infocom 2015 论文列表
2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015.
|
Truthful incentive mechanisms for crowdsourcing.
The importance of being earnest in crowdsourcing systems.
Incentivize crowd labeling under budget constraint.
Providing long-term participation incentive in participatory sensing.
Noise-tolerant localization from incomplete range measurements for wireless sensor networks.
Fingerprint-free tracking with dynamic enhanced field division.
A fistful of pings: Accurate and lightweight anycast enumeration and geolocation.
Network-side positioning of cellular-band devices with minimal effort.
Ricci curvature of the Internet topology.
Measuring the mixing time of a network.
What is wrecking your data plan? A measurement study of mobile web overhead.
A measurement study on TCP behaviors in HSPA+ networks on high-speed rails.
VINCE: Exploiting visible light sensing for smartphone-based NFC systems.
Characterizing home wireless performance: The gateway view.
Ambient rendezvous: Energy-efficient neighbor discovery via acoustic sensing.
Adaptive online power-management for Bluetooth Low Energy.
Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices.
Fine-grained data sharing in cloud computing for mobile devices.
SMOC: A secure mobile cloud computing platform.
Harnessing encrypted data in cloud for secure and efficient image sharing from mobile devices.
When smart grid meets geo-distributed cloud: An auction approach to datacenter demand response.
An online procurement auction for power demand response in storage-assisted smart grids.
A truthful incentive mechanism for emergency demand response in colocation data centers.
Comprehensive understanding of operation cost reduction using energy storage for IDCs.
DPCP: A protocol for optimal pull coordination in decentralized social networks.
Information sharing in distributed stochastic bandits.
Unveiling the adoption and cascading process of OSN-based gifting applications.
Sampling online social networks via heterogeneous statistics.
Leveraging traffic repetitions for high-speed deep packet inspection.
Tapping into the router's unutilized processing power.
Independent counter estimation buckets.
TimeFlip: Scheduling network updates with timestamp-based TCAM ranges.
High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility.
Revealing, characterizing, and detecting crowdsourcing spammers: A case study in community Q&A.
Crowdsourced live streaming over the cloud.
Crowdsourcing with Tullock contests: A new perspective.
Fusing noisy fingerprints with distance bounds for indoor localization.
Static power of mobile devices: Self-updating radio maps for wireless indoor localization.
The collocation of measurement points in large open indoor environment.
Fundamental limits of RSS fingerprinting based indoor localization.
An empirical mixture model for large-scale RTT measurements.
Modeling repeating behaviors in packet arrivals: Detection and measurement.
Do we need a perfect ground-truth for benchmarking Internet traffic classifiers?
Sequential and adaptive sampling for matrix completion in network monitoring systems.
Dancing with light: Predictive in-frame rate selection for visible light networks.
Ultrasonic intra-body networking: Interference modeling, stochastic channel access and rate control.
Steering with eyes closed: Mm-Wave beam steering without in-band measurement.
Chirp signal-based aerial acoustic communication for smart devices.
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure.
Assessing attack vulnerability in networks with uncertainty.
Distinct element counting in distributed dynamic data streams.
Distributed algorithms for content allocation in interconnected content distribution networks.
Rate alteration attacks in smart grid.
P3: Joint optimization of charger placement and power allocation for wireless power transfer.
Peak-minimizing online EV charging: Price-of-uncertainty and algorithm robustification.
Persistence and availability of floating content in a campus environment.
On the efficiency of social recommender networks.
Timely video popularity forecasting based on social networks.
MOOC performance prediction via clickstream data and social learning networks.
BFAST: Unified and scalable index for NDN forwarding architecture.
Least recently used caches under the Shot Noise Model.
Can web pages be classified using anonymized TCP/IP headers?
Efficient analysis of caching strategies under dynamic content popularity.
User recruitment for mobile crowdsensing over opportunistic networks.
Contextual-code: Simplifying information pulling from targeted sources in physical world.
Crowdsensing Under (Soft) Control.
Multi-task assignment for crowdsensing in mobile social networks.
Quantized conflict graphs for wireless network optimization.
Capacity analysis of hybrid wireless networks with long-range social contacts behavior.
ChASER: Channel-aware symbol error reduction for high-performance WiFi systems in dynamic channel environment.
On setting-up asynchronous ad hoc wireless networks.
Harmony: Content resolution for smart devices using acoustic channel.
A-DCF: Design and implementation of delay and queue length based wireless MAC.
Scheduling in wireless networks with full-duplex cut-through transmission.
A coded generalization of selective repeat ARQ.
Bits and coins: Supporting collaborative consumption of mobile internet.
VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks.
Interference alignment using shadow channel.
Incentivizing sharing in realtime D2D streaming networks: A mean field game perspective.
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Generalized pattern matching string search on encrypted data in cloud systems.
Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee.
SEISA: Secure and efficient encrypted image search with access control.
Truthful online double auctions for dynamic mobile crowdsourcing.
ITSEC: An information-theoretically secure framework for truthful spectrum auctions.
Resisting three-dimensional manipulations in distributed wireless spectrum auctions.
Socially-optimal online spectrum auctions for secondary wireless communication.
PhaseU: Real-time LOS identification with WiFi.
Speedup of information exchange using multiple channels in wireless ad hoc networks.
On end-to-end delay minimization in wireless networks under the physical interference model.
Scalable clock synchronization in wireless networks with low-duty-cycle radio operations.
CSMA k-SIC - A class of distributed MAC protocols and their performance evaluation.
FD2: A directional full duplex communication system for indoor wireless networks.
Revisiting overlapped channels: Efficient broadcast in multi-channel wireless networks.
SIEVE: Scalable user grouping for large MU-MIMO systems.
Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships.
PLACE: Physical layer cardinality estimation for large-scale RFID systems.
Fast RFID grouping protocols.
Expecting the unexpected: Fast and reliable detection of missing RFID tags in the wild.
Blast: Accelerating high-performance data analytics applications by optical multicast.
Optimizing throughput in optical networks: The joint routing and power control problem.
WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips.
WaveCube: A scalable, fault-tolerant, high-performance optical data center architecture.
Hermes: Latency optimal task assignment for resource-constrained mobile computing.
Dynamic adaptive techniques for learning application delay tolerance for mobile data offloading.
Code offload with least context migration in the mobile cloud.
Online scheduling for delayed mobile offloading.
TSearch: Target-oriented low-delay node searching in DTNs with social network properties.
Forming external behaviors by leveraging internal opinions.
On the efficiency-optimal Markov chains for distributed networking applications.
Pairwise stochastic bounded confidence opinion dynamics: Heavy tails and stability.
A new upper bound on the control information required in multiple access communications.
Routing in accumulative multi-hop networks.
Maximizing network capacity of MPR-capable wireless networks.
A better constant approximation for minimum 3-connected m-dominating set problem in unit disk graph using Tutte decomposition.
Improving learning and adaptation in security games by exploiting information asymmetry.
Complexities in Internet peering: Understanding the "Black" in the "Black Art".
Work capacity of freelance markets: Fundamental limits and decentralized schemes.
Formation games of reliable networks.
Scaling wireless full-duplex in multi-cell networks.
AirShare: Distributed coherent transmission made seamless.
Be responsible: A novel communications scheme for full-duplex MIMO radios.
HybridCast: Joint multicast-unicast design for multiuser MIMO networks.
Distributed network resource allocation for multi-tiered multimedia applications.
A new paradigm for multiflow in wireless networks: Theory and applications.
TCPRand: Randomizing TCP payload size for TCP fairness in data center networks.
Comprehensive understanding of TCP Incast problem.
RFID cardinality estimation with blocker tags.
TagBooth: Deep shopping data acquisition powered by RFID tags.
Beyond one-dollar mouse: A battery-free device for 3D human-computer interaction via RFID tags.
Human object estimation via backscattered radio frequency signal.
Optimal communication structures for big data aggregation.
Temporal update dynamics under blind sampling.
Modeling randomized data streams in caching, data processing, and crawling applications.
SmartEye: Real-time and efficient cloud image sharing for disaster environments.
Financial analysis of 4G network deployment.
Around the web in six weeks: Documenting a large-scale crawl.
Off-path round trip time measurement via TCP/IP side channels.
Secondary markets for mobile data: Feasibility and benefits of traded data plans.
De-anonymizing scale-free social networks by percolation graph matching.
On the progressive spread over strategic diffusion: Asymptotic and computation.
Construction of simple graphs with a target joint degree matrix and beyond.
Cliques in hyperbolic random graphs.
Copula analysis for statistical network calculus.
Flow-based feasibility test of linear interference alignment with arbitrary interference topology.
Local detection of infections in heterogeneous networks.
Fast optimal nonconcave resource allocation.
Sponsoring mobile data: An economic analysis of the impact on users and content providers.
Backpressure meets taxes: Faithful data collection in stochastic mobile phone sensing systems.
Automatic generation of mobile app signatures from traffic observations.
WiGest: A ubiquitous WiFi-based gesture recognition system.
CodeRepair: PHY-layer partial packet recovery without the pain.
Outsourcing coordination and management of home wireless access points through an open API.
Convergence properties of general network selection games.
Enabling TDMA for today's wireless LANs.
Achieving utility-delay-reliability tradeoff in stochastic network optimization with finite buffers.
Priority queueing with multiple packet characteristics.
Performance analysis for overflow loss systems of processor-sharing queues.
Low-complexity multi-resource packet scheduling for network function virtualization.
Real-time failure prediction in online services.
Robust geometric forest routing with tunable load balancing.
GEARSHIFT: Guaranteeing availability requirements in SLAs using hybrid fault tolerance.
Fault-tolerant coverage with maximum lifetime in wireless sensor networks.
Enhancing reliability and response times via replication in computing clusters.
Near optimal placement of virtual network functions.
AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication.
ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement.
Provable fairness for TDMA scheduling.
Minimum-Latency Beaconing Schedule in duty-cycled multihop wireless networks.
On the universality of age-based scheduling in wireless networks.
Latency-aware rate adaptation in 802.11n home networks.
Mitigating macro-cell outage in LTE-Advanced deployments.
FiWi enhanced LTE-A HetNets with unreliable fiber backhaul sharing and WiFi offloading.
Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics.
Efficient resource scheduling for a secondary network in shared spectrum.
Throughput-optimal broadcast on directed acyclic graphs.
Delay models in ethernet long-reach passive optical networks.
Stochastic and fluid index policies for resource allocation problems.
The online disjoint set cover problem and its applications.
All or none? The dilemma of handling WiFi broadcast traffic in smartphone suspend mode.
iSelf: Towards cold-start emotion labeling using transfer learning with smartphones.
Fine-grained sleep monitoring: Hearing your breathing with smartphones.
Energy-aware video streaming on smartphones.
Bridging link power asymmetry in mobile whitespace networks.
VeRV: A temporal and data-concerned verification framework for the vehicle bus systems.
A consensus-based approach for platooning with inter-vehicular communications.
Data preference matters: A new perspective of safety data dissemination in vehicular ad hoc networks.
Price of fairness for opportunistic and priority schedulers.
The power of slightly more than one sample in randomized load balancing.
On multiplexing flows: Does it hurt or not?
Optimal scheduling for jobs with progressive deadlines.
On sample-path staleness in lazy data replication.
iPath: Intelligent and optimal path selection for Byzantine fault tolerant communication.
Congestion-aware single link failure recovery in hybrid SDN networks.
Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network.
Optimization for speculative execution in a MapReduce-like cluster.
Capturing resource tradeoffs in fair multi-resource allocation.
A truthful (1-ε)-optimal mechanism for on-demand cloud resource provisioning.
When hybrid cloud meets flash crowd: Towards cost-effective service provisioning.
Efficient secure outsourcing of large-scale linear systems of equations.
Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems.
Enhancing privacy through caching in location-based services.
Personalized location privacy in mobile networks: A social group utility approach.
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design.
Modeling link correlation in low-power wireless networks.
SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs.
Minimum connected dominating set construction in wireless networks under the beeping model.
Priority algorithm for near-data scheduling: Throughput and heavy-traffic optimality.
Optimal scheduling of a large-scale multiclass parallel server system with ergodic cost.
Service-martingales: Theory and applications to the delay analysis of random access protocols.
On the complexity of optimal routing and content caching in heterogeneous networks.
A cloudlet-based multi-lateral resource exchange framework for mobile users.
Differentially private and strategy-proof spectrum auction with approximate revenue maximization.
PPER: Privacy-preserving economic-robust spectrum auction in wireless networks.
HySIM: A hybrid spectrum and information market for TV white space networks.
Need for speed: CORA scheduler for optimizing completion-times in the cloud.
Energy-efficient heuristics for job assignment in processor-sharing server farms.
Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing.
HybridSwap: A scalable and synthetic framework for guest swapping on virtualization platform.
Exploring full-duplex gains in multi-cell wireless networks: A spatial stochastic framework.
A behavior-aware profiling of handheld devices.
On factors affecting the usage and adoption of a nation-wide TV streaming service.
Measurement and modeling of user transitioning among networks.
SPIRO: Turning elephants into mice with efficient RF transport.
Supporting WiFi and LTE co-existence.
A correlated shadowing model for urban wireless networks.
Trajectory aware macro-cell planning for mobile users.
Network coding-based multicast in multi-hop CRNs under uncertain spectrum availability.
Low-delay distributed source coding for time-varying sources with unknown statistics.
On optimal diversity in network-coding-based routing in wireless networks.
Content caching and delivery over heterogeneous wireless networks.
Dynamic defense strategy against advanced persistent threat with insiders.
Adversary-aware IP address randomization for proactive agility against sophisticated attackers.
Agile virtualized infrastructure to proactively defend against cyber attacks.
Original SYN: Finding machines hidden behind firewalls.
VM-tracking: Visual-motion sensing integration for real-time human tracking.
On 2-way neighbor discovery in wireless networks with directional antennas.
On heterogeneous neighbor discovery in wireless sensor networks.
Local face-view barrier coverage in camera sensor networks.
Policy-compliant path diversity and bisection bandwidth.
Compact location encodings for scalable Internet routing.
Optimized network traffic engineering using segment routing.
Minimum control latency of dynamic networks.
MadeCR: Correlation-based malware detection for cognitive radio.
WINET: Indoor white space network design.
Optimal multicast in dense multi-channel multi-radio wireless networks.
Robust optimization of cognitive radio networks powered by energy harvesting.
Location-aware associated data placement for geo-distributed data-intensive applications.
StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters.
Provably delay efficient data retrieving in storage clouds.
Online procurement auctions for resource pooling in client-assisted cloud storage systems.
JITScope: Protecting web users from control-flow hijacking attacks.
Detecting distributed signature-based intrusion: The case of multi-path routing attacks.
Differentially private publication of general time-serial trajectory data.
Accelerating regular expression matching over compressed HTTP.
Drawing dominant dataset from big sensory data in wireless sensor networks.
Beyond duty cycling: Wake-up radio with selective awakenings for long-lived wireless sensing systems.
SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks.
Index policies for optimal mean-variance trade-off of inter-delivery times in real-time sensor networks.
The (surprising) computational power of the SDN data plane.
Virtual machine migration planning in software-defined networks.
OFFICER: A general optimization framework for OpenFlow rule allocation and endpoint policy enforcement.
On the co-existence of distributed and centralized routing control-planes.
Changing channel without strings: Coordination-free wideband spectrum adaptation.
Mode and user selection for multi-user MIMO WLANs without CSI.
Priority differentiation in cognitive radio networks.
Joint sensing task and subband allocation for large-scale spectrum profiling.
Rapier: Integrating routing and scheduling for coflow-aware data center networks.
RUSH: Routing and scheduling for hybrid data center networks.
End-to-end scheduling for all-optical data centers.
Exploiting large system dynamics for designing simple data center schedulers.
Dissecting packet loss in mobile broadband networks from the edge.
Exploiting causes and effects of wireless link correlation for better performance.
On the accuracy of smartphone-based mobile network measurement.
How bad are the rogues' impact on enterprise 802.11 network performance?
Performance analysis for two-tier cellular systems based on probabilistic distance models.
ADMM based algorithm for eICIC configuration in heterogeneous cellular networks.
Radio resource allocation in heterogeneous wireless networks: A spatial-temporal perspective.
Femto-matching: Efficient traffic offloading in heterogeneous cellular networks.
PeerClean: Unveiling peer-to-peer botnets through dynamic group behavior analysis.
Network latency prediction for personal devices: Distance-feature decomposition from 3D sampling.
On the impossibility of efficient self-stabilization in virtual overlays with churn.
ISP-friendly peer-assisted on-demand streaming of long duration content in BBC iPlayer.
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Exploiting mobile social behaviors for Sybil detection.
Game-theory-based batch identification of invalid signatures in wireless mobile networks.
Queuing the trust: Secure backpressure algorithm against insider threats in wireless networks.
Minimizing the maximum sensor movement for barrier coverage in the plane.
Boosting sensor network calculus by thoroughly bounding cross-traffic.
On the construction of maximum-quality aggregation trees in deadline-constrained WSNs.
Composite event coverage in wireless sensor networks with heterogeneous sensors.
UbiFlow: Mobility management in urban-scale software defined IoT.
Cracking network monitoring in DCNs with SDN.
A distributed and robust SDN control plane for transactional network updates.
Reliable multicast routing for software-defined networks.
SpecGuard: Spectrum misuse detection in dynamic spectrum access systems.
Optimal secondary user packet size in mobile cognitive radio networks under fading channels.
Improved rendezvous algorithms for heterogeneous cognitive radio networks.
Efficient broadcast on fragmented spectrum in cognitive radio networks.
Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs.
More load, more differentiation - A design principle for deadline-aware congestion control.
Absorbing micro-burst traffic by enhancing dynamic threshold policy of data center switches.
Towards 48-fold cabling complexity reduction in large flattened butterfly networks.
Power-throughput tradeoffs of 802.11n/ac in smartphones.
Energy-aware wireless scheduling with near optimal backlog and convergence time tradeoffs.
ExPerio - Exploiting periodicity for opportunistic energy-efficient data transmission.
Energy-efficient transmission with data sharing.
Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks.
A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks.
On the performance of successive interference cancellation in D2D-enabled cellular networks.
Adaptive video streaming over whitespace: SVC for 3-Tiered spectrum sharing.
Optimized layered integrated video encoding.
Redundancy control through traffic deduplication.
Video acuity assessment in mobile devices.