


default search action
36th IPCCC 2017: San Diego, CA, USA
- 36th IEEE International Performance Computing and Communications Conference, IPCCC 2017, San Diego, CA, USA, December 10-12, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6468-7

- Bo Wu, Ke Xu, Qi Li, Fan Yang:

Robust and lightweight fault localization. 1-8 - Yajun Yu, Mingwei Xu, Yuan Yang:

When QUIC meets TCP: An experimental study. 1-8 - Jinping Yu, Xinxin Fan, Guoqiang Zhang, Jingping Bi:

Scheduling loop-free updates for multiple policies with overlaps in software-defined networks. 1-8 - Zhengyu Yang, Morteza Hoseinzadeh, Ping Wong, John Artoux, Clay Mayers, David Thomas Evans, Rory Thomas Bolt, Janki Bhimani, Ningfang Mi, Steven Swanson

:
H-NVMe: A hybrid framework of NVMe-based storage system in cloud computing environment. 1-8 - Yang Chen, Jie Wu:

Link-based fine granularity flow migration in SDNs to reduce packet loss. 1-8 - Zhengyu Yang, Morteza Hoseinzadeh, Allen Andrews, Clay Mayers, David Thomas Evans, Rory Thomas Bolt, Janki Bhimani, Ningfang Mi, Steven Swanson

:
AutoTiering: Automatic data placement manager in multi-tier all-flash datacenter. 1-8 - Xin Li, Jie Wu, Zhuzhong Qian, Shaojie Tang, Sanglu Lu:

Towards location-aware joint job and data assignment in cloud data centers with NVM. 1-8 - Ziyan Song, Ting Zhang, Qing Li

, Guang Yang, Yong Jiang:
START: Sensible traffic scheduling in dynamic data center networks. 1-8 - Biyu Zhou, Jie Wu, Fa Zhang, Zhiyong Liu:

Resource optimization for survivable embedding of virtual clusters in cloud data centers. 1-8 - Shuaibing Lu, Zhiyi Fang, Jie Wu, Guannan Qu:

Elastic scaling of virtual clusters in cloud data center networks. 1-8 - Catalina Aranzazu Suescun, Mihaela Cardei:

Spatio-temporal event detection and reporting in mobile-sink wireless sensors networks. 1-8 - Zhuo Jiang, Qian Wu, Hewu Li, Jianping Wu:

Can MPTCP increase system efficiency and fairness in 802.11 multirate WLAN environment? 1-7 - J. J. Garcia-Luna-Aceves:

Avoiding interference from hidden terminals with carrier tones. 1-8 - Haizhou Bao

, Qin Liu
, Chuanhe Huang, Xiaohua Jia:
Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networks. 1-7 - J. J. Garcia-Luna-Aceves, Spencer Thompson, Joshua Stern:

Time-based persistence in channel-access protocols with carrier sensing. 1-8 - Hongliang Li, Jie Wu, Zhen Jiang, Xiang Li, Xiaohui Wei, Yuan Zhuang:

Integrated recovery and task allocation for stream processing. 1-8 - Abdel-Hameed A. Badawy, Donald Yeung:

Optimizing locality in graph computations using reuse distance profiles. 1-8 - Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao:

Does the content defined chunking really solve the local boundary shift problem? 1-8 - Xiaoyun Zhang, Daji Qiao:

On minimizing the maximum sensor movement to construct a horizontal barrier. 1-8 - Hai Zhu, Fu Xiao, Lijuan Sun, Xiaohui Xie, Ruchuan Wang:

Robust passive static human detection with commodity WiFi devices. 1-8 - Xin Liang, Xiaolin Gui, A. N. Jian, Dewang Ren:

Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy. 1-8 - Fudong Qiu, Fan Wu, Xiaofeng Gao, Guihai Chen

:
A privacy-preserving combinatorial auction mechanism for spectrum redistribution. 1-8 - Fei Xu, Haiqing Pan, Zigang Cao, Zhen Li, Gang Xiong

, Yangyang Guan, Siu-Ming Yiu:
Identifying malware with HTTP content type inconsistency via header-payload comparison. 1-7 - Yihao Jia

, Ying Liu, Gang Ren, Lin He
:
Revisiting inter-AS IP spoofing let the protection drive source address validation. 1-10 - Jing Zheng, Jianhua Sun, Kun Sun, Bo Wu, Qi Li:

Cookie-based amplification repression protocol. 1-8 - Xiaodong Zhu

, Jinlin Wang
, Lingfang Wang, Weining Qi:
Popularity-based neighborhood collaborative caching for information-centric networks. 1-8 - Jehan-François Pâris, Vero Estrada-Galiñanes

, Ahmed Amer, Carlos Rincon:
Using entanglements to increase the reliability of two-dimensional square RAID arrays. 1-8 - Han Zhang, Xingang Shi, Yingya Guo, Haijun Geng, Zhiliang Wang, Xia Yin:

Joint source selection and transfer optimization for erasure coding storage system. 1-8 - Zhixiang Mao, Shengan Zheng

, Linpeng Huang, Yanyan Shen:
A DAX-enabled mmap mechanism for log-structured in-memory file systems. 1-8 - Jannatun Noor, Hasan Ibna Akbar, Ruhul Amin Sujon, A. B. M. Alim Al Islam:

Secure processing-aware media storage (SPMS). 1-8 - Zhenyu Ju, Chuanhe Huang, Yanjiao Chen

, Lin Ma:
A truthful auction mechanism for resource provisioning in mobile crowdsensing. 1-8 - Mohamed Abdelaal, Mohammad Qaid, Frank Dürr, Kurt Rothermel:

iSense: Energy-aware crowd-sensing framework. 1-9 - Yangsu Liu, Zhenzhe Zheng, Fan Wu, Xiaofeng Gao, Guihai Chen

:
Fault tolerant mechanism design for time coverage in crowdsensing system. 1-8 - Luoyao Hao

, Chengming Jin, Xiaofeng Gao, Fan Wu, Guihai Chen
:
Towards cost-effective and budget-balanced task allocation in crowdsourcing systems. 1-8 - Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar

, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla:
Approach to detect non-adversarial overlapping collusion in crowdsourcing. 1-8 - Zengyin Yang, Hewu Li, Qian Wu, Jianping Wu:

Analyzing and optimizing BGP stability in future space-based internet. 1-8 - Xiaohui Nie, Youjian Zhao, Guo Chen, Kaixin Sui, Yazheng Chen, Dan Pei

, Miao Zhang, Jiyang Zhang:
TCP WISE: One initial congestion window is not enough. 1-8 - Hemin Yang, Jared S. Ivey, George F. Riley:

Scalability comparison of SDN control plane architectures based on simulations. 1-8 - Tran Phuong Thao, Adetokunbo Makanju, Ayumu Kubota:

Anonymous and analysable web browsing. 1-8 - Ziqing Zhang, Cuicui Kang, Peipei Fu, Zigang Cao, Zhen Li, Gang Xiong:

Metrie learning with statistical features for network traffic classification. 1-7 - Alan Hylton, Janche Sang, Greg Henselman-Petrusek

, Robert Short:
Performance enhancement of a computational persistent homology package. 1-8 - Fatih Berber

, Ramin Yahyapour
:
Response time speedup of multi-tier internet systems. 1-9 - Luoyao Hao

, Chengming Jin, Xiaofeng Gao, Linghe Kong
, Fan Wu, Guihai Chen
:
QoE-aware optimization for SVC-based adaptive streaming in D2D communications. 1-8 - Xiaoguang Niu, Zhen Wang, Qiongzan Ye, Yihao Zhang, Jiawei Wang:

A hierarchical-learning-based crowdedness estimation mechanism for crowdsensing buses. 1-8 - Minh Quan Ho, Christian Obrecht, Bernard Tourancheau, Benoît Dupont de Dinechin, Julien Hascoet:

Improving 3D lattice boltzmann method stencil with asynchronous transfers on many-core processors. 1-9 - Feng Sheng, Qiang Cao, Haoran Cai, Jie Yao, Changsheng Xie:

Laro: Lazy repartitioning for graph workloads on heterogeneous clusters. 1-8 - Ying Mao, Jenna Oak, Anthony Pompili, Daniel Beer, Tao Han, Peizhao Hu:

DRAPS: Dynamic and resource-aware placement scheme for docker containers in a heterogeneous cluster. 1-8 - Xue Ouyang, Huan Zhou, Stephen J. Clement, Paul Townend, Jie Xu:

Mitigate data skew caused stragglers through ImKP partition in MapReduce. 1-8 - Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:

Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. 1-9 - Junjie Wang, Jinyang Li, Tianshu Pang, Xiaoshan Sun, Qi Liu, Hengchang Liu:

Towards a holistic and optimized framework for smart grid regulation. 1-8 - Yu Chen, Hong Li, Weiwei Zhao, Lin Zhang, Zhongjin Liu, Zhiqiang Shi:

IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares. 1-8 - Chang Liu, Lingwu Zeng, Junzheng Shi, Fei Xu, Gang Xiong, Siu-Ming Yiu:

Auto-identification of background traffic based on autonomous periodic interaction. 1-8 - Luis Felipe Zapata Rivera, Catalina Aranzazu Suescun, Imadeldin O. Mahgoub

:
An energy-aware collaborative multi-agent system for autonomous underwater vehicles. 1-8 - Donghe Li, Qingyu Yang, Wei Yu

, Dou An, Xinyu Yang, Wei Zhao
:
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. 1-8 - Meixuan Li, Yu-e Sun, He Huang, Jing Yuan

, Yang Du, Yu Bao, Yonglong Luo:
Profit maximization resource allocation in cloud computing with performance guarantee. 1-2 - Fan Wu, Wang Yang, Qingshan Guo, Xinfang Xie:

Reducing idle listening time in 802.11 via NDN. 1-2 - Khaleda Akhter Papry, A. B. M. Alim Al Islam:

Fault-tolerant 3D mesh for network-on-chip. 1-2 - Yu Tian, Xin Ye

:
Motif: A social reading platform that helps people filter, memorize, and organize online contents. 1-4 - Shuo-Han Chen

, Wei-Shin Li, Min-Hong Shen, Yi-Han Lien, Tseng-Yi Chen
, Tsan-sheng Hsu, Hsin-Wen Wei, Wei-Kuan Shih:
An update-overhead-aware caching policy for write-optimized file systems on SMR disks. 1-2 - Jianwei Zhang, Xinchang Zhang, Meng Sun:

Two-level decomposition for multi-commodity multicast traffic engineering. 1-2 - Liudong Zuo:

Bandwidth preemption for data transfer request with higher priority. 1-2 - Salem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Subaschandrabose, Zilong Ye:

Secure the internet of things with challenge response authentication in fog computing. 1-2 - Zheng Liu, Qing Li

, Dan Wang
, Mingwei Xu:
Balancing interdependent networks: Theory and algorithm. 1-2 - A. S. M. Rizvi, Tarik Reza Toha

, Siddhartha Shankar Das
, Sriram Chellappan, A. B. M. Alim Al Islam:
Many-objective performance enhancement in computing clusters. 1-2 - Eren Balevi, Richard D. Gitlin:

Unsupervised machine learning in 5G networks for low latency communications. 1-2 - Janki Bhimani, Jingpei Yang, Zhengyu Yang, Ningfang Mi, N. H. V. Krishna Giri, Rajinikanth Pandurangan, Changho Choi, Vijay Balakrishnan:

Enhancing SSDs with multi-stream: What? why? how? 1-2 - Bhargava Kalla, Nandakishore Santhi

, Abdel-Hameed A. Badawy, Gopinath Chennupati, Stephan J. Eidenbenz:
Probabilistic Monte Carlo simulations for static branch prediction. 1-4 - Yosef Ashibani

, Qusay H. Mahmoud:
An efficient and secure scheme for smart home communication using identity-based signcryption. 1-7 - Baiyu Chen, Zhengyu Yang, Siyu Huang, Xianzhi Du, Zhiwei Cui, Janki Bhimani, Xin Xie, Ningfang Mi:

Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles. 1-6 - Tzu-Ting Tseng, Chung-An Shen:

The VLSI architecture of a highly efficient configurable pre-processor for MIMO detections. 1-5 - Muhammad Shoaib, Özlem Durmaz Incel

, Hans Scholten, Paul J. M. Havinga:
Resource consumption analysis of online activity recognition on mobile phones and smartwatches. 1-6 - Dou An, Qingyu Yang, Wei Yu

, Donghe Li, Yang Zhang, Wei Zhao
:
Towards truthful auction for big data trading. 1-7 - Christof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva:

Towards scalable and adaptable security monitoring. 1-6 - S. M. Osman Gani, Yaser P. Fallah, Gaurav Bansal, Takayuki Shimizu:

Message content control for distributed map sharing in vehicle safety communications. 1-7 - Fukuro Koshiji, Ryogo Urushidate, Kohji Koshiji:

Biomedical signal transmission using human body communication. 1-2 - Ashref Aloui, Mounira Msahli, Talel Abdessalem, Stéphane Bressan, Sihem Mesnager:

Preserving privacy in distributed system (PPDS) protocol: Security analysis. 1-7 - Aklilu Daniel Tesfamicael, Vicky Liu

, Ernest Foo
, William J. Caelli:
Modeling for performance and security balanced trading communication systems in the cloud. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














