


default search action
33rd INFOCOM 2014: Toronto, Canada
- 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014. IEEE 2014, ISBN 978-14799-3360-0

CC1: Cloud Computing 1
- Long Gong, Yonggang Wen, Zuqing Zhu, Tony Lee:

Toward profit-seeking virtual network embedding algorithm via global resource capacity. 1-9 - Fang Hao, Murali S. Kodialam, T. V. Lakshman, Sarit Mukherjee:

Online allocation of virtual machines in a distributed cloud. 10-18 - Yang Peng, Kai Chen

, Guohui Wang, Wei Bai
, Zhiqiang Ma, Lin Gu:
HadoopWatch: A first step towards comprehensive traffic forecasting in cloud computing. 19-27 - Lei Jiao

, Jun Li, Wei Du, Xiaoming Fu
:
Multi-objective data placement for multi-cloud socially aware services. 28-36
LO1: Localization 1
- Edmund Novak

, Qun Li
:
Near-pri: Private, proximity based location sharing. 37-45 - Yang Yang, Miao Jin, Hongyi Wu:

3D surface localization with terrain model. 46-54 - Yang Tian, Ruipeng Gao, Kaigui Bian, Fan Ye, Tao Wang, Yizhou Wang, Xiaoming Li:

Towards ubiquitous indoor localization service leveraging environmental physical features. 55-63 - Jun Liu, Zhaohui Wang, Zheng Peng

, Jun-Hong Cui, Lance Fiondella:
Suave: Swarm underwater autonomous vehicle localization. 64-72
MN1: Multimedia networking 1
- Hao Cui, Chong Luo, Chang Wen Chen

, Feng Wu:
Robust uncoded video transmission over wireless fast fading channel. 73-81 - Vinay Joseph

, Gustavo de Veciana:
NOVA: QoE-driven optimization of DASH-based video delivery in networks. 82-90 - Zhi Wang, Lifeng Sun, Chuan Wu

, Wenwu Zhu, Shiqiang Yang:
Joint online transcoding and geo-distributed delivery for dynamic adaptive streaming. 91-99 - Randeep Bhatia, T. V. Lakshman, Arun N. Netravali, Krishan K. Sabnani:

Improving mobile video streaming with link aware scheduling and client caches. 100-108
NE1: Network economics and pricing 1
- Dejun Yang

, Xiang Zhang, Guoliang Xue:
PROMISE: A framework for truthful and profit maximizing spectrum double auctions. 109-117 - Jian Zhao, Hongxing Li, Chuan Wu

, Zongpeng Li, Zhizhong Zhang, Francis C. M. Lau:
Dynamic pricing and profit maximization for the cloud with geo-distributed data centers. 118-126 - Tie Luo

, Hwee-Pink Tan
, Lirong Xia
:
Profit-maximizing incentive for participatory sensing. 127-135 - Xukai Zou, Huian Li, Yan Sui, Wei Peng, Feng Li:

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties. 136-144
RF1: RFID 1
- Lei Xie, Hao Han, Qun Li

, Jie Wu, Sanglu Lu:
Efficiently collecting histograms over RFID tags. 145-153 - Linghe Kong

, Liang He, Yu Gu, Min-You Wu, Tian He:
A Parallel Identification Protocol for RFID systems. 154-162 - Jia Liu, Bin Xiao

, Kai Bu, Lijun Chen:
Efficient distributed query processing in large RFID-enabled supply chains. 163-171 - Min Chen, Shigang Chen, Qingjun Xiao:

Pandaka: A lightweight cipher for RFID systems. 172-180
RS: Router and switch design
- Giuseppe Rossini, Dario Rossi, Michele Garetto

, Emilio Leonardi
:
Multi-Terabyte and multi-Gbps information centric routers. 181-189 - Tian Pan

, Ting Zhang, Junxiao Shi
, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Beichuan Zhang, Bin Liu:
Towards zero-time wakeup of line cards in power-aware routers. 190-198 - Stefano Vissicchio, Laurent Vanbever, Luca Cittadini, Geoffrey G. Xie, Olivier Bonaventure:

Safe routing reconfigurations with route redistribution. 199-207 - Shu Yang, Mingwei Xu, Dan Wang

, Gautier Bayzelon, Jianping Wu:
Scalable forwarding tables for supporting flexible policies in enterprise networks. 208-216
SP1: Security and privacy 1
- Qingsi Wang, Mingyan Liu:

Learning in hide-and-seek. 217-225 - Wenhai Sun

, Shucheng Yu
, Wenjing Lou, Y. Thomas Hou
, Hui Li:
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. 226-234 - Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui:

Will cyber-insurance improve network security? A market analysis. 235-243 - Jun Shao

, Rongxing Lu, Xiaodong Lin:
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. 244-252
WN1: Wireless networks 1
- Xiufeng Xie, Xinyu Zhang:

Does full-duplex double the capacity of wireless networks? 253-261 - Yang Yang, Bo Chen, Kannan Srinivasan, Ness B. Shroff:

Characterizing the achievable throughput in wireless networks with two active RF chains. 262-270 - Chunmei Han, Kaishun Wu

, Yuxi Wang, Lionel M. Ni:
WiFall: Device-free fall detection by wireless networks. 271-279 - Hyeryung Jang, Se-Young Yun, Jinwoo Shin, Yung Yi:

Distributed learning for utility maximization over CSMA-based wireless multihop networks. 280-288
CC2: Cloud Computing 2
- Qi Zhang, Mohamed Faten Zhani

, Maissa Jabri, Raouf Boutaba:
Venice: Reliable virtual data center embedding in clouds. 289-297 - Yuhong Zhao, Hong Jiang, Ke Zhou, Zhijie Huang

, Ping Huang:
Meeting service level agreement cost-effectively for video-on-demand applications in the cloud. 298-306 - Jian Li, Tongtong Li, Jian Ren:

Beyond the MDS bound in distributed cloud storage. 307-315 - Jun Li

, Baochun Li:
Cooperative repair with minimum-storage regenerating codes for distributed storage. 316-324
FC: Flow and congestion control
- Reza Banirazi, Edmond A. Jonckheere, Bhaskar Krishnamachari:

Heat-Diffusion: Pareto optimal dynamic routing for time-varying wireless networks. 325-333 - Peng-Jun Wan, Zhu Wang, Lei Wang, Zhiguo Wan, Sai Ji:

From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks. 334-342 - Georgios S. Paschos, Chih-Ping Li, Eytan H. Modiano, Kostas Choumas

, Thanasis Korakis:
Multirate multicast: Optimal algorithms and implementation. 343-351 - Tobias Harks, Martin Hoefer, Kevin Schewior

, Alexander Skopalik:
Routing games with progressive filling. 352-360
LO2: Localization 2
- Wei Xi, Jizhong Zhao, Xiang-Yang Li, Kun Zhao, Shaojie Tang, Xue Liu, Zhiping Jiang:

Electronic frog eye: Counting crowd using WiFi. 361-369 - Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones. 370-378 - Tianci Liu, Lei Yang

, Qiongzheng Lin
, Yi Guo, Yunhao Liu:
Anchor-free backscatter positioning for RFID tags with high accuracy. 379-387 - Yuanchao Shu

, Peng Cheng, Yu Gu, Jiming Chen, Tian He:
TOC: Localizing wireless rechargeable sensors with time of charge. 388-396
MN2: Multimedia networking 2
- Zhenyu Li, Gaogang Xie, Jiali Lin, Yun Jin, Mohamed Ali Kâafar

, Kavé Salamatian
:
On the geographic patterns of a large-scale mobile video-on-demand system. 397-405 - Vinay Joseph

, Sem C. Borst, Martin I. Reiman:
Optimal rate allocation for adaptive wireless video streaming in networks with user dynamics. 406-414 - Yang Cao, Xu Chen, Tao Jiang, Junshan Zhang:

SoCast: Social ties based cooperative video multicast. 415-423 - Munhwan Choi, Weiping Sun, Jonghoe Koo, Sunghyun Choi

, Kang G. Shin:
Reliable video multicast over Wi-Fi networks with coordinated multiple APs. 424-432
NE2: Network economics and pricing 2
- Linquan Zhang, Zongpeng Li, Chuan Wu

:
Dynamic resource provisioning in cloud computing: A randomized auction approach. 433-441 - Weijie Wu, Richard T. B. Ma

, John C. S. Lui:
Exploring bundling sale strategy in online service markets with network effects. 442-450 - George Iosifidis

, Lin Gao, Jianwei Huang, Leandros Tassiulas:
Enabling crowd-sourced mobile Internet access. 451-459 - Syed Hasan, Sergey Gorinsky

, Constantine Dovrolis, Ramesh K. Sitaraman
:
Trade-offs in optimizing the cache deployments of CDNs. 460-468
RF2: RFID 2
- Jinsong Han, Chen Qian, Xing Wang, Dan Ma, Jizhong Zhao, Pengfeng Zhang, Wei Xi, Zhiping Jiang:

Twins: Device-free object tracking using passive tags. 469-476 - Wei Gong, Kebin Liu, Xin Miao, Haoxiang Liu:

Arbitrarily accurate approximation scheme for large-scale RFID cardinality estimation. 477-485 - Haoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, Wenbo He:

Towards adaptive continuous scanning in large-scale RFID systems. 486-494 - Yuanqing Zheng

, Mo Li
:
Read bulk data from computational RFIDs. 495-503
SP2: Security and privacy 2
- Jing Zhao, Taeho Jung, Yu Wang, Xiangyang Li:

Achieving differential privacy of data disclosure in the smart grid. 504-512 - Lei Yang, Xu Chen, Junshan Zhang, H. Vincent Poor

:
Optimal privacy-preserving energy management for smart meters. 513-521 - Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese

:
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. 522-530 - Daniel Luchaup, Lorenzo De Carli

, Somesh Jha, Eric Bach:
Deep packet inspection with DFA-trees and parametrized language overapproximation. 531-539
WN2: Wireless networks 2
- Wei Sun, Zheng Yang, Keyu Wang, Yunhao Liu:

Hello: A generic flexible protocol for neighbor discovery. 540-548 - Liyang Zhang, Zhangyu Guan, Tommaso Melodia

:
Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying. 549-557 - XiaoHua Xu, Min Song:

Restricted coverage in wireless networks. 558-564 - Cem Boyaci, Ye Xia:

Optimal delay bound for maximum weight scheduling policy in wireless networks. 565-573
CC3: Cloud computing 3
- Jiao Zhang, Fengyuan Ren, Chuang Lin:

Delay guaranteed live migration of Virtual Machines. 574-582 - Wei Wang

, Baochun Li, Ben Liang
:
Dominant resource fairness in cloud computing systems with heterogeneous servers. 583-591 - Bharath Balasubramanian, Tian Lan, Mung Chiang:

SAP: Similarity-aware partitioning for efficient cloud storage. 592-600 - Sivan Albagli-Kim, Hadas Shachnai, Tami Tamir:

Scheduling jobs with dwindling resource requirements in clouds. 601-609
IM1: Internet monitoring and measurement 1
- Tatsuaki Kimura, Keisuke Ishibashi, Tatsuya Mori

, Hiroshi Sawada, Tsuyoshi Toyono, Ken Nishimatsu, Akio Watanabe, Akihiro Shimoda, Kohei Shiomoto
:
Spatio-temporal factorization of log data for understanding network events. 610-618 - Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Di Zhang, Xiaoming Fu

, K. K. Ramakrishnan
:
Mining checkins from location-sharing services for client-independent IP geolocation. 619-627 - Alex X. Liu, Chad R. Meiners, Eric Torng:

Packet classification using binary Content Addressable Memory. 628-636 - Anduo Wang, Alexander J. T. Gurney, Xianglong Han, Jinyan Cao, Boon Thau Loo

, Carolyn L. Talcott, Andre Scedrov
:
A reduction-based approach towards scaling up formal analysis of internet configurations. 637-645
NC: Network coding
- Xunrui Yin, Zongpeng Li, Xin Wang:

A matroid theory approach to multicast network coding. 646-654 - Wei-Cheng Kuo, Chih-Chun Wang:

Robust and optimal opportunistic scheduling for downlink 2-flow inter-session network coding with varying channel quality. 655-663 - Shiyu Ji, Tingting Chen, Sheng Zhong, Subhash C. Kak:

DAWN: Defending against wormhole attacks in wireless network coding systems. 664-672 - Fei Chen, Tao Xiang

, Yuanyuan Yang
, Sherman S. M. Chow
:
Secure cloud storage meets with secure network coding. 673-681
NE3: Network economics and pricing 3
- Lin Gao, George Iosifidis

, Jianwei Huang, Leandros Tassiulas:
Hybrid data pricing for network-assisted user-provided connectivity. 682-690 - Zhixue Lu, Prasun Sinha, R. Srikant:

EasyBid: Enabling cellular offloading via small players. 691-699 - Liang Zhang

, Weijie Wu, Dan Wang
:
Time dependent pricing in wireless data networks: Flat-rate vs. usage-based schemes. 700-708 - Wei Dong, Swati Rallapalli, Lili Qiu, K. K. Ramakrishnan

, Yin Zhang:
Double auctions for dynamic spectrum allocation. 709-717
SN1: Sensor networks 1
- Xuefeng Liu, Jiannong Cao

, Shaojie Tang, Peng Guo:
A generalized coverage-preserving scheduling in WSNs: A case study in structural health monitoring. 718-726 - Haofu Han, Jiadi Yu, Hongzi Zhu, Yingying Chen

, Jie Yang, Yanmin Zhu, Guangtao Xue, Minglu Li:
SenSpeed: Sensing driving conditions to estimate vehicle speed in urban environments. 727-735 - Ahmed E. A. A. Abdulla, Zubair Md Fadlullah

, Hiroki Nishiyama
, Nei Kato
, Fumie Ono, Ryu Miura:
An optimal data collection technique for improved utility in UAS-aided networks. 736-744 - Shibo He, Dong-Hoon Shin, Junshan Zhang, Jiming Chen:

Toward optimal allocation of location dependent tasks in crowdsensing. 745-753
SP3: Security and privacy 3
- Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:

Achieving k-anonymity in privacy-aware location-based services. 754-762 - Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao:

PLAM: A privacy-preserving framework for local-area mobile social networks. 763-771 - Zhengrui Qin, Shanhe Yi

, Qun Li
, Dmitry Zamkov:
Preserving secondary users' privacy in cognitive radio networks. 772-780 - Maciej Korczynski, Andrzej Duda

:
Markov chain fingerprinting to classify encrypted traffic. 781-789
WN3: Wireless networks 3
- Shaohe Lv, Xuan Dong, Yong Lu, Xiaoli Du, Xiaodong Wang, Yong Dou, Xingming Zhou:

3D pipeline contention: Asymmetric full duplex in wireless networks. 790-798 - Lan Zhang, Kebin Liu, Yonghang Jiang, Xiang-Yang Li, Yunhao Liu, Panlong Yang:

Montage: Combine frames with movement continuity for realtime multi-user tracking. 799-807 - Xiufeng Xie, Xinyu Zhang:

Scalable user selection for MU-MIMO networks. 808-816 - Yongjiu Du, Ehsan Aryafar, Joseph Camp

, Mung Chiang:
iBeam: Intelligent client-side multi-user beamforming in wireless networks. 817-825
CC4: Cloud computing 4
- Guanfeng Liang, Ulas C. Kozat:

TOFEC: Achieving optimal throughput-delay trade-off of cloud storage using erasure codes. 826-834 - Haiying Shen, Zhuozhao Li

:
New bandwidth sharing and pricing policies to achieve a win-win situation for cloud provider and tenants. 835-843 - Yu Hua, Xue Liu, Dan Feng:

Neptune: Efficient remote communication services for cloud backups. 844-852 - György Dán, Niklas Carlsson:

Dynamic content allocation for cloud-assisted service of periodic workloads. 853-861
CNE: Cooperative networking
- Kyung-Hwa Kim, Hyunwoo Nam, Henning Schulzrinne:

WiSlow: A Wi-Fi network performance troubleshooting tool for end users. 862-870 - Riheng Jia, Jinbei Zhang, Xinbing Wang, Xiaohua Tian, Qian Zhang

:
Scaling laws for heterogeneous cognitive radio networks with cooperative secondary users. 871-879 - Yantian Hou, Ming Li, Xu Yuan, Y. Thomas Hou

, Wenjing Lou:
Cooperative cross-technology interference mitigation for heterogeneous multi-hop networks. 880-888
EE1: Energy efficiency in wireless networks 1
- Ashikur Rahman

, Nael B. Abu-Ghazaleh
:
On the expected size of minimum-energy path-preserving topologies for wireless multi-hop networks. 889-897 - Hang Li, Chuan Huang, Shuguang Cui

, Junshan Zhang:
Distributed opportunistic scheduling for wireless networks powered by renewable energy sources. 898-906 - Chenfei Gao, Weiyi Zhang, Jian Tang, Chonggang Wang, Shihong Zou, Sen Su:

Relax, but Do Not Sleep: A new perspective on Green Wireless Networking. 907-915 - Wenjie Hu, Guohong Cao:

Energy optimization through traffic aggregation in wireless networks. 916-924
IM2: Internet monitoring and measurement 2
- Aveek K. Das, Parth H. Pathak, Chen-Nee Chuah

, Prasant Mohapatra:
Contextual localization through network traffic analysis. 925-933 - Mehdi Malboubi, Liyuan Wang, Chen-Nee Chuah

, Puneet Sharma:
Intelligent SDN based traffic (de)Aggregation and Measurement Paradigm (iSTAMP). 934-942 - Andra Lutu, Marcelo Bagnulo

, Jesús Cid-Sueiro
, Olaf Maennel
:
Separating wheat from chaff: Winnowing unintended prefixes using machine learning. 943-951 - Alex X. Liu, Eric Torng:

An overlay automata approach to regular expression matching. 952-960
SN2: Sensor networks 2
- Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu, Yunhao Liu:

Walking down the STAIRS: Efficient collision resolution for wireless sensor networks. 961-969 - Yitao Hu, Xinbing Wang, Xiaoying Gan:

Critical sensing range for mobile heterogeneous camera sensor networks. 970-978 - Kan Huang, Chien-Chun Ni, Rik Sarkar, Jie Gao, Joseph S. B. Mitchell:

Bounded stretch geographic homotopic routing in sensor networks. 979-987 - Stefano Basagni, Ladislau Bölöni, Petrika Gjanci, Chiara Petrioli

, Cynthia A. Phillips, Danila Turgut:
Maximizing the value of sensed information in underwater wireless sensor networks via an autonomous underwater vehicle. 988-996
WS1: Wireless security and privacy 1
- Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, Junshan Zhang:

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks. 997-1005 - Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang:

Utility-based cooperative decision in cooperative authentication. 1006-1014 - Hanif Rahbari

, Marwan Krunz, Loukas Lazos:
Security vulnerability and countermeasures of frequency offset correction in 802.11a systems. 1015-1023 - Fei Huo, Guang Gong:

A new efficient physical layer OFDM encryption scheme. 1024-1032
CC5: Cloud computing 5
- Liuhua Chen, Haiying Shen:

Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters. 1033-1041 - Shengbo Chen, Yin Sun, Ulas C. Kozat, Longbo Huang, Prasun Sinha, Guanfeng Liang, Xin Liu, Ness B. Shroff:

When queueing meets coding: Optimal-latency data retrieving scheme in storage clouds. 1042-1050 - Ryan Shea, Haiyang Wang, Jiangchuan Liu:

Power consumption of virtual machines with network transactions: Measurement and improvements. 1051-1059 - Yujin Li, Wenye Wang:

Can mobile cloudlets support mobile applications? 1060-1068
CN1: Cellular networks 1
- Wei Bao

, Ben Liang
:
Structured spectrum allocation and user association in heterogeneous cellular networks. 1069-1077 - Konstantinos Poularakis, George Iosifidis

, Antonios Argyriou
, Leandros Tassiulas:
Video delivery over heterogeneous cellular networks: Optimizing cost and performance. 1078-1086 - Wentao Zhao, Shaowei Wang, Chonggang Wang, Xiaobing Wu:

Cell planning for heterogeneous networks: An approximation algorithm. 1087-1095 - Walid Saad, Zhu Han, Rong Zheng, Mérouane Debbah, H. Vincent Poor

:
A college admissions game for uplink user association in wireless small cell networks. 1096-1104
EE2: Energy efficiency in wireless networks 2
- Haipeng Dai

, Yunhuai Liu, Guihai Chen
, Xiaobing Wu, Tian He:
Safe Charging for wireless power transfer. 1105-1113 - Chenxi Qiu, Haiying Shen, Lei Yu

:
Energy-efficient cooperative broadcast in fading wireless networks. 1114-1122 - Yong Cui, Shihan Xiao, Xin Wang, Minming Li

, Hongyi Wang, Zeqi Lai:
Performance-aware energy optimization on mobile devices in cellular network. 1123-1131 - Bingjie Leng, Parisa Mansourifard, Bhaskar Krishnamachari:

Microeconomic analysis of base-station sharing in green cellular networks. 1132-1140
IM3: Internet monitoring and measurement 3
- Ouldooz Baghban Karimi, Jiangchuan Liu, Jennifer Rexford

:
Optimal collaborative access point association in wireless networks. 1141-1149 - Sisi Xiong, Yanjun Yao, Qing Cao, Tian He:

kBF: A Bloom Filter for key-value storage with an application on approximate state machines. 1150-1158 - Hesham Mekky, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Antonio Nucci:

Detecting malicious HTTP redirections using trees of user browsing activity. 1159-1167 - Yubao Zhang, Xin Ruan, Haining Wang, Hui Wang:

What scale of audience a campaign can reach in what price on Twitter? 1168-1176
SN3: Sensor networks 3
- Andreas Loukas, Marco Zuniga

, Ioannis Protonotarios, Jie Gao:
How to identify global trends from local decisions? Event region detection on mobile networks. 1177-1185 - Jiliang Wang, Zhichao Cao, XuFei Mao, Yunhao Liu:

Sleep in the Dins: Insomnia therapy for duty-cycled sensor networks. 1186-1194 - Liang He, Peng Cheng, Yu Gu, Jianping Pan

, Ting Zhu, Cong Liu:
Mobile-to-mobile energy replenishment in mission-critical robotic sensor networks. 1195-1203 - Hua Huang

, Chien-Chun Ni, Xiaomeng Ban, Jie Gao, Andrew T. Schneider, Shan Lin:
Connected wireless camera network deployment with visibility coverage. 1204-1212
US: Urban sensing and environmental monitoring
- Dong Zhao, Xiang-Yang Li, Huadong Ma:

How to crowdsource tasks truthfully without sacrificing utility: Online incentive mechanisms with budget constraint. 1213-1221 - Xiao Qi, Yongcai Wang, Yuexuan Wang, Liwen Xu:

Compressive sensing over strongly connected digraph and its application in traffic monitoring. 1222-1230 - Zhenni Feng, Yanmin Zhu, Qian Zhang

, Lionel M. Ni, Athanasios V. Vasilakos
:
TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing. 1231-1239 - Xiaonan Guo, Eddie C. L. Chan, Ce Liu, Kaishun Wu

, Siyuan Liu, Lionel M. Ni:
ShopProfiler: Profiling shops with crowdsourcing data. 1240-1248
WS2: Wireless security and privacy 2
- Zhili Chen, Liusheng Huang, Lu Li, Wei Yang, Haibo Miao, Miaomiao Tian, Fei Wang:

PS-TRUST: Provably secure solution for truthful double spectrum auctions. 1249-1257 - Pengfei Hu

, Kai Xing, Xiuzhen Cheng, Hao Wei, Haojin Zhu
:
Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks. 1258-1266 - Wei Wang, Lin Chen, Kang G. Shin, Lingjie Duan

:
Secure cooperative spectrum sensing and access against intelligent malicious behaviors. 1267-1275 - Xianru Du, Dan Shan, Kai Zeng, Lauren M. Huie:

Physical layer challenge-response authentication in wireless networks with relay. 1276-1284
CC6: Clound computing 6
- Ryan Shea, Feng Wang, Haiyang Wang, Jiangchuan Liu:

A deep investigation into network performance in virtual machine based cloud environments. 1285-1293 - Liuhua Chen, Haiying Shen, Karan Sapra:

RIAL: Resource Intensity Aware Load balancing in clouds. 1294-1302 - Jian-Jhih Kuo

, Hsiu-Hsien Yang, Ming-Jer Tsai:
Optimal approximation algorithm of virtual machine placement for data latency minimization in cloud systems. 1303-1311 - Pablo Jesús Argibay-Losada, Kseniia Nozhnina, Gokhan Sahin

, Chunming Qiao:
Using stop-and-wait to improve TCP throughput in fast optical switching (FOS) networks over short physical distances. 1312-1320
CN2: Cellular networks 2
- Yuhuan Du, Gustavo de Veciana:

"Wireless networks without edges": Dynamic radio resource clustering and user scheduling. 1321-1329 - Omer Gurewitz, Yakov Sandomirsky, Gabriel Scalosub:

Cellular multi-coverage with non-uniform rates. 1330-1338 - Robert Margolies, Ashwin Sridharan, Vaneet Aggarwal

, Rittwik Jana, N. K. Shankaranarayanan, Vinay A. Vaishampayan
, Gil Zussman:
Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms. 1339-1347 - Ying Zhang:

User mobility from the view of cellular data networks. 1348-1356
EE3: Energy efficiency in wireless networks 3
- Kyoung-Hak Jung, Yuepeng Qi, Chansu Yu, Young-Joo Suh:

Energy efficient Wifi tethering on a smartphone. 1357-1365 - Qingwen Zhao, Yanmin Zhu, Hongzi Zhu, Jian Cao, Guangtao Xue, Bo Li:

Fair energy-efficient sensing task allocation in participatory sensing with smartphones. 1366-1374 - Jon Crowcroft

, Michael Segal
, Liron Levin:
Improved structures for data collection in wireless sensor networks. 1375-1383 - Lu Liu, Xianghui Cao

, Yu Cheng
, Lili Du
, Wei Song, Yu Wang:
Energy-efficient capacity optimization in wireless networks. 1384-1392
FN: Firewalls and network intrusion detection
- Zhuo Zhang, Zhibin Zhang, Patrick P. C. Lee

, Yunjie Liu, Gaogang Xie:
ProWord: An unsupervised approach to protocol feature word extraction. 1393-1401 - Zhen Ling, Junzhou Luo, Kui Wu, Wei Yu

, Xinwen Fu
:
TorWard: Discovery of malicious traffic over Tor. 1402-1410 - Deguang Kong, Guanhua Yan:

Transductive malware label propagation: Find your lineage from your neighbors. 1411-1419 - Qun Huang, Patrick P. C. Lee

:
LD-Sketch: A distributed sketching design for accurate and scalable anomaly detection in network data streams. 1420-1428
IM4: Internet monitoring and measurement 4
- MyungKeun Yoon

, JinWoo Son, Seon-Ho Shin:
Bloom tree: A search tree based on Bloom filters for multiple-set membership testing. 1429-1437 - João Taveira Araújo, Raul Landa, Richard G. Clegg

, George Pavlou, Kensuke Fukuda:
A longitudinal analysis of Internet rate limitations. 1438-1446 - Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

:
Monitor placement for maximal identifiability in network tomography. 1447-1455 - Chenguang Yu, Yang Xu, Bo Liu, Yong Liu

:
"Can you SEE me now?" A measurement study of mobile video calls. 1456-1464
SN4: Sensor networks 4
- Yan Li, Haibo Zhang

, Zhiyi Huang, Michael H. Albert:
Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links. 1465-1473 - Xiaolin Fang, Hong Gao, Jianzhong Li, Yingshu Li

:
Approximate multiple count in Wireless Sensor Networks. 1474-1482 - Gang Li, Jin Teng, Fan Yang, Adam C. Champion, Dong Xuan, Hong Luan, Yuan F. Zheng:

EV-sounding: A visual assisted electronic channel sounding system. 1483-1491 - Vikram P. Munishwar, Vinay Kolar, Nael B. Abu-Ghazaleh

:
Coverage in visual sensor networks with Pan-Tilt-Zoom cameras: The MaxFoV problem. 1492-1500
WS3: wireless ecurity and privacy 3
- Zhuo Lu, Wenye Wang

, Cliff Wang:
How can botnets cause storms? Understanding the evolution and impact of mobile botnets. 1501-1509 - Saiyu Qi, Yuanqing Zheng

, Mo Li
, Li Lu, Yunhao Liu:
COLLECTOR: A secure RFID-enabled batch recall protocol. 1510-1518 - Ilona Murynets, Michael Zabarankin, Roger Piqueras Jover, Adam Panagia:

Analysis and detection of SIMbox fraud in mobility networks. 1519-1526 - Mahtab Mirmohseni, Panagiotis Papadimitratos

:
Scaling laws for secrecy capacity in cooperative wireless networks. 1527-1535
CN3: Cellular networks 3
- Francesco Malandrino

, Claudio Casetti, Carla-Fabiana Chiasserini
, Zana Limani
:
Fast resource scheduling in HetNets with D2D support. 1536-1544 - Tuo Yu, Zilong Zhou, Da Zhang, Xinbing Wang, Yunxin Liu, Songwu Lu:

INDAPSON: An incentive data plan sharing system based on self-organizing network. 1545-1553 - Mayank Manjrekar, Vinod Ramaswamy, Srinivas Shakkottai:

A mean field game approach to scheduling in cellular systems. 1554-1562 - Tarun Bansal, Karthikeyan Sundaresan, Sampath Rangarajan, Prasun Sinha:

R2D2: Embracing device-to-device communication in next generation cellular networks. 1563-1571
DC1: Data center networking 1
- Jian Guo, Fangming Liu, Xiaomeng Huang, John C. S. Lui, Mi Hu, Qiao Gao, Hai Jin:

On efficient bandwidth allocation for traffic variability in datacenters. 1572-1580 - Hong Xu

, Baochun Li:
RepFlow: Minimizing flow completion times with replicated flows in data centers. 1581-1589 - Marco Chiesa

, Guy Kindler, Michael Schapira:
Traffic engineering with Equal-Cost-Multipath: An algorithmic perspective. 1590-1598 - Li Chen, Yuan Feng, Baochun Li, Bo Li:

Towards performance-centric fairness in datacenter networks. 1599-1607
FT1: Fault tolerance and survivability 1
- Hiroshi Saito:

Geometric evaluation of survivability of disaster-affected network with probabilistic failure. 1608-1616 - Baohua Yang, Junda Liu, Scott Shenker, Jun Li, Kai Zheng:

Keep Forwarding: Towards k-link failure resilient routing. 1617-1625 - Reuven Cohen, Gabi Nakibly:

Restorable logical topology in the face of no or partial traffic demand knowledge. 1626-1634 - Yusuke Kobayashi, Kensuke Otsuki:

Max-flow min-cut theorem and faster algorithms in a circular disk failure model. 1635-1643
SB1: Scheduling and buffer management 1
- Peter M. van de Ven, Bo Zhang, Angela Schörgendorfer:

Distributed backup scheduling: Modeling and optimization. 1644-1652 - Peng-Jun Wan, Xiaohua Jia

, Guojun Dai
, Hongwei Du, Ophir Frieder:
Fast and simple approximation algorithms for maximum weighted independent set of links. 1653-1661 - Jaewook Kwak, Chul-Ho Lee, Do Young Eun

:
A high-order Markov chain based scheduling algorithm for low delay in CSMA networks. 1662-1670 - Yin Sun, Can Emre Koksal, Kyu-Han Kim, Ness B. Shroff:

Scheduling of multicast and unicast services under limited feedback by using rateless codes. 1671-1679
SC1: Social computing and networks 1
- Wei Wei, Xiaojun Zhu

, Qun Li
:
LBSNSim: Analyzing and modeling location-based social networks. 1680-1688 - Tong Meng

, Fan Wu, Guihai Chen
:
On designing neighbor discovery protocols: A code-based approach. 1689-1697 - Guangchi Liu, Qing Yang, Honggang Wang

, Xiaodong Lin, Mike P. Wittie:
Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic. 1698-1706 - Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:

FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. 1707-1715
SD: Software defined networking
- Ulas C. Kozat, Guanfeng Liang, Koray Kokten:

On diagnosis of forwarding plane via static forwarding rules in Software Defined Networks. 1716-1724 - Lukas Kekely

, Viktor Pus, Jan Korenek:
Software Defined Monitoring of application protocols. 1725-1733 - Rami Cohen, Liane Lewin-Eytan, Joseph Naor, Danny Raz:

On the effect of forwarding table size on SDN network utilization. 1734-1742 - Dan Li, Yunfei Shang, Congjie Chen:

Software defined green data center network with exclusive routing. 1743-1751
VN1: Vehicular Networks 1
- Shaohan Hu, Hengchang Liu, Lu Su, Hongyan Wang, Tarek F. Abdelzaher, Pan Hui, Wei Zheng, Zhiheng Xie, John A. Stankovic:

Towards automatic phone-to-phone communication for vehicular networking applications. 1752-1760 - Jun Qin, Hongzi Zhu, Yanmin Zhu, Li Lu, Guangtao Xue, Minglu Li:

POST: Exploiting dynamic sociality for mobile advertising in vehicular networks. 1761-1769 - Hassan Aboubakr Omar, Weihua Zhuang

, Li Li:
On multihop communications for in-vehicle Internet access based on a TDMA MAC protocol. 1770-1778 - Lei Zhang, Boyang Yu, Jianping Pan

:
GeoMob: A mobility-aware geocast scheme in metropolitans via taxicabs and buses. 1779-1787
CN4: Cellular networks 4
- Majed Haddad, Habib B. A. Sidi, Piotr Wiecek, Eitan Altman:

Automated dynamic offset applied to cell association. 1788-1796 - Vincenzo Sciancalepore

, Vincenzo Mancuso
, Albert Banchs, Shmuel Zaks, Antonio Capone
:
Interference coordination strategies for content update dissemination in LTE-A. 1797-1805 - Diala Naboulsi, Razvan Stanica, Marco Fiore

:
Classifying call profiles in large-scale mobile traffic datasets. 1806-1814 - Yeon-Sup Lim, Yung-Chih Chen, Erich M. Nahum, Don Towsley

, Kang-Won Lee:
Cross-layer path management in multi-path transport protocol for mobile devices. 1815-1823
DC2: Data center networking 2
- Brent E. Stephens, Alan L. Cox, Ankit Singla, John B. Carter, Colin Dixon, Wes Felter:

Practical DCB for improved data center networks. 1824-1832 - Vaneet Aggarwal

, Chao Tian, Vinay A. Vaishampayan
, Yih-Farn Robin Chen:
Distributed data storage systems with opportunistic repair. 1833-1841 - Xin Li, Jie Wu, Shaojie Tang, Sanglu Lu:

Let's stay together: Towards traffic aware virtual machine placement in data centers. 1842-1850 - Dawei Li

, Jie Wu:
On the design and analysis of Data Center Network architectures for interconnecting dual-port servers. 1851-1859
FT2: Fault tolerance and survivability 2
- János Tapolcai

, Lajos Rónyai, Éva Hosszu, Pin-Han Ho, Suresh Subramaniam
:
Signaling free localization of node failures in all-optical networks. 1860-1868 - Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang:

Fault tolerant barrier coverage for wireless sensor networks. 1869-1877 - Yan Wang, Dongsheng Wei, Xunrui Yin, Xin Wang:

Heterogeneity-aware data regeneration in distributed storage systems. 1878-1886 - Pengfei Chen, Yong Qi, Pengfei Zheng, Di Hou:

CauseInfer: Automatic and distributed performance diagnosis with hierarchical causality graph in large distributed systems. 1887-1895
SB2: Scheduling and buffer management 2
- Florin Ciucu, Felix Poloczek, Jens B. Schmitt:

Sharp per-flow delay bounds for bursty arrivals: The case of FIFO, SP, and EDF scheduling. 1896-1904 - Chandramani Singh, Angelia Nedic

, R. Srikant:
LP-relaxation based distributed algorithms for scheduling in wireless networks. 1905-1913 - Wei Wang

, Ben Liang
, Baochun Li:
Low complexity multi-resource fair queueing with bounded delay. 1914-1922 - Shizhen Zhao, Xiaojun Lin:

Rate-control and multi-channel scheduling for wireless live streaming with stringent deadlines. 1923-1931
SC2: Social computing and networks 2
- Zongqing Lu, Yonggang Wen, Guohong Cao:

Information diffusion in mobile social networks: The speed perspective. 1932-1940 - Zhong Li

, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic:
Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach. 1941-1949 - Ngoc Minh Do, Ye Zhao, Shu-Ting Wang, Cheng-Hsin Hsu, Nalini Venkatasubramanian:

Optimizing offline access to social network content on mobile devices. 1950-1958 - Xu Chen, Xiaowen Gong, Lei Yang, Junshan Zhang:

A social group utility maximization framework with applications in database assisted spectrum access. 1959-1967
VN2: Vehicular networks 2
- Markus Forster, Raphaël Frank, Mario Gerla, Thomas Engel:

A Cooperative Advanced Driver Assistance System to mitigate vehicular traffic shock waves. 1968-1976 - Yang Wang, Liusheng Huang, Tianbo Gu, Hao Wei, Kai Xing, Junshan Zhang:

Data-driven traffic flow analysis for vehicular communications. 1977-1985 - Yiran Zhao, Yang Zhang, Tuo Yu, Tianyuan Liu, Xinbing Wang, Xiaohua Tian, Xue Liu:

CityDrive: A map-generating and speed-optimizing driving system. 1986-1994 - Dong Li, Zhixue Lu, Tarun Bansal, Erik Schilling, Prasun Sinha:

ForeSight: Mapping vehicles in visual domain and electronic domain. 1995-2003
DB: Big Data
- Yanfang Le, Jiangchuan Liu, Funda Ergün, Dan Wang

:
Online load balancing for MapReduce with skewed data input. 2004-2012 - Kan Yang

, Xiaohua Jia
, Kui Ren
, Ruitao Xie
, Liusheng Huang:
Enabling efficient access control with dynamic policy updating for big data in the cloud. 2013-2021 - Linquan Zhang, Zongpeng Li, Chuan Wu

, Minghua Chen
:
Online algorithms for uploading deferrable big data to the cloud. 2022-2030 - Dan Williams, Shuai Zheng, Xiangliang Zhang

, Hani Jamjoom:
TideWatch: Fingerprinting the cyclicality of big data workloads. 2031-2039
CNB: Content/name based networking
- Valentina Martina, Michele Garetto

, Emilio Leonardi
:
A unified approach to the performance analysis of caching systems. 2040-2048 - Haowei Yuan, Patrick Crowley:

Scalable Pending Interest Table design: From principles to practice. 2049-2057 - Shiyou Qian, Jian Cao, Yanmin Zhu, Minglu Li:

REIN: A fast event matching approach for content-based publish/subscribe systems. 2058-2066 - Christos Tsilopoulos, George Xylomenos

, Yannis Thomas:
Reducing forwarding state in content-centric networks with semi-stateless forwarding. 2067-2075
CR1: Cognitive radio networks 1
- Yao-Win Peter Hong

, Chee Wei Tan
, Liang Zheng, Cheng-Lin Hsieh, Chia-Han Lee:
A unified framework for wireless max-min utility optimization with general monotonic constraints. 2076-2084 - Xingya Liu, Jiang Xie:

A practical self-adaptive rendezvous protocol in cognitive radio ad hoc networks. 2085-2093 - Jing Zhao, Wei Gao, Yi Wang, Guohong Cao:

Delay-constrained caching in cognitive radio networks. 2094-2102 - Jelena V. Misic, Vojislav B. Misic:

Probability distribution of spectral hole duration in cognitive networks. 2103-2111
CS: Cloud security and privacy
- Bing Wang, Shucheng Yu

, Wenjing Lou, Y. Thomas Hou
:
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. 2112-2120 - Jiawei Yuan, Shucheng Yu

:
Efficient public integrity checking for cloud data sharing with multi-user modification. 2121-2129 - Cong Wang

, Bingsheng Zhang, Kui Ren
, Janet Meiling Wang Roveda, Chang Wen Chen
, Zhen Xu:
A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing. 2130-2138
FT3: Fault tolerancy and survivability 3
- Jing Zhang, Xiangke Liao, Shanshan Li, Yu Hua, Xue Liu, Bin Lin:

Aggrecode: Constructing route intersection for data reconstruction in erasure coded storage. 2139-2147 - Theodore Elhourani, Abishek Gopalan, Srinivasan Ramasubramanian:

IP fast rerouting for multi-link failures. 2148-2156 - Ali Zand, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel:

Rippler: Delay injection for service dependency detection. 2157-2165
SB3: Scheduling and buffer management 3
- Yuqing Zhu, Yiwei Jiang, Weili Wu, Ling Ding, Ankur Teredesai, Deying Li, Wonjun Lee:

Minimizing makespan and total completion time in MapReduce-like systems. 2166-2174 - Yi Yuan, Dan Wang

, Jiangchuan Liu:
Joint scheduling of MapReduce jobs with servers: Performance bounds and experiments. 2175-2183 - Xuan Wang, Yi Chen, Lin Cai

, Jianping Pan
:
Scheduling in a secure wireless network. 2184-2192 - Kyu Seob Kim, Chih-Ping Li, Eytan H. Modiano:

Scheduling multicast traffic with deadlines in wireless networks. 2193-2201
SC3: Social computing and networks 3
- Siddhartha Banerjee, Avhishek Chatterjee

, Sanjay Shakkottai:
Epidemic thresholds with external agents. 2202-2210 - Kai Zhu, Lei Ying:

A robust information source estimator with sparse observations. 2211-2219 - Minsung Jang, Karsten Schwan, Ketan Bhardwaj, Ada Gavrilovska, Adhyas Avasthi:

Personal clouds: Sharing and integrating networked resources to enhance end user experiences. 2220-2228 - Brian Proulx, Junshan Zhang:

Modeling social network relationships via t-cherry junction trees. 2229-2237
CR2: Cognitive radio networks 2
- Jing Zhao, Guohong Cao:

Spectrum-aware data replication in intermittently connected cognitive radio networks. 2238-2246 - Shan-Hung Wu, Ching-Chan Wu, Wing-Kai Hon

, Kang G. Shin:
Rendezvous for heterogeneous spectrum-agile devices. 2247-2255 - Haitham Hassanieh

, Lixin Shi, Omid Abari, Ezzeldin Hamed, Dina Katabi:
GHz-wide sensing and decoding using the sparse Fourier transform. 2256-2264 - Peng Lin, Xiaojun Feng, Qian Zhang

:
Flexauc: Serving dynamic demands in spectrum trading markets with flexible auction. 2265-2273
DT: Delay tolerant networks
- Lirong Xue, Donghyun Kim, Yuqing Zhu, Deying Li, Wei Wang, Alade O. Tokuta:

Multiple heterogeneous data ferry trajectory planning in wireless sensor networks. 2274-2282 - Kang Chen, Haiying Shen:

DSearching: Distributed searching of mobile nodes in DTNs with floating mobility information. 2283-2291 - Jeongho Kwak, Okyoung Choi, Song Chong, Prasant Mohapatra:

Dynamic speed scaling for energy minimization in delay-tolerant smartphone applications. 2292-2300 - Wei Gao, Qinghua Li, Guohong Cao:

Forwarding redundancy in opportunistic mobile networks: Investigation and elimination. 2301-2309
LL: Localization and location privacy
- Xi Chen, Xiaopei Wu, Xiang-Yang Li, Yuan He, Yunhao Liu:

Privacy-preserving high-quality map generation with participatory sensing. 2310-2318 - Tao Shu, Yingying Chen

, Jie Yang, Albert Williams:
Multi-lateral privacy-preserving localization in pervasive environments. 2319-2327 - Wei Wang, Qian Zhang

:
A stochastic game for privacy preserving context sensing on mobile phone. 2328-2336 - Hong Li, Limin Sun, Haojin Zhu

, Xiang Lu, Xiuzhen Cheng:
Achieving privacy preservation in WiFi fingerprint-based localization. 2337-2345
MD: Mobile Data Offloading
- Xiaofei Wang, Min Chen

, Zhu Han, Dapeng Oliver Wu
, Ted Taekyoung Kwon:
TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks. 2346-2354 - Marco Valerio Barbera, Sokol Kosta

, Alessandro Mei
, Vasile Claudiu Perta, Julinda Stefa
:
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system. 2355-2363 - Fidan Mehmeti, Thrasyvoulos Spyropoulos:

Is it worth to be patient? Analysis and optimization of delayed mobile data offloading. 2364-2372 - Liyao Xiang, Shiwen Ye, Yuan Feng, Baochun Li, Bo Li:

Ready, Set, Go: Coalesced offloading from mobile devices to the cloud. 2373-2381
PA1: Performance analysis and modelling 1
- Michael A. Beck, Sebastian A. Henningsen, Simon B. Birnbach, Jens B. Schmitt:

Towards a statistical network calculus - Dealing with uncertainty in arrivals. 2382-2390 - Florin Ciucu, Ramin Khalili, Yuming Jiang

, Liu Yang, Yong Cui:
Towards a system theoretic approach to wireless network capacity in finite time and space. 2391-2399 - Rahul Singh, I-Hong Hou, P. R. Kumar:

Fluctuation analysis of debt based policies for wireless networks with hard delay constraints. 2400-2408 - Ehsan Monsef, Tricha Anjali, Sanjiv Kapoor:

Price of Anarchy in network routing with class based capacity guarantees. 2409-2417
SB4: Scheduling and buffer management 4
- Michael J. Neely:

Distributed stochastic optimization via correlated scheduling. 2418-2426 - Reuven Cohen, Guy Grebla:

Multi-dimensional OFDMA scheduling in a wireless network with relay nodes. 2427-2435 - Huasen Wu, Xiaojun Lin, Xin Liu, Youguang Zhang:

Application-level scheduling with deadline constraints. 2436-2444 - Zizhong Cao, Murali S. Kodialam, T. V. Lakshman:

Joint static and dynamic traffic scheduling in data center networks. 2445-2453
WL: Wireless LANs
- Guanhua Wang, Kaishun Wu

, Qian Zhang
, Lionel M. Ni:
SimCast: Efficient video delivery in MU-MIMO WLANs. 2454-2462 - Ruwaifa Anwar, Kamran Nishat, Mohsin Ali

, Zahaib Akhtar, Haseeb Niaz, Ihsan Ayyub Qazi
:
Loss differentiation: Moving onto high-speed wireless LANs. 2463-2471 - Jiajue Ou, Yuanqing Zheng

, Mo Li
:
MISC: Merging incorrect symbols using constellation diversity for 802.11 retransmission. 2472-2480 - Jun Huang

, Guoliang Xing, Gang Zhou:
Unleashing exposed terminals in enterprise WLANs: A rate adaptation approach. 2481-2489
CR3: Cognitive radio networks 3
- Tongjie Zhang, Zongpeng Li, Reihaneh Safavi-Naini:

Incentivize cooperative sensing in distributed cognitive radio networks with reputation-based pricing. 2490-2498 - Xiaoyu Ji, Jiliang Wang, Mingyan Liu, Yubo Yan, Panlong Yang, Yunhao Liu:

Hitchhike: Riding control on preambles. 2499-2507 - Siddhartha Brahma, Melissa Duarte, Ayan Sengupta

, I-Hsiang Wang, Christina Fragouli, Suhas N. Diggavi:
QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying. 2508-2516 - Tarun Bansal, Bo Chen, Prasun Sinha:

FastProbe: Malicious user detection in Cognitive Radio Networks through active transmissions. 2517-2525
MA1: Medium access control 1
- Hongxing Li, Nitin H. Vaidya:

Optimal CSMA-based wireless communication with worst-case delay and non-uniform sizes. 2526-2534 - Dongmyung Lee, Donggyu Yun, Jinwoo Shin, Yung Yi, Se-Young Yun:

Provable per-link delay-optimal CSMA for general wireless network topology. 2535-2543 - François Baccelli, Bartlomiej Blaszczyszyn, Chandramani Singh:

Analysis of a proportionally fair and locally adaptive Spatial Aloha in Poisson Networks. 2544-2552 - Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr:

Communication through collisions: Opportunistic utilization of past receptions. 2553-2561
OP: Overlay and peer-to-peer networks
- Aemen Lodhi, Amogh Dhamdhere, Constantine Dovrolis:

Open peering by Internet transit providers: Peer preference or peer pressure? 2562-2570 - Cédric Westphal:

A stable fountain code mechanism for peer-to-peer content distribution. 2571-2579 - Vinay Setty

, Gunnar Kreitz, Guido Urdaneta, Roman Vitenberg, Maarten van Steen
:
Maximizing the number of satisfied subscribers in pub/sub systems under capacity constraints. 2580-2588
PA2: Performance analysis and modelling 2
- Shuochao Yao, Xinbing Wang, Xiaohua Tian, Qian Zhang

:
Delay-throughput tradeoff with correlated mobility of ad-hoc networks. 2589-2597 - Kuangyu Zheng, Xiaodong Wang, Li Li, Xiaorui Wang:

Joint power optimization of data center network and servers with correlation analysis. 2598-2606 - Virag Shah, Gustavo de Veciana:

Performance evaluation and asymptotics for Content Delivery Networks. 2607-2615 - Florin Ciucu, Jens B. Schmitt:

On the catalyzing effect of randomness on the per-flow throughput in wireless networks. 2616-2624
SG1: Smart Grid 1
- Mingkui Wei, Wenye Wang

:
Greenbench: A benchmark for observing power grid vulnerability under data-centric threats. 2625-2633 - Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, Gil Zussman:

Power grid vulnerability to geographically correlated failures - Analysis and control implications. 2634-2642 - Yu Zhang, Mihaela van der Schaar

:
Structure-aware stochastic load management in smart grids. 2643-2651 - Hao Liang, Atef Abdrabou

, Weihua Zhuang
:
Stochastic information management for voltage regulation in smart distribution systems. 2652-2660
SR1: Short range wireless technologies 1
- Bingsheng Zhang, Kui Ren

, Guoliang Xing, Xinwen Fu
, Cong Wang
:
SBVLC: Secure barcode-based visible light communication for smartphones. 2661-2669 - Lei Yang

, Yong Qi, Jianbing Fang, Xuan Ding, Tianci Liu, Mo Li
:
Frogeye: Perception of the slightest tag motion. 2670-2678 - Giuseppe Enrico Santagati, Tommaso Melodia

:
Sonar inside your body: Prototyping ultrasonic intra-body sensor networks. 2679-2687 - Zimu Zhou, Zheng Yang, Chenshu Wu, Wei Sun, Yunhao Liu:

LiFi: Line-Of-Sight identification with WiFi. 2688-2696
CR4: Cognitive radio networks 4
- Qiben Yan

, Huacheng Zeng, Tingting Jiang, Ming Li, Wenjing Lou, Y. Thomas Hou
:
MIMO-based jamming resilient communication in wireless networks. 2697-2706 - Tsung Ying Wu, Wanjiun Liao

, Cheng-Shang Chang:
CACH: Cycle-Adjustable Channel hopping for control channel establishment in cognitive radio networks. 2706-2714 - Bo Gao, Yaling Yang, Jung-Min "Jerry" Park:

A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks. 2715-2723 - You Han

, Eylem Ekici
, Haris Kremo
, Onur Altintas:
Throughput-efficient channel allocation in multi-channel cognitive vehicular networks. 2724-2732
MA2: Medium access control 2
- Douglas M. Blough, Giovanni Resta

, Paolo Santi:
Interference-aware proportional fairness for multi-rate wireless networks. 2733-2741 - Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, Swetha Shivaramaiah:

FD-MMAC: Combating multi-channel hidden and exposed terminals using a single transceiver. 2742-2750 - Adrian Ogierman, Andréa W. Richa, Christian Scheideler, Stefan Schmid

, Jin Zhang:
Competitive MAC under adversarial SINR. 2751-2759 - Richard Combes, Alexandre Proutière, Donggyu Yun, Jungseul Ok, Yung Yi:

Optimal Rate Sampling in 802.11 systems. 2760-2767
PA3: Performance analysis and modelling 3
- Jiajia Liu

, Hiroki Nishiyama
, Nei Kato
, Jianfeng Ma, Xiaohong Jiang:
Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility. 2768-2776 - Yuqing Zhu, Weili Wu, James Willson, Ling Ding, Lidong Wu, Deying Li, Wonjun Lee:

An approximation algorithm for client assignment in client/server systems. 2777-2785 - Ane Izagirre, Urtzi Ayesta, Ina Maria Verloop:

Sojourn time approximations in a multi-class time-sharing server. 2786-2794 - Xin Xu

, Chul-Ho Lee, Do Young Eun
:
A general framework of hybrid graph sampling for complex network analysis. 2795-2803
SG2: Smart Grid 2
- Jongho Won, Chris Y. T. Ma, David K. Y. Yau, Nageswara S. V. Rao

:
Proactive fault-tolerant aggregation protocol for privacy-assured smart metering. 2804-2812 - Fanxin Kong, Chuansheng Dong, Xue Liu, Haibo Zeng:

Blowing hard is not all we want: Quantity vs quality of wind power in the smart grid. 2813-2821 - Dong-Hoon Shin, Shibo He, Junshan Zhang:

Robust and cost-effective architecture design for smart grid communications: A multi-stage middleware deployment approach. 2822-2830 - Kan Zhou, Jianping Pan

, Lin Cai
:
Optimal Combined Heat and Power system scheduling in smart grid. 2831-2839
SR2: Short range wireless technologies 2
- Yi Guo, Lei Yang

, Bowen Li, Tianci Liu, Yunhao Liu:
RollCaller: User-friendly indoor navigation system using human-item spatial relation. 2840-2848 - Jun Huang

, Wahhab Albazrqaoe
, Guoliang Xing:
BlueID: A practical system for Bluetooth device identification. 2849-2857 - Peng Guo, Jiannong Cao

, Kui Zhang, Xuefeng Liu:
Enhancing ZigBee throughput under WiFi interference using real-time adaptive coding. 2858-2866

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














