IPCCC logo

34th IEEE -- International Performance Computing and Communications Conference

IPCCC 2015 (December 14-16) Nanjing, China
Sheraton Nanjing Kingsley Hotel & Towers


Home General Information Contact and Committee Information Author's Information Industrial Track Program at a Glance Hotel Registration Call for Papers
The complete final program is available in both web format and PDF.
The complete proceedings can be found here

First Keynote Speach

Title: Big Data Security and Privacy
Elisa Bertino, Purdue University, bertino@cs.purdue.edu

Abstract:

Technological advances and novel applications, such as sensors, cyber-physical systems, smart mobile devices, cloud systems, data analytics, and social networks, are making possible to capture, and to quickly process and analyze huge amounts of data from which to extract information critical for security-related tasks. In the area of cyber security, such tasks include user authentication, access control, anomaly detection, user monitoring, and protection from insider threat. By analyzing and integrating data collected on the Internet and Web one can identify connections and relationships among individuals that may in turn help with homeland protection. By collecting and mining data concerning user travels and disease outbreaks one can predict disease spreading across geographical areas. And those are just a few examples; there are certainly many other domains where data technologies can play a major role in enhancing security. The use of data for security tasks is however raising major privacy concerns. Collected data, even if anonymized by removing identifiers such as names or social security numbers, when linked with other data may lead to re-identify the individuals to which specific data items are related to. Also, as organizations, such as governmental agencies, often need to collaborate on security tasks, data sets are exchanged across different organizations, resulting in these data sets being available to many different parties. Apart from the use of data for analytics, security tasks such as authentication and access control may require detailed information about users. An example is multi-factor authentication that may require, in addition to a password or a certificate, user biometrics. Recently proposed continuous authentication techniques extend access control system. This information if misused or stolen can lead to privacy breaches. It would then seem that in order to achieve security we must give up privacy. However this may not be necessarily the case. Recent advances in cryptography are making possible to work on encrypted data — for example for performing analytics on encrypted data. However much more needs to be done as the specific data privacy techniques to use heavily depend on the specific use of data and the security tasks at hand. Also current techniques are not still able to meet the efficiency requirement for use with big data sets. In this talk we will discuss methods and techniques to make this reconciliation possible and identify research directions.

Biography

Elisa Bertino is professor of computer science at Purdue University, and serves as Director of Purdue Cyber Center and Research Director of the Center for Information and Research in Information Assurance and Security (CERIAS). She is also an adjunct professor of Computer Science & Info tech at RMIT. Prior to joining Purdue in 2004, she was a professor and department head at the Department of Computer Science and Communication of the University of Milan. She has been a visiting researcher at the IBM Research Laboratory (now Almaden) in San Jose, at the Microelectronics and Computer Technology Corporation, at Rutgers University, at Telcordia Technologies. Her recent research focuses on data security and privacy, digital identity management, policy systems, and security for the Internet-of-Things. She is a Fellow of ACM and of IEEE. She received the IEEE Computer Society 2002 Technical Achievement Award, the IEEE Computer Society 2005 Kanai Award, and the ACM SIGSAC 2014 Outstanding Contributions Award. She is currently serving as EiC of IEEE Transactions on Dependable and Secure Computing.

Second Keynote Speach

Title: Adversarial signal processing and the hypothesis testing game
Mauro Barni

Abstract:

Security-oriented applications of signal processing have received increasing attention in the last years. Digital watermarking, steganography and steganalysis, multimedia forensics, biometric security, are just a few examples of such an interest. In many cases, though, researchers have failed to recognize the single most unique feature behind any security-oriented application, i.e. the presence of one or more adversaries aiming at making the system fail. One of the most evident consequences is that security requirements are misunderstood, e.g. quite often security is exchanged for robustness. Even when the need to cope with the actions of a malevolent adversary is taken into account, the proposed solutions are often ad-hoc, failing to provide a unifying view of the challenges that such scenarios pose from a signal processing perspective. Times are ripe to go beyond this limited view and lay the basis for a general theory that takes into account the impact that the presence of an adversary has on the design of effective signal processing tools, i.e. a theory of adversarial signal processing.
It is the aim of this talk to:
i) motivate the need for the development of a general theory of adversarial signal processing;
ii) propose a unifying framework based on game-theory; iii) present some recent results regarding adversarial hypothesis testing.

Biography

Mauro Barni graduated in electronic engineering at the University of Florence in 1991. He received the PhD in informatics and telecommunications in October 1995. He has carried out his research activity for over 20 years first at the Department of Electronics and Telecommunication of the University of Florence, then at the Department of Information Engineering of the University of Siena. During the last decade he has been studying the application of image processing techniques to copyright protection and authentication of multimedia, and the possibility of processing signals that has been previously encrypted without decrypting them. Lately he has been working on theoretical and practical aspects of adversarial signal processing. He is author/co-author of almost 300 papers published in international journals and conference proceedings, and holds four patents in the field of digital watermarking and image authentication. He is co-author of the book Watermarking Systems Engineering: Enabling Digital Assets Security and other Applications, published by Dekker Inc. in February 2004. He participated to several National and European research projects on diverse topics, including computer vision, multimedia signal processing, remote sensing, digital watermarking, IPR protection. He was the funding editor of the EURASIP Journal on Information Security. He is the Editor in Chief of the IEEE Transactions on Information Forensics and Security for the years 2015-2017. He has been serving as associate editor of many journals including several IEEE Transactions. Prof. Barni has been the chairman of the IEEE Information Forensic and Security Technical Committee (IFS-TC) from 2010 to 2011. He is a fellow member of the IEEE and a member of EURASIP. He was appointed DL of the IEEE SPS for the years 2013-2014. He was the technical program chair of ICASSP 2014.



A preliminary program can be found below.


Dec. 14th , TWO ROOMS: Jiang Hai Yuan, Su Xiu

08:00-08:15

Opening Ceremony

08:15-09:15

Keynote 1: Elisa Bertino, Purdue University

 

ROOM: Jiang Hai Yuan

ROOM: Su Xiu

09:15-10:35

Session 1: Fundamental Theory and Algorithms

Session 2: Big Data Processing and Analytics

10:40-12:00

Session 9: Network Protocols

Session 14: Cache, Memory, and Disk Storage Systems

Lunch

13:20-15:00

Session 4: Data Centers and Cloud Computing

Session 5: Parallel and Distributed Systems

Break

15:20-17:00

Session 6: Network Protocols

Session 7: Cyber Physical Systems

Dinner

 

Dec. 15th, TWO ROOMS: Su Xiu, Yun Jin

08:00-09:00

Keynote 2: Mauro Barni

 

ROOM: Su Xiu

ROOM: Yun Jin

09:15-10:55

Session 8: Cloud Computing and Big Data Processing

Session 10: Wireless Communication and Networks I

11:00-12:00

Session 3: Internet of Things

Session 15: Mobile Ad Hoc, Sensor and Mesh Networks

Lunch

13:20-15:00

Session 11: Wireless Communication and Networks II

Industrial Track

Break

15:20-17:00

Session 12: Performance Tools and Evaluation

Reception

 

Dec. 16th, ONE ROOM: Su Xiu

08:00-09:40

Session 13: Internet Services and Network Management

Break

10:00-11:40

Session 17: Security and Privacy I

Lunch

13:00-14:20

Session 16: Processor Architecture

14:30-16:10

Session 18: Security and Privacy II

 




#

Title

Authors with affiliation and country

Session 1: Fundamental Theory and Algorithms

1570214207

An enhanced algorithm based on paths algebra strategy to solve the VNE problem

Canhui Wang (University of Shandong, P.R. China); Fangjin Zhu (ShanDong University, P.R. China); Qijia Zhang (Shandong University, P.R. China)

1570214335

A Novel Algorithm for Pattern Matching with Back References

Liu Yang (Baidu, Inc., P.R. China); Vinod Ganapathy (Rutgers University, USA); Pratyusa K Manadhata (Hewlett Packard, USA); Ye Wu (Baidu, Inc, P.R. China)

1570215769

Lifetime Maximization in Rechargeable Wireless Sensor Networks with Charging Interference

Yi Qu and Ke Xu (Tsinghua University, P.R. China); Haiyang Wang (University of Minnesota at Duluth, USA); Dan Wang (The Hong Kong Polytechnic University, Hong Kong); Bo Wu (Tsinghua University, P.R. China)

1570215643

Privacy-preserving Min and k-Min Computations with Fully Homomorphic Encryption

Bingbing Jiang (Nanjing University, P.R. China)

                                                                                                             Session 2: Big Data Processing and Analytics

1570213570

SpeedStream: A Real-Time Stream Data Processing Platform in The Cloud

Li Zhao (Institute of Information Engineering, CAS, P.R. China); Zhang Chuang (Institute of Information Engineering Chinese Academy of Sciences, P.R. China); Xu Kefu (Institute of Information Engineering, CAS, P.R. China)

1570214757

Efficient TV White Space Database Construction via Spectrum Sensing and Spatial Inference

Mengyun Tang, Ze Zheng, Guoru Ding and Xue Zhen (PLA University of Science and Technology, P.R. China)

1570215894

Mining Friendships Through Spatial-temporal Features in Mobile Social Networks

Jianwei Niu (Beihang University, P.R. China); Danning Wang (BeiHang University, P.R. China); Jie Lu (Beihang University, P.R. China)

1570215898

Parallel and Distributed Normalization of Security Events for Instant Attack Analysis

David Jaeger (Hasso Plattner Institute, Germany); Andrey Sapegin (Hasso Plattner Institute, University of Potsdam, Germany); Martin Ussath (Hasso Plattner Institute, Germany); Feng Cheng (University of Potsdam, Germany); Christoph Meinel (Hasso Plattner Institute, University of Potsdam, Germany)

Session 3: Internet of Things.

1570214141

Class-Based Delta-Encoding for High-Speed Train Data Stream

Yangxin Lin, Meng Ma, Ping Wang and Jinlong Lin (Peking University, P.R. China); Lin Ma (National Railway Research & Design Institute of Signal & Communication Ltd, P.R. China)

1570214184

On the Channel Capacity of MIMO-Radar-Based Communications

Renhui Xu (Nanjing Institute of Communication Engineering, P.R. China); Peng Laixian (Institute of Communication Engineering, P.R. China); Wendong Zhao (Institute of Communications Engineering, P.R. China)

1570214641

Network Coding based Transmission Schemes in DTNs with Group Meetings

Abdurrahman Arikan and Yuexin Mao (University of Connecticut, USA); Xiaolan Zhang (Fordham University, USA); Bing Wang, Shengli Zhou and Song Han (University of Connecticut, USA)

Session 4: Data Centers and Cloud Computing

1570213825

Efficient Switch-Assisted Congestion Control for Data Centers: an Implementation and Evaluation

Ahmed M. Abdelmoniem and Brahim Bensaou (The Hong Kong University of Science and Technology, Hong Kong)

1570214410

SDN-based TCP Congestion Control in Data Center Networks

Yifei Lu and Shuhong Zhu (Nanjing University of Science and Technology, P.R. China)

1570214429

Bandwidth Guaranteed Virtual Network Function Placement and Scaling in Datacenter Networks

Fangxin Wang, Ruilin Ling, Jing Zhu and Dan Li (Tsinghua University, P.R. China)

1570214717

Dynamic Flow Consolidation for Energy Savings in Green DCNs

Chao Zhu (Tsinghua University, P.R. China); Yu Xiao (Aalto University, Finland); Yong Cui (Tsinghua University, P.R. China); Zhenjie Yang (Dalian University of Technology, P.R. China); Shihan Xiao (University of Tsinghua, P.R. China); Antti Yla-Jaaski (Aalto University, Finland)

1570215320

Towards Shorter Task Completion Time in Datacenter Networks

Yuchao Zhang and Ke Xu (Tsinghua University, P.R. China); Haiyang Wang (University of Minnesota at Duluth, USA); Meng Shen (Beijing Institute of Technology, P.R. China)

Session 5: Parallel and Distributed Systems

1570212803

OMO: Optimize MapReduce Overlap with a Good Start (Reduce) and a Good Finish (Map)

Jiayin Wang (University of Massachusetts Boston, USA); Yi Yao (Northeastern University, USA); Ying Mao and Bo Sheng (University of Massachusetts Boston, USA); Ningfang Mi (Northeastern University, USA)

1570213345

Towards Adaptive Elastic Distributed Software Defined Networking

Yanyu Chen (Tsinghua University, P.R. China); Qing Li (Graduate School at Shenzhen, Tsinghua University, P.R. China); Yuan Yang and Qi Li (Tsinghua University, P.R. China); Yong Jiang and Xi Xiao (Graduate School at Shenzhen, Tsinghua University, P.R. China)

1570214495

Pirogue, a lighter dynamic version of the Raft distributed consensus algorithm

Jehan Francois Paris (University of Houston, USA); Darrell Long (University of California at Santa Cruz, USA)

1570215956

SkipMon: a Locality-Aware Collaborative Intrusion Detection System

Emmanouil Vasilomanolakis, Matthias Kruegl and Carlos Garcia Cordero (Technische Universität Darmstadt, Germany); Max Muehlhaeuser (Technical University Darmstadt, Germany); Mathias Fischer (International Computer Science Institute, USA)

1570216016

Decentralized Multi-Charger Coordination for Wireless Rechargeable Sensor Networks

Lei Mo and Pengcheng You (Zhejiang University, P.R. China); Xianghui Cao (Southeast University, P.R. China); Jiming Chen (Zhejiang University, P.R. China); YeQiong Song (LORIA - University of Lorraine - France, France)

Session 6: Network Protocols.

1570190531

Detect and Analyze Large-scale BGP Events by Bi-clustering Update Visibility Matrix

Meng Chen and Mingwei Xu (Tsinghua University, P.R. China); Qing Li (Graduate School at Shenzhen, Tsinghua University, P.R. China); Xirui Song (Beijing University of Posts and Telecommunications, P.R. China); Yuan Yang (Tsinghua University, P.R. China)

1570213752

Building Smartphone Ad-Hoc Networks With Long-range Radios

Ying Mao, Jiayin Wang and Bo Sheng (University of Massachusetts Boston, USA); Fan Wu (Shanghai Jiao Tong University, P.R. China)

1570213889

Scalable Name-Based Inter-Domain Routing for Information-Centric Networks

Sangmun Kim and Zhenhai Duan (Florida State University, USA); Fernando Sanchez (Universidad San Francisco de Quito, Ecuador)

1570214316

RAPIT: RTT-Aware Pending Interest Table for Content Centric Networking

Yalei Tan, Qing Li and Yong Jiang (Graduate School at Shenzhen, Tsinghua University, P.R. China); Shutao Xia (Tsinghua University, P.R. China)

1570213515

Traffic-Aware Networking for Video Streaming Service using SDN

Calvin Hue, Yu-Jia Chen and Li-Chun Wang (National Chiao Tung University, Taiwan)

Session 7: Cyber Physical Systems

1570212986

On Stochastic Optimal Bidding Schemes for Microgrids

Qingyu Yang and Dou An (Xi'an Jiaotong University, P.R. China); Wei Yu (Towson University, USA); Xinyu Yang (Xi'an Jiaotong University, P.R. China); Xinwen Fu (University of Massachusetts Lowell, USA)

1570214330

Sensor Placement based on Delaunay Triangulation for Complete Confident Information Coverage in An Area with Obstacles

Lu Dai and Bang Wang (Huazhong University of Science and Technology, P.R. China)

1570214493

Defending against Energy Dispatching Data Integrity Attacks in Smart Grid

Xiaofei He, Xinyu Yang and Jie Lin (Xi'an Jiaotong University, P.R. China); Linqiang Ge (Computer and Information Sciences, Towson University, USA); Wei Yu (Towson University, USA); Qingyu Yang (Xi'an Jiaotong University, P.R. China)

1570214858

Power-free Structural Health Monitoring via Compressive Sensing

Ju-min Zhao, Deng-ao Li and Tian Cao (Taiyuan University of Technology, P.R. China)

1570214237

Distributed Load Scheduling in Smart Community With Capacity Constrained Local Power Supplier

Nuo Yu, Lan Mu and Yuting Miao (Harbin Institute of Technology Shenzhen Graduate School, P.R. China); Hejiao Huang (Harbin Institute of Technology, P.R. China); Hongwei Du (Harbin Institute of Technology Shenzhen Graduate School, P.R. China); Xiaohua Jia (City University of Hong Kong, Hong Kong)

Session 8: Cloud Computing and Big Data Processing

1570212644

Performability Analysis of a Cloud System

Xiwei Qiu, Peng Sun, Xun Guo and Yanping Xiang (University of Electronic Science and Technology of China, P.R. China)

1570214016

How Green Are Cloud Patterns?

S. Amirhossein Abtahizadeh (Ecole Polytechnique Montreal, Canada); Foutse Khomh (École Polytechnique, Montreal, Montreal, Canada); Yann-Gaël Guéhéneuc (Ecole Polytechnique Montreal, Canada)

1570214441

Virtual Machine Placement Based on the VM Performance Models in Cloud

Hui Zhao, Qinghua Zheng, Weizhan Zhang, Yuxuan Chen and Yunhui Huang (Xi'an Jiaotong University, P.R. China)

1570216587

Minimizing Response Latency via Efficient Virtual Machine Placement in Cloud Systems

Hou Deng, Liusheng Huang, Chenkai Yang, Hongli Xu and Bing Leng (University of Science and Technology of China, P.R. China)

1570215636

A Customizable MapReduce Framework for Complex Data-Intensive Workflows on GPUs

Zhi Qiao and Shuwen Liang (University of North Texas, USA); Hai Jiang (Arkansas State University, USA); Song Fu (University of North Texas, USA)

Session 9: Network Protocols

1570211485

Energy Cost Minimization via Intelligent Temporal and Spatial Resource Allocation in Green Heterogeneous Cellular Networks

Qiang Yang and Bang Wang (Huazhong University of Science and Technology, P.R. China)

1570214416

Comparative Analysis of Big Data Transfer Protocols in an International High-Speed Network

Se-young Yu, Nevil Brownlee and Aniket Mahanti (University of Auckland, New Zealand)

1570214660

Controller Placement for Multi-States Software-Defined Networks

Guo Sheng, Shu Yang and Qi Li (Tsinghua University, P.R. China); Yong Jiang (Graduate School at Shenzhen, Tsinghua University, P.R. China)

1570216309

On Secure Shared Key Establishment for Mobile Devices using Contextual Information

Ala Altaweel, Radu Stoleru and Subhajit Mandal (Texas A&M University, USA)

Session 10: Wireless Communication and Networks I

1570213862

Charging Your Smartphones on Public Commuters via Wireless Energy Transfer

Wenzheng Xu (Sichuan University & Australian National University, P.R. China); Weifa Liang (The Australian National University, Australia); Su Hu and XiaoLa Lin (Sun Yat-Sen University, P.R. China); Jian Peng (Sichuan University, P.R. China)

1570213893

Efficient RSS Measurement in Wireless Networks based on Compressive Sensing

Yanchao Zhao (Nanjing University of Aeronautics and Astronautics & Nanjing University, P.R. China); Wenzhong Li (Nanjing University, P.R. China); Jie Wu (Temple University, USA); Sanglu Lu (Nanjing University, P.R. China)

1570213989

On the Coexistence of 802.11 and 802.15.4 Networks with Delay Constraints

Wei Zhang, Mahima Agumbe Suresh, Yuhan Zhou, Raghavan Veera and Radu Stoleru (Texas A&M University, USA)

1570214105

Stochastic Duty Cycling for Heterogenous Energy Harvesting Networks

Jianhui Zhang (Hangzhou Dianzi University, P.R. China); Mengmeng Wang (Hangzhou Dianzi Universtiy, P.R. China); Zhi Li (Hanghzou Dianzi University, P.R. China)

1570214317

Traffic Condition Estimation Using Vehicular Crowdsensing Data

Lu Shao (Tongji University, P.R. China); Cheng Wang (Tongji University, Shanghai, P.R. China); Zhong Li and Changjun Jiang (Tongji University, P.R. China)

Session 11: Wireless Communication and Networks II

1570214616

On Balancing the Energy Consumption of Routing Protocols for Opportunistic Social Networks

Chen Yang and Radu Stoleru (Texas A&M University, USA)

1570215745

Adaptive Partial Frequency Reuse in LTE-Advanced Relay Networks

Chen Sun (Nanchang Hangkong University, P.R. China); Xiaojun Wang (Dublin City University, Ireland); Zhiyong Yang (Nanchang Hangkong University, P.R. China)

1570216040

Optimum Reference Node Deployment for Indoor Localization Based on the Average Cramer-Rao Bound Minimization

Fei Long (Western University, Canada); Aydin Behnad (The University of Western Ontario, Canada); Xianbin Wang (Western University, Canada)

1570216782

Network Performance Isolation Scheme for QoE in a mobile device

Woonghee Lee, Hyunsoon Kim, Joon Yeop Lee and Albert Chung (Korea University, Korea); Yong Seok Park (Samsung electronics, Korea); Hwangnam Kim (Korea University, Korea)

1570214397

Network Intrusion Detection And Prevention Middlebox Management In SDN

Wen Wang and Wenbo He (McGill University, Canada); Jinshu Su (National University of Defence Technology, P.R. China)

Session 12: Performance Tools and Evaluation

1570214516

PATHA: Performance Analysis Tool for HPC Applications

Wucherl Yoo (Lawrence Berkeley National Laboratory, USA); Michelle Koo (University of California, Berkeley, USA); Yi Cao (California Institute of Technology, USA); Alex Sim (Lawrence Berkeley National Laboratory, USA); Peter Nugent (LBNL & UC Berkeley, USA); Kesheng Wu (Lawrence Berkeley National Laboratory, USA)

1570214527

Energy-Efficient, Delay-aware Packet Scheduling in High-Speed Networks

Qun Yu and Taieb Znati (University of Pittsburgh, USA); Wang Yang (Southeast University, P.R. China)

1570215493

Spatio-Temporal Tensor Completion for Imputing Missing Internet Traffic Data

Zhou Huibin and Dafang Zhang (Hunan University, P.R. China); Kun Xie and Yuxiang Chen (State University of New York at Stony Brook, USA)

1570215976

ATLAS: An Adaptive Failure-Aware Scheduler for Hadoop

Mbarka Soualhia (Concordia University, Canada); Foutse Khomh (École Polytechnique, Montreal, Montreal, Canada); Sofiene Tahar (Concordia University, Canada)

1570215615

ScalaSEM: A Testing Framework for Large Scale Datacenter SDN Design

Nan Zhu and Wenbo He (McGill University, Canada)

Session 13: Internet Services and Network Management

1570193475

Narrowing Down the Debugging Space of Slow Search Response Time

Dapeng Liu, Youjian Zhao, Dan Pei and Chengbin Quan (Tsinghua University, P.R. China); Qingqian Tao, Pei Wang, Xiyang Chen and Dai Tan (Baidu, P.R. China); Xiaowei Jing (PetroChina, P.R. China); Mei Feng (Petro China, P.R. China)

1570213240

Pricing and Revenue Sharing for Secondary Market Mobile Users Internet Access

Hengky Susanto (Hong Kong University of Science and Technology, Hong Kong); Benyuan Liu (University of Massachusetts Lowell, USA); Byung-Guk Kim (University of Massachusetts at Lowell, USA); Honggang Zhang (University of Massachusetts Boston, USA); Xinwen Fu (University of Massachusetts Lowell, USA)

1570214028

Incremental Deployment for Traffic Engineering in Hybrid SDN Network

Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi and Jianping Wu (Tsinghua University, P.R. China); Han Zhang (Tsinghua University, Beijing, P.R. China)

1570215897

Complete Font Generation of Chinese Characters in Personal Handwriting Style

Jeng-Wei Lin (Tunghai University, Taiwan); Chian-Ya Hong and Ray-I Chang (National Taiwan University, Taiwan); Yu-Chun Wang, Shu-Yu Lin and Jan-Ming Ho (Academia Sinica, Taiwan)

1570193467

Learning Thresholds for PV Change Detection from Operators' Labels

Dapeng Liu, Youjian Zhao, Kaixin Sui, Shiwen Cheng, Dan Pei and Chengbin Quan (Tsinghua University, P.R. China); Jiao Luo (Baidu, P.R. China); Xiaowei Jing (PetroChina, P.R. China); Mei Feng (Petro China, P.R. China)

Session 14: Cache, Memory, and Disk Storage Systems.

1570213602

Integrated caching and tiering according to use and QoS requirements

Mark Abashkin (Ben-Gurion University of the Negev, Israel); Assaf Natanzon (EMC Corp. and Ben-Gurion University of the Negev, Israel); Eitan Bachmat (Ben-Gurion University, Israel)

1570215616

PASSI: A Parallel, Reliable and Scalable Storage Software Infrastructure for Active Storage System and I/O Environments

Song Fu (University of North Texas, USA); Hsing-bung HB Chen (Los Alamos National Lab, USA)

1570215842

P-CLS: A Popularity-driven Caching Location and Searching Scheme in Content Centric Networking

Yuemei Xu (Beijing Foreign Studies University, P.R. China); Shuai Ma (University of Southern California, USA); Yang Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Fu Chen (Beijing Foreign Studies University & CS, P.R. China); Song Ci (University of Nebraska-Lincoln, USA)

1570215912

WAlloc: An Efficient Wear-Aware Allocator for Non-Volatile Main Memory

Songping Yu, Nong Xiao, Mingzhu Deng, Yuxuan Xing and Fang Liu (National University of Defense Technology, P.R. China); Zhiping Cai (University of Florida & National University of Defense Technology, USA); Wei Chen (National University of Defense Technology, P.R. China)

Session 15: Mobile Ad Hoc, Sensor and Mesh Networks.

1570215735

R-PMD: Robust Passive Motion Detection Using PHY Information with MIMO

Hai Zhu, Fu Xiao, Lijuan Sun and Xiaohui Xie (Nanjing University of Posts and Telecommunications, P.R. China); Panlong Yang (Institute of Communication Engineering, PLAUST, P.R. China); Ruchuan Wang (Nanjing University of Posts and Telecommunications, P.R. China)

1570214428

A Goodput Distribution Model For IEEE 802.11 Wireless Mesh Networks

Ying Qu, Bryan Ng and Winston K.G. Seah (Victoria University of Wellington, New Zealand)

1570214198

New Tight Upper Bounds on the Capacity for General Deterministic Dissemination in Wireless Ad Hoc Networks

Cheng Wang (Tongji University, Shanghai, P.R. China); Jieren Zhou (Tongji University, P.R. China); Tianci Liu (Tsinghua University, P.R. China); Lu Shao (Tongji University, P.R. China); Huiya Yan (University of Wisconsin-La Crosse, USA)

Session 16: Processor Architecture

1570215141

Reducing Inter-Task Interference Delay by Optimizing Bank-to-Core Mapping

Jizan Zhang, Zhimin Gu and Mingquan Zhang (Beijing Institute of Technology, P.R. China)

1570215153

Optimization Strategies for Inter-Thread Synchronization Overhead on NUMA Machine

Song Wu, Jun Zhang, Yaqiong Peng, Hai Jin and Wenbin Jiang (Huazhong University of Science and Technology, P.R. China)

1570215879

Resilient and Efficient Communication in Many-Core Systems using Network Coding

Sadia Moriam (Vodafone Chair for Mobile Communications Techiche Universitat Dresden, Germany); Yexin Yan (Technische Universit Dresden, Germany); Erik Fischer (TU-Dresden, Germany); Elke Franz and Gerhard Fettweis (Technische Universität Dresden, Germany)

1570214323

A Low-Latency Fine-Grained Dynamic Shared Cache Management Scheme for Chip Multi-Processor

Jinbo Xu, Zhengbin Pang and Weixia Xu (National University of Defense Technology, P.R. China)

Session 17: Security and Privacy I

1570213493

How to Protect Query and Report Privacy without Sacrificing Service Quality in Participatory Sensing

Meng Li (Beijing Institute of Technology, P.R. China); Fan Wu and Guihai Chen (Shanghai Jiao Tong University, P.R. China); Liehuang Zhu and Zijian Zhang (Beijing Institute of Technology, P.R. China)

1570213776

A Secure OFDM Transmission Scheme Based on Chaos Mapping

Xiaozhong Zhang, Ying Wang, Juan Zeng and Yongming Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)

1570214092

Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis

Xing Liu and Wei Wang (Beijing Jiaotong University, P.R. China); Jiqiang Liu (Beijing Jiao Tong University, P.R. China)

1570214259

PROTA: A Privacy-Preserving Protocol for Real-Time Targeted Advertising

Yiming Pang, Bo Wang, Fan Wu and Guihai Chen (Shanghai Jiao Tong University, P.R. China); Bo Sheng (University of Massachusetts Boston, USA)

1570214279

Self-Adaptive Anonymous Communication Scheme Under SDN Architecture

Tingting Zeng, Meng Shen, Mingzhong Wang, Liehuang Zhu and Fan Li (Beijing Institute of Technology, P.R. China)

Session 18: Security and Privacy II

1570214302

Identify User Variants Based on User Behavior on Social Media

Haoran Xu and Yuqing Sun (Shandong University, P.R. China)

1570214483

Privacy Preserving Big Histogram Aggregation for Spatial Crowdsensing

Shaowei Wang, Liusheng Huang, Pengzhan Wang, Yao Shen, Hongli Xu and Wei Yang (University of Science and Technology of China, P.R. China)

1570215033

Detecting BGP Instability Using Recurrence Quantification Analysis (RQA)

Bahaa Al-Musawi (Centre for Advanced Internet Architectures & Swinburne University of Technology, Australia); Philip Branch and Grenville Armitage (Swinburne University of Technology, Australia)

1570215935

Replication Attack Detection with Monitor Nodes in Clustered Wireless Sensor Networks

Guo Cheng and Songtao Guo (Southwest University, P.R. China); Yuanyuan Yang (Stony Brook University, USA); Fei Wang (Southwest University, P.R. China)

1570214511

Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices

Douglas Summerville (State University of New York at Binghamton, USA); Kenneth Zach and Yu Chen (Binghamton University, USA)

Session 19: Poster Session

1570212611

Fincher: Elephant Flow Scheduling based on Stable Matching in Data Center Networks

Yuxiang Zhang, Lin Cui and Qiao Chu (Jinan University, P.R. China)

1570212687

A Non-orthogonal Waveform Superposition Scheme for High Efficient and Reliable Communications

Ying Wang (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)

1570212981

A Domestic Adaptable Infant Monitoring System (AIMS) Using Wireless Sensor Networks

Hong Zhou (University of Southern Queensland, Australia); Brad Goold (USQ, Australia)

1570213910

Proactive Complex Event Processing for Transportation Internet of Things

Yongheng Wang (College of Information Science and Engineering, HuNan University, P.R. China); Qian LI (Hunan University & College of Information Science and Engineering, P.R. China)

1570214213

An Effective Service Discovery Approach Based on Field Theory and Contribution Degree in Unstructured P2P Networks

Wanchun Yang, Chenxi Zhang and Jiangfeng Li (Tongji University, P.R. China)

1570214271

Measuring the Internet Routing Scalability from the Perspective of Address Allocation

Dan Wu, Zhiliang Wang, Xia Yin, Xingang Shi and Jianping Wu (Tsinghua University, P.R. China)

1570214277

Latency-Aware Routing with Bandwidth Assignment for Software Defined Networks

Qiongyu Zhang, Liehuang Zhu, Meng Shen, Mingzhong Wang and Fan Li (Beijing Institute of Technology, P.R. China)

1570214318

An ASIP Based Physical Layer Virtualization Method of Centralized Radio Access Network

Fang Xiao (Institute of Computing Technology, Chinese Academy of Sciences & University of Chinese Academy of Sciences, P.R. China)

1570215582

Blind Identification of Helical Interleaving of the First Type

Li Huang (University of Science and Technology of China, P.R. China); Wengu Chen and Hong Chen (Institute of Applied Physics and Computational Mathematics, P.R. China)

1570215790

A Dominating-set-based and Popularity-driven Caching Scheme in Edge CCN

Weiyuan Li and Yang Li (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China); Wei Wang (Institute of Telecommunication Satellite, China Academy of Space Technology, P.R. China); Yonghui Xin and Tao Lin (Institute of Information Engineering, Chinese Academy of Sciences, P.R. China)

1570215938

Characterizing I/O Workloads of HPC Applications through online analysis

Wenrui Dong, Guangming Liu, Jie Yu and You Zuo (National University of Defense Technology, P.R. China)

1570216893

Reducing the Read Latency of In-line Deduplication File System

Yongtao Zhou, Yuhui Deng, Yan Li and Junjie Xie (Jinan University, P.R. China)

1570213067

Minimizing Energy Cost for Green Cloud Data Centers by Using ESDs

Chonglin Gu, Lingmin Zhang, Zhixiang He, Hejiao Hua and Xiaohua Jia (Harbin Institute of Technology Shenzhen Graduate School, China)

 

--!>

For questions, suggestions, or problems with the IPCCC website, please email the webmaster.
Platinum Patron
Follow ipccc on Twitter