-Channel Moving Window CodesFei Wu 0008, Yin Sun, Lu Chen, Jackie Xu, Kannan Srinivasan, Ness B. Shroff. 2267-2275 [doi]
- Chase++: Fountain-Enabled Fast Flooding in Asynchronous Duty Cycle NetworksZhichao Cao, Jiliang Wang, Daibo Liu, Xin Miao, Qiang Ma, Xufei Mao. 2276-2284 [doi]
- Linear Block Coding for Efficient Beam Discovery in Millimeter Wave Communication NetworksYahia Shabara, C. Emre Koksal, Eylem Ekici. 2285-2293 [doi]
- CAPS: Coding-based Adaptive Packet Spraying to Reduce Flow Completion Time in Data CenterJinbin Hu, Jiawei Huang, Wenjun Lv, Yutao Zhou, Jianxin Wang, Tian He 0001. 2294-2302 [doi]
- Virtual Network Reconfiguration with Load Balancing and Migration Cost ConsiderationsLingnan Gao, George N. Rouskas. 2303-2311 [doi]
- Joint Selection and Scheduling of Communication Requests in Multi-Channel Wireless Networks under SINR ModelPeng-Jun Wan, Huaqiang Yuan, Jiliang Wang, Ju Ren, Yaoxue Zhang. 2312-2320 [doi]
- Analysis of Hybrid Geographic/Delay-Tolerant Routing Protocols for Wireless Mobile NetworksRiccardo Cavallari, Stavros Toumpis, Roberto Verdone. 2321-2329 [doi]
- Information Theoretical Analysis of Synaptic Communication for NanonetworksHamideh Ramezani, Tooba Khan, Özgür B. Akan. 2330-2338 [doi]
- Online Learning based Uplink Scheduling in HetNets with Limited Backhaul CapacityZhenhua Han, Haisheng Tan, Rui Wang 0007, ShaoJie Tang, Francis C. M. Lau 0001. 2348-2356 [doi]
- 3: Power Efficient and Low Latency Baseband Processing for LTE FemtocellsNishant Budhdev, Mun Choon Chan, Tulika Mitra. 2357-2365 [doi]
- FluidRAN: Optimized vRAN/MEC OrchestrationAndres Garcia-Saavedra, Xavier Costa-Pérez, Douglas J. Leith, George Iosifidis. 2366-2374 [doi]
- Following the Shadow: Agile 3-D Beam-Steering for 60 GHz Wireless NetworksAnfu Zhou, Leilei Wu, Shaoqing Xu, Huadong Ma, Teng Wei, Xinyu Zhang. 2375-2383 [doi]
- Indoor Localization Using Commercial Off-The-Shelf 60 GHz Access PointsGuillermo Bielsa, Joan Palacios, Adrian Loch, Daniel Steinmetzer, Paolo Casari, Joerg Widmer. 2384-2392 [doi]
- Efficient Beam Alignment in Millimeter Wave Systems Using Contextual BanditsMorteza Hashemi, Ashutosh Sabharwal, C. Emre Koksal, Ness B. Shroff. 2393-2401 [doi]
- Communication-Driven Localization and Mapping for Millimeter Wave NetworksJoan Palacios, Guillermo Bielsa, Paolo Casari, Joerg Widmer. 2402-2410 [doi]
- Towards Personalized Task Matching in Mobile Crowdsensing via Fine-Grained User ProfilingShuo Yang, Kunyan Han, Zhenzhe Zheng, ShaoJie Tang, Fan Wu. 2411-2419 [doi]
- Dynamic Task Assignment in Crowdsensing with Location Awareness and Location DiversityXiong Wang, Riheng Jia, Xiaohua Tian, Xiaoying Gan. 2420-2428 [doi]
- A Constrained Maximum Likelihood Estimator for Unguided Social SensingHuajie Shao, Shuochao Yao, Yiran Zhao, Chao Zhang, Jinda Han, Lance M. Kaplan, Lu Su, Tarek F. Abdelzaher. 2429-2437 [doi]
- Sybil-Proof Online Incentive Mechanisms for CrowdsensingJian Lin, Ming Li, Dejun Yang, Guoliang Xue. 2438-2446 [doi]
- Small-Scale Markets for Bilateral Resource Trading in the Sharing EconomyBainan Xia, Srinivas Shakkottai, Vijay Subramanian. 2447-2455 [doi]
- Occupation-Oblivious Pricing of Cloud Jobs via Online LearningXiaoxi Zhang, Chuan Wu, Zhiyi Huang 0002, Zongpeng Li. 2456-2464 [doi]
- An Investigation into Android In-App Ad Practice: Implications for App DevelopersBoyuan He, Haitao Xu, Ling Jin, Guanyu Guo, Yan Chen, Guangyao Weng. 2465-2473 [doi]
- Optimizing Data Plans: Usage Dynamics in Mobile Data NetworksLiang Zheng, Carlee Joe-Wong, Matthew Andrews, Mung Chiang. 2474-2482 [doi]
- Robust Multi-stage Power Grid Operations with Energy StorageYihan Zou, Xiaojun Lin, Dionysios Aliprantis, Minghua Chen. 2483-2491 [doi]
- EV Charging Network Design with Transportation and Power Grid ConstraintsYongmin Zhang, Jiayi Chen, Lin Cai 0001, Jianping Pan 0001. 2492-2500 [doi]
- How Can Cyber-Physical Interdependence Affect the Mitigation of Cascading Power Failure?Mingkui Wei, Zhuo Lu, Yufei Tang, Xiang Lu. 2501-2509 [doi]
- Restricting Involuntary Extension of Failures in Smart Grids using Social Network MetricsJose Cordova-Garcia, Dongliang Xie, Xin Wang. 2510-2518 [doi]
- Privacy Risk Assessment on Email TrackingHaitao Xu, Shuai Hao, Alparslan Sari, Haining Wang. 2519-2527 [doi]
- Randomized View Reconciliation in Permissionless Distributed SystemsRuomu Hou, Irvan Jahja, Loi Luu, Prateek Saxena, Haifeng Yu. 2528-2536 [doi]
- Towards Fine-grained Fingerprinting of Firmware in Online Embedded DevicesQiang Li, Xuan Feng, Haining Wang, Zhi Li 0018, Limin Sun. 2537-2545 [doi]
- Stochastic Models and Wide-Area Network Measurements for Blockchain Design and AnalysisNikolaos Papadis, Sem C. Borst, Anwar Walid, Mohamed Grissa, Leandros Tassiulas. 2546-2554 [doi]
- Proactive Video Push for Optimizing Bandwidth Consumption in Hybrid CDN-P2P VoD SystemsYuanxing Zhang, Chengliang Gao, Yangze Guo, Kaigui Bian, Xin Jin 0008, Zhi Yang, Lingyang Song, Jiangang Cheng, Hu Tuo, Xiaoming Li. 2555-2563 [doi]
- Paid Peering, Settlement-Free Peering, or Both?Xin Wang, Yinlong Xu, Richard T. B. Ma. 2564-2572 [doi]
- Mode-Suppression: A Simple and Provably Stable Chunk-Sharing Algorithm for P2P NetworksVamseedhar R. Reddyvari, Parimal Parag, Srinivas Shakkottai. 2573-2581 [doi]
- On the Distributed Computation of Load Centrality and its Application to DV RoutingLeonardo Maccari, Lorenzo Ghiro, Alessio Guerrieri, Alberto Montresor, Renato Lo Cigno. 2582-2590 [doi]
- A Simple Model of MTC in Smart FactoriesPaolo Castagno, Vincenzo Mancuso, Matteo Sereno, Marco Ajmone Marsan. 2591-2599 [doi]
- Fundamental Limits of Wireless Distributed Computing NetworksMingyue Ji, Rong-Rong Chen. 2600-2608 [doi]
- To Accept or Not to Accept: The Question of Supplemental Discount Offers in Mobile Data PlansMadhumitha Harishankar, Nagarjun Srinivasan, Carlee Joe-Wong, Patrick Tague. 2609-2617 [doi]
- It's All in the Name: Why Some URLs are More Vulnerable to TyposquattingRashid Tahir, Ali Raza, Faizan Ahmad, Jehangir Kazi, Fareed Zaffar, Chris Kanich, Matthew Caesar. 2618-2626 [doi]
- Fast OpenFlow Table Lookup with Fast UpdateTong Yang 0003, Alex X. Liu, Yulong Shen, Qiaobin Fu, Dagang Li, Xiaoming Li. 2636-2644 [doi]
- CutSplit: A Decision-Tree Combining Cutting and Splitting for Scalable Packet ClassificationWenjun Li, Xianfeng Li, Hui Li, Gaogang Xie. 2645-2653 [doi]
- ByteCuts: Fast Packet Classification by Interior Bit ExtractionJames Daly, Eric Torng. 2654-2662 [doi]
- On Spatial and Temporal Variations in Ultra Dense Wireless NetworksPranav Madadi, François Baccelli, Gustavo de Veciana. 2663-2671 [doi]
- Optimal Activation Rates in Ultra-Dense Wireless Networks with Intermittent Traffic SourcesFabio Cecchi, Sem C. Borst, J. S. H. van Leeuwaarden, Philip A. Whiting. 2672-2680 [doi]
- Joint Optimization of User Association and Dynamic TDD for Ultra-Dense NetworksNikolaos Sapountzis, Thrasyvoulos Spyropoulos, Navid Nikaein, Umer Salim. 2681-2689 [doi]
- Robust User Association for Ultra Dense NetworksNikolaos Liakopoulos, Georgios S. Paschos, Thrasyvoulos Spyropoulos. 2690-2698 [doi]
- Optimal Demand-Aware Ride-Sharing RoutingQiulin Lin, Lei Deng, Jingzhou Sun, Minghua Chen. 2699-2707 [doi]
- MOVI: A Model-Free Approach to Dynamic Fleet ManagementTakuma Oda, Carlee Joe-Wong. 2708-2716 [doi]
- Distributed Trip Selection Game for Public Bike System with CrowdsourcingJianhui Zhang, Pengqian Lu, Zhi Li, Jiayu Gan. 2717-2725 [doi]
- MobiCrowd: Mobile Crowdsourcing on Location-based Social NetworksYulong Tian, Wei Wei, Qun Li, Fengyuan Xu, Sheng Zhong. 2726-2734 [doi]
- CrowdBuy: Privacy-friendly Image Dataset Purchasing via CrowdsourcingLan Zhang, Yannan Li, Xiang Xiao, Xiang-Yang Li 0001, Junjun Wang, Anxin Zhou, Qiang Li. 2735-2743 [doi]
- Optimal Cache Leasing from a Mobile Network Operator to a Content ProviderJonatan Krolikowski, Anastasios Giovanidis, Marco Di Renzo. 2744-2752 [doi]
- Dominant Strategy Allocation of Divisible Network Resources with Limited Information ExchangeHao Ge, Randall A. Berry. 2753-2761 [doi]
- Learning Cloud Dynamics to Optimize Spot Instance Bidding StrategiesMikhail Khodak, Liang Zheng, Andrew S. Lan, Carlee Joe-Wong, Mung Chiang. 2762-2770 [doi]