default search action
27th IWQoS 2019: Phoenix, AZ, USA
- Proceedings of the International Symposium on Quality of Service, IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019. ACM 2019, ISBN 978-1-4503-6778-3
- Zehua Guo, Wendi Feng, Sen Liu, Wenchao Jiang, Yang Xu, Zhi-Li Zhang:
RetroFlow: maintaining control resiliency and flow programmability for software-defined WANs. 1:1-1:10 - Xiong Wang, Linghe Kong, Jintao Wu, Xiaofeng Gao, Hang Wang, Guihai Chen:
mmHandover: a pre-connection based handover protocol for 5G millimeter wave vehicular networks. 2:1-2:10 - Chunyu Qiao, Gen Li, Jiliang Wang, Yunhao Liu:
NEIVA: environment identification based video bitrate adaption in cellular networks. 3:1-3:10 - Shiwei Zhang, Weichao Li, Daoyuan Wu, Bo Jin, Rocky K. C. Chang, Debin Gao, Yi Wang, Ricky K. P. Mok:
An empirical study of mobile network behavior and application performance in the wild. 4:1-4:10 - Yu Zhou, Jun Bi, Yunsenxiao Lin, Yangyang Wang, Dai Zhang, Zhaowei Xi, Jiamin Cao, Chen Sun:
P4Tester: efficient runtime rule fault detection for programmable data planes. 5:1-5:10 - Tian Pan, Xingchen Lin, Jiao Zhang, Hao Li, Jianhui Lv, Tao Huang, Bin Liu, Beichuan Zhang:
NB-cache: non-blocking in-network caching for high-speed content routers. 6:1-6:10 - Jiahui Hou, Jianwei Qian, Yu Wang, Xiang-Yang Li, Haohua Du, Linlin Chen:
ML defense: against prediction API threats in cloud-based machine learning service. 7:1-7:10 - Juan Li, Jie Wu, Yanmin Zhu:
Selecting optimal mobile users for long-term environmental monitoring by crowdsourcing. 8:1-8:10 - Yu Qiao, Jun Wu, Lei Zhang, Chongjun Wang:
Mechanism design for cross-market task crowdsourcing. 9:1-9:10 - Jiaqi Zheng, Qiufang Ma, Chen Tian, Haipeng Dai, Wei Zhang, Guihai Chen, Gong Zhang:
Orchestrating service chain deployment with plutus in next generation cellular core. 10:1-10:10 - Zichen Xu, Christopher Stewart, Jiacheng Huang:
Elastic, geo-distributed RAFT. 11:1-11:9 - Gengbiao Shen, Qing Li, Yong Jiang, Richard O. Sinnott, Dong Lin, Zehua Guo, Yi Wang:
Chunk-level request-grant-transfer mode for QoE-sensitive video delivery in CDN. 12:1-12:10 - Ya Su, Youjian Zhao, Wentao Xia, Rong Liu, Jiahao Bu, Jing Zhu, Yuanpu Cao, Haibin Li, Chenhao Niu, Yiyin Zhang, Zhaogang Wang, Dan Pei:
CoFlux: robustly correlating KPIs by fluctuations for service troubleshooting. 13:1-13:10 - Jing'an Xue, Weizhen Dang, Haibo Wang, Jilong Wang, Hui Wang:
Evaluating performance and inefficient routing of an anycast CDN. 14:1-14:10 - Heyi Tang, Yong Cui, Jianping Wu, Xiaowei Yang, Zhenjie Yang:
Trigger relationship aware mobile traffic classification. 15:1-15:10 - Wanxin Shi, Qing Li, Chao Wang, Gengbiao Shen, Weichao Li, Yu Wu, Yong Jiang:
LEAP: learning-based smart edge with caching and prefetching for adaptive video streaming. 16:1-16:10 - Jiajie Shen, Yi Li, Yangfan Zhou, Xin Wang:
Understanding I/O performance of IPFS storage: a client's perspective. 17:1-17:10 - Meng Shen, Jinpeng Zhang, Liehuang Zhu, Ke Xu, Xiaojiang Du, Yiting Liu:
Encrypted traffic classification of decentralized applications on ethereum using feature fusion. 18:1-18:10 - Fangxin Wang, Jiangchuan Liu, Wei Gong:
WiCAR: wifi-based in-car activity recognition with multi-adversarial domain adaptation. 19:1-19:10 - Liuyan Liu, Haisheng Tan, Shaofeng H.-C. Jiang, Zhenhua Han, Xiang-Yang Li, Hong Huang:
Dependent task placement and scheduling with function configuration in edge computing. 20:1-20:10 - Yikai Xiao, Qixia Zhang, Fangming Liu, Jia Wang, Miao Zhao, Zhongxing Zhang, Jiaxing Zhang:
NFVdeep: adaptive online service function chain deployment with deep reinforcement learning. 21:1-21:10 - Lu Zhang, Chao Li, Pengyu Wang, Yunxin Liu, Yang Hu, Quan Chen, Minyi Guo:
Characterizing and orchestrating NFV-ready servers for efficient edge data processing. 22:1-22:10 - Yi Zhao, Hui Su, Liang Zhang, Dan Wang, Ke Xu:
Variety matters: a new model for the wireless data market under sponsored data plans. 23:1-23:10 - Mahdi Dolati, Majid Ghaderi, Ahmad Khonsari:
Proactive inter-datacenter multicast with realtime and bulk transfers. 24:1-24:10 - Hui Cai, Fan Ye, Yuanyuan Yang, Yanmin Zhu, Jie Li:
Towards privacy-preserving data trading for web browsing history. 25:1-25:10 - Lei Liu, Song Xu, Jia Hu, Lizhen Cui, Geyong Min:
Balancing of the quality-of-service, energy and revenue of base stations in wireless networks via tullock contests. 26:1-26:8 - Yuchuan Luo, Xiaohua Jia, Huayi Duan, Cong Wang, Ming Xu, Shaojing Fu:
pRide: private ride request for online ride hailing service with secure hardware enclave. 27:1-27:10 - Long Luo, Klaus-Tycho Foerster, Stefan Schmid, Hongfang Yu:
DaRTree: deadline-aware multicast transfers in reconfigurable wide-area networks. 28:1-28:10 - Ruoyang Guo, Bo Qin, Yuncheng Wu, Ruixuan Liu, Hong Chen, Cuiping Li:
MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud. 29:1-29:10 - Yifan Gong, Baochun Li, Ben Liang, Zheng Zhan:
Chic: experience-driven scheduling in machine learning clusters. 30:1-30:10 - Yutong Liu, Linghe Kong, Muhammad Hassan, Long Cheng, Guangtao Xue, Guihai Chen:
Litedge: towards light-weight edge computing for efficient wireless surveillance system. 31:1-31:10 - Xiangrui Yang, Zhigang Sun, Junnan Li, Jinli Yan, Tao Li, Wei Quan, Donglai Xu, Gianni Antichi:
FAST: enabling fast software/hardware prototype for network experimentation. 32:1-32:10 - Yunzhi Li, Yidan Hu, Rui Zhang, Yanchao Zhang, Terri Hedgpeth:
Secure indoor positioning against signal strength attacks via optimized multi-voting. 33:1-33:10 - Xianghao Xu, Fang Wang, Hong Jiang, Yongli Cheng, Yu Hua, Dan Feng, Yongxuan Zhang:
LOSC: efficient out-of-core graph processing with locality-optimized subgraph construction. 34:1-34:10 - Xi Huang, Simeng Bian, Ziyu Shao, Hong Xu:
Predictive switch-controller association and control devolution for SDN systems. 35:1-35:10 - Zhiyao Hu, Dongsheng Li, Yiming Zhang, Deke Guo, Ziyang Li:
Branch scheduling: dag-aware scheduling for speeding up data-parallel jobs. 36:1-36:10 - Kuai Xu, Yinxin Wan, Guoliang Xue, Feng Wang:
Multidimensional behavioral profiling of internet-of-things in edge networks. 37:1-37:10 - Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li:
ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples. 38:1-38:10 - Jing Guo, Zihao Chang, Sa Wang, Haiyang Ding, Yihui Feng, Liang Mao, Yungang Bao:
Who limits the resource efficiency of my datacenter: an analysis of Alibaba datacenter traces. 39:1-39:10 - Ang Li, Tao Li, Yan Zhang, Lili Zhang, Yanchao Zhang:
SocialDistance: how far are you from verified users in online social media? 40:1-40:10 - Qin Hu, Shengling Wang, Xiuzhen Cheng:
A game theoretic analysis on block withholding attacks using the zero-determinant strategy. 41:1-41:10 - Chong Xiang, Xinyu Wang, Qingrong Chen, Minhui Xue, Zhaoyu Gao, Haojin Zhu, Cailian Chen, Qiuhua Fan:
No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization. 42:1-42:10
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.