


default search action
37th INFOCOM 2018: Honolulu, HI, USA - Workshops
- IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2018, Honolulu, HI, USA, April 15-19, 2018. IEEE 2018, ISBN 978-1-5386-5979-3

- Mohannad Alhanahnah, Qiben Yan

:
Towards best secure coding practice for implementing SSL/TLS. 1-6 - Xu Han, Yanheng Liu, Jian Wang:

Modeling and analyzing privacy-awareness social behavior network. 7-12 - Yanyan Li, Mengjun Xie

:
Understanding secure and usable gestures for realtime motion based authentication. 13-20 - Yijin Chen, Yuming Mao, Lei Cui, Supeng Leng, Yunkai Wei, Xiaosha Chen:

A two layer model of malware propagation in a search engine context. 21-26 - Louma Chaddad, Ali Chehab

, Imad H. Elhajj
, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. 27-32 - Yuanxiong Guo

, Yanmin Gong
, Laurent L. Njilla, Charles A. Kamhoua:
A stochastic game approach to cyber-physical security with applications to smart grid. 33-38 - Shuqing He, Bo Cheng, Haifeng Wang, Xuelian Xiao, Yunpeng Cao, Junliang Chen:

Data security storage model for fog computing in large-scale IoT application. 39-44 - Alessandra De Paola

, Salvatore Gaglio, Giuseppe Lo Re
, Marco Morana:
A hybrid system for malware detection on big data. 45-50 - Ming Cheung, James She, Lufi Liu:

Deep learning-based online counterfeit-seller detection. 51-56 - Joong-Lyul Lee

, Jaejin Hwang, Hyesung Park, Donghyun Kim:
On latency-aware tree topology construction for emergency responding VANET applications. 57-63 - Tabinda Salam, Waheed ur Rehman, Razaullah Khan, Israr Khan, Xiaofeng Tao

:
Dynamic resource allocation and mobile aggregator selection in mission critical MTC networks. 64-69 - Weifeng Gao, Wan Du, Zhiwei Zhao:

Reliable channel allocation for mission oriented low-power wireless networks. 70-75 - Jinhwan Jung, Daewoo Kim, Joonki Hong, Joohyun Kang, Yung Yi:

Parameterized slot scheduling for adaptive and autonomous TSCH networks. 76-81 - Kayhan Zrar Ghafoor

, Linghe Kong
, Ali Safaa Sadiq
, Zouina Doukha, Fuad Mawlood Shareef:
Trust-aware routing protocol for mobile crowdsensing environments. 82-87 - Xin Li, Qiuyuan Huang, Dapeng Oliver Wu

:
A repeated stochastic game approach for strategic network selection in heterogeneous networks. 88-93 - Jingyuan Yang, Jin Cao, Ran He, Lisa Zhang:

A unified clustering approach for identifying functional zones in suburban and urban areas. 94-99 - Haina Zheng, Ke Xiong, Pingyi Fan

, Zhangdui Zhong:
Buildings' producing filter effect on PM25 data: A model-fitting approach. 100-105 - Yifan Hou

, Pan Zhou, Jie Xu
, Dapeng Oliver Wu
:
Course recommendation of MOOC with big data support: A contextual online learning approach. 106-111 - Shahab Farazi, Andrew G. Klein

, D. Richard Brown:
Average age of information for status update systems with an energy harvesting server. 112-117 - Roy D. Yates:

Age of information in a network of preemptive servers. 118-123 - Elie Najm, Emre Telatar:

Status updates in a multi-stream M/G/1/1 preemptive queue. 124-129 - Jaya Prakash Champati, Hussein Al-Zubaidy, James Gross:

Statistical guarantee optimization for age of information for the D/G/1 queue. 130-135 - Yin Sun, Elif Uysal-Biyikoglu

, Sastry Kompella
:
Age-optimal updates of multiple information flows. 136-141 - Shuaibing Lu, Zhiyi Fang, Jie Wu:

Online provisioning for virtual clusters in multi-tenant cloud data center network. 142-147 - Lee Gillam, Konstantinos Katsaros

, Mehrdad Dianati
, Alexandros Mouzakitis:
Exploring edges for connected and autonomous driving. 148-153 - Yiming Liu, F. Richard Yu, Xi Li, Hong Ji, Victor C. M. Leung:

Hybrid computation offloading in fog and cloud networks with non-orthogonal multiple access. 154-159 - I-Chen Tsai, Chia-Mu Yu, Haruo Yokota

, Sy-Yen Kuo
:
VENUS: Verifiable range query in data streaming. 160-165 - Federico Chiariotti

, Stepán Kucera, Andrea Zanella, Holger Claussen
:
LEAP: A latency control protocol for multi-path data delivery with pre-defined QoS guarantees. 166-171 - Mohammad Wardat

, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdallah A. Khreishah
:
Cloud data centers revenue maximization using server consolidation: Modeling and evaluation. 172-177 - Balázs Németh, Mark Szalay

, Janos Doka, Matthias Rost, Stefan Schmid
, László Toka, Balázs Sonkoly
:
Fast and efficient network service embedding method with adaptive offloading to the edge. 178-183 - Erfan Meskar

, Ben Liang
:
Fair multi-resource allocation with external resource for mobile edge computing. 184-189 - Fei Wang, Xi Zhang:

Dynamic interface-selection and resource allocation over heterogeneous mobile edge-computing wireless networks with energy harvesting. 190-195 - Yi-Hsuan Hung, Chih-Yu Wang, Ren-Hung Hwang

:
Combinatorial clock auction for live video streaming in mobile edge computing. 196-201 - Abubakr O. Al-Abbasi

, Vaneet Aggarwal
:
EdgeCache: An optimized algorithm for CDN-based over-the-top video streaming services. 202-207 - Chia-ling Chan, Romain Fontugne, Kenjiro Cho, Shigeki Goto:

Monitoring TLS adoption using backbone and edge traffic. 208-213 - Safiqul Islam, Michael Welzl

, Kristian A. Hiorth, David A. Hayes
, Grenville Armitage, Stein Gjessing:
ctrlTCP: Reducing latency through coupled, heterogeneous multi-flow TCP congestion control. 214-219 - Pengfei Wang

, Aleksandar Kuzmanovic:
"What's the score?": A first look at sports live data feed services. 220-225 - Matthieu Caneill, Noel De Palma, Ali Aït-Bachir, Bastien Dine, Rachid Mokhtari, Yagmur Gizem Cinar:

Online metrics prediction in monitoring systems. 226-231 - Zhenkun Qiu, Sihai Zhang, Wuyang Zhou, Shui Yu

:
Empirical study on taxi's mobility nature in dense urban area. 232-237 - Phuong Ha, Lisong Xu:

Available bandwidth estimation in public clouds. 238-243 - Ze Li, Zengshan Tian, Mu Zhou, Zhenyuan Zhang, Yue Jin:

An accurate and robust environment sensing algorithm for enhancing indoor localization. 244-249 - Rupam Kundu, Gopi Krishna Tummala, Prasun Sinha:

CaneScanner: Obstacle detection for people with visual disabilities. 250-255 - Tanmoy Das, Gopi Krishna Tummala, Prasun Sinha:

TagTone: Scalable RFID communication through multi-frequency analysis. 256-261 - Yiyun Zhou, Meng Han, Liyuan Liu, Jing (Selena) He, Yan Wang:

Deep learning approach for cyberattack detection. 262-267 - Arvind Narayanan, Eman Ramadan

, Zhi-Li Zhang:
OpenCDN: An ICN-based open content distribution system using distributed actor model. 268-273 - Yang Yang, Kunlun Wang, Guowei Zhang, Xu Chen, Xiliang Luo, Ming-Tuo Zhou:

Maximal energy efficient task scheduling for homogeneous fog networks. 274-279 - Yi Zhang, Xiaoke Jiang, Yi Wang, Kai Lei

:
Cache and delivery of VR video over named data networking. 280-285 - Kai Lei

, Jie Xing, Yi Wang, Keke Li, Dong Lin:
Let sources know: Enabling access tracking in a content centric context. 286-292 - Dávid Haja, Marton Szabo, Mark Szalay

, Adam Nagy, András Kern, László Toka, Balázs Sonkoly
:
How to orchestrate a distributed OpenStack. 293-298 - Fengxian Guo, Liangde Ma, Heli Zhang, Hong Ji, Xi Li:

Joint load management and resource allocation in the energy harvesting powered small cell networks with mobile edge computing. 299-304 - Anna Wisniewska, Mohammad Abu Shattal

, Bilal Khan, Ala I. Al-Fuqaha
, Kirk Dombrowski:
Emergence of pecking order in social Cognitive Radio societies. 305-311 - Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua:

A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices. 312-317 - Zhouyou Gu, Wibowo Hardjawana

, Branka Vucetic
, Lok Sang Ho
:
Multi-tenant spectrum and SSIDs controller for WiFi networks. 318-323 - Sander Vrijders, Dimitri Staessens, Marco Capitani, Vincenzo Maffione:

Rumba: A python framework for automating large-scale Recursive Internet Experiments on GENI and FIRE+. 324-329 - Parishad Karimi, Shreyasee Mukherjee, Jakub Kolodziejski, Ivan Seskar, Dipankar Raychaudhuri:

Measurement based mobility emulation platform for next generation wireless networks. 330-335 - Ronan-Alexandre Cherrueau, Matthieu Simonin, Alexandre van Kempen

:
EnosStack: A LAMP-like stack for the experimenter. 336-341 - Cise Midoglu, Leonhard Wimmer, Andra Lutu, Ozgu Alay, Carsten Griwodz:

MONROE-Nettest: A configurable tool for dissecting speed measurements in mobile broadband networks. 342-347 - Songtao Feng, Jing Yang

:
Optimal status updating for an energy harvesting sensor with a noisy channel. 348-353 - Yuanzhang Xiao, Yin Sun:

A dynamic jamming game for real-time status updates. 354-360 - Jing Zhong, Roy D. Yates, Emina Soljanin

:
Minimizing content staleness in dynamo-style replicated storage systems. 361-366 - Clement Kam, Sastry Kompella

, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Towards an effective age of information: Remote estimation of a Markov source. 367-372 - Shenglong Li, Quanlu Zhang, Zhi Yang, Hanyu Zhao, Yafei Dai:

Building efficient and available distributed transaction with Paxos-based coding consensus. 373-378 - Wataru Morita, Daisuke Sugahara, Kouji Hirata, Miki Yamamoto:

AQM with multi-queue for microburst in data center networks. 379-384 - Ruijiu Mao, Vaneet Aggarwal

, Mung Chiang:
Stochastic non-preemptive co-flow scheduling with time-indexed relaxation. 385-390 - Youngmi Jin, Michiaki Hayashi:

Trade-off between fairness and efficiency in dominant alpha-fairness family. 391-396 - Feng Wang

, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa:
Efficient handling of excessive locators in hierarchical addressing. 397-402 - Doron Zarchy

, Amogh Dhamdhere, Constantine Dovrolis, Michael Schapira:
Nash-peering: A new techno-economic framework for internet interconnections. 403-408 - Tomoyuki Kitabatake, Romain Fontugne, Hiroshi Esaki:

BLT: A taxonomy and classification tool for mining BGP update messages. 409-414 - Klaus-Tycho Foerster

, Mahmoud Parham
, Marco Chiesa
, Stefan Schmid
:
TI-MFA: Keep calm and reroute segments fast. 415-420 - Yun Lin

, Wenxin Li, Jianguo Sun, Qidi Wu:
Improving wireless devices identification using gray relationship classifier to enhance wireless network security. 421-425 - Nan Lu, Qinghe Du, Li Sun

, Pinyi Ren:
Traffic-driven intrusion detection for massive MTC towards 5G networks. 426-431 - Abubakr O. Al-Abbasi

, Vaneet Aggarwal
:
Mean latency optimization in erasure-coded distributed storage systems. 432-437 - Christos Stergiou

, Kostas E. Psannis
, Theofanis Xifilidis, Andreas P. Plageras, Brij B. Gupta
:
Security and privacy of big data for social networking services in cloud. 438-443 - Zahra Pooranian

, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti
:
RARE: Defeating side channels based on data-deduplication in cloud storage. 444-449 - Hao Hao, Changqiao Xu, Mu Wang, Haiyong Xie, Yifeng Liu, Dapeng Oliver Wu

:
Knowledge-centric proactive edge caching over mobile content distribution network. 450-455 - Xiao Zhang, Haijun Wang, Haitao Zhao:

An SDN framework for UAV backbone network towards knowledge centric networking. 456-461 - Sadia Din

, Anand Paul
, Awais Ahmad, Syed Hassan Ahmed
, Gwanggil Jeon, Danda B. Rawat
:
Hierarchical architecture for 5G based software-defined intelligent transportation system. 462-467 - Qingxin Xia, Feng Hong

, Yuan Feng, Zhongwen Guo:
MotionHacker: Motion sensor based eavesdropping on handwriting via smartwatch. 468-473 - Di Zhang, Zheng Chang, Timo Hämäläinen

, Weinan Gao
:
A contract-based resource allocation mechanism in wireless virtualized network. 474-479 - Mu Zhou, Yiyao Liu, Wei Nie, Liangbo Xie, Zengshan Tian:

Secure mobile crowdsourcing for WLAN indoor localization. 480-485 - Xi Zhang, Jingqing Wang:

Statistical QoS-driven power adaptation for distributed caching based mobile offloading over 5G wireless networks. 486-491 - Tongxin Li, Junyu Liu, Min Sheng, Jiandong Li:

Spectral efficiency optimization in caching enabled ultra-dense small cell networks. 492-498 - Tingting Liu, Jun Li

, BaekGyu Kim
, Chung-Wei Lin, Shinichi Shiraishi, Jiang Xie, Zhu Han
:
Distributed file allocation using matching game in mobile fog-caching service network. 499-504 - Lu Pei, Zhaohui Yang

, Cunhua Pan
, Wenhuan Huang, Ming Chen:
Joint bandwidth, caching and association optimization for D2D assisted wireless networks. 505-510 - Wei Jiang, Gang Feng, Shuang Qin, Tak-Shing Peter Yum:

Efficient D2D content caching using multi-agent reinforcement learning. 511-516 - Mengting Liu, F. Richard Yu, Yinglei Teng, Victor C. M. Leung, Mei Song:

Joint computation offloading and content caching for wireless blockchain networks. 517-522 - Enrico Gregori, Valerio Luconi

, Alessio Vecchio:
NeutMon: Studying neutrality in European mobile networks. 523-528 - Jakob Struye, Bart Braem, Steven Latré, Johann Marquez-Barja

:
The CityLab testbed - Large-scale multi-technology wireless experimentation in a city environment: Neural network-based interference prediction in a smart city. 529-534 - Stephen A. Seidel, Michael T. Mehari, Charles J. Colbourn, Eli De Poorter, Ingrid Moerman

, Violet R. Syrotiuk:
Analysis of large-scale experimental data from wireless networks. 535-540 - Mohamed Moulay

, Vincenzo Mancuso:
Experimental performance evaluation of WebRTC video services over mobile networks. 541-546 - Qing He, György Dán, Viktoria Fodor:

Minimizing age of correlated information for wireless camera networks. 547-552 - Juan Liu, Xijun Wang

, Bo Bai, Huaiyu Dai:
Age-optimal trajectory planning for UAV-assisted data collection. 553-558 - Yunquan Dong, Zhengchuan Chen, Pingyi Fan

:
Uplink age of information of unilaterally powered two-way data exchanging systems. 559-564 - Sneihil Gopal, Sanjit K. Kaul

:
A game theoretic approach to DSRC and WiFi coexistence. 565-570 - Joshika Agarwal, Rishabh Jain, Sanjay Kumar Dhurandher, Isaac Woungang, Nitin Gupta:

Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN. 571-576 - Majed Haddad, Piotr Wiecek, Oussama Habachi

:
A game theoretic load-aware network selection. 577-582 - Shuan He, Wei Wang:

Spectrum-shared NOMA game-theoretical power requisition in context-aware wireless multimedia communications. 583-588 - Shu Sun, Theodore S. Rappaport, Mansoor Shafi:

Hybrid beamforming for 5G millimeter-wave multi-cell networks. 589-596 - Muhammad Nazmul Islam, Navid Abedini, Georg K. Hampel, Sundar Subramanian, Junyi Li:

Investigation of performance in integrated access and backhaul networks. 597-602 - Shahram Shahsavari, Fraida Fund

, Elza Erkip, Shivendra S. Panwar:
Capturing capacity and profit gains with base station sharing in mmWave cellular networks. 603-609 - Faisal N. Abu-Khzam, Karine Lamaa:

Efficient heuristic algorithms for positive-influence dominating set in social networks. 610-615 - Anis Elgabli

, Vaneet Aggarwal
:
GroupCast: Preference-aware cooperative video streaming with scalable video coding. 616-621 - Christelle Caillouet

, Frédéric Giroire, Tahiry Razafindralambo
:
Optimization of mobile sensor coverage with UAVs. 622-627 - Dimitrios Zorbas

, Christos Douligeris:
Computing optimal drone positions to wirelessly recharge IoT devices. 628-633 - Sidharth Kumar, Suraj Suman

, Swades De:
Backhaul and delay-aware placement of UAV-enabled base station. 634-639 - Rachad Atat

, Junchao Ma, Hao Chen, Ulysses Lee, Jonathan D. Ashdown, Lingjia Liu:
Cognitive relay networks with energy and mutual-information accumulation. 640-644 - Shuanshuan Wu, Pedram Johari, Nicholas Mastronarde, Josep Miquel Jornet

:
On the photo-thermal effect of intra-body nano-optical communications on red blood cells. 645-650 - Yi Chen

, Chong Han:
Channel modeling and analysis for wireless networks-on-chip communications in the millimeter wave and terahertz bands. 651-656 - Haoyue Tang

, Jintao Wang, Yahong Rosa Zheng
:
Covert communications with extremely low power under finite block length over slow fading. 657-661 - Simon Pietro Romano

, Fabio Giangrande:
On the use of network coding as a virtual network function in satellite-terrestrial CDNs. 662-667 - Chia-Yu Chang, Navid Nikaein, Thrasyvoulos Spyropoulos:

Radio access network resource slicing for flexible service execution. 668-673 - Máté Cserép

, Ákos Recse, Róbert Szabó, László Toka:
Business network formation among 5G providers. 674-679 - Sihua Shao

, Hanbin Zhang, Dimitrios Koutsonikolas, Abdallah Khreishah
:
Two-dimensional reduction of beam training overhead in crowded 802.11ad based networks. 680-685 - Yanpeng Yang, Hossein Shokri Ghadikolaei, Carlo Fischione

, Marina Petrova, Ki Won Sung:
Reducing initial cell-search latency in mmWave networks. 686-691 - Yusuke Koda, Koji Yamamoto

, Takayuki Nishio, Masahiro Morikura:
Reinforcement learning based predictive handover for pedestrian-aware mmWave networks. 692-697 - Xiaoming Fu

, Hong Huang, Xiang-Yang Li, Haisheng Tan, Jie Tang:
A comparative analysis of school pupils' daily habits in Germany and China. 698-703 - Muhammad Saad, Aziz Mohaisen

:
Towards characterizing blockchain-based cryptocurrencies for highly-accurate predictions. 704-709 - Raffaele Montella, Mario Ruggieri, Sokol Kosta

:
A fast, secure, reliable, and resilient data transfer framework for pervasive IoT applications. 710-715 - Anil Madhavapeddy

, K. C. Sivaramakrishnan, Gemma Gordon, Thomas Gazagnaire:
An architecture for interspatial communication. 716-723 - Mingyue Ding, Shengchu Wang, Zhongyan Huang, Konglin Zhu, Ling Zhang:

Message-passing cooperative localization in sensor networks with AOA measurements. 724-729 - Natalya Rozhnova, Marc-Olivier Buob, Richard Douville:

Application-agnostic remote access for Bluetooth Low Energy. 730-735 - Aljawharah Alnasser, Hongjian Sun

:
Performance analysis of behavior-based solutions in vehicular networks. 736-741 - Xi Zhang, Qixuan Zhu:

Statistical QoS provisioning over D2D-offloading based 5G multimedia big-data mobile wireless networks. 742-747 - Weihong Yang, Yang Qin, Yuanyuan Yang

:
Analysis of malicious flows via SIS epidemic model in CCN. 748-753 - Vladimir Marbukh:

Towards efficient offloading in fog/edge computing by approximating effect of externalities. 754-759 - Duc Van Le

, Chen-Khong Tham
:
A deep reinforcement learning based offloading scheme in ad-hoc mobile clouds. 760-765 - Chang Ge, Ning Wang

:
Real-time QoE estimation of DASH-based mobile video applications through edge computing. 766-771 - Yuanjun Yao, Qiang Cao, Rubens Farias, Jeffrey S. Chase, Victor Orlikowski, Paul Ruth

, Mert Cevik, Cong Wang
, Nick Buraglio
:
Toward live inter-domain network services on the ExoGENI testbed. 772-777 - Nabeel Akhtar, Ibrahim Matta

, Ali Raza
, Yuefeng Wang:
EL-SEC: ELastic management of security applications on virtualized infrastructure. 778-783 - Garegin Grigoryan

, Keivan Bahmani, Grayson Schermerhorn, Yaoqing Liu:
GRASP: A green energy aware SDN platform. 784-789 - Jon Patman, Meshal Alfarhood

, Soliman Islam, Mauro Lemus, Prasad Calyam, Kannappan Palaniappan:
Predictive analytics for fog computing using machine learning and GENI. 790-795 - Guowen Xu

, Hongwei Li, Wenlei Wang, Yue Chen, Haomiao Yang, Yanzhi Ren:
Towards practical personalized recommendation with multi-level differential privacy controls. 796-801 - Adriano Di Luzio, Alessandro Mei

, Julinda Stefa:
Uncovering hidden social relationships through location-based services: The Happn case study. 802-807 - Qichao Xu, Zhou Su, Minghui Dai:

Trustworthy caching for mobile big data in social networks. 808-812 - Xiaojing Ma, Bin Zhu, Tao Zhang, Sixing Cao, Hai Jin, Deqing Zou:

Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance. 813-818 - Jie Yuan, Xiaoyong Li

:
A multi-source feedback based trust calculation mechanism for edge computing. 819-824 - Ruidong Li

, Hitoshi Asaeda
:
Secure in-network big data provision with suspension chain model. 825-830 - Jianguo Sun, Qi Zhong, Liang Kou, Wenshan Wang, Qingan Da, Yun Lin

:
A lightweight multi-factor mobile user authentication scheme. 831-836 - Yuyao Li, Zheng Dou, Xiaolei Zhu, Chengzhuo Shi:

Improving signal modulation recognition using principal component analysis and compressive sensing. 837-841 - Abdulhamid Adebayo, Danda B. Rawat

, Jiang Li, Moses Garuba:
Group-query-as-a-service for secure dynamic spectrum access in geolocation-enabled database-driven opportunistic wireless communications in ROAR framework. 842-847 - Shiwei Yan, Yong Shang, Ming Zhang

:
Compromised secrecy region with friendly jammers in heterogeneous cellular networks. 848-852 - Xuya Jia, Yong Jiang, Jing Zhu:

Link fault protection and traffic engineering in hybrid SDN networks. 853-858 - Austin Jerome, Murat Yuksel, Syed Hassan Ahmed

, Mostafa A. Bassiouni:
SDN-based load balancing for multi-path TCP. 859-864 - Sabur Baidya

, Yan Chen, Marco Levorato:
eBPF-based content and computation-aware communication for real-time edge computing. 865-870 - Chuanji Zhang, Hemin Yang, George F. Riley:

Admission control in software-defined datacenter network in view of flow table capacity. 871-876 - Elif Bozkaya

, Berk Canberk
:
BS-on-air: Optimum UAV localization for resilient ultra dense networks. 877-881 - Sajad Mousavi, Fatemeh Afghah, Jonathan D. Ashdown, Kurt A. Turck:

Leader-follower based coalition formation in large-scale UAV networks, a quantum evolutionary approach. 882-887 - Wenxin Chen, Yingfei Dong, Zhenhai Duan:

Attacking altitude estimation in drone navigation. 888-893 - Alok Ranjan, Bighnaraj Panigrahi, Hemant Kumar Rath, Prasant Misra, Anantha Simha:

LTE-CAS: LTE-based criticality aware scheduling for UAV assisted emergency response. 894-899 - Sudharman K. Jayaweera

, Alireza Ghasempour:
Sensitivity of coherent cooperative transmission to synchronization errors. 900-905 - Sethuraman N. Rao, Dhanesh Raj, Vickram Parthasarathy, S. Aiswarya

, Maneesha Vinodini Ramesh, P. Venkat Rangan:
A novel solution for high speed internet over the oceans. 906-912 - Alok Ranjan, Himanshu Bhushan Sahu, Prasant Misra:

DeepSense: Sensing the radio signal behavior in metal and non-metal underground mine workings. 913-918 - Tongyu Dai

, Xinggong Zhang, Zongming Guo:
Poster abstract: Analysis and experimental investigation of BBR. 1-2 - Piotr Gawlowicz, Anatolij Zubow:

Demo abstract: Practical cross-technology radio resource management between LTE-U and WiFi. 1-2 - Xiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han

:
Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmitters. 1-2 - Ray-Guang Cheng, Raymond Knopp, Chung-Yin Ho, Kai-Hsiang Hsu, Tian-Jen Liu, Wei-Tai Chen, Bing-Zhi Hsieh, Matthieu Kanj, François Taburet, Navid Nikaein:

Demo abstract - Design and implementation of an open source NB-IoT eNB. 1-2 - Sladana Josilo

, György Dán:
Poster abstract: Decentralized fog computing resource management for offloading of periodic tasks. 1-2 - Ran Ben-Basat, Gil Einziger, Erez Waisbard:

Line speed heavy hitters on sliding windows. 1-2 - Yang Liu

, Zhenjiang Li:
Poster abstract: Context-free wearable side-channel leaks your typing privacy. 1-2 - Mohammad Noormohammadpour

, Cauligi S. Raghavendra:
Poster abstract: Minimizing flow completion times using adaptive routing over inter-datacenter wide area networks. 1-2 - Amin M. Khan, Felix Freitag

, Vladimir Vlassov
, Phuong Hoai Ha
:
Demo abstract: Towards IoT service deployments on edge community network microclouds. 1-2 - Boyang Hu, Qiben Yan

, Yao Zheng
:
Tracking location privacy leakage of mobile ad networks at scale. 1-2 - Patrick Kalmbach, Andreas Blenk

, Wolfgang Kellerer
, Stefan Schmid
:
Poster abstract: Themis: A data-driven approach to bot detection. 1-2 - Guoming Tang, Huan Wang, Kui Wu, Deke Guo, Chong Zhang:

When more may not be better: Toward cost-efficient CDN selection. 1-2 - Kecheng Liu, Yu Cheng

:
Demo: Enabling data sharing and multimedia applications over a multi-hop ad hoc network formed by un-rooted smartphones. 1-2 - Bo Cheng, Shuai Zhao, Meng Niu, Junliang Chen:

Agile IoT service communication and orchestration platform using event driven SOA paradigm. 1-2 - Wei Zhang, Xinchang Zhang, Huiling Shi:

Poster abstract: NMEMD: A novel method for efficiently measuring software-defined network delay. 1-2 - Xinjie Guan, Xili Wan, Jun-Bo Wang, Xinxin Ma, Guangwei Bai:

Mobility aware partition of MEC regions in wireless metropolitan area networks. 1-2 - Huanpu Yin

, Anfu Zhou, Liang Liu, Huadong Ma:
Poster abstract: Ubiquitous writer: Robust text input for small mobile devices via acoustic sensing. 1-3 - Kun Suo, Yong Zhao, Wei Chen, Jia Rao:

Demo/poster abstract: Efficient and flexible packet tracing for virtualized networks using eBPF. 1-2 - Weiguang Wang, Jing Cui, Ran Ju, Xuefei Tan, Feng Li, Boyan Tu, Guoping Li, Lin Han, Lei Han:

Poster abstract: A low latency and high scalability network with extreme QoS assurance. 1-2 - Lei Pi, Lan Wang:

Secure bootstrapping and access control in NDN-based smart home systems. 1-2 - Md. Mahmud Hossain

, Ragib Hasan
, Shams Zawoad:
Probe-IoT: A public digital ledger based forensic investigation framework for IoT. 1-2 - Nabeel Akhtar, Ibrahim Matta

, Ali Raza
, Yuefeng Wang:
Demo abstract: EL-SEC: ELastic management of security applications on virtualized infrastructure. 1-2 - Amit Samanta

, Yong Li:
Time-to-think: Optimal economic considerations in mobile edge computing. 1-2 - Sung Kim, Mohammad Mamunur Rashid, Saurabh Deo, Javier Perez-Ramirez, Mikhail Galeev, Ganesh Venkatesan, Sabyasachi Dey, William Li, Dave Cavalcanti:

Demo/poster abstract: Enabling time-critical applications over next-generation 802.11 networks. 1-2 - Markus Klugel

, Wolfgang Kellerer
:
Poster abstract: Semi-decentralized interference management in D2D-enabled cellular networks. 1-2 - Yahui Li, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Jiangyuan Yao, Yingya Guo:

Efficient network configuration verification using optimized datalog. 1-2 - Tingjun Chen

, Mahmood Baraani Dastjerdi, Guy Farkash, Jin Zhou, Harish Krishnaswamy, Gil Zussman:
Demo abstract: Open-access full-duplex wireless in the ORBIT testbed. 1-2 - Mariya Zheleva, Timothy LaRock, Paul Schmitt, Petko Bogdanov

:
Efficient spectrum summarization using compressed spectrum scans. 1-2 - Jun Yang, Nan Zhou, Yifan Li, Xueer Xue, Yingfei Dong, Yibo Xue, Jun Li:

Poster abstract: Homophily and controversy: On the role of public opinion in online viral diffusion. 1-2 - Qiuxi Zhu

, Md. Yusuf Sarwar Uddin
, Nalini Venkatasubramanian, Cheng-Hsin Hsu, Hua-Jun Hong:
Poster abstract: Enhancing reliability of community Internet-of-Things deployments with mobility. 1-2 - Mariya Zheleva, Petko Bogdanov, Timothy LaRock, Paul Schmitt:

AirVIEW: Unsupervised transmitter detection for next generation spectrum sensing. 1-2 - Chavoosh Ghasemi, Hamed Yousefi, Kang G. Shin, Beichuan Zhang:

Poster abstract: Routing meets caching in named data networks. 1-2 - Xiang Zhou, Zheng Chang, Chuanhao Sun, Xing Zhang:

Demo abstract: Context-aware video streaming with Q-learning for MEC-enabled cellular networks. 1-2 - Zhangyu Guan, Lorenzo Bertizzolo, Emrecan Demirors

, Tommaso Melodia
:
Demo abstract: WNOS: Software-defined generation of distributed optimal control programs for wireless networks. 1-2 - Ming-Hung Wang

, Meng-Han Tsai, Wei-Chieh Yang, Chin-Laung Lei:
Infection categorization using deep autoencoder. 1-2 - Chathurika Ranaweera, Paolo Monti, Bjorn Skubic, Marija Furdek

, Lena Wosinska
, Ampalavanapillai Nirmalathas, Christina Lim, Elaine Wong:
Optical X-haul options for 5G fixed wireless access: Which one to choose? 1-2 - Lanfranco Zanzi, Vincenzo Sciancalepore

, Andres Garcia-Saavedra
, Xavier Costa-Pérez
:
OVNES: Demonstrating 5G network slicing overbooking on real deployments. 1-2 - Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem

, Yulong Shen, Jianfeng Ma:
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation. 1-2 - Amir Helmy, Ahmed Helmy

:
Poster abstract: Detecting epileptic seizures with a smartphone using frequency analysis. 1-2 - Dominik S. Buse

, Christoph Sommer
, Falko Dressler
:
Demo abstract: Integrating a driving simulator with city-scale VANET simulation for the development of next generation ADAS systems. 1-2 - Tian Pan

, Weite Qin, Tao Huang
, Fan Yang, Xinhua E, Hao Li:
Towards power-aware network function virtualization on multi-core processors. 1-2 - Alemnew Sheferaw Asrese, Ermias Andargie Walelgne, Andra Lutu, Özgü Alay, Jörg Ott:

Poster abstract: Measuring web latency in cellular networks. 1-2 - Andrian Putina, Steven Barth, Albert Bifet

, Drew Pletcher, Cristina Precup, Patrice Nivaggioli, Dario Rossi:
Unsupervised real-time detection of BGP anomalies leveraging high-rate and fine-grained telemetry data. 1-2 - Yuanfang Chen, Falin Chen, Ting Wu, Weitong Hu, XiaoHua Xu:

A deep learning model for secure cyber-physical transportation systems. 1-2 - Huacheng Zeng:

Demo abstract: An anti-jamming wireless communication system. 1-2 - George Koutitas, J. Jabez

, C. Grohman, C. Radhakrishna, Varun Kumar Siddaraju, Shivesh Singh Jadon:
Demo/poster abstract: XReality research lab - Augmented reality meets Internet of Things. 1-2 - Apostolos Destounis, Georgios S. Paschos, Stefano Paris, Jeremie Leguay, Lazaros Gkatzikis, Spyridon Vassilaras, Mathieu Leconte, Paolo Medagliani:

Slice-based column generation for network slicing. 1-2 - Jan Rüth

, René Glebke, Tanja Ulmen, Klaus Wehrle
:
Demo abstract: Towards in-network processing for low-latency industrial control. 1-2 - Yuzhe Yang

, Zixuan Bai, Zhiwen Hu, Zijie Zheng, Kaigui Bian, Lingyang Song:
AQNet: Fine-grained 3D spatio-temporal air quality monitoring by aerial-ground WSN. 1-2 - Ari Pouttu, Olli Liinamaa, Giuseppe Destino:

Demo/poster abstract: 5G test network (5GTN) - Environment for demonstrating 5G and IoT convergence during 2018 Korean Olympics between Finland and Korea. 1-2 - Qiang Li

, Xuan Feng, Haining Wang, Limin Sun:
Discovery of Internet of Thing devices based on rules. 1-2 - János Harmatos, Dávid Jocha, Róbert Szabó, Balázs Péter Gero, Balázs Németh, János Czentye, Balázs Sonkoly

:
Self-healing in multi-constrained multi-actor virtualization orchestration. 1-2 - Xiaoran Fan, Zhijie Zhang, Wade Trappe, Yanyong Zhang, Richard E. Howard, Zhu Han

:
Demo abstract: A practical secret communication system by perturbing focused phases among distributed transmitters. 1-2 - Qi Xia, Qiben Yan

, Qin Zhou:
High-bandwidth ultrasonic communication using graphene-based acoustic devices. 1-2 - Tiffany Tuor, Shiqiang Wang, Theodoros Salonidis, Bong Jun Ko, Kin K. Leung:

Demo abstract: Distributed machine learning at resource-limited edge nodes. 1-2 - Ran Ben-Basat, Rana Shahout, Roy Friedman:

Frequent elements on query defined ranges. 1-2 - Markus Klugel

, Wolfgang Kellerer
:
Poster abstract: Iterative waterfilling and multi-channel standard interference. 1-2 - Haihua Gong, Kai Xing, Wenwen Du:

A user activity pattern mining system based on human activity recognition and location service. 1-2 - Yang Zhou, Hao Jin, Peng Liu, Haowei Zhang, Tong Yang, Xiaoming Li:

Accurate per-flow measurement with bloom sketch. 1-2 - V. Marbukh:

Towards managing age of network state information in challenged networks. 1-2 - Lihua Ruan

, Sourav Mondal
, Elaine Wong:
Machine learning based bandwidth prediction in tactile heterogeneous access networks. 1-2 - David Barach, Leonardo Linguaglossa, Damjan Marion, Pierre Pfister, Salvatore Pontarelli, Dario Rossi, Jerome Tollet:

Batched packet processing for high-speed software data plane functions. 1-2 - Vladimir Marbukh:

Economics of networked infrastructures at the edge of undesirable contagion: A case of SIS infection. 1-2 - Tong Yang, Siang Gao, Zhouyi Sun, Yufei Wang, Yulong Shen, Xiaoming Li:

Diamond sketch: Accurate per-flow measurement for real IP streams. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














