Abstract is missing.
- Auto-identification of background traffic based on autonomous periodic interactionChang Liu, Lingwu Zeng, Junzheng Shi, Fei Xu, Gang Xiong, Siu-Ming Yiu. 1-8 [doi]
- An update-overhead-aware caching policy for write-optimized file systems on SMR disksShuo-Han Chen, Wei-Shin Li, Min-Hong Shen, Yi-Han Lien, Tseng-Yi Chen, Tsan-sheng Hsu, Hsin-Wen Wei, Wei Kuan Shih. 1-2 [doi]
- Anonymous and analysable web browsingTran Phuong Thao, Adetokunbo Makanju, Ayumu Kubota. 1-8 [doi]
- Approach to detect non-adversarial overlapping collusion in crowdsourcingGeorges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla. 1-8 [doi]
- Response time speedup of multi-tier internet systemsFatih Berber, Ramin Yahyapour. 1-9 [doi]
- Laro: Lazy repartitioning for graph workloads on heterogeneous clustersFeng Sheng, Qiang Cao, Haoran Cai, Jie Yao, Changsheng Xie. 1-8 [doi]
- Message content control for distributed map sharing in vehicle safety communicationsS. M. Osman Gani, Yaser P. Fallah, Gaurav Bansal, Takayuki Shimizu. 1-7 [doi]
- Avoiding interference from hidden terminals with carrier tonesJ. J. Garcia-Luna-Aceves. 1-8 [doi]
- Does the content defined chunking really solve the local boundary shift problem?Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao. 1-8 [doi]
- START: Sensible traffic scheduling in dynamic data center networksZiyan Song, Ting Zhang, Qing Li 0006, Guang Yang, Yong Jiang. 1-8 [doi]
- Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networksHaizhou Bao, Qin Liu, Chuanhe Huang, Xiaohua Jia. 1-7 [doi]
- Reducing idle listening time in 802.11 via NDNFan Wu, Wang Yang, Qingshan Guo, Xinfang Xie. 1-2 [doi]
- A truthful auction mechanism for resource provisioning in mobile crowdsensingZhenyu Ju, Chuanhe Huang, Yanjiao Chen, Lin Ma. 1-8 [doi]
- Profit maximization resource allocation in cloud computing with performance guaranteeMeixuan Li, Yu-e Sun, He Huang 0001, Jing Yuan, Yang Du, Yu Bao, Yonglong Luo. 1-2 [doi]
- Mitigate data skew caused stragglers through ImKP partition in MapReduceXue Ouyang, Huan Zhou, Stephen Clement, Paul Townend, Jie Xu. 1-8 [doi]
- Robust and lightweight fault localizationBo Wu, Ke Xu, Qi Li, Fan Yang. 1-8 [doi]
- QoE-aware optimization for SVC-based adaptive streaming in D2D communicationsLuoyao Hao, Chengming Jin, Xiaofeng Gao, Linghe Kong, Fan Wu, Guihai Chen. 1-8 [doi]
- H-NVMe: A hybrid framework of NVMe-based storage system in cloud computing environmentZhengyu Yang, Morteza Hoseinzadeh, Ping Wong, John Artoux, Clay Mayers, David Thomas Evans, Rory Thomas Bolt, Janki Bhimani, Ningfang Mi, Steven Swanson. 1-8 [doi]
- Time-based persistence in channel-access protocols with carrier sensingJ. J. Garcia-Luna-Aceves, Spencer Thompson, Joshua Stern. 1-8 [doi]
- Two-level decomposition for multi-commodity multicast traffic engineeringJianwei Zhang, Xinchang Zhang, Meng Sun. 1-2 [doi]
- When QUIC meets TCP: An experimental studyYajun Yu, Mingwei Xu, Yuan Yang. 1-8 [doi]
- Modeling for performance and security balanced trading communication systems in the cloudAklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, William J. Caelli. 1-7 [doi]
- Revisiting inter-AS IP spoofing let the protection drive source address validationYiHao Jia, Ying Liu, Gang Ren, Lin He. 1-10 [doi]
- Bandwidth preemption for data transfer request with higher priorityLiudong Zuo. 1-2 [doi]
- Resource optimization for survivable embedding of virtual clusters in cloud data centersBiyu Zhou, Jie Wu, Fa Zhang, Zhiyong Liu. 1-8 [doi]
- Scalability comparison of SDN control plane architectures based on simulationsHemin Yang, Jared S. Ivey, George F. Riley. 1-8 [doi]
- Secure the internet of things with challenge response authentication in fog computingSalem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Subaschandrabose, Zilong Ye. 1-2 [doi]
- Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategyXin Liang, Xiaolin Gui, A. N. Jian, Dewang Ren. 1-8 [doi]
- Metrie learning with statistical features for network traffic classificationZiqing Zhang, Cuicui Kang, Peipei Fu, Zigang Cao, Zhen Li, Gang Xiong. 1-7 [doi]
- Towards scalable and adaptable security monitoringChristof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva. 1-6 [doi]
- Enhancing SSDs with multi-stream: What? why? how?Janki Bhimani, Jingpei Yang, Zhengyu Yang, Ningfang Mi, N. H. V. Krishna Giri, Rajinikanth Pandurangan, Changho Choi, Vijay Balakrishnan. 1-2 [doi]
- Resource consumption analysis of online activity recognition on mobile phones and smartwatchesMuhammad Shoaib, Özlem Durmaz Incel, Hans Scholten, Paul J. M. Havinga. 1-6 [doi]
- The VLSI architecture of a highly efficient configurable pre-processor for MIMO detectionsTzu-Ting Tseng, Chung-An Shen. 1-5 [doi]
- A hierarchical-learning-based crowdedness estimation mechanism for crowdsensing busesXiaoguang Niu, Zhen Wang, Qiongzan Ye, Yihao Zhang, Jiawei Wang. 1-8 [doi]
- Cookie-based amplification repression protocolJing Zheng, Jianhua Sun, Kun Sun, Bo Wu 0002, Qi Li. 1-8 [doi]
- Unsupervised machine learning in 5G networks for low latency communicationsEren Balevi, Richard D. Gitlin. 1-2 [doi]
- Motif: A social reading platform that helps people filter, memorize, and organize online contentsYu Tian, Xin Ye. 1-4 [doi]
- Integrated recovery and task allocation for stream processingHongliang Li, Jie Wu, Zhen Jiang, Xiang Li, Xiaohui Wei, Yuan Zhuang. 1-8 [doi]
- Joint source selection and transfer optimization for erasure coding storage systemHan Zhang, Xingang Shi, Yingya Guo, Haijun Geng, Zhiliang Wang, Xia Yin. 1-8 [doi]
- Identifying malware with HTTP content type inconsistency via header-payload comparisonFei Xu, Haiqing Pan, Zigang Cao, Zhen Li, Gang Xiong, Yangyang Guan, Siu-Ming Yiu. 1-7 [doi]
- Scheduling loop-free updates for multiple policies with overlaps in software-defined networksJinping Yu, Xinxin Fan, Guoqiang Zhang, Jingping Bi. 1-8 [doi]
- Analyzing and optimizing BGP stability in future space-based internetZengyin Yang, Hewu Li, Qian Wu, Jianping Wu. 1-8 [doi]
- iSense: Energy-aware crowd-sensing frameworkMohamed Abdelaal, Mohammad Qaid, Frank Dürr, Kurt Rothermel. 1-9 [doi]
- Elastic scaling of virtual clusters in cloud data center networksShuaibing Lu, Zhiyi Fang, Jie Wu, Guannan Qu. 1-8 [doi]
- Robust passive static human detection with commodity WiFi devicesHai Zhu, Fu Xiao, Lijuan Sun, Xiaohui Xie, Ruchuan Wang. 1-8 [doi]
- On minimizing the maximum sensor movement to construct a horizontal barrierXiaoyun Zhang, Daji Qiao. 1-8 [doi]
- Link-based fine granularity flow migration in SDNs to reduce packet lossYang Chen, Jie Wu. 1-8 [doi]
- Towards a holistic and optimized framework for smart grid regulationJunjie Wang, Jinyang Li, Tianshu Pang, Xiaoshan Sun, Qi Liu, Hengchang Liu. 1-8 [doi]
- Preserving privacy in distributed system (PPDS) protocol: Security analysisAshref Aloui, Mounira Msahli, Talel Abdessalem, Stéphane Bressan, Sihem Mesnager. 1-7 [doi]
- IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwaresYu Chen, Hong Li, Weiwei Zhao, Lin Zhang, Zhongjin Liu, Zhiqiang Shi. 1-8 [doi]
- A privacy-preserving combinatorial auction mechanism for spectrum redistributionFudong Qiu, Fan Wu, Xiaofeng Gao, Guihai Chen. 1-8 [doi]
- Using entanglements to increase the reliability of two-dimensional square RAID arraysJehan-François Pâris, Vero Estrada-Galiñanes, Ahmed Amer, Carlos Rincon. 1-8 [doi]
- Spatio-temporal event detection and reporting in mobile-sink wireless sensors networksCatalina Aranzazu Suescun, Mihaela Cardei. 1-8 [doi]
- A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgridsDonghe Li, Qingyu Yang, Wei Yu, Dou An, Xinyu Yang, Wei Zhao. 1-8 [doi]
- Balancing interdependent networks: Theory and algorithmZheng Liu, Qing Li, Dan Wang, Mingwei Xu. 1-2 [doi]
- Towards location-aware joint job and data assignment in cloud data centers with NVMXin Li, Jie Wu, Zhuzhong Qian, ShaoJie Tang, Sanglu Lu. 1-8 [doi]
- Performance enhancement of a computational persistent homology packageAlan Hylton, Janche Sang, Greg Henselman-Petrusek, Robert Short. 1-8 [doi]
- DRAPS: Dynamic and resource-aware placement scheme for docker containers in a heterogeneous clusterYing Mao, Jenna Oak, Anthony Pompili, Daniel Beer, Tao Han, Peizhao Hu. 1-8 [doi]
- Can MPTCP increase system efficiency and fairness in 802.11 multirate WLAN environment?Zhuo Jiang, Qian Wu, Hewu Li, Jianping Wu. 1-7 [doi]
- AutoTiering: Automatic data placement manager in multi-tier all-flash datacenterZhengyu Yang, Morteza Hoseinzadeh, Allen Andrews, Clay Mayers, David Thomas Evans, Rory Thomas Bolt, Janki Bhimani, Ningfang Mi, Steven Swanson. 1-8 [doi]
- Fault-tolerant 3D mesh for network-on-chipKhaleda Akhter Papry, A. B. M. Alim Al Islam. 1-2 [doi]
- An energy-aware collaborative multi-agent system for autonomous underwater vehiclesLuis Felipe Zapata Rivera, Catalina Aranzazu Suescun, Imadeldin Mahgoub. 1-8 [doi]
- Fault tolerant mechanism design for time coverage in crowdsensing systemYangsu Liu, Zhenzhe Zheng, Fan Wu, Xiaofeng Gao, Guihai Chen. 1-8 [doi]
- Cyber-physical system enabled nearby traffic flow modelling for autonomous vehiclesBaiyu Chen, Zhengyu Yang, Siyu Huang, Xianzhi Du, Zhiwei Cui, Janki Bhimani, Xin Xie, Ningfang Mi. 1-6 [doi]
- Towards cost-effective and budget-balanced task allocation in crowdsourcing systemsLuoyao Hao, Chengming Jin, Xiaofeng Gao, Fan Wu, Guihai Chen. 1-8 [doi]
- Probabilistic Monte Carlo simulations for static branch predictionBhargava Kalla, Nandakishore Santhi, Abdel-Hameed A. Badawy, Gopinath Chennupati, Stephan Eidenbenz. 1-4 [doi]
- Optimizing locality in graph computations using reuse distance profilesAbdel-Hameed A. Badawy, Donald Yeung. 1-8 [doi]
- Towards truthful auction for big data tradingDou An, Qingyu Yang, Wei Yu 0002, Donghe Li, Yang Zhang, Wei Zhao. 1-7 [doi]
- Secure processing-aware media storage (SPMS)Jannatun Noor, Hasan Ibna Akbar, Ruhul Amin Sujon, A. B. M. Alim Al Islam. 1-8 [doi]
- A DAX-enabled mmap mechanism for log-structured in-memory file systemsZhixiang Mao, Shengan Zheng, Linpeng Huang, Yanyan Shen. 1-8 [doi]
- Popularity-based neighborhood collaborative caching for information-centric networksXiaodong Zhu, Jinlin Wang, Lingfang Wang, Weining Qi. 1-8 [doi]
- Biomedical signal transmission using human body communicationFukuro Koshiji, Ryogo Urushidate, Kohji Koshiji. 1-2 [doi]
- Many-objective performance enhancement in computing clustersA. S. M. Rizvi, Tarik Reza Toha, Siddhartha Shankar Das, Sriram Chellappan, A. B. M. Alim Al Islam. 1-2 [doi]
- An efficient and secure scheme for smart home communication using identity-based signcryptionYosef Ashibani, Qusay H. Mahmoud. 1-7 [doi]
- Efficient tamper-evident logging of distributed systems via concurrent authenticated treeFangxiao Ning, Yu Wen, Gang Shi, Dan Meng. 1-9 [doi]
- TCP WISE: One initial congestion window is not enoughXiaohui Nie, Youjian Zhao, Guo Chen, Kaixin Sui, Yazheng Chen, Dan Pei, Miao Zhang, Jiyang Zhang. 1-8 [doi]
- Improving 3D lattice boltzmann method stencil with asynchronous transfers on many-core processorsMinh Quan Ho, Christian Obrecht, Bernard Tourancheau, Benoît Dupont de Dinechin, Julien Hascoet. 1-9 [doi]