infocom 2017 论文列表
2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1-4, 2017.
|
On human mobility predictability via WLAN logs.
iType: Using eye gaze to enhance typing privacy.
POWERFUL: Mobile app fingerprinting via power analysis.
Understanding and managing notifications.
Mobile traffic forecasting for maximizing 5G network slicing resource utilization.
Service chain embedding with maximum flow in software defined network and application to the next-generation cellular network architecture.
Dynamic path selection in 5G multi-RAT wireless networks.
Dynamic base station formation for solving NLOS problem in 5G millimeter-wave communication.
Conflict graph embedding for wireless network optimization.
Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR.
Robust routing in interdependent networks.
Online knapsack problem and budgeted truthful bipartite matching.
Energy-efficient W-layer for behavior-based implicit authentication on mobile devices.
LeakSemantic: Identifying abnormal sensitive network transmissions in mobile applications.
Your face your heart: Secure mobile face authentication with photoplethysmograms.
Large-scale invisible attack on AFC systems with NFC-equipped smartphones.
Accurate recovery of internet traffic data under dynamic measurements.
Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection.
Optimal elephant flow detection.
Randomized admission policy for efficient top-k and frequency estimation.
Coexistence of Dedicated Short Range Communications (DSRC) and Wi-Fi: Implications to Wi-Fi performance.
Towards instantaneous collision and interference detection using in-band full duplex.
Inter-client interference cancellation for full-duplex networks.
When and how much to neutralize interference?
LightTouch: Securely connecting wearables to ambient displays with user intent.
Meta-activity recognition: A wearable approach for logic cognition-based activity sensing.
FitCoach: Virtual fitness coach empowered by wearable mobile devices.
Detecting on-body devices through creeping wave propagation.
Adaptive scheduling of parallel jobs in spark streaming.
Energy efficient real-time task scheduling on CPU-GPU hybrid clusters.
Performance optimization of Hadoop workflows in public clouds through adaptive task partitioning.
BlitzG: Exploiting high-bandwidth networks for fast graph processing.
Internet-wide study of DNS cache injections.
Checks and balances: A tripartite public key infrastructure for secure web-based connections.
A signaling game model for moving target defense.
A secure and verifiable outsourcing scheme for matrix inverse computation.
Towards truthful auction mechanisms for task assignment in mobile device clouds.
Timely cloud gaming.
QoE and power efficiency tradeoff for fog computing networks with fog node cooperation.
Stealth migration: Hiding virtual machines on the network.
Rumor source detection under querying with untruthful answers.
Scalable name-based data synchronization for named data networking.
Cache policies for linear utility maximization.
Analysis of tandem PIT and CS with non-zero download delay.
Design and application of a many-to-one communication protocol.
Edge-based beaconing schedule in duty-cycled multihop wireless networks.
Beam-forecast: Facilitating mobile 60 GHz networks via model-driven beam steering.
A framework for evaluating physical-layer network coding gains in multi-hop wireless networks.
Knitter: Fast, resilient single-user indoor floor plan construction.
Taming the inconsistency of Wi-Fi fingerprints for device-free passive indoor localization.
NaviLight: Indoor localization and navigation under arbitrary lights.
JADE: Zero-knowledge device localization and environment mapping for millimeter wave systems.
Multipath TCP for datacenters: From energy efficiency perspective.
Improving ECN marking scheme with micro-burst traffic in data center networks.
Convergence to multi-resource fairness under end-to-end window control.
TCP Rapid: From theory to practice.
Privacy-preserving pattern matching over encrypted genetic data in cloud computing.
MAGIK: An efficient key extraction mechanism based on dynamic geomagnetic field.
Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Sybil-proof incentive mechanisms for crowdsensing.
A simple re-sequencing load-balanced switch based on analytical packet reordering bounds.
Heavy traffic queue length behavior in switches with reconfiguration delay.
Coflex: Navigating the fairness-efficiency tradeoff for coflow scheduling.
Coflow scheduling in input-queued switches: Optimal delay scaling and algorithms.
TagScreen: Synchronizing social televisions through hidden sound markers.
Challenging the limits: Sampling online social networks with cost constraints.
STRM: A sister tweet reinforcement process for modeling hashtag popularity.
Exploiting social influence for context-aware event recommendation in event-based social networks.
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Monitoring quality-of-experience for operational cellular networks using machine-to-machine traffic.
Why it takes so long to connect to a WiFi access point.
ButterFly: Mobile collaborative rendering over GPU workload migration.
Riding the airways: Ultra-wideband ambient backscatter via commercial broadcast systems.
Fusing RFID and computer vision for fine-grained object tracking.
Tag size profiling in multiple reader RFID systems.
Tag-compass: Determining the spatial direction of an object with small dimensions.
Stable user-defined priorities.
A new backpressure algorithm for joint rate control and routing with vanishing utility optimality gaps and finite queue lengths.
Fractional wireless link scheduling and polynomial approximate capacity regions of wireless networks.
Non-concave network utility maximization: A distributed optimization approach.
Disaster avoidance control against heavy rainfall.
Availability-aware mapping of service function chains.
Towards reliable and lightweight source switching for datacenter networks.
CubeX: Leveraging glocality of cube-based networks for RAM-based key-value store.
Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point.
Single restart with time stamps for computational offloading in a semi-online setting.
A game theoretic analysis of selfish mobile computation offloading.
Keep your nice friends close, but your rich friends closer - Computation offloading using NFC.
PUFSec: Device fingerprint-based security architecture for Internet of Things.
Proximity based IoT device authentication.
ADMin: Adaptive monitoring dissemination for the Internet of Things.
A resource-aware and time-critical IoT framework.
MON: Mission-optimized overlay networks.
A new stable peer-to-peer protocol with non-persistent peers.
SVC-TChain: Incentivizing good behavior in layered P2P video streaming.
Bandwidth scheduling in overlay networks with linear capacity constraints.
Network function virtualization enablement within SDN data plane.
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds.
One step at a time: Optimizing SDN upgrades in ISP networks.
FlowConvertor: Enabling portability of SDN applications.
mEEC: A novel error estimation code with multi-dimensional feature.
An implantable low-power ultrasonic platform for the Internet of Medical Things.
Finding MARLIN: Exploiting multi-modal communications for reliable and low-latency underwater networking.
A parity check analog decoder for molecular communication based on biological circuits.
On packet loss rates in modern 802.11 networks.
ACT-AP: ACTivator access point for multicast over WLAN.
Quiet ACK: ACK transmit power control in IEEE 802.11 WLANs.
acPad: Enhancing channel utilization for 802.11ac using packet padding.
An experimental reality check on the scaling laws of swarming systems.
The efficiency of open access in platforms for networked cournot markets.
Emerging internet content and service providers' relationships: Models and analyses of engineering, business and policy impact.
Economic viability of a virtual ISP.
Understanding source location privacy protocols in sensor networks via perturbation of time series.
Analysis of secrecy performance in fading multiple access wiretap channel with SIC receiver.
Interactive message transmission over adversarial wiretap channel II.
Secret key agreement using a virtual wiretap channel.
Proactive VNF provisioning with multi-timescale cloud resources: Fusing online learning and online optimization.
Robust web service recommendation via quantile matrix factorization.
Online job dispatching and scheduling in edge-clouds.
Online auction for IaaS clouds: Towards elastic user demands and weighted heterogeneous VMs.
A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems.
SpecSense: Crowdsensing for efficient querying of spectrum occupancy.
Where are you from: Home location profiling of crowd sensors from noisy and sparse crowdsourcing data.
CENTURION: Incentivizing multi-requester mobile crowd sensing.
Contact avoidance routing in delay tolerant networks.
EMF: Embedding multiple flows of information in existing traffic for concurrent communication among heterogeneous IoT devices.
WiZig: Cross-technology energy communication over a noisy channel.
C-Morse: Cross-technology communication with transparent Morse coding.
OpinionWalk: An efficient solution to massive trust assessment in online social networks.
Behavior in social learning networks: Early detection for online short-courses.
Learning distributed representations for large-scale dynamic social networks.
Active opinion-formation in online social networks.
TUM: Towards ubiquitous multi-device localization for cross-device interaction.
EchoTrack: Acoustic device-free hand tracking on smart phones.
LiCompass: Extracting orientation from polarized light.
SilentTalk: Lip reading through ultrasonic sensing on mobile phones.
ZipWeave: Towards efficient and reliable measurement based mobile coverage maps.
Can you find me now? Evaluation of network-based localization in a 4G LTE network.
WOLoc: WiFi-only outdoor localization using crowdsensed hotspot labels.
SatProbe: Low-energy and fast indoor/outdoor detection based on raw GPS processing.
Complexity vs. optimality: Unraveling source-destination connection in uncertain graphs.
Economies of scale in parallel-server systems.
Network simplification preserving bandwidth and routing capabilities.
Fundamental limits of failure identifiability by boolean network tomography.
Spatiotemporal modeling and prediction in cellular networks: A big data enabled deep learning approach.
Joint spatial and temporal classification of mobile traffic demands.
Better with fewer bits: Improving the performance of cardinality estimation of large data streams.
Optimise web browsing on heterogeneous mobile platforms: A machine learning based approach.
Transparent cross-technology communication over data traffic.
Efficient minimization of sum and differential costs on machines with job placement constraints.
Considering resource demand misalignments to reduce resource over-provisioning in cloud datacenters.
Interconnecting heterogeneous devices in the personal mobile cloud.
Rate-aware flow scheduling for commodity data center networks.
Optimal multicast in virtualized datacenter networks with software switches.
Flier: Flow-level congestion-aware routing for direct-connect data centers.
Joint bidding and geographical load balancing for datacenters: Is uncertainty a blessing or a curse?
Crowdsourcing spectrum data decoding.
Group discovery time in device-to-device (D2D) proximity services (ProSe) networks.
Efficient remote radio head switching scheme in cloud radio access network: A load balancing perspective.
CFOSynt: Carrier frequency offset assisted clock syntonization for wireless sensor networks.
Universal path tracing for large-scale sensor networks.
Constructing connected dominating sets in battery-free networks.
Energy-efficient joint communication-motion planning for relay-assisted wireless robot surveillance.
On the rao-blackwellization and its application for graph sampling via neighborhood exploration.
Viral marketing with positive influence.
Why approximate when you can get the exact? Optimal targeted viral marketing at scale.
Scalable bicriteria algorithms for the threshold activation problem in online social networks.
Password correlation: Quantification, evaluation and application.
SybilSCAR: Sybil detection in online social networks via local rule based propagation.
CCSP: A compressed certificate status protocol.
Botnet protocol inference in the presence of encrypted traffic.
Energy-delay tradeoff for request bundling on smartphones.
Cost of differential privacy in demand reporting for smart grid economic dispatch.
How they interact? Understanding cyber and physical interactions against fault propagation in smart grid.
Electric grid power flow model camouflage against topology leaking attacks.
MASH: A rate adaptation algorithm for multiview video streaming over HTTP.
Beyond the touch: Interaction-aware mobile gamecasting with gazing pattern prediction.
Modeling and analyzing the influence of chunk size variation on bitrate adaptation in DASH.
A control theoretic approach to ABR video streaming: A fresh look at PID-based rate adaptation.
Modeling and performance analysis of Wi-Fi networks coexisting with LTE-U.
A novel coupled queueing model to control traffic via QoS-aware collision pricing in cognitive radio networks.
A 2D heterogeneous rendezvous protocol for multi-wideband cognitive radio networks.
Pilot-based full-duplex spectrum-sensing and multichannel-MAC over non-time-slotted cognitive radio networks.
Switch: Enabling transmitter and receiver participation in seamless lightweight control.
Random access with repeated contentions for emerging wireless technologies.
Impacts of channel selection on industrial wireless sensor-actuator networks.
Multi-user downlink with single-user uplink can starve TCP.
On optimal service differentiation in congested network markets.
Network slicing games: Enabling customization in multi-tenant networks.
Optimising 5G infrastructure markets: The business of network slicing.
Cooperative and competitive operator pricing for mobile crowdsourced internet access.
DyMo: Dynamic monitoring of large scale LTE-Multicast systems.
Progressive damage assessment and network recovery after massive failures.
SLA-verifier: Stateful and quantitative verification for service chaining.
List of shared risk link groups representing regional failures with limited size.
Approximation algorithms for the NFV service distribution problem.
On the latency-accuracy tradeoff in approximate MapReduce jobs.
AccurateML: Information-aggregation-based approximate processing for fast and accurate machine learning on MapReduce.
Provably efficient algorithms for joint placement and allocation of virtual network functions.
Make a difference: Diversity-driven social mobile crowdsensing.
When data acquisition meets data analytics: A distributed active learning framework for optimal budgeted mobile crowdsensing.
Context-aware data quality estimation in mobile crowdsensing.
Secret-sharing-based secure user recruitment protocol for mobile crowdsensing.
Caching-aware recommendations: Nudging user preferences towards better caching performance.
Popularity-aware caching increases the capacity of wireless networks.
Proactive retention aware caching.
Rethinking CDN design with distributee time-varying traffic demands.
FEC for VoIP using dual-delay streaming codes.
Low latency low loss streaming using in-network coding and caching.
MOMD: A multi-object multi-dimensional auction for crowdsourced mobile video streaming.
QDLCoding: QoS-differentiated low-cost video encoding scheme for online video service.
Every pixel counts: Fine-grained UI rendering analysis for mobile applications.
ER: Early recognition of inattentive driving leveraging audio devices on smartphones.
iGuard: A real-time anti-theft system for smartphones.
Surviving screen-off battery through out-of-band Wi-Fi coordination.
CatCharger: Deploying wireless charging lanes in a metropolitan road network through categorization and clustering of vehicle traffic.
Secure resource allocations for polarization-enabled cooperative cognitive radio networks with energy harvesting capability.
Optimizing wireless charger placement for directional charging.
Optimal energy requesting strategy for RF-based energy harvesting wireless communications.
Throughput optimization with latency constraints.
Measurement-based scheduler for multi-class QoE optimization in wireless networks.
Optimizing stochastic scheduling in fork-join queueing models: Bounds and applications.
Load balancing in large-scale systems with multiple dispatchers.
Securing multipath TCP: Design & implementation.
DDoS attack on cloud auto-scaling mechanisms.
FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks.
Network anti-spoofing with SDN data plane.
LRC: Dependency-aware cache management for data analytics clusters.
On localizing urban events with Instagram.
Verifiable social data outsourcing.
AccountTrade: Accountable protocols for big data trading against dishonest consumers.
BD-CAT: Balanced dynamic content addressing in trees.
Load balancing over symmetric virtual topologies.
Scalable software-defined networking through hybrid switching.
Load balancing with bounded convergence in dynamic networks.
One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
DSC: Dynamic stripe construction for asynchronous encoding in clustered file system.
Taming tail latency for erasure-coded, distributee storage systems.
Latency analysis for distributed storage.
RFlow+: An SDN-based WLAN monitoring and management framework.
Towards rule enforcement verification for software defined networks.
Traffic aware placement of interdependent NFV middleboxes.
Minimizing flow statistics collection cost of SDN using wildcard requests.
Tracking mm-Wave channel dynamics: Fast beam training strategies under mobility.
Smart underground antenna arrays: A soil moisture adaptive beamforming approach.
Beamforming in the body: Energy-efficient and collision-free communication for implants.
BUSH: Empowering large-scale MU-MIMO in WLANs with hybrid beamforming.
Fast downstream to many (computational) RFIDs.
DBF: A general framework for anomaly detection in RFID systems.
RF-scanner: Shelf scanning with robot-assisted RFID systems.
PHY assisted tree-based RFID identification.
Augmenting max-weight with explicit learning for wireless scheduling with switching costs.
Maximum-weighted subset of communication requests schedulable without spectral splitting.
Generalized finitary real-time calculus.
Optimal control for generalized network-flow problems.
Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories.
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Local private ordinal data distribution estimation.
Location-privacy-aware review publication mechanism for local business service systems.
Discovering valuations and enforcing truthfulness in a deadline-aware scheduler.
Power of redundancy: Designing partial replication for multi-tier applications.
Handling flash deals with soft guarantee in hybrid cloud.
Addressing job processing variability through redundant execution and opportunistic checkpointing: A competitive analysis.
Expect the unexpected: Sub-second optimization for segment routing.
ABSORB: Autonomous base station with optical reflex backhaul to adapt to fluctuating demand.
Competitive analysis for online scheduling in software-defined optical WAN.
Combinatorial approach for network switch design in data center networks.
Harnessing hardware defects for improving wireless link performance: Measurements and applications.
Enhancing wireless performance using reflectors.
STRALE: Mobility-aware PHY rate and frame aggregation length adaptation in WLANs.
Perceiving accurate CSI phases with commodity WiFi devices.
Photo crowdsourcing for area coverage in resource constrained environments.
Multihop calibration for mobile sensing: K-hop Calibratability and reference sensor deployment.
Joint sensing duty cycle scheduling for heterogeneous coverage guarantee.
Distributed non-structure based data aggregation for duty-cycle wireless sensor networks.
Unveiling polarization in social networks: A matrix factorization approach.
Incentivizing strategic users for social diffusion: Quantity or quality?
An efficient randomized algorithm for rumor blocking in online social networks.
Motif clustering and overlapping clustering for social network analysis.
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
RSPP: A reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks.
CASHEIRS: Cloud assisted scalable hierarchical encrypted based image retrieval system.
When gene meets cloud: Enabling scalable and efficient range query on encrypted genomic data.
Malicious co-residency on the cloud: Attacks and defense.
BAC: Bandwidth-aware compression for efficient live migration of virtual machines.
Scheduling jobs across geo-distributed datacenters with max-min fairness.
Cluster fair queueing: Speeding up data-parallel jobs with delay guarantees.
CoCloud: Enabling efficient cross-cloud file collaboration based on inefficient web APIs.
One more queue is enough: Minimizing flow completion time with explicit priority notification.
Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers.
Multi-tenant multi-objective bandwidth allocation in datacenters using stacked congestion control.