Top Banner
IEEE Catalog Number: ISBN: CFP14INF-POD 978-1-4799-3361-7 IEEE INFOCOM 2014 – IEEE Conference on Computer Communications Toronto, Ontario, Canada 27 April – 2 May 2014 Pages 1-951 1/3
35

IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Jul 05, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

IEEE Catalog Number: ISBN:

CFP14INF-POD 978-1-4799-3361-7

IEEE INFOCOM 2014 – IEEE Conference on Computer Communications

Toronto, Ontario, Canada 27 April – 2 May 2014

Pages 1-951

1/3

Page 2: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Program

CC1: Cloud computing 1

Toward Profit-Seeking Virtual Network Embedding Algorithm via Global Resource CapacityLong Gong (University of Science and Technology of China, P.R. China); Yonggang Wen (NanyangTechnological University, Singapore); Zuqing Zhu (University of Science and Technology of China,P.R. China); Tony Lee (SJTU, P.R. China)pp. 1-9

Online Allocation of Virtual Machines in a Distributed CloudFang Hao (Bell Labs, Alcatel-Lucent, USA); M. Kodialam (Bell Labs, USA); T. V. Lakshman (BellLabs, Alcatel-Lucent, USA); Sarit Mukherjee (Bell Labs USA, USA)pp. 10-18

HadoopWatch: A First Step Towards Comprehensive Traffic Forecasting in Cloud ComputingYang Peng (Hong Kong University of Science and Technology, Hong Kong); Kai Chen (Hong KongUniversity of Science and Technology, Hong Kong); Guohui Wang (IBM T. J. Watson ResearchCenter, USA); Wei Bai (Hong Kong University of Science of Technology, Hong Kong); Zhiqiang Ma(Hong Kong University of Science and Technology, Hong Kong); Lin Gu (Hong Kong University ofScience and Technology, Hong Kong)pp. 19-27

Multi-Objective Data Placement for Multi-Cloud Socially Aware ServicesLei Jiao (University of Goettingen, Germany); Jun Li (University of Oregon, USA); Wei Du(University of Goettingen, Germany); Xiaoming Fu (University of Goettingen, Germany)pp. 28-36

LO1: Localization 1

Near-Pri: Private, Proximity Based Location SharingEdmund Novak (William and Mary, USA); Qun Li (College of William and Mary, USA)pp. 37-45

3D Surface Localization with Terrain ModelYang Yang (University of Louisiana at Lafayette, USA); Miao Jin (University of Louisiana atLafayette, USA); Hongyi Wu (University of Louisiana at Lafayette, USA)pp. 46-54

Towards Ubiquitous Indoor Localization Service Leveraging Environmental Physical FeaturesYang Tian (Peking University, P.R. China); Ruipeng Gao (Peking University, P.R. China); Kaigui Bian(Peking University, P.R. China); Fan Ye (Peking University, P.R. China); Tao Wang (PekingUniversity, P.R. China); Yizhou Wang (Peking University, P.R. China); XiaoMing Li (PekingUniversity, P.R. China)pp. 55-63

Suave: Swarm Underwater Autonomous Vehicle LocalizationJun Liu (University of Connecticut, USA); Zhaohui Wang (Michigan Technological University, USA);Zheng Peng (University of Connecticut, USA); Jun-Hong Cui (University of Connecticut, USA);Lance Fiondella (University of Massachusetts, USA)pp. 64-72

MN1: Multimedia networking 1

Robust Uncoded Video Transmission over Wireless Fast Fading ChannelHao Cui (University of Science and Technology of China, P.R. China); Chong Luo (MicrosoftResearch, P.R. China); Chang Wen Chen (State University of New York at Buffalo, USA); Feng Wu(Microsoft Research Asia, P.R. China)pp. 73-81

Page 3: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

NOVA: QoE-driven Optimization of DASH-based Video Delivery in NetworksVinay Joseph (Qualcomm, USA); Gustavo de Veciana (The University of Texas at Austin, USA)pp. 82-90

Joint Online Transcoding and Geo-distributed Delivery for Dynamic Adaptive StreamingZhi Wang (Tsinghua University, P.R. China); Lifeng Sun (Tsinghua University, P.R. China); ChuanWu (The University of Hong Kong, Hong Kong); Wenwu Zhu (Tsinghua University, P.R. China);Shiqiang Yang (Tsinghua University, P.R. China)pp. 91-99

Improving mobile video streaming with link aware scheduling and client cachesRandeep Bhatia (Bell Labs, Alcatel-Lucent, USA); T. V. Lakshman (Bell Labs, Alcatel-Lucent, USA);Arun Netravali (OMNICapital, USA); Krishan Sabnani (Alcatel-Lucent, USA)pp. 100-108

NE1: Network economics and pricing 1

PROMISE: A Framework for Truthful and Profit Maximizing Spectrum Double AuctionsDejun Yang (Colorado School of Mines, USA); Xiang Zhang (Arizona State University, USA);Guoliang Xue (Arizona State University, USA)pp. 109-117

Dynamic Pricing and Profit Maximization for the Cloud with Geo-distributed Data CentersJian Zhao (The University of Hong Kong, Hong Kong); Hongxing Li (University of California atDavis, USA); Chuan Wu (The University of Hong Kong, Hong Kong); Zongpeng Li (University ofCalgary, Canada); Zhizhong Zhang (The University of Hong Kong, Hong Kong); Francis C.M. Lau(The University of Hong Kong, Hong Kong)pp. 118-126

Profit-Maximizing Incentive for Participatory SensingTie Luo (Institute for Infocomm Research & National University of Singapore, Singapore); HweePink Tan (Institute for Infocomm Research, Singapore); Lirong Xia (Harvard University, USA)pp. 127-135

Assurable, Transparent, and Mutual Restraining E-voting Involving Multiple Conflicting PartiesXukai Zou (School of Science, Purdue University-Indianapolis, USA); Huian Li (Purdue UniversityIndianapolis, USA); Yan Sui (Purdue University Indianapolis, USA); Wei Peng (Indiana University-Purdue University Indianapolis, USA); Feng Li (Indiana University-Purdue University Indianapolis,USA)pp. 136-144

RF1: RFID 1

Efficiently Collecting Histograms Over RFID TagsLei Xie (Nanjing University, P.R. China); Hao Han (Intelligent Automation Inc, USA); Qun Li(College of William and Mary, USA); Jie Wu (Temple University, USA); Sanglu Lu (NanjingUniversity, P.R. China)pp. 145-153

A Parallel Identification Protocol for RFID SystemsLinghe Kong (Shanghai Jiao Tong University, P.R. China); Liang He (Singapore University ofTechnology and Design, Singapore); Yu Gu (Singapore University of Technology and Design &Advanced Digital Sciences Center, Singapore); Min-You Wu (Shanghai JiaoTong University, P.R.China); Tian He (University of Minnesota, USA)pp. 154-162

Efficient Distributed Query Processing in Large RFID-enabled Supply ChainsJia Liu (Nanjing University, P.R. China); Bin Xiao (The Hong Kong Polytechnic University, HongKong); Kai Bu (Zhejiang University, P.R. China); Li-jun Chen (Nanjing University, P.R. China)pp. 163-171

Page 4: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Pandaka: A Lightweight Cipher for RFID SystemsMin Chen (University of Florida, USA); Shigang Chen (University of Florida, USA); Qingjun Xiao(University of Florida, USA)pp. 172-180

RS: Router and switch design

Multi-Terabyte and Multi-Gbps Information Centric RoutersGiuseppe Rossini (Telecom ParisTech, France); Michele Garetto (Università di Torino, Italy); DarioRossi (Telecom ParisTech, France); Emilio Leonardi (Politecnico di Torino, Italy)pp. 181-189

Towards Zero-Time Wake-Up of Line Cards in Power-Aware RoutersTian Pan (Tsinghua University, P.R. China); Ting Zhang (Tsinghua University, P.R. China); JunxiaoShi (University of Arizona, USA); Yang Li (Tsinghua University, P.R. China); Linxiao Jin (TsinghuaUniversity, P.R. China); Fuliang Li (Tsinghua University, P.R. China); Jiahai Yang (TsinghuaUniversity, P.R. China); Beichuan Zhang (University of Arizona, USA); Bin Liu (Tsinghua University,P.R. China)pp. 190-198

Safe Routing Reconfigurations with Route RedistributionStefano Vissicchio (Université Catholique de Louvain, Belgium); Laurent Vanbever (PrincetonUniversity, USA); Luca Cittadini (Roma Tre University, Italy); Geoffrey G Xie (Naval PostgraduateSchool, USA); Olivier Bonaventure (Université catholique de Louvain, Belgium)pp. 199-207

Scalable Forwarding Tables for Supporting Flexible Policies in Enterprise NetworksShu Yang (Tsinghua University, P.R. China); Mingwei Xu (Tsinghua University, P.R. China); DanWang (The Hong Kong Polytechnic University, Hong Kong); Gautier Bayzelon (Tsinghua University,P.R. China); Jianping Wu (Tsinghua University, P.R. China)pp. 208-216

SP1: Security and privacy 1

Learning in Hide-and-SeekQingsi Wang (University of Michigan, USA); Mingyan Liu (University of Michigan, USA)pp. 217-225

Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforcedSearch Authorization in the Cloud

Wenhai Sun (Xidian University, P.R. China); Shucheng Yu (University of Arkansas at Little Rock,USA); Wenjing Lou (Virginia Tech, USA); Thomas Hou (Virginia Tech, USA); Hui Li (XidianUniversity, P.R. China)pp. 226-234

Will Cyber-Insurance Improve Network Security? A Market AnalysisRanjan Pal (University of Southern California, USA); Leana Golubchik (USC, USA); KonstantinosPsounis (University of Southern California, USA); Pan Hui (Hong Kong University of Science andTechnology & Telekom Innovation Laboratories, Hong Kong)pp. 235-243

FINE: A Fine-Grained Privacy-Preserving Location-based Service Framework for Mobile DevicesJun Shao (Zhejiang Gongshang University, P.R. China); Rongxing Lu (Nanyang TechnologicalUniversity, Singapore); Xiaodong Lin (University of Ontario Institute of Technology, Canada)pp. 244-252

Page 5: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

WN1: Wireless networks 1

Does Full-duplex Double the Capacity of Wireless Networks?Xiufeng Xie (University of Wisconsin-Madison, USA); Xinyu Zhang (University of Wisconsin-Madison, USA)pp. 253-261

Characterizing the Achievable Throughput in Wireless Networks with Two Active RF chainsYang Yang (Ohio State University, USA); Bo Chen (Ohio State University, USA); Kannan Srinivasan(The Ohio State University, USA); Ness B. Shroff (The Ohio State University, USA)pp. 262-270

WiFall: Device-free Fall Detection by Wireless NetworksChunmei Han (Hong Kong University of Science and Technology, Hong Kong); Kaishun Wu (HKUST& Sun Yat-sen University, Hong Kong); Yuxi Wang (Hong Kong University of Science andTechnology, Hong Kong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 271-279

Distributed Learning for Utility Maximization over CSMA-based Wireless Multihop NetworksHyeryung Jang (KAIST, Korea); Se-Young Yun (Inria, France); Jinwoo Shin (KAIST, Korea); Yung Yi(KAIST, Korea)pp. 280-288

CC2: Cloud computing 2

Venice: Reliable Virtual Data Center Embedding in CloudsQi Zhang (University of Waterloo, Canada); Mohamed Faten Zhani (University of Waterloo -Canada, Canada); Maissa Jabri (University of Waterloo, Canada); Raouf Boutaba (University ofWaterloo, Canada)pp. 289-297

Meeting Service Level Agreement Cost-Effectively for Video-on-Demand Applications in theCloud

Yuhong Zhao (Huazhong University of Science and Technology, P.R. China); Hong Jiang (Universityof Nebraska at Lincoln, USA); Ke Zhou (Huazhong University of Science and Technology, P.R.China); Zhijie Huang (Huazhong University of Science and Technology, P.R. China); Ping Huang(Virginia Commonwealth University, USA)pp. 298-306

Beyond the MDS Bound in Distributed Cloud StorageJian Li (Michigan State University, USA); Tongtong Li (Michigan State University, USA); Jian Ren(Michigan State University, USA)pp. 307-315

Cooperative Repair with Minimum-Storage Regenerating Codes for Distributed StorageJun Li (University of Toronto, Canada); Baochun Li (University of Toronto, Canada)pp. 316-324

FC: Flow and congestion control

Heat-Diffusion: Pareto Optimal Dynamic Routing for Time-Varying Wireless NetworksReza Banirazi (University of Southern California, USA); Edmond Jonckheere (USC, USA); BhaskarKrishnamachari (University of Southern California, USA)pp. 325-333

From Least Interference-Cost Paths to Maximum (Concurrent) Multiflow in MC-MR WirelessNetworks

Peng-Jun Wan (Illinois Institute of Technology, USA); Zhu Wang (Illinois Institute of Technology,USA); Lei Wang (Dalian University of Technology, P.R. China); Zhiguo Wan (Tsinghua University,P.R. China); Sai Ji (Nanjing University of Information Science & Technology, P.R. China)pp. 334-342

Page 6: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Multirate Multicast: Optimal Algorithms and ImplementationGeorgios S. Paschos (Massachusetts Institute of Technology & CERTH-ITI, USA); Chih-ping Li (MIT,USA); Eytan Modiano (MIT, USA); Kostas Choumas (University of Thessaly, Greece); ThanasisKorakis (Polytechnic Institute of New York University, USA)pp. 343-351

Routing Games with Progressive FillingTobias Harks (Maastricht University, The Netherlands); Alexander Skopalik (Paderborn, Germany);Martin Hoefer (Saarland University & Max-Planck-Institut für Informatik, Germany); Kevin Schewior(Berlin, Germany)pp. 352-360

LO2: Localization 2

Electronic Frog Eye: Counting Crowd Using WiFiWei Xi (Xi'an Jiaotong University, P.R. China); Jizhong Zhao (Xi'an Jiaotong University, P.R. China);Xiang-Yang Li (Illinois Institute of Technology, USA); Kun Zhao (Xi'an Jiaotong University, P.R.China); Shaojie Tang (Temple University, USA); Xue Liu (McGill Univerisity, Canada); Zhiping Jiang(Xian Jiaotong University, P.R. China)pp. 361-369

Shake and Walk: Acoustic Direction Finding and Fine-grained Indoor Localization UsingSmartphones

Wenchao Huang (University of Science and Technology of China, P.R. China); Yan Xiong (Universityof Science and Technology of China, P.R. China); Xiang-Yang Li (Illinois Institute of Technology,USA); Hao Lin (Jiangnan University, P.R. China); Xufei Mao (Tsinghua University, P.R. China);Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China); Yunhao Liu (TsinghuaUniversity & The Hong Kong University of Science and Technology, P.R. China)pp. 370-378

Anchor-free Backscatter Positioning for RFID Tags with High AccuracyTianci Liu (Tsinghua University, P.R. China); Lei Yang (Tsinghua National Laboratory of InformationScience and Technology, P.R. China); Qiongzheng Lin (Tsinghua University, P.R. China); Yi Guo(Hongkong University of Science and Technology, P.R. China); Yunhao Liu (Tsinghua University &The Hong Kong University of Science and Technology, P.R. China)pp. 379-387

TOC: Localizing Wireless Rechargeable Sensors with Time of ChargeYuanchao Shu (Zhejiang University, USA); Peng Cheng (Zhejiang University & Singapore Universityof Technology and Design, P.R. China); Yu Gu (Singapore University of Technology and Design &Advanced Digital Sciences Center, Singapore); Jiming Chen (Zhejiang University, P.R. China); TianHe (University of Minnesota, USA)pp. 388-396

MN2: Multimedia networking 2

On the Geographic Patterns of a Large-scale Mobile Video-on-Demand SystemZhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); GaogangXie (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Jiali Lin(Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Yun Jin (PPlive,P.R. China); Mohamed-Ali Kaafar (INRIA France & NICTA Australia, France); Kavé Salamatian(LISTIC PolyTech, Université de Savoie Chambery Annecy, France)pp. 397-405

Optimal Rate Allocation for Adaptive Wireless Video Streaming in Networks with UserDynamics

Vinay Joseph (Qualcomm, USA); Sem Borst (Alcatel-Lucent, Bell Labs & Eindhoven University ofTechnology, USA); Marty Reiman (Bell Labs, Lucent Technologies, USA)pp. 406-414

Page 7: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

SoCast: Social Ties Based Cooperative Video MulticastYang Cao (Huazhong University of Science and Technology, P.R. China); Xu Chen (Arizona StateUniversity, USA); Junshan Zhang (Arizona State University, USA); Tao Jiang (Huazhong Universityof Science and Technology, P.R. China)pp. 415-423

Reliable Video Multicast over Wi-Fi Networks with Coordinated Multiple APsMunhwan Choi (Seoul National University, Korea); Weiping Sun (Seoul National University, Korea);Jonghoe Koo (Seoul National University, Korea); Sunghyun Choi (Seoul National University, Korea);Kang G. Shin (University of Michigan, USA)pp. 424-432

NE2: Network economics and pricing 2

Dynamic Resource Provisioning in Cloud Computing: A Randomized Auction ApproachLinquan Zhang (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada);Chuan Wu (The University of Hong Kong, Hong Kong)pp. 433-441

Exploring Bundling Sale Strategy in Online Service Markets with Network EffectsWeijie Wu (Shanghai Jiao Tong University, P.R. China); Richard T. B. Ma (National University ofSingapore, Singapore); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong)pp. 442-450

Enabling Crowd-Sourced Mobile Internet AccessGeorge Iosifidis (CERTH & University of Thessaly, Greece); Lin Gao (The Chinese University of HongKong, Hong Kong); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong); LeandrosTassiulas (University of Thessaly, Greece)pp. 451-459

Trade-offs in Optimizing the Cache Deployments of CDNsSyed Hasan (Institute IMDEA Networks, Spain); Sergey Gorinsky (IMDEA Networks Institute,Spain); Constantine Dovrolis (Georgia Institute of Technology, USA); Ramesh K Sitaraman(University of Massachusetts, Amherst & Akamai Technologies, USA)pp. 460-468

RF2: RFID 2

Twins: Device-free Object Tracking using Passive TagsJinsong Han (Xi'an Jiaotong University, P.R. China); Chen Qian (University of Kentucky, USA); DanMa (Xi'an Jiaotong University, P.R. China); Xing Wang (Xi'an Jiaotong University, P.R. China);Jizhong Zhao (Xi'an Jiaotong University, P.R. China); Pengfeng Zhang (Xi'an Jiaotong University,P.R. China); Wei Xi (Xi'an Jiaotong University, P.R. China); Zhiping Jiang (Xian Jiaotong University,P.R. China)pp. 469-476

Arbitrarily Accurate Approximation Scheme for Large-Scale RFID Cardinality EstimationWei Gong (Tsinghua University, P.R. China); Kebin Liu (Tsinghua University, P.R. China); Xin Miao(Tsinghua University, Hong Kong); Haoxiang Liu (Hong Kong University of Science and Technology,P.R. China)pp. 477-485

Towards Adaptive Continuous Scanning in Large-Scale RFID SystemsHaoxiang Liu (Hong Kong University of Science and Technology, P.R. China); Wei Gong (TsinghuaUniversity, P.R. China); Xin Miao (Tsinghua University, P.R. China); Kebin Liu (Tsinghua University,P.R. China); Wenbo He (McGill University, Canada)pp. 486-494

Read Bulk Data from Computational RFIDsYuanqing Zheng (Nanyang Technological University, Singapore); Mo Li (Nanyang TechnologicalUniversity, Singapore)pp. 495-503

Page 8: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

SP2: Security and privacy 2

Achieving Differential Privacy of Data Disclosure in the Smart GridJing Zhao (Illinois Institute of Technology, USA); Taeho Jung (Illinois Institute of Technology,USA); Yu Wang (University of North Carolina at Charlotte, USA); Xiang-Yang Li (Illinois Institute ofTechnology, USA)pp. 504-512

Optimal Privacy-Preserving Energy Management for Smart MetersLei Yang (Arizona State University, USA); Xu Chen (Arizona State University, USA); Junshan Zhang(Arizona State University, USA); H. Vincent Poor (Princeton University, USA)pp. 513-521

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted DataQingji Zheng (University of Texas at San Antonio, USA); Shouhuai Xu (University of Texas at SanAntonio, USA); Giuseppe Ateniese (The Johns Hopkins University, USA)pp. 522-530

Deep Packet Inspection with DFA-trees and Parametrized Language OverapproximationDaniel Luchaup (University of Wisconsin Madison, USA); Lorenzo De Carli (University of Wisconsin-Madison, USA); Somesh Jha (University of Wisconsin, USA); Eric Bach (University of WisconsinMadison, USA)pp. 531-539

WN2: Wireless networks 2

Hello: A Generic Flexible Protocol for Neighbor DiscoveryWei Sun (Hong Kong University of Science and Technology, Hong Kong); Zheng Yang (TsinghuaUniversity, P.R. China); Keyu Wang (Hong Kong University of Science and Technology, HongKong); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology,P.R. China)pp. 540-548

Cooperative Anti-jamming for Infrastructure-less Wireless Networks with Stochastic RelayingLiyang Zhang (State University of New York at Buffalo, USA); Zhangyu Guan (State University ofNew York at Buffalo & Shandong University, USA); Tommaso Melodia (State University of New Yorkat Buffalo, USA)pp. 549-557

Restricted Coverage in Wireless NetworksXiaohua Xu (University of Toledo & College of Engineering, USA); Min Song (The University ofToledo, USA)pp. 558-564

Optimal Delay Bound for Maximum Weight Scheduling Policy in Wireless NetworksCem Boyaci (University of Florida, USA); Ye Xia (University of Florida, USA)pp. 565-573

CC3: Cloud computing 3

Delay Guaranteed Live Migration of Virtual MachinesJiao Zhang (Tsinghua University, P.R. China); Fengyuan Ren (Tsinghua University, P.R. China);Chuang Lin (Tsinghua University, P.R. China)pp. 574-582

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous ServersWei Wang (University of Toronto, Canada); Baochun Li (University of Toronto, Canada); Ben Liang(University of Toronto, Canada)pp. 583-591

Page 9: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

SAP: Similarity-Aware Partitioning for Efficient Cloud StorageBharath Balasubramanian (Princeton University, USA); Tian Lan (George Washington University,USA); Mung Chiang (Princeton University, USA)pp. 592-600

Scheduling Jobs with Dwindling Resource Requirements in CloudsSivan Albagli-Kim (Technion, Israel); Hadas Shachnai (Technion, Israel); Tami Tamir (TheInterdisciplinary Center, Israel)pp. 601-609

IM1: Internet monitoring and measurement 1

Spatio-temporal Factorization of Log Data for Understanding Network EventsTatsuaki Kimura (NTT, Japan); Keisuke Ishibashi (NTT, Japan); Tatsuya Mori (Waseda University,Japan); Hiroshi Sawada (NTT Corporation, Japan); Tsuyoshi Toyono (NTT Corporation, Japan); KenNishimatsu (NTT, Japan); Akio Watanabe (NTT Corporation & NTT Network TechnologyLabolatories, Japan); Akihiro Shimoda (NTT Corporation, Japan); Kohei Shiomoto (NTT, Japan)pp. 610-618

Mining Checkins From Location-sharing Services for Client-independent IP GeolocationHao Liu (Tsinghua University, P.R. China); Yaoxue Zhang (Tsinghua University, P.R. China); YuezhiZhou (Tsinghua University, P.R. China); Di Zhang (Tsinghua University, P.R. China); Xiaoming Fu(University of Goettingen, Germany); K. K. Ramakrishnan (Rutgers University, USA)pp. 619-627

Packet Classification Using Binary Content Addressable MemoryAlex X. Liu (Michigan State University, USA); Chad Meiners (MIT Lincoln Laboratory, USA); EricTorng (Michigan State University, USA)pp. 628-636

A Reduction-based Approach Towards Scaling Up Formal Analysis of Internet ConfigurationsAnduo Wang (University of Illinois at Urbana-Champaign, USA); Alexander Gurney (University ofPennsylvania, USA); Xianglong Han (University of Pennsylvania, USA); Jinyan Cao (University ofPennsylvania, USA); Boon Thau Loo (University of Pennsylvania, USA); Carolyn Talcott (SRIInternational, USA); Andre Scedrov (University of Pennsylvania, USA)pp. 637-645

NC: Network coding

A Matroid Theory Approach to Multicast Network CodingXunrui Yin (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada); Xin Wang(Fudan University, P.R. China)pp. 646-654

Robust and Optimal Opportunistic Scheduling for Downlink 2-Flow Inter-session NetworkCoding with Varying Channel Quality

Wei-Cheng Kuo (Purdue University, USA); Chih-Chun Wang (Purdue University, USA)pp. 655-663

DAWN: Defending Against Wormhole Attacks in Wireless Network Coding SystemsShiyu Ji (Oklahoma State University, USA); Tingting Chen (Oklahoma State University, USA);Sheng Zhong (Nanjing University, P.R. China); Subhash Kak (Oklahoma State University, USA)pp. 664-672

Secure Cloud Storage Meets with Secure Network CodingFei Chen (The Chinese University of Hong Kong, Hong Kong); Tao Xiang (Chongqing University,P.R. China); Yuanyuan Yang (Stony Brook University, USA); Sherman S. M. Chow (ChineseUniversity of Hong Kong, Hong Kong)pp. 673-681

Page 10: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

NE3: Network economics and pricing 3

Hybrid Data Pricing for Network-Assisted User-Provided ConnectivityLin Gao (The Chinese University of Hong Kong, Hong Kong); George Iosifidis (CERTH & Universityof Thessaly, Greece); Jianwei Huang (The Chinese University of Hong Kong, Hong Kong); LeandrosTassiulas (University of Thessaly, Greece)pp. 682-690

EasyBid: Enabling Cellular Offloading via Small PlayersZhixue Lu (Ohio State University, USA); Prasun Sinha (Ohio State University, USA); R. Srikant(University of Illinois at Urbana-Champaign, USA)pp. 691-699

Time Dependent Pricing in Wireless Data Networks: Flat-Rate vs. Usage-Based SchemesLiang Zhang (The Hong Kong Polytechnic University, Hong Kong); Weijie Wu (Shanghai Jiao TongUniversity, P.R. China); Dan Wang (The Hong Kong Polytechnic University, Hong Kong)pp. 700-708

Double Auctions for Dynamic Spectrum AllocationWei Dong (University of Texas at Austin, USA); Swati Rallapalli (University of Texas at Austin,USA); Lili Qiu (The University of Texas at Austin, USA); K. K. Ramakrishnan (Rutgers University,USA); Yin Zhang (University of Texas at Austin, USA)pp. 709-717

SN1: Sensor networks 1

A Generalized Coverage-Preserving Scheduling in WSNs: a Case Study in Structural HealthMonitoring

Xuefeng Liu (The Hong Kong Polytechnic University, Hong Kong); Jiannong Cao (Hong KongPolytechnic Univ, Hong Kong); Shaojie Tang (Temple University, USA); Peng Guo (HuazhongUniversity of Science and Technology, P.R. China)pp. 718-726

SenSpeed: Sensing Driving Conditions to Estimate Vehicle Speed in Urban EnvironmentsHaofu Han (Shanghai Jiaotong University, P.R. China); Jiadi Yu (Shanghai Jiao Tong University, P.R.China); Hongzi Zhu (Shanghai Jiao Tong University, P.R. China); Yingying Chen (Stevens Instituteof Technology, USA); Jie Yang (Oakland University, USA); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R. China); Minglu Li(Shanghai Jiao Tong University, P.R. China)pp. 727-735

An Optimal Data Collection Technique for Improved Utility in UAS-aided NetworksAhmed E.A.A. Abdulla (Tohoku University, Japan); Zubair Fadlullah (Tohoku University, Japan);Hiroki Nishiyama (Tohoku University, Japan); Nei Kato (Tohoku University, Japan); Fumie Ono(National Institute of Information and Communications Technology, Japan); Ryu Miura (NICT,Japan)pp. 736-744

Toward Optimal Allocation of Location Dependent Tasks in CrowdsensingShibo He (Arizona State University, USA); Dong-Hoon Shin (Arizona State University, USA);Junshan Zhang (Arizona State University, USA); Jiming Chen (Zhejiang University, P.R. China)pp. 745-753

SP3: Security and privacy 3

Achieving k-anonymity in Privacy-Aware Location-Based ServicesBen Niu (Xidian University, P.R. China); Qinghua Li (University of Arkansas, USA); Xiaoyan Zhu(Xidian University, P.R. China); Guohong Cao (The Pennsylvania State University, USA); Hui Li(Xidian University, P.R. China)pp. 754-762

Page 11: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

PLAM: A Privacy-Preserving Framework for Local-Area Mobile Social NetworksRongxing Lu (Nanyang Technological University, Singapore); Xiaodong Lin (University of OntarioInstitute of Technology, Canada); Zhiguo Shi (Zhejiang University, P.R. China); Jun Shao (ZhejiangGongshang University, P.R. China)pp. 763-771

Preserving Secondary Users' Privacy in Cognitive Radio NetworksZhengrui Qin (College of William and Mary, USA); Qun Li (College of William and Mary, USA);Shanhe Yi (College of William and Mary, USA); Dmitry Zamkov (University of Illinois at Urbana-Champaign, USA)pp. 772-780

Markov Chain Fingerprinting to Classify Encrypted TrafficMaciej Korczyński (Fefferman lab, Rutgers University, USA); Andrzej Duda (Grenoble Institute ofTechnology, France)pp. 781-789

WN3: Wireless networks 3

3D Pipeline Contention: Asymmetric Full Duplex in Wireless NetworksShaohe Lv (National University of Defense Technology, P.R. China); Xuan Dong (National Universityof Defence Technology, P.R. China); Yong Lu (National University of Defense Technology, P.R.China); Xiaoli Du (National University of Defense Technology, P.R. China); Xiaodong Wang(National University of Defense Technology, P.R. China); Yong Dou (National University of DefenseTechnology (NUDT), P.R. China); XingMing Zhou (School of Computer, National University ofDefense Technology, P.R. China)pp. 790-798

Montage: Combine Frames with Movement Continuity for Realtime Multi-User TrackingLan Zhang (Tsinghua University, P.R. China); Kebin Liu (Tsinghua University, P.R. China);Yonghang Jiang (Tsinghua University, P.R. China); Xiang-Yang Li (Illinois Institute of Technology,USA); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology,P.R. China); Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China)pp. 799-807

Scalable User Selection for MU-MIMO NetworksXiufeng Xie (University of Wisconsin-Madison, USA); Xinyu Zhang (University of Wisconsin-Madison, USA)pp. 808-816

iBeam: Intelligent Client-Side Multi-User Beamforming in Wireless NetworksYongjiu Du (Southern Methodist University, USA); Ehsan Aryafar (Intel Labs, USA); Joseph D.Camp (Southern Methodist University, USA); Mung Chiang (Princeton University, USA)pp. 817-825

CC4: Cloud computing 4

TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure CodesGuanfeng Liang (DOCOMO Innovations, USA); Ulas Can Kozat (DOCOMO Innovations, USA)pp. 826-834

New Bandwidth Sharing and Pricing Policies to Achieve A Win-Win Situation for Cloud Providerand Tenants

Haiying Shen (Clemson University, USA); Zhuozhao Li (Clemson University, USA)pp. 835-843

Neptune: Efficient Remote Communication Services for Cloud BackupsYu Hua (Huazhong University of Science and Technology, P.R. China); Xue Liu (McGill Univerisity,Canada); Dan Feng (Huazhong University of Science and Technology, P.R. China)pp. 844-852

Page 12: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Dynamic Content Allocation for Cloud-assisted Service of Periodic WorkloadsGyörgy Dán (KTH, Royal Institute of Technology, Sweden); Niklas Carlsson (Linköping University,Sweden)pp. 853-861

CNE: Cooperative networking

WiSlow: A WiFi Network Performance Troubleshooting Tool for End UsersKyung Hwa Kim (Columbia University, USA); Hyunwoo Nam (Columbia University, USA); HenningSchulzrinne (Columbia University, USA)pp. 862-870

Scaling Laws for Heterogeneous Cognitive Radio Networks with Cooperative Secondary UsersRiheng Jia (Shanghai Jiaotong University, P.R. China); Jinbei Zhang (Shanghai Jiaotong University,P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China); Xiaohua Tian (ShanghaiJiaotong University, P.R. China); Qian Zhang (Hong Kong University of Science and Technology,Hong Kong)pp. 871-879

Cooperative Cross-Technology Interference Mitigation for Heterogeneous Multi-hop NetworksYantian Hou (USU, USA); Ming Li (Utah State University, USA); Xu Yuan (Virginia Tech, USA);Thomas Hou (Virginia Tech, USA); Wenjing Lou (Virginia Tech, USA)pp. 880-888

EE1: Energy efficiency in wireless networks 1

On the Expected Size of Minimum-Energy Path-preserving Topologies for Wireless Multi-hopNetworks

Ashikur Rahman (State University of New York, USA); Nael Abu-Ghazaleh (State University of NewYork at Binghamton, USA)pp. 889-897

Distributed Opportunistic Scheduling for Wireless Networks Powered by Renewable EnergySources

Hang Li (Texas A&M University, USA); Chuan Huang (Arizona State University, USA); Shuguang Cui(Texas A&M University, USA); Junshan Zhang (Arizona State University, USA)pp. 898-906

Relax, but Do Not Sleep: A New Perspective on Green Wireless NetworkingChenfei Gao (Syracuse University, USA); Weiyi Zhang (AT&T Labs Research, USA); Jian Tang(Syracuse University, USA); Chonggang Wang (InterDigital Communications, USA); Shihong Zou(Beijing University of Posts&Telecommunications, P.R. China); Sen Su (Beijing University of Posts &Telecommunications (BUPT), P.R. China)pp. 907-915

Energy Optimization Through Traffic Aggregation in Wireless NetworksWenjie Hu (The Pennsylvania State University, USA); Guohong Cao (The Pennsylvania StateUniversity, USA)pp. 916-924

IM2: Internet monitoring and measurement 2

Contextual Localization Through Network Traffic AnalysisAveek K Das (University of California, Davis, USA); Parth H Pathak (University of California, Davis,USA); Chen-Nee Chuah (University of California, Davis, USA); Prasant Mohapatra (University ofCalifornia, Davis, USA)pp. 925-933

Page 13: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Intelligent SDN based Traffic (de)Aggregation and Measurement Paradigm (iSTAMP)Mehdi Malboubi (University of California, Davis, USA); Liyuan Wang (UC Davis, USA); Chen-NeeChuah (University of California, Davis, USA); Puneet Sharma (HP Labs Palo Alto, USA)pp. 934-942

Separating Wheat from Chaff: Winnowing Unintended Prefixes using Machine LearningAndra Lutu (Institute IMDEA Networks & University Carlos III of Madrid, Spain); Marcelo Bagnulo(University Carlos III of Madrid, Spain); Jesus Cid-Sueiro (Universidad Carlos III de Madrid, Spain);Olaf M Maennel (Loughborough University, United Kingdom)pp. 943-951

An Overlay Automata Approach to Regular Expression MatchingAlex X. Liu (Michigan State University, USA); Eric Torng (Michigan State University, USA)pp. 952-960

PNL1: Panel 1

SN2: Sensor networks 2

Walking down the STAIRS: Efficient Collision Resolution for Wireless Sensor NetworksXiaoyu Ji (Hong Kong University of Science and Technology, Hong Kong); Yuan He (TsinghuaUniversity, P.R. China); Jiliang Wang (Tsinghua University, P.R. China); Wei Dong (ZhejiangUniversity, P.R. China); Xiaopei Wu (Tsinghua University, P.R. China); Yunhao Liu (TsinghuaUniversity & The Hong Kong University of Science and Technology, P.R. China)pp. 961-969

Critical Sensing Range for Mobile Heterogeneous Camera Sensor NetworksYitao Hu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University,P.R. China); Xiaoying Gan (Shanghai Jiao Tong University, P.R. China)pp. 970-978

Bounded Stretch Geographic Homotopic Routing in Sensor NetworksKan Huang (State University of New York at Stony Brook, USA); Chien-Chun Ni (Stony BrookUniversity, USA); Rik Sarkar (University of Edinburgh, United Kingdom); Jie Gao (Stony BrookUniversity, USA); Joseph Mitchell (SUNY Stony Brook, USA)pp. 979-987

Maximizing the Value of Sensed Information in Underwater Wireless Sensor Networks via anAutonomous Underwater Vehicle

Stefano Basagni (Northeastern University, USA); Ladislau Bölöni (University of Central Florida,USA); Petrika Gjanci (University of Rome "La Sapienza", Italy); Chiara Petrioli (University of Rome"La Sapienza", Italy); Cynthia A Phillips (Sandia National Laboratories, USA); Damla Turgut(University of Central Florida, USA)pp. 988-996

WS1: Wireless security and privacy 1

SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless NetworksJingchao Sun (Arizona State University, USA); Xu Chen (Arizona State University, USA); JinxueZhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA); JunshanZhang (Arizona State University, USA)pp. 997-1005

Utility-based Cooperative Decision in Cooperative AuthenticationYunchuan Guo (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China);Yin Lihua (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Licai Liu(Beijing University of Posts and Telecommunications & Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Fang Binxing (Institute of Computing TechnologyChinese Academy of Sciences, P.R. China)pp. 1006-1014

Page 14: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a SystemsHanif Rahbari (University of Arizona, USA); Marwan Krunz (University of Arizona, USA); LoukasLazos (University of Arizona, USA)pp. 1015-1023

A New Efficient Physical Layer OFDM Encryption SchemeFei Huo (University of Waterloo, Canada); Guang Gong (University of Waterloo, Canada)pp. 1024-1032

CC5: Cloud computing 5

Consolidating Complementary VMs with Spatial/Temporal-awareness in Cloud DatacentersLiuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA)pp. 1033-1041

When Queueing Meets Coding: Optimal-Latency Data Retrieving Scheme in Storage CloudsShengbo Chen (Qualcomm R&D, USA); Yin Sun (the Ohio State University, USA); Ulas Can Kozat(DOCOMO Innovations, USA); Longbo Huang (Tsinghua University, P.R. China); Prasun Sinha (OhioState University, USA); Guanfeng Liang (DOCOMO Innovations, USA); Xin Liu (UC Davis, USA);Ness B. Shroff (The Ohio State University, USA)pp. 1042-1050

Power Consumption of Virtual Machines with Network Transactions: Measurement andImprovement

Ryan Shea (Simon Fraser University, Canada); Haiyang Wang (University of Minnesota at Duluth,USA); Jiangchuan Liu (Simon Fraser University, Canada)pp. 1051-1059

Can Mobile Cloudlets Support Mobile Applications?Yujin Li (North Carolina State University, USA); Wenye Wang (NC State University, USA)pp. 1060-1068

CN1: Cellular networks 1

Structured Spectrum Allocation and User Association in Heterogeneous Cellular NetworksWei Bao (University of Toronto, Canada); Ben Liang (University of Toronto, Canada)pp. 1069-1077

Video Delivery over Heterogeneous Cellular Networks: Optimizing Cost and PerformanceKonstantinos Poularakis (University of Thessaly, Greece); George Iosifidis (CERTH & University ofThessaly, Greece); Antonios Argyriou (University of Thessaly & CERTH, Greece); Leandros Tassiulas(University of Thessaly, Greece)pp. 1078-1086

Cell Planning for Heterogeneous Networks: An Approximation AlgorithmWentao Zhao (Nanjing University, P.R. China); Shaowei Wang (Nanjing University, P.R. China);Chonggang Wang (InterDigital Communications, USA); Xiaobing Wu (Nanjing University & NationalLaboratory for Novel Software Technology, P.R. China)pp. 1087-1095

A College Admissions Game for Uplink User Association in Wireless Small Cell NetworksWalid Saad (Virginia Tech & Wireless@VT, USA); Zhu Han (University of Houston, USA); RongZheng (McMaster University, Canada); Mérouane Debbah (Supelec, France); H. Vincent Poor(Princeton University, USA)pp. 1096-1104

Page 15: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

EE2: Energy efficiency in wireless networks 2

Safe Charging for Wireless Power TransferHaipeng Dai (Nanjing University & State Key Lab of Novel Software Technology, P.R. China);Yunhuai Liu (Third Research Institute of Ministry of Public Security, P.R. China); Guihai Chen(Shanghai Jiao Tong University, P.R. China); Xiaobing Wu (Nanjing University & NationalLaboratory for Novel Software Technology, P.R. China); Tian He (University of Minnesota, USA)pp. 1105-1113

Energy-efficient Cooperative Broadcast in Fading Wireless NetworksChenxi Qiu (Clemson University, USA); Haiying Shen (Clemson University, USA); Lei Yu (ClemsonUniversity, USA)pp. 1114-1122

Performance-aware Energy Optimization on Mobile Devices in Cellular NetworkYong Cui (Tsinghua University, P.R. China); Shihan Xiao (University of Tsinghua, P.R. China); XinWang (Stony Brook University, USA); Minming Li (City University of Hong Kong, Hong Kong);Hongyi Wang (Tsinghua University, P.R. China); Zeqi Lai (Tsinghua University, P.R. China)pp. 1123-1131

Microeconomic Analysis of Base-Station Sharing in Green Cellular NetworksBingjie Leng (Tsinghua University, P.R. China); Parisa Mansourifard (University of SouthernCalifornia, USA); Bhaskar Krishnamachari (University of Southern California, USA)pp. 1132-1140

IM3: Internet monitoring and measurement 3

Optimal Collaborative Access Point Association in Wireless NetworksOuldooz Baghban Karimi (Simon Fraser University, Canada); Jiangchuan Liu (Simon FraserUniversity, Canada); Jennifer Rexford (Princeton University, USA)pp. 1141-1149

kBF: a Bloom Filter for Key-Value Storage with an Application on Approximate StateSisi Xiong (University of Tennessee, Knoxville, USA); Yanjun Yao (University of Tennessee,Knoxville, USA); Qing Cao (University of Tennessee, USA); Tian He (University of Minnesota, USA)pp. 1150-1158

Detecting Malicious HTTP Redirections Using Trees of User Browsing ActivityHesham Mekky (University of Minnesota, USA); Ruben Torres (Narus Inc., USA); Zhi-Li Zhang(University of Minnesota, USA); Sabyasachi Saha (Narus Inc., USA); Antonio Nucci (Narus inc.,USA)pp. 1159-1167

What Scale of Audience a Campaign can Reach in What Price on Twitter?Yubao Zhang (College of William and Mary, USA); Xin Ruan (College of William and Mary, USA);Haining Wang (College of William and Mary, USA); Hui Wang (National University of DefenseTechnology, P.R. China)pp. 1168-1176

SN3: Sensor networks 3

How to identify global trends from local decisions? Event Region Detection on Mobile NetworksAndreas Loukas (Delft University of Technology, The Netherlands); Marco Zuniga (Delft Universityof Technology, The Netherlands); Ioannis Protonotarios (Delft University of Technology, TheNetherlands); Jie Gao (Stony Brook University, USA)pp. 1177-1185

Sleep in the Dins: Insomnia Therapy for Duty-cycled Sensor NetworksJiliang Wang (Tsinghua University, P.R. China); Zhichao Cao (Tsinghua University, P.R. China);Xufei Mao (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University & The Hong KongUniversity of Science and Technology, P.R. China)pp. 1186-1194

Page 16: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Mobile-to-Mobile Energy Replenishment in Mission-Critical Robotic Sensor NetworksLiang He (Singapore University of Technology and Design, Singapore); Peng Cheng (SingaporeUniversity of Technology and Design, P.R. China); Yu Gu (Singapore University of Technology andDesign & Advanced Digital Sciences Center, Singapore); Jianping Pan (University of Victoria,Canada); Ting Zhu (State University of New York at Binghamton, USA); Cong Liu (The University oftexas at Dallas, USA)pp. 1195-1203

Connected Wireless Camera Network Deployment with Visibility CoverageHua Huang (Temple University, USA); Chien-Chun Ni (Stony Brook University, USA); Jie Gao(Stony Brook University, USA); Xiaomeng Ban (Stony Brook University, USA); Andrew Schneider(Temple University, USA); Shan Lin (Temple University, USA)pp. 1204-1212

US: Urban sensing and environmental monitoring

How to Crowdsource Tasks Truthfully without Sacrificing Utility: Online Incentive Mechanismswith Budget Constraint

Dong Zhao (Beijing University of Posts and Telecommunications, P.R. China); Xiang-Yang Li (IllinoisInstitute of Technology, USA); Huadong Ma (Beijing University of Posts and Telecommunications,P.R. China)pp. 1213-1221

Compressive Sensing over Strongly Connected Digraph and Its Transportation MonitoringApplication

Xiao Qi (Tsinghua University, P.R. China); Yongcai Wang (Tsinghua University, P.R. China);Yuexuan Wang (The University of Hong Kong & Tsinghua University, P.R. China); Liwen Xu(Tsinghua University, P.R. China)pp. 1222-1230

TRAC: Truthful Auction for Location-Aware Collaborative Sensing in Mobile CrowdsourcingZhenni Feng (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Qian Zhang (Hong Kong University of Science and Technology, HongKong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong); Athanasios V.Vasilakos (National Technical University of Athens & Kuwait University, Greece)pp. 1231-1239

ShopProfiler: Profiling Shops with Crowdsourcing DataXiaonan Guo (Singapore Management University, Singapore); Eddie Chan (The Hong KongUniversity of Science and Technology, Hong Kong); Ce Liu (University of Pittsburgh, USA); KaishunWu (HKUST & Sun Yat-sen University, Hong Kong); Siyuan Liu (Carnegie Mellon University, USA);Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 1240-1248

WS2: Wireless security and privacy 2

PS-TRUST: Provably Secure Solution for Truthful Double Spectrum AuctionsZhili Chen (University of Science and Technology of China, P.R. China); Liusheng Huang (Universityof Science and Technology of China, P.R. China); Lu Li (University of Science and Technology ofChina, P.R. China); Wei Yang (University of Science and Technology of China, P.R. China); HaiboMiao (University of Science and Technology of China, P.R. China); Miaomiao Tian (University ofScience and Technology of China, P.R. China); Fei Wang (Suzhou Institute for Advanced Study,USTC & NHPCC, USTC, P.R. China)pp. 1249-1257

Information Leaks Out: Attacks and Countermeasures on Compressive Data Gathering inWireless Sensor Networks

Pengfei Hu (University of California, Davis, USA); Kai Xing (University of Science and Technology ofChina, P.R. China); Xiuzhen Cheng (George Washington Univ, USA); Hao Wei (The ChineseUniversity of Hong Kong, Hong Kong); Haojin Zhu (Shanghai Jiao Tong University, P.R. China)pp. 1258-1266

Page 17: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Secure Cooperative Spectrum Sensing and Access Against Intelligent Malicious BehaviorsWei Wang (Zhejiang University, P.R. China); Lin Chen (The University of Paris-Sud, France); KangG. Shin (University of Michigan, USA); Lingjie Duan (Singapore University of Technology andDesign (SUTD), Singapore)pp. 1267-1275

Physical Layer Challenge-Response Authentication in Wireless Networks with RelayXianru Du (University of Michigan - Dearborn, USA); Dan Shan (GM Research, USA); Kai Zeng(University of Michigan - Dearborn, USA); Lauren Huie (Air Force Research Lab, USA)pp. 1276-1284

CC6: Cloud computing 6

A Deep Investigation Into Network Performance in Virtual Machine Based Cloud EnvironmentRyan Shea (Simon Fraser University, Canada); Feng Wang (The University of Mississippi, USA);Haiyang Wang (University of Minnesota at Duluth, USA); Jiangchuan Liu (Simon Fraser University,Canada)pp. 1285-1293

RIAL: Resource Intensity Aware Load Balancing in CloudsLiuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA); Karan Sapra(Clemson University, USA)pp. 1294-1302

Optimal Approximation Algorithm of Virtual Machine Placement for Data Latency Minimizationin Cloud Systems

Jian-Jhih Kuo (National Tsing Hua University, Taiwan); Hsiu-Hsien Yang (National Tsing HuaUniversity, Taiwan); Ming-Jer Tsai (National Tsing Hua University, Taiwan)pp. 1303-1311

Using Stop-and-Wait to Improve TCP Throughput in Fast Optical Switching (FOS) Networksover Short Physical Distances

Pablo Jesus Argibay-Losada (SUNY at Buffalo, USA); Kseniia Nozhnina (State University ofInformation and Communication Technologies, Ukraine); Gokhan Sahin (University of Aveiro,Portugal); Chunming Qiao (State University of New York at Buffalo, USA)pp. 1312-1320

CN2: Cellular networks 2

"Wireless Networks Without Edges": Dynamic Radio Resource Clustering and User SchedulingYuhuan Du (University of Texas at Austin, USA); Gustavo de Veciana (The University of Texas atAustin, USA)pp. 1321-1329

Cellular Multi-Coverage with Non-uniform RatesOmer Gurewitz (Ben Gurion University, Israel); Yakov Sandomirsky (Ben Gurion University of theNegev, Israel); Gabriel Scalosub (Ben-Gurion University, Israel)pp. 1330-1338

Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and AlgorithmsRobert Margolies (Columbia University, USA); Ashwin Sridharan (AT&T, USA); Vaneet Aggarwal(AT&T Labs - Research, USA); Rittwik Jana (AT&T Labs Research, USA); Nemmara K.Shankaranarayanan (AT&T Laboratories - Research, USA); Vinay A. Vaishampayan (DIMACS,Rutgers University & Columbia University, USA); Gil Zussman (Columbia University, USA)pp. 1339-1347

User Mobility from the View of Cellular Data NetworksYing Zhang (Ericsson Research, USA)pp. 1348-1356

Page 18: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

EE3: Energy efficiency in wireless networks 3

Energy Efficient Wifi Tethering on a SmartphoneKyoung-Hak Jung (Pohang University of Science and Technology (POSTECH), Korea); Yuepeng Qi(Pohang University of Science and Technology (POSTECH), Korea); Chansu Yu (Cleveland StateUniversity, USA); Young-Joo Suh (Pohang University of Science and Technology (POSTECH), Korea)pp. 1357-1365

Fair Energy-efficient Sensing Task Allocation in Participatory Sensing with SmartphonesQingwen Zhao (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University, P.R. China); Jian Cao(Shanghai Jiaotong University, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.China); Bo Li (Hong Kong University of Science and Technology, Hong Kong)pp. 1366-1374

Improved Structures for Data Collection in Wireless Sensor NetworksJon Crowcroft (University of Cambridge, United Kingdom); Michael Segal (Ben-Gurion University ofthe Negev, Israel); Liron Levin (Ben-Gurion University of the Negev, Israel)pp. 1375-1383

Energy-Efficient Capacity Optimization in Wireless NetworksLu Liu (Illinois Institute of Technology, USA); Xianghui Cao (Illinois Institute of Technology &Zhejiang University, USA); Yu Cheng (Illinois Institute of Technology, USA); Lili Du (IllinoisInstitute of Technology, USA); Wei Song (University of New Brunswick, Canada); Yu Wang(University of North Carolina at Charlotte, USA)pp. 1384-1392

FN: Firewalls and network intrusion detection

ProWord: An Unsupervised Approach to Protocol Feature Word ExtractionZhuo Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); ZhibinZhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Patrick Pak-Ching Lee (The Chinese University of Hong Kong, Hong Kong); Yunjie Liu (Beijing University ofPosts and Telecommunications, P.R. China); Gaogang Xie (Institute of Computing Technology,Chinese Academy of Sciences, P.R. China)pp. 1393-1401

TorWard: Discovery of Malicious Traffic over TorZhen Ling (Southeast University, P.R. China); Luo Junzhou (Southeast University, P.R. China); KuiWu (University of Victoria, Canada); Wei Yu (Towson University, USA); Xinwen Fu (University ofMassachusetts Lowell, USA)pp. 1402-1410

Transductive Malware Label Propagation: Find Your Lineage From Your NeighborsDeguang Kong (University of Texas at Arlington, USA); Guanhua Yan (Los Alamos NationalLaboratory, USA)pp. 1411-1419

LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection inNetwork Data Streams

Qun Huang (The Chinese University of Hong Kong, P.R. China); Patrick Pak-Ching Lee (The ChineseUniversity of Hong Kong, Hong Kong)pp. 1420-1428

IM4: Internet monitoring and measurement 4

Bloom Tree: A Search Tree Based on Bloom Filters for Multiple-Set Membership TestingMyungKeun Yoon (Kookmin University, Korea); JinWoo Son (Kookmin University, Korea); Seon-HoShin (Kookmin University, Korea)pp. 1429-1437

Page 19: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

A longitudinal analysis of Internet rate limitationsJoão Taveira Araújo (University College London, United Kingdom); Raul Landa (University CollegeLondon, United Kingdom); Richard G Clegg (University College London, United Kingdom); KensukeFukuda (National Institute of Informatics, Japan); George Pavlou (University College London,United Kingdom)pp. 1438-1446

Monitor Placement for Maximal Identifiability in Network TomographyLiang Ma (Imperial College London, United Kingdom); Ting He (IBM Research, USA); Kin K. Leung(Imperial College, United Kingdom); Ananthram Swami (Army Research Lab., USA); Don Towsley(University of Massachusetts at Amherst, USA)pp. 1447-1455

``Can you SEE me now?" A Measurement Study of Mobile Video CallsChenguang Yu (Polytechnic Institute of NYU, USA); Yang Xu (Polytechnic Institute of NYU, USA); BoLiu (Polytechnic Institute of NYU, USA); Yong Liu (Polytechnic Institute of NYU, USA)pp. 1456-1464

SN4: Sensor networks 4

Optimal Link Scheduling for Delay-constrained Periodic Traffic over Unreliable Wireless LinksYan Li (University of Otago, New Zealand); Haibo Zhang (Universtiy of Otago, New Zealand); ZhiyiHuang (University of Otago, New Zealand); Michael Albert (University of Otago, New Zealand)pp. 1465-1473

Approximate Multiple Count in Wireless Sensor NetworksXiaolin Fang (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin InstituteTechnology, P.R. China); Jianzhong Li (Harbin Institute of Technology, P.R. China); Yingshu Li(Georgia State University, USA)pp. 1474-1482

EV-Sounding: A Visual Assisted Electronic Channel Sounding SystemGang Li (the Ohio State University, USA); Jin Teng (The Ohio State University, USA); Fan Yang (theOhio State University, USA); Adam C. Champion (The Ohio State University, USA); Dong Xuan (TheOhio State University, USA); Hong Luan (University of Jinan, P.R. China); Yuan Fang Zheng (TheOhio-state University, USA)pp. 1483-1491

Coverage in Visual Sensor Networks with Pan-Tilt-Zoom Cameras: the MaxFoV ProblemVikram P. Munishwar (State University of New York at Binghamton, USA); Vinay Kolar (IBMResearch, India); Nael Abu-Ghazaleh (State University of New York at Binghamton, USA)pp. 1492-1500

WS3: Wireless security and privacy 3

How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile BotnetsZhuo Lu (Intelligent Automation, Inc & North Carolina State University, USA); Wenye Wang (NCState University, USA); Cliff Wang (Army Research Office, USA)pp. 1501-1509

COLLECTOR: A Secure RFID-Enabled Batch Recall ProtocolSaiyu Qi (Hong Kong university of science and Technology, Hong Kong); Yuanqing Zheng (NanyangTechnological University, Singapore); Mo Li (Nanyang Technological University, Singapore); Li Lu(University of Electronic Science and Technology of China, P.R. China); Yunhao Liu (TsinghuaUniversity & The Hong Kong University of Science and Technology, P.R. China)pp. 1510-1518

Analysis and Detection of SIMbox Fraud in Mobility NetworksIlona Murynets (AT&T Security Research Center, USA); Michael Zabarankin (Stevens Institute ofTechnology, USA); Roger Piqueras Jover (AT&T Security Research Center, USA); Adam Panagia(AT&T, USA)pp. 1519-1526

Page 20: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Scaling Laws for Secrecy Capacity in Cooperative Wireless NetworksMahtab Mirmohseni (Sharif University of Technology, Iran); Panagiotis (Panos) Papadimitratos(KTH, Sweden)pp. 1527-1535

CN3: Cellular networks 3

Fast Resource Scheduling in HetNets with D2D SupportFrancesco Malandrino (Trinity College, Dublin, Ireland); Claudio E. Casetti (Politecnico di Torino,Italy); Carla-Fabiana Chiasserini (Politecnico di Torino, Italy); Zana Limani (Politecnico di Torino,Italy)pp. 1536-1544

INDAPSON: An Incentive Data Plan Sharing System Based on Self-Organizing NetworkTuo Yu (Shanghai Jiaotong University, P.R. China); Zilong Zhou (Shanghai Jiao Tong University,P.R. China); Da Zhang (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (ShanghaiJiaotong University, P.R. China); Yunxin Liu (Microsoft Research Asia, P.R. China); Songwu Lu(University of California at Los Angeles, USA)pp. 1545-1553

A Mean Field Game Approach to Scheduling in Cellular SystemsMayank Manjrekar (Texas A&M University, USA); Vinod Ramaswamy (Texas A&M University, USA);Srinivas Shakkottai (Texas A&M University, USA)pp. 1554-1562

R2D2: Embracing Device-to-Device Communication in Next Generation Cellular NetworksTarun Bansal (The Ohio State University, USA); Karthikeyan Sundaresan (NEC Labs America, USA);Sampath Rangarajan (NEC Labs America, USA); Prasun Sinha (Ohio State University, USA)pp. 1563-1571

DC1: Data center networking 1

On Efficient Bandwidth Allocation for Traffic Variability in DatacentersJian Guo (Huazhong University of Science and Technology, P.R. China); Fangming Liu (HuazhongUniversity of Science and Technology, P.R. China); Xiaomeng Huang (Tsinghua University, P.R.China); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong); Mi Hu (HuazhongUniversity of Science and Technology, P.R. China); Gao Qiao (Huazhong University of Science andTechnology, P.R. China); Hai Jin (Huazhong University of Science and Technology, P.R. China)pp. 1572-1580

RepFlow: Minimizing Flow Completion Times with Replicated Flows in Data CentersHong Xu (City University of Hong Kong & University of Toronto, Hong Kong); Baochun Li (Universityof Toronto, Canada)pp. 1581-1589

Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic PerspectiveMarco Chiesa (Roma Tre University, Italy); Guy Kindler (Hebrew University of Jerusalem, Israel);Michael Schapira (Hebrew University of Jerusalem, USA)pp. 1590-1598

Towards Performance-Centric Fairness in Datacenter NetworksLi Chen (University of Toronto, Canada); Yuan Feng (The Hong Kong Polytechnic University, HongKong); Baochun Li (University of Toronto, Canada); Bo Li (Hong Kong University of Science andTechnology, Hong Kong)pp. 1599-1607

FT1: Fault tolerance and survivability 1

Geometric Evaluation of Survivability of Disaster-affected Network with Probabilistic FailureHiroshi Saito (NTT & NTT Network Technology Laboratories, Japan)

Page 21: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

pp. 1608-1616

Keep Forwarding: Towards K-link Failure Resilient RoutingBaohua Yang (IBM Research, P.R. China); Junda Liu (University of California, Berkeley, USA); ScottShenker (U. C. Berkeley and ICSI, USA); Jun Li (Tsinghua University, P.R. China); Kai Zheng (IBMResearch, P.R. China)pp. 1617-1625

Restorable Logical Topology in the Face of No or Partial Traffic Demand KnowledgeReuven Cohen (Technion, Israel); Gabi Nakibly (National EW Research & Simulation Center, Israel)pp. 1626-1634

Max-Flow Min-Cut Theorem and Faster Algorithms in a Circular Disk Failure ModelYusuke Kobayashi (University of Tokyo, Japan); Kensuke Otsuki (University of Tokyo, Japan)pp. 1635-1643

SB1: Scheduling and buffer management 1

Distributed Backup Scheduling: Modeling and OptimizationPeter M van de Ven (IBM Thomas J. Watson Research Center, USA); Bo Zhang (IBM T. J. WatsonResearch Center, USA); Angela Schorgendorfer (IBM T. J. Watson Research Center, USA)pp. 1644-1652

Fast And Simple Approximation Algorithms for Maximum Weighted Independent Set of LinksPeng-Jun Wan (Illinois Institute of Technology, USA); Xiaohua Jia (City University of Hong Kong,Hong Kong); Guo-Jun Dai (School of Computer Science, Hangzhou DianZi University, P.R. China);Hongwei Du (Harbin Institute of Technology Shenzhen Graduate School, P.R. China); Ophir Frieder(Georgetown University, USA)pp. 1653-1661

A High-order Markov Chain Based Scheduling Algorithm for Low Delay in CSMA NetworksJaewook Kwak (North Carolina State University, USA); Chul-Ho Lee (North Carolina StateUniversity, USA); Do Young Eun (North Carolina State University, USA)pp. 1662-1670

Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless CodesYin Sun (the Ohio State University, USA); Can Emre Koksal (The Ohio State University, USA); Kyu-Han Kim (Hewlett-Packard Laboratories, USA); Ness B. Shroff (The Ohio State University, USA)pp. 1671-1679

SC1: Social computing and networks 1

LBSNSim: Analyzing and Modeling Location-based Social NetworksWei Wei (College of William and Mary, USA); Xiaojun Zhu (Nanjing University, P.R. China); Qun Li(College of William and Mary, USA)pp. 1680-1688

On Designing Neighbor Discovery Protocols: A Code-Based ApproachTong Meng (Shanghai Jiao Tong University, P.R. China); Fan Wu (Shanghai Jiao Tong University,P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China)pp. 1689-1697

Assessment of Multi-Hop Interpersonal Trust in Social Networks by Three-Valued SubjectiveLogic

Guangchi Liu (Montana State University, USA); Qing Yang (Montana State University, USA);Honggang Wang (University of Massachusetts, Dartmouth & College of Engineering, USA);Xiaodong Lin (University of Ontario Institute of Technology, Canada); Mike P Wittie (Montana StateUniversity, USA)pp. 1698-1706

FluidRating: A Time-Evolving Rating Scheme in Trust-based Recommendation Systems UsingFluid Dynamics

Wenjun Jiang (Central South University, P.R. China); Jie Wu (Temple University, USA); GuojunWang (Central South University, P.R. China); Huanyang Zheng (Temple University, USA)

Page 22: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

pp. 1707-1715

SD: Software defined networking

On Diagnosis of Forwarding Plane via Static Forwarding Rules in Software Defined NetworksUlas Can Kozat (DOCOMO Innovations, USA); Guanfeng Liang (DOCOMO Innovations, USA); KorayKokten (Ozyegin University, Turkey)pp. 1716-1724

Software Defined Monitoring of Application ProtocolsLukáš Kekely (CESNET a. l. e., Czech Republic); Viktor Puš (CESNET, Czech Republic); Jan Korenek(Brno University of Technology & CESNET, Czech Republic)pp. 1725-1733

On the effect of forwarding table size on SDN network utilizationRami Cohen (IBM Research - Haifa, Israel); Liane Lewin-Eytan (Yahoo! Research, Israel); Joseph(Seffi) Naor (Technion, Israel); Danny Raz (Technion, Israel)pp. 1734-1742

Software Defined Green Data Center Network with Exclusive RoutingDan Li (Tsinghua University, P.R. China); Yunfei Shang (Tsinghua University, P.R. China); CongjieChen (Tsinghua University, P.R. China)pp. 1743-1751

VN1: Vehicular Networks 1

Towards Automatic Phone-to-Phone Communication for Vehicular Networking ApplicationsShaohan Hu (University of Illinois at Urbana-Champaign, USA); Hengchang Liu (UIUC, USA); Lu Su(The State University of New York at Buffalo, USA); Hongyan Wang (UIUC, USA); Tarek Abdelzaher(University of Illinois, Urbana Champaign, USA); Pan Hui (Hong Kong University of Science andTechnology & Telekom Innovation Laboratories, Hong Kong); Wei Zheng (University of Wisconsin -Madison, USA); Zhiheng Xie (University of Virginia, USA); John Stankovic (University of Virginia,USA)pp. 1752-1760

POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular NetworksJun Qin (Shanghai Jiao Tong University, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University,P.R. China); Yanmin Zhu (Shanghai Jiao Tong University, P.R. China); Li Lu (University of ElectronicScience and Technology of China, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.China); Minglu Li (Shanghai Jiao Tong University, P.R. China)pp. 1761-1769

On Multihop Communications For In-Vehicle Internet Access Based On a TDMA MAC ProtocolHassan A Omar (University of Waterloo, Canada); Weihua Zhuang (University of Waterloo,Canada); Li Li (Communication Research Centre of Canada, Canada)pp. 1770-1778

GeoMob: A Mobility-aware Geocast Scheme in Metropolitans via Taxicabs and BusesLei Zhang (University of Victoria, Canada); Boyang Yu (University of Victoria, Canada); JianpingPan (University of Victoria, Canada)pp. 1779-1787

CN4: Cellular networks 4

Automated Dynamic Offset Applied to Cell AssociationMajed Haddad (INRIA, France); Habib B.A. Sidi (Orange Labs, France); Piotr Wiecek (WroclawUniversity of Technology, Poland); Eitan Altman (INRIA, France)pp. 1788-1796

Page 23: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Interference Coordination Strategies for Content Update Dissemination in LTE-AVincenzo Sciancalepore (Institute IMDEA Networks & Politecnico di Milano, Italy); VincenzoMancuso (IMDEA Networks Institute, Spain); Albert Banchs (Universidad Carlos III de Madrid,Spain); Shmuel Zaks (Technion, Israel); Antonio Capone (Politecnico di Milano, Italy)pp. 1797-1805

Classifying Call Profiles in Large-scale Mobile Traffic DatasetsDiala Naboulsi (INSA Lyon, France); Razvan Stanica (INSA Lyon, France); Marco Fiore (NationalResearch Council of Italy, Italy)pp. 1806-1814

Cross-Layer Path Management in Multi-path Transport Protocol for Mobile DevicesYeon-sup Lim (University of Massachusetts Amherst, USA); Yung-Chih Chen (University ofMassachusetts at Amherst, USA); Erich Nahum (IBM T. J. Watson Research Center, USA); DonTowsley (University of Massachusetts at Amherst, USA); Kang-Won Lee (IBM Research, USA)pp. 1815-1823

DC2: Data center networking 2

Practical DCB for Improved Data Center NetworksBrent Stephens (Rice University & IBM, USA); Ankit Singla (University of Illinois at Urbana-Champaign, USA); Colin Dixon (IBM Research, USA); Wes Felter (IBM, USA); John Carter (IBMResearh, USA); Alan L. Cox (Rice University, USA)pp. 1824-1832

Distributed Data Storage Systems with Opportunistic RepairVaneet Aggarwal (AT&T Labs - Research, USA); Chao Tian (AT&T Labs-Research, ShannonLaboratory, USA); Vinay A. Vaishampayan (DIMACS, Rutgers University & Columbia University,USA); Yih-Farn Robin Chen (AT&T Labs - Research, USA)pp. 1833-1841

Let's Stay Together: Towards Traffic Aware Virtual Machine Placement in Data CentersXin Li (Nanjing University & State Key Laboratory of Novel Software Technology, P.R. China); JieWu (Temple University, USA); Shaojie Tang (Temple University, Philadelphia, PA, USA); Sanglu Lu(Nanjing University, P.R. China)pp. 1842-1850

On the Design and Analysis of Data Center Network Architectures for Interconnecting Dual-Port Servers

Dawei Li (Temple University, USA); Jie Wu (Temple University, USA)pp. 1851-1859

FT2: Fault tolerance and survivability 2

Signaling Free Localization of Node Failures in All-Optical NetworksJános Tapolcai (Budapest University of Technology and Economics, Hungary); Lajos Rónyai(Budapest University of Technology and Economics (BME), Hungary); Éva Hosszu (BudapestUniversity of Technology and Economics, Hungary); Pin-Han Ho (University of Waterloo, Canada);Suresh Subramaniam (The George Washington University, USA)pp. 1860-1868

Fault Tolerant Barrier Coverage for Wireless Sensor NetworksZhibo Wang (University of Tennessee, Knoxville, USA); Honglong Chen (China University ofPetroleum, P.R. China); Qing Cao (University of Tennessee, USA); Hairong Qi (the University ofTennessee, USA); Zhi Wang (Zhejiang University & State Key Laboratory of Industrial ControlTechnology, Zhejiang University, P.R. China)pp. 1869-1877

Heterogeneity-Aware Data Regeneration in Distributed Storage SystemsYan Wang (Fudan University, P.R. China); Dongsheng Wei (Fudan University, P.R. China); XunruiYin (University of Calgary, Canada); Xin Wang (Fudan University, P.R. China)pp. 1878-1886

Page 24: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

CauseInfer:Automatic and Distributed Performance Diagnosis with Hierarchical CausalityGraph in Large Distributed Systems

Pengfei Chen (Xi'an Jiaotong University, P.R. China); Yong Qi (Xi'an Jiaotong University, P.R.China); Pengfei Zheng (Xi'an Jiaotong University, P.R. China); Di Hou (Xi'an Jiaotong University,P.R. China)pp. 1887-1895

PNL2: Panel 2

SB2: Scheduling and buffer management 2

Sharp Per-Flow Delay Bounds for Bursty Arrivals: The Case of FIFO, SP, and EDF SchedulingFlorin Ciucu (University of Warwick, United Kingdom); Felix Poloczek (TU Berlin / T-Labs,Germany); Jens Schmitt (University of Kaiserslautern, Germany)pp. 1896-1904

LP-relaxation based Distributed Algorithms for Scheduling in Wireless NetworksChandramani K. Singh (University of Illinois at Urbana-Champaign, India); Angelia Nedich(University of Illinois at Urbana-Champaign, USA); R. Srikant (University of Illinois at Urbana-Champaign, USA)pp. 1905-1913

Low Complexity Multi-Resource Fair Queueing with Bounded DelayWei Wang (University of Toronto, Canada); Ben Liang (University of Toronto, Canada); Baochun Li(University of Toronto, Canada)pp. 1914-1922

Rate-Control and Multi-Channel Scheduling for Wireless Live Streaming with StringentDeadlines

Shizhen Zhao (Purdue University, USA); Xiaojun Lin (Purdue University, USA)pp. 1923-1931

SC2: Social computing and networks 2

Information Diffusion in Mobile Social Networks: The Speed PerspectiveZongqing Lu (The Pennsylvania State University, USA); Yonggang Wen (Nanyang TechnologicalUniversity, Singapore); Guohong Cao (The Pennsylvania State University, USA)pp. 1932-1940

Improving Data Forwarding in Mobile Social Networks with Infrastructure Support: A Space-Crossing Community Approach

Zhong Li (Tongji University, P.R. China); Cheng Wang (University of Ottawa & Tongji University,Shanghai, Canada); Siqian Yang (University of Tongji, P.R. China); Changjun Jiang (TongjiUniversity, P.R. China); Ivan Stojmenovic (University of Ottawa, Canada)pp. 1941-1949

Optimizing Offline Access to Social Network Content on Mobile DevicesNgoc Do (UC Irvine, USA); Ye Zhao (University of California, Irvine, USA); Shu-Ting Wang(National Tsing Hua University, Taiwan); Cheng-Hsin Hsu (National Tsing Hua University, Taiwan);Nalini Venkatasubramanian (University of California, Irvine, USA)pp. 1950-1958

A Social Group Utility Maximization Framework with Applications in Database AssistedSpectrum Access

Xu Chen (Arizona State University, USA); Xiaowen Gong (Arizona State University, USA); Lei Yang(Arizona State University, USA); Junshan Zhang (Arizona State University, USA)pp. 1959-1967

Page 25: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

VN2: Vehicular Networks 2

A Cooperative Advanced Driver Assistance System to Mitigate Vehicular Traffic Shock WavesMarkus Forster (University of Luxembourg, Luxemburg); Raphael Frank (University of Luxembourg,Luxemburg); Mario Gerla (University of California at Los Angeles, USA); Thomas Engel (Universityof Luxemburg, Luxemburg)pp. 1968-1976

Data-driven Traffic Flow Analysis for Vehicular CommunicationsYang Wang (University of Science and Technology of China, P.R. China); Liusheng Huang(University of Science and Technology of China, P.R. China); Tianbo Gu (University ofMassachusetts Amherst, USA); Hao Wei (The Chinese University of Hong Kong, Hong Kong); KaiXing (University of Science and Technology of China, P.R. China); Junshan Zhang (Arizona StateUniversity, USA)pp. 1977-1985

CityDrive: A Map-Generating and Speed-Optimizing Driving SystemYiran Zhao (Shanghai Jiao Tong University, P.R. China); Yang Zhang (Shanghai Jiao TongUniversity, P.R. China); Tuo Yu (Shanghai Jiaotong University, P.R. China); Tianyuan Liu (ShanghaiJiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University, P.R. China);Xiaohua Tian (Shanghai Jiaotong University, P.R. China); Xue Liu (McGill Univerisity, Canada)pp. 1986-1994

ForeSight: Mapping Vehicles in Visual Domain and Electronic DomainDong Li (Ohio State University, USA); Zhixue Lu (Ohio State University, USA); Tarun Bansal (TheOhio State University, USA); Erik Schilling (Ohio State University, USA); Prasun Sinha (Ohio StateUniversity, USA)pp. 1995-2003

BD: Big Data

Online Load Balancing for MapReduce with Skewed Data InputYanfang Le (Simon Fraser Unversity, Canada); Jiangchuan Liu (Simon Fraser University, Canada);Funda Ergun (Indiana University, USA); Dan Wang (The Hong Kong Polytechnic University, HongKong)pp. 2004-2012

Enabling Efficient Access Control with Dynamic Policy Updating for Big Data in the CloudKan Yang (City University of Hong Kong, Hong Kong); Xiaohua Jia (City University of Hong Kong,Hong Kong); Kui Ren (State University of New York at Buffalo, USA); Ruitao Xie (City University ofHong Kong, Hong Kong); Liusheng Huang (University of Science and Technology of China, P.R.China)pp. 2013-2021

Online Algorithms for Uploading Deferrable Big Data to The CloudLinquan Zhang (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada);Chuan Wu (The University of Hong Kong, Hong Kong); Minghua Chen (The Chinese University ofHong Kong, P.R. China)pp. 2022-2030

TideWatch: Fingerprinting the Cyclicality of Big Data WorkloadsDan Williams (T. J. Watson Research Center, USA); Shuai Zheng (King Abdullah University ofScience and Technology, Saudi Arabia); Xiangliang Zhang (King Abdullah University of Science andTechnology, Saudi Arabia); Hani Jamjoom (IBM T. J. Watson Research Center & IBM, USA)pp. 2031-2039

CNB: Content/name based networking

A unified approach to the performance analysis of caching systemsValentina Martina (Politecnico di Torino, Italy); Michele Garetto (Università di Torino, Italy); EmilioLeonardi (Politecnico di Torino, Italy)

Page 26: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

pp. 2040-2048

Scalable Pending Interest Table Design: From Principles to PracticeHaowei Yuan (Washington University in St. Louis, USA); Patrick Crowley (Washington University inSt. Louis, USA)pp. 2049-2057

REIN: A Fast Event Matching Approach for Content-based Publish/Subscribe SystemsShiyou Qian (Shanghai Jiao Tong University & Shanghai Jiao Tong University, P.R. China); Jian Cao(Shanghai Jiaotong University, P.R. China); Yanmin Zhu (Shanghai Jiao Tong University, P.R.China); Minglu Li (Shanghai Jiao Tong University, P.R. China)pp. 2058-2066

Reducing Forwarding State in Content-Centric Networks with Semi-Stateless ForwardingChristos Tsilopoulos (Athens University of Economics and Business, Greece); George Xylomenos(Athens University of Economics and Business, Greece); Yannis Thomas (Athens University ofEconomics and Business (AUEB), Greece)pp. 2067-2075

CR1: Cognitive radio networks 1

A Unified Framework for Wireless Max-Min Utility Optimization with General MonotonicConstraints

Yao-Win Peter Hong (National Tsing Hua University, Taiwan); Chee Wei Tan (City University ofHong Kong, Hong Kong); Liang Zheng (City University of Hong Kong, Hong Kong); Cheng-Lin Hsieh(National Tsing-Hua University, Taiwan); Chia-Han Lee (Academia Sinica, Taiwan)pp. 2076-2084

A Practical Self-Adaptive Rendezvous Protocol in Cognitive Radio Ad Hoc NetworksXingya Liu (University of North Carolina at Charlotte, USA); Linda Jiang Xie (University of NorthCarolina at Charlotte, USA)pp. 2085-2093

Delay-Constrained Caching in Cognitive Radio NetworksJing Zhao (The Pennsylvania State University, USA); Wei Gao (University of Tennessee, USA); YiWang (Pennsylvania State University, USA); Guohong Cao (The Pennsylvania State University,USA)pp. 2094-2102

Probability Distribution of Spectral Hole Duration in Cognitive NetworksJelena Mišić (Ryerson University, Canada); Vojislav B. Mišić (Ryerson University, Canada)pp. 2103-2111

CS: Cloud security and privacy

Privacy-Preserving Multi-Keyword Fuzzy Search over Encrypted Data in the CloudBing Wang (Virginia Tech, USA); Shucheng Yu (University of Arkansas at Little Rock, USA);Wenjing Lou (Virginia Tech, USA); Thomas Hou (Virginia Tech, USA)pp. 2112-2120

Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User ModificationJiawei Yuan (University of Arkansas at Little Rock, USA); Shucheng Yu (University of Arkansas atLittle Rock, USA)pp. 2121-2129

A Privacy-aware Cloud-assisted Healthcare Monitoring System via Compressive SensingCong Wang (City University of Hong Kong, Hong Kong); Bingsheng Zhang (State University of NewYork at Buffalo, USA); Kui Ren (State University of New York at Buffalo, USA); Janet Roveda(University of Arizona, USA); Chang Wen Chen (State University of New York at Buffalo, USA);Zhen Xu (State University of New York at Buffalo, USA)pp. 2130-2138

Page 27: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

FT3: Fault tolerance and survivability 3

Aggrecode: Constructing Route Intersection for Data Reconstruction in Erasure Coded StorageSystems

Jing Zhang (McGill University & National University of Defense Technology, Canada); Xiangke Liao(NUDT, P.R. China); Li Shanshan (National University of Defense Technology, P.R. China); Yu Hua(Huazhong University of Science and Technology, P.R. China); Xue Liu (McGill Univerisity, Canada);Bin Lin (National University of Defense Technology, P.R. China)pp. 2139-2147

IP Fast Rerouting for Multi-Link FailuresTheodore Elhourani (University of Arizona, USA); Abishek Gopalan (University of Arizona, USA);Srinivasan Ramasubramanian (University of Arizona, USA)pp. 2148-2156

Rippler: Delay Injection for Service Dependency DetectionAli Zand (UC Santa Barbara, USA); Giovanni Vigna (University of California Santa Barbara, USA);Richard Kemmerer (University of California, Santa Barbara, USA); Christopher Kruegel (Universityof California, Santa Barbara, USA)pp. 2157-2165

SB3: Scheduling and buffer management 3

Minimizing Makespan and Total Completion Time in MapReduce-like SystemsYuqing Zhu (University of Texas at Dallas, USA); Yiwei Jiang (Zhejiang Sci-Tech University, USA);Weili Wu (UT Dallas, USA); Ling Ding (University of Washington Tacoma, USA); Ankur Teredesai(Univ of Washington, USA); Deying Li (Renmin University of China, P.R. China); Wonjun Lee (KoreaUniversity, Korea)pp. 2166-2174

Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and ExperimentsYuan Yi (The Hong Kong Polytechnic University, Hong Kong); Dan Wang (The Hong KongPolytechnic University, Hong Kong); Jiangchuan Liu (Simon Fraser University, Canada)pp. 2175-2183

Scheduling in a Secure Wireless NetworkXuan Wang (University of Victoria, Canada); Yi Chen (University of Victoria, Canada); Lin Cai(University of Victoria, Canada); Jianping Pan (University of Victoria, Canada)pp. 2184-2192

Scheduling Multicast Traffic with Deadlines in Wireless NetworksKyu Seob Kim (MIT, USA); Chih-ping Li (MIT, USA); Eytan Modiano (MIT, USA)pp. 2193-2201

SC3: Social computing and networks 3

Epidemic Thresholds with External AgentsSiddhartha Banerjee (Stanford University, USA); Avhishek Chatterjee (UT Austin, USA); SanjayShakkottai (The University of Texas at Austin, USA)pp. 2202-2210

A Robust Information Source Estimator with Sparse ObservationsKai Zhu (Arizona State University, USA); Lei Ying (Arizona State University, USA)pp. 2211-2219

Personal Clouds: Sharing and Integrating Networked Resources to Enhance End UserExperiences

Minsung Jang (Georgia Institute of Technology & Center for Experimental Research in ComputerSystems, USA); Karsten Schwan (Georgia Tech, USA); Ketan Bhardwaj (Georgia Institute ofTechnology, USA); Ada Gavrilovska (Georgia Institute of Technology, USA); Adhyas Avasthi (NokiaResearch Center, Palo Alto, USA)pp. 2220-2228

Page 28: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Modeling Social Network Relationships via t-Cherry Junction TreesBrian Proulx (Arizona State University, USA); Junshan Zhang (Arizona State University, USA)pp. 2229-2237

CR2: Cognitive radio networks 2

Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio NetworksJing Zhao (The Pennsylvania State University, USA); Guohong Cao (The Pennsylvania StateUniversity, USA)pp. 2238-2246

Rendezvous for Heterogeneous Spectrum-Agile DevicesShan-Hung Wu (National Tsing Hua University, Taiwan); Ching-Chan Wu (National Tsing HuaUniversity, Taiwan); Wing-Kai Hon (National Tsing Hua University, Taiwan); Kang G. Shin(University of Michigan, USA)pp. 2247-2255

GHz-Wide Sensing and Decoding Using the Sparse Fourier TransformHaitham Hassanieh (MIT, USA); Lixin Shi (MIT, USA); Omid Abari (MIT, USA); Ezzeldin Hamed(MIT, USA); Dina Katabi (MIT, USA)pp. 2256-2264

Flexauc: Serving Dynamic Demands in Spectrum Trading Markets with Flexible AuctionPeng Lin (HKUST, Hong Kong); Xiaojun Feng (Hong Kong University of Science and Technology,Hong Kong); Qian Zhang (Hong Kong University of Science and Technology, Hong Kong)pp. 2265-2273

DT: Delay tolerant networks

Multiple Heterogeneous Data Ferry Trajectory Planning in Wireless Sensor NetworksLirong Xue (Renmin University of China, P.R. China); Donghyun Kim (North Carolina CentralUniversity, USA); Yuqing Zhu (University of Texas at Dallas, USA); Deying Li (Renmin University ofChina, P.R. China); Wei Wang (Xi'an Jiaotong University, P.R. China); Alade Tokuta (North CarolinaCentral University, USA)pp. 2274-2282

DSearching: Distributed Searching of Mobile Nodes in DTNs with Floating Mobility InformationKang Chen (Clemson University, USA); Haiying Shen (Clemson University, USA)pp. 2283-2291

Dynamic Speed Scaling for Energy Minimization in Delay-Tolerant Smartphone ApplicationsJeongho Kwak (KAIST, Korea); Okyoung Choi (KAIST, Korea); Song Chong (KAIST, Korea);Prasant Mohapatra (University of California, Davis, USA)pp. 2292-2300

Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and EliminationWei Gao (University of Tennessee, USA); Qinghua Li (University of Arkansas, USA); Guohong Cao(The Pennsylvania State University, USA)pp. 2301-2309

LL: Localization and location privacy

Privacy-preserving High-quality Map Generation with Participatory sensingXi Chen (Tsinghua University, P.R. China); Xiaopei Wu (Tsinghua University, P.R. China); Xiang-Yang Li (Illinois Institute of Technology, USA); Yuan He (Tsinghua University, P.R. China); YunhaoLiu (Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)pp. 2310-2318

Page 29: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Multi-lateral Privacy-Preserving Localization in Pervasive EnvironmentsTao Shu (Oakland University, USA); Yingying Chen (Stevens Institute of Technology, USA); JieYang (Oakland University, USA); Albert Williams (University of Massachusetts Amherst, USA)pp. 2319-2327

A Stochastic Game for Privacy Preserving Context Sensing on Mobile PhoneWei Wang (Hong Kong University of Science and Technology, Hong Kong); Qian Zhang (Hong KongUniversity of Science and Technology, Hong Kong)pp. 2328-2336

Achieving Privacy Preservation in WiFi Fingerprint-Based LocalizationHong Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); LiminSun (Institute of Information Engineering, China Academy of Science, Beijing, P.R. China); HaojinZhu (Shanghai Jiao Tong University, P.R. China); Xiang Lu (Institute of Information Engineering,CAS, P.R. China); Xiuzhen Cheng (George Washington Univ, USA)pp. 2337-2345

MD: Mobile Data Offloading

TOSS: Traffic Offloading by Social Network Service-Based Opportunistic Sharing in MobileSocial Networks

Xiaofei Wang (Seoul National University, Korea); Min Chen (Huazhong University of Science andTechnology, P.R. China); Zhu Han (University of Houston, USA); Dapeng Oliver Wu (University ofFlorida, USA); Taekyoung Kwon (Seoul National University, Korea)pp. 2346-2354

Mobile Offloading in the Wild: Findings and Lessons Learned Through a Real-life Experimentwith a New Cloud-aware System

Marco Valerio Barbera (Sapienza University of Rome, Italy); Sokol Kosta (Sapienza University ofRome, Italy); Alessandro Mei (Sapienza University of Rome, Italy); Vasile Claudiu Perta (SapienzaUniversity of Rome, Italy); Julinda Stefa (Sapienza University of Rome, Italy)pp. 2355-2363

Is it Worth to be Patient? Analysis and Optimization of Delayed Mobile Data OffloadingFidan Mehmeti (EURECOM, France); Thrasyvoulos Spyropoulos (EURECOM, France)pp. 2364-2372

Ready, Set, Go: Coalesced Offloading from Mobile Devices to the CloudLiyao Xiang (University of Toronto, Canada); Shiwen Ye (University of Toronto, Canada); YuanFeng (The Hong Kong Polytechnic University, Hong Kong); Baochun Li (University of Toronto,Canada); Bo Li (Hong Kong University of Science and Technology, Hong Kong)pp. 2373-2381

PA1: Performance analysis and modeling 1

Towards a Statistical Network Calculus - Dealing with Uncertainty in ArrivalsMichael Beck (University of Kaiserslautern, Germany); Sebastian Henningsen (University ofKaiserslautern, Germany); Simon Birnbach (University of Kaiserslautern, Germany); Jens Schmitt(University of Kaiserslautern, Germany)pp. 2382-2390

Towards a System Theoretic Approach to Wireless Network Capacity in Finite Time and SpaceFlorin Ciucu (University of Warwick, United Kingdom); Ramin Khalili (EPFL, Switzerland); YumingJiang (Norwegian University of Science and Technology (NTNU), Norway); Liu Yang (TsinghuaUniversity, P.R. China); Yong Cui (Tsinghua University, P.R. China)pp. 2391-2399

Fluctuation Analysis of Debt Based Policies for Wireless Networks with Hard Delay ConstraintsRahul Singh (Texas A&M University, USA); I-Hong Hou (Texas A&M University, USA); PanganamalaR Kumar (Texas A&M University, USA)pp. 2400-2408

Page 30: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Price of Anarchy in Network Routing with Class based capacity GuaranteesEhsan Monsef (Illinois Institute of Technology, USA); Tricha Anjali (Illinois Institute of Technology,USA); Sanjiv Kapoor (Illinois Institute of Technology, USA)pp. 2409-2417

SB4: Scheduling and buffer management 4

Distributed Stochastic Optimization via Correlated SchedulingMichael J. Neely (University of Southern California, USA)pp. 2418-2426

Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay NodesReuven Cohen (Technion, Israel); Guy Grebla (Columbia University, USA)pp. 2427-2435

Application-Level Scheduling with Deadline ConstraintsHuasen Wu (Beihang University, Beijing, P.R. China); Xiaojun Lin (Purdue University, USA); Xin Liu(UC Davis, USA); Youguang Zhang (Beihang University, P.R. China)pp. 2436-2444

Joint Static and Dynamic Traffic Scheduling in Data Center NetworksZizhong Cao (Polytechnic Institute of New York University, USA); M. Kodialam (Bell Labs, USA); T.V. Lakshman (Bell Labs, Alcatel-Lucent, USA)pp. 2445-2453

WL: Wireless LANs

SimCast: Efficient Video Delivery in MU-MIMO WLANsGuanhua Wang (Hong Kong University of Science and Technology, Hong Kong); Kaishun Wu(HKUST & Sun Yat-sen University, Hong Kong); Qian Zhang (Hong Kong University of Science andTechnology, Hong Kong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 2454-2462

Loss Differentiation: Moving onto High-Speed Wireless LANsMuhammad Ruwaifa Anwar (Lahore University of Management Sciences, Pakistan); MuhammadKamran Nishat (Lahore University of Management Sciences, Pakistan); Mohsin Ali (LahoreUniversity of Management Sciences, Pakistan); Zahaib Akhtar (University of Southern California,USA); Haseeb Niaz (Lahore University of Management Sciences, USA); Ihsan Ayyub Qazi (LahoreUniversity of Management Sciences (LUMS), Pakistan)pp. 2463-2471

MISC: Merging Incorrect Symbols using Constellation Diversity for 802.11 RetransmissionJiajue Ou (Nanyang Technological University, Singapore); Yuanqing Zheng (Nanyang TechnologicalUniversity, Singapore); Mo Li (Nanyang Technological University, Singapore)pp. 2472-2480

TRACK: Unleash Exposed Terminals in Enterprise WLANsJun Huang (Michigan State University, USA); Guoliang Xing (Michigan State University, USA); GangZhou (College of William and Mary, USA)pp. 2481-2489

CR3: Cognitive radio networks 3

Incentivize Cooperative Sensing in Distributed Cognitive Radio Networks with Reputation-based Pricing

Tongjie Zhang (University of Calgary, Canada); Zongpeng Li (University of Calgary, Canada);Reihaneh Safavi-Naini (University of Calgary, Canada)pp. 2490-2498

Page 31: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Hitchhike: Riding Control on PreamblesXiaoyu Ji (Hong Kong University of Science and Technology, Hong Kong); Jiliang Wang (TsinghuaUniversity, P.R. China); Mingyan Liu (University of Michigan, USA); Yubo Yan (PLA University ofScience and Technology, P.R. China); Panlong Yang (Institute of Communication Engineering,PLAUST, P.R. China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science andTechnology, P.R. China)pp. 2499-2507

QUILT: A Decode/Quantize-Interleave-Transmit Approach to Cooperative RelayingSiddhartha Brahma (EPFL Switzerland, Switzerland); Melissa Duarte (Rice University, USA); AyanSengupta (EPFL Switzerland, Switzerland); I-Hsiang Wang (National Taiwan University, Taiwan);Christina Fragouli (EPFL, Switzerland); Suhas Diggavi (University of California Los Angeles, USA)pp. 2508-2516

FastProbe: Malicious User Detection in Cognitive Radio Networks Through Active TransmissionsTarun Bansal (The Ohio State University, USA); Bo Chen (Ohio State University, USA); PrasunSinha (Ohio State University, USA)pp. 2517-2525

MA1: Medium access control 1

Optimal CSMA-based Wireless Communication with Worst-case Delay and Non-uniform SizesHongxing Li (University of California at Davis, USA); Nitin Vaidya (University of Illinois at Urbana-Champaign, USA)pp. 2526-2534

Provable Per-Link Delay-Optimal CSMA for General Wireless Network TopologyDongmyung Lee (KAIST, Korea); Donggyu Yun (KAIST, Korea); Jinwoo Shin (KAIST, Korea); YungYi (KAIST, Korea); Se-Young Yun (Inria, France)pp. 2535-2543

Analysis of a Proportionally Fair and Locally Adaptive Spatial Aloha in Poisson NetworksFrancois Baccelli (INRIA-ENS, France); Bartlomiej Błaszczyszyn (Inria-Ens, France); ChandramaniK. Singh (University of Illinois at Urbana-Champaign, India)pp. 2544-2552

Communication Through Collisions: Opportunistic Utilization of Past ReceptionsAlireza Vahid (Cornell University, USA); Mohammad Ali Maddah-Ali (Bell Labs, Alcatel Lucent, USA);Salman Avestimehr (University of Southern California, USA)pp. 2553-2561

OP: Overlay and peer-to-peer networks

Open Peering by Internet Transit Providers: Peer Preference or Peer Pressure?Aemen Lodhi (Georgia Institute of Technology, USA); Amogh Dhamdhere (CAIDA, University ofCalifornia, San Diego, USA); Constantine Dovrolis (Georgia Institute of Technology, USA)pp. 2562-2570

A Stable Fountain Code Mechanism for Peer-to-Peer Content DistributionCedric Westphal (Huawei Innovation Center, USA)pp. 2571-2579

Maximizing the Number of Satisfied Subscribers in Pub/Sub Systems Under CapacityConstraints

Vinay Setty (University of Oslo, Norway); Gunnar Kreitz (KTH - Royal Institute of Technology,Sweden); Guido Urdaneta (Spotify, Sweden); Roman Vitenberg (University of Oslo, Norway);Maarten van Steen (VU University Amsterdam, The Netherlands)pp. 2580-2588

Page 32: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

PA2: Performance analysis and modeling 2

Delay-Throughput Tradeoff with Correlated Mobility of Ad-Hoc NetworksShuochao Yao (Shanghai Jiaotong University, P.R. China); Xinbing Wang (Shanghai JiaotongUniversity, P.R. China); Xiaohua Tian (Shanghai Jiaotong University, P.R. China); Qian Zhang(Hong Kong University of Science and Technology, Hong Kong)pp. 2589-2597

Joint Power Optimization of Data Center Network and Servers with Correlation AnalysisKuangyu Zheng (The Ohio State University, USA); Xiaodong Wang (The Ohio State University,USA); Li Li (The Ohio State University, USA); Xiaorui Wang (The Ohio State University, USA)pp. 2598-2606

Performance Evaluation and Asymptotics for Content Delivery NetworksVirag Shah (The University of Texas at Austin, USA); Gustavo de Veciana (The University of Texasat Austin, USA)pp. 2607-2615

On the Catalyzing Effect of Randomness on the Per-Flow Throughput in Wireless NetworksFlorin Ciucu (University of Warwick, United Kingdom); Jens Schmitt (University of Kaiserslautern,Germany)pp. 2616-2624

SG1: Smart Grid 1

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric ThreatsMingkui Wei (North Carolina State University, USA); Wenye Wang (NC State University, USA)pp. 2625-2633

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and ControlImplications

Andrey Bernstein (EPFL, Israel); Daniel Bienstock (Columbia University, USA); David Hay (TheHebrew University of Jerusalem, Israel); Meric Uzunoglu (Columbia University, USA); Gil Zussman(Columbia University, USA)pp. 2634-2642

Structure-aware Stochastic Load Management in Smart GridsYu Zhang (University of California, Los Angeles, USA); Mihaela van der Schaar (University ofCalifornia, Los Angeles (UCLA), USA)pp. 2643-2651

Stochastic Information Management for Voltage Regulation in Smart Distribution SystemsHao Liang (University of Waterloo, Canada); Atef Abdrabou (UAE University, UAE); Weihua Zhuang(University of Waterloo, Canada)pp. 2652-2660

SR1: Short range wireless technologies 1

SBVLC: Secure Barcode-based Visible Light Communication for SmartphonesBingsheng Zhang (State University of New York at Buffalo, USA); Kui Ren (State University of NewYork at Buffalo, USA); Guoliang Xing (Michigan State University, USA); Xinwen Fu (University ofMassachusetts Lowell, USA); Cong Wang (City University of Hong Kong, Hong Kong)pp. 2661-2669

Frogeye: Perception of the Slightest Tag MotionLei Yang (Tsinghua National Laboratory of Information Science and Technology, P.R. China); YongQi (Xi'an Jiaotong University, P.R. China); Jianbing Fang (Tsinghua University, P.R. China); XuanDing (Tsinghua University, P.R. China); Tianci Liu (Tsinghua University, P.R. China); Mo Li(Nanyang Technological University, Singapore)pp. 2670-2678

Page 33: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Sonar Inside Your Body: Prototyping Ultrasonic Intra-body Sensor NetworksG. Enrico Santagati (University at Buffalo, USA); Tommaso Melodia (State University of New Yorkat Buffalo, USA)pp. 2679-2687

LiFi: Line-Of-Sight Identification with WiFiZimu Zhou (Hong Kong University of Science and Technology, Hong Kong); Zheng Yang (TsinghuaUniversity, P.R. China); Chenshu Wu (Tsinghua University, P.R. China); Wei Sun (Hong KongUniversity of Science and Technology, Hong Kong); Yunhao Liu (Tsinghua University & The HongKong University of Science and Technology, P.R. China)pp. 2688-2696

CR4: Cognitive radio networks 4

MIMO-based Jamming Resilient Communication in Wireless NetworksQiben Yan (Virginia Tech, USA); Huacheng Zeng (Virginia Tech, USA); Tingting Jiang (Virginia Tech,USA); Ming Li (Utah State University, USA); Wenjing Lou (Virginia Tech, USA); Thomas Hou(Virginia Tech, USA)pp. 2697-2705

CACH: Cycle-Adjustable Channel Hopping for Control Channel Establishment in Cognitive RadioNetworks

Tsung-Ying Wu (National Taiwan University, Taiwan); Wanjiun Liao (National Taiwan University,Taiwan); Cheng-Shang Chang (National Tsing Hua University, Taiwan)pp. 2706-2714

A Credit-Token-Based Spectrum Etiquette Framework for Coexistence of HeterogeneousCognitive Radio Networks

Bo Gao (Virginia Tech, USA); Yaling Yang (Virginia Tech, USA); Jung-Min (Jerry) Park (VirginiaTech, USA)pp. 2715-2723

Throughput-Efficient Channel Allocation in Multi-Channel Cognitive Vehicular NetworksYou Han (The Ohio State University, USA); Eylem Ekici (The Ohio State University, USA); HarisKremo (Toyota InfoTechnology Center, Japan); Onur Altintas (Toyota InfoTechnology Center,Japan)pp. 2724-2732

MA2: Medium access control 2

Interference-aware proportional fairness for Multi-rate Wireless NetworksDouglas Blough (Georgia Institute of Technology, USA); Giovanni Resta (Istituto di Informatica eTelematica, Italy); Paolo Santi (IIT-CNR, Italy)pp. 2733-2741

FD-MMAC: Combating Multi-Channel Hidden and Exposed Terminals Using a Single TransceiverYan Zhang (University of Arizona, USA); Loukas Lazos (University of Arizona, USA); Kai Chen(University of Arizona, USA); Bocan Hu (University of Arizona, USA); Swetha Shivaramaiah(University of Arizona, USA)pp. 2742-2750

Competitive MAC under Adversarial SINRAdrian Ogierman (University of Paderborn, Germany); Andrea Richa (Arizona State University,USA); Christian Scheideler (Paderborn University, Germany); Stefan Schmid (T-Labs & TU Berlin,Germany); Jin Zhang (Google, USA)pp. 2751-2759

Optimal Rate Sampling in 802.11 SystemsRichard Combes (KTH, Royal Institute of Technology, Sweden); Alexandre Proutiere (MicrosoftResearch, United Kingdom); Donggyu Yun (KAIST, Korea); Jungseul Ok (KAIST, Korea); Yung Yi(KAIST, Korea)pp. 2760-2767

Page 34: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

PA3: Performance analysis and modeling 3

Throughput-Delay Tradeoff in Mobile Ad Hoc Networks with Correlated MobilityJiajia Liu (Xidian University, P.R. China); Hiroki Nishiyama (Tohoku University, Japan); Nei Kato(Tohoku University, Japan); Jian-feng Ma (Xidian University, Puerto Rico); Xiaohong Jiang (FutureUniversity-Hakodate, Japan)pp. 2768-2776

An Approximation Algorithm for Client Assignment in Client/Server SystemsYuqing Zhu (University of Texas at Dallas, USA); Weili Wu (UT Dallas, USA); James Willson (TheUniversity of New Mexico, USA); Ling Ding (University of Washington Tacoma, USA); Lidong Wu(UT Dallas, USA); Deying Li (Renmin University of China, P.R. China); Wonjun Lee (KoreaUniversity, Korea)pp. 2777-2785

Sojourn time approximations in a multi-class time-sharing serverAne Izagirre (University of Toulouse, France); Urtzi Ayesta (CNRS-LAAS and Ikerbasque-Universityof the Basque Country, Spain); Maaike Verloop (CNRS, France)pp. 2786-2794

A General Framework of Hybrid Graph Sampling for Complex Network AnalysisXin Xu (North Carolina State University, USA); Chul-Ho Lee (North Carolina State University, USA);Do Young Eun (North Carolina State University, USA)pp. 2795-2803

SG2: Smart Grid 2

Proactive Fault-Tolerant Aggregation Protocol for Privacy-Assured Smart MeteringJongho Won (Purdue University, USA); Chris Yu Tak Ma (Advanced Digital Sciences Center, Illinoisat Singapore, Singapore); David K. Y. Yau (Purdue University, USA); Nageswara Rao (Oak RidgeNational Laboratory, USA)pp. 2804-2812

Blowing Hard Is Not All We Want: Quantity vs Quality of Wind Power in the Smart GridFanxin Kong (McGill University, Canada); Chuansheng Dong (McGill University, Canada); Xue Liu(McGill Univerisity, Canada); Haibo Zeng (McGill University, Canada)pp. 2813-2821

Robust and Cost-Effective Architecture Design for Smart Grid Communications: A Multi-stageMiddleware Deployment Approach

Dong-Hoon Shin (Arizona State University, USA); Shibo He (Arizona State University, USA);Junshan Zhang (Arizona State University, USA)pp. 2822-2830

Optimal Combined Heat and Power System Scheduling in Smart GridKan Zhou (University of Victoria, Canada); Jianping Pan (University of Victoria, Canada); Lin Cai(University of Victoria, Canada)pp. 2831-2839

SR2: Short range wireless technologies 2

RollCaller: User-Friendly Indoor Navigation System Using Human-Item Spatial RelationYi Guo (Hongkong University of Science and Technology, P.R. China); Lei Yang (Tsinghua NationalLaboratory of Information Science and Technology, P.R. China); Bowen Li (School of Software,Tsinghua University, P.R. China); Tianci Liu (Tsinghua University, P.R. China); Yunhao Liu(Tsinghua University & The Hong Kong University of Science and Technology, P.R. China)pp. 2840-2848

BlueID: A Practical System for Bluetooth Device IdentificationJun Huang (Michigan State University, USA); Wahhab Mousa (Michigan State University, USA);Guoliang Xing (Michigan State University, USA)pp. 2849-2857

Page 35: IEEE INFOCOM VNE 2014 v1 - Proceedingstoc.proceedings.com/22661webtoc.pdfProtecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization

Enhancing Zigbee throughput under WiFi interference using real-time adaptive codingPeng Guo (Huazhong University of Science and Technology, P.R. China); Jiannong Cao (Hong KongPolytechnic Univ, Hong Kong); Kui Zhang (University of Twente, The Netherlands); Xuefeng Liu(The Hong Kong Polytechnic University, Hong Kong)pp. 2858-2866