2013 22nd International Conference on Computer Communication and Networks (ICCCN)

July 30 2013-Aug. 2 2013

Filter Results

Displaying Results 1 - 25 of 123
  • [Front cover]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (129 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Committee

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s):i - ii
    Request permission for commercial reuse | |PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2013, Page(s):i - vii
    Request permission for commercial reuse | |PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2013, Page(s):i - vi
    Request permission for commercial reuse | |PDF file iconPDF (200 KB) | HTML iconHTML
    Freely Available from IEEE
  • Worshop Technical Program Committee

    Publication Year: 2013, Page(s):i - ii
    Request permission for commercial reuse | |PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • ContextQOS Organizing Committee

    Publication Year: 2013, Page(s):i - ii
    Request permission for commercial reuse | |PDF file iconPDF (102 KB)
    Freely Available from IEEE
  • Technical program overview

    Publication Year: 2013, Page(s):i - iv
    Request permission for commercial reuse | |PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Technical program

    Publication Year: 2013, Page(s):i - xxiii
    Request permission for commercial reuse | |PDF file iconPDF (549 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • A Fast Approach to Unknown Tag Identification in Large Scale RFID Systems

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (405 KB) | HTML iconHTML

    Radio Frequency Identification (RFID) technology has been widely applied in many scenarios such as inventory control, supply chain management due to its superior properties including fast identification and relatively long interrogating range over barcode systems. It is critical to efficiently identify the unknown tags because these tags can appear when new tagged objects are moved in or wrongly p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mediation Layer for Connecting Data-Intensive Applications to Reconfigurable Data Nodes

    Publication Year: 2013, Page(s):1 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (857 KB) | HTML iconHTML

    A novel and rapidly growing area of research concerns data-intensive applications and the technical challenges that accompany it. One of those challenges is developing approaches and mechanisms that render high performance in processing and storing data. We joined this research effort by proposing a reconfigurable active solid state drives (RASSD) system that deals with such applications, through ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Efficient Secure Coding Scheme for Random Linear Network Coding

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (221 KB) | HTML iconHTML

    Random Linear Network Coding (RLNC) is a promising technology of Network coding (NC) {that is} verified to be both sufficient and efficient. In this paper, we propose an efficient implementation of coding process, ensuring the security against active and passive attacks, in order to deploy RLNC in real networks, especially on battery constrained mobile devices with low computation capabilities suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reserve Price Auction for Spectrum Sharing with Heterogeneous Channels

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (680 KB) | HTML iconHTML

    Cognitive radio is a novel communication paradigm that can significantly improve spectrum utilization by allowing the cognitive radio users to dynamically utilize the licensed spectrum. To achieve this, studying efficient spectrum allocation mechanisms is imperative. In this paper, we consider a cognitive radio network consisting of a primary spectrum owner (PO), multiple primary users (PU) and mu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scheduler for Multipath TCP

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (625 KB) | HTML iconHTML

    We first explain problems with the default scheduler used by the Linux kernel MPTCP implementation. Then we propose the design of a new scheduler. Preliminary empirical results show that our proposed scheduler improves the throughput in MPTCP by alleviating the problems caused by the default scheduler. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Social Network Integrated Reputation System for Cooperative P2P File Sharing

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (815 KB) | HTML iconHTML

    In current reputation systems for peer-to-peer (P2P) file sharing networks, reputation querying generates high overhead in file service. Also, a high-reputed node may be reluctant to further increase its reputation in these reputation systems. Recently, social network-based P2P systems that favor file sharing among friends have been proposed for reliable file sharing. However, this approach contra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Software-Defined Networking Approach for Disaster-Resilient WANs

    Publication Year: 2013, Page(s):1 - 5
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (323 KB) | HTML iconHTML

    The current technology of Internet provides an acceptable level of resilience in normal operation. However, the Internet may get catastrophic impacts when unexpected disasters such as earthquakes, tsunami, etc. happen. Specifically, the Internet infrastructure including Wide Area Networks (WANs) face many challenges to normal operation including power outage, link, device failures, rerouting packe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study of SNR Wall Phenomenon under Cooperative Energy Spectrum Sensing

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (487 KB) | HTML iconHTML

    Energy detection has a low complexity of receiver structure and requires no information about primary signal. However, a single user detection has been proved vulnerable to the noise uncertainty, which causes the existence of a SNR wall below which the detector cannot robustly a chieve the given detection requirement. Compared to single user detection, cooperative energy spectrum sensing algorithm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Verification Service Architecture for the Future Internet

    Publication Year: 2013, Page(s):1 - 9
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1509 KB) | HTML iconHTML

    In this paper, we propose a service architecture for verification, a necessary component of a choice-based economy architecture of the future Internet. Such a verification architecture motivates and addresses the task of enabling users to verify, or obtain third-party verification of, whether the service components offered by various network service providers were responsible for meeting or failin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Virtual Network Allocation Algorithm for Reliability Negotiation

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (986 KB) | HTML iconHTML

    The Internet has become a primary means of communication, even though it currently does not guarantee Quality of Service (QoS). In order to tackle with this problem, companies establish Service Level Agreements (SLA) with their providers, including the reliability of services. This paper shows an algorithm for virtual network allocation in a reliability context, where some techniques of disjoint p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerating Allreduce Operation: A Switch-Based Solution

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (499 KB) | HTML iconHTML

    Collective operations, such as all reduce, are widely treated as the critical limiting factors in achieving high performance in massively parallel applications. Conventional host-based implementations, which introduce a large amount of point-to-point communications, are less efficient in large-scale systems. To address this issue, we propose a design of switch chip to accelerate collective operati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Achieving Privacy of Data Requests in MANETs by Means of Piggybacking and Hop Modification

    Publication Year: 2013, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (884 KB) | HTML iconHTML

    Caching systems have been proposed for MANETs to increase data availability and reduce data access delays. Every caching system is composed of three main components. The first component is requesting the data items from the server into the caching system. The second component is publishing the cached items in the network (or advertising them). While, the third component relates to nodes requesting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.