Default Cover Image

2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)

Dec. 14 2015 to Dec. 16 2015

Nanjing, China

Table of Contents

KeynotesFreely available from IEEE.pp. 1-2
SponsorFreely available from IEEE.pp. 1-1
An enhanced algorithm based on paths algebra strategy to solve the VNE problemFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A novel algorithm for pattern matching with back referencesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Lifetime maximization in rechargeable wireless sensor networks with charging interferenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy-preserving min and k-th min computations with fully homomorphic encryptionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
SpeedStream: A real-time stream data processing platform in the cloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Efficient TV white space database construction via spectrum sensing and spatial inferenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Mining friendships through spatial-temporal features in mobile social networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Class-based delta-encoding for high-speed train data streamFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On the channel capacity of MIMO-radar-based communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Network coding based transmission schemes in DTNs with group meetingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
SDN-based TCP congestion control in data center networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Bandwidth guaranteed virtual network function placement and scaling in datacenter networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Dynamic flow consolidation for energy savings in green DCNsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards shorter task completion time in datacenter networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
OMO: Optimize MapReduce overlap with a good start (reduce) and a good finish (map)Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards adaptive elastic distributed Software Defined NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Pirogue, a lighter dynamic version of the Raft distributed consensus algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Decentralized multi-charger coordination for wireless rechargeable sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Detect and analyze Large-scale BGP events by bi-clustering Update Visibility MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Building smartphone Ad-Hoc networks with long-range radiosFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Scalable name-based inter-domain routing for information-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
RAPIT: RTT-Aware Pending Interest Table for Content Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Traffic-aware networking for video streaming service using SDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
On stochastic optimal bidding strategy for microgridsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Sensor placement based on Delaunay triangulation for complete confident information coverage in an area with obstaclesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Defending against Energy Dispatching Data integrity attacks in smart gridFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Power-free Structural Health Monitoring via compressive sensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Performability analysis of a cloud systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
How green are cloud patterns?Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
Virtual machine placement based on the VM performance models in cloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Minimizing response latency via efficient virtual machine placement in cloud systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A customizable MapReduce framework for complex data-intensive workflows on GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Comparative analysis of big data transfer protocols in an international high-speed networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Towards Controller Placement for robust Software-Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On secure shared key establishment for mobile devices using contextual informationFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Charging your smartphones on public commuters via wireless energy transferFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient RSS measurement in wireless networks based on compressive sensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On the coexistence of 802.11 and 802.15.4 networks with delay constraintsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Stochastic duty cycling for heterogenous energy harvesting networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Traffic condition estimation using vehicular crowdsensing dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On balancing the energy consumption of routing protocols for opportunistic social networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Adaptive partial frequency reuse in LTE-Advanced relay networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Network Performance Isolation Scheme for QoE in a mobile deviceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Network intrusion detection and prevention middlebox management in SDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
PATHA: Performance Analysis Tool for HPC ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Energy-efficient, Delay-aware packet scheduling in high-speed networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Spatio-temporal tensor completion for imputing missing internet traffic dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
ATLAS: An AdapTive faiLure-Aware Scheduler for HadoopFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
ScalaSEM: Scalable validation of SDN design with deployable codeFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Pricing and revenue sharing in secondary market of mobile internet accessFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Incremental deployment for traffic engineering in hybrid SDN networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Complete font generation of Chinese characters in personal handwriting styleFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Integrated caching and tiering according to use and QoS requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
P-CLS: A popularity-driven Caching Location and Searching scheme in Content Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
WAlloc: An efficient wear-aware allocator for non-volatile main memoryFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A goodput distribution model for IEEE 802.11 wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Reducing inter-task interference delay by optimizing bank-to-core mappingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Optimization strategies for inter-thread synchronization overhead on NUMA machineFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Resilient and efficient communication in many-core systems using network codingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A low-latency fine-grained dynamic shared cache management scheme for chip multi-processorFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A secure OFDM transmission scheme based on chaos mappingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Exploring sensor usage behaviors of Android applications based on data flow analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
PROTA: A Privacy-pReserving prOtocol for real-time Targeted AdvertisingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Self-adaptive anonymous communication scheme under SDN architectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Identify user variants based on user behavior on social mediaFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy preserving big histogram aggregation for spatial crowdsensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Detecting BGP instability using Recurrence Quantification Analysis (RQA)Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
Replication attack detection with monitor nodes in clustered wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Ultra-lightweight deep packet anomaly detection for Internet of Things devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Fincher: Elephant flow scheduling based on stable matching in data center networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A non-orthogonal waveform superposition scheme for high efficient and reliable communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A domestic Adaptable Infant Monitoring System using wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Proactive Complex Event Processing for transportation Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Measuring the internet routing scalability from the perspective of address allocationFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Latency-aware routing with bandwidth assignment for Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
An ASIP based physical layer virtualization method of centralized radio access networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Blind identification of helical interleaving of the first typeFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A dominating-set-based and popularity-driven caching scheme in edge CCNFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Characterizing I/O workloads of HPC applications through online analysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Reducing the read latency of in-line deduplication file systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Minimizing energy cost for green cloud data centers by using ESDsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
R-PMD: robust passive motion detection using PHY information with MIMOFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Showing 97 out of 97