Abstract is missing.
- A user activity pattern mining system based on human activity recognition and location serviceHaihua Gong, Kai Xing, Wenwen Du. 1-2 [doi]
- Towards best secure coding practice for implementing SSL/TLSMohannad Alhanahnah, Qiben Yan. 1-6 [doi]
- Poster abstract: Ubiquitous writer: Robust text input for small mobile devices via acoustic sensingHuanpu Yin, Anfu Zhou, Liang Liu 0001, Huadong Ma. 1-3 [doi]
- Poster abstract: Enhancing reliability of community Internet-of-Things deployments with mobilityQiuxi Zhu, Md. Yusuf Sarwar Uddin, Nalini Venkatasubramanian, Cheng-Hsin Hsu, Hua-Jun Hong. 1-2 [doi]
- Demo abstract: Practical cross-technology radio resource management between LTE-U and WiFiPiotr Gawlowicz, Anatolij Zubow. 1-2 [doi]
- Poster abstract: Detecting epileptic seizures with a smartphone using frequency analysisAmir Helmy, Ahmed Helmy. 1-2 [doi]
- Unsupervised real-time detection of BGP anomalies leveraging high-rate and fine-grained telemetry dataAndrian Putina, Steven Barth, Albert Bifet, Drew Pletcher, Cristina Precup, Patrice Nivaggioli, Dario Rossi. 1-2 [doi]
- Poster abstract: Semi-decentralized interference management in D2D-enabled cellular networksMarkus Klugel, Wolfgang Kellerer. 1-2 [doi]
- Poster abstract: Homophily and controversy: On the role of public opinion in online viral diffusionJun Yang, Nan Zhou, Yifan Li, Xueer Xue, Yingfei Dong, Yibo Xue, Jun Li. 1-2 [doi]
- Demo abstract: Open-access full-duplex wireless in the ORBIT testbedTingjun Chen, Mahmood Baraani Dastjerdi, Guy Farkash, Jin Zhou, Harish Krishnaswamy, Gil Zussman. 1-2 [doi]
- Time-to-think: Optimal economic considerations in mobile edge computingAmit Samanta, Yong Li. 1-2 [doi]
- Demo/poster abstract: 5G test network (5GTN) - Environment for demonstrating 5G and IoT convergence during 2018 Korean Olympics between Finland and KoreaAri Pouttu, Olli Liinamaa, Giuseppe Destino. 1-2 [doi]
- Accurate per-flow measurement with bloom sketchYang Zhou, Hao Jin, Peng Liu, Haowei Zhang, Tong Yang 0003, Xiaoming Li. 1-2 [doi]
- Slice-based column generation for network slicingApostolos Destounis, Georgios S. Paschos, Stefano Paris, Jeremie Leguay, Lazaros Gkatzikis, Spyridon Vassilaras, Mathieu Leconte, Paolo Medagliani. 1-2 [doi]
- Infection categorization using deep autoencoderMing-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, Chin-Laung Lei. 1-2 [doi]
- Poster abstract: Decentralized fog computing resource management for offloading of periodic tasksSladana Josilo, György Dán. 1-2 [doi]
- Machine learning based bandwidth prediction in tactile heterogeneous access networksLihua Ruan, Sourav Mondal, Elaine Wong 0001. 1-2 [doi]
- Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocationXuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen, Jianfeng Ma. 1-2 [doi]
- Poster abstract: Routing meets caching in named data networksChavoosh Ghasemi, Hamed Yousefi, Kang G. Shin, Beichuan Zhang. 1-2 [doi]
- Optical X-haul options for 5G fixed wireless access: Which one to choose?Chathurika Ranaweera, Paolo Monti, Bjorn Skubic, Marija Furdek, Lena Wosinska, Ampalavanapillai Nirmalathas, Christina Lim, Elaine Wong 0001. 1-2 [doi]
- Secure bootstrapping and access control in NDN-based smart home systemsLei Pi, Lan Wang. 1-2 [doi]
- Diamond sketch: Accurate per-flow measurement for real IP streamsTong Yang 0003, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li. 1-2 [doi]
- Discovery of Internet of Thing devices based on rulesQiang Li, Xuan Feng, Haining Wang, Limin Sun. 1-2 [doi]
- Towards managing age of network state information in challenged networksV. Marbukh. 1-2 [doi]
- Demo/poster abstract: Enabling time-critical applications over next-generation 802.11 networksSung Kim, Mohammad Mamunur Rashid, Saurabh Deo, Javier Perez-Ramirez, Mikhail Galeev, Ganesh Venkatesan, Sabyasachi Dey, William Li, Dave Cavalcanti. 1-2 [doi]
- AirVIEW: Unsupervised transmitter detection for next generation spectrum sensingMariya Zheleva, Petko Bogdanov, Timothy LaRock, Paul Schmitt. 1-2 [doi]
- Demo abstract - Design and implementation of an open source NB-IoT eNBRay-Guang Cheng, Raymond Knopp, Chung-Yin Ho, Kai-Hsiang Hsu, Tian-Jen Liu, Wei-Tai Chen, Bing-Zhi Hsieh, Matthieu Kanj, François Taburet, Navid Nikaein. 1-2 [doi]
- Poster abstract: Analysis and experimental investigation of BBRTongyu Dai, Xinggong Zhang, Zongming Guo. 1-2 [doi]
- High-bandwidth ultrasonic communication using graphene-based acoustic devicesQi Xia, Qiben Yan, Qin Zhou. 1-2 [doi]
- Demo abstract: Context-aware video streaming with Q-learning for MEC-enabled cellular networksXiang Zhou, Zheng Chang, Chuanhao Sun, Xing Zhang. 1-2 [doi]
- Demo/poster abstract: XReality research lab - Augmented reality meets Internet of ThingsG. Koutitas, J. Jabez, C. Grohman, C. Radhakrishna, V. Siddaraju, S. Jadon. 1-2 [doi]
- Poster abstract: Iterative waterfilling and multi-channel standard interferenceMarkus Klugel, Wolfgang Kellerer. 1-2 [doi]
- Self-healing in multi-constrained multi-actor virtualization orchestrationJános Harmatos, David Jocha, Róbert Szabó, Balázs Péter Gero, Balázs Németh, János Czentye, Balázs Sonkoly. 1-2 [doi]
- Line speed heavy hitters on sliding windowsRan Ben-Basat, Gil Einziger, Erez Waisbard. 1-2 [doi]
- Efficient spectrum summarization using compressed spectrum scansMariya Zheleva, Timothy LaRock, Paul Schmitt, Petko Bogdanov. 1-2 [doi]
- Agile IoT service communication and orchestration platform using event driven SOA paradigmBo Cheng 0001, Shuai Zhao 0001, Meng Niu, Junliang Chen. 1-2 [doi]
- Batched packet processing for high-speed software data plane functionsDavid Barach, Leonardo Linguaglossa, Damjan Marion, Pierre Pfister, Salvatore Pontarelli, Dario Rossi, Jerome Tollet. 1-2 [doi]
- Demo abstract: Distributed machine learning at resource-limited edge nodesTiffany Tuor, Shiqiang Wang, Theodoros Salonidis, Bongjun Ko, Kin K. Leung. 1-2 [doi]
- When more may not be better: Toward cost-efficient CDN selectionGuoming Tang, Huan Wang, Kui Wu 0001, Deke Guo, Chong Zhang. 1-2 [doi]
- Poster abstract: Measuring web latency in cellular networksAlemnew Sheferaw Asrese, Ermias Andargie Walelgne, Andra Lutu, Özgü Alay, Jörg Ott. 1-2 [doi]
- OVNES: Demonstrating 5G network slicing overbooking on real deploymentsLanfranco Zanzi, Vincenzo Sciancalepore, Andres Garcia-Saavedra, Xavier Costa-Pérez. 1-2 [doi]
- Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmittersXiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han. 1-2 [doi]
- Demo abstract: Towards IoT service deployments on edge community network microcloudsAmin M. Khan, Felix Freitag, Vladimir Vlassov, Phuong Hoai Ha. 1-2 [doi]
- Demo: Enabling data sharing and multimedia applications over a multi-hop ad hoc network formed by un-rooted smartphonesKecheng Liu, Yu Cheng 0003. 1-2 [doi]
- Frequent elements on query defined rangesRan Ben-Basat, Rana Shahout, Roy Friedman. 1-2 [doi]
- Demo abstract: A practical secret communication system by perturbing focused phases among distributed transmittersXiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han. 1-2 [doi]
- Efficient network configuration verification using optimized datalogYaHui Li, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Jiangyuan Yao, Yingya Guo. 1-2 [doi]
- Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructureNabeel Akhtar, Ibrahim Matta, Ali Raza, Yuefeng Wang. 1-2 [doi]
- Poster abstract: Minimizing flow completion times using adaptive routing over inter-datacenter wide area networksMohammad Noormohammadpour, Cauligi S. Raghavendra. 1-2 [doi]
- Poster abstract: NMEMD: A novel method for efficiently measuring software-defined network delayWei Zhang, Xinchang Zhang, Huiling Shi. 1-2 [doi]
- Demo abstract: Integrating a driving simulator with city-scale VANET simulation for the development of next generation ADAS systemsDominik S. Buse, Christoph Sommer 0001, Falko Dressler. 1-2 [doi]
- Mobility aware partition of MEC regions in wireless metropolitan area networksXinjie Guan, Xili Wan, Jun-Bo Wang, Xinxin Ma, Guangwei Bai. 1-2 [doi]
- Towards power-aware network function virtualization on multi-core processorsTian Pan, Weite Qin, Tao Huang, Fan Yang, Xinhua E., Hao Li 0011. 1-2 [doi]
- Demo abstract: Towards in-network processing for low-latency industrial controlJan Rüth, René Glebke, Tanja Ulmen, Klaus Wehrle. 1-2 [doi]
- A deep learning model for secure cyber-physical transportation systemsYuanfang Chen, Falin Chen, Ting Wu, Weitong Hu, XiaoHua Xu. 1-2 [doi]
- Poster abstract: Context-free wearable side-channel leaks your typing privacyYang Liu 0101, Zhenjiang Li. 1-2 [doi]
- Demo abstract: WNOS: Software-defined generation of distributed optimal control programs for wireless networksZhangyu Guan, Lorenzo Bertizzolo, Emrecan Demirors, Tommaso Melodia. 1-2 [doi]
- Tracking location privacy leakage of mobile ad networks at scaleBoyang Hu, Qiben Yan, Yao Zheng. 1-2 [doi]
- Economics of networked infrastructures at the edge of undesirable contagion: A case of SIS infectionVladimir Marbukh. 1-2 [doi]
- AQNet: Fine-grained 3D spatio-temporal air quality monitoring by aerial-ground WSNYuzhe Yang, Zixuan Bai, Zhiwen Hu, Zijie Zheng, Kaigui Bian, Lingyang Song. 1-2 [doi]
- Demo abstract: An anti-jamming wireless communication systemHuacheng Zeng. 1-2 [doi]
- Poster abstract: A low latency and high scalability network with extreme QoS assuranceWeiguang Wang, Jing Cui, Ran Ju, Xuefei Tan, Feng Li, Boyan Tu, Guoping Li, Lin Han, Lei Han. 1-2 [doi]
- Demo/poster abstract: Efficient and flexible packet tracing for virtualized networks using eBPFKun Suo, Yong Zhao, Wei Chen 0038, Jia Rao. 1-2 [doi]
- Probe-IoT: A public digital ledger based forensic investigation framework for IoTMd. Mahmud Hossain, Ragib Hasan, Shams Zawoad. 1-2 [doi]
- Poster abstract: Themis: A data-driven approach to bot detectionPatrick Kalmbach, Andreas Blenk, Wolfgang Kellerer, Stefan Schmid 0001. 1-2 [doi]
- Modeling and analyzing privacy-awareness social behavior networkXu Han 0005, Yanheng Liu, Jian Wang 0003. 7-12 [doi]
- Understanding secure and usable gestures for realtime motion based authenticationYanyan Li, Mengjun Xie. 13-20 [doi]
- A two layer model of malware propagation in a search engine contextYijin Chen, Yuming Mao, Lei Cui, Supeng Leng, Yunkai Wei, Xiaosha Chen. 21-26 [doi]
- App traffic mutation: Toward defending against mobile statistical traffic analysisLouma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. 27-32 [doi]
- A stochastic game approach to cyber-physical security with applications to smart gridYuanxiong Guo, Yanmin Gong, Laurent L. Njilla, Charles A. Kamhoua. 33-38 [doi]
- Data security storage model for fog computing in large-scale IoT applicationShuqing He, Bo Cheng 0001, Haifeng Wang, Xuelian Xiao, Yunpeng Cao, Junliang Chen. 39-44 [doi]
- A hybrid system for malware detection on big dataAlessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re, Marco Morana. 45-50 [doi]
- Deep learning-based online counterfeit-seller detectionMing Cheung, James She, Lufi Liu. 51-56 [doi]
- On latency-aware tree topology construction for emergency responding VANET applicationsJoong-Lyul Lee, Jaejin Hwang, Hyesung Park, Donghyun Kim 0001. 57-63 [doi]
- Dynamic resource allocation and mobile aggregator selection in mission critical MTC networksTabinda Salam, Waheed ur Rehman, Razaullah Khan, Israr Khan, Xiaofeng Tao. 64-69 [doi]
- Reliable channel allocation for mission oriented low-power wireless networksWeifeng Gao, Wan Du, Zhiwei Zhao. 70-75 [doi]
- Parameterized slot scheduling for adaptive and autonomous TSCH networksJinhwan Jung, Daewoo Kim, Joonki Hong, Joohyun Kang, Yung Yi. 76-81 [doi]
- Trust-aware routing protocol for mobile crowdsensing environmentsKayhan Zrar Ghafoor, Linghe Kong, Ali Safaa Sadiq, Zouina Doukha, Fuad Mawlood Shareef. 82-87 [doi]
- A repeated stochastic game approach for strategic network selection in heterogeneous networksXin Li, Qiuyuan Huang, Dapeng Oliver Wu. 88-93 [doi]
- A unified clustering approach for identifying functional zones in suburban and urban areasJingyuan Yang, Jin Cao, Ran He, Lisa Zhang. 94-99 [doi]
- Buildings' producing filter effect on PM25 data: A model-fitting approachHaina Zheng, Ke Xiong, Pingyi Fan, Zhangdui Zhong. 100-105 [doi]
- Course recommendation of MOOC with big data support: A contextual online learning approachYifan Hou, Pan Zhou, Jie Xu, Dapeng Oliver Wu. 106-111 [doi]
- Average age of information for status update systems with an energy harvesting serverShahab Farazi, Andrew G. Klein, D. Richard Brown. 112-117 [doi]
- Age of information in a network of preemptive serversRoy D. Yates. 118-123 [doi]
- Status updates in a multi-stream M/G/1/1 preemptive queueElie Najm, Emre Telatar. 124-129 [doi]
- Statistical guarantee optimization for age of information for the D/G/1 queueJaya Prakash Champati, Hussein Al-Zubaidy, James Gross. 130-135 [doi]
- Age-optimal updates of multiple information flowsYin Sun, Elif Uysal-Biyikoglu, Sastry Kompella. 136-141 [doi]
- Online provisioning for virtual clusters in multi-tenant cloud data center networkShuaibing Lu, Zhiyi Fang, Jie Wu. 142-147 [doi]
- Exploring edges for connected and autonomous drivingLee Gillam, Konstantinos Katsaros, Mehrdad Dianati, Alexandros Mouzakitis. 148-153 [doi]
- Hybrid computation offloading in fog and cloud networks with non-orthogonal multiple accessYiming Liu, F. Richard Yu, Xi Li, Hong Ji, Victor C. M. Leung. 154-159 [doi]
- VENUS: Verifiable range query in data streamingI-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo. 160-165 [doi]
- LEAP: A latency control protocol for multi-path data delivery with pre-defined QoS guaranteesFederico Chiariotti, Stepán Kucera, Andrea Zanella, Holger Claussen. 166-171 [doi]
- Cloud data centers revenue maximization using server consolidation: Modeling and evaluationMohammad Wardat, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdallah A. Khreishah. 172-177 [doi]
- Fast and efficient network service embedding method with adaptive offloading to the edgeBalázs Németh, Mark Szalay, Janos Doka, Matthias Rost, Stefan Schmid 0001, László Toka, Balázs Sonkoly. 178-183 [doi]
- Fair multi-resource allocation with external resource for mobile edge computingErfan Meskar, Ben Liang. 184-189 [doi]
- Dynamic interface-selection and resource allocation over heterogeneous mobile edge-computing wireless networks with energy harvestingFei Wang, Xi Zhang. 190-195 [doi]
- Combinatorial clock auction for live video streaming in mobile edge computingYi-Hsuan Hung, Chih-Yu Wang 0001, Ren-Hung Hwang. 196-201 [doi]
- EdgeCache: An optimized algorithm for CDN-based over-the-top video streaming servicesAbubakr O. Al-Abbasi, Vaneet Aggarwal. 202-207 [doi]
- Monitoring TLS adoption using backbone and edge trafficChia-ling Chan, Romain Fontugne, Kenjiro Cho, Shigeki Goto. 208-213 [doi]
- ctrlTCP: Reducing latency through coupled, heterogeneous multi-flow TCP congestion controlSafiqul Islam, Michael Welzl, Kristian Hiorth, David A. Hayes, Grenville Armitage, Stein Gjessing. 214-219 [doi]
- "What's the score?": A first look at sports live data feed servicesPengfei Wang, Aleksandar Kuzmanovic. 220-225 [doi]
- Online metrics prediction in monitoring systemsMatthieu Caneill, Noel De Palma, Ali Aït-Bachir, Bastien Dine, Rachid Mokhtari, Yagmur Gizem Cinar. 226-231 [doi]
- Empirical study on taxi's mobility nature in dense urban areaZhenkun Qiu, Sihai Zhang, Wuyang Zhou, Shui Yu. 232-237 [doi]
- Available bandwidth estimation in public cloudsPhuong Ha, Lisong Xu. 238-243 [doi]
- An accurate and robust environment sensing algorithm for enhancing indoor localizationZe Li, Zengshan Tian, Mu Zhou, Zhenyuan Zhang, Yue Jin. 244-249 [doi]
- CaneScanner: Obstacle detection for people with visual disabilitiesRupam Kundu, Gopi Krishna Tummala, Prasun Sinha. 250-255 [doi]
- TagTone: Scalable RFID communication through multi-frequency analysisTanmoy Das, Gopi Krishna Tummala, Prasun Sinha. 256-261 [doi]
- Deep learning approach for cyberattack detectionYiyun Zhou, Meng Han, Liyuan Liu, Jing Selena He, Yan Wang. 262-267 [doi]
- OpenCDN: An ICN-based open content distribution system using distributed actor modelArvind Narayanan, Eman Ramadan, Zhi-Li Zhang. 268-273 [doi]
- Maximal energy efficient task scheduling for homogeneous fog networksYang Yang, Kunlun Wang, Guowei Zhang, Xu Chen, Xiliang Luo, Ming-Tuo Zhou. 274-279 [doi]
- Cache and delivery of VR video over named data networkingYi Zhang, Xiaoke Jiang, Yi Wang, Kai Lei. 280-285 [doi]
- Let sources know: Enabling access tracking in a content centric contextKai Lei, Jie Xing, Yi Wang, KeKe Li, Dong Lin. 286-292 [doi]
- How to orchestrate a distributed OpenStackDavid Haja, Marton Szabo, Mark Szalay, Adam Nagy, András Kern, László Toka, Balázs Sonkoly. 293-298 [doi]
- Joint load management and resource allocation in the energy harvesting powered small cell networks with mobile edge computingFengxian Guo, Liangde Ma, Heli Zhang, Hong Ji, Xi Li. 299-304 [doi]
- Emergence of pecking order in social Cognitive Radio societiesAnna Wisniewska, Mohammad Abu Shattal, Bilal Khan, Ala I. Al-Fuqaha, Kirk Dombrowski. 305-311 [doi]
- A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devicesFatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua. 312-317 [doi]
- Multi-tenant spectrum and SSIDs controller for WiFi networksZhouyou Gu, Wibowo Hardjawana, Branka Vucetic, Lok Sang Ho. 318-323 [doi]
- Rumba: A python framework for automating large-scale Recursive Internet Experiments on GENI and FIRE+Sander Vrijders, Dimitri Staessens, Marco Capitani, Vincenzo Maffione. 324-329 [doi]
- Measurement based mobility emulation platform for next generation wireless networksParishad Karimi, Shreyasee Mukherjee, Jakub Kolodziejski, Ivan Seskar, Dipankar Raychaudhuri. 330-335 [doi]
- EnosStack: A LAMP-like stack for the experimenterRonan-Alexandre Cherrueau, Matthieu Simonin, Alexandre van Kempen. 336-341 [doi]
- MONROE-Nettest: A configurable tool for dissecting speed measurements in mobile broadband networksCise Midoglu, Leonhard Wimmer, Andra Lutu, Ozgu Alay, Carsten Griwodz. 342-347 [doi]
- Optimal status updating for an energy harvesting sensor with a noisy channelSongtao Feng, Jing Yang. 348-353 [doi]
- A dynamic jamming game for real-time status updatesYuanzhang Xiao, Yin Sun. 354-360 [doi]
- Minimizing content staleness in dynamo-style replicated storage systemsJing Zhong, Roy D. Yates, Emina Soljanin. 361-366 [doi]
- Towards an effective age of information: Remote estimation of a Markov sourceClement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 367-372 [doi]
- Building efficient and available distributed transaction with Paxos-based coding consensusShenglong Li, Quanlu Zhang, Zhi Yang, Hanyu Zhao, Yafei Dai. 373-378 [doi]
- AQM with multi-queue for microburst in data center networksWataru Morita, Daisuke Sugahara, Kouji Hirata, Miki Yamamoto. 379-384 [doi]
- Stochastic non-preemptive co-flow scheduling with time-indexed relaxationRuijiu Mao, Vaneet Aggarwal, Mung Chiang. 385-390 [doi]
- Trade-off between fairness and efficiency in dominant alpha-fairness familyYoungmi Jin, Michiaki Hayashi. 391-396 [doi]
- Efficient handling of excessive locators in hierarchical addressingFeng Wang 0017, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa. 397-402 [doi]
- Nash-peering: A new techno-economic framework for internet interconnectionsDoron Zarchy, Amogh Dhamdhere, Constantine Dovrolis, Michael Schapira. 403-408 [doi]
- BLT: A taxonomy and classification tool for mining BGP update messagesTomoyuki Kitabatake, Romain Fontugne, Hiroshi Esaki. 409-414 [doi]
- TI-MFA: Keep calm and reroute segments fastKlaus-Tycho Foerster, Mahmoud Parham, Marco Chiesa, Stefan Schmid 0001. 415-420 [doi]
- Improving wireless devices identification using gray relationship classifier to enhance wireless network securityYun Lin, Wenxin Li, Jianguo Sun, Qidi Wu. 421-425 [doi]
- Traffic-driven intrusion detection for massive MTC towards 5G networksNan Lu, Qinghe Du, Li Sun, Pinyi Ren. 426-431 [doi]
- Mean latency optimization in erasure-coded distributed storage systemsAbubakr O. Al-Abbasi, Vaneet Aggarwal. 432-437 [doi]
- Security and privacy of big data for social networking services in cloudChristos Stergiou, Kostas E. Psannis, Theofanis Xifilidis, Andreas P. Plageras, Brij B. Gupta. 438-443 [doi]
- RARE: Defeating side channels based on data-deduplication in cloud storageZahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti. 444-449 [doi]
- Knowledge-centric proactive edge caching over mobile content distribution networkHao Hao, Changqiao Xu, Mu Wang, Haiyong Xie 0001, Yifeng Liu, Dapeng Oliver Wu. 450-455 [doi]
- An SDN framework for UAV backbone network towards knowledge centric networkingXiao Zhang, Haijun Wang, Haitao Zhao 0001. 456-461 [doi]
- Hierarchical architecture for 5G based software-defined intelligent transportation systemSadia Din, Anand Paul, Awais Ahmad, Syed Hassan Ahmed, Gwanggil Jeon, Danda B. Rawat. 462-467 [doi]
- MotionHacker: Motion sensor based eavesdropping on handwriting via smartwatchQingxin Xia, Feng Hong, Yuan Feng, Zhongwen Guo. 468-473 [doi]
- A contract-based resource allocation mechanism in wireless virtualized networkDi Zhang, Zheng Chang, Timo Hämäläinen 0002, Weinan Gao. 474-479 [doi]
- Secure mobile crowdsourcing for WLAN indoor localizationMu Zhou, Yiyao Liu, Wei Nie, Liangbo Xie, Zengshan Tian. 480-485 [doi]
- Statistical QoS-driven power adaptation for distributed caching based mobile offloading over 5G wireless networksXi Zhang, Jingqing Wang. 486-491 [doi]
- Spectral efficiency optimization in caching enabled ultra-dense small cell networksTongxin Li, Junyu Liu, Min Sheng, Jiandong Li 0001. 492-498 [doi]
- Distributed file allocation using matching game in mobile fog-caching service networkTingting Liu, Jun Li, BaekGyu Kim, Chung-Wei Lin, Shinichi Shiraishi, Jiang Xie, Zhu Han. 499-504 [doi]
- Joint bandwidth, caching and association optimization for D2D assisted wireless networksLu Pei, Zhaohui Yang 0001, Cunhua Pan, Wenhuan Huang, Ming Chen. 505-510 [doi]
- Efficient D2D content caching using multi-agent reinforcement learningWei Jiang, Gang Feng, Shuang Qin, Tak-Shing Peter Yum. 511-516 [doi]
- Joint computation offloading and content caching for wireless blockchain networksMengting Liu, F. Richard Yu, Yinglei Teng, Victor C. M. Leung, Mei Song. 517-522 [doi]
- NeutMon: Studying neutrality in European mobile networksEnrico Gregori, Valerio Luconi, Alessio Vecchio. 523-528 [doi]
- The CityLab testbed - Large-scale multi-technology wireless experimentation in a city environment: Neural network-based interference prediction in a smart cityJakob Struye, Bart Braem, Steven Latré, Johann Márquez-Barja. 529-534 [doi]
- Analysis of large-scale experimental data from wireless networksStephen A. Seidel, Michael T. Mehari, Charles J. Colbourn, Eli De Poorter, Ingrid Moerman, Violet R. Syrotiuk. 535-540 [doi]
- Experimental performance evaluation of WebRTC video services over mobile networksMohamed Moulay, Vincenzo Mancuso. 541-546 [doi]
- Minimizing age of correlated information for wireless camera networksQing He, György Dán, Viktoria Fodor. 547-552 [doi]
- Age-optimal trajectory planning for UAV-assisted data collectionJuan Liu 0002, Xijun Wang, Bo Bai, Huaiyu Dai. 553-558 [doi]
- Uplink age of information of unilaterally powered two-way data exchanging systemsYunquan Dong, Zhengchuan Chen, Pingyi Fan. 559-564 [doi]
- A game theoretic approach to DSRC and WiFi coexistenceSneihil Gopal, Sanjit K. Kaul. 565-570 [doi]
- Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRANJoshika Agarwal, Rishabh Jain, Sanjay Kumar Dhurandher, Isaac Woungang, Nitin Gupta. 571-576 [doi]
- A game theoretic load-aware network selectionMajed Haddad, Piotr Wiecek, Oussama Habachi. 577-582 [doi]
- Spectrum-shared NOMA game-theoretical power requisition in context-aware wireless multimedia communicationsShuan He, Wei Wang 0015. 583-588 [doi]
- Hybrid beamforming for 5G millimeter-wave multi-cell networksShu Sun, Theodore S. Rappaport, Mansoor Shafi. 589-596 [doi]
- Investigation of performance in integrated access and backhaul networksMuhammad Nazmul Islam, Navid Abedini, Georg Hampel, Sundar Subramanian, Junyi Li. 597-602 [doi]
- Capturing capacity and profit gains with base station sharing in mmWave cellular networksShahram Shahsavari, Fraida Fund, Elza Erkip, Shivendra S. Panwar. 603-609 [doi]
- Efficient heuristic algorithms for positive-influence dominating set in social networksFaisal N. Abu-Khzam, Karine Lamaa. 610-615 [doi]
- GroupCast: Preference-aware cooperative video streaming with scalable video codingAnis Elgabli, Vaneet Aggarwal. 616-621 [doi]
- Optimization of mobile sensor coverage with UAVsChristelle Caillouet, Frédéric Giroire, Tahiry Razafindralambo. 622-627 [doi]
- Computing optimal drone positions to wirelessly recharge IoT devicesDimitrios Zorbas, Christos Douligeris. 628-633 [doi]
- Backhaul and delay-aware placement of UAV-enabled base stationSidharth Kumar, Suraj Suman, Swades De. 634-639 [doi]
- Cognitive relay networks with energy and mutual-information accumulationRachad Atat, Junchao Ma, Hao Chen 0010, Ulysses Lee, Jonathan D. Ashdown, Lingjia Liu. 640-644 [doi]
- On the photo-thermal effect of intra-body nano-optical communications on red blood cellsShuanshuan Wu, Pedram Johari, Nicholas Mastronarde, Josep Miquel Jornet. 645-650 [doi]
- Channel modeling and analysis for wireless networks-on-chip communications in the millimeter wave and terahertz bandsYi Chen, Chong Han. 651-656 [doi]
- Covert communications with extremely low power under finite block length over slow fadingHaoyue Tang, Jintao Wang, Yahong Rosa Zheng. 657-661 [doi]
- On the use of network coding as a virtual network function in satellite-terrestrial CDNsSimon Pietro Romano, Fabio Giangrande. 662-667 [doi]
- Radio access network resource slicing for flexible service executionChia-Yu Chang, Navid Nikaein, Thrasyvoulos Spyropoulos. 668-673 [doi]
- Business network formation among 5G providersMate Cserep, Akos Recse, Róbert Szabó, László Toka. 674-679 [doi]
- Two-dimensional reduction of beam training overhead in crowded 802.11ad based networksSihua Shao, Hanbin Zhang, Dimitrios Koutsonikolas, Abdallah Khreishah. 680-685 [doi]
- Reducing initial cell-search latency in mmWave networksYanpeng Yang, Hossein Shokri Ghadikolaei, Carlo Fischione, Marina Petrova, Ki Won Sung. 686-691 [doi]
- Reinforcement learning based predictive handover for pedestrian-aware mmWave networksYusuke Koda, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura. 692-697 [doi]
- A comparative analysis of school pupils' daily habits in Germany and ChinaXiaoming Fu 0001, Hong Huang 0001, Xiang-Yang Li 0001, Haisheng Tan, Jie Tang. 698-703 [doi]
- Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictionsMuhammad Saad, Aziz Mohaisen. 704-709 [doi]
- A fast, secure, reliable, and resilient data transfer framework for pervasive IoT applicationsRaffaele Montella, Mario Ruggieri, Sokol Kosta. 710-715 [doi]
- An architecture for interspatial communicationAnil Madhavapeddy, K. C. Sivaramakrishnan, Gemma Gordon, Thomas Gazagnaire. 716-723 [doi]
- Message-passing cooperative localization in sensor networks with AOA measurementsMingyue Ding, Shengchu Wang, Zhongyan Huang, Konglin Zhu, Ling Zhang. 724-729 [doi]
- Application-agnostic remote access for Bluetooth Low EnergyNatalya Rozhnova, Marc-Olivier Buob, Richard Douville. 730-735 [doi]
- Performance analysis of behavior-based solutions in vehicular networksAljawharah Alnasser, Hongjian Sun. 736-741 [doi]
- Statistical QoS provisioning over D2D-offloading based 5G multimedia big-data mobile wireless networksXi Zhang, Qixuan Zhu. 742-747 [doi]
- Analysis of malicious flows via SIS epidemic model in CCNWeihong Yang, Yang Qin, Yuanyuan Yang. 748-753 [doi]
- Towards efficient offloading in fog/edge computing by approximating effect of externalitiesVladimir Marbukh. 754-759 [doi]
- A deep reinforcement learning based offloading scheme in ad-hoc mobile cloudsDuc Van Le, Chen-Khong Tham. 760-765 [doi]
- Real-time QoE estimation of DASH-based mobile video applications through edge computingChang Ge 0001, Ning Wang. 766-771 [doi]
- Toward live inter-domain network services on the ExoGENI testbedYuanjun Yao, Qiang Cao, Rubens Farias, Jeffrey S. Chase, Victor Orlikowski, Paul Ruth, Mert Cevik, Cong Wang, Nick Buraglio. 772-777 [doi]
- EL-SEC: ELastic management of security applications on virtualized infrastructureNabeel Akhtar, Ibrahim Matta, Ali Raza, Yuefeng Wang. 778-783 [doi]
- GRASP: A green energy aware SDN platformGaregin Grigoryan, Keivan Bahmani, Grayson Schermerhorn, Yaoqing Liu. 784-789 [doi]
- Predictive analytics for fog computing using machine learning and GENIJon Patman, Meshal Alfarhood, Soliman Islam, Mauro Lemus, Prasad Calyam, Kannappan Palaniappan. 790-795 [doi]
- Towards practical personalized recommendation with multi-level differential privacy controlsGuowen Xu, Hongwei Li, Wenlei Wang, Yue Chen, Haomiao Yang, Yanzhi Ren. 796-801 [doi]
- Uncovering hidden social relationships through location-based services: The Happn case studyAdriano Di Luzio, Alessandro Mei, Julinda Stefa. 802-807 [doi]
- Trustworthy caching for mobile big data in social networksQichao Xu, Zhou Su, Minghui Dai. 808-812 [doi]
- Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillanceXiaojing Ma 0002, Bin Zhu, Tao Zhang, Sixing Cao, Hai Jin 0001, Deqing Zou. 813-818 [doi]
- A multi-source feedback based trust calculation mechanism for edge computingJie Yuan, Xiaoyong Li. 819-824 [doi]
- Secure in-network big data provision with suspension chain modelRuidong Li, Hitoshi Asaeda. 825-830 [doi]
- A lightweight multi-factor mobile user authentication schemeJianguo Sun, Qi Zhong, Liang Kou, Wenshan Wang, Qingan Da, Yun Lin. 831-836 [doi]
- Improving signal modulation recognition using principal component analysis and compressive sensingYuyao Li, Zheng Dou, Xiaolei Zhu, Chengzhuo Shi. 837-841 [doi]
- Group-query-as-a-service for secure dynamic spectrum access in geolocation-enabled database-driven opportunistic wireless communications in ROAR frameworkAbdulhamid Adebayo, Danda B. Rawat, Jiang Li, Moses Garuba. 842-847 [doi]
- Compromised secrecy region with friendly jammers in heterogeneous cellular networksShiwei Yan, Yong Shang, Ming Zhang. 848-852 [doi]
- Link fault protection and traffic engineering in hybrid SDN networksXuya Jia, Yong Jiang, Jing Zhu. 853-858 [doi]
- SDN-based load balancing for multi-path TCPAustin Jerome, Murat Yuksel, Syed Hassan Ahmed, Mostafa Bassiouni. 859-864 [doi]
- eBPF-based content and computation-aware communication for real-time edge computingSabur Baidya, Yan Chen, Marco Levorato. 865-870 [doi]
- Admission control in software-defined datacenter network in view of flow table capacityChuanji Zhang, Hemin Yang, George F. Riley. 871-876 [doi]
- BS-on-air: Optimum UAV localization for resilient ultra dense networksElif Bozkaya, Berk Canberk. 877-881 [doi]
- Leader-follower based coalition formation in large-scale UAV networks, a quantum evolutionary approachSajad Mousavi, Fatemeh Afghah, Jonathan D. Ashdown, Kurt Turck. 882-887 [doi]
- Attacking altitude estimation in drone navigationWenxin Chen, Yingfei Dong, Zhenhai Duan. 888-893 [doi]
- LTE-CAS: LTE-based criticality aware scheduling for UAV assisted emergency responseAlok Ranjan, Bighnaraj Panigrahi, Hemant Kumar Rath, Prasant Misra, Anantha Simha. 894-899 [doi]
- Sensitivity of coherent cooperative transmission to synchronization errorsSudharman K. Jayaweera, Alireza Ghasempour. 900-905 [doi]
- A novel solution for high speed internet over the oceansSethuraman N. Rao, Dhanesh Raj, Vickram Parthasarathy, S. Aiswarya, Maneesha Vinodini Ramesh, Venkat Rangan. 906-912 [doi]
- DeepSense: Sensing the radio signal behavior in metal and non-metal underground mine workingsAlok Ranjan, H. B. Sahu, Prasant Misra. 913-918 [doi]