14-19 April 2013

Filter Results

Displaying Results 1 - 25 of 477
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • General chair's welcome

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • TPC chair's welcome

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (209 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program

    Publication Year: 2013, Page(s):1 - 54
    Request permission for commercial reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • Program

    Publication Year: 2013, Page(s):1 - 43
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Freely Available from IEEE
  • Technical Program Committee (TPC) members

    Publication Year: 2013, Page(s):1 - 12
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Efficient caching in content-centric networks using OpenFlow

    Publication Year: 2013, Page(s):1 - 2
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB) | HTML iconHTML

    Content-Centric Networking (CCN) is designed for efficient content dissemination and supports caching contents on the path from content providers to content consumers to improve user experience and reduce costs. However, this strategy is not optimal inside a domain. In this paper, we propose a solution to improve caching in CCN using a Software-Defined Networking approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of a sleep schedule on the AODV convergence time in WSNs

    Publication Year: 2013, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (75 KB) | HTML iconHTML

    As part of a search for a better understanding of MAC/routing interactions in Wireless Sensor Networks, this paper presents an analysis of the behaviour of the AODV routing protocol when combined with a duty-cycle MAC protocol. In particular, the paper focuses on the time it takes for a route request to be answered in presence of increased latency due to the MAC protocol sleep schedule. The paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing traffic sampling scope and efficiency

    Publication Year: 2013, Page(s):5 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (814 KB) | HTML iconHTML

    Traffic Sampling is a crucial step towards scalable network measurements, enclosing manifold challenges. The wide variety of foreseeable sampling scenarios demands for a modular view of sampling components and features, grounded on a consistent architecture. Articulating the measurement scope, the required information model and the adequate sampling strategy is a major design issue for achieving a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Obsidian: A scalable and efficient framework for NetFlow obfuscation

    Publication Year: 2013, Page(s):7 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (121 KB) | HTML iconHTML

    Through this software the authors aim to promote the sharing of network logs within the research community. The (k, j)obfuscation technique opens sundry interesting future directions. In fact, many networking and security tasks can be re-thought based on obfuscated datasets, for instance, quality of service (QoS), traffic classification, anomaly detection and more. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-harvesting WSNs for structural health monitoring of underground train tunnels

    Publication Year: 2013, Page(s):9 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (613 KB) | HTML iconHTML

    Structural health monitoring is a vital tool to help engineers improving the safety of critical structures, avoiding the risks of catastrophic failures. Wireless sensor networks (WSNs) are a very promising technology for structural health monitoring, as they can provide a quality of monitoring similar to conventional (wired) SHM systems with lower cost. In addiction, WSNs are both non-intrusive an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed scheduling for scalable P2P video streaming with network coding

    Publication Year: 2013, Page(s):11 - 12
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (87 KB) | HTML iconHTML

    Previous research has shown the benefits of random-push Network Coding (NC) for P2P video streaming. On the other hand, scalable video coding provides graceful quality adaptation to heterogeneous network conditions. Nevertheless, packet scheduling for scalable media streaming with P2P NC is still a largely unexplored problem. Our ongoing research aims at designing a packet scheduling scheme that m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAC-aware routing metrics for low power and lossy networks

    Publication Year: 2013, Page(s):13 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    In this paper, routing metrics for low power and lossy networks are designed and evaluated. The cross-layer interactions between routing and medium access control (MAC) are explored, by considering the specifications of IETF RPL over the IEEE 802.15.4 MAC. In particular, the experimental study of a reliability metric that extends the expected transmission count (ETX) to include the effects of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electricity cost efficient workload mapping

    Publication Year: 2013, Page(s):15 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (82 KB) | HTML iconHTML

    In this thesis, we formulate a generalized optimization problem to minimize the electricity cost of network operation while using techniques applicable to operational networks. We applied our optimization formulation to two different networks: geo-diverse data centers and cellular networks. In case of cellular networks, using traffic traces from an large operational network, we observed that an op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the impact of disorder on dynamic network navigation

    Publication Year: 2013, Page(s):17 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    Dynamic networks like Online Social Networks or Disruption Tolerant Networks (DTNs), when considering their spatial, temporal and size complexity, even if partly wired, are exposed to nodes and links churns and failures which can be modeled with dynamic graphs with time varying edges and vertices. Recently, it has been shown that dynamic networks exhibit some regularity in their temporal contact p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient dynamic spectrum sharing through rate compensation and spectrum handoff

    Publication Year: 2013, Page(s):19 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (594 KB) | HTML iconHTML

    In this work, we propose a heuristic for dynamic spectrum sharing in cognitive radio networks. The concept of rate compensation is introduced so that cognitive radio users are able to achieve their rate requirement by performing adequately spectrum handoffs. Indeed, performing spectrum handoff can increase the achieved rate obtained by moving from unavailable channels to available ones. However, h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple approximate analysis of floating content for context-aware applications

    Publication Year: 2013, Page(s):21 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB) | HTML iconHTML

    Context-awareness is a peculiar characteristic of an ever expanding set of applications that make use of a combination of restricted spatio-temporal locality and mobile communications, to deliver a variety of services to the end user. It is expected that by 2014 more than 1.5 billion people would be using applications based on local search (search restricted on the basis of spatio-temporal localit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data dissemination bounds in people-centric systems

    Publication Year: 2013, Page(s):23 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    This paper presents an overview of our research proposal. We present the key challenge in deploying people-centric systems that rely on opportunistic data dissemination. We propose to address this challenge by developing a model to predict the minimum number of nodes required to disseminate information to all nodes in a given network. We conduct some simulations in OMNET++ and present our prelimin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profit-maximizing virtual machine trading in a federation of selfish clouds

    Publication Year: 2013, Page(s):25 - 29
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    The emerging federated cloud paradigm advocates sharing of resources among cloud providers, to exploit temporal availability of resources and diversity of operational costs for job serving. While extensive studies exist on enabling interoperability across different cloud platforms, a fundamental question on cloud economics remains unanswered: When and how should a cloud trade VMs with others, such... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DPack: Disk scheduler for highly consolidated cloud

    Publication Year: 2013, Page(s):30 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    Virtualization allows us to consolidate multiple servers onto a single physical machine, saving infrastructure cost. Yet, consolidation can lead to performance degradation, jeopardizing Service Level Agreement (SLA). In this paper, we analyze and identify the factors to the performance degradation due to consolidation - that is the wait time and the ready time. The wait time is the queuing time ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dache: A data aware caching for big-data applications using the MapReduce framework

    Publication Year: 2013, Page(s):35 - 39
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    The buzz-word big-data (application) refers to the large-scale distributed applications that work on unprecedentedly large data sets. Google's MapReduce framework and Apache's Hadoop, its open-source implementation, are the defacto software system for big-data applications. An observation regarding these applications is that they generate a large amount of intermediate data, and these abundant inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HBaseMQ: A distributed message queuing system on clouds with HBase

    Publication Year: 2013, Page(s):40 - 44
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (145 KB) | HTML iconHTML

    Message queuing systems can be used to support a plethora of fundamental services in distributed systems. This paper presents HBaseMQ, the first distributed message queuing system based on bare-bones HBase. HBaseMQ directly inherits HBase's properties such as scalability and fault tolerance, enabling HBase users to rapidly instantiate a message queuing system with no extra program deployment or mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video sharing propagation in social networks: Measurement, modeling, and analysis

    Publication Year: 2013, Page(s):45 - 49
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6188 KB) | HTML iconHTML

    The social networking services (SNS) have drastically changed the information distribution landscape and people's daily life. With the development in broadband accesses, video has become one of the most important types of objects spreading among social networking service users, yet presents more significant challenges than other types of objects, not only to the SNS management, but also to the net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video requests from Online Social Networks: Characterization, analysis and generation

    Publication Year: 2013, Page(s):50 - 54
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4592 KB) | HTML iconHTML

    The deep penetration of Online Social Networks (OSNs) have made them major portals for video content sharing. It is known that a significant portion of the accesses to video sharing sites are now coming from OSN users. Yet the unique features of video sharing over OSNs and their impact remain largely unknown. In this paper, we present a measurement study towards understanding the video requests fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.