default search action
37th INFOCOM 2018: Honolulu, HI, USA - Workshops
- IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops, INFOCOM Workshops 2018, Honolulu, HI, USA, April 15-19, 2018. IEEE 2018, ISBN 978-1-5386-5979-3
- Mohannad Alhanahnah, Qiben Yan:
Towards best secure coding practice for implementing SSL/TLS. 1-6 - Xu Han, Yanheng Liu, Jian Wang:
Modeling and analyzing privacy-awareness social behavior network. 7-12 - Yanyan Li, Mengjun Xie:
Understanding secure and usable gestures for realtime motion based authentication. 13-20 - Yijin Chen, Yuming Mao, Lei Cui, Supeng Leng, Yunkai Wei, Xiaosha Chen:
A two layer model of malware propagation in a search engine context. 21-26 - Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi:
App traffic mutation: Toward defending against mobile statistical traffic analysis. 27-32 - Yuanxiong Guo, Yanmin Gong, Laurent L. Njilla, Charles A. Kamhoua:
A stochastic game approach to cyber-physical security with applications to smart grid. 33-38 - Shuqing He, Bo Cheng, Haifeng Wang, Xuelian Xiao, Yunpeng Cao, Junliang Chen:
Data security storage model for fog computing in large-scale IoT application. 39-44 - Alessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re, Marco Morana:
A hybrid system for malware detection on big data. 45-50 - Ming Cheung, James She, Lufi Liu:
Deep learning-based online counterfeit-seller detection. 51-56 - Joong-Lyul Lee, Jaejin Hwang, Hyesung Park, Donghyun Kim:
On latency-aware tree topology construction for emergency responding VANET applications. 57-63 - Tabinda Salam, Waheed ur Rehman, Razaullah Khan, Israr Khan, Xiaofeng Tao:
Dynamic resource allocation and mobile aggregator selection in mission critical MTC networks. 64-69 - Weifeng Gao, Wan Du, Zhiwei Zhao:
Reliable channel allocation for mission oriented low-power wireless networks. 70-75 - Jinhwan Jung, Daewoo Kim, Joonki Hong, Joohyun Kang, Yung Yi:
Parameterized slot scheduling for adaptive and autonomous TSCH networks. 76-81 - Kayhan Zrar Ghafoor, Linghe Kong, Ali Safaa Sadiq, Zouina Doukha, Fuad Mawlood Shareef:
Trust-aware routing protocol for mobile crowdsensing environments. 82-87 - Xin Li, Qiuyuan Huang, Dapeng Oliver Wu:
A repeated stochastic game approach for strategic network selection in heterogeneous networks. 88-93 - Jingyuan Yang, Jin Cao, Ran He, Lisa Zhang:
A unified clustering approach for identifying functional zones in suburban and urban areas. 94-99 - Haina Zheng, Ke Xiong, Pingyi Fan, Zhangdui Zhong:
Buildings' producing filter effect on PM25 data: A model-fitting approach. 100-105 - Yifan Hou, Pan Zhou, Jie Xu, Dapeng Oliver Wu:
Course recommendation of MOOC with big data support: A contextual online learning approach. 106-111 - Shahab Farazi, Andrew G. Klein, D. Richard Brown:
Average age of information for status update systems with an energy harvesting server. 112-117 - Roy D. Yates:
Age of information in a network of preemptive servers. 118-123 - Elie Najm, Emre Telatar:
Status updates in a multi-stream M/G/1/1 preemptive queue. 124-129 - Jaya Prakash Champati, Hussein Al-Zubaidy, James Gross:
Statistical guarantee optimization for age of information for the D/G/1 queue. 130-135 - Yin Sun, Elif Uysal-Biyikoglu, Sastry Kompella:
Age-optimal updates of multiple information flows. 136-141 - Shuaibing Lu, Zhiyi Fang, Jie Wu:
Online provisioning for virtual clusters in multi-tenant cloud data center network. 142-147 - Lee Gillam, Konstantinos Katsaros, Mehrdad Dianati, Alexandros Mouzakitis:
Exploring edges for connected and autonomous driving. 148-153 - Yiming Liu, F. Richard Yu, Xi Li, Hong Ji, Victor C. M. Leung:
Hybrid computation offloading in fog and cloud networks with non-orthogonal multiple access. 154-159 - I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo:
VENUS: Verifiable range query in data streaming. 160-165 - Federico Chiariotti, Stepán Kucera, Andrea Zanella, Holger Claussen:
LEAP: A latency control protocol for multi-path data delivery with pre-defined QoS guarantees. 166-171 - Mohammad Wardat, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdallah A. Khreishah:
Cloud data centers revenue maximization using server consolidation: Modeling and evaluation. 172-177 - Balázs Németh, Mark Szalay, Janos Doka, Matthias Rost, Stefan Schmid, László Toka, Balázs Sonkoly:
Fast and efficient network service embedding method with adaptive offloading to the edge. 178-183 - Erfan Meskar, Ben Liang:
Fair multi-resource allocation with external resource for mobile edge computing. 184-189 - Fei Wang, Xi Zhang:
Dynamic interface-selection and resource allocation over heterogeneous mobile edge-computing wireless networks with energy harvesting. 190-195 - Yi-Hsuan Hung, Chih-Yu Wang, Ren-Hung Hwang:
Combinatorial clock auction for live video streaming in mobile edge computing. 196-201 - Abubakr O. Al-Abbasi, Vaneet Aggarwal:
EdgeCache: An optimized algorithm for CDN-based over-the-top video streaming services. 202-207 - Chia-ling Chan, Romain Fontugne, Kenjiro Cho, Shigeki Goto:
Monitoring TLS adoption using backbone and edge traffic. 208-213 - Safiqul Islam, Michael Welzl, Kristian A. Hiorth, David A. Hayes, Grenville Armitage, Stein Gjessing:
ctrlTCP: Reducing latency through coupled, heterogeneous multi-flow TCP congestion control. 214-219 - Pengfei Wang, Aleksandar Kuzmanovic:
"What's the score?": A first look at sports live data feed services. 220-225 - Matthieu Caneill, Noel De Palma, Ali Aït-Bachir, Bastien Dine, Rachid Mokhtari, Yagmur Gizem Cinar:
Online metrics prediction in monitoring systems. 226-231 - Zhenkun Qiu, Sihai Zhang, Wuyang Zhou, Shui Yu:
Empirical study on taxi's mobility nature in dense urban area. 232-237 - Phuong Ha, Lisong Xu:
Available bandwidth estimation in public clouds. 238-243 - Ze Li, Zengshan Tian, Mu Zhou, Zhenyuan Zhang, Yue Jin:
An accurate and robust environment sensing algorithm for enhancing indoor localization. 244-249 - Rupam Kundu, Gopi Krishna Tummala, Prasun Sinha:
CaneScanner: Obstacle detection for people with visual disabilities. 250-255 - Tanmoy Das, Gopi Krishna Tummala, Prasun Sinha:
TagTone: Scalable RFID communication through multi-frequency analysis. 256-261 - Yiyun Zhou, Meng Han, Liyuan Liu, Jing (Selena) He, Yan Wang:
Deep learning approach for cyberattack detection. 262-267 - Arvind Narayanan, Eman Ramadan, Zhi-Li Zhang:
OpenCDN: An ICN-based open content distribution system using distributed actor model. 268-273 - Yang Yang, Kunlun Wang, Guowei Zhang, Xu Chen, Xiliang Luo, Ming-Tuo Zhou:
Maximal energy efficient task scheduling for homogeneous fog networks. 274-279 - Yi Zhang, Xiaoke Jiang, Yi Wang, Kai Lei:
Cache and delivery of VR video over named data networking. 280-285 - Kai Lei, Jie Xing, Yi Wang, Keke Li, Dong Lin:
Let sources know: Enabling access tracking in a content centric context. 286-292 - Dávid Haja, Marton Szabo, Mark Szalay, Adam Nagy, András Kern, László Toka, Balázs Sonkoly:
How to orchestrate a distributed OpenStack. 293-298 - Fengxian Guo, Liangde Ma, Heli Zhang, Hong Ji, Xi Li:
Joint load management and resource allocation in the energy harvesting powered small cell networks with mobile edge computing. 299-304 - Anna Wisniewska, Mohammad Abu Shattal, Bilal Khan, Ala I. Al-Fuqaha, Kirk Dombrowski:
Emergence of pecking order in social Cognitive Radio societies. 305-311 - Fatemeh Afghah, Alireza Shamsoshoara, Laurent Njilla, Charles A. Kamhoua:
A reputation-based stackelberg game model to enhance secrecy rate in spectrum leasing to selfish IoT devices. 312-317 - Zhouyou Gu, Wibowo Hardjawana, Branka Vucetic, Lok Sang Ho:
Multi-tenant spectrum and SSIDs controller for WiFi networks. 318-323 - Sander Vrijders, Dimitri Staessens, Marco Capitani, Vincenzo Maffione:
Rumba: A python framework for automating large-scale Recursive Internet Experiments on GENI and FIRE+. 324-329 - Parishad Karimi, Shreyasee Mukherjee, Jakub Kolodziejski, Ivan Seskar, Dipankar Raychaudhuri:
Measurement based mobility emulation platform for next generation wireless networks. 330-335 - Ronan-Alexandre Cherrueau, Matthieu Simonin, Alexandre van Kempen:
EnosStack: A LAMP-like stack for the experimenter. 336-341 - Cise Midoglu, Leonhard Wimmer, Andra Lutu, Ozgu Alay, Carsten Griwodz:
MONROE-Nettest: A configurable tool for dissecting speed measurements in mobile broadband networks. 342-347 - Songtao Feng, Jing Yang:
Optimal status updating for an energy harvesting sensor with a noisy channel. 348-353 - Yuanzhang Xiao, Yin Sun:
A dynamic jamming game for real-time status updates. 354-360 - Jing Zhong, Roy D. Yates, Emina Soljanin:
Minimizing content staleness in dynamo-style replicated storage systems. 361-366 - Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Towards an effective age of information: Remote estimation of a Markov source. 367-372 - Shenglong Li, Quanlu Zhang, Zhi Yang, Hanyu Zhao, Yafei Dai:
Building efficient and available distributed transaction with Paxos-based coding consensus. 373-378 - Wataru Morita, Daisuke Sugahara, Kouji Hirata, Miki Yamamoto:
AQM with multi-queue for microburst in data center networks. 379-384 - Ruijiu Mao, Vaneet Aggarwal, Mung Chiang:
Stochastic non-preemptive co-flow scheduling with time-indexed relaxation. 385-390 - Youngmi Jin, Michiaki Hayashi:
Trade-off between fairness and efficiency in dominant alpha-fairness family. 391-396 - Feng Wang, Lixin Gao, Xiaozhe Shao, Hiroaki Harai, Kenji Fujikawa:
Efficient handling of excessive locators in hierarchical addressing. 397-402 - Doron Zarchy, Amogh Dhamdhere, Constantine Dovrolis, Michael Schapira:
Nash-peering: A new techno-economic framework for internet interconnections. 403-408 - Tomoyuki Kitabatake, Romain Fontugne, Hiroshi Esaki:
BLT: A taxonomy and classification tool for mining BGP update messages. 409-414 - Klaus-Tycho Foerster, Mahmoud Parham, Marco Chiesa, Stefan Schmid:
TI-MFA: Keep calm and reroute segments fast. 415-420 - Yun Lin, Wenxin Li, Jianguo Sun, Qidi Wu:
Improving wireless devices identification using gray relationship classifier to enhance wireless network security. 421-425 - Nan Lu, Qinghe Du, Li Sun, Pinyi Ren:
Traffic-driven intrusion detection for massive MTC towards 5G networks. 426-431 - Abubakr O. Al-Abbasi, Vaneet Aggarwal:
Mean latency optimization in erasure-coded distributed storage systems. 432-437 - Christos Stergiou, Kostas E. Psannis, Theofanis Xifilidis, Andreas P. Plageras, Brij B. Gupta:
Security and privacy of big data for social networking services in cloud. 438-443 - Zahra Pooranian, Kang-Cheng Chen, Chia-Mu Yu, Mauro Conti:
RARE: Defeating side channels based on data-deduplication in cloud storage. 444-449 - Hao Hao, Changqiao Xu, Mu Wang, Haiyong Xie, Yifeng Liu, Dapeng Oliver Wu:
Knowledge-centric proactive edge caching over mobile content distribution network. 450-455 - Xiao Zhang, Haijun Wang, Haitao Zhao:
An SDN framework for UAV backbone network towards knowledge centric networking. 456-461 - Sadia Din, Anand Paul, Awais Ahmad, Syed Hassan Ahmed, Gwanggil Jeon, Danda B. Rawat:
Hierarchical architecture for 5G based software-defined intelligent transportation system. 462-467 - Qingxin Xia, Feng Hong, Yuan Feng, Zhongwen Guo:
MotionHacker: Motion sensor based eavesdropping on handwriting via smartwatch. 468-473 - Di Zhang, Zheng Chang, Timo Hämäläinen, Weinan Gao:
A contract-based resource allocation mechanism in wireless virtualized network. 474-479 - Mu Zhou, Yiyao Liu, Wei Nie, Liangbo Xie, Zengshan Tian:
Secure mobile crowdsourcing for WLAN indoor localization. 480-485 - Xi Zhang, Jingqing Wang:
Statistical QoS-driven power adaptation for distributed caching based mobile offloading over 5G wireless networks. 486-491 - Tongxin Li, Junyu Liu, Min Sheng, Jiandong Li:
Spectral efficiency optimization in caching enabled ultra-dense small cell networks. 492-498 - Tingting Liu, Jun Li, BaekGyu Kim, Chung-Wei Lin, Shinichi Shiraishi, Jiang Xie, Zhu Han:
Distributed file allocation using matching game in mobile fog-caching service network. 499-504 - Lu Pei, Zhaohui Yang, Cunhua Pan, Wenhuan Huang, Ming Chen:
Joint bandwidth, caching and association optimization for D2D assisted wireless networks. 505-510 - Wei Jiang, Gang Feng, Shuang Qin, Tak-Shing Peter Yum:
Efficient D2D content caching using multi-agent reinforcement learning. 511-516 - Mengting Liu, F. Richard Yu, Yinglei Teng, Victor C. M. Leung, Mei Song:
Joint computation offloading and content caching for wireless blockchain networks. 517-522 - Enrico Gregori, Valerio Luconi, Alessio Vecchio:
NeutMon: Studying neutrality in European mobile networks. 523-528 - Jakob Struye, Bart Braem, Steven Latré, Johann Márquez-Barja:
The CityLab testbed - Large-scale multi-technology wireless experimentation in a city environment: Neural network-based interference prediction in a smart city. 529-534 - Stephen A. Seidel, Michael T. Mehari, Charles J. Colbourn, Eli De Poorter, Ingrid Moerman, Violet R. Syrotiuk:
Analysis of large-scale experimental data from wireless networks. 535-540 - Mohamed Moulay, Vincenzo Mancuso:
Experimental performance evaluation of WebRTC video services over mobile networks. 541-546 - Qing He, György Dán, Viktoria Fodor:
Minimizing age of correlated information for wireless camera networks. 547-552 - Juan Liu, Xijun Wang, Bo Bai, Huaiyu Dai:
Age-optimal trajectory planning for UAV-assisted data collection. 553-558 - Yunquan Dong, Zhengchuan Chen, Pingyi Fan:
Uplink age of information of unilaterally powered two-way data exchanging systems. 559-564 - Sneihil Gopal, Sanjit K. Kaul:
A game theoretic approach to DSRC and WiFi coexistence. 565-570 - Joshika Agarwal, Rishabh Jain, Sanjay Kumar Dhurandher, Isaac Woungang, Nitin Gupta:
Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN. 571-576 - Majed Haddad, Piotr Wiecek, Oussama Habachi:
A game theoretic load-aware network selection. 577-582 - Shuan He, Wei Wang:
Spectrum-shared NOMA game-theoretical power requisition in context-aware wireless multimedia communications. 583-588 - Shu Sun, Theodore S. Rappaport, Mansoor Shafi:
Hybrid beamforming for 5G millimeter-wave multi-cell networks. 589-596 - Muhammad Nazmul Islam, Navid Abedini, Georg K. Hampel, Sundar Subramanian, Junyi Li:
Investigation of performance in integrated access and backhaul networks. 597-602 - Shahram Shahsavari, Fraida Fund, Elza Erkip, Shivendra S. Panwar:
Capturing capacity and profit gains with base station sharing in mmWave cellular networks. 603-609 - Faisal N. Abu-Khzam, Karine Lamaa:
Efficient heuristic algorithms for positive-influence dominating set in social networks. 610-615 - Anis Elgabli, Vaneet Aggarwal:
GroupCast: Preference-aware cooperative video streaming with scalable video coding. 616-621 - Christelle Caillouet, Frédéric Giroire, Tahiry Razafindralambo:
Optimization of mobile sensor coverage with UAVs. 622-627 - Dimitrios Zorbas, Christos Douligeris:
Computing optimal drone positions to wirelessly recharge IoT devices. 628-633 - Sidharth Kumar, Suraj Suman, Swades De:
Backhaul and delay-aware placement of UAV-enabled base station. 634-639 - Rachad Atat, Junchao Ma, Hao Chen, Ulysses Lee, Jonathan D. Ashdown, Lingjia Liu:
Cognitive relay networks with energy and mutual-information accumulation. 640-644 - Shuanshuan Wu, Pedram Johari, Nicholas Mastronarde, Josep Miquel Jornet:
On the photo-thermal effect of intra-body nano-optical communications on red blood cells. 645-650 - Yi Chen, Chong Han:
Channel modeling and analysis for wireless networks-on-chip communications in the millimeter wave and terahertz bands. 651-656 - Haoyue Tang, Jintao Wang, Yahong Rosa Zheng:
Covert communications with extremely low power under finite block length over slow fading. 657-661 - Simon Pietro Romano, Fabio Giangrande:
On the use of network coding as a virtual network function in satellite-terrestrial CDNs. 662-667 - Chia-Yu Chang, Navid Nikaein, Thrasyvoulos Spyropoulos:
Radio access network resource slicing for flexible service execution. 668-673 - Máté Cserép, Ákos Recse, Róbert Szabó, László Toka:
Business network formation among 5G providers. 674-679 - Sihua Shao, Hanbin Zhang, Dimitrios Koutsonikolas, Abdallah Khreishah:
Two-dimensional reduction of beam training overhead in crowded 802.11ad based networks. 680-685 - Yanpeng Yang, Hossein Shokri Ghadikolaei, Carlo Fischione, Marina Petrova, Ki Won Sung:
Reducing initial cell-search latency in mmWave networks. 686-691 - Yusuke Koda, Koji Yamamoto, Takayuki Nishio, Masahiro Morikura:
Reinforcement learning based predictive handover for pedestrian-aware mmWave networks. 692-697 - Xiaoming Fu, Hong Huang, Xiang-Yang Li, Haisheng Tan, Jie Tang:
A comparative analysis of school pupils' daily habits in Germany and China. 698-703