callback( { "result":{ "query":":facetid:toc:\"db/conf/icnp/icnp2016.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.09" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"86", "@dc":"86", "@oc":"86", "@id":"43403278", "text":":facetid:toc:db/conf/icnp/icnp2016.bht" } }, "hits":{ "@total":"86", "@computed":"86", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"3277058", "info":{"authors":{"author":[{"@pid":"90/7209","text":"Hrishikesh B. Acharya"},{"@pid":"191/7815-4","text":"Satyam Kumar 0004"},{"@pid":"169/9751","text":"Mohit Wadhwa"},{"@pid":"160/9724","text":"Ayush Shah"}]},"title":"Rules in play: On the complexity of routing tables and firewalls.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/AcharyaKWS16","doi":"10.1109/ICNP.2016.7784426","ee":"https://doi.org/10.1109/ICNP.2016.7784426","url":"https://dblp.org/rec/conf/icnp/AcharyaKWS16"}, "url":"URL#3277058" }, { "@score":"1", "@id":"3277059", "info":{"authors":{"author":[{"@pid":"34/7562","text":"Faraz Ahmed"},{"@pid":"83/9528","text":"M. Zubair Shafiq"},{"@pid":"75/4783","text":"Amir R. Khakpour"},{"@pid":"l/AlexXLiu","text":"Alex X. Liu"}]},"title":"Optimizing Internet transit routing for content delivery networks.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/AhmedSKL16","doi":"10.1109/ICNP.2016.7784432","ee":"https://doi.org/10.1109/ICNP.2016.7784432","url":"https://dblp.org/rec/conf/icnp/AhmedSKL16"}, "url":"URL#3277059" }, { "@score":"1", "@id":"3277060", "info":{"authors":{"author":[{"@pid":"46/4715","text":"Kamran Ali"},{"@pid":"01/7553","text":"Ioannis Pefkianakis"},{"@pid":"l/AlexXLiu","text":"Alex X. Liu"},{"@pid":"10/5900","text":"Kyu-Han Kim"}]},"title":"Boosting powerline communications for ubiquitous connectivity in enterprises.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/AliPLK16","doi":"10.1109/ICNP.2016.7784453","ee":"https://doi.org/10.1109/ICNP.2016.7784453","url":"https://dblp.org/rec/conf/icnp/AliPLK16"}, "url":"URL#3277060" }, { "@score":"1", "@id":"3277061", "info":{"authors":{"author":[{"@pid":"76/3134","text":"Pedro Amaral"},{"@pid":"85/2062","text":"João Dinis"},{"@pid":"28/1661","text":"Paulo Pinto"},{"@pid":"72/3100","text":"Luís Bernardo"},{"@pid":"261/8868","text":"João Tavares 0003"},{"@pid":"217/4594","text":"Henrique S. Mamede"}]},"title":"Machine Learning in Software Defined Networks: Data collection and traffic classification.","venue":"ICNP","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/AmaralDPBTM16","doi":"10.1109/ICNP.2016.7785327","ee":"https://doi.org/10.1109/ICNP.2016.7785327","url":"https://dblp.org/rec/conf/icnp/AmaralDPBTM16"}, "url":"URL#3277061" }, { "@score":"1", "@id":"3277062", "info":{"authors":{"author":[{"@pid":"150/5758","text":"Yanan Bao"},{"@pid":"23/10962","text":"Huasen Wu"},{"@pid":"191/7826","text":"Albara Ah Ramli"},{"@pid":"191/7818","text":"Bradley Wang"},{"@pid":"76/1820-2","text":"Xin Liu 0002"}]},"title":"Viewing 360 degree videos: Motion prediction and bandwidth optimization.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/BaoWRWL16","doi":"10.1109/ICNP.2016.7784458","ee":"https://doi.org/10.1109/ICNP.2016.7784458","url":"https://dblp.org/rec/conf/icnp/BaoWRWL16"}, "url":"URL#3277062" }, { "@score":"1", "@id":"3277063", "info":{"authors":{"author":[{"@pid":"141/1542","text":"Osamah L. Barakat"},{"@pid":"65/10800","text":"David Koll"},{"@pid":"33/4231","text":"Xiaoming Fu 0001"}]},"title":"Gavel: Towards a graph database Defined Network.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/BarakatK016","doi":"10.1109/ICNP.2016.7784469","ee":"https://doi.org/10.1109/ICNP.2016.7784469","url":"https://dblp.org/rec/conf/icnp/BarakatK016"}, "url":"URL#3277063" }, { "@score":"1", "@id":"3277064", "info":{"authors":{"author":[{"@pid":"172/5446","text":"Carlos Bermejo"},{"@pid":"135/6249","text":"Dimitris Chatzopoulos"},{"@pid":"62/1272-1","text":"Pan Hui 0001"}]},"title":"How sustainable is social based mobile crowdsensing? An experimental study.","venue":"ICNP","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/BermejoCH16","doi":"10.1109/ICNP.2016.7785318","ee":"https://doi.org/10.1109/ICNP.2016.7785318","url":"https://dblp.org/rec/conf/icnp/BermejoCH16"}, "url":"URL#3277064" }, { "@score":"1", "@id":"3277065", "info":{"authors":{"author":[{"@pid":"64/1299","text":"Bruhadeshwar Bezawada"},{"@pid":"191/7817","text":"Xiaojiang Liang"},{"@pid":"l/AlexXLiu","text":"Alex X. Liu"},{"@pid":"96/4282-20","text":"Rui Li 0020"}]},"title":"A template approach to group key establishment in dynamic ad-hoc groups.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/BezawadaLLL16","doi":"10.1109/ICNP.2016.7784470","ee":"https://doi.org/10.1109/ICNP.2016.7784470","url":"https://dblp.org/rec/conf/icnp/BezawadaLLL16"}, "url":"URL#3277065" }, { "@score":"1", "@id":"3277066", "info":{"authors":{"author":[{"@pid":"05/7548-1","text":"Zhichao Cao 0001"},{"@pid":"75/3699","text":"Jiliang Wang"},{"@pid":"141/1957","text":"Daibo Liu"},{"@pid":"98/3341-2","text":"Xiaolong Zheng 0002"}]},"title":"Chase: Taming concurrent broadcast for flooding in asynchronous duty cycle networks.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/CaoWLZ16","doi":"10.1109/ICNP.2016.7784410","ee":"https://doi.org/10.1109/ICNP.2016.7784410","url":"https://dblp.org/rec/conf/icnp/CaoWLZ16"}, "url":"URL#3277066" }, { "@score":"1", "@id":"3277067", "info":{"authors":{"author":[{"@pid":"174/4026","text":"Chien-Hsin Chen"},{"@pid":"70/538","text":"Chien Chen"},{"@pid":"87/857","text":"Ssu-Hsuan Lu"},{"@pid":"89/971","text":"Chien-Chao Tseng"}]},"title":"Role-based campus network slicing.","venue":"ICNP","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChenCLT16","doi":"10.1109/ICNP.2016.7785315","ee":"https://doi.org/10.1109/ICNP.2016.7785315","url":"https://dblp.org/rec/conf/icnp/ChenCLT16"}, "url":"URL#3277067" }, { "@score":"1", "@id":"3277068", "info":{"authors":{"author":[{"@pid":"50/6996-7","text":"Min Chen 0007"},{"@pid":"49/1245-8","text":"Jia Liu 0008"},{"@pid":"c/ShigangChen","text":"Shigang Chen"},{"@pid":"51/452","text":"Qingjun Xiao"}]},"title":"Efficient anonymous category-level joint Tag estimation.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChenLCX16","doi":"10.1109/ICNP.2016.7784439","ee":"https://doi.org/10.1109/ICNP.2016.7784439","url":"https://dblp.org/rec/conf/icnp/ChenLCX16"}, "url":"URL#3277068" }, { "@score":"1", "@id":"3277069", "info":{"authors":{"author":[{"@pid":"91/6670","text":"Kang Chen"},{"@pid":"15/5579","text":"Haiying Shen"}]},"title":"Distributed privacy-protecting DTN routing: Concealing the information indispensable in routing.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChenS16","doi":"10.1109/ICNP.2016.7784461","ee":"https://doi.org/10.1109/ICNP.2016.7784461","url":"https://dblp.org/rec/conf/icnp/ChenS16"}, "url":"URL#3277069" }, { "@score":"1", "@id":"3277070", "info":{"authors":{"author":[{"@pid":"148/1942","text":"Liuhua Chen"},{"@pid":"15/5579","text":"Haiying Shen"},{"@pid":"06/4903","text":"Stephen Platt"}]},"title":"Cache contention aware Virtual Machine placement and migration in cloud datacenters.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChenSP16","doi":"10.1109/ICNP.2016.7784447","ee":"https://doi.org/10.1109/ICNP.2016.7784447","url":"https://dblp.org/rec/conf/icnp/ChenSP16"}, "url":"URL#3277070" }, { "@score":"1", "@id":"3277071", "info":{"authors":{"author":[{"@pid":"06/10875","text":"Zhitang Chen"},{"@pid":"172/4484","text":"Jiayao Wen"},{"@pid":"34/8744","text":"Yanhui Geng"}]},"title":"Predicting future traffic using Hidden Markov Models.","venue":"ICNP","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChenWG16","doi":"10.1109/ICNP.2016.7785328","ee":"https://doi.org/10.1109/ICNP.2016.7785328","url":"https://dblp.org/rec/conf/icnp/ChenWG16"}, "url":"URL#3277071" }, { "@score":"1", "@id":"3277072", "info":{"authors":{"author":[{"@pid":"56/1917","text":"Min Cheng"},{"@pid":"81/5941-10","text":"Qian Xu 0010"},{"@pid":"51/3036","text":"Jianming Lv"},{"@pid":"l/WenyinLiu","text":"Wenyin Liu"},{"@pid":"181/2689-1","text":"Qing Li 0001"},{"@pid":"21/1550-1","text":"Jianping Wang 0001"}]},"title":"MS-LSTM: A multi-scale LSTM model for BGP anomaly detection.","venue":"ICNP","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChengXLLLW16","doi":"10.1109/ICNP.2016.7785326","ee":"https://doi.org/10.1109/ICNP.2016.7785326","url":"https://dblp.org/rec/conf/icnp/ChengXLLLW16"}, "url":"URL#3277072" }, { "@score":"1", "@id":"3277073", "info":{"authors":{"author":[{"@pid":"136/1074","text":"Zicheng Chi"},{"@pid":"07/4410-9","text":"Yao Yao 0009"},{"@pid":"16/11029","text":"Tiantian Xie"},{"@pid":"117/7454","text":"Zhichuan Huang"},{"@pid":"70/595","text":"Michael Hammond"},{"@pid":"42/5105-1","text":"Ting Zhu 0001"}]},"title":"Harmony: Exploiting coarse-grained received signal strength from IoT devices for human activity recognition.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChiYXHHZ16","doi":"10.1109/ICNP.2016.7784414","ee":"https://doi.org/10.1109/ICNP.2016.7784414","url":"https://dblp.org/rec/conf/icnp/ChiYXHHZ16"}, "url":"URL#3277073" }, { "@score":"1", "@id":"3277074", "info":{"authors":{"author":[{"@pid":"17/1900-1","text":"Jaeyoung Choi 0001"},{"@pid":"52/8581","text":"Sangwoo Moon"},{"@pid":"31/7062","text":"Jinwoo Shin"},{"@pid":"01/66","text":"Yung Yi"}]},"title":"Estimating the rumor source with anti-rumor in social networks.","venue":"ICNP","pages":"1-6","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/ChoiMSY16","doi":"10.1109/ICNP.2016.7785329","ee":"https://doi.org/10.1109/ICNP.2016.7785329","url":"https://dblp.org/rec/conf/icnp/ChoiMSY16"}, "url":"URL#3277074" }, { "@score":"1", "@id":"3277075", "info":{"authors":{"author":[{"@pid":"124/6911","text":"Haipeng Dai"},{"@pid":"58/4775-4","text":"Xiaoyu Wang 0004"},{"@pid":"l/AlexXLiu","text":"Alex X. Liu"},{"@pid":"136/1070","text":"Fengmin Zhang"},{"@pid":"50/2082","text":"Yang Zhao"},{"@pid":"51/1742","text":"Guihai Chen"}]},"title":"Omnidirectional chargability with directional antennas.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/DaiWLZZC16","doi":"10.1109/ICNP.2016.7784435","ee":"https://doi.org/10.1109/ICNP.2016.7784435","url":"https://dblp.org/rec/conf/icnp/DaiWLZZC16"}, "url":"URL#3277075" }, { "@score":"1", "@id":"3277076", "info":{"authors":{"author":[{"@pid":"09/8674","text":"Xuan Feng"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"81/4036","text":"Haining Wang"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"Characterizing industrial control system devices on the Internet.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/FengLWS16","doi":"10.1109/ICNP.2016.7784407","ee":"https://doi.org/10.1109/ICNP.2016.7784407","url":"https://dblp.org/rec/conf/icnp/FengLWS16"}, "url":"URL#3277076" }, { "@score":"1", "@id":"3277077", "info":{"authors":{"author":[{"@pid":"09/8674","text":"Xuan Feng"},{"@pid":"72/872-7","text":"Qiang Li 0007"},{"@pid":"81/4036","text":"Haining Wang"},{"@pid":"37/4705","text":"Limin Sun"}]},"title":"ASCEND: A search engine for online industrial control devices.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/FengLWS16a","doi":"10.1109/ICNP.2016.7784467","ee":"https://doi.org/10.1109/ICNP.2016.7784467","url":"https://dblp.org/rec/conf/icnp/FengLWS16a"}, "url":"URL#3277077" }, { "@score":"1", "@id":"3277078", "info":{"authors":{"author":[{"@pid":"127/2799","text":"Marcel Flores"},{"@pid":"05/3476","text":"Alexander Wenzel"},{"@pid":"k/AleksandarKuzmanovic","text":"Aleksandar Kuzmanovic"}]},"title":"Enabling router-assisted congestion control on the Internet.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/FloresWK16","doi":"10.1109/ICNP.2016.7784442","ee":"https://doi.org/10.1109/ICNP.2016.7784442","url":"https://dblp.org/rec/conf/icnp/FloresWK16"}, "url":"URL#3277078" }, { "@score":"1", "@id":"3277079", "info":{"authors":{"author":[{"@pid":"12/4000-1","text":"Kai Gao 0001"},{"@pid":"30/433","text":"Chen Gu"},{"@pid":"77/7791","text":"Qiao Xiang"},{"@pid":"10/5630-36","text":"Xin Wang 0036"},{"@pid":"y/YangRichardYang","text":"Yang Richard Yang"},{"@pid":"79/3662","text":"Jun Bi"}]},"title":"ORSAP: Abstracting routing state on demand.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GaoGXWYB16","doi":"10.1109/ICNP.2016.7784454","ee":"https://doi.org/10.1109/ICNP.2016.7784454","url":"https://dblp.org/rec/conf/icnp/GaoGXWYB16"}, "url":"URL#3277079" }, { "@score":"1", "@id":"3277080", "info":{"authors":{"author":[{"@pid":"138/4338","text":"Chengxi Gao"},{"@pid":"l/VictorCSLee","text":"Victor C. S. Lee"}]},"title":"DEME: Decouple packet marking from enqueuing for multiple services in data center networks.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GaoL16","doi":"10.1109/ICNP.2016.7784465","ee":"https://doi.org/10.1109/ICNP.2016.7784465","url":"https://dblp.org/rec/conf/icnp/GaoL16"}, "url":"URL#3277080" }, { "@score":"1", "@id":"3277081", "info":{"authors":{"author":[{"@pid":"133/3857","text":"Chenfei Gao"},{"@pid":"119/2621","text":"Gozde Ozcan"},{"@pid":"181/2667-8","text":"Jian Tang 0008"},{"@pid":"54/5244","text":"Mustafa Cenk Gursoy"},{"@pid":"59/803","text":"Weiyi Zhang"}]},"title":"R-Cloud: A cloud framework for enabling Radio-as-a-Service over a wireless substrate.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GaoOTGZ16","doi":"10.1109/ICNP.2016.7784444","ee":"https://doi.org/10.1109/ICNP.2016.7784444","url":"https://dblp.org/rec/conf/icnp/GaoOTGZ16"}, "url":"URL#3277081" }, { "@score":"1", "@id":"3277082", "info":{"authors":{"author":[{"@pid":"116/0691","text":"Mahanth Gowda"},{"@pid":"138/3618","text":"Nirupam Roy"},{"@pid":"19/6964","text":"Romit Roy Choudhury"},{"@pid":"n/SrihariNelakuditi","text":"Srihari Nelakuditi"}]},"title":"Compressing backoff in CSMA networks.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GowdaRCN16","doi":"10.1109/ICNP.2016.7784437","ee":"https://doi.org/10.1109/ICNP.2016.7784437","url":"https://dblp.org/rec/conf/icnp/GowdaRCN16"}, "url":"URL#3277082" }, { "@score":"1", "@id":"3277083", "info":{"authors":{"author":[{"@pid":"141/1963","text":"Gaoyang Guan"},{"@pid":"92/748-1","text":"Wei Dong 0001"},{"@pid":"38/4304-1","text":"Yi Gao 0001"},{"@pid":"50/3147","text":"Jiajun Bu"}]},"title":"Towards rapid and cost-effective prototyping of IoT platforms.","venue":"ICNP","pages":"1-5","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GuanDGB16","doi":"10.1109/ICNP.2016.7785320","ee":"https://doi.org/10.1109/ICNP.2016.7785320","url":"https://dblp.org/rec/conf/icnp/GuanDGB16"}, "url":"URL#3277083" }, { "@score":"1", "@id":"3277084", "info":{"authors":{"author":[{"@pid":"118/8129","text":"Xiang-Fa Guo"},{"@pid":"146/7888","text":"Hande Hong"},{"@pid":"28/6329","text":"Mun Choon Chan"},{"@pid":"86/2160","text":"Li-Shiuan Peh"}]},"title":"Poster abstract: Long-term observation with passive Wi-Fi scanning.","venue":"ICNP","pages":"1-2","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GuoHCP16","doi":"10.1109/ICNP.2016.7784472","ee":"https://doi.org/10.1109/ICNP.2016.7784472","url":"https://dblp.org/rec/conf/icnp/GuoHCP16"}, "url":"URL#3277084" }, { "@score":"1", "@id":"3277085", "info":{"authors":{"author":[{"@pid":"191/7787","text":"Linqi Guo"},{"@pid":"142/4208","text":"John Z. F. Pang"},{"@pid":"75/6446","text":"Anwar Walid"}]},"title":"Dynamic Service Function Chaining in SDN-enabled networks with middleboxes.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GuoPW16","doi":"10.1109/ICNP.2016.7784431","ee":"https://doi.org/10.1109/ICNP.2016.7784431","url":"https://dblp.org/rec/conf/icnp/GuoPW16"}, "url":"URL#3277085" }, { "@score":"1", "@id":"3277086", "info":{"authors":{"author":[{"@pid":"161/4522","text":"Andrey Gushchin"},{"@pid":"181/9131","text":"Shih-Hao Tseng"},{"@pid":"85/4619","text":"Ao Tang"}]},"title":"Optimization-based network flow deadline scheduling.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/GushchinTT16","doi":"10.1109/ICNP.2016.7784415","ee":"https://doi.org/10.1109/ICNP.2016.7784415","url":"https://dblp.org/rec/conf/icnp/GushchinTT16"}, "url":"URL#3277086" }, { "@score":"1", "@id":"3277087", "info":{"authors":{"author":[{"@pid":"03/283","text":"Takeru Inoue"},{"@pid":"27/5891","text":"Richard Chen"},{"@pid":"129/1046","text":"Toru Mano"},{"@pid":"87/11527","text":"Kimihiro Mizutani"},{"@pid":"184/3474","text":"Hisashi Nagata"},{"@pid":"65/462","text":"Osamu Akashi"}]},"title":"An efficient framework for data-plane verification with geometric windowing queries.","venue":"ICNP","pages":"1-10","year":"2016","type":"Conference and Workshop Papers","access":"closed","key":"conf/icnp/InoueCMMNA16","doi":"10.1109/ICNP.2016.7784412","ee":"https://doi.org/10.1109/ICNP.2016.7784412","url":"https://dblp.org/rec/conf/icnp/InoueCMMNA16"}, "url":"URL#3277087" } ] } } } )