


default search action
25th ICCCN 2016: Waikoloa, HI, USA
- 25th International Conference on Computer Communication and Networks, ICCCN 2016, Waikoloa, HI, USA, August 1-4, 2016. IEEE 2016, ISBN 978-1-5090-2279-3

- Tuan Le, Haik Kalantarian, Mario Gerla:

A Buffer Management Strategy Based on Power-Law Distributed Contacts in Delay Tolerant Networks. 1-8 - James Griffioen, Tilman Wolf, Kenneth L. Calvert:

A Coin-Operated Software-Defined Exchange. 1-8 - Yuming Ge, Bo Deng, Yi Sun, Libo Tang, Dajiang Sheng, Yantao Zhao, Gaogang Xie, Kavé Salamatian

:
A Comprehensive Investigation of User Privacy Leakage to Android Applications. 1-6 - En-Hau Yeh, Phone Lin

, Yi-Bing Lin, Chia-Peng Lee:
A Connection-Driven Mechanism for Energy Saving of Small-Cell Networks. 1-8 - Swetank Kumar Saha

, Viral Vijay Vira, Anuj Garg, Dimitrios Koutsonikolas:
A Feasibility Study of 60 GHz Indoor WLANs. 1-9 - Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu

, Peng Zhao:
A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid. 1-9 - Wen Qi, Jin Wang, Hermine Hovhannisyan, Kejie Lu, Jianping Wang, Junda Zhu:

A Generic Mitigation Framework against Cross-VM Covert Channels. 1-10 - Zhenquan Qin, Yingxiao Sun, Liang Sun, Lei Shu

, Lei Wang, Wenzhe Zhang, Bingxian Lu
:
A Joint Duty Cycle and Network Coding MAC Protocol for Underwater Wireless Sensor Networks. 1-9 - Junggab Son, Donghyun Kim, Rahman Mitchel Tashakkori, Alade O. Tokuta, Heekuck Oh:

A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection. 1-9 - Shengjie Xu

, Yi Qian, Rose Qingyang Hu:
A Secure Data Learning Scheme in Big Data Applications. 1-9 - Bei Liu, Wei Wang, Donghyun Kim, Yingshu Li

, Sung-Sik Kwon:
A Simpler Constant Factor Approximation for the k-Connected m-Domination Set Problem in Unit Disk Graph. 1-8 - Jinwei Liu, Haiying Shen, Xiang Zhang:

A Survey of Mobile Crowdsensing Techniques: A Critical Component for the Internet of Things. 1-6 - Jianjun Wen, Zeeshan Ansar

, Waltenegus Dargie
:
A System Architecture for Managing Complex Experiments in Wireless Sensor Networks. 1-9 - Xuan Feng, Qiang Li

, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:
Active Profiling of Physical Devices at Internet Scale. 1-9 - Zhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue, Yingfei Dong:

ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data. 1-9 - Reshma Kotamsetty, Manimaran Govindarasu:

Adaptive Latency-Aware Query Processing on Encrypted Data for the Internet of Things. 1-7 - Siobahn C. Day

, James Brown, Zachery Thomas, India Gregory, Lowell Bass, Gerry V. Dozier:
Adversarial Authorship, AuthorWebs, and Entropy-Based Evolutionary Clustering. 1-6 - Yigal Bejerano, Varun Gupta, Craig Gutterman, Gil Zussman:

AMuSe: Adaptive Multicast Services to Very Large Groups - Project Overview. 1-9 - James Brown, Mohd Anwar, Gerry V. Dozier:

An Evolutionary General Regression Neural Network Classifier for Intrusion Detection. 1-5 - Salem Sati

, Christopher Probst, Kalman Graffi
:
Analysis of Buffer Management Policies for Opportunistic Networks. 1-8 - Briana Arrington, LiEsa Barnett, Rahmira Rufus, Albert C. Esterline:

Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms. 1-6 - Chowdhury Sayeed Hyder, Thomas D. Jeitschko

, Li Xiao:
Bid and Time Strategyproof Online Spectrum Auctions with Dynamic User Arrival and Dynamic Spectrum Supply. 1-9 - Sabah Razavi, D. Richard Brown:

Characterizing the Effect of Channel Estimation Error on Distributed Reception with Hard Decision Exchanges. 1-8 - Junyu Hu, Zhenquan Qin, Yingxiao Sun, Lei Shu

, Bingxian Lu
, Lei Wang:
CII: A Light-Weight Mechanism for ZigBee Performance Assurance under WiFi Interference. 1-9 - Ailidani Ailijiang, Aleksey Charapko, Murat Demirbas:

Consensus in the Cloud: Paxos Systems Demystified. 1-10 - Sudip Vhaduri, Christian Poellabauer

:
Cooperative Discovery of Personal Places from Location Traces. 1-9 - Chowdhury Sayeed Hyder, Li Xiao:

Cooperative Routing via Overlapping Coalition Formation Game in Cognitive Radio Networks. 1-6 - Junmei Yao, Chao Yang, Wei Lou:

Coordinate Transmissions Centrally: A Cross-Layer Approach for WLANs. 1-9 - Fang Dong, Kui Wu, Venkatesh Srinivasan, Jianping Wang:

Copula Analysis of Latent Dependency Structure for Collaborative Auto-Scaling of Cloud Services. 1-8 - Siguang Chen, Jincheng Liu, Meng Wu, Zhixin Sun:

DCT-Based Adaptive Data Compression in Wireless Sensor Networks. 1-5 - Chunyi Peng, Yuanjie Li:

Demystify Undesired Handoff in Cellular Networks. 1-9 - Tilman Wolf, Jingrui Li:

Denial-of-Service Prevention for Software-Defined Network Controllers. 1-10 - Salih Serdar Guclu, Tanir Ozcelebi, Johan J. Lukkien:

Dependability Analysis of Asynchronous Radio Duty Cycling Protocols. 1-11 - Ke Bao, Fei Hu, Elizabeth S. Bentley, Sunil Kumar:

Diamond-Shaped Mesh Network Routing with Cross-Layer Design to Explore the Benefits of Multi-Beam Smart Antennas. 1-5 - Wenjie Li, Laura Galluccio, Michel Kieffer, Francesca Bassi

:
Distributed Faulty Node Detection in DTNs. 1-9 - Jian Song, Yong Cui, Zongpeng Li, Yayun Bao, Lanshan Zhang, Yangjun Zhang:

EDASH: Energy-Aware QoE Optimization for Adaptive Video Delivery over LTE Networks. 1-9 - Zeeshan Ansar

, Jianjun Wen, Waltenegus Dargie
:
Efficient Online Burst Transmission Scheme for Wireless Sensor Networks. 1-9 - Ankit Gangwal

, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi
, Mauro Conti
:
ELBA: Efficient Layer Based Routing Algorithm in SDN. 1-7 - Mehdi Rahmani-Andebili

, Haiying Shen:
Energy Scheduling for a Smart Home Applying Stochastic Model Predictive Control. 1-6 - Oleksandr Artemenko, Omachonu Joshua Dominic, Oleksandr Andryeyev, Andreas Mitschele-Thiel:

Energy-Aware Trajectory Planning for the Localization of Mobile Devices Using an Unmanned Aerial Vehicle. 1-9 - Yong Jin, Masahiko Tomoishi, Satoshi Matsuura:

Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection. 1-6 - Chaofan Yang, Chenshu Wu, Zheng Yang, Tongtong Liu, Zuwei Yin, Yunhao Liu, XuFei Mao:

Enhancing Industrial Video Surveillance over Wireless Mesh Networks. 1-9 - Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu:

Enhancing Network Security through Software Defined Networking (SDN). 1-9 - Torsten Lorenzen:

Experimental Analysis of the Channel Busy Time in Vehicular Ad-Hoc Networks. 1-9 - Jianxun Cao, Dan Pei

, Xiaoping Zhang, Beichuan Zhang, Youjian Zhao:
Fetching Popular Data from the Nearest Replica in NDN. 1-9 - Xin He, Prashant J. Shenoy

:
Firebird: Network-Aware Task Scheduling for Spark Using SDNs. 1-10 - Robert Mitchell, Paul Sery, Tom Klitsner:

Foundations for Cyber Zone Defense. 1-7 - Aytac Azgin, Ravishankar Ravindran, Guoqiang Wang:

Hash-Based Overlay Routing Architecture for Information Centric Networks. 1-9 - Liang Yang, Bryan C. K. Ng, Winston K. G. Seah

:
Heavy Hitter Detection and Identification in Software Defined Networking. 1-10 - Yanxiao Zhao, Zhiming Hong, Guodong Wang, Jun Huang:

High-Order Hidden Bivariate Markov Model: A Novel Approach on Spectrum Prediction. 1-7 - Stefano Iannucci, Qian Chen

, Sherif Abdelwahed:
High-Performance Intrusion Response Planning on Many-Core Architectures. 1-6 - Yuchen Cao, Yongbin Zhou, Hailong Zhang, Wei Yang:

Hilbert Transform Based Vertical Preprocessing for Side-Channel Analysis. 1-7 - Abdul Salam

, Mehmet Can Vuran
:
Impacts of Soil Type and Moisture on the Capacity of Multi-Carrier Modulation in Internet of Underground Things. 1-9 - Jing He, Amir Atabekov, Hisham M. Haddad:

Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair System. 1-6 - Ibrahim El-Shekeil, Amitangshu Pal, Krishna Kant:

IP Address Consolidation and Reconfiguration in Enterprise Networks. 1-9 - Meng Shen, Liehuang Zhu, Mingwei Wei, Qiongyu Zhang, Mingzhong Wang

, Fan Li:
Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks. 1-8 - Zhiwei Wang, Lingyu Zhou:

Leakage-Resilient Key-Aggregate Cryptosystem with Auxiliary Input. 1-5 - Zhuozhao Li

, Haiying Shen, Kang Chen:
Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set Based Approach. 1-9 - Nouha Oualha

, Kim Thuat Nguyen:
Lightweight Attribute-Based Encryption for the Internet of Things. 1-6 - Nils Richerzhagen, Björn Richerzhagen, Rhaban Hark, Dominik Stingl, Ralf Steinmetz

:
Limiting the Footprint of Monitoring in Dynamic Scenarios through Multi-Dimensional Offloading. 1-9 - Chenxi Qiu, Haiying Shen:

Link Scheduling in Cooperative Communication with SINR-Based Interference. 1-9 - Tong Liu, Yanmin Zhu, Hongzi Zhu, Jiadi Yu, Yuanyuan Yang

, Fan Ye:
Long-Term Renewable Energy Usage Maximization in a Microgrid. 1-8 - Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Sheng Xiao, Yupeng Hu:

Malware Variant Detection Using Opcode Image Recognition with Small Training Sets. 1-9 - Ali Behfarnia

, Ali Eslami:
Message Passing for Analysis and Resilient Design of Self-Healing Interdependent Cyber-Physical Networks. 1-6 - Ning Wang, Jie Wu:

Minimizing the Subscription Aggregation Cost in the Content-Based Pub/Sub System. 1-9 - Venkatesh Ramaswamy:

Modeling and Performance Analysis of Information-Centric Networks. 1-8 - Armen Dzhagaryan

, Aleksandar Milenkovic
:
Models for Evaluating Effective Throughputs for File Transfers in Mobile Computing. 1-9 - Lingnan Gao, George N. Rouskas

:
Network-Aware Virtual Request Partitioning Based on Spectral Clustering. 1-8 - Amitangshu Pal, Krishna Kant:

On the Feasibility of Distributed Sampling Rate Adaptation in Heterogeneous and Collaborative Wireless Sensor Networks. 1-9 - Yi Yao, Han Gao, Jiayin Wang, Ningfang Mi, Bo Sheng

:
OpERA: Opportunistic and Efficient Resource Allocation in Hadoop YARN by Harnessing Idle Resources. 1-9 - Amber Bhargava, Spencer Congero, Timothy Ferrell, Alex Jones, Leo Linsky, Jayashree Mohan, Bhaskar Krishnamachari:

Optimizing Downloads over Random Duration Links in Mobile Networks. 1-9 - Huanyang Zheng, Ziqi Wan, Jie Wu:

Optimizing MapReduce Framework through Joint Scheduling of Overlapping Phases. 1-9 - Hui Sun, Mort Naraghi-Pour:

Performance Analysis of a Hop-by-Hop Relay Selection Strategy in Multi-Hop Networks. 1-7 - David Shur, Yow-Jian Lin, Anthony J. McAuley, John Chapin:

Performance of Opportunistic Distributed RF Operations in Uncertain and Challenged Network Environments. 1-6 - Paul Schmitt, Daniel Iland, Elizabeth M. Belding, Mariya Zheleva:

PhoneHome: Robust Extension of Cellular Coverage. 1-8 - Lei Zhang, Cong Zhang, Jiangchuan Liu, Xiaowen Chu

, Ke Xu, Haiyang Wang, Yong Jiang:
Power-Aware Wireless Transmission for Computation Offloading in Mobile Cloud. 1-9 - Daqing Yun, Chase Q. Wu, Nageswara S. V. Rao, Qiang Liu, Rajkumar Kettimuthu, Eun-Sung Jung

:
Profiling Optimization for Big Data Transfer over Dedicated Channels. 1-9 - Shan Jiang

, Jiannong Cao
, Yan Liu, Jinlin Chen, Xuefeng Liu:
Programming Large-Scale Multi-Robot System with Timing Constraints. 1-9 - Aseel Basheer

, Kewei Sha
:
QAAC: Quality-Assured Adaptive Data Compression for Sensor Data. 1-6 - Ramin Khalili, Wint Yi Poe, Zoran Despotovic, Artur Hecker

:
Reducing State of OpenFlow Switches in Mobile Core Networks by Flow Rule Aggregation. 1-9 - Jie Hu, Chuang Lin, Xiangyang Li:

Relationship Privacy Leakage in Network Traffics. 1-9 - Kang Chen, Haiying Shen:

RoadAware: Learning Personalized Road Information on Daily Routes with Smartphones. 1-9 - Chong Han, Lijuan Sun, Jian Guo, Changchao Chen:

Rotatable Sensor Scheduling for Multi-Demands of Coverage in Directional Sensor Networks. 1-8 - Takayuki Sasaki, Christos Pappas, Taeho Lee, Torsten Hoefler, Adrian Perrig:

SDNsec: Forwarding Accountability for the SDN Data Plane. 1-10 - Matthew Morrison, George Humphrey, John N. Daigle, John Ralston, Jason Thibado, Andreas Ralston:

Secure and Connected Telehealth Approach to Mitigating Concussion Risks in Student Athletes. 1-9 - Kai Zhou

, Jian Ren:
Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud. 1-9 - Albert F. Harris III, Hari Sundaram

, Robin Kravets
:
Security and Privacy in Public IoT Spaces. 1-8 - Oleksandr Andryeyev, Alina Rubina, Oleg Golokolenko, Oleksandr Artemenko, Andreas Mitschele-Thiel:

SkySAIL: A Flexible Software-Defined Radio Enabled Micro Aerial Vehicle. 1-6 - Hao Cai, Tilman Wolf:

Source Authentication and Path Validation in Networks Using Orthogonal Sequences. 1-10 - Björn Richerzhagen, Nils Richerzhagen, Sophie Schönherr, Rhaban Hark, Ralf Steinmetz

:
Stateless Gateways - Reducing Cellular Traffic for Event Distribution in Mobile Social Applications. 1-9 - Spike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer:

Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. 1-6 - Jingjie Jiang

, Shiyao Ma, Bo Li, Baochun Li:
Tailor: Trimming Coflow Completion Times in Datacenter Networks. 1-9 - Dominik Schäfer, Janick Edinger, Justin Mazzola Paluska, Sebastian VanSyckel, Christian Becker

:
Tasklets: "Better than Best-Effort" Computing. 1-11 - Andrew G. Shewmaker, Carlos Maltzahn, Katia Obraczka, Scott A. Brandt, John Bent:

TCP Inigo: Ambidextrous Congestion Control. 1-10 - Rui Zhao, Samantha John

, Stacy Karas, Cara Bussell, Jennifer Roberts, Daniel Six, Brandon Gavett
, Chuan Yue:
The Highly Insidious Extreme Phishing Attacks. 1-10 - Klaus-Tycho Förster

, Roger Wattenhofer:
The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow Migration. 1-9 - Ahmad Cheraghi

, Tobias Amft, Salem Sati
, Philipp Hagemeister, Kalman Graffi
:
The State of Simulation Tools for P2P Networks on Mobile Ad-Hoc and Opportunistic Networks. 1-7 - Congmin Fan, Xiaojun Yuan

, Ying Jun Zhang
:
Throughput Bounds for Training-Based Multiuser MIMO Systems. 1-7 - Prabhu Janakaraj, Pu Wang

, Zheng Chen:
Towards Cloud-Based Crowd-Augmented Spectrum Mapping for Dynamic Spectrum Access. 1-7 - Tong Li

, Ke Xu, Meng Sheng, Haiyang Wang, Kun Yang, Yuchao Zhang:
Towards Minimal Tardiness of Data-Intensive Applications in Heterogeneous Networks. 1-9 - Christian F. Tschudin, Ersin Uzun

, Christopher A. Wood:
Trust in Information-Centric Networking: From Theory to Practice. 1-9 - Sila Ozen Guclu, Tanir Ozcelebi, Johan J. Lukkien:

Trust-Based Neighbor Unreachability Detection for RPL. 1-6 - Chowdhury Sayeed Hyder, Thomas D. Jeitschko

, Li Xiao:
Truthful Online Double Auctions with Real-Time Stochastic Arrival of Demand and Supply. 1-9 - Wei Yu

, Hansong Xu, Hanlin Zhang, David W. Griffith, Nada Golmie:
Ultra-Dense Networks: Survey of State of the Art and Future Directions. 1-10 - Greg Kuperman, Robert Margolies, Nathaniel M. Jones, Brian Proulx, Aradhana Narula-Tam:

Uncoordinated MAC for Adaptive Multi-Beam Directional Networks: Analysis and Evaluation. 1-10 - Ming Ma, Zhi Wang, Ke Su, Lifeng Sun:

Understanding the Power of Smartrouter-Based Peer CDN for Video Streaming. 1-9 - Cory J. Kleinheksel

, Arun K. Somani:
Unidirectional Quorum-Based Cycle Planning for Efficient Resource Utilization and Fault-Tolerance. 1-8 - Jialue Fang, Ye Zhu, Yong Guan:

Voice Pattern Hiding for VoIP Communications. 1-9 - Yulong Gu, Mengjia Feng, Yuan Yao, Weidong Liu, Jiaxing Song:

We Know What You Are Doing or Going to Do: Towards Accurate Human Activities Sensing. 1-9 - Yulong Gu, Yuan Yao, Weidong Liu, Jiaxing Song:

We Know Where You Are: Home Location Identification in Location-Based Social Networks. 1-9 - Yu-Jung Chu, Thinh P. Nguyen, Zachary Neil Stark:

WiFO: Hybrid WiFi and Free-Space Optical Communication System with PAM Optimal Decoding. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














