ieee infocom 2014 - ieee ; 2 - gbv.de · ieeeinfocom2014-ieee conferenceoncomputer communications...

13
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Toronto, Ontario, Canada 27 April - 2 May 2014 Pages 952-1904 IEEE Catalog Number: CFP14INF-POD ISBN: 978-1-4799-3361-7 2/3

Upload: others

Post on 11-Oct-2019

11 views

Category:

Documents


0 download

TRANSCRIPT

IEEE INFOCOM 2014 - IEEE

Conference on ComputerCommunications

Toronto, Ontario, Canada

27 April - 2 May 2014

Pages 952-1904

IEEE Catalog Number: CFP14INF-POD

ISBN: 978-1-4799-3361-7

2/3

An Overlay Automata Approach to Regular Expression MatchingAlex X. Liu (Michigan State University, USA); EricTorng (Michigan State University, USA)pp. 952-960

PNL1: Panel 1

SIM 2: Sensor networks 2

Walking down the STAIRS: Efficient Collision Resolution for Wireless Sensor Networks

Xiaoyu Ji (Hong Kong University of Science and Technology, Hong Kong); Yuan He (TsinghuaUniversity, P.R. China); Jiliang Wang (Tsinghua University, P.R. China); Wei Dong (ZhejiangUniversity, P.R. China); Xiaopei Wu (Tsinghua University, P.R. China); Yunhao Liu (TsinghuaUniversity &The Hong Kong University of Science and Technology, P.R. China)pp. 961-969

Critical Sensing Range for Mobile Heterogeneous Camera Sensor Networks

Yitao Hu (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (Shanghai Jiaotong University,P.R. China); Xiaoying Gan (Shanghai Jiao Tong University, P.R. China)pp. 970-978

Bounded Stretch Geographic Homotopic Routing in Sensor Networks

Kan Huang (State University of New York at Stony Brook, USA); Chien-Chun Ni (Stony Brook

University, USA); Rik Sarkar (University of Edinburgh, United Kingdom); Jie Gao (Stony Brook

University, USA); Joseph Mitchell (SUNY Stony Brook, USA)pp. 979-987

Maximizing the Value ofSensed Information in Underwater Wireless Sensor Networks via an

Autonomous Underwater Vehicle

Stefano Basagni (Northeastern University, USA); Ladislau Boloni (University of Central Florida,USA); Petrika Gjanci (University of Rome "La Sapienza", Italy); Chiara Petrioli (University of Rome

"La Sapienza", Italy); Cynthia A Phillips (Sandia National Laboratories, USA); Damla Turgut(University of Central Florida, USA)pp. 988-996

WS1: Wireless security and privacy 1

SYNERGY: A Game-TheoreticalApproach for Cooperative Key Generation in Wireless Networks

Jingchao Sun (Arizona State University, USA); Xu Chen (Arizona State University, USA); Jinxue

Zhang (Arizona State University, USA); Yanchao Zhang (Arizona State University, USA); Junshan

Zhang (Arizona State University, USA)pp. 997-1005

Utility-based Cooperative Decision in Cooperative Authentication

Yunchuan Guo (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China);Yin Lihua (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Licai Liu

(Beijing University of Posts and Telecommunications & Institute of Information Engineering,Chinese Academy of Sciences, P.R. China); Fang Binxing (Institute of Computing TechnologyChinese Academy of Sciences, P.R. China)pp. 1006-1014

Security Vulnerability and Countermeasures of Frequency Offset Correction in 802.11a SystemsHanif Rahbari (University of Arizona, USA); Marwan Krunz (University of Arizona, USA); LoukasLazos (University of Arizona, USA)pp. 1015-1023

A New Efficient Physical LayerOFDM Encryption SchemeFei Huo (University of Waterloo, Canada); Guang Gong (University of Waterloo, Canada)pp. 1024-1032

CC5: Cloud computing 5

Consolidating Complementary VMs with Spatial/Temporal-awareness in Cloud DatacentersLiuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA)pp. 1033-1041

When Queueing Meets Coding: Optimal-Latency Data Retrieving Scheme in Storage Clouds

Shengbo Chen (Qualcomm R&D, USA); Yin Sun (the Ohio State University, USA); Ulas Can Kozat

(DOCOMO Innovations, USA); Longbo Huang (Tsinghua University, P.R. China); Prasun Sinha (OhioState University, USA); Guanfeng Liang (DOCOMO Innovations, USA); Xin Liu (UC Davis, USA);Ness B. Shroff (The Ohio State University, USA)pp. 1042-1050

Power Consumption of Virtual Machines with Network Transactions: Measurement and

Improvement

Ryan Shea (Simon Fraser University, Canada); Haiyang Wang (University of Minnesota at Duluth,USA); Jiangchuan Liu (Simon Fraser University, Canada)pp. 1051-1059

Can Mobile Cloudlets Support Mobile Applications?Yujin Li (North Carolina State University, USA); Wenye Wang (NC State University, USA)pp. 1060-1068

CN1: Cellular networks 1

Structured Spectrum Allocation and User Association in Heterogeneous Cellular Networks

Wei Bao (University of Toronto, Canada); Ben Liang (University of Toronto, Canada)pp. 1069-1077

Video Delivery over Heterogeneous Cellular Networks: Optimizing Cost and Performance

Konstantinos Poularakis (University of Thessaly, Greece); George Iosifidis (CERTH & University of

Thessaly, Greece); Antonios Argyriou (University of Thessaly & CERTH, Greece); Leandros Tassiulas

(University of Thessaly, Greece)pp. 1078-1086

Cell Planning for Heterogeneous Networks: An Approximation AlgorithmWentao Zhao (Nanjing University, P.R. China); Shaowei Wang (Nanjing University, P.R. China);Chonggang Wang (InterDigital Communications, USA); Xiaobing Wu (Nanjing University & National

Laboratory for Novel Software Technology, P.R. China)pp. 1087-1095

A College Admissions Game for Uplink User Association in Wireless Small Cell Networks

Walid Saad (Virginia Tech & Wireless@VT, USA); Zhu Han (University of Houston, USA); RongZheng (McMaster University, Canada); Merouane Debbah (Supelec, France); H. Vincent Poor

(Princeton University, USA)pp. 1096-1104

EE2: Energy efficiency in wireless networks 2

Safe Charging for Wireless Power Transfer

Haipeng Dai (Nanjing University & State Key Lab of Novel Software Technology, P.R. China);Yunhuai Liu (Third Research Institute of Ministry of Public Security, P.R. China); Guihai Chen

(Shanghai Jiao Tong University, P.R. China); Xiaobing Wu (Nanjing University & National

Laboratory for Novel Software Technology, P.R. China); Tian He (University of Minnesota, USA)pp. 1105-1113

Energy-efficient Cooperative Broadcast in Fading Wireless Networks

Chenxi Qiu (Clemson University, USA); Haiying Shen (Clemson University, USA); Lei Yu (Clemson

University, USA)pp. 1114-1122

Performance-aware Energy Optimization on Mobile Devices in Cellular Network

Yong Cui (Tsinghua University, P.R. China); Shihan Xiao (University of Tsinghua, P.R. China); Xin

Wang (Stony Brook University, USA); Minming Li (City University of Hong Kong, Hong Kong);Hongyi Wang (Tsinghua University, P.R. China); Zeqi Lai (Tsinghua University, P.R. China)

pp. 1123-1131

Microeconomic Analysis of Base-Station Sharing in Green Cellular Networks

Bingjie Leng (Tsinghua University, P.R. China); Parisa Mansourifard (University of Southern

California, USA); Bhaskar Krishnamachari (University of Southern California, USA)pp. 1132-1140

IM3: Internet monitoring and measurement 3

Optimal Collaborative Access Point Association in Wireless Networks

Ouldooz Baghban Karimi (Simon Fraser University, Canada); Jiangchuan Liu (Simon Fraser

University, Canada); Jennifer Rexford (Princeton University, USA)pp. 1141-1149

kBF: a Bloom Filter for Key-Value Storage with an Application on Approximate State

Sisi Xiong (University of Tennessee, Knoxville, USA); Yanjun Yao (University of Tennessee,

Knoxville, USA); Qing Cao (University of Tennessee, USA); Tian He (University of Minnesota, USA)pp. 1150-1158

Detecting Malicious HTTP Redirections Using Trees of User Browsing ActivityHesham Mekky (University of Minnesota, USA); Ruben Torres (Narus Inc., USA); Zhi-Li Zhang(University of Minnesota, USA); Sabyasachi Sana (Narus Inc., USA); Antonio Nucci (Narus inc.,USA)pp. 1159-1167

What Scale of Audience a Campaign can Reach in What Price on Twitter?

Yubao Zhang (College of William and Mary, USA); Xin Ruan (College of William and Mary, USA);

Haining Wang (College of William and Mary, USA); Hui Wang (National University of Defense

Technology, P.R. China)pp. 1168-1176

SN3: Sensor networks 3

How to identify global trends from local decisions? Event Region Detection on Mobile Networks

Andreas Loukas (Delft University of Technology, The Netherlands); Marco Zuniga (Delft Universityof Technology, The Netherlands); Ioannis Protonotarios (Delft University of Technology, The

Netherlands); Jie Gao (Stony Brook University, USA)pp. 1177-1185

Sleep in the Dins: Insomnia Therapy for Duty-cycled Sensor Networks

Jiliang Wang (Tsinghua University, P.R. China); Zhichao Cao (Tsinghua University, P.R. China);Xufei Mao (Tsinghua University, P.R. China); Yunhao Liu (Tsinghua University &The Hong KongUniversity of Science and Technology, P.R. China)pp. 1186-1194

Mobile-to-Mobile Energy Replenishment in Mission-Critical Robotic Sensor Networks

Liang He (Singapore University of Technology and Design, Singapore); Peng Cheng (SingaporeUniversity of Technology and Design, P.R. China); Yu Gu (Singapore University of Technology and

Design & Advanced Digital Sciences Center, Singapore); Jianping Pan (University of Victoria,Canada); Ting Zhu (State University of New York at Binghamton, USA);' Cong Liu (The University of

texas at Dallas, USA)pp. 1195-1203

Connected Wireless Camera Network Deployment with Visibility Coverage

Hua Huang (Temple University, USA); Chien-Chun Ni (Stony Brook University, USA); Jie Gao

(Stony Brook University, USA); Xiaomeng Ban (Stony Brook University, USA); Andrew Schneider

(Temple University, USA); Shan Lin (Temple University, USA)pp. 1204-1212

US: Urban sensing and environmental monitoring

How to Crowdsource Tasks Truthfully without Sacrificing Utility: Online Incentive Mechanisms

with Budget Constraint

Dong Zhao (Beijing University of Posts and Telecommunications, P.R. China); Xiang-Yang Li (IllinoisInstitute of Technology, USA); Huadong Ma (Beijing University of Posts and Telecommunications,P.R. China)pp. 1213-1221

Compressive Sensing over Strongly Connected Digraph and Its Transportation Monitoring

Application

Xiao Qi (Tsinghua University, P.R. China); Yongcai Wang (Tsinghua University, P.R. China);Yuexuan Wang (The University of Hong Kong & Tsinghua University, P.R. China); Liwen Xu

(Tsinghua University, P.R. China)pp. 1222-1230

TRAC: Truthful Auction for Location-Aware Collaborative Sensing in Mobile CrowdsourcingZhenni Feng (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Qian Zhang (Hong Kong University of Science and Technology, HongKong); Lionel Ni (Hong Kong University of Science and Technology, Hong Kong); Athanasios V.

Vasilakos (National Technical University of Athens & Kuwait University, Greece)pp. 1231-1239

ShopProfiler: Profiling Shops with Crowdsourcing Data

Xiaonan Guo (Singapore Management University, Singapore); Eddie Chan (The Hong KongUniversity of Science and Technology, Hong Kong); Ce Liu (University of Pittsburgh, USA); Kaishun

Wu (HKUST & Sun Yat-sen University, Hong Kong); Siyuan Liu (Carnegie Mellon University, USA);Lionel Ni (Hong Kong University of Science and Technology, Hong Kong)pp. 1240-1248

WS2: Wireless security and privacy 2

PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions

Zhili Chen (University of Science and Technology of China, P.R. China); Liusheng Huang (Universityof Science and Technology of China, P.R. China); Lu Li (University of Science and Technology of

China, P.R. China); Wei Yang (University of Science and Technology of China, P.R. China); Haibo

Miao (University of Science and Technology of China, P.R. China); Miaomiao Tian (University of

Science and Technology of China, P.R. China); Fei Wang (Suzhou Institute for Advanced Study,

USTC & NHPCC, USTC, P.R. China)pp. 1249-1257

Information Leaks Out: Attacks and Countermeasures on Compressive Data Gathering in

Wireless Sensor Networks

Pengfei Hu (University of California, Davis, USA); Kai Xing (University of Science and Technology of

China, P.R. China); Xiuzhen Cheng (George Washington Univ, USA); Hao Wei (The Chinese

University of Hong Kong, Hong Kong); Haojin Zhu (Shanghai Jiao Tong University, P.R. China)pp. 1258-1266

Secure Cooperative Spectrum Sensing and Access Against Intelligent Malicious Behaviors

Wei Wang (Zhejiang University, P.R. China); Lin Chen (The University of Paris-Sud, France); KangG. Shin (University of Michigan, USA); Lingjie Duan (Singapore University of Technology and

Design (SUTD), Singapore)pp. 1267-1275

Physical Layer Challenge-Response Authentication in Wireless Networks with RelayXianru Du (University of Michigan - Dearborn, USA); Dan Shan (GM Research, USA); Kai Zeng(University of Michigan - Dearborn, USA); Lauren Huie (Air Force Research Lab, USA)pp. 1276-1284

CC6: Cloud computing 6

A Deep Investigation Into Network Performance in Virtual Machine Based Cloud Environment

Ryan Shea (Simon Fraser University, Canada); Feng Wang (The University of Mississippi, USA);Haiyang Wang (University of Minnesota at Duluth, USA); Jiangchuan Liu (Simon Fraser University,

Canada)pp. 1285-1293

RIAL: Resource Intensity Aware Load Balancing in Clouds

Liuhua Chen (Clemson University, USA); Haiying Shen (Clemson University, USA); Karan Sapra(Clemson University, USA)pp. 1294-1302

Optimal Approximation Algorithm of Virtual Machine Placement for Data Latency Minimization

in Cloud SystemsJian-Jhih Kuo (National Tsing Hua University, Taiwan); Hsiu-Hsien Yang (National Tsing Hua

University, Taiwan); Ming-JerTsai (National Tsing Hua University, Taiwan)pp. 1303-1311

Using Stop-and-Wait to Improve TCP Throughput in Fast Optical Switching (FOS) Networks

over Short Physical Distances

Pablo Jesus Argibay-Losada (SUNY at Buffalo, USA); Kseniia Nozhnina (State University of

Information and Communication Technologies, Ukraine); Gokhan Sahin (University of Aveiro,

Portugal); Chunming Qiao (State University of New York at Buffalo, USA)pp. 1312-1320

CN2: Cellular networks 2

"Wireless Networks Without Edges": Dynamic Radio Resource Clustering and User SchedulingYuhuan Du (University of Texas at Austin, USA); Gustavo de Veciana (The University of Texas at

Austin, USA)pp. 1321-1329

Cellular Multi-Coverage with Non-uniform Rates

Omer Gurewitz (Ben Gurion University, Israel); Yakov Sandomirsky (Ben Gurion University of the

Negev, Israel); Gabriel Scalosub (Ben-Gurion University, Israel)pp. 1330-1338

Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and AlgorithmsRobert Margolies (Columbia University, USA); Ashwin Sridharan (AT&T, USA); Vaneet Aggarwal(AT&T Labs - Research, USA); Rittwik Jana (AT&T Labs Research, USA); Nemmara K.

Shankaranarayanan (AT&T Laboratories - Research, USA); Vinay A. Vaishampayan (DIMACS,Rutgers University & Columbia University, USA); Gil Zussman (Columbia University, USA)pp. 1339-1347

User Mobility from the View of Cellular Data Networks

Ying Zhang (Ericsson Research, USA)pp. 1348-1356

EE3: Energy efficiency in wireless networks 3

Energy Efficient Wifi Tethering on a SmartphoneKyoung-Hak Jung (Pohang University of Science and Technology (POSTECH), Korea); Yuepeng Qi(Pohang University of Science and Technology (POSTECH), Korea); Chansu Yu (Cleveland State

University, USA); Young-Joo Suh (Pohang University of Science and Technology (POSTECH), Korea)pp. 1357-1365

Fair Energy-efficient Sensing Task Allocation in Participatory Sensing with SmartphonesQingwen Zhao (Shanghai Jiao Tong University, P.R. China); Yanmin Zhu (Shanghai Jiao TongUniversity, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University, P.R. China); Jian Cao

(Shanghai Jiaotong University, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.

China); Bo Li (Hong Kong University of Science and Technology, Hong Kong)pp. 1366-1374

Improved Structures for Data Collection in Wireless Sensor Networks

Jon Crowcroft (University of Cambridge, United Kingdom); Michael Segal (Ben-Gurion University of

the Negev, Israel); Liron Levin (Ben-Gurion University of the Negev, Israel)pp. 1375-1383

Energy-Efficient Capacity Optimization in Wireless Networks

Lu Liu (Illinois Institute of Technology, USA); Xianghui Cao (Illinois Institute of Technology &

Zhejiang University, USA); Yu Cheng (Illinois Institute of Technology, USA); Lili Du (IllinoisInstitute of Technology, USA); Wei Song (University of New Brunswick, Canada); Yu Wang

(University of North Carolina at Charlotte, USA)pp. 1384-1392

FN: Firewalls and network intrusion detection

ProWord: An Unsupervised Approach to Protocol Feature Word Extraction

Zhuo Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Zhibin

Zhang (Institute of Computing Technology, Chinese Academy of Sciences, P.R. China); Patrick Pak-

Ching Lee (The Chinese University of Hong Kong, Hong Kong); Yunjie Liu (Beijing University of

Posts and Telecommunications, P.R. China); Gaogang Xie (Institute of Computing Technology,Chinese Academy of Sciences, P.R. China)pp. 1393-1401

TorWard: Discovery of Malicious Traffic over Tor

Zhen Ling (Southeast University, P.R. China); Luo Junzhou (Southeast University, P.R. China); Kui

Wu (University of Victoria, Canada); Wei Yu (Towson University, USA); Xinwen Fu (University of

Massachusetts Lowell, USA)pp. 1402-1410

Transductive Malware Label Propagation: Find Your Lineage From Your NeighborsDeguang Kong (University of Texas at Arlington, USA); Guanhua Yan (Los Alamos National

Laboratory, USA)pp. 1411-1419

LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in

Network Data Streams

Qun Huang (The Chinese University of Hong Kong, P.R. China); Patrick Pak-Ching Lee (The Chinese

University of Hong Kong, Hong Kong)pp. 1420-1428

IM4: Internet monitoring and measurement 4

Bloom Tree: A Search Tree Based on Bloom Filters for Multiple-Set Membership Testing

MyungKeun Yoon (Kookmin University, Korea); JinWoo Son (Kookmin University, Korea); Seon-Ho

Shin (Kookmin University, Korea)pp. 1429-1437

A longitudinal analysis of Internet rate limitations

Joao Taveira Araujo (University College London, United Kingdom); Raul Landa (University College

London, United Kingdom); Richard G Clegg (University College London, United Kingdom); Kensuke

Fukuda (National Institute of Informatics, Japan); George Pavlou (University College London,United Kingdom)pp. 1438-1446

Monitor Placement for Maximal Identifiability in Network Tomography

Liang Ma (Imperial College London, United Kingdom); Ting He (IBM Research, USA); Kin K. Leung(Imperial College, United Kingdom); Ananthram Swami (Army Research Lab., USA); Don Towsley(University of Massachusetts at Amherst, USA)

pp. 1447-1455

* *

Can you SEE me now?"A Measurement Study of Mobile Video Calls

Chenguang Yu (Polytechnic Institute of NYU, USA); Yang Xu (Polytechnic Institute of NYU, USA); Bo

Liu (Polytechnic Institute of NYU, USA); Yong Liu (Polytechnic Institute of NYU, USA)pp. 1456-1464

SN4: Sensor networks 4

Optimal Link Scheduling for Delay-constrained Periodic Traffic over Unreliable Wireless Links

Yan Li (University of Otago, New Zealand); Haibo Zhang (Universtiy of Otago, New Zealand); ZhiyiHuang (University of Otago, New Zealand); Michael Albert (University of Otago, New Zealand)pp. 1465-1473

Approximate Multiple Count in Wireless Sensor Networks

Xiaolin Fang (Harbin Institute of Technology, P.R. China); Hong Gao (University of Harbin Institute

Technology, P.R. China); Jianzhong Li (Harbin Institute of Technology, P.R. China); Yingshu Li

(Georgia State University, USA)pp. 1474-1482

EV-Sounding: A Visual Assisted Electronic Channel Sounding SystemGang Li (the Ohio State University, USA); Jin Teng (The Ohio State University, USA); Fan Yang (theOhio State University, USA); Adam C. Champion (The Ohio State University, USA); Dong Xuan (TheOhio State University, USA); Hong Luan (University of Jinan, P.R. China); Yuan Fang Zheng (TheOhio-state University, USA)pp. 1483-1491

Coverage in Visual Sensor Networks with Pan-Tilt-Zoom Cameras: the MaxFoV Problem

Vikram P. Munishwar (State University of New York at Binghamton, USA); Vinay Kolar (IBM

Research, India); Nael Abu-Ghazaleh (State University of New York at Binghamton, USA)pp. 1492-1500

WS3: Wireless security and privacy 3

How Can Botnets Cause Storms? Understanding the Evolution and Impact of Mobile Botnets

Zhuo Lu (Intelligent Automation, Inc & North Carolina State University, USA); Wenye Wang (NCState University, USA); Cliff Wang (Army Research Office, USA)pp. 1501-1509

COLLECTOR: A Secure RFID-Enabled Batch Recall Protocol

Saiyu Qi (Hong Kong university of science and Technology, Hong Kong); Yuanqing Zheng (NanyangTechnological University, Singapore); Mo Li (Nanyang Technological University, Singapore); Li Lu

(University of Electronic Science and Technology of China, P.R. China); Yunhao Liu (TsinghuaUniversity &The Hong Kong University of Science and Technology, P.R. China)pp. 1510-1518

Analysis and Detection ofSIMbox Fraud in Mobility NetworksIlona Murynets (AT&T Security Research Center, USA); Michael Zabarankin (Stevens Institute of

Technology, USA); Roger Piqueras Jover (AT&T Security Research Center, USA); Adam Panagia(AT&T, USA)pp. 1519-1526

Scaling Laws for Secrecy Capacity in Cooperative Wireless Networks

Mahtab Mirmohseni (Sharif University of Technology, Iran); Panagiotis (Panos) Papadimitratos(KTH, Sweden)pp. 1527-1535

CN3: Cellular networks 3

Fast Resource Scheduling in HetNets with D2D SupportFrancesco Malandrino (Trinity College, Dublin, Ireland); Claudio E. Casetti (Politecnico di Torino,

Italy); Carla-Fabiana Chiasserini (Politecnico di Torino, Italy); Zana Limani (Politecnico di Torino,Italy)pp. 1536-1544

INDAPSON: An Incentive Data Plan Sharing System Based on Self-Organizing NetworkTuo Yu (Shanghai Jiaotong University, P.R. China); Zilong Zhou (Shanghai Jiao Tong University,P.R. China); Da Zhang (Shanghai Jiao Tong University, P.R. China); Xinbing Wang (ShanghaiJiaotong University, P.R. China); Yunxin Liu (Microsoft Research Asia, P.R. China); Songwu Lu

(University of California at Los Angeles, USA)pp. 1545-1553

A Mean Field GameApproach to Scheduling in Cellular Systems

Mayank Manjrekar (Texas A&M University, USA); Vinod Ramaswamy (Texas A&M University, USA);Srinivas Shakkottai (Texas A&M University, USA)pp. 1554-1562

R2D2: Embracing Device-to-Device Communication in Next Generation Cellular Networks

Tarun Bansal (The Ohio State University, USA); Karthikeyan Sundaresan (NEC Labs America, USA);

Sampath Rangarajan (NEC Labs America, USA); Prasun Sinha (Ohio State University, USA)pp. 1563-1571

DC1: Data center networking 1

On Efficient Bandwidth Allocation for Traffic Variability in Datacenters

Jian Guo (Huazhong University of Science and Technology, P.R. China); Fangming Liu (HuazhongUniversity of Science and Technology, P.R. China); Xiaomeng Huang (Tsinghua University, P.R.

China); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong); Mi Hu (HuazhongUniversity of Science and Technology, P.R. China); Gao Qiao (Huazhong University of Science and

Technology, P.R. China); Hai Jin (Huazhong University of Science and Technology, P.R. China)pp. 1572-1580

RepFlow: Minimizing Flow Completion Times with Replicated Flows in Data Centers

Hong Xu (City University of Hong Kong & University of Toronto, Hong Kong); Baochun Li (Universityof Toronto, Canada)pp. 1581-1589

Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic PerspectiveMarco Chiesa (Roma Tre University, Italy); Guy Kindler (Hebrew University of Jerusalem, Israel);Michael Schapira (Hebrew University of Jerusalem, USA)pp. 1590-1598

Towards Performance-Centric Fairness in Datacenter Networks

Li Chen (University of Toronto, Canada); Yuan Feng (The Hong Kong Polytechnic University, Hong

Kong); Baochun Li (University of Toronto, Canada); Bo Li (Hong Kong University of Science and

Technology, Hong Kong)pp. 1599-1607

FT1: Fault tolerance and survivability 1

Geometric Evaluation ofSurvivability of Disaster-affected Network with Probabilistic Failure

Hiroshi Saito (NTT & NTT Network Technology Laboratories, Japan)

pp. 1608-1616

Keep Forwarding: Towards K-link Failure Resilient RoutingBaohua Yang (IBM Research, P.R. China); Junda Liu (University of California, Berkeley, USA); Scott

Shenker (U. C. Berkeley and ICSI, USA); Jun Li (Tsinghua University, P.R. China); Kai Zheng (IBMResearch, P.R. China)pp. 1617-1625

Restorable Logical Topology in the Face of No or Partial Traffic Demand KnowledgeReuven Cohen (Technion, Israel); Gabi Nakibly (National EW Research & Simulation Center, Israel)pp. 1626-1634

Max-Flow Min-Cut Theorem and Faster Algorithms in a Circular Disk Failure Model

Yusuke Kobayashi (University of Tokyo, Japan); Kensuke Otsuki (University of Tokyo, Japan)pp. 1635-1643

SB1: Scheduling and buffer management 1

Distributed Backup Scheduling: Modeling and OptimizationPeter M van de Ven (IBM Thomas J. Watson Research Center, USA); Bo Zhang (IBM T. J. Watson

Research Center, USA); Angela Schorgendorfer (IBM T. J. Watson Research Center, USA)pp. 1644-1652

Fast And Simple Approximation Algorithms for Maximum Weighted Independent Set of Links

Peng-Jun Wan (Illinois Institute of Technology, USA); Xiaohua Jia (City University of Hong Kong,Hong Kong); Guo-Jun Dai (School of Computer Science, Hangzhou DianZi University, P.R. China);Hongwei Du (Harbin Institute of Technology Shenzhen Graduate School, P.R. China); Ophir Frieder

(Georgetown University, USA)pp. 1653-1661

A High-order Markov Chain Based Scheduling Algorithm for Low Delay in CSMA Networks

Jaewook Kwak (North Carolina State University, USA); Chul-Ho Lee (North Carolina State

University, USA); Do Young Eun (North Carolina State University, USA)pp. 1662-1670

Scheduling of Multicast and Unicast Services under Limited Feedback by using Rateless Codes

Yin Sun (the Ohio State University, USA); Can Emre Koksal (The Ohio State University, USA); Kyu-Han Kim (Hewlett-Packard Laboratories, USA); Ness B. Shroff (The Ohio State University, USA)pp. 1671-1679

SCI: Social computing and networks 1

LBSNSim: Analyzing and Modeling Location-based Social Networks

Wei Wei (College of William and Mary, USA); Xiaojun Zhu (Nanjing University, P.R. China); Qun Li

(College of William and Mary, USA)pp. 1680-1688

On Designing Neighbor Discovery Protocols: A Code-Based ApproachTong Meng (Shanghai Jiao Tong University, P.R. China); Fan Wu (Shanghai Jiao Tong University,P.R. China); Guihai Chen (Shanghai Jiao Tong University, P.R. China)pp. 1689-1697

Assessment of Multi-Hop Interpersonal Trust in Social Networks by Three-Valued SubjectiveLogic

Guangchi Liu (Montana State University, USA); Qing Yang (Montana State University, USA);Honggang Wang (University of Massachusetts, Dartmouth & College of Engineering, USA);Xiaodong Lin (University of Ontario Institute of Technology, Canada); Mike P Wittie (Montana State

University, USA)pp. 1698-1706

FluidRating: A Time-Evolving Rating Scheme in Trust-based Recommendation Systems UsingFluid Dynamics

Wenjun Jiang (Central South University, P.R. China); Jie Wu (Temple University, USA); Guojun

Wang (Central South University, P.R. China); Huanyang Zheng (Temple University, USA)

pp. 1707-1715

SD: Software defined networking

On Diagnosis of Forwarding Plane via Static Forwarding Rules in Software Defined NetworksUlas Can Kozat (DOCOMO Innovations, USA); Guanfeng Liang (DOCOMO Innovations, USA); KorayKokten (Ozyegin University, Turkey)pp. 1716-1724

Software Defined Monitoring of Application Protocols

Lukas Kekely (CESNET a. I. e., Czech Republic); Viktor Pus (CESNET, Czech Republic); Jan Korenek

(Brno University of Technology & CESNET, Czech Republic)pp. 1725-1733

On the effect of forwarding table size on SDN network utilization

Rami Cohen (IBM Research - Haifa, Israel); Liane Lewin-Eytan (Yahoo! Research, Israel); Joseph(Seffi) Naor (Technion, Israel); Danny Raz (Technion, Israel)pp. 1734-1742

Software Defined Green Data Center Network with Exclusive RoutingDan Li (Tsinghua University, P.R. China); Yunfei Shang (Tsinghua University, P.R. China); CongjieChen (Tsinghua University, P.R. China)pp. 1743-1751

VN1: Vehicular Networks 1

Towards Automatic Phone-to-Phone Communication for Vehicular Networking ApplicationsShaohan Hu (University of Illinois at Urbana-Champaign, USA); Hengchang Liu (UIUC, USA); Lu Su

(The State University of New York at Buffalo, USA); Hongyan Wang (UIUC, USA); Tarek Abdelzaher

(University of Illinois, Urbana Champaign, USA); Pan Hui (Hong Kong University of Science and

Technology & Telekom Innovation Laboratories, Hong Kong); Wei Zheng (University of Wisconsin -

Madison, USA); Zhiheng Xie (University of Virginia, USA); John Stankovic (University of Virginia,USA)pp. 1752-1760

POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks

Jun Qin (Shanghai Jiao Tong University, P.R. China); Hongzi Zhu (Shanghai Jiao Tong University,P.R. China); Yanmin Zhu (Shanghai Jiao Tong University, P.R. China); Li Lu (University of Electronic

Science and Technology of China, P.R. China); Xue Guangtao (Shanghai Jiao Tong University, P.R.

China); Minglu Li (Shanghai Jiao Tong University, P.R. China)pp. 1761-1769

On Multihop Communications For In-Vehicle Internet Access Based On a TDMA MAC Protocol

Hassan A Omar (University of Waterloo, Canada); Weihua Zhuang (University of Waterloo,Canada); Li Li (Communication Research Centre of Canada, Canada)pp. 1770-1778

GeoMob: A Mobility-aware Geocast Scheme in Metropolitans via Taxicabs and Buses

Lei Zhang (University of Victoria, Canada); Boyang Yu (University of Victoria, Canada); JianpingPan (University of Victoria, Canada)pp. 1779-1787

CN4: Cellular networks 4

Automated Dynamic Offset Applied to Cell Association

Majed Haddad (INRIA, France); Habib B.A. Sidi (Orange Labs, France); Piotr Wiecek (WroclawUniversity of Technology, Poland); Eitan Altman (INRIA, France)pp. 1788-1796

Interference Coordination Strategies for Content Update Dissemination in LTE-A

Vincenzo Sciancalepore (Institute IMDEA Networks & Politecnico di Milano, Italy); Vincenzo

Mancuso (IMDEA Networks Institute, Spain); Albert Banchs (Universidad Carlos III de Madrid,Spain); Shmuel Zaks (Technion, Israel); Antonio Capone (Politecnico di Milano, Italy)pp. 1797-1805

Classifying Call Profiles in Large-scale Mobile Traffic Datasets

Diala Naboulsi (INSA Lyon, France); Razvan Stanica (INSA Lyon, France); Marco Fiore (NationalResearch Council of Italy, Italy)pp. 1806-1814

Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices

Yeon-sup Lim (University of Massachusetts Amherst, USA); Yung-Chih Chen (University of

Massachusetts at Amherst, USA); Erich Nahum (IBM T. J. Watson Research Center, USA); Don

Towsley (University of Massachusetts at Amherst, USA); Kang-Won Lee (IBM Research, USA)pp. 1815-1823

DC2: Data center networking 2

Practical DCB for Improved Data Center Networks

Brent Stephens (Rice University & IBM, USA); Ankit Singla (University of Illinois at Urbana-

Champaign, USA); Colin Dixon (IBM Research, USA); Wes Felter (IBM, USA); John Carter (IBMResearh, USA); Alan L. Cox (Rice University, USA)pp. 1824-1832

Distributed Data Storage Systems with Opportunistic RepairVaneet Aggarwal (AT&T Labs - Research, USA); Chao Tian (AT&T Labs-Research, Shannon

Laboratory, USA); Vinay A. Vaishampayan (DIMACS, Rutgers University & Columbia University,USA); Yih-Farn Robin Chen (AT&T Labs - Research, USA)pp. 1833-1841

Let's Stay Together: Towards Traffic Aware Virtual Machine Placement in Data Centers

Xin Li (Nanjing University & State Key Laboratory of Novel Software Technology, P.R. China); Jie

Wu (Temple University, USA); Shaojie Tang (Temple University, Philadelphia, PA, USA); Sanglu Lu

(Nanjing University, P.R. China)pp. 1842-1850

On the Design and Analysis of Data Center Network Architectures for Interconnecting Dual-

Port Servers

Dawei Li (Temple University, USA); Jie Wu (Temple University, USA)pp. 1851-1859

FT2: Fault tolerance and survivability 2

Signaling Free Localization of Node Failures in All-Optical NetworksJanos Tapolcai (Budapest University of Technology and Economics, Hungary); Lajos Ronyai(Budapest University of Technology and Economics (BME), Hungary); Eva Hosszu (Budapest

University of Technology and Economics, Hungary); Pin-Han Ho (University of Waterloo, Canada);Suresh Subramaniam (The George Washington University, USA)pp. 1860-1868

Fault Tolerant Barrier Coverage for Wireless Sensor Networks

Zhibo Wang (University of Tennessee, Knoxville, USA); Honglong Chen (China University of

Petroleum, P.R. China); Qing Cao (University of Tennessee, USA); Hairong Qi (the University of

Tennessee, USA); Zhi Wang (Zhejiang University & State Key Laboratory of Industrial Control

Technology, Zhejiang University, P.R. China)pp. 1869-1877

Heterogeneity-Aware Data Regeneration in Distributed Storage Systems

Yan Wang (Fudan University, P.R. China); Dongsheng Wei (Fudan University, P.R. China); Xunrui

Yin (University of Calgary, Canada); Xin Wang (Fudan University, P.R. China)pp. 1878-1886

CauselnfenAutomatic and Distributed Performance Diagnosis with Hierarchical CausalityGraph in Large Distributed Systems

Pengfei Chen (Xi'an Jiaotong University, P.R. China); Yong Qi (Xi'an Jiaotong University, P.R.

China); Pengfei Zheng (Xi'an Jiaotong University, P.R. China); Di Hou (Xi'an Jiaotong University,P.R. China)pp. 1887-1895

PNL2: Panel 2

SB2: Scheduling and buffer management 2

Sharp Per-Flow Delay Bounds for Bursty Arrivals: The Case of FIFO, SP, and EDF SchedulingFlorin Ciucu (University of Warwick, United Kingdom); Felix Poloczek (TU Berlin / T-Labs,

Germany); Jens Schmitt (University of Kaiserslautern, Germany)pp. 1896-1904