Abstract is missing.
- New tight upper bounds on the capacity for general deterministic dissemination in wireless ad hoc networksCheng Wang, Jieren Zhou, Tianci Liu, Lu Shao, Huiya Yan. 1-8 [doi]
- Detecting BGP instability using Recurrence Quantification Analysis (RQA)Bahaa Al-Musawi, Philip Branch, Grenville J. Armitage. 1-8 [doi]
- SDN-based TCP congestion control in data center networksYifei Lu, Shuhong Zhu. 1-7 [doi]
- PROTA: A Privacy-pReserving prOtocol for real-time Targeted AdvertisingYiming Pang, Bo Wang, Fan Wu, Guihai Chen, Bo Sheng. 1-8 [doi]
- Distributed load scheduling in smart community with capacity constrained local power supplierNuo Yu, Lan Mu, Yuting Miao, Hejiao Huang, Hongwei Du, Xiaohua Jia. 1-8 [doi]
- A goodput distribution model for IEEE 802.11 wireless mesh networksYing Qu, Bryan Ng, Winston K. G. Seah. 1-8 [doi]
- Message from the IPCCC 2015 technical program chairsKui Ren, Tommaso Melodia. 1 [doi]
- R-PMD: robust passive motion detection using PHY information with MIMOHai Zhu, Fu Xiao, Lijuan Sun, Xiaohui Xie, Panlong Yang, Ruchuan Wang. 1-8 [doi]
- Lifetime maximization in rechargeable wireless sensor networks with charging interferenceYi Qu, Ke Xu, Haiyang Wang, Dan Wang, Bo Wu. 1-8 [doi]
- Bandwidth guaranteed virtual network function placement and scaling in datacenter networksFangxin Wang, Ruilin Ling, Jing Zhu, Dan Li. 1-8 [doi]
- Message from the IPCCC 2015 general chairsGuoliang Xue, Sheng Zhong. 1 [doi]
- Efficient TV white space database construction via spectrum sensing and spatial inferenceMengyun Tang, Ze Zheng, Guoru Ding, Zhen Xue. 1-5 [doi]
- Power-free Structural Health Monitoring via compressive sensingJu-min Zhao, Ding Feng, Deng-ao Li, Bao-feng Zhao. 1-8 [doi]
- Traffic condition estimation using vehicular crowdsensing dataLu Shao, Cheng Wang, Zhong Li, Changjun Jiang. 1-8 [doi]
- Incremental deployment for traffic engineering in hybrid SDN networkYingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Han Zhang. 1-8 [doi]
- Privacy-preserving min and k-th min computations with fully homomorphic encryptionBingbing Jiang, Yuan Zhang. 1-8 [doi]
- A dominating-set-based and popularity-driven caching scheme in edge CCNWeiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Tao Lin. 1-2 [doi]
- Measuring the internet routing scalability from the perspective of address allocationDan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu. 1-2 [doi]
- Adaptive partial frequency reuse in LTE-Advanced relay networksChen Sun, Jian Shu, Wei Zheng, Zhiyong Yang, Xiaojun Wang. 1-8 [doi]
- Defending against Energy Dispatching Data integrity attacks in smart gridXiaofei He, Xinyu Yang, Jie Lin, Linqiang Ge, Wei Yu, Qingyu Yang. 1-8 [doi]
- Detect and analyze Large-scale BGP events by bi-clustering Update Visibility MatrixMeng Chen, Mingwei Xu, Qing Li, Xirui Song, Yuan Yang. 1-8 [doi]
- Minimizing response latency via efficient virtual machine placement in cloud systemsHou Deng, Liusheng Huang, Chenkai Yang, Hongli Xu, Bing Leng. 1-8 [doi]
- Blind identification of helical interleaving of the first typeLi Huang, Wengu Chen, Hong Chen. 1-2 [doi]
- Class-based delta-encoding for high-speed train data streamYangxin Lin, Ping Wang, Jinlong Lin, Meng Ma, Ling Liu, Lin Ma. 1-8 [doi]
- A novel algorithm for pattern matching with back referencesLiu Yang, Vinod Ganapathy, Pratyusa K. Manadhata, Ye Wu. 1-8 [doi]
- Integrated caching and tiering according to use and QoS requirementsMark Abashkin, Assaf Natanzon, Eitan Bachmat. 1-8 [doi]
- Privacy preserving big histogram aggregation for spatial crowdsensingShaowei Wang, Liusheng Huang, Pengzhan Wang, Yao Shen, Hongli Xu, Wei Yang. 1-8 [doi]
- Latency-aware routing with bandwidth assignment for Software Defined NetworksQiongyu Zhang, Liehuang Zhu, Meng Shen, Mingzhong Wang, Fan Li. 1-2 [doi]
- Complete font generation of Chinese characters in personal handwriting styleJeng-Wei Lin, Chian-Ya Hong, Ray-I Chang, Yu-Chun Wang, Shu-Yu Lin, Jan-Ming Ho. 1-5 [doi]
- Spatio-temporal tensor completion for imputing missing internet traffic dataHuibin Zhou, Dafang Zhang, Kun Xie, Yuxiang Chen. 1-7 [doi]
- Narrowing down the debugging space of slow search response timeDapeng Liu, Youjian Zhao, Dan Pei, Chengbin Quan, Qingqian Tao, Pei Wang, Xiyang Chen, Dai Tan, Xiaowei Jing, Mei Feng. 1 [doi]
- Fincher: Elephant flow scheduling based on stable matching in data center networksYuxiang Zhang, Lin Cui, Qiao Chu. 1-2 [doi]
- An effective service discovery approach based on field theory and contribution degree in unstructured P2P networksWanchun Yang, Chenxi Zhang, Jiangfeng Li. 1-2 [doi]
- A low-latency fine-grained dynamic shared cache management scheme for chip multi-processorJinbo Xu, Weixia Xu, Zhengbin Pang. 1-7 [doi]
- A customizable MapReduce framework for complex data-intensive workflows on GPUsZhi Qiao, Shuwen Liang, Hai Jiang, Song Fu. 1-8 [doi]
- Energy cost minimization via intelligent temporal and spatial resource allocation in green heterogeneous cellular networksQiang Yang, Bang Wang. 1-8 [doi]
- Characterizing I/O workloads of HPC applications through online analysisWenrui Dong, Guangming Liu, Jie Yu, You Zuo. 1-2 [doi]
- How to protect query and report privacy without sacrificing service quality in participatory sensingMeng Li, Fan Wu, Guihai Chen, Liehuang Zhu, Zijian Zhang. 1-7 [doi]
- RAPIT: RTT-Aware Pending Interest Table for Content Centric NetworkingYalei Tan, Qing Li, Yong Jiang, Shu-Tao Xia. 1-8 [doi]
- Network coding based transmission schemes in DTNs with group meetingsAbdurrahman Arikan, Yuexin Mao, Xiaolan Zhang, Bing Wang, Shengli Zhou, Song Han. 1-8 [doi]
- Traffic-aware networking for video streaming service using SDNCalvin Hue, Yu-Jia Chen, Li-Chun Wang. 1-5 [doi]
- An enhanced algorithm based on paths algebra strategy to solve the VNE problemCanhui Wang, Fangjin Zhu, Qijia Zhang. 1-7 [doi]
- Network intrusion detection and prevention middlebox management in SDNWen Wang, Wenbo He, Jinshu Su. 1-8 [doi]
- Towards shorter task completion time in datacenter networksYuchao Zhang, Ke Xu, Haiyang Wang, Meng Shen. 1-8 [doi]
- Exploring sensor usage behaviors of Android applications based on data flow analysisXing Liu, Jiqiang Liu, Wei Wang 0012. 1-8 [doi]
- Decentralized multi-charger coordination for wireless rechargeable sensor networksLei Mo, Pengcheng You, Xianghui Cao, Yeqiong Song, Jiming Chen. 1-8 [doi]
- SkipMon: A locality-aware Collaborative Intrusion Detection SystemEmmanouil Vasilomanolakis, Matthias Krugl, Carlos Garcia Cordero, Max Mühlhäuser, Mathias Fischer. 1-8 [doi]
- Self-adaptive anonymous communication scheme under SDN architectureTingting Zeng, Meng Shen, Mingzhong Wang, Liehuang Zhu, Fan Li. 1-8 [doi]
- Proactive Complex Event Processing for transportation Internet of ThingsYongheng Wang, Qian Li. 1-2 [doi]
- Optimum reference node deployment for indoor localization based on the average Mean Square Error minimizationFei Long, Aydin Behnad, Xianbin Wang. 1-6 [doi]
- WAlloc: An efficient wear-aware allocator for non-volatile main memorySongping Yu, Nong Xiao, Mingzhu Deng, Yuxuan Xing, Fang Liu, Zhiping Cai, Wei Chen 0009. 1-8 [doi]
- Optimization strategies for inter-thread synchronization overhead on NUMA machineSong Wu, Jun Zhang, Yaqiong Peng, Hai Jin, Wenbin Jiang. 1-8 [doi]
- Building smartphone Ad-Hoc networks with long-range radiosYing Mao, Jiayin Wang, Bo Sheng, Fan Wu. 1-8 [doi]
- Towards Controller Placement for robust Software-Defined NetworksSheng Guo, Shu Yang, Qi Li, Yong Jiang. 1-8 [doi]
- Towards adaptive elastic distributed Software Defined NetworkingYanyu Chen, Qing Li, Yuan Yang, Qi Li, Yong Jiang, Xi Xiao. 1-8 [doi]
- Reducing the read latency of in-line deduplication file systemYongtao Zhou, Yuhui Deng, Yan Li, Junjie Xie. 1-2 [doi]
- Sensor placement based on Delaunay triangulation for complete confident information coverage in an area with obstaclesLu Dai, Bang Wang. 1-8 [doi]
- An ASIP based physical layer virtualization method of centralized radio access networkFang Xiao, Yiqing Zhou, Shan Huang, Jiangnan Lin, Lin Liu. 1-4 [doi]
- Virtual machine placement based on the VM performance models in cloudHui Zhao, Qinghua Zheng, Weizhan Zhang, Yuxuan Chen, Yunhui Huang. 1-8 [doi]
- Scalable name-based inter-domain routing for information-centric networksSangmun Kim, Zhenhai Duan, Fernando Sanchez. 1-8 [doi]
- How green are cloud patterns?S. Amirhossein Abtahizadeh, Foutse Khomh, Yann-Gaël Guéhéneuc. 1-8 [doi]
- A non-orthogonal waveform superposition scheme for high efficient and reliable communicationsYing Wang, Yongming Wang, Weihua Zhou. 1-2 [doi]
- Identify user variants based on user behavior on social mediaHaoran Xu, Yuqing Sun. 1-8 [doi]
- Dynamic flow consolidation for energy savings in green DCNsChao Zhu, Yu Xiao, Yong Cui, Zhenjie Yang, Shihan Xiao, Antti Ylä-Jääski. 1-8 [doi]
- Energy-efficient, Delay-aware packet scheduling in high-speed networksQun Yu, Taieb Znati, Wang Yang. 1-8 [doi]
- Efficient RSS measurement in wireless networks based on compressive sensingYanchao Zhao, Wenzhong Li, Jie Wu 0001, Sanglu Lu. 1-8 [doi]
- Performability analysis of a cloud systemXiwei Qiu, Peng Sun, Xun Guo, Yanping Xiang. 1-6 [doi]
- Comparative analysis of big data transfer protocols in an international high-speed networkSe-Young Yu, Nevil Brownlee, Aniket Mahanti. 1-9 [doi]
- PASSI: A Parallel, Reliable and Scalable Storage Software Infrastructure for active storage system and I/O environmentsHsing-bung Chen, Song Fu. 1-8 [doi]
- Mining friendships through spatial-temporal features in mobile social networksJianwei Niu, Danning Wang, Jie Lu. 1-8 [doi]
- Parallel and distributed normalization of security events for instant attack analysisDavid Jaeger, Andrey Sapegin, Martin Ussath, Feng Cheng 0002, Christoph Meinel. 1-8 [doi]
- Reducing inter-task interference delay by optimizing bank-to-core mappingJizan Zhang, Zhimin Gu, Mingquan Zhang. 1-8 [doi]
- ATLAS: An AdapTive faiLure-Aware Scheduler for HadoopMbarka Soualhia, Foutse Khomh, Sofiène Tahar. 1-8 [doi]
- P-CLS: A popularity-driven Caching Location and Searching scheme in Content Centric NetworkingYuemei Xu, Shuai Ma, Yang Li, Fu Chen, Song Ci. 1-8 [doi]
- A domestic Adaptable Infant Monitoring System using wireless sensor networksHong Zhou, Brad Goold. 1-2 [doi]
- On the coexistence of 802.11 and 802.15.4 networks with delay constraintsWei Zhang 0041, Mahima Agumbe Suresh, Yuhan Zhou, Raghavan S. Veera, Radu Stoleru. 1-8 [doi]
- On the channel capacity of MIMO-radar-based communicationsRenhui Xu, Laixian Peng, Wendong Zhao. 1-7 [doi]
- On balancing the energy consumption of routing protocols for opportunistic social networksChen Yang, Radu Stoleru. 1-9 [doi]
- OMO: Optimize MapReduce overlap with a good start (reduce) and a good finish (map)Jiayin Wang, Yi Yao, Ying Mao, Bo Sheng, Ningfang Mi. 1-8 [doi]
- Stochastic duty cycling for heterogenous energy harvesting networksJianhui Zhang, Mengmeng Wang, Zhi Li. 1-9 [doi]
- PATHA: Performance Analysis Tool for HPC ApplicationsWucherl Yoo, Michelle Koo, Yi Cao, Alex Sim, Peter Nugent, Kesheng Wu. 1-8 [doi]
- Charging your smartphones on public commuters via wireless energy transferWenzheng Xu, Weifa Liang, Su Hu, Xiaola Lin, Jian Peng. 1-8 [doi]
- A secure OFDM transmission scheme based on chaos mappingXiaozhong Zhang, Ying Wang, Juan Zeng, Yongming Wang. 1-6 [doi]
- Learning thresholds for PV change detection from operators' labelsDapeng Liu, Youjian Zhao, Kaixin Sui, Shiwen Cheng, Dan Pei, Chengbin Quan, Jiao Luo, Xiaowei Jing, Mei Feng. 1-9 [doi]
- Pirogue, a lighter dynamic version of the Raft distributed consensus algorithmJehan-François Pâris, Darrell D. E. Long. 1-8 [doi]
- Network Performance Isolation Scheme for QoE in a mobile deviceWoonghee Lee, Hyunsoon Kim, Joon Yeop Lee, Albert Yongjoon Chung, Yong-Seok Park, Hwangnam Kim. 1-8 [doi]
- On secure shared key establishment for mobile devices using contextual informationAla Altaweel, Radu Stoleru, Subhajit Mandal. 1-10 [doi]
- SpeedStream: A real-time stream data processing platform in the cloudLi Zhao, Zhang Chuang, Xu Ke-fu. 1-10 [doi]
- Minimizing energy cost for green cloud data centers by using ESDsChonglin Gu, Lingmin Zhang, Zhixiang He, Hejiao Huang, Xiaohua Jia. 1-2 [doi]
- Resilient and efficient communication in many-core systems using network codingSadia Moriam, Yexin Yan, Erik Fischer, Elke Franz, Gerhard P. Fettweis. 1-8 [doi]
- Ultra-lightweight deep packet anomaly detection for Internet of Things devicesDouglas H. Summerville, Kenneth M. Zach, Yu Chen. 1-8 [doi]
- ScalaSEM: Scalable validation of SDN design with deployable codeNan Zhu, Wenbo He. 1-8 [doi]
- Pricing and revenue sharing in secondary market of mobile internet accessHengky Susanto, Benyuan Liu, Byung-Guk Kim, Honggang Zhang, Xinwen Fu. 1-8 [doi]
- On stochastic optimal bidding strategy for microgridsQingyu Yang, Dou An, Wei Yu, Xinyu Yang, Xinwen Fu. 1-8 [doi]
- Replication attack detection with monitor nodes in clustered wireless sensor networksGuo Cheng, Songtao Guo, Yuanyuan Yang, Fei Wang. 1-8 [doi]