default search action
36th IPCCC 2017: San Diego, CA, USA
- 36th IEEE International Performance Computing and Communications Conference, IPCCC 2017, San Diego, CA, USA, December 10-12, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6468-7
- Bo Wu, Ke Xu, Qi Li, Fan Yang:
Robust and lightweight fault localization. 1-8 - Yajun Yu, Mingwei Xu, Yuan Yang:
When QUIC meets TCP: An experimental study. 1-8 - Jinping Yu, Xinxin Fan, Guoqiang Zhang, Jingping Bi:
Scheduling loop-free updates for multiple policies with overlaps in software-defined networks. 1-8 - Zhengyu Yang, Morteza Hoseinzadeh, Ping Wong, John Artoux, Clay Mayers, David Thomas Evans, Rory Thomas Bolt, Janki Bhimani, Ningfang Mi, Steven Swanson:
H-NVMe: A hybrid framework of NVMe-based storage system in cloud computing environment. 1-8 - Yang Chen, Jie Wu:
Link-based fine granularity flow migration in SDNs to reduce packet loss. 1-8 - Zhengyu Yang, Morteza Hoseinzadeh, Allen Andrews, Clay Mayers, David Thomas Evans, Rory Thomas Bolt, Janki Bhimani, Ningfang Mi, Steven Swanson:
AutoTiering: Automatic data placement manager in multi-tier all-flash datacenter. 1-8 - Xin Li, Jie Wu, Zhuzhong Qian, Shaojie Tang, Sanglu Lu:
Towards location-aware joint job and data assignment in cloud data centers with NVM. 1-8 - Ziyan Song, Ting Zhang, Qing Li, Guang Yang, Yong Jiang:
START: Sensible traffic scheduling in dynamic data center networks. 1-8 - Biyu Zhou, Jie Wu, Fa Zhang, Zhiyong Liu:
Resource optimization for survivable embedding of virtual clusters in cloud data centers. 1-8 - Shuaibing Lu, Zhiyi Fang, Jie Wu, Guannan Qu:
Elastic scaling of virtual clusters in cloud data center networks. 1-8 - Catalina Aranzazu Suescun, Mihaela Cardei:
Spatio-temporal event detection and reporting in mobile-sink wireless sensors networks. 1-8 - Zhuo Jiang, Qian Wu, Hewu Li, Jianping Wu:
Can MPTCP increase system efficiency and fairness in 802.11 multirate WLAN environment? 1-7 - J. J. Garcia-Luna-Aceves:
Avoiding interference from hidden terminals with carrier tones. 1-8 - Haizhou Bao, Qin Liu, Chuanhe Huang, Xiaohua Jia:
Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networks. 1-7 - J. J. Garcia-Luna-Aceves, Spencer Thompson, Joshua Stern:
Time-based persistence in channel-access protocols with carrier sensing. 1-8 - Hongliang Li, Jie Wu, Zhen Jiang, Xiang Li, Xiaohui Wei, Yuan Zhuang:
Integrated recovery and task allocation for stream processing. 1-8 - Abdel-Hameed A. Badawy, Donald Yeung:
Optimizing locality in graph computations using reuse distance profiles. 1-8 - Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
Does the content defined chunking really solve the local boundary shift problem? 1-8 - Xiaoyun Zhang, Daji Qiao:
On minimizing the maximum sensor movement to construct a horizontal barrier. 1-8 - Hai Zhu, Fu Xiao, Lijuan Sun, Xiaohui Xie, Ruchuan Wang:
Robust passive static human detection with commodity WiFi devices. 1-8 - Xin Liang, Xiaolin Gui, A. N. Jian, Dewang Ren:
Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy. 1-8 - Fudong Qiu, Fan Wu, Xiaofeng Gao, Guihai Chen:
A privacy-preserving combinatorial auction mechanism for spectrum redistribution. 1-8 - Fei Xu, Haiqing Pan, Zigang Cao, Zhen Li, Gang Xiong, Yangyang Guan, Siu-Ming Yiu:
Identifying malware with HTTP content type inconsistency via header-payload comparison. 1-7 - Yihao Jia, Ying Liu, Gang Ren, Lin He:
Revisiting inter-AS IP spoofing let the protection drive source address validation. 1-10 - Jing Zheng, Jianhua Sun, Kun Sun, Bo Wu, Qi Li:
Cookie-based amplification repression protocol. 1-8 - Xiaodong Zhu, Jinlin Wang, Lingfang Wang, Weining Qi:
Popularity-based neighborhood collaborative caching for information-centric networks. 1-8 - Jehan-François Pâris, Vero Estrada-Galiñanes, Ahmed Amer, Carlos Rincon:
Using entanglements to increase the reliability of two-dimensional square RAID arrays. 1-8 - Han Zhang, Xingang Shi, Yingya Guo, Haijun Geng, Zhiliang Wang, Xia Yin:
Joint source selection and transfer optimization for erasure coding storage system. 1-8 - Zhixiang Mao, Shengan Zheng, Linpeng Huang, Yanyan Shen:
A DAX-enabled mmap mechanism for log-structured in-memory file systems. 1-8 - Jannatun Noor, Hasan Ibna Akbar, Ruhul Amin Sujon, A. B. M. Alim Al Islam:
Secure processing-aware media storage (SPMS). 1-8 - Zhenyu Ju, Chuanhe Huang, Yanjiao Chen, Lin Ma:
A truthful auction mechanism for resource provisioning in mobile crowdsensing. 1-8 - Mohamed Abdelaal, Mohammad Qaid, Frank Dürr, Kurt Rothermel:
iSense: Energy-aware crowd-sensing framework. 1-9 - Yangsu Liu, Zhenzhe Zheng, Fan Wu, Xiaofeng Gao, Guihai Chen:
Fault tolerant mechanism design for time coverage in crowdsensing system. 1-8 - Luoyao Hao, Chengming Jin, Xiaofeng Gao, Fan Wu, Guihai Chen:
Towards cost-effective and budget-balanced task allocation in crowdsourcing systems. 1-8 - Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla:
Approach to detect non-adversarial overlapping collusion in crowdsourcing. 1-8 - Zengyin Yang, Hewu Li, Qian Wu, Jianping Wu:
Analyzing and optimizing BGP stability in future space-based internet. 1-8 - Xiaohui Nie, Youjian Zhao, Guo Chen, Kaixin Sui, Yazheng Chen, Dan Pei, Miao Zhang, Jiyang Zhang:
TCP WISE: One initial congestion window is not enough. 1-8 - Hemin Yang, Jared S. Ivey, George F. Riley:
Scalability comparison of SDN control plane architectures based on simulations. 1-8 - Tran Phuong Thao, Adetokunbo Makanju, Ayumu Kubota:
Anonymous and analysable web browsing. 1-8 - Ziqing Zhang, Cuicui Kang, Peipei Fu, Zigang Cao, Zhen Li, Gang Xiong:
Metrie learning with statistical features for network traffic classification. 1-7 - Alan Hylton, Janche Sang, Greg Henselman-Petrusek, Robert Short:
Performance enhancement of a computational persistent homology package. 1-8 - Fatih Berber, Ramin Yahyapour:
Response time speedup of multi-tier internet systems. 1-9 - Luoyao Hao, Chengming Jin, Xiaofeng Gao, Linghe Kong, Fan Wu, Guihai Chen:
QoE-aware optimization for SVC-based adaptive streaming in D2D communications. 1-8 - Xiaoguang Niu, Zhen Wang, Qiongzan Ye, Yihao Zhang, Jiawei Wang:
A hierarchical-learning-based crowdedness estimation mechanism for crowdsensing buses. 1-8 - Minh Quan Ho, Christian Obrecht, Bernard Tourancheau, Benoît Dupont de Dinechin, Julien Hascoet:
Improving 3D lattice boltzmann method stencil with asynchronous transfers on many-core processors. 1-9 - Feng Sheng, Qiang Cao, Haoran Cai, Jie Yao, Changsheng Xie:
Laro: Lazy repartitioning for graph workloads on heterogeneous clusters. 1-8 - Ying Mao, Jenna Oak, Anthony Pompili, Daniel Beer, Tao Han, Peizhao Hu:
DRAPS: Dynamic and resource-aware placement scheme for docker containers in a heterogeneous cluster. 1-8 - Xue Ouyang, Huan Zhou, Stephen J. Clement, Paul Townend, Jie Xu:
Mitigate data skew caused stragglers through ImKP partition in MapReduce. 1-8 - Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. 1-9 - Junjie Wang, Jinyang Li, Tianshu Pang, Xiaoshan Sun, Qi Liu, Hengchang Liu:
Towards a holistic and optimized framework for smart grid regulation. 1-8 - Yu Chen, Hong Li, Weiwei Zhao, Lin Zhang, Zhongjin Liu, Zhiqiang Shi:
IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares. 1-8 - Chang Liu, Lingwu Zeng, Junzheng Shi, Fei Xu, Gang Xiong, Siu-Ming Yiu:
Auto-identification of background traffic based on autonomous periodic interaction. 1-8 - Luis Felipe Zapata Rivera, Catalina Aranzazu Suescun, Imadeldin O. Mahgoub:
An energy-aware collaborative multi-agent system for autonomous underwater vehicles. 1-8 - Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinyu Yang, Wei Zhao:
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. 1-8 - Meixuan Li, Yu-e Sun, He Huang, Jing Yuan, Yang Du, Yu Bao, Yonglong Luo:
Profit maximization resource allocation in cloud computing with performance guarantee. 1-2 - Fan Wu, Wang Yang, Qingshan Guo, Xinfang Xie:
Reducing idle listening time in 802.11 via NDN. 1-2 - Khaleda Akhter Papry, A. B. M. Alim Al Islam:
Fault-tolerant 3D mesh for network-on-chip. 1-2 - Yu Tian, Xin Ye:
Motif: A social reading platform that helps people filter, memorize, and organize online contents. 1-4 - Shuo-Han Chen, Wei-Shin Li, Min-Hong Shen, Yi-Han Lien, Tseng-Yi Chen, Tsan-sheng Hsu, Hsin-Wen Wei, Wei-Kuan Shih:
An update-overhead-aware caching policy for write-optimized file systems on SMR disks. 1-2 - Jianwei Zhang, Xinchang Zhang, Meng Sun:
Two-level decomposition for multi-commodity multicast traffic engineering. 1-2 - Liudong Zuo:
Bandwidth preemption for data transfer request with higher priority. 1-2 - Salem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Subaschandrabose, Zilong Ye:
Secure the internet of things with challenge response authentication in fog computing. 1-2 - Zheng Liu, Qing Li, Dan Wang, Mingwei Xu:
Balancing interdependent networks: Theory and algorithm. 1-2 - A. S. M. Rizvi, Tarik Reza Toha, Siddhartha Shankar Das, Sriram Chellappan, A. B. M. Alim Al Islam:
Many-objective performance enhancement in computing clusters. 1-2 - Eren Balevi, Richard D. Gitlin:
Unsupervised machine learning in 5G networks for low latency communications. 1-2 - Janki Bhimani, Jingpei Yang, Zhengyu Yang, Ningfang Mi, N. H. V. Krishna Giri, Rajinikanth Pandurangan, Changho Choi, Vijay Balakrishnan:
Enhancing SSDs with multi-stream: What? why? how? 1-2 - Bhargava Kalla, Nandakishore Santhi, Abdel-Hameed A. Badawy, Gopinath Chennupati, Stephan J. Eidenbenz:
Probabilistic Monte Carlo simulations for static branch prediction. 1-4 - Yosef Ashibani, Qusay H. Mahmoud:
An efficient and secure scheme for smart home communication using identity-based signcryption. 1-7 - Baiyu Chen, Zhengyu Yang, Siyu Huang, Xianzhi Du, Zhiwei Cui, Janki Bhimani, Xin Xie, Ningfang Mi:
Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles. 1-6 - Tzu-Ting Tseng, Chung-An Shen:
The VLSI architecture of a highly efficient configurable pre-processor for MIMO detections. 1-5 - Muhammad Shoaib, Özlem Durmaz Incel, Hans Scholten, Paul J. M. Havinga:
Resource consumption analysis of online activity recognition on mobile phones and smartwatches. 1-6 - Dou An, Qingyu Yang, Wei Yu, Donghe Li, Yang Zhang, Wei Zhao:
Towards truthful auction for big data trading. 1-7 - Christof Brandauer, Peter Dorfinger, Pedro Yuri Arbs Paiva:
Towards scalable and adaptable security monitoring. 1-6 - S. M. Osman Gani, Yaser P. Fallah, Gaurav Bansal, Takayuki Shimizu:
Message content control for distributed map sharing in vehicle safety communications. 1-7 - Fukuro Koshiji, Ryogo Urushidate, Kohji Koshiji:
Biomedical signal transmission using human body communication. 1-2 - Ashref Aloui, Mounira Msahli, Talel Abdessalem, Stéphane Bressan, Sihem Mesnager:
Preserving privacy in distributed system (PPDS) protocol: Security analysis. 1-7 - Aklilu Daniel Tesfamicael, Vicky Liu, Ernest Foo, William J. Caelli:
Modeling for performance and security balanced trading communication systems in the cloud. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.