dblp: 35. ICDCS 2015 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


35th ICDCS 2015: Columbus, OH, USA

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

35th IEEE International Conference on Distributed Computing Systems, ICDCS 2015, Columbus, OH, USA, June 29 - July 2, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-7214-5
Crowd-Sensing

Si Chen
, Muyuan Li, Kui Ren
, Chunming Qiao:
Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos. 1-10
Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan:
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices. 11-20
Pengfei Zhou
, Shiqi Jiang, Mo Li
:
Urban Traffic Monitoring with the Help of Bus Riders. 21-30
Linghe Kong
, Liang He, Xiao-Yang Liu, Yu Gu, Min-You Wu, Xue Liu:
Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery. 31-40
Vehicular Applications

Huanyang Zheng, Jie Wu:
Optimizing Roadside Advertisement Dissemination in Vehicular Cyber-Physical Systems. 41-50
Yian Zhou, Shigang Chen, Zhen Mo, Qingjun Xiao:
Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems. 51-60
Jie Lin, Wei Yu
, Xinyu Yang, Qingyu Yang, Xinwen Fu
, Wei Zhao
:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. 61-72
Fusang Zhang, Hai Liu
, Yiu-Wing Leung, Xiaowen Chu
, Beihong Jin:
Community-Based Bus System as Routing Backbone for Vehicular Ad Hoc Networks. 73-82
Distributed Resource Management I

Sotirios Kentros, Chadi Kari
, Aggelos Kiayias, Alexander Russell
:
Asynchronous Adaptive Task Allocation. 83-92
Xinhui Hu, Arne Ludwig, Andréa W. Richa, Stefan Schmid
:
Competitive Strategies for Online Cloud Resource Allocation with Discounts: The 2-Dimensional Parking Permit Problem. 93-102
Mohammad Hassan Hajiesmaili, Lok To Mak, Zhi Wang, Chuan Wu
, Minghua Chen
, Ahmad Khonsari
:
Cost-Effective Low-Delay Cloud Video Conferencing. 103-112
Energy and Green Computing I

Tan Zhang, Xian Zhang, Fangming Liu, Hongkun Leng, Qian Yu, Guanfeng Liang:
eTrain: Making Wasted Energy Useful by Utilizing Heartbeats for Mobile Data Transmissions. 113-122
Tuan Dao, Indrajeet Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy
, Guohong Cao, Prasant Mohapatra:
TIDE: A User-centric Tool for Identifying Energy Hungry Applications on Smartphones. 123-132
Cong Wang, Ji Li, Fan Ye, Yuanyuan Yang
:
Improve Charging Capability for Wireless Rechargeable Sensor Networks Using Resonant Repeaters. 133-142
Distributed Resource Management II

Gueyoung Jung, Matti A. Hiltunen, Kaustubh R. Joshi, Rajesh K. Panta, Richard D. Schlichting:
Ostro: Scalable Placement Optimization of Complex Application Topologies in Large-Scale Data Centers. 143-152
Qinhui Wang, Baoliu Ye, Bin Tang, Song Guo
, Sanglu Lu:
eBay in the Clouds: False-Name-Proof Auctions for Cloud Resource Allocation. 153-162
Kyuyong Shin, Carlee Joe-Wong, Sangtae Ha, Yung Yi, Injong Rhee, Douglas S. Reeves:
T-Chain: A General Incentive Scheme for Cooperative Computing. 163-174
Energy and Green Computing II

Wenli Zheng
, Xiaorui Wang:
Data Center Sprinting: Enabling Computational Sprinting at the Data Center Level. 175-184
Joshua Dennis Booth, Jagadish Kotra, Hui Zhao, Mahmut T. Kandemir, Padma Raghavan:
Phase Detection with Hidden Markov Models for DVFS on Many-Core Processors. 185-195
Sotiris E. Nikoletseas, Theofanis P. Raptis
, Christoforos L. Raptopoulos:
Low Radiation Efficient Wireless Energy Transfer in Wireless Distributed Systems. 196-204
Social Networks

Zaobo He, Zhipeng Cai
, Xiaoming Wang:
Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks. 205-214
Jing Tang
, Xueyan Tang, Junsong Yuan
:
Optimizing Inter-server Communication for Online Social Networks. 215-224
Hongjuan Li
, Xiuzhen Cheng, Keqiu Li, Zhi Tian:
Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks. 225-234
Qiang Cao, Michael Sirivianos
, Xiaowei Yang, Kamesh Munagala
:
Combating Friend Spam Using Social Rejections. 235-244
Performance Optimization

Kaveh Razavi, Gerrit Van Der Kolk, Thilo Kielmann
:
Prebaked µVMs: Scalable, Instant VM Startup for IaaS Clouds. 245-255
Chen Chen, Stephanos Matsumoto, Adrian Perrig:
ECO-DNS: Expected Consistency Optimization for DNS. 256-267
Simone Silvestri, Rahul Urgaonkar, Murtaza Zafer, Bong Jun Ko:
An Online Method for Minimizing Network Monitoring Overhead. 268-277
David Katz, Antonio Barbalace, Saif Ansary, Akshay Ravichandran, Binoy Ravindran
:
Thread Migration in a Replicated-Kernel OS. 278-287
Privacy

Yan Wang, Yingying Chen
, Fan Ye, Jie Yang, Hongbo Liu
:
Towards Understanding the Advertiser's Perspective of Smartphone User Privacy. 288-297
Jingyu Hua
, An Tang, Sheng Zhong:
Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising. 298-307
Lan Zhang, Taeho Jung, Cihang Liu, Xuan Ding, Xiang-Yang Li, Yunhao Liu:
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices. 308-317
Kaihe Xu, Hao Yue
, Linke Guo, Yuanxiong Guo
, Yuguang Fang
:
Privacy-Preserving Machine Learning Algorithms for Big Data Systems. 318-327
MapReduce

Alok Gautam Kumbhare, Marc Frîncu
, Yogesh L. Simmhan
, Viktor K. Prasanna:
Fault-Tolerant and Elastic Streaming MapReduce with Decentralized Coordination. 328-338
Huanle Xu, Wing Cheong Lau
:
Task-Cloning Algorithms in a MapReduce Cluster with Competitive Performance Bounds. 339-348
Hao Wang, Li Chen
, Kai Chen
, Ziyang Li, Yiming Zhang, Haibing Guan, Zhengwei Qi, Dongsheng Li, Yanhui Geng
:
FLOWPROPHET: Generic and Accurate Traffic Prediction for Data-Parallel Cluster Computing. 349-358
Dazhao Cheng, Palden Lama, Changjun Jiang, Xiaobo Zhou:
Towards Energy Efficiency in Heterogeneous Hadoop Clusters by Adaptive Task Assignment. 359-368
Sensor Networks

Songwei Fu, Yan Zhang, Yuming Jiang
, Chengchen Hu, Chia-Yen Shih, Pedro José Marrón
:
Experimental Study for Multi-layer Parameter Configuration of WSN Links. 369-378
Ling Guo, Yuqing Zhu, Deying Li, Donghyun Kim:
PTZ Camera Scheduling for Selected Area Coverage in Visual Sensor Networks. 379-388
Zimu Zhou, Zheng Yang, Chenshu Wu, Yunhao Liu, Lionel M. Ni:
On Multipath Link Characterization and Adaptation for Device-Free Human Detection. 389-398
Streaming and Real-Time Traffic

Björn Lohrmann, Peter Janacik, Odej Kao:
Elastic Stream Processing with Latency Guarantees. 399-410
Tom Z. J. Fu, Jianbing Ding, Richard T. B. Ma
, Marianne Winslett, Yin Yang
, Zhenjie Zhang:
DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast Streams. 411-420
Xu Zheng, Zhipeng Cai
, Jianzhong Li, Hong Gao:
An Application-Aware Scheduling Policy for Real-Time Traffic. 421-430
Data Storage I

Quanlu Zhang, Yafei Dai, Fengqian Li, Lintao Zhang:
UStore: A Low Cost Cold and Archival Data Storage System for Data Centers. 431-441
Qi Zhang, Sai Qian Zhang, Alberto Leon-Garcia, Raouf Boutaba:
Aurora: Adaptive Block Replication in Distributed File Systems. 442-451
Mainak Ghosh, Indranil Gupta, Shalmoli Gupta, Nirman Kumar:
Fast Compaction Algorithms for NoSQL Databases. 452-461
Publish Subscribe Systems

Navneet Kumar Pandey, Kaiwen Zhang, Stéphane Weiss, Hans-Arno Jacobsen, Roman Vitenberg:
Minimizing the Communication Cost of Aggregation in Publish/Subscribe Systems. 462-473
Chen Chen, Yoav Tock, Hans-Arno Jacobsen, Roman Vitenberg:
Weighted Overlay Design for Topic-Based Publish/Subscribe Systems on Geo-Distributed Data Centers. 474-485
Julien Gascon-Samson, Franz-Philippe Garcia, Bettina Kemme, Jörg Kienzle:
Dynamoth: A Scalable Pub/Sub Middleware for Latency-Constrained Applications in the Cloud. 486-496
Algorithms I

Hoda Akbari, Petra Berenbrink, Robert Elsässer, Dominik Kaaser:
Discrete Load Balancing in Heterogeneous Networks with a Focus on Second-Order Diffusion. 497-506
Peng-Jun Wan, XiaoHua Xu:
Weighted Restless Bandit and Its Applications. 507-516
Leszek Gasieniec, Tomasz Jurdzinski
, Russell Martin, Grzegorz Stachowiak
:
Deterministic Symmetry Breaking in Ring Networks. 517-526
Jie Cheng, Qiang Ye
, Hongwei Du, Chuang Liu
:
DISCO: A Distributed Localization Scheme for Mobile Networks. 527-536
Networks and Protocols

Qian Wang
, Man Zhou
, Kui Ren
, Tao Lei, Jikun Li, Zhibo Wang
:
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes. 537-546
Zhenhua Li, Yuanyuan Yang
:
ABCCC: An Advanced Cube Based Network for Data Centers. 547-556
Mingwen Chen, Songlin Hu
, Vinod Muthusamy, Hans-Arno Jacobsen:
Congestion Avoidance with Incremental Filter Aggregation in Content-Based Routing Networks. 557-568
Guo Chen, Youjian Zhao, Dan Pei
, Dan Li:
Rewiring 2 Links Is Enough: Accelerating Failure Recovery in Production Data Center Networks. 569-578
Algorithms II

Saba Aflaki, Fathiyeh Faghih, Borzoo Bonakdarpour:
Synthesizing Self-Stabilizing Protocols under Average Recovery Time Constraints. 579-588
Lélia Blin, Pierre Fraigniaud:
Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning Trees. 589-598
Peng Li, Debin Gao
, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. 599-608
Bruhadeshwar Bezawada
, Alex X. Liu, Bargav Jayaraman, Ann L. Wang, Rui Li:
Privacy Preserving String Matching for Cloud Computing. 609-618
Security

Shankar Karuppayah
, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer:
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism. 619-629
Jialong Zhang, Sabyasachi Saha, Guofei Gu, Sung-Ju Lee, Marco Mellia
:
Systematic Mining of Associated Server Herds for Malware Campaign Discovery. 630-641
Javid Habibi, Aditi Gupta, Stephen Carlsony, Ajay Panicker, Elisa Bertino:
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles. 642-652
Dario Nascimento, Miguel Correia
:
Shuttle: Intrusion Recovery for PaaS. 653-663
Data Storage II

Lu Chao, Chundian Li, Fan Liang, Xiaoyi Lu, Zhiwei Xu:
Accelerating Apache Hive with MPI for Data Warehouse Systems. 664-673
Animesh Trivedi
, Patrick Stuedi, Bernard Metzler, Clemens Lutz
, Martin L. Schmatz, Thomas R. Gross:
RStore: A Direct-Access DRAM-based Data Store. 674-685
Ittay Eyal, Ken Birman
, Robbert van Renesse:
Cache Serializability: Reducing Inconsistency in Edge Transactions. 686-695
Wireless and Sensor Networks

Jun Li, Xudong Zhu, Xiaofeng Gao, Fan Wu, Guihai Chen
, Ding-Zhu Du, Shaojie Tang:
A Novel Approximation for Multi-hop Connected Clustering Problem in Wireless Sensor Networks. 696-705
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
, Jie Wu, Ten-Hwang Lai:
Multi-path Based Avoidance Routing in Wireless Networks. 706-715
Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji, Mengshu Hou
:
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs. 716-725
Posters

Juan Li, Yanmin Zhu, Jiadi Yu, Qian Zhang
, Lionel M. Ni:
Towards Redundancy-Aware Data Utility Maximization in Crowdsourced Sensing with Smartphones. 726-727
Angelos Chatzipapas, Vincenzo Mancuso
:
Improving the Energy Benefit for 802.3az Using Dynamic Coalescing Techniques. 728-729
Lin Cui, Fung Po Tso
, Dimitrios P. Pezaros
, Weijia Jia
, Wei Zhao
:
Policy-Aware Virtual Machine Management in Data Center Networks. 730-731
Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. 732-733
Yuhua Lin, Haiying Shen:
Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Experience. 734-735
Yuhua Lin, Haiying Shen, Liuhua Chen:
EcoFlow: An Economical and Deadline-Driven Inter-datacenter Video Flow Scheduling System. 736-737
Guoxin Liu, Haiying Shen:
Harnessing the Power of Multiple Cloud Service Providers: An Economical and SLA-Guaranteed Cloud Storage Service. 738-739
Ji Li, Siyao Cheng, Yingshu Li
, Zhipeng Cai
:
Approximate Holistic Aggregation in Wireless Sensor Networks. 740-741
Yang Wang, Liusheng Huang, Hao Wei, Wei Zheng, Tianbo Gu, Hengchang Liu:
Planning Battery Swapping Stations for Urban Electrical Taxis. 742-743
Rui Han, Junwei Wang, Siguang Huang, Chenrong Shao, Shulin Zhan, Jianfeng Zhan, José Luis Vázquez-Poletti:
Interference-Aware Component Scheduling for Reducing Tail Latency in Cloud Interactive Services. 744-745
Jia Zou, Juwei Shi, Tongping Liu, Zhao Cao, Chen Wang:
Foreseer: Workload-Aware Data Storage for MapReduce. 746-747
Agustina, Chengzheng Sun:
Operational Transformation for Real-Time Synchronization of Cloud Storage. 748-749
Zhiyin Chen, Shuang Wu, Xudong Zhu, Xiaofeng Gao, Jian Gu, Guihai Chen
:
A Route Scheduling Algorithm for the Sweep Coverage Problem. 750-751
Xiao Hu, Fan Wu, Xiaofeng Gao, Guihai Chen
:
WhiFind: A Matrix Completion Approach for Indoor White Space Identification. 752-753
Hongxu Zhang, Yufeng Wang, Chiu C. Tan, Yifan Zhang:
mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of Service. 754-755
Min Chen, Shigang Chen:
An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens. 756-757
Jianping He, Bin Liu, Xuan Bao, Hongxia Jin, George Kesidis:
On Privacy Preserving Partial Image Sharing. 758-759
Mohammad Reza Zakerinasab, Mea Wang:
Inspecting Coding Dependency in Layered Video Coding for Efficient Unequal Error Protection. 760-761
Amy Babay
, Yair Amir:
Fast Total Ordering for Modern Data Centers. 762-763
Mohamed Mohamedin
, Roberto Palmieri
, Binoy Ravindran
:
On Preserving Data Integrity of Transactional Applications on Multicore Architectures. 764-765
Sebastiano Peluso, Alexandru Turcu, Roberto Palmieri
, Binoy Ravindran
:
On Exploiting Locality for Generalized Consensus. 766-767
Wei Wang, Yingjie Victor Chen, Qian Zhang
, Kaishun Wu
, Jin Zhang:
Less Transmissions, More Throughput: Bringing Carpool to Public WLANs. 768-769
Hong Xie, John C. S. Lui:
A Mechanism Approach to Reduce New Seller Ramp-Up Time in eBay-Like Reputation Systems. 770-771
Hasini Gunasinghe, Elisa Bertino:
RahasNym: Protecting against Linkability in the Digital Identity Ecosystem. 772-773
Lu Wang
, Xiaoke Qi, Jiang Xiao, Kaishun Wu
, Jin Zhang, Mounir Hamdi
, Qian Zhang
:
Piros: Pushing the Limits of Partially Concurrent Transmission in WiFi Networks. 774-775
Russell W. F. Lai, Sherman S. M. Chow
:
Structured Encryption with Non-interactive Updates and Parallel Traversal. 776-777
Chunyao Song, Tingjian Ge, Cindy X. Chen, Jie Wang:
Soft Quorums: A High Availability Solution for Service Oriented Stream Systems. 778-779
Lei Zhang, Feng Wang, Jiangchuan Liu:
Improve Quality of Experience for Mobile Instant Video Clip Sharing. 780-781
Young Yoon, Nathan Robinson, Vinod Muthusamy, Sheila A. McIlraith, Hans-Arno Jacobsen:
Towards Planning the Transformation of Overlays. 782-783
Shuping Ji, Chunyang Ye, Jun Wei, Hans-Arno Jacobsen:
Towards Scalable Publish/Subscribe Systems. 784-785
Yurong Cheng, Ye Yuan, Lei Chen
, Guoren Wang:
The Reachability Query over Distributed Uncertain Graphs. 786-787
Lin Wang, Kai Zheng, Baohua Yang, Yi Sun, Yue Zhang, Steve Uhlig
:
Lazy Ctrl: Scalable Network Control for Cloud Data Centers. 788-789
Yu Xiang, Tian Lan, Vaneet Aggarwal
, Yih-Farn Robin Chen:
Multi-tenant Latency Optimization in Erasure-Coded Storage with Differentiated Services. 790-791
Jiguo Yu
, Lili Jia, Wei Li, Xiuzhen Cheng, Shengling Wang, Rongfang Bie, Dongxiao Yu:
A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model. 792-793
Boyang Wang, Ming Li, Haitao Wang, Hui Li:
Circular Range Search on Encrypted Spatial Data. 794-795
Jongho Won, Elisa Bertino:
Inside Attack Filtering for Robust Sensor Localization. 796-797
J. Harshan, Frédérique E. Oggier, Anwitaman Datta
:
Sparsity Exploiting Erasure Coding for Resilient Storage and Efficient I/O Access in Delta Based Versioning Systems. 798-799
Mahnush Movahedi, Jared Saia, Mahdi Zamani:
Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling. 800-801
Vincent Primault, Sonia Ben Mokhtar
, Lionel Brunie:
Privacy-Preserving Publication of Mobility Data with High Utility. 802-803
Zhongxing Ming, Mingwei Xu, Ning Wang
, Bingjie Gao, Qi Li
:
TAFTA: A Truthful Auction Framework for User Data Allowance Trading in Mobile Networks. 804-805

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







