IEEE Catalog Number: ISBN: CFP14INF-POD 978-1-4799-3361-7 IEEE INFOCOM 2014 – IEEE Conference on Computer Communications Toronto, Ontario, Canada 27 April – 2 May 2014 Pages 1-951 1/3
IEEE Catalog Number: ISBN:
CFP14INF-POD 978-1-4799-3361-7
IEEE INFOCOM 2014 – IEEE Conference on Computer Communications
Toronto, Ontario, Canada 27 April – 2 May 2014
Pages 1-951
1/3
Program
CC1: Cloud computing 1
Toward Profit-Seeking Virtual Network Embedding Algorithm via Global Resource CapacityLong Gong (University of Science and Technology of China, P.R. China); Yonggang Wen (NanyangTechnological University, Singapore); Zuqing Zhu (University of Science and Technology of China,P.R. China); Tony Lee (SJTU, P.R. China)pp. 1-9
Online Allocation of Virtual Machines in a Distributed CloudFang Hao (Bell Labs, Alcatel-Lucent, USA); M. Kodialam (Bell Labs, USA); T. V. Lakshman (BellLabs, Alcatel-Lucent, USA); Sarit Mukherjee (Bell Labs USA, USA)pp. 10-18
HadoopWatch: A First Step Towards Comprehensive Traffic Forecasting in Cloud ComputingYang Peng (Hong Kong University of Science and Technology, Hong Kong); Kai Chen (Hong KongUniversity of Science and Technology, Hong Kong); Guohui Wang (IBM T. J. Watson ResearchCenter, USA); Wei Bai (Hong Kong University of Science of Technology, Hong Kong); Zhiqiang Ma(Hong Kong University of Science and Technology, Hong Kong); Lin Gu (Hong Kong University ofScience and Technology, Hong Kong)pp. 19-27
Multi-Objective Data Placement for Multi-Cloud Socially Aware ServicesLei Jiao (University of Goettingen, Germany); Jun Li (University of Oregon, USA); Wei Du(University of Goettingen, Germany); Xiaoming Fu (University of Goettingen, Germany)pp. 28-36
LO1: Localization 1
Near-Pri: Private, Proximity Based Location SharingEdmund Novak (William and Mary, USA); Qun Li (College of William and Mary, USA)pp. 37-45
3D Surface Localization with Terrain ModelYang Yang (University of Louisiana at Lafayette, USA); Miao Jin (University of Louisiana atLafayette, USA); Hongyi Wu (University of Louisiana at Lafayette, USA)pp. 46-54
Towards Ubiquitous Indoor Localization Service Leveraging Environmental Physical FeaturesYang Tian (Peking University, P.R. China); Ruipeng Gao (Peking University, P.R. China); Kaigui Bian(Peking University, P.R. China); Fan Ye (Peking University, P.R. China); Tao Wang (PekingUniversity, P.R. China); Yizhou Wang (Peking University, P.R. China); XiaoMing Li (PekingUniversity, P.R. China)pp. 55-63
Suave: Swarm Underwater Autonomous Vehicle LocalizationJun Liu (University of Connecticut, USA); Zhaohui Wang (Michigan Technological University, USA);Zheng Peng (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA);Lance Fiondella (University of Massachusetts, USA)pp. 64-72
MN1: Multimedia networking 1
Robust Uncoded Video Transmission over Wireless Fast Fading ChannelHao Cui (University of Science and Technology of China, P.R. China); Chong Luo (MicrosoftResearch, P.R. China); Chang Wen Chen (State University of New York at Buffalo, USA); Feng Wu(Microsoft Research Asia, P.R. China)pp. 73-81
NOVA: QoE-driven Optimization of DASH-based Video Delivery in NetworksVinay Joseph (Qualcomm, USA); Gustavo de Veciana (The University of Texas at Austin, USA)pp. 82-90
Joint Online Transcoding and Geo-distributed Delivery for Dynamic Adaptive StreamingZhi Wang (Tsinghua University, P.R. China); Lifeng Sun (Tsinghua University, P.R. China); ChuanWu (The University of Hong Kong, Hong Kong); Wenwu Zhu (Tsinghua University, P.R. China);Shiqiang Yang (Tsinghua University, P.R. China)pp. 91-99
Improving mobile video streaming with link aware scheduling and client cachesRandeep Bhatia (Bell Labs, Alcatel-Lucent, USA); T. V. Lakshman (Bell Labs, Alcatel-Lucent, USA);Arun Netravali (OMNICapital, USA); Krishan Sabnani (Alcatel-Lucent, USA)pp. 100-108
NE1: Network economics and pricing 1
PROMISE: A Framework for Truthful and Profit Maximizing Spectrum Double AuctionsDejun Yang (Colorado School of Mines, USA); Xiang Zhang (Arizona State University, USA);Guoliang Xue (Arizona State University, USA)pp. 109-117
Dynamic Pricing and Profit Maximization for the Cloud with Geo-distributed Data CentersJian Zhao (The University of Hong Kong, Hong Kong); Hongxing Li (University of California atDavis, USA); Chuan Wu (The University of Hong Kong, Hong Kong); Zongpeng Li (University ofCalgary, Canada); Zhizhong Zhang (The University of Hong Kong, Hong Kong); Francis C.M. Lau(The University of Hong Kong, Hong Kong)pp. 118-126
Profit-Maximizing Incentive for Participatory SensingTie Luo (Institute for Infocomm Research & National University of Singapore, Singapore); HweePink Tan (Institute for Infocomm Research, Singapore); Lirong Xia (Harvard University, USA)pp. 127-135
Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting PartiesXukai Zou (School of Science, Purdue University-Indianapolis, USA); Huian Li (Purdue UniversityIndianapolis, USA); Yan Sui (Purdue University Indianapolis, USA); Wei Peng (Indiana University-Purdue University Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis,USA)pp. 136-144
RF1: RFID 1
Efficiently Collecting Histograms Over RFID TagsLei Xie (Nanjing University, P.R. China); Hao Han (Intelligent Automation Inc, USA); Qun Li(College of William and Mary, USA); Jie Wu (Temple University, USA); Sanglu Lu (NanjingUniversity, P.R. China)pp. 145-153
A Parallel Identification Protocol for RFID SystemsLinghe Kong (Shanghai Jiao Tong University, P.R. China); Liang He (Singapore University ofTechnology and Design, Singapore); Yu Gu (Singapore University of Technology and Design &Advanced Digital Sciences Center, Singapore); Min-You Wu (Shanghai JiaoTong University, P.R.China); Tian He (University of Minnesota, USA)pp. 154-162
Efficient Distributed Query Processing in Large RFID-enabled Supply ChainsJia Liu (Nanjing University, P.R. China); Bin Xiao (The Hong Kong Polytechnic University, HongKong); Kai Bu (Zhejiang University, P.R. China); Li-jun Chen (Nanjing University, P.R. China)pp. 163-171
Pandaka: A Lightweight Cipher for RFID SystemsMin Chen (University of Florida, USA); Shigang Chen (University of Florida, USA); Qingjun Xiao(University of Florida, USA)pp. 172-180
RS: Router and switch design
Multi-Terabyte and Multi-Gbps Information Centric RoutersGiuseppe Rossini (Telecom ParisTech, France); Michele Garetto (Università di Torino, Italy); DarioRossi (Telecom ParisTech, France); Emilio Leonardi (Politecnico di Torino, Italy)pp. 181-189
Towards Zero-Time Wake-Up of Line Cards in Power-Aware RoutersTian Pan (Tsinghua University, P.R. China); Ting Zhang (Tsinghua University, P.R. China); JunxiaoShi (University of Arizona, USA); Yang Li (Tsinghua University, P.R. China); Linxiao Jin (TsinghuaUniversity, P.R. China); Fuliang Li (Tsinghua University, P.R. China); Jiahai Yang (TsinghuaUniversity, P.R. China); Beichuan Zhang (University of Arizona, USA); Bin Liu (Tsinghua University,P.R. China)pp. 190-198
Safe Routing Reconfigurations with Route RedistributionStefano Vissicchio (Université Catholique de Louvain, Belgium); Laurent Vanbever (PrincetonUniversity, USA); Luca Cittadini (Roma Tre University, Italy); Geoffrey G Xie (Naval PostgraduateSchool, USA); Olivier Bonaventure (Université catholique de Louvain, Belgium)pp. 199-207
Scalable Forwarding Tables for Supporting Flexible Policies in Enterprise NetworksShu Yang (Tsinghua University, P.R. China); Mingwei Xu (Tsinghua University, P.R. China); DanWang (The Hong Kong Polytechnic University, Hong Kong); Gautier Bayzelon (Tsinghua University,P.R. China); Jianping Wu (Tsinghua University, P.R. China)pp. 208-216
SP1: Security and privacy 1
Learning in Hide-and-SeekQingsi Wang (University of Michigan, USA); Mingyan Liu (University of Michigan, USA)pp. 217-225
Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforcedSearch Authorization in the Cloud
Wenhai Sun (Xidian University, P.R. China); Shucheng Yu (University of Arkansas at Little Rock,USA); Wenjing Lou (Virginia Tech, USA); Thomas Hou (Virginia Tech, USA); Hui Li (XidianUniversity, P.R. China)pp. 226-234
Will Cyber-Insurance Improve Network Security? A Market AnalysisRanjan Pal (University of Southern California, USA); Leana Golubchik (USC, USA); KonstantinosPsounis (University of Southern California, USA); Pan Hui (Hong Kong University of Science andTechnology & Telekom Innovation Laboratories, Hong Kong)pp. 235-243
FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile DevicesJun Shao (Zhejiang Gongshang University, P.R. China); Rongxing Lu (Nanyang TechnologicalUniversity, Singapore); Xiaodong Lin (University of Ontario Institute of Technology, Canada)pp. 244-252
WN1: Wireless networks 1
Does Full-duplex Double the Capacity of Wireless Networks?Xiufeng Xie (University of Wisconsin-Madison, USA); Xinyu Zhang (University of Wisconsin-Madison, USA)pp. 253-261
Characterizing the Achievable Throughput in Wireless Networks with Two Active RF chainsYang Yang (Ohio State University, USA); Bo Chen (Ohio State University, USA); Kannan Srinivasan(The Ohio State University, USA); Ness B. Shroff (The Ohio State University, USA)pp. 262-270
WiFall: Device-free Fall Detection by Wireless NetworksChunmei Han (Hong Kong University of Science and Technology, Hong Kong); Kaishun Wu (HKUST& Sun Yat-sen University, Hong Kong); Yuxi Wang (Hong Kong University of Science andTechnology, Hong Kong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 271-279
Distributed Learning for Utility Maximization over CSMA-based Wireless Multihop NetworksHyeryung Jang (KAIST, Korea); Se-Young Yun (Inria, France); Jinwoo Shin (KAIST, Korea); Yung Yi(KAIST, Korea)pp. 280-288
CC2: Cloud computing 2
Venice: Reliable Virtual Data Center Embedding in CloudsQi Zhang (University of Waterloo, Canada); Mohamed Faten Zhani (University of Waterloo -Canada, Canada); Maissa Jabri (University of Waterloo, Canada); Raouf Boutaba (University ofWaterloo, Canada)pp. 289-297
Meeting Service Level Agreement Cost-Effectively for Video-on-Demand Applications in theCloud
Yuhong Zhao (Huazhong University of Science and Technology, P.R. China); Hong Jiang (Universityof Nebraska at Lincoln, USA); Ke Zhou (Huazhong University of Science and Technology, P.R.China); Zhijie Huang (Huazhong University of Science and Technology, P.R. China); Ping Huang(Virginia Commonwealth University, USA)pp. 298-306
Beyond the MDS Bound in Distributed Cloud StorageJian Li (Michigan State University, USA); Tongtong Li (Michigan State University, USA); Jian Ren(Michigan State University, USA)pp. 307-315
Cooperative Repair with Minimum-Storage Regenerating Codes for Distributed StorageJun Li (University of Toronto, Canada); Baochun Li (University of Toronto, Canada)pp. 316-324
FC: Flow and congestion control
Heat-Diffusion: Pareto Optimal Dynamic Routing for Time-Varying Wireless NetworksReza Banirazi (University of Southern California, USA); Edmond Jonckheere (USC, USA); BhaskarKrishnamachari (University of Southern California, USA)pp. 325-333
From Least Interference-Cost Paths to Maximum (Concurrent) Multiflow in MC-MR WirelessNetworks
Peng-Jun Wan (Illinois Institute of Technology, USA); Zhu Wang (Illinois Institute of Technology,USA); Lei Wang (Dalian University of Technology, P.R. China); Zhiguo Wan (Tsinghua University,P.R. China); Sai Ji (Nanjing University of Information Science & Technology, P.R. China)pp. 334-342
Multirate Multicast: Optimal Algorithms and ImplementationGeorgios S. Paschos (Massachusetts Institute of Technology & CERTH-ITI, USA); Chih-ping Li (MIT,USA); Eytan Modiano (MIT, USA); Kostas Choumas (University of Thessaly, Greece); ThanasisKorakis (Polytechnic Institute of New York University, USA)pp. 343-351
Routing Games with Progressive FillingTobias Harks (Maastricht University, The Netherlands); Alexander Skopalik (Paderborn, Germany);Martin Hoefer (Saarland University & Max-Planck-Institut für Informatik, Germany); Kevin Schewior(Berlin, Germany)pp. 352-360
LO2: Localization 2
Electronic Frog Eye: Counting Crowd Using WiFiWei Xi (Xi'an Jiaotong University, P.R. China); Jizhong Zhao (Xi'an Jiaotong University, P.R. China);Xiang-Yang Li (Illinois Institute of Technology, USA); Kun Zhao (Xi'an Jiaotong University, P.R.China); Shaojie Tang (Temple University, USA); Xue Liu (McGill Univerisity, Canada); Zhiping Jiang(Xian Jiaotong University, P.R. China)pp. 361-369
Shake and Walk: Acoustic Direction Finding and Fine-grained Indoor Localization UsingSmartphones
Wenchao Huang (University of Science and Technology of China, P.R. China); Yan Xiong (Universityof Science and Technology of China, P.R. China); Xiang-Yang Li (Illinois Institute of Technology,USA); Hao Lin (Jiangnan University, P.R. China); Xufei Mao (Tsinghua University, P.R. China);Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China); Yunhao Liu (TsinghuaUniversity & The Hong Kong University of Science and Technology, P.R. China)pp. 370-378
Anchor-free Backscatter Positioning for RFID Tags with High AccuracyTianci Liu (Tsinghua University, P.R. China); Lei Yang (Tsinghua National Laboratory of InformationScience and Technology, P.R. China); Qiongzheng Lin (Tsinghua University, P.R. China); Yi Guo(Hongkong University of Science and Technology, P.R. China); Yunhao Liu (Tsinghua University &The Hong Kong University of Science and Technology, P.R. China)pp. 379-387
TOC: Localizing Wireless Rechargeable Sensors with Time of ChargeYuanchao Shu (Zhejiang University, USA); Peng Cheng (Zhejiang University & Singapore Universityof Technology and Design, P.R. China); Yu Gu (Singapore University of Technology and Design &Advanced Digital Sciences Center, Singapore); Jiming Chen (Zhejiang University, P.R. China); TianHe (University of Minnesota, USA)pp. 388-396
MN2: Multimedia networking 2
On the Geographic Patterns of a Large-scale Mobile Video-on-Demand SystemZhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); GaogangXie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Jiali Lin(Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Yun Jin (PPlive,P.R. China); Mohamed-Ali Kaafar (INRIA France & NICTA Australia, France); Kavé Salamatian(LISTIC PolyTech, Université de Savoie Chambery Annecy, France)pp. 397-405
Optimal Rate Allocation for Adaptive Wireless Video Streaming in Networks with UserDynamics
Vinay Joseph (Qualcomm, USA); Sem Borst (Alcatel-Lucent, Bell Labs & Eindhoven University ofTechnology, USA); Marty Reiman (Bell Labs, Lucent Technologies, USA)pp. 406-414
SoCast: Social Ties Based Cooperative Video MulticastYang Cao (Huazhong University of Science and Technology, P.R. China); Xu Chen (Arizona StateUniversity, USA); Junshan Zhang (Arizona State University, USA); Tao Jiang (Huazhong Universityof Science and Technology, P.R. China)pp. 415-423
Reliable Video Multicast over Wi-Fi Networks with Coordinated Multiple APsMunhwan Choi (Seoul National University, Korea); Weiping Sun (Seoul National University, Korea);Jonghoe Koo (Seoul National University, Korea); Sunghyun Choi (Seoul National University, Korea);Kang G. Shin (University of Michigan, USA)pp. 424-432
NE2: Network economics and pricing 2
Dynamic Resource Provisioning in Cloud Computing: A Randomized Auction ApproachLinquan Zhang (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada);Chuan Wu (The University of Hong Kong, Hong Kong)pp. 433-441
Exploring Bundling Sale Strategy in Online Service Markets with Network EffectsWeijie Wu (Shanghai Jiao Tong University, P.R. China); Richard T. B. Ma (National University ofSingapore, Singapore); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong)pp. 442-450
Enabling Crowd-Sourced Mobile Internet AccessGeorge Iosifidis (CERTH & University of Thessaly, Greece); Lin Gao (The Chinese University of HongKong, Hong Kong); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong); LeandrosTassiulas (University of Thessaly, Greece)pp. 451-459
Trade-offs in Optimizing the Cache Deployments of CDNsSyed Hasan (Institute IMDEA Networks, Spain); Sergey Gorinsky (IMDEA Networks Institute,Spain); Constantine Dovrolis (Georgia Institute of Technology, USA); Ramesh K Sitaraman(University of Massachusetts, Amherst & Akamai Technologies, USA)pp. 460-468
RF2: RFID 2
Twins: Device-free Object Tracking using Passive TagsJinsong Han (Xi'an Jiaotong University, P.R. China); Chen Qian (University of Kentucky, USA); DanMa (Xi'an Jiaotong University, P.R. China); Xing Wang (Xi'an Jiaotong University, P.R. China);Jizhong Zhao (Xi'an Jiaotong University, P.R. China); Pengfeng Zhang (Xi'an Jiaotong University,P.R. China); Wei Xi (Xi'an Jiaotong University, P.R. China); Zhiping Jiang (Xian Jiaotong University,P.R. China)pp. 469-476
Arbitrarily Accurate Approximation Scheme for Large-Scale RFID Cardinality EstimationWei Gong (Tsinghua University, P.R. China); Kebin Liu (Tsinghua University, P.R. China); Xin Miao(Tsinghua University, Hong Kong); Haoxiang Liu (Hong Kong University of Science and Technology,P.R. China)pp. 477-485
Towards Adaptive Continuous Scanning in Large-Scale RFID SystemsHaoxiang Liu (Hong Kong University of Science and Technology, P.R. China); Wei Gong (TsinghuaUniversity, P.R. China); Xin Miao (Tsinghua University, P.R. China); Kebin Liu (Tsinghua University,P.R. China); Wenbo He (McGill University, Canada)pp. 486-494
Read Bulk Data from Computational RFIDsYuanqing Zheng (Nanyang Technological University, Singapore); Mo Li (Nanyang TechnologicalUniversity, Singapore)pp. 495-503
SP2: Security and privacy 2
Achieving Differential Privacy of Data Disclosure in the Smart GridJing Zhao (Illinois Institute of Technology, USA); Taeho Jung (Illinois Institute of Technology,USA); Yu Wang (University of North Carolina at Charlotte, USA); Xiang-Yang Li (Illinois Institute ofTechnology, USA)pp. 504-512
Optimal Privacy-Preserving Energy Management for Smart MetersLei Yang (Arizona State University, USA); Xu Chen (Arizona State University, USA); Junshan Zhang(Arizona State University, USA); H. Vincent Poor (Princeton University, USA)pp. 513-521
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted DataQingji Zheng (University of Texas at San Antonio, USA); Shouhuai Xu (University of Texas at SanAntonio, USA); Giuseppe Ateniese (The Johns Hopkins University, USA)pp. 522-530
Deep Packet Inspection with DFA-trees and Parametrized Language OverapproximationDaniel Luchaup (University of Wisconsin Madison, USA); Lorenzo De Carli (University of Wisconsin-Madison, USA); Somesh Jha (University of Wisconsin, USA); Eric Bach (University of WisconsinMadison, USA)pp. 531-539
WN2: Wireless networks 2
Hello: A Generic Flexible Protocol for Neighbor DiscoveryWei Sun (Hong Kong University of Science and Technology, Hong Kong); Zheng Yang (TsinghuaUniversity, P.R. China); Keyu Wang (Hong Kong University of Science and Technology, HongKong); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology,P.R. China)pp. 540-548
Cooperative Anti-jamming for Infrastructure-less Wireless Networks with Stochastic RelayingLiyang Zhang (State University of New York at Buffalo, USA); Zhangyu Guan (State University ofNew York at Buffalo & Shandong University, USA); Tommaso Melodia (State University of New Yorkat Buffalo, USA)pp. 549-557
Restricted Coverage in Wireless NetworksXiaohua Xu (University of Toledo & College of Engineering, USA); Min Song (The University ofToledo, USA)pp. 558-564
Optimal Delay Bound for Maximum Weight Scheduling Policy in Wireless NetworksCem Boyaci (University of Florida, USA); Ye Xia (University of Florida, USA)pp. 565-573
CC3: Cloud computing 3
Delay Guaranteed Live Migration of Virtual MachinesJiao Zhang (Tsinghua University, P.R. China); Fengyuan Ren (Tsinghua University, P.R. China);Chuang Lin (Tsinghua University, P.R. China)pp. 574-582
Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous ServersWei Wang (University of Toronto, Canada); Baochun Li (University of Toronto, Canada); Ben Liang(University of Toronto, Canada)pp. 583-591
SAP: Similarity-Aware Partitioning for Efficient Cloud StorageBharath Balasubramanian (Princeton University, USA); Tian Lan (George Washington University,USA); Mung Chiang (Princeton University, USA)pp. 592-600
Scheduling Jobs with Dwindling Resource Requirements in CloudsSivan Albagli-Kim (Technion, Israel); Hadas Shachnai (Technion, Israel); Tami Tamir (TheInterdisciplinary Center, Israel)pp. 601-609
IM1: Internet monitoring and measurement 1
Spatio-temporal Factorization of Log Data for Understanding Network EventsTatsuaki Kimura (NTT, Japan); Keisuke Ishibashi (NTT, Japan); Tatsuya Mori (Waseda University,Japan); Hiroshi Sawada (NTT Corporation, Japan); Tsuyoshi Toyono (NTT Corporation, Japan); KenNishimatsu (NTT, Japan); Akio Watanabe (NTT Corporation & NTT Network TechnologyLabolatories, Japan); Akihiro Shimoda (NTT Corporation, Japan); Kohei Shiomoto (NTT, Japan)pp. 610-618
Mining Checkins From Location-sharing Services for Client-independent IP GeolocationHao Liu (Tsinghua University, P.R. China); Yaoxue Zhang (Tsinghua University, P.R. China); YuezhiZhou (Tsinghua University, P.R. China); Di Zhang (Tsinghua University, P.R. China); Xiaoming Fu(University of Goettingen, Germany); K. K. Ramakrishnan (Rutgers University, USA)pp. 619-627
Packet Classification Using Binary Content Addressable MemoryAlex X. Liu (Michigan State University, USA); Chad Meiners (MIT Lincoln Laboratory, USA); EricTorng (Michigan State University, USA)pp. 628-636
A Reduction-based Approach Towards Scaling Up Formal Analysis of Internet ConfigurationsAnduo Wang (University of Illinois at Urbana-Champaign, USA); Alexander Gurney (University ofPennsylvania, USA); Xianglong Han (University of Pennsylvania, USA); Jinyan Cao (University ofPennsylvania, USA); Boon Thau Loo (University of Pennsylvania, USA); Carolyn Talcott (SRIInternational, USA); Andre Scedrov (University of Pennsylvania, USA)pp. 637-645
NC: Network coding
A Matroid Theory Approach to Multicast Network CodingXunrui Yin (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada); Xin Wang(Fudan University, P.R. China)pp. 646-654
Robust and Optimal Opportunistic Scheduling for Downlink 2-Flow Inter-session NetworkCoding with Varying Channel Quality
Wei-Cheng Kuo (Purdue University, USA); Chih-Chun Wang (Purdue University, USA)pp. 655-663
DAWN: Defending Against Wormhole Attacks in Wireless Network Coding SystemsShiyu Ji (Oklahoma State University, USA); Tingting Chen (Oklahoma State University, USA);Sheng Zhong (Nanjing University, P.R. China); Subhash Kak (Oklahoma State University, USA)pp. 664-672
Secure Cloud Storage Meets with Secure Network CodingFei Chen (The Chinese University of Hong Kong, Hong Kong); Tao Xiang (Chongqing University,P.R. China); Yuanyuan Yang (Stony Brook University, USA); Sherman S. M. Chow (ChineseUniversity of Hong Kong, Hong Kong)pp. 673-681
NE3: Network economics and pricing 3
Hybrid Data Pricing for Network-Assisted User-Provided ConnectivityLin Gao (The Chinese University of Hong Kong, Hong Kong); George Iosifidis (CERTH & Universityof Thessaly, Greece); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong); LeandrosTassiulas (University of Thessaly, Greece)pp. 682-690
EasyBid: Enabling Cellular Offloading via Small PlayersZhixue Lu (Ohio State University, USA); Prasun Sinha (Ohio State University, USA); R. Srikant(University of Illinois at Urbana-Champaign, USA)pp. 691-699
Time Dependent Pricing in Wireless Data Networks: Flat-Rate vs. Usage-Based SchemesLiang Zhang (The Hong Kong Polytechnic University, Hong Kong); Weijie Wu (Shanghai Jiao TongUniversity, P.R. China); Dan Wang (The Hong Kong Polytechnic University, Hong Kong)pp. 700-708
Double Auctions for Dynamic Spectrum AllocationWei Dong (University of Texas at Austin, USA); Swati Rallapalli (University of Texas at Austin,USA); Lili Qiu (The University of Texas at Austin, USA); K. K. Ramakrishnan (Rutgers University,USA); Yin Zhang (University of Texas at Austin, USA)pp. 709-717
SN1: Sensor networks 1
A Generalized Coverage-Preserving Scheduling in WSNs: a Case Study in Structural HealthMonitoring
Xuefeng Liu (The Hong Kong Polytechnic University, Hong Kong); Jiannong Cao (Hong KongPolytechnic Univ, Hong Kong); Shaojie Tang (Temple University, USA); Peng Guo (HuazhongUniversity of Science and Technology, P.R. China)pp. 718-726
SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban EnvironmentsHaofu Han (Shanghai Jiaotong University, P.R. China); Jiadi Yu (Shanghai Jiao Tong University, P.R.China); Hongzi Zhu (Shanghai Jiao Tong University, P.R. China); Yingying Chen (Stevens Instituteof Technology, USA); Jie Yang (Oakland University, USA); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R. China); Minglu Li(Shanghai Jiao Tong University, P.R. China)pp. 727-735
An Optimal Data Collection Technique for Improved Utility in UAS-aided NetworksAhmed E.A.A. Abdulla (Tohoku University, Japan); Zubair Fadlullah (Tohoku University, Japan);Hiroki Nishiyama (Tohoku University, Japan); Nei Kato (Tohoku University, Japan); Fumie Ono(National Institute of Information and Communications Technology, Japan); Ryu Miura (NICT,Japan)pp. 736-744
Toward Optimal Allocation of Location Dependent Tasks in CrowdsensingShibo He (Arizona State University, USA); Dong-Hoon Shin (Arizona State University, USA);Junshan Zhang (Arizona State University, USA); Jiming Chen (Zhejiang University, P.R. China)pp. 745-753
SP3: Security and privacy 3
Achieving k-anonymity in Privacy-Aware Location-Based ServicesBen Niu (Xidian University, P.R. China); Qinghua Li (University of Arkansas, USA); Xiaoyan Zhu(Xidian University, P.R. China); Guohong Cao (The Pennsylvania State University, USA); Hui Li(Xidian University, P.R. China)pp. 754-762
PLAM: A Privacy-Preserving Framework for Local-Area Mobile Social NetworksRongxing Lu (Nanyang Technological University, Singapore); Xiaodong Lin (University of OntarioInstitute of Technology, Canada); Zhiguo Shi (Zhejiang University, P.R. China); Jun Shao (ZhejiangGongshang University, P.R. China)pp. 763-771
Preserving Secondary Users' Privacy in Cognitive Radio NetworksZhengrui Qin (College of William and Mary, USA); Qun Li (College of William and Mary, USA);Shanhe Yi (College of William and Mary, USA); Dmitry Zamkov (University of Illinois at Urbana-Champaign, USA)pp. 772-780
Markov Chain Fingerprinting to Classify Encrypted TrafficMaciej Korczyński (Fefferman lab, Rutgers University, USA); Andrzej Duda (Grenoble Institute ofTechnology, France)pp. 781-789
WN3: Wireless networks 3
3D Pipeline Contention: Asymmetric Full Duplex in Wireless NetworksShaohe Lv (National University of Defense Technology, P.R. China); Xuan Dong (National Universityof Defence Technology, P.R. China); Yong Lu (National University of Defense Technology, P.R.China); Xiaoli Du (National University of Defense Technology, P.R. China); Xiaodong Wang(National University of Defense Technology, P.R. China); Yong Dou (National University of DefenseTechnology (NUDT), P.R. China); XingMing Zhou (School of Computer, National University ofDefense Technology, P.R. China)pp. 790-798
Montage: Combine Frames with Movement Continuity for Realtime Multi-User TrackingLan Zhang (Tsinghua University, P.R. China); Kebin Liu (Tsinghua University, P.R. China);Yonghang Jiang (Tsinghua University, P.R. China); Xiang-Yang Li (Illinois Institute of Technology,USA); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology,P.R. China); Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China)pp. 799-807
Scalable User Selection for MU-MIMO NetworksXiufeng Xie (University of Wisconsin-Madison, USA); Xinyu Zhang (University of Wisconsin-Madison, USA)pp. 808-816
iBeam: Intelligent Client-Side Multi-User Beamforming in Wireless NetworksYongjiu Du (Southern Methodist University, USA); Ehsan Aryafar (Intel Labs, USA); Joseph D.Camp (Southern Methodist University, USA); Mung Chiang (Princeton University, USA)pp. 817-825
CC4: Cloud computing 4
TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure CodesGuanfeng Liang (DOCOMO Innovations, USA); Ulas Can Kozat (DOCOMO Innovations, USA)pp. 826-834
New Bandwidth Sharing and Pricing Policies to Achieve A Win-Win Situation for Cloud Providerand Tenants
Haiying Shen (Clemson University, USA); Zhuozhao Li (Clemson University, USA)pp. 835-843
Neptune: Efficient Remote Communication Services for Cloud BackupsYu Hua (Huazhong University of Science and Technology, P.R. China); Xue Liu (McGill Univerisity,Canada); Dan Feng (Huazhong University of Science and Technology, P.R. China)pp. 844-852
Dynamic Content Allocation for Cloud-assisted Service of Periodic WorkloadsGyörgy Dán (KTH, Royal Institute of Technology, Sweden); Niklas Carlsson (Linköping University,Sweden)pp. 853-861
CNE: Cooperative networking
WiSlow: A WiFi Network Performance Troubleshooting Tool for End UsersKyung Hwa Kim (Columbia University, USA); Hyunwoo Nam (Columbia University, USA); HenningSchulzrinne (Columbia University, USA)pp. 862-870
Scaling Laws for Heterogeneous Cognitive Radio Networks with Cooperative Secondary UsersRiheng Jia (Shanghai Jiaotong University, P.R. China); Jinbei Zhang (Shanghai Jiaotong University,P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China); Xiaohua Tian (ShanghaiJiaotong University, P.R. China); Qian Zhang (Hong Kong University of Science and Technology,Hong Kong)pp. 871-879
Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop NetworksYantian Hou (USU, USA); Ming Li (Utah State University, USA); Xu Yuan (Virginia Tech, USA);Thomas Hou (Virginia Tech, USA); Wenjing Lou (Virginia Tech, USA)pp. 880-888
EE1: Energy efficiency in wireless networks 1
On the Expected Size of Minimum-Energy Path-preserving Topologies for Wireless Multi-hopNetworks
Ashikur Rahman (State University of New York, USA); Nael Abu-Ghazaleh (State University of NewYork at Binghamton, USA)pp. 889-897
Distributed Opportunistic Scheduling for Wireless Networks Powered by Renewable EnergySources
Hang Li (Texas A&M University, USA); Chuan Huang (Arizona State University, USA); Shuguang Cui(Texas A&M University, USA); Junshan Zhang (Arizona State University, USA)pp. 898-906
Relax, but Do Not Sleep: A New Perspective on Green Wireless NetworkingChenfei Gao (Syracuse University, USA); Weiyi Zhang (AT&T Labs Research, USA); Jian Tang(Syracuse University, USA); Chonggang Wang (InterDigital Communications, USA); Shihong Zou(Beijing University of Posts&Telecommunications, P.R. China); Sen Su (Beijing University of Posts &Telecommunications (BUPT), P.R. China)pp. 907-915
Energy Optimization Through Traffic Aggregation in Wireless NetworksWenjie Hu (The Pennsylvania State University, USA); Guohong Cao (The Pennsylvania StateUniversity, USA)pp. 916-924
IM2: Internet monitoring and measurement 2
Contextual Localization Through Network Traffic AnalysisAveek K Das (University of California, Davis, USA); Parth H Pathak (University of California, Davis,USA); Chen-Nee Chuah (University of California, Davis, USA); Prasant Mohapatra (University ofCalifornia, Davis, USA)pp. 925-933
Intelligent SDN based Traffic (de)Aggregation and Measurement Paradigm (iSTAMP)Mehdi Malboubi (University of California, Davis, USA); Liyuan Wang (UC Davis, USA); Chen-NeeChuah (University of California, Davis, USA); Puneet Sharma (HP Labs Palo Alto, USA)pp. 934-942
Separating Wheat from Chaff: Winnowing Unintended Prefixes using Machine LearningAndra Lutu (Institute IMDEA Networks & University Carlos III of Madrid, Spain); Marcelo Bagnulo(University Carlos III of Madrid, Spain); Jesus Cid-Sueiro (Universidad Carlos III de Madrid, Spain);Olaf M Maennel (Loughborough University, United Kingdom)pp. 943-951
An Overlay Automata Approach to Regular Expression MatchingAlex X. Liu (Michigan State University, USA); Eric Torng (Michigan State University, USA)pp. 952-960
PNL1: Panel 1
SN2: Sensor networks 2
Walking down the STAIRS: Efficient Collision Resolution for Wireless Sensor NetworksXiaoyu Ji (Hong Kong University of Science and Technology, Hong Kong); Yuan He (TsinghuaUniversity, P.R. China); Jiliang Wang (Tsinghua University, P.R. China); Wei Dong (ZhejiangUniversity, P.R. China); Xiaopei Wu (Tsinghua University, P.R. China); Yunhao Liu (TsinghuaUniversity & The Hong Kong University of Science and Technology, P.R. China)pp. 961-969
Critical Sensing Range for Mobile Heterogeneous Camera Sensor NetworksYitao Hu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University,P.R. China); Xiaoying Gan (Shanghai Jiao Tong University, P.R. China)pp. 970-978
Bounded Stretch Geographic Homotopic Routing in Sensor NetworksKan Huang (State University of New York at Stony Brook, USA); Chien-Chun Ni (Stony BrookUniversity, USA); Rik Sarkar (University of Edinburgh, United Kingdom); Jie Gao (Stony BrookUniversity, USA); Joseph Mitchell (SUNY Stony Brook, USA)pp. 979-987
Maximizing the Value of Sensed Information in Underwater Wireless Sensor Networks via anAutonomous Underwater Vehicle
Stefano Basagni (Northeastern University, USA); Ladislau Bölöni (University of Central Florida,USA); Petrika Gjanci (University of Rome "La Sapienza", Italy); Chiara Petrioli (University of Rome"La Sapienza", Italy); Cynthia A Phillips (Sandia National Laboratories, USA); Damla Turgut(University of Central Florida, USA)pp. 988-996
WS1: Wireless security and privacy 1
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless NetworksJingchao Sun (Arizona State University, USA); Xu Chen (Arizona State University, USA); JinxueZhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA); JunshanZhang (Arizona State University, USA)pp. 997-1005
Utility-based Cooperative Decision in Cooperative AuthenticationYunchuan Guo (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China);Yin Lihua (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Licai Liu(Beijing University of Posts and Telecommunications & Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Fang Binxing (Institute of Computing TechnologyChinese Academy of Sciences, P.R. China)pp. 1006-1014
Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a SystemsHanif Rahbari (University of Arizona, USA); Marwan Krunz (University of Arizona, USA); LoukasLazos (University of Arizona, USA)pp. 1015-1023
A New Efficient Physical Layer OFDM Encryption SchemeFei Huo (University of Waterloo, Canada); Guang Gong (University of Waterloo, Canada)pp. 1024-1032
CC5: Cloud computing 5
Consolidating Complementary VMs with Spatial/Temporal-awareness in Cloud DatacentersLiuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA)pp. 1033-1041
When Queueing Meets Coding: Optimal-Latency Data Retrieving Scheme in Storage CloudsShengbo Chen (Qualcomm R&D, USA); Yin Sun (the Ohio State University, USA); Ulas Can Kozat(DOCOMO Innovations, USA); Longbo Huang (Tsinghua University, P.R. China); Prasun Sinha (OhioState University, USA); Guanfeng Liang (DOCOMO Innovations, USA); Xin Liu (UC Davis, USA);Ness B. Shroff (The Ohio State University, USA)pp. 1042-1050
Power Consumption of Virtual Machines with Network Transactions: Measurement andImprovement
Ryan Shea (Simon Fraser University, Canada); Haiyang Wang (University of Minnesota at Duluth,USA); Jiangchuan Liu (Simon Fraser University, Canada)pp. 1051-1059
Can Mobile Cloudlets Support Mobile Applications?Yujin Li (North Carolina State University, USA); Wenye Wang (NC State University, USA)pp. 1060-1068
CN1: Cellular networks 1
Structured Spectrum Allocation and User Association in Heterogeneous Cellular NetworksWei Bao (University of Toronto, Canada); Ben Liang (University of Toronto, Canada)pp. 1069-1077
Video Delivery over Heterogeneous Cellular Networks: Optimizing Cost and PerformanceKonstantinos Poularakis (University of Thessaly, Greece); George Iosifidis (CERTH & University ofThessaly, Greece); Antonios Argyriou (University of Thessaly & CERTH, Greece); Leandros Tassiulas(University of Thessaly, Greece)pp. 1078-1086
Cell Planning for Heterogeneous Networks: An Approximation AlgorithmWentao Zhao (Nanjing University, P.R. China); Shaowei Wang (Nanjing University, P.R. China);Chonggang Wang (InterDigital Communications, USA); Xiaobing Wu (Nanjing University & NationalLaboratory for Novel Software Technology, P.R. China)pp. 1087-1095
A College Admissions Game for Uplink User Association in Wireless Small Cell NetworksWalid Saad (Virginia Tech & Wireless@VT, USA); Zhu Han (University of Houston, USA); RongZheng (McMaster University, Canada); Mérouane Debbah (Supelec, France); H. Vincent Poor(Princeton University, USA)pp. 1096-1104
EE2: Energy efficiency in wireless networks 2
Safe Charging for Wireless Power TransferHaipeng Dai (Nanjing University & State Key Lab of Novel Software Technology, P.R. China);Yunhuai Liu (Third Research Institute of Ministry of Public Security, P.R. China); Guihai Chen(Shanghai Jiao Tong University, P.R. China); Xiaobing Wu (Nanjing University & NationalLaboratory for Novel Software Technology, P.R. China); Tian He (University of Minnesota, USA)pp. 1105-1113
Energy-efficient Cooperative Broadcast in Fading Wireless NetworksChenxi Qiu (Clemson University, USA); Haiying Shen (Clemson University, USA); Lei Yu (ClemsonUniversity, USA)pp. 1114-1122
Performance-aware Energy Optimization on Mobile Devices in Cellular NetworkYong Cui (Tsinghua University, P.R. China); Shihan Xiao (University of Tsinghua, P.R. China); XinWang (Stony Brook University, USA); Minming Li (City University of Hong Kong, Hong Kong);Hongyi Wang (Tsinghua University, P.R. China); Zeqi Lai (Tsinghua University, P.R. China)pp. 1123-1131
Microeconomic Analysis of Base-Station Sharing in Green Cellular NetworksBingjie Leng (Tsinghua University, P.R. China); Parisa Mansourifard (University of SouthernCalifornia, USA); Bhaskar Krishnamachari (University of Southern California, USA)pp. 1132-1140
IM3: Internet monitoring and measurement 3
Optimal Collaborative Access Point Association in Wireless NetworksOuldooz Baghban Karimi (Simon Fraser University, Canada); Jiangchuan Liu (Simon FraserUniversity, Canada); Jennifer Rexford (Princeton University, USA)pp. 1141-1149
kBF: a Bloom Filter for Key-Value Storage with an Application on Approximate StateSisi Xiong (University of Tennessee, Knoxville, USA); Yanjun Yao (University of Tennessee,Knoxville, USA); Qing Cao (University of Tennessee, USA); Tian He (University of Minnesota, USA)pp. 1150-1158
Detecting Malicious HTTP Redirections Using Trees of User Browsing ActivityHesham Mekky (University of Minnesota, USA); Ruben Torres (Narus Inc., USA); Zhi-Li Zhang(University of Minnesota, USA); Sabyasachi Saha (Narus Inc., USA); Antonio Nucci (Narus inc.,USA)pp. 1159-1167
What Scale of Audience a Campaign can Reach in What Price on Twitter?Yubao Zhang (College of William and Mary, USA); Xin Ruan (College of William and Mary, USA);Haining Wang (College of William and Mary, USA); Hui Wang (National University of DefenseTechnology, P.R. China)pp. 1168-1176
SN3: Sensor networks 3
How to identify global trends from local decisions? Event Region Detection on Mobile NetworksAndreas Loukas (Delft University of Technology, The Netherlands); Marco Zuniga (Delft Universityof Technology, The Netherlands); Ioannis Protonotarios (Delft University of Technology, TheNetherlands); Jie Gao (Stony Brook University, USA)pp. 1177-1185
Sleep in the Dins: Insomnia Therapy for Duty-cycled Sensor NetworksJiliang Wang (Tsinghua University, P.R. China); Zhichao Cao (Tsinghua University, P.R. China);Xufei Mao (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong KongUniversity of Science and Technology, P.R. China)pp. 1186-1194
Mobile-to-Mobile Energy Replenishment in Mission-Critical Robotic Sensor NetworksLiang He (Singapore University of Technology and Design, Singapore); Peng Cheng (SingaporeUniversity of Technology and Design, P.R. China); Yu Gu (Singapore University of Technology andDesign & Advanced Digital Sciences Center, Singapore); Jianping Pan (University of Victoria,Canada); Ting Zhu (State University of New York at Binghamton, USA); Cong Liu (The University oftexas at Dallas, USA)pp. 1195-1203
Connected Wireless Camera Network Deployment with Visibility CoverageHua Huang (Temple University, USA); Chien-Chun Ni (Stony Brook University, USA); Jie Gao(Stony Brook University, USA); Xiaomeng Ban (Stony Brook University, USA); Andrew Schneider(Temple University, USA); Shan Lin (Temple University, USA)pp. 1204-1212
US: Urban sensing and environmental monitoring
How to Crowdsource Tasks Truthfully without Sacrificing Utility: Online Incentive Mechanismswith Budget Constraint
Dong Zhao (Beijing University of Posts and Telecommunications, P.R. China); Xiang-Yang Li (IllinoisInstitute of Technology, USA); Huadong Ma (Beijing University of Posts and Telecommunications,P.R. China)pp. 1213-1221
Compressive Sensing over Strongly Connected Digraph and Its Transportation MonitoringApplication
Xiao Qi (Tsinghua University, P.R. China); Yongcai Wang (Tsinghua University, P.R. China);Yuexuan Wang (The University of Hong Kong & Tsinghua University, P.R. China); Liwen Xu(Tsinghua University, P.R. China)pp. 1222-1230
TRAC: Truthful Auction for Location-Aware Collaborative Sensing in Mobile CrowdsourcingZhenni Feng (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Qian Zhang (Hong Kong University of Science and Technology, HongKong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong); Athanasios V.Vasilakos (National Technical University of Athens & Kuwait University, Greece)pp. 1231-1239
ShopProfiler: Profiling Shops with Crowdsourcing DataXiaonan Guo (Singapore Management University, Singapore); Eddie Chan (The Hong KongUniversity of Science and Technology, Hong Kong); Ce Liu (University of Pittsburgh, USA); KaishunWu (HKUST & Sun Yat-sen University, Hong Kong); Siyuan Liu (Carnegie Mellon University, USA);Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 1240-1248
WS2: Wireless security and privacy 2
PS-TRUST: Provably Secure Solution for Truthful Double Spectrum AuctionsZhili Chen (University of Science and Technology of China, P.R. China); Liusheng Huang (Universityof Science and Technology of China, P.R. China); Lu Li (University of Science and Technology ofChina, P.R. China); Wei Yang (University of Science and Technology of China, P.R. China); HaiboMiao (University of Science and Technology of China, P.R. China); Miaomiao Tian (University ofScience and Technology of China, P.R. China); Fei Wang (Suzhou Institute for Advanced Study,USTC & NHPCC, USTC, P.R. China)pp. 1249-1257
Information Leaks Out: Attacks and Countermeasures on Compressive Data Gathering inWireless Sensor Networks
Pengfei Hu (University of California, Davis, USA); Kai Xing (University of Science and Technology ofChina, P.R. China); Xiuzhen Cheng (George Washington Univ, USA); Hao Wei (The ChineseUniversity of Hong Kong, Hong Kong); Haojin Zhu (Shanghai Jiao Tong University, P.R. China)pp. 1258-1266
Secure Cooperative Spectrum Sensing and Access Against Intelligent Malicious BehaviorsWei Wang (Zhejiang University, P.R. China); Lin Chen (The University of Paris-Sud, France); KangG. Shin (University of Michigan, USA); Lingjie Duan (Singapore University of Technology andDesign (SUTD), Singapore)pp. 1267-1275
Physical Layer Challenge-Response Authentication in Wireless Networks with RelayXianru Du (University of Michigan - Dearborn, USA); Dan Shan (GM Research, USA); Kai Zeng(University of Michigan - Dearborn, USA); Lauren Huie (Air Force Research Lab, USA)pp. 1276-1284
CC6: Cloud computing 6
A Deep Investigation Into Network Performance in Virtual Machine Based Cloud EnvironmentRyan Shea (Simon Fraser University, Canada); Feng Wang (The University of Mississippi, USA);Haiyang Wang (University of Minnesota at Duluth, USA); Jiangchuan Liu (Simon Fraser University,Canada)pp. 1285-1293
RIAL: Resource Intensity Aware Load Balancing in CloudsLiuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA); Karan Sapra(Clemson University, USA)pp. 1294-1302
Optimal Approximation Algorithm of Virtual Machine Placement for Data Latency Minimizationin Cloud Systems
Jian-Jhih Kuo (National Tsing Hua University, Taiwan); Hsiu-Hsien Yang (National Tsing HuaUniversity, Taiwan); Ming-Jer Tsai (National Tsing Hua University, Taiwan)pp. 1303-1311
Using Stop-and-Wait to Improve TCP Throughput in Fast Optical Switching (FOS) Networksover Short Physical Distances
Pablo Jesus Argibay-Losada (SUNY at Buffalo, USA); Kseniia Nozhnina (State University ofInformation and Communication Technologies, Ukraine); Gokhan Sahin (University of Aveiro,Portugal); Chunming Qiao (State University of New York at Buffalo, USA)pp. 1312-1320
CN2: Cellular networks 2
"Wireless Networks Without Edges": Dynamic Radio Resource Clustering and User SchedulingYuhuan Du (University of Texas at Austin, USA); Gustavo de Veciana (The University of Texas atAustin, USA)pp. 1321-1329
Cellular Multi-Coverage with Non-uniform RatesOmer Gurewitz (Ben Gurion University, Israel); Yakov Sandomirsky (Ben Gurion University of theNegev, Israel); Gabriel Scalosub (Ben-Gurion University, Israel)pp. 1330-1338
Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and AlgorithmsRobert Margolies (Columbia University, USA); Ashwin Sridharan (AT&T, USA); Vaneet Aggarwal(AT&T Labs - Research, USA); Rittwik Jana (AT&T Labs Research, USA); Nemmara K.Shankaranarayanan (AT&T Laboratories - Research, USA); Vinay A. Vaishampayan (DIMACS,Rutgers University & Columbia University, USA); Gil Zussman (Columbia University, USA)pp. 1339-1347
User Mobility from the View of Cellular Data NetworksYing Zhang (Ericsson Research, USA)pp. 1348-1356
EE3: Energy efficiency in wireless networks 3
Energy Efficient Wifi Tethering on a SmartphoneKyoung-Hak Jung (Pohang University of Science and Technology (POSTECH), Korea); Yuepeng Qi(Pohang University of Science and Technology (POSTECH), Korea); Chansu Yu (Cleveland StateUniversity, USA); Young-Joo Suh (Pohang University of Science and Technology (POSTECH), Korea)pp. 1357-1365
Fair Energy-efficient Sensing Task Allocation in Participatory Sensing with SmartphonesQingwen Zhao (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University, P.R. China); Jian Cao(Shanghai Jiaotong University, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.China); Bo Li (Hong Kong University of Science and Technology, Hong Kong)pp. 1366-1374
Improved Structures for Data Collection in Wireless Sensor NetworksJon Crowcroft (University of Cambridge, United Kingdom); Michael Segal (Ben-Gurion University ofthe Negev, Israel); Liron Levin (Ben-Gurion University of the Negev, Israel)pp. 1375-1383
Energy-Efficient Capacity Optimization in Wireless NetworksLu Liu (Illinois Institute of Technology, USA); Xianghui Cao (Illinois Institute of Technology &Zhejiang University, USA); Yu Cheng (Illinois Institute of Technology, USA); Lili Du (IllinoisInstitute of Technology, USA); Wei Song (University of New Brunswick, Canada); Yu Wang(University of North Carolina at Charlotte, USA)pp. 1384-1392
FN: Firewalls and network intrusion detection
ProWord: An Unsupervised Approach to Protocol Feature Word ExtractionZhuo Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); ZhibinZhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong); Yunjie Liu (Beijing University ofPosts and Telecommunications, P.R. China); Gaogang Xie (Institute of Computing Technology,Chinese Academy of Sciences, P.R. China)pp. 1393-1401
TorWard: Discovery of Malicious Traffic over TorZhen Ling (Southeast University, P.R. China); Luo Junzhou (Southeast University, P.R. China); KuiWu (University of Victoria, Canada); Wei Yu (Towson University, USA); Xinwen Fu (University ofMassachusetts Lowell, USA)pp. 1402-1410
Transductive Malware Label Propagation: Find Your Lineage From Your NeighborsDeguang Kong (University of Texas at Arlington, USA); Guanhua Yan (Los Alamos NationalLaboratory, USA)pp. 1411-1419
LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection inNetwork Data Streams
Qun Huang (The Chinese University of Hong Kong, P.R. China); Patrick Pak-Ching Lee (The ChineseUniversity of Hong Kong, Hong Kong)pp. 1420-1428
IM4: Internet monitoring and measurement 4
Bloom Tree: A Search Tree Based on Bloom Filters for Multiple-Set Membership TestingMyungKeun Yoon (Kookmin University, Korea); JinWoo Son (Kookmin University, Korea); Seon-HoShin (Kookmin University, Korea)pp. 1429-1437
A longitudinal analysis of Internet rate limitationsJoão Taveira Araújo (University College London, United Kingdom); Raul Landa (University CollegeLondon, United Kingdom); Richard G Clegg (University College London, United Kingdom); KensukeFukuda (National Institute of Informatics, Japan); George Pavlou (University College London,United Kingdom)pp. 1438-1446
Monitor Placement for Maximal Identifiability in Network TomographyLiang Ma (Imperial College London, United Kingdom); Ting He (IBM Research, USA); Kin K. Leung(Imperial College, United Kingdom); Ananthram Swami (Army Research Lab., USA); Don Towsley(University of Massachusetts at Amherst, USA)pp. 1447-1455
``Can you SEE me now?" A Measurement Study of Mobile Video CallsChenguang Yu (Polytechnic Institute of NYU, USA); Yang Xu (Polytechnic Institute of NYU, USA); BoLiu (Polytechnic Institute of NYU, USA); Yong Liu (Polytechnic Institute of NYU, USA)pp. 1456-1464
SN4: Sensor networks 4
Optimal Link Scheduling for Delay-constrained Periodic Traffic over Unreliable Wireless LinksYan Li (University of Otago, New Zealand); Haibo Zhang (Universtiy of Otago, New Zealand); ZhiyiHuang (University of Otago, New Zealand); Michael Albert (University of Otago, New Zealand)pp. 1465-1473
Approximate Multiple Count in Wireless Sensor NetworksXiaolin Fang (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin InstituteTechnology, P.R. China); Jianzhong Li (Harbin Institute of Technology, P.R. China); Yingshu Li(Georgia State University, USA)pp. 1474-1482
EV-Sounding: A Visual Assisted Electronic Channel Sounding SystemGang Li (the Ohio State University, USA); Jin Teng (The Ohio State University, USA); Fan Yang (theOhio State University, USA); Adam C. Champion (The Ohio State University, USA); Dong Xuan (TheOhio State University, USA); Hong Luan (University of Jinan, P.R. China); Yuan Fang Zheng (TheOhio-state University, USA)pp. 1483-1491
Coverage in Visual Sensor Networks with Pan-Tilt-Zoom Cameras: the MaxFoV ProblemVikram P. Munishwar (State University of New York at Binghamton, USA); Vinay Kolar (IBMResearch, India); Nael Abu-Ghazaleh (State University of New York at Binghamton, USA)pp. 1492-1500
WS3: Wireless security and privacy 3
How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile BotnetsZhuo Lu (Intelligent Automation, Inc & North Carolina State University, USA); Wenye Wang (NCState University, USA); Cliff Wang (Army Research Office, USA)pp. 1501-1509
COLLECTOR: A Secure RFID-Enabled Batch Recall ProtocolSaiyu Qi (Hong Kong university of science and Technology, Hong Kong); Yuanqing Zheng (NanyangTechnological University, Singapore); Mo Li (Nanyang Technological University, Singapore); Li Lu(University of Electronic Science and Technology of China, P.R. China); Yunhao Liu (TsinghuaUniversity & The Hong Kong University of Science and Technology, P.R. China)pp. 1510-1518
Analysis and Detection of SIMbox Fraud in Mobility NetworksIlona Murynets (AT&T Security Research Center, USA); Michael Zabarankin (Stevens Institute ofTechnology, USA); Roger Piqueras Jover (AT&T Security Research Center, USA); Adam Panagia(AT&T, USA)pp. 1519-1526
Scaling Laws for Secrecy Capacity in Cooperative Wireless NetworksMahtab Mirmohseni (Sharif University of Technology, Iran); Panagiotis (Panos) Papadimitratos(KTH, Sweden)pp. 1527-1535
CN3: Cellular networks 3
Fast Resource Scheduling in HetNets with D2D SupportFrancesco Malandrino (Trinity College, Dublin, Ireland); Claudio E. Casetti (Politecnico di Torino,Italy); Carla-Fabiana Chiasserini (Politecnico di Torino, Italy); Zana Limani (Politecnico di Torino,Italy)pp. 1536-1544
INDAPSON: An Incentive Data Plan Sharing System Based on Self-Organizing NetworkTuo Yu (Shanghai Jiaotong University, P.R. China); Zilong Zhou (Shanghai Jiao Tong University,P.R. China); Da Zhang (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (ShanghaiJiaotong University, P.R. China); Yunxin Liu (Microsoft Research Asia, P.R. China); Songwu Lu(University of California at Los Angeles, USA)pp. 1545-1553
A Mean Field Game Approach to Scheduling in Cellular SystemsMayank Manjrekar (Texas A&M University, USA); Vinod Ramaswamy (Texas A&M University, USA);Srinivas Shakkottai (Texas A&M University, USA)pp. 1554-1562
R2D2: Embracing Device-to-Device Communication in Next Generation Cellular NetworksTarun Bansal (The Ohio State University, USA); Karthikeyan Sundaresan (NEC Labs America, USA);Sampath Rangarajan (NEC Labs America, USA); Prasun Sinha (Ohio State University, USA)pp. 1563-1571
DC1: Data center networking 1
On Efficient Bandwidth Allocation for Traffic Variability in DatacentersJian Guo (Huazhong University of Science and Technology, P.R. China); Fangming Liu (HuazhongUniversity of Science and Technology, P.R. China); Xiaomeng Huang (Tsinghua University, P.R.China); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong); Mi Hu (HuazhongUniversity of Science and Technology, P.R. China); Gao Qiao (Huazhong University of Science andTechnology, P.R. China); Hai Jin (Huazhong University of Science and Technology, P.R. China)pp. 1572-1580
RepFlow: Minimizing Flow Completion Times with Replicated Flows in Data CentersHong Xu (City University of Hong Kong & University of Toronto, Hong Kong); Baochun Li (Universityof Toronto, Canada)pp. 1581-1589
Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic PerspectiveMarco Chiesa (Roma Tre University, Italy); Guy Kindler (Hebrew University of Jerusalem, Israel);Michael Schapira (Hebrew University of Jerusalem, USA)pp. 1590-1598
Towards Performance-Centric Fairness in Datacenter NetworksLi Chen (University of Toronto, Canada); Yuan Feng (The Hong Kong Polytechnic University, HongKong); Baochun Li (University of Toronto, Canada); Bo Li (Hong Kong University of Science andTechnology, Hong Kong)pp. 1599-1607
FT1: Fault tolerance and survivability 1
Geometric Evaluation of Survivability of Disaster-affected Network with Probabilistic FailureHiroshi Saito (NTT & NTT Network Technology Laboratories, Japan)
pp. 1608-1616
Keep Forwarding: Towards K-link Failure Resilient RoutingBaohua Yang (IBM Research, P.R. China); Junda Liu (University of California, Berkeley, USA); ScottShenker (U. C. Berkeley and ICSI, USA); Jun Li (Tsinghua University, P.R. China); Kai Zheng (IBMResearch, P.R. China)pp. 1617-1625
Restorable Logical Topology in the Face of No or Partial Traffic Demand KnowledgeReuven Cohen (Technion, Israel); Gabi Nakibly (National EW Research & Simulation Center, Israel)pp. 1626-1634
Max-Flow Min-Cut Theorem and Faster Algorithms in a Circular Disk Failure ModelYusuke Kobayashi (University of Tokyo, Japan); Kensuke Otsuki (University of Tokyo, Japan)pp. 1635-1643
SB1: Scheduling and buffer management 1
Distributed Backup Scheduling: Modeling and OptimizationPeter M van de Ven (IBM Thomas J. Watson Research Center, USA); Bo Zhang (IBM T. J. WatsonResearch Center, USA); Angela Schorgendorfer (IBM T. J. Watson Research Center, USA)pp. 1644-1652
Fast And Simple Approximation Algorithms for Maximum Weighted Independent Set of LinksPeng-Jun Wan (Illinois Institute of Technology, USA); Xiaohua Jia (City University of Hong Kong,Hong Kong); Guo-Jun Dai (School of Computer Science, Hangzhou DianZi University, P.R. China);Hongwei Du (Harbin Institute of Technology Shenzhen Graduate School, P.R. China); Ophir Frieder(Georgetown University, USA)pp. 1653-1661
A High-order Markov Chain Based Scheduling Algorithm for Low Delay in CSMA NetworksJaewook Kwak (North Carolina State University, USA); Chul-Ho Lee (North Carolina StateUniversity, USA); Do Young Eun (North Carolina State University, USA)pp. 1662-1670
Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless CodesYin Sun (the Ohio State University, USA); Can Emre Koksal (The Ohio State University, USA); Kyu-Han Kim (Hewlett-Packard Laboratories, USA); Ness B. Shroff (The Ohio State University, USA)pp. 1671-1679
SC1: Social computing and networks 1
LBSNSim: Analyzing and Modeling Location-based Social NetworksWei Wei (College of William and Mary, USA); Xiaojun Zhu (Nanjing University, P.R. China); Qun Li(College of William and Mary, USA)pp. 1680-1688
On Designing Neighbor Discovery Protocols: A Code-Based ApproachTong Meng (Shanghai Jiao Tong University, P.R. China); Fan Wu (Shanghai Jiao Tong University,P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China)pp. 1689-1697
Assessment of Multi-Hop Interpersonal Trust in Social Networks by Three-Valued SubjectiveLogic
Guangchi Liu (Montana State University, USA); Qing Yang (Montana State University, USA);Honggang Wang (University of Massachusetts, Dartmouth & College of Engineering, USA);Xiaodong Lin (University of Ontario Institute of Technology, Canada); Mike P Wittie (Montana StateUniversity, USA)pp. 1698-1706
FluidRating: A Time-Evolving Rating Scheme in Trust-based Recommendation Systems UsingFluid Dynamics
Wenjun Jiang (Central South University, P.R. China); Jie Wu (Temple University, USA); GuojunWang (Central South University, P.R. China); Huanyang Zheng (Temple University, USA)
pp. 1707-1715
SD: Software defined networking
On Diagnosis of Forwarding Plane via Static Forwarding Rules in Software Defined NetworksUlas Can Kozat (DOCOMO Innovations, USA); Guanfeng Liang (DOCOMO Innovations, USA); KorayKokten (Ozyegin University, Turkey)pp. 1716-1724
Software Defined Monitoring of Application ProtocolsLukáš Kekely (CESNET a. l. e., Czech Republic); Viktor Puš (CESNET, Czech Republic); Jan Korenek(Brno University of Technology & CESNET, Czech Republic)pp. 1725-1733
On the effect of forwarding table size on SDN network utilizationRami Cohen (IBM Research - Haifa, Israel); Liane Lewin-Eytan (Yahoo! Research, Israel); Joseph(Seffi) Naor (Technion, Israel); Danny Raz (Technion, Israel)pp. 1734-1742
Software Defined Green Data Center Network with Exclusive RoutingDan Li (Tsinghua University, P.R. China); Yunfei Shang (Tsinghua University, P.R. China); CongjieChen (Tsinghua University, P.R. China)pp. 1743-1751
VN1: Vehicular Networks 1
Towards Automatic Phone-to-Phone Communication for Vehicular Networking ApplicationsShaohan Hu (University of Illinois at Urbana-Champaign, USA); Hengchang Liu (UIUC, USA); Lu Su(The State University of New York at Buffalo, USA); Hongyan Wang (UIUC, USA); Tarek Abdelzaher(University of Illinois, Urbana Champaign, USA); Pan Hui (Hong Kong University of Science andTechnology & Telekom Innovation Laboratories, Hong Kong); Wei Zheng (University of Wisconsin -Madison, USA); Zhiheng Xie (University of Virginia, USA); John Stankovic (University of Virginia,USA)pp. 1752-1760
POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular NetworksJun Qin (Shanghai Jiao Tong University, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University,P.R. China); Yanmin Zhu (Shanghai Jiao Tong University, P.R. China); Li Lu (University of ElectronicScience and Technology of China, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.China); Minglu Li (Shanghai Jiao Tong University, P.R. China)pp. 1761-1769
On Multihop Communications For In-Vehicle Internet Access Based On a TDMA MAC ProtocolHassan A Omar (University of Waterloo, Canada); Weihua Zhuang (University of Waterloo,Canada); Li Li (Communication Research Centre of Canada, Canada)pp. 1770-1778
GeoMob: A Mobility-aware Geocast Scheme in Metropolitans via Taxicabs and BusesLei Zhang (University of Victoria, Canada); Boyang Yu (University of Victoria, Canada); JianpingPan (University of Victoria, Canada)pp. 1779-1787
CN4: Cellular networks 4
Automated Dynamic Offset Applied to Cell AssociationMajed Haddad (INRIA, France); Habib B.A. Sidi (Orange Labs, France); Piotr Wiecek (WroclawUniversity of Technology, Poland); Eitan Altman (INRIA, France)pp. 1788-1796
Interference Coordination Strategies for Content Update Dissemination in LTE-AVincenzo Sciancalepore (Institute IMDEA Networks & Politecnico di Milano, Italy); VincenzoMancuso (IMDEA Networks Institute, Spain); Albert Banchs (Universidad Carlos III de Madrid,Spain); Shmuel Zaks (Technion, Israel); Antonio Capone (Politecnico di Milano, Italy)pp. 1797-1805
Classifying Call Profiles in Large-scale Mobile Traffic DatasetsDiala Naboulsi (INSA Lyon, France); Razvan Stanica (INSA Lyon, France); Marco Fiore (NationalResearch Council of Italy, Italy)pp. 1806-1814
Cross-Layer Path Management in Multi-path Transport Protocol for Mobile DevicesYeon-sup Lim (University of Massachusetts Amherst, USA); Yung-Chih Chen (University ofMassachusetts at Amherst, USA); Erich Nahum (IBM T. J. Watson Research Center, USA); DonTowsley (University of Massachusetts at Amherst, USA); Kang-Won Lee (IBM Research, USA)pp. 1815-1823
DC2: Data center networking 2
Practical DCB for Improved Data Center NetworksBrent Stephens (Rice University & IBM, USA); Ankit Singla (University of Illinois at Urbana-Champaign, USA); Colin Dixon (IBM Research, USA); Wes Felter (IBM, USA); John Carter (IBMResearh, USA); Alan L. Cox (Rice University, USA)pp. 1824-1832
Distributed Data Storage Systems with Opportunistic RepairVaneet Aggarwal (AT&T Labs - Research, USA); Chao Tian (AT&T Labs-Research, ShannonLaboratory, USA); Vinay A. Vaishampayan (DIMACS, Rutgers University & Columbia University,USA); Yih-Farn Robin Chen (AT&T Labs - Research, USA)pp. 1833-1841
Let's Stay Together: Towards Traffic Aware Virtual Machine Placement in Data CentersXin Li (Nanjing University & State Key Laboratory of Novel Software Technology, P.R. China); JieWu (Temple University, USA); Shaojie Tang (Temple University, Philadelphia, PA, USA); Sanglu Lu(Nanjing University, P.R. China)pp. 1842-1850
On the Design and Analysis of Data Center Network Architectures for Interconnecting Dual-Port Servers
Dawei Li (Temple University, USA); Jie Wu (Temple University, USA)pp. 1851-1859
FT2: Fault tolerance and survivability 2
Signaling Free Localization of Node Failures in All-Optical NetworksJános Tapolcai (Budapest University of Technology and Economics, Hungary); Lajos Rónyai(Budapest University of Technology and Economics (BME), Hungary); Éva Hosszu (BudapestUniversity of Technology and Economics, Hungary); Pin-Han Ho (University of Waterloo, Canada);Suresh Subramaniam (The George Washington University, USA)pp. 1860-1868
Fault Tolerant Barrier Coverage for Wireless Sensor NetworksZhibo Wang (University of Tennessee, Knoxville, USA); Honglong Chen (China University ofPetroleum, P.R. China); Qing Cao (University of Tennessee, USA); Hairong Qi (the University ofTennessee, USA); Zhi Wang (Zhejiang University & State Key Laboratory of Industrial ControlTechnology, Zhejiang University, P.R. China)pp. 1869-1877
Heterogeneity-Aware Data Regeneration in Distributed Storage SystemsYan Wang (Fudan University, P.R. China); Dongsheng Wei (Fudan University, P.R. China); XunruiYin (University of Calgary, Canada); Xin Wang (Fudan University, P.R. China)pp. 1878-1886
CauseInfer:Automatic and Distributed Performance Diagnosis with Hierarchical CausalityGraph in Large Distributed Systems
Pengfei Chen (Xi'an Jiaotong University, P.R. China); Yong Qi (Xi'an Jiaotong University, P.R.China); Pengfei Zheng (Xi'an Jiaotong University, P.R. China); Di Hou (Xi'an Jiaotong University,P.R. China)pp. 1887-1895
PNL2: Panel 2
SB2: Scheduling and buffer management 2
Sharp Per-Flow Delay Bounds for Bursty Arrivals: The Case of FIFO, SP, and EDF SchedulingFlorin Ciucu (University of Warwick, United Kingdom); Felix Poloczek (TU Berlin / T-Labs,Germany); Jens Schmitt (University of Kaiserslautern, Germany)pp. 1896-1904
LP-relaxation based Distributed Algorithms for Scheduling in Wireless NetworksChandramani K. Singh (University of Illinois at Urbana-Champaign, India); Angelia Nedich(University of Illinois at Urbana-Champaign, USA); R. Srikant (University of Illinois at Urbana-Champaign, USA)pp. 1905-1913
Low Complexity Multi-Resource Fair Queueing with Bounded DelayWei Wang (University of Toronto, Canada); Ben Liang (University of Toronto, Canada); Baochun Li(University of Toronto, Canada)pp. 1914-1922
Rate-Control and Multi-Channel Scheduling for Wireless Live Streaming with StringentDeadlines
Shizhen Zhao (Purdue University, USA); Xiaojun Lin (Purdue University, USA)pp. 1923-1931
SC2: Social computing and networks 2
Information Diffusion in Mobile Social Networks: The Speed PerspectiveZongqing Lu (The Pennsylvania State University, USA); Yonggang Wen (Nanyang TechnologicalUniversity, Singapore); Guohong Cao (The Pennsylvania State University, USA)pp. 1932-1940
Improving Data Forwarding in Mobile Social Networks with Infrastructure Support: A Space-Crossing Community Approach
Zhong Li (Tongji University, P.R. China); Cheng Wang (University of Ottawa & Tongji University,Shanghai, Canada); Siqian Yang (University of Tongji, P.R. China); Changjun Jiang (TongjiUniversity, P.R. China); Ivan Stojmenovic (University of Ottawa, Canada)pp. 1941-1949
Optimizing Offline Access to Social Network Content on Mobile DevicesNgoc Do (UC Irvine, USA); Ye Zhao (University of California, Irvine, USA); Shu-Ting Wang(National Tsing Hua University, Taiwan); Cheng-Hsin Hsu (National Tsing Hua University, Taiwan);Nalini Venkatasubramanian (University of California, Irvine, USA)pp. 1950-1958
A Social Group Utility Maximization Framework with Applications in Database AssistedSpectrum Access
Xu Chen (Arizona State University, USA); Xiaowen Gong (Arizona State University, USA); Lei Yang(Arizona State University, USA); Junshan Zhang (Arizona State University, USA)pp. 1959-1967
VN2: Vehicular Networks 2
A Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock WavesMarkus Forster (University of Luxembourg, Luxemburg); Raphael Frank (University of Luxembourg,Luxemburg); Mario Gerla (University of California at Los Angeles, USA); Thomas Engel (Universityof Luxemburg, Luxemburg)pp. 1968-1976
Data-driven Traffic Flow Analysis for Vehicular CommunicationsYang Wang (University of Science and Technology of China, P.R. China); Liusheng Huang(University of Science and Technology of China, P.R. China); Tianbo Gu (University ofMassachusetts Amherst, USA); Hao Wei (The Chinese University of Hong Kong, Hong Kong); KaiXing (University of Science and Technology of China, P.R. China); Junshan Zhang (Arizona StateUniversity, USA)pp. 1977-1985
CityDrive: A Map-Generating and Speed-Optimizing Driving SystemYiran Zhao (Shanghai Jiao Tong University, P.R. China); Yang Zhang (Shanghai Jiao TongUniversity, P.R. China); Tuo Yu (Shanghai Jiaotong University, P.R. China); Tianyuan Liu (ShanghaiJiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China);Xiaohua Tian (Shanghai Jiaotong University, P.R. China); Xue Liu (McGill Univerisity, Canada)pp. 1986-1994
ForeSight: Mapping Vehicles in Visual Domain and Electronic DomainDong Li (Ohio State University, USA); Zhixue Lu (Ohio State University, USA); Tarun Bansal (TheOhio State University, USA); Erik Schilling (Ohio State University, USA); Prasun Sinha (Ohio StateUniversity, USA)pp. 1995-2003
BD: Big Data
Online Load Balancing for MapReduce with Skewed Data InputYanfang Le (Simon Fraser Unversity, Canada); Jiangchuan Liu (Simon Fraser University, Canada);Funda Ergun (Indiana University, USA); Dan Wang (The Hong Kong Polytechnic University, HongKong)pp. 2004-2012
Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the CloudKan Yang (City University of Hong Kong, Hong Kong); Xiaohua Jia (City University of Hong Kong,Hong Kong); Kui Ren (State University of New York at Buffalo, USA); Ruitao Xie (City University ofHong Kong, Hong Kong); Liusheng Huang (University of Science and Technology of China, P.R.China)pp. 2013-2021
Online Algorithms for Uploading Deferrable Big Data to The CloudLinquan Zhang (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada);Chuan Wu (The University of Hong Kong, Hong Kong); Minghua Chen (The Chinese University ofHong Kong, P.R. China)pp. 2022-2030
TideWatch: Fingerprinting the Cyclicality of Big Data WorkloadsDan Williams (T. J. Watson Research Center, USA); Shuai Zheng (King Abdullah University ofScience and Technology, Saudi Arabia); Xiangliang Zhang (King Abdullah University of Science andTechnology, Saudi Arabia); Hani Jamjoom (IBM T. J. Watson Research Center & IBM, USA)pp. 2031-2039
CNB: Content/name based networking
A unified approach to the performance analysis of caching systemsValentina Martina (Politecnico di Torino, Italy); Michele Garetto (Università di Torino, Italy); EmilioLeonardi (Politecnico di Torino, Italy)
pp. 2040-2048
Scalable Pending Interest Table Design: From Principles to PracticeHaowei Yuan (Washington University in St. Louis, USA); Patrick Crowley (Washington University inSt. Louis, USA)pp. 2049-2057
REIN: A Fast Event Matching Approach for Content-based Publish/Subscribe SystemsShiyou Qian (Shanghai Jiao Tong University & Shanghai Jiao Tong University, P.R. China); Jian Cao(Shanghai Jiaotong University, P.R. China); Yanmin Zhu (Shanghai Jiao Tong University, P.R.China); Minglu Li (Shanghai Jiao Tong University, P.R. China)pp. 2058-2066
Reducing Forwarding State in Content-Centric Networks with Semi-Stateless ForwardingChristos Tsilopoulos (Athens University of Economics and Business, Greece); George Xylomenos(Athens University of Economics and Business, Greece); Yannis Thomas (Athens University ofEconomics and Business (AUEB), Greece)pp. 2067-2075
CR1: Cognitive radio networks 1
A Unified Framework for Wireless Max-Min Utility Optimization with General MonotonicConstraints
Yao-Win Peter Hong (National Tsing Hua University, Taiwan); Chee Wei Tan (City University ofHong Kong, Hong Kong); Liang Zheng (City University of Hong Kong, Hong Kong); Cheng-Lin Hsieh(National Tsing-Hua University, Taiwan); Chia-Han Lee (Academia Sinica, Taiwan)pp. 2076-2084
A Practical Self-Adaptive Rendezvous Protocol in Cognitive Radio Ad Hoc NetworksXingya Liu (University of North Carolina at Charlotte, USA); Linda Jiang Xie (University of NorthCarolina at Charlotte, USA)pp. 2085-2093
Delay-Constrained Caching in Cognitive Radio NetworksJing Zhao (The Pennsylvania State University, USA); Wei Gao (University of Tennessee, USA); YiWang (Pennsylvania State University, USA); Guohong Cao (The Pennsylvania State University,USA)pp. 2094-2102
Probability Distribution of Spectral Hole Duration in Cognitive NetworksJelena Mišić (Ryerson University, Canada); Vojislav B. Mišić (Ryerson University, Canada)pp. 2103-2111
CS: Cloud security and privacy
Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudBing Wang (Virginia Tech, USA); Shucheng Yu (University of Arkansas at Little Rock, USA);Wenjing Lou (Virginia Tech, USA); Thomas Hou (Virginia Tech, USA)pp. 2112-2120
Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User ModificationJiawei Yuan (University of Arkansas at Little Rock, USA); Shucheng Yu (University of Arkansas atLittle Rock, USA)pp. 2121-2129
A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive SensingCong Wang (City University of Hong Kong, Hong Kong); Bingsheng Zhang (State University of NewYork at Buffalo, USA); Kui Ren (State University of New York at Buffalo, USA); Janet Roveda(University of Arizona, USA); Chang Wen Chen (State University of New York at Buffalo, USA);Zhen Xu (State University of New York at Buffalo, USA)pp. 2130-2138
FT3: Fault tolerance and survivability 3
Aggrecode: Constructing Route Intersection for Data Reconstruction in Erasure Coded StorageSystems
Jing Zhang (McGill University & National University of Defense Technology, Canada); Xiangke Liao(NUDT, P.R. China); Li Shanshan (National University of Defense Technology, P.R. China); Yu Hua(Huazhong University of Science and Technology, P.R. China); Xue Liu (McGill Univerisity, Canada);Bin Lin (National University of Defense Technology, P.R. China)pp. 2139-2147
IP Fast Rerouting for Multi-Link FailuresTheodore Elhourani (University of Arizona, USA); Abishek Gopalan (University of Arizona, USA);Srinivasan Ramasubramanian (University of Arizona, USA)pp. 2148-2156
Rippler: Delay Injection for Service Dependency DetectionAli Zand (UC Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA);Richard Kemmerer (University of California, Santa Barbara, USA); Christopher Kruegel (Universityof California, Santa Barbara, USA)pp. 2157-2165
SB3: Scheduling and buffer management 3
Minimizing Makespan and Total Completion Time in MapReduce-like SystemsYuqing Zhu (University of Texas at Dallas, USA); Yiwei Jiang (Zhejiang Sci-Tech University, USA);Weili Wu (UT Dallas, USA); Ling Ding (University of Washington Tacoma, USA); Ankur Teredesai(Univ of Washington, USA); Deying Li (Renmin University of China, P.R. China); Wonjun Lee (KoreaUniversity, Korea)pp. 2166-2174
Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and ExperimentsYuan Yi (The Hong Kong Polytechnic University, Hong Kong); Dan Wang (The Hong KongPolytechnic University, Hong Kong); Jiangchuan Liu (Simon Fraser University, Canada)pp. 2175-2183
Scheduling in a Secure Wireless NetworkXuan Wang (University of Victoria, Canada); Yi Chen (University of Victoria, Canada); Lin Cai(University of Victoria, Canada); Jianping Pan (University of Victoria, Canada)pp. 2184-2192
Scheduling Multicast Traffic with Deadlines in Wireless NetworksKyu Seob Kim (MIT, USA); Chih-ping Li (MIT, USA); Eytan Modiano (MIT, USA)pp. 2193-2201
SC3: Social computing and networks 3
Epidemic Thresholds with External AgentsSiddhartha Banerjee (Stanford University, USA); Avhishek Chatterjee (UT Austin, USA); SanjayShakkottai (The University of Texas at Austin, USA)pp. 2202-2210
A Robust Information Source Estimator with Sparse ObservationsKai Zhu (Arizona State University, USA); Lei Ying (Arizona State University, USA)pp. 2211-2219
Personal Clouds: Sharing and Integrating Networked Resources to Enhance End UserExperiences
Minsung Jang (Georgia Institute of Technology & Center for Experimental Research in ComputerSystems, USA); Karsten Schwan (Georgia Tech, USA); Ketan Bhardwaj (Georgia Institute ofTechnology, USA); Ada Gavrilovska (Georgia Institute of Technology, USA); Adhyas Avasthi (NokiaResearch Center, Palo Alto, USA)pp. 2220-2228
Modeling Social Network Relationships via t-Cherry Junction TreesBrian Proulx (Arizona State University, USA); Junshan Zhang (Arizona State University, USA)pp. 2229-2237
CR2: Cognitive radio networks 2
Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio NetworksJing Zhao (The Pennsylvania State University, USA); Guohong Cao (The Pennsylvania StateUniversity, USA)pp. 2238-2246
Rendezvous for Heterogeneous Spectrum-Agile DevicesShan-Hung Wu (National Tsing Hua University, Taiwan); Ching-Chan Wu (National Tsing HuaUniversity, Taiwan); Wing-Kai Hon (National Tsing Hua University, Taiwan); Kang G. Shin(University of Michigan, USA)pp. 2247-2255
GHz-Wide Sensing and Decoding Using the Sparse Fourier TransformHaitham Hassanieh (MIT, USA); Lixin Shi (MIT, USA); Omid Abari (MIT, USA); Ezzeldin Hamed(MIT, USA); Dina Katabi (MIT, USA)pp. 2256-2264
Flexauc: Serving Dynamic Demands in Spectrum Trading Markets with Flexible AuctionPeng Lin (HKUST, Hong Kong); Xiaojun Feng (Hong Kong University of Science and Technology,Hong Kong); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)pp. 2265-2273
DT: Delay tolerant networks
Multiple Heterogeneous Data Ferry Trajectory Planning in Wireless Sensor NetworksLirong Xue (Renmin University of China, P.R. China); Donghyun Kim (North Carolina CentralUniversity, USA); Yuqing Zhu (University of Texas at Dallas, USA); Deying Li (Renmin University ofChina, P.R. China); Wei Wang (Xi'an Jiaotong University, P.R. China); Alade Tokuta (North CarolinaCentral University, USA)pp. 2274-2282
DSearching: Distributed Searching of Mobile Nodes in DTNs with Floating Mobility InformationKang Chen (Clemson University, USA); Haiying Shen (Clemson University, USA)pp. 2283-2291
Dynamic Speed Scaling for Energy Minimization in Delay-Tolerant Smartphone ApplicationsJeongho Kwak (KAIST, Korea); Okyoung Choi (KAIST, Korea); Song Chong (KAIST, Korea);Prasant Mohapatra (University of California, Davis, USA)pp. 2292-2300
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and EliminationWei Gao (University of Tennessee, USA); Qinghua Li (University of Arkansas, USA); Guohong Cao(The Pennsylvania State University, USA)pp. 2301-2309
LL: Localization and location privacy
Privacy-preserving High-quality Map Generation with Participatory sensingXi Chen (Tsinghua University, P.R. China); Xiaopei Wu (Tsinghua University, P.R. China); Xiang-Yang Li (Illinois Institute of Technology, USA); Yuan He (Tsinghua University, P.R. China); YunhaoLiu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)pp. 2310-2318
Multi-lateral Privacy-Preserving Localization in Pervasive EnvironmentsTao Shu (Oakland University, USA); Yingying Chen (Stevens Institute of Technology, USA); JieYang (Oakland University, USA); Albert Williams (University of Massachusetts Amherst, USA)pp. 2319-2327
A Stochastic Game for Privacy Preserving Context Sensing on Mobile PhoneWei Wang (Hong Kong University of Science and Technology, Hong Kong); Qian Zhang (Hong KongUniversity of Science and Technology, Hong Kong)pp. 2328-2336
Achieving Privacy Preservation in WiFi Fingerprint-Based LocalizationHong Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); LiminSun (Institute of Information Engineering, China Academy of Science, Beijing, P.R. China); HaojinZhu (Shanghai Jiao Tong University, P.R. China); Xiang Lu (Institute of Information Engineering,CAS, P.R. China); Xiuzhen Cheng (George Washington Univ, USA)pp. 2337-2345
MD: Mobile Data Offloading
TOSS: Traffic Offloading by Social Network Service-Based Opportunistic Sharing in MobileSocial Networks
Xiaofei Wang (Seoul National University, Korea); Min Chen (Huazhong University of Science andTechnology, P.R. China); Zhu Han (University of Houston, USA); Dapeng Oliver Wu (University ofFlorida, USA); Taekyoung Kwon (Seoul National University, Korea)pp. 2346-2354
Mobile Offloading in the Wild: Findings and Lessons Learned Through a Real-life Experimentwith a New Cloud-aware System
Marco Valerio Barbera (Sapienza University of Rome, Italy); Sokol Kosta (Sapienza University ofRome, Italy); Alessandro Mei (Sapienza University of Rome, Italy); Vasile Claudiu Perta (SapienzaUniversity of Rome, Italy); Julinda Stefa (Sapienza University of Rome, Italy)pp. 2355-2363
Is it Worth to be Patient? Analysis and Optimization of Delayed Mobile Data OffloadingFidan Mehmeti (EURECOM, France); Thrasyvoulos Spyropoulos (EURECOM, France)pp. 2364-2372
Ready, Set, Go: Coalesced Offloading from Mobile Devices to the CloudLiyao Xiang (University of Toronto, Canada); Shiwen Ye (University of Toronto, Canada); YuanFeng (The Hong Kong Polytechnic University, Hong Kong); Baochun Li (University of Toronto,Canada); Bo Li (Hong Kong University of Science and Technology, Hong Kong)pp. 2373-2381
PA1: Performance analysis and modeling 1
Towards a Statistical Network Calculus - Dealing with Uncertainty in ArrivalsMichael Beck (University of Kaiserslautern, Germany); Sebastian Henningsen (University ofKaiserslautern, Germany); Simon Birnbach (University of Kaiserslautern, Germany); Jens Schmitt(University of Kaiserslautern, Germany)pp. 2382-2390
Towards a System Theoretic Approach to Wireless Network Capacity in Finite Time and SpaceFlorin Ciucu (University of Warwick, United Kingdom); Ramin Khalili (EPFL, Switzerland); YumingJiang (Norwegian University of Science and Technology (NTNU), Norway); Liu Yang (TsinghuaUniversity, P.R. China); Yong Cui (Tsinghua University, P.R. China)pp. 2391-2399
Fluctuation Analysis of Debt Based Policies for Wireless Networks with Hard Delay ConstraintsRahul Singh (Texas A&M University, USA); I-Hong Hou (Texas A&M University, USA); PanganamalaR Kumar (Texas A&M University, USA)pp. 2400-2408
Price of Anarchy in Network Routing with Class based capacity GuaranteesEhsan Monsef (Illinois Institute of Technology, USA); Tricha Anjali (Illinois Institute of Technology,USA); Sanjiv Kapoor (Illinois Institute of Technology, USA)pp. 2409-2417
SB4: Scheduling and buffer management 4
Distributed Stochastic Optimization via Correlated SchedulingMichael J. Neely (University of Southern California, USA)pp. 2418-2426
Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay NodesReuven Cohen (Technion, Israel); Guy Grebla (Columbia University, USA)pp. 2427-2435
Application-Level Scheduling with Deadline ConstraintsHuasen Wu (Beihang University, Beijing, P.R. China); Xiaojun Lin (Purdue University, USA); Xin Liu(UC Davis, USA); Youguang Zhang (Beihang University, P.R. China)pp. 2436-2444
Joint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao (Polytechnic Institute of New York University, USA); M. Kodialam (Bell Labs, USA); T.V. Lakshman (Bell Labs, Alcatel-Lucent, USA)pp. 2445-2453
WL: Wireless LANs
SimCast: Efficient Video Delivery in MU-MIMO WLANsGuanhua Wang (Hong Kong University of Science and Technology, Hong Kong); Kaishun Wu(HKUST & Sun Yat-sen University, Hong Kong); Qian Zhang (Hong Kong University of Science andTechnology, Hong Kong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 2454-2462
Loss Differentiation: Moving onto High-Speed Wireless LANsMuhammad Ruwaifa Anwar (Lahore University of Management Sciences, Pakistan); MuhammadKamran Nishat (Lahore University of Management Sciences, Pakistan); Mohsin Ali (LahoreUniversity of Management Sciences, Pakistan); Zahaib Akhtar (University of Southern California,USA); Haseeb Niaz (Lahore University of Management Sciences, USA); Ihsan Ayyub Qazi (LahoreUniversity of Management Sciences (LUMS), Pakistan)pp. 2463-2471
MISC: Merging Incorrect Symbols using Constellation Diversity for 802.11 RetransmissionJiajue Ou (Nanyang Technological University, Singapore); Yuanqing Zheng (Nanyang TechnologicalUniversity, Singapore); Mo Li (Nanyang Technological University, Singapore)pp. 2472-2480
TRACK: Unleash Exposed Terminals in Enterprise WLANsJun Huang (Michigan State University, USA); Guoliang Xing (Michigan State University, USA); GangZhou (College of William and Mary, USA)pp. 2481-2489
CR3: Cognitive radio networks 3
Incentivize Cooperative Sensing in Distributed Cognitive Radio Networks with Reputation-based Pricing
Tongjie Zhang (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada);Reihaneh Safavi-Naini (University of Calgary, Canada)pp. 2490-2498
Hitchhike: Riding Control on PreamblesXiaoyu Ji (Hong Kong University of Science and Technology, Hong Kong); Jiliang Wang (TsinghuaUniversity, P.R. China); Mingyan Liu (University of Michigan, USA); Yubo Yan (PLA University ofScience and Technology, P.R. China); Panlong Yang (Institute of Communication Engineering,PLAUST, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science andTechnology, P.R. China)pp. 2499-2507
QUILT: A Decode/Quantize-Interleave-Transmit Approach to Cooperative RelayingSiddhartha Brahma (EPFL Switzerland, Switzerland); Melissa Duarte (Rice University, USA); AyanSengupta (EPFL Switzerland, Switzerland); I-Hsiang Wang (National Taiwan University, Taiwan);Christina Fragouli (EPFL, Switzerland); Suhas Diggavi (University of California Los Angeles, USA)pp. 2508-2516
FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active TransmissionsTarun Bansal (The Ohio State University, USA); Bo Chen (Ohio State University, USA); PrasunSinha (Ohio State University, USA)pp. 2517-2525
MA1: Medium access control 1
Optimal CSMA-based Wireless Communication with Worst-case Delay and Non-uniform SizesHongxing Li (University of California at Davis, USA); Nitin Vaidya (University of Illinois at Urbana-Champaign, USA)pp. 2526-2534
Provable Per-Link Delay-Optimal CSMA for General Wireless Network TopologyDongmyung Lee (KAIST, Korea); Donggyu Yun (KAIST, Korea); Jinwoo Shin (KAIST, Korea); YungYi (KAIST, Korea); Se-Young Yun (Inria, France)pp. 2535-2543
Analysis of a Proportionally Fair and Locally Adaptive Spatial Aloha in Poisson NetworksFrancois Baccelli (INRIA-ENS, France); Bartlomiej Błaszczyszyn (Inria-Ens, France); ChandramaniK. Singh (University of Illinois at Urbana-Champaign, India)pp. 2544-2552
Communication Through Collisions: Opportunistic Utilization of Past ReceptionsAlireza Vahid (Cornell University, USA); Mohammad Ali Maddah-Ali (Bell Labs, Alcatel Lucent, USA);Salman Avestimehr (University of Southern California, USA)pp. 2553-2561
OP: Overlay and peer-to-peer networks
Open Peering by Internet Transit Providers: Peer Preference or Peer Pressure?Aemen Lodhi (Georgia Institute of Technology, USA); Amogh Dhamdhere (CAIDA, University ofCalifornia, San Diego, USA); Constantine Dovrolis (Georgia Institute of Technology, USA)pp. 2562-2570
A Stable Fountain Code Mechanism for Peer-to-Peer Content DistributionCedric Westphal (Huawei Innovation Center, USA)pp. 2571-2579
Maximizing the Number of Satisfied Subscribers in Pub/Sub Systems Under CapacityConstraints
Vinay Setty (University of Oslo, Norway); Gunnar Kreitz (KTH - Royal Institute of Technology,Sweden); Guido Urdaneta (Spotify, Sweden); Roman Vitenberg (University of Oslo, Norway);Maarten van Steen (VU University Amsterdam, The Netherlands)pp. 2580-2588
PA2: Performance analysis and modeling 2
Delay-Throughput Tradeoff with Correlated Mobility of Ad-Hoc NetworksShuochao Yao (Shanghai Jiaotong University, P.R. China); Xinbing Wang (Shanghai JiaotongUniversity, P.R. China); Xiaohua Tian (Shanghai Jiaotong University, P.R. China); Qian Zhang(Hong Kong University of Science and Technology, Hong Kong)pp. 2589-2597
Joint Power Optimization of Data Center Network and Servers with Correlation AnalysisKuangyu Zheng (The Ohio State University, USA); Xiaodong Wang (The Ohio State University,USA); Li Li (The Ohio State University, USA); Xiaorui Wang (The Ohio State University, USA)pp. 2598-2606
Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah (The University of Texas at Austin, USA); Gustavo de Veciana (The University of Texasat Austin, USA)pp. 2607-2615
On the Catalyzing Effect of Randomness on the Per-Flow Throughput in Wireless NetworksFlorin Ciucu (University of Warwick, United Kingdom); Jens Schmitt (University of Kaiserslautern,Germany)pp. 2616-2624
SG1: Smart Grid 1
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric ThreatsMingkui Wei (North Carolina State University, USA); Wenye Wang (NC State University, USA)pp. 2625-2633
Power Grid Vulnerability to Geographically Correlated Failures - Analysis and ControlImplications
Andrey Bernstein (EPFL, Israel); Daniel Bienstock (Columbia University, USA); David Hay (TheHebrew University of Jerusalem, Israel); Meric Uzunoglu (Columbia University, USA); Gil Zussman(Columbia University, USA)pp. 2634-2642
Structure-aware Stochastic Load Management in Smart GridsYu Zhang (University of California, Los Angeles, USA); Mihaela van der Schaar (University ofCalifornia, Los Angeles (UCLA), USA)pp. 2643-2651
Stochastic Information Management for Voltage Regulation in Smart Distribution SystemsHao Liang (University of Waterloo, Canada); Atef Abdrabou (UAE University, UAE); Weihua Zhuang(University of Waterloo, Canada)pp. 2652-2660
SR1: Short range wireless technologies 1
SBVLC: Secure Barcode-based Visible Light Communication for SmartphonesBingsheng Zhang (State University of New York at Buffalo, USA); Kui Ren (State University of NewYork at Buffalo, USA); Guoliang Xing (Michigan State University, USA); Xinwen Fu (University ofMassachusetts Lowell, USA); Cong Wang (City University of Hong Kong, Hong Kong)pp. 2661-2669
Frogeye: Perception of the Slightest Tag MotionLei Yang (Tsinghua National Laboratory of Information Science and Technology, P.R. China); YongQi (Xi'an Jiaotong University, P.R. China); Jianbing Fang (Tsinghua University, P.R. China); XuanDing (Tsinghua University, P.R. China); Tianci Liu (Tsinghua University, P.R. China); Mo Li(Nanyang Technological University, Singapore)pp. 2670-2678
Sonar Inside Your Body: Prototyping Ultrasonic Intra-body Sensor NetworksG. Enrico Santagati (University at Buffalo, USA); Tommaso Melodia (State University of New Yorkat Buffalo, USA)pp. 2679-2687
LiFi: Line-Of-Sight Identification with WiFiZimu Zhou (Hong Kong University of Science and Technology, Hong Kong); Zheng Yang (TsinghuaUniversity, P.R. China); Chenshu Wu (Tsinghua University, P.R. China); Wei Sun (Hong KongUniversity of Science and Technology, Hong Kong); Yunhao Liu (Tsinghua University & The HongKong University of Science and Technology, P.R. China)pp. 2688-2696
CR4: Cognitive radio networks 4
MIMO-based Jamming Resilient Communication in Wireless NetworksQiben Yan (Virginia Tech, USA); Huacheng Zeng (Virginia Tech, USA); Tingting Jiang (Virginia Tech,USA); Ming Li (Utah State University, USA); Wenjing Lou (Virginia Tech, USA); Thomas Hou(Virginia Tech, USA)pp. 2697-2705
CACH: Cycle-Adjustable Channel Hopping for Control Channel Establishment in Cognitive RadioNetworks
Tsung-Ying Wu (National Taiwan University, Taiwan); Wanjiun Liao (National Taiwan University,Taiwan); Cheng-Shang Chang (National Tsing Hua University, Taiwan)pp. 2706-2714
A Credit-Token-Based Spectrum Etiquette Framework for Coexistence of HeterogeneousCognitive Radio Networks
Bo Gao (Virginia Tech, USA); Yaling Yang (Virginia Tech, USA); Jung-Min (Jerry) Park (VirginiaTech, USA)pp. 2715-2723
Throughput-Efficient Channel Allocation in Multi-Channel Cognitive Vehicular NetworksYou Han (The Ohio State University, USA); Eylem Ekici (The Ohio State University, USA); HarisKremo (Toyota InfoTechnology Center, Japan); Onur Altintas (Toyota InfoTechnology Center,Japan)pp. 2724-2732
MA2: Medium access control 2
Interference-aware proportional fairness for Multi-rate Wireless NetworksDouglas Blough (Georgia Institute of Technology, USA); Giovanni Resta (Istituto di Informatica eTelematica, Italy); Paolo Santi (IIT-CNR, Italy)pp. 2733-2741
FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single TransceiverYan Zhang (University of Arizona, USA); Loukas Lazos (University of Arizona, USA); Kai Chen(University of Arizona, USA); Bocan Hu (University of Arizona, USA); Swetha Shivaramaiah(University of Arizona, USA)pp. 2742-2750
Competitive MAC under Adversarial SINRAdrian Ogierman (University of Paderborn, Germany); Andrea Richa (Arizona State University,USA); Christian Scheideler (Paderborn University, Germany); Stefan Schmid (T-Labs & TU Berlin,Germany); Jin Zhang (Google, USA)pp. 2751-2759
Optimal Rate Sampling in 802.11 SystemsRichard Combes (KTH, Royal Institute of Technology, Sweden); Alexandre Proutiere (MicrosoftResearch, United Kingdom); Donggyu Yun (KAIST, Korea); Jungseul Ok (KAIST, Korea); Yung Yi(KAIST, Korea)pp. 2760-2767
PA3: Performance analysis and modeling 3
Throughput-Delay Tradeoff in Mobile Ad Hoc Networks with Correlated MobilityJiajia Liu (Xidian University, P.R. China); Hiroki Nishiyama (Tohoku University, Japan); Nei Kato(Tohoku University, Japan); Jian-feng Ma (Xidian University, Puerto Rico); Xiaohong Jiang (FutureUniversity-Hakodate, Japan)pp. 2768-2776
An Approximation Algorithm for Client Assignment in Client/Server SystemsYuqing Zhu (University of Texas at Dallas, USA); Weili Wu (UT Dallas, USA); James Willson (TheUniversity of New Mexico, USA); Ling Ding (University of Washington Tacoma, USA); Lidong Wu(UT Dallas, USA); Deying Li (Renmin University of China, P.R. China); Wonjun Lee (KoreaUniversity, Korea)pp. 2777-2785
Sojourn time approximations in a multi-class time-sharing serverAne Izagirre (University of Toulouse, France); Urtzi Ayesta (CNRS-LAAS and Ikerbasque-Universityof the Basque Country, Spain); Maaike Verloop (CNRS, France)pp. 2786-2794
A General Framework of Hybrid Graph Sampling for Complex Network AnalysisXin Xu (North Carolina State University, USA); Chul-Ho Lee (North Carolina State University, USA);Do Young Eun (North Carolina State University, USA)pp. 2795-2803
SG2: Smart Grid 2
Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart MeteringJongho Won (Purdue University, USA); Chris Yu Tak Ma (Advanced Digital Sciences Center, Illinoisat Singapore, Singapore); David K. Y. Yau (Purdue University, USA); Nageswara Rao (Oak RidgeNational Laboratory, USA)pp. 2804-2812
Blowing Hard Is Not All We Want: Quantity vs Quality of Wind Power in the Smart GridFanxin Kong (McGill University, Canada); Chuansheng Dong (McGill University, Canada); Xue Liu(McGill Univerisity, Canada); Haibo Zeng (McGill University, Canada)pp. 2813-2821
Robust and Cost-Effective Architecture Design for Smart Grid Communications: A Multi-stageMiddleware Deployment Approach
Dong-Hoon Shin (Arizona State University, USA); Shibo He (Arizona State University, USA);Junshan Zhang (Arizona State University, USA)pp. 2822-2830
Optimal Combined Heat and Power System Scheduling in Smart GridKan Zhou (University of Victoria, Canada); Jianping Pan (University of Victoria, Canada); Lin Cai(University of Victoria, Canada)pp. 2831-2839
SR2: Short range wireless technologies 2
RollCaller: User-Friendly Indoor Navigation System Using Human-Item Spatial RelationYi Guo (Hongkong University of Science and Technology, P.R. China); Lei Yang (Tsinghua NationalLaboratory of Information Science and Technology, P.R. China); Bowen Li (School of Software,Tsinghua University, P.R. China); Tianci Liu (Tsinghua University, P.R. China); Yunhao Liu(Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)pp. 2840-2848
BlueID: A Practical System for Bluetooth Device IdentificationJun Huang (Michigan State University, USA); Wahhab Mousa (Michigan State University, USA);Guoliang Xing (Michigan State University, USA)pp. 2849-2857
Enhancing Zigbee throughput under WiFi interference using real-time adaptive codingPeng Guo (Huazhong University of Science and Technology, P.R. China); Jiannong Cao (Hong KongPolytechnic Univ, Hong Kong); Kui Zhang (University of Twente, The Netherlands); Xuefeng Liu(The Hong Kong Polytechnic University, Hong Kong)pp. 2858-2866