IEEE INFOCOM 2020
Opening and Keynote
Opening Session
Baochun Li, Ben Liang (INFOCOM 2020 General Chairs); Vincent Chan (President, IEEE Communications Society); Tom Hou (Executive Chair); Guoliang Xue (Steering Committee Chair); Yunhao Liu, Mehmet Can Vuran, Hongyi Wu, Dejun Yang (Program Chairs and Vice Chair)
Intelligent Environments to Realize Communication in 6G Wireless Systems
Ian F. Akyildiz (Georgia Institute of Technology, USA)
Session Chair
Ben Liang (University of Toronto)
Virtual Coffee Break
Virtual Coffee Break
N/A
Session Chair
N/A
Industry Keynote
What does New IP Do and Why?
Richard Li (Future Networks)
Session Chair
Ben Liang (University of Toronto)
Virtual Lunch Break
Virtual Lunch Break
N/A
Session Chair
N/A
N2Women Lunch Meeting
N2Women Lunch Meeting
Keerthi Dasala (Rice University, USA), Ting He (Penn State University, USA), Rong Zheng (McMaster University, Canada)
Session Chair
Keerthi Dasala (Rice University, USA)
IoT and Health
Continuous User Verification via Respiratory Biometrics
Jian Liu (The University of Tennessee, Knoxville, USA); Yingying Chen (Rutgers University, USA); Yudi Dong (Stevens Institute of Technology, USA); Yan Wang and Tianming Zhao (Temple University, USA); Yu-Dong Yao (Stevens Institute of Technology, USA)
Deeper Exercise Monitoring for Smart Gym using Fused RFID and CV Data
Zijuan Liu, Xiulong Liu and Keqiu Li (Tianjin University, China)
Reconfigure and Reuse: Interoperable Wearables for Healthcare IoT
Nidhi Pathak (Indian Institute of Technology Kharagpur, India); Anandarup Mukherjee (Indian Institute of Technology, Kharagpur, India); Sudip Misra (Indian Institute of Technology-Kharagpur, India)
TrueHeart: Continuous Authentication on Wrist-worn Wearables Using PPG-based Biometrics
Tianming Zhao and Yan Wang (Temple University, USA); Jian Liu (The University of Tennessee, Knoxville, USA); Yingying Chen (Rutgers University, USA); Jerry Cheng (New York Institute of Technology, USA); Jiadi Yu (Shanghai Jiao Tong University, China)
Session Chair
WenZhan Song (University of Georgia)
Scheduling I
A Converse Result on Convergence Time for Opportunistic Wireless Scheduling
Michael Neely (University of Southern California, USA)
Is Deadline Oblivious Scheduling Efficient for controlling real-time traffic in cellular downlink systems?
Sherif ElAzzouni, Eylem Ekici and Ness B. Shroff (The Ohio State University, USA)
INFOCOM 2020 Best Paper: On the Power of Randomization for Scheduling Real-Time Traffic in Wireless Networks
Christos Tsanikidis and Javad Ghaderi (Columbia University, USA)
OST: On-Demand TSCH Scheduling with Traffic-awareness
Seungbeom Jeong and Hyung-Sin Kim (Seoul National University, Korea (South)); Jeongyeup Paek (Chung-Ang University, Korea (South)); Saewoong Bahk (Seoul National University, Korea (South))
Session Chair
Cong Wang (Old Dominion University)
Privacy I
(How Much) Does a Private WAN Improve Cloud Performance?
Todd W Arnold, Ege Gurmericliler and Georgia Essig (Columbia University, USA); Arpit Gupta (Columbia University); Matt Calder (Microsoft); Vasileios Giotsas (Lancaster University, United Kingdom (Great Britain)); Ethan Katz-Bassett (Columbia University, USA)
De-anonymization of Social Networks: the Power of Collectiveness
Jiapeng Zhang and Luoyi Fu (Shanghai Jiao Tong University, China); Xinbing Wang (Shanghai Jiaotong University, China); Songwu Lu (University of California at Los Angeles, USA)
To address this issue, we, for the first time, integrate the multi-hop relationships, which exhibit more structural commonness between networks, into the seedless de-anonymization. We aim to leverage these multi-hop relations to minimize the total disagreements of multi-hop adjacency matrices, which we call collective adjacency disagreements (CADs), between two networks. Theoretically, we demonstrate that CAD enlarges the difference between wrongly and correctly matched node pairs, whereby two networks can be correctly matched w.h.p. even when the network density is below log(n). Algorithmically, we adopt the conditional gradient descending method on a collective-form objective, which efficiently finds the minimal CADs for networks with broad degree distributions. Experiments return desirable accuracies thanks to the rich information manifested by collectiveness since most nodes can be correctly matched when merely utilizing adjacency relations fails to work.
Towards Correlated Queries on Trading of Private Web Browsing History
Hui Cai (Shanghai Jiao Tong University, China); Fan Ye and Yuanyuan Yang (Stony Brook University, USA); Yanmin Zhu (Shanghai Jiao Tong University, China); Jie Li (Shanghai Jiaotong University, China)
Towards Pattern-aware Privacy-preserving Real-time Data Collection
Zhibo Wang, Wenxin Liu and Xiaoyi Pang (Wuhan University, China); Ju Ren (Central South University, China); Zhe Liu (Nanjing University of Aeronautics and Astronautics, China & SnT, University of Luxembourg, Luxembourg); Yongle Chen (Taiyuan University of Technology, China)
In this paper, we propose a novel pattern-aware privacy-preserving approach, called PatternLDP, to protect data privacy while the pattern of time-series can still be preserved. To this end, instead of providing the same level of privacy protection at each data point, each user only samples remarkable points in time-series and adaptively perturbs them according to their impacts on local patterns. In particular, we propose a pattern-aware sampling method to determine whether to sample and perturb current data point, and propose an importance-aware randomization mechanism to adaptively perturb sampled data locally while achieving better trade-off between privacy and utility. Extensive experiments on real-world datasets demonstrate that PatternLDP outperforms existing mechanisms.
Session Chair
Vasanta Chaganti (Swarthmore College)
Network Intelligence I
Camel: Smart, Adaptive Energy Optimization for Mobile Web Interactions
Jie Ren (Shaanxi Normal University, China); Lu Yuan (Northwest University, China); Petteri Nurmi (University of Helsinki, Finland); Xiaoming Wang and Miao Ma (Shaanxi Normal University, China); Ling Gao, Zhanyong Tang and Jie Zheng (Northwest University, China); Zheng Wang (University of Leeds, United Kingdom (Great Britain))
COSE: Configuring Serverless Functions using Statistical Learning
Nabeel Akhtar (Boston University & Akamai, USA); Ali Raza (Boston University, USA); Vatche Ishakian (Bentley University, USA); Ibrahim Matta (Boston University, USA)
Machine Learning on Volatile Instances
Xiaoxi Zhang, Jianyu Wang, Gauri Joshi and Carlee Joe-Wong (Carnegie Mellon University, USA)
Optimizing Mixture Importance Sampling Via Online Learning: Algorithms and Applications
Tingwei Liu (The Chinese University of Hong Kong, Hong Kong); Hong Xie (Chongqing University, China); John Chi Shing Lui (Chinese University of Hong Kong, Hong Kong)
Session Chair
Christopher G. Brinton (Purdue University)
Multi-Armed Bandits
Exploring Best Arm with Top Reward-Cost Ratio in Stochastic Bandits
Zhida Qin and Xiaoying Gan (Shanghai Jiao Tong University, China); Jia Liu (Iowa State University, USA); Hongqiu Wu, Haiming Jin and Luoyi Fu (Shanghai Jiao Tong University, China)
MABSTA: Collaborative Computing over Heterogeneous Devices in Dynamic Environments
Yi-Hsuan Kao (Supplyframe, USA); Kwame-Lante Wright (Carnegie Mellon University, USA); Po-Han Huang and Bhaskar Krishnamachari (University of Southern California, USA); Fan Bai (General Motors, USA)
Combinatorial Multi-Armed Bandit Based Unknown Worker Recruitment in Heterogeneous Crowdsensing
Guoju Gao (University of Science and Technology of China, China); Jie Wu (Temple University, USA); Mingjun Xiao (University of Science and Technology of China, China); Guoliang Chen (University of Science & Technology of China, China)
Stochastic Network Utility Maximization with Unknown Utilities: Multi-Armed Bandits Approach
Arun Verma and Manjesh K Hanawal (Indian Institute of Technology Bombay, India)
Session Chair
Bo Ji (Temple University)
UAV I
Energy-Efficient UAV Crowdsensing with Multiple Charging Stations by Deep Learning
Chi Harold Liu and Chengzhe Piao (Beijing Institute of Technology, China); Jian Tang (Syracuse University, USA)
RF Backscatter-based State Estimation for Micro Aerial Vehicles
Shengkai Zhang, Wei Wang, Ning Zhang and Tao Jiang (Huazhong University of Science and Technology, China)
SocialDrone: An Integrated Social Media and Drone Sensing System for Reliable Disaster Response
Md Tahmid Rashid, Daniel Zhang and Dong Wang (University of Notre Dame, USA)
VFC-Based Cooperative UAV Computation Task Offloading for Post-disaster Rescue
Weiwei Chen, Zhou Su and Qichao Xu (Shanghai University, China); Tom H. Luan (Xidian University, China); Ruidong Li (National Institute of Information and Communications Technology (NICT), Japan)
Session Chair
Christoph Sommer (Paderborn University)
Edge Computing I
Coded Edge Computing
Kwang Taik Kim (Purdue University, USA); Carlee Joe-Wong (Carnegie Mellon University, USA); Mung Chiang (Purdue University, USA)
HotDedup: Managing Hot Data Storage at Network Edge through Optimal Distributed Deduplication
Shijing Li and Tian Lan (George Washington University, USA)
Joint Configuration Adaptation and Bandwidth Allocation for Edge-based Real-time Video Analytics
Can Wang, Sheng Zhang, Yu Chen and Zhuzhong Qian (Nanjing University, China); Jie Wu (Temple University, USA); Mingjun Xiao (University of Science and Technology of China, China)
Latency-aware VNF Chain Deployment with Efficient Resource Reuse at Network Edge
Panpan Jin (Huazhong University of Science and Technology, China); Xincai Fei (Huazhong University of Science & Technology, China); Qixia Zhang and Fangming Liu (Huazhong University of Science and Technology, China); Bo Li (Hong Kong University of Science and Technology, Hong Kong)
Session Chair
Serge Fdida (Sorbonne University)
Virtual Coffee Break
Virtual Coffee Break
N/A
Session Chair
N/A
RFID and Backscatter Systems I
A Universal Method to Combat Multipaths for RFID Sensing
Ge Wang (Xi‘an Jiaotong University, China); Chen Qian (University of California at Santa Cruz, USA); Kaiyan Cui (Xi'an Jiaotong University, China); Xiaofeng Shi (University of California Santa Cruz, USA); Han Ding, Wei Xi and Jizhong Zhao (Xi'an Jiaotong University, China); Jinsong Han (Zhejiang University & Institute of Cyber Security Research, China)
AnyScatter: Eliminating Technology Dependency in Ambient Backscatter Systems
Taekyung Kim and Wonjun Lee (Korea University, Korea (South))
RF-Ear: Contactless Multi-device Vibration Sensing and Identification Using COTS RFID
Panlong Yang and Yuanhao Feng (University of Science and Technology of China, China); Jie Xiong (University of Massachusetts Amherst, USA); Ziyang Chen and Xiang-Yang Li (University of Science and Technology of China, China)
In this work, we design RF-Ear, a contactless vibration sensing system using Commercial off-the-shelf(COTS) RFID hardware. RF-Ear could accurately monitor the mechanical vibrations of multiple devices (up to 8) using a single tag: it can clearly tell which object is vibrating at what frequency without attaching tags on any device. RF-Ear can measure the vibration frequency up to 400Hz with a mean error rate of 0.2%. Our evaluation results show that RF-Ear can effectively detect 2mm vibration amplitude change with 90% accuracy. We further employ each device's unique vibration fingerprint to identify and differentiate devices of exactly the same model. Comprehensive experiments conducted in a real power plant demonstrate the effectiveness of our system with great performance.
TagRay: Contactless Sensing and Tracking of Mobile Objects using COTS RFID Devices
Ziyang Chen and Panlong Yang (University of Science and Technology of China, China); Jie Xiong (University of Massachusetts Amherst, USA); Yuanhao Feng and Xiang-Yang Li (University of Science and Technology of China, China)
Session Chair
Song Min Kim (KAIST)
Network Optimization I
Communication-Efficient Network-Distributed Optimization with Differential-Coded Compressors
Xin Zhang, Jia Liu and Zhengyuan Zhu (Iowa State University, USA); Elizabeth Serena Bentley (AFRL, USA)
How to Distribute Computation in Networks
Derya Malak (Rensselaer Polytechnic Institute, USA); Alejandro Cohen and Muriel Médard (MIT, USA)
Simple and Fast Distributed Computation of Betweenness Centrality
Pierluigi Crescenzi (Université de Paris, France & University of Florence, Italy); Pierre Fraigniaud (CNRS and Université Paris 7, France); Ami Paz (Faculty of Computer Science - University of Vienna, Austria)
Systematic Topology Design for Large-Scale Networks: A Unified Framework
Yijia Chang, Xi Huang, Longxiulin Deng and Ziyu Shao (ShanghaiTech University, China); Junshan Zhang (Arizona State University, USA)
Session Chair
Atilla Eryilmaz (Ohio State University)
Security I
MagView: A Distributed Magnetic Covert Channel via Video Encoding and Decoding
Juchuan Zhang, Xiaoyu Ji and Wenyuan Xu (Zhejiang University, China); Yi-Chao Chen (Shanghai Jiao Tong University, China); Yuting Tang (University of California, Los Angeles, USA); Gang Qu (University of Maryland, USA)
Stealthy DGoS Attack: DeGrading of Service under the Watch of Network Tomography
Cho-Chun Chiu (The Pennsylvania State University, USA); Ting He (Penn State University, USA)
Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home
Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk and Haojin Zhu (Shanghai Jiao Tong University, China)
Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service
Jinyang Li and Zhenyu Li (Institute of Computing Technology, Chinese Academy of Sciences, China); Gareth Tyson (Queen Mary, University of London, United Kingdom (Great Britain)); Gaogang Xie (Institute of Computing Technology, Chinese Academy of Sciences, China)
Session Chair
Qiben Yan (Michigan State University)
Network Intelligence II
Autonomous Unknown-Application Filtering and Labeling for DL-based Traffic Classifier Update
Jielun Zhang, Fuhao Li, Feng Ye and Hongyu Wu (University of Dayton, USA)
Communication-Efficient Distributed Deep Learning with Merged Gradient Sparsification on GPUs
Shaohuai Shi, Qiang Wang and Xiaowen Chu (Hong Kong Baptist University, Hong Kong); Bo Li (Hong Kong University of Science and Technology, Hong Kong); Yang Qin (Harbin Institute of Technology (Shenzhen), China); Ruihao Liu and Xinxiao Zhao (ShenZhen District Block Technology Co., Ltd., China)
Tracking the State of Large Dynamic Networks via Reinforcement Learning
Matthew Andrews (Nokia Bell Labs, USA); Sem Borst (Eindhoven University of Technology & Nokia Bell Labs, USA); Jeongran Lee (Nokia Bell Labs, USA); Enrique Martín-López and Karina Palyutina (Nokia Bell Labs, United Kingdom (Great Britain))
Unsupervised and Network-Aware Diagnostics for Latent Issues in Network Information Databases
Hua Shao (Tsinghua University, China); Li Chen (Huawei, Hong Kong); Youjian Zhao (Tsinghua University, China)
Session Chair
Wenye Wang (NC State University)
Age of Information
AoI Scheduling with Maximum Thresholds
Chengzhang Li, Shaoran Li, Yongce Chen, Thomas Hou and Wenjing Lou (Virginia Tech, USA)
Minimizing Age of Information in Multi-channel Time-sensitive Information Update Systems
Zhenzhi Qian and Fei Wu (The Ohio State University, USA); Jiayu Pan (Ohio State University, USA); Kannan Srinivasan and Ness B. Shroff (The Ohio State University, USA)
On the Minimum Achievable Age of Information for General Service-Time Distributions
Jaya Prakash Varma Champati, Ramana Reddy Avula, Tobias J. Oechtering and James Gross (KTH Royal Institute of Technology, Sweden)
Unifying AoI Minimization and Remote Estimation --- Optimal Sensor/Controller Coordination with Random Two-way Delay
Cho-Hsin Tsai and Chih-Chun Wang (Purdue University, USA)
Session Chair
Ana C Aguiar (University of Porto)
Wireless Networks
AoI and Throughput Tradeoffs in Routing-aware Multi-hop Wireless Networks
Jiadong Lou and Xu Yuan (University of Louisiana at Lafayette, USA); Sastry Kompella (Naval Research Laboratory, USA); Nian-Feng Tzeng (University of Louisiana at Lafayette, USA)
Decentralized placement of data and analytics in wireless networks for energy-efficient execution
Prithwish Basu (Raytheon BBN Technologies, USA); Theodoros Salonidis (IBM Research, USA); Brent Kraczek (US Army Research Laboratory, USA); Sayed M Saghaian N. E. (The Pennsylvania State University, USA); Ali Sydney (Raytheon BBN Technologies, USA); Bong Jun Ko (IBM T.J. Watson Research Center, USA); Tom La Porta (Pennsylvania State University, USA); Kevin S Chan (US CCDC Army Research Laboratory, USA)
We introduce an expressive analytics-service-hypergraph model for representing k-ary composability relationships between various analytics and data components and leverage binary quadratic programming(BQP) to minimize the total energy consumption of a given placement of the hypergraph nodes on the network subject to resource availability constraints. Then, after defining a potential-energy functional P(.) to model the affinities of analytics components and network resources using analogs of attractive and repulsive forces in physics, we propose a decentralized Metropolis-Monte-Carlo(MMC) sampling method which seeks to minimize P by moving analytics and data on the network. Although P is non-convex, using a potential game formulation, we identify conditions under which the algorithm provably converges to a local minimum energy equilibrium configuration.
Trace-based simulations of the placement of a deep-neural-network analytics service on a realistic wireless network show that for smaller problem instances our MMC algorithm yields placements with total energy within a small factor of BQP and more balanced workload distributions; for larger problems, it yields low-energy configurations while the BQP approach fails.
Link Quality Estimation Of Cross-Technology Communication
Jia Zhang, Xiuzhen Guo and Haotian Jiang (Tsinghua University, China); Xiaolong Zheng (Beijing University of Posts and Telecommunications, China); Yuan He (Tsinghua University, China)
S-MAC: Achieving High Scalability via Adaptive Scheduling in LPWAN
Zhuqing Xu and Luo Junzhou (Southeast University, China); Zhimeng Yin and Tian He (University of Minnesota, USA); Fang Dong (Southeast University, China)
Session Chair
Zhichao Cao (Michigan State University)
Caching I
Exploring the interplay between CDN caching and video streaming performance
Ehab Ghabashneh and Sanjay Rao (Purdue University, USA)
Similarity Caching: Theory and Algorithms
Michele Garetto (Università di Torino, Italy); Emilio Leonardi (Politecnico di Torino, Italy); Giovanni Neglia (Inria, France)
T-cache: Dependency-free Ternary Rule Cache for Policy-based Forwarding
Ying Wan (Tsinghua University, China); Haoyu Song (Futurewei Technologies, USA); Yang Xu (Fudan University, China); Yilun Wang (Tsinghua University, China); Tian Pan (Beijing University of Posts and Telecommunications, China); Chuwen Zhang and Bin Liu (Tsinghua University, China)
Universally Stable Cache Networks
Yuanyuan Li and Stratis Ioannidis (Northeastern University, USA)
Session Chair
Aaron D Striegel (University of Notre Dame)
Demo Session 1
High Voltage Discharge Exhibits Severe Effect on ZigBee-based Device in Solar Insecticidal Lamp Internet of Things
Kai Huang, Kailiang Li, Lei Shu and Xing Yang (Nanjing Agricultural University, China)
FingerLite: Finger Gesture Recognition Using Ambient Light
Miao Huang and Haihan Duan (Sichuan University, China); Yanru Chen (Sichuan University, USA); Yanbing Yang (Sichuan University, China); Jie Hao (Nanjing University of Aeronautics and Astronautics, China); Liangyin Chen (Sichuan University & University of Minnesota, China)
An SDR-in-the-loop Carla Simulator for C-V2X-Based Autonomous Driving
Wei Zhang (Communication and Information Engineering of Shanghai University, China); Siyu Fu, Zixu Cao, Zhiyuan Jiang, Shunqing Zhang and Shugong Xu (Shanghai University, China)
INFOCOM 2020 Best Demo: Cross-Technology Communication between LTE-U/LAA and WiFi
Piotr Gawłowicz and Anatolij Zubow (Technische Universität Berlin, Germany); Suzan Bayhan (University of Twente, The Netherlands)
Increasing the Data Rate for Reflected Optical Camera Communication Using Uniform LED Light
Zequn Chen, Runji Lin and Haihan Duan (Sichuan University, China); Yanru Chen (Sichuan University, USA); Yanbing Yang (Sichuan University, China); Rengmao Wu (Zhejiang University, China); Liangyin Chen (Sichuan University & University of Minnesota, China)
Elastic Deployment of Robust Distributed Control Planes with Performance Guarantees
Daniel F. Perez-Ramirez (RISE Research Institutes of Sweden, Sweden); Rebecca Steinert (RISE SICS AB, Sweden); Dejan Kostic (KTH Royal Institute of Technology, Sweden); Natalia V. Vesselinova (RISE, Sweden)
Sensing and Communication Integrated System for Autonomous Driving Vehicles
Qixun Zhang, Huan Sun, Zhiqing Wei and Zhiyong Feng (Beijing University of Posts and Telecommunications, China)
Session Chair
Xiaonan Zhang (Florida State University)
Demo Session 2
Seamless Mobile Video Streaming in Multicast Multi-RAT Communications
Pavlos Basaras (Trinity College, Ireland); Stepan Kucera (Bell Labs, Alcatel-Lucent Ltd., Ireland); Kariem Fahmi (Trinity College Dublin, Ireland); Holger Claussen (Nokia Bell Labs, Ireland); George Iosifidis (Trinity College Dublin, Ireland)
Leveraging AI players for QoE estimation in cloud gaming
German Sviridov (Politecnico di Torino, Italy); Cedric Beliard (Huawei Technologies, Co. Ltd., France); Gwendal Simon (Huawei, France); Andrea Bianco and Paolo Giaccone (Politecnico di Torino, Italy); Dario Rossi (Telecom ParisTech, France)
To overcome these shortcomings, we propose to substitute human players with artificial agents trained with state-of-the-art Deep Reinforcement Learning techniques. Equivalently to traditional QoE assessment, we measure the in-game score achieved by an artificial agent for the game of Doom for varying network parameters. Our results show that the proposed methodology can be applied to understand fine-grained impact of network conditions on gaming experience while opening a lot of new opportunities for network operators and game developers.
Loop Avoidance in Computer Networks Using a Meshed Tree Protocol
Peter Willis, Nirmala Shenoy and Hrishikesh B Acharya (Rochester Institute of Technology, USA)
AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM
Zhu Tang (National University of Defense Technology, China); Li Sudan (National University of Defanse Technology, China); Peng Xun (National University of Defense Technology, China); Wenping Deng (National University of Defense Technology & ETH Zurich, China); Baosheng Wang (National University of Defense Technology, China)
CLoRa-A Covert Channel over LoRa PHY
Ningning Hou and Yuanqing Zheng (The Hong Kong Polytechnic University, Hong Kong)
Real-time Edge Analytics and Concept Drift Computation for Efficient Deep Learning From Spectrum Data
Zaheer Khan and Janne Lehtomäki (University of Oulu, Finland); Adnan Shahid (Gent University - imec, Belgium); Ingrid Moerman (Ghent University - imec, Belgium)
Opening the Deep Pandora Box:Explainable Traffic Classification
Cedric Beliard (Huawei Technologies, Co. Ltd., France); Alessandro Finamore (HUAWEI France, France); Dario Rossi (Telecom ParisTech, France)
Session Chair
Biao Han (National University of Defense Technology, China)
Poster Session 1
Near Optimal Network-wide Per-Flow Measurement
Ran Ben Basat (Harvard University, USA); Gil Einziger (Ben-Gurion University Of The Negev, Israel); Bilal Tayh (Ben Gurion University of the Negev, Israel)
Scalable and Interactive Simulation for IoT Applications with TinySim
Gonglong Chen, Wei Dong, Fujian Qiu, Gaoyang Guan, Yi Gao and Siyu Zeng (Zhejiang University, China)
Parallel VM Placement with Provable Guarantees
Itamar Cohen (Ben-Gurion University of the Negev, Israel); Gil Einziger (Ben-Gurion University Of The Negev, Israel); Maayan Goldstein and Yaniv Sa'ar (Nokia Bell Labs, Israel); Gabriel Scalosub (Ben-Gurion University of the Negev, Israel); Erez Waisbard (Nokia Bell Labs, Israel)
Measurement and Analysis of Cloud User Interest: A Glance From BitTorrent
Lei Ding (University of Alberta, Canada); Yang Li (University of Minnesota Duluth, USA); Haiyang Wang (University of Minnesota at Duluth, USA); Ke Xu (Tsinghua University, China)
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems
Yi Zhao (Tsinghua University, China); Wei Bao (The University of Sydney, Australia); Dan Wang (The Hong Kong Polytechnic University, Hong Kong); Ke Xu (Tsinghua University, China); Liang Lv (Tsinghua, China)
Always Heading for the Peak: Learning to Route with Domain Knowledge
Jing Chen, Zili Meng and Mingwei Xu (Tsinghua University, China)
Session Chair
Xiaowen Gong (Auburn University)
Poster Session 2
Joint Optimization of Service Function Chain Elastic Scaling and Routing
Weihan Chen and Zhiliang Wang (Tsinghua University, China); Han Zhang (Beihang University, China); Xia Yin and Xingang Shi (Tsinghua University, China); Lei Sun (Lenovo, China)
An Unsupervised Two-Layer Multi-Step Network Attack Detector
Su Wang, Zhiliang Wang, Xia Yin and Xingang Shi (Tsinghua University, China)
Towards Ambient Backscatter as an Anti-jamming Solution for IoT Devices
Wonwoo Jang and Wonjun Lee (Korea University, Korea (South))
Poster Abstract: An Open Source Approach to Field Testing of WLAN up to IEEE 802.11ad at 60 GHz Using Commodity Hardware
Florian Klingler, Fynn Hauptmeier and Christoph Sommer (Paderborn University, Germany); Falko Dressler (TU Berlin, Germany)
IRS Assisted Multiple User Detection for Uplink URLLC Non-Orthogonal Multiple Access
Lei Feng (Beijing University of Posts and Telecommunications, China); Xiaoyu Que (Beijing Univertsity of Posts and Telecommunications, China); Peng Yu and Li Wenjing (Beijing University of Posts and Telecommunications, China); Qiu Xuesong (Beijing University of Posts & Telecommunications (BUPT), China)
Poster Abstract: Environment-Independent Electronic Device Detection using Millimeter-Wave
Yeming Li (Zhejiang University EmNets Group, China); Wei Dong and Yuxiang Lin (Zhejiang University, China)
Session Chair
Zhangyu Guan (University at Buffalo)
Made with in Toronto · Privacy Policy · © 2021 Duetone Corp.