Default Cover Image

2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)

Dec. 10 2017 to Dec. 12 2017

San Diego, CA

Table of Contents

Robust and lightweight fault localizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
When QUIC meets TCP: An experimental studyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Scheduling loop-free updates for multiple policies with overlaps in software-defined networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Link-based fine granularity flow migration in SDNs to reduce packet lossFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards location-aware joint job and data assignment in cloud data centers with NVMFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
START:Sensible traffic scheduling in dynamic data center networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Resource optimization for survivable embedding of virtual clusters in cloud data centersFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Elastic scaling of virtual clusters in cloud data center networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Spatio-temporal event detection and reporting in mobile-sink wireless sensors networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Can MPTCP increase system efficiency and fairness in 802.11 multirate WLAN environment?Full-text access may be available. Sign in or learn about subscription options.pp. 1-7
Avoiding interference from hidden terminals with carrier tonesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Time-based persistence in channel-access protocols with carrier sensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Integrated recovery and task allocation for stream processingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Optimizing locality in graph computations using reuse distance profilesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Does the content defined chunking really solve the local boundary shift problem?Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
On minimizing the maximum sensor movement to construct a horizontal barrierFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Robust passive static human detection with commodity WiFi devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A privacy-preserving combinatorial auction mechanism for spectrum redistributionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Identifying malware with HTTP content type inconsistency via header-payload comparisonFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Revisiting inter-AS IP spoofing let the protection drive source address validationFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Cookie-based amplification repression protocolFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Popularity-based neighborhood collaborative caching for information-centric networksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Joint source selection and transfer optimization for erasure coding storage systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A DAX-enabled mmap mechanism for log-structured in-memory file systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Secure processing-aware media storage (SPMS)Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
A truthful auction mechanism for resource provisioning in mobile crowdsensingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
iSense: Energy-aware crowd-sensing frameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Fault tolerant mechanism design for time coverage in crowdsensing systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards cost-effective and budget-balanced task allocation in crowdsourcing systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Analyzing and optimizing BGP stability in future space-based internetFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
TCP WISE: One initial congestion window is not enoughFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Scalability comparison of SDN control plane architectures based on simulationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Anonymous and analysable web browsingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Metric learning with statistical features for network traffic classificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Performance enhancement of a computational persistent homology packageFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Response time speedup of multi-tier internet systemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
QoE-aware optimization for SVC-based adaptive streaming in D2D communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A hierarchical-learning-based crowdedness estimation mechanism for crowdsensing busesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Laro: Lazy repartitioning for graph workloads on heterogeneous clustersFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Mitigate data skew caused stragglers through ImKP partition in MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient tamper-evident logging of distributed systems via concurrent authenticated treeFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Towards a holistic and optimized framework for smart grid regulationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwaresFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Auto-identification of background traffic based on autonomous periodic interactionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Profit maximization resource allocation in cloud computing with performance guaranteeFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Reducing idle listening time in 802.11 via NDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Fault-tolerant 3D mesh for network-on-chipFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Motif: A social reading platform that helps people filter, memorize, and organize online contentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Two-level decomposition for multi-commodity multicast traffic engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Bandwidth preemption for data transfer request with higher priorityFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Balancing interdependent networks: Theory and algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Many-objective performance enhancement in computing clustersFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Unsupervised machine learning in 5G networks for low latency communicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Welcome message from the general chairsFreely available from IEEE.pp. 1-1
An efficient and secure scheme for smart home communication using identity-based signcryptionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
The VLSI architecture of a highly efficient configurable pre-processor for MIMO detectionsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Towards truthful auction for big data tradingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Towards scalable and adaptable security monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Biomedical signal transmission using human body communicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Showing 79 out of 79