Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDCS
ICDCS 2016
Generate Citations
2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)
June 27 2016 to June 30 2016
Nara, Japan
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xiii
Message from the ICDCS 2016 General Co-Chairs
Freely available from IEEE.
pp. xiv-xiv
Message from the ICDCS 2016 Program Committee Co-Chairs
Freely available from IEEE.
pp. xv-xv
Organizing Committee
Freely available from IEEE.
pp. xvi-xvi
Technical Program Committees
Freely available from IEEE.
pp. xvii-xxiv
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xxv-xxvi
A Look at Basics of Distributed Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Michel Raynal
Cognitive Technologies for Smarter Cities
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-21
by
Martin G. Kienzle
Reflecting on the Past, Preparing for the Future: From Peer-to-Peer to Edge-Centric Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-23
by
Alberto Montresor
Software-Based Networks: Leveraging High-Performance NFV Platforms to Meet Future Communication Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-24
by
K. K. Ramakrishnan
INSPECTOR: Data Provenance Using Intel Processor Trace (PT)
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-34
by
Jörg Thalheim
,
Pramod Bhatotia
,
Christof Fetzer
PAG: Private and Accountable Gossip
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-44
by
Jérémie Decouchant
,
Sonia Ben Mokhtar
,
Albin Petit
,
Vivien Quéma
Practical Intrusion-Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-56
by
Daniel Obenshain
,
Thomas Tantillo
,
Amy Babay
,
John Schultz
,
Andrew Newell
,
Md. Edadul Hoque
,
Yair Amir
,
Cristina Nita-Rotaru
Gremlin: Systematic Resilience Testing of Microservices
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-66
by
Victor Heorhiadi
,
Shriram Rajagopalan
,
Hani Jamjoom
,
Michael K. Reiter
,
Vyas Sekar
CRONets: Cloud-Routed Overlay Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-77
by
Chris X. Cai
,
Franck Le
,
Xin Sun
,
Geoffrey G. Xie
,
Hani Jamjoom
,
Roy H. Campbell
Riptide: Jump-Starting Back-Office Connections in Cloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-87
by
Marcel Flores
,
Amir R. Khakpour
,
Harkeerat Bedi
The Internet is for Porn: Measurement and Analysis of Online Adult Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-97
by
Faraz Ahmed
,
M. Zubair Shafiq
,
Alex X. Liu
Tuning the Aggressive TCP Behavior for Highly Concurrent HTTP Connections in Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-107
by
Jiawei Huang
,
Jianxin Wang
,
Tao Zhang
,
Jianer Chen
,
Yi Pan
A Performance Analysis of Incentive Mechanisms for Cooperative Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-117
by
Carlee Joe-Wong
,
Youngbin Im
,
Kyuyong Shin
,
Sangtae Ha
GrapH: Heterogeneity-Aware Graph Computation with Adaptive Partitioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-128
by
Christian Mayer
,
Muhammad Adnan Tariq
,
Chen Li
,
Kurt Rothermel
Minimum-Cost Cloud Storage Service Across Multiple Cloud Providers
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-138
by
Guoxin Liu
,
Haiying Shen
A Realistic and Optimized V2V Communication System for Taxicabs
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-148
by
Yang Wang
,
Erkun Yang
,
Wei Zheng
,
Liusheng Huang
,
Hengchang Liu
,
Binxin Liang
Optimal Marching of Autonomous Networked Robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-158
by
Buri Ban
,
Miao Jin
,
Hongyi Wu
RichNote: Adaptive Selection and Delivery of Rich Media Notifications to Mobile Users
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-168
by
Md. Yusuf Sarwar Uddin
,
Vinay Setty
,
Ye Zhao
,
Roman Vitenberg
,
Nalini Venkatasubramanian
Decentralized Context Sharing in Vehicular Delay Tolerant Networks with Compressive Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-178
by
Kun Xie
,
Wang Luo
,
Xin Wang
,
Dongliang Xie
,
Jiannong Cao
,
Jigang Wen
,
Gaogang Xie
RuleTris: Minimizing Rule Update Latency for TCAM-Based SDN Switches
Full-text access may be available. Sign in or learn about subscription options.
pp. 179-188
by
Xitao Wen
,
Bo Yang
,
Yan Chen
,
Li Erran Li
,
Kai Bu
,
Peng Zheng
,
Yang Yang
,
Chengchen Hu
RITM: Revocation in the Middle
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-200
by
Pawel Szalachowski
,
Laurent Chuat
,
Taeho Lee
,
Adrian Perrig
A Distributed Auctioneer for Resource Allocation in Decentralized Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-210
by
Amin M. Khan
,
Xavier Vilaça
,
Luís Rodrigues
,
Felix Freitag
Datacomp: Locally Independent Adaptive Compression for Real-World Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 211-220
by
Peter A. H. Peterson
,
Peter L. Reiher
Hybrid Content-Based Routing Using Network and Application Layer Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 221-231
by
Sukanya Bhowmik
,
Muhammad Adnan Tariq
,
Lobna Hegazy
,
Kurt Rothermel
Exploiting Causality to Engineer Elastic Distributed Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-241
by
K. R. Jayaram
RUSH: A RobUst ScHeduler to Manage Uncertain Completion-Times in Shared Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-251
by
Zhe Huang
,
Bharath Balasubramanian
,
Michael Wang
,
Tian Lan
,
Mung Chiang
,
Danny H. K. Tsang
The Same Speed Timer in Population Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-261
by
Yuichi Sudo
,
Toshimitsu Masuzawa
,
Ajoy K. Datta
,
Lawrence L. Larmore
Interactive Wireless Charging for Energy Balance
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-270
by
Sotiris Nikoletseas
,
Theofanis P. Raptis
,
Christoforos Raptopoulos
Nearly Optimal Distributed Algorithm for Computing Betweenness Centrality
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-280
by
Qiang-Sheng Hua
,
Haoqiang Fan
,
Ming Ai
,
Lixiang Qian
,
Yangyang Li
,
Xuanhua Shi
,
Hai Jin
An Efficient Lock-Free Logarithmic Search Data Structure Based on Multi-dimensional List
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-292
by
Deli Zhang
,
Damian Dechev
Characterizing the Computational Power of Anonymous Mobile Robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-302
by
Mattia D'Emidio
,
Daniele Frigioni
,
Alfredo Navarra
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-312
by
Nolen Scaife
,
Henry Carter
,
Patrick Traynor
,
Kevin R. B. Butler
Amnesia: A Bilateral Generative Password Manager
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-322
by
Luren Wang
,
Yue Li
,
Kun Sun
Know Your Phish: Novel Techniques for Detecting Phishing Sites and Their Targets
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-333
by
Samuel Marchal
,
Kalle Saari
,
Nidhi Singh
,
N. Asokan
BotMeter: Charting DGA-Botnet Landscapes in Large Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 334-343
by
Ting Wang
,
Xin Hu
,
Jiyong Jang
,
Shouling Ji
,
Marc Stoecklin
,
Teryl Taylor
Enabling Privacy-Preserving Incentives for Mobile Crowd Sensing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 344-353
by
Haiming Jin
,
Lu Su
,
Bolin Ding
,
Klara Nahrstedt
,
Nikita Borisov
Quality-Aware and Fine-Grained Incentive Mechanisms for Mobile Crowdsensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 354-363
by
Jing Wang
,
Jian Tang
,
Dejun Yang
,
Erica Wang
,
Guoliang Xue
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-373
by
Na Ruan
,
Lei Gao
,
Haojin Zhu
,
Weijia Jia
,
Xiang Li
,
Qi Hu
Resource-Aware Photo Crowdsourcing Through Disruption Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-383
by
Yibo Wu
,
Yi Wang
,
Wenjie Hu
,
Xiaomei Zhang
,
Guohong Cao
Mayflower: Improving Distributed Filesystem Performance Through SDN/Filesystem Co-Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-394
by
Sajjad Rizvi
,
Xi Li
,
Bernard Wong
,
Fiodar Kazhamiaka
,
Benjamin Cassell
A Parity-Based Data Outsourcing Model for Query Authentication and Correction
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-404
by
Shixin Tian
,
Ying Cai
,
Zhenbi Hu
Cure: Strong Semantics Meets High Availability and Low Latency
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-414
by
Deepthi Devaki Akkoorath
,
Alejandro Z. Tomsic
,
Manuel Bravo
,
Zhongmiao Li
,
Tyler Crain
,
Annette Bieniusa
,
Nuno Preguiça
,
Marc Shapiro
Flexible Instance: Meeting Deadlines of Delay Tolerant Jobs in the Cloud with Dynamic Pricing
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-424
by
Xiaomeng Yi
,
Fangming Liu
,
Zongpeng Li
,
Hai Jin
SpotLight: An Information Service for the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 425-436
by
Xue Ouyang
,
David Irwin
,
Prashant Shenoy
Routing and Scheduling of Social Influence Diffusion in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 437-446
by
Hui-Ju Hung
,
De-Nian Yang
,
Wang-Chien Lee
Social Graph Publishing with Privacy Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-456
by
Faraz Ahmed
,
Alex X. Liu
,
Rong Jin
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-466
by
Douglas McGeehan
,
Dan Lin
,
Sanjay Madria
On Source Dependency Models for Reliable Social Sensing: Algorithms and Fundamental Error Bounds
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-476
by
Shuochao Yao
,
Shaohan Hu
,
Shen Li
,
Yiran Zhao
,
Lu Su
,
Lance Kaplan
,
Aylin Yener
,
Tarek Abdelzaher
Efficient Top-k Result Diversification for Mobile Sensor Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-486
by
Masahiro Yokoyama
,
Takahiro Hara
Energy Minimization for Quality-Constrained Video with Multipath TCP over Heterogeneous Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 487-496
by
Jiyan Wu
,
Bo Cheng
,
Ming Wang
Efficient Resource Allocation and Consolidation with Selfish Agents: An Adaptive Auction Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-508
by
Richard T. B. Ma
HIDE: AP-Assisted Broadcast Traffic Management to Save Smartphone Energy
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-518
by
Ge Peng
,
Gang Zhou
,
David T. Nguyen
,
Xin Qi
,
Shan Lin
Accurate Spatial Calibration of RFID Antennas via Spinning Tags
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-528
by
Chunhui Duan
,
Lei Yang
,
Yunhao Liu
WiLocator: WiFi-Sensing Based Real-Time Bus Tracking and Arrival Time Prediction in Urban Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 529-538
by
Wenping Liu
,
Jiangchuan Liu
,
Hongbo Jiang
,
Bicheng Xu
,
Hongzhi Lin
,
Guoyin Jiang
,
Jing Xing
CACE: Exploiting Behavioral Interactions for Improved Activity Recognition in Multi-inhabitant Smart Homes
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-548
by
Mohammad Arif Ul Alam
,
Nirmalya Roy
,
Archan Misra
,
Joseph Taylor
Overlay Design for Topic-Based Publish/Subscribe under Node Degree Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 549-559
by
Chen Chen
,
Yoav Tock
,
Hans-Arno Jacobsen
Service Placement for Detecting and Localizing Failures Using End-to-End Observations
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-569
by
Ting He
,
Novella Bartolini
,
Hana Khamfroush
,
InJung Kim
,
Liang Ma
,
Tom La Porta
Live Exploration of Dynamic Rings
Full-text access may be available. Sign in or learn about subscription options.
pp. 570-579
by
G.A. Di Luna
,
S. Dobrev
,
P. Flocchini
,
N. Santoro
Randomized Load Balancing in Finite Regimes
Full-text access may be available. Sign in or learn about subscription options.
pp. 580-589
by
Antonie S. Godtschalk
,
Florin Ciucu
Spectrum Matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 590-599
by
Yanjiao Chen
,
Linshan Jiang
,
Haofan Cai
,
Jin Zhang
,
Baochun Li
CACA: Link-Based Channel Allocation Exploiting Capture Effect for Channel Reuse in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 600-608
by
Junghyun Jun
,
Solchan Yeon
,
Titir Kundu
,
Dharma P. Agrawal
,
Jaehoon Jeong
An Analysis of Onion-Based Anonymous Routing for Delay Tolerant Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 609-618
by
Kazuya Sakai
,
Min-Te Sun
,
Wei-Shinn Ku
,
Jie Wu
,
Faisal S. Alanazi
Directional Beam Alignment for Millimeter Wave Cellular Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 619-628
by
Jie Zhao
,
Xin Wang
,
Harish Viswanathan
Measurement, Modeling, and Analysis of TCP in High-Speed Mobility Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 629-638
by
Qingfang Liu
,
Ke Xu
,
Haiyang Wang
,
Meng Shen
,
Li Li
,
Qingyang Xiao
Backlog-Aware SRPT Flow Scheduling in Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 639-648
by
Tong Zhang
,
Fengyuan Ren
,
Ran Shu
An NFV Orchestration Framework for Interference-Free Policy Enforcement
Full-text access may be available. Sign in or learn about subscription options.
pp. 649-658
by
Xin Li
,
Chen Qian
Bandwidth-Greedy Hashing for Massive-Scale Concurrent Flows
Full-text access may be available. Sign in or learn about subscription options.
pp. 659-668
by
Tian Pan
,
Bin Liu
,
Xiaoyu Guo
,
Yang Li
,
Haoyu Song
Fast Total Ordering for Modern Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 669-679
by
Amy Babay
,
Yair Amir
A De-compositional Approach to Regular Expression Matching for Network Security Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 680-689
by
Eric Norige
,
Alex Liu
Privacy-Preserving Data Classification and Similarity Evaluation for Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 690-699
by
Qi Jia
,
Linke Guo
,
Zhanpeng Jin
,
Yuguang Fang
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor
Full-text access may be available. Sign in or learn about subscription options.
pp. 700-710
by
Qian Wang
,
Shengshan Hu
,
Jingjun Wang
,
Kui Ren
D-DEMOS: A Distributed, End-to-End Verifiable, Internet Voting System
Full-text access may be available. Sign in or learn about subscription options.
pp. 711-720
by
Nikos Chondros
,
Bingsheng Zhang
,
Thomas Zacharias
,
Panos Diamantopoulos
,
Stathis Maneas
,
Christos Patsonakis
,
Alex Delis
,
Aggelos Kiayias
,
Mema Roussopoulos
Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 721-722
by
Mingjun Xiao
,
Jie Wu
,
He Huang
,
Liusheng Huang
,
Chang Hu
RF-ISee: Identify and Distinguish Multiple RFID Tagged Objects in Augmented Reality Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 723-724
by
Jianqiang Sun
,
Lei Xie
,
Qingliang Cai
,
Chuyu Wang
,
Jie Wu
,
Sanglu Lu
OmniFlow: Coupling Load Balancing with Flow Control in Datacenter Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 725-726
by
Kaiyuan Wen
,
Zhuzhong Qian
,
Sheng Zhang
,
Sanglu Lu
Approximate Agreement under Mobile Byzantine Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 727-728
by
Silvia Bonomi
,
Antonella Del Pozzo
,
Maria Potop-Butucaru
,
Sébastien Tixeuil
Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 729-730
by
Yanzhi Dou
,
He Li
,
Kexiong Zeng
,
Jinshan Liu
,
Yaling Yang
,
Bo Gao
,
Kui Ren
On MinMax-Memory Claims for Scientific Workflows in the In-memory Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 731-732
by
Yang Wang
,
Chengzhong Xu
,
Shuibing He
,
Xian-He Sun
On the Efficiency of Decentralized Search in Expert Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 733-734
by
Liang Ma
,
Mudhakar Srivatsa
,
Derya Cansever
,
Xifeng Yan
,
Sue Kase
,
Michelle Vanni
Virtual Machine Level Temperature Profiling and Prediction in Cloud Datacenters
Full-text access may be available. Sign in or learn about subscription options.
pp. 735-736
by
Zhaohui Wu
,
Xiang Li
,
Peter Garraghan
,
Xiaohong Jiang
,
Kejiang Ye
,
Albert Y. Zomaya
Strategic Security Resource Allocation for Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 737-738
by
Antonino Rullo
,
Daniele Midi
,
Edoardo Serra
,
Elisa Bertino
FSQCN: Fast and Simple Quantized Congestion Notification in Data Center Ethernet
Full-text access may be available. Sign in or learn about subscription options.
pp. 739-740
by
Chang Ruan
,
Jianxin Wang
,
Wanchun Jiang
Practical Concurrent Wireless Charging Scheduling for Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 741-742
by
Peng Guo
,
Xuefeng Liu
,
Tingfang Tang
,
Shaojie Tang
,
Jiannong Cao
A Geometric Windowing Algorithm in Network Data-Plane Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 743-744
by
Richard Chen
,
Toru Mano
,
Takeru Inoue
,
Kimihiro Mizutani
,
Hisashi Nagata
,
Osamu Akashi
Dslash: Managing Data in Overloaded Batch Streaming Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 745-746
by
Robert Birke
,
Mathias Bjoerkqvist
,
Evangelia Kalyvianaki
,
Lydia Y. Chen
Distributed Online Data Aggregation in Dynamic Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 747-748
by
Quentin Bramas
,
Toshimitsu Masuzawa
,
Sébastien Tixeuil
Efficient Free-Rider Detection Using Symmetric Overlays
Full-text access may be available. Sign in or learn about subscription options.
pp. 749-750
by
João Silva
,
Xavier Vilaça
,
Hugo Miranda
,
Luís Rodrigues
Distributed Encoding for Multiple-Inherited Locators to Accommodate Billions of Objects in the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 751-752
by
Xiaozhe Shao
,
Feng Wang
,
Lixin Gao
,
Kenji Fujikawa
,
Hiroaki Harai
Sprout: A Functional Caching Approach to Minimize Service Latency in Erasure-Coded Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 753-754
by
Vaneet Aggarwal
,
Yih-Farn R. Chen
,
Tian Lan
,
Yu Xiang
UDS: A Unified Approach to Deterministic Multithreading
Full-text access may be available. Sign in or learn about subscription options.
pp. 755-756
by
Franz J. Hauck
,
Jörg Domaschka
DMZtore: A dispersed Data Storage System with Decentralized Multi-factor Access Control (Demo)
Full-text access may be available. Sign in or learn about subscription options.
pp. 757-758
by
Ertem Esiner
,
Shun Hanli Hanley
,
Anwitaman Datta
Showing 100 out of 112
Load More
Load All