View
14
Download
0
Category
Preview:
Citation preview
IEEE INFOCOM 2014 - IEEE
Conference on ComputerCommunications
Toronto, Ontario, Canada
27 April - 2 May 2014
Pages 952-1904
IEEE Catalog Number: CFP14INF-POD
ISBN: 978-1-4799-3361-7
2/3
An Overlay Automata Approach to Regular Expression MatchingAlex X. Liu (Michigan State University, USA); EricTorng (Michigan State University, USA)pp. 952-960
PNL1: Panel 1
SIM 2: Sensor networks 2
Walking down the STAIRS: Efficient Collision Resolution for Wireless Sensor Networks
Xiaoyu Ji (Hong Kong University of Science and Technology, Hong Kong); Yuan He (TsinghuaUniversity, P.R. China); Jiliang Wang (Tsinghua University, P.R. China); Wei Dong (ZhejiangUniversity, P.R. China); Xiaopei Wu (Tsinghua University, P.R. China); Yunhao Liu (TsinghuaUniversity &The Hong Kong University of Science and Technology, P.R. China)pp. 961-969
Critical Sensing Range for Mobile Heterogeneous Camera Sensor Networks
Yitao Hu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University,P.R. China); Xiaoying Gan (Shanghai Jiao Tong University, P.R. China)pp. 970-978
Bounded Stretch Geographic Homotopic Routing in Sensor Networks
Kan Huang (State University of New York at Stony Brook, USA); Chien-Chun Ni (Stony Brook
University, USA); Rik Sarkar (University of Edinburgh, United Kingdom); Jie Gao (Stony Brook
University, USA); Joseph Mitchell (SUNY Stony Brook, USA)pp. 979-987
Maximizing the Value ofSensed Information in Underwater Wireless Sensor Networks via an
Autonomous Underwater Vehicle
Stefano Basagni (Northeastern University, USA); Ladislau Boloni (University of Central Florida,USA); Petrika Gjanci (University of Rome "La Sapienza", Italy); Chiara Petrioli (University of Rome
"La Sapienza", Italy); Cynthia A Phillips (Sandia National Laboratories, USA); Damla Turgut(University of Central Florida, USA)pp. 988-996
WS1: Wireless security and privacy 1
SYNERGY: A Game-TheoreticalApproach for Cooperative Key Generation in Wireless Networks
Jingchao Sun (Arizona State University, USA); Xu Chen (Arizona State University, USA); Jinxue
Zhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA); Junshan
Zhang (Arizona State University, USA)pp. 997-1005
Utility-based Cooperative Decision in Cooperative Authentication
Yunchuan Guo (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China);Yin Lihua (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Licai Liu
(Beijing University of Posts and Telecommunications & Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Fang Binxing (Institute of Computing TechnologyChinese Academy of Sciences, P.R. China)pp. 1006-1014
Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a SystemsHanif Rahbari (University of Arizona, USA); Marwan Krunz (University of Arizona, USA); LoukasLazos (University of Arizona, USA)pp. 1015-1023
A New Efficient Physical LayerOFDM Encryption SchemeFei Huo (University of Waterloo, Canada); Guang Gong (University of Waterloo, Canada)pp. 1024-1032
CC5: Cloud computing 5
Consolidating Complementary VMs with Spatial/Temporal-awareness in Cloud DatacentersLiuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA)pp. 1033-1041
When Queueing Meets Coding: Optimal-Latency Data Retrieving Scheme in Storage Clouds
Shengbo Chen (Qualcomm R&D, USA); Yin Sun (the Ohio State University, USA); Ulas Can Kozat
(DOCOMO Innovations, USA); Longbo Huang (Tsinghua University, P.R. China); Prasun Sinha (OhioState University, USA); Guanfeng Liang (DOCOMO Innovations, USA); Xin Liu (UC Davis, USA);Ness B. Shroff (The Ohio State University, USA)pp. 1042-1050
Power Consumption of Virtual Machines with Network Transactions: Measurement and
Improvement
Ryan Shea (Simon Fraser University, Canada); Haiyang Wang (University of Minnesota at Duluth,USA); Jiangchuan Liu (Simon Fraser University, Canada)pp. 1051-1059
Can Mobile Cloudlets Support Mobile Applications?Yujin Li (North Carolina State University, USA); Wenye Wang (NC State University, USA)pp. 1060-1068
CN1: Cellular networks 1
Structured Spectrum Allocation and User Association in Heterogeneous Cellular Networks
Wei Bao (University of Toronto, Canada); Ben Liang (University of Toronto, Canada)pp. 1069-1077
Video Delivery over Heterogeneous Cellular Networks: Optimizing Cost and Performance
Konstantinos Poularakis (University of Thessaly, Greece); George Iosifidis (CERTH & University of
Thessaly, Greece); Antonios Argyriou (University of Thessaly & CERTH, Greece); Leandros Tassiulas
(University of Thessaly, Greece)pp. 1078-1086
Cell Planning for Heterogeneous Networks: An Approximation AlgorithmWentao Zhao (Nanjing University, P.R. China); Shaowei Wang (Nanjing University, P.R. China);Chonggang Wang (InterDigital Communications, USA); Xiaobing Wu (Nanjing University & National
Laboratory for Novel Software Technology, P.R. China)pp. 1087-1095
A College Admissions Game for Uplink User Association in Wireless Small Cell Networks
Walid Saad (Virginia Tech & Wireless@VT, USA); Zhu Han (University of Houston, USA); RongZheng (McMaster University, Canada); Merouane Debbah (Supelec, France); H. Vincent Poor
(Princeton University, USA)pp. 1096-1104
EE2: Energy efficiency in wireless networks 2
Safe Charging for Wireless Power Transfer
Haipeng Dai (Nanjing University & State Key Lab of Novel Software Technology, P.R. China);Yunhuai Liu (Third Research Institute of Ministry of Public Security, P.R. China); Guihai Chen
(Shanghai Jiao Tong University, P.R. China); Xiaobing Wu (Nanjing University & National
Laboratory for Novel Software Technology, P.R. China); Tian He (University of Minnesota, USA)pp. 1105-1113
Energy-efficient Cooperative Broadcast in Fading Wireless Networks
Chenxi Qiu (Clemson University, USA); Haiying Shen (Clemson University, USA); Lei Yu (Clemson
University, USA)pp. 1114-1122
Performance-aware Energy Optimization on Mobile Devices in Cellular Network
Yong Cui (Tsinghua University, P.R. China); Shihan Xiao (University of Tsinghua, P.R. China); Xin
Wang (Stony Brook University, USA); Minming Li (City University of Hong Kong, Hong Kong);Hongyi Wang (Tsinghua University, P.R. China); Zeqi Lai (Tsinghua University, P.R. China)
pp. 1123-1131
Microeconomic Analysis of Base-Station Sharing in Green Cellular Networks
Bingjie Leng (Tsinghua University, P.R. China); Parisa Mansourifard (University of Southern
California, USA); Bhaskar Krishnamachari (University of Southern California, USA)pp. 1132-1140
IM3: Internet monitoring and measurement 3
Optimal Collaborative Access Point Association in Wireless Networks
Ouldooz Baghban Karimi (Simon Fraser University, Canada); Jiangchuan Liu (Simon Fraser
University, Canada); Jennifer Rexford (Princeton University, USA)pp. 1141-1149
kBF: a Bloom Filter for Key-Value Storage with an Application on Approximate State
Sisi Xiong (University of Tennessee, Knoxville, USA); Yanjun Yao (University of Tennessee,
Knoxville, USA); Qing Cao (University of Tennessee, USA); Tian He (University of Minnesota, USA)pp. 1150-1158
Detecting Malicious HTTP Redirections Using Trees of User Browsing ActivityHesham Mekky (University of Minnesota, USA); Ruben Torres (Narus Inc., USA); Zhi-Li Zhang(University of Minnesota, USA); Sabyasachi Sana (Narus Inc., USA); Antonio Nucci (Narus inc.,USA)pp. 1159-1167
What Scale of Audience a Campaign can Reach in What Price on Twitter?
Yubao Zhang (College of William and Mary, USA); Xin Ruan (College of William and Mary, USA);
Haining Wang (College of William and Mary, USA); Hui Wang (National University of Defense
Technology, P.R. China)pp. 1168-1176
SN3: Sensor networks 3
How to identify global trends from local decisions? Event Region Detection on Mobile Networks
Andreas Loukas (Delft University of Technology, The Netherlands); Marco Zuniga (Delft Universityof Technology, The Netherlands); Ioannis Protonotarios (Delft University of Technology, The
Netherlands); Jie Gao (Stony Brook University, USA)pp. 1177-1185
Sleep in the Dins: Insomnia Therapy for Duty-cycled Sensor Networks
Jiliang Wang (Tsinghua University, P.R. China); Zhichao Cao (Tsinghua University, P.R. China);Xufei Mao (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University &The Hong KongUniversity of Science and Technology, P.R. China)pp. 1186-1194
Mobile-to-Mobile Energy Replenishment in Mission-Critical Robotic Sensor Networks
Liang He (Singapore University of Technology and Design, Singapore); Peng Cheng (SingaporeUniversity of Technology and Design, P.R. China); Yu Gu (Singapore University of Technology and
Design & Advanced Digital Sciences Center, Singapore); Jianping Pan (University of Victoria,Canada); Ting Zhu (State University of New York at Binghamton, USA);' Cong Liu (The University of
texas at Dallas, USA)pp. 1195-1203
Connected Wireless Camera Network Deployment with Visibility Coverage
Hua Huang (Temple University, USA); Chien-Chun Ni (Stony Brook University, USA); Jie Gao
(Stony Brook University, USA); Xiaomeng Ban (Stony Brook University, USA); Andrew Schneider
(Temple University, USA); Shan Lin (Temple University, USA)pp. 1204-1212
US: Urban sensing and environmental monitoring
How to Crowdsource Tasks Truthfully without Sacrificing Utility: Online Incentive Mechanisms
with Budget Constraint
Dong Zhao (Beijing University of Posts and Telecommunications, P.R. China); Xiang-Yang Li (IllinoisInstitute of Technology, USA); Huadong Ma (Beijing University of Posts and Telecommunications,P.R. China)pp. 1213-1221
Compressive Sensing over Strongly Connected Digraph and Its Transportation Monitoring
Application
Xiao Qi (Tsinghua University, P.R. China); Yongcai Wang (Tsinghua University, P.R. China);Yuexuan Wang (The University of Hong Kong & Tsinghua University, P.R. China); Liwen Xu
(Tsinghua University, P.R. China)pp. 1222-1230
TRAC: Truthful Auction for Location-Aware Collaborative Sensing in Mobile CrowdsourcingZhenni Feng (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Qian Zhang (Hong Kong University of Science and Technology, HongKong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong); Athanasios V.
Vasilakos (National Technical University of Athens & Kuwait University, Greece)pp. 1231-1239
ShopProfiler: Profiling Shops with Crowdsourcing Data
Xiaonan Guo (Singapore Management University, Singapore); Eddie Chan (The Hong KongUniversity of Science and Technology, Hong Kong); Ce Liu (University of Pittsburgh, USA); Kaishun
Wu (HKUST & Sun Yat-sen University, Hong Kong); Siyuan Liu (Carnegie Mellon University, USA);Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 1240-1248
WS2: Wireless security and privacy 2
PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions
Zhili Chen (University of Science and Technology of China, P.R. China); Liusheng Huang (Universityof Science and Technology of China, P.R. China); Lu Li (University of Science and Technology of
China, P.R. China); Wei Yang (University of Science and Technology of China, P.R. China); Haibo
Miao (University of Science and Technology of China, P.R. China); Miaomiao Tian (University of
Science and Technology of China, P.R. China); Fei Wang (Suzhou Institute for Advanced Study,
USTC & NHPCC, USTC, P.R. China)pp. 1249-1257
Information Leaks Out: Attacks and Countermeasures on Compressive Data Gathering in
Wireless Sensor Networks
Pengfei Hu (University of California, Davis, USA); Kai Xing (University of Science and Technology of
China, P.R. China); Xiuzhen Cheng (George Washington Univ, USA); Hao Wei (The Chinese
University of Hong Kong, Hong Kong); Haojin Zhu (Shanghai Jiao Tong University, P.R. China)pp. 1258-1266
Secure Cooperative Spectrum Sensing and Access Against Intelligent Malicious Behaviors
Wei Wang (Zhejiang University, P.R. China); Lin Chen (The University of Paris-Sud, France); KangG. Shin (University of Michigan, USA); Lingjie Duan (Singapore University of Technology and
Design (SUTD), Singapore)pp. 1267-1275
Physical Layer Challenge-Response Authentication in Wireless Networks with RelayXianru Du (University of Michigan - Dearborn, USA); Dan Shan (GM Research, USA); Kai Zeng(University of Michigan - Dearborn, USA); Lauren Huie (Air Force Research Lab, USA)pp. 1276-1284
CC6: Cloud computing 6
A Deep Investigation Into Network Performance in Virtual Machine Based Cloud Environment
Ryan Shea (Simon Fraser University, Canada); Feng Wang (The University of Mississippi, USA);Haiyang Wang (University of Minnesota at Duluth, USA); Jiangchuan Liu (Simon Fraser University,
Canada)pp. 1285-1293
RIAL: Resource Intensity Aware Load Balancing in Clouds
Liuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA); Karan Sapra(Clemson University, USA)pp. 1294-1302
Optimal Approximation Algorithm of Virtual Machine Placement for Data Latency Minimization
in Cloud SystemsJian-Jhih Kuo (National Tsing Hua University, Taiwan); Hsiu-Hsien Yang (National Tsing Hua
University, Taiwan); Ming-JerTsai (National Tsing Hua University, Taiwan)pp. 1303-1311
Using Stop-and-Wait to Improve TCP Throughput in Fast Optical Switching (FOS) Networks
over Short Physical Distances
Pablo Jesus Argibay-Losada (SUNY at Buffalo, USA); Kseniia Nozhnina (State University of
Information and Communication Technologies, Ukraine); Gokhan Sahin (University of Aveiro,
Portugal); Chunming Qiao (State University of New York at Buffalo, USA)pp. 1312-1320
CN2: Cellular networks 2
"Wireless Networks Without Edges": Dynamic Radio Resource Clustering and User SchedulingYuhuan Du (University of Texas at Austin, USA); Gustavo de Veciana (The University of Texas at
Austin, USA)pp. 1321-1329
Cellular Multi-Coverage with Non-uniform Rates
Omer Gurewitz (Ben Gurion University, Israel); Yakov Sandomirsky (Ben Gurion University of the
Negev, Israel); Gabriel Scalosub (Ben-Gurion University, Israel)pp. 1330-1338
Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and AlgorithmsRobert Margolies (Columbia University, USA); Ashwin Sridharan (AT&T, USA); Vaneet Aggarwal(AT&T Labs - Research, USA); Rittwik Jana (AT&T Labs Research, USA); Nemmara K.
Shankaranarayanan (AT&T Laboratories - Research, USA); Vinay A. Vaishampayan (DIMACS,Rutgers University & Columbia University, USA); Gil Zussman (Columbia University, USA)pp. 1339-1347
User Mobility from the View of Cellular Data Networks
Ying Zhang (Ericsson Research, USA)pp. 1348-1356
EE3: Energy efficiency in wireless networks 3
Energy Efficient Wifi Tethering on a SmartphoneKyoung-Hak Jung (Pohang University of Science and Technology (POSTECH), Korea); Yuepeng Qi(Pohang University of Science and Technology (POSTECH), Korea); Chansu Yu (Cleveland State
University, USA); Young-Joo Suh (Pohang University of Science and Technology (POSTECH), Korea)pp. 1357-1365
Fair Energy-efficient Sensing Task Allocation in Participatory Sensing with SmartphonesQingwen Zhao (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University, P.R. China); Jian Cao
(Shanghai Jiaotong University, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.
China); Bo Li (Hong Kong University of Science and Technology, Hong Kong)pp. 1366-1374
Improved Structures for Data Collection in Wireless Sensor Networks
Jon Crowcroft (University of Cambridge, United Kingdom); Michael Segal (Ben-Gurion University of
the Negev, Israel); Liron Levin (Ben-Gurion University of the Negev, Israel)pp. 1375-1383
Energy-Efficient Capacity Optimization in Wireless Networks
Lu Liu (Illinois Institute of Technology, USA); Xianghui Cao (Illinois Institute of Technology &
Zhejiang University, USA); Yu Cheng (Illinois Institute of Technology, USA); Lili Du (IllinoisInstitute of Technology, USA); Wei Song (University of New Brunswick, Canada); Yu Wang
(University of North Carolina at Charlotte, USA)pp. 1384-1392
FN: Firewalls and network intrusion detection
ProWord: An Unsupervised Approach to Protocol Feature Word Extraction
Zhuo Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Zhibin
Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Patrick Pak-
Ching Lee (The Chinese University of Hong Kong, Hong Kong); Yunjie Liu (Beijing University of
Posts and Telecommunications, P.R. China); Gaogang Xie (Institute of Computing Technology,Chinese Academy of Sciences, P.R. China)pp. 1393-1401
TorWard: Discovery of Malicious Traffic over Tor
Zhen Ling (Southeast University, P.R. China); Luo Junzhou (Southeast University, P.R. China); Kui
Wu (University of Victoria, Canada); Wei Yu (Towson University, USA); Xinwen Fu (University of
Massachusetts Lowell, USA)pp. 1402-1410
Transductive Malware Label Propagation: Find Your Lineage From Your NeighborsDeguang Kong (University of Texas at Arlington, USA); Guanhua Yan (Los Alamos National
Laboratory, USA)pp. 1411-1419
LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in
Network Data Streams
Qun Huang (The Chinese University of Hong Kong, P.R. China); Patrick Pak-Ching Lee (The Chinese
University of Hong Kong, Hong Kong)pp. 1420-1428
IM4: Internet monitoring and measurement 4
Bloom Tree: A Search Tree Based on Bloom Filters for Multiple-Set Membership Testing
MyungKeun Yoon (Kookmin University, Korea); JinWoo Son (Kookmin University, Korea); Seon-Ho
Shin (Kookmin University, Korea)pp. 1429-1437
A longitudinal analysis of Internet rate limitations
Joao Taveira Araujo (University College London, United Kingdom); Raul Landa (University College
London, United Kingdom); Richard G Clegg (University College London, United Kingdom); Kensuke
Fukuda (National Institute of Informatics, Japan); George Pavlou (University College London,United Kingdom)pp. 1438-1446
Monitor Placement for Maximal Identifiability in Network Tomography
Liang Ma (Imperial College London, United Kingdom); Ting He (IBM Research, USA); Kin K. Leung(Imperial College, United Kingdom); Ananthram Swami (Army Research Lab., USA); Don Towsley(University of Massachusetts at Amherst, USA)
pp. 1447-1455
* *
Can you SEE me now?"A Measurement Study of Mobile Video Calls
Chenguang Yu (Polytechnic Institute of NYU, USA); Yang Xu (Polytechnic Institute of NYU, USA); Bo
Liu (Polytechnic Institute of NYU, USA); Yong Liu (Polytechnic Institute of NYU, USA)pp. 1456-1464
SN4: Sensor networks 4
Optimal Link Scheduling for Delay-constrained Periodic Traffic over Unreliable Wireless Links
Yan Li (University of Otago, New Zealand); Haibo Zhang (Universtiy of Otago, New Zealand); ZhiyiHuang (University of Otago, New Zealand); Michael Albert (University of Otago, New Zealand)pp. 1465-1473
Approximate Multiple Count in Wireless Sensor Networks
Xiaolin Fang (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin Institute
Technology, P.R. China); Jianzhong Li (Harbin Institute of Technology, P.R. China); Yingshu Li
(Georgia State University, USA)pp. 1474-1482
EV-Sounding: A Visual Assisted Electronic Channel Sounding SystemGang Li (the Ohio State University, USA); Jin Teng (The Ohio State University, USA); Fan Yang (theOhio State University, USA); Adam C. Champion (The Ohio State University, USA); Dong Xuan (TheOhio State University, USA); Hong Luan (University of Jinan, P.R. China); Yuan Fang Zheng (TheOhio-state University, USA)pp. 1483-1491
Coverage in Visual Sensor Networks with Pan-Tilt-Zoom Cameras: the MaxFoV Problem
Vikram P. Munishwar (State University of New York at Binghamton, USA); Vinay Kolar (IBM
Research, India); Nael Abu-Ghazaleh (State University of New York at Binghamton, USA)pp. 1492-1500
WS3: Wireless security and privacy 3
How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets
Zhuo Lu (Intelligent Automation, Inc & North Carolina State University, USA); Wenye Wang (NCState University, USA); Cliff Wang (Army Research Office, USA)pp. 1501-1509
COLLECTOR: A Secure RFID-Enabled Batch Recall Protocol
Saiyu Qi (Hong Kong university of science and Technology, Hong Kong); Yuanqing Zheng (NanyangTechnological University, Singapore); Mo Li (Nanyang Technological University, Singapore); Li Lu
(University of Electronic Science and Technology of China, P.R. China); Yunhao Liu (TsinghuaUniversity &The Hong Kong University of Science and Technology, P.R. China)pp. 1510-1518
Analysis and Detection ofSIMbox Fraud in Mobility NetworksIlona Murynets (AT&T Security Research Center, USA); Michael Zabarankin (Stevens Institute of
Technology, USA); Roger Piqueras Jover (AT&T Security Research Center, USA); Adam Panagia(AT&T, USA)pp. 1519-1526
Scaling Laws for Secrecy Capacity in Cooperative Wireless Networks
Mahtab Mirmohseni (Sharif University of Technology, Iran); Panagiotis (Panos) Papadimitratos(KTH, Sweden)pp. 1527-1535
CN3: Cellular networks 3
Fast Resource Scheduling in HetNets with D2D SupportFrancesco Malandrino (Trinity College, Dublin, Ireland); Claudio E. Casetti (Politecnico di Torino,
Italy); Carla-Fabiana Chiasserini (Politecnico di Torino, Italy); Zana Limani (Politecnico di Torino,Italy)pp. 1536-1544
INDAPSON: An Incentive Data Plan Sharing System Based on Self-Organizing NetworkTuo Yu (Shanghai Jiaotong University, P.R. China); Zilong Zhou (Shanghai Jiao Tong University,P.R. China); Da Zhang (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (ShanghaiJiaotong University, P.R. China); Yunxin Liu (Microsoft Research Asia, P.R. China); Songwu Lu
(University of California at Los Angeles, USA)pp. 1545-1553
A Mean Field GameApproach to Scheduling in Cellular Systems
Mayank Manjrekar (Texas A&M University, USA); Vinod Ramaswamy (Texas A&M University, USA);Srinivas Shakkottai (Texas A&M University, USA)pp. 1554-1562
R2D2: Embracing Device-to-Device Communication in Next Generation Cellular Networks
Tarun Bansal (The Ohio State University, USA); Karthikeyan Sundaresan (NEC Labs America, USA);
Sampath Rangarajan (NEC Labs America, USA); Prasun Sinha (Ohio State University, USA)pp. 1563-1571
DC1: Data center networking 1
On Efficient Bandwidth Allocation for Traffic Variability in Datacenters
Jian Guo (Huazhong University of Science and Technology, P.R. China); Fangming Liu (HuazhongUniversity of Science and Technology, P.R. China); Xiaomeng Huang (Tsinghua University, P.R.
China); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong); Mi Hu (HuazhongUniversity of Science and Technology, P.R. China); Gao Qiao (Huazhong University of Science and
Technology, P.R. China); Hai Jin (Huazhong University of Science and Technology, P.R. China)pp. 1572-1580
RepFlow: Minimizing Flow Completion Times with Replicated Flows in Data Centers
Hong Xu (City University of Hong Kong & University of Toronto, Hong Kong); Baochun Li (Universityof Toronto, Canada)pp. 1581-1589
Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic PerspectiveMarco Chiesa (Roma Tre University, Italy); Guy Kindler (Hebrew University of Jerusalem, Israel);Michael Schapira (Hebrew University of Jerusalem, USA)pp. 1590-1598
Towards Performance-Centric Fairness in Datacenter Networks
Li Chen (University of Toronto, Canada); Yuan Feng (The Hong Kong Polytechnic University, Hong
Kong); Baochun Li (University of Toronto, Canada); Bo Li (Hong Kong University of Science and
Technology, Hong Kong)pp. 1599-1607
FT1: Fault tolerance and survivability 1
Geometric Evaluation ofSurvivability of Disaster-affected Network with Probabilistic Failure
Hiroshi Saito (NTT & NTT Network Technology Laboratories, Japan)
pp. 1608-1616
Keep Forwarding: Towards K-link Failure Resilient RoutingBaohua Yang (IBM Research, P.R. China); Junda Liu (University of California, Berkeley, USA); Scott
Shenker (U. C. Berkeley and ICSI, USA); Jun Li (Tsinghua University, P.R. China); Kai Zheng (IBMResearch, P.R. China)pp. 1617-1625
Restorable Logical Topology in the Face of No or Partial Traffic Demand KnowledgeReuven Cohen (Technion, Israel); Gabi Nakibly (National EW Research & Simulation Center, Israel)pp. 1626-1634
Max-Flow Min-Cut Theorem and Faster Algorithms in a Circular Disk Failure Model
Yusuke Kobayashi (University of Tokyo, Japan); Kensuke Otsuki (University of Tokyo, Japan)pp. 1635-1643
SB1: Scheduling and buffer management 1
Distributed Backup Scheduling: Modeling and OptimizationPeter M van de Ven (IBM Thomas J. Watson Research Center, USA); Bo Zhang (IBM T. J. Watson
Research Center, USA); Angela Schorgendorfer (IBM T. J. Watson Research Center, USA)pp. 1644-1652
Fast And Simple Approximation Algorithms for Maximum Weighted Independent Set of Links
Peng-Jun Wan (Illinois Institute of Technology, USA); Xiaohua Jia (City University of Hong Kong,Hong Kong); Guo-Jun Dai (School of Computer Science, Hangzhou DianZi University, P.R. China);Hongwei Du (Harbin Institute of Technology Shenzhen Graduate School, P.R. China); Ophir Frieder
(Georgetown University, USA)pp. 1653-1661
A High-order Markov Chain Based Scheduling Algorithm for Low Delay in CSMA Networks
Jaewook Kwak (North Carolina State University, USA); Chul-Ho Lee (North Carolina State
University, USA); Do Young Eun (North Carolina State University, USA)pp. 1662-1670
Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless Codes
Yin Sun (the Ohio State University, USA); Can Emre Koksal (The Ohio State University, USA); Kyu-Han Kim (Hewlett-Packard Laboratories, USA); Ness B. Shroff (The Ohio State University, USA)pp. 1671-1679
SCI: Social computing and networks 1
LBSNSim: Analyzing and Modeling Location-based Social Networks
Wei Wei (College of William and Mary, USA); Xiaojun Zhu (Nanjing University, P.R. China); Qun Li
(College of William and Mary, USA)pp. 1680-1688
On Designing Neighbor Discovery Protocols: A Code-Based ApproachTong Meng (Shanghai Jiao Tong University, P.R. China); Fan Wu (Shanghai Jiao Tong University,P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China)pp. 1689-1697
Assessment of Multi-Hop Interpersonal Trust in Social Networks by Three-Valued SubjectiveLogic
Guangchi Liu (Montana State University, USA); Qing Yang (Montana State University, USA);Honggang Wang (University of Massachusetts, Dartmouth & College of Engineering, USA);Xiaodong Lin (University of Ontario Institute of Technology, Canada); Mike P Wittie (Montana State
University, USA)pp. 1698-1706
FluidRating: A Time-Evolving Rating Scheme in Trust-based Recommendation Systems UsingFluid Dynamics
Wenjun Jiang (Central South University, P.R. China); Jie Wu (Temple University, USA); Guojun
Wang (Central South University, P.R. China); Huanyang Zheng (Temple University, USA)
pp. 1707-1715
SD: Software defined networking
On Diagnosis of Forwarding Plane via Static Forwarding Rules in Software Defined NetworksUlas Can Kozat (DOCOMO Innovations, USA); Guanfeng Liang (DOCOMO Innovations, USA); KorayKokten (Ozyegin University, Turkey)pp. 1716-1724
Software Defined Monitoring of Application Protocols
Lukas Kekely (CESNET a. I. e., Czech Republic); Viktor Pus (CESNET, Czech Republic); Jan Korenek
(Brno University of Technology & CESNET, Czech Republic)pp. 1725-1733
On the effect of forwarding table size on SDN network utilization
Rami Cohen (IBM Research - Haifa, Israel); Liane Lewin-Eytan (Yahoo! Research, Israel); Joseph(Seffi) Naor (Technion, Israel); Danny Raz (Technion, Israel)pp. 1734-1742
Software Defined Green Data Center Network with Exclusive RoutingDan Li (Tsinghua University, P.R. China); Yunfei Shang (Tsinghua University, P.R. China); CongjieChen (Tsinghua University, P.R. China)pp. 1743-1751
VN1: Vehicular Networks 1
Towards Automatic Phone-to-Phone Communication for Vehicular Networking ApplicationsShaohan Hu (University of Illinois at Urbana-Champaign, USA); Hengchang Liu (UIUC, USA); Lu Su
(The State University of New York at Buffalo, USA); Hongyan Wang (UIUC, USA); Tarek Abdelzaher
(University of Illinois, Urbana Champaign, USA); Pan Hui (Hong Kong University of Science and
Technology & Telekom Innovation Laboratories, Hong Kong); Wei Zheng (University of Wisconsin -
Madison, USA); Zhiheng Xie (University of Virginia, USA); John Stankovic (University of Virginia,USA)pp. 1752-1760
POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks
Jun Qin (Shanghai Jiao Tong University, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University,P.R. China); Yanmin Zhu (Shanghai Jiao Tong University, P.R. China); Li Lu (University of Electronic
Science and Technology of China, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.
China); Minglu Li (Shanghai Jiao Tong University, P.R. China)pp. 1761-1769
On Multihop Communications For In-Vehicle Internet Access Based On a TDMA MAC Protocol
Hassan A Omar (University of Waterloo, Canada); Weihua Zhuang (University of Waterloo,Canada); Li Li (Communication Research Centre of Canada, Canada)pp. 1770-1778
GeoMob: A Mobility-aware Geocast Scheme in Metropolitans via Taxicabs and Buses
Lei Zhang (University of Victoria, Canada); Boyang Yu (University of Victoria, Canada); JianpingPan (University of Victoria, Canada)pp. 1779-1787
CN4: Cellular networks 4
Automated Dynamic Offset Applied to Cell Association
Majed Haddad (INRIA, France); Habib B.A. Sidi (Orange Labs, France); Piotr Wiecek (WroclawUniversity of Technology, Poland); Eitan Altman (INRIA, France)pp. 1788-1796
Interference Coordination Strategies for Content Update Dissemination in LTE-A
Vincenzo Sciancalepore (Institute IMDEA Networks & Politecnico di Milano, Italy); Vincenzo
Mancuso (IMDEA Networks Institute, Spain); Albert Banchs (Universidad Carlos III de Madrid,Spain); Shmuel Zaks (Technion, Israel); Antonio Capone (Politecnico di Milano, Italy)pp. 1797-1805
Classifying Call Profiles in Large-scale Mobile Traffic Datasets
Diala Naboulsi (INSA Lyon, France); Razvan Stanica (INSA Lyon, France); Marco Fiore (NationalResearch Council of Italy, Italy)pp. 1806-1814
Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices
Yeon-sup Lim (University of Massachusetts Amherst, USA); Yung-Chih Chen (University of
Massachusetts at Amherst, USA); Erich Nahum (IBM T. J. Watson Research Center, USA); Don
Towsley (University of Massachusetts at Amherst, USA); Kang-Won Lee (IBM Research, USA)pp. 1815-1823
DC2: Data center networking 2
Practical DCB for Improved Data Center Networks
Brent Stephens (Rice University & IBM, USA); Ankit Singla (University of Illinois at Urbana-
Champaign, USA); Colin Dixon (IBM Research, USA); Wes Felter (IBM, USA); John Carter (IBMResearh, USA); Alan L. Cox (Rice University, USA)pp. 1824-1832
Distributed Data Storage Systems with Opportunistic RepairVaneet Aggarwal (AT&T Labs - Research, USA); Chao Tian (AT&T Labs-Research, Shannon
Laboratory, USA); Vinay A. Vaishampayan (DIMACS, Rutgers University & Columbia University,USA); Yih-Farn Robin Chen (AT&T Labs - Research, USA)pp. 1833-1841
Let's Stay Together: Towards Traffic Aware Virtual Machine Placement in Data Centers
Xin Li (Nanjing University & State Key Laboratory of Novel Software Technology, P.R. China); Jie
Wu (Temple University, USA); Shaojie Tang (Temple University, Philadelphia, PA, USA); Sanglu Lu
(Nanjing University, P.R. China)pp. 1842-1850
On the Design and Analysis of Data Center Network Architectures for Interconnecting Dual-
Port Servers
Dawei Li (Temple University, USA); Jie Wu (Temple University, USA)pp. 1851-1859
FT2: Fault tolerance and survivability 2
Signaling Free Localization of Node Failures in All-Optical NetworksJanos Tapolcai (Budapest University of Technology and Economics, Hungary); Lajos Ronyai(Budapest University of Technology and Economics (BME), Hungary); Eva Hosszu (Budapest
University of Technology and Economics, Hungary); Pin-Han Ho (University of Waterloo, Canada);Suresh Subramaniam (The George Washington University, USA)pp. 1860-1868
Fault Tolerant Barrier Coverage for Wireless Sensor Networks
Zhibo Wang (University of Tennessee, Knoxville, USA); Honglong Chen (China University of
Petroleum, P.R. China); Qing Cao (University of Tennessee, USA); Hairong Qi (the University of
Tennessee, USA); Zhi Wang (Zhejiang University & State Key Laboratory of Industrial Control
Technology, Zhejiang University, P.R. China)pp. 1869-1877
Heterogeneity-Aware Data Regeneration in Distributed Storage Systems
Yan Wang (Fudan University, P.R. China); Dongsheng Wei (Fudan University, P.R. China); Xunrui
Yin (University of Calgary, Canada); Xin Wang (Fudan University, P.R. China)pp. 1878-1886
CauselnfenAutomatic and Distributed Performance Diagnosis with Hierarchical CausalityGraph in Large Distributed Systems
Pengfei Chen (Xi'an Jiaotong University, P.R. China); Yong Qi (Xi'an Jiaotong University, P.R.
China); Pengfei Zheng (Xi'an Jiaotong University, P.R. China); Di Hou (Xi'an Jiaotong University,P.R. China)pp. 1887-1895
PNL2: Panel 2
SB2: Scheduling and buffer management 2
Sharp Per-Flow Delay Bounds for Bursty Arrivals: The Case of FIFO, SP, and EDF SchedulingFlorin Ciucu (University of Warwick, United Kingdom); Felix Poloczek (TU Berlin / T-Labs,
Germany); Jens Schmitt (University of Kaiserslautern, Germany)pp. 1896-1904
Recommended