


default search action
36th INFOCOM 2017: Atlanta, GA, USA
- 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017. IEEE 2017, ISBN 978-1-5090-5336-0

- Chen Tian, Ali Munir, Alex X. Liu, Yingtong Liu, Yanzhao Li, Jiajun Sun, Fan Zhang, Gong Zhang:

Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion control. 1-9 - Ruozhou Yu

, Guoliang Xue, Xiang Zhang, Dan Li:
Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers. 1-9 - Yuanwei Lu, Guo Chen, Larry Luo, Kun Tan, Yongqiang Xiong, Xiaoliang Wang, Enhong Chen:

One more queue is enough: Minimizing flow completion time with explicit priority notification. 1-9 - Jinlong E, Yong Cui, Peng Wang, Zhenhua Li, Chaokun Zhang:

CoCloud: Enabling efficient cross-cloud file collaboration based on inefficient web APIs. 1-9 - Chen Chen, Wei Wang

, Shengkai Zhang
, Bo Li:
Cluster fair queueing: Speeding up data-parallel jobs with delay guarantees. 1-9 - Li Chen, Shuhao Liu, Baochun Li, Bo Li:

Scheduling jobs across geo-distributed datacenters with max-min fairness. 1-9 - Chunguang Li, Dan Feng, Yu Hua, Wen Xia, Leihua Qin, Yue Huang, Yukun Zhou:

BAC: Bandwidth-aware compression for efficient live migration of virtual machines. 1-9 - Ahmed Osama Fathy Atya, Zhiyun Qian

, Srikanth V. Krishnamurthy
, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. 1-9 - Wenhai Sun

, Ning Zhang, Wenjing Lou, Y. Thomas Hou
:
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data. 1-9 - Xin Li

, Qinghan Xue, Mooi Choo Chuah:
CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system. 1-9 - Lei Yang, Qingji Zheng, Xinxin Fan:

RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. 1-9 - Qian Wang

, Shengshan Hu
, Minxin Du
, Jingjun Wang, Kui Ren:
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. 1-9 - Pan Li, Hoang Dau

, Gregory J. Puleo, Olgica Milenkovic:
Motif clustering and overlapping clustering for social network analysis. 1-9 - Guangmo Amo Tong, Weili Wu, Ling Guo, Deying Li, Cong Liu, Bin Liu, Ding-Zhu Du:

An efficient randomized algorithm for rumor blocking in online social networks. 1-9 - Jungseul Ok, Jinwoo Shin, Yung Yi:

Incentivizing strategic users for social diffusion: Quantity or quality? 1-9 - Md. Tanvir Al Amin

, Charu C. Aggarwal, Shuochao Yao, Tarek F. Abdelzaher, Lance M. Kaplan:
Unveiling polarization in social networks: A matrix factorization approach. 1-9 - Quan Chen

, Hong Gao, Siyao Cheng, Jianzhong Li, Zhipeng Cai
:
Distributed non-structure based data aggregation for duty-cycle wireless sensor networks. 1-9 - Kin Sum Liu, Tyler Mayer, Hao-Tsung Yang

, Esther M. Arkin, Jie Gao, Mayank Goswami, Matthew P. Johnson, Nirman Kumar, Shan Lin:
Joint sensing duty cycle scheduling for heterogeneous coverage guarantee. 1-9 - Kaibo Fu, Wei Ren, Wei Dong:

Multihop calibration for mobile sensing: K-hop Calibratability and reference sensor deployment. 1-9 - Yibo Wu

, Yi Wang, Guohong Cao:
Photo crowdsourcing for area coverage in resource constrained environments. 1-9 - Yiwei Zhuo, Hongzi Zhu, Hua Xue, Shan Chang:

Perceiving accurate CSI phases with commodity WiFi devices. 1-9 - Seongho Byeon, Kangjin Yoon, Changmok Yang, Sunghyun Choi:

STRALE: Mobility-aware PHY rate and frame aggregation length adaptation in WLANs. 1-9 - Sihui Han, Kang G. Shin:

Enhancing wireless performance using reflectors. 1-9 - Alireza Ameli Renani, Jun Huang

, Guoliang Xing, Abdol-Hossein Esfahanian:
Harnessing hardware defects for improving wireless link performance: Measurements and applications. 1-9 - Ganesh Chennimala Sankaran, Krishna M. Sivalingam

:
Combinatorial approach for network switch design in data center networks. 1-9 - Su Jia, Xin Jin, Golnaz Ghasemiesfeh, Jiaxin Ding, Jie Gao:

Competitive analysis for online scheduling in software-defined optical WAN. 1-9 - Yu Nakayama

, Takuya Tsutsumi, Kazuki Maruta
, Kaoru Sezaki:
ABSORB: Autonomous base station with optical reflex backhaul to adapt to fluctuating demand. 1-9 - Steven Gay, Renaud Hartert, Stefano Vissicchio:

Expect the unexpected: Sub-second optimization for segment routing. 1-9 - Huanle Xu, Gustavo de Veciana, Wing Cheong Lau:

Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysis. 1-9 - Yipei Niu

, Fangming Liu, Xincai Fei, Bo Li:
Handling flash deals with soft guarantee in hybrid cloud. 1-9 - Robert Birke, Juan F. Pérez

, Zhan Qiu, Mathias Björkqvist, Lydia Y. Chen:
Power of redundancy: Designing partial replication for multi-tier applications. 1-9 - Zhe Huang, S. Matthew Weinberg

, Liang Zheng, Carlee Joe-Wong, Mung Chiang:
Discovering valuations and enforcing truthfulness in a deadline-aware scheduler. 1-9 - Xu Zheng, Zhipeng Cai

, Jianzhong Li, Hong Gao:
Location-privacy-aware review publication mechanism for local business service systems. 1-9 - Shaowei Wang, Yiwen Nie, Pengzhan Wang, Hongli Xu, Wei Yang, Liusheng Huang:

Local private ordinal data distribution estimation. 1-9 - Hai Liu, Xinghua Li, Hui Li, Jianfeng Ma, XinDi Ma:

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. 1-9 - Marco Gramaglia, Marco Fiore, Alberto Tarable, Albert Banchs:

Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories. 1-9 - Abhishek Sinha, Eytan H. Modiano:

Optimal control for generalized network-flow problems. 1-9 - Kai Lampka, Steffen Bondorf

, Jens B. Schmitt, Nan Guan
, Wang Yi:
Generalized finitary real-time calculus. 1-9 - Peng-Jun Wan, Huaqiang Yuan, Xiaohua Jia, Jiliang Wang, Zhu Wang:

Maximum-weighted subset of communication requests schedulable without spectral splitting. 1-9 - Subhashini Krishnasamy, P. T. Akhil, Ari Arapostathis

, Sanjay Shakkottai, Rajesh Sundaresan:
Augmenting max-weight with explicit learning for wireless scheduling with switching costs. 1-9 - Yuxiao Hou, Yuanqing Zheng:

PHY assisted tree-based RFID identification. 1-9 - Jia Liu, Feng Zhu, Yanyan Wang, Xia Wang, Qing-feng Pan, Lijun Chen:

RF-scanner: Shelf scanning with robot-assisted RFID systems. 1-9 - Min Chen, Jia Liu, Shigang Chen, Yan Qiao, Yuanqing Zheng:

DBF: A general framework for anomaly detection in RFID systems. 1-9 - Henko Aantjes, Amjad Yousef Majid

, Przemyslaw Pawelczak, Jethro Tan, Aaron N. Parks, Joshua R. Smith:
Fast downstream to many (computational) RFIDs. 1-9 - Zhe Chen, Xu Zhang, Sulei Wang, Yuedong Xu, Jie Xiong

, Xin Wang:
BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming. 1-9 - Meenupriya Swaminathan, Anna Vizziello

, Davy Duong, Pietro Savazzi, Kaushik R. Chowdhury
:
Beamforming in the body: Energy-efficient and collision-free communication for implants. 1-9 - Abdul Salam

, Mehmet C. Vuran
:
Smart underground antenna arrays: A soil moisture adaptive beamforming approach. 1-9 - Joan Palacios, Danilo De Donno

, Joerg Widmer
:
Tracking mm-Wave channel dynamics: Fast beam training strategies under mobility. 1-9 - Hongli Xu, Zhuolong Yu, Chen Qian, Xiang-Yang Li, Zichun Liu:

Minimizing flow statistics collection cost of SDN using wildcard requests. 1-9 - Wenrui Ma

, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou:
Traffic aware placement of interdependent NFV middleboxes. 1-9 - Peng Zhang:

Towards rule enforcement verification for software defined networks. 1-9 - RhongHo Jang

, DongGyu Cho, Youngtae Noh
, DaeHun Nyang:
RFlow+: An SDN-based WLAN monitoring and management framework. 1-9 - Parimal Parag

, Archana Bura, Jean-François Chamberland
:
Latency analysis for distributed storage. 1-9 - Vaneet Aggarwal

, Jingxian Fan, Tian Lan:
Taming tail latency for erasure-coded, distributee storage systems. 1-9 - Shuzhan Wei, Yongkun Li, Yinlong Xu, Si Wu:

DSC: Dynamic stripe construction for asynchronous encoding in clustered file system. 1-9 - Xuefeng Liu, Wenhai Sun

, Wenjing Lou, Qingqi Pei, Yuqing Zhang:
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. 1-9 - Michael Dinitz

, Jeremy T. Fineman, Seth Gilbert
, Calvin Newport:
Load balancing with bounded convergence in dynamic networks. 1-9 - Hongli Xu, He Huang, Shigang Chen, Gongming Zhao:

Scalable software-defined networking through hybrid switching. 1-9 - Syed Mohammad Irteza

, Hafiz Mohsin Bashir, Talal Anwar, Ihsan Ayyub Qazi
, Fahad Rafique Dogar:
Load balancing over symmetric virtual topologies. 1-9 - Stefanie Roos, Martin Byrenheid, Clemens Deusser, Thorsten Strufe:

BD-CAT: Balanced dynamic content addressing in trees. 1-9 - Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:

AccountTrade: Accountable protocols for big data trading against dishonest consumers. 1-9 - Xin Yao, Rui Zhang, Yanchao Zhang, Yaping Lin:

Verifiable social data outsourcing. 1-9 - Prasanna Giridhar, Shiguang Wang, Tarek F. Abdelzaher, Raghu K. Ganti, Lance M. Kaplan, Jemin George:

On localizing urban events with Instagram. 1-9 - Yinghao Yu, Wei Wang

, Jun Zhang
, Khaled Ben Letaief
:
LRC: Dependency-aware cache management for data analytics clusters. 1-9 - Yehuda Afek, Anat Bremler-Barr, Lior Shafir:

Network anti-spoofing with SDN data plane. 1-9 - Shang Gao

, Zhe Peng
, Bin Xiao, Aiqun Hu, Kui Ren:
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. 1-9 - Anat Bremler-Barr, Eli Brosh, Mor Sides:

DDoS attack on cloud auto-scaling mechanisms. 1-9 - Mathieu Jadin, Gautier Tihon, Olivier Pereira, Olivier Bonaventure:

Securing multipath TCP: Design & implementation. 1-9 - Mark van der Boor, Sem C. Borst, Johan van Leeuwaarden:

Load balancing in large-scale systems with multiple dispatchers. 1-9 - Wasiur R. KhudaBukhsh

, Amr Rizk, Alexander Frömmgen, Heinz Koeppl:
Optimizing stochastic scheduling in fork-join queueing models: Bounds and applications. 1-9 - Arjun Anand, Gustavo de Veciana:

Measurement-based scheduler for multi-class QoE optimization in wireless networks. 1-9 - Alex Davydow, Pavel Chuprikov

, Sergey I. Nikolenko
, Kirill Kogan
:
Throughput optimization with latency constraints. 1-9 - Yu Luo, Lina Pu, Yanxiao Zhao, Guodong Wang, Min Song:

Optimal energy requesting strategy for RF-based energy harvesting wireless communications. 1-9 - Haipeng Dai

, Xiaoyu Wang, Alex X. Liu, Huizhen Ma, Guihai Chen
:
Optimizing wireless charger placement for directional charging. 1-9 - Fei Wang, Xi Zhang:

Secure resource allocations for polarization-enabled cooperative cognitive radio networks with energy harvesting capability. 1-9 - Li Yan, Haiying Shen, Juanjuan Zhao, Chengzhong Xu

, Feng Luo, Chenxi Qiu:
CatCharger: Deploying wireless charging lanes in a metropolitan road network through categorization and clustering of vehicle traffic. 1-9 - Xianjin Xia

, ShiNing Li, Yu Zhang, Lin Li, Tao Gu
, Yongji Liu, Yan Pan:
Surviving screen-off battery through out-of-band Wi-Fi coordination. 1-9 - Meng Jin, Yuan He, Dingyi Fang, Xiaojiang Chen, Xin Meng, Tianzhang Xing:

iGuard: A real-time anti-theft system for smartphones. 1-9 - Xiangyu Xu

, Hang Gao, Jiadi Yu, Yingying Chen
, Yanmin Zhu, Guangtao Xue, Minglu Li:
ER: Early recognition of inattentive driving leveraging audio devices on smartphones. 1-9 - Yi Gao, Yang Luo, Daqing Chen, Haocheng Huang, Wei Dong, Mingyuan Xia, Xue Liu, Jiajun Bu:

Every pixel counts: Fine-grained UI rendering analysis for mobile applications. 1-9 - Guanyu Gao, Yonggang Wen, Han Hu:

QDLCoding: QoS-differentiated low-cost video encoding scheme for online video service. 1-9 - Ming Tang, Shou Wang, Lin Gao, Jianwei Huang, Lifeng Sun:

MOMD: A multi-object multi-dimensional auction for crowdsourced mobile video streaming. 1-9 - Kazuhisa Matsuzono, Hitoshi Asaeda

, Thierry Turletti:
Low latency low loss streaming using in-network coding and caching. 1-9 - Ahmed Badr, Ashish Khisti, Wai-tian Tan, Xiaoqing Zhu, John G. Apostolopoulos:

FEC for VoIP using dual-delay streaming codes. 1-9 - Guoming Tang, Kui Wu, Richard Brunner:

Rethinking CDN design with distributee time-varying traffic demands. 1-9 - Samta Shukla, Alhussein A. Abouzeid

:
Proactive retention aware caching. 1-9 - Li Qiu, Guohong Cao:

Popularity-aware caching increases the capacity of wireless networks. 1-9 - Livia Elena Chatzieleftheriou

, Merkourios Karaliopoulos, Iordanis Koutsopoulos:
Caching-aware recommendations: Nudging user preferences towards better caching performance. 1-9 - Mingjun Xiao, Jie Wu, Sheng Zhang, Jiapeng Yu:

Secret-sharing-based secure user recruitment protocol for mobile crowdsensing. 1-9 - Shengzhong Liu, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Guihai Chen

:
Context-aware data quality estimation in mobile crowdsensing. 1-9 - Qiang Xu, Rong Zheng:

When data acquisition meets data analytics: A distributed active learning framework for optimal budgeted mobile crowdsensing. 1-9 - Man Hon Cheung, Fen Hou, Jianwei Huang:

Make a difference: Diversity-driven social mobile crowdsensing. 1-9 - Yu Sang, Bo Ji

, Gagan Raj Gupta, Xiaojiang Du, Lin Ye:
Provably efficient algorithms for joint placement and allocation of virtual network functions. 1-9 - Rui Han, Fan Zhang, Zhentao Wang:

AccurateML: Information-aggregation-based approximate processing for fast and accurate machine learning on MapReduce. 1-9 - Juan F. Pérez

, Robert Birke, Lydia Y. Chen:
On the latency-accuracy tradeoff in approximate MapReduce jobs. 1-9 - Hao Feng, Jaime Llorca

, Antonia M. Tulino
, Danny Raz, Andreas F. Molisch:
Approximation algorithms for the NFV service distribution problem. 1-9 - János Tapolcai, Lajos Rónyai, Bálazs Vass

, Laszlo Gyimothi:
List of shared risk link groups representing regional failures with limited size. 1-9 - Ying Zhang, Wenfei Wu, Sujata Banerjee

, Joon-Myung Kang
, Mario A. Sánchez:
SLA-verifier: Stateful and quantitative verification for service chaining. 1-9 - Stefano Ciavarella, Novella Bartolini

, Hana Khamfroush, Thomas La Porta:
Progressive damage assessment and network recovery after massive failures. 1-9 - Yigal Bejerano, Chandru Raman, Chun-Nam Yu, Varun Gupta, Craig Gutterman, Tomas Young, Hugo Infante, Yousef Abdelmalek, Gil Zussman:

DyMo: Dynamic monitoring of large scale LTE-Multicast systems. 1-9 - Meng Zhang, Lin Gao, Jianwei Huang, Michael L. Honig:

Cooperative and competitive operator pricing for mobile crowdsourced internet access. 1-9 - Dario Bega, Marco Gramaglia, Albert Banchs, Vincenzo Sciancalepore

, Konstantinos Samdanis
, Xavier Pérez Costa
:
Optimising 5G infrastructure markets: The business of network slicing. 1-9 - Pablo Caballero Garces, Albert Banchs, Gustavo de Veciana, Xavier Pérez Costa

:
Network slicing games: Enabling customization in multi-tenant networks. 1-9 - Mao Zou, Richard T. B. Ma

, Xin Wang, Yinlong Xu:
On optimal service differentiation in congested network markets. 1-9 - Peshal Nayak, Michele Garetto, Edward W. Knightly:

Multi-user downlink with single-user uplink can starve TCP. 1-9 - Dolvara Gunatilaka, Mo Sha

, Chenyang Lu:
Impacts of channel selection on industrial wireless sensor-actuator networks. 1-9 - Andrea Baiocchi, Ilenia Tinnirello, Domenico Garlisi

, Alice Lo Valvo
:
Random access with repeated contentions for emerging wireless technologies. 1-9 - Chao-Fang Shih, Raghupathy Sivakumar:

Switch: Enabling transmitter and receiver participation in seamless lightweight control. 1-9 - Wenchi Cheng, Xi Zhang, Hailin Zhang:

Pilot-based full-duplex spectrum-sensing and multichannel-MAC over non-time-slotted cognitive radio networks. 1-9 - Xingya Liu, Jiang Xie:

A 2D heterogeneous rendezvous protocol for multi-wideband cognitive radio networks. 1-9 - Changhee Joo, Ness B. Shroff:

A novel coupled queueing model to control traffic via QoS-aware collision pricing in cognitive radio networks. 1-9 - Amr Abdelfattah, Naceur Malouch:

Modeling and performance analysis of Wi-Fi networks coexisting with LTE-U. 1-9 - Yanyuan Qin, Ruofan Jin, Shuai Hao, Krishna R. Pattipati, Feng Qian, Subhabrata Sen, Bing Wang, Chaoqun Yue:

A control theoretic approach to ABR video streaming: A fresh look at PID-based rate adaptation. 1-9 - Tong Zhang, Fengyuan Ren, Wenxue Cheng, Xiaohui Luo, Ran Shu, Xiaolan Liu:

Modeling and analyzing the influence of chunk size variation on bitrate adaptation in DASH. 1-9 - Cong Zhang, Qiyun He, Jiangchuan Liu, Zhi Wang:

Beyond the touch: Interaction-aware mobile gamecasting with gazing pattern prediction. 1-9 - Khaled Diab, Mohamed Hefeeda

:
MASH: A rate adaptation algorithm for multiview video streaming over HTTP. 1-9 - Ian D. Markwood, Yao Liu, Kevin A. Kwiat, Charles A. Kamhoua:

Electric grid power flow model camouflage against topology leaking attacks. 1-9 - Zhuo Lu, Mingkui Wei, Xiang Lu:

How they interact? Understanding cyber and physical interactions against fault propagation in smart grid. 1-9 - Xin Lou, Rui Tan, David K. Y. Yau, Peng Cheng:

Cost of differential privacy in demand reporting for smart grid economic dispatch. 1-9 - Ali Sehati, Majid Ghaderi:

Energy-delay tradeoff for request bundling on smartphones. 1-9 - Lorenzo De Carli

, Ruben Torres, Gaspar Modelo-Howard, Alok Tongaonkar, Somesh Jha:
Botnet protocol inference in the presence of encrypted traffic. 1-9 - Antonios A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos

, Panagiotis Ilia
, Evangelos P. Markatos:
CCSP: A compressed certificate status protocol. 1-9 - Binghui Wang, Le Zhang

, Neil Zhenqiang Gong:
SybilSCAR: Sybil detection in online social networks via local rule based propagation. 1-9 - Shouling Ji, Shukun Yang, Anupam Das, Xin Hu, Raheem A. Beyah

:
Password correlation: Quantification, evaluation and application. 1-9 - Alan Kuhnle, Tianyi Pan, Md Abdul Alim, My T. Thai:

Scalable bicriteria algorithms for the threshold activation problem in online social networks. 1-9 - Xiang Li, J. David Smith, Thang N. Dinh

, My T. Thai:
Why approximate when you can get the exact? Optimal targeted viral marketing at scale. 1-9 - Zhao Zhang, Yishuo Shi, James Willson, Ding-Zhu Du, Guangmo Tong:

Viral marketing with positive influence. 1-8 - Chul-Ho Lee, Xin Xu

, Do Young Eun
:
On the rao-blackwellization and its application for graph sampling via neighborhood exploration. 1-9 - Yunlong Wu, Bo Zhang, Shaoshi Yang

, Xiaodong Yi, Xuejun Yang:
Energy-efficient joint communication-motion planning for relay-assisted wireless robot surveillance. 1-9 - Tuo Shi

, Siyao Cheng, Jianzhong Li, Zhipeng Cai
:
Constructing connected dominating sets in battery-free networks. 1-9 - Yi Gao, Wei Dong, Xiaoyu Zhang, Wenbin Wu:

Universal path tracing for large-scale sensor networks. 1-9 - Fujuan Guo, Baofeng Zhou, Mehmet C. Vuran

:
CFOSynt: Carrier frequency offset assisted clock syntonization for wireless sensor networks. 1-9 - Xiaojian Lin, Shaowei Wang:

Efficient remote radio head switching scheme in cloud radio access network: A load balancing perspective. 1-9 - David W. Griffith, Aziza Ben Mosbah

, Richard Rouil
:
Group discovery time in device-to-device (D2D) proximity services (ProSe) networks. 1-9 - Roberto Calvo-Palomino, Domenico Giustiniano

, Vincent Lenders
, Aymen Fakhreddine
:
Crowdsourcing spectrum data decoding. 1-9 - Ying Zhang, Lei Deng

, Minghua Chen
, Peijian Wang:
Joint bidding and geographical load balancing for datacenters: Is uncertainty a blessing or a curse? 1-9 - Abdul Kabbani, Milad Sharif:

Flier: Flow-level congestion-aware routing for direct-connect data centers. 1-9 - Rui Zhu, Di Niu, Baochun Li, Zongpeng Li:

Optimal multicast in virtualized datacenter networks with software switches. 1-9 - Ziyang Li, Wei Bai, Kai Chen, Dongsu Han

, Yiming Zhang, Dongsheng Li, Hongfang Yu:
Rate-aware flow scheduling for commodity data center networks. 1-9 - Yong Li, Wei Gao:

Interconnecting heterogeneous devices in the personal mobile cloud. 1-9 - Liuhua Chen, Haiying Shen:

Considering resource demand misalignments to reduce resource over-provisioning in cloud datacenters. 1-9 - Jaya Prakash Champati, Ben Liang

:
Efficient minimization of sum and differential costs on machines with job placement constraints. 1-9 - Wenchao Jiang, Zhimeng Yin, Song Min Kim, Tian He:

Transparent cross-technology communication over data traffic. 1-9 - Jie Ren, Ling Gao, Hai Wang, Zheng Wang

:
Optimise web browsing on heterogeneous mobile platforms: A machine learning based approach. 1-9 - Qingjun Xiao, You Zhou, Shigang Chen:

Better with fewer bits: Improving the performance of cardinality estimation of large data streams. 1-9 - Angelo Furno

, Marco Fiore, Razvan Stanica:
Joint spatial and temporal classification of mobile traffic demands. 1-9 - Jing Wang, Jian Tang, Zhiyuan Xu, Yanzhi Wang, Guoliang Xue, Xing Zhang, Dejun Yang

:
Spatiotemporal modeling and prediction in cellular networks: A big data enabled deep learning approach. 1-9 - Novella Bartolini

, Ting He, Hana Khamfroush:
Fundamental limits of failure identifiability by boolean network tomography. 1-9 - Sergey I. Nikolenko

, Kirill Kogan
, Antonio Fernández Anta:
Network simplification preserving bandwidth and routing capabilities. 1-9 - Josu Doncel

, Samuli Aalto
, Urtzi Ayesta:
Economies of scale in parallel-server systems. 1-9 - Xinzhe Fu, Zhiying Xu, Qianyang Peng, Luoyi Fu, Xinbing Wang:

Complexity vs. optimality: Unraveling source-destination connection in uncertain graphs. 1-9 - Kongyang Chen, Guang Tan:

SatProbe: Low-energy and fast indoor/outdoor detection based on raw GPS processing. 1-9 - Jin Wang, Nicholas Tan, Jun Luo

, Sinno Jialin Pan
:
WOLoc: WiFi-only outdoor localization using crowdsensed hotspot labels. 1-9 - Robert Margolies, Richard A. Becker, Simon D. Byers, Supratim Deb, Rittwik Jana, Simon Urbanek

, Chris Volinsky
:
Can you find me now? Evaluation of network-based localization in a 4G LTE network. 1-9 - Mah-Rukh Fida, Andra Lutu, Mahesh K. Marina, Ozgu Alay:

ZipWeave: Towards efficient and reliable measurement based mobile coverage maps. 1-9 - Jiayao Tan, Cam-Tu Nguyen, Xiaoliang Wang:

SilentTalk: Lip reading through ultrasonic sensing on mobile phones. 1-9 - Yu-Lin Wei

, Hsin-I Wu, Han-Chung Wang, Hsin-Mu Tsai, Kate Ching-Ju Lin, Rayana Boubezari, Hoa Le Minh
, Zabih Ghassemlooy:
LiCompass: Extracting orientation from polarized light. 1-9 - Huijie Chen

, Fan Li, Yu Wang:
EchoTrack: Acoustic device-free hand tracking on smart phones. 1-9 - Han Xu, Zheng Yang, Zimu Zhou, Ke Yi, Chunyi Peng:

TUM: Towards ubiquitous multi-device localization for cross-device interaction. 1-9 - Wenjun Jiang

, Jie Wu:
Active opinion-formation in online social networks. 1-9 - Aakas Zhiyuli, Xun Liang

, Zhiming Xu:
Learning distributed representations for large-scale dynamic social networks. 1-9 - Weiyu Chen, Christopher G. Brinton

, Da Cao, Mung Chiang:
Behavior in social learning networks: Early detection for online short-courses. 1-9 - Guangchi Liu, Qi Chen, Qing Yang, Binhai Zhu, Honggang Wang

, Wei Wang
:
OpinionWalk: An efficient solution to massive trust assessment in online social networks. 1-9 - Zhimeng Yin, Wenchao Jiang, Song Min Kim, Tian He:

C-Morse: Cross-technology communication with transparent Morse coding. 1-9 - Xiuzhen Guo, Xiaolong Zheng, Yuan He:

WiZig: Cross-technology energy communication over a noisy channel. 1-9 - Zicheng Chi, Zhichuan Huang, Yao Yao, Tiantian Xie, Hongyu Sun, Ting Zhu:

EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices. 1-9 - Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto:

Contact avoidance routing in delay tolerant networks. 1-9 - Haiming Jin, Lu Su, Klara Nahrstedt:

CENTURION: Incentivizing multi-requester mobile crowd sensing. 1-9 - Chao Huang, Dong Wang, Shenglong Zhu:

Where are you from: Home location profiling of crowd sensors from noisy and sparse crowdsourcing data. 1-9 - Ayon Chakraborty, Md. Shaifur Rahman, Himanshu Gupta, Samir R. Das:

SpecSense: Crowdsensing for efficient querying of spectrum occupancy. 1-9 - Chenglin Miao

, Lu Su, Wenjun Jiang, Yaliang Li, Miaomiao Tian:
A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. 1-9 - Juan Li

, Yanmin Zhu, Jiadi Yu, Chengnian Long, Guangtao Xue, Shiyou Qian:
Online auction for IaaS clouds: Towards elastic user demands and weighted heterogeneous VMs. 1-9 - Haisheng Tan, Zhenhua Han, Xiang-Yang Li, Francis C. M. Lau:

Online job dispatching and scheduling in edge-clouds. 1-9 - Rui Zhu, Di Niu, Zongpeng Li:

Robust web service recommendation via quantile matrix factorization. 1-9 - Xiaoxi Zhang, Chuan Wu

, Zongpeng Li, Francis C. M. Lau:
Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimization. 1-9 - Setareh Sharifian, Fuchun Lin, Reihaneh Safavi-Naini:

Secret key agreement using a virtual wiretap channel. 1-9 - Pengwei Wang, Reihaneh Safavi-Naini:

Interactive message transmission over adversarial wiretap channel II. 1-9 - Kai-Wei Jiang

, Tao Jing, Zhen Li, Yan Huo
, Fan Zhang:
Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver. 1-9 - Matthew Bradbury

, Arshad Jhumka:
Understanding source location privacy protocols in sensor networks via perturbation of time series. 1-9 - Liang Zheng, Carlee Joe-Wong, Jiasi Chen

, Christopher G. Brinton
, Chee Wei Tan
, Mung Chiang:
Economic viability of a virtual ISP. 1-9 - Debasis Mitra, Qiong Wang, Ao Hong:

Emerging internet content and service providers' relationships: Models and analyses of engineering, business and policy impact. 1-9 - John Z. F. Pang, Hu Fu, Won I. Lee, Adam Wierman:

The efficiency of open access in platforms for networked cournot markets. 1-9 - Diego Ximenes Mendes, Edmundo de Souza e Silva, Daniel Sadoc Menasché, Rosa Maria Meri Leão, Don Towsley

:
An experimental reality check on the scaling laws of swarming systems. 1-9 - Chi-Han Lin, Yi-Ting Chen, Kate Ching-Ju Lin, Wen-Tsuen Chen:

acPad: Enhancing channel utilization for 802.11ac using packet padding. 1-9 - Seongwon Kim, Jaehong Yi, Youngwook Son

, Seungmin Yoo, Sunghyun Choi:
Quiet ACK: ACK transmit power control in IEEE 802.11 WLANs. 1-9 - Gyujin Lee, Yeonchul Shin, Jonghoe Koo, Junyoung Choi

, Sunghyun Choi:
ACT-AP: ACTivator access point for multicast over WLAN. 1-9 - Ramanujan K. Sheshadri

, Dimitrios Koutsonikolas:
On packet loss rates in modern 802.11 networks. 1-9 - Alessio Marcone, Massimiliano Pierobon

, Maurizio Magarini:
A parity check analog decoder for molecular communication based on biological circuits. 1-9 - Stefano Basagni, Valerio Di Valerio, Petrika Gjanci, Chiara Petrioli:

Finding MARLIN: Exploiting multi-modal communications for reliable and low-latency underwater networking. 1-9 - Giuseppe Enrico Santagati, Tommaso Melodia

:
An implantable low-power ultrasonic platform for the Internet of Medical Things. 1-9 - Zhenghao Zhang, Piyush Kumar:

mEEC: A novel error estimation code with multi-dimensional feature. 1-9 - Heng Pan, Gaogang Xie, Zhenyu Li, Peng He, Laurent Mathy:

FlowConvertor: Enabling portability of SDN applications. 1-9 - Konstantinos Poularakis, George Iosifidis

, Georgios Smaragdakis
, Leandros Tassiulas:
One step at a time: Optimizing SDN upgrades in ISP networks. 1-9 - Haopei Wang, Abhinav Srivastava, Lei Xu, Sungmin Hong, Guofei Gu:

Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds. 1-9 - Hesham Mekky, Fang Hao, Sarit Mukherjee, T. V. Lakshman, Zhi-Li Zhang:

Network function virtualization enablement within SDN data plane. 1-9 - Chase Q. Wu:

Bandwidth scheduling in overlay networks with linear capacity constraints. 1-9 - Parisa Rahimzadeh, Carlee Joe-Wong, Kyuyong Shin, Youngbin Im, Jongdeog Lee, Sangtae Ha:

SVC-TChain: Incentivizing good behavior in layered P2P video streaming. 1-9 - Omer Bilgen, Aaron B. Wagner:

A new stable peer-to-peer protocol with non-persistent peers. 1-9 - Bruce Spang, Anirudh Sabnis, Ramesh K. Sitaraman

, Donald F. Towsley
, Brian DeCleene:
MON: Mission-optimized overlay networks. 1-9 - László Toka, Balázs Lajtha, Éva Hosszu, Bence Formanek, Daniel Gehberger, János Tapolcai:

A resource-aware and time-critical IoT framework. 1-9 - Demetris Trihinas, George Pallis, Marios D. Dikaiakos:

ADMin: Adaptive monitoring dissemination for the Internet of Things. 1-9 - Jiansong Zhang, Zeyu Wang, Zhice Yang

, Qian Zhang
:
Proximity based IoT device authentication. 1-9 - So-Yeon Park, Sunil Lim, Dahee Jeong, Jungjin Lee, Joon-Sung Yang, HyungJune Lee

:
PUFSec: Device fingerprint-based security architecture for Internet of Things. 1-9 - Kathleen Sucipto, Dimitris Chatzopoulos

, Sokol Kosta
, Pan Hui:
Keep your nice friends close, but your rich friends closer - Computation offloading using NFC. 1-9 - Sladana Josilo

, György Dán:
A game theoretic analysis of selfish mobile computation offloading. 1-9 - Jaya Prakash Champati, Ben Liang

:
Single restart with time stamps for computational offloading in a semi-online setting. 1-9 - Meng-Hsi Chen, Ben Liang

, Min Dong
:
Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point. 1-9 - Yiming Zhang, Dongsheng Li, Tian Tian, Ping Zhong:

CubeX: Leveraging glocality of cube-based networks for RAM-based key-value store. 1-9 - Feng Wang

, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa:
Towards reliable and lightweight source switching for datacenter networks. 1-9 - Jingyuan Fan, Chaowen Guan, Yangming Zhao, Chunming Qiao:

Availability-aware mapping of service function chains. 1-9 - Hiroshi Saito, Hirotada Honda, Ryoichi Kawahara:

Disaster avoidance control against heavy rainfall. 1-9 - Mahmoud E. Ashour, Jingyao Wang, Constantino Lagoa

, Necdet Serhat Aybat
, Hao Che:
Non-concave network utility maximization: A distributed optimization approach. 1-9 - Peng-Jun Wan, Fahad Al-dhelaan, Huaqiang Yuan, Sai Ji:

Fractional wireless link scheduling and polynomial approximate capacity regions of wireless networks. 1-9 - Hao Yu, Michael J. Neely:

A new backpressure algorithm for joint rate control and routing with vanishing utility optimality gaps and finite queue lengths. 1-9 - Shay Vargaftik, Isaac Keslassy

, Ariel Orda:
Stable user-defined priorities. 1-9 - Jia Liu, Min Chen, Shigang Chen, Qing-feng Pan, Lijun Chen:

Tag-compass: Determining the spatial direction of an object with small dimensions. 1-9 - Shigeng Zhang, Xuan Liu, Jianxin Wang, Jiannong Cao:

Tag size profiling in multiple reader RFID systems. 1-9 - Chunhui Duan, Xing Rao, Lei Yang

, Yunhao Liu:
Fusing RFID and computer vision for fine-grained object tracking. 1-9 - Chouchang Yang, Jeremy Gummeson

, Alanson P. Sample
:
Riding the airways: Ultra-wideband ambient backscatter via commercial broadcast systems. 1-9 - Chao Wu, Yaoxue Zhang, Lan Zhang, Bowen Yang, Xu Chen, Wenwu Zhu, Lili Qiu:

ButterFly: Mobile collaborative rendering over GPU workload migration. 1-9 - Changhua Pei, Zhi Wang, Youjian Zhao, Zihan Wang, Yuan Meng, Dan Pei

, Yuanquan Peng, Wenliang Tang, Xiaodong Qu:
Why it takes so long to connect to a WiFi access point. 1-9 - Faraz Ahmed, Jeffrey Erman, Zihui Ge, Alex X. Liu, Jia Wang, He Yan:

Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic. 1-9 - Lei Xue

, Xiaobo Ma, Xiapu Luo
, Le Yu, Shuai Wang, Ting Chen:
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement. 1-9 - Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang

, Feng Xia
:
Exploiting social influence for context-aware event recommendation in event-based social networks. 1-9 - Bidisha Samanta, Abir De, Niloy Ganguly

:
STRM: A sister tweet reinforcement process for modeling hashtag popularity. 1-9 - Xin Xu

, Chul-Ho Lee, Do Young Eun
:
Challenging the limits: Sampling online social networks with cost constraints. 1-9 - Qiongzheng Lin

, Lei Yang
, Yunhao Liu:
TagScreen: Synchronizing social televisions through hidden sound markers. 1-9 - Qingkai Liang, Eytan H. Modiano:

Coflow scheduling in input-queued switches: Optimal delay scaling and algorithms. 1-9 - Wei Wang

, Shiyao Ma, Bo Li, Baochun Li:
Coflex: Navigating the fairness-efficiency tradeoff for coflow scheduling. 1-9 - Chang-Heng Wang, Siva Theja Maguluri, Tara Javidi

:
Heavy traffic queue length behavior in switches with reconfiguration delay. 1-9 - Sen Yang, Bill Lin, Paul Tune, Jun (Jim) Xu:

A simple re-sequencing load-balanced switch based on analytical packet reordering bounds. 1-9 - Jian Lin, Ming Li, Dejun Yang

, Guoliang Xue, Jian Tang:
Sybil-proof incentive mechanisms for crowdsensing. 1-9 - Chun-Chi Liu, Shengling Wang, Liran Ma

, Xiuzhen Cheng, Rongfang Bie, Jiguo Yu:
Mechanism design games for thwarting malicious behavior in crowdsourcing applications. 1-9 - Fudong Qiu, Zhengxian He, Linghe Kong

, Fan Wu:
MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic field. 1-9 - Bing Wang, Wei Song, Wenjing Lou, Y. Thomas Hou

:
Privacy-preserving pattern matching over encrypted genetic data in cloud computing. 1-9 - Qianwen Yin, Jasleen Kaur, F. Donelson Smith:

TCP Rapid: From theory to practice. 1-9 - Thomas Bonald, James W. Roberts, Christian Vitale:

Convergence to multi-resource fairness under end-to-end window control. 1-9 - Danfeng Shan, Fengyuan Ren:

Improving ECN marking scheme with micro-burst traffic in data center networks. 1-9 - Jia Zhao, Jiangchuan Liu, Haiyang Wang, Chi Xu:

Multipath TCP for datacenters: From energy efficiency perspective. 1-9 - Joan Palacios, Paolo Casari

, Joerg Widmer
:
JADE: Zero-knowledge device localization and environment mapping for millimeter wave systems. 1-9 - Zenghua Zhao, Jiankun Wang, Xingya Zhao, Chunyi Peng, Qian Guo, Bin Wu:

NaviLight: Indoor localization and navigation under arbitrary lights. 1-9 - Xi Chen, Chen Ma

, Michel Allegue, Xue Liu:
Taming the inconsistency of Wi-Fi fingerprints for device-free passive indoor localization. 1-9 - Ruipeng Gao, Bing Zhou, Fan Ye, Yizhou Wang:

Knitter: Fast, resilient single-user indoor floor plan construction. 1-9 - Anfu Zhou, Xinyu Zhang, Huadong Ma:

Beam-forecast: Facilitating mobile 60 GHz networks via model-driven beam steering. 1-9 - Quan Chen

, Hong Gao, Yingshu Li
, Siyao Cheng, Jianzhong Li:
Edge-based beaconing schedule in duty-cycled multihop wireless networks. 1-9 - Sudipta Saha, Mun Choon Chan:

Design and application of a many-to-one communication protocol. 1-9 - Huichen Dai, Bin Liu, Haowei Yuan, Patrick Crowley, Jianyuan Lu:

Analysis of tandem PIT and CS with non-zero download delay. 1-9 - Giovanni Neglia, Damiano Carra, Pietro Michiardi:

Cache policies for linear utility maximization. 1-9 - Minsheng Zhang, Vince Lehman, Lan Wang:

Scalable name-based data synchronization for named data networking. 1-9 - Jaeyoung Choi, Sangwoo Moon, Jiin Woo, Kyunghwan Son, Jinwoo Shin, Yung Yi:

Rumor source detection under querying with untruthful answers. 1-9 - Stefan Achleitner

, Thomas La Porta, Patrick D. McDaniel, Srikanth V. Krishnamurthy
, Alexander Poylisher, Constantin Serban:
Stealth migration: Hiding virtual machines on the network. 1-9 - Yong Xiao, Marwan Krunz:

QoE and power efficiency tradeoff for fog computing networks with fog node cooperation. 1-9 - Roy D. Yates, Mehrnaz Tavan, Yi Hu, Dipankar Raychaudhuri:

Timely cloud gaming. 1-9 - Xiumin Wang, Xiaoming Chen, Weiwei Wu:

Towards truthful auction mechanisms for task assignment in mobile device clouds. 1-9 - Chunqiang Hu, Abdulrahman Alhothaily, Arwa Alrawais, Xiuzhen Cheng, Carl Sturtivant

, Hang Liu:
A secure and verifiable outsourcing scheme for matrix inverse computation. 1-9 - Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra:

A signaling game model for moving target defense. 1-9 - Jing Chen, Shixiong Yao

, Quan Yuan, Ruiying Du, Guoliang Xue:
Checks and balances: A tripartite public key infrastructure for secure web-based connections. 1-9 - Amit Klein

, Haya Schulmann, Michael Waidner
:
Internet-wide study of DNS cache injections. 1-9 - Yongli Cheng, Hong Jiang, Fang Wang, Yu Hua, Dan Feng:

BlitzG: Exploiting high-bandwidth networks for fast graph processing. 1-9 - Tong Shu, Chase Q. Wu:

Performance optimization of Hadoop workflows in public clouds through adaptive task partitioning. 1-9 - Xinxin Mei, Xiaowen Chu

, Hai Liu, Yiu-Wing Leung, Zongpeng Li:
Energy efficient real-time task scheduling on CPU-GPU hybrid clusters. 1-9 - Dazhao Cheng, Yuan Chen, Xiaobo Zhou, Daniel Gmach, Dejan S. Milojicic

:
Adaptive scheduling of parallel jobs in spark streaming. 1-9 - Wei Wang, Yingjie Chen, Lin Yang, Qian Zhang

:
Detecting on-body devices through creeping wave propagation. 1-9 - Xiaonan Guo, Jian Liu, Yingying Chen

:
FitCoach: Virtual fitness coach empowered by wearable mobile devices. 1-9 - Lei Xie, Xu Dong, Wei Wang, Dawei Huang:

Meta-activity recognition: A wearable approach for logic cognition-based activity sensing. 1-9 - Xiaohui Liang

, Tianlong Yun, Ronald A. Peterson, David Kotz
:
LightTouch: Securely connecting wearables to ambient displays with user intent. 1-9 - Zhao Li, Kang G. Shin, Lu Zhen:

When and how much to neutralize interference? 1-9 - Kai-Cheng Hsu, Kate Ching-Ju Lin, Hung-Yu Wei

:
Inter-client interference cancellation for full-duplex networks. 1-9 - Tom Vermeulen, Mihir Laghate, Ghaith Hattab, Danijela Cabric, Sofie Pollin

:
Towards instantaneous collision and interference detection using in-band full duplex. 1-9 - Gaurang Naik

, Jinshan Liu, Jung-Min Park:
Coexistence of Dedicated Short Range Communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance. 1-9 - Ran Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner:

Randomized admission policy for efficient top-k and frequency estimation. 1-9 - Ran Ben-Basat, Gil Einziger, Roy Friedman, Yaron Kassner:

Optimal elephant flow detection. 1-9 - Gaogang Xie, Kun Xie, Jun Huang, Xin Wang, Yuxiang Chen, Jigang Wen:

Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection. 1-9 - Kun Xie, Can Peng, Xin Wang, Gaogang Xie, Jigang Wen:

Accurate recovery of internet traffic data under dynamic measurements. 1-9 - Fan Dang

, Pengfei Zhou
, Zhenhua Li, Ennan Zhai, Aziz Mohaisen, Qingfu Wen, Mo Li
:
Large-scale invisible attack on AFC systems with NFC-equipped smartphones. 1-9 - Yimin Chen, Jingchao Sun, Xiaocong Jin, Tao Li, Rui Zhang, Yanchao Zhang:

Your face your heart: Secure mobile face authentication with photoplethysmograms. 1-9 - Hao Fu, Zizhan Zheng

, Somdutta Bose, Matt Bishop
, Prasant Mohapatra:
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications. 1-9 - Yingyuan Yang, Jinyuan Sun:

Energy-efficient W-layer for behavior-based implicit authentication on mobile devices. 1-9 - Rahul Vaze:

Online knapsack problem and budgeted truthful bipartite matching. 1-9 - Jianan Zhang

, Eytan H. Modiano:
Robust routing in interdependent networks. 1-9 - Jiguo Yu, Xueli Ning, Yunchuan Sun, Shengling Wang, Yawei Wang:

Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR. 1-9 - Wenzhong Li, Jinggong Zhang, Yanchao Zhao:

Conflict graph embedding for wireless network optimization. 1-9 - Shih-Chun Lin

, Ian F. Akyildiz:
Dynamic base station formation for solving NLOS problem in 5G millimeter-wave communication. 1-9 - Sem C. Borst, Aliye Özge Kaya, Doru Calin, Harish Viswanathan:

Dynamic path selection in 5G multi-RAT wireless networks. 1-9 - Jian-Jhih Kuo

, Shan-Hsiang Shen, Hongyu Kang, De-Nian Yang
, Ming-Jer Tsai, Wen-Tsuen Chen:
Service chain embedding with maximum flow in software defined network and application to the next-generation cellular network architecture. 1-9 - Vincenzo Sciancalepore

, Konstantinos Samdanis
, Xavier Pérez Costa
, Dario Bega, Marco Gramaglia, Albert Banchs:
Mobile traffic forecasting for maximizing 5G network slicing resource utilization. 1-9 - Swadhin Pradhan

, Lili Qiu, Abhinav Parate, Kyu-Han Kim:
Understanding and managing notifications. 1-9 - Yimin Chen, Xiaocong Jin, Jingchao Sun, Rui Zhang, Yanchao Zhang:

POWERFUL: Mobile app fingerprinting via power analysis. 1-9 - Zhenjiang Li, Mo Li

, Prasant Mohapatra, Jinsong Han, Shuaiyu Chen:
iType: Using eye gaze to enhance typing privacy. 1-9 - Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, Steve Romig, Wei Zhao

:
On human mobility predictability via WLAN logs. 1-9

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














