Applications and Experiences Track Papers
Accepted Papers
- 9, Opportunistic Energy Sharing Between Power Grid and Electric Vehicles: A Game Theory-Based Pricing Policy
- 24, MobiQoR: Pushing the Envelope of Mobile Edge Computing via Quality-of-Result Optimization
- 71, Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control
- 86, Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy
- 88, GBooster: Towards Acceleration of GPU-intensive Mobile Applications
- 89, Privacy Preserving User-based Recommender System
- 109, TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks
- 110, Multi-Resource Load Balancing for Virtual Network Functions
- 111, Virtual Machine Power Accounting with Shapley Value
- 113, Reducing Cellular Signaling Traffic for Heartbeat Messages via Energy-Efficient D2D Forwarding
- 120, DeepOpp: Context-aware Mobile Access to Social Media Content on Underground Metro Systems
- 137, Privacy Preserving Optimization of Participatory Sensing in Mobile Cloud Computing
- 165, Specifying a Distributed Snapshot Algorithm as a Meta-program and Model Checking it at Meta-level
- 215, Optimal Resource Allocation for Multi-user Video Streaming over mmWave Networks
- 217, On Directional Neighbor Discovery in mmWave Networks
- 252, Learning from failure across multiple clusters: A trace-driven approach to understanding, predicting, and mitigating job terminations
- 267, Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds
- 276, Data Integrity for Collaborative Applications over Hosted Services
- 277, A preventive auto-parallelization approach for elastic stream processing
- 283, Scalable Routing for Topic-based Publish/Subscribe Systems under Fluctuations
- 284, Fast and Flexible Networking for Message-oriented Middleware
- 310, TailCut: Power Reduction under Quality and Latency Constraints in Distributed Search Systems
- 313, Joint Request Balancing and Content Aggregation in Crowdsourced CDN
- 316, SPHINX: A Password Store that Perfectly Hides Passwords from Itself
- 335, RBAY: A Scalable and Extensible Information Plane for Federating Distributed Datacenter Resources
- 340, Task-aware TCP in Data Center Networks
- 344, BEES: Bandwidth- and Energy- Efficient Image Sharing for Real-time Situation Awareness
- 352, Parallelizing Big De Bruijn Graph Construction on Heterogeneous Processors
- 408, Scaling k-Nearest Neighbors Queries
- 471, Efficient Distributed Coordination at WAN scale
- 472, JPR: Exploring Joint Partitioning and Replication for Traffic Minimization in Online Social Networks
- 478, Self-Evolving Subscriptions for Content-Based Publish/Subscribe Systems
- 523, Limitations of Load Balancing Mechanisms for N-Tier Systems in the Presence of Millibottlenecks
- 540, A Multi-Agent Parallel Apporach to Analyzing Large Climate Data Sets
- 564, Optimizing Source Selection in Social Sensing in the Presence of Influence Graphs
- 578, Energy Efficient Object Detection in Camera Sensor Networks
- 582, A Versatile Platform for Mobile Data Gathering Experiments in Wireless Sensor Networks
- 583, Dependable Cloud Resources with Guardian
- 590, Leveraging Target k-Coverage in Wireless Rechargeable Sensor Networks
- 630, On Achieving Efficient Data Transfer for Graph Processing in Geo-Distributed Datacenters
- 673, Shrink: A Breast Cancer Risk Assessment Model Based on Medical Social Network
- 684, Energy Proportional Servers: Where Are We in 2016?
- 697, When Smart TV Meets CRN: Privacy-preserving Fine-grained Spectrum Access
- 707, A Communication-aware Container Re-distribution Approach for High Performance VNFs
- 709, Transparent Fault-Tolerance using Intra-Machine Full-Software-Stack Replication
- 712, Minimizing Cost in IaaS Clouds via Scheduled Instance Reservation
- 717, k-Protected Routing Protocol in Multi-hop Cognitive Radio Networks
- 719, StoArranger: Enabling Efficient Usage of Cloud Storage Services on Mobile Devices
- 720, Revisiting Security Risks of Asymmetric ScalarProduct Preserving Encryption and Its Variants
- 721, An Adversary-Centric Behavior Modeling of DDoS Attacks
- 725, REX: Rapid Ensemble Classification System for Landslide Detection using Social Media
- 744, MDL$^\propto$: Accurate and Private Multiparty Deep Learning
- 745, Toward An Integrated Approach to Localizing Failures in Community Water Networks
- 748, OPPay: Design and Implementation of A Payment System for Opportunistic Data Services
- 751, Characterizing Performance and Energy-efficiency of The RAMCloud Storage System
- 758, Performance Analysis of Cloud Computing Centers Serving Parallelizable Rendering Jobs Using M/M/c/r Queuing Systems
- 762, Proactively Secure Cloud-Enabled Storage
- 766, Evaluation of Deep Learning Frameworks over Different HPC Architectures
- 767, Are HTTP/2 Servers Ready Yet?
- 831, PhaseBeat: Exploiting CSI Phase Data for Vital Sign Monitoring with Commodity WiFi Devices