Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPCCC
IPCCC 2018
Generate Citations
2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)
Nov. 17 2018 to Nov. 19 2018
Orlando, FL, USA
ISBN: 978-1-5386-6808-5
Table of Contents
Where You Really Are: User Trip Based City Functional Zone Ascertainment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jiayu Gan
,
Jianhui Zhang
,
Siwen Zheng
Web Tracking Cartography with DNS Records
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jingxiu Su
,
Zhenyu Li
,
Stéphane Grumbach
,
Muhammad Ikram
,
Kave Salamatian
,
Gaogang Xie
Integrated Bandwidth Variation Pattern Differentiation for HTTP Adaptive Streaming over 4G Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Haipeng Du
,
Weizhan Zhang
,
Xuanyu Wang
,
Qinghua Zheng
Performance and Stability of Application Placement in Mobile Edge Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhi Cao
,
Honggang Zhang
,
Benyuan Liu
Budget-feasible User Recruitment in Mobile Crowdsensing with User Mobility Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Wenjie Yang
,
Guodong Sun
,
Xingjian Ding
,
Xiaoyue Zhang
GAC: Gain-Aware 2-Round Cooperative Caching Approach in Information-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jiang Zhi
,
Jun Li
,
Haibo Wu
,
Yongmao Ren
Privacy Preserving Online Social Networks using Enhanced Equicardinal Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Madhuri Siddula
,
Zhipeng Cai
,
Dongjing Miao
An Optimal LTE-U Access Method for Throughput Maximization and Fairness Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qian Wang
,
Zhipeng Gao
,
Xiaojiang Du
,
Liehuang Zhu
A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Zhi Cao
,
Honggang Zhang
,
Benyuan Liu
,
Bo Sheng
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Donghe Li
,
Qingyu Yang
,
Wei Yu
,
Dou An
,
Xinwen Fu
U-PoT: A Honeypot Framework for UPnP-Based IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Muhammad A. Hakim
,
Hidayet Aksu
,
A. Selcuk Uluagac
,
Kemal Akkaya
S5: An Application Sensitive QoS Assurance System via SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Lei Wang
,
Qing Li
,
Lu Liu
,
Yong Jiang
,
Mingwei Xu
,
Jianping Wu
A Cost-effective and Energy-efficient Architecture for Die-stacked DRAM/NVM Memory Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yuhua Guo
,
Weijun Xiao
,
Qing Liu
,
Xubin He
Quality-Aware Task Assignment in Opportunistic Network-Based Crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Shohei Karaguchi
,
Kazuya Sakai
,
Satoshi Fukumoto
CoDE: Fast Name Lookup and Update using Conflict-driven Encoding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tong Shen
,
Xinyi Zhang
,
Gaogang Xie
,
Yuanmei Meng
,
Dafang Zhang
Oceanic Data Processing System Based on Multi-sensor Interaction through Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jiachen Yang
,
Qiming Zhao
,
Chang Wang
,
Bin Jiang
,
Tianyuan Zhang
,
Houbing Song
Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Jian Wang
,
Yongxin Liu
,
Alfaidi Amal
,
Houbing Song
,
Richard S. Stansbury
,
Jiawei Yuan
,
Tianyu Yang
When Group Buying Meets Wi-Fi Advertising
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yang Liu
,
Ying Zhang
,
Jianfeng Guan
,
Changqiao Xu
,
Yu Wang
The Frame Latency of Personalized Livestreaming Can Be Significantly Slowed Down by WiFi
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Guoshun Nan
,
Xiuquan Qiao
,
Jiting Wang
,
Zeyan Li
,
Jiahao Bu
,
Changhua Pei
,
Mengyu Zhou
,
Dan Pei
Software Rejuvenation in Computer Systems: An Automatic Forecasting Approach Based on Time Series
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Paulo Pereira
,
Jean Araujo
,
Rubens Matos
,
Nuno Preguiça
,
Paulo Maciel
Stride: Distributed Video Transcoding in Spark
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sajad Sameti
,
Mea Wang
,
Diwakar Krishnamurthy
Participant Grouping for Privacy Preservation in Mobile Crowdsensing over Hierarchical Edge Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ting Li
,
Zhijin Qiu
,
Lijuan Cao
,
Hanshang Li
,
Zhongwen Guo
,
Fan Li
,
Xinghua Shi
,
Yu Wang
Peer Data Caching Algorithms in Large-Scale High-Mobility Pervasive Edge Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yaodong Huang
,
Fan Ye
,
Yuanyuan Yang
Learning-based Cooperative Sound Event Detection with Edge Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jingrong Wang
,
Kaiyang Liu
,
George Tzanetakis
,
Jianping Pan
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Chao Liu
,
Jianan Li
,
Min Yu
,
Gang Li
,
Bo Luo
,
Kai Chen
,
Jianguo Jiang
,
Weiqing Huang
Classifying User Activities in the Encrypted WeChat Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chengshang Hou
,
Junzheng Shi
,
Cuicui Kang
,
Zigang Cao
,
Xiong Gang
A Novel Intrusion Detection Algorithm for Industrial Control Systems Based on CNN and Process State Transition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Junjiao Liu
,
Libo Yin
,
Yan Hu
,
Shichao Lv
,
Limin Sun
Robust and Unsupervised KPI Anomaly Detection Based on Conditional Variational Autoencoder
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Zeyan Li
,
Wenxiao Chen
,
Dan Pei
Real-time Distributed-Random-Forest-Based Network Intrusion Detection System Using Apache Spark
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hao Zhang
,
Shumin Dai
,
Yongdan Li
,
Wenjun Zhang
Rapid Deployment of Anomaly Detection Models for Large Number of Emerging KPI Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jiahao Bu
,
Ying Liu
,
Shenglin Zhang
,
Weibin Meng
,
Qitong Liu
,
Xiaotian Zhu
,
Dan Pei
OC-Cache: An Open-channel SSD Based Cache for Multi-Tenant Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Haitao Wang
,
Zhanhuai Li
,
Xiao Zhang
,
Xiaonan Zhao
,
Xingsheng Zhao
,
Weijun Li
,
Song Jiang
Binoclt: A New Binomial Classification Scheme for Long-Text Mining in Online Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Quanquan Chu
,
Shiyu Liu
,
Xiaofeng Gao
,
Fan Wu
,
Guihai Chen
,
Qianni Deng
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Rixin Xu
,
Qiang Zeng
,
Liehuang Zhu
,
Haotian Chi
,
Xiaojiang Du
Adaptive Video Encoding and Dynamic Channel Access for Real-time Streaming over SDRs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Debashri Roy
,
Tathagata Mukherjee
,
Mainak Chatterjee
,
Eduardo Pasiliao
AutoRARE: An Automated Tool For Generating FPGA-Based Multi-Memory Hardware Accelerators For Compute-Intensive Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shrikant S. Jadhav
,
Clay Gloster
,
Christopher Doss
,
Youngsoo Kim
,
Jannatun Naher
Towards Optimized Online Task Allocation in Cost-Sensitive Crowdsensing Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yang Zhang
,
Daniel Zhang
,
Qi Li
,
Dong Wang
Crail-KV: A High-Performance Distributed Key-Value Store Leveraging Native KV-SSDs over NVMe-oF
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tim Bisson
,
Ke Chen
,
Changho Choi
,
Vijay Balakrishnan
,
Yang-suk Kee
Friendly-Jamming-Aware Routing Protocols for Tactical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jonghyun Kim
,
Stephan Bohacek
,
Pratik K. Biswas
,
Siamak Samoohi
,
Sharon Mackey
,
Mitesh Patel
HyperProtect: Enhancing the Performance of a Dynamic Backup System Using Intelligent Scheduling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yaobin Qin
,
Brandon Hoffmann
,
David J. Lilja
How to Set Timeout: Achieving Adaptive Load Balance in Asymmetric Topology Based on Flowlet Switching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhiqiang Guo
,
Xiaodong Dong
,
Sheng Chen
,
Xiaobo Zhou
,
Keqiu Li
On the Impact of Sweep Radius and Energy Limitation on Sweep Coverage in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Baihong Chen
,
Hongwei Du
,
Chuang Liu
,
Qiang Ye
GD-FTL: Improving the Performance and Lifetime of TLC SSD by Downgrading Worn-out Blocks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tianming Yang
,
Haitao Wu
,
Wei Sun
Forwarding and Optical Indices in an All-Optical BCube Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Suzhen Wang
,
Jingjing Luo
,
Yuan-Hsun Lo
,
Wing Shing Wong
Reliability and Performance Analysis of a Data Center's Network Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Walid Mokhtar Bennaceur
,
Leïla Kloul
A New Game Theoretic Scheme for Verifiable Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Pinglan Liu
,
Wensheng Zhang
Imaging Subsurface Civil Infrastructure with Smart Seismic Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Maria Valero
,
Fangyu Li
,
WenZhan Song
,
XiangYang Li
iPand: Accurate Gesture Input with Ambient Acoustic Sensing on Hand
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shumin Cao
,
Xin He
,
Peide Zhu
,
Mingshi Chen
,
Xiangyang Li
,
Panlong Yang
Intelligent Optimization-Based Energy-Efficient Networking in Cloud Services for Multimedia Big Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dingde Jiang
,
Yihang Zhang
,
Houbing Song
,
Wenjuan Wang
Choosing the Best Server for a Data Center: The Importance of Workload Weighting
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sulav Malla
,
Ken Christensen
Implementing Correct and Efficient Collision Avoidance in Multi-Hop Ad-Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
J.J. Garcia-Luna-Aceves
A graph neural network based efficient firmware information extraction method for IoT devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Weidong Zhang
,
Hong Li
,
Hui Wen
,
Hongsong Zhu
,
Limin Sun
FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Weilan Lin
,
Meng Ma
,
Disheng Pan
,
Ping Wang
BFRP: Endpoint Congestion Avoidance Through Bilateral Flow Reservation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tianye Yang
,
Dezun Dong
,
Cunlu Li
,
Liquan Xiao
A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shuyi Zhang
,
Shiran Pan
,
Wei Wang
,
Qiongxiao Wang
Socialite: Social Activity Mining and Friend Auto-labeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Guangjing Wang
,
Lan Zhang
,
Zhi Yang
,
Xiang-Yang Li
2-Dominant Resource Fairness: Fairness-Efficiency Tradeoffs in Multi-resource Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Suhan Jiang
,
Jie Wu
Vehicle Delay-tolerant Network Routing Algorithm based on Multi-period Bayesian Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hongyu Zhou
,
Jiagao Wu
,
Lu Shen
,
Linfeng Liu
UAV-enabled Data Gathering in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Ionut Cardei
,
Mihaela Cardei
,
Rafael Papa
ThinDedup: An I/O Deduplication Scheme that Minimizes Efficiency Loss due to Metadata Writes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fan Ni
,
Xingbo Wu
,
Weijun Li
,
Song Jiang
A Road-Aware Spatial Mapping for Moving Objects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xingsheng Zhao
,
Jingwen Shi
,
Mingzhe Du
,
Fan Ni
,
Song Jiang
,
Yang Wang
Efficient Allocation and Heterogeneous Composition of NVM Crossbar Arrays for Deep Learning Acceleration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hao Yan
,
Armin Haj Aboutalebi
,
Lide Duan
Utility-based Allocation of Industrial IoT Applications in Mobile Edge Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Amardeep Mehta
,
Ewnetu Bayuh Lakew
,
Johan Tordsson
,
Erik Elmroth
Cloud Resource Provisioning for Combined Stream and Batch Workflows
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Raed Alsurdeh
,
Rodrigo N. Calheiros
,
Kenan M. Matawie
,
Bahman Javadi
Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Ghanshyam Bhutra
,
Amar Rasheed
,
Rabi Mahapatra
A Novel Method to Generate Frequent Itemsets in Distributed Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jingyi Zheng
,
Xiaoheng Deng
,
Honggang Zhang
CODA: Achieving Multipath Data Transmission in NDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Dongbiao He
,
Jinlei Jiang
,
Guangwen Yang
,
Cedric Westphal
QoS-Aware Matching of Edge Computing Services to Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nafiseh Sharghivand
,
Farnaz Derakhshan
,
Lena Mashayekhy
Location-leaking through Network Traffic in Mobile Augmented Reality Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Gabriel Meyer-Lee
,
Jiacheng Shang
,
Jie Wu
DeepSDN: Connecting the Dots Towards Self-driving Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Kuldip Singh Atwal
,
Mostafa Bassiouni
3D-PIM NoCs with Multiple Subnetworks: A Performance and Power Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Abdel-Hameed A. Badawy
,
Jesus Gardea
,
Yuho Jin
,
Jonathan Cook
Data Exchange in Delay Tolerant Networks using Joint Inter- and Intra-Flow Network Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Pouya Ostovari
,
Jie Wu
,
Alireza Jolfaei
A Case-Based Decision System for Routing in Packet-Switched Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Zirui Zhuang
,
Jingyu Wang
,
Qi Qi
,
Haifeng Sun
,
Jianxin Liao
Discover and Secure (DaS): An Automated Virtual Machine Security Management Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Beaulah A Navamani
,
Chuan Yue
,
Xiaobo Zhou
Fully Dynamic Broadcasting under SINR
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Dongxiao Yu
,
Longlong Lin
,
Yong Zhang
,
Jiguo Yu
,
Yifei Zou
,
Qiang-Sheng Hua
,
Xiuzhen Cheng
Decouple and Stretch: A Boost to Channel Pruning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Zhen Chen
,
Jianxin Lin
,
Sen Liu
,
Jun Xia
,
Weiping Li
A Cache Based DoS Attack on Real Information Centric Networking System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Faustina J. Anto Morais
,
Swapnoneel Roy
,
Sanjay P. Ahuja
Dynamic Reservation and Deep Reinforcement Learning based Autonomous Resource Management for wireless Virtual Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Guolin Sun
,
Gebrekidan Tesfay Zemuy
,
Kun Xiong
Network Embedding based on External Word Vectors
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
XiaoKun Zhang
,
Yan Liu
,
Jing Chen
Cost Effective test-bed for Comparison of SDN Network and Traditional Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Adriana Collaguazo Jaramillo
,
Ronny Alcivar
,
Joffre Pesantez
,
Ronald Ponguillo
EasyOrchestrator: A NFV-based Network Service Creation Platform for End-users
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yi Yue
,
Bo Cheng
A More Scalable Scheduling Algorithm for FPGA-based Time-Triggered Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Yulong Zhan
,
Jihong Zhu
Reversible Programming Techniques for Shortest-Path Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Lanying Guo
,
Chao Peng
,
Siyuan Chen
,
Cheng He
Centralized In-network Caching for Information Centric Networking with Decoupling Data and Control Planes
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Sen Wang
,
Biao Zhang
An Effective Scheme to Utilize Caches for Streaming Services in Mobile CCN
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Go Nakagawa
,
Yusuke Ito
,
Yurino Sato
,
Hiroyuki Koga
On the Use of Q-Learning to Solve the Selectable Virtual Network Embedding Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Sen Wang
,
Biao Zhang
Availability-Aware Container Scheduler for Application Services in Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yanal Alahmad
,
Tariq Daradkeh
,
Anjali Agarwal
An Efficient Latch-free Database Index Based on Multi-dimensional Lists
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Kenneth Lamar
,
Ramin Izadpanah
,
Jim Brandt
,
Damian Dechev
A Deep Learning Based Framework for Cloud Masquerade Attack Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Shuting Xu
,
Shuhua Lai
,
Yongjian Li
Notice of Removal: HCache: A Hybrid Caching Strategy in Information-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Haibo Wu
,
Jun Li
,
Jiang Zhi
,
Yongmao Ren
,
Lingling Li
IPCCC 2018 General Chairs
Freely available from IEEE.
pp. 1-1
IPCCC 2018 Technical Program Co-Chairs
Freely available from IEEE.
pp. 1-1
Showing 91 out of 91