Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPCCC
IPCCC 2017
Generate Citations
2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)
Dec. 10 2017 to Dec. 12 2017
San Diego, CA
Table of Contents
Robust and lightweight fault localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bo Wu
,
Ke Xu
,
Qi Li
,
Fan Yang
When QUIC meets TCP: An experimental study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yajun Yu
,
Mingwei Xu
,
Yuan Yang
Scheduling loop-free updates for multiple policies with overlaps in software-defined networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jinping Yu
,
Xinxin Fan
,
Guoqiang Zhang
,
Jingping Bi
H-NVMe: A hybrid framework of NVMe-based storage system in cloud computing environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhengyu Yang
,
Morteza Hoseinzadeh
,
Ping Wong
,
John Artoux
,
Clay Mayers
,
David Thomas Evans
,
Rory Thomas Bolt
,
Janki Bhimani
,
Ningfang Mi
,
Steven Swanson
Link-based fine granularity flow migration in SDNs to reduce packet loss
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yang Chen
,
Jie Wu
AutoTiering: Automatic data placement manager in multi-tier all-flash datacenter
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhengyu Yang
,
Morteza Hoseinzadeh
,
Allen Andrews
,
Clay Mayers
,
David Thomas Evans
,
Rory Thomas Bolt
,
Janki Bhimani
,
Ningfang Mi
,
Steven Swanson
Towards location-aware joint job and data assignment in cloud data centers with NVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xin Li
,
Jie Wu
,
Zhuzhong Qian
,
Shaojie Tang
,
Sanglu Lu
START:Sensible traffic scheduling in dynamic data center networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ziyan Song
,
Ting Zhang
,
Qing Li
,
Guang Yang
,
Yong Jiang
Resource optimization for survivable embedding of virtual clusters in cloud data centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Biyu Zhou
,
Jie Wu
,
Fa Zhang
,
Zhiyong Liu
Elastic scaling of virtual clusters in cloud data center networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shuaibing Lu
,
Zhiyi Fang
,
Jie Wu
,
Guannan Qu
Spatio-temporal event detection and reporting in mobile-sink wireless sensors networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Catalina Aranzazu-Suescun
,
Mihaela Cardei
Can MPTCP increase system efficiency and fairness in 802.11 multirate WLAN environment?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Zhuo Jiang
,
Qian Wu
,
Hewu Li
,
Jianping Wu
Avoiding interference from hidden terminals with carrier tones
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
J.J. Garcia-Luna-Aceves
Minimal road-side unit placement for delay-bounded applications in bus Ad-hoc networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Haizhou Bao
,
Qin Liu
,
Chuanhe Huang
,
Xiaohua Jia
Time-based persistence in channel-access protocols with carrier sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
J.J. Garcia-Luna-Aceves
,
Spencer Thompson
,
Joshua Stern
Integrated recovery and task allocation for stream processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hongliang Li
,
Jie Wu
,
Zhen Jiang
,
Xiang Li
,
Xiaohui Wei
,
Yuan Zhuang
Optimizing locality in graph computations using reuse distance profiles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abdel-Hameed A. Badawy
,
Donald Yeung
Does the content defined chunking really solve the local boundary shift problem?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wenlong Tian
,
Ruixuan Li
,
Zhiyong Xu
,
Weijun Xiao
On minimizing the maximum sensor movement to construct a horizontal barrier
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiaoyun Zhang
,
Daji Qiao
Robust passive static human detection with commodity WiFi devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hai Zhu
,
Fu Xiao
,
Lijuan Sun
,
Xiaohui Xie
,
Ruchuan Wang
Mitigating cloud co-resident attacks via grouping-based virtual machine placement strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xin Liang
,
Xiaolin Gui
,
A.N. Jian
,
Dewang Ren
A privacy-preserving combinatorial auction mechanism for spectrum redistribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fudong Qiu
,
Fan Wu
,
Xiaofeng Gao
,
Guihai Chen
Identifying malware with HTTP content type inconsistency via header-payload comparison
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Fei Xu
,
Haiqing Pan
,
Zigang Cao
,
Zhen Li
,
Gang Xiong
,
Yangyang Guan
,
S.M. Yiu
Revisiting inter-AS IP spoofing let the protection drive source address validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Yihao Jia
,
Ying Liu
,
Gang Ren
,
Lin He
Cookie-based amplification repression protocol
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jing Zheng
,
Jianhua Sun
,
Kun Sun
,
Bo Wu
,
Qi Li
Popularity-based neighborhood collaborative caching for information-centric networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiaodong Zhu
,
Jinlin Wang
,
Lingfang Wang
,
Weining Qi
Using entanglements to increase the reliability of two-dimensional square RAID arrays
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jehan-François Pâris
,
Vero Estrada-Galiñanes
,
Ahmed Amer
,
Carlos Rincón
Joint source selection and transfer optimization for erasure coding storage system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Han Zhang
,
Xingang Shi
,
YingYa Guo
,
Haijun Geng
,
Zhiliang Wang
,
Xia Yin
A DAX-enabled mmap mechanism for log-structured in-memory file systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhixiang Mao
,
Shengan Zheng
,
Linpeng Huang
,
Yanyan Shen
Secure processing-aware media storage (SPMS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jannatun Noor
,
Hasan Ibna Akbar
,
Ruhul Amin Sujon
,
A.B.M. Alim Al Islam
A truthful auction mechanism for resource provisioning in mobile crowdsensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhenyu Ju
,
Chuanhe Huang
,
Yanjiao Chen
,
Lin Ma
iSense: Energy-aware crowd-sensing framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Mohamed Abdelaal
,
Mohammad Qaid
,
Frank Dürr
,
Kurt Rothermel
Fault tolerant mechanism design for time coverage in crowdsensing system
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yangsu Liu
,
Zhenzhe Zheng
,
Fan Wu
,
Xiaofeng Gao
,
Guihai Chen
Towards cost-effective and budget-balanced task allocation in crowdsourcing systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Luoyao Hao
,
Chengming Jin
,
Xiaofeng Gao
,
Fan Wu
,
Guihai Chen
Approach to detect non-adversarial overlapping collusion in crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Georges A. Kamhoua
,
Niki Pissinou
,
S.S. Iyengar
,
Jonathan Beltran
,
Jerry Miller
,
Charles A. Kamhoua
,
Laurent L. Njilla
Analyzing and optimizing BGP stability in future space-based internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zengyin Yang
,
Hewu Li
,
Qian Wu
,
Jianping Wu
TCP WISE: One initial congestion window is not enough
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiaohui Nie
,
Youjian Zhao
,
Guo Chen
,
Kaixin Sui
,
Yazheng Chen
,
Dan Pei
,
Miao Zhang
,
Jiyang Zhang
Scalability comparison of SDN control plane architectures based on simulations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hemin Yang
,
Jared Ivey
,
George F. Riley
Anonymous and analysable web browsing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tran Phuong Thao
,
Adetokunbo Makanju
,
Ayumu Kubota
Metric learning with statistical features for network traffic classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ziqing Zhang
,
Cuicui Kang
,
Peipei Fu
,
Zigang Cao
,
Zhen Li
,
Gang Xiong
Performance enhancement of a computational persistent homology package
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Alan Hylton
,
Janche Sang
,
Greg Henselman-Petrusek
,
Robert Short
Response time speedup of multi-tier internet systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Fatih Berber
,
Ramin Yahyapour
QoE-aware optimization for SVC-based adaptive streaming in D2D communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Luoyao Hao
,
Chengming Jin
,
Xiaofeng Gao
,
Linghe Kong
,
Fan Wu
,
Guihai Chen
A hierarchical-learning-based crowdedness estimation mechanism for crowdsensing buses
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xiaoguang Niu
,
Zhen Wang
,
Qiongzan Ye
,
Yihao Zhang
,
Jiawei Wang
Improving 3D lattice boltzmann method stencil with asynchronous transfers on many-core processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Minh Quan Ho
,
Christian Obrecht
,
Bernard Tourancheau
,
Benoît Dupont de Dinechin
,
Julien Hascoet
Laro: Lazy repartitioning for graph workloads on heterogeneous clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Feng Sheng
,
Qiang Cao
,
Haoran Cai
,
Jie Yao
,
Changsheng Xie
DRAPS: Dynamic and resource-aware placement scheme for docker containers in a heterogeneous cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ying Mao
,
Jenna Oak
,
Anthony Pompili
,
Daniel Beer
,
Tao Han
,
Peizhao Hu
Mitigate data skew caused stragglers through ImKP partition in MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xue Ouyang
,
Huan Zhou
,
Stephen Clement
,
Paul Townend
,
Jie Xu
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Fangxiao Ning
,
Yu Wen
,
Gang Shi
,
Dan Meng
Towards a holistic and optimized framework for smart grid regulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Junjie Wang
,
Jinyang Li
,
Tianshu Pang
,
Xiaoshan Sun
,
Qi Liu
,
Hengchang Liu
IHB: A scalable and efficient scheme to identify homologous binaries in IoT firmwares
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yu Chen
,
Hong Li
,
Weiwei Zhao
,
Lin Zhang
,
Zhongjin Liu
,
Zhiqiang Shi
Auto-identification of background traffic based on autonomous periodic interaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chang Liu
,
Lingwu Zeng
,
Junzheng Shi
,
Fei Xu
,
Gang Xiong
,
S.M. Yiu
An energy-aware collaborative multi-agent system for autonomous underwater vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Luis Felipe Zapata-Rivera
,
Catalina Aranzazu-Suescun
,
Imadeldin Mahgoub
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Donghe Li
,
Qingyu Yang
,
Wei Yu
,
Dou An
,
Xinyu Yang
,
Wei Zhao
Profit maximization resource allocation in cloud computing with performance guarantee
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Meixuan Li
,
Yu-E Sun
,
He Huang
,
Jing Yuan
,
Yang Du
,
Yu Bao
,
Yonglong Luo
Reducing idle listening time in 802.11 via NDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Fan Wu
,
Wang Yang
,
Qingshan Guo
,
Xinfang Xie
Fault-tolerant 3D mesh for network-on-chip
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Khaleda Akhter Papry
,
A. B. M. Alim Al Islam
Motif: A social reading platform that helps people filter, memorize, and organize online contents
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Yu Tian
,
Xin Ye
An update-overhead-aware caching policy for write-optimized file systems on SMR disks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Shuo-Han Chen
,
Wei-Shin Li
,
Min-Hong Shen
,
Yi-Han Lien
,
Tseng-Yi Chen
,
Tsan-sheng Hsu
,
Hsin-Wen Wei
,
Wei-Kuan Shih
Two-level decomposition for multi-commodity multicast traffic engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Jianwei Zhang
,
Xinchang Zhang
,
Meng Sun
Bandwidth preemption for data transfer request with higher priority
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Liudong Zuo
Secure the internet of things with challenge response authentication in fog computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Salem Alharbi
,
Peter Rodriguez
,
Rajaputhri Maharaja
,
Prashant Iyer
,
Nivethitha Subaschandrabose
,
Zilong Ye
Balancing interdependent networks: Theory and algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Zheng Liu
,
Qing Li
,
Dan Wang
,
Mingwei Xu
Many-objective performance enhancement in computing clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Asm Rizvi
,
Tarik Reza Toha
,
Siddhartha Shankar Das
,
Sriram Chellappan
,
A. B. M. Alim Al Islam
Unsupervised machine learning in 5G networks for low latency communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Eren Balevi
,
Richard D. Gitlin
Enhancing SSDs with multi-stream: What? why? how?
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Janki Bhimani
,
Jingpei Yang
,
Zhengyu Yang
,
Ningfang Mi
,
N. H. V. Krishna Giri
,
Rajinikanth Pandurangan
,
Changho Choi
,
Vijay Balakrishnan
Probabilistic Monte Carlo simulations for static branch prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Bhargava Kalla
,
Nandakishore Santhi
,
Abdel-Hameed A. Badawy
,
Gopinath Chennupati
,
Stephan Eidenbenz
Message from the IPCCC 2017 technical program committee chairs
Freely available from IEEE.
pp. 1-1
Welcome message from the general chairs
Freely available from IEEE.
pp. 1-1
An efficient and secure scheme for smart home communication using identity-based signcryption
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yosef Ashibani
,
Qusay H. Mahmoud
Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Baiyu Chen
,
Zhengyu Yang
,
Siyu Huang
,
Xianzhi Du
,
Zhiwei Cui
,
Janki Bhimani
,
Xin Xie
,
Ningfang Mi
The VLSI architecture of a highly efficient configurable pre-processor for MIMO detections
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Tzu-Ting Tseng
,
Chung-An Shen
Resource consumption analysis of online activity recognition on mobile phones and smartwatches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Muhammad Shoaib
,
Ozlem Durmaz Incel
,
Hans Scolten
,
Paul Havinga
Towards truthful auction for big data trading
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Dou An
,
Qingyu Yang
,
Wei Yu
,
Donghe Li
,
Yang Zhang
,
Wei Zhao
Towards scalable and adaptable security monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Christof Brandauer
,
Peter Dorfinger
,
Pedro Yuri Arbs Paiva
Message content control for distributed map sharing in vehicle safety communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
S. M. Osman Gani
,
Yaser P. Fallah
,
Gaurav Bansal
,
Takayuki Shimizu
Biomedical signal transmission using human body communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Fukuro Koshiji
,
Ryogo Urushidate
,
Kohji Koshiji
Preserving privacy in distributed system (PPDS) protocol: Security analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ashref Aloui
,
Mounira Msahli
,
Talel Abdessalem
,
Stephane Bressan
,
Sihem Mesnager
Modeling for performance and security balanced trading communication systems in the cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Aklilu Daniel Tesfamicael
,
Vicky Liu
,
Ernest Foo
,
William Caelli
Showing 79 out of 79