


default search action
38th INFOCOM 2019: Paris, France
- 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019. IEEE 2019, ISBN 978-1-7281-0515-4

- Bahman Abolhassani, John Tadrous, Atilla Eryilmaz:

Wireless Multicasting for Content Distribution: Stability and Delay Gain Analysis. 1-9 - Konstantinos Poularakis, Jaime Llorca

, Antonia M. Tulino
, Ian J. Taylor, Leandros Tassiulas:
Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing Networks. 10-18 - Wei Wang

, Xin Liu, Yao Yao, Yan Pan, Zicheng Chi, Ting Zhu:
CRF: Coexistent Routing and Flooding using WiFi Packets in Heterogeneous IoT Networks. 19-27 - Itamar Cohen

, Gil Einziger, Roy Friedman, Gabriel Scalosub:
Access Strategies for Network Caching. 28-36 - Jaya Prakash Champati, Hussein Al-Zubaidy, James Gross:

On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* Systems: Exact Expressions and Bounds. 37-45 - Mengxue Liu, Andréa W. Richa, Matthias Rost, Stefan Schmid

:
A Constant Approximation for Maximum Throughput Multicommodity Routing And Its Application to Delay-Tolerant Network Scheduling. 46-54 - Bin Han

, Vincenzo Sciancalepore
, Di Feng
, Xavier Costa-Pérez
, Hans D. Schotten:
A Utility-Driven Multi-Queue Admission Control Solution for Network Slicing. 55-63 - Stanislav Lange, Leonardo Linguaglossa, Stefan Geissler, Dario Rossi, Thomas Zinner:

Discrete-Time Modeling of NFV Accelerators that Exploit Batched Processing. 64-72 - Tao Wu, Panlong Yang, Haipeng Dai

, Wanru Xu, Mingxue Xu:
Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSNs. 73-81 - Xi Zhang, Qixuan Zhu:

D2D Offloading for Statistical QoS Provisionings Over 5G Multimedia Mobile Wireless Networks. 82-90 - Saadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla:

Enhancing Cellular Performance via Vehicular-based Opportunistic Relaying and Load Balancing. 91-99 - Zhao Li, Jie Chen, Kang G. Shin, Jia Liu:

Interference Recycling: Exploiting Interfering Signals to Enhance Data Transmission. 100-108 - Bo Yin, Shuai Zhang, Yu Cheng

, Lin X. Cai
, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Only Those Requested Count: Proactive Scheduling Policies for Minimizing Effective Age-of-Information. 109-117 - Chengzhang Li, Shaoran Li, Y. Thomas Hou

:
A General Model for Minimizing Age of Information at Network Edge. 118-126 - Antonio Massaro, Francesco De Pellegrini, Lorenzo Maggi:

Optimal Trunk-Reservation by Policy Learning. 127-135 - Isfar Tariq, Rajat Sen, Gustavo de Veciana, Sanjay Shakkottai:

Online Channel-state Clustering And Multiuser Capacity Learning For Wireless Scheduling. 136-144 - Bruna Soares Peres, Otávio Augusto de Oliviera Souza, Olga Goussevskaia, Chen Avin, Stefan Schmid

:
Distributed Self-Adjusting Tree Networks. 145-153 - Fenghua Li, Zhe Sun

, Ang Li, Ben Niu, Hui Li, Guohong Cao:
HideMe: Privacy-Preserving Photo Sharing on Social Networks. 154-162 - Prasanna Karthik Vairam

, Gargi Mitra, Vignesh Manoharan, Chester Rebeiro, Byrav Ramamurthy, Kamakoti Veezhinathan:
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption. 163-171 - Shaohuai Shi

, Xiaowen Chu
, Bo Li:
MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD Algorithms. 172-180 - Shuyu Shi, Yaxiong Xie

, Mo Li
, Alex X. Liu, Jun Zhao
:
Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic Environments. 181-189 - Pengfei Liu, Panlong Yang, Wen-Zhan Song

, Yubo Yan, Xiang-Yang Li:
Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features. 190-198 - Tianhang Zheng

, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. 199-207 - Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu, Yu Cheng

:
A Unified Sampling and Scheduling Approach for Status Update in Multiaccess Wireless Networks. 208-216 - Milad Mahdian, Armin Moharrer, Stratis Ioannidis

, Edmund Yeh:
Kelly Cache Networks. 217-225 - Pariya Babaie, Eman Ramadan

, Zhi-Li Zhang:
Cache Network Management Using BIG Cache Abstraction. 226-234 - Georgios S. Paschos, Apostolos Destounis, Luigi Vigneri, George Iosifidis

:
Learning to Cache With No Regrets. 235-243 - Haisheng Tan, Shaofeng H.-C. Jiang

, Zhenhua Han, Liuyan Liu, Kai Han, Qinglin Zhao:
Camul: Online Caching on Multiple Caches with Relaying and Bypassing. 244-252 - Ruirong Chen, Wei Gao:

Enabling Cross-Technology Coexistence for Extremely Weak Wireless Devices. 253-261 - Taekyung Kim, Wonjun Lee:

Channel Independent Wi-Fi Backscatter Networks. 262-270 - Zihan Wang, Yuan Zhuang, Zhi Wang, Xin Wu:

Individual Data Plan in Virtual Network Operation: A Proactive Matching Approach. 271-279 - Dario Bega, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Pérez

:
DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning. 280-288 - Peng-Jun Wan, Zhu Wang, Huaqiang Yuan, Jinling Zhang, XuFei Mao:

Fair Rate Allocation over A Generalized Symmetric Polymatroid with Box Constraints. 289-297 - Ruozhou Yu

, Vishnu Teja Kilari, Guoliang Xue, Dejun Yang
:
Load Balancing for Interdependent IoT Microservices. 298-306 - Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu, Jianping Wu:

Octans: Optimal Placement of Service Function Chains in Many-Core Systems. 307-315 - Cuiying Feng

, Luning Wang, Kui Wu, Jianping Wang:
Bound-based Network Tomography with Additive Metrics. 316-324 - Djob Mvondo, Boris Teabe, Alain Tchana, Daniel Hagimont, Noel De Palma:

Memory flipping: a threat to NUMA virtual machines in the Cloud. 325-333 - Bin Shi, Haiying Shen:

Memory/Disk Operation Aware Lightweight VM Live Migration Across Data-centers with Low Performance Impact. 334-342 - Dinuni K. Fernando, Jonathan Terner, Kartik Gopalan

, Ping Yang:
Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live Migration. 343-351 - Jian Li, Jianmin Qian, Haibing Guan:

A Holistic Model for Performance Prediction and Optimization on NUMA-based Virtualized Systems. 352-360 - Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Huacheng Zeng:

EE-IoT: An Energy-Efficient IoT Communication Scheme for WLANs. 361-369 - Kunal Sankhe, Mauro Belgiovine, Fan Zhou, Shamnaz Riyaz, Stratis Ioannidis

, Kaushik R. Chowdhury
:
ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks. 370-378 - Mingyu Yang

, Li-Xuan Chuo, Karan Suri, Lu Liu, Hao Zheng, Hun-Seok Kim:
iLPS: Local Positioning System with Simultaneous Localization and Wireless Communication. 379-387 - Kai Lei

, Meng Qin, Bo Bai, Gong Zhang, Min Yang:
GCN-GAN: A Non-linear Temporal Link Prediction Model for Weighted Dynamic Networks. 388-396 - Qingkai Liang, Eytan H. Modiano:

Optimal Network Control in Partially-Controllable Networks. 397-405 - Chaoqun You:

Hierarchical Multi-resource Fair Queueing for Network Function Virtualization. 406-414 - Paolo Laffranchini, Luís E. T. Rodrigues, Marco Canini

, Balachander Krishnamurthy:
Measurements As First-class Artifacts. 415-423 - Sandeep Kumar Singh

, Admela Jukan:
Computing Blocking Probabilities in Elastic Optical Networks with Spectrum Defragmentation. 424-432 - Ahmed Khalid

, Ahmed H. Zahran
, Cormac J. Sreenan:
RTOP: Optimal User Grouping and SFN Clustering for Multiple eMBMS Video Sessions. 433-441 - Salvatore D'Oro

, Francesco Restuccia, Alessandro Talamonti, Tommaso Melodia
:
The Slice Is Served: Enforcing Radio Access Network Slicing in Virtualized 5G Systems. 442-450 - Lou Salaun, Marceau Coupechoux, Chung Shue Chen:

Weighted Sum-Rate Maximization in Multi-Carrier NOMA with Cellular Power Constraint. 451-459 - Pu Wang, Ning Wang, Monireh Dabaghchian

, Kai Zeng, Zheng Yan
:
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise. 460-468 - Klaus-Tycho Foerster

, Yvonne-Anne Pignolet, Stefan Schmid
, Gilles Trédan:
CASA: Congestion and Stretch Aware Static Fast Rerouting. 469-477 - Huanle Xu, Yang Liu, Wing Cheong Lau, Jun Guo, Alex X. Liu:

Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability. 478-486 - Tian Pan

, Enge Song, Zizheng Bian, Xingchen Lin, Xiaoyu Peng, Jiao Zhang, Tao Huang
, Bin Liu, Yunjie Liu:
INT-path: Towards Optimal Path Planning for In-band Network-Wide Telemetry. 487-495 - Sisi Xiong, Qing Cao, Weisheng Si

:
Adaptive Path Tracing with Programmable Bloom Filters in Software-Defined Networks. 496-504 - Yixin Bao, Yanghua Peng, Chuan Wu

:
Deep Learning-based Job Placement in Distributed Machine Learning Clusters. 505-513 - Stephen Pasteris, Shiqiang Wang, Mark Herbster, Ting He:

Service Placement with Provable Guarantees in Heterogeneous Edge Computing Systems. 514-522 - Gamal Sallam, Bo Ji

:
Joint Placement and Allocation of Virtual Network Functions with Budget and Capacity Constraints. 523-531 - Chen Chen, Wei Wang, Bo Li:

Round-Robin Synchronization: Mitigating Communication Bottlenecks in Parameter Servers. 532-540 - Yongzhi Wang

, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. 541-549 - Mohannad Alhanahnah, Qiben Yan

, Hamid Bagheri, Hao Zhou
, Yutaka Tsutano, Witawas Srisa-an
, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. 550-558 - Liyao Xiang, Jingbo Yang, Baochun Li:

Differentially-Private Deep Learning from an optimization Perspective. 559-567 - Chaoyue Niu, Zhenzhe Zheng, Shaojie Tang, Xiaofeng Gao, Fan Wu:

Making Big Money from Small Sensors: Trading Time-Series Data under Pufferfish Privacy. 568-576 - Zicheng Chi, Yan Li, Zhichuan Huang, Hongyu Sun, Ting Zhu:

Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data Stream. 577-585 - Vijay K. Shah, Simone Silvestri, Brian Luciano, Sajal K. Das:

X-CHANT: A Diverse DSA based Architecture for Next-generation Challenged Networks. 586-594 - Ali Rahmati, Xiaofan He, Ismail Güvenç, Huaiyu Dai:

Dynamic Mobility-Aware Interference Avoidance for Aerial Base Stations in Cognitive Radio Networks. 595-603 - Minh Vu, Lisong Xu, Sebastian G. Elbaum, Wei Sun, Kevin Qiao:

Efficient systematic testing of network protocols with temporal uncertain events. 604-612 - Moinul Hossain, Jiang Xie:

Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio Networks. 613-621 - Parinaz Naghizadeh

, Maria Gorlatova, Andrew S. Lan, Mung Chiang:
Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent Learning. 622-630 - Debasis Mitra, Abhinav Sridhar:

Consortiums of ISP-Content Providers Formed by Nash Bargaining for Internet Content Delivery. 631-639 - Costas Courcoubetis, Antonis Dimakis:

Throughput and Pricing of Ridesharing Systems. 640-648 - Shi Su, Wai-Tian Tan, Xiaoqing Zhu, Rob Liston:

Client Pre-Screening for MU-MIMO in Commodity 802.11ac Networks via Online Learning. 649-657 - Junyang Shi, Mo Sha

:
Parameter Self-Configuration and Self-Adaptation in Industrial Wireless Sensor-Actuator Networks. 658-666 - Vincenzo Mancuso, Paolo Castagno, Matteo Sereno, Marco Ajmone Marsan:

Slicing Cell Resources: The Case of HTC and MTC Coexistence. 667-675 - Amit Sheoran

, Sonia Fahmy
, Chunyi Peng, Navin Modi:
Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation. 676-684 - Damiano Carra, Giovanni Neglia, Pietro Michiardi:

TTL-based Cloud Caches. 685-693 - Guocong Quan, Jian Tan, Atilla Eryilmaz:

Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels. 694-702 - Rashid Tahir

, Sultan Durrani, Faizan Ahmed, Hammas Saeed, Fareed Zaffar, Muhammad Saqib Ilyas:
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web. 703-711 - Lailong Luo, Deke Guo, Ori Rottenstreich, Richard T. B. Ma

, Xueshan Luo, Bangbang Ren:
The Consistent Cuckoo Filter. 712-720 - Amjad Yousef Majid

, Michel Jansen, Guillermo Ortas Delgado, Kasim Sinan Yildirim
, Przemyslaw Pawelczak:
Multi-hop Backscatter Tag-to-Tag Networks. 721-729 - Marcelo Pizzutti, Alberto E. Schaeffer Filho:

Adaptive Multipath Routing based on Hybrid Data and Control Plane Operation. 730-738 - Harsh Gupta, Atilla Eryilmaz, R. Srikant:

Link Rate Selection using Constrained Thompson Sampling. 739-747 - Lixing Chen, Jie Xu

:
Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed Feedback. 748-756 - Suining He

, Kang G. Shin:
Crowd-Flow Graph Construction and Identification with Spatio-Temporal Signal Feature Fusion. 757-765 - Daniel Yue Zhang, Dong Wang:

An Integrated Top-down and Bottom-up Task Allocation Approach in Social Sensing based Edge Computing Systems. 766-774 - Li Lu

, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu
, Guangtao Xue, Minglu Li:
KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals. 775-783 - Pranvera Kortoçi, Liang Zheng, Carlee Joe-Wong, Mario Di Francesco, Mung Chiang:

Fog-based Data Offloading in Urban IoT Scenarios. 784-792 - Jian-Jhih Kuo

, Sheng-Hao Chiang, Shan-Hsiang Shen, De-Nian Yang
, Wen-Tsuen Chen:
Dynamic Multicast Traffic Engineering with Efficient Rerouting for Software-Defined Networks. 793-801 - Subhrendu Chattopadhyay

, Soumyajit Chatterjee, Sukumar Nandi
, Sandip Chakraborty:
Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications. 802-810 - Gengbiao Shen, Qing Li, Shuo Ai, Yong Jiang, Mingwei Xu, Xuya Jia:

How Powerful Switches Should be Deployed: A Precise Estimation Based on Queuing Theory. 811-819 - Junjie Xie, Chen Qian, Deke Guo, Minmei Wang, Shouqian Shi, Honghui Chen:

Efficient Indexing Mechanism for Unstructured Data Sharing Systems in Edge Computing. 820-828 - Shengling Wang, Chenyu Wang

, Qin Hu:
Corking by Forking: Vulnerability Analysis of Blockchain. 829-837 - Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. 838-846 - Minmei Wang, Chen Qian, Xin Li, Shouqian Shi:

Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. 847-855 - Chi Lin, Zhi Shang, Wan Du, Jiankang Ren, Lei Wang, Guowei Wu:

CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge. 856-864 - Chuyu Wang, Lei Xie, Keyan Zhang, Wei Wang, Yanling Bu, Sanglu Lu:

Spin-Antenna: 3D Motion Tracking for Tag Array Labeled Objects via Spinning Antenna. 865-873 - Jia Liu, Xingyu Chen, Shigang Chen, Xiulong Liu, Yanyan Wang, Lijun Chen:

TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag Matrix. 874-882 - Junchen Guo

, Ting Wang, Yuan He, Meng Jin, Chengkun Jiang, Yunhao Liu:
TwinLeak: RFID-based Liquid Leakage Detection in Industrial Environments. 883-891 - Ping Li, Zhenlin An

, Lei Yang
, Panlong Yang:
Towards Physical-Layer Vibration Sensing with RFIDs. 892-900 - Xu Wang, Randall A. Berry

:
Price Competition with LTE-U and WiFi. 901-909 - Fangxin Wang, Cong Zhang, Feng Wang, Jiangchuan Liu, Yifei Zhu

, Haitian Pang, Lifeng Sun:
Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoE. 910-918 - Meng Zhang, Jianwei Huang:

Mechanism Design for Network Utility Maximization with Private Constraint Information. 919-927 - Yunpeng Li, Costas Courcoubetis, Lingjie Duan

:
Recommending Paths: Follow or Not Follow? 928-936 - Yi Zhao, Zimu Zhou, Xu Wang, Tongtong Liu, Yunhao Liu, Zheng Yang:

CellTradeMap: Delineating Trade Areas for Urban Commercial Districts with Cellular Networks. 937-945 - Ran He, Jin Cao, Lisa Zhang, Denny Lee:

Statistical Enrichment Models for Activity Inference from Imprecise Location Data. 946-954 - Mohammed Alasmar

, George Parisis
, Richard G. Clegg, Nickolay Zakhleniuk:
On the Distribution of Traffic Volumes in the Internet and its Implications. 955-963 - Weili Chen, Jun Wu, Zibin Zheng

, Chuan Chen, Yuren Zhou:
Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network. 964-972 - Kyoungjun Park, Myungchul Kim:

EVSO: Environment-aware Video Streaming optimization of Power Consumption. 973-981 - Xiaoda Jiang, Hancheng Lu, Chang Wen Chen

, Feng Wu:
Receiver-driven Video Multicast over NOMA Systems in Heterogeneous Environments. 982-990 - Haitian Pang, Cong Zhang, Fangxin Wang, Jiangchuan Liu, Lifeng Sun:

Towards Low Latency Multi-viewpoint 360° Interactive Video: A Multimodal Deep Reinforcement Learning Approach. 991-999 - Bastian Alt

, Trevor Ballard, Ralf Steinmetz
, Heinz Koeppl, Amr Rizk:
CBA: Contextual Quality Adaptation for Adaptive Bitrate Video Streaming. 1000-1008 - Fabien Geyer, Steffen Bondorf

:
DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural Networks. 1009-1017 - Kunyi Chen, Hong Gao, Zhipeng Cai

, Quan Chen
, Jianzhong Li:
Distributed Energy-Adaptive Aggregation Scheduling with Coverage Guarantee For Battery-Free Wireless Sensor Networks. 1018-1026 - Yifei Zou, Dongxiao Yu, Libing Wu

, Jiguo Yu, Yu Wu, Qiang-Sheng Hua, Francis C. M. Lau:
Fast Distributed Backbone Construction Despite Strong Adversarial Jamming. 1027-1035 - Boaz Patt-Shamir, Will Rosenbaum

:
Space-Optimal Packet Routing on Trees. 1036-1044 - Wenqiang Jin, Mingyan Xiao, Ming Li, Linke Guo:

If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd Sensing. 1045-1053 - Merkouris Karaliopoulos, Iordanis Koutsopoulos, Leonidas Spiliopoulos

:
Optimal User Choice Engineering in Mobile Crowdsensing with Bounded Rational Users. 1054-1062 - Haiming Jin, Hongpeng Guo

, Lu Su, Klara Nahrstedt, Xinbing Wang:
Dynamic Task Pricing in Multi-Requester Mobile Crowd Sensing with Markov Correlated Equilibrium. 1063-1071 - Zai Shi, Atilla Eryilmaz:

A Flexible Distributed Optimization Framework for Service of Concurrent Tasks in Processing Networks. 1072-1080 - Geng Li, Yang Richard Yang, Franck Le, Yeon-Sup Lim, Junqi Wang:

Update Algebra: Toward Continuous, Non-Blocking Composition of Network Updates in SDN. 1081-1089 - Franck Le, Erich M. Nahum:

Experiences Implementing Live VM Migration over the WAN with Multi-Path TCP. 1090-1098 - Konstantinos Poularakis, Qiaofeng Qin, Liang Ma, Sastry Kompella

, Kin K. Leung, Leandros Tassiulas
:
Learning the Optimal Synchronization Rates in Distributed SDN Control Architectures. 1099-1107 - Hongli Xu, Shigang Chen, Qianpiao Ma

, Liusheng Huang:
Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks. 1108-1116 - Irmak Aykin, Berk Akgun, Marwan Krunz:

Smartlink: Exploiting Channel Clustering Effects for Reliable Millimeter Wave Communications. 1117-1125 - Anfu Zhou, Shaoyuan Yang, Yi Yang

, Yuhang Fan, Huadong Ma:
Autonomous Environment Mapping Using Commodity Millimeter-wave Network Device. 1126-1134 - William J. Tomlinson, Stella Banou

, Christopher Yu, Michele Nogueira, Kaushik R. Chowdhury
:
Secure On-skin Biometric Signal Transmission using Galvanic Coupling. 1135-1143 - Alireza Shahanaghi, Yaling Yang, R. Michael Buehrer:

On the Stochastic Link Modeling of Static Wireless Sensor Networks in Ocean Environments. 1144-1152 - Fatemah Alharbi, Jie Chang, Yuchen Zhou, Feng Qian, Zhiyun Qian

, Nael B. Abu-Ghazaleh
:
Collaborative Client-Side DNS Cache Poisoning Attack. 1153-1161 - Xiaoli Zhang, Huayi Duan

, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. 1162-1170 - Chang Liu, Longtao He, Gang Xiong

, Zigang Cao, Zhen Li:
FS-Net: A Flow Sequence Network For Encrypted Traffic Classification. 1171-1179 - Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu

:
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks. 1180-1188 - Erqun Dong, Jingao Xu, Chenshu Wu, Yunhao Liu, Zheng Yang:

Pair-Navi: Peer-to-Peer Indoor Navigation with Mobile Visual SLAM. 1189-1197 - Weijun Wang, Haipeng Dai

, Chao Dong, Xiao Cheng, Xiaoyu Wang, Guihai Chen
, Wanchun Dou:
PANDA: Placement of Unmanned Aerial Vehicles Achieving 3D Directional Coverage. 1198-1206 - Yuzhe Yang

, Zhiwen Hu, Kaigui Bian, Lingyang Song:
ImgSensingNet: UAV Vision Guided Aerial-Ground Air Quality Sensing System. 1207-1215 - Binyao Jiang, Yisheng Ji, Xiaohua Tian, Xinbing Wang:

Batch Reading Densely Arranged QR Codes. 1216-1224 - Yadong Xie, Fan Li, Yue Wu, Song Yang, Yu Wang:

D3-Guard: Acoustic-based Drowsy Driving Detection Using Smartphones. 1225-1233 - Chengwen Luo, Xingyu Feng, Junliang Chen, Jianqiang Li

, Weitao Xu
, Wei Li, Li Zhang, Zahir Tari
, Albert Y. Zomaya
:
Brush like a Dentist: Accurate Monitoring of Toothbrushing via Wrist-Worn Gesture Sensing. 1234-1242 - Shuochao Yao, Yiran Zhao, Huajie Shao, Dongxin Liu, Shengzhong Liu, Yifan Hao, Ailing Piao, Shaohan Hu, Su Lu, Tarek F. Abdelzaher:

SADeepSense: Self-Attention Deep Learning Framework for Heterogeneous On-Device Sensors in Internet of Things Applications. 1243-1251 - Yuanxing Zhang

, Pengyu Zhao, Kaigui Bian, Yunxin Liu, Lingyang Song, Xiaoming Li:
DRL360: 360-degree Video Streaming with Deep Reinforcement Learning. 1252-1260 - Shaoqi Wang, Wei Chen, Xiaobo Zhou, Sang-Yoon Chang, Mike Ji:

Addressing Skewness in Iterative ML Jobs with Parameter Partition. 1261-1269 - Wuyang Zhang, Sugang Li, Luyang Liu, Zhenhua Jia, Yanyong Zhang, Dipankar Raychaudhuri:

Hetero-Edge: Orchestration of Real-time Vision Applications on Heterogeneous Edge Clouds. 1270-1278 - Vajiheh Farhadi

, Fidan Mehmeti, Ting He, Tom La Porta, Hana Khamfroush, Shiqiang Wang, Kevin S. Chan:
Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds. 1279-1287 - Hao Wang, Di Niu, Baochun Li:

Distributed Machine Learning with a Serverless Architecture. 1288-1296 - Yanbing Yang

, Jun Luo
, Chen Chen
, Wen-De Zhong, Liangyin Chen:
SynLight: Synthetic Light Emission for Fast Transmission in COTS Device-enabled VLC. 1297-1305 - Zeyu Wang, Zhice Yang, Qianyi Huang, Lin Yang, Qian Zhang:

ALS-P: Light Weight Visible Light Positioning via Ambient Light Sensor. 1306-1314 - Hao Cui

, Huanyu Bian, Weiming Zhang, Nenghai Yu:
UnseenCode: Invisible On-screen Barcode with Image-based Extraction. 1315-1323 - Rens Bloom, Marco Zuniga

, Qing Wang
, Domenico Giustiniano
:
Tweeting with Sunlight: Encoding Data on Mobile Objects. 1324-1332 - Mathieu Jadin, Francois Aubry, Pierre Schaus, Olivier Bonaventure:

CG4SR: Near Optimal Traffic Engineering for Segment Routing with Column Generation. 1333-1341 - Khaled Diab, Mohamed Hefeeda

:
Joint Content Distribution and Traffic Engineering of Adaptive Videos in Telco-CDNs. 1342-1350 - Chen Avin, Kaushik Mondal, Stefan Schmid

:
Demand-Aware Network Design with Minimal Congestion and Route Lengths. 1351-1359 - Fan Zhou, Zijing Wen, Goce Trajcevski, Kunpeng Zhang

, Ting Zhong, Fang Liu:
Disentangled Network Alignment with Matching Explainability. 1360-1368 - Victor Valls, George Iosifidis

, Theodoros Salonidis:
Maximum Lifetime Analytics in IoT Networks. 1369-1377 - Fengqian Guo, Hancheng Lu, Daren Zhu, Hao Wu:

Interference-aware User Grouping Strategy in NOMA Systems with QoS Constraints. 1378-1386 - Nguyen Hoang Tran

, Wei Bao
, Albert Y. Zomaya
, Minh N. H. Nguyen, Choong Seon Hong
:
Federated Learning over Wireless Networks: Optimization Model Design and Analysis. 1387-1395 - Jie Chuai, Zhitang Chen, Guochen Liu, Xueying Guo, Xiaoxiao Wang, Xin Liu, Chongming Zhu, Feiyi Shen:

A Collaborative Learning Based Approach for Parameter Configuration of Cellular Networks. 1396-1404 - Ioannis Gasparis, Zhiyun Qian

, Chengyu Song
, Srikanth V. Krishnamurthy
, Rajiv Gupta
, Paul L. Yu:
Figment: Fine-grained Permission Management for Mobile Apps. 1405-1413 - Nima Eshraghi, Ben Liang

:
Joint Offloading Decision and Resource Allocation with Uncertain Task Computing Requirement. 1414-1422 - Chuang Hu

, Wei Bao
, Dan Wang
, Fengming Liu:
Dynamic Adaptive DNN Surgery for Inference Acceleration on the Edge. 1423-1431 - Hengrun Zhang, Kai Zeng:

Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge. 1432-1440 - Yang Liu, Huanle Xu, Wing Cheong Lau:

Online Job Scheduling with Resource Packing on a Cluster of Heterogeneous Servers. 1441-1449 - Klaus-Tycho Foerster

, Juho Hirvonen, Stefan Schmid
, Jukka Suomela
:
On the Power of Preprocessing in Decentralized Network Optimization. 1450-1458 - Bin Gao, Zhi Zhou, Fangming Liu, Fei Xu:

Winning at the Starting Line: Joint Network Selection and Service Placement for Mobile Edge Computing. 1459-1467 - Tao Ouyang, Rui Li, Xu Chen, Zhi Zhou, Xin Tang:

Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning Approach. 1468-1476 - He Li, Yaling Yang, Yanzhi Dou, Jung-Min "Jerry" Park, Kui Ren:

PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing. 1477-1485 - Lin He

, Gang Ren, Ying Liu:
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch. 1486-1494 - Mohamed Grissa, Attila A. Yavuz

, Bechir Hamdaoui:
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band. 1495-1503 - Xiaonan Zhang

, Pei Huang, Linke Guo, Mo Sha
:
Incentivizing Relay Participation for Securing IoT Communication. 1504-1512 - Cui Zhao, Zhenjiang Li, Ting Liu, Han Ding, Jinsong Han, Wei Xi, Ruowei Gui:

RF-Mehndi: A Fingertip Profiled RF Identifier. 1513-1521 - Jia Liu, Xingyu Chen, Xiulong Liu, Xiaocong Zhang, Xia Wang, Lijun Chen:

On Improving Write Throughput in Commodity RFID Systems. 1522-1530 - Zhenlin An

, Qiongzheng Lin
, Lei Yang
, Wei Lou:
Embracing Tag Collisions: Acquiring Bloom Filters across RFIDs in Physical Layer. 1531-1539 - Sihua Shao

, Abdallah Khreishah
, Juan Paez
:
PassiveRETRO: Enabling Completely Passive Visible Light Localization for IoT Applications. 1540-1548 - Yining Zhu, Haoran Yu, Randall A. Berry

, Chang Liu:
Cross-Network Prioritized Sharing: An Added Value MVNO's Perspective. 1549-1557 - Ming Tang, Jianwei Huang:

How to Earn Money in Live Streaming Platforms? - A Study of Donation-Based Markets. 1558-1566 - Huan Zhou, Xue Ouyang

, Zhijie Ren, Jinshu Su
, Cees de Laat, Zhiming Zhao:
A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement. 1567-1575 - Yuxuan Jiang, Mohammad Shahrad

, David Wentzlaff, Danny H. K. Tsang, Carlee Joe-Wong:
Burstable Instances for Clouds: Performance Modeling, Equilibrium Analysis, and Revenue Maximization. 1576-1584 - Salvatore D'Oro

, Francesco Restuccia, Tommaso Melodia
:
Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying. 1585-1593 - Yidan Hu

, Rui Zhang
:
Differentially-Private Incentive Mechanism for Crowdsourced Radio Environment Map Construction. 1594-1602 - Shangqing Zhao, Zhuo Lu, Zhengping Luo

, Yao Liu:
Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks. 1603-1611 - Wei Xiong, Petko Bogdanov, Mariya Zheleva:

Robust and Efficient Modulation Recognition Based on Local Sequential IQ Features. 1612-1620 - Ahmed Mohamed Abdelmoniem

, Brahim Bensaou:
Hysteresis-based Active Queue Management for TCP Traffic in Data Centers. 1621-1629 - Luigi Vigneri, Georgios S. Paschos, Panayotis Mertikopoulos

:
Large-Scale Network Utility Maximization: Countering Exponential Growth with Exponentiated Gradients. 1630-1638 - Fujie Fan, Bing Hu, Kwan L. Yeung:

Routing in Black Box: Modularized Load Balancing for Multipath Data Center Networks. 1639-1647 - Han Zhang

, Wenzhong Li, Shaohua Gao, Xiaoliang Wang, Baoliu Ye:
ReLeS: A Neural Adaptive Multipath Scheduler based on Deep Reinforcement Learning. 1648-1656 - Zhenzhi Qian, Yang Yang, Kannan Srinivasan, Ness B. Shroff:

Joint Antenna Allocation and Link Scheduling in FlexRadio Networks. 1657-1665 - Nithin S. Ramesan

, François Baccelli:
Powers Maximizing Proportional Fairness Among Poisson Bipoles. 1666-1674 - Mohamed Lamine Lamali, Simon Lassourreuille, Stephan Kunne, Johanne Cohen:

A stack-vector routing protocol for automatic tunneling. 1675-1683 - Xi Jin, Abusayeed Saifullah, Chenyang Lu, Peng Zeng

:
Real-Time Scheduling for Event-Triggered and Time-Triggered Flows in Industrial Wireless Sensor-Actuator Networks. 1684-1692 - Harshvardhan Tibrewal, Sravan Patchala, Manjesh Kumar Hanawal, Sumit Jagdish Darak

:
Distributed Learning and Optimal Assignment in Multiplayer Heterogeneous Networks. 1693-1701 - Fengjiao Li, Jia Liu, Bo Ji

:
Combinatorial Sleeping Bandits with Fairness Constraints. 1702-1710 - Guangmo Amo Tong, Ding-Zhu Du:

Beyond Uniform Reverse Sampling: A Hybrid Sampling Technique for Misinformation Prevention. 1711-1719 - Nelson Antunes

, Vladas Pipiras
, Gonçalo Jacinto
:
Regularized inversion of flow size distribution. 1720-1728 - Shuai Wang, Dan Li, Jinkun Geng, Yue Gu, Yang Cheng:

Impact of Network Topology on the Performance of DML: Theoretical Analysis and Practical Factors. 1729-1737 - Matteo Salani, Cristina Rottondi, Massimo Tornatore

:
Routing and Spectrum Assignment Integrating Machine-Learning-Based QoT Estimation in Elastic Optical Networks. 1738-1746 - Nikolaos Liakopoulos, Georgios S. Paschos, Thrasyvoulos Spyropoulos:

No Regret in Cloud Resources Reservation with Violation Guarantees. 1747-1755 - Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Massimo Tornatore

, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati
:
Achieving a Fully-Flexible Virtual Network Embedding in Elastic Optical Networks. 1756-1764 - Xinzhe Fu, Eytan H. Modiano:

Network Interdiction Using Adversarial Traffic Flows. 1765-1773 - Yilei Lin, Ting He, Shiqiang Wang, Kevin S. Chan, Stephen Pasteris:

Looking Glass of NFV: Inferring the Structure and State of NFV Network from External Observations. 1774-1782 - Tingwei Liu

, John C. S. Lui:
FAVE: A fast and efficient network Flow AVailability Estimation method with bounded relative error. 1783-1791 - Dmitrii Chemodanov, Prasad Calyam, Flavio Esposito:

A Near Optimal Reliable Composition Approach for Geo-Distributed Latency-Sensitive Service Chains. 1792-1800 - Hanling Yi, Qiulin Lin

, Minghua Chen
:
Balancing Cost and Dissatisfaction in Online EV Charging under Real-time Pricing. 1801-1809 - Tao Wu, Panlong Yang, Haipeng Dai

, Wanru Xu, Mingxue Xu:
Collaborated Tasks-driven Mobile Charging and Scheduling: A Near Optimal Result. 1810-1818 - Chi Lin, Yanhong Zhou, Fenglong Ma, Jing Deng, Lei Wang, Guowei Wu:

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks. 1819-1827 - Pengzhan Zhou, Cong Wang, Yuanyuan Yang

:
Self-sustainable Sensor Networks with Multi-source Energy Harvesting and Wireless Charging. 1828-1836 - Weichao Mao, Zhenzhe Zheng, Fan Wu:

Pricing for Revenue Maximization in IoT Data Markets: An Information Design Perspective. 1837-1845 - Zhiyuan Wang

, Lin Gao, Jianwei Huang, Biying Shou:
Economic Viability of Data Trading with Rollover. 1846-1854 - Xuehe Wang, Lingjie Duan

:
Dynamic Pricing and Capacity Allocation of UAV-provided Mobile Services. 1855-1863 - Behrouz Jedari

, Mario Di Francesco:
Auction-based Cache Trading for Scalable Videos in Multi-Provider Heterogeneous Networks. 1864-1872 - Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Liuwan Zhu, Hongyi Wu:

CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis. 1873-1881 - Nengwen Zhao, Jing Zhu, Rong Liu, Dapeng Liu, Ming Zhang, Dan Pei

:
Label-Less: A Semi-Automatic Labelling Tool for KPI Anomalies. 1882-1890 - Wenxiao Chen

, Haowen Xu, Zeyan Li
, Dan Pei
, Jie Chen, Honglin Qiao, Yang Feng, Zhaogang Wang:
Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAE. 1891-1899 - Xiaocan Li

, Kun Xie, Xin Wang, Gaogang Xie, Jigang Wen, Guangxing Zhang, Zheng Qin:
Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution. 1900-1908 - Deepak Nadig

, Byrav Ramamurthy, Brian Bockelman, David Swanson:
APRIL: An Application-Aware, Predictive and Intelligent Load Balancing Solution for Data-Intensive Science. 1909-1917 - Jiao Zhang, Zenan Wang, Chunyi Peng, Linquan Zhang, Tao Huang

, Yunjie Liu:
RABA: Resource-Aware Backup Allocation For A Chain of Virtual Network Functions. 1918-1926 - Avirup Saha, Niloy Ganguly

, Sandip Chakraborty, Abir De:
Learning Network Traffic Dynamics Using Temporal Point Process. 1927-1935 - Shiyou Qian, Weichao Mao, Jian Cao, Frederic Le Mouel, Minglu Li:

Adjusting Matching Algorithm to Adapt to Workload Fluctuations in Content-based Publish/Subscribe Systems. 1936-1944 - Seyed Ali Hassani

, Karthick Parashar, André Bourdoux, Barend van Liempd, Sofie Pollin
:
Doppler Radar with In-Band Full Duplex Radios. 1945-1953 - Yongce Chen, Shaoran Li, Chengzhang Li, Y. Thomas Hou

, Brian Jalaian:
To Cancel or Not to Cancel: Exploiting Interference Signal Strength in the Eigenspace for Efficient MIMO DoF Utilization. 1954-1962 - Sulei Wang, Zhe Chen, Yuedong Xu, Qiben Yan

, Chongbin Xu, Xin Wang:
On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure. 1963-1971 - Nan Cen, Neil Dave, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia

:
LiBeam: Throughput-Optimal Cooperative Beamforming for Indoor Visible Light Networks. 1972-1980 - Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang

, Dan Wang
, Ke Xu, Qi Tan:
TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information. 1981-1989 - Abhisek Dash

, Animesh Mukherjee, Saptarshi Ghosh:
A Network-centric Framework for Auditing Recommendation Systems. 1990-1998 - Guangchi Liu, Chenyu Li, Qing Yang:

NeuralWalk: Trust Assessment in Online Social Networks with Neural Networks. 1999-2007 - Jinyuan Jia, Neil Zhenqiang Gong:

Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge. 2008-2016 - Tong Yang, Jiaqi Xu, Xilai Liu, Peng Liu, Lun Wang, Jun Bi, Xiaoming Li:

A Generic Technique for Sketches to Adapt to Different Counting Ranges. 2017-2025 - Lu Tang, Qun Huang, Patrick P. C. Lee

:
MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams. 2026-2034 - Yaniv Sadeh, Ori Rottenstreich, Arye Barkan, Yossi Kanizo, Haim Kaplan:

Optimal Representations of a Traffic Distribution in Switch Memories. 2035-2043 - Vitalii Demianiuk

, Kirill Kogan
, Sergey I. Nikolenko
:
Approximate Classifiers with Controlled Accuracy. 2044-2052 - Zhibo Wang, Jingxin Li, Jiahui Hu

, Ju Ren, Zhetao Li, Yanjun Li:
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform. 2053-2061 - Qian Wang

, Xiu Lin, Man Zhou
, Yanjiao Chen
, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. 2062-2070 - Chen Wang, Jian Liu, Xiaonan Guo, Yan Wang

, Yingying Chen:
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables. 2071-2079 - Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:

NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. 2080-2088 - Hao Fu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra:

Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection. 2089-2097 - Haoran Yu, Ermin Wei, Randall A. Berry

:
A Business Model Analysis of Mobile Data Rewards. 2098-2106 - Lianjie Shi, Xin Wang, Richard T. B. Ma

:
On Optimal Hybrid Premium Peering and Caching Purchasing Strategy of Internet Content Providers. 2107-2115 - Jingya Zhou, Jianxi Fan:

TransLink: User Identity Linkage across Heterogeneous Social Networks via Translating Embeddings. 2116-2124 - Xiuzhen Guo, Yuan He, Xiaolong Zheng, Zihao Yu, Yunhao Liu:

LEGO-Fi: Transmitter-Transparent CTC with Cross-Demapping. 2125-2133 - Panagiotis Vamvakas, Eirini-Eleni Tsiropoulou

, Symeon Papavassiliou:
Dynamic Spectrum Management in 5G Wireless Networks: A Real-Life Modeling Approach. 2134-2142 - Jie Wang

, Wenye Wang, Cliff Wang:
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks. 2143-2151 - Francesco Restuccia, Tommaso Melodia

:
Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF Loop. 2152-2160 - Alexandros Milolidakis, Romain Fontugne, Xenofontas A. Dimitropoulos:

Detecting Network Disruptions At Colocation Facilities. 2161-2169 - Kun Xie, Jiazheng Tian, Xin Wang, Gaogang Xie, Jigang Wen, Dafang Zhang:

Efficiently Inferring Top-k Elephant Flows based on Discrete Tensor Completion. 2170-2178 - Yang Li, Jiachen Sun

, Wenguang Huang, Xiaohua Tian:
Detecting Anomaly in Large-scale Network using Mobile Crowdsourcing. 2179-2187 - Batiste Le Bars, Argyris Kalogeratos:

A Probabilistic Framework to Node-level Anomaly Detection in Communication Networks. 2188-2196 - Yihao Jia

, Aleksandar Kuzmanovic:
Perceiving Internet Anomalies via CDN Replica Shifts. 2197-2205 - Zhaoyu Gao, Arun Venkataramani:

Measuring Update Performance and Consistency Anomalies in Managed DNS Services. 2206-2214 - Kun Xie, Xiaocan Li

, Xin Wang, Gaogang Xie, Dongliang Xie, Zhenyu Li, Jigang Wen, Zulong Diao:
Quick and Accurate False Data Detection in Mobile Crowd Sensing. 2215-2223 - Antoine Brochard, Bartlomiej Blaszczyszyn, Stéphane Mallat, Sixin Zhang:

Statistical learning of geometric characteristics of wireless networks. 2224-2232 - Leyla Roohi, Benjamin I. P. Rubinstein

, Vanessa Teague:
Differentially-Private Two-Party Egocentric Betweenness Centrality. 2233-2241 - Tianchong Gao, Feng Li

:
PHDP: Preserving Persistent Homology in Differentially Private Graph Publications. 2242-2250 - Anuj K. Nayak, Seyyedali Hosseinalipour, Huaiyu Dai:

Smart Information Spreading for Opinion Maximization in Social Networks. 2251-2259 - Jiaqi Liu, Qin Zhang, Luoyi Fu, Xinbing Wang, Songwu Lu:

Evolving Knowledge Graphs. 2260-2268 - Konstantinos Psychas, Javad Ghaderi:

Scheduling Jobs with Random Resource Requirements in Computing Clusters. 2269-2277 - Frédéric Giroire, Nicolas Huin, Andrea Tomassilli, Stéphane Pérennes:

When Network Matters: Data Center Scheduling with Network Tasks. 2278-2286 - Jiaying Meng, Haisheng Tan, Chao Xu, Wanli Cao, Liuyan Liu, Bojie Li:

Dedas: Online Task Dispatching and Scheduling with Bandwidth Constraint in Edge Computing. 2287-2295 - Tung-Wei Kuo:

Minimum Age TDMA Scheduling. 2296-2304 - Peshal Nayak, Santosh Pandey, Edward W. Knightly:

Virtual Speed Test: an AP Tool for Passive Analysis of Wireless LANs. 2305-2313 - Soumya Basu, Sanjay Shakkottai:

Switching Constrained Max-Weight Scheduling for Wireless Networks. 2314-2322 - Xiaoyu Wang, Haipeng Dai

, He Huang, Yunhuai Liu, Guihai Chen
, Wanchun Dou:
Robust Scheduling for Wireless Charger Networks. 2323-2331 - Silvio Mandelli, Matthew Andrews, Sem C. Borst, Siegfried Klein:

Satisfying Network Slicing Constraints via 5G MAC Scheduling. 2332-2340 - Jinlong E, Yong Cui, Mingkang Ruan, Zhenhua Li, Ennan Zhai:

HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting. 2341-2349 - Giovanni Neglia, Gianmarco Calbi, Don Towsley

, Gayane Vardoyan
:
The Role of Network Topology for Distributed Machine Learning. 2350-2358 - Yérom-David Bromberg, Quentin Dufour, Davide Frey:

Multisource Rumor Spreading with Network Coding. 2359-2367 - Adiseshu Hari, Murali S. Kodialam, T. V. Lakshman:

ACCEL: Accelerating the Bitcoin Blockchain for High-throughput, Low-latency Applications. 2368-2376 - Joan Palacios, Paolo Casari

, Hany Assasa, Joerg Widmer
:
LEAP: Location Estimation and Predictive Handover with Consumer-Grade mmWave Devices. 2377-2385 - Yang Liu, Wuxiong Zhang, Yang Yang, Weidong Fang, Fei Qin, Xuewu Dai:

PAMT: Phase-based Acoustic Motion Tracking in Multipath Fading Environments. 2386-2394 - Yuanchao Shu

, Zhuqi Li, Börje Karlsson
, Yiyong Lin, Thomas Moscibroda, Kang G. Shin:
Incrementally-deployable Indoor Navigation with Automatic Trace Generation. 2395-2403 - Sixu Piao, Zhongjie Ba

, Lu Su, Dimitrios Koutsonikolas, Shi Li, Kui Ren:
Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution. 2404-2412 - Anastasios Giovanidis

, Bruno Baynat, Antoine Vendeville
:
Performance Analysis of Online Social Platforms. 2413-2421 - Vishrant Tripathi, Rajat Talak, Eytan H. Modiano:

Age Optimal Information Gathering and Dissemination on Graphs. 2422-2430 - Xin Zhang, Jia Liu, Zhengyuan Zhu

, Elizabeth S. Bentley:
Compressed Distributed Gradient Descent: Communication-Efficient Consensus over Networks. 2431-2439 - Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku

:
Data-Intensive Routing in Delay-Tolerant Networks. 2440-2448 - Qixia Zhang

, Fangming Liu, Chaobing Zeng:
Adaptive Interference-Aware VNF Placement for Service-Customized 5G Network Slices. 2449-2457 - Gil Einziger, Maayan Goldstein, Yaniv Sa'ar:

Faster Placement of Virtual Machines through Adaptive Caching. 2458-2466 - Sladana Josilo

, György Dán:
Wireless and Computing Resource Allocation for Selfish Computation Offloading in Edge Computing. 2467-2475 - Lorenzo Corneo

, Christian Rohner, Per Gunningberg:
Age of Information-Aware Scheduling for Timely and Scalable Internet of Things Applications. 2476-2484 - Xiangyu Wang

, Jianfeng Ma, Ximeng Liu, Yinbin Miao:
Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key. 2485-2493 - Ke Cheng, Yulong Shen, Yongzhi Wang

, Liangmin Wang
, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. 2494-2502 - Lei Xu

, Xingliang Yuan, Cong Wang, Qian Wang
, Chungen Xu
:
Hardening Database Padding for Searchable Encryption. 2503-2511 - Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang

, Hairong Qi:
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning. 2512-2520 - Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Huacheng Zeng, Hongxiang Li

:
A Practical Underlay Spectrum Sharing Scheme for Cognitive Radio Networks. 2521-2529 - Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:

Entrapment for Wireless Eavesdroppers. 2530-2538 - Zijiang Hao, Shanhe Yi

, Qun Li
:
Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud Applications. 2539-2547 - Gabriele Castellano, Flavio Esposito, Fulvio Risso:

A Distributed Orchestration Algorithm for Edge Computing Resources with Guarantees. 2548-2556 - Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:

A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. 2557-2565 - Shutong Chen

, Lei Jiao
, Lin Wang, Fangming Liu:
An Online Market Mechanism for Edge Emergency Demand Response via Cloudlet Control. 2566-2574 - Abhinandan S. Prasad

, Mayutan Arumaithurai, David Koll, Yuming Jiang
, Xiaoming Fu
:
OFM: An Online Fisher Market for Cloud Computing. 2575-2583 - Ramya Burra

, Chandramani Singh, Joy Kuri:
Service Scheduling for Bernoulli Requests and Quadratic Cost. 2584-2592 - Yongchao Zhang, Xin Chen, Ning Zhang, Ying Chen, Zhuo Li:

Dynamic Radio Resource and Task Allocation for Wireless Powered Mobile Edge Computing System. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














