default search action
38th INFOCOM 2019: Paris, France
- 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019. IEEE 2019, ISBN 978-1-7281-0515-4
- Bahman Abolhassani, John Tadrous, Atilla Eryilmaz:
Wireless Multicasting for Content Distribution: Stability and Delay Gain Analysis. 1-9 - Konstantinos Poularakis, Jaime Llorca, Antonia M. Tulino, Ian J. Taylor, Leandros Tassiulas:
Joint Service Placement and Request Routing in Multi-cell Mobile Edge Computing Networks. 10-18 - Wei Wang, Xin Liu, Yao Yao, Yan Pan, Zicheng Chi, Ting Zhu:
CRF: Coexistent Routing and Flooding using WiFi Packets in Heterogeneous IoT Networks. 19-27 - Itamar Cohen, Gil Einziger, Roy Friedman, Gabriel Scalosub:
Access Strategies for Network Caching. 28-36 - Jaya Prakash Champati, Hussein Al-Zubaidy, James Gross:
On the Distribution of AoI for the GI/GI/1/1 and GI/GI/1/2* Systems: Exact Expressions and Bounds. 37-45 - Mengxue Liu, Andréa W. Richa, Matthias Rost, Stefan Schmid:
A Constant Approximation for Maximum Throughput Multicommodity Routing And Its Application to Delay-Tolerant Network Scheduling. 46-54 - Bin Han, Vincenzo Sciancalepore, Di Feng, Xavier Costa-Pérez, Hans D. Schotten:
A Utility-Driven Multi-Queue Admission Control Solution for Network Slicing. 55-63 - Stanislav Lange, Leonardo Linguaglossa, Stefan Geissler, Dario Rossi, Thomas Zinner:
Discrete-Time Modeling of NFV Accelerators that Exploit Batched Processing. 64-72 - Tao Wu, Panlong Yang, Haipeng Dai, Wanru Xu, Mingxue Xu:
Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSNs. 73-81 - Xi Zhang, Qixuan Zhu:
D2D Offloading for Statistical QoS Provisionings Over 5G Multimedia Mobile Wireless Networks. 82-90 - Saadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla:
Enhancing Cellular Performance via Vehicular-based Opportunistic Relaying and Load Balancing. 91-99 - Zhao Li, Jie Chen, Kang G. Shin, Jia Liu:
Interference Recycling: Exploiting Interfering Signals to Enhance Data Transmission. 100-108 - Bo Yin, Shuai Zhang, Yu Cheng, Lin X. Cai, Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu:
Only Those Requested Count: Proactive Scheduling Policies for Minimizing Effective Age-of-Information. 109-117 - Chengzhang Li, Shaoran Li, Y. Thomas Hou:
A General Model for Minimizing Age of Information at Network Edge. 118-126 - Antonio Massaro, Francesco De Pellegrini, Lorenzo Maggi:
Optimal Trunk-Reservation by Policy Learning. 127-135 - Isfar Tariq, Rajat Sen, Gustavo de Veciana, Sanjay Shakkottai:
Online Channel-state Clustering And Multiuser Capacity Learning For Wireless Scheduling. 136-144 - Bruna Soares Peres, Otávio Augusto de Oliviera Souza, Olga Goussevskaia, Chen Avin, Stefan Schmid:
Distributed Self-Adjusting Tree Networks. 145-153 - Fenghua Li, Zhe Sun, Ang Li, Ben Niu, Hui Li, Guohong Cao:
HideMe: Privacy-Preserving Photo Sharing on Social Networks. 154-162 - Prasanna Karthik Vairam, Gargi Mitra, Vignesh Manoharan, Chester Rebeiro, Byrav Ramamurthy, Kamakoti Veezhinathan:
Towards Measuring Quality of Service in Untrusted Multi-Vendor Service Function Chains: Balancing Security and Resource Consumption. 163-171 - Shaohuai Shi, Xiaowen Chu, Bo Li:
MG-WFBP: Efficient Data Communication for Distributed Synchronous SGD Algorithms. 172-180 - Shuyu Shi, Yaxiong Xie, Mo Li, Alex X. Liu, Jun Zhao:
Synthesizing Wider WiFi Bandwidth for Respiration Rate Monitoring in Dynamic Environments. 181-189 - Pengfei Liu, Panlong Yang, Wen-Zhan Song, Yubo Yan, Xiang-Yang Li:
Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features. 190-198 - Tianhang Zheng, Zhi Sun, Kui Ren:
FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. 199-207 - Zhiyuan Jiang, Sheng Zhou, Zhisheng Niu, Yu Cheng:
A Unified Sampling and Scheduling Approach for Status Update in Multiaccess Wireless Networks. 208-216 - Milad Mahdian, Armin Moharrer, Stratis Ioannidis, Edmund Yeh:
Kelly Cache Networks. 217-225 - Pariya Babaie, Eman Ramadan, Zhi-Li Zhang:
Cache Network Management Using BIG Cache Abstraction. 226-234 - Georgios S. Paschos, Apostolos Destounis, Luigi Vigneri, George Iosifidis:
Learning to Cache With No Regrets. 235-243 - Haisheng Tan, Shaofeng H.-C. Jiang, Zhenhua Han, Liuyan Liu, Kai Han, Qinglin Zhao:
Camul: Online Caching on Multiple Caches with Relaying and Bypassing. 244-252 - Ruirong Chen, Wei Gao:
Enabling Cross-Technology Coexistence for Extremely Weak Wireless Devices. 253-261 - Taekyung Kim, Wonjun Lee:
Channel Independent Wi-Fi Backscatter Networks. 262-270 - Zihan Wang, Yuan Zhuang, Zhi Wang, Xin Wu:
Individual Data Plan in Virtual Network Operation: A Proactive Matching Approach. 271-279 - Dario Bega, Marco Gramaglia, Marco Fiore, Albert Banchs, Xavier Costa-Pérez:
DeepCog: Cognitive Network Management in Sliced 5G Networks with Deep Learning. 280-288 - Peng-Jun Wan, Zhu Wang, Huaqiang Yuan, Jinling Zhang, XuFei Mao:
Fair Rate Allocation over A Generalized Symmetric Polymatroid with Box Constraints. 289-297 - Ruozhou Yu, Vishnu Teja Kilari, Guoliang Xue, Dejun Yang:
Load Balancing for Interdependent IoT Microservices. 298-306 - Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu, Jianping Wu:
Octans: Optimal Placement of Service Function Chains in Many-Core Systems. 307-315 - Cuiying Feng, Luning Wang, Kui Wu, Jianping Wang:
Bound-based Network Tomography with Additive Metrics. 316-324 - Djob Mvondo, Boris Teabe, Alain Tchana, Daniel Hagimont, Noel De Palma:
Memory flipping: a threat to NUMA virtual machines in the Cloud. 325-333 - Bin Shi, Haiying Shen:
Memory/Disk Operation Aware Lightweight VM Live Migration Across Data-centers with Low Performance Impact. 334-342 - Dinuni K. Fernando, Jonathan Terner, Kartik Gopalan, Ping Yang:
Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live Migration. 343-351 - Jian Li, Jianmin Qian, Haibing Guan:
A Holistic Model for Performance Prediction and Optimization on NUMA-based Virtualized Systems. 352-360 - Hossein Pirayesh, Pedram Kheirkhah Sangdeh, Huacheng Zeng:
EE-IoT: An Energy-Efficient IoT Communication Scheme for WLANs. 361-369 - Kunal Sankhe, Mauro Belgiovine, Fan Zhou, Shamnaz Riyaz, Stratis Ioannidis, Kaushik R. Chowdhury:
ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks. 370-378 - Mingyu Yang, Li-Xuan Chuo, Karan Suri, Lu Liu, Hao Zheng, Hun-Seok Kim:
iLPS: Local Positioning System with Simultaneous Localization and Wireless Communication. 379-387 - Kai Lei, Meng Qin, Bo Bai, Gong Zhang, Min Yang:
GCN-GAN: A Non-linear Temporal Link Prediction Model for Weighted Dynamic Networks. 388-396 - Qingkai Liang, Eytan H. Modiano:
Optimal Network Control in Partially-Controllable Networks. 397-405 - Chaoqun You:
Hierarchical Multi-resource Fair Queueing for Network Function Virtualization. 406-414 - Paolo Laffranchini, Luís E. T. Rodrigues, Marco Canini, Balachander Krishnamurthy:
Measurements As First-class Artifacts. 415-423 - Sandeep Kumar Singh, Admela Jukan:
Computing Blocking Probabilities in Elastic Optical Networks with Spectrum Defragmentation. 424-432 - Ahmed Khalid, Ahmed H. Zahran, Cormac J. Sreenan:
RTOP: Optimal User Grouping and SFN Clustering for Multiple eMBMS Video Sessions. 433-441 - Salvatore D'Oro, Francesco Restuccia, Alessandro Talamonti, Tommaso Melodia:
The Slice Is Served: Enforcing Radio Access Network Slicing in Virtualized 5G Systems. 442-450 - Lou Salaun, Marceau Coupechoux, Chung Shue Chen:
Weighted Sum-Rate Maximization in Multi-Carrier NOMA with Cellular Power Constraint. 451-459 - Pu Wang, Ning Wang, Monireh Dabaghchian, Kai Zeng, Zheng Yan:
Optimal Resource Allocation for Secure Multi-User Wireless Powered Backscatter Communication with Artificial Noise. 460-468 - Klaus-Tycho Foerster, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Trédan:
CASA: Congestion and Stretch Aware Static Fast Rerouting. 469-477 - Huanle Xu, Yang Liu, Wing Cheong Lau, Jun Guo, Alex X. Liu:
Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability. 478-486 - Tian Pan, Enge Song, Zizheng Bian, Xingchen Lin, Xiaoyu Peng, Jiao Zhang, Tao Huang, Bin Liu, Yunjie Liu:
INT-path: Towards Optimal Path Planning for In-band Network-Wide Telemetry. 487-495 - Sisi Xiong, Qing Cao, Weisheng Si:
Adaptive Path Tracing with Programmable Bloom Filters in Software-Defined Networks. 496-504 - Yixin Bao, Yanghua Peng, Chuan Wu:
Deep Learning-based Job Placement in Distributed Machine Learning Clusters. 505-513 - Stephen Pasteris, Shiqiang Wang, Mark Herbster, Ting He:
Service Placement with Provable Guarantees in Heterogeneous Edge Computing Systems. 514-522 - Gamal Sallam, Bo Ji:
Joint Placement and Allocation of Virtual Network Functions with Budget and Capacity Constraints. 523-531 - Chen Chen, Wei Wang, Bo Li:
Round-Robin Synchronization: Mitigating Communication Bottlenecks in Parameter Servers. 532-540 - Yongzhi Wang, Yulong Shen, Cuicui Su, Ke Cheng, Yibo Yang, Anter Faree, Yao Liu:
CFHider: Control Flow Obfuscation with Intel SGX. 541-549 - Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. 550-558 - Liyao Xiang, Jingbo Yang, Baochun Li:
Differentially-Private Deep Learning from an optimization Perspective. 559-567 - Chaoyue Niu, Zhenzhe Zheng, Shaojie Tang, Xiaofeng Gao, Fan Wu:
Making Big Money from Small Sensors: Trading Time-Series Data under Pufferfish Privacy. 568-576 - Zicheng Chi, Yan Li, Zhichuan Huang, Hongyu Sun, Ting Zhu:
Simultaneous Bi-directional Communications and Data Forwarding using a Single ZigBee Data Stream. 577-585 - Vijay K. Shah, Simone Silvestri, Brian Luciano, Sajal K. Das:
X-CHANT: A Diverse DSA based Architecture for Next-generation Challenged Networks. 586-594 - Ali Rahmati, Xiaofan He, Ismail Güvenç, Huaiyu Dai:
Dynamic Mobility-Aware Interference Avoidance for Aerial Base Stations in Cognitive Radio Networks. 595-603 - Minh Vu, Lisong Xu, Sebastian G. Elbaum, Wei Sun, Kevin Qiao:
Efficient systematic testing of network protocols with temporal uncertain events. 604-612 - Moinul Hossain, Jiang Xie:
Hide and Seek: A Defense Against Off-sensing Attack in Cognitive Radio Networks. 613-621 - Parinaz Naghizadeh, Maria Gorlatova, Andrew S. Lan, Mung Chiang:
Hurts to Be Too Early: Benefits and Drawbacks of Communication in Multi-Agent Learning. 622-630 - Debasis Mitra, Abhinav Sridhar:
Consortiums of ISP-Content Providers Formed by Nash Bargaining for Internet Content Delivery. 631-639 - Costas Courcoubetis, Antonis Dimakis:
Throughput and Pricing of Ridesharing Systems. 640-648 - Shi Su, Wai-Tian Tan, Xiaoqing Zhu, Rob Liston:
Client Pre-Screening for MU-MIMO in Commodity 802.11ac Networks via Online Learning. 649-657 - Junyang Shi, Mo Sha:
Parameter Self-Configuration and Self-Adaptation in Industrial Wireless Sensor-Actuator Networks. 658-666 - Vincenzo Mancuso, Paolo Castagno, Matteo Sereno, Marco Ajmone Marsan:
Slicing Cell Resources: The Case of HTC and MTC Coexistence. 667-675 - Amit Sheoran, Sonia Fahmy, Chunyi Peng, Navin Modi:
Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation. 676-684 - Damiano Carra, Giovanni Neglia, Pietro Michiardi:
TTL-based Cloud Caches. 685-693 - Guocong Quan, Jian Tan, Atilla Eryilmaz:
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels. 694-702 - Rashid Tahir, Sultan Durrani, Faizan Ahmed, Hammas Saeed, Fareed Zaffar, Muhammad Saqib Ilyas:
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web. 703-711 - Lailong Luo, Deke Guo, Ori Rottenstreich, Richard T. B. Ma, Xueshan Luo, Bangbang Ren:
The Consistent Cuckoo Filter. 712-720 - Amjad Yousef Majid, Michel Jansen, Guillermo Ortas Delgado, Kasim Sinan Yildirim, Przemyslaw Pawelczak:
Multi-hop Backscatter Tag-to-Tag Networks. 721-729 - Marcelo Pizzutti, Alberto E. Schaeffer Filho:
Adaptive Multipath Routing based on Hybrid Data and Control Plane Operation. 730-738 - Harsh Gupta, Atilla Eryilmaz, R. Srikant:
Link Rate Selection using Constrained Thompson Sampling. 739-747 - Lixing Chen, Jie Xu:
Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed Feedback. 748-756 - Suining He, Kang G. Shin:
Crowd-Flow Graph Construction and Identification with Spatio-Temporal Signal Feature Fusion. 757-765 - Daniel Yue Zhang, Dong Wang:
An Integrated Top-down and Bottom-up Task Allocation Approach in Social Sensing based Edge Computing Systems. 766-774 - Li Lu, Jiadi Yu, Yingying Chen, Yanmin Zhu, Xiangyu Xu, Guangtao Xue, Minglu Li:
KeyListener: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals. 775-783 - Pranvera Kortoçi, Liang Zheng, Carlee Joe-Wong, Mario Di Francesco, Mung Chiang:
Fog-based Data Offloading in Urban IoT Scenarios. 784-792 - Jian-Jhih Kuo, Sheng-Hao Chiang, Shan-Hsiang Shen, De-Nian Yang, Wen-Tsuen Chen:
Dynamic Multicast Traffic Engineering with Efficient Rerouting for Software-Defined Networks. 793-801 - Subhrendu Chattopadhyay, Soumyajit Chatterjee, Sukumar Nandi, Sandip Chakraborty:
Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications. 802-810 - Gengbiao Shen, Qing Li, Shuo Ai, Yong Jiang, Mingwei Xu, Xuya Jia:
How Powerful Switches Should be Deployed: A Precise Estimation Based on Queuing Theory. 811-819 - Junjie Xie, Chen Qian, Deke Guo, Minmei Wang, Shouqian Shi, Honghui Chen:
Efficient Indexing Mechanism for Unstructured Data Sharing Systems in Edge Computing. 820-828 - Shengling Wang, Chenyu Wang, Qin Hu:
Corking by Forking: Vulnerability Analysis of Blockchain. 829-837 - Hui Xia, Fu Xiao, Sanshun Zhang, Chun-qiang Hu, Xiuzhen Cheng:
Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach. 838-846 - Minmei Wang, Chen Qian, Xin Li, Shouqian Shi:
Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching. 847-855 - Chi Lin, Zhi Shang, Wan Du, Jiankang Ren, Lei Wang, Guowei Wu:
CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge. 856-864 - Chuyu Wang, Lei Xie, Keyan Zhang, Wei Wang, Yanling Bu, Sanglu Lu:
Spin-Antenna: 3D Motion Tracking for Tag Array Labeled Objects via Spinning Antenna. 865-873 - Jia Liu, Xingyu Chen, Shigang Chen, Xiulong Liu, Yanyan Wang, Lijun Chen:
TagSheet: Sleeping Posture Recognition with an Unobtrusive Passive Tag Matrix. 874-882 - Junchen Guo, Ting Wang, Yuan He, Meng Jin, Chengkun Jiang, Yunhao Liu:
TwinLeak: RFID-based Liquid Leakage Detection in Industrial Environments. 883-891 - Ping Li, Zhenlin An, Lei Yang, Panlong Yang:
Towards Physical-Layer Vibration Sensing with RFIDs. 892-900 - Xu Wang, Randall A. Berry:
Price Competition with LTE-U and WiFi. 901-909 - Fangxin Wang, Cong Zhang, Feng Wang, Jiangchuan Liu, Yifei Zhu, Haitian Pang, Lifeng Sun:
Intelligent Edge-Assisted Crowdcast with Deep Reinforcement Learning for Personalized QoE. 910-918 - Meng Zhang, Jianwei Huang:
Mechanism Design for Network Utility Maximization with Private Constraint Information. 919-927 - Yunpeng Li, Costas Courcoubetis, Lingjie Duan:
Recommending Paths: Follow or Not Follow? 928-936 - Yi Zhao, Zimu Zhou, Xu Wang, Tongtong Liu, Yunhao Liu, Zheng Yang:
CellTradeMap: Delineating Trade Areas for Urban Commercial Districts with Cellular Networks. 937-945 - Ran He, Jin Cao, Lisa Zhang, Denny Lee:
Statistical Enrichment Models for Activity Inference from Imprecise Location Data. 946-954 - Mohammed Alasmar, George Parisis, Richard G. Clegg, Nickolay Zakhleniuk:
On the Distribution of Traffic Volumes in the Internet and its Implications. 955-963 - Weili Chen, Jun Wu, Zibin Zheng, Chuan Chen, Yuren Zhou:
Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network. 964-972 - Kyoungjun Park, Myungchul Kim:
EVSO: Environment-aware Video Streaming optimization of Power Consumption. 973-981 - Xiaoda Jiang, Hancheng Lu, Chang Wen Chen, Feng Wu:
Receiver-driven Video Multicast over NOMA Systems in Heterogeneous Environments. 982-990 - Haitian Pang, Cong Zhang, Fangxin Wang, Jiangchuan Liu, Lifeng Sun:
Towards Low Latency Multi-viewpoint 360° Interactive Video: A Multimodal Deep Reinforcement Learning Approach. 991-999 - Bastian Alt, Trevor Ballard, Ralf Steinmetz, Heinz Koeppl, Amr Rizk:
CBA: Contextual Quality Adaptation for Adaptive Bitrate Video Streaming. 1000-1008 - Fabien Geyer, Steffen Bondorf:
DeepTMA: Predicting Effective Contention Models for Network Calculus using Graph Neural Networks. 1009-1017 - Kunyi Chen, Hong Gao, Zhipeng Cai, Quan Chen, Jianzhong Li:
Distributed Energy-Adaptive Aggregation Scheduling with Coverage Guarantee For Battery-Free Wireless Sensor Networks. 1018-1026 - Yifei Zou, Dongxiao Yu, Libing Wu, Jiguo Yu, Yu Wu, Qiang-Sheng Hua, Francis C. M. Lau:
Fast Distributed Backbone Construction Despite Strong Adversarial Jamming. 1027-1035 - Boaz Patt-Shamir, Will Rosenbaum:
Space-Optimal Packet Routing on Trees. 1036-1044 - Wenqiang Jin, Mingyan Xiao, Ming Li, Linke Guo:
If You Do Not Care About It, Sell It: Trading Location Privacy in Mobile Crowd Sensing. 1045-1053 - Merkouris Karaliopoulos, Iordanis Koutsopoulos, Leonidas Spiliopoulos:
Optimal User Choice Engineering in Mobile Crowdsensing with Bounded Rational Users. 1054-1062 - Haiming Jin, Hongpeng Guo, Lu Su, Klara Nahrstedt, Xinbing Wang:
Dynamic Task Pricing in Multi-Requester Mobile Crowd Sensing with Markov Correlated Equilibrium. 1063-1071 - Zai Shi, Atilla Eryilmaz:
A Flexible Distributed Optimization Framework for Service of Concurrent Tasks in Processing Networks. 1072-1080 - Geng Li, Yang Richard Yang, Franck Le, Yeon-Sup Lim, Junqi Wang:
Update Algebra: Toward Continuous, Non-Blocking Composition of Network Updates in SDN. 1081-1089 - Franck Le, Erich M. Nahum:
Experiences Implementing Live VM Migration over the WAN with Multi-Path TCP. 1090-1098 - Konstantinos Poularakis, Qiaofeng Qin, Liang Ma, Sastry Kompella, Kin K. Leung, Leandros Tassiulas:
Learning the Optimal Synchronization Rates in Distributed SDN Control Architectures. 1099-1107 - Hongli Xu, Shigang Chen, Qianpiao Ma, Liusheng Huang:
Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks. 1108-1116 - Irmak Aykin, Berk Akgun, Marwan Krunz:
Smartlink: Exploiting Channel Clustering Effects for Reliable Millimeter Wave Communications. 1117-1125 - Anfu Zhou, Shaoyuan Yang, Yi Yang, Yuhang Fan, Huadong Ma:
Autonomous Environment Mapping Using Commodity Millimeter-wave Network Device. 1126-1134 - William J. Tomlinson, Stella Banou, Christopher Yu, Michele Nogueira, Kaushik R. Chowdhury:
Secure On-skin Biometric Signal Transmission using Galvanic Coupling. 1135-1143 - Alireza Shahanaghi, Yaling Yang, R. Michael Buehrer:
On the Stochastic Link Modeling of Static Wireless Sensor Networks in Ocean Environments. 1144-1152 - Fatemah Alharbi, Jie Chang, Yuchen Zhou, Feng Qian, Zhiyun Qian, Nael B. Abu-Ghazaleh:
Collaborative Client-Side DNS Cache Poisoning Attack. 1153-1161 - Xiaoli Zhang, Huayi Duan, Cong Wang, Qi Li, Jianping Wu:
Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes. 1162-1170 - Chang Liu, Longtao He, Gang Xiong, Zigang Cao, Zhen Li:
FS-Net: A Flow Sequence Network For Encrypted Traffic Classification. 1171-1179 - Zhen Ling, Junzhou Luo, Danni Xu, Ming Yang, Xinwen Fu:
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks. 1180-1188 - Erqun Dong, Jingao Xu, Chenshu Wu, Yunhao Liu, Zheng Yang:
Pair-Navi: Peer-to-Peer Indoor Navigation with Mobile Visual SLAM. 1189-1197 - Weijun Wang, Haipeng Dai, Chao Dong, Xiao Cheng, Xiaoyu Wang, Guihai Chen, Wanchun Dou:
PANDA: Placement of Unmanned Aerial Vehicles Achieving 3D Directional Coverage. 1198-1206 - Yuzhe Yang, Zhiwen Hu, Kaigui Bian, Lingyang Song:
ImgSensingNet: UAV Vision Guided Aerial-Ground Air Quality Sensing System. 1207-1215 - Binyao Jiang, Yisheng Ji, Xiaohua Tian, Xinbing Wang:
Batch Reading Densely Arranged QR Codes. 1216-1224 - Yadong Xie, Fan Li, Yue Wu, Song Yang, Yu Wang:
D3-Guard: Acoustic-based Drowsy Driving Detection Using Smartphones. 1225-1233 - Chengwen Luo, Xingyu Feng, Junliang Chen, Jianqiang Li, Weitao Xu, Wei Li, Li Zhang, Zahir Tari, Albert Y. Zomaya:
Brush like a Dentist: Accurate Monitoring of Toothbrushing via Wrist-Worn Gesture Sensing. 1234-1242 - Shuochao Yao, Yiran Zhao, Huajie Shao, Dongxin Liu, Shengzhong Liu, Yifan Hao, Ailing Piao, Shaohan Hu, Su Lu, Tarek F. Abdelzaher:
SADeepSense: Self-Attention Deep Learning Framework for Heterogeneous On-Device Sensors in Internet of Things Applications. 1243-1251 - Yuanxing Zhang, Pengyu Zhao, Kaigui Bian, Yunxin Liu, Lingyang Song, Xiaoming Li:
DRL360: 360-degree Video Streaming with Deep Reinforcement Learning. 1252-1260 - Shaoqi Wang, Wei Chen, Xiaobo Zhou, Sang-Yoon Chang, Mike Ji:
Addressing Skewness in Iterative ML Jobs with Parameter Partition. 1261-1269 - Wuyang Zhang, Sugang Li, Luyang Liu, Zhenhua Jia, Yanyong Zhang, Dipankar Raychaudhuri:
Hetero-Edge: Orchestration of Real-time Vision Applications on Heterogeneous Edge Clouds. 1270-1278 - Vajiheh Farhadi, Fidan Mehmeti, Ting He, Tom La Porta, Hana Khamfroush, Shiqiang Wang, Kevin S. Chan:
Service Placement and Request Scheduling for Data-intensive Applications in Edge Clouds. 1279-1287 - Hao Wang, Di Niu, Baochun Li:
Distributed Machine Learning with a Serverless Architecture. 1288-1296 - Yanbing Yang, Jun Luo, Chen Chen, Wen-De Zhong, Liangyin Chen:
SynLight: Synthetic Light Emission for Fast Transmission in COTS Device-enabled VLC. 1297-1305 - Zeyu Wang, Zhice Yang, Qianyi Huang, Lin Yang, Qian Zhang:
ALS-P: Light Weight Visible Light Positioning via Ambient Light Sensor. 1306-1314 - Hao Cui, Huanyu Bian, Weiming Zhang, Nenghai Yu:
UnseenCode: Invisible On-screen Barcode with Image-based Extraction. 1315-1323 - Rens Bloom, Marco Zuniga, Qing Wang, Domenico Giustiniano:
Tweeting with Sunlight: Encoding Data on Mobile Objects. 1324-1332 - Mathieu Jadin, Francois Aubry, Pierre Schaus, Olivier Bonaventure:
CG4SR: Near Optimal Traffic Engineering for Segment Routing with Column Generation. 1333-1341 - Khaled M. Diab, Mohamed Hefeeda:
Joint Content Distribution and Traffic Engineering of Adaptive Videos in Telco-CDNs. 1342-1350 - Chen Avin, Kaushik Mondal, Stefan Schmid:
Demand-Aware Network Design with Minimal Congestion and Route Lengths. 1351-1359 - Fan Zhou, Zijing Wen, Goce Trajcevski, Kunpeng Zhang, Ting Zhong, Fang Liu:
Disentangled Network Alignment with Matching Explainability. 1360-1368 - Victor Valls, George Iosifidis, Theodoros Salonidis:
Maximum Lifetime Analytics in IoT Networks. 1369-1377 - Fengqian Guo, Hancheng Lu, Daren Zhu, Hao Wu:
Interference-aware User Grouping Strategy in NOMA Systems with QoS Constraints. 1378-1386 - Nguyen Hoang Tran, Wei Bao, Albert Y. Zomaya, Minh N. H. Nguyen, Choong Seon Hong:
Federated Learning over Wireless Networks: Optimization Model Design and Analysis. 1387-1395 - Jie Chuai, Zhitang Chen, Guochen Liu, Xueying Guo, Xiaoxiao Wang, Xin Liu, Chongming Zhu, Feiyi Shen:
A Collaborative Learning Based Approach for Parameter Configuration of Cellular Networks. 1396-1404 - Ioannis Gasparis, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Paul L. Yu:
Figment: Fine-grained Permission Management for Mobile Apps. 1405-1413 - Nima Eshraghi, Ben Liang:
Joint Offloading Decision and Resource Allocation with Uncertain Task Computing Requirement. 1414-1422 - Chuang Hu, Wei Bao, Dan Wang, Fengming Liu:
Dynamic Adaptive DNN Surgery for Inference Acceleration on the Edge. 1423-1431 - Hengrun Zhang, Kai Zeng:
Pairwise Markov Chain: A Task Scheduling Strategy for Privacy-Preserving SIFT on Edge. 1432-1440 - Yang Liu, Huanle Xu, Wing Cheong Lau:
Online Job Scheduling with Resource Packing on a Cluster of Heterogeneous Servers. 1441-1449 - Klaus-Tycho Foerster, Juho Hirvonen, Stefan Schmid, Jukka Suomela:
On the Power of Preprocessing in Decentralized Network Optimization. 1450-1458 - Bin Gao, Zhi Zhou, Fangming Liu, Fei Xu:
Winning at the Starting Line: Joint Network Selection and Service Placement for Mobile Edge Computing. 1459-1467 - Tao Ouyang, Rui Li, Xu Chen, Zhi Zhou, Xin Tang:
Adaptive User-managed Service Placement for Mobile Edge Computing: An Online Learning Approach. 1468-1476 - He Li, Yaling Yang, Yanzhi Dou, Jung-Min "Jerry" Park, Kui Ren:
PeDSS: Privacy Enhanced and Database-Driven Dynamic spectrum Sharing. 1477-1485 - Lin He, Gang Ren, Ying Liu:
Bootstrapping Accountability and Privacy to IPv6 Internet without Starting from Scratch. 1486-1494 - Mohamed Grissa, Attila A. Yavuz, Bechir Hamdaoui:
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band. 1495-1503 - Xiaonan Zhang, Pei Huang, Linke Guo, Mo Sha:
Incentivizing Relay Participation for Securing IoT Communication. 1504-1512 - Cui Zhao, Zhenjiang Li, Ting Liu, Han Ding, Jinsong Han, Wei Xi, Ruowei Gui:
RF-Mehndi: A Fingertip Profiled RF Identifier. 1513-1521 - Jia Liu, Xingyu Chen, Xiulong Liu, Xiaocong Zhang, Xia Wang, Lijun Chen:
On Improving Write Throughput in Commodity RFID Systems. 1522-1530 - Zhenlin An, Qiongzheng Lin, Lei Yang, Wei Lou:
Embracing Tag Collisions: Acquiring Bloom Filters across RFIDs in Physical Layer. 1531-1539 - Sihua Shao, Abdallah Khreishah, Juan Paez:
PassiveRETRO: Enabling Completely Passive Visible Light Localization for IoT Applications. 1540-1548 - Yining Zhu, Haoran Yu, Randall A. Berry, Chang Liu:
Cross-Network Prioritized Sharing: An Added Value MVNO's Perspective. 1549-1557 - Ming Tang, Jianwei Huang:
How to Earn Money in Live Streaming Platforms? - A Study of Donation-Based Markets. 1558-1566 - Huan Zhou, Xue Ouyang, Zhijie Ren, Jinshu Su, Cees de Laat, Zhiming Zhao:
A Blockchain based Witness Model for Trustworthy Cloud Service Level Agreement Enforcement. 1567-1575 - Yuxuan Jiang, Mohammad Shahrad, David Wentzlaff, Danny H. K. Tsang, Carlee Joe-Wong:
Burstable Instances for Clouds: Performance Modeling, Equilibrium Analysis, and Revenue Maximization. 1576-1584 - Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia:
Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying. 1585-1593 - Yidan Hu, Rui Zhang:
Differentially-Private Incentive Mechanism for Crowdsourced Radio Environment Map Construction. 1594-1602 - Shangqing Zhao, Zhuo Lu, Zhengping Luo, Yao Liu:
Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks. 1603-1611 - Wei Xiong, Petko Bogdanov, Mariya Zheleva:
Robust and Efficient Modulation Recognition Based on Local Sequential IQ Features. 1612-1620 - Ahmed Mohamed Abdelmoniem, Brahim Bensaou:
Hysteresis-based Active Queue Management for TCP Traffic in Data Centers. 1621-1629 - Luigi Vigneri, Georgios S. Paschos, Panayotis Mertikopoulos:
Large-Scale Network Utility Maximization: Countering Exponential Growth with Exponentiated Gradients. 1630-1638 - Fujie Fan, Bing Hu, Kwan L. Yeung:
Routing in Black Box: Modularized Load Balancing for Multipath Data Center Networks. 1639-1647 - Han Zhang, Wenzhong Li, Shaohua Gao, Xiaoliang Wang, Baoliu Ye:
ReLeS: A Neural Adaptive Multipath Scheduler based on Deep Reinforcement Learning. 1648-1656 - Zhenzhi Qian, Yang Yang, Kannan Srinivasan, Ness B. Shroff:
Joint Antenna Allocation and Link Scheduling in FlexRadio Networks. 1657-1665 - Nithin S. Ramesan, François Baccelli:
Powers Maximizing Proportional Fairness Among Poisson Bipoles. 1666-1674 - Mohamed Lamine Lamali, Simon Lassourreuille, Stephan Kunne, Johanne Cohen:
A stack-vector routing protocol for automatic tunneling. 1675-1683 - Xi Jin, Abusayeed Saifullah, Chenyang Lu, Peng Zeng:
Real-Time Scheduling for Event-Triggered and Time-Triggered Flows in Industrial Wireless Sensor-Actuator Networks. 1684-1692 - Harshvardhan Tibrewal, Sravan Patchala, Manjesh Kumar Hanawal, Sumit Jagdish Darak:
Distributed Learning and Optimal Assignment in Multiplayer Heterogeneous Networks. 1693-1701 - Fengjiao Li, Jia Liu, Bo Ji:
Combinatorial Sleeping Bandits with Fairness Constraints. 1702-1710 - Guangmo Amo Tong, Ding-Zhu Du:
Beyond Uniform Reverse Sampling: A Hybrid Sampling Technique for Misinformation Prevention. 1711-1719 - Nelson Antunes, Vladas Pipiras, Gonçalo Jacinto:
Regularized inversion of flow size distribution. 1720-1728 - Shuai Wang, Dan Li, Jinkun Geng, Yue Gu, Yang Cheng:
Impact of Network Topology on the Performance of DML: Theoretical Analysis and Practical Factors. 1729-1737 - Matteo Salani, Cristina Rottondi, Massimo Tornatore:
Routing and Spectrum Assignment Integrating Machine-Learning-Based QoT Estimation in Elastic Optical Networks. 1738-1746 - Nikolaos Liakopoulos, Georgios S. Paschos, Thrasyvoulos Spyropoulos:
No Regret in Cloud Resources Reservation with Violation Guarantees. 1747-1755 - Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati:
Achieving a Fully-Flexible Virtual Network Embedding in Elastic Optical Networks. 1756-1764 - Xinzhe Fu, Eytan H. Modiano:
Network Interdiction Using Adversarial Traffic Flows. 1765-1773 - Yilei Lin, Ting He, Shiqiang Wang, Kevin S. Chan, Stephen Pasteris:
Looking Glass of NFV: Inferring the Structure and State of NFV Network from External Observations. 1774-1782 - Tingwei Liu, John C. S. Lui:
FAVE: A fast and efficient network Flow AVailability Estimation method with bounded relative error. 1783-1791 - Dmitrii Chemodanov, Prasad Calyam, Flavio Esposito:
A Near Optimal Reliable Composition Approach for Geo-Distributed Latency-Sensitive Service Chains. 1792-1800 - Hanling Yi, Qiulin Lin, Minghua Chen:
Balancing Cost and Dissatisfaction in Online EV Charging under Real-time Pricing. 1801-1809 - Tao Wu, Panlong Yang, Haipeng Dai, Wanru Xu, Mingxue Xu:
Collaborated Tasks-driven Mobile Charging and Scheduling: A Near Optimal Result. 1810-1818 - Chi Lin, Yanhong Zhou, Fenglong Ma, Jing Deng, Lei Wang, Guowei Wu:
Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks. 1819-1827 - Pengzhan Zhou, Cong Wang, Yuanyuan Yang:
Self-sustainable Sensor Networks with Multi-source Energy Harvesting and Wireless Charging. 1828-1836 - Weichao Mao, Zhenzhe Zheng, Fan Wu:
Pricing for Revenue Maximization in IoT Data Markets: An Information Design Perspective. 1837-1845 - Zhiyuan Wang, Lin Gao, Jianwei Huang, Biying Shou:
Economic Viability of Data Trading with Rollover. 1846-1854 - Xuehe Wang, Lingjie Duan:
Dynamic Pricing and Capacity Allocation of UAV-provided Mobile Services. 1855-1863 - Behrouz Jedari, Mario Di Francesco:
Auction-based Cache Trading for Scalable Videos in Multi-Provider Heterogeneous Networks. 1864-1872 - Rui Ning, Cong Wang, Chunsheng Xin, Jiang Li, Liuwan Zhu, Hongyi Wu:
CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis. 1873-1881 - Nengwen Zhao, Jing Zhu, Rong Liu, Dapeng Liu, Ming Zhang, Dan Pei:
Label-Less: A Semi-Automatic Labelling Tool for KPI Anomalies. 1882-1890 - Wenxiao Chen, Haowen Xu, Zeyan Li, Dan Pei, Jie Chen, Honglin Qiao, Yang Feng, Zhaogang Wang:
Unsupervised Anomaly Detection for Intricate KPIs via Adversarial Training of VAE. 1891-1899 - Xiaocan Li, Kun Xie, Xin Wang, Gaogang Xie, Jigang Wen, Guangxing Zhang, Zheng Qin:
Online Internet Anomaly Detection With High Accuracy: A Fast Tensor Factorization Solution. 1900-1908 - Deepak Nadig, Byrav Ramamurthy, Brian Bockelman, David Swanson:
APRIL: An Application-Aware, Predictive and Intelligent Load Balancing Solution for Data-Intensive Science. 1909-1917 - Jiao Zhang, Zenan Wang, Chunyi Peng, Linquan Zhang, Tao Huang, Yunjie Liu:
RABA: Resource-Aware Backup Allocation For A Chain of Virtual Network Functions. 1918-1926 - Avirup Saha, Niloy Ganguly, Sandip Chakraborty, Abir De:
Learning Network Traffic Dynamics Using Temporal Point Process. 1927-1935 - Shiyou Qian, Weichao Mao, Jian Cao, Frederic Le Mouel, Minglu Li:
Adjusting Matching Algorithm to Adapt to Workload Fluctuations in Content-based Publish/Subscribe Systems. 1936-1944 - Seyed Ali Hassani, Karthick Parashar, André Bourdoux, Barend van Liempd, Sofie Pollin:
Doppler Radar with In-Band Full Duplex Radios. 1945-1953 - Yongce Chen, Shaoran Li, Chengzhang Li, Y. Thomas Hou, Brian Jalaian:
To Cancel or Not to Cancel: Exploiting Interference Signal Strength in the Eigenspace for Efficient MIMO DoF Utilization. 1954-1962 - Sulei Wang, Zhe Chen, Yuedong Xu, Qiben Yan, Chongbin Xu, Xin Wang:
On User Selective Eavesdropping Attacks in MU-MIMO: CSI Forgery and Countermeasure. 1963-1971 - Nan Cen, Neil Dave, Emrecan Demirors, Zhangyu Guan, Tommaso Melodia:
LiBeam: Throughput-Optimal Cooperative Beamforming for Indoor Visible Light Networks. 1972-1980 - Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu, Qi Tan:
TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information. 1981-1989 - Abhisek Dash, Animesh Mukherjee, Saptarshi Ghosh:
A Network-centric Framework for Auditing Recommendation Systems. 1990-1998 - Guangchi Liu, Chenyu Li, Qing Yang:
NeuralWalk: Trust Assessment in Online Social Networks with Neural Networks. 1999-2007 - Jinyuan Jia, Neil Zhenqiang Gong:
Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge. 2008-2016 - Tong Yang, Jiaqi Xu, Xilai Liu, Peng Liu, Lun Wang, Jun Bi, Xiaoming Li:
A Generic Technique for Sketches to Adapt to Different Counting Ranges. 2017-2025 - Lu Tang, Qun Huang, Patrick P. C. Lee:
MV-Sketch: A Fast and Compact Invertible Sketch for Heavy Flow Detection in Network Data Streams. 2026-2034 - Yaniv Sadeh, Ori Rottenstreich, Arye Barkan, Yossi Kanizo, Haim Kaplan:
Optimal Representations of a Traffic Distribution in Switch Memories. 2035-2043 - Vitalii Demianiuk, Kirill Kogan, Sergey I. Nikolenko:
Approximate Classifiers with Controlled Accuracy. 2044-2052 - Zhibo Wang, Jingxin Li, Jiahui Hu, Ju Ren, Zhetao Li, Yanjun Li:
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform. 2053-2061 - Qian Wang, Xiu Lin, Man Zhou, Yanjiao Chen, Cong Wang, Qi Li, Xiangyang Luo:
VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones. 2062-2070 - Chen Wang, Jian Liu, Xiaonan Guo, Yan Wang, Yingying Chen:
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables. 2071-2079 - Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. 2080-2088 - Hao Fu, Zizhan Zheng, Sencun Zhu, Prasant Mohapatra:
Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection. 2089-2097 - Haoran Yu, Ermin Wei, Randall A. Berry:
A Business Model Analysis of Mobile Data Rewards. 2098-2106 - Lianjie Shi, Xin Wang, Richard T. B. Ma:
On Optimal Hybrid Premium Peering and Caching Purchasing Strategy of Internet Content Providers. 2107-2115 - Jingya Zhou, Jianxi Fan:
TransLink: User Identity Linkage across Heterogeneous Social Networks via Translating Embeddings. 2116-2124 - Xiuzhen Guo, Yuan He, Xiaolong Zheng, Zihao Yu, Yunhao Liu:
LEGO-Fi: Transmitter-Transparent CTC with Cross-Demapping. 2125-2133 - Panagiotis Vamvakas, Eirini-Eleni Tsiropoulou, Symeon Papavassiliou:
Dynamic Spectrum Management in 5G Wireless Networks: A Real-Life Modeling Approach. 2134-2142 - Jie Wang, Wenye Wang, Cliff Wang:
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks. 2143-2151 - Francesco Restuccia, Tommaso Melodia:
Big Data Goes Small: Real-Time Spectrum-Driven Embedded Wireless Networking Through Deep Learning in the RF Loop. 2152-2160 - Alexandros Milolidakis, Romain Fontugne, Xenofontas A. Dimitropoulos:
Detecting Network Disruptions At Colocation Facilities. 2161-2169 - Kun Xie, Jiazheng Tian, Xin Wang, Gaogang Xie, Jigang Wen, Dafang Zhang:
Efficiently Inferring Top-k Elephant Flows based on Discrete Tensor Completion. 2170-2178 - Yang Li, Jiachen Sun, Wenguang Huang, Xiaohua Tian:
Detecting Anomaly in Large-scale Network using Mobile Crowdsourcing. 2179-2187 - Batiste Le Bars, Argyris Kalogeratos:
A Probabilistic Framework to Node-level Anomaly Detection in Communication Networks. 2188-2196 - YiHao Jia, Aleksandar Kuzmanovic:
Perceiving Internet Anomalies via CDN Replica Shifts. 2197-2205 - Zhaoyu Gao, Arun Venkataramani:
Measuring Update Performance and Consistency Anomalies in Managed DNS Services. 2206-2214 - Kun Xie, Xiaocan Li, Xin Wang, Gaogang Xie, Dongliang Xie, Zhenyu Li, Jigang Wen, Zulong Diao:
Quick and Accurate False Data Detection in Mobile Crowd Sensing. 2215-2223 - Antoine Brochard, Bartlomiej Blaszczyszyn, Stéphane Mallat, Sixin Zhang:
Statistical learning of geometric characteristics of wireless networks. 2224-2232 - Leyla Roohi, Benjamin I. P. Rubinstein, Vanessa Teague:
Differentially-Private Two-Party Egocentric Betweenness Centrality. 2233-2241 - Tianchong Gao, Feng Li:
PHDP: Preserving Persistent Homology in Differentially Private Graph Publications. 2242-2250 - Anuj Nayak, Seyyedali Hosseinalipour, Huaiyu Dai:
Smart Information Spreading for Opinion Maximization in Social Networks. 2251-2259 - Jiaqi Liu, Qin Zhang, Luoyi Fu, Xinbing Wang, Songwu Lu:
Evolving Knowledge Graphs. 2260-2268 - Konstantinos Psychas, Javad Ghaderi:
Scheduling Jobs with Random Resource Requirements in Computing Clusters. 2269-2277 - Frédéric Giroire, Nicolas Huin, Andrea Tomassilli, Stéphane Pérennes:
When Network Matters: Data Center Scheduling with Network Tasks. 2278-2286 - Jiaying Meng, Haisheng Tan, Chao Xu, Wanli Cao, Liuyan Liu, Bojie Li:
Dedas: Online Task Dispatching and Scheduling with Bandwidth Constraint in Edge Computing. 2287-2295 - Tung-Wei Kuo:
Minimum Age TDMA Scheduling. 2296-2304 - Peshal Nayak, Santosh Pandey, Edward W. Knightly:
Virtual Speed Test: an AP Tool for Passive Analysis of Wireless LANs. 2305-2313 - Soumya Basu, Sanjay Shakkottai:
Switching Constrained Max-Weight Scheduling for Wireless Networks. 2314-2322 - Xiaoyu Wang, Haipeng Dai, He Huang, Yunhuai Liu, Guihai Chen, Wanchun Dou:
Robust Scheduling for Wireless Charger Networks. 2323-2331 - Silvio Mandelli, Matthew Andrews, Sem C. Borst, Siegfried Klein:
Satisfying Network Slicing Constraints via 5G MAC Scheduling. 2332-2340 - Jinlong E, Yong Cui, Mingkang Ruan, Zhenhua Li, Ennan Zhai:
HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting. 2341-2349 - Giovanni Neglia, Gianmarco Calbi, Don Towsley, Gayane Vardoyan:
The Role of Network Topology for Distributed Machine Learning. 2350-2358 - Yérom-David Bromberg, Quentin Dufour, Davide Frey:
Multisource Rumor Spreading with Network Coding. 2359-2367 - Adiseshu Hari, Murali S. Kodialam, T. V. Lakshman:
ACCEL: Accelerating the Bitcoin Blockchain for High-throughput, Low-latency Applications. 2368-2376 - Joan Palacios, Paolo Casari, Hany Assasa, Joerg Widmer:
LEAP: Location Estimation and Predictive Handover with Consumer-Grade mmWave Devices. 2377-2385 - Yang Liu, Wuxiong Zhang, Yang Yang, Weidong Fang, Fei Qin, Xuewu Dai:
PAMT: Phase-based Acoustic Motion Tracking in Multipath Fading Environments. 2386-2394 - Yuanchao Shu, Zhuqi Li, Börje Karlsson, Yiyong Lin, Thomas Moscibroda, Kang G. Shin:
Incrementally-deployable Indoor Navigation with Automatic Trace Generation. 2395-2403 - Sixu Piao, Zhongjie Ba, Lu Su, Dimitrios Koutsonikolas, Shi Li, Kui Ren:
Automating CSI Measurement with UAVs: from Problem Formulation to Energy-Optimal Solution. 2404-2412 - Anastasios Giovanidis, Bruno Baynat, Antoine Vendeville:
Performance Analysis of Online Social Platforms. 2413-2421 - Vishrant Tripathi, Rajat Talak, Eytan H. Modiano:
Age Optimal Information Gathering and Dissemination on Graphs. 2422-2430 - Xin Zhang, Jia Liu, Zhengyuan Zhu, Elizabeth S. Bentley:
Compressed Distributed Gradient Descent: Communication-Efficient Consensus over Networks. 2431-2439 - Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku:
Data-Intensive Routing in Delay-Tolerant Networks. 2440-2448 - Qixia Zhang, Fangming Liu, Chaobing Zeng:
Adaptive Interference-Aware VNF Placement for Service-Customized 5G Network Slices. 2449-2457 - Gil Einziger, Maayan Goldstein, Yaniv Sa'ar:
Faster Placement of Virtual Machines through Adaptive Caching. 2458-2466 - Sladana Josilo, György Dán:
Wireless and Computing Resource Allocation for Selfish Computation Offloading in Edge Computing. 2467-2475 - Lorenzo Corneo, Christian Rohner, Per Gunningberg:
Age of Information-Aware Scheduling for Timely and Scalable Internet of Things Applications. 2476-2484 - Xiangyu Wang, Jianfeng Ma, Ximeng Liu, Yinbin Miao:
Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key. 2485-2493 - Ke Cheng, Yulong Shen, Yongzhi Wang, Liangmin Wang, Jianfeng Ma, Xionghong Jiang, Cuicui Su:
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys. 2494-2502 - Lei Xu, Xingliang Yuan, Cong Wang, Qian Wang, Chungen Xu:
Hardening Database Padding for Searchable Encryption. 2503-2511 - Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, Hairong Qi:
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning. 2512-2520 - Pedram Kheirkhah Sangdeh, Hossein Pirayesh, Huacheng Zeng, Hongxiang Li:
A Practical Underlay Spectrum Sharing Scheme for Cognitive Radio Networks. 2521-2529 - Song Fang, Tao Wang, Yao Liu, Shangqing Zhao, Zhuo Lu:
Entrapment for Wireless Eavesdroppers. 2530-2538 - Zijiang Hao, Shanhe Yi, Qun Li:
Nomad: An Efficient Consensus Approach for Latency-Sensitive Edge-Cloud Applications. 2539-2547 - Gabriele Castellano, Flavio Esposito, Fulvio Risso:
A Distributed Orchestration Algorithm for Edge Computing Resources with Guarantees. 2548-2556 - Jianhai Chen, Deshi Ye, Shouling Ji, Qinming He, Yang Xiang, Zhenguang Liu:
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers. 2557-2565 - Shutong Chen, Lei Jiao, Lin Wang, Fangming Liu:
An Online Market Mechanism for Edge Emergency Demand Response via Cloudlet Control. 2566-2574 - Abhinandan S. Prasad, Mayutan Arumaithurai, David Koll, Yuming Jiang, Xiaoming Fu:
OFM: An Online Fisher Market for Cloud Computing. 2575-2583 - Ramya Burra, Chandramani Singh, Joy Kuri:
Service Scheduling for Bernoulli Requests and Quadratic Cost. 2584-2592 - Yongchao Zhang, Xin Chen, Ning Zhang, Ying Chen, Zhuo Li:
Dynamic Radio Resource and Task Allocation for Wireless Powered Mobile Edge Computing System. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.