Abstract is missing.
- Wireless Multicasting for Content Distribution: Stability and Delay Gain AnalysisBahman Abolhassani, John Tadrous, Atilla Eryilmaz. 1-9 [doi]
- Dynamic Radio Resource and Task Allocation for Wireless Powered Mobile Edge Computing SystemYongchao Zhang 0002, Xin Chen 0018, Ning Zhang 0007, Ying Chen 0010, Zhuo Li 0003. 1-6 [doi]
- Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing NetworksKonstantinos Poularakis, Jaime Llorca, Antonia Maria Tulino, Ian Taylor, Leandros Tassiulas. 10-18 [doi]
- CRF: Coexistent Routing and Flooding using WiFi Packets in Heterogeneous IoT NetworksWei Wang, Xin Liu, Yao Yao, Yan Pan, Zicheng Chi, Ting Zhu. 19-27 [doi]
- Access Strategies for Network CachingItamar Cohen, Gil Einziger, Roy Friedman, Gabriel Scalosub. 28-36 [doi]
- On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* Systems: Exact Expressions and BoundsJaya Prakash Champati, Hussein Al-Zubaidy, James Gross. 37-45 [doi]
- A Constant Approximation for Maximum Throughput Multicommodity Routing And Its Application to Delay-Tolerant Network SchedulingMengxue Liu, Andréa W. Richa, Matthias Rost, Stefan Schmid 0001. 46-54 [doi]
- A Utility-Driven Multi-Queue Admission Control Solution for Network SlicingBin Han 0004, Vincenzo Sciancalepore, Di Feng, Xavier Costa-Pérez, Hans D. Schotten. 55-63 [doi]
- Discrete-Time Modeling of NFV Accelerators that Exploit Batched ProcessingStanislav Lange, Leonardo Linguaglossa, Stefan Geissler, Dario Rossi, Thomas Zinner. 64-72 [doi]
- Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSNsTao Wu, Panlong Yang, Haipeng Dai, Wanru Xu, Mingxue Xu. 73-81 [doi]
- D2D Offloading for Statistical QoS Provisionings Over 5G Multimedia Mobile Wireless NetworksXi Zhang, Qixuan Zhu. 82-90 [doi]
- Enhancing Cellular Performance via Vehicular-based Opportunistic Relaying and Load BalancingSaadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla. 91-99 [doi]
- Interference Recycling: Exploiting Interfering Signals to Enhance Data TransmissionZhao Li, Jie Chen, Kang G. Shin, Jia Liu. 100-108 [doi]
- Only Those Requested Count: Proactive Scheduling Policies for Minimizing Effective Age-of-InformationBo Yin, Shuai Zhang, Yu Cheng, Lin X. Cai, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu. 109-117 [doi]
- A General Model for Minimizing Age of Information at Network EdgeChengzhang Li, Shaoran Li, Y. Thomas Hou. 118-126 [doi]
- Optimal Trunk-Reservation by Policy LearningAntonio Massaro, Francesco De Pellegrini, Lorenzo Maggi. 127-135 [doi]
- Online Channel-state Clustering And Multiuser Capacity Learning For Wireless SchedulingIsfar Tariq, Rajat Sen, Gustavo de Veciana, Sanjay Shakkottai. 136-144 [doi]
- Distributed Self-Adjusting Tree NetworksBruna Soares Peres, Otavio Augusto de Oliveira Souza, Olga Goussevskaia, Chen Avin, Stefan Schmid 0001. 145-153 [doi]
- HideMe: Privacy-Preserving Photo Sharing on Social NetworksFengHua Li, Zhe Sun, Ang Li, Ben Niu 0001, Hui Li, Guohong Cao. 154-162 [doi]
- Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource ConsumptionPrasanna Karthik Vairam, Gargi Mitra, Vignesh Manoharan, Chester Rebeiro, Byrav Ramamurthy, Kamakoti Veezhinathan. 163-171 [doi]
- MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD AlgorithmsShaohuai Shi, Xiaowen Chu, Bo Li 0001. 172-180 [doi]
- Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic EnvironmentsShuyu Shi, Yaxiong Xie, Mo Li, Alex X. Liu, Jun Zhao. 181-189 [doi]
- Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical FeaturesPengfei Liu, Panlong Yang, Wen-Zhan Song, Yubo Yan, Xiang-Yang Li. 190-198 [doi]
- FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer IdentificationTianhang Zheng, Zhi Sun, Kui Ren 0001. 199-207 [doi]
- A Unified Sampling and Scheduling Approach for Status Update in Multiaccess Wireless NetworksZhiyuan Jiang, Sheng Zhou, Zhisheng Niu, Cheng Yu 0003. 208-216 [doi]
- Kelly Cache NetworksMilad Mahdian, Armin Moharrer, Stratis Ioannidis, Edmund Yeh. 217-225 [doi]
- Cache Network Management Using BIG Cache AbstractionPariya Babaie, Eman Ramadan, Zhi-Li Zhang. 226-234 [doi]
- Learning to Cache With No RegretsGeorgios S. Paschos, Apostolos Destounis, Luigi Vigneri, George Iosifidis. 235-243 [doi]
- Camul: Online Caching on Multiple Caches with Relaying and BypassingHaisheng Tan, Shaofeng H.-C. Jiang, Zhenhua Han, Liuyan Liu, Kai Han, Qinglin Zhao. 244-252 [doi]
- Enabling Cross-Technology Coexistence for Extremely Weak Wireless DevicesRuirong Chen, Wei Gao. 253-261 [doi]
- Channel Independent Wi-Fi Backscatter NetworksTaekyung Kim, Wonjun Lee. 262-270 [doi]
- Individual Data Plan in Virtual Network Operation: A Proactive Matching ApproachZihan Wang, Yuan Zhuang, Zhi Wang, Xin Wu. 271-279 [doi]
- DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep LearningDario Bega, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Pérez. 280-288 [doi]
- Fair Rate Allocation over A Generalized Symmetric Polymatroid with Box ConstraintsPeng-Jun Wan, Zhu Wang, Huaqiang Yuan, Jinling Zhang, Xufei Mao. 289-297 [doi]
- Load Balancing for Interdependent IoT MicroservicesRuozhou Yu, Vishnu Teja Kilari, Guoliang Xue, Dejun Yang. 298-306 [doi]
- Octans: Optimal Placement of Service Function Chains in Many-Core SystemsZhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu, Jianping Wu. 307-315 [doi]
- Bound-based Network Tomography with Additive MetricsCuiying Feng, Luning Wang, Kui Wu 0001, Jianping Wang. 316-324 [doi]
- Memory flipping: a threat to NUMA virtual machines in the CloudDjob Mvondo, Boris Teabe, Alain Tchana, Daniel Hagimont, Noel De Palma. 325-333 [doi]
- Memory/Disk Operation Aware Lightweight VM Live Migration Across Data-centers with Low Performance ImpactBin Shi, Haiying Shen. 334-342 [doi]
- Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live MigrationDinuni Fernando, Jonathan Terner, Kartik Gopalan, Ping Yang. 343-351 [doi]
- A Holistic Model for Performance Prediction and Optimization on NUMA-based Virtualized SystemsJian Li, Jianmin Qian, Haibing Guan. 352-360 [doi]
- EE-IoT: An Energy-Efficient IoT Communication Scheme for WLANsHossein Pirayesh, Pedram Kheirkhah Sangdeh, Huacheng Zeng. 361-369 [doi]
- ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworksKunal Sankhe, Mauro Belgiovine, Fan Zhou, Shamnaz Riyaz, Stratis Ioannidis, Kaushik R. Chowdhury. 370-378 [doi]
- iLPS: Local Positioning System with Simultaneous Localization and Wireless CommunicationMingyu Yang, Li-Xuan Chuo, Karan Suri, Lu Liu, Hao Zheng, Hun-Seok Kim. 379-387 [doi]
- GCN-GAN: A Non-linear Temporal Link Prediction Model for Weighted Dynamic NetworksKai Lei, Meng Qin, Bo Bai 0001, Gong Zhang, Min Yang. 388-396 [doi]
- Optimal Network Control in Partially-Controllable NetworksQingkai Liang, Eytan Modiano. 397-405 [doi]
- Hierarchical Multi-resource Fair Queueing for Network Function VirtualizationChaoqun You. 406-414 [doi]
- Measurements As First-class ArtifactsPaolo Laffranchini, Luis Rodrigues, Marco Canini, Balachander Krishnamurthy. 415-423 [doi]
- Computing Blocking Probabilities in Elastic Optical Networks with Spectrum DefragmentationSandeep Kumar Singh, Admela Jukan. 424-432 [doi]
- RTOP: Optimal User Grouping and SFN Clustering for Multiple eMBMS Video SessionsAhmed Khalid, Ahmed H. Zahran, Cormac J. Sreenan. 433-441 [doi]
- The Slice Is Served: Enforcing Radio Access Network Slicing in Virtualized 5G SystemsSalvatore D'Oro, Francesco Restuccia, Alessandro Talamonti, Tommaso Melodia. 442-450 [doi]
- Weighted Sum-Rate Maximization in Multi-Carrier NOMA with Cellular Power ConstraintLou Salaun, Marceau Coupechoux, Chung Shue Chen. 451-459 [doi]
- Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial NoisePu Wang, Ning Wang, Monireh Dabaghchian, Kai Zeng, Zheng Yan. 460-468 [doi]
- CASA: Congestion and Stretch Aware Static Fast ReroutingKlaus-Tycho Foerster, Yvonne Anne Pignolet, Stefan Schmid 0001, Gilles Tredan. 469-477 [doi]
- Efficient Online Resource Allocation in Heterogeneous Clusters with Machine VariabilityHuanle Xu, Yang Liu, Wing Cheong Lau, Jun Guo, Alex X. Liu. 478-486 [doi]
- INT-path: Towards Optimal Path Planning for In-band Network-Wide TelemetryTian Pan, Enge Song, Zizheng Bian, Xingchen Lin, Xiaoyu Peng, Jiao Zhang, Tao Huang, Bin Liu, Yunjie Liu. 487-495 [doi]
- Adaptive Path Tracing with Programmable Bloom Filters in Software-Defined NetworksSisi Xiong, Qing Cao, Weisheng Si. 496-504 [doi]
- Deep Learning-based Job Placement in Distributed Machine Learning ClustersYixin Bao, Yanghua Peng, Chuan Wu. 505-513 [doi]
- Service Placement with Provable Guarantees in Heterogeneous Edge Computing SystemsStephen Pasteris, Shiqiang Wang, Mark Herbster, Ting He 0001. 514-522 [doi]
- Joint Placement and Allocation of Virtual Network Functions with Budget and Capacity ConstraintsGamal Sallam, Bo Ji. 523-531 [doi]
- Round-Robin Synchronization: Mitigating Communication Bottlenecks in Parameter ServersChen Chen, Wei Wang, Bo Li. 532-540 [doi]
- CFHider: Control Flow Obfuscation with Intel SGXYongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu. 541-549 [doi]
- Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded CodeMohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo. 550-558 [doi]
- Differentially-Private Deep Learning from an optimization PerspectiveLiyao Xiang, Jingbo Yang, Baochun Li. 559-567 [doi]
- Making Big Money from Small Sensors: Trading Time-Series Data under Pufferfish PrivacyChaoyue Niu, Zhenzhe Zheng, ShaoJie Tang, Xiaofeng Gao, Fan Wu 0006. 568-576 [doi]
- Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data StreamZicheng Chi, Yan Li, Zhichuan Huang, Hongyu Sun 0005, Ting Zhu. 577-585 [doi]
- X-CHANT: A Diverse DSA based Architecture for Next-generation Challenged NetworksVijay K. Shah, Simone Silvestri, Brian Luciano, Sajal K. Das. 586-594 [doi]
- Dynamic Mobility-Aware Interference Avoidance for Aerial Base Stations in Cognitive Radio NetworksAli Rahmati, Xiaofan He, Ismail Güvenç, Huaiyu Dai. 595-603 [doi]
- Efficient systematic testing of network protocols with temporal uncertain eventsMinh Vu, Lisong Xu, Sebastian G. Elbaum, Wei Sun, Kevin Qia. 604-612 [doi]
- Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio NetworksMoinul Hossain, Jiang Xie. 613-621 [doi]
- Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent LearningParinaz Naghizadeh, Maria Gorlatova, Andrew S. Lan, Mung Chiang. 622-630 [doi]
- Consortiums of ISP-Content Providers Formed by Nash Bargaining for Internet Content DeliveryDebasis Mitra, Abhinav Sridhar. 631-639 [doi]
- Throughput and Pricing of Ridesharing SystemsCostas Courcoubetis, Antonis Dimakis. 640-648 [doi]
- Client Pre-Screening for MU-MIMO in Commodity 802.11ac Networks via Online LearningShi Su, Wai-tian Tan, Xiaoqing Zhu, Rob Liston. 649-657 [doi]
- Parameter Self-Configuration and Self-Adaptation in Industrial Wireless Sensor-Actuator NetworksJunyang Shi, Mo Sha 0001. 658-666 [doi]
- Slicing Cell Resources: The Case of HTC and MTC CoexistenceVincenzo Mancuso, Paolo Castagno, Matteo Sereno, Marco Ajmone Marsan. 667-675 [doi]
- Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted ValidationAmit Sheoran, Sonia Fahmy, Chunyi Peng, Navin Modi. 676-684 [doi]
- TTL-based Cloud CachesDamiano Carra, Giovanni Neglia, Pietro Michiardi. 685-693 [doi]
- Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable ChannelsGuocong Quan, Jian Tan, Atilla Eryilmaz. 694-702 [doi]
- The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the WebRashid Tahir, Sultan Durrani, Faizan Ahmed, Hammas Saeed, Fareed Zaffar, Saqib Ilyas. 703-711 [doi]
- The Consistent Cuckoo FilterLailong Luo, Deke Guo, Ori Rottenstreich, Richard T. B. Ma, Xueshan Luo, Bangbang Ren. 712-720 [doi]
- Multi-hop Backscatter Tag-to-Tag NetworksAmjad Yousef Majid, Michel Jansen, Guillermo Ortas Delgado, Kasim Sinan Ytidtnm, Przemystaw Pawetczak. 721-729 [doi]
- Adaptive Multipath Routing based on Hybrid Data and Control Plane OperationMarcelo Pizzutti, Alberto E. Schaeffer Filho. 730-738 [doi]
- Link Rate Selection using Constrained Thompson SamplingHarsh Gupta, Atilla Eryilmaz, R. Srikant. 739-747 [doi]
- Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed FeedbackLixing Chen, Jie Xu 0001. 748-756 [doi]
- Crowd-Flow Graph Construction and Identification with Spatio-Temporal Signal Feature FusionSuining He, Kang G. Shin. 757-765 [doi]
- An Integrated Top-down and Bottom-up Task Allocation Approach in Social Sensing based Edge Computing SystemsDaniel Yue Zhang, Dong Wang 0002. 766-774 [doi]
- KeyLiSterber: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic SignalsLi Lu 0008, Jiadi Yu, Yingying Chen 0001, Yanmin Zhu, Xiangyu Xu, Guangtao Xue, Minglu Li 0001. 775-783 [doi]
- Fog-based Data Offloading in Urban IoT ScenariosPranvera Kortoçi, Liang Zheng, Carlee Joe-Wong, Mario Di Francesco, Mung Chiang. 784-792 [doi]
- Dynamic Multicast Traffic Engineering with Efficient Rerouting for Software-Defined NetworksJian-Jhih Kuo, Sheng-Hao Chiang, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen. 793-801 [doi]
- Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT ApplicationsSubhrendu Chattopadhyay, Soumyajit Chatterjee, Sukumar Nandi, Sandip Chakraborty. 802-810 [doi]
- How Powerful Switches Should be Deployed: A Precise Estimation Based on Queuing TheoryGengbiao Shen, Qing Li, Shuo Ai, Yong Jiang, Mingwei Xu, Xuya Jia. 811-819 [doi]
- Efficient Indexing Mechanism for Unstructured Data Sharing Systems in Edge ComputingJunjie Xie, Chen Qian, Deke Guo, Minmei Wang, Shouqian Shi, Honghui Chen. 820-828 [doi]
- Corking by Forking: Vulnerability Analysis of BlockchainShengling Wang 0001, Chenyu Wang, Qin Hu. 829-837 [doi]
- Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware ApproachHui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiu-zhen Cheng. 838-846 [doi]
- Collaborative Validation of Public-Key Certificates for IoT by Distributed CachingMinmei Wang, Chen Qian, Xin Li, Shouqian Shi. 847-855 [doi]
- CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of ChargeChi Lin, Zhi Shang, Wan Du, Jiankang Ren, Lei Wang, Guowei Wu. 856-864 [doi]
- Spin-Antenna: 3D Motion Tracking for Tag Array Labeled Objects via Spinning AntennaChuyu Wang, Lei Xie, Keyan Zhang, Wei Wang, Yanling Bu, Sanglu Lu. 865-873 [doi]
- TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag MatrixJia Liu, Xingyu Chen, Shigang Chen, Xiulong Liu, Yanyan Wang, Lijun Chen. 874-882 [doi]
- TwinLeak: RFID-based Liquid Leakage Detection in Industrial EnvironmentsJunchen Guo, Ting Wang, Yuan He, Meng Jin, Chengkun Jiang, Yunhao Liu. 883-891 [doi]
- Towards Physical-Layer Vibration Sensing with RFIDsPing Li, Zhenlin An, Lei Yang, Panlong Yang. 892-900 [doi]
- Price Competition with LTE-U and WiFiXu Wang, Randall A. Berry. 901-909 [doi]
- Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoEFangxin Wang, Cong Zhang, Feng Wang 0001, Jiangchuan Liu, Yifei Zhu, Haitian Pang, Lifeng Sun. 910-918 [doi]
- Mechanism Design for Network Utility Maximization with Private Constraint InformationMeng Zhang, Jianwei Huang. 919-927 [doi]
- Recommending Paths: Follow or Not Follow?Yunpeng Li, Costas Courcoubetis, Lingjie Duan. 928-936 [doi]
- CellTradeMap: Delineating Trade Areas for Urban Commercial Districts with Cellular NetworksYi Zhao, Zimu Zhou, Xu Wang, Tongtong Liu, Yunhao Liu, Zheng Yang. 937-945 [doi]
- Statistical Enrichment Models for Activity Inference from Imprecise Location DataRan He, Jin Cao, Lisa Zhang, Denny Lee. 946-954 [doi]
- On the Distribution of Traffic Volumes in the Internet and its ImplicationsMohammed Alasmar, George Parisis, Richard G. Clegg, Nickolay Zakhleniuk. 955-963 [doi]
- Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction NetworkWeili Chen, Jun Wu, Zibin Zheng, Chuan Chen, Yuren Zhou. 964-972 [doi]
- EVSO: Environment-aware Video Streaming optimization of Power ConsumptionKyoungjun Park, Myungchul Kim. 973-981 [doi]
- Receiver-driven Video Multicast over NOMA Systems in Heterogeneous EnvironmentsXiaoda Jiang, Hancheng Lu, Chang Wen Chen, Feng Wu. 982-990 [doi]
- Towards Low Latency Multi-viewpoint 360° Interactive Video: A Multimodal Deep Reinforcement Learning ApproachHaitian Pang, Cong Zhang, Fangxin Wang, Jiangchuan Liu, Lifeng Sun. 991-999 [doi]
- CBA: Contextual Quality Adaptation for Adaptive Bitrate Video StreamingBastian Alt, Trevor Ballard, Ralf Steinmetz, Heinz Koeppl, Amr Rizk. 1000-1008 [doi]
- DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural NetworksFabien Geyer, Steffen Bondorf. 1009-1017 [doi]
- Distributed Energy-Adaptive Aggregation Scheduling with Coverage Guarantee For Battery-Free Wireless Sensor NetworksKunyi Chen, Hong Gao, Zhipeng Cai, Quan Chen 0003, Jianzhong Li. 1018-1026 [doi]
- Fast Distributed Backbone Construction Despite Strong Adversarial JammingYifei Zou, Dongxiao Yu, Libing Wu, Jiguo Yu, Yu Wu, Qiang-Sheng Hua, Francis C. M. Lau 0001. 1027-1035 [doi]
- Space-Optimal Packet Routing on TreesBoaz Patt-Shamir, Will Rosenbaum. 1036-1044 [doi]
- If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd SensingWenqiang Jin, Mingyan Xiao, Ming Li, Linke Guo. 1045-1053 [doi]
- Optimal User Choice Engineering in Mobile Crowdsensing with Bounded Rational UsersMerkouris Karaliopoulos, Iordanis Koutsopoulos, Leonidas Spiliopoulos. 1054-1062 [doi]
- Dynamic Task Pricing in Multi-Requester Mobile Crowd Sensing with Markov Correlated EquilibriumHaiming Jin, Hongpeng Guo, Lu Su, Klara Nahrstedt, Xinbing Wang. 1063-1071 [doi]
- A Flexible Distributed Optimization Framework for Service of Concurrent Tasks in Processing NetworksZai Shi, Atilla Eryilmaz. 1072-1080 [doi]
- Update Algebra: Toward Continuous, Non-Blocking Composition of Network Updates in SDNGeng Li, Yang Richard Yang, Franck Le, Yeon-sup Lim, Junqi Wang. 1081-1089 [doi]
- Experiences Implementing Live VM Migration over the WAN with Multi-Path TCPFranck Le, Erich M. Nahum. 1090-1098 [doi]
- Learning the Optimal Synchronization Rates in Distributed SDN Control ArchitecturesKonstantinos Poularakis, Qiaofeng Qin, Liang Ma 0002, Sastry Kompella, Kin K. Leung, Leandros Tassiulas. 1099-1107 [doi]
- Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined NetworksHongli Xu, Shigang Chen, Qianpiao Ma, Liusheng Huang. 1108-1116 [doi]
- Smartlink: Exploiting Channel Clustering Effects for Reliable Millimeter Wave CommunicationsIrmak Aykin, Berk Akgun, Marwan Krunz. 1117-1125 [doi]
- Autonomous Environment Mapping Using Commodity Millimeter-wave Network DeviceAnfu Zhou, Shaoyuan Yang, Yi Yang, Yuhang Fan, Huadong Ma. 1126-1134 [doi]
- Secure On-skin Biometric Signal Transmission using Galvanic CouplingWilliam J. Tomlinson, Stella Banou, Christopher Yu, Michele Nogueira, Kaushik R. Chowdhury. 1135-1143 [doi]
- On the Stochastic Link Modeling of Static Wireless Sensor Networks in Ocean EnvironmentsAlireza Shahanaghi, Yaling Yang, R. Michael Buehrer. 1144-1152 [doi]
- Collaborative Client-Side DNS Cache Poisoning AttackFatemah Alharbi, Jie Chang, Yuchen Zhou, Feng Qian 0001, Zhiyun Qian, Nael B. Abu-Ghazaleh. 1153-1161 [doi]
- Towards Verifiable Performance Measurement over In-the-Cloud MiddleboxesXiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu. 1162-1170 [doi]
- FS-Net: A Flow Sequence Network For Encrypted Traffic ClassificationChang Liu, Longtao He, Gang Xiong, Zigang Cao, Zhen Li. 1171-1179 [doi]
- Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous NetworksZhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu. 1180-1188 [doi]
- Pair-Navi: Peer-to-Peer Indoor Navigation with Mobile Visual SLAMErqun Dong, Jingao Xu, Chenshu Wu, Yunhao Liu, Zheng Yang 0002. 1189-1197 [doi]
- PANDA: Placement of Unmanned Aerial Vehicles Achieving 3D Directional CoverageWeijun Wang, Haipeng Dai, Chao Dong, Xiao Cheng, Xiaoyu Wang, Guihai Chen, Wanchun Dou. 1198-1206 [doi]
- ImgSensingNet: UAV Vision Guided Aerial-Ground Air Quality Sensing SystemYuzhe Yang, Zhiwen Hu, Kaigui Bian, Lingyang Song. 1207-1215 [doi]
- Batch Reading Densely Arranged QR CodesBinyao Jiang, Yisheng Ji, Xiaohua Tian, Xinbing Wang. 1216-1224 [doi]
- 3-Guard: Acoustic-based Drowsy Driving Detection Using SmartphonesYadong Xie, Fan Li 0001, Yue Wu, Song Yang, Yu Wang. 1225-1233 [doi]
- Brush like a Dentist: Accurate Monitoring of Toothbrushing via Wrist-Worn Gesture SensingChengwen Luo, Xingyu Feng, Junliang Chen, JianQiang Li, Weitao Xu, Wei Li, Li Zhang, Zahir Tari, Albert Y. Zomaya. 1234-1242 [doi]
- SADeepSense: Self-Attention Deep Learning Framework for Heterogeneous On-Device Sensors in Internet of Things ApplicationsShuochao Yao, Yiran Zhao, Huajie Shao, Dongxin Liu, Shengzhong Liu, Yifan Hao, Ailing Piao, Shaohan Hu, Su Lu, Tarek F. Abdelzaher. 1243-1251 [doi]
- DRL360: 360-degree Video Streaming with Deep Reinforcement LearningYuanxing Zhang, Pengyu Zhao, Kaigui Bian, Yunxin Liu, Lingyang Song, Xiaoming Li. 1252-1260 [doi]
- Addressing Skewness in Iterative ML Jobs with Parameter PartitionShaoqi Wang, Wei Chen 0038, Xiaobo Zhou 0002, Sang-Yoon Chang, Mike Ji. 1261-1269 [doi]
- Hetero-Edge: Orchestration of Real-time Vision Applications on Heterogeneous Edge CloudsWuyang Zhang, Sugang Li, Luyang Liu, Zhenhua Jia, Yanyong Zhang, Dipankar Raychaudhuri. 1270-1278 [doi]
- Service Placement and Request Scheduling for Data-intensive Applications in Edge CloudsVajiheh Farhadi, Fidan Mehmeti, Ting He 0001, Tom La Porta, Hana Khamfroush, Shiqiang Wang, Kevin S. Chan. 1279-1287 [doi]
- Distributed Machine Learning with a Serverless ArchitectureHao Wang, Di Niu, Baochun Li. 1288-1296 [doi]
- SynLight: Synthetic Light Emission for Fast Transmission in COTS Device-enabled VLCYanbing Yang, Jun Luo, Chen Chen 0037, Wen De Zhong, Liangyin Chen. 1297-1305 [doi]
- ALS-P: Light Weight Visible Light Positioning via Ambient Light SensorZeyu Wang, Zhice Yang, Qianyi Huang, Lin Yang, Qian Zhang. 1306-1314 [doi]
- UnseenCode: Invisible On-screen Barcode with Image-based ExtractionHao Cui, Huanyu Bian, Weiming Zhang, Nenghai Yu. 1315-1323 [doi]
- Tweeting with Sunlight: Encoding Data on Mobile ObjectsRens Bloom, Marco Zuniga, Qing Wang 0007, Domenico Giustiniano. 1324-1332 [doi]
- CG4SR: Near Optimal Traffic Engineering for Segment Routing with Column GenerationMathieu Jadin, Francois Aubry, Pierre Schaus, Olivier Bonaventure. 1333-1341 [doi]
- Joint Content Distribution and Traffic Engineering of Adaptive Videos in Telco-CDNsKhaled M. Diab, Mohamed Hefeeda. 1342-1350 [doi]
- Demand-Aware Network Design with Minimal Congestion and Route LengthsChen Avin, Kaushik Mondal 0001, Stefan Schmid 0001. 1351-1359 [doi]
- Disentangled Network Alignment with Matching ExplainabilityFan Zhou 0002, Zijing Wen, Goce Trajcevski, Kunpeng Zhang, Ting Zhong, Fang Liu. 1360-1368 [doi]
- Maximum Lifetime Analytics in IoT NetworksVictor Valls, George Iosifidis, Theodoros Salonidis. 1369-1377 [doi]
- Interference-aware User Grouping Strategy in NOMA Systems with QoS ConstraintsFengqian Guo, Hancheng Lu, Daren Zhu, Hao Wu. 1378-1386 [doi]
- Federated Learning over Wireless Networks: Optimization Model Design and AnalysisNguyen H. Tran, Wei Bao, Albert Zomaya, Nguyen N. H. Minh, Choong Seon Hong. 1387-1395 [doi]
- A Collaborative Learning Based Approach for Parameter Configuration of Cellular NetworksJie Chuai, Zhitang Chen, Guochen Liu, Xueying Guo, Xiaoxiao Wang, Xin Liu, Chongming Zhu, Feiyi Shen. 1396-1404 [doi]
- Figment: Fine-grained Permission Management for Mobile AppsIoannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta 0001, Paul Yu. 1405-1413 [doi]
- Joint Offloading Decision and Resource Allocation with Uncertain Task Computing RequirementNima Eshraghi, Ben Liang. 1414-1422 [doi]
- Dynamic Adaptive DNN Surgery for Inference Acceleration on the EdgeChuang Hu, Wei Bao, Dan Wang, Fengming Liu. 1423-1431 [doi]
- Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on EdgeHengrun Zhang, Kai Zeng 0001. 1432-1440 [doi]
- Online Job Scheduling with Resource Packing on a Cluster of Heterogeneous ServersYang Liu, Huanle Xu, Wing Cheong Lau. 1441-1449 [doi]
- On the Power of Preprocessing in Decentralized Network OptimizationKlaus-Tycho Foerster, Juho Hirvonen, Stefan Schmid 0001, Jukka Suomela. 1450-1458 [doi]
- Winning at the Starting Line: Joint Network Selection and Service Placement for Mobile Edge ComputingBin Gao, Zhi Zhou, Fangming Liu, Fei Xu. 1459-1467 [doi]
- Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning ApproachTao Ouyang, Rui Li, Xu Chen, Zhi Zhou, Xin Tang. 1468-1476 [doi]
- PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum SharingHe Li, Yaling Yang, Yanzhi Dou, Jung-Min "Jerry" Park, Kui Ren 0001. 1477-1485 [doi]
- Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from ScratchLin He, Gang Ren, Ying Liu. 1486-1494 [doi]
- TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS BandMohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui. 1495-1503 [doi]
- Incentivizing Relay Participation for Securing IoT CommunicationXiaonan Zhang, Pei Huang, Linke Guo, Mo Sha. 1504-1512 [doi]
- RF-Mehndi: A Fingertip Profiled RF IdentifierCui Zhao, Zhenjiang Li, Ting Liu, Han Ding, Jinsong Han, Wei Xi, Ruowei Gui. 1513-1521 [doi]
- On Improving Write Throughput in Commodity RFID SystemsJia Liu, Xingyu Chen, Xiulong Liu, Xiaocong Zhang, Xia Wang, Lijun Chen. 1522-1530 [doi]
- Embracing Tag Collisions: Acquiring Bloom Filters across RFIDs in Physical LayerZhenlin An, Qiongzheng Lin, Lei Yang, Wei Lou. 1531-1539 [doi]
- PassiveRETRO: Enabling Completely Passive Visible Light Localization for IoT ApplicationsSihua Shao, Abdallah Khreishah, Juan Paez. 1540-1548 [doi]
- Cross-Network Prioritized Sharing: An Added Value MVNO's PerspectiveYining Zhu, Haoran Yu, Randall A. Berry, Chang Liu. 1549-1557 [doi]
- How to Earn Money in Live Streaming Platforms? - A Study of Donation-Based MarketsMing Tang, Jianwei Huang. 1558-1566 [doi]
- A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement EnforcementHuan Zhou, Xue Ouyang, Zhijie Ren, Jinshu Su, Cees de Laat, Zhiming Zhao. 1567-1575 [doi]
- Burstable Instances for Clouds: Performance Modeling, Equilibrium Analysis, and Revenue MaximizationYuxuan Jiang 0001, Mohammad Shahrad, David Wentzlaff, Danny H. K. Tsang, Carlee Joe-Wong. 1576-1584 [doi]
- Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift KeyingSalvatore D'Oro, Francesco Restuccia, Tommaso Melodia. 1585-1593 [doi]
- Differentially-Private Incentive Mechanism for Crowdsourced Radio Environment Map ConstructionYidan Hu, Rui Zhang. 1594-1602 [doi]
- Orthogonality-Sabotaging Attacks against OFDMA-based Wireless NetworksShangqing Zhao, Zhuo Lu, Zhengping Luo, Yao Liu. 1603-1611 [doi]
- Robust and Efficient Modulation Recognition Based on Local Sequential IQ FeaturesWei Xiong, Petko Bogdanov, Mariya Zheleva. 1612-1620 [doi]
- Hysteresis-based Active Queue Management for TCP Traffic in Data CentersAhmed M. Abdelmoniem, Brahim Bensaou. 1621-1629 [doi]
- Large-Scale Network Utility Maximization: Countering Exponential Growth with Exponentiated GradientsLuigi Vigneri, Georgios S. Paschos, Panayotis Mertikopoulos. 1630-1638 [doi]
- Routing in Black Box: Modularized Load Balancing for Multipath Data Center NetworksFujie Fan, Bing Hu 0002, Kwan L. Yeung. 1639-1647 [doi]
- ReLeS: A Neural Adaptive Multipath Scheduler based on Deep Reinforcement LearningHan Zhang, Wenzhong Li, Shaohua Gao, Xiaoliang Wang, Baoliu Ye. 1648-1656 [doi]
- Joint Antenna Allocation and Link Scheduling in FlexRadio NetworksZhenzhi Qian, Yang Yang 0010, Kannan Srinivasan, Ness B. Shroff. 1657-1665 [doi]
- Powers Maximizing Proportional Fairness Among Poisson BipolesNithin S. Ramesan, François Baccelli. 1666-1674 [doi]
- A stack-vector routing protocol for automatic tunnelingMohamed Lamine Lamali, Simon Lassourreuille, Stephan Kunne, Johanne Cohen. 1675-1683 [doi]
- Real-Time Scheduling for Event-Triggered and Time-Triggered Flows in Industrial Wireless Sensor-Actuator NetworksXi Jin, Abusayeed Saifullah, Chenyang Lu, Peng Zeng 0001. 1684-1692 [doi]
- Distributed Learning and Optimal Assignment in Multiplayer Heterogeneous NetworksHarshvardhan Tibrewal, Sravan Patchala, Manjesh K. Hanawal, Sumit Jagdish Darak. 1693-1701 [doi]
- Combinatorial Sleeping Bandits with Fairness ConstraintsFengjiao Li, Jia Liu, Bo Ji. 1702-1710 [doi]
- Beyond Uniform Reverse Sampling: A Hybrid Sampling Technique for Misinformation PreventionGuangmo Amo Tong, Ding-Zhu Du. 1711-1719 [doi]
- Regularized inversion of flow size distributionNelson Antunes, Vladas Pipiras, Gonçalo Jacinto. 1720-1728 [doi]
- Impact of Network Topology on the Performance of DML: Theoretical Analysis and Practical FactorsShuai Wang, Dan Li, Jinkun Geng, Yue Gu, Yang Cheng. 1729-1737 [doi]
- Routing and Spectrum Assignment Integrating Machine-Learning-Based QoT Estimation in Elastic Optical NetworksMatteo Salani, Cristina Rottondi, Massimo Tornatore. 1738-1746 [doi]
- No Regret in Cloud Resources Reservation with Violation GuaranteesNikolaos Liakopoulos, Georgios S. Paschos, Thrasyvoulos Spyropoulos. 1747-1755 [doi]
- Achieving a Fully-Flexible Virtual Network Embedding in Elastic Optical NetworksNashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati. 1756-1764 [doi]
- Network Interdiction Using Adversarial Traffic FlowsXinzhe Fu, Eytan Modiano. 1765-1773 [doi]
- Looking Glass of NFV: Inferring the Structure and State of NFV Network from External ObservationsYilei Lin, Ting He 0001, Shiqiang Wang, Kevin S. Chan, Stephen Pasteris. 1774-1782 [doi]
- FAVE: A fast and efficient network Flow AVailability Estimation method with bounded relative errorTingwei Liu, John C. S. Lui. 1783-1791 [doi]
- A Near Optimal Reliable Composition Approach for Geo-Distributed Latency-Sensitive Service ChainsDmitrii Chemodanov, Prasad Calyam, Flavio Esposito. 1792-1800 [doi]
- Balancing Cost and Dissatisfaction in Online EV Charging under Real-time PricingHanling Yi, Qiulin Lin, Minghua Chen. 1801-1809 [doi]
- Collaborated Tasks-driven Mobile Charging and Scheduling: A Near Optimal ResultTao Wu, Panlong Yang, Haipeng Dai, Wanru Xu, Mingxue Xu. 1810-1818 [doi]
- Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor NetworksChi Lin, Yanhong Zhou, Fenglong Ma, Jing Deng, Lei Wang, Guowei Wu. 1819-1827 [doi]
- Self-sustainable Sensor Networks with Multi-source Energy Harvesting and Wireless ChargingPengzhan Zhou, Cong Wang, Yuanyuan Yang. 1828-1836 [doi]
- Pricing for Revenue Maximization in IoT Data Markets: An Information Design PerspectiveWeichao Mao, Zhenzhe Zheng, Fan Wu. 1837-1845 [doi]
- Economic Viability of Data Trading with RolloverZhiyuan Wang, Lin Gao 0001, Jianwei Huang, Biying Shou. 1846-1854 [doi]
- Dynamic Pricing and Capacity Allocation of UAV-provided Mobile ServicesXuehe Wang, Lingjie Duan. 1855-1863 [doi]
- Auction-based Cache Trading for Scalable Videos in Multi-Provider Heterogeneous NetworksBehrouz Jedari, Mario Di Francesco. 1864-1872 [doi]
- CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral AnalysisRui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Liuwan Zhu, Hongyi Wu. 1873-1881 [doi]
- Label-Less: A Semi-Automatic Labelling Tool for KPI AnomaliesNengwen Zhao, Jing Zhu, Rong Liu, Dapeng Liu, Ming Zhang, Dan Pei. 1882-1890 [doi]
- Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAEWenxiao Chen, Haowen Xu, Zeyan Li, Dan Peiy, Jie Chen, Honglin Qiao, Yang Feng, Zhaogang Wang. 1891-1899 [doi]
- Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization SolutionXiaocan Li, Kun Xie, Xin Wang, Gaogang Xie, Jigang Wen, Guangxing Zhang, Zheng Qin. 1900-1908 [doi]
- APRIL: An Application-Aware, Predictive and Intelligent Load Balancing Solution for Data-Intensive ScienceDeepak Nadig, Byrav Ramamurthy, Brian Bockelman, David Swanson. 1909-1917 [doi]
- RABA: Resource-Aware Backup Allocation For A Chain of Virtual Network FunctionsJiao Zhang, Zenan Wang, Chunyi Peng, Linquan Zhang, Tao Huang, Yunjie Liu. 1918-1926 [doi]
- Learning Network Traffic Dynamics Using Temporal Point ProcessAvirup Saha, Niloy Ganguly, Sandip Chakraborty, Abir De. 1927-1935 [doi]
- Adjusting Matching Algorithm to Adapt to Workload Fluctuations in Content-based Publish/Subscribe SystemsShiyou Qian, Weichao Mao, Jian Cao, Frederic Le Mouel, Minglu Li. 1936-1944 [doi]
- Doppler Radar with In-Band Full Duplex RadiosSeyed Ali Hassani, Karthick Parashar, André Bourdoux, Barend van Liempd, Sofie Pollin. 1945-1953 [doi]
- To Cancel or Not to Cancel: Exploiting Interference Signal Strength in the Eigenspace for Efficient MIMO DoF UtilizationYongce Chen, Shaoran Li, Chengzhang Li, Y. Thomas Hou, Brian Jalaian. 1954-1962 [doi]
- On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and CountermeasureSulei Wang, Zhe Chen, Yuedong Xu, Qiben Yan, Chongbin Xu, Xin Wang. 1963-1971 [doi]
- LiBeam: Throughput-Optimal Cooperative Beamforming for Indoor Visible Light NetworksNan Cen, Neil Dave, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia. 1972-1980 [doi]
- TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source InformationYi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu, Qi Tan. 1981-1989 [doi]
- A Network-centric Framework for Auditing Recommendation SystemsAbhisek Dash, Animesh Mukherjee 0001, Saptarshi Ghosh. 1990-1998 [doi]
- NeuralWalk: Trust Assessment in Online Social Networks with Neural NetworksGuangchi Liu, Chenyu Li, Qing Yang 0003. 1999-2007 [doi]
- Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior KnowledgeJinyuan Jia, Neil Zhenqiang Gong. 2008-2016 [doi]
- A Generic Technique for Sketches to Adapt to Different Counting RangesTong Yang, Jiaqi Xu, Xilai Liu, Peng Liu, Lun Wang, Jun Bi, Xiaoming Li. 2017-2025 [doi]
- MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data StreamsLu Tang, Qun Huang, Patrick P. C. Lee. 2026-2034 [doi]
- Optimal Representations of a Traffic Distribution in Switch MemoriesYaniv Sadeh, Ori Rottenstreich, Arye Barkan, Yossi Kanizo, Haim Kaplan. 2035-2043 [doi]
- Approximate Classifiers with Controlled AccuracyVitalii Demianiuk, Kirill Kogan, Sergey I. Nikolenko. 2044-2052 [doi]
- Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted PlatformZhibo Wang, Jingxin Li, Jiahui Hu, Ju Ren, Zhetao Li, Yanjun Li. 2053-2061 [doi]
- VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on SmartphonesQian Wang 0002, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo. 2062-2070 [doi]
- WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn WearablesChen Wang, Jian Liu, Xiaonan Guo, Yan Wang 0003, Yingying Chen. 2071-2079 [doi]
- NAuth: Secure Face-to-Face Device Authentication via NonlinearityXinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu. 2080-2088 [doi]
- Keeping Context In Mind: Automating Mobile App Access Control with User Interface InspectionHao Fu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra. 2089-2097 [doi]
- A Business Model Analysis of Mobile Data RewardsHaoran Yu, Ermin Wei, Randall A. Berry. 2098-2106 [doi]
- On Optimal Hybrid Premium Peering and Caching Purchasing Strategy of Internet Content ProvidersLianjie Shi, Xin Wang, Richard T. B. Ma. 2107-2115 [doi]
- TransLink: User Identity Linkage across Heterogeneous Social Networks via Translating EmbeddingsJingya Zhou, Jianxi Fan. 2116-2124 [doi]
- LEGO-Fi: Transmitter-Transparent CTC with Cross-DemappingXiuzhen Guo, Yuan He, Xiaolong Zheng 0002, Zihao Yu, Yunhao Liu. 2125-2133 [doi]
- Dynamic Spectrum Management in 5G Wireless Networks: A Real-Life Modeling ApproachPanagiotis Vamvakas, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou. 2134-2142 [doi]
- SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay NetworksJie Wang, Wenye Wang, Cliff Wang. 2143-2151 [doi]
- Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF LoopFrancesco Restuccia, Tommaso Melodia. 2152-2160 [doi]
- Detecting Network Disruptions At Colocation FacilitiesAlexandros Milolidakis, Romain Fontugne, Xenofontas Dimitropoulos. 2161-2169 [doi]
- Efficiently Inferring Top-k Elephant Flows based on Discrete Tensor CompletionKun Xie, Jiazheng Tian, Xin Wang, Gaogang Xie, Jigang Wen, Dafang Zhang. 2170-2178 [doi]
- Detecting Anomaly in Large-scale Network using Mobile CrowdsourcingYang Li, Jiachen Sun, Wenguang Huang, Xiaohua Tian. 2179-2187 [doi]
- A Probabilistic Framework to Node-level Anomaly Detection in Communication NetworksBatiste Le Bars, Argyris Kalogeratos. 2188-2196 [doi]
- Perceiving Internet Anomalies via CDN Replica ShiftsYiHao Jia, Aleksandar Kuzmanovic. 2197-2205 [doi]
- Measuring Update Performance and Consistency Anomalies in Managed DNS ServicesZhaoyu Gao, Arun Venkataramani. 2206-2214 [doi]
- Quick and Accurate False Data Detection in Mobile Crowd SensingKun Xie, Xiaocan Li, Xin Wang, Gaogang Xie, Dongliang Xie, Zhenyu Li, Jigang Wen, Zulong Diao. 2215-2223 [doi]
- Statistical learning of geometric characteristics of wireless networksAntoine Brochard, Bartlomiej Blaszczyszyn, Stéphane Mallat, Sixin Zhang. 2224-2232 [doi]
- Differentially-Private Two-Party Egocentric Betweenness CentralityLeyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague. 2233-2241 [doi]
- PHDP: Preserving Persistent Homology in Differentially Private Graph PublicationsTianchong Gao, Feng Li 0001. 2242-2250 [doi]
- Smart Information Spreading for Opinion Maximization in Social NetworksAnuj Nayak, Seyyedali Hosseinalipour, Huaiyu Dai. 2251-2259 [doi]
- Evolving Knowledge GraphsJiaqi Liu, Qin Zhang, Luoyi Fu, Xinbing Wang, Songwu Lu. 2260-2268 [doi]
- Scheduling Jobs with Random Resource Requirements in Computing ClustersKonstantinos Psychas, Javad Ghaderi. 2269-2277 [doi]
- When Network Matters: Data Center Scheduling with Network TasksFrédéric Giroire, Nicolas Huin, Andrea Tomassilli, Stéphane Pérennes. 2278-2286 [doi]
- Dedas: Online Task Dispatching and Scheduling with Bandwidth Constraint in Edge ComputingJiaying Meng, Haisheng Tan, Chao Xu, Wanli Cao, Liuyan Liu, Bojie Li. 2287-2295 [doi]
- Minimum Age TDMA SchedulingTung-Wei Kuo. 2296-2304 [doi]
- Virtual Speed Test: an AP Tool for Passive Analysis of Wireless LANsPeshal Nayak, Santosh Pandey, Edward W. Knightly. 2305-2313 [doi]
- Switching Constrained Max-Weight Scheduling for Wireless NetworksSoumya Basu, Sanjay Shakkottai. 2314-2322 [doi]
- Robust Scheduling for Wireless Charger NetworksXiaoyu Wang, Haipeng Dai, He Huang, Yunhuai Liu, Guihai Chen, Wanchun Dou. 2323-2331 [doi]
- Satisfying Network Slicing Constraints via 5G MAC SchedulingSilvio Mandelli, Matthew Andrews, Sem C. Borst, Siegfried Klein. 2332-2340 [doi]
- HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem HostingJinlong E, Yong Cui 0001, Mingkang Ruan, Zhenhua Li 0001, Ennan Zhai. 2341-2349 [doi]
- The Role of Network Topology for Distributed Machine LearningGiovanni Neglia, Gianmarco Calbi, Don Towsley, Gayane Vardoyan. 2350-2358 [doi]
- Multisource Rumor Spreading with Network CodingYerom-David Bromberg, Quentin Dufour, Davide Frey. 2359-2367 [doi]
- ACCEL: Accelerating the Bitcoin Blockchain for High-throughput, Low-latency ApplicationsAdiseshu Hari, Murali S. Kodialam, T. V. Lakshman. 2368-2376 [doi]
- LEAP: Location Estimation and Predictive Handover with Consumer-Grade mmWave DevicesJoan Palacios, Paolo Casari, Hany Assasa, Joerg Widmer. 2377-2385 [doi]
- PAMT: Phase-based Acoustic Motion Tracking in Multipath Fading EnvironmentsYang Liu, Wuxiong Zhang, Yang Yang, Weidong Fang, Fei Qin, Xuewu Dai. 2386-2394 [doi]
- Incrementally-deployable Indoor Navigation with Automatic Trace GenerationYuanchao Shu, Zhuqi Li, Börje Karlsson 0001, Yiyong Lin, Thomas Moscibroda, Kang Shin. 2395-2403 [doi]
- Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal SolutionSixu Piao, Zhongjie Ba, Lu Su, Dimitrios Koutsonikolas, Shi Li, Kui Ren 0001. 2404-2412 [doi]
- Performance Analysis of Online Social PlatformsAnastasios Giovanidis, Bruno Baynat, Antoine Vendeville. 2413-2421 [doi]
- Age Optimal Information Gathering and Dissemination on GraphsVishrant Tripathi, Rajat Talak, Eytan Modiano. 2422-2430 [doi]
- Compressed Distributed Gradient Descent: Communication-Efficient Consensus over NetworksXin Zhang, Jia Liu, Zhengyuan Zhu, Elizabeth S. Bentley. 2431-2439 [doi]
- Data-Intensive Routing in Delay-Tolerant NetworksKazuya Sakai, Min-Te Sun, Wei-Shinn Ku. 2440-2448 [doi]
- Adaptive Interference-Aware VNF Placement for Service-Customized 5G Network SlicesQixia Zhang, Fangming Liu, Chaobing Zeng. 2449-2457 [doi]
- Faster Placement of Virtual Machines through Adaptive CachingGil Einziger, Maayan Goldstein, Yaniv Sarar. 2458-2466 [doi]
- Wireless and Computing Resource Allocation for Selfish Computation Offloading in Edge ComputingSladana Josilo, György Dan. 2467-2475 [doi]
- Age of Information-Aware Scheduling for Timely and Scalable Internet of Things ApplicationsLorenzo Corneo, Christian Rohner, Per Gunningberg. 2476-2484 [doi]
- Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared KeyXiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao. 2485-2493 [doi]
- Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple KeysKe Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, Xionghong Jiang, Cuicui Su. 2494-2502 [doi]
- Hardening Database Padding for Searchable EncryptionLei Xu 0015, Xingliang Yuan, Cong Wang, Qian Wang, Chungen Xu. 2503-2511 [doi]
- Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated LearningZhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, Hairong Qi. 2512-2520 [doi]
- A Practical Underlay Spectrum Sharing Scheme for Cognitive Radio NetworksPedram Kheirkhah Sangdeh, Hossein Pirayesh, Huacheng Zeng, Hongxiang Li. 2521-2529 [doi]
- Entrapment for Wireless EavesdroppersSong Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu. 2530-2538 [doi]
- Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud ApplicationsZijiang Hao, Shanhe Yi, Qun Li. 2539-2547 [doi]
- A Distributed Orchestration Algorithm for Edge Computing Resources with GuaranteesGabriele Castellano, Flavio Esposito, Fulvio Risso. 2548-2556 [doi]
- A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data CentersJianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang 0001, Zhenguang Liu. 2557-2565 [doi]
- An Online Market Mechanism for Edge Emergency Demand Response via Cloudlet ControlShutong Chen, Lei Jiao, Lin Wang, Fangming Liu. 2566-2574 [doi]
- OFM: An Online Fisher Market for Cloud ComputingAbhinandan S. Prasad, Mayutan Arumaithurai, David Koll, Yuming Jiang, Xiaoming Fu 0001. 2575-2583 [doi]
- Service Scheduling for Bernoulli Requests and Quadratic CostRamya Burra, Chandramani Singh, Joy Kuri. 2584-2592 [doi]