


default search action
23rd ICCCN 2014: Shanghai, China
- 23rd International Conference on Computer Communication and Networks, ICCCN 2014, Shanghai, China, August 4-7, 2014. IEEE 2014, ISBN 978-1-4799-3572-7

- Junzhao Du, Sicong Liu, Chi Xu, Kai Wang, Hui Liu, Kewei Sha

:
Lightweight construction of the information potential field in wireless sensor networks. 1-8 - Sadaf Yasmin, Rao Naveed Bin Rais

, Amir Qayyum:
A multi-attribute routing protocol for opportunistic network environments. 1-6 - Qi Liao, Zhen Li, Aaron Striegel

:
Is more P2P always bad for ISPs? An analysis of P2P and ISP business models. 1-6 - Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Wenlong Chen:

HSR: Using hybrid source routing to achieve scalable Internet routing. 1-8 - Shenglin Zhang

, Ying Liu, Dan Pei
:
A measurement study on BGP AS path looping (BAPL) behavior. 1-7 - Jia Lu, Biao Han

, Wei Yang, Yuanming Gao, Wenhua Dou:
Smart error estimating coding: Using symbol error structure in wireless networks. 1-7 - Kuien Liu, Yaguang Li, Zhiming Ding, Shuo Shang, Kai Zheng:

Benchmarking big data for trip recommendation. 1-6 - Shuai Gao, Yujing Zeng, Hongbin Luo, Hongke Zhang:

Scalable area-based hierarchical control plane for software defined information centric networking. 1-7 - Xin Su, Jie Zeng, Chiyang Xiao:

Key technologies for SON in next generation radio access networks. 1-8 - Zhongxing Ming, Mingwei Xu, Dan Wang

:
Age-based cooperative caching in information-centric networking. 1-8 - Chenguang Kong, Xiaojun Cao

:
Semi-controlled authorized information dissemination in content-based social networks. 1-6 - Majid Khonji

, Sid Chi-Kin Chau
, Khaled M. Elbassioni
:
Inapproximability of power allocation with inelastic demands in AC electric systems and networks. 1-6 - Bingshuang Liu, Skyler Berg, Jun Li, Tao Wei, Chao Zhang, Xinhui Han:

The store-and-flood distributed reflective denial of service attack. 1-8 - Xiongqi Wu, James Griffioen:

Supporting application-based route selection. 1-8 - Wenbin Tang, Xiaowei Wu

, T.-H. Hubert Chan:
An incentive protocol for distributed dynamic P2P video-on-demand streaming. 1-6 - Xiang Wang, Zhi Liu, Jun Li, Baohua Yang, Yaxuan Qi:

Tualatin: Towards network security service provision in cloud datacenters. 1-8 - Kaliappa Ravindran, Michael Iannelli

:
SLA evaluation in cloud-based data-centric distributed services. 1-8 - Der-Rong Din, Chih-Wei Chou:

Virtual-topology adaptation for mixed-line-rate optical WDM networks under dynamic traffic. 1-6 - Binzhang Fu, Sheng Xu, Wentao Bao, Guolong Jiang, Mingyu Chen, Lixin Zhang, Yidong Tao, Rui He, Junfeng Zhao:

Dandelion: A locally-high-performance and globally-high-scalability hierarchical data center network. 1-8 - Toru Mano, Takeru Inoue, Dai Ikarashi, Koki Hamada, Kimihiro Mizutani

, Osamu Akashi:
Efficient virtual network optimization across multiple domains without revealing private information. 1-8 - Xinming Zhang

, Haitao Zhu, Guoqing Qiu:
Optimal physical carrier sensing to defend against exposed terminal problem in wireless ad hoc networks. 1-6 - Kebina Manandhar, Ben Adcock

, Xiaojun Cao
:
Preserving the Anonymity in MobilityFirst networks. 1-6 - Ashley D. Lloyd, P. H. W. Li, Mario Antonioletti, Terence M. Sloan

:
Using global research infrastructure with big (commercial) data: Modelling consumer behaviour in China. 1-6 - Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng:

Feedback-based smartphone strategic sampling for BYOD security. 1-8 - Zane Wei, Da-Qi Ren:

Review of energy aware big data computing measurements, benchmark methods and performance analysis. 1-4 - Thai Duong, Thinh P. Nguyen:

Fast Markov Decision Process for data collection in sensor networks. 1-8 - Mayssaa El Rifai, Pramode K. Verma:

An IEEE 802.11 quantum handshake using the three-stage protocol. 1-6 - Chi-Chung Cheung, Hon-Wai Chu

, Sean Shensheng Xu
:
A new optimization algorithm for power saving in backbone networks. 1-6 - Waltenegus Dargie

:
Estimation of the cost of VM migration. 1-8 - Quangang Li

, Jinqiao Shi, Tingwen Liu
, Li Guo, Zhiguang Qin:
A probabilistic approach towards modeling email network with realistic features. 1-8 - Hong Zhang, Kaiping Xue

, Peilin Hong, Sean Shen:
Congestion exposure enabled TCP with network coding for hybrid wired-wireless network. 1-8 - Joshua A. Alcorn, C. Edward Chow:

A framework for large-scale modeling and simulation of attacks on an OpenFlow network. 1-6 - Yuhao Wen, Zhen Chen, Ge Ma, Junwei Cao, Wenxun Zheng, Guodong Peng, Shiwei Li, Wen-Liang Huang:

SECOMPAX: A bitmap index compression algorithm. 1-7 - Zoran Despotovic, Artur Hecker

, Ahsan Naveed Malik, Riccardo Guerzoni, Ishan Vaishnavi, Riccardo Trivisonno
, Sergio Beker:
VNetMapper: A fast and scalable approach to virtual networks embedding. 1-6 - Lixing Song, Shaoen Wu:

Cross-layer wireless information security. 1-9 - Panagiotis Georgopoulos, Matthew Broadbent

, Bernhard Plattner, Nicholas J. P. Race
:
Cache as a service: Leveraging SDN to efficiently and transparently support video-on-demand on the last mile. 1-9 - Kebina Manandhar, Xiaojun Cao

:
Attacks/faults detection and isolation in the Smart Grid using Kalman Filter. 1-6 - Ling Guo, Donghyun Kim, Deying Li, Wenping Chen, Alade O. Tokuta:

Constructing belt-barrier providing β-quality of monitoring with minimum camera sensors. 1-8 - Xinming Zhang

, Zhilong Dai, Haitao Zhu:
Channel reservation based on contention and interference in wireless ad hoc networks. 1-8 - Long Yao, Peilin Hong, Wei Zhou:

Evaluating the controller capacity in software defined networking. 1-6 - Longfei Wu

, Xiaojiang Du, Jie Wu:
MobiFish: A lightweight anti-phishing scheme for mobile phones. 1-8 - Rabia Noor Enam, Rehan Qureshi

:
An adaptive data aggregation technique for dynamic cluster based Wireless Sensor Networks. 1-7 - Zhe Fu, Kai Wang, Liangwei Cai, Jun Li:

Intelligent grouping algorithms for regular expressions in deep inspection. 1-8 - Xiang Lan, Sanfeng Zhang:

MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN. 1-8 - Guang Yao, Jun Bi, Tao Feng, Peiyao Xiao, Duanqi Zhou:

Performing software defined route-based IP spoofing filtering with SEFA. 1-8 - Xinming Zhang

, Bo Yang, Yangyang Ma:
TCP congestion control based on accurate bandwidth-delay product in wireless Ad hoc networks. 1-7 - Lei Xie, Xiaoning Zhang, Sheng Wang:

An energy efficient algorithm based on multi-topology routing in IP networks. 1-8 - Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han:

MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph. 1-7 - Lan Wei, Wenbo Lian, Kuien Liu, Yongji Wang:

Hippo: An enhancement of pipeline-aware in-memory caching for HDFS. 1-5 - Jiangling Yin, Andrew Foran, Xuhong Zhang, Jun Wang

:
ScalScheduling: A Scalable Scheduling Architecture for MPI-based interactive analysis programs. 1-8 - Chaozhu Zhang, Nairui Li:

The design and implementation of UAT mode ADS-B signal's RS decoder. 1-6 - Xin Xie

, Keqiu Li, Xiulong Liu:
An unknown tag identification protocol based on coded filtering vector in large scale RFID systems. 1-8 - Xuanxia Yao

, Xiaoguang Han, Xiaojiang Du:
A light-weight certificate-less public key cryptography scheme based on ECC. 1-8 - Jianjun Yang, Zongming Fei, Bryson Payne

, Le Li, Markus A. Hitz, Tongquan Wei:
Location aided energy balancing strategy in green cellular networks. 1-6 - XiaoHua Xu, Min Song:

Stable wireless link scheduling subject to physical interference with power control. 1-8 - Sucheng Fan, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Yi Qian:

A security protocol for wireless sensor networks designed for monitoring smart grid transmission lines. 1-7 - António Furtado

, Luis Irio, Rodolfo Oliveira
, Luís Bernardo
, Rui Dinis
:
Characterization of the Spatial False Alarm effect in Cognitive Radio Networks. 1-8 - Zheng Guo, Feng Ye, Jinghong Guo, Yun Liang, Guoliang Xu, Xuping Zhang, Yi Qian:

A wireless sensor network for monitoring smart grid transmission lines. 1-6 - Baobao Zhang, Jun Bi, Jianping Wu:

LAS: An effective anti-spoofing method using existing information. 1-8 - Sha Yuan, Ding Tang, Yinlong Liu, Shuotian Bai, Tao Lin, Song Ci:

Context-aware distributed service provisioning based on anycast for information-centric network. 1-7 - Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim:

TCAM-based classification using divide-and-conquer for range expansion. 1-8 - Xiong Wang, Mengchao Ran:

Link weights migration without congestion in IP networks. 1-6 - Yao-Jen Tang, Jian-Jhih Kuo

, Ming-Jer Tsai:
Double-ruling-based location-free data replication and retrieval scheme in mobile ad hoc networks. 1-8 - Bin Tang, Neeraj Jaggi, Masaaki Takahashi:

Achieving data K-Availability in intermittently connected sensor networks. 1-8 - Yunlong Song, Min Liu:

Greedy-based distributed algorithms for green traffic routing. 1-8 - Arnaud Kaiser, Michael Boc:

Energy-efficient routing in IPv6 home networks. 1-8 - Uri Verner, Avi Mendelson, Assaf Schuster:

Scheduling periodic real-time communication in multi-GPU systems. 1-8 - Kun-Ting Chen, Chien Chen, Po-Hsiang Wang:

Network aware load-balancing via parallel VM migration for data centers. 1-8 - Kaustubh Dhondge, Baek-Young Choi

, Sejun Song, Hyungbae Park:
Optical Wireless authentication for smart devices using an onboard ambient light sensor. 1-8 - Xinjie Guan, Baek-Young Choi

, Sejun Song:
Topology and migration-aware energy efficient virtual network embedding for green data centers. 1-8 - Huian Li, Abhishek Reddy Kankanala, Xukai Zou:

A taxonomy and comparison of remote voting schemes. 1-8 - Mayank Raj

, Krishna Kant, Sajal K. Das
:
E-DARWIN: Energy Aware Disaster Recovery Network using WiFi Tethering. 1-8 - Hengyi Wei, Baocheng Sun, Mingming Jing:

BalancedBoost: A hybrid approach for real-time network traffic classification. 1-6 - Mark Scanlon

, Huijie Shen:
An analysis of BitTorrent cross-swarm peer participation and geolocational distribution. 1-6 - Xinming Zhang

, Zhigang Duan, Lei Tao, Dan Keun Sung:
Localization algorithms based on a mobile anchor in wireless sensor networks. 1-6 - Jason Richmond, Jinhua Guo:

Pricing the Internet for congestion control and social welfare. 1-6 - Cherry Ye Aung, Peter Han Joo Chong

, Ruo Jun Cai:
Hybrid opportunistic routing in highly dynamic MANET. 1-6 - Abderrahmen Mtibaa, Khaled A. Harras

, Hussein M. Alnuweiri:
Malicious attacks in Mobile Device Clouds: A data driven risk assessment. 1-8 - Chenxi Zhou, Yuchun Guo, Yishuai Chen, Xiaofei Nie, Wei Zhu:

Characterizing user watching behavior and video quality in mobile devices. 1-6 - Masaki Tagawa, Yutaro Wada, Yuzo Taenaka, Kazuya Tsukamoto:

Network capacity expansion methods based on efficient channel utilization for multi-channel wireless backbone network. 1-6 - Yan Liu, Xin Xu, Xi Ding, Yong Cui:

Localized routing optimization for multi-access Mobile Nodes in PMIPv6. 1-5 - Qian Hu, Yang Wang, Xiaojun Cao

:
Virtual network embedding: An optimal decomposition approach. 1-6 - Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li:

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. 1-8 - Kaliappa Ravindran:

Software cybernetics to manage adaptation behavior of complex network systems. 1-8 - Anhua Lin, Jianzhong Zhang, Kai Lu, Wen Zhang:

An efficient outdoor localization method for smartphones. 1-8 - Dan Ni, Kaiping Xue

, Peilin Hong, Sean Shen:
Fine-grained Forward Prediction based Dynamic Packet Scheduling Mechanism for multipath TCP in lossy networks. 1-7 - Xinming Zhang

, Fan Yan, Lei Tao, Dan Keun Sung:
Optimal candidate set for opportunistic routing in asynchronous wireless sensor networks. 1-8 - Yanan Liu, Lei Mao, Lein Harn, Yi Wang:

Group key distribution with full-healing property. 1-6 - Jiajun Zhu, Bang Wang:

Sensor placement algorithms for confident information coverage in wireless sensor networks. 1-7 - Kotaro Kataoka

, Nitin Agarwal, Aditya V. Kamath:
Scaling a broadcast domain of Ethernet: Extensible transparent filter using SDN. 1-8 - Kewei Sha, Chenguang Xu, Zhiwei Wang:

One-time symmetric key based cloud supported secure smart meter reading. 1-6 - Eunsang Cho

, Jaeyoung Choi, Donghyun Kim, Jongsoon Yoon, Ted Taekyoung Kwon, Yanghee Choi:
LOCON: A lookup-based content-oriented networking framework. 1-8 - Qingsong Liu, Yifan Hu:

MicroEye: Visual summary of microblogsphere from the eye of celebrities. 1-6 - Ying Mao, Jiayin Wang, Joseph Paul Cohen

, Bo Sheng
:
PASA: Passive broadcast for smartphone ad-hoc networks. 1-8 - Feixiong Zhang, Yanyong Zhang, Alex Reznik, Hang Liu, Chen Qian, Chenren Xu:

A transport protocol for content-centric networking with explicit congestion control. 1-8 - Yanan Chang, Xiaohua Jia

:
Rate-adaptive broadcast routing and scheduling for video streaming in wireless mesh networks. 1-8 - Ke Liu, Jack Y. B. Lee:

Uplink delay variation compensation in queue length estimation over mobile data networks. 1-8 - Liang Chen, Yipeng Zhou

, Dah-Ming Chiu:
A lifetime model of online video popularity. 1-8 - Shuang Liang, Xiaojiang Du, Chiu C. Tan, Wei Yu

:
An effective online scheme for detecting Android malware. 1-8 - Xinming Zhang

, Kaiheng Chen, Yue Zhang, Dan Keun Sung:
A probabilistic broadcast algorithm based on the connectivity information of predictable rendezvous nodes in mobile ad hoc networks. 1-6 - Chow-Sing Lin, Jhe-Wei Lin:

Streaming videos over BitTorrent by balancing playback continuity and distribution of piece rareness. 1-5 - Kun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin:

Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly. 1-6 - Shen Li, Lu Su, Yerzhan Suleimenov, Hengchang Liu, Tarek F. Abdelzaher, Guihai Chen

:
Centaur: Dynamic message dissemination over online social networks. 1-8 - Xiao Zhao, Hancheng Lu:

Adaptive hybrid digital-analog video transmission in wireless mobile networks. 1-7 - Guangyu Li, Lila Boukhatem:

An Intersection-based Delay sensitive routing for VANETs using ACO algorithm. 1-8 - Jonathan D. Backens, Min Song, Chunsheng Xin:

A transparent spectrum co-access protocol for cognitive radio networks. 1-8 - Wen Wu

, Xu Li, Huarui Yin, Guo Wei:
A joint real grassmannian quantization strategy for MIMO interference alignment with limited feedback. 1-6 - Wenzhe Zhang, Zhenquan Qin, Jiajun Xin, Lei Wang, Ming Zhu, Liang Sun, Lei Shu

:
UPMAC: A localized load-adaptive MAC protocol for underwater acoustic networks. 1-8 - Cheng Cui, Lin Xue, Chui-Hui Chiu, Praveenkumar Kondikoppa, Seung-Jong Park

:
DMCTCP: Desynchronized Multi-Channel TCP for high speed access networks with tiny buffers. 1-8 - Xiaojiang Ren, Weifa Liang

, Wenzheng Xu:
Maximizing charging throughput in rechargeable sensor networks. 1-8 - Shouxi Luo, Hongfang Yu, Lemin Li:

Fast incremental flow table aggregation in SDN. 1-8 - Ming Zhu, Dan Li, Ying Liu, Jianping Wu:

CDRDN: Content Driven Routing in Datacenter Network. 1-8 - Alok N. Choudhary, John C. S. Lui, Keith W. Ross:

Keynote speakers: Big data science and social networks - Accelerating insights and building value. 1-3 - Sujie Shao, Shao-Yong Guo, Xuesong Qiu, Luoming Meng:

A random switching traffic scheduling algorithm in wireless smart grid communication network. 1-6 - Ahmad Foroozani, Mohammed Gharib

, Ali Mohammad Afshin Hemmatyar, Ali Movaghar
:
A novel human mobility model for MANETs based on real data. 1-7 - Zain ul Abidin Jaffri

, Yueping Cai:
ZET: Zone and energy threshold based clustering routing protocol for Wireless Sensor Networks. 1-6 - Kyung-Hwa Kim, Hyunwoo Nam, Vishal Kumar Singh, Daniel Song, Henning Schulzrinne:

DYSWIS: Crowdsourcing a home network diagnosis. 1-10 - Hong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang:

Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach. 1-6 - Wenqi Sun, Hewu Li, Jianping Wu:

Channel assignment based on conflict-area for reducing interference in large-scale WLANs. 1-5 - Jiajun Sun, Huadong Ma:

Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets. 1-8 - Soumya Hegde, Raksha Srinivas, Dinil Mon Divakaran, Mohan Gurusamy

:
Dynamic embedding of virtual networks in hybrid optical-electrical datacenters. 1-8 - Jun Huang, Yanxiao Zhao, Kazem Sohraby:

Resource allocation for intercell device-to-device communication underlaying cellular network: A game-theoretic approach. 1-8 - Hao Wang, Yangming Zhao, Haibing Guan:

On pricing schemes in data center network with game theoretic approach. 1-8 - Yimin Zhang, Guizhong Liu:

JCCA resource allocation for video transmission in OFDMA relay system. 1-7 - Sheng Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu:

Leveraging tenant flexibility in resource allocation for virtual networks. 1-8 - Shaoen Wu, Saad Biaz:

Auto bit rate adaptation with transmission failure diagnosis for WLANs. 1-8 - Lei Meng, Shu Liu, Aaron D. Striegel

:
Characterizing the utility of smartphone background traffic. 1-5 - Guozi Sun, Siqi Huang, Wan Bao, Yitao Yang, Zhiwei Wang:

A privacy protection policy combined with privacy homomorphism in the Internet of Things. 1-6 - Rui Deng, Guizhong Liu, Jian Yang:

Utility based optimized cross-layer scheduling for real-time video over HSDPA. 1-6 - Hongbin Luo, Jianbo Cui, Gong Chen, Zhe Chen, Hongke Zhang:

On the applicability of software defined networking to large scale networks. 1-6 - Jiapeng Zhang, Yingfei Dong:

Utilizing path dynamics for delay assurance in synchronized multihop scheduling. 1-6 - Levi Malott, Sriram Chellappan:

Investigating the fractal nature of individual user netflow data. 1-6 - Wei Liu, E. K. Park, S. S. Zhu:

e-Health PST (privacy, security and trust) mobile networking infrastructure. 1-6 - Yanxiao Zhao, Md Nashid Anjum, Min Song:

A new interference model for the IEEE 802.22 cognitive WRAN. 1-8 - Ming Zhu, Zhiping Cai, Dong Zhao, Junhui Wang, Ming Xu:

Using multiple unmanned aerial vehicles to maintain connectivity of MANETs. 1-7 - Ji Li, Yuanyuan Yang

, Cong Wang:
Mobility Assisted Data Gathering in heterogeneous energy replenishable wireless sensor networks. 1-8 - Georg Wimmer:

Transient magnetic field formulation for solid source conductors with axial symmetry. 1-4 - Quanlong Li, Qing Yang, Shaoen Wu:

Multi-bit sensing based target localization (MSTL) algorithm in wireless sensor networks. 1-7 - Abhishek Parakh, Pramode K. Verma:

Improving the efficiency of entanglement based quantum key exchange. 1-6 - Ruiyun Yu, Pengfei Wang, Zhijie Zhao:

NDI: Node-dependence-based Dynamic gaming Incentive algorithm in opportunistic networks. 1-8 - Sulabh Bhattarai, Stephen Rook, Linqiang Ge, Sixiao Wei, Wei Yu

, Xinwen Fu
:
On simulation studies of cyber attacks against LTE networks. 1-8 - Min Yao, Chuang Lin:

An online mechanism for dynamic instance allocation in reserved instance marketplace. 1-8 - You Wang, Jun Bi:

A solution for IP mobility support in software defined networks. 1-8 - Aamir Saeed, Jens Myrup Pedersen

, Rasmus Løvenstein Olsen:
QoE loss score value for service migration in context aware environment. 1-5 - Dan Liao, Gang Sun

, Vishal Anand, Kexiang Xiao, Mao Gan:
Cost efficient survivable multicast virtual network design. 1-7 - Scott T. Rager, Ertugrul N. Ciftcioglu, Thomas F. La Porta:

Performance analysis of practical distributed backpressure protocols. 1-8 - Xiaoli Huan, Bang Wang, Yijun Mo:

Placement of rechargeable routers based on proportional fairness in green mesh networks. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














