Abstract is missing.
- CODA: Achieving Multipath Data Transmission in NDNDongbiao He, Jinlei Jiang, Guangwen Yang, Cédric Westphal. 1-8 [doi]
- Discover and Secure (DaS): An Automated Virtual Machine Security Management FrameworkBeaulah A. Navamani, Chuan Yue, Xiaobo Zhou. 1-6 [doi]
- A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value DecompositionShuyi Zhang, Shiran Pan, Wei Wang, Qiongxiao Wang. 1-8 [doi]
- Efficient Allocation and Heterogeneous Composition of NVM Crossbar Arrays for Deep Learning AccelerationHao Yan, Armin Haj Aboutalebi, Lide Duan. 1-8 [doi]
- When Group Buying Meets Wi-Fi AdvertisingYang Liu, Ying Zhang, Jianfeng Guan, Changqiao Xu, Yu Wang. 1-8 [doi]
- HCache: A Hybrid Caching Strategy in Information-Centric NetworkingHaibo Wu, Jun Li, Jiang Zhi, Yongmao Ren, Lingling Li. 1-2 [doi]
- Imaging Subsurface Civil Infrastructure with Smart Seismic NetworkMaria Valero, Fangyu Li, Wen-Zhan Song, Xiangyang Li. 1-8 [doi]
- Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility PredictionWenjie Yang, Guodong Sun, Xingjian Ding, Xiaoyue Zhang. 1-10 [doi]
- Crail-KV: A High-Performance Distributed Key-Value Store Leveraging Native KV-SSDs over NVMe-oFTim Bisson, Ke Chen, Changho Choi, Vijay Balakrishnan, Yang-Suk Kee. 1-8 [doi]
- iPand: Accurate Gesture Input with Ambient Acoustic Sensing on HandShumin Cao, Xin He, Peide Zhu, Mingshi Chen, Xiangyang Li, Panlong Yang. 1-8 [doi]
- 3D-PIM NoCs with Multiple Subnetworks: A Performance and Power EvaluationAbdel-Hameed A. Badawy, Jesus Gardea, Yuho Jin, Jonathan Cook. 1-8 [doi]
- 2-Dominant Resource Fairness: Fairness-Efficiency Tradeoffs in Multi-resource AllocationSuhan Jiang, Jie Wu. 1-8 [doi]
- Towards Optimized Online Task Allocation in Cost-Sensitive Crowdsensing ApplicationsYang Zhang, Daniel Zhang, Qi Li, Dong Wang. 1-8 [doi]
- Vehicle Delay-tolerant Network Routing Algorithm based on Multi-period Bayesian NetworkHongyu Zhou, Jiagao Wu, Lu Shen, Linfeng Liu. 1-8 [doi]
- Where You Really Are: User Trip Based City Functional Zone AscertainmentJiayu Gan, Jianhui Zhang, Siwen Zheng. 1-8 [doi]
- Cost Effective test-bed for Comparison of SDN Network and Traditional NetworkAdriana Collaguazo Jaramillo, Ronny Alcivar, Joffre Pesantez, Ronald Ponguillo. 1-2 [doi]
- Choosing the Best Server for a Data Center: The Importance of Workload WeightingSulav Malla, Ken Christensen. 1-8 [doi]
- Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network CodingPouya Ostovari, Jie Wu, Alireza Jolfaei. 1-8 [doi]
- Socialite: Social Activity Mining and Friend Auto-labelingGuangjing Wang, Lan Zhang, Zhi Yang, Xiang-Yang Li. 1-8 [doi]
- The Frame Latency of Personalized Livestreaming Can Be Significantly Slowed Down by WiFiGuoshun Nan, Xiuquan Qiao, Jiting Wang, Zeyan Li, Jiahao Bu, Changhua Pei, Mengyu Zhou, Dan Pei. 1-8 [doi]
- A Cost-effective and Energy-efficient Architecture for Die-stacked DRAM/NVM Memory SystemsYuhua Guo, Weijun Xiao, Qing Liu 0002, Xubin He. 1-2 [doi]
- Intelligent Optimization-Based Energy-Efficient Networking in Cloud Services for Multimedia Big DataDingde Jiang, Yihang Zhang, Houbing Song, Wenjuan Wang. 1-6 [doi]
- Quality-Aware Task Assignment in Opportunistic Network-Based CrowdsourcingShohei Karaguchi, Kazuya Sakai, Satoshi Fukumoto. 1-7 [doi]
- Cloud Resource Provisioning for Combined Stream and Batch WorkflowsRaed Alsurdeh, Rodrigo N. Calheiros, Kenan M. Matawie, Bahman Javadi. 1-8 [doi]
- A More Scalable Scheduling Algorithm for FPGA-based Time-Triggered NetworkYulong Zhan, Jihong Zhu. 1-2 [doi]
- FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service ArchitectureWeilan Lin, Meng Ma, Disheng Pan, Ping Wang. 1-8 [doi]
- URefFlow: A Unified Android Malware Detection Model Based on Reflective CallsChao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, Weiqing Huang. 1-7 [doi]
- Fountain Code Enabled ADS-B for Aviation Security and Safety EnhancementJian Wang, Yongxin Liu, Alfaidi Amal, Houbing Song, Richard S. Stansbury, Jiawei Yuan, Tianyu Yang. 1-7 [doi]
- Real-time Distributed-Random-Forest-Based Network Intrusion Detection System Using Apache SparkHao Zhang, Shumin Dai, Yongdan Li, Wenjun Zhang. 1-7 [doi]
- QoS-Aware Matching of Edge Computing Services to Internet of ThingsNafiseh Sharghivand, Farnaz Derakhshan, Lena Mashayekhy. 1-8 [doi]
- How to Set Timeout: Achieving Adaptive Load Balance in Asymmetric Topology Based on Flowlet SwitchingZhiqiang Guo, Xiaodong Dong, Sheng Chen, Xiaobo Zhou 0003, Keqiu Li. 1-6 [doi]
- Forwarding and Optical Indices in an All-Optical BCube NetworksSuzhen Wang, Jingjing Luo, Yuan-Hsun Lo, Wing Shing Wong. 1-8 [doi]
- Learning-based Cooperative Sound Event Detection with Edge ComputingJingrong Wang, Kaiyang Liu, George Tzanetakis, Jianping Pan 0001. 1-8 [doi]
- A graph neural network based efficient firmware information extraction method for IoT devicesWeidong Zhang, Hong Li, Hui-Wen, Hongsong Zhu, Limin Sun. 1-8 [doi]
- Web Tracking Cartography with DNS RecordsJingxiu Su, Zhenyu Li 0001, Stéphane Grumbach, Muhammad Ikram, Kavé Salamatian, Gaogang Xie. 1-8 [doi]
- Oceanic Data Processing System Based on Multi-sensor Interaction through Internet of ThingsJiachen Yang, Qiming Zhao, Chang Wang, Bin Jiang 0003, Tianyuan Zhang, Houbing Song. 1-8 [doi]
- An Effective Scheme to Utilize Caches for Streaming Services in Mobile CCNGo Nakagawa, Yusuke Ito, Yurino Sato, Hiroyuki Koga. 1-2 [doi]
- GD-FTL: Improving the Performance and Lifetime of TLC SSD by Downgrading Worn-out BlocksTianming Yang, Haitao Wu, Wei Sun. 1-8 [doi]
- A Road-Aware Spatial Mapping for Moving ObjectsXingsheng Zhao, Jingwen Shi, Mingzhe Du, Fan Ni, Song Jiang, Yang Wang. 1-8 [doi]
- Decouple and Stretch: A Boost to Channel PruningZhen Chen, Jianxin Lin, Sen Liu, Jun Xia, Weiping Li. 1-6 [doi]
- Centralized In-network Caching for Information Centric Networking with Decoupling Data and Control PlanesSen Wang, Biao Zhang. 1-2 [doi]
- Adaptive Video Encoding and Dynamic Channel Access for Real-time Streaming over SDRsDebashri Roy, Tathagata Mukherjee, Mainak Chatterjee, Eduardo L. Pasiliao. 1-9 [doi]
- Integrated Bandwidth Variation Pattern Differentiation for HTTP Adaptive Streaming over 4G Cellular NetworksHaipeng Du, Weizhan Zhang, Xuanyu Wang, Qinghua Zheng. 1-9 [doi]
- An Optimal LTE-U Access Method for Throughput Maximization and Fairness AssuranceQian Wang, Zhipeng Gao, Xiaojiang Du, Liehuang Zhu. 1-8 [doi]
- GAC: Gain-Aware 2-Round Cooperative Caching Approach in Information-Centric NetworkingJiang Zhi, Jun Li, Haibo Wu, Yongmao Ren. 1-8 [doi]
- A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State TransitionJunjiao Liu, Libo Yin, Yan Hu, Shichao Lv, Limin Sun. 1-8 [doi]
- Utility-based Allocation of Industrial IoT Applications in Mobile Edge CloudsAmardeep Mehta, Ewnetu Bayuh Lakew, Johan Tordsson, Erik Elmroth. 1-10 [doi]
- A Cache Based DoS Attack on Real Information Centric Networking SystemFaustina J. Anto Morais, Swapnoneel Roy, Sanjay P. Ahuja. 1-7 [doi]
- OC-Cache: An Open-channel SSD Based Cache for Multi-Tenant SystemsHaitao Wang, Zhanhuai Li, Xiao Zhang, Xiaonan Zhao, Xingsheng Zhao, Weijun Li, Song Jiang. 1-6 [doi]
- Binoclt: A New Binomial Classification Scheme for Long-Text Mining in Online Social NetworkQuanquan Chu, Shiyu Liu, Xiaofeng Gao, Fan Wu, Guihai Chen, Qianni Deng. 1-8 [doi]
- Reversible Programming Techniques for Shortest-Path AlgorithmsLanying Guo, Chao Peng, Siyuan Chen, Cheng He. 1-2 [doi]
- DeepSDN: Connecting the Dots Towards Self-driving NetworksKuldip Singh Atwal, Mostafa A. Bassiouni. 1-8 [doi]
- On the Use of Q-Learning to Solve the Selectable Virtual Network Embedding ProblemSen Wang, Biao Zhang. 1-2 [doi]
- Participant Grouping for Privacy Preservation in Mobile Crowdsensing over Hierarchical Edge CloudsTing Li, Zhijin Qiu, Lijuan Cao, Hanshang Li, Zhongwen Guo, Fan Li, Xinghua Shi, Yu Wang 0003. 1-8 [doi]
- Reliability and Performance Analysis of a Data Center's Network ArchitectureWalid Mokhtar Bennaceur, Leïla Kloul. 1-8 [doi]
- Network Embedding based on External Word VectorsXiaokun Zhang, Yan Liu, Jing Chen. 1-2 [doi]
- Friendly-Jamming-Aware Routing Protocols for Tactical NetworksJonghyun Kim, Stephan Bohacek, Pratik K. Biswas, Siamak Samoohi, Sharon J. Mackey, Mitesh P. Patel. 1-6 [doi]
- CoDE: Fast Name Lookup and Update using Conflict-driven EncodingTong Shen, Xin-Yi Zhang, Gaogang Xie, Yuanmei Meng, Dafang Zhang. 1-8 [doi]
- A Case-Based Decision System for Routing in Packet-Switched NetworksZirui Zhuang, Jingyu Wang, Qi Qi, Haifeng Sun, Jianxin Liao. 1-2 [doi]
- AutoRARE: An Automated Tool For Generating FPGA-Based Multi-Memory Hardware Accelerators For Compute-Intensive ApplicationsShrikant S. Jadhav, Clay Gloster, Christopher Doss, Youngsoo Kim, Jannatun Naher. 1-8 [doi]
- A New Game Theoretic Scheme for Verifiable Cloud ComputingPinglan Liu, Wensheng Zhang. 1-8 [doi]
- Implementing Correct and Efficient Collision Avoidance in Multi-Hop Ad-Hoc NetworksJ. J. Garcia-Luna-Aceves. 1-10 [doi]
- Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT DevicesGhanshyam Bhutra, Amar Rasheed, Rabi N. Mahapatra. 1-7 [doi]
- Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case StudyRixin Xu, Qiang Zeng 0001, Liehuang Zhu, Haotian Chi, Xiaojiang Du. 1-8 [doi]
- Location-leaking through Network Traffic in Mobile Augmented Reality ApplicationsGabriel Meyer-Lee, Jiacheng Shang, Jie Wu 0001. 1-8 [doi]
- Fully Dynamic Broadcasting under SINRDongxiao Yu, Longlong Lin, Yong Zhang, Jiguo Yu, Yifei Zou, Qiang-Sheng Hua, Xiuzhen Cheng. 1-8 [doi]
- On the Impact of Sweep Radius and Energy Limitation on Sweep Coverage in Wireless Sensor NetworksBaihong Chen, Hongwei Du, Chuang Liu 0007, Qiang Ye. 1-7 [doi]
- HyperProtect: Enhancing the Performance of a Dynamic Backup System Using Intelligent SchedulingYaobin Qin, Brandon Hoffmann, David J. Lilja. 1-8 [doi]
- A Deep Learning Based Framework for Cloud Masquerade Attack DetectionShuting Xu, Shuhua Lai, Yongjian Li. 1-2 [doi]
- Dynamic Reservation and Deep Reinforcement Learning based Autonomous Resource Management for wireless Virtual NetworksGuolin Sun, Gebrekidan Tesfay Zemuy, Kun Xiong. 1-4 [doi]
- Classifying User Activities in the Encrypted WeChat TrafficChengshang Hou, Junzheng Shi, Cuicui Kang, Zigang Cao, Xiong Gang. 1-8 [doi]
- EasyOrchestrator: A NFV-based Network Service Creation Platform for End-usersYi Yue, Bo Cheng 0001. 1-2 [doi]
- BFRP: Endpoint Congestion Avoidance Through Bilateral Flow ReservationTianye Yang, Dezun Dong, Cunlu Li, Liquan Xiao. 1-8 [doi]
- A Novel Method to Generate Frequent Itemsets in Distributed EnvironmentJingyi Zheng, Xiaoheng Deng, Honggang Zhang. 1-8 [doi]
- Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational AutoencoderZeyan Li, Wenxiao Chen, Dan Pei. 1-9 [doi]
- ThinDedup: An I/O Deduplication Scheme that Minimizes Efficiency Loss due to Metadata WritesFan Ni, Xingbo Wu, Weijun Li, Song Jiang. 1-8 [doi]
- Towards Incentive Mechanism for Taxi Services Allocation with Privacy GuaranteeDonghe Li, Qingyu Yang, Wei Yu 0002, Dou An, Xinwen Fu. 1-8 [doi]
- Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI StreamsJiahao Bu, Ying Liu, Shenglin Zhang, Weibin Meng, Qitong Liu, Xiaotian Zhu, Dan Pei. 1-8 [doi]
- UAV-enabled Data Gathering in Wireless Sensor NetworksIonut Cardei, Mihaela Cardei, Rafael Papa. 1-8 [doi]
- Performance and Stability of Application Placement in Mobile Edge Computing SystemZhi Cao, Honggang Zhang, Benyuan Liu. 1-8 [doi]
- S5: An Application Sensitive QoS Assurance System via SDNLei Wang, Qing Li, Lu Liu, Yong Jiang, Mingwei Xu, Jianping Wu. 1-8 [doi]
- U-PoT: A Honeypot Framework for UPnP-Based IoT DevicesMuhammad A. Hakim, Hidayet Aksu, A. Selcuk Uluagac, Kemal Akkaya. 1-8 [doi]
- Privacy Preserving Online Social Networks using Enhanced Equicardinal ClusteringMadhuri Siddula, Zhipeng Cai, Dongjing Miao. 1-8 [doi]
- Software Rejuvenation in Computer Systems: An Automatic Forecasting Approach Based on Time SeriesPaulo Pereira, Jean Araujo, Rubens de S. Matos, Nuno Preguica, Paulo Maciel. 1-8 [doi]
- Peer Data Caching Algorithms in Large-Scale High-Mobility Pervasive Edge Computing EnvironmentsYaodong Huang, Fan Ye 0003, Yuanyuan Yang. 1-8 [doi]
- Availability-Aware Container Scheduler for Application Services in CloudYanal Alahmad, Tariq Daradkeh, Anjali Agarwal. 1-6 [doi]
- An Efficient Latch-free Database Index Based on Multi-dimensional ListsKenneth Lamar, Ramin Izadpanah, Jim M. Brandt, Damian Dechev. 1-2 [doi]
- A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing SystemZhi Cao, Honggang Zhang, Benyuan Liu, Bo Sheng. 1-8 [doi]
- Stride: Distributed Video Transcoding in SparkSajad Sameti, Mea Wang, Diwakar Krishnamurthy. 1-8 [doi]