Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPCCC
IPCCC 2015
Generate Citations
2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)
Dec. 14 2015 to Dec. 16 2015
Nanjing, China
Table of Contents
Message from the IPCCC 2015 general chairs
Freely available from IEEE.
pp. 1-1
by
Guoliang Xue
,
Sheng Zhong
Message from the IPCCC 2015 technical program chairs
Freely available from IEEE.
pp. 1-1
by
Kui Ren
,
Tommaso Melodia
Keynotes
Freely available from IEEE.
pp. 1-2
Sponsor
Freely available from IEEE.
pp. 1-1
An enhanced algorithm based on paths algebra strategy to solve the VNE problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Canhui Wang
,
Fangjin Zhu
,
Qijia Zhang
A novel algorithm for pattern matching with back references
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Liu Yang
,
Vinod Ganapathy
,
Pratyusa Manadhata
,
Ye Wu
Lifetime maximization in rechargeable wireless sensor networks with charging interference
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yi Qu
,
Ke Xu
,
Haiyang Wang
,
Dan Wang
,
Bo Wu
Privacy-preserving min and k-th min computations with fully homomorphic encryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bingbing Jiang
,
Yuan Zhang
SpeedStream: A real-time stream data processing platform in the cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Li Zhao
,
Zhang Chuang
,
Xu Ke-fu
Efficient TV white space database construction via spectrum sensing and spatial inference
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mengyun Tang
,
Ze Zheng
,
Guoru Ding
,
Zhen Xue
Mining friendships through spatial-temporal features in mobile social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jianwei Niu
,
Danning Wang
,
Jie Lu
Parallel and distributed normalization of security events for instant attack analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
David Jaeger
,
Andrey Sapegin
,
Martin Ussath
,
Feng Cheng
,
Christoph Meinel
Class-based delta-encoding for high-speed train data stream
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yangxin Lin
,
Ping Wang
,
Jinlong Lin
,
Meng Ma
,
Ling Liu
,
Lin Ma
On the channel capacity of MIMO-radar-based communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Renhui Xu
,
Laixian Peng
,
Wendong Zhao
Network coding based transmission schemes in DTNs with group meetings
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abdurrahman Arikan
,
Yuexin Mao
,
Xiaolan Zhang
,
Bing Wang
,
Shengli Zhou
,
Song Han
SDN-based TCP congestion control in data center networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yifei Lu
,
Shuhong Zhu
Bandwidth guaranteed virtual network function placement and scaling in datacenter networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fangxin Wang
,
Ruilin Ling
,
Jing Zhu
,
Dan Li
Dynamic flow consolidation for energy savings in green DCNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chao Zhu
,
Yu Xiao
,
Yong Cui
,
Zhenjie Yang
,
ShiHan Xiao
,
Antti Yla-Jaaski
Towards shorter task completion time in datacenter networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yuchao Zhang
,
Ke Xu
,
Haiyang Wang
,
Meng Shen
OMO: Optimize MapReduce overlap with a good start (reduce) and a good finish (map)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jiayin Wang
,
Yi Yao
,
Ying Mao
,
Bo Sheng
,
Ningfang Mi
Towards adaptive elastic distributed Software Defined Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yanyu Chen
,
Qing Li
,
Yuan Yang
,
Qi Li
,
Yong Jiang
,
Xi Xiao
Pirogue, a lighter dynamic version of the Raft distributed consensus algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jehan-Francois Paris
,
Darrell D. E. Long
SkipMon: A locality-aware Collaborative Intrusion Detection System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Emmanouil Vasilomanolakis
,
Matthias Krugl
,
Carlos Garcia Cordero
,
Max Muhlhauser
,
Mathias Fischer
Decentralized multi-charger coordination for wireless rechargeable sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lei Mo
,
Pengcheng You
,
Xianghui Cao
,
Ye-Qiong Song
,
Jiming Chen
Detect and analyze Large-scale BGP events by bi-clustering Update Visibility Matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Meng Chen
,
Mingwei Xu
,
Qing Li
,
Xirui Song
,
Yuan Yang
Building smartphone Ad-Hoc networks with long-range radios
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ying Mao
,
Jiayin Wang
,
Bo Sheng
,
Fan Wu
Scalable name-based inter-domain routing for information-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sangmun Kim
,
Zhenhai Duan
,
Fernando Sanchez
RAPIT: RTT-Aware Pending Interest Table for Content Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yalei Tan
,
Qing Li
,
Yong Jiang
,
Shutao Xia
Traffic-aware networking for video streaming service using SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Calvin Hue
,
Yu-Jia Chen
,
Li-Chun Wang
On stochastic optimal bidding strategy for microgrids
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qingyu Yang
,
Dou An
,
Wei Yu
,
Xinyu Yang
,
Xinwen Fu
Sensor placement based on Delaunay triangulation for complete confident information coverage in an area with obstacles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lu Dai
,
Bang Wang
Defending against Energy Dispatching Data integrity attacks in smart grid
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiaofei He
,
Xinyu Yang
,
Jie Lin
,
Linqiang Ge
,
Wei Yu
,
Qingyu Yang
Power-free Structural Health Monitoring via compressive sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ju-min Zhao
,
Ding Feng
,
Deng-ao Li
,
Bao-feng Zhao
Distributed load scheduling in smart community with capacity constrained local power supplier
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nuo Yu
,
Lan Mu
,
Yuting Miao
,
Hejiao Huang
,
Hongwei Du
,
Xiaohua Jia
Performability analysis of a cloud system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiwei Qiu
,
Peng Sun
,
Xun Guo
,
Yanping Xiang
How green are cloud patterns?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
S. Amirhossein Abtahizadeh
,
Foutse Khomh
,
Yann-Gael Gueheneuc
Virtual machine placement based on the VM performance models in cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hui Zhao
,
Qinghua Zheng
,
Weizhan Zhang
,
Yuxuan Chen
,
Yunhui Huang
Minimizing response latency via efficient virtual machine placement in cloud systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hou Deng
,
Liusheng Huang
,
Chenkai Yang
,
Hongli Xu
,
Bing Leng
A customizable MapReduce framework for complex data-intensive workflows on GPUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhi Qiao
,
Shuwen Liang
,
Hai Jiang
,
Song Fu
Energy cost minimization via intelligent temporal and spatial resource allocation in green heterogeneous cellular networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qiang Yang
,
Bang Wang
Comparative analysis of big data transfer protocols in an international high-speed network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Se-young Yu
,
Nevil Brownlee
,
Aniket Mahanti
Towards Controller Placement for robust Software-Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sheng Guo
,
Shu Yang
,
Qi Li
,
Yong Jiang
On secure shared key establishment for mobile devices using contextual information
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Ala' Altaweel
,
Radu Stoleru
,
Subhajit Mandal
Charging your smartphones on public commuters via wireless energy transfer
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wenzheng Xu
,
Weifa Liang
,
Su Hu
,
Xiaola Lin
,
Jian Peng
Efficient RSS measurement in wireless networks based on compressive sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yanchao Zhao
,
Wenzhong Li
,
Jie Wu
,
Sanglu Lu
On the coexistence of 802.11 and 802.15.4 networks with delay constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wei Zhang
,
Mahima A. Suresh
,
Yuhan Zhou
,
Raghavan S. Veera
,
Radu Stoleru
Stochastic duty cycling for heterogenous energy harvesting networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Jianhui Zhang
,
Mengmeng Wang
,
Zhi Li
Traffic condition estimation using vehicular crowdsensing data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lu Shao
,
Cheng Wang
,
Zhong Li
,
Changjun Jiang
On balancing the energy consumption of routing protocols for opportunistic social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Chen Yang
,
Radu Stoleru
Adaptive partial frequency reuse in LTE-Advanced relay networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chen Sun
,
Jian Shu
,
Wei Zheng
,
Zhiyong Yang
,
Xiaojun Wang
Optimum reference node deployment for indoor localization based on the average Mean Square Error minimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Fei Long
,
Aydin Behnad
,
Xianbin Wang
Network Performance Isolation Scheme for QoE in a mobile device
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Woonghee Lee
,
Hyunsoon Kim
,
Joon Yeop Lee
,
Albert Yongjoon Chung
,
Yong Seok Park
,
Hwangnam Kim
Network intrusion detection and prevention middlebox management in SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wen Wang
,
Wenbo He
,
Jinshu Su
PATHA: Performance Analysis Tool for HPC Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wucherl Yoo
,
Michelle Koo
,
Yi Cao
,
Alex Sim
,
Peter Nugent
,
Kesheng Wu
Energy-efficient, Delay-aware packet scheduling in high-speed networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qun Yu
,
Taieb Znati
,
Wang Yang
Spatio-temporal tensor completion for imputing missing internet traffic data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Huibin Zhou
,
Dafang Zhang
,
Kun Xie
,
Yuxiang Chen
ATLAS: An AdapTive faiLure-Aware Scheduler for Hadoop
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mbarka Soualhia
,
Foutse Khomh
,
Sofiene Tahar
ScalaSEM: Scalable validation of SDN design with deployable code
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nan Zhu
,
Wenbo He
Narrowing down the debugging space of slow search response time
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-1
by
Dapeng Liu
,
Youjian Zhao
,
Dan Pei
,
Chengbin Quan
,
Qingqian Tao
,
Pei Wang
,
Xiyang Chen
,
Dai Tan
,
Xiaowei Jing
,
Mei Feng
Pricing and revenue sharing in secondary market of mobile internet access
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hengky Susanto
,
Benyuan Liu
,
ByungGuk Kim
,
Honggang Zhang
,
Xinwen Fu
Incremental deployment for traffic engineering in hybrid SDN network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yingya Guo
,
Zhiliang Wang
,
Xia Yin
,
Xingang Shi
,
Jianping Wu
,
Han Zhang
Complete font generation of Chinese characters in personal handwriting style
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jeng-Wei Lin
,
Chian-Ya Hong
,
Ray-I Chang
,
Yu-Chun Wang
,
Shu-Yu Lin
,
Jan-Ming Ho
Learning thresholds for PV change detection from operators' labels
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Dapeng Liu
,
Youjian Zhao
,
Kaixin Sui
,
Shiwen Cheng
,
Dan Pei
,
Chengbin Quan
,
Jiao Luo
,
Xiaowei Jing
,
Mei Feng
Integrated caching and tiering according to use and QoS requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mark Abashkin
,
Assaf Natanzon
,
Eitan Bachmat
PASSI: A Parallel, Reliable and Scalable Storage Software Infrastructure for active storage system and I/O environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hsing-bung Chen
,
Song Fu
P-CLS: A popularity-driven Caching Location and Searching scheme in Content Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yuemei Xu
,
Shuai Ma
,
Yang Li
,
Fu Chen
,
Song Ci
WAlloc: An efficient wear-aware allocator for non-volatile main memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Songping Yu
,
Nong Xiao
,
Mingzhu Deng
,
Yuxuan Xing
,
Fang Liu
,
Zhiping Cai
,
Wei Chen
A goodput distribution model for IEEE 802.11 wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ying Qu
,
Bryan Ng
,
Winston K.G. Seah
New tight upper bounds on the capacity for general deterministic dissemination in wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Cheng Wang
,
Jieren Zhou
,
Tianci Liu
,
Lu Shao
,
Huiya Yan
Reducing inter-task interference delay by optimizing bank-to-core mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jizan Zhang
,
Zhimin Gu
,
Mingquan Zhang
Optimization strategies for inter-thread synchronization overhead on NUMA machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Song Wu
,
Jun Zhang
,
Yaqiong Peng
,
Hai Jin
,
Wenbin Jiang
Resilient and efficient communication in many-core systems using network coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sadia Moriam
,
Yexin Yan
,
Erik Fischer
,
Elke Franz
,
Gerhard P. Fettweis
A low-latency fine-grained dynamic shared cache management scheme for chip multi-processor
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jinbo Xu
,
Weixia Xu
,
Zhengbin Pang
How to protect query and report privacy without sacrificing service quality in participatory sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Meng Li
,
Fan Wu
,
Guihai Chen
,
Liehuang Zhu
,
Zijian Zhang
A secure OFDM transmission scheme based on chaos mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xiaozhong Zhang
,
Ying Wang
,
Juan Zeng
,
Yongming Wang
Exploring sensor usage behaviors of Android applications based on data flow analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xing Liu
,
Jiqiang Liu
,
Wei Wang
PROTA: A Privacy-pReserving prOtocol for real-time Targeted Advertising
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yiming Pang
,
Bo Wang
,
Fan Wu
,
Guihai Chen
,
Bo Sheng
Self-adaptive anonymous communication scheme under SDN architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tingting Zeng
,
Meng Shen
,
Mingzhong Wang
,
Liehuang Zhu
,
Fan Li
Identify user variants based on user behavior on social media
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Haoran Xu
,
Yuqing Sun
Privacy preserving big histogram aggregation for spatial crowdsensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shaowei Wang
,
Liusheng Huang
,
Pengzhan Wang
,
Yao Shen
,
Hongli Xu
,
Wei Yang
Detecting BGP instability using Recurrence Quantification Analysis (RQA)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bahaa Al-Musawi
,
Philip Branch
,
Grenville Armitage
Replication attack detection with monitor nodes in clustered wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Guo Cheng
,
Songtao Guo
,
Yuanyuan Yang
,
Fei Wang
Ultra-lightweight deep packet anomaly detection for Internet of Things devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Douglas H. Summerville
,
Kenneth M. Zach
,
Yu Chen
Fincher: Elephant flow scheduling based on stable matching in data center networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yuxiang Zhang
,
Lin Cui
,
Qiao Chu
A non-orthogonal waveform superposition scheme for high efficient and reliable communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Ying Wang
,
Yongming Wang
,
Weihua Zhou
A domestic Adaptable Infant Monitoring System using wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Hong Zhou
,
Brad Goold
Proactive Complex Event Processing for transportation Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yongheng Wang
,
Qian Li
An effective service discovery approach based on field theory and contribution degree in unstructured P2P networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Wanchun Yang
,
Chenxi Zhang
,
Jiangfeng Li
Measuring the internet routing scalability from the perspective of address allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Dan Wu
,
Zhiliang Wang
,
Xia Yin
,
Xingang Shi
,
Jianping Wu
Latency-aware routing with bandwidth assignment for Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Qiongyu Zhang
,
Liehuang Zhu
,
Meng Shen
,
Mingzhong Wang
,
Fan Li
An ASIP based physical layer virtualization method of centralized radio access network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Fang Xiao
,
Yiqing Zhou
,
Shan Huang
,
Jiangnan Lin
,
Lin Liu
Blind identification of helical interleaving of the first type
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Li Huang
,
Wengu Chen
,
Hong Chen
A dominating-set-based and popularity-driven caching scheme in edge CCN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Weiyuan Li
,
Yang Li
,
Wei Wang
,
Yonghui Xin
,
Tao Lin
Characterizing I/O workloads of HPC applications through online analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Wenrui Dong
,
Guangming Liu
,
Jie Yu
,
You Zuo
Reducing the read latency of in-line deduplication file system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yongtao Zhou
,
Yuhui Deng
,
Yan Li
,
Junjie Xie
Minimizing energy cost for green cloud data centers by using ESDs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Chonglin Gu
,
Lingmin Zhang
,
Zhixiang He
,
Hejiao Huang
,
Xiaohua Jia
R-PMD: robust passive motion detection using PHY information with MIMO
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hai Zhu
,
Fu Xiao
,
Lijuan Sun
,
xiaohui Xie
,
Panlong Yang
,
Ruchuan Wang
Showing 97 out of 97