Default Cover Image

2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)

Nov. 17 2018 to Nov. 19 2018

Orlando, FL, USA

ISBN: 978-1-5386-6808-5

Table of Contents

Where You Really Are: User Trip Based City Functional Zone AscertainmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Web Tracking Cartography with DNS RecordsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Performance and Stability of Application Placement in Mobile Edge Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
GAC: Gain-Aware 2-Round Cooperative Caching Approach in Information-Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy Preserving Online Social Networks using Enhanced Equicardinal ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
An Optimal LTE-U Access Method for Throughput Maximization and Fairness AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards Incentive Mechanism for Taxi Services Allocation with Privacy GuaranteeFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
U-PoT: A Honeypot Framework for UPnP-Based IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
S5: An Application Sensitive QoS Assurance System via SDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Cost-effective and Energy-efficient Architecture for Die-stacked DRAM/NVM Memory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Quality-Aware Task Assignment in Opportunistic Network-Based CrowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
CoDE: Fast Name Lookup and Update using Conflict-driven EncodingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
When Group Buying Meets Wi-Fi AdvertisingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Stride: Distributed Video Transcoding in SparkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Peer Data Caching Algorithms in Large-Scale High-Mobility Pervasive Edge Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Learning-based Cooperative Sound Event Detection with Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
URefFlow: A Unified Android Malware Detection Model Based on Reflective CallsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Classifying User Activities in the Encrypted WeChat TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational AutoencoderFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Real-time Distributed-Random-Forest-Based Network Intrusion Detection System Using Apache SparkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
OC-Cache: An Open-channel SSD Based Cache for Multi-Tenant SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Towards Optimized Online Task Allocation in Cost-Sensitive Crowdsensing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Friendly-Jamming-Aware Routing Protocols for Tactical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
HyperProtect: Enhancing the Performance of a Dynamic Backup System Using Intelligent SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On the Impact of Sweep Radius and Energy Limitation on Sweep Coverage in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
GD-FTL: Improving the Performance and Lifetime of TLC SSD by Downgrading Worn-out BlocksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Forwarding and Optical Indices in an All-Optical BCube NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Reliability and Performance Analysis of a Data Center's Network ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A New Game Theoretic Scheme for Verifiable Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Imaging Subsurface Civil Infrastructure with Smart Seismic NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
iPand: Accurate Gesture Input with Ambient Acoustic Sensing on HandFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Choosing the Best Server for a Data Center: The Importance of Workload WeightingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Implementing Correct and Efficient Collision Avoidance in Multi-Hop Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
A graph neural network based efficient firmware information extraction method for IoT devicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
BFRP: Endpoint Congestion Avoidance Through Bilateral Flow ReservationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Socialite: Social Activity Mining and Friend Auto-labelingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
2-Dominant Resource Fairness: Fairness-Efficiency Tradeoffs in Multi-resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Vehicle Delay-tolerant Network Routing Algorithm based on Multi-period Bayesian NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
UAV-enabled Data Gathering in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
ThinDedup: An I/O Deduplication Scheme that Minimizes Efficiency Loss due to Metadata WritesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Road-Aware Spatial Mapping for Moving ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Utility-based Allocation of Industrial IoT Applications in Mobile Edge CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Cloud Resource Provisioning for Combined Stream and Batch WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Novel Method to Generate Frequent Itemsets in Distributed EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
CODA: Achieving Multipath Data Transmission in NDNFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
QoS-Aware Matching of Edge Computing Services to Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Location-leaking through Network Traffic in Mobile Augmented Reality ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
DeepSDN: Connecting the Dots Towards Self-driving NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
3D-PIM NoCs with Multiple Subnetworks: A Performance and Power EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network CodingFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Case-Based Decision System for Routing in Packet-Switched NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Discover and Secure (DaS): An Automated Virtual Machine Security Management FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fully Dynamic Broadcasting under SINRFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Decouple and Stretch: A Boost to Channel PruningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Cache Based DoS Attack on Real Information Centric Networking SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Network Embedding based on External Word VectorsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
EasyOrchestrator: A NFV-based Network Service Creation Platform for End-usersFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A More Scalable Scheduling Algorithm for FPGA-based Time-Triggered NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Reversible Programming Techniques for Shortest-Path AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Centralized In-network Caching for Information Centric Networking with Decoupling Data and Control PlanesFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
An Effective Scheme to Utilize Caches for Streaming Services in Mobile CCNFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
On the Use of Q-Learning to Solve the Selectable Virtual Network Embedding ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Availability-Aware Container Scheduler for Application Services in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An Efficient Latch-free Database Index Based on Multi-dimensional ListsFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
A Deep Learning Based Framework for Cloud Masquerade Attack DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
Notice of Removal: HCache: A Hybrid Caching Strategy in Information-Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 1-2
IPCCC 2018 General ChairsFreely available from IEEE.pp. 1-1
IPCCC 2018 Technical Program Co-ChairsFreely available from IEEE.pp. 1-1
Showing 91 out of 91