-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path2013.json
1 lines (1 loc) · 416 KB
/
2013.json
1
[{"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["sasu tarkoma", "giulio jacucci", "mikko rinne", "sumi helal", "kai kuikkaniemi", "marko turpeinen", "petri savolainen", "jukka reitmaa"], "keyword": ["ecosystem", "architecture"], "paperid": "7E1FADBA", "author_id": ["12557FFB", "6FFCC5F0", "768B4B87", "7A537C58", "7AD46558", "80E8C70B", "80F27D34", "8499B137"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["dongyue xue", "eylem ekici", "moustafa youssef", "ahmed elbagoury"], "keyword": ["network architectures", "networks"], "paperid": "76098AD8", "author_id": ["7FED22CA", "7FF70407", "811255E6", "84B644DC"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ingmar baumgart", "martin florian", "simeon andreev"], "keyword": ["geocast", "overlay networks", "maintenance engineering", "mobile computing", "bandwidth", "data models", "overdrive", "routing", "computational modeling"], "paperid": "75DD52A8", "author_id": ["71364CD8", "7DB091B2", "84C74987"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["kevin lau", "jie hui"], "keyword": ["transient state", "metrics", "measurement", "performance"], "paperid": "757F546A", "author_id": ["78E713DA", "7E9DE9E0"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ahmed helmy", "guliz seray tuncay", "giacomo benincasa"], "keyword": ["mobile computing"], "paperid": "7F33C78E", "author_id": ["750CD34C", "7D8409D4", "82E3AD1D"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["klaus wehrle", "hanno wirtz", "torsten zimmermann", "jan ruth"], "keyword": ["network protocols", "networks"], "paperid": "7ECA8EF2", "author_id": ["7341EC32", "7D2FFD41", "7EA6305E", "847E1D00"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["vishnu navda", "ramachandran ramjee", "venkata n padmanabhan", "abhijnan chakraborty"], "keyword": ["3g", "lte", "networks", "design", "performance"], "paperid": "78B925A6", "author_id": ["00659AE7", "28A0077D", "798C6D44", "7DF5F8B5"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["dina katabi", "omid aryan", "shyamnath gollakota", "fadel adib", "swarun kumar"], "keyword": ["mimo", "wireless", "networks", "hardware"], "paperid": "76FCD468", "author_id": ["0B9370B1", "0F4802F2", "7997DF6E", "7C51BD23", "856DE597"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["mustafa y arslan", "srikanth v krishnamurthy", "s v singh", "sampath rangarajan", "karthikeyan sundaresan"], "keyword": ["das", "multiplexing", "interference", "prototypes", "wimax"], "paperid": "79F62CF6", "author_id": ["7D7BD158", "7F2BD337", "8136AA89", "8168F2ED", "85E1FCBE"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["jincheng zhang", "minghua chen", "ranveer chandra", "lichao yan", "guanglin zhang", "xuhang ying"], "keyword": ["clustering algorithms", "design", "metrics", "measurement", "networks"], "paperid": "77FE57DD", "author_id": ["7D4DFA98", "7E248BC3", "7EE4D969", "84B417F8", "84D05C17", "84F01D05"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["xiangyang li", "xuesi jian", "cheng bo", "xufei mao", "fan li", "yu wang"], "keyword": ["classification"], "paperid": "7C588A88", "author_id": ["7DD9A433", "7F3E1498", "80C80F08", "81320DA9", "81632C0E", "85452F8F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["lin zhong", "hang yu", "clayton shepard"], "keyword": ["beamforming", "mrt", "zero forcing", "multi user mimo", "conjugate"], "paperid": "75B771D1", "author_id": ["7DD46EA0", "7F14622F", "7FD6CA7A"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["songwu lu", "guanhua tu", "chiyu li", "chunyi peng", "hongyi wang"], "keyword": ["cellular networks", "networks", "design", "performance"], "paperid": "77D2F012", "author_id": ["7EBD27F7", "8008E226", "806401CC", "83322EC5", "847C07A5"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["milena radenkovic", "murray goulden", "jon crowcroft", "d j mcauley", "christian greiffenhagen", "richard mortier", "h w howard"], "keyword": ["security", "network security"], "paperid": "7704E0A1", "author_id": ["47EEC65F", "73DE03D9", "7575972F", "75C8B2CE", "760CF5A5", "7AF8EEC1", "80164804"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["xinyu zhang", "xiufeng xie", "karthikeyan sundaresan"], "keyword": ["networks", "network protocols"], "paperid": "804423DB", "author_id": ["7F143EA1", "7F3D81DD", "85E1FCBE"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["susumu ishihara", "nobuhiro nakamura", "yuya niimi"], "keyword": ["ad hoc networks", "data dissemination", "networks", "network protocols", "network layer protocols", "routing protocols"], "paperid": "811B7DD1", "author_id": ["77D791AE", "84893BEF", "84CA80E6"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ioannis komnios", "vassilis tsaoussidis"], "keyword": ["delay tolerant networking", "routing protocols", "network layer protocols", "network protocols", "networks"], "paperid": "79619A3C", "author_id": ["0E8B998F", "79E41B1E"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["eduardo cerqueira", "ronedo ferreira", "p m mendes", "waldir moreira", "douglas cirqueira"], "keyword": ["network protocols", "networks"], "paperid": "78AB01C4", "author_id": ["7B6D9541", "7D5AE865", "7DE7D741", "804CF078", "848A47E9"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["arjmand samuel", "muhammad shahzad", "alex x liu"], "keyword": ["authentication", "gesture"], "paperid": "7A82C2DC", "author_id": ["7695EA66", "7CF432D3", "7F7BC34C"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["dirk trossen", "george parisis"], "keyword": ["network protocols", "network architectures", "networks", "information theory", "cryptography", "coding theory", "hardware"], "paperid": "7763D614", "author_id": ["2A517562", "78B7D188"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["panayotis antoniadis", "abdullah alhussainy", "karin anna hummel"], "keyword": ["mobility"], "paperid": "7BC11548", "author_id": ["8248F852", "84710404", "8549A0D6"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["marco gruteser", "yingying chen", "richard p martin", "hongbo liu", "yan wang", "jie yang"], "keyword": ["information systems"], "paperid": "8051C8C1", "author_id": ["23675588", "80EF83E1", "8165E681", "850EC3C8", "85858FF1", "86058467"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["wai ho mow", "wenjian huang"], "keyword": [], "paperid": "0519356D", "author_id": ["70409E9F", "7F4B2A6F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["bastian bloessl", "michele segata", "christoph sommer", "falko dressler"], "keyword": ["ofdm", "receiver", "networks", "measurement", "metrics"], "paperid": "7B7FDEDF", "author_id": ["0AB4E416", "6B09794C", "7B721263", "7FDCF3E6"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["enoch peserico", "federica bogo"], "keyword": ["throughput", "network coding", "interference", "routing", "mobility models", "networks", "network architectures"], "paperid": "7A32677B", "author_id": ["7561913C", "84DD508F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["bogdan carbunar", "jaime ballesteros", "mahmudur rahman", "naphtali rishe", "athanasios v vasilakos"], "keyword": ["privacy", "social networks", "radiation detectors", "encryption", "mobile computing", "data privacy", "protocols", "internet", "personal information"], "paperid": "7C8D2C3D", "author_id": ["7593EF38", "7E26B42B", "7E810EC5", "833214F0", "85AA7D42"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["zubair nabi"], "keyword": ["video conferencing", "developing world", "web applications", "network protocols", "world wide web", "information systems", "network architectures", "networks"], "paperid": "77D8211F", "author_id": ["8510BACA"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["kun tan", "jiansong zhang"], "keyword": ["networks"], "paperid": "77ACA545", "author_id": ["7F449570", "7F59C808"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["tarun bansal", "kannan srinivasan", "prasun sinha", "bo chen"], "keyword": ["wireless networks"], "paperid": "788CB8F1", "author_id": ["751F08E7", "75F727E0", "7D5C1D24", "EA6FADF1"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["moamen elgendy", "muhammed elsayed", "a k salama", "moustafa youssef", "abdelrahman asal", "moamen mokhtar", "ahmad mamdouh"], "keyword": ["cognitive radio networks", "emulation"], "paperid": "778F59AF", "author_id": ["760EFF0A", "7D536086", "7E6B8B11", "811255E6", "84A39F99", "84B5104C", "84F760FA"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ahmed helmy", "jeeyoung kim", "udayan kumar"], "keyword": ["mobile device"], "paperid": "77FCFD93", "author_id": ["750CD34C", "7FBFA6D5", "804C374D"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["shanhsiang shen", "aditya akella"], "keyword": ["video", "wireless networks", "networks", "network architectures"], "paperid": "7B6D31F8", "author_id": ["816097A8", "851BC34F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["fani tsapeli", "vassilis tsaoussidis", "nikolaos bezirgiannidis", "sotiris diamantopoulos"], "keyword": ["delay tolerant networking", "networks", "network protocols", "network layer protocols", "routing protocols"], "paperid": "7A5C853B", "author_id": ["00F43C8C", "79E41B1E", "7BF8430D", "7F33C1FF"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["shyamnath gollakota", "sidhant gupta", "qifan pu", "shwetak n patel"], "keyword": ["gesture recognition", "networks"], "paperid": "7FA23539", "author_id": ["7997DF6E", "7E68B661", "7E7BFF5E", "7ECBCF70"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["tristan henderson", "shantanu pal"], "keyword": ["cloud computing"], "paperid": "802CD27F", "author_id": ["7DB8985D", "806D528E"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["andreas f molisch", "dilip bethanabhotla", "hilmi e egilmez", "antonio ortega", "michael j neely", "joongheon kim", "feiyu meng", "peiyao chen", "giuseppe caire"], "keyword": ["android", "network protocols", "networks"], "paperid": "79C1D0BD", "author_id": ["271A7D58", "71C797B9", "76D1925F", "7E44A9EC", "7E65174D", "82848BA2", "849AD627", "849E71CE", "854866C8"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["lili qiu", "sangki yun", "daehyeok kim"], "keyword": ["ieee 802 11", "physical layer", "spectrum allocation", "networks"], "paperid": "7CAA472A", "author_id": ["7E7A2A0F", "8142FF2C", "850B9648"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["mario gerla", "markoliver stehr", "joshua joy", "yuting yu", "samuel wood", "james mathewson"], "keyword": ["network coding", "manet", "networks", "network architectures"], "paperid": "79AB3365", "author_id": ["21908EB6", "77236231", "7F4A816A", "7FE50506", "8081E0A5", "848B2B45"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["guang tan", "tian he", "song min kim", "yunhuai liu", "shuai wang"], "keyword": ["protocol", "wireless", "energy efficiency", "ieee 802 11", "broadcast"], "paperid": "78BFB170", "author_id": ["7F6B75DC", "80388B5E", "809EF459", "814CE4A0", "849B8458"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["nitin h vaidya", "ghazale hosseinabadi"], "keyword": [], "paperid": "79A66F32", "author_id": ["809310ED", "75D6B171"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["qifan pu", "wenjun hu", "hao gu"], "keyword": [], "paperid": "7A494AC3", "author_id": ["7E7BFF5E", "7F402939", "84C34BE5"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["emmanuel lochin", "jose radzik", "jerome lacan", "huyenchi bui", "nicolas kuhn"], "keyword": ["tcp", "networks", "local area networks"], "paperid": "7A695558", "author_id": ["0626841B", "736A7583", "7B539153", "7EEE17E8", "80C25C9B"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["thanasis korakis", "stratos keranidis", "leandros tassiulas", "iordanis koutsopoulos", "lieven hollevoet", "virgilios passas", "ingrid moerman", "wei liu", "kostas chounos"], "keyword": ["networks", "network protocols"], "paperid": "7F63BBDB", "author_id": ["0480F652", "0DE3FC7C", "0F6CB05B", "1A0284C1", "6009ACF8", "648FC242", "79BF2C6D", "7E91C29A", "84B4D40B"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["feng xia", "jie li", "li liu"], "keyword": ["swarm intelligence", "interest", "network protocols", "networks"], "paperid": "778695FF", "author_id": ["7D3CD169", "8601B363", "860EC920"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["yang panlong", "li xiangyang", "yan yubo", "zhang lan", "tao yue", "you lizhao"], "keyword": ["sensor networks", "mimo", "physical layer"], "paperid": "774C0702", "author_id": ["100E72CA", "6701C1BD", "84813A7F", "84CB3A88", "84D59AD0", "84FCEBBE"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["babak azimisadjadi", "justin yackoski", "yalin evren sagduyu", "ali namazi", "renato levy", "jason li", "alexey bogaevskiy"], "keyword": ["simulation", "network", "emulation", "frequency", "fpga", "radio"], "paperid": "7755905E", "author_id": ["74ACB82C", "77EC5A14", "7CA7E372", "80511E54", "80E66325", "814A4738", "84B8415C"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["don towsley", "matthew p johnson", "prithwish basu", "feng yu", "philippe nain", "amotz barnoy"], "keyword": ["approximation algorithms", "computation", "markov chains", "theory of computation", "probability and statistics", "stochastic processes"], "paperid": "77AD42C8", "author_id": ["7945B8D1", "7D949BF1", "7D963DAD", "7F32D097", "80D251C7", "852C9E88"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["thyagarajan nandagopal"], "keyword": ["broadcast", "multicast", "hardware", "networks"], "paperid": "7BD81AAA", "author_id": ["8488CE4D"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["fredrik bjurefors", "george theodoropoulos", "per gunningberg", "christian rohner", "paul smith", "merkourios karaliopoulos"], "keyword": ["communication systems", "resilience", "routing protocols", "network layer protocols", "network protocols", "networks"], "paperid": "813B1288", "author_id": ["0D27F0AD", "7BAD51D6", "7C3FD403", "7CE087C5", "7F74AEC5", "823B1811"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["suman banerjee", "tan zhang"], "keyword": [], "paperid": "7523F4D1", "author_id": ["7D2EDD6C", "811F4A71"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["dina katabi", "fadel adib", "ross a knepper", "daniela rus", "jue wang"], "keyword": ["optimization", "hardware", "networks"], "paperid": "7A1401B7", "author_id": ["0B9370B1", "7C51BD23", "8171AD7F", "84B776B0", "B1A260FD"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["henry tirri"], "keyword": ["health", "data", "cloud", "mobility", "location"], "paperid": "7B99F8DC", "author_id": ["7B87EB60"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["suman banerjee", "ashish patro", "srinivas govindan"], "keyword": ["deployment", "interference", "measurement", "network monitoring", "networks"], "paperid": "7B107250", "author_id": ["7D2EDD6C", "8163A602", "8503E452"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["robin kravets", "sumi helal", "ranveer chandra"], "keyword": [], "paperid": "85D26EEE", "author_id": ["7A1C4759", "7A537C58", "7EE4D969"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["heikki mahkonen", "tony jokikyyny", "teemu rintaaho", "jimmy kjallman", "tero kauppinen", "mohit sethi", "patrik salmela"], "keyword": ["machine to machine", "security", "internet of things", "cloud computing", "generic bootstrapping architecture"], "paperid": "7BCE0A84", "author_id": ["0DC43D90", "43087D70", "43A263F2", "779D1F0D", "8007AD09", "803C5782", "84D33464"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["rajesh mahindra", "mohammad a khojastepour", "jiasi chen", "mung chiang", "sampath rangarajan"], "keyword": ["cellular networks", "networks", "hardware"], "paperid": "76E5C92C", "author_id": ["712430F5", "7530D3B0", "7D9865D7", "7FC6A25D", "8168F2ED"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["adrian perrig", "yuehsun lin", "jonathan m mccune", "michael farb", "tiffany hyunjin kim"], "keyword": ["secure communication"], "paperid": "75B948DF", "author_id": ["278972A6", "7D4AA8A1", "7EA66F42", "7FD0A5A8", "80A847A3"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["christina fragouli", "katerina argyraki", "marios gatzianas", "suhas diggavi", "melissa duarte", "panagiotis kostopoulos"], "keyword": ["networks", "network security"], "paperid": "794DD03A", "author_id": ["0AE659CF", "123BAB28", "7AE73D66", "80FE0794", "8116EFA8", "84943720"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["kazuma kamienoo", "akira watanabe", "hidekazu suzuki", "katsuhiro naito", "tatsuya hirose"], "keyword": ["mobility", "android", "handover", "nat traversal"], "paperid": "78E0C22D", "author_id": ["0CCEE94D", "7D7BFA04", "7DD638C1", "7E35F45D", "84A79633"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["jie xiong", "kyle jamieson"], "keyword": ["wireless", "security", "network monitoring", "networks"], "paperid": "7595AEB5", "author_id": ["7FFEA43F", "80C0CD4C"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["flavio bonomi"], "keyword": ["multi homing", "network coding", "internet of things", "lisp", "distributed computing"], "paperid": "7748933A", "author_id": ["81188629"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["tamer nadeem", "mostafa uddin"], "keyword": ["localization", "mobility", "sensors", "principal component analysis", "inertial sensors", "estimation", "accuracy"], "paperid": "7967F359", "author_id": ["7AC7AF1E", "7E6FBBE3"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["krishna sekar"], "keyword": ["mobile devices", "thermal management"], "paperid": "7C290E8C", "author_id": ["86389F32"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["konstantina papagiannaki", "adriana iamnitchi", "rade stanojevic", "vijay erramilli", "jeremy blackburn"], "keyword": ["network effects"], "paperid": "7550E1B2", "author_id": ["676CB8AF", "75799B0D", "79B6D460", "7C66A77B", "7E237A4D"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["milind m buddhikot"], "keyword": ["networks"], "paperid": "775592A6", "author_id": ["852BD58F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["aaron striegel", "shu liu"], "keyword": ["bluetooth", "proximity", "wifi", "reliability", "availability"], "paperid": "7B196087", "author_id": ["1580DDF4", "56764EBC"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["lienwu chen", "pochun chou"], "keyword": ["network architectures", "networks"], "paperid": "77764FF4", "author_id": ["7E1AC741", "84B4C448"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["abderrahmen mtibaa", "afnan fahim", "khaled a harras"], "keyword": ["measurements"], "paperid": "76B1F24C", "author_id": ["7C12D742", "7D2D68BD", "85FB4A59"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ahmed helmy", "guliz seray tuncay", "giacomo benincasa"], "keyword": ["mobile computing"], "paperid": "816F1460", "author_id": ["750CD34C", "7D8409D4", "82E3AD1D"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["marwan fayed", "mahesh k marina", "luca boccassi"], "keyword": [], "paperid": "80AA8FAD", "author_id": ["7C589474", "7F7FAF70", "84C9067D"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["sebastian schildt", "lars wolf", "bjorn gernert"], "keyword": ["mobility", "routing protocols", "network layer protocols", "network protocols", "networks"], "paperid": "803671C4", "author_id": ["6C927DBE", "7DF7093A", "85019D75"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["scott burleigh"], "keyword": ["communication networks", "delay tolerant networking", "cost estimates", "cost analysis", "local area networks", "communication satellites"], "paperid": "7AB8C52B", "author_id": ["0EA46804"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["wai ho mow", "wenjian huang"], "keyword": ["encoder", "decoder"], "paperid": "7FBA31F0", "author_id": ["70409E9F", "7F4B2A6F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["christos efstratiou", "cecilia mascolo", "sarfraz nawaz"], "keyword": [], "paperid": "78C8A1CF", "author_id": ["0BD97CAC", "17223A48", "82C6A5DC"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["emmanuel lochin", "jon crowcroft", "arjuna sathiaseelan"], "keyword": [], "paperid": "5E7269BC", "author_id": ["0626841B", "7575972F", "82AE026C"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["teemu karkkainen", "jorg ott", "arseny kurnikov"], "keyword": ["networks", "network architectures", "network protocols"], "paperid": "7C936050", "author_id": ["77D26358", "78BDB00F", "848FDD17"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["you lu", "lungchih tung", "mario gerla", "wenyi cheng"], "keyword": ["social network"], "paperid": "784A604D", "author_id": ["7CEC4115", "7E5A90BF", "82268858", "84AC0E04"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["daniel philip venmani", "djamal zeghlache", "yvon gourhant"], "keyword": ["networks"], "paperid": "7CFE12E7", "author_id": ["125872B9", "1347E782", "2BDC68D9"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["srinivasan keshav"], "keyword": ["networks"], "paperid": "750DF7D4", "author_id": ["80E5C87A"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["bozidar radunovic", "kyuhan kim", "souvik sen", "jeongkeun lee"], "keyword": ["wireless", "networks"], "paperid": "7BCDB194", "author_id": ["31F1FDD4", "7ECA83E3", "81678915", "862678B7"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["carlo caini", "a damico", "m rodolfi"], "keyword": ["delay tolerant networking", "satellite communications", "network protocols", "networks"], "paperid": "78D29320", "author_id": ["6DA68062", "8497A05F", "850F4C06"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["xiangyang li", "qiuyuan huang", "cheng bo", "yu wang", "lan zhang"], "keyword": ["mobile device", "identification"], "paperid": "798578EA", "author_id": ["7DD9A433", "7FEC73B6", "80C80F08", "85452F8F", "8551CE45"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["wilhelm kleiminger", "paul baumann", "silvia santini"], "keyword": ["residence time"], "paperid": "7B77AAD4", "author_id": ["0433DC07", "77EDD51F", "7D6F985B"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ellen zegura", "mostafa ammar", "alireza monfared"], "keyword": ["networks", "network protocols"], "paperid": "7FA97952", "author_id": ["7B504DCB", "7F031230", "84DEA85B"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["marco gruteser"], "keyword": ["localization"], "paperid": "77E8ADF6", "author_id": ["23675588"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["jukka k nurminen", "matti siekkinen", "mohammad ashraful hoque"], "keyword": ["dash"], "paperid": "77E47199", "author_id": ["6ACD2E89", "768B6B72", "7F3A73DD"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["sotiriosangelos lenas", "vassilis tsaoussidis"], "keyword": ["delay tolerant networking", "network management", "networks"], "paperid": "7BA35BDF", "author_id": ["14179A49", "79E41B1E"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["ziling zhou", "haifeng yu", "binbin chen"], "keyword": ["two phase", "rfid", "counting", "networks", "hardware", "real time systems", "indexes", "optimization", "estimation", "protocols"], "paperid": "814B0C65", "author_id": ["7D178229", "7F735734", "817600F9"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["mohammad a khojastepour", "karthikeyan sundaresan", "xinyu zhang", "kang g shin", "sampath rangarajan"], "keyword": [], "paperid": "7E5BED5F", "author_id": ["7530D3B0", "78B0B4B5", "7F143EA1", "80C0034C", "8168F2ED"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["stephen dabideen", "r ramanathan"], "keyword": ["fan out", "routing", "multipath", "adaptive", "routing protocols", "network layer protocols", "network protocols", "networks"], "paperid": "75BFDF91", "author_id": ["0B10AE74", "7EFF78C7"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["taeho jung", "xiangyang li", "lan yao", "cheng bo", "xufei mao", "yue tao"], "keyword": ["localization"], "paperid": "7CB62538", "author_id": ["7D0AF3F6", "7DD9A433", "7F10D75E", "80C80F08", "81320DA9", "8474AE9A"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["tohru asami", "yuta morisawa", "yoshihiro kawahara"], "keyword": [], "paperid": "76B3D154", "author_id": ["7B801C89", "7D5D93A0", "8065E98B"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["samir r das", "ayon chakraborty", "milind m buddhikot"], "keyword": [], "paperid": "7A4EC8A2", "author_id": ["80814C18", "849368A2", "852BD58F"], "year": 2013}, {"conf_id": "42F4F2CC", "conf": "acm ieee international conference on mobile computing and networking", "author_name": ["theus hossmann", "andreea picu", "sacha trifunovic", "karin anna hummel"], "keyword": ["energy", "neighbor discovery", "bluetooth"], "paperid": "788641AA", "author_id": ["02D96C1F", "76EDA359", "7ECC3D7B", "8549A0D6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["haojin zhu", "xinping guan", "shuai li", "kai xing", "zhaoyu gao"], "keyword": ["cognitive radio", "spatial diversity", "radio spectrum", "entropy", "collaboration", "sensors", "silicon", "encryption"], "paperid": "79504924", "author_id": ["7E3D25F6", "7E507A47", "807F1A65", "8175BD5E", "85113D18"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["fan wu", "qianyi huang", "yixin tao"], "keyword": ["privacy", "cost accounting", "encryption", "data privacy", "interference", "resource management"], "paperid": "7A981A83", "author_id": ["7D07EAA6", "7DE2F4FF", "815B2246"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peng ning", "huaiyu dai", "xiaofan he", "wenbo shen"], "keyword": ["statistical inference", "wireless communication", "correlation", "vulnerability", "correlation attack", "security", "radio receivers", "wireless sensor networks", "cat"], "paperid": "7532FE84", "author_id": ["77172889", "7EC259FC", "7F663010", "80DE24F1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mohammad ali maddahali", "urs niesen"], "keyword": ["approximation algorithms", "encoding", "cache memory", "file servers", "servers", "memory management"], "paperid": "79893C44", "author_id": ["06EF497E", "0D44BA3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["john tadrous", "atilla eryilmaz", "hesham el gamal"], "keyword": ["linear programming", "probability", "resource allocation", "entropy", "service providers", "telecommunication services", "resource management", "pricing", "supply and demand", "wireless communication", "computer networks"], "paperid": "800838AB", "author_id": ["7A820009", "7DF20B35", "83F04099"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongli zhang", "lin ye", "jiantao shi", "xiaojiang du"], "keyword": ["indexes", "bandwidth", "system performance", "mathematical analysis", "bittorrent", "routing", "pollution", "system design", "cryptography", "optimization", "mathematical model", "internet", "computer network security", "toxicology"], "paperid": "7A7CE4F9", "author_id": ["7E23FC59", "7FE32D69", "80A22F55", "80DA9D0C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rui shi", "jie gao", "xianfeng gu", "mausumi goswami"], "keyword": ["harmonic analysis", "graph theory", "wireless sensor network", "network routing", "random walk", "traffic pattern", "markov chain", "brownian motion", "graph", "markov processes", "privacy"], "paperid": "80A0A980", "author_id": ["69126DFA", "76230F36", "7DF401BD", "83883F3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["negar kiyavash", "sachin kadloor"], "keyword": ["estimation theory", "time division multiple access", "privacy", "data privacy"], "paperid": "7FA38418", "author_id": ["03810C05", "4CCD87FB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["k j ray liu", "yan chen", "y yang", "chihyu wang", "chunxiao jiang"], "keyword": ["sensors", "games", "markov processes", "game theory", "cognitive radio", "bayesian learning", "markov decision process"], "paperid": "7A7D0CCC", "author_id": ["7D758AB1", "7D828245", "7ECA25B5", "804C3497", "807357DD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "c emre koksal", "zhoujia mao"], "keyword": ["uplink", "competitive ratio", "scheduling algorithms", "spread spectrum communication", "topology", "network topology"], "paperid": "7633EA4D", "author_id": ["7C52E731", "7E16770E", "7F6BB9E6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sajad shiralishahreza", "yashar ganjali", "soheil hassas yeganeh"], "keyword": ["security", "quality of service", "logic gates", "prototypes", "servers", "internet", "home automation"], "paperid": "7590DBD6", "author_id": ["13D0EF3C", "762C8390", "78205A43"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["noa zilberman", "yuval shavitt", "lior neudorfer"], "keyword": ["databases", "complex network", "internet traffic", "internet", "routing"], "paperid": "80FBE903", "author_id": ["737033A8", "7C8F4F08", "84DAB014"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["haojin zhu", "zhenfu cao", "muyuan li", "yao liu", "zhaoyu gao"], "keyword": ["databases", "privacy", "cognitive radio", "private information retrieval", "wireless communication", "protocols", "availability", "data privacy", "vectors"], "paperid": "752514BF", "author_id": ["7E3D25F6", "7FC94B6B", "7FE5AE13", "812F28BA", "85113D18"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["\u771f\u4e00", "\u5c71\u53e3"], "keyword": [], "paperid": "17994B7C", "author_id": ["7E8022EC", "810FFFCA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["nick duffield", "gene moo lee", "lili qiu", "jia wang", "yichao chen"], "keyword": ["noise", "cellular network", "principal component analysis", "scalability", "regression analysis", "measurement", "testing", "customer satisfaction"], "paperid": "75C59F1A", "author_id": ["78470629", "7CEBC465", "7E7A2A0F", "85972309", "862A6B3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gustavo de veciana", "vinay joseph"], "keyword": ["network controller", "nova", "resource allocation", "resource management", "tradeoffs", "optimization"], "paperid": "7899E420", "author_id": ["811F8051", "82E205F0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["francois baccelli", "bartlomiej blaszczyszyn", "chandramani singh"], "keyword": ["stochastic geometry", "transmitters", "stochastic processes", "optimization", "interference", "network topology", "geometry", "throughput", "adaptive control"], "paperid": "7C472E19", "author_id": ["03844107", "593AB9D7", "84A85EA0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yung yi", "youngmi jin", "joohyun lee", "song chong"], "keyword": ["economic incentives", "cellular networks", "mobile communication", "mobility", "economics", "pricing", "game theory", "stackelberg game", "games"], "paperid": "80BE45CA", "author_id": ["7CEEA7C0", "7CF6714D", "7DA77EED", "7FF986D1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mingyan liu", "yang liu"], "keyword": ["throughput", "wireless communication", "sensors", "switches"], "paperid": "7EFDB4F9", "author_id": ["7D3C37B5", "7D4728F0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["marwan krunz", "mohammad j abdelrahman", "hanif rahbari", "philippe nain"], "keyword": ["unicast", "computer network security", "wireless network", "ad hoc networks", "denial of service attack", "algorithm design and analysis", "protocols", "synchronization", "control channel", "robustness"], "paperid": "7B6B397E", "author_id": ["13D8B6A7", "7D5FEA92", "7EB9C892", "80D251C7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qiang zhai", "jin teng", "yuan f zheng", "junda zhu", "xinfeng li", "wei zhao", "dong xuan"], "keyword": ["wireless communication", "interference", "mobile computing", "visualization", "mobile communication"], "paperid": "7AC08DEC", "author_id": ["787F1047", "78DC5925", "7EC00AEF", "7ECF83C8", "7F42BF5F", "80166663", "84D39966"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ori rottenstreich", "yoram revah", "yuval cassuto", "tal mizrahi", "carmi arad", "isaac keslassy", "avinatan hassidim", "marat radan"], "keyword": ["random access", "system on chip", "data compression", "servers", "additives", "computer networks", "optimization", "bipartite graph", "dictionaries", "encoding", "graph theory"], "paperid": "7684C7AC", "author_id": ["0DD1047E", "396CEBD4", "7535A4B0", "7A8E3877", "833358E7", "84125B0D", "848B99C1", "84EBE8EF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["h derakhshi", "ahmad khonsari", "p mousavi", "h shafiei"], "keyword": ["privacy", "hidden markov models", "data privacy", "routing", "wireless sensor networks"], "paperid": "7A7BAAB1", "author_id": ["571D6C68", "79991465", "7D47BD1C", "85DCD0D4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michalis faloutsos", "yi wang", "hui zang"], "keyword": ["internet", "measurement", "telecommunications", "pattern recognition", "cultural differences", "pricing", "correlation"], "paperid": "80DB6E8B", "author_id": ["09F0BA79", "449B84E3", "860180D4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mark crovella", "brian eriksson", "larissa spinelli"], "keyword": ["internet topology", "internet", "learning artificial intelligence", "network interfaces", "feature extraction", "data mining", "transport protocols", "topology"], "paperid": "7EDB66C1", "author_id": ["05729C1A", "7FFC9E94", "84B94CEC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chengchen hu", "hao li"], "keyword": ["protocols", "np hard problem", "memory management", "throughput", "organizations", "mobile computing", "room", "internet", "network nodes", "mobile communication"], "paperid": "7F90B20E", "author_id": ["7E956D63", "81E6DB41"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["k j ray liu", "yan chen", "chihyu wang", "yang gao"], "keyword": ["statistical distribution", "optimization", "pricing", "integrated circuits", "ev"], "paperid": "786F7255", "author_id": ["7D758AB1", "7D828245", "804C3497", "84AB982B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chunsheng xin", "min song", "yanxiao zhao"], "keyword": ["throughput", "cognitive radio", "sensors", "innovation management", "switches", "spectrum efficiency", "markov processes"], "paperid": "77D54101", "author_id": ["7E65833C", "8076F23D", "81222B49"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hadas shachnai", "sivan albaglikim", "tami tamir"], "keyword": ["approximation algorithms", "image reconstruction", "color", "linear programming", "approximation theory", "job shop scheduling", "schedules", "servers"], "paperid": "7EA71E91", "author_id": ["05DB6624", "0CFD1E6F", "75962918"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["marco ajmone marsan", "balaji rengarajan", "shady ali", "gianluca rizzo"], "keyword": ["predictive models", "mobile computing", "probability density function", "mobile communications", "local search", "computational modeling"], "paperid": "7D497D2F", "author_id": ["766FF1C0", "768D04FB", "7D5FBA25", "85FA6684"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yihchun hu", "jerry t chiang"], "keyword": ["signal detection", "protocols", "detectors", "correlation", "matched filters", "signal to noise ratio", "feature extraction", "cognitive radio", "hermitian matrices"], "paperid": "7C99A617", "author_id": ["7FF8F6C5", "80DEC6C9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sunil kumar khatri", "khushboo bahri", "himanshu singhal"], "keyword": [], "paperid": "02A7F3B0", "author_id": ["7EDBF323", "8002553A", "8167AC26"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["karl aberer", "thanasis g papaioannou", "s n akshay uttama nambi", "debasis chakraborty"], "keyword": ["sustainable development", "hidden markov models", "fossil fuels", "accuracy", "power generators"], "paperid": "7E040504", "author_id": ["103019E2", "77F7B4C3", "7F27E0CC", "83F1FC19"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xin jin", "wenjie jiang", "minghua chen", "mung chiang", "ziyu shao"], "keyword": ["approximation algorithm", "virtual local area network", "combinatorial optimization", "upper bound", "convergence", "routing", "transport protocols", "quality of service", "resource allocation", "markov processes", "network topologies", "switches", "approximation theory", "local area networks", "load balancing", "algorithm design and analysis"], "paperid": "7EFF110C", "author_id": ["2060ABC5", "750E33AE", "7E248BC3", "7FC6A25D", "81590E92"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["leonard kleinrock", "rafael p laufer"], "keyword": ["radiation detectors", "wireless communication", "spread spectrum communication", "steady state", "statistical distributions", "carrier sense multiple access with collision avoidance", "transmitters", "throughput"], "paperid": "775DACAF", "author_id": ["0F1FE8A2", "28FE4C2C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jia liu", "hanif d sherali", "ness b shroff", "cathy h xia"], "keyword": ["hessian matrix", "convergence", "routing", "newton method", "wireless networks", "subgradient method", "vectors", "optimization", "interference"], "paperid": "78AE6D0B", "author_id": ["005A4B96", "04ED1760", "7C52E731", "856E91CC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["guido urdaneta", "johan pouwelse", "dick epema", "gunnar kreitz", "magnus isaksson", "boxun zhang", "javier ubillos"], "keyword": ["computer and information science", "switches", "mobile computing", "correlation", "music", "human computer interaction", "mobile communication"], "paperid": "7CC541B8", "author_id": ["75558B75", "757632F7", "7A7A4C3D", "7AF3298B", "7BFA8807", "7DA1D638", "8308E2D3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hansarno jacobsen", "kianoosh mokhtarian"], "keyword": ["approximation algorithms", "overlay networks", "algorithm design and analysis", "end to end delay", "routing"], "paperid": "792F259F", "author_id": ["7508BB84", "6F527306"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["\u6566\u53f2", "\u6d77\u91ce"], "keyword": [], "paperid": "2676FE3F", "author_id": ["7DB0D9DD", "7ECA51B5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ibrahim hokelek", "selcuk cevher", "mustafa ulutas"], "keyword": ["redundancy", "topology", "next generation networks", "mrt", "nickel", "mrc", "path length", "internet", "quality of service", "routing", "network topology", "routing protocols"], "paperid": "7D0E2B78", "author_id": ["753DFF36", "7AC246E9", "84D9F7C7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jiang xie", "haopeng li"], "keyword": ["internet", "wireless communication", "data packets", "gas", "manganese", "schedules", "directional antennas", "logic gates", "scheduling"], "paperid": "7BC44CF7", "author_id": ["7E229480", "7F6C95E4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["christian bettstetter", "evsen yanmaz", "robert kuschnig"], "keyword": ["wireless communication", "fading", "path loss", "throughput", "ad hoc networks", "dipole antennas", "remotely operated vehicles", "network performance"], "paperid": "78EBD459", "author_id": ["0AA12E30", "436BCA18", "7FDE5375"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["valentino pacifici", "gyo\u0308rgy dan"], "keyword": ["resource management", "telecommunications", "protocols", "nash equilibrium", "autonomous systems", "routing", "internet", "convergence"], "paperid": "7C3708E9", "author_id": ["7115C143", "7FFD6F96"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["romit roy choudhury", "kun tan", "injong rhee", "li erran li", "soung chang liew", "sungro yoon"], "keyword": ["mobile devices", "detectors", "compressed sensing", "noise measurement", "hardware", "algorithm design and analysis", "bandwidth", "noise", "broadband networks", "analog filters"], "paperid": "7C4662BA", "author_id": ["7DF9871A", "7F449570", "804EB92D", "80E3D08F", "80E914C0", "810C91C3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["stefan schmid", "yvonneanne pignolet", "gilles tredan"], "keyword": ["communication complexity", "network topology", "embedded systems", "graph theory", "virtualization", "computer network security", "resource allocation", "topology"], "paperid": "78F36448", "author_id": ["80B6AFF2", "83AD2BF8", "85F7A224"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["andreas ruttor", "sven wietholter", "manfred opper", "uwe bergemann", "adam wolisz"], "keyword": ["hetnet", "radio resource management", "interference", "estimation", "data models"], "paperid": "7623FE5E", "author_id": ["0B7C1B47", "24240B5F", "60CCFD62", "847A97E5", "851A6030"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bin cao", "rongxing lu", "xuemin shen", "xiaodong lin", "zhiguo shi"], "keyword": ["privacy", "data dissemination", "data privacy", "security", "nickel", "data packet", "manet", "incentive"], "paperid": "7B357796", "author_id": ["76D35C24", "7D98871A", "7EA9B3E8", "7EF517A4", "803AF79A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zartash afzal uzmi", "bilal khan", "ihsan ayyub qazi", "a mushtaq", "achmad munir", "m safdar iqbal", "saad n ismail"], "keyword": ["bandwidth", "protocols", "data centers", "application software", "throughput", "scheduling", "linux", "routing protocols", "social networks", "oscillators", "hardware", "transport protocols"], "paperid": "7C3213CD", "author_id": ["469CCEDE", "76529AEC", "78DD3259", "7904B5EF", "7DD03895", "7EFE7C9A", "80C26028"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rittwik jana", "y f r chen"], "keyword": ["wireless communication", "3g", "wireless networks", "bandwidth", "economic incentives", "pricing", "dynamic range", "cellular traffic", "network congestion", "qos", "service provider", "wifi", "lte"], "paperid": "810FEA70", "author_id": ["789A5290", "850F9572"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["haiying shen", "chenxi qiu", "sima soltani", "lei yu"], "keyword": ["fading", "wireless networks", "schedules", "heuristic algorithm", "np complete problem", "radio receivers", "broadcasting"], "paperid": "79679103", "author_id": ["7D856181", "7F09E719", "81FC8A51", "85DE1334"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["guanhong pei", "anil kumar s vullikanti"], "keyword": ["graph topology", "distributed algorithms", "silicon", "interference", "graph theory", "approximation algorithms", "broadcasting", "signal to noise ratio", "approximation theory", "scheduling", "computational modeling"], "paperid": "75C93B8E", "author_id": ["7C6DBCB3", "177A61BE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["george xylomenos", "christos tsilopoulos", "dirk trossen", "ben tagger", "charilaos stais", "george parisis", "yannis thomas"], "keyword": ["computer architecture", "communication models", "computer networks", "middleware", "prototypes", "media", "internet"], "paperid": "757BFF28", "author_id": ["119AB49D", "130DE0B2", "2A517562", "69C2A74A", "709F9D27", "78B7D188", "7E17FC6C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaodong lin", "dong xuan", "zhaoyang zhang", "honggang wang", "hua fang"], "keyword": ["accuracy", "sensors", "social networks", "real time systems", "genetic algorithm"], "paperid": "79A0B95F", "author_id": ["7EF517A4", "7F2FAC50", "7F70F65C", "807FF8E6", "813CC4D2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shahrzad shirazipourazad", "zahra derakhshandeh", "chenyang zhou", "arunabha sen"], "keyword": ["ofdm modulation", "np complete", "routing", "network topology", "approximation theory", "topology", "optical transport network", "resource management", "resource allocation", "approximation algorithms", "computational complexity", "binary tree"], "paperid": "797BD4A8", "author_id": ["12CAA6C7", "4A173155", "7D34E606", "7FCE4863"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongzi zhu", "yanmin zhu", "yuchen wu", "bo li"], "keyword": ["barium", "vehicular networks", "queueing theory", "ccr", "residual capacity", "global positioning system", "bandwidth"], "paperid": "80901E7E", "author_id": ["7CEC9798", "7EF7DEFA", "7F1974F8", "85A4DFF2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chuan wu", "hongxing li", "francis c m lau", "zongpeng li"], "keyword": ["optimization", "throughput", "routing", "protocols", "algorithm design and analysis", "optimal decision making", "unicast", "spectrum allocation", "cognitive radio"], "paperid": "7A8A9606", "author_id": ["7DBF5A93", "7E42AE0D", "7F44A7D2", "8003BACF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peter megyesi", "sandor molnar", "geza szabo"], "keyword": ["internet", "graphical user interfaces", "databases", "time measurement", "emulation"], "paperid": "75AECFD1", "author_id": ["79337D12", "7C8D204D", "7FAE7805"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["luca deri", "alfredo cardigliano", "francesco fusco"], "keyword": ["network adapter", "indexing", "band pass filters", "public domain software", "instruction sets", "packet capture", "matched filters", "storage area networks", "computer network security"], "paperid": "7EA4D2FC", "author_id": ["10078AAE", "7066F247", "8548568C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wenji chen", "yong guan", "yang liu"], "keyword": ["time series analysis", "radiation detectors", "merging", "nonparametric statistics", "pattern recognition"], "paperid": "77D70E0D", "author_id": ["7E83FBFB", "7E8502DC", "8578C401"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ulas c kozat", "guanfeng liang"], "keyword": ["resource sharing", "erasure coding", "resource allocation", "strips", "queueing", "cloud computing", "encoding", "throughput", "correlation"], "paperid": "7A077898", "author_id": ["79FF6E3A", "7D0550B5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["leana golubchik", "yuan yao", "kingshuk mukherjee", "samir khuller"], "keyword": ["internet", "cost accounting", "schedules", "vectors", "online algorithm", "servers", "bandwidth"], "paperid": "77957AC8", "author_id": ["0F8803D7", "684ED769", "79084795", "80BCCBF8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wenye wang", "lei sun"], "keyword": ["interference", "routing protocols", "network topology", "cognitive radio", "topology", "wireless networks", "blackholes", "lattices", "branching process", "network performance", "failure analysis"], "paperid": "7AE68EA5", "author_id": ["80545DA3", "83C01F0A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jean bolot", "arun sridharan"], "keyword": ["planning", "clustering algorithms", "pareto distribution", "network planning", "statistical distribution", "shape", "information extraction", "trajectory", "mobility models"], "paperid": "7A135BC0", "author_id": ["7881AD48", "85751C87"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ilenia tinnirello", "francesco gringoli", "domenico garlisi", "giuseppe bianchi", "fabrizio giuliano", "pierluigi gallo"], "keyword": ["wireless communication", "hardware", "bandwidth", "virtualization", "data packets", "virtual machines", "time division multiple access", "throughput"], "paperid": "08B744BA", "author_id": ["01102A4D", "057D1E48", "6571F50E", "7AAF60FA", "7C537C08", "807779F6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["brendan mumey", "ivan judson", "richard s wolff", "jian tang"], "keyword": ["wireless communication", "smart antennas", "approximation algorithm", "directional antennas", "greedy algorithms", "scheduling", "np hard", "computational complexity"], "paperid": "784578C4", "author_id": ["0170B0D3", "7EF09EEA", "8045D735", "830790C1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alain tcheukam siwe", "ugo montanari"], "keyword": ["power generation", "planning", "marketing", "distributed environment", "learning artificial intelligence", "software agents", "electricity", "multi agent systems"], "paperid": "7F9503E2", "author_id": ["06B86E4F", "756EF942"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["richard southwell", "jianwei huang", "xu chen"], "keyword": ["integrated circuits", "interference", "quality of service", "games", "nash equilibrium", "wireless communication", "wireless networks", "game theory"], "paperid": "7A9B113B", "author_id": ["7C7EEB0F", "7E9A2A72", "7F5805D5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["laurent decreusefond", "anais vergne", "pedro martins"], "keyword": ["topology", "wireless sensor networks", "game theory", "sensors", "nash equilibrium", "network topology", "algebraic topology", "homology", "face", "indexes"], "paperid": "79AAD010", "author_id": ["008C096D", "793D5753", "80C55920"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xinyu zhang", "kang g shin"], "keyword": ["modulation", "radio transmitters", "protocols", "wireless networks", "radio receivers", "signal to noise ratio", "software radio", "wifi"], "paperid": "77D52489", "author_id": ["7F143EA1", "80C0034C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["victor o k li", "kacheong leung", "chengdi lai"], "keyword": ["bandwidth allocation", "transport protocols", "network topology", "systematics", "tcp", "bandwidth", "robustness", "routing", "internet"], "paperid": "7F30E181", "author_id": ["2AFD21EF", "803B466F", "84EADB3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lin cai", "lei zhang", "jianping pan"], "keyword": ["wireless ad hoc network", "silicon", "lattice theory", "mobile ad hoc network", "probability", "percolation", "percolation theory", "connectivity", "vehicular ad hoc network", "directed percolation"], "paperid": "762F3BF4", "author_id": ["7D5C3E93", "7E022BA6", "7EE58D74"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["pavlos sermpezis", "thrasyvoulos spyropoulos"], "keyword": ["heterogeneous network", "accuracy", "random variables", "complex network", "social networks", "graph theory", "diffusion process"], "paperid": "7ECDA6A9", "author_id": ["14BD857C", "850493DB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ramana rao kompella", "advait dixit", "pawan prakash", "y charlie hu"], "keyword": ["queueing theory", "topology", "throughput", "kernel", "network topology", "bandwidth", "tcp congestion control", "servers", "transport protocols"], "paperid": "7F18A17C", "author_id": ["0DA6F0BE", "77306147", "7DC61474", "7F7E0808"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ali tizghadam", "alberto leongarcia", "hassan naser", "ali shariat"], "keyword": ["convex programming", "end to end delay", "optimization", "resource allocation", "interference", "round trip time", "robustness", "sinr", "quality of service", "wireless networks", "graph theory", "resistance distance"], "paperid": "7CEECA34", "author_id": ["1347E166", "2533C7D7", "7B80E134", "84AE178E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie wu", "mingjun xiao", "cong liu", "liusheng huang"], "keyword": ["routing", "nickel", "exponential distribution", "probabilistic logic", "utility", "probability density function"], "paperid": "7A10B0E0", "author_id": ["7D59933A", "7EE81F7C", "7EFB2295", "811F3D3C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaojiang chen", "lin cai", "tianzhang xing", "dingyi fang", "zhe yang", "ju wang"], "keyword": ["rss", "accuracy", "gaussian distribution", "compressive sensing", "wildlife", "sensor networks", "sensors", "vectors"], "paperid": "7683CC47", "author_id": ["7D09F4ED", "7D5C3E93", "7E284E81", "810FBFA7", "811B4635", "84556B16"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chuan wu", "jian zhao", "xiaojun lin", "can zhao"], "keyword": ["decentralized control", "computational complexity", "servers", "robustness", "availability", "algorithm design and analysis"], "paperid": "7FFFEF8C", "author_id": ["7DBF5A93", "7DC68B01", "7DD9C61E", "7FC3D45B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mo li", "zhenjiang li", "yuanqing zheng"], "keyword": ["synchronization", "lighting", "mobile computing", "global positioning system"], "paperid": "78C9B091", "author_id": ["7DDED2F4", "8144E8F6", "8172A2DD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rahul vaze"], "keyword": ["optimization", "indexes", "algorithm design and analysis", "energy harvesting", "communication systems", "minimisation", "upper bound"], "paperid": "7BC771C3", "author_id": ["719FC5EE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xin luo", "hamidou tembine"], "keyword": ["game theory", "access control", "stability analysis", "vectors", "convergence", "evolutionary dynamics", "games", "evolutionary computation", "resource management"], "paperid": "785DB451", "author_id": ["9697A9ED", "0E463B1E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["florin ciucu", "adam wierman", "minghong lin", "chuang lin", "kai wang"], "keyword": ["statistical analysis", "optimization", "stochastic processes", "servers", "data models", "switches", "stochastic programming", "modeling and simulation"], "paperid": "79FD9C57", "author_id": ["06DD00C6", "5423686E", "7E988336", "7EB98F1E", "7F7F4675"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["taeho jung", "xiangyang li"], "keyword": ["iron", "personal privacy", "location based service", "access control", "encryption", "protocols"], "paperid": "7F072FF4", "author_id": ["7D0AF3F6", "7DD9A433"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["longfei shangguan", "zimu zhou", "chenshu wu", "yunhao liu", "zheng yang"], "keyword": ["feature extraction", "histograms", "computer architecture", "azimuth", "human computer interaction", "wireless communication"], "paperid": "81111B5E", "author_id": ["7C63373E", "7D432320", "7DBC2160", "7F046EF7", "7F675402"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["christina fragouli", "melissa duarte gelvez", "siddhartha brahma", "ayan sengupta", "i hsiang wang", "suhas diggavi"], "keyword": ["ofdm", "wireless connection", "decoding", "physical layer", "vectors"], "paperid": "7A2BA433", "author_id": ["0AE659CF", "6DF13250", "795DB198", "7E20DBF8", "8020AD21", "80FE0794"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zwi altman", "eitan altman", "richard combes"], "keyword": ["convergence", "fading", "wireless networks", "traffic engineering", "queuing theory", "optimization", "interference", "stochastic approximation", "stability", "numerical analysis", "global optimum", "quality of service", "self organizing networks", "load balancing", "local optima", "niobium"], "paperid": "7F50864A", "author_id": ["75AE0C81", "7D7B9DD9", "806125BD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carlo borgiattino", "francesco malandrino", "c f chiasserini", "marco fiore", "roberto sadao yokoyama", "claudio casetti"], "keyword": ["radiation detectors", "asymmetric cryptography", "protocols", "cryptography", "cars", "privacy", "vehicular networks"], "paperid": "7F2D45B6", "author_id": ["0A166987", "507EEBFB", "7A094616", "7B43DD13", "7B7328C3", "7C9A93C1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["niall richard murphy", "david malone", "darren f kavanagh"], "keyword": ["history", "led", "security", "access control", "algorithm design and analysis", "cryptography", "femtocell"], "paperid": "815BC519", "author_id": ["7EF1DFA2", "7FFC7082", "8506D066"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carlee joewong", "soumya sen", "sangtae ha"], "keyword": [], "paperid": "836E2295", "author_id": ["14690F07", "80130CAD", "80DC67C7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["taeho jung", "xiangyang li", "shaojie tang", "wei gong", "xufei mao", "lan zhang"], "keyword": ["communication channels", "secure channel", "computational complexity", "smc", "data privacy", "homomorphic", "privacy", "polynomials", "protocols", "aggregation", "cryptography", "computational modeling"], "paperid": "795D7C8E", "author_id": ["7D0AF3F6", "7DD9A433", "7E282E35", "811826BD", "81320DA9", "8551CE45"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["patrick senac", "anhdung nguyen", "m diaz"], "keyword": ["navigation", "routing", "graphs", "network performance", "graph theory"], "paperid": "80DBF312", "author_id": ["6D2B4DCF", "7E837888", "7FE5B1C8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peter romirermaierhofer", "arian bar", "antonio paciello"], "keyword": ["clustering algorithms", "ddos attacks", "servers", "internet", "algorithm design and analysis", "computer network security", "graph theory"], "paperid": "7E3CBCFE", "author_id": ["0743BBEB", "80C90EC5", "84DED86E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hao huang", "ziguo zhong", "tian he", "songmin kim", "jihoon yun"], "keyword": ["psr", "calibration", "clock drift", "energy efficiency", "schedules", "estimation", "synchronization", "wireless networks"], "paperid": "75287B7E", "author_id": ["4FECE7EE", "7A5B47E4", "80388B5E", "84AC3CF9", "863DB8C1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["haojin zhu", "yang wang", "xi chen", "zhiguo wan", "liusheng huang", "kai xing", "pengfei hu"], "keyword": ["wireless sensor networks", "data analysis", "sensors", "privacy", "regression analysis", "data privacy", "data acquisition", "data models", "computational modeling", "data cluster"], "paperid": "7661D8B3", "author_id": ["7E3D25F6", "7FF1B615", "8087E6A4", "80F25D10", "811F3D3C", "8175BD5E", "84C6221C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["takayuki osogami", "hiroki yanagisawa", "rudy raymond"], "keyword": ["vm", "mixed integer programming", "cloud computing", "dynamic programming", "maintenance engineering", "servers", "fault tolerance", "resource management", "finance"], "paperid": "75B634DC", "author_id": ["10E67DDC", "7E3421B5", "84899B43"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["minas gjoka", "carter t butts", "emily j smith"], "keyword": ["probability", "statistical analysis", "complete graph", "topology", "graph theory", "social network analysis", "sociology", "communication networks", "labeling", "estimation"], "paperid": "77A10E32", "author_id": ["16103EFA", "75383056", "81236E4F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["heejun roh", "cheoulhoon jung", "dingzhu du", "wonjun lee"], "keyword": ["games", "game theory", "payment", "application service provider", "distributed databases", "heterogeneity", "cloud computing", "pricing", "optimization", "quality of service", "resource allocation"], "paperid": "79287860", "author_id": ["7DA64792", "8007DD11", "8154EB28", "8352FEEE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jean walrand", "longbo huang"], "keyword": ["routing", "optical switches", "packet switching", "servers", "resource management", "queueing theory", "algorithm design and analysis", "scheduling algorithms"], "paperid": "7921C287", "author_id": ["138CFD6A", "7D270C61"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alexander skopalik", "tobias harks", "kevin schewior", "martin hoefer"], "keyword": ["stability", "bandwidth", "price of anarchy", "nash equilibria", "routing", "congestion control", "games", "resource management", "bandwidth allocation", "polynomials", "protocols", "computational complexity", "silicon", "game theory"], "paperid": "78E7E12F", "author_id": ["081B633A", "0F511719", "4818CA93", "7C1D7CE0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hanif d sherali", "liguang xie", "y thomas hou", "yi shi", "scott f midkiff", "wenjing lou"], "keyword": ["wireless sensor networks", "routing", "base stations", "mathematical model", "mobile communication", "wireless communication", "minimisation"], "paperid": "75E2AC0B", "author_id": ["04ED1760", "7D49E3E4", "7F981600", "806DCDA9", "8105290F", "81640989"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["cuong vu", "mehdi malboubi", "chennee chuah", "parmanand sharma"], "keyword": ["accuracy", "robustness", "internet", "clustering algorithms", "estimation", "algorithm design and analysis", "tomography"], "paperid": "772E114E", "author_id": ["812A4DC5", "81765CD9", "821A2BEE", "8293CA5E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gerhard hasslinger", "franz hartleb", "anne m schwahn"], "keyword": ["internet", "autocorrelation", "mathematical model", "markov processes", "fitting", "time measurement", "transport protocols"], "paperid": "77FFED9C", "author_id": ["000C59A9", "134EA6BD", "7AF1D150"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alexander l stolyar", "anwar walid", "yang guo"], "keyword": ["virtual machines", "steady state", "vectors", "optimization problem", "convex programming", "resource allocation", "algorithm design and analysis", "resource management", "data centers", "routing", "cloud computing", "servers", "virtualisation", "computational modeling"], "paperid": "76070453", "author_id": ["089360D7", "7D666377", "7F55FC0A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yung yi", "youngmi jin", "jinwoo shin", "jungseul ok"], "keyword": ["games", "convergence", "communication networks", "game theory", "innovation management", "nickel", "convergence rate", "social networks"], "paperid": "815792B3", "author_id": ["7CEEA7C0", "7CF6714D", "7FCFBA59", "8109A9D1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yanjiao chen", "jianwei huang", "lingjie duan", "qian zhang"], "keyword": ["spectrum allocation", "social welfare", "wireless communication", "games", "revenue", "pricing", "resource management", "economics"], "paperid": "79A94EFF", "author_id": ["7DD7DE30", "7E9A2A72", "7FEE246E", "80240ADD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["marco di francesco", "sk kajal arefin imon", "sajal k das", "ajmal khan"], "keyword": ["time complexity", "switches", "energy budget", "sensor networks", "randomized algorithm", "oscillators", "load balancing", "data collection"], "paperid": "75B2425F", "author_id": ["75836196", "765AF5A9", "7D405383", "81118136"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiali hei", "shan lin", "xiaojiang du", "insup lee"], "keyword": ["health care", "insulin", "wireless communication", "access control", "wireless sensor networks", "regression analysis", "diabetes", "learning artificial intelligence"], "paperid": "762C78F3", "author_id": ["77693842", "7D0676B7", "80DA9D0C", "813D0A4D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["scott f midkiff", "sastry kompella", "huacheng zeng", "y thomas hou", "yi shi", "wenjing lou"], "keyword": ["receiver", "interference", "integrated circuits", "spread spectrum communication", "mimo", "transmitters", "network throughput", "radio receivers", "vectors", "information theory"], "paperid": "7521EE2B", "author_id": ["6830849E", "751D0EBD", "7D135ECC", "7F981600", "806DCDA9", "81640989"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jin tang", "yu cheng"], "keyword": ["markov chain", "markov processes", "mathematical model", "probability", "protocols", "iterative methods", "detectors", "markov decision process"], "paperid": "7746F57C", "author_id": ["7508D4C7", "7E0D0C66"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sun sun", "min dong", "ben liang"], "keyword": ["greedy algorithms", "energy states", "degradation", "statistical analysis", "real time systems", "resource management"], "paperid": "7EF6B3E4", "author_id": ["7E70CC14", "8149F664", "85F65248"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ting ning", "zhu han", "zhipeng yang", "hongyi wu"], "keyword": ["mobile computing", "games", "game theory"], "paperid": "78D133D0", "author_id": ["7D3561C4", "7E1FB9D3", "7F2E53B3", "808AA8DF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hong xu", "baochun li"], "keyword": ["accuracy", "cloud computing", "algorithm design and analysis", "distributed algorithms", "web services", "servers", "bandwidth", "optimization", "routing", "electricity"], "paperid": "78C93A90", "author_id": ["7E778E7A", "7F13CFD4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["athina markopoulou", "minas gjoka", "venkata s k pulla", "chandra s jammi", "prashant tiwari"], "keyword": ["crowdsourcing", "search engines", "mobile computing", "knowledge discovery", "question answering system", "humanoid robots", "servers", "graph theory", "outsourcing"], "paperid": "78DECA68", "author_id": ["0F972B34", "16103EFA", "84952197", "84DB8E34", "85368E1B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei shi", "shuo zhang", "yunhao liu", "yi liang", "yang wang", "tianbo gu", "liusheng huang", "kai xing", "pengfei hu", "zhengang zhao"], "keyword": ["vehicular networks", "system design", "reliability", "mobile communication", "packet loss", "wireless communication", "rural areas", "software design", "ad hoc networks"], "paperid": "7BB3E813", "author_id": ["7D1A3F69", "7DA8161D", "7F046EF7", "7F34C5C3", "7FF1B615", "806D77CE", "811F3D3C", "8175BD5E", "84C6221C", "84DD77E4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["murali kodialam", "ali khanafer", "krishna p n puttaswamy"], "keyword": ["snow", "algorithm design and analysis", "cpu", "pricing", "optimization", "randomized algorithms", "web application", "csp", "game theory", "games", "cloud computing"], "paperid": "7F1AA234", "author_id": ["01870B8B", "71478B06", "78B2289D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["edward j coyle", "seksan laitrakun"], "keyword": ["random variables", "sensor fusion", "frequency modulation", "reliability", "signal detection", "dep", "sensors", "wireless sensor network", "protocols", "throughput", "decision theory"], "paperid": "79E83A40", "author_id": ["86395DCE", "05BA82A7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei rao", "xingshe zhou", "xue liu", "yuan yao"], "keyword": ["deviation", "mean", "probability distribution", "markov processes", "emergencies", "radio broadcasting", "protocols", "numerical analysis", "quality of service", "next generation networks", "emergency management", "exponential distribution", "vanet"], "paperid": "7BFFFA03", "author_id": ["7E24DEED", "7E8A6D47", "7F339A86", "8058501E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michalis faloutsos", "yi wang", "hui zang"], "keyword": ["regression analysis", "correlation", "age group", "accuracy", "communication networks", "call graph", "prediction algorithms", "graph theory", "mobile computing", "linear regression", "graphs", "demography"], "paperid": "81175DE8", "author_id": ["09F0BA79", "449B84E3", "761BE03C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yu hua", "bin xiao", "xue liu"], "keyword": ["computational complexity", "resource allocation", "artificial neural networks", "nest", "cloud computing", "hash tables", "quality of service", "vectors", "servers"], "paperid": "7A52554E", "author_id": ["77DDC5D2", "7A740EAC", "7F339A86"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lingjun li", "guoliang xue", "xinxin zhao"], "keyword": ["cryptography", "computational overhead", "servers", "data privacy", "random oracle model", "protocols", "indexes", "encryption", "privacy"], "paperid": "7C61B504", "author_id": ["7FDFBE60", "7FF1EEA7", "8418CEEA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mihaela van der schaar", "shaolei ren"], "keyword": ["pricing", "dynamic scheduling", "profitability", "data center", "servers", "stochastic processes", "electricity", "cloud computing", "queueing theory"], "paperid": "75EB20C1", "author_id": ["29E49436", "7D758B29"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ahmed helmy", "pan hui", "gautam s thakur"], "keyword": ["gamma distribution", "internet", "car to car communication", "image analysis", "statistical distributions", "data models", "ad hoc networks", "time series", "algorithms", "log logistic distribution", "metropolitan areas", "heavy tail distribution", "next generation networks", "weibull distribution", "goodness of fit test", "kernel", "traffic pattern"], "paperid": "7EA11B99", "author_id": ["750CD34C", "7D33EF8B", "80D08A56"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongyu gao", "jin cao", "li erran li", "bruce friedman"], "keyword": ["graph theory", "geographic location", "logistics", "statistical analysis"], "paperid": "77510102", "author_id": ["7E01A353", "809DF556", "80E3D08F", "80F19E5B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zheng zeng", "p r kumar", "xue liu", "van gao"], "keyword": ["intermittency", "wind power", "correlation", "ghg emissions", "coefficient of variation", "renewable energy", "servers"], "paperid": "76D72778", "author_id": ["78EDF9CF", "7EABCECD", "7F339A86", "84B3810D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["anthony ephremides", "jeffrey e wieselthier", "sastry kompella", "gam d nguyen", "clement kam"], "keyword": ["numerical stability", "cognitive radio", "throughput", "queueing theory", "unicast", "secondary source", "markov processes", "stability analysis"], "paperid": "77A7314D", "author_id": ["10C79F59", "13D4EB4E", "751D0EBD", "7DE05EC6", "7F6C0910"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["konstantinos poularakis", "leandros tassiulas"], "keyword": ["investment", "games", "competitive market", "nash equilibrium", "electronic data interchange", "vectors", "np complete", "computational complexity", "game theory", "information retrieval", "decision model", "marketing", "competitive intelligence", "information industry", "ict", "heuristic algorithm", "linear programming"], "paperid": "7E1D3073", "author_id": ["0186C8AE", "0F6CB05B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["paul cuff", "pan hui", "shang shang", "santosh kulkarni"], "keyword": ["markov processes", "gossip", "upper bound", "convergence", "graph topology", "algorithm design and analysis", "network analysis", "random walks", "simulation", "graph theory"], "paperid": "79381F7A", "author_id": ["6153E87A", "7D33EF8B", "810172D8", "853E3576"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zhili chen", "miaomiao tian", "wei yang", "haibo miao", "liusheng huang", "fei wang", "lu li"], "keyword": ["cryptography", "privacy", "cost accounting", "algorithm design and analysis", "data privacy", "zinc", "protocols"], "paperid": "7724E617", "author_id": ["7D145500", "7D6A984C", "7DD02E76", "7F97E193", "811F3D3C", "83733462", "8610B9E9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["malolan chetlur", "shivkumar kalyanaraman", "hemant kowshik", "p k dutta"], "keyword": ["wireless networks", "scheduling", "mobile communication", "wireless communication"], "paperid": "77047390", "author_id": ["0549CF92", "755E66E0", "77591E69", "7E3F8DAA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tarek abdelzaher", "pan hui", "shiguang wang", "shaohan hu", "zhiheng xie", "hengchang liu", "wei zheng"], "keyword": ["mobile communication", "sensors", "data generation", "environmental changes", "wireless communication", "heuristic algorithm"], "paperid": "7ADC487A", "author_id": ["756C154A", "7D33EF8B", "7EAB2285", "80C08660", "817AEDA3", "83397B00", "A5C17C95"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jiangchuan liu", "haitao li", "xu cheng"], "keyword": ["china", "market research", "vegetation"], "paperid": "75B3B87F", "author_id": ["7D1FE4C6", "7F92617C", "7F94261A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["longfei shangguan", "zhenjiang li", "mo li", "yunhao liu", "zheng yang"], "keyword": ["protocols", "probability", "market research", "correlation", "accuracy"], "paperid": "7C38AC6E", "author_id": ["7C63373E", "7D47A4E6", "7DDED2F4", "7F046EF7", "7F675402"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ori rottenstreich", "ely porat", "haim kaplan", "avinatan hassidim", "isaac keslassy"], "keyword": ["packet header", "encoding", "indexes", "telecommunication equipment", "computer networks", "closed form formula"], "paperid": "7B4DE68A", "author_id": ["0DD1047E", "758A396F", "80A33DB7", "848B99C1", "8546DE48"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jorg liebeherr", "hussein alzubaidy", "almut burchard"], "keyword": ["markov processes", "statistical analysis", "fading", "signal to noise ratio", "algebra", "servers", "statistical models", "calculus"], "paperid": "8061679F", "author_id": ["5150AF5C", "7D445677", "807B8BD4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["h t kung", "youngjune gwon"], "keyword": ["decoding", "software defined radio", "bandwidth", "mathematical analysis", "wireless network", "fft", "compressed sensing", "minimisation", "base stations"], "paperid": "80BA40F1", "author_id": ["7FB8889A", "76A95128"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["stefan joerer", "ozan k tonguz", "michele segata", "christoph sommer", "falko dressler", "renate lo cigno"], "keyword": ["vehicle dynamics", "shadow mapping", "protocols", "mobile communication", "mobile computing", "radio broadcasting", "vehicular ad hoc network"], "paperid": "7F9BD972", "author_id": ["08BA2ED9", "28CFA84F", "6B09794C", "7B721263", "7FDCF3E6", "850AF03E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["nicolo michelusi", "michele zorzi", "luca corradini", "leonardo badia", "raffaele carli"], "keyword": ["markov processes", "qos", "degradation", "markov chains", "energy harvesting", "wireless sensor networks", "wireless communication"], "paperid": "79C9408B", "author_id": ["64E2F3CC", "75C29F98", "7B1065BC", "7E06F9A8", "80443935"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ning ding", "yang yang", "su xia", "miao jin", "hongyi wu"], "keyword": ["shape", "distributed algorithms", "computational modeling", "navigation", "radionavigation", "noise", "computational complexity", "routing", "wireless sensor networks"], "paperid": "7A353AB2", "author_id": ["0B454D0D", "3DAE97B4", "7B8FBEDB", "7FE34476", "808AA8DF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["anastasios giannoulis", "edward w knightly", "paul patras"], "keyword": ["spectrum", "interference", "wireless networks", "network design", "mobile communication", "mobile computing", "ap"], "paperid": "75CD9AB2", "author_id": ["732AEA1E", "7AF223B8", "7CB8BA3D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["k j ray liu", "yan chen", "chihyu wang", "hungyu wei"], "keyword": ["resource management", "pricing", "games", "iterative methods", "wireless network", "markov processes", "game theory"], "paperid": "75D03C2C", "author_id": ["7D758AB1", "7D828245", "804C3497", "80D05435"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["florian wamser", "phuoc trangia", "david hock", "thomas zinner", "michael seufert"], "keyword": ["resource management", "logic gates", "internet"], "paperid": "7618D208", "author_id": ["120CA9CE", "29D83936", "70CD9E20", "771F11E2", "7FF17413"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["elisha j rosensweig", "jim kurose"], "keyword": ["computational modeling", "calculus", "queueing theory", "network topology", "topology", "writing", "protocols", "computer architecture"], "paperid": "77EC1CEF", "author_id": ["17D13BE8", "5F653421"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["thorsten strufe", "stefanie roos"], "keyword": ["topology", "network topology", "privacy", "routing"], "paperid": "794143CD", "author_id": ["06D00704", "805768F0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["pierdomenico fiadino", "arian bar", "pedro casas"], "keyword": ["web services", "pattern matching", "transport protocols", "internet", "optimization"], "paperid": "78CC4A13", "author_id": ["7B371275", "80C90EC5", "811A71CD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bin xiao", "qingjun xiao", "shigang chen"], "keyword": ["accuracy", "sociology", "protocols", "statistics"], "paperid": "792C5631", "author_id": ["7A740EAC", "7D61E313", "806F1558"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["heejun roh", "sinjae lee", "dingzhu du", "wonjun lee", "chenglong shao"], "keyword": ["signal to noise ratio", "games", "bandwidth", "computer science", "cognitive radio", "game theory"], "paperid": "78F3E069", "author_id": ["7DA64792", "7F13742F", "8154EB28", "8352FEEE", "8503B7DC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "changhee joo", "bo ji"], "keyword": ["queueing theory", "schedules", "scheduling algorithms", "stability", "dynamic scheduling", "throughput", "routing"], "paperid": "79CE216E", "author_id": ["7C52E731", "83F19F37", "84FC6F18"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["murali kodialam", "t v lakshman", "sankalp agarwal"], "keyword": ["routing", "software defined networking", "approximation theory", "network interfaces", "optimization", "computer networks", "data centers", "traffic engineering"], "paperid": "7B57D677", "author_id": ["01870B8B", "790E800C", "7D057DAB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yuval elovici", "asaf shabtai", "lena tenenboimchekina", "bracha shapira", "lior rokach", "dudu mimran", "o barad"], "keyword": ["traffic pattern", "mobile communication", "learning artificial intelligence", "humanoid robots", "mobile devices", "payloads", "mobile computing"], "paperid": "77002459", "author_id": ["10F24683", "5A3F8FB9", "5FF5983E", "75387006", "75F9D854", "76025916", "7B1C4FD1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yu wu", "hongbo jiang", "chen tian", "chonggang wang", "guang tang", "tianlong yu"], "keyword": ["topology", "indexes", "network topology", "measurement", "routing", "graph theory", "set theory", "strips", "wireless sensor networks", "morse theory"], "paperid": "76A33429", "author_id": ["7DBC9BC0", "7E1B4E11", "7E6F10AF", "7FF1212D", "84DEFC98", "84EBB55D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hagen woesner", "l bergesio", "matteo gerola", "elio salvadori", "marc sune", "r doriguzzi corin", "r riggio f de pellegrini", "t rothe"], "keyword": ["software defined networking", "network topology", "virtualization", "topology", "computer architecture"], "paperid": "7B88D5A1", "author_id": ["2A101A31", "7799D384", "79908166", "7A6909CF", "80BC0F3C", "84886545", "851FA0DE", "85777FD0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gustavo de veciana", "zheng lu"], "keyword": ["optimization", "wireless communication", "wireless networks", "public transportation", "mobile communication", "servers", "schedules"], "paperid": "77729B17", "author_id": ["811F8051", "3784B78D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yuanyao shih", "aichun pang", "chienhan chai"], "keyword": ["interference", "cellular networks", "access control", "nash equilibrium", "games", "femtocell", "telecommunication services", "game theory", "signal to noise ratio"], "paperid": "7C33B4F8", "author_id": ["7F74AFDF", "7F7CC1B2", "84C1073A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hao yue", "linke guo", "chi zhang", "yuguang fang"], "keyword": ["privacy", "mobile communication", "mobile computing", "encryption", "social behaviors", "protocols", "routing", "cryptography"], "paperid": "79A204EE", "author_id": ["7F418CE3", "7FB8B860", "7FDB6840", "808745B0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie gao", "dengpan zhou", "wei zeng", "david xianfeng gu", "siming li"], "keyword": ["mobile communication", "sensors", "routing", "conformal mapping", "mobile computing", "wireless sensor networks", "graph theory"], "paperid": "77AF3E95", "author_id": ["76230F36", "7CFD2A7F", "7D8C0DC8", "84ECCAB0", "84FCE0A6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mehmet c vuran", "xin dong"], "keyword": ["wireless sensor networks", "soil moisture", "topology", "lattices"], "paperid": "811EB758", "author_id": ["77EEF02A", "7F25B402"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mingwei xu", "meng chen", "qing li"], "keyword": ["routing", "internet", "forwarding information base", "network topology", "topology"], "paperid": "757391F7", "author_id": ["7D353057", "82B74E7A", "852F6DCE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michele garetto", "delia ciullo", "emilio leonardi", "valentina martina"], "keyword": ["servers", "upper bound", "stochastic models", "bandwidth", "random variables"], "paperid": "7DAEA537", "author_id": ["061E6BE8", "7BFC814C", "7DF3884C", "7FA418F7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["douglas cochran", "junshan zhang", "xiaowen gong"], "keyword": ["clutter", "doppler effect", "radio waves", "snr", "sensors", "silicon", "rf energy"], "paperid": "76976A1E", "author_id": ["7DABE4E8", "7DAFD36E", "7E6FC61F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie wu", "chunsheng xin", "ying dai"], "keyword": ["cognitive radio networks", "availability", "self organization", "organizations", "global positioning system", "wireless networks", "routing"], "paperid": "81085601", "author_id": ["7D59933A", "7E65833C", "805516A2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carlee joewong", "sangtae ha", "satyaki sen"], "keyword": ["cost accounting", "pricing", "degradation", "economics", "mobile data", "femtocells", "numerical analysis", "wifi", "wireless communication", "throughput", "internet"], "paperid": "7B21CBBF", "author_id": ["14690F07", "80DC67C7", "80DD814F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chuan wu", "hongxing li", "francis c m lau", "zongpeng li"], "keyword": ["scheduling", "electricity", "server provisioning", "virtual machines", "cloud computing", "dynamic algorithm", "job scheduling", "resource sharing", "sla", "servers", "interoperability", "schedules", "cost accounting", "dynamic scheduling"], "paperid": "7CC13E87", "author_id": ["7DBF5A93", "7E42AE0D", "7F44A7D2", "8003BACF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["louis plissonneau", "ernst w biersack", "heng cui"], "keyword": ["internet", "web pages", "quality of service", "web interface", "critical path analysis", "web browsing"], "paperid": "7A5161E6", "author_id": ["058A8C48", "0FE1C1DD", "806955DC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tian pan", "qunfeng dong", "ting zhang", "huichen dai", "yi wang", "zhian mi", "xiaoyu guo", "bin liu"], "keyword": ["scalability", "throughput", "instruction sets", "internet", "data structure", "memory management", "information retrieval"], "paperid": "7B6AC93B", "author_id": ["7D29B2E3", "7EF104F4", "804C3421", "80AA43E8", "84902E62", "849DC1C7", "84B82BE2", "84F3FCC4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jindou fan", "huichen dai", "yi wang", "bin liu"], "keyword": ["radiation detectors", "security", "internet", "privacy", "data privacy", "servers", "routing", "computer network security", "memory management"], "paperid": "78BBF747", "author_id": ["7F9BDE32", "80AA43E8", "84902E62", "84F3FCC4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["niels l m van adrichem", "fernando kuipers"], "keyword": ["computer networks", "servers", "autonomous systems", "routing", "directory service", "local area networks", "network topology", "topology"], "paperid": "788264BC", "author_id": ["75688B3A", "80DFBB28"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yan wang", "xin wang", "xiangyang xue", "zongpeng li", "xunrui yin"], "keyword": ["graph theory", "hadwiger conjecture", "encoding", "routing", "graph coloring", "vectors", "communication network", "network coding", "information theory", "finite field", "network topology", "black box", "color"], "paperid": "7B6A2A6D", "author_id": ["57B09FD4", "7E353776", "7FE436DC", "8003BACF", "8145D609"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mo li", "yuanqing zheng"], "keyword": ["compressive sensing", "rfid tags", "software radio", "noise", "vectors", "physical layer", "servers", "software defined networking"], "paperid": "77BF0870", "author_id": ["7DDED2F4", "8172A2DD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei yang", "yunhao liu", "jinsong han", "xuan ding", "yi guo"], "keyword": ["intelligent sensors", "authentication", "privacy", "shape", "svm", "user interfaces", "accelerameter", "security", "authorisation", "human computer interaction", "mobile computing"], "paperid": "794FFBFC", "author_id": ["7EF5600F", "7F046EF7", "7F5B1F5C", "80584FC0", "85CC7CF1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["christina fragouli", "katerina argyraki", "iris safaka", "suhas diggavi"], "keyword": ["information theoretic security", "authentication", "privacy", "broadcast domain", "cryptographic protocols", "protocols", "reliability", "probability", "wireless communication"], "paperid": "79D09512", "author_id": ["0AE659CF", "123BAB28", "13D32313", "80FE0794"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei ying", "juan jose jaramillo"], "keyword": ["optimization", "wireless networks", "resource allocator", "bandwidth", "schedules", "resource management", "scheduling"], "paperid": "7E7DAAD0", "author_id": ["7DF51EF1", "8163BE3C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yashar ghiassifarrokhfal", "jorg liebeherr"], "keyword": ["scheduling", "probabilistic logic", "computational complexity", "markov processes", "convergence", "multiplexing", "probability"], "paperid": "7C95CF74", "author_id": ["4DF327BF", "5150AF5C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ed novak", "qun li", "guihai chen", "chiu c tan", "xiaojun zhu", "fengyuan xu"], "keyword": ["noise", "wireless communication", "markov processes", "vehicle dynamics", "entropy", "correlation"], "paperid": "7CB49F02", "author_id": ["7C0CB1A5", "7D814B79", "7EF31BBE", "7F856502", "7FF2BFDC", "80F57E56"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zhi zhou", "hongbo jiang", "fangming liu", "hai jin", "bo li"], "keyword": ["operating profit", "scheduling", "throughput", "computational modeling", "control systems", "power budget", "routing", "optimal control", "datacenter", "virtual machines", "cloud computing", "servers", "measurement", "lyapunov optimization", "economics"], "paperid": "7BFBCFA4", "author_id": ["58F1E4B2", "7E1B4E11", "80D09303", "813F6C3E", "85A4DFF2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["baochun li", "di niu"], "keyword": ["convergence", "resource management", "resource allocation", "distributed processing", "algorithm design and analysis", "cost function", "message passing", "vectors"], "paperid": "75493AC7", "author_id": ["7F13CFD4", "810B208C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["florin ciucu", "ramin khalili", "yong cui", "yuming jiang", "liu yang"], "keyword": ["probability", "scheduling", "markov processes", "probability distributions", "routing", "calculus", "upper bound"], "paperid": "76CCFDE6", "author_id": ["06DD00C6", "7AE02E2D", "7EA4E305", "80A92D6E", "861AF039"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["siyao cheng", "jianzhong li", "zhipeng cai"], "keyword": ["accuracy", "interpolation", "spline interpolation", "algorithm design and analysis", "approximation theory", "data acquisition", "wireless sensor networks"], "paperid": "7C9703EB", "author_id": ["7D7F4A4B", "7EF84BEE", "8080C2F3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sungwon yang", "pralav dessai", "manish verma", "mario gerla"], "keyword": ["rf signal", "databases", "accuracy", "calibration", "servers"], "paperid": "778B0189", "author_id": ["7DC14DBD", "84729C15", "86388C93", "8639D486"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peng cheng", "lingkun fu", "tian he", "yu gu", "jiming chen"], "keyword": ["linear programming", "approximation theory", "wireless communication", "computational complexity", "merging", "energy storage", "communication complexity", "two dimensional space", "wireless sensor networks", "rfid tag"], "paperid": "7670CAE0", "author_id": ["75783DEE", "7DACE2FE", "80388B5E", "8082D122", "80DF5EF9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["srikanth v krishnamurthy", "tom la porta", "zi feng", "ramesh govindan", "george papageorgiou"], "keyword": ["wireless network", "interference", "video quality", "packet loss", "psnr", "signal to noise ratio", "distortion"], "paperid": "753F00EA", "author_id": ["7F2BD337", "80989FF0", "80C7FAAC", "8495D5CB", "851977DB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qian zhang", "xiaojun feng", "jin zhang"], "keyword": ["bandwidth", "tv", "nash equilibrium", "databases", "cost accounting", "business models", "game theory", "games", "distributed algorithms", "pricing"], "paperid": "7659F49C", "author_id": ["80240ADD", "81172250", "85587464"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ankur kamthe", "alberto e cerpa", "miguel a carreiraperpinan"], "keyword": ["protocols", "wireless communication", "data models", "vectors", "wireless sensor networks", "learning artificial intelligence", "computational modeling", "training data", "data collection", "reference model", "cabling"], "paperid": "753774AC", "author_id": ["180792EF", "2913DC8B", "7B7BC30D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mitch gusat", "daniel crisan", "cyriel minkenberg", "robert birke"], "keyword": ["motion pictures", "switches", "servers", "packets", "hardware", "bandwidth"], "paperid": "78F96A1C", "author_id": ["4B0A389A", "789277C2", "7AC7A32B", "7CA57A2A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lijiang chen", "jilong xue", "yafei dai", "xiao wang", "zhi yang", "xiaoyong yang"], "keyword": ["security", "graph theory", "upper bound", "mathematical model", "trusted computing", "malware", "spam", "feature extraction"], "paperid": "79F00FFE", "author_id": ["7DDEEEAB", "7EA30FC7", "7F4C267C", "7F7E165F", "80ED8CDC", "81382DC0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei bao", "ben liang"], "keyword": ["mobile computing", "servers", "poisson equation", "queueing theory", "vectors", "entropy", "mobile communication", "stationary distribution"], "paperid": "7936163C", "author_id": ["7A10D2FD", "85F65248"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["christian bettstetter", "wasif masood", "johannes klinglmayr", "thomas watzl", "istvan fehervari"], "keyword": ["synchronisation", "wireless sensor networks", "couplings", "network topology", "algorithm design and analysis", "communication protocols", "oscillators", "mobile computing", "wireless communications"], "paperid": "756201FF", "author_id": ["0AA12E30", "79045A2C", "79FA3132", "84DB4AFB", "8506E974"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["minyou wu", "mingyuan xia", "xue liu", "linghe kong"], "keyword": ["compressive sensing", "interpolation", "ocean temperature", "estimation", "wireless sensor networks", "spatial correlation", "data loss", "signal reconstruction"], "paperid": "7863A651", "author_id": ["7DDB4399", "7E1ECD6C", "7F339A86", "7FD2168F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yung yi", "jeongwoo cho", "do young eun", "jaeseong jeong", "song chong"], "keyword": ["mobile communication", "sensors", "artificial intelligence", "aging", "computer science"], "paperid": "7A26BB17", "author_id": ["7CEEA7C0", "7D656C89", "7D7E37D2", "7D97F88F", "7FF986D1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gordon wilfong", "y richard yang", "hongze zhao", "chuanxiong guo", "dan li", "li erran li", "vahid liaghat", "mohammadtaghi hajiaghay"], "keyword": ["bandwidth", "network topology", "topology", "firewall", "cloud computing", "virtualization", "security", "load balancer", "routing"], "paperid": "7B3270CD", "author_id": ["1313E205", "7EBD82A2", "7F456313", "802C378E", "803A9763", "80E3D08F", "84E20719", "850B125A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["haochao li", "lionel m ni", "qian zhang", "kaishun wu"], "keyword": ["ap", "wlan", "mu mimo", "time frequency analysis", "software radio", "wireless networks", "frequency domain", "interference", "ieee 802 11"], "paperid": "751A6536", "author_id": ["7DD198CD", "7E50C199", "80240ADD", "805085FC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yinjie chen", "xinwen fu", "wei zhao", "benyuan liu", "zhongli liu"], "keyword": ["directional antennas", "angle of arrival", "wireless sniffer", "mobile robots", "angular velocity", "wireless communication", "aoa"], "paperid": "790B6F44", "author_id": ["7D8416F0", "7F49D8D4", "80166663", "81359EA9", "8639F7D5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiong wang", "chunming qiao", "yangming zhao", "sheng wang", "sizhong xu", "xiujiao gao"], "keyword": ["energy conservation", "traffic engineering", "games", "optimization", "nash bargaining", "routing", "game theory", "multi objective optimization", "load balance", "resource allocation", "energy efficiency"], "paperid": "76F3F47E", "author_id": ["7D8D7264", "7E0B9FBE", "7F7ABB9F", "8077C1AC", "84A475C8", "84B56E3F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["matteo rosi", "leonardo maccari"], "keyword": ["force", "cryptography", "data protection", "message authentication", "authentication", "wireless communication", "wps", "protocols"], "paperid": "786C0580", "author_id": ["80F91F5E", "740DA483"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["li zhang", "jian tan", "xiaoqiao meng"], "keyword": ["couplings", "synchronization", "resource allocation", "instruction sets"], "paperid": "79B5D078", "author_id": ["7E3A4EF7", "7F595EF4", "80A5BE89"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "eylem ekici", "zizhan zheng", "shuang li"], "keyword": ["markov processes", "dynamic programming", "greedy algorithms", "decision support systems", "cognitive radio"], "paperid": "78ED642D", "author_id": ["7C52E731", "7FF70407", "8143F422", "83D02352"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yuanyuan yang", "zhiyang guo"], "keyword": ["multicast", "load balancing", "uplink", "bandwidth", "fat tree", "servers", "computer networks"], "paperid": "7CE7B8C4", "author_id": ["823CC2A6", "7EBF14C2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["branislav kveton", "diana joumblatt", "nina taft", "r l teixeira", "jaideep chandrashekar"], "keyword": ["support vector machines", "vectors", "feature selection", "quantization", "measurement", "learning artificial intelligence", "quality of service", "feature extraction", "ergonomics"], "paperid": "7928C53A", "author_id": ["07D1F319", "5766B47A", "75E77DE8", "7EA033EC", "8630D100"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jeanphilippe javaudin", "bernard cousin", "olivier bouchet", "mariehelene hamon", "han yan", "maryline lebouc", "cedric gueguen", "fabrice fontaine", "jeanpaul vuichard"], "keyword": ["energy conservation", "home automation", "protocols", "convergence"], "paperid": "7B5EC9F0", "author_id": ["21209ACB", "76A5D85E", "7DF1824E", "7FA5E449", "80418807", "847FB26D", "848A110D", "849A59C1", "84D77EB4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["stefan schmid", "j schneider"], "keyword": ["upper bound", "bandwidth", "graph theory", "mts", "cost function", "virtual machines", "algorithm design and analysis", "servers", "computational complexity", "gravity", "metrical task system"], "paperid": "77F06687", "author_id": ["80B6AFF2", "83933B45"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaojun cao", "qian hu", "yang wang"], "keyword": ["integer programming", "np completeness", "linear programming", "polynomials", "computational complexity", "bandwidth", "computational modeling", "virtualisation", "internet", "service providers"], "paperid": "765C2C7F", "author_id": ["7BDEF033", "802E3AE8", "85FD8397"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["damien saucez", "thierry turletti", "xuan nam nguyen"], "keyword": ["software defined networking", "internet", "optimization", "routing", "protocols", "bandwidth", "openflow", "computer architecture", "ccn"], "paperid": "7DF9F375", "author_id": ["0189E965", "7889E9F8", "7D7D2456"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["piet van mieghem", "s trajanovski", "fernando kuipers"], "keyword": ["equilateral triangle", "directed graphs", "robustness", "shape", "measurement", "communication networks", "ellipse", "failure analysis", "geography", "computational complexity", "computational geometry", "critical region", "square", "polynomials"], "paperid": "7E3951E8", "author_id": ["2AD43BDB", "76FFDC82", "80DFBB28"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["m h r khouzani", "ness b shroff", "soumya sen"], "keyword": ["security policy", "time measurement", "economics", "security", "investment", "internet", "autonomous system"], "paperid": "7B7C7F1D", "author_id": ["5D60A90D", "7C52E731", "80130CAD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mingyan liu", "shangpin sheng"], "keyword": ["uncertainty", "spread spectrum communication", "stochastic processes", "bandwidth", "channel capacity"], "paperid": "77D78ADA", "author_id": ["7D3C37B5", "7E2144D6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jiangchuan liu", "haitao li", "ke xu", "haiyang wang"], "keyword": ["internet", "content management", "silicon"], "paperid": "775EC6AB", "author_id": ["7D1FE4C6", "7F92617C", "7FD5DB56", "862F75F9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rong zheng", "thanh le", "zhu han"], "keyword": ["wireless networks", "approximation algorithms", "decision problem", "greedy algorithms", "computational complexity"], "paperid": "76B42C95", "author_id": ["7751003A", "7D0C8BAE", "7E1FB9D3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yan grunenberger", "eduard goma", "claudio rossi", "konstantina papagiannak"], "keyword": ["http", "mobile communication", "bandwidth", "digital subscriber lines", "internet", "adsl", "transport protocols", "wireless communication"], "paperid": "76539E30", "author_id": ["797CED7B", "7BCC564D", "7E0AB841", "83B61728"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dawei gong", "yuanyuan yang"], "keyword": ["optimization", "time division multiple access", "interference", "signal to noise ratio", "tree topology", "wireless communication", "data gathering", "data models", "sinr", "scheduling", "wireless sensor networks", "reliability", "energy conservation", "energy efficiency", "sensors", "np hard"], "paperid": "766E0B7A", "author_id": ["80E646F0", "823CC2A6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qian zhang", "wei wang", "jin zhang"], "keyword": ["computer architecture", "handover", "collaborative filtering", "correlation"], "paperid": "7C02E5FD", "author_id": ["80240ADD", "84F6F3F8", "85587464"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaolin li", "xinxin liu", "kaikai liu", "lulu xie"], "keyword": ["accuracy", "bit error rate", "acoustics", "demodulation", "synchronization"], "paperid": "765BFEFC", "author_id": ["7DC99157", "7E8A33B4", "808CF89B", "8494870B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yinyu ye", "zirui zhou", "anthony mancho so", "kamfung sze", "senshan ji"], "keyword": ["approximation algorithms", "vectors", "convex programming", "optimization", "polynomials", "polynomial time", "symmetric matrices"], "paperid": "79FAFCA1", "author_id": ["7D095C0E", "80897894", "810EE9D0", "84DF4DC8", "84F9A549"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["arun venkataramani", "lixin gao", "yang song"], "keyword": ["internet traffic", "game theory", "markov processes", "servers", "games", "internet", "pricing"], "paperid": "7CEDA5AA", "author_id": ["7CC884BB", "80E4E3E9", "857BE27D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["james w roberts"], "keyword": [], "paperid": "83F76A0A", "author_id": ["855209DB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["li xiao", "pei huang", "xi yang"], "keyword": ["fpga", "frequency domain analysis", "probability", "time domain", "binary codes", "collision detection", "interference", "ofdm", "wireless communication"], "paperid": "7C0859BC", "author_id": ["7F5A134E", "7F662275", "8090B646"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ram keralapura", "marios iliofotou", "alok tongaonkar"], "keyword": ["feature extraction", "network management", "payloads", "internet", "protocols", "reverse engineering", "classification algorithms"], "paperid": "7AF2C73C", "author_id": ["011C82D6", "0E1EFC30", "449A2769"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["feng wen", "min chen", "fangming liu", "hai jin", "yupeng qu", "peng shu"], "keyword": ["lyapunov optimization", "bandwidth", "mobile communication", "mobile computing", "cloud computing", "energy conservation"], "paperid": "75561E21", "author_id": ["7630E929", "7E2DFFA5", "80D09303", "813F6C3E", "84729774", "8508F115"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mario gerla", "youngtae noh", "seongwon han", "uichin lee"], "keyword": ["underwater acoustic communication", "bandwidth", "pipelining", "propagation delay", "underwater", "acoustic waves", "throughput", "protocols", "schedules"], "paperid": "78EC6F23", "author_id": ["21908EB6", "76221271", "7F78C2AC", "81618B96"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dora spenza", "chiara petrioli", "a cammarano"], "keyword": ["concrete", "strain", "wireless sensor networks", "energy harvesting", "strain gauges", "data analysis", "wireless communication", "risk analysis", "wind turbines", "deformation", "structural engineering", "ad hoc networks", "tensile strength", "geotechnical engineering"], "paperid": "815096D9", "author_id": ["083D60D0", "19E11361", "8512D706"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yang wang", "yingying chen", "hongbo liu", "jie yang"], "keyword": ["data mining", "wireless communication", "cryptography", "mobile communication", "wireless sensor networks", "time measurement", "ofdm"], "paperid": "7ED21659", "author_id": ["7FF1B615", "80EF83E1", "850EC3C8", "86058467"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xi zhang", "wenchi cheng", "hailin zhang"], "keyword": ["closed form expression", "signal to noise ratio", "dynamic scheduling", "resource management", "full duplex", "optimal control", "convex programming", "transmitters", "wireless communication", "interference", "karush kuhn tucker conditions", "lead", "signal to interference plus noise ratio", "wireless networks", "power control"], "paperid": "7AD0EDEB", "author_id": ["7D782A7B", "7DA2C8E8", "80148DA2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ram keralapura", "luigi grimaudo", "elena baralis", "marco mellia"], "keyword": ["protocols", "unsupervised learning", "servers", "algorithm design and analysis", "labeling", "learning artificial intelligence", "traffic engineering", "internet", "clustering algorithms", "computer network security", "security", "network management", "internet traffic", "accuracy", "select", "traffic classification"], "paperid": "7FB9DCCC", "author_id": ["011C82D6", "04009A26", "75F06B12", "7B15CAFF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["srihari nelakuditi", "naveen santhapuri", "romit roy choudhury", "justin manweiler"], "keyword": ["accuracy", "compass", "feature extraction", "sensors", "support vector machines"], "paperid": "75A0F636", "author_id": ["01166E1A", "0A7D3255", "7DF9871A", "7F33B810"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["can ma", "zhenquan qin", "jiaqi xu", "lei shu", "lei wang", "ming zhu", "canfen chen", "weifeng ying"], "keyword": ["huffman coding", "sensor networks", "data compression", "throughput"], "paperid": "79CE7ECA", "author_id": ["7DB6539D", "7EBDF29E", "7FFD1A12", "81515C0C", "851E4DCB", "855A4BE6", "85A03870", "85F4C811"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei guo", "bo shen", "fei li", "yao liu", "songqing chen"], "keyword": ["media", "cellular network", "server side", "internet", "mobile communication", "telecommunication services", "servers"], "paperid": "7A1CA0C1", "author_id": ["7DB73E0F", "7DF78C63", "80B1164A", "812F28BA", "82B1672E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mark crovella", "john mark agosta", "nina taft", "daniel ting", "jaideep chandrashekar"], "keyword": ["maximum likelihood estimation", "marginal distribution", "mathematical model", "computational modeling", "pareto distribution", "data models"], "paperid": "7B8E8F76", "author_id": ["05729C1A", "2323029F", "71598BF4", "859A81A2", "8630D100"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["atilla eryilmaz", "ruogu li", "bin li"], "keyword": ["fading", "steady state", "statistical analysis", "throughput", "scheduling", "stability analysis", "vectors"], "paperid": "7B8FD83D", "author_id": ["7DF20B35", "7F82C540", "8119D3C6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei bao", "ben liang"], "keyword": ["sps", "downlink", "frequency allocation", "objective function", "nash equilibrium", "interference", "geometric programming", "stochastic programming", "closed form expression", "stochastic processes", "optimization problem", "resource management"], "paperid": "769432FC", "author_id": ["7A10D2FD", "85F65248"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shigeru yamada"], "keyword": [], "paperid": "0658B128", "author_id": ["8161D7A6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["amit pande", "prasant mohapatra", "shaxun chen", "kai zeng"], "keyword": ["wireless sensor networks", "packet loss", "noise", "wireless communication"], "paperid": "799ED78A", "author_id": ["7EF7449E", "7F1AA18B", "7F6069AA", "809A875B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["liang tang", "yun rui", "qian wang", "husheng li", "zhiyong bu"], "keyword": ["power transmission", "internet", "logic gates", "smart grids", "artificial neural networks", "silicon"], "paperid": "811E3883", "author_id": ["30D029B1", "7D1B9253", "7DDB89CC", "7F67390B", "85B96F2E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mary r schurgot", "lloyd greenwald", "limin wang", "matteo varvello", "jairo o esteban", "yang guo", "david t stott", "smith"], "keyword": ["internet", "mobile ad hoc networks", "scale", "routing", "availability", "mobile computing"], "paperid": "7C025FB1", "author_id": ["01139D33", "17A30EE2", "56A95EBC", "76974283", "7CF8E874", "7F55FC0A", "8172B7C1", "84F747A6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["taeho jung", "xiangyang li", "yunhao liu", "lan zhang"], "keyword": ["computer network security", "data privacy", "protocols", "cryptographic protocols", "vectors", "encryption", "ranging", "dot product", "ranking", "privacy"], "paperid": "7C9DC621", "author_id": ["7D0AF3F6", "7DD9A433", "7F046EF7", "8551CE45"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["songtao guo", "yuanyuan yang", "cong wang"], "keyword": ["distributed algorithm", "routing protocols", "wireless sensor networks", "energy balance", "mobile communication", "distributed databases", "wireless communication", "optimization"], "paperid": "768AEA54", "author_id": ["806F5C20", "823CC2A6", "99C499AE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["admela jukan", "ashwin gumaste", "xiaomin chen"], "keyword": ["linear programming", "routing", "optical fibers", "multipath routing", "integer linear programming", "spectral efficiency", "optimization"], "paperid": "80792E83", "author_id": ["013CB31B", "7E0485CD", "809D435A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alok tongaonkar", "xiaoyin wang", "shuaifu dai", "antonio nucci", "dong song"], "keyword": ["network security", "internet", "servers", "fuzzy set theory", "fingerprint recognition", "mobile communication", "fingerprint identification", "network management", "transport protocols", "feature extraction", "humanoid robots"], "paperid": "8147277B", "author_id": ["449A2769", "7FD51D59", "81675454", "82B332F7", "83BB5A9F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["anyu wang", "zhifang zhang"], "keyword": ["maintenance engineering", "interpolation", "network coding", "vectors", "polynomials", "distributed storage", "bandwidth"], "paperid": "7B05F498", "author_id": ["7DDAF749", "800D9699"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gabor retvari", "janos tapolcai"], "keyword": ["overlay networks", "linear programming", "integer programming", "numerical analysis", "network topology", "topology", "optimization", "routing protocols", "virtualization"], "paperid": "764C56B5", "author_id": ["03B080F4", "10926C15"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ariel orda", "amir nahir", "danny raz"], "keyword": ["cloud computing", "queueing theory", "resource allocation", "servers", "data centers", "propagation delay"], "paperid": "7B8140D7", "author_id": ["25A54095", "7DE121A5", "83051545"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["vasileios giotsas", "shi zhou"], "keyword": ["bgp", "autonomous systems", "computer network security", "inter domain", "network topology", "security", "ixp", "measurement", "routing", "internet", "servers", "topology", "protocols"], "paperid": "7D60EE4D", "author_id": ["125758AA", "804E970B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mario gerla", "fabio angius", "cedric westphal", "giovanni pau"], "keyword": ["computer architecture", "data replication", "api", "data storage", "encryption", "cryptographic protocols", "data privacy", "data control", "protocols", "data access", "authorisation"], "paperid": "7C8463EB", "author_id": ["21908EB6", "7AA48BEF", "84C9A481", "857F8C70"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["weiwen zhang", "dapeng oliver wu", "yonggang wen"], "keyword": ["collaboration", "mobile communication", "directed acyclic graph", "directed graphs", "markov processes", "groupware", "cloud computing", "energy conservation", "mobile computing", "stochastic processes", "topology", "scheduling", "mobile device"], "paperid": "7BB44168", "author_id": ["7CEE1CA4", "7DD98F61", "7E14EDEC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["leandros tassiulas", "george iosifidis", "lin gao", "jianwei huang"], "keyword": ["network congestion", "mobile communication", "qos", "data models", "wifi", "subgame perfect equilibrium", "economics", "spe", "mobile cellular network", "games", "traffic volume", "game theory", "manganese", "pricing", "market price"], "paperid": "7F4E653A", "author_id": ["0F6CB05B", "52BE1640", "7E4F5B33", "7E9A2A72"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["niloy ganguly", "rajib ranjan maiti", "arobinda gupta"], "keyword": ["routing", "greedy algorithms", "human computer interaction", "computer science", "graph theory", "history", "routing protocols"], "paperid": "75670ADA", "author_id": ["7D073802", "7DB0DD65", "7E90ED2A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zi li", "yang peng", "wensheng zhang", "daji qiao"], "keyword": ["data collection", "switches", "wireless sensor networks", "routing"], "paperid": "79D04FD1", "author_id": ["7EBEEC75", "7F679452", "8176A452", "852B536B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ashish khisti", "john apostolopoulos", "waitian tan", "amr badr"], "keyword": ["channel coding", "upper bound", "linear code", "decoding", "convolutional codes"], "paperid": "7BE6CFC3", "author_id": ["10AAC62F", "7BFFF060", "7F52CA74", "84220C25"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eytan modiano", "chihping li"], "keyword": ["statistical analysis", "routing", "optimization", "queueing theory", "vectors", "resource management", "throughput", "networks", "hardware", "performance", "flow control", "robust control", "radio receivers"], "paperid": "7A267F30", "author_id": ["09DF3E99", "7FCF00B0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["prusayon nintanavongsa", "m yousof naderi", "kaushik r chowdhury"], "keyword": ["radio frequency", "sensors", "wireless sensor networks", "optimization", "radio transmitters", "radiative transfer"], "paperid": "7BE1A224", "author_id": ["0ADDB5DF", "59B1BFE9", "7E0A7360"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kave salamatian", "mohamedali kaafar", "gaogang xie", "dong wang", "hosung park", "sue moon"], "keyword": ["graph theory", "media", "predictive models"], "paperid": "76B2C514", "author_id": ["09EFBC10", "7B7CE79D", "7E8B2C6E", "7FD30890", "80999C7C", "82A4A48D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["animashree anandkumar", "furong huang"], "keyword": ["games", "resource allocation", "open systems", "convergence", "switches", "cloud computing", "multi agent systems", "computational complexity", "servers", "nash equilibrium"], "paperid": "78398E8D", "author_id": ["77599A8B", "7E6A5467"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["davide pasetto", "massimiliano meneghin", "kevin m lynch", "j sheehan", "k a muller", "ken inoue"], "keyword": ["local area networks", "hpc", "protocols", "high frequency trading", "system bus", "kernel", "roce", "hardware", "payloads", "transport protocols", "iwarp"], "paperid": "7994C751", "author_id": ["637CF4A6", "7D4D5D16", "7DA9B4AF", "7EF8698A", "7FF2B95E", "7FF7055F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["edoardo amaldi", "antonio capone", "giulio betti", "giulia ercolani"], "keyword": ["communication networks", "switches", "electricity", "integer programming", "renewable energy source", "network topologies", "computer networks", "photovoltaic systems", "optimization", "routing"], "paperid": "80955473", "author_id": ["0309A224", "7E35FAF0", "7F1392E8", "84C876E6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["j burkey", "wentao shang", "lixia zhang", "j m thompson", "meki cherkaoui"], "keyword": ["internet", "routing protocols", "mobile devices", "throughput", "java", "reactive power", "uri scheme"], "paperid": "7762B2B1", "author_id": ["7AC7D08F", "7B9DFA82", "815F4B3F", "8269C7A1", "85F7E95D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["roberto di pietro", "stefano guarino"], "keyword": ["data confidentiality", "mobile computing", "wireless sensor networks", "metrics", "mobile communication", "cryptography", "availability", "mobility models", "data models"], "paperid": "753C135A", "author_id": ["7DC9031C", "84FFDCA1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ari juels", "ronald l rivest", "kevin d bowers", "enya shen"], "keyword": ["authentication", "cloning", "trusted computing", "sensors", "synchronization", "cryptography", "cryptographic keys"], "paperid": "7802CA10", "author_id": ["02C8FB9F", "29752D3A", "7C6BEF23", "8578282E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["\u8429\u884c", "\u3055\u3068\u307f"], "keyword": [], "paperid": "2397FA67", "author_id": ["7D84E042", "7F8B9585"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peyman talebifard", "hasen nicanfar", "victor c m leung", "seyedali hosseininezhad"], "keyword": ["data privacy", "power station", "message authentication", "smart grid", "identity management", "privacy", "cryptography", "computer network security", "public key", "security", "energy storage", "pseudonymity", "servers", "authentication"], "paperid": "7EC83461", "author_id": ["0C1B4B2C", "130A1E28", "29083198", "7DBA0D3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["fan li", "feng zhao", "guobin shen", "zhiyang wang", "he wang", "song han"], "keyword": ["accelerometers", "location based services", "telecommunication services", "point location", "magnetometer", "vectors", "estimation", "interpolation", "extrapolation", "acceleration"], "paperid": "7AD58BA3", "author_id": ["7EC7D489", "7F0FE2D2", "80A535DA", "8491C1C8", "E182ACA0", "F74CC549"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie wu", "shuhui yang", "guojun wang", "qin liu", "feng li"], "keyword": ["outsourcing", "privacy", "data privacy", "cloud computing", "measurement", "graph theory", "social networks", "probabilistic logic"], "paperid": "80D714DC", "author_id": ["7D59933A", "7E95859E", "7EA75C68", "809F336C", "8473C041"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["limin wang", "moritz steiner", "yanhua li", "zhili zhang", "jie bao"], "keyword": ["art", "advertisement", "data collection", "geographic information systems", "mobile computing", "communication networks"], "paperid": "7E35AAD2", "author_id": ["56A95EBC", "7ED0258E", "80C3814C", "81027109", "85947F8C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["aruna seneviratne", "prasant mohapatra", "ningning cheng", "xinlei wang", "wei cheng"], "keyword": ["internet", "privacy", "protocols", "engines", "online advertising", "cognition", "data privacy", "web browsing"], "paperid": "787C9C2C", "author_id": ["75D47833", "7F1AA18B", "80485509", "817A4F3A", "F7491EE0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yujin li", "wenye wang"], "keyword": ["vectors", "hitting time", "vehicle dynamics", "upper bound", "geocast", "mobile ad hoc networks", "communication networks", "simulation"], "paperid": "7C15DCFA", "author_id": ["83F0FA62", "80545DA3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["loukas lazos", "yan zhang"], "keyword": ["radiation detectors", "throughput", "bandwidth"], "paperid": "7663323B", "author_id": ["761EA156", "7D2BB6F2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["frederique oggier", "lluis pamiesjuarez", "amitava datta"], "keyword": ["erasure codes", "data centers", "encoding", "atomic operation", "redundancy", "distributed databases", "migration", "distributed storage", "forward error correction", "pipelines"], "paperid": "7C6200E6", "author_id": ["81ED630F", "8552CA2A", "85E14BFB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kebin liu", "xiangrong xiao", "zhichao cao", "yunhao liu", "qiang ma"], "keyword": ["network topology", "probabilistic model", "topology", "wireless sensor networks", "routing", "probability", "wireless communication", "network management"], "paperid": "754F9301", "author_id": ["7D529DD0", "7D768656", "7D875C40", "7F046EF7", "84360E74"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["marcelo bagnulo", "andra lutu", "olaf maennel"], "keyword": ["routing", "protocols", "internet", "labeling", "topology", "routing protocols", "autonomous system", "border gateway protocol"], "paperid": "7FD7CDFF", "author_id": ["02D4D60C", "0A6CE8E7", "129EA45D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["francois baccelli", "t v nguyen", "xinzhou wu", "sivaraman subramanian", "kai zhu"], "keyword": ["radiation detectors", "vanet", "stochastic geometry", "transmitters", "protocols", "closed form expression", "poisson point process", "stochastic processes"], "paperid": "811D6C05", "author_id": ["03844107", "7F6B8DB7", "81AAC1A8", "8370C2E0", "85775045"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peter j winzer", "marina thottan", "f bruce shepherd", "alexandre frechette"], "keyword": ["vegetation", "robustness", "measurement", "routing"], "paperid": "7B36FE73", "author_id": ["62890DDA", "7568122E", "7E6CD942", "831F5A4A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["thomas moscibroda", "xiao qi", "yuexuan wang", "liwen xu"], "keyword": ["topology", "mathematical model", "accuracy", "network topology", "compressed sensing", "wireless sensor networks"], "paperid": "78FE2901", "author_id": ["08533FEB", "7E90AFA3", "7F1FB139", "855CF0C6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yossi kanizo", "david hay", "isaac keslassy"], "keyword": ["color", "network switches", "semantics", "network controller", "tcam", "software radio", "access control", "data structures", "software defined networks", "control systems", "protocols", "computer languages"], "paperid": "7AC4127C", "author_id": ["028B7764", "7F0946C6", "84125B0D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xuan liu", "qian wang", "kui ren", "zuyi li", "yanling yuan"], "keyword": ["vectors", "nonlinear programming", "optimization", "power systems", "computational modeling", "generators", "power system protection"], "paperid": "7953B676", "author_id": ["3877BAA6", "7DDB89CC", "7F6340F3", "7FA16068", "808A1F9F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["velin kounev", "david tipper"], "keyword": ["smart grid", "http protocol", "wireless sensor networks", "real time systems", "protocols", "tcp protocol", "ami", "home automation", "transport protocols"], "paperid": "7F084EED", "author_id": ["6DCBB160", "744AD911"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["simone mainardi", "luciano lenzini", "enrico gregori"], "keyword": ["parallel dimensions", "topology", "correlation", "autonomous systems", "internet", "economics"], "paperid": "80CCEAA6", "author_id": ["76CB1BD8", "7748E842", "801444F3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["do young eun", "chulho lee", "jaewook kwak"], "keyword": ["availability", "mobile computing", "wireless interface", "mobile ad hoc networks", "ad hoc networks", "measurement"], "paperid": "76E9826D", "author_id": ["7D7E37D2", "7E02E9FA", "7FA42BB2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carlee joewong", "youngbin im", "mung chiang", "ted taekyoung kwon", "soumya sen", "sangtae ha"], "keyword": ["bandwidth", "prediction algorithms", "3g", "radio receivers", "bandwidth allocation", "transport protocols", "mobile communication", "throughput"], "paperid": "7C5ECDC5", "author_id": ["14690F07", "7E07C77A", "7FC6A25D", "7FFD6429", "80130CAD", "80DC67C7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["olivier thonnard", "pierreantoine vervier"], "keyword": ["routing", "internet", "protocols", "bgp hijacking", "computer network security"], "paperid": "7CF73F38", "author_id": ["10A5566D", "7F67B6BB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongjuan li", "xiuzhen cheng", "xiaoshuang xing", "tao jing", "keqiu li"], "keyword": ["cognitive radio networks", "history", "free rider", "evolutionary computation", "uncertainty", "probability", "energy conservation", "false alarm rate", "game theory", "evolutionary game theory", "games", "entropy", "sensors"], "paperid": "76630BC1", "author_id": ["7CEE12C3", "7F2DCA44", "8056BFBE", "8139B0E0", "815FFAA1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["baochun li", "boyang wang", "hui li"], "keyword": ["indexes", "cloud computing", "public key", "digital signatures", "writing", "data integrity", "data services", "games", "manganese"], "paperid": "7D6E52DA", "author_id": ["7F13CFD4", "81139F43", "829A3256"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei ying", "li zhang", "weina wang", "jian tan", "kai zhu"], "keyword": ["throughput", "software architecture", "routing", "computational modeling", "markov processes", "scheduling", "little law", "resource allocation", "queueing theory", "vectors", "load balancing", "minimisation", "parallel algorithms"], "paperid": "7D3D6EA7", "author_id": ["7DF51EF1", "7E3A4EF7", "7F3A986E", "7F595EF4", "85775045"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bartlomiej blaszczyszyn", "mohamed kadhem karray", "holger paul keeler"], "keyword": ["shadow mapping", "convergence", "hexagonal", "poisson model", "optimization", "signal to noise ratio", "interference", "poisson", "fading", "base stations", "stochastic processes", "fading distribution", "sinr"], "paperid": "7726E62D", "author_id": ["593AB9D7", "79C91C00", "7E6F587E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["avinatan hassidim", "michal segalov", "danny raz", "ariel shaqed"], "keyword": ["cost efficiency", "vectors", "packet loss", "planning", "network resources"], "paperid": "7A1EE48A", "author_id": ["144DD20F", "5DCB1743", "83051545", "84E968EC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["nael b abughazaleh", "seon yeong han", "dongman lee"], "keyword": ["fading", "correlation", "shadow mapping", "regression analysis", "computational modeling"], "paperid": "7B884C8B", "author_id": ["2ACDEC28", "80BFDD39", "8528A39F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["markus benter", "hannes frey", "florentin"], "keyword": ["routing", "topology", "graphs", "wireless sensor networks", "mesh generation", "planarity", "computational modeling", "wireless ad hoc network", "graph theory", "bismuth", "protocols", "network topology"], "paperid": "76731A86", "author_id": ["76FAC630", "7E27190C", "84EC4FAD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["pokai huang", "xiaojun lin"], "keyword": ["schedules", "throughput", "algorithm design and analysis", "computational complexity"], "paperid": "7969741E", "author_id": ["849C67EF", "7DD9C61E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dimitris syrivelis", "ioannis broustis", "ahmed osama fathy atya", "thomas la porta", "srikanth v krishnamurthy", "sushil singh"], "keyword": ["network throughput", "network policy", "encoding", "measurements", "network coding", "simulation", "lifting equipment", "topology", "testbed"], "paperid": "75EDDEDD", "author_id": ["08166181", "1214B9E1", "4993507C", "7E4C479A", "7F2BD337", "80D42297"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["anja feldmann", "johannes grassler", "stefan schmid"], "keyword": ["servers", "virtualisation", "quality of service", "network topology", "topology", "cloud computing", "prototypes"], "paperid": "7765BC41", "author_id": ["795F7D7D", "7C3F396D", "85F093B2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["devu manikantan shila", "yu cheng"], "keyword": ["signal to noise ratio", "bandwidth", "interference", "wireless networks", "channel capacity"], "paperid": "7A5C888B", "author_id": ["03F8F3DA", "7E0D0C66"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "yousi zheng", "pradeep sinha"], "keyword": ["online algorithm", "data handling", "schedules", "scheduling", "parallel programming", "algorithm design and analysis", "parallel algorithms", "writing", "job scheduling"], "paperid": "7DD84836", "author_id": ["7C52E731", "7E3ED761", "86217765"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jing yuan", "shaojie tang"], "keyword": ["submodular", "wireless sensor networks", "games", "scheduling", "sensors", "algorithm design and analysis", "correlation", "schedules"], "paperid": "75AC6B99", "author_id": ["03B00DCC", "7E282E35"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["boxuan gu", "adam c champion", "zhezhe chen", "dong xuan", "xinfeng li", "feng qin", "gang li"], "keyword": ["security", "mobile computing", "tracking", "switches", "sensitivity"], "paperid": "7FEF833A", "author_id": ["790B2186", "7A2B3920", "7D9184FD", "7F2FAC50", "7F42BF5F", "80C0D27F", "B3D530E6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eytan modiano", "hulya seferoglu"], "keyword": ["routing", "vectors", "scheduling algorithms", "wireless networks", "algorithm design and analysis", "backpressure routing"], "paperid": "768C45DB", "author_id": ["09DF3E99", "75256FAE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michele garetto", "emilio leonardi", "giuseppa alfano"], "keyword": ["indexes", "mobile ad hoc networks", "mobile communication", "mobile computing", "throughput", "ad hoc networks", "wireless networks", "protocols"], "paperid": "77E71A1B", "author_id": ["061E6BE8", "7DF3884C", "7F1C4F9A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["marwan krunz", "wessam afifi"], "keyword": ["adaptive strategy", "signal to noise ratio", "probability", "spectrum efficiency", "throughput", "cognitive radio", "interference", "measurement", "sensors"], "paperid": "77458A88", "author_id": ["13D8B6A7", "780C2772"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yang yang", "miao jin", "hongyi wu", "yao zhao"], "keyword": ["wireless sensor networks", "topology", "memory", "routing", "graph theory", "information retrieval", "network topology", "shape"], "paperid": "79F1B887", "author_id": ["3DAE97B4", "7FE34476", "808AA8DF", "84C1599A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alberto dainotti", "kimberly c claffy", "emile aben", "kyle benson"], "keyword": ["natural disasters", "worms", "computer network security", "malicious software", "packet loss", "internet", "autonomous system", "routing"], "paperid": "808A1050", "author_id": ["426A1095", "76482346", "7D2FE2E7", "81336334"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eliane bodanese", "john bigham", "gareth tyson"], "keyword": ["protocols", "mobile communication", "resilience", "routing", "internet"], "paperid": "78E7E432", "author_id": ["057173F4", "77BDD8BD", "7D0AD35F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei dong", "yunhao liu", "chun chen", "chao huang", "biyuan mo"], "keyword": ["indexes", "stream", "meta data", "binary codes", "embedded systems", "wireless sensor networks", "wireless communication", "r2"], "paperid": "7A9104BC", "author_id": ["7DB91B72", "7F046EF7", "803BEDCD", "8310D108", "84A0B53A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rachid elazouzi", "salah eddine elayoubi", "eitan altman", "yuedong xu"], "keyword": ["base station", "pde", "probability", "markov processes", "ode", "throughput", "wireless networks", "mathematical model", "partial differential equations", "probability generating function", "ordinary differential equations"], "paperid": "807403BA", "author_id": ["0E158259", "78A10F66", "7D7B9DD9", "80A9AF39"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["nakjung choi", "yanghee choi", "taesoo kwon", "bing han", "xiaofei wang"], "keyword": ["psnr", "cellular traffic", "mobile communication", "wimax", "cellular networks", "video quality", "bandwidth"], "paperid": "7912DEC7", "author_id": ["7D39FCAB", "7EB59AC7", "7F9A84E5", "84F7E504", "852327FA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["victor omwando", "prasant mohapatra", "kefeng tan", "jindan zhu", "wei cheng"], "keyword": ["software radio", "transmitter", "decision support systems"], "paperid": "7E84A907", "author_id": ["0EF36CF9", "7F1AA18B", "8043A8AC", "814F6CCC", "F7491EE0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hyungbae park", "sejun song", "chintser huang", "baekyoung choi"], "keyword": ["privacy", "wormholes", "dss", "sensors", "wireless communication", "mobile communication", "wireless sensor networks", "permeability", "uncertainty"], "paperid": "757B574D", "author_id": ["7D65666E", "8000959A", "80A1372B", "82394B98"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["junzhou luo", "xinwen fu", "kui wu", "z ling"], "keyword": ["servers", "correlation", "computer network security", "routing protocols", "transport protocols"], "paperid": "7D7F2CF9", "author_id": ["7D40293A", "7F49D8D4", "80187FB7", "81038967"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["laurent vanbever", "stefano vissicchio", "olivier bonaventure", "luca cittadini"], "keyword": ["maintenance engineering", "routing protocols", "network topology", "routing", "oscillators", "topology"], "paperid": "7C1DBD50", "author_id": ["013396E1", "08380A3F", "1637892C", "78354644"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["stefan schmid", "galen wilkerson", "ramin khalili"], "keyword": ["data analysis", "transportation", "sociology", "statistics"], "paperid": "7BFF61C3", "author_id": ["80B6AFF2", "8367248C", "836F8B0D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "xiaojun lin", "gagan gupta", "bo ji"], "keyword": ["queueing theory", "scheduling", "indexes", "throughput", "numerical analysis", "markov processes", "servers", "greedy algorithms"], "paperid": "7685C11E", "author_id": ["7C52E731", "7DD9C61E", "80FBF08E", "84FC6F18"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yu zhao", "tian he", "chuanping hu", "yunhuai liu", "athanasios v vasilakos"], "keyword": ["frequency diversity", "algorithm design and analysis", "robustness"], "paperid": "789962A1", "author_id": ["801EF509", "80388B5E", "8048447F", "814CE4A0", "85AA7D42"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tsunghan lin", "h t kung"], "keyword": ["software radio", "throughput", "antennas", "vectors", "decoding", "mimo", "compressive sensing"], "paperid": "80953A04", "author_id": ["7DD9C3A6", "7FB8889A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qingsi wang", "mingyan liu"], "keyword": ["throughput", "queueing theory", "wireless communication", "optimization", "power control", "stochastic processes", "computational complexity", "markov processes", "energy harvesting"], "paperid": "7629F6BD", "author_id": ["80A55C1A", "7D3C37B5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zhu han", "tian zhang", "zhigang cao", "wei chen"], "keyword": ["vectors", "closed form expression", "markov processes", "physical layer", "transmitters", "markov decision process", "energy harvesting", "resource management", "optimization", "stochastic processes"], "paperid": "7EE347E3", "author_id": ["7E1FB9D3", "7EB9D7AF", "7F2628CC", "8556CD30"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["anshu chaturvedi"], "keyword": [], "paperid": "01A23E0D", "author_id": ["7E200CBE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["steven a benno", "danny de vleeschauwer", "andre t beck", "ross h miller", "harish viswanathan", "gang li"], "keyword": ["optimization", "transport protocols", "base stations", "video", "throughput", "video quality", "resource allocation", "scheduling", "lte"], "paperid": "78A3E879", "author_id": ["6D9B7750", "80A0F9B2", "8111E987", "81EBDB35", "829D62A9", "B3D530E6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["patrick crowley", "haowei yuan"], "keyword": ["content management", "web server", "internet", "transport protocols", "network throughput", "computer architecture"], "paperid": "7C64048B", "author_id": ["7FFDACD3", "7E99F5C4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["antonio pescape", "alessio botta"], "keyword": ["digital subscriber lines", "satellite communication", "internet", "broadband networks", "downlink", "jitter", "satellites", "3g", "throughput", "adsl"], "paperid": "7FC4FCEE", "author_id": ["12524DE8", "7B76361F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaohua jia", "zhu wang", "shaojie tang", "xiaohua xu", "pengjun wan", "zhiguo wan"], "keyword": ["wireless networks", "scheduling", "stability analysis", "interference", "vectors", "stability", "throughput"], "paperid": "7926AB4F", "author_id": ["7D4BC413", "7DA2AF00", "7E282E35", "7EBF591E", "8038E2BF", "80F25D10"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yan huo", "hongjuan li", "xiuzhen cheng", "xiaoshuang xing", "tao jing"], "keyword": ["hidden markov models", "gibbs sampling", "parameter estimation", "probability distribution", "bayesian inference", "cognitive radio network", "accuracy", "sampling methods", "sensors"], "paperid": "767899CD", "author_id": ["7AF6E87E", "7CEE12C3", "7F2DCA44", "8056BFBE", "8139B0E0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qiangsheng hua", "yuexuan wang", "jiguo yu", "francis c m lau", "dongxiao yu"], "keyword": ["interference", "asynchronous communications", "probability", "tv", "collision detection", "signal to noise ratio", "algorithm design and analysis", "network topology", "ad hoc networks", "radio broadcasting", "synchronization", "wireless networks"], "paperid": "79F9C3AA", "author_id": ["7628640F", "7F1FB139", "7F326862", "7F44A7D2", "80A1EB8A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["my t thai", "thach n dinh", "nam p nguyen"], "keyword": ["approximation algorithms", "community structure", "social networks", "modularity", "complex networks", "time complexity", "approximation theory", "computational complexity"], "paperid": "79FBD5CF", "author_id": ["7CF7EEBC", "7E4011C6", "814E93A3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["matteo varvello", "diego perino", "leonardo linguaglossa"], "keyword": ["data structures", "switches", "memory management", "computer networks", "network processor", "wire speed"], "paperid": "764C0C32", "author_id": ["76974283", "7D8FC512", "84796940"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["phil demar", "wenji wu"], "keyword": ["engines", "instruction sets", "central processing unit", "multicore processing"], "paperid": "7B959A8F", "author_id": ["58CA2B1C", "7DB2D870"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mo li", "yuanqing zheng"], "keyword": ["software radio", "estimation", "probabilistic logic", "rfid tags", "accuracy", "protocols"], "paperid": "75D0C57B", "author_id": ["7DDED2F4", "8172A2DD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["prakash mandaym comar", "pangning tan", "antonio nucci", "simanto saha", "lei liu"], "keyword": ["feature extraction", "unsupervised learning", "payloads", "internet", "support vector machines", "tree data structures", "learning artificial intelligence", "supervised learning", "kernel", "malware"], "paperid": "75501F6A", "author_id": ["79BC7464", "7DF5587D", "82B332F7", "83895BCE", "85740B98"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["weiyi zhang", "chonggang wang", "xiang sheng", "jian tang", "chenfei gao"], "keyword": ["wireless sensor networks", "approximation algorithms", "cognitive radio", "virtualisation", "linear programming", "wireless communication", "optimization", "integer programming", "communication complexity", "resource management"], "paperid": "78DAF538", "author_id": ["7D310961", "7FF1212D", "814AC8CC", "830790C1", "851F5A68"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["f richard yu", "shengrong bu", "yi qian"], "keyword": ["mobile computing", "stackelberg game", "cognitive radio", "mobile communication", "smart grids", "heterogeneous networks", "games", "electricity", "energy efficiency", "femtocells", "interference", "energy conservation"], "paperid": "80F111C0", "author_id": ["7E473167", "7F8760AB", "81698A22"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michael j neely"], "keyword": ["vectors", "scheduling", "optimization", "stochastic programming", "utility theory", "distributed algorithms", "sensor fusion", "set theory"], "paperid": "78F707E6", "author_id": ["7E65174D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["claudio e palazzi"], "keyword": ["games", "spread spectrum communication", "mobile computing", "mobile devices", "internet connectivity", "wireless networks", "internet", "logic gates"], "paperid": "7A430DC6", "author_id": ["7967E0DA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei rao", "xue liu", "jianying luo"], "keyword": ["resource allocation", "servers", "scheduling", "minimization", "electricity", "cloud computing", "internet"], "paperid": "75424025", "author_id": ["7E24DEED", "7F339A86", "815492CD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei dong", "yuan he", "yunhao liu", "tong zhu"], "keyword": ["measurement system", "correlation", "routing", "performance measurement", "wireless sensor networks", "packet loss", "radiation detectors", "empirical measurement", "map", "protocols", "networks", "hardware", "performance", "ad hoc networks", "measurement"], "paperid": "75BF1751", "author_id": ["7DB91B72", "7EF8CB64", "7F046EF7", "7F27172B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["swati rallapalli", "gene moo lee", "wei dong", "lili qiu", "yichao chen"], "keyword": ["mobile devices", "user interfaces", "markov processes", "predictive models", "location based services", "mobile computing", "wireless communication", "measurement", "accuracy"], "paperid": "7E249A00", "author_id": ["763F4DB6", "7CEBC465", "7DB91B72", "7E7A2A0F", "862A6B3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wilfried n gansterer", "arthur w berger"], "keyword": ["computer network security", "merging", "internet", "resource allocation", "quality of service", "clustering algorithms", "world wide web", "cloud computing"], "paperid": "7FFE43F9", "author_id": ["76F23DF3", "809FA685"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tiphaine pheneau", "vania conan", "marcelo dias de amorim"], "keyword": ["computer networks", "communication networks", "automatic repeat request", "protocols", "routing"], "paperid": "7DFDC5E2", "author_id": ["03D3DF14", "0950B205", "8255BE14"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eytan modiano", "brooke shrader", "nathaniel m jones"], "keyword": ["routing", "encoding", "wireless networks", "network coding", "throughput", "scheduling"], "paperid": "7CAAA491", "author_id": ["09DF3E99", "77F87549", "80230510"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["olivier mehani", "yan shvartzshnaider", "david levy", "maximilian ott"], "keyword": ["information systems", "engines", "internet", "routing", "databases", "graph theory", "iron"], "paperid": "7D7754FA", "author_id": ["0351818D", "0F3A9BBD", "7DF3AE93", "7F558048"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mansoor alicherry", "t v lakshman"], "keyword": ["bandwidth", "cloud computing", "optimization", "measurement", "approximation algorithms", "vm", "computational complexity", "np hard problem", "minimization"], "paperid": "80ECC252", "author_id": ["75E35CE4", "790E800C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qian wang", "lingyu wang", "kui ren", "cong wang", "zhen xu"], "keyword": ["algorithm design and analysis", "cryptography", "convex functions", "data integrity", "convex optimization", "optimization", "cloud computing", "security", "outsourcing", "computational modeling"], "paperid": "7768540E", "author_id": ["7DDB89CC", "7E3002D6", "7F6340F3", "99C499AE", "DA3AFDA4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["cedric westphal", "dipankar raychaudhuri", "abhishek chanda"], "keyword": ["meta data", "optimization", "content management", "network architecture", "control systems", "servers", "computer architecture"], "paperid": "7BD9B045", "author_id": ["7585D277", "76313A5B", "7D54F6C9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["s k dwivedi", "jitendra nath singh"], "keyword": [], "paperid": "223F08B3", "author_id": ["8018756A", "85C4A044"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yu gong", "m d taht", "cristina testa", "davide rossi", "s valenti"], "keyword": ["linux kernel", "internet", "kernel", "simulation", "protocols", "active queue management", "inductors", "tcp", "transport protocols", "queueing theory", "bufferbloat"], "paperid": "80739F41", "author_id": ["41A6A175", "7ABBE398", "80BBC0EF", "80D12A31", "824BD198"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["biao han", "jie li"], "keyword": ["ad hoc networks", "polynomial time", "security", "polynomials", "communication complexity", "wireless communication", "channel capacity"], "paperid": "7AA5A301", "author_id": ["8055822F", "81811562"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kave salamatian", "laurent mathy", "steve uhlig", "layong luo", "gaogang xie", "yingke xie"], "keyword": ["static random access memory", "routing", "virtualisation", "scalability", "memory management", "fib", "forwarding information base", "merging"], "paperid": "7EE3512A", "author_id": ["09EFBC10", "10EBC610", "76475CCE", "7DEF2728", "7E8B2C6E", "7E901E1F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["francois baccelli", "ilkka norros", "remi varloot", "fabien mathieu"], "keyword": ["p2p", "availability", "stochastic geometry", "bandwidth", "fluids", "scalability", "mathematical model"], "paperid": "802C3827", "author_id": ["03844107", "061AD2B1", "0B00B5F4", "7E428AA5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["pengfei huang", "xudong wang"], "keyword": ["error probability", "phase control", "wireless communication", "frequency diversity", "cryptography", "coherence", "radio transmitters", "antennas"], "paperid": "8050DA55", "author_id": ["7D846AF9", "7ECDA184"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongyi yao", "wentao huang", "tracey ho", "sidharth jaggi"], "keyword": ["reliable multicast", "network coding", "encoding", "redundancy", "vectors", "decoding"], "paperid": "7C27D5BD", "author_id": ["7DE8F252", "7E3C5D1E", "7F16A3E4", "7F2C28FA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["raul etkin", "jeongkeun lee", "sungju lee", "kang g shin", "eugene chai"], "keyword": ["mimo", "transmitters", "psnr", "antennas", "ofdm"], "paperid": "7527D10B", "author_id": ["76620953", "7E3F25E5", "7F4E5C0E", "80C0034C", "83D4DE1F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wenji chen", "yong guan", "yang liu"], "keyword": ["load balancing", "algorithm design and analysis", "dictionaries", "radiation detectors", "resource allocation", "data structures", "data models", "security", "internet", "computational complexity"], "paperid": "79B82A6F", "author_id": ["7E83FBFB", "7E8502DC", "8578C401"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sriharsha gangam", "parmanand sharma", "sonia fahmy"], "keyword": ["network flows", "system monitoring", "computer network security", "accuracy", "bandwidth", "enterprise network", "engineering"], "paperid": "7A3E4BBA", "author_id": ["79EE9C59", "7D0D96E8", "8173ECDE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ivan stojmenovic", "cheng wang", "changjun jiang", "siqian yang", "zhong li"], "keyword": ["mobile computing", "mobile communication", "human factors", "vectors"], "paperid": "7418979B", "author_id": ["0F179263", "7D249880", "7D5DABC8", "7E29185D", "804A53EB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ahmed helmy", "gautam s thakur"], "keyword": ["wireless networks", "mobile computing", "accuracy", "internet", "protocols", "mobile communication"], "paperid": "7E713713", "author_id": ["750CD34C", "80D08A56"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["janos tapolcai", "lajos ronyai", "peter babarczi", "pinhan ho"], "keyword": ["testing", "failure analysis", "cost function", "switches"], "paperid": "76BAF105", "author_id": ["10926C15", "12274B9E", "68C16C85", "7E7F84AF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["giorgos aristomenopoulos", "p vlahopoulos", "gregory katsaros", "symeon papavassiliou"], "keyword": ["quality of service", "multimedia", "user interfaces", "prototypes", "mobile communication", "servers", "mobile"], "paperid": "7820AA9E", "author_id": ["5988924B", "761BAF33", "76B63A42", "79542595"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yanmin zhu", "qian zhang", "hongjian wang"], "keyword": ["wireless sensor networks", "dataset", "accuracy", "vehicular networks", "entropy", "compressed sensing", "routing"], "paperid": "7D8A83E6", "author_id": ["7EF7DEFA", "80240ADD", "86318E04"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bin cao", "rongxing lu", "xuemin shen", "xiaodong lin", "jon w mark", "qinyu zhang"], "keyword": ["optimization", "silicon", "cognitive radio", "games", "throughput", "ccrn", "resource management", "game theory"], "paperid": "75F17849", "author_id": ["76D35C24", "7D98871A", "7EA9B3E8", "7EF517A4", "80522E17", "81693653"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kamran nishat", "ihsan ayyub qazi", "ruwaifa anwar", "haseeb niaz", "zahid akhtar", "mohamed sukri mat ali"], "keyword": ["data rates", "noise", "measurement"], "paperid": "775C868A", "author_id": ["47094E5D", "78DD3259", "7A2B1A97", "7BCD55C2", "85896844", "85908F8E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiuyuan zheng", "yingying chen", "yu gan", "jie yang"], "keyword": ["wireless communication", "wireless sensor networks", "tomography", "accuracy"], "paperid": "761110E6", "author_id": ["7E0BAEB9", "80EF83E1", "8208490A", "86058467"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carlo fischione", "prodromosvasileios mekikis", "piergiuseppe di marco", "georgia athanasiou"], "keyword": ["routing", "reliability", "computer and information science", "computer science", "resource allocation", "load balancing", "measurement"], "paperid": "7EB0A2E4", "author_id": ["101DF354", "76053A36", "7FFC8EAB", "83BF1E37"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["han zhang", "christos papadopoulos", "dan massey"], "keyword": ["dpi", "entropy", "payloads", "inspection", "computer network security", "cryptography", "detectors", "malware", "encryption"], "paperid": "7FBEA7B8", "author_id": ["5A47F7C6", "7D5C69F0", "7E2605EE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["cheng liu", "meilong jiang", "geekung chang", "sampath rangarajan", "karthikeyan sundaresan"], "keyword": ["mobile communication", "baseband", "wimax", "optical switches", "computer architecture", "ofdm modulation"], "paperid": "77766439", "author_id": ["7E268D8A", "7E62F51C", "8162A05B", "8168F2ED", "85E1FCBE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["faramarz fekri", "mohsen sardari", "ahmad beirami", "jun zou"], "keyword": ["encoding", "clustering algorithms", "network flows", "computer networks", "servers", "classification algorithms", "redundancy", "data compression", "entropy"], "paperid": "77C86637", "author_id": ["0EB5C123", "7A809EE3", "7BBE59A4", "82B602BE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["frederic rousseau", "maria isabel vergara gallego"], "keyword": ["synchronization", "wireless sensor networks", "decoding", "energy conservation", "schedules", "duty cycle", "low power electronics", "maintenance engineering", "sensors"], "paperid": "80DF3F60", "author_id": ["7FF3CEFF", "84A4A0B0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["irem koprulu", "ness b shroff", "han cai"], "keyword": ["mobile communication", "tin", "throughput", "wireless networks", "mobile computing"], "paperid": "75C63376", "author_id": ["452F6388", "7C52E731", "8212FED4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dmitri loguinov", "zhongmei yao", "daren b h cline"], "keyword": ["stochastic processes", "resilience", "stochastic model", "shape", "linear approximation", "graph theory", "random variables", "tuning", "stochastic modeling"], "paperid": "7C9B85D7", "author_id": ["12BAC6B5", "7F18337C", "7F42ECCF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yunfei hou", "chunming qiao", "yunjie zhao", "xu li"], "keyword": ["channel allocation", "unicast", "protocols", "human factor", "bandwidth allocation", "traffic management", "bandwidth", "optimization problem", "vanet", "wireless communication"], "paperid": "79B569C1", "author_id": ["7DD58184", "7E0B9FBE", "82A42F29", "851AF66C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["r m nelms", "shiwen mao", "yingsong huang"], "keyword": ["stochastic programming", "zinc", "decision support systems", "quality of service", "energy storage systems", "renewable energy sources", "electric energy", "stability", "scheduling", "electricity", "lyapunov optimization", "online algorithm", "smart grid", "optimization"], "paperid": "7CC1CC1A", "author_id": ["466FF6B3", "7E6C3BEA", "7F6BA95C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yaling yang", "ting wang"], "keyword": ["algorithm design and analysis", "sdr", "robustness", "vectors", "wireless communication"], "paperid": "75ECF65F", "author_id": ["8000ABEA", "A82EB173"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hong xu", "baochun li"], "keyword": ["computer networks", "transport protocols", "ecmp", "fct", "resource allocation", "data centers", "queueing theory", "head of line blocking"], "paperid": "78E2B693", "author_id": ["7E778E7A", "7F13CFD4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ivica rimac", "romit roy choudhury", "xuan bao", "uichin lee", "yin lin"], "keyword": ["mobile devices", "internet", "mobile communication", "servers", "mobile ad hoc networks"], "paperid": "7B474FF0", "author_id": ["6F9C0B81", "7DF9871A", "804A4D8D", "81618B96", "849249CA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ruben merz", "julien herzen", "patrick thiran"], "keyword": ["resource management", "bandwidth", "ap", "interference"], "paperid": "7E78F7DF", "author_id": ["74663417", "7B13BF83", "84A25D33"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["stefan ruehrup", "alessandro dalconzo", "arthur w berger", "pierfrancesco urbano"], "keyword": ["dispersion", "internet", "graph theory", "computer network security", "topology", "dsl", "clustering algorithms", "cryptography"], "paperid": "7D1DAF0C", "author_id": ["77025979", "7A1A5F65", "809FA685", "859E2C5B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["fan bai", "xuemin shen", "tom h luan"], "keyword": ["fading", "physical layer", "media", "throughput", "vehicular networks"], "paperid": "7A99ECB0", "author_id": ["7E8852B4", "7EA9B3E8", "85DAD844"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["takeshi mitamura", "kenji fukuda", "seiki sato"], "keyword": ["organizations", "security", "servers", "internet", "robustness"], "paperid": "76D249AB", "author_id": ["75287DA1", "7FF0E767", "84D7C48A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["adisorn lertsinsrubtavee", "naceur malouch", "serge fdida"], "keyword": ["availability", "dynamic scheduling", "cognitive radio networks", "resource management", "bandwidth"], "paperid": "7F3A7397", "author_id": ["0341FEAD", "7C2E0D07", "80454F22"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["elisha j rosensweig", "jim kurose", "daniel sadoc menasche"], "keyword": ["network topology", "topology", "content management", "routing", "markov processes", "steady state"], "paperid": "75A9DF27", "author_id": ["17D13BE8", "5F653421", "85BCB9FF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ophir frieder", "xiaohua jia", "hongwei du", "pengjun wan", "zhiguo wan", "guojun dai"], "keyword": ["approximation algorithms", "wireless networks", "schedules", "scheduling", "minimisation", "approximation theory", "interference"], "paperid": "79725879", "author_id": ["75BF6D6C", "7D4BC413", "7E979064", "8038E2BF", "80F25D10", "847FC6C7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ilias gkortsilas", "konstantinos deltouzos", "nikolaos efthymiopoulos", "spyros denazis"], "keyword": ["bandwidth", "media", "quality of service", "servers", "cloud", "overlay networks", "distributed algorithms", "p2p"], "paperid": "7ACDA633", "author_id": ["0F3C2B01", "0FC2DA0B", "1384BA56", "853A8D07"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yanchao zhang", "jingchao sun", "rui zhang"], "keyword": ["protocols", "accuracy", "indexes", "estimation", "mobile computing", "data privacy", "pattern matching", "privacy", "data structures", "bloom filter"], "paperid": "790ED3A8", "author_id": ["7E80366D", "7F0931AE", "86324E1B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["john c s lui", "daniel zeng", "fangming liu", "hai jin", "jian guo"], "keyword": ["distributed algorithm", "servers", "bandwidth", "bandwidth allocation", "game theory", "resource management", "bismuth", "virtual machines", "channel allocation", "cloud computing", "games", "nash bargaining solution", "nist", "network performance"], "paperid": "759CBB4C", "author_id": ["79EA6402", "805970EC", "80D09303", "813F6C3E", "84039CA8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["patrick senac", "anhdung nguyen", "michel diaz"], "keyword": ["routing", "graph theory", "navigation"], "paperid": "7E8D2616", "author_id": ["6D2B4DCF", "7E837888", "7EF556B4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shruti nagpal", "sunil kumar khatri", "ashok kumar"], "keyword": [], "paperid": "01C0994D", "author_id": ["7E586072", "7EDBF323", "85D6C6F1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongbo jiang", "guang tan", "tian he", "yunhuai liu", "shuai wang"], "keyword": ["network backbone", "measurement", "algorithm design and analysis", "radio broadcasting", "clustering algorithms", "encoding", "wireless networks", "network coding", "computer networks", "connected dominating set", "broadcast", "computer aided software engineering"], "paperid": "7B56D656", "author_id": ["7E1B4E11", "7F6B75DC", "80388B5E", "814CE4A0", "849B8458"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["robert doverspike", "mario kosseifi", "lei ying", "guangzhi li", "dahai xu", "zihui ge", "yingying chen", "shan zhou", "yu jin", "jie yang"], "keyword": ["cellular network", "adaboost", "antenna", "feature extraction", "data services", "prediction algorithms", "measurement"], "paperid": "7C2CBE01", "author_id": ["0CC9ED62", "78E0D0D5", "7DF51EF1", "7E81BED3", "7F7A60FE", "80CC7AAE", "80EF83E1", "84B188C1", "8584DFB9", "86058467"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie wu", "yaxiong zhao"], "keyword": ["distributed databases", "parallel programming", "indexes", "protocols", "sorting", "acceleration", "distributed file system", "public domain software", "pricing", "big data", "programming", "parallel processing", "java"], "paperid": "76CBF234", "author_id": ["7D59933A", "80509DC6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qinghua li", "wei gao"], "keyword": ["mobile devices", "mobile computing", "schedules", "scheduling"], "paperid": "813D06FE", "author_id": ["7D0AFB69", "83D9A883"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["nuno c martins", "jeanmarc seigneur", "rute sofia", "paolo di francesco", "alessandro bogliolo", "walter moreira", "carlos ballester", "valentin moreno"], "keyword": ["cryptography", "security associations", "logic gates", "android", "trusted computing", "wireless networks"], "paperid": "7C17712E", "author_id": ["768C8873", "783FBF7D", "784E3F83", "7B0B041C", "7B529AE7", "7D51FF10", "7E2D64DC", "8408B341"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gil zussman", "peter r kinget", "luca p carloni", "gerald stanje", "john sarik", "maria gorlatova", "baradwaj vigraham", "marcin szczodrak", "robert margolies", "jianxun zhu", "ioannis kymissis"], "keyword": ["photovoltaic systems", "organic solar cell", "wireless sensor networks", "prototypes", "energy harvesting", "rfid", "transceivers"], "paperid": "758F5831", "author_id": ["0EF250B7", "0F00D40B", "12377E5E", "123D3A80", "47FCA6A1", "4B64DB63", "719E0C0C", "771C69B2", "77884EF2", "7FBBC106", "8550389D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "c emre koksal", "sungju lee", "yin sun"], "keyword": ["scheduling", "channel coding", "transmitters", "mutual information", "markov processes", "curse of dimensionality", "decision theory", "computational complexity", "channel state information", "resource allocation", "downlink"], "paperid": "79B83076", "author_id": ["7C52E731", "7E16770E", "7F4E5C0E", "7FE33C5F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["my t thai", "yilin shen", "d t nguyen"], "keyword": ["schedules", "wireless sensor networks", "quality of service", "mobile communication", "mobile computing", "approximation algorithms", "measurement", "approximation theory"], "paperid": "75DB7088", "author_id": ["7CF7EEBC", "7DBCECD4", "81407AA8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xue liu", "chen zhang"], "keyword": ["cloud computing", "scalability", "protocols", "queueing theory", "fault tolerance", "message passing"], "paperid": "7738D164", "author_id": ["7F339A86", "A46DC7B7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["fan wu", "tianrong zhang", "chunming qiao"], "keyword": ["interference", "game theory", "wireless networks", "resource management", "channel allocation", "cost accounting", "vectors"], "paperid": "7C4F2CEF", "author_id": ["7D07EAA6", "7DB0C57D", "7E0B9FBE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["julinda stefa", "marco v barbera", "alessandro mei", "sokol kosta"], "keyword": ["mobile communication", "bandwidth", "cloud computing", "mobile computing", "cloning"], "paperid": "79D1D44F", "author_id": ["5FC0D623", "7E508C1C", "802EFD21", "82B55675"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["r m karthik", "arvind chakrapani"], "keyword": ["mathematical model", "next generation networks", "tin"], "paperid": "79E4CACB", "author_id": ["7E5055CC", "851FACAC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiangyang li", "dapeng cheng", "yuan he", "yunhao liu", "yin wang"], "keyword": ["synchronization", "signal to noise ratio", "constructive interference", "wireless sensor networks"], "paperid": "7CA6FF1D", "author_id": ["7DD9A433", "7E936975", "7EF8CB64", "7F046EF7", "809E49E2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eli brosh", "yuval rochman", "hanoch levy"], "keyword": ["algorithm design and analysis", "resource allocation", "network topology", "servers", "stochastic processes", "motion pictures", "sensitivity analysis", "resource utilization"], "paperid": "7C65D659", "author_id": ["046EEE11", "7519BDC3", "80173F55"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["liane lewineytan", "reuven cohen", "joseph naor", "danny raz"], "keyword": ["bandwidth allocation", "virtual machines", "network topology", "cloud computing", "bandwidth", "resource management", "approximation theory", "storage area networks", "resource allocation", "computational complexity", "resource utilization", "greedy algorithms", "routing", "approximation algorithms", "np hard problem"], "paperid": "7AF7457D", "author_id": ["78884A53", "7E284EE1", "7EB48EE9", "83051545"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["taeho jung", "xiangyang li", "meng wan", "zhiguo wan"], "keyword": ["encryption", "authorisation", "cryptography", "data privacy", "cloud computing", "generators", "gold", "servers", "attribute based encryption", "public key"], "paperid": "7A1F29C3", "author_id": ["7D0AF3F6", "7DD9A433", "7E00A81B", "80F25D10"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["min chen", "yuguang fang", "zhen mo", "wen luo", "shigang chen"], "keyword": ["vectors", "servers", "protocols", "supply chain", "logistics", "transportation", "scalability"], "paperid": "79B678DB", "author_id": ["57DC41D1", "808745B0", "80B16A0F", "85C34109", "86205E43"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["valerio arnaboldi", "andrea passarella", "marco conti", "fabio pezzoni"], "keyword": ["cognition", "internet", "experimental analysis", "size", "accuracy", "indexes", "communication networks", "human behaviour", "social characteristics"], "paperid": "813A772E", "author_id": ["042D21CC", "49033CB8", "7517681E", "7AE83684"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["r srikant", "siva theja maguluri"], "keyword": ["routing", "scheduling", "schedules", "servers", "vectors", "cpu", "markov processes", "random variables", "throughput", "stochastic processes", "resource allocation", "cloud computing", "networks", "hardware", "performance", "load balancing", "stochastic model", "memory", "virtual machines", "job queue", "queueing theory"], "paperid": "7BBB5148", "author_id": ["765BB63F", "781034F6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sachin s khade", "s l badjate"], "keyword": [], "paperid": "1887937E", "author_id": ["7FAD8981", "84B7823F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eytan modiano", "greg kuperman"], "keyword": ["integer programming", "routing", "multiprotocol label switching", "failure analysis", "np hard", "switches", "resource management", "linear programming", "computational complexity", "network protection", "lagrangian relaxation"], "paperid": "75BC0988", "author_id": ["09DF3E99", "7C80C941"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yiming chen", "dejian ye", "xiuyan jiang"], "keyword": ["forward error correction", "qos", "packet loss", "tv", "middleware", "encoding", "decoding", "servers"], "paperid": "78576D01", "author_id": ["7D832C73", "80455C6F", "815E52A5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongli zhang", "panpan li", "xiangzhan yu", "zhigang zhou", "xiaojiang du"], "keyword": ["outsourcing", "cloud computing", "sensitive information", "data privacy", "trusted computing", "cryptography", "algorithm design and analysis", "encryption", "privacy", "data retrieval"], "paperid": "78773A4F", "author_id": ["7E23FC59", "7EB1CC24", "7F1D4EA7", "80CB4077", "80DA9D0C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["roksana boreli", "dominik schatzmann", "mentari djatmiko", "xenofontas dimitropoulos", "aharon friedman"], "keyword": ["data privacy", "switches", "protocols", "privacy", "ping", "traceroute", "computer network security", "ixp", "secure multiparty computation", "internet"], "paperid": "752C9151", "author_id": ["12E64CDA", "70ACE07D", "72E19D21", "7981451F", "83AD83A6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xin wang", "baochun li", "jun li"], "keyword": ["data integrity", "distributed databases", "linear code", "resilience", "redundancy", "bandwidth"], "paperid": "760B17FB", "author_id": ["7E353776", "7F13CFD4", "85D1C505"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chihchuan cheng", "picheng hsiu"], "keyword": ["dynamic programming", "scheduling", "signal processing", "mobile communication", "signal strength", "schedules", "data handling", "mobile computing"], "paperid": "7548B830", "author_id": ["84A2DD70", "68CE25E7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yung yi", "jeongwoo cho", "hyeryung jang", "hyojung lee"], "keyword": ["stability analysis", "games", "network neutrality", "internet", "scheduling", "statistics", "sociology", "computer and information science", "economics"], "paperid": "7D4E1919", "author_id": ["7CEEA7C0", "7D656C89", "7F3E6F38", "80F2AE09"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongzi zhu", "shan chang", "xuemin shen", "yanmin zhu", "mianxiong dong", "minglu li"], "keyword": ["vehicular networks", "social network analysis", "mobility", "routing", "global positioning system", "entropy", "end to end delay", "algorithm design and analysis"], "paperid": "7C0726AC", "author_id": ["7CEC9798", "7E9E67E8", "7EA9B3E8", "7EF7DEFA", "7F103A05", "7FEDACCE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chuan wu", "minghua chen", "francis c m lau", "zongpeng li", "chuanxiong guo", "linquan zhang"], "keyword": ["prediction algorithms", "data aggregation", "routing", "optimization", "cloud computing", "competitive ratio", "algorithm design and analysis", "geographical location"], "paperid": "7C66C152", "author_id": ["7DBF5A93", "7E248BC3", "7F44A7D2", "8003BACF", "802C378E", "849465CE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mark crovella", "brian eriksson"], "keyword": ["internet", "accuracy", "geology", "global positioning system", "geometry", "network topology"], "paperid": "78DA26AE", "author_id": ["05729C1A", "7FFC9E94"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ihsun chuang", "kuanrong lee", "yauhwang kuo", "hsiaoyun wu"], "keyword": ["ttr", "failure analysis", "algorithm design and analysis", "simulation", "emerging technologies", "cognitive radio", "synchronization"], "paperid": "764302D7", "author_id": ["7B40C025", "8071F75B", "84B90647", "84C9584B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["minyou wu", "wei shu", "linghe kong", "jialiang lu", "song yang"], "keyword": ["probability", "wireless communication", "wireless sensor networks", "probabilistic logic", "remote monitoring", "routing", "patient monitoring"], "paperid": "7BE6A052", "author_id": ["7DDB4399", "7EE943FA", "7FD2168F", "80C99777", "84B732D9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alonso silva", "patricio reyes"], "keyword": ["knowledge engineering", "computational complexity", "probability distribution", "marketing", "np hard problem", "topology", "social networks", "greedy algorithms", "communication networks", "network topology"], "paperid": "7BDB8C42", "author_id": ["816C974B", "7F4206FB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["emmanuel baccelli", "mesut gu\u0308nes", "matthias wa\u0308hlisch", "oliver hahm", "thomas c schmidt"], "keyword": ["iot", "internet", "sensor networks", "linux", "internet hosts", "real time systems", "memory management", "multithreading", "operating system", "microcontrollers", "kernel"], "paperid": "7BD555D2", "author_id": ["12A62478", "36F619A7", "3E0C48C7", "751CC6F5", "7E6A8EE7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["leandros tassiulas", "constantinos fragiadakis", "georgios s paschos", "leonidas georgiadis"], "keyword": ["encoding", "stochastic processes", "statistics", "throughput", "network coding", "decoding", "radio receivers", "stability analysis", "wireless networks"], "paperid": "7EEF721C", "author_id": ["0F6CB05B", "4BAFAE2B", "75F52039", "7A234B07"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei xi", "zhiping jiang", "jizhong zhao", "xiangyang li", "jinsong han"], "keyword": ["cryptography", "authentication", "ofdm", "decorrelation", "phy layer", "channel state information"], "paperid": "7DF91450", "author_id": ["7D03A1CA", "7DA0E5ED", "7DAA0D83", "7DD9A433", "7F5B1F5C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["udi weinsberg", "oded argon", "yuval shavitt"], "keyword": ["harmonic analysis", "phase noise", "power spectral density", "resource allocation", "internet", "traffic shaping", "load balancing", "resource utilization", "robustness"], "paperid": "7A403038", "author_id": ["056B4C5D", "11025F52", "7C8F4F08"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rong du", "xinping guan", "zhiyi zhou", "cailian chen"], "keyword": [], "paperid": "79F77066", "author_id": ["7E4B8F14", "7E507A47", "7EDB1652", "7F95C16B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["biying shou", "jianwei huang", "lingjie duan"], "keyword": ["internet", "cost accounting", "games", "game theory", "pricing", "elasticity"], "paperid": "7FB96F9D", "author_id": ["7A919964", "7E9A2A72", "7FEE246E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["swati rallapalli", "leo razoumov", "yin zhang", "wei dong", "lili qiu", "tae won cho", "rittwik jana", "k k ramakrishnan"], "keyword": ["decision support systems", "ideal", "mobile computing", "electronic commerce", "vectors", "tendering", "cost accounting", "dynamic scheduling", "femtocells", "pricing", "wireless networks", "resource management", "reverse auction", "commerce", "economics", "bidding process", "cellular networks", "optimization"], "paperid": "7D2E68DF", "author_id": ["763F4DB6", "7A03D3FD", "7D41530D", "7DB91B72", "7E7A2A0F", "7E82ECA4", "7EBF8011", "7F26F553"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["esa hyytia", "jorg ott"], "keyword": ["capacity", "numerical analysis", "monte carlo methods", "percolation theory", "ad hoc networks", "space time", "percolation", "c 4", "poisson point process", "mobility", "criticality"], "paperid": "77E763C6", "author_id": ["7983C872", "78BDB00F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie gao", "wei zeng", "xianfeng gu", "xiaomeng ban", "mausumi goswami"], "keyword": ["data storage", "data retrieval", "random walks", "indexing", "sensor networks", "motion planning", "sensor fusion", "data integration", "harmonic analysis", "planning", "shape"], "paperid": "7C374131", "author_id": ["76230F36", "7D8C0DC8", "7DF401BD", "7FD0E867", "83883F3B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiangyang li", "shaojie tang", "dapeng wu", "qiuyuan huang"], "keyword": ["greedy algorithm", "np hard", "scheduling", "minimization", "strips", "approximation algorithms", "randomized algorithm", "peak demand", "schedules"], "paperid": "781F0FD2", "author_id": ["7DD9A433", "7E282E35", "7EB8A595", "7FEC73B6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mihaela van der schaar", "shaolei ren", "byunggook kim", "jangwon lee"], "keyword": ["electrical energy", "power system", "ev", "smart grids", "social welfare", "electricity", "scheduling"], "paperid": "7F3925EC", "author_id": ["29E49436", "7D758B29", "7E1B56C4", "7F575F2C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["iordanis koutsopoulos"], "keyword": ["data acquisition", "wireless sensor networks", "quality of service", "commerce", "artificial intelligence", "parameter estimation", "service provider", "resource management", "data collection", "sensors", "air pollution", "vectors"], "paperid": "77881171", "author_id": ["1A0284C1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei wang", "baochun li", "ben liang"], "keyword": ["parallel", "servers", "schedules", "resource allocation", "resource management", "vectors", "computational modeling", "cloud computing", "resource utilization"], "paperid": "7928E540", "author_id": ["7F00EFA0", "7F13CFD4", "85F65248"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["edward w knightly", "oscar bejarano"], "keyword": ["physical layer", "throughput", "signal to noise ratio", "fading", "protocols", "spatial diversity", "probability", "modulation", "gain"], "paperid": "7BC944E1", "author_id": ["7AF223B8", "816DFB96"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["li zhang", "jian tan", "shicong meng", "xiaoqiao meng"], "keyword": ["stochastic programming", "optimization", "bismuth", "indexes", "data handling", "predictive control", "random variables", "network topology", "scheduling", "system performance"], "paperid": "76D4F435", "author_id": ["7E3A4EF7", "7F595EF4", "809108A4", "80A5BE89"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["atsushi tagami", "teruyuki hasegawa", "makoto fukushima"], "keyword": ["ccn", "system on chip", "longest prefix matching", "protocols", "memory management", "throughput", "forwarding information base"], "paperid": "7C7F8793", "author_id": ["518BA0D5", "7E1EDF8B", "852092AE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yifan zhang", "qun li"], "keyword": ["decoding", "protocols"], "paperid": "788E8694", "author_id": ["00CE5EC4", "7D814B79"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["huacheng zeng", "y thomas hou", "yi shi", "wenjing lou"], "keyword": ["linear programming", "mimo", "spatial multiplexing", "integer programming", "interference", "spread spectrum communication", "interference cancellation", "resource management"], "paperid": "757796D6", "author_id": ["7D135ECC", "7F981600", "806DCDA9", "81640989"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yong zhou", "weihua zhuang"], "keyword": ["spread spectrum communication", "probability", "ad hoc networks", "interference", "transmitters", "silicon", "scheduling"], "paperid": "7A91727D", "author_id": ["7DA4A391", "7F4E5085"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaojun cao", "zilong ye", "chunming qiao", "xiujiao gao"], "keyword": ["traffic grooming", "prediction algorithms", "look ahead", "wavelength division multiplexing", "bandwidth", "accuracy"], "paperid": "75E431B5", "author_id": ["7BDEF033", "7D135F53", "7E0B9FBE", "84B56E3F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["thyaga nandagopal", "yanru ma", "sean banerjee", "krishna p n puttaswamy"], "keyword": ["availability", "redundancy", "servers", "cloud computing", "semantics", "bandwidth", "erasure codes", "costing", "encoding"], "paperid": "772B2D6A", "author_id": ["7BB65E58", "7CFED262", "85062D90", "8637881E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carlee joewong", "mingjye sheng", "soumya sen", "felix ming fai wong", "sangtae ha"], "keyword": ["internet", "broadband networks", "mobile communication", "pricing", "customer behavior", "traffic pattern", "planning", "protocols", "telecommunication services", "network equipment"], "paperid": "8173E2C2", "author_id": ["14690F07", "7DEC9CF9", "80130CAD", "802BFF78", "80DC67C7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eric torng", "alex x liu", "jonathan daly"], "keyword": ["approximation algorithms", "dynamic programming", "authorisation", "merging", "security", "color", "data compression", "access control", "networks", "hardware"], "paperid": "78044615", "author_id": ["79B930BF", "7F7BC34C", "84813161"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["john heidemann", "xun fan", "ramesh govindan"], "keyword": ["servers", "routing", "internet", "ip anycast", "tld", "domain name system"], "paperid": "8083E3F6", "author_id": ["1042D22A", "7F36621E", "8495D5CB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ruogu zhou", "guoliang xing", "jianwei niu", "yuhang gao"], "keyword": ["fingerprinting", "interference", "ubiquitous computing", "mobile communication", "accuracy", "servers"], "paperid": "77B0611C", "author_id": ["7B6B9AF0", "7D9335E2", "7F6DDD8C", "80F57C91"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jinyuan sun", "pan li", "miao pan", "ming li"], "keyword": ["pricing", "scheduling", "integrated circuits", "interference", "spectrum auction", "spectrum scarcity", "toa", "wireless networks", "data transmission", "resource management"], "paperid": "7609820D", "author_id": ["7D5C3C5C", "7E5762BF", "7E850781", "860B6531"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["d c tsilimantos", "eitan altman", "jeanmarie gorce"], "keyword": ["energy conservation", "geometry", "base station", "ofdm modulation", "sleep mode", "stochastic analysis", "energy efficiency", "interference", "signal to noise ratio", "stochastic geometry", "mathematical model", "probability"], "paperid": "7E010FB9", "author_id": ["791310A6", "7EBBF97C", "80CFD0DA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["krishna jagannathan", "adam wierman", "j m nair"], "keyword": ["stability analysis", "wireless networks", "throughput", "queueing theory", "traffic flow", "indexes", "scheduling", "servers"], "paperid": "77559ED6", "author_id": ["7A091215", "836C62B9", "849E76ED"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["christian wietfeld", "nils dorsch", "hanno georg", "markus putzke"], "keyword": ["smart grids", "power systems", "switches", "ethernet", "interoperability", "protocols", "calculus", "merging", "power system simulation", "open systems"], "paperid": "7FAD8007", "author_id": ["780AE0C1", "78C1F750", "81022AE2", "8335EB88"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["andrey lukyanenko", "simanto saha", "antti ylajaaski"], "keyword": ["servers", "fault tolerance", "internet", "indexes", "network topology", "statistics", "routing", "sociology"], "paperid": "78FCF091", "author_id": ["80EAB96F", "80F55AEA", "82957F85"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaohong guan", "yun gu", "dai wang", "yuhong gui", "ting liu"], "keyword": ["power generation", "power system protection", "smart grid", "indexes", "decision support systems", "algorithm design and analysis", "security", "sensitivity", "pipelines", "power system", "estimation", "apse"], "paperid": "7EFBBF46", "author_id": ["7E4E1D65", "7FDC6683", "80A3A997", "81307492", "85139A37"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yan qiao", "shigang chen", "wen luo"], "keyword": ["sociology", "object tracking", "accuracy", "maximum likelihood estimation", "protocols", "supply chain management"], "paperid": "79BEB73E", "author_id": ["7D1945A2", "806F1558", "85C34109"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jagdish chandra", "niloy ganguly", "bivas mitra"], "keyword": ["topology", "protocols", "rate equation", "mathematical model", "social networks"], "paperid": "79D98B03", "author_id": ["77CD177A", "7D073802", "809234BE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yeqing yi", "alex x liu", "yaping lin", "rui li", "fei chen"], "keyword": ["wireless sensor networks", "protocols", "data privacy", "watermarking", "cryptography", "sensors", "silicon", "upper bound", "privacy"], "paperid": "79F139BB", "author_id": ["7DF7F8FF", "7F7BC34C", "7F834C0A", "81D5477F", "8549DDF0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michael zuba", "zheng peng", "zaihan jiang", "huifang chen", "yibo zhu", "junhong cui"], "keyword": ["propagation delay", "probability", "throughput", "underwater acoustic communication", "underwater acoustics", "time sharing"], "paperid": "7890B487", "author_id": ["7AF1CC04", "7E5B38B8", "7E7643F2", "7F63F162", "807033B6", "80EE932B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaolin fang", "yingshu li", "jianzhong li", "hong gao"], "keyword": ["optimization", "time complexity", "approximation algorithms", "wireless sensor networks"], "paperid": "7964B3F5", "author_id": ["7DF7A2E2", "7E8BDB35", "7EF84BEE", "8090AC40"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["attilio fiandrotti", "enrico magli", "anooq muzaffar sheikh"], "keyword": ["scalable video coding", "scheduling algorithms", "network coding", "decoding", "bandwidth"], "paperid": "7EE42758", "author_id": ["021D3E9B", "7C58A28C", "81606728"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["julinda stefa", "vasile c perta", "pan hui", "alessandro mei", "sokol kosta"], "keyword": ["protocols", "mobile communication", "servers", "collaboration", "cloning", "cloud computing", "real time systems", "mobile computing"], "paperid": "7AC61800", "author_id": ["5FC0D623", "72B8CC03", "7D33EF8B", "802EFD21", "82B55675"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shimin gong", "wei liu", "weihua zhuang", "ping wang"], "keyword": ["cognitive radio network", "distribution functions", "gaussian distribution", "iterative methods", "mathematical model", "uncertainty", "signal detection", "noise", "statistical distributions", "sensors"], "paperid": "789C7EF0", "author_id": ["78C0BF06", "7E4442E2", "7F4E5085", "8105F8ED"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dario g garao", "guido maier", "achille pattavina"], "keyword": ["optical computing", "data center", "free space optics", "optical switches", "energy efficiency", "energy conservation"], "paperid": "78F168A2", "author_id": ["10854665", "759B84FD", "80B3B59A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["liqun chen", "hoon wei lim", "guomin yang"], "keyword": ["public key cryptography", "authentication", "protocols", "key exchange", "materials", "cryptographic protocols", "servers", "networks"], "paperid": "7A9EFEDE", "author_id": ["7DBB8439", "7E86F86F", "811C67ED"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dapeng oliver wu", "wang liu", "kejie lu", "jianping wang", "liusheng huang", "yi qian", "jun liu"], "keyword": ["ad hoc networks", "mobile computing", "mobile ad hoc networks", "throughput"], "paperid": "7611C588", "author_id": ["7DD98F61", "7F22CCA8", "7F489B9F", "80545B57", "811F3D3C", "81698A22", "8493A060"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["antonio pescape", "pietro marchetta"], "keyword": ["vectors", "system monitoring", "internet", "payloads", "uncertainty", "binary trees", "ttl", "traceroute"], "paperid": "7E6A3BB0", "author_id": ["12524DE8", "68B5860A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jiangchuan liu", "hongbo jiang", "fangming liu", "hong zhang", "bo li", "athanasios v vasilakos"], "keyword": ["cloud computing", "trusted computing", "pricing", "resource allocation", "resource management", "computer science", "cost accounting", "supply and demand", "commerce"], "paperid": "774537D4", "author_id": ["7D1FE4C6", "7E1B4E11", "80D09303", "82AD9F13", "85A4DFF2", "85AA7D42"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tungwei kuo", "mingjer tsai", "kate chingju lin"], "keyword": ["approximation theory", "maximum coverage problem", "algorithm design and analysis", "network throughput", "approximation algorithms", "logic gates", "census", "tv", "submodular set function", "optimization"], "paperid": "802F74F4", "author_id": ["7E730E94", "7ED2D14C", "8125D1BD"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chenshu wu", "yunhao liu", "zheng yang", "yiyang zhao"], "keyword": ["location based service", "sensors", "glocal", "gps", "trajectory", "accuracy", "dead reckoning"], "paperid": "7BC72A21", "author_id": ["7DBC2160", "7F046EF7", "7F675402", "8168778B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ness b shroff", "yoora kim", "injong rhee", "kyunghan lee"], "keyword": ["acceleration", "computer network security", "measurement", "sociology", "pattern recognition", "probability", "markov processes", "vectors"], "paperid": "801EB904", "author_id": ["7C52E731", "7E4174A4", "804EB92D", "80DF7314"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["apurv bhartia", "sumin yun", "lei qiu"], "keyword": ["precoding", "software radio", "uplink", "usrp", "multiplexing", "mimo", "synchronization", "wireless communication", "throughput"], "paperid": "806BC0D7", "author_id": ["7630827C", "7E0667B4", "7EDFC053"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["atilla eryilmaz", "ruogu li", "bin li"], "keyword": ["upper bound", "vectors", "wireless networks", "measurement", "algorithm design and analysis", "convergence", "dual algorithm", "scheduling"], "paperid": "77BDBBA2", "author_id": ["7DF20B35", "7F82C540", "8119D3C6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["baochun li", "yuefei zhu", "zongpeng li"], "keyword": ["vectors", "wireless communication", "vcg mechanism", "quadratic programming", "linear programming", "economics", "robustness", "channel allocation", "cost accounting", "commerce", "resource management"], "paperid": "758312AC", "author_id": ["7F13CFD4", "7FC3265C", "8003BACF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongzi zhu", "fei yu", "guangtao xue", "zhenxian hu", "gong zhang", "minglu li"], "keyword": ["entropy", "switches", "correlation"], "paperid": "79B6D778", "author_id": ["7CEC9798", "7D50A440", "7EC1C7C8", "7EFA28D5", "7F768AF5", "7FEDACCE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["douglas h summerville", "zhou su", "hao chen", "yu chen"], "keyword": ["computer network security", "convolution", "field programmable gate arrays", "electronic data interchange", "algorithm design and analysis", "frequency domain analysis", "parallel processing", "real time systems"], "paperid": "79C6B8C5", "author_id": ["48A1FA87", "7E42A546", "801BC2FB", "8549E490"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sanjay shakkottai", "sharayu moharir"], "keyword": ["ofdm modulation", "scheduling", "iterative methods", "downlink", "algorithm design and analysis", "indexes", "routing", "resource management"], "paperid": "792E86AD", "author_id": ["04F50656", "8480B067"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jie wu", "mingjun xiao", "liusheng huang"], "keyword": ["delay tolerant network", "social characteristics", "probability density function", "routing"], "paperid": "75838003", "author_id": ["7D59933A", "7EE81F7C", "811F3D3C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hongjuan li", "tao jing", "xiuzhen cheng", "shixiang zhu", "yan huo"], "keyword": ["cognitive radio networks", "system performance", "radio transmitters", "optimal stopping theory", "signal to noise ratio", "probability", "sensors"], "paperid": "7F3EFDCA", "author_id": ["7CEE12C3", "7D27FED4", "7F2DCA44", "80B1DEFF", "80F8F1BE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rahul urgaonkar", "jason redi", "r ramanathan", "william nii tetteh"], "keyword": ["transceivers", "channel allocation", "indexes", "throughput", "level set", "wireless networks", "routing", "algorithm design and analysis"], "paperid": "7C10E1B2", "author_id": ["0C66FFD2", "7A050E24", "7EFF78C7", "8294FF51"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["matthias wahlisch", "martin landsmann", "ted schmidt"], "keyword": ["authorisation", "topology", "routing protocol", "message authentication", "authentication", "data protection", "encryption"], "paperid": "778DBAE0", "author_id": ["7B74AEA5", "8289EC26", "85177594"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["joao marco c silva", "solange rito lima", "p e r carvalho"], "keyword": ["computer networks", "internet", "taxonomy", "sampling methods", "computer architecture", "process control", "linear prediction", "layered architecture", "information model", "accuracy"], "paperid": "7D78AD05", "author_id": ["7FA35FD7", "8064CDF8", "815C174B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chunming qiao", "kejie lu", "jianping wang"], "keyword": ["privacy", "gev", "linear network coding", "wireless communication", "vectors", "correlation", "cryptography"], "paperid": "76FFD9DB", "author_id": ["7E0B9FBE", "7F489B9F", "80545B57"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["wei li", "xiuzhen cheng", "xiaoshuang xing", "tao jing"], "keyword": ["cognitive radio networks", "radio transmitters", "spread spectrum communication", "games", "time frequency analysis", "radio receivers", "game theory", "frequency domain analysis"], "paperid": "7B8F548D", "author_id": ["67AD0959", "7F2DCA44", "8056BFBE", "8139B0E0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["matteo varvello", "daniel c kilper", "antonia m tulino", "nakjung choi", "ke guan", "jaime llorca", "jairo o esteban"], "keyword": ["integer linear programming", "energy efficiency", "dynamic scheduling", "internet", "vegetation", "optimization", "routing", "linear programming", "network nodes"], "paperid": "78691D46", "author_id": ["76974283", "7882C954", "7C19229E", "7D39FCAB", "7DEF33F1", "7E129363", "851D1D71"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lei shi", "shuo zhang", "haojin zhu", "yuepeng wang", "kai xing"], "keyword": ["algorithm design and analysis", "cds", "wireless sensor networks", "topology", "wireless communication", "maximal independent set", "maintenance engineering", "network topology", "ad hoc networks"], "paperid": "7BF38F91", "author_id": ["7D1A3F69", "7DA8161D", "7E3D25F6", "84C11414", "8573311A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["alireza keshavarzhaddad", "ehsan aryafar", "mung chiang", "michael wang"], "keyword": ["switches", "games", "throughput", "game theory", "nash equilibria", "convergence", "hysteresis"], "paperid": "79D2BF86", "author_id": ["03E349DF", "2D012EE9", "7FC6A25D", "839D2E7A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["guohua li", "jianzhong li", "hong gao"], "keyword": ["time series", "data point", "data streams", "time complexity", "approximation theory", "wireless communication", "linear approximation", "approximation algorithms", "wireless sensor networks"], "paperid": "78B637C5", "author_id": ["7D8BA9D1", "7EF84BEE", "8090AC40"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ashutosh sabharwal", "pedro e santacruz", "vaneet aggarwal"], "keyword": ["network coding", "knowledge engineering", "wireless networks", "interference", "color", "computer architecture", "physical layer", "channel state information", "scheduling"], "paperid": "7FD37F84", "author_id": ["7BDE519E", "8103BFF1", "8105BDC6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["soren finster", "ingmar baumgart"], "keyword": ["cryptography", "vegetation", "computer network security", "protocols", "time measurement", "data privacy", "meter reading"], "paperid": "7F423AD8", "author_id": ["78EE45CB", "71364CD8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chau yuen", "luiz a dasilva", "jianwei huang", "yong xiao"], "keyword": ["spof", "games", "wireless networks", "resource allocation", "optimization", "vectors", "resource management"], "paperid": "7AAE10DE", "author_id": ["7D98C239", "7DEA3016", "7E9A2A72", "82AF8564"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shucheng yu", "jiawei yuan"], "keyword": ["cloud computing", "cryptography", "euclidean distance", "servers", "vectors", "indexes", "data privacy"], "paperid": "7A6AE909", "author_id": ["7E2725D7", "7F529B31"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ilenia tinnirello", "francesco gringoli", "domenico garlisi", "fabrizio giuliano", "paolo gallo", "giovanni bianchi"], "keyword": ["virtualisation", "data packets", "bandwidth", "virtual machines", "time division multiple access", "hardware", "throughput", "wireless communication"], "paperid": "76896672", "author_id": ["01102A4D", "057D1E48", "6571F50E", "7C537C08", "7F4DF549", "817D3404"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yanan sun", "ting liu", "yang liu", "xiaohon guan"], "keyword": ["energy conservation", "sensor fusion", "smart grid", "security"], "paperid": "7834D4CC", "author_id": ["7E2FD03B", "85139A37", "8539503A", "861D5E26"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["athina markopoulou", "maciej kurant", "minas gjoka"], "keyword": ["network topology", "clustering algorithms", "degree distribution", "statistical distributions", "topology", "estimation", "social network", "measurement", "sampling methods", "random walk", "graph theory"], "paperid": "791357CA", "author_id": ["0F972B34", "142B1360", "16103EFA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qun li", "guihai chen", "xiaojun zhu"], "keyword": ["acceleration", "accuracy", "dead reckoning", "global positioning system", "gyroscopes"], "paperid": "7512236F", "author_id": ["7D814B79", "7EF31BBE", "7FF2BFDC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tristan groleat", "maurizio dusi", "nicola bonelli", "brian trammell", "andrea di pietro", "felipe huici", "sandrine vaton", "petr kastovsky"], "keyword": ["traffic volume", "internet", "network monitoring", "flow meter", "radiation detectors", "optimization", "hardware", "transport protocols", "logic gates", "data analysis", "resource management", "network analysis"], "paperid": "7776911E", "author_id": ["369B2B5F", "5C37F380", "716642C9", "7B301362", "7F6F2F4A", "81535721", "82BEE85E", "84C2E6A8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sweta r parkhedkar", "yogita k dubey"], "keyword": [], "paperid": "04055F1F", "author_id": ["0E33EC65", "7F7426D9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zhu wang", "boliu xu", "pengjun wan", "minming li", "lei wang", "chao ma"], "keyword": ["approximation algorithms", "interference", "wireless networks", "vectors", "polynomials", "energy conservation", "approximation theory"], "paperid": "7B09B52A", "author_id": ["7DA2AF00", "7FA67DDE", "8038E2BF", "80EBC4C0", "851E4DCB", "85824ACA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["srinivas shakkottai", "mayank manjrekar", "vinod ramaswamy"], "keyword": ["random variables", "markov processes", "base stations", "games", "cellular networks", "scheduling", "computational modeling", "game theory"], "paperid": "7693FFC1", "author_id": ["7338807F", "7A77868B", "8291284E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["henning schulzrinne", "kyung hwa kim", "hyunwoo nam"], "keyword": ["computer science"], "paperid": "791460C0", "author_id": ["7C5A7E88", "7CFB389E", "8490132F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["junshan zhang", "shibo he", "xiaowen gong", "youxian sun", "jiming chen"], "keyword": ["approximation algorithms", "ad hoc networks", "wireless sensor networks", "sun", "algorithm design and analysis"], "paperid": "77098809", "author_id": ["7DAFD36E", "7E46AFFB", "7E6FC61F", "802B6721", "80DF5EF9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xi fang", "guoliang xue", "dejun yang"], "keyword": ["mobile computing", "privacy", "mobile communication", "algorithm design and analysis", "game theory", "sorting", "data privacy", "cost accounting"], "paperid": "7916C57A", "author_id": ["7D646A7F", "7FF1EEA7", "814F8CB8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["peng lin", "mohamed hamdi", "qian zhang", "xiaojun feng"], "keyword": ["wireless communication", "algorithm design and analysis", "vectors", "tin", "time complexity", "spectrum auction"], "paperid": "7CCF3790", "author_id": ["7E49A5A7", "7E7D3B3E", "80240ADD", "81172250"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["eytan modiano", "greg kuperman"], "keyword": ["throughput", "routing", "schedules", "wireless networks"], "paperid": "77800F02", "author_id": ["09DF3E99", "7C80C941"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yanjiao chen", "qian zhang", "kaishun wu", "jin zhang"], "keyword": ["graph theory", "interference", "cost accounting", "central frequency", "path loss", "economics", "resource management", "simulation", "transmitters"], "paperid": "7523105B", "author_id": ["7DD7DE30", "80240ADD", "805085FC", "85587464"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jin teng", "dong xuan", "xinfeng li", "zuoming yu"], "keyword": ["wireless sensor networks", "honeycomb structures", "wireless networks", "shape"], "paperid": "77B40D20", "author_id": ["78DC5925", "7F2FAC50", "7F42BF5F", "834B8CD7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jim kurose", "brian neil levine", "sookhyun yang"], "keyword": ["learning artificial intelligence", "logic gates", "computer network security", "forensics", "throughput", "linux", "internet", "digital forensics", "wireless communication", "entropy"], "paperid": "763A644E", "author_id": ["5F653421", "80985171", "80B6A6AF"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zeyu zheng", "jianping wang", "xun xiao", "minming li"], "keyword": ["virtual machines", "heuristic algorithm", "cloud computing", "preventive maintenance", "scheduling", "schedules", "servers", "bismuth"], "paperid": "7D940712", "author_id": ["7FF17892", "80545B57", "80C54505", "80EBC4C0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["richard a kemmerer", "christopher kruegel", "giovanni vigna", "ali zand"], "keyword": ["noise", "jitter", "statistical tests", "servers", "watermarking"], "paperid": "76EF93A9", "author_id": ["0DEB81F5", "7747476D", "82AD3B49", "853CFCF0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["antonio iera", "stefano yuri paratore", "giuseppe ruggeri", "orazio briante", "claudia campolo", "marthinus j booysen", "antonella molinaro"], "keyword": ["data collection", "pollution", "kinematics", "intelligent transportation systems"], "paperid": "7FFC6DF5", "author_id": ["025A496B", "767CA323", "788A7D2F", "79FA20F3", "7B2ECAD6", "7C382843", "7EA7EEBB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["long cheng", "jianwei niu", "tian he", "yu gu"], "keyword": ["synchronization", "schedules", "wireless sensor networks", "switches", "network operations", "reliability", "failure analysis", "dynamic scheduling", "real time systems", "networks", "hardware"], "paperid": "7B3E5E35", "author_id": ["7E647C63", "7F6DDD8C", "80388B5E", "8082D122"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["romit roy choudhury", "mamatha gowda", "sungju lee", "satyaki sen"], "keyword": ["algorithm design and analysis", "vectors", "modulation", "wireless networks", "estimation", "throughput"], "paperid": "7B034AFB", "author_id": ["7DF9871A", "7E5D5749", "7F4E5C0E", "80DD814F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sebastian zander", "lachlan l h andrew", "grenville armitage"], "keyword": ["sensitive information", "internet", "statistics", "sociology", "encryption", "transport protocols", "computer network security", "protocols", "history"], "paperid": "7A2C2A4C", "author_id": ["7405120F", "7D642D9E", "7F483F2F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shaojie tang", "xuefeng liu", "jiannong cao"], "keyword": ["vectors", "fault tolerance", "feature extraction", "wireless sensor network", "structural engineering", "dynamic data", "shape", "sensors", "frequency modulation", "distributed processing", "distributed algorithms"], "paperid": "7B8007CC", "author_id": ["7E282E35", "7F3F0F95", "802C4419"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yang yang", "kannan srinivasan", "ness b shroff", "bo chen"], "keyword": ["multiplexing", "radio frequency", "interference", "wireless network", "software defined radio", "wireless communication", "schedules", "throughput", "mimo"], "paperid": "7B50C007", "author_id": ["3DAE97B4", "75F727E0", "7C52E731", "EA6FADF1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ernst w biersack", "heng cui"], "keyword": ["information retrieval", "internet", "web pages", "degradation", "servers"], "paperid": "7E14369A", "author_id": ["0FE1C1DD", "806955DC"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ariel orda", "jose yallouz"], "keyword": ["quality of service", "additives", "network delay", "optimization"], "paperid": "77557B41", "author_id": ["25A54095", "84C6787C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["daniele riboni", "l mancini", "claudio bettini", "antonio villani", "domenico vitali"], "keyword": ["indexes", "security", "anomaly detection", "confidentiality", "traffic classification", "qos", "computer network security", "data privacy", "knowledge engineering"], "paperid": "7DA6D78A", "author_id": ["0AF3D00D", "3EAE1694", "44AFB762", "7EEBFF66", "807DD368"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jing lv", "hongwei du", "lidong wu", "deying li", "weili wu", "wonjun lee"], "keyword": ["graph theory", "approximation algorithms", "wireless sensor network", "approximation theory", "algorithm design and analysis", "random algorithm", "steiner trees", "measurement", "connected graph", "computational complexity", "sensors"], "paperid": "752A0332", "author_id": ["10B1CE84", "7E979064", "807686DC", "80A82E08", "80B47319", "85C2CAFA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["pengda huang", "joseph camp", "dinesh rajan", "yongjiu du", "matthew jordan tonnemacher"], "keyword": ["wireless communication", "optimization", "field programmable gate arrays", "memory footprint", "iterative methods", "accuracy", "fading", "emulation", "hardware"], "paperid": "7A9EFE2E", "author_id": ["7E0195B2", "7F5A0FAA", "800F2661", "80E78520", "859256E0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["michele garetto", "emilio leonardi", "valentina martina"], "keyword": ["networks", "network architectures", "performance", "temporal locality", "computational modeling"], "paperid": "7AD20A50", "author_id": ["061E6BE8", "7DF3884C", "7FA418F7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mihaela van der schaar", "byunggook kim", "jangwon lee", "shaolei ren"], "keyword": ["electricity", "games", "nash equilibrium", "smart grids", "social welfare", "scheduling", "collaboration", "game theory"], "paperid": "7DDC511F", "author_id": ["29E49436", "7E1B56C4", "7F575F2C", "85D2DE9C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zhiyang guo", "yuanyuan yang", "zhemin zhang"], "keyword": ["optical switches", "packet switching", "indexes", "energy efficiency", "scheduling algorithms", "internet"], "paperid": "7AB3F906", "author_id": ["7EBF14C2", "823CC2A6", "84B819EA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dimitrios koutsonikolas", "ramanujan k sheshadri"], "keyword": ["barium", "channel bonding", "mac", "throughput", "routing"], "paperid": "783167BA", "author_id": ["5C026BFB", "7F7A4966"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["julius schulzzander", "anja feldmann", "roberto riggio", "cigdem sengul", "l r d suresh"], "keyword": ["handover", "wlan", "energy conservation", "cellular networks", "software defined networking", "wireless communication", "energy efficiency", "energy management", "signal to noise ratio"], "paperid": "7E6D1632", "author_id": ["3BF2B353", "795F7D7D", "79D9F9F9", "7F04C803", "816A511B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["chiara chirichella", "davide rossi"], "keyword": ["queueing theory", "operating systems", "internet", "protocol", "queuing delay", "congestion control", "protocols", "packet switching"], "paperid": "7D4905AE", "author_id": ["7BCE0AF5", "80D12A31"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["jean walrand", "jianwei huang", "lingjie duan"], "keyword": ["switches", "economics", "market share", "marketing", "quality of service", "games"], "paperid": "77E8DDF5", "author_id": ["138CFD6A", "7E9A2A72", "7FEE246E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yoichi shinoda", "shinsuke miwa", "razvan beuran"], "keyword": ["emulation", "mobile communication", "mobile computing", "internet", "wireless networks", "user experience", "protocols", "protocol"], "paperid": "7DA5CFC5", "author_id": ["7C5A8FD9", "7F88A27F", "80CD1F81"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["marco mellia", "maurizio matteo munafo", "stefano traverso", "ignacio bermudez"], "keyword": ["measurement", "cloud computing", "web services", "servers", "availability"], "paperid": "76165CE1", "author_id": ["7B15CAFF", "7B4D93E2", "7CDD0A13", "813879E9"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["laurent massoulie", "don towsley", "bo jiang", "nayana hegde"], "keyword": ["topology", "resource management", "network topology", "social networks", "stability analysis"], "paperid": "75AEAC11", "author_id": ["01074096", "7945B8D1", "7DFCEEF5", "83FE4703"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shreeshankar bodas", "bilal sadiq"], "keyword": ["transmitters", "ofdm", "polynomials", "scheduling", "computational complexity", "servers", "wireless communication", "uplink", "barium", "np complete", "resource management", "queueing theory"], "paperid": "7F4FE81C", "author_id": ["7B0BE3CF", "7BB8CCB8"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["fabio martignon", "ilario filippini", "stefano paris", "lin chen"], "keyword": ["polynomial time", "resource management", "greedy algorithms", "mobile communication", "bandwidth", "wireless communication", "internet connections", "mobile computing", "polynomials", "internet"], "paperid": "7D987F60", "author_id": ["10053A0B", "7A4A1E3E", "817698DF", "847EEA16"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gil zussman", "peter r kinget", "john sarik", "maria gorlatova", "robert margolies", "jianxun zhu", "kanghwan kim", "ioannis kymissis", "youngwan kim", "luis pena", "meng wang"], "keyword": ["spread spectrum communication", "energy harvesting", "prototypes", "control systems", "active networks"], "paperid": "7872256D", "author_id": ["0EF250B7", "0F00D40B", "47FCA6A1", "4B64DB63", "77884EF2", "7FBBC106", "80C3C4A9", "8550389D", "85781510", "857CA7B1", "86256BB2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["giovanna carofiglio", "luca muscariello", "massimo gallo", "michele papali"], "keyword": ["internet", "labeling", "stability analysis", "point to multipoint", "routing protocols", "tcp ip", "transport protocols", "receiver", "queueing theory"], "paperid": "76E20389", "author_id": ["11017D68", "8185B807", "838BD81E", "84910E94"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaohua jia", "kui ren", "kan yang", "bo zhang"], "keyword": ["servers", "access control", "cloud computing", "cryptography", "authorisation", "public key", "trusted computing", "encryption", "outsourcing"], "paperid": "7B2E072F", "author_id": ["7D4BC413", "7F6340F3", "8067047C", "80777DCE"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["dennis l goeckel", "don towsley", "ramya raghavendra", "ting he"], "keyword": ["routing", "upper bound", "learning artificial intelligence", "cooperative learning", "topology", "dynamic network", "time measurement"], "paperid": "7A179973", "author_id": ["1393E165", "7945B8D1", "7D09F302", "810B2875"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["shucheng yu", "y thomas hou", "wenjing lou", "lu shi"], "keyword": ["multi agent systems", "protocol", "distributed processing", "system control", "routing protocols", "routing", "trusted computing", "adversary", "graph theory"], "paperid": "78B64B98", "author_id": ["7E2725D7", "7F981600", "81640989", "8174D4F5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mohammad ali maddahali", "a salman avestimehr", "alireza vahid"], "keyword": ["transmitters", "encoding", "wireless networks", "interference cancellation", "interference", "signal to noise ratio", "physical layer", "radio receivers", "throughput"], "paperid": "769ECCA6", "author_id": ["06EF497E", "79F3FA94", "7DF0D34C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["changtien lu", "y thomas hou", "ming li", "qiben yan", "feng chen", "wenjing lou", "tingting jiang"], "keyword": ["data models", "sensors", "cognitive radio network", "estimation", "switches", "inspection"], "paperid": "7C6575CA", "author_id": ["7DEFF67B", "7F981600", "7FBBF39E", "8014E2B3", "810DCE08", "81640989", "84B422F7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["zhigang chen", "xuemin shen", "lin x cai", "zhongming zheng", "anfeng liu"], "keyword": ["probability", "cloning", "privacy", "protocols", "wireless sensor networks", "indexes", "security", "broadcasting", "data privacy"], "paperid": "7D99B3AF", "author_id": ["7DE76D79", "7EA9B3E8", "7FD167D8", "809938D9", "80F96A75"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mesut gunes", "michael frey"], "keyword": ["routing", "spread spectrum communication", "resilience", "wireless communication", "disaster management", "control theory"], "paperid": "78FE115B", "author_id": ["7D0A4828", "7CA3029C"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaolin li", "linke guo", "yuguang fang", "kaikai liu", "xinxin liu"], "keyword": ["location based service", "data privacy", "games", "privacy", "correlation", "mobile computing", "servers", "game theory", "trajectory", "bayesian game"], "paperid": "7A118101", "author_id": ["7DC99157", "7FB8B860", "808745B0", "808CF89B", "84771408"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["carolyn talcott", "andre scedrov", "xianglong han", "jinyan cao", "anduo wang", "boon thau loo", "alexander jt gurney"], "keyword": [], "paperid": "7A6FC100", "author_id": ["27702A78", "7D53E14F", "7DE29DC0", "7DE77BD9", "7E12DE1A", "7FC400DE", "7FDE2EE3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["george kesidis", "yung yi", "youngmi jin", "fatih kocak", "jinwoo shin"], "keyword": ["sociology", "servers", "scalability", "probabilistic logic", "markov processes"], "paperid": "7A2F5054", "author_id": ["140EA06C", "7CEEA7C0", "7CF6714D", "7F27FFF2", "82737676"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yingfei dong", "zhenhai duan", "todd baumeister", "guanyu tian"], "keyword": ["computer network security", "cryptography", "routing", "security", "algorithm design and analysis", "topology", "network topology", "watermarking"], "paperid": "7B0840E8", "author_id": ["7F4E2E33", "7FAB7AC4", "80C86578", "80EA0FFB"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["qiangsheng hua", "yuexuan wang", "francis c m lau", "zhaoquan gu"], "keyword": ["wireless communication", "scheduling", "mobile computing", "sensors", "interference", "sensor networks", "mobile communication"], "paperid": "7AF16594", "author_id": ["7628640F", "7F1FB139", "7F44A7D2", "7FC5E9D6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["mario gerla", "cedric westphal", "fabio angius", "jun wei", "giovanni pau"], "keyword": ["servers", "collaboration", "protocols", "distributed databases", "indexes", "synchronization"], "paperid": "75837E68", "author_id": ["21908EB6", "7585D277", "7AA48BEF", "8012CEC8", "857F8C70"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["claudio cicconetti", "g tanganelli", "enzo mingozzi", "carlo vallati"], "keyword": ["business logic", "software architecture", "switches", "clients", "protocols", "visualization", "core network", "distributed architecture", "internet of things", "servers", "aggregation"], "paperid": "7C7DDB1A", "author_id": ["50AEAD9A", "7400AC2F", "7931C8CF", "7C18D51F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kazu", "shimura"], "keyword": [], "paperid": "18576994", "author_id": ["45EC1FD0", "7EBFE632"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["orathai sukwong", "h s kim"], "keyword": ["virtualization", "virtual machines", "dynamic scheduling", "scheduling", "quality of service", "throughput", "sla", "resource allocation", "degradation", "web services", "cloud computing", "optimization", "servers", "hypervisor"], "paperid": "7F77DA3C", "author_id": ["097F60FC", "7D1E16E3"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yrjo raivio", "jukka k nurminen", "antony j r meyn", "raul garcia marrero", "eetu jalonen"], "keyword": ["internet traffic", "apis", "internet"], "paperid": "7A61C23E", "author_id": ["1888B837", "6ACD2E89", "847B8A0B", "84DB69AE", "84F6C763"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["raheem beyah", "mingyuan yan", "zhipeng cai", "yueming duan", "jing he", "shouling ji"], "keyword": ["cognitive radio", "scheduling", "schedules", "broadcast communication", "unicast", "interference", "redundancy", "broadcasting"], "paperid": "77F854E7", "author_id": ["1EFE1364", "7FA3DFAA", "8080C2F3", "810A6730", "810ABCFA", "81409DD4"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["gordon b agnew", "seyed ali ahmadzadeh"], "keyword": ["design methodology", "data network", "radio receivers", "turbo codes", "adaptive modulation", "communication complexity", "communication model", "error rate", "demodulation", "statistical testing", "noise", "transmitters"], "paperid": "77895C9C", "author_id": ["21C371F2", "7963E925"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["karin hansson", "oliver popov", "avelino mondlane", "xavier muianga"], "keyword": ["information systems"], "paperid": "5E451A08", "author_id": ["7DF3B0F2", "816D32F0", "852C6CE1", "85B7282A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["julinda stefa", "vasile c perta", "marco v barbera", "alessandro mei", "sokol kosta"], "keyword": ["mobile computing", "cloning", "web navigation", "authentication", "internet", "mobile communication", "cloud computing", "mobile devices"], "paperid": "77A10B3D", "author_id": ["5FC0D623", "72B8CC03", "7E508C1C", "802EFD21", "82B55675"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["martin i reiman", "ulas ozen", "qiong wang", "mark andrews"], "keyword": ["service provider", "wireless networks", "advertising", "pricing schedule", "economic models", "end users", "random variables", "bandwidth", "pricing", "stackelberg game", "economics", "game theory", "investment"], "paperid": "7E351939", "author_id": ["0502FB8E", "76108D37", "7EBC102D", "7FE3707F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kumkum garg"], "keyword": ["mobile communication", "sensors", "wireless sensor networks", "mobile computing", "wireless communication", "communication complexity", "graph theory", "data models", "mathematical model", "np hard problem", "mathematical analysis", "network node", "mobile network"], "paperid": "7DAA6AA1", "author_id": ["7FEC6F12"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["muhammad ilyas", "zartash afzal uzmi"], "keyword": ["optimization", "computer networks", "computational modeling", "base stations", "electricity", "transceivers", "cellular networks"], "paperid": "7E50EFAA", "author_id": ["8505C4E8", "860A7868"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tarek abdelzaher", "prasant mohapatra", "xinlei wang", "wei cheng"], "keyword": ["registers", "sensors", "protocols", "servers", "security", "privacy", "anonymity", "wireless sensor networks", "mobile computing"], "paperid": "76DBE706", "author_id": ["756C154A", "7F1AA18B", "817A4F3A", "F7491EE0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bruno quoitin", "mathieu michel"], "keyword": ["schedules", "routing protocols", "wireless sensor networks", "routing", "response time"], "paperid": "7E599C67", "author_id": ["12170972", "84497DE0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hua tian", "x q li", "gao fengyuan", "wei wei"], "keyword": ["throughput", "finite state machines", "optimization", "protocols", "detectors"], "paperid": "76F623DB", "author_id": ["20AA4926", "836F56E2", "8467C485", "C07DD6FA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["paolo gasti", "gene tsudik", "naveen nathan", "jeff burke"], "keyword": ["building management systems", "public key", "authentication", "building automation systems", "local area networks", "internet", "ccn", "protocols"], "paperid": "76B3E39D", "author_id": ["0B08CF9D", "1BBDD3AC", "7F26268F", "80A648C0"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["murali kodialam", "fang hao", "t v lakshman", "krishna p n puttaswamy"], "keyword": ["algorithm design and analysis", "memory management", "protocols", "probabilistic logic", "cloud computing", "databases"], "paperid": "76C69B35", "author_id": ["01870B8B", "7891139D", "790E800C", "8637881E"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bertrand mathieu", "reaz ahmed", "md golam rabbani", "md faizul bari", "shihabur rahman chowdhury", "raouf boutaba"], "keyword": ["vegetation", "internet", "routing protocols", "bgp routing", "routing", "address space", "indexing", "silicon"], "paperid": "7CA190F4", "author_id": ["79015121", "7D77E14A", "7E71E810", "7EAA4D23", "7FF3D527", "83499AE5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["prasanna chaporkar", "sanjay agrawal", "r udwani"], "keyword": ["wireless networks", "codec", "real time applications", "algorithm design and analysis", "time division multiple access"], "paperid": "78C1F849", "author_id": ["26CA7F8F", "839CAEB0", "8586D262"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yanchao zhang", "chi zhang", "jinxue zhang", "rui zhang"], "keyword": ["mobile communication", "silicon", "detectors", "fading", "cascading style sheets", "robustness", "signal detection"], "paperid": "7C6BBF1A", "author_id": ["7E80366D", "7FDB6840", "80602AAC", "86324E1B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["hao jiang", "haiying shen", "j hallstrom", "chenxi qiu", "sima soltani", "karan sapra"], "keyword": ["wireless networks", "channel coding", "bit error rate", "mathematical model", "wireless communication", "error correction", "decoding", "stability analysis"], "paperid": "79D18D38", "author_id": ["1ED3E676", "7D856181", "7EAED57F", "7F09E719", "81FC8A51", "8508D555"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["novella bartolini", "g bongiovanni", "simone silvestri", "t la porta"], "keyword": ["radio frequency", "wireless sensor networks", "security", "decision support systems"], "paperid": "78D1BD37", "author_id": ["3F420924", "78317679", "7FE471BE", "801E857B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["matthias steiner", "matteo varvello"], "keyword": ["internet", "protocols", "distributed hash table", "accuracy", "file sharing", "linux", "cryptography"], "paperid": "7F7DC036", "author_id": ["750C81B6", "76974283"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["sangwoon jeon", "michael gastpar"], "keyword": ["encoding", "interference", "spread spectrum communication", "radio transmitters", "wireless communication", "upper bound", "protocols", "physical layer", "cognitive radio", "throughput", "cognitive networks", "tin", "wireless sensor networks", "ad hoc networks", "base stations", "cognition", "channel capacity"], "paperid": "79B3C6D2", "author_id": ["7D470E85", "7A5CAEB5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["pan li", "sergio salinas", "anup thapa", "ming li"], "keyword": ["mobile computing", "security", "location based services", "engines", "data privacy", "privacy", "servers", "accuracy", "mobile devices", "region of interest", "geometry", "roi"], "paperid": "79E4030B", "author_id": ["7E5762BF", "7F434CE6", "846E35E5", "860B6531"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["rachid elazouzi", "francesco de pellegrini", "daniele miorandi", "eitan altman", "tania jimenez"], "keyword": ["social network", "human behavior", "games", "society", "game theory", "complex systems", "social science", "user generated content", "communication networks", "content management", "market research", "measurement"], "paperid": "7DF50B95", "author_id": ["0E158259", "208231FC", "4DA90CFF", "7D7B9DD9", "7D8BFCC2"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["vinay a vaishampayan", "chao tian", "yihfarn robin chen", "vaneet aggarwal"], "keyword": ["bandwidth", "reliability", "storage area networks", "maintenance engineering"], "paperid": "75BC3F8B", "author_id": ["0CA89BB7", "7B7A9881", "7DA9B04D", "8105BDC6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["philip wette", "holger karl"], "keyword": ["feedback", "wavelength division multiplexing", "application layer", "topology", "routing", "optical switches", "network topology"], "paperid": "7A87589E", "author_id": ["783F41B1", "7E8C521F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["xiaofeng liao", "xiuzhen cheng", "dengyuan wu", "fan zhang", "dechang chen", "chunqiang hu"], "keyword": ["patient monitoring", "computational overhead", "cryptographic protocols", "vectors", "transparency", "indexes", "security"], "paperid": "76B2B2B2", "author_id": ["7D8A18FB", "7F2DCA44", "7F918F7C", "7FBEC2F1", "7FDA9302", "803ED05F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["besem abid", "hamida seba", "souleymane mbengue"], "keyword": ["real time systems", "sensors", "wireless sensor networks"], "paperid": "7B152A86", "author_id": ["75DA6FBE", "76027F3E", "77BE35F6"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["m j larson", "yingdi yu", "duane wessels", "lixia zhang"], "keyword": ["public key", "internet", "computer network security", "servers"], "paperid": "7D9F380F", "author_id": ["7DDC5403", "7E8E7732", "8138179E", "815F4B3F"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yaoqing liu", "beichuan zhang", "lan wang"], "keyword": ["algorithm design and analysis", "merging", "forwarding information base", "binary trees", "network operations", "routing", "routing protocols"], "paperid": "7916AF64", "author_id": ["8022CB26", "806738F5", "80964E66"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["adrian ogierman", "christian scheideler", "andrea w richa", "stefan schmid", "jin zhang"], "keyword": ["signal to noise ratio", "tv", "interference"], "paperid": "791139E3", "author_id": ["08244718", "1377614C", "80AAD4E6", "85F093B2", "DFDCE657"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["bjoern dusza", "christian wietfeld", "liang cheng", "christoph ide"], "keyword": ["wireless sensor networks", "uplink", "carrier frequency", "energy harvesting devices"], "paperid": "7ADCE29A", "author_id": ["48613A42", "780AE0C1", "7EBDE66E", "813BDDF5"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["yong cui", "qiang liu", "xin wang"], "keyword": ["interference", "signal to noise ratio", "detectors", "channel allocation", "accuracy", "cognitive radio"], "paperid": "7909213F", "author_id": ["7EA4E305", "83079149", "851EAA12"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["lingjun li", "guoliang xue", "xinxin zhao"], "keyword": ["authentication", "data mining", "cryptography", "protocols", "feature extraction"], "paperid": "7A542138", "author_id": ["7FDFBE60", "7FF1EEA7", "8418CEEA"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["ozgur b akan", "mustafa ozger"], "keyword": ["availability", "protocols", "cognitive radio", "energy conservation", "wireless sensor networks", "clustering algorithms"], "paperid": "75D1DC9B", "author_id": ["7FDF6330", "850BA72D"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["atilla eryilmaz", "ozgur dalkilic", "ozan candogan"], "keyword": ["schedules", "iteration", "cost function", "generators", "iso", "social welfare", "costing", "iterative methods", "pricing"], "paperid": "7F0B6489", "author_id": ["7DF20B35", "7F7E8CC5", "861FF03B"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["tarun bansal", "p k sinha", "bo chen"], "keyword": ["base stations", "cognitive radio", "correlation", "sensors", "measurement", "scattering", "radio transmitters", "accuracy"], "paperid": "78F86DBB", "author_id": ["751F08E7", "8295B200", "EA6FADF1"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["florin ciucu", "jens b schmitt"], "keyword": ["interference", "poisson distribution", "geometry", "spread spectrum communication", "throughput", "correlation"], "paperid": "78504787", "author_id": ["06DD00C6", "7D296074"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["kenneth w shum", "yuchong hu", "patrick p c lee"], "keyword": ["redundancy", "codes", "data storage", "data transfer", "bandwidth", "maintenance engineering", "cloud computing", "fault tolerance", "encoding"], "paperid": "7D556E14", "author_id": ["7D66BE81", "7EBAA943", "7F0D7DD7"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["p k kapur"], "keyword": [], "paperid": "26D5F523", "author_id": ["7807759A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["thin nguyen", "randall a berry", "michael l honig", "raunaq vohra", "huimin zhou", "venkatachalam subramanian"], "keyword": ["distribution functions", "games", "newsvendor model", "roaming", "nash equilibrium", "investment"], "paperid": "7B5BF70F", "author_id": ["7E37EE12", "7FD8E603", "81F29731", "841FF25E", "846DC9F5", "852C3E2A"], "year": 2013}, {"conf_id": "442BD7CD", "conf": "international conference on computer communications", "author_name": ["matthias steiner", "g hampel", "tian bu"], "keyword": ["tunneling", "telecom", "protocols", "cellular network", "computer network security", "sdn", "iron", "robustness", "decision support systems", "security", "gateway", "internet", "mobile communication", "logic gates", "ip", "mobility", "data centers"], "paperid": "80A31B3E", "author_id": ["750C81B6", "7C651045", "80920E17"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["lei shang", "xinwei xie", "jingling xue", "yi lu"], "keyword": [], "paperid": "6D8D06C9", "author_id": ["7D079075", "7D90689D", "7FD76D86", "84596215"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["markjan nederhof", "eberhard bertsch", "sylvain schmitz"], "keyword": ["parsing"], "paperid": "6F479BF1", "author_id": ["6684750A", "7C89B117", "7F876831"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["bruce r childers", "ryan w moore"], "keyword": [], "paperid": "0AA29EB2", "author_id": ["80735B1D", "823FC34B"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["andreas krall", "gergo barany"], "keyword": [], "paperid": "0655FBC5", "author_id": ["7FF4DB4A", "80944E2D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["philipp klaus krause"], "keyword": ["register allocation", "tree decomposition"], "paperid": "027895A0", "author_id": ["7FB7415D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["axel simon", "holger siegel"], "keyword": [], "paperid": "03B4F923", "author_id": ["7D1685FD", "80CB95D7"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["uday bondhugula", "somashekaracharya g bhaskaracharya"], "keyword": [], "paperid": "061F16EC", "author_id": ["78B3AA2D", "85A1DC51"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["george kastrinis", "yannis smaragdakis"], "keyword": [], "paperid": "0B3D7EF0", "author_id": ["068A4619", "862766A8"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["alexander v veidenbaum", "arun kejariwal", "mukund madhugiri", "rosario cammarota", "alexandru nicolau", "debora donato"], "keyword": [], "paperid": "6BCD4DFD", "author_id": ["1176EEDF", "59F5931F", "76772AA4", "7791586F", "7FD78B7F", "81438E07"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["tim leek", "ryan whelan", "david kaeli"], "keyword": ["taint analysis", "dynamic analysis"], "paperid": "7D6DEACB", "author_id": ["79BFAADB", "80DF8019", "81DF99FF"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["emery d berger"], "keyword": [], "paperid": "8607EB61", "author_id": ["7FCCE089"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["michael philippsen", "ronald veldema", "stefan kempf"], "keyword": [], "paperid": "0B397415", "author_id": ["296F058F", "79EB833C", "80441135"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["andreas zwinkau", "roland leisa", "sebastian buchwald", "christoph mallon", "matthias braun", "sebastian hack"], "keyword": [], "paperid": "5B75FEA3", "author_id": ["12844CE8", "1ACB419B", "7923E93D", "7E38CC75", "7E4A9F3D", "8034EB64"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["bogdan burliga"], "keyword": [], "paperid": "7A6EF1A6", "author_id": ["102207E2"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["thecla schiphorst", "greg corness"], "keyword": ["human computer interaction", "performing arts"], "paperid": "76496FCF", "author_id": ["581E4CBE", "77215BC1"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["stephen guynup", "elizabeth graff"], "keyword": ["narrative", "cinema", "film", "interactivity", "simulation"], "paperid": "7C99D0F4", "author_id": ["84860010", "849130E4"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["graham dove", "jason dykes", "sara jones", "amanda brown", "alison duffy"], "keyword": ["data visualization"], "paperid": "80A8899F", "author_id": ["7D54F3A4", "7E6C3C67", "7F50D920", "84DCE62D", "84F6874F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["baris serim"], "keyword": ["design", "material", "drawing", "human centered computing"], "paperid": "75864F33", "author_id": ["7D7B411E"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["aleksandra kleczar"], "keyword": [], "paperid": "7AC239D5", "author_id": ["37D61BAE"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["dariusz brodka"], "keyword": [], "paperid": "7956DE7F", "author_id": ["0016CD6E"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["carlos jensen", "jennifer l davidson"], "keyword": ["creativity"], "paperid": "7A5D5AEB", "author_id": ["803B451C", "7F0CB526"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["hakim hachour"], "keyword": ["knowledge"], "paperid": "79A11BC1", "author_id": ["8496770B"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["joanna janik"], "keyword": [], "paperid": "78024E5D", "author_id": ["7D215BF7"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jose c yong", "angela k y leung", "shyhnan liou", "chiyue chiu", "lin qiu", "letty kwan"], "keyword": ["neuroticism", "creativity", "emotions"], "paperid": "7D2137BB", "author_id": ["7D31E27D", "7DDF5F23", "7E366E5A", "7E97BB8C", "80C7D21E", "847A91E6"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["chihpin hsiao", "nick j davis", "ellen yiluen do", "shuangxin chen", "binjie sun", "rui chen"], "keyword": ["game design", "human cognition"], "paperid": "784FA0D3", "author_id": ["76D8B1FB", "7DCF1123", "801AE302", "84A615A9", "84E30C44", "AE87C307"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["eric paulos", "scott e hudson", "will harrigananderson", "haakon faste", "stacey kuznetsov"], "keyword": ["citizen science", "biosensing", "human centered computing"], "paperid": "78AADFA6", "author_id": ["74FDE0B1", "816B6416", "84CC3267", "84DBCE95", "86350BDC"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["mia borch munster", "anders haug"], "keyword": ["interior design"], "paperid": "78388266", "author_id": ["80CA3C42", "84EEFB82"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["renick bell"], "keyword": ["improvisation", "information systems", "human centered computing", "theory of computation", "information retrieval", "models of computation", "document management", "operating systems"], "paperid": "7C18A74D", "author_id": ["7D0650CF"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["damian hills"], "keyword": ["methodology", "interaction design", "information systems"], "paperid": "7A0C83BA", "author_id": ["79E1D402"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["andruid kerne", "andrew m webb", "bryant poffenberger", "nic lupfer", "colton revia", "rhema linder", "yin qu"], "keyword": ["interpretation", "reflection"], "paperid": "77F9A27A", "author_id": ["0CC5A3B3", "7F294ECD", "8482CA61", "849DD9A5", "84AFB2C3", "84DF2F4D", "85004544"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["aleksandra kleczar"], "keyword": [], "paperid": "7B05F046", "author_id": ["4A227691"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["damian hills"], "keyword": ["interaction design", "information systems"], "paperid": "768B399D", "author_id": ["79E1D402"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["dagmar reinhardt", "lian loke"], "keyword": ["interaction", "body", "choreography", "neuroplasticity"], "paperid": "77604C62", "author_id": ["7D152C86", "8116F49F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["oliver bown", "a m martin"], "keyword": ["machine learning"], "paperid": "7C372852", "author_id": ["2922BFFB", "85AF9661"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["joanna komorowska"], "keyword": [], "paperid": "7C83CF1B", "author_id": ["7881D13A"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["andrew johnston", "mark havryliv", "alon ilsar"], "keyword": [], "paperid": "782D9FE1", "author_id": ["7ECDFC45", "84993922", "85070989"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["thecla schiphorst", "kristin carlson"], "keyword": ["creativity"], "paperid": "77D030BA", "author_id": ["581E4CBE", "7F26F15E"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["erik m schmidt", "youngmoo e kim", "david rosen"], "keyword": ["music technology"], "paperid": "76462B14", "author_id": ["7CFD4370", "806ED964", "854867D3"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["mary lou maher", "mi jeong kim", "ju hyun lee"], "keyword": ["collective intelligence", "creativity"], "paperid": "80B3AF89", "author_id": ["7D2DBA41", "800D2936", "82B9C5D3"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["justyna migdal"], "keyword": [], "paperid": "7877CB21", "author_id": ["77E51A31"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["anna tatarkiewicz"], "keyword": [], "paperid": "7C0A4981", "author_id": ["303A1BAB"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["stanislaw \u015bniezewski"], "keyword": [], "paperid": "7B6DEB5E", "author_id": ["115DE964"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["deny w junaidy", "yukari nagai"], "keyword": ["creativity"], "paperid": "77FE0C0E", "author_id": ["3CE19CF7", "7DCCF549"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["martyn daderobertson", "tom schofield", "marian dork"], "keyword": ["cinema", "data visualization", "photography", "semiotics", "data"], "paperid": "80B85E19", "author_id": ["48EF5C68", "7AC649D1", "862A09B1"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["stephanie west"], "keyword": [], "paperid": "7CC3D666", "author_id": ["7FF3824E"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["mary mainsbridge", "robbie mudrazija"], "keyword": ["improvisation"], "paperid": "7640A99B", "author_id": ["84741F6B", "84DA80A4"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["ricardo sosa", "andy dong"], "keyword": ["social networks", "creativity", "ideation"], "paperid": "79DCD58E", "author_id": ["84B0DDB7", "7F68582F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["john vines", "tom schofield", "memo atken", "ed carter", "amy golding", "tom higham"], "keyword": ["kinect"], "paperid": "77AE7D22", "author_id": ["7893926B", "7AC649D1", "847D431D", "84B50B14", "84CBB4DE", "85732B3C"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["oliver bown", "a p martin"], "keyword": ["machine learning", "information systems", "information retrieval"], "paperid": "754240BD", "author_id": ["2922BFFB", "8570974F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["bert bongers", "victor donker", "michelle pickrell", "rebecca hall", "stuart t smith"], "keyword": ["empirical methods", "visual arts", "programming", "aesthetics", "creativity"], "paperid": "7E769310", "author_id": ["7E5D71F8", "7EF07F09", "7FDCBB9E", "7FFCEDD4", "80F553DB"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["agnieszka heszen"], "keyword": [], "paperid": "7CAA2180", "author_id": ["1180928B"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["d a lerner", "josette weinberg"], "keyword": ["nbo"], "paperid": "77F99129", "author_id": ["7DEE8BA6", "7E84543A"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["julia katherine haines"], "keyword": ["collaboration", "design", "culture", "information theory"], "paperid": "79123100", "author_id": ["84F61E30"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["toby gifford", "bradley d voltz", "andrew r brown"], "keyword": ["performance", "music", "generative", "interaction", "agency", "partnership", "information systems", "information retrieval", "human centered computing", "artificial intelligence"], "paperid": "784AC3B9", "author_id": ["7639B264", "7892143B", "7F61E0AB"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["nick bryankinns", "ben bengler"], "keyword": ["collaboration", "interaction design", "field study", "information retrieval", "information systems", "human centered computing"], "paperid": "7E8E3948", "author_id": ["2CDC3E72", "77C20431"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["andrew hugill", "fania raczinski", "hongji yang"], "keyword": ["information retrieval"], "paperid": "7563EC52", "author_id": ["750FE18B", "7BF96CE0", "7CF6474E"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["stanislaw \u015bniezewski"], "keyword": [], "paperid": "7A4D9955", "author_id": ["0DD10D2F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["ingrid maria pohl"], "keyword": ["design method", "sense of touch", "prototyping", "human centered computing"], "paperid": "7834385A", "author_id": ["84C86F0B"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["yukari nagai", "deny w junaidy"], "keyword": [], "paperid": "75EA9156", "author_id": ["7DCCF549", "3CE19CF7"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["ruth aylett", "sandy louchart"], "keyword": [], "paperid": "785F912C", "author_id": ["2ACDF1FB", "863C03D7"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["josephine anstey", "dave pape", "devin wilson"], "keyword": ["alien intelligence"], "paperid": "76708E81", "author_id": ["786CEAC8", "7D25DF7A", "849A49B4"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["agnieszka fulinska"], "keyword": [], "paperid": "76FAA0F7", "author_id": ["2FDCA581"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["philippe pasquier", "steven j barnes", "benjamin david robert bogart"], "keyword": ["simulation", "default mode network", "perception", "neuroscience", "biopsychology", "mental imagery", "art", "generative", "creativity", "artificial intelligence"], "paperid": "7CFC2BC7", "author_id": ["7CEA59A2", "7D38EAF8", "7F146127"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["neil maiden", "anja sisarica", "kevin pudney", "lucia panesse", "dalia morosini", "malcolm e rose"], "keyword": ["creativity"], "paperid": "7A2BF973", "author_id": ["10041AAF", "14B79684", "7640CF8F", "7B0B61AA", "7C192ADE", "7E764D7D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["anders haug", "mia borch munster"], "keyword": ["aesthetics", "product designer", "argumentation", "design process"], "paperid": "7A6549D4", "author_id": ["84EEFB82", "80CA3C42"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["aaron kozbelt", "scott dexter"], "keyword": ["empirical methods", "aesthetics", "visual arts", "creativity", "programming"], "paperid": "7ADFC67E", "author_id": ["00436BAD", "7C338954"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["ron wakkary", "audrey desjardins"], "keyword": ["practice theory"], "paperid": "7FCAA4E7", "author_id": ["109657A7", "7DA04F83"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["mateusz strozynski"], "keyword": [], "paperid": "764981AC", "author_id": ["7AC7BD56"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["marcin pawlak"], "keyword": [], "paperid": "760E7560", "author_id": ["7FD40645"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["tomasz grabowski"], "keyword": [], "paperid": "796E0A93", "author_id": ["813AF65D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["viveka weiley", "matt adcock"], "keyword": ["physical computing", "cscw", "place", "mixed reality", "collaboration", "drawing", "art"], "paperid": "76517980", "author_id": ["84A1F7BC", "80FC7C3B"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["philippe pasquier", "benjamin david robert bogart"], "keyword": ["perception", "mental imagery", "biopsychology", "creativity"], "paperid": "7A5F7836", "author_id": ["7CEA59A2", "7F146127"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["daniel cermaksassenrath", "clinton watkins"], "keyword": ["internet", "filter", "installation"], "paperid": "7917EBD0", "author_id": ["02D98631", "84F75245"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["mira dontcheva", "ellen yiluen do", "nicholas davis", "holger winnemoller"], "keyword": ["creativity", "human computer interaction", "cognitive science", "human centered computing"], "paperid": "805EF293", "author_id": ["0C8F31E6", "801AE302", "81BD3AC9", "85469AB4"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jan kucharski"], "keyword": [], "paperid": "7BB5464C", "author_id": ["8117F902"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["benjamin carey"], "keyword": ["improvisation", "computer music", "information retrieval", "information systems"], "paperid": "7572A133", "author_id": ["8503EB57"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["derek reilly", "dustin freeman", "fanny chevalier", "nathan lapierre"], "keyword": ["silhouette", "public", "art"], "paperid": "76D87EFB", "author_id": ["7D2AFF4A", "80FD35FA", "8210FF77", "847BA229"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["zhao chen", "fu zhiyong", "wu jiayu", "lin xu", "pan jiajia", "liu zhiyuan", "tang jiayu"], "keyword": ["social networks"], "paperid": "7F41DA98", "author_id": ["847B0FF5", "84A83D53", "84D87934", "84EAFEF3", "84F0970D", "8506B1D7", "850C7296"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["ken friedman"], "keyword": ["knowledge systems", "human centered computing"], "paperid": "756663DE", "author_id": ["71580F91"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jane w davidson", "sandra garrido", "sean bernard"], "keyword": ["personality", "music", "creativity"], "paperid": "7A4ACFBD", "author_id": ["7EADC89E", "7FEFD0C8", "84BF0ECF"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["hubert wolanin"], "keyword": [], "paperid": "7BB10002", "author_id": ["2C18EB4E"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jeffrey bardzell", "shad gross", "shaowen bardzell"], "keyword": ["critical theory", "experience design", "style"], "paperid": "7C0145DD", "author_id": ["4759F6BD", "80CA4B8F", "862CBCAE"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jerzy styka"], "keyword": [], "paperid": "770B982B", "author_id": ["2B37D894"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["agnieszka fulinska"], "keyword": [], "paperid": "76AA9D83", "author_id": ["2CE6E47D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["celine latulipe"], "keyword": ["politics", "art", "value", "creativity", "human centered computing"], "paperid": "7A6727B9", "author_id": ["77835371"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["moushumi sharmin", "brian p bailey"], "keyword": ["reflection", "design process"], "paperid": "7FB15CE3", "author_id": ["79D09B76", "7D345879"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["joanna janik"], "keyword": [], "paperid": "7960F56A", "author_id": ["80AA86BC"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["steve dipaola", "carman neustaedter", "jim bizzocchi", "claude fortin", "kate hennessy"], "keyword": ["sensory modalities", "visualization", "ubiquitous computing", "computation"], "paperid": "79D74B93", "author_id": ["67B76C74", "77AA1E31", "79B581BF", "79F714DC", "7D4AEFBA"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["daniel cermaksassenrath", "jenna gavin", "matthew martin"], "keyword": ["media", "meaning", "transparency", "game", "installation"], "paperid": "7521FB6B", "author_id": ["02D98631", "7F899AAF", "816989D4"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["thecla schiphorst", "lyn bartram", "albert hwang", "diego s maranan"], "keyword": ["embodied cognition", "popular culture", "dance", "performance"], "paperid": "7A9F89B8", "author_id": ["581E4CBE", "8056D855", "84FE7128", "8503538C"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["livia giacomini", "stephanie rajalingam", "ernesto sumarkho", "thomas marcusson"], "keyword": [], "paperid": "7838FE62", "author_id": ["8473AF33", "84982118", "84B4F1A9", "84F2D16F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["alexander wiethoff", "saul greenberg", "michael rohs", "andreas butz", "julia kufner", "hanna schneider"], "keyword": ["prototyping", "design process"], "paperid": "8028FE44", "author_id": ["7A07AE25", "7E66CCEC", "7FC9516D", "80016278", "84965EBB", "84DF1E31"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jacek hajduk"], "keyword": [], "paperid": "77815798", "author_id": ["7D9C2FE2"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["arne eigenfeldt"], "keyword": ["electronic dance music", "computational creativity"], "paperid": "759A64C8", "author_id": ["060E36B0"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["joao dos santos"], "keyword": ["installation", "digital art", "interfaces", "human centered computing"], "paperid": "77F32F16", "author_id": ["84C18D6D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["neil maiden", "kevin pudney", "julie macmanus", "malcolm e rose", "sara jones", "kristine pitts", "kos zachos", "ian turner"], "keyword": [], "paperid": "7C27C362", "author_id": ["10041AAF", "7640CF8F", "7E383A61", "7E764D7D", "7F50D920", "7FF4A043", "84FAC9E5", "85392622"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["thecla schiphorst", "chyicheng lin", "renata m sheppard", "lian loke"], "keyword": ["user experience", "design process"], "paperid": "7C4C721B", "author_id": ["581E4CBE", "7D8FEC5C", "7E4A9A62", "8116F49F"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["jennifer lade", "jonathan duckworth"], "keyword": ["play"], "paperid": "7C66C7C8", "author_id": ["7766EFD8", "7FD92748"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["francis quek", "joshua tanenbaum", "sharon lynn chu", "luke gusukuma"], "keyword": ["creativity", "imagination", "human centered computing"], "paperid": "7B9F385C", "author_id": ["793AF17F", "7B9C21BC", "80D6D767", "84CA590D"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["matias espinoza", "jaime sanchez", "marcia de borba campos", "lotfi b merabet"], "keyword": ["biomedical research", "bioinformatics", "mobility", "orientation"], "paperid": "7EDA692F", "author_id": ["7D729C0C", "7EABA055", "80582927", "8631F013"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["michail n giannakos", "letizia jaccheri"], "keyword": ["human centered computing"], "paperid": "7BB372E0", "author_id": ["152E2804", "69F33D99"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["alwin de rooij", "sara jones"], "keyword": ["creativity"], "paperid": "8171EAA7", "author_id": ["7ECED2C6", "7F50D920"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["robert j k jacob", "garth griffin"], "keyword": ["information systems", "human centered computing", "information retrieval"], "paperid": "7810800A", "author_id": ["281D6D72", "8063DF59"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["maciej jonca"], "keyword": [], "paperid": "7C6B09A5", "author_id": ["777EA15B"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["shannon novak"], "keyword": ["mobile device", "music", "installation", "augmented reality", "art"], "paperid": "7F467FC7", "author_id": ["850049D6"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["maxine glancy", "tom bartindale", "patrick olivier", "peter wright", "david kirk", "elizabeth valentine"], "keyword": ["collaborative", "editing", "television", "creativity", "production", "human centered computing"], "paperid": "78D88C31", "author_id": ["779C8416", "7AB06784", "7D9DEA93", "7E148756", "7EBEB50C", "84C1B6F6"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["bartlomiej bednarek"], "keyword": [], "paperid": "7CD716FD", "author_id": ["8082C5ED"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["david h albonesi", "adam m izraelevitz", "paula petrica", "christine a shoemaker"], "keyword": [], "paperid": "7AAAE0A7", "author_id": ["0E2B7536", "14A31C01", "2BE5629B", "7A8C892C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ronald g dreslinski", "reetuparna das", "satish narayanasamy", "sudhir satpathy"], "keyword": ["thermal management", "gpu computing"], "paperid": "7DA336D7", "author_id": ["0D1200EE", "7EA10205", "807B28A8", "84E22D9E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["luis ceze", "georg seelig", "richard a muscat", "karin strauss"], "keyword": ["hardware"], "paperid": "7B2986CB", "author_id": ["7676D4CD", "773179CD", "7B9959C2", "7CF22D08"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["stefanos kaxiras", "alberto ros"], "keyword": ["synonyms", "performance", "multicore", "cache coherence", "dynamic memory", "semiconductor memory", "integrated circuits", "hardware"], "paperid": "7E0B43E9", "author_id": ["14BF323D", "7F2BB618"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["chengchun tu", "chaotang lee", "tzicker chiueh"], "keyword": ["error correction", "dynamic random access memory"], "paperid": "79879DF7", "author_id": ["7E28D46E", "7FC57EE1", "8588A452"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mark manasse", "karin strauss", "john d davis", "parikshit gopalan", "rodolfo azevedo", "sergey yekhanin"], "keyword": ["error correction", "phase change memory"], "paperid": "7E3AE2C6", "author_id": ["77FDE964", "7CF22D08", "7D2A9855", "7E7E699B", "7E8327FF", "8498D425"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["minsoo rhu", "mattan erez"], "keyword": ["simd"], "paperid": "758A4AA7", "author_id": ["64B33F35", "810352AA"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["alex d breslow", "lingjia tang", "jason mars", "hailong yang"], "keyword": ["datacenters"], "paperid": "7897CEEC", "author_id": ["7D3E6382", "7DC2748A", "7E03B7B7", "851A3883"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yale n patt", "m aater suleman", "jose a joao", "onur mutlu"], "keyword": ["multicore", "critical sections"], "paperid": "7866EED6", "author_id": ["079E6C3C", "6D181C5E", "7B7EE05A", "80C6C70F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["eric s chung", "john d davis", "jaewon lee"], "keyword": ["fpga", "mobile", "big data", "asic", "query language", "database"], "paperid": "7B2B6DEB", "author_id": ["798D08C6", "7D2A9855", "863A14D4"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["tor m aamodt", "vijay janapa reddi", "syed zohaib gilani", "nam sung kim", "tayler hetherington", "jingwen leng", "ahmed eltantawy"], "keyword": ["energy", "power"], "paperid": "7CC14FA6", "author_id": ["724608CD", "77DD0E23", "7DBFF8C2", "7DCBA1DC", "849290ED", "84BBBFA3", "84E73B11"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yi ge", "yu zhang", "tao liu", "hubertus franke", "kun wang", "xiaotao chang", "jimi xenidis", "fei chen"], "keyword": ["dynamic random access memory", "error correction"], "paperid": "786FBFEE", "author_id": ["777B6ADC", "7F710A63", "80D928C8", "81EA26B4", "8230A543", "849EE2A2", "84FB9634", "8601CEF5"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["krste asanovic", "david a patterson", "henry cook", "sarah bird", "miquel moreto", "khanh dao"], "keyword": ["optimization", "gpu computing", "throughput", "computer architecture", "hardware", "thermal management"], "paperid": "77773739", "author_id": ["285BDA61", "7D1BF6D7", "7EBED3F1", "80DF28D5", "81C5172E", "84BC895E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["srilatha manne", "indrani paul", "manish arora", "sudhakar yalamanchili", "w lloyd bircher"], "keyword": ["thermal management", "gpu computing", "design"], "paperid": "774D5312", "author_id": ["7CEF8C83", "7F025DCC", "804DA9D3", "80E1809F", "8508A099"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["wajahat qadeer", "christos kozyrakis", "ofer shacham", "rehan hameed", "mark horowitz", "preethi venkatesan"], "keyword": ["convolution", "energy efficiency", "computational photography", "demosaic"], "paperid": "7D5243D5", "author_id": ["09ADA382", "2A835758", "6D566651", "7D85050E", "7DFAA11D", "7E842115"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jichuan chang", "mark d hill", "michael m swift", "arkaprava basu", "jayneel gandhi"], "keyword": ["virtual memory"], "paperid": "7871F054", "author_id": ["7D80D069", "7DECA359", "7F4407D2", "80FA8D21", "84BA2AF6"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["sandhya dwarkadas", "arrvindh shriraman", "hongzhou zhao", "snehasish kumar"], "keyword": ["multicore", "synonyms", "cache coherence"], "paperid": "79B3C5C2", "author_id": ["01253277", "62112AAD", "7DCB093E", "849E8DDE"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["qing guo", "engin ipek", "eby g friedman", "ravi patel", "xiaochen guo"], "keyword": ["tcam", "stt mram", "semiconductor memory", "integrated circuits", "hardware"], "paperid": "7561E200", "author_id": ["75941923", "7CD6335A", "7E5A3793", "7F5E1F94", "805594E0"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["janani mukundan", "jose f martinez", "jeffrey a stuecheli", "hillery c hunter", "kyuhyoun kim"], "keyword": ["computational photography", "convolution", "demosaic", "energy efficiency"], "paperid": "771B040E", "author_id": ["7987A83B", "7E30089A", "7EEFB154", "801897BA", "811D8388"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["canturk isci", "jeffrey o kephart", "michael frissora", "suzanne mcintosh", "rajarshi das", "robert wolford", "james e hanson", "scott a piper", "allen ng", "robert kantner", "tom brey", "abdoulaye traore", "james norris"], "keyword": ["dynamic random access memory", "error correction"], "paperid": "7800B602", "author_id": ["6AF67033", "7294B351", "7881188A", "7D580BA4", "7D6FC4C1", "7F040BED", "7F9A2AAC", "8173B7C3", "8477D9DD", "847C2D09", "84E61443", "84F5DABA", "85703E99"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jose f martinez", "saugata ghose", "hyodong lee"], "keyword": ["dynamic random access memory", "error correction"], "paperid": "7C742236", "author_id": ["7E30089A", "848224F8", "84E44A79"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["pinar tozun", "andreas moshovos", "anastasia ailamaki", "islam atta", "xin tong"], "keyword": ["oltp", "concurrency", "models of computation", "theory of computation", "information systems", "dynamic memory", "semiconductor memory", "integrated circuits", "hardware"], "paperid": "76657EAC", "author_id": ["1C3D6D00", "778385FA", "78A3D443", "80F4B339", "8500D6D7"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["christos kozyrakis", "d sanchez"], "keyword": ["error correction", "phase change memory"], "paperid": "7DF5696C", "author_id": ["2A835758", "7D0E9644"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["minshu zhao", "donald yeung", "mengju wu"], "keyword": ["power", "energy"], "paperid": "773253D6", "author_id": ["7D7ED81A", "7E412B4C", "7F936840"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["thomas f wenisch", "parthasarathy ranganathan", "ali saidi", "david meisner", "kevin lim"], "keyword": ["computational photography", "demosaic", "convolution", "energy efficiency"], "paperid": "7B9F5C39", "author_id": ["0E156087", "7DD6C7AD", "7E0C62D8", "7FCD634A", "8053EFCD"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["adrian m caulfield", "steven swanson"], "keyword": ["error correction", "phase change memory"], "paperid": "78324A10", "author_id": ["77404699", "82C453DD"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["derek lockhart", "christopher batten", "ji kim", "shreesha srinath", "christopher torng"], "keyword": ["error correction", "dynamic random access memory", "computer graphics", "single instruction multiple data"], "paperid": "7E4ABA32", "author_id": ["7C9F4E8C", "7F0FD3A9", "7F88496A", "84E9827B", "85102968"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["srinivas devadas", "ling ren", "christopher w fletcher", "marten van dijk", "xiangyao yu"], "keyword": ["machine learning"], "paperid": "811E4FF0", "author_id": ["32FE9E14", "7BCC8A12", "7D6FAC56", "7DF53C99", "7EDB0B92"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["stijn eyerman", "lieven eeckhout", "jennifer b sartor", "kristof du bois"], "keyword": ["energy", "power"], "paperid": "7C4FB4D2", "author_id": ["75AF1088", "77AC477F", "84D801C2", "84F311AC"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["nak hee seong", "sungkap yeo", "hsienhsin s lee"], "keyword": ["phase change memory"], "paperid": "7CB13686", "author_id": ["76D237A3", "7DCA0EF2", "800628BD"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["olivier temam", "rodolphe heliot", "zheng li", "bilel belhadj", "antoine joubert"], "keyword": [], "paperid": "7A8E2A70", "author_id": ["0D04B855", "3F57685D", "4E019258", "77FF9E28", "7E865CAF"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["abdullah muzahid", "josep torrellas", "yuelu duan"], "keyword": ["parallel programming", "sequential consistency", "synchronization"], "paperid": "755F2127", "author_id": ["7C986407", "806F4690", "84EE58F9"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["g edward suh", "ruirui huang", "erik halberg"], "keyword": ["fpga prototype"], "paperid": "7E199A73", "author_id": ["7F3DE3E5", "8108E2E2", "8495D391"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jaewoong sim", "vilas sridharan", "gabriel h loh", "mike oconnor"], "keyword": ["reliability", "cache", "robustness", "dynamic memory", "semiconductor memory", "integrated circuits", "hardware"], "paperid": "7838A9D6", "author_id": ["7F4799B5", "7FD14D4E", "83E60DB3", "84FD0B5E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["neal c crago", "michael adler", "michael pellauer", "vladimir pavlov", "daniel lustig", "angshuman parashar", "bushra ahsan", "aamer jaleel", "randy l allmon", "stephen maresh", "antonia zhai", "mohit gambhir", "rachid rayess", "joel emer"], "keyword": [], "paperid": "7BAB2086", "author_id": ["755E3590", "76E8EA6E", "771D6110", "7830AFAB", "78F48FA7", "7D50F3E6", "7D59D7B9", "7DF4AA73", "82B5CB4D", "848CC6FC", "84C334CA", "84E1ECFE", "850858DA", "863E7E56"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["naifeng jing", "yao lu", "ramon canal", "zhigang mao", "shrikanth ganapathy", "minyi guo", "xiaoyao liang", "yao shen"], "keyword": ["computer architecture", "data processing", "energy efficiency", "logic design"], "paperid": "79462147", "author_id": ["764578CC", "7DF2B544", "7FD8989C", "8014C561", "804ED697", "80EA58AD", "810A67ED", "82A3C2F8"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xavier vera", "nikos foutris", "antonio gonzalez", "d gizopoulos"], "keyword": [], "paperid": "7F28CFB3", "author_id": ["5C847AD7", "6D5051B8", "83D1779D", "85CB2228"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["adwait jog", "ravishankar iyer", "a k mishra", "chita r das", "onur mutlu", "mahmut kandemir", "onur kayiran"], "keyword": [], "paperid": "7635C61C", "author_id": ["779867A1", "7E848A22", "7F558F19", "805BF7BD", "80C6C70F", "82A47F45", "84C33137"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zhiqiang lin", "junyuan zeng", "jonghyuk lee", "yuanfeng wen", "weidong shi", "ziyi liu"], "keyword": ["hardware security", "computer architecture", "hardware", "integrated circuits", "semiconductor memory"], "paperid": "7FD4A467", "author_id": ["7F5C3D7F", "7F9B4873", "80003528", "80A6F375", "80E9CCD0", "812D6FAD"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["daniel kudrow", "diana franklin", "kenneth r brown", "yu tomita", "kenneth bier", "z deng", "frederic t chong"], "keyword": ["compilers", "programming languages", "quantum computers"], "paperid": "7D6ADE6A", "author_id": ["78CE4B7D", "7E3D143D", "7F07E729", "812BBC74", "84B96F58", "84FF8A4C", "85515B25"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["babak falsafi", "djordje jevdjic", "stavros volos"], "keyword": ["bandwidth efficiency", "dynamic memory", "semiconductor memory", "integrated circuits", "hardware"], "paperid": "7E694B26", "author_id": ["06FF2F22", "0D40A4A9", "0FCC6356"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["lingjia tang", "jason mars"], "keyword": ["datacenters"], "paperid": "75ED8F09", "author_id": ["7DC2748A", "7E03B7B7"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["srinivas devadas", "george kurian", "omer khan"], "keyword": ["cache coherence", "multicore"], "paperid": "79C7C573", "author_id": ["32FE9E14", "804D8FEC", "80792C06"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["matthew maycock", "simha sethumadhavan", "adam waksman", "salvatore j stolfo", "john demme", "adrian tang", "jared schmitz"], "keyword": ["machine learning", "hardware"], "paperid": "81276B0D", "author_id": ["75583050", "75717FD3", "75822DE0", "788368E8", "7B2EE9EE", "84CE401A", "84D9617A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["daniel j sorin", "blake a hechtman"], "keyword": ["stt mram", "tcam"], "paperid": "8101FF79", "author_id": ["11FA3499", "42EB00C8"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ted huffmire", "jason oberg", "hassan m g wassel", "ryan kastner", "ying gao", "frederic t chong", "timothy sherwood"], "keyword": [], "paperid": "7FA13CB6", "author_id": ["755512E4", "76346DF2", "7BF367B1", "7E351334", "84C8CF9B", "85515B25", "8567EC11"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["anahita shayesteh", "aniruddha s vaidya", "mani azimi", "dong hyuk woo", "roy saharoy"], "keyword": ["simd", "computer graphics"], "paperid": "75A1CFA4", "author_id": ["76BD8137", "78E38A0C", "80B5D436", "84D9C26F", "84F40801"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["o seongil", "jung ho ahn", "young hoon son", "j w lee", "yuhwan ro"], "keyword": ["microarchitecture", "dram", "hardware", "integrated circuits", "semiconductor memory", "dynamic memory"], "paperid": "75103C96", "author_id": ["164AD3EC", "7F13FF4D", "7F6A3552", "806F384E", "849EF64F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["kenneth a ross", "raymond j barker", "martha a kim", "lisa wu"], "keyword": ["microarchitecture", "real time systems"], "paperid": "7BDC061E", "author_id": ["7E25FAAF", "7F481048", "7FEDEBD0", "84B9425A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ben jaiyen", "j liu", "yoongu kim", "chris wilkerson", "onur mutlu"], "keyword": ["demosaic", "energy efficiency", "computational photography", "convolution"], "paperid": "757250FC", "author_id": ["0D57AF51", "7DEAF64C", "7E735039", "7FC17F4D", "80C6C70F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["di wang", "chuangang ren", "anand sivasubramaniam"], "keyword": ["datacenters"], "paperid": "75328E07", "author_id": ["00D5CDB5", "76DD8DE2", "812B3684"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["maged m michael", "cathy may", "derek e williams", "brad frey", "hung le", "harold w cain"], "keyword": ["synchronization", "parallel programming", "sequential consistency"], "paperid": "792C493B", "author_id": ["7D85FDA1", "7E0CE54E", "8074D2BD", "84D36115", "84D9CB58", "861FC496"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["tim kranich", "klaus danne", "justin e gottschlich", "nima honarmand", "rolf kassa", "gilles pokam", "nathan dautenhahn", "cristiano pereira", "josep torrellas", "shiliang hu", "samuel t king"], "keyword": ["fpga prototype"], "paperid": "8061C699", "author_id": ["099F0922", "5A1A434F", "77236E09", "7810F071", "78F8F92C", "7C6B3982", "7CBB678B", "7E924360", "806F4690", "81417A58", "862888EF"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["prashant j nair", "moinuddin k qureshi", "daehyun kim"], "keyword": ["error correction", "dynamic random access memory", "error rate"], "paperid": "7ACF2A38", "author_id": ["7DEB8CC7", "7F7156E0", "84D646BD"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["anys bacha", "radu teodorescu"], "keyword": ["thermal management", "gpu computing"], "paperid": "7D0F70C3", "author_id": ["84CFE6B3", "76B1DE3C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["daniel mosse", "rami melhem", "miao zhou", "bruce r childers", "yu du"], "keyword": ["phase change memory", "design", "semiconductor memory", "integrated circuits", "hardware"], "paperid": "7CCE604F", "author_id": ["78F7AFE6", "7BC96AD5", "7E6078D4", "80735B1D", "826F711F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["farshad khunjush", "ali karami", "sayyed ali mirsoleimani"], "keyword": ["principal component analysis", "regression analysis", "benchmark testing", "kernel", "predictive models", "programming", "high performance computing", "gpu programming"], "paperid": "767BC730", "author_id": ["088FF2AB", "7F6F994F", "8473486E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xu qi"], "keyword": ["alife", "image segmentation"], "paperid": "79DE5C8A", "author_id": ["7EEB8337"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yanmei lv", "yanlong ni", "aihua xu", "dong zhang"], "keyword": ["stratified random sampling"], "paperid": "77C090F4", "author_id": ["7F8E20DA", "7FA79A00", "801F8134", "8327AF3D"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["peng chen", "lu lu"], "keyword": ["parallel algorithm"], "paperid": "7AAAE5ED", "author_id": ["7F0F3726", "7FBBB0E2"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["hua liu", "chunqiao zhao"], "keyword": ["information system", "contracts management", "information management"], "paperid": "79B770D6", "author_id": ["7DAEB091", "84AC330C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["chunmei yu", "jianjun wang"], "keyword": ["entropy", "steganalysis", "sparse representation"], "paperid": "78A440F0", "author_id": ["800EFFB6", "FA846ED5"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["qingchao wei", "qizhong cai", "congse xie", "shaoming pan"], "keyword": ["compile", "can bus"], "paperid": "7D322EFC", "author_id": ["7DABE68E", "7EB497E6", "7F2615E8", "812C65F9"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ji hu", "xiaoping xue", "xiaoping wang"], "keyword": ["quorum sensing", "biological systems"], "paperid": "77A9E1C0", "author_id": ["7D46EF87", "837608EA", "852D548C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["hao liu", "yong wang", "yanxiu sheng", "xi wang", "zhiqiang wei", "konglong tang"], "keyword": ["message broker", "mqtt protocol"], "paperid": "77D6AFC7", "author_id": ["4922EA9D", "4C5452D7", "7D5FCA64", "7D6386A3", "7F0C5386", "80FF1B03"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["tiegang zou"], "keyword": [], "paperid": "75C29173", "author_id": ["7714BBBE"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["somayeh timarchi", "maryam saremi"], "keyword": ["adders", "encoding", "silicon", "computer architecture", "residue number system"], "paperid": "7B1BE0FC", "author_id": ["4770D897", "84F963D5"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mahmood ahmadi", "rashid isvand khatami"], "keyword": ["logic design", "decision trees", "network routing", "field programmable gate arrays", "computer architecture", "engines", "look up tables", "pipelines", "sram", "logic gates", "throughput"], "paperid": "77F8A581", "author_id": ["8433B039", "84798E57"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["steve renals", "jean carletta", "catherine lai"], "keyword": [], "paperid": "7D30E23C", "author_id": ["762E2C93", "790E6029", "863C6566"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mehrzad nejat", "alireza mazraee farahani", "mojtaba mohammadi abdevand"], "keyword": ["low power electronics", "network synthesis", "network topology", "logic gates", "clock", "synchronization", "circuit topology", "topology"], "paperid": "7B0C5DD9", "author_id": ["7FB4EC80", "84805C05", "84E038BF"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["juha plosila", "masoumeh ebrahimi", "masoud daneshtalab", "xin chang"], "keyword": ["network on chip", "network routing", "adaptive routing", "switches", "algorithm design and analysis", "out of order", "system on chip"], "paperid": "7791F4C5", "author_id": ["2464D6C1", "7F060C0B", "80CD21B3", "84DED1DA"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xueai zhao", "yingcong zhao"], "keyword": ["constructivism"], "paperid": "75410550", "author_id": ["7E963FBE", "8408A909"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jiawei fang", "binye wu", "xuejiao wu", "xiaolong ma", "xufeng tao"], "keyword": ["risk assessment"], "paperid": "7B6CD9AF", "author_id": ["7D283164", "7E338944", "7F058A50", "7F832D4C", "80E9CD82"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yunguang chen", "xue dong"], "keyword": [], "paperid": "7869B355", "author_id": ["7FF8DC77", "7CBC61C4"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["s m fakhraie", "farzad farshchi", "muhammad saeed abrishami"], "keyword": ["fir filters", "low pass filters", "low power electronics", "approximation theory", "function approximation", "adders", "hardware"], "paperid": "7C753211", "author_id": ["754F1ED8", "8475D70D", "84E4FD4E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["hao liu", "yanxiu sheng", "xi wang", "zhiqiang wei", "chunhai zhang", "shanhui yin"], "keyword": [], "paperid": "76CD4BC5", "author_id": ["4922EA9D", "7D5FCA64", "7D6386A3", "7F0C5386", "7FCA1DCB", "8102DE0D"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["hao liu", "yanxiu sheng", "xi wang", "zhiqiang wei", "chunhai zhang", "nuan sui"], "keyword": ["android"], "paperid": "7A046CB7", "author_id": ["4922EA9D", "7D5FCA64", "7D6386A3", "7F0C5386", "7FCA1DCB", "80A7C526"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["y liu", "erich zwyssig", "thomas hain", "c w fox"], "keyword": [], "paperid": "6DB4314E", "author_id": ["26899A79", "7C30293B", "7F990F19", "808A59A1"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ershad sharifahmadian", "yoonsuk choi", "shahram latifi"], "keyword": ["image registration", "artificial satellites", "image fusion", "spatial analysis", "wavelet transforms", "contourlet transform", "multispectral", "panchromatic", "spatial resolution", "wavelet"], "paperid": "77CB3D26", "author_id": ["7AB6BC12", "7EC2B081", "814613C4"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["rahebeh niaraki asli", "saeideh shirinzadeh"], "keyword": ["logic design", "low power electronics", "nanoelectronics", "vlsi", "cmos integrated circuits", "soft error", "transistors"], "paperid": "7AB8FD55", "author_id": ["7294BA26", "84DB96AC"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["limei cui", "yanlin tao"], "keyword": ["project management"], "paperid": "7545D318", "author_id": ["848D1B0A", "84D057A8"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ali jahanian", "ali zarei"], "keyword": ["vlsi", "nanowires", "application specific integrated circuits", "integrated circuit layout", "benchmark testing", "planning", "routing", "performance", "placement", "radio frequency"], "paperid": "7B814417", "author_id": ["797B0F48", "7D7A32A8"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mingrui xua", "jingjing guo", "changxi yang"], "keyword": [], "paperid": "7A06E011", "author_id": ["773FDEF8", "7EAA2139", "85038AE2"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jun shen", "lianjun jiang", "min li"], "keyword": ["sparse representation", "image classification", "hyperspectral"], "paperid": "751DB5B6", "author_id": ["3B7822EB", "7CF6BBE3", "86225170"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["pasi liljeberg", "hannu tenhunen", "masoumeh ebrahimi", "masoud daneshtalab"], "keyword": ["network on chip", "network routing", "mesh generation", "fault tolerance", "integrated circuit design", "mesh networks", "switches", "ascending order"], "paperid": "7B102C5C", "author_id": ["48F07116", "7A6FA438", "7EFB4FC0", "80CD21B3"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mohammadreza baharani", "hamid noori", "bagher salami"], "keyword": ["linux", "thermal management", "prediction algorithms", "multicore processing"], "paperid": "7860046B", "author_id": ["7B7282EB", "7D32A9D9", "80395FBC"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["hao liu", "yanxiu sheng", "xi wang", "zhiqiang wei", "yiyan zhang"], "keyword": ["buffering"], "paperid": "80A55944", "author_id": ["4922EA9D", "7D5FCA64", "7D6386A3", "7F0C5386", "7FD312AE"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["steve renals", "arnab ghoshal", "liang lu"], "keyword": [], "paperid": "59FE6BFE", "author_id": ["762E2C93", "7C29EFF1", "7D58752C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["hamid reza faragardi", "aboozar rajabi", "nasser yazdani"], "keyword": ["energy conservation", "resource allocation", "cloud computing", "energy efficiency", "genetic algorithms", "data centers", "servers"], "paperid": "7D26D250", "author_id": ["12753538", "76E64CAB", "7E4251EA"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xiaoqi lin", "yifeng wu"], "keyword": ["boiler", "fuzzy neural network"], "paperid": "7D2C8014", "author_id": ["802AB2A4", "858B72BD"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["tingting yang", "weiming zhang", "baoxin xiu", "jie liu"], "keyword": [], "paperid": "80F45B6B", "author_id": ["7D5EA0D2", "7DAA397C", "80E277E7", "86359C6F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["qin yan", "fan yu"], "keyword": ["decision tree", "id3 algorithm"], "paperid": "7B28BD53", "author_id": ["0F6CFC64", "80F2959D"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mehrdad biglari", "behnaz pourmohseni", "ehsan qasemi"], "keyword": ["cryptography", "field programmable gate arrays", "engines", "advanced encryption standard", "generators", "throughput", "encryption", "embedded systems"], "paperid": "7B04CC0B", "author_id": ["84721812", "84E1293F", "84EE8C9F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["lin zhai", "xin pan", "lina ning", "fan han"], "keyword": ["ransac", "sift"], "paperid": "7E5CF292", "author_id": ["7EDCB934", "7FD020C5", "812564E7", "815303F6"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["baolei ma", "yanmei zhang"], "keyword": ["real time", "socket programming", "database"], "paperid": "78C454A8", "author_id": ["7F26934E", "7DD25273"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["amirali baniasadi", "hajar falahati", "shaahin hessabi", "mania abdi"], "keyword": ["gpgpu", "ipc", "pipelines", "computer architecture", "kernel", "instruction per cycle"], "paperid": "7A76C591", "author_id": ["768EB67E", "7B929C6C", "7F24A2F3", "82E4DCBC"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xiangjin zeng", "cheng lu"], "keyword": [], "paperid": "75E26984", "author_id": ["7F430C05", "815EAC25"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["david martinez", "phil green", "heidi christensen"], "keyword": [], "paperid": "5A7BA0EF", "author_id": ["7F416827", "7FB35B9A", "805DFF1F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mehdi sedighi", "morteza saheb zamani", "zahra nabizadeh"], "keyword": ["fault tolerance", "logic circuits", "quantum gates", "benchmark testing", "computer architecture", "area", "error detection and correction"], "paperid": "7ACA663A", "author_id": ["775C06F3", "7E6EDB2B", "84A248E2"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jifeng cui", "feng xu", "wei zhou"], "keyword": ["wireless sensor networks"], "paperid": "75C3C507", "author_id": ["7515ECE8", "7D2629D6", "7E26592A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["alireza ahmadi mohammadabadi", "hadis heidari", "abdolah chalechale"], "keyword": ["image retrieval", "multi threading", "edge detection", "kernel", "feature extraction", "histograms", "instruction sets"], "paperid": "7ABA50AC", "author_id": ["79D5C760", "7E8BD0DA", "86372B78"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yuling huang"], "keyword": ["software architecture"], "paperid": "75E2FA90", "author_id": ["804ED5B8"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zhengjia wu", "yuesheng luo", "shaoxiong huang"], "keyword": ["neural network", "finite difference"], "paperid": "753D0ABD", "author_id": ["80EF9F97", "8351BB1F", "8417BF04"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jun li", "xiaoji chen", "jianli chu", "xia liu"], "keyword": ["gsm", "linux", "embedded", "rfid"], "paperid": "795EDD43", "author_id": ["7E4E1011", "7EE29C42", "7F3D7C51", "A0E58DB9"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["morteza saheb zamani", "seyed mohammad hossein shekarian", "shirin alami"], "keyword": ["logic design", "trusted computing", "benchmark testing", "hardware", "probabilistic logic", "noise", "logic gates"], "paperid": "78A24590", "author_id": ["7E6EDB2B", "80C09518", "8479EE78"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zhen fan", "fengbing luo", "lei zhang"], "keyword": [], "paperid": "77573D9C", "author_id": ["7E2C9DAF", "7EC06A93", "818F5DC2"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["wenxue yang", "feng yang", "zhe chen"], "keyword": ["prognostics and health management", "sensor", "electronics"], "paperid": "77BE7F4C", "author_id": ["7D370380", "7F1D2C8B", "821DDA6E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mo cheng", "maolin zhang"], "keyword": ["risk assessment", "functional model", "cluster analysis", "code analysis", "regression testing"], "paperid": "78AF8DC0", "author_id": ["7ED22D4C", "7E813506"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yali wu", "ruijun zheng", "yongqi sun", "rui zhang"], "keyword": ["parallel computing"], "paperid": "7C708270", "author_id": ["7CF2BF45", "7F207F0B", "804C8FB9", "C1D91D8A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jigang zhang", "na liang"], "keyword": [], "paperid": "7C2F63AB", "author_id": ["7D0CB01B", "7D7225E8"], "year": 2013}, {"conf_id": "4677BC9C", "conf": "international symposium on computer architecture", "author_name": ["maurizio palesi", "jorg henkel", "jianjia chen", "todor stefanov"], "keyword": ["network on chip", "software maintenance", "reliability", "availability", "information systems", "modeling and simulation", "grid computing", "networks", "hardware", "network architectures", "machine learning", "integrated circuits", "logic circuits", "human centered computing", "haptic devices", "software verification and validation", "graphical user interfaces", "requirements analysis", "theory of computation", "formal methods", "software verification", "verification", "world wide web", "web applications", "computer supported cooperative work", "web services", "information retrieval", "system on chip", "organizations", "adaptive systems", "middleware", "embedded systems", "multicore processing", "wireless communication", "mobile communication"], "paperid": "81B33F5F", "author_id": ["015DBBE9", "7EFA78E5", "7FF8BDA3", "801BB0D8"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["bella bose"], "keyword": ["parallel processing", "number theory", "hypercubes", "gaussian integers", "routing", "mesh networks", "topology", "network topology", "broadcasting", "parallel systems"], "paperid": "7BC1DD37", "author_id": ["7A05FBF6"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["kefei wang", "li zhang"], "keyword": [], "paperid": "7750365C", "author_id": ["80C0EDEE", "8571F5E3"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["a jahanshahi", "nariman eskandari", "mohammad kazem taram"], "keyword": ["monte carlo methods", "field programmable gate arrays", "heuristic algorithm", "monte carlo tree search", "games", "artificial intelligence"], "paperid": "79DAC3B4", "author_id": ["7791B31B", "8499C3DA", "84C4125F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["weikang qian", "junhui mei"], "keyword": ["sensor", "image processing", "fpga"], "paperid": "7CA1B4DB", "author_id": ["7D46AF71", "8029D521"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["jordi carrabina"], "keyword": ["field programmable gate arrays", "system on chip", "hardware", "programming model", "hardware acceleration", "asic", "complex systems", "multicore", "network on chip", "parallel programming", "embedded systems"], "paperid": "757A35B7", "author_id": ["15810123"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yue hu", "shouwei zhang", "bo liu"], "keyword": [], "paperid": "7E666549", "author_id": ["7D79FF94", "7FC3EF5C", "863BC980"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["shaoge yang", "yufeng peng", "lili zhao"], "keyword": [], "paperid": "8042000B", "author_id": ["7DABA835", "7EE6F0D9", "A70C04A0"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["daqing wang", "xiaoping xue", "caiyun chen", "fang zhang", "qing luo"], "keyword": ["formal verification"], "paperid": "7ECB29D6", "author_id": ["7D87727B", "80658568", "8087104B", "8527525A", "86306A68"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zahra shirmohammadi", "seyed ghassem miremadi"], "keyword": ["crosstalk", "network on chip", "gray codes", "hardware description languages", "switches", "encoding", "code word", "reliability", "repeaters"], "paperid": "7945C0D9", "author_id": ["47ECF559", "7A0AA9FF"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["baowen hu", "bo shen", "qing liu"], "keyword": ["data fusion"], "paperid": "764B9836", "author_id": ["7D34DB9D", "7E86A5D9", "ABFC6C89"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yujie zhang", "jian xu", "jing zhang"], "keyword": ["conditional random fields", "natural language processing"], "paperid": "75E7EE03", "author_id": ["80527A36", "9E4CF97F", "BDB93DA7"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["saeideh alinezhad chamazcoti", "seyed ghassem miremadi", "hossein asadi"], "keyword": ["raid", "encoding", "erasure code", "reliability", "layout", "computational complexity", "simulation"], "paperid": "779266EB", "author_id": ["09C45026", "7A0AA9FF", "8159430C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["javad alirezaie", "shaahin hessabi", "sanaz sadat alamian", "ramin fallahzadeh"], "keyword": ["low power electronics", "network routing", "fault tolerance", "network on chip", "latency", "functional test", "testing", "registers", "test strategy"], "paperid": "7ACB9303", "author_id": ["11D659EF", "7F24A2F3", "84942772", "8503336C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["pawel swietojanski", "m aniol", "peter bell", "thomas hain", "heidi christensen", "simon king", "p green"], "keyword": [], "paperid": "5D7473E0", "author_id": ["61A8359F", "7640F7FA", "7F152C2C", "7F990F19", "805DFF1F", "80EE2A7A", "81318677"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["huami yang", "qi wang", "zhuang liu"], "keyword": ["wireless networks"], "paperid": "787855AC", "author_id": ["7E812264", "83604742", "84B2466E"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["wenju xu", "yulong zhao", "guanwu zhou"], "keyword": ["data mining", "decision tree", "support vector machine", "big data"], "paperid": "7883F1EC", "author_id": ["7EF1A9CC", "7F0DE62A", "80D834FB"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["s m fakhraie", "ghasem pasandi"], "keyword": ["writing", "static random access memory", "nmos transistor"], "paperid": "7C487BB6", "author_id": ["754F1ED8", "84A205DF"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["wanli zuo", "xianglin zuo", "tianyi zhang", "mengmeng wang", "baoping feng", "qian zhang", "yuan yao"], "keyword": ["big 5 personality traits"], "paperid": "7A89FBD4", "author_id": ["7A7D8F4C", "7D3658DD", "7E20E6C4", "803B3477", "8158DF42", "84F889EE", "85C60BC9"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ping jia", "xiangrong ding"], "keyword": ["color temperature", "smart home", "solar energy", "led"], "paperid": "7E92AB21", "author_id": ["7D28CC9F", "81071212"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["christophe veaux", "junichi yamagishi", "simon king"], "keyword": [], "paperid": "81C8E7C6", "author_id": ["3D5125A2", "75C33164", "80EE2A7A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["thomas hain", "phil green", "heidi christensen"], "keyword": [], "paperid": "5AC732F7", "author_id": ["7F990F19", "7FB35B9A", "805DFF1F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xiaoyan yang", "jie chen", "bingmou cui"], "keyword": [], "paperid": "7B995E1B", "author_id": ["5660CAA6", "7DDC6613", "7E220EC3"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["qiuyue dang", "kuo zhang", "yueming lu", "jiwei zhang"], "keyword": [], "paperid": "7C6BA110", "author_id": ["7B63CE85", "7E439910", "8047BE7B", "80C4085A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["deyan wang"], "keyword": ["data analysis", "statistic"], "paperid": "7B4CF974", "author_id": ["7E37878C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["chenhan wu", "huisan zhang", "rui xu", "jing wang"], "keyword": ["model validation"], "paperid": "7C894BA8", "author_id": ["8030B176", "8082AF11", "8133BFA8", "816242F5"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["amir rastegarnia", "azam khalili", "shahrood aghazadeh", "amin lotfzad pak"], "keyword": ["mobile communication", "iterative methods", "vectors", "adaptive systems", "mobile computing", "estimation", "mobile network"], "paperid": "7C488EDA", "author_id": ["7970AF4A", "7D758241", "84874727", "84A89D6C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ghassem jaberipur", "h ahmadifar"], "keyword": ["adders"], "paperid": "7BBD8214", "author_id": ["40C92C36", "76EB3F68"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yubin li", "siyu hao", "bingmou cui", "yan wei"], "keyword": ["visualization"], "paperid": "7FB3469A", "author_id": ["7CEF08E9", "7F2F9EB1", "7FCE032A", "AFD300CE"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["daqing wang", "xiaolin shen", "shaoyin wang", "xiaoping xue"], "keyword": ["fault tolerant"], "paperid": "7AE52D24", "author_id": ["7D87727B", "7EA27255", "7F69212B", "80658568"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["wenqi wang", "qiang li"], "keyword": ["apriori algorithm"], "paperid": "7A1F639F", "author_id": ["863561CD", "DB57160F"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["shuxiang song", "tao wei", "haiying xia"], "keyword": ["iris recognition", "least squares fitting"], "paperid": "790631C2", "author_id": ["7D30E2D8", "7D550749", "83B550B4"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yan fang", "yibo liu", "xiaochuan yin"], "keyword": ["bayesian theory"], "paperid": "7999B121", "author_id": ["7D5BAEA5", "7FFF30D0", "801A3E5B"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xia geng", "zhi yang"], "keyword": ["data mining", "cloud computing"], "paperid": "78E9F554", "author_id": ["7D4B4EC1", "CFCF14DC"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["xiaolong song", "qiao wang", "zhengang jiang"], "keyword": ["segmentation"], "paperid": "7F85855F", "author_id": ["7D3C9349", "7E5D633D", "7FD33696"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["avi", "mendelson"], "keyword": [], "paperid": "5857C580", "author_id": ["0DD908E2", "138B09E3"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["yufu yin", "yunpeng wang", "yongfei miao"], "keyword": ["combinatorial optimization", "hypermutation"], "paperid": "7F298AF8", "author_id": ["7EE9378E", "80A1ACE8", "8637EC6C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ali jahanian", "r s hashemi", "saba amanollahi", "adel hosseiny"], "keyword": ["field programmable gate arrays", "logic design", "hardware", "algorithm design and analysis"], "paperid": "77857C78", "author_id": ["797B0F48", "800F87F8", "849152E1", "8506F4CE"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zuhong feng", "xiujuan gao", "long wang"], "keyword": ["bayesian network", "rough set", "mutual information"], "paperid": "7BAEA780", "author_id": ["7EB7EC6F", "81392DB3", "85647930"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["mehdi sedighi", "naser mohammadzadeh", "morteza saheb zamani", "mina chookhachizadeh moghadam"], "keyword": ["quantum computing", "scheduling", "layout", "logic gates", "ion trap", "physical design", "algorithm design and analysis", "routing"], "paperid": "7AC38391", "author_id": ["775C06F3", "7D60900C", "7E6EDB2B", "84D48769"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zuhong feng", "xiujuan gao", "long wang"], "keyword": ["load balancing", "ad hoc network"], "paperid": "79E260D9", "author_id": ["7EB7EC6F", "81392DB3", "85647930"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["oscar saz", "thomas hain"], "keyword": [], "paperid": "5ADCF534", "author_id": ["84B70B69", "7F990F19"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["zhenjiang zhang", "xiaoni wang", "wei cao"], "keyword": ["load balancing", "ad hoc network"], "paperid": "77A45C9C", "author_id": ["7F1E2B97", "809F08A2", "C66D6EF0"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["liu ningzhong", "yuan gao", "gaosheng yang"], "keyword": ["sparse representation"], "paperid": "7B73DD88", "author_id": ["31D09C9D", "7EE387A0", "7FD53604"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["junichi yamagishi", "adriana stan", "peter bell", "simon king"], "keyword": [], "paperid": "7CFADD83", "author_id": ["75C33164", "78CB7E75", "7F152C2C", "80EE2A7A"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["wenhua zeng", "chang wan", "lvqing yang"], "keyword": ["rfid", "location"], "paperid": "8117DC73", "author_id": ["8056D18C", "80CDCE2E", "80F7F275"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["siamak mohammadi", "rahim soleymanpour"], "keyword": ["instruction sets", "system on chip", "benchmark testing", "hardware", "algorithm design and analysis", "scheduling", "rfu"], "paperid": "76BDFB45", "author_id": ["7DC33EAE", "847E9E93"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["ahmed hemani", "shuo li", "shaoteng liu", "jamshaid sarwar malik"], "keyword": ["code generation", "electronic design automation", "hardware"], "paperid": "7CC53B2C", "author_id": ["750AF5D3", "7E8AA04B", "7F7533C4", "803DA384"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["roberto barrachicote", "jaime lorenzotrueba", "junichi yamagishi", "j m montero", "oliver watts"], "keyword": ["adaptation"], "paperid": "732757B4", "author_id": ["01935B96", "5BD2A678", "75C33164", "7F894F59", "7FEA4D62"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["thanos stouraitis"], "keyword": ["vlsi", "integrated circuit design", "cryptography", "hardware", "telecommunications", "algorithm design and analysis", "memory"], "paperid": "7AE78E71", "author_id": ["73DB8A3C"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["pierre lanchantin", "m s seigel", "p c woodland", "m j f gales", "yuesheng long", "xindong liu"], "keyword": [], "paperid": "583B1CA4", "author_id": ["0611A07E", "762B65F1", "77FFB0CA", "7DE7149C", "7E786F4D", "8005CBAA"], "year": 2013}, {"conf_id": "436EE6FE", "conf": "international symposium on computer architecture", "author_name": ["li cai", "bingyu zhu"], "keyword": ["floating car"], "paperid": "77306969", "author_id": ["76E9B698", "7F106C32"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ramana rao kompella", "advait dixit", "fang hao", "t v lakshman", "sarit mukherjee"], "keyword": ["software defined networks"], "paperid": "7E475A28", "author_id": ["0DA6F0BE", "77306147", "7891139D", "790E800C", "858F9FB6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["weijie wu", "liang zhang", "dan wang"], "keyword": ["stackelberg game", "networks", "network management"], "paperid": "7B895B19", "author_id": ["806A7EA2", "84FAB8DA", "85A5630A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["laurent vanbever", "jennifer rexford", "nate foster", "joshua reich", "theophilus benson"], "keyword": ["dynamic software updating", "software defined network", "reliability", "availability", "network management", "networks"], "paperid": "80973647", "author_id": ["013396E1", "77221471", "7D52D04A", "7E22B827", "84F47618"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jingwei zhang"], "keyword": ["modeling and simulation", "performance"], "paperid": "774EFA4F", "author_id": ["7E3BAE1F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["sikun yang", "yizhi wang", "eng keong lua"], "keyword": ["information extraction", "information retrieval", "information systems"], "paperid": "7B1C2A83", "author_id": ["8471034D", "848F91BF", "8492E458"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jim kurose"], "keyword": [], "paperid": "76C24A54", "author_id": ["5F653421"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["giovanna carofiglio", "raffaele chiocchetti", "d de rossi", "giuseppe rossini", "diego perino"], "keyword": [], "paperid": "7725F5B5", "author_id": ["11017D68", "79E3DFCB", "7EC17D8F", "7ED5C3E7", "84753894"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["carlos m s cabral", "mauricio ferreira magalhaes", "christian esteve rothenberg"], "keyword": ["emulation", "prototyping", "routing", "ccn"], "paperid": "7B3BD894", "author_id": ["7D6F5CD6", "7D7C5484", "8068D0EB"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["noel crespi", "lin lv", "antonio m ortiz", "yuanfang chen", "mingchu li", "lei shu"], "keyword": ["wireless networks", "floor plan"], "paperid": "7A3966F9", "author_id": ["7911F2C3", "7C03016B", "7CF8CD54", "7DB2572E", "7E0DA900", "81515C0C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["takeshi okuda", "suguru yamaguchi", "kazuya okada", "junya niwa"], "keyword": ["cloud computing", "mobile device", "distributed storage", "information retrieval", "information systems"], "paperid": "7BBE1D50", "author_id": ["7DDB0DD8", "7FD559AB", "800E0C1A", "847F5233"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["rob sherwood", "nate foster"], "keyword": [], "paperid": "859C0A6F", "author_id": ["767D4EFE", "7D52D04A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["kathi fisler", "daniel j dougherty", "shriram krishnamurthi", "arjun guha", "tim nelson"], "keyword": ["verification", "openflow", "software defined networks", "model checking", "formal methods", "logic", "theory of computation", "network management", "networks"], "paperid": "7F72D0A1", "author_id": ["4AC5AD8F", "7D7C2FB1", "7F283270", "8361C27E", "853A16E3"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["andreas wundsam", "nick mckeown", "scott shenker", "kyriakos zarifis", "peyman kazemian", "vimalkumar jeyakumar", "nikhil handigol", "sam whitlock", "hongyi zeng", "brandon heller", "colin scott", "james mccauley"], "keyword": ["network architecture", "openflow", "software defined networks", "troubleshooting", "networks"], "paperid": "7D3B5BC1", "author_id": ["0346F7BE", "0D02BCA6", "2AE7B5AF", "7525F955", "79B42316", "7A939360", "7B138304", "7B13D62A", "7EB05117", "814D9EE2", "82CB181E", "856680E8"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yashar ganjali", "sajad shiralishahreza"], "keyword": ["sampling", "openflow", "software defined network", "network monitoring", "networks"], "paperid": "7ECA545C", "author_id": ["762C8390", "857865DB"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["manuel peuster", "christoph robbert", "matthias keller"], "keyword": ["testbed", "networks", "operating systems"], "paperid": "7C1446FB", "author_id": ["8484F4B8", "84B6CB84", "863CC35F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["istemi ekin akkus", "ruichuan chen", "paul francis"], "keyword": ["analytics", "differential privacy"], "paperid": "75E57DF5", "author_id": ["75C0121B", "7ED82621", "8291E2AC"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["diego kreutz", "paulo verissimo", "fernando ramos"], "keyword": ["security", "dependability", "sdn", "operating systems"], "paperid": "7B3C562A", "author_id": ["77A51756", "78AF1F6B", "7F328BC3"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mark reitblatt", "marco canini", "nate foster", "arjun guha"], "keyword": ["fault tolerance", "openflow"], "paperid": "7EA03C53", "author_id": ["030016A5", "7BF33803", "7D52D04A", "8361C27E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["patrick eugster", "sergey i nikolenko", "kirill kogan", "william culhane", "eddie ruan"], "keyword": ["tcam"], "paperid": "80ACC113", "author_id": ["5880DD36", "7954B168", "7ADA6CB6", "807D99D5", "84FFD0EA"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["patrick senac", "a d nguyen", "michel diaz"], "keyword": ["routing", "networks", "network protocols", "network layer protocols", "routing protocols"], "paperid": "76066287", "author_id": ["6D2B4DCF", "7E935FBF", "7EF556B4"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["andreas mauthe", "edmundo monteiro"], "keyword": ["network operations", "network management", "network architectures", "human factors", "network protocols"], "paperid": "7C3183E6", "author_id": ["76F75145", "7FD6F8AA"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yan chen", "chengchen hu", "x wen", "yi wang", "chao shi"], "keyword": ["security", "openflow", "networks"], "paperid": "782ED433", "author_id": ["7D51F344", "7E956D63", "7EBB81D8", "84902E62", "854E8D19"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["hani jamjoom", "dan williams"], "keyword": ["software defined networking", "openflow", "high availability", "network architectures", "networks"], "paperid": "7E25D1B4", "author_id": ["127FB6B8", "8207A7E0"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick mckeown", "ramesh johari", "teyuan huang"], "keyword": [], "paperid": "7B4D5861", "author_id": ["0D02BCA6", "7D0EBF7F", "8111CA0E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ethan katzbassett", "harsha v madhyastha", "michael butkiewicz", "zhe wu", "dorian perkins"], "keyword": ["storage system", "cloud services", "optimization"], "paperid": "85C587B3", "author_id": ["00710F54", "49302D7D", "78B2221B", "83205760", "84C5DED1"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["eng keong lua", "andreas mauthe", "fernando boavida", "marilia curado", "eduardo cerqueira", "miko\u014faj leszczuk"], "keyword": [], "paperid": "86245C2B", "author_id": ["84CDA85C", "76F75145", "85F14C62", "7F3B1F9E", "7B6D9541", "863431F1"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["tal mizrahi", "yoram moses"], "keyword": ["configuration", "clock synchronization", "management", "sdn"], "paperid": "8140B960", "author_id": ["7A8E3877", "7D18AECB"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["kai wang", "jun li"], "keyword": ["dfa", "network security"], "paperid": "784E10A8", "author_id": ["7F7F4675", "85D1C505"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["patrick zwickl", "peter reichl", "andreas sackl", "patrick maille"], "keyword": ["quality of service", "economics"], "paperid": "7BA2B4BF", "author_id": ["5C481573", "7652D8DA", "78803AA2", "7FAB3726"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ishai menache", "virajith jalaparti", "peter bodik", "srikanth kandula", "chenyu yan", "mikhail rybalkin"], "keyword": ["optimization"], "paperid": "77BA1744", "author_id": ["02E80B7E", "03A8BC0B", "073BC207", "7C857356", "7F9E2D86", "84E63394"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["n blefari melazzi", "andrea detti", "bruno ricci"], "keyword": [], "paperid": "0BFD05F5", "author_id": ["697F13B0", "7B138094", "7E756D3C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["afnan fahim", "abderrahmen mtibaa", "khaled a harras", "mostafa ammar"], "keyword": [], "paperid": "863EC457", "author_id": ["7D2D68BD", "7C12D742", "85FB4A59", "7F031230"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nicola blefarimelazzi", "andrea detti", "bruno ricci"], "keyword": ["cellular network"], "paperid": "7DA2E02B", "author_id": ["0833834C", "7B138094", "7E756D3C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jiyoung woo", "ah reum kang", "huy kang kim"], "keyword": ["social contagion", "diffusion model", "sociology"], "paperid": "77710E11", "author_id": ["7D34A812", "7E1E867C", "8132A047"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["kai bu", "bin xiao", "xuan liu", "jiwei li"], "keyword": [], "paperid": "79170AEA", "author_id": ["79275B89", "7A740EAC", "7D183A17", "84F68C7E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["luca de cicco", "saverio mascolo", "gaetano carlucci"], "keyword": ["congestion control", "web applications", "world wide web", "information systems"], "paperid": "75BBDEF6", "author_id": ["800B2FA0", "805726AB", "84822701"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dino farinacci", "randy h katz", "sharon barkai", "d meyer"], "keyword": ["software defined networks", "networks", "network architectures"], "paperid": "7F4BEC4C", "author_id": ["73DE1079", "7F2DCB1C", "847ED56A", "855D6B2C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["klara nahrstedt", "karrie karahalios", "robin kravets", "hilfi alkaff", "andrew t campbell"], "keyword": ["energy management", "crowdsourcing"], "paperid": "7997DE76", "author_id": ["097C5971", "0E98294D", "7A1C4759", "7BE6AACA", "7CF67165"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mihaela ion", "jianqing zhang", "eve m schooler"], "keyword": ["privacy", "security", "attribute based encryption", "network architectures", "networks"], "paperid": "7655D642", "author_id": ["7AF8E83A", "84FCCC42", "856D7F49"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["wanfu ding", "gaogang xie", "hongtao guan", "chengyong lin", "heng pan", "junjie liu"], "keyword": [], "paperid": "76F86937", "author_id": ["7DBF37EF", "7E8B2C6E", "80496274", "82A1D347", "84E18478", "A4BF83B1"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["george parisis", "dirk trossen"], "keyword": ["network", "network architectures", "network protocols"], "paperid": "812A48F8", "author_id": ["78B7D188", "827479CE"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["marco canini", "dan levin", "petr kuznetsov", "stefan schmid"], "keyword": ["control plane", "software defined network", "network policy", "operating systems"], "paperid": "8159D3F7", "author_id": ["7BF33803", "7D269D6C", "7EF8257F", "80B6AFF2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["tutomu murase"], "keyword": ["mobile computing", "multimedia", "quality of service", "networks"], "paperid": "7A3E3225", "author_id": ["815E7152"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nahid shahmehri", "derek l eager", "vengatanathan krishnamoorthi", "niklas carlsson", "anirban mahanti", "patrik bergstrom"], "keyword": ["computer vision", "artificial intelligence", "application layer protocols", "network protocols", "networks"], "paperid": "7EAE8F33", "author_id": ["045350AF", "2B04780B", "654F9C6B", "7C292B1A", "811E9E6D", "81571AE6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["david erickson"], "keyword": ["java", "beacon", "openflow", "controller"], "paperid": "7C91F305", "author_id": ["815F785D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["brahim bensaou", "jun zhang", "jason min wang"], "keyword": ["network management", "network protocols", "networks"], "paperid": "767186CF", "author_id": ["7C4B4D89", "7EE6FBD7", "80A84EBE"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["seungwon shin", "guofei gu"], "keyword": ["software defined networking"], "paperid": "768A4999", "author_id": ["7E287CAF", "802C1129"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["you lu", "biao zhou", "lungchih tung", "mario gerla", "ashwin ramesh", "lohith nagaraja"], "keyword": [], "paperid": "7A38D226", "author_id": ["7CEC4115", "7D868F07", "7E5A90BF", "82268858", "84CDE7B0", "8506FDC5"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["baixi xing", "lekai zhang", "kejun zhang", "shouqian sun", "eng keong lua"], "keyword": [], "paperid": "75710E10", "author_id": ["7E5388B2", "7E83F81E", "7ECC344F", "7F6A8E6C", "84CDA85C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["david oran"], "keyword": [], "paperid": "7589C355", "author_id": ["5D20B354"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["christopher lorier", "jonathan philip stringer", "christian esteve rothenberg", "richard nelson", "qiang fu"], "keyword": ["computer science", "openflow", "networks"], "paperid": "80F0C2FB", "author_id": ["050BABCB", "7F780DB0", "8068D0EB", "834DC53D", "9F01CD0B"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nicholas j p race", "yehia elkhatib", "matthew broadbent", "panagiotis georgopoulos", "mu mu"], "keyword": ["software defined networking", "openflow"], "paperid": "7FECE9C5", "author_id": ["255619EE", "737D429F", "7730A4F8", "792EF370", "806B58E2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["natali ruchansky", "davide proserpio"], "keyword": [], "paperid": "7783D84E", "author_id": ["0527BB3F", "857BF331"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["guido marchetto", "matteo virgilio", "riccardo sisto"], "keyword": ["simulation", "security", "ddos attacks", "networks", "network protocols"], "paperid": "75F99273", "author_id": ["757E875C", "7CE95C70", "80EEF7B9"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mingwei xu", "zhongxing ming", "dan wang"], "keyword": ["algorithm"], "paperid": "80203F79", "author_id": ["7D353057", "7E006B27", "85A5630A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ken yocum", "alex c snoeren", "danny yuxing huang"], "keyword": ["openflow", "software defined networking", "modeling"], "paperid": "7EC0273F", "author_id": ["7B0F71D5", "7DEBB0CB", "80DE0A8B"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ethan katzbassett", "kyriakos zarifis", "jitendra padhye", "matt calder", "minlan yu", "rui miao"], "keyword": ["packet loss", "data center", "networks", "network protocols"], "paperid": "814FBB86", "author_id": ["00710F54", "7525F955", "7830534A", "7B4E65C3", "7D82CA42", "7F65F16B"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mingsyan chen", "weiliang shen", "kate chingju lin"], "keyword": ["mimo", "networks", "network protocols"], "paperid": "77BB2D3E", "author_id": ["010D45FB", "7EE91BE4", "8125D1BD"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["shyamnath gollakota", "qifan pu", "siyu jiang"], "keyword": ["user interface", "gestures", "wireless", "networks"], "paperid": "7CA5213A", "author_id": ["7997DF6E", "7E7BFF5E", "847DAEC5"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick feamster", "jennifer rexford", "dave levin", "theophilus benson", "bilal anwer"], "keyword": ["software defined networking", "network management", "networks"], "paperid": "7A5C6A2E", "author_id": ["51D985F7", "77221471", "7F3CA7E9", "84F47618", "850AF979"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["scott shenker", "ali ghodsi", "teemu koponen", "aurojit panda", "colin scott"], "keyword": ["software defined network", "computer and information science", "availability", "correctness", "operating systems"], "paperid": "7B9ADB9A", "author_id": ["2AE7B5AF", "70588ECB", "7A838B21", "7F1B08A4", "82CB181E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["rick mcgeer"], "keyword": ["np completeness", "complexity", "network protocols", "networks"], "paperid": "79A3C463", "author_id": ["13477B22"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dijiang huang", "di ma", "changjun hu", "yan zhu"], "keyword": ["attribute based encryption", "access control", "location based service", "public key encryption", "cryptography"], "paperid": "75914D09", "author_id": ["7E971992", "7EE45583", "80089B26", "863DE6C2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dina katabi", "fadel adib"], "keyword": ["wireless", "mimo"], "paperid": "7EE6A9C3", "author_id": ["0B9370B1", "7C51BD23"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["zoltan turanyi", "gergely pongracz", "l molnar", "zoltan lajos kis"], "keyword": ["network processor", "performance", "efficiency", "openflow", "power", "software defined networking", "data plane", "design"], "paperid": "78233A76", "author_id": ["2062C281", "6D207AEC", "831984D3", "8489375D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yu wu", "chuan wu", "francis c m lau", "bo li"], "keyword": ["video conferencing", "mobile computing", "cloud computing"], "paperid": "7E3BA811", "author_id": ["7DBC9BC0", "7DBF5A93", "7F44A7D2", "85A4DFF2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["david oran", "ashok narayanan", "natalya rozhnova", "yaogong wang", "injong rhee"], "keyword": ["congestion control"], "paperid": "7CA761FE", "author_id": ["5D20B354", "7DF6EFE6", "7E50B14B", "7F74EFB7", "804EB92D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["r l smelyanskiy", "v antonenko"], "keyword": ["virtualization", "emulation", "network simulation", "networks", "network protocols", "transport protocols"], "paperid": "7E3C30F2", "author_id": ["419080AA", "79FB04B3"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["seyed kaveh fayazbakhsh", "minlan yu", "vyas sekar", "jeffrey c mogul"], "keyword": ["networks"], "paperid": "7F7AA221", "author_id": ["79D294F2", "7D82CA42", "7E3BB59C", "84ED6010"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["haoyu song"], "keyword": ["forwarding plane", "sdn", "openflow", "networks"], "paperid": "79A249A3", "author_id": ["84A90B5F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jennifer rexford", "n p katta", "david walker"], "keyword": ["openflow", "software defined networking"], "paperid": "7B79CFB5", "author_id": ["77221471", "7A520839", "80DB37DA"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ulas c kozat", "guanfeng liang", "koray kokten"], "keyword": ["verification", "sdn", "openflow", "network monitoring", "networks"], "paperid": "7B035913", "author_id": ["79FF6E3A", "7D0550B5", "7DEA7BF7"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["chin guok", "ping pan", "chris liou", "sharfuddin syed", "abhinava sadasivarao", "andrew lake", "inder monga"], "keyword": ["sdn", "virtualization", "otn"], "paperid": "7DE8BB2D", "author_id": ["7A252CA4", "7DA2E52E", "7E393BD1", "7FD90E56", "7FFDFD98", "8091559A", "845BC61A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xing li", "gang wang", "tianyi wang", "haitao zheng", "ben y zhao"], "keyword": [], "paperid": "7CA2336A", "author_id": ["7D2F1B35", "7E54972D", "7E5D0961", "7ED780B5", "81212FE4"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["stefan schmid", "jukka suomela"], "keyword": ["software defined networking"], "paperid": "7DCF505C", "author_id": ["85F093B2", "7FFA3BD4"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xinggong zhang", "zongming guo", "feng lao", "tong niu"], "keyword": ["networks"], "paperid": "7B0EF4AF", "author_id": ["8005A0A8", "8068517F", "848FBC21", "84DDC917"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["john c s lui"], "keyword": ["cloud computing", "mobile computing", "security", "information systems"], "paperid": "75609F97", "author_id": ["79EA6402"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["peter peresini", "dejan kostic", "maciej ku\u017aniar", "marco canini", "nedeljko vasic"], "keyword": ["software defined network", "fault tolerance", "computer science", "operating systems", "reliability", "availability"], "paperid": "78B0C78F", "author_id": ["2990D76B", "74A29FA2", "7674F2DE", "7BF33803", "7E63F0C2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["sachin katti", "li erran li", "daniel perry", "aditya gudipati"], "keyword": ["software defined networking"], "paperid": "7F6A06E0", "author_id": ["7EF9A66F", "80E3D08F", "849FFDCC", "84F59D27"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["antonio carzaniga", "koorosh khazaei", "alexander l wolf", "michele papalini"], "keyword": ["publish subscribe", "routing", "networks", "network architectures"], "paperid": "7B433F70", "author_id": ["29AF08FF", "7889BF46", "856D855F", "85ECBAF9"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["peter peresini", "maciej kuzniar", "marco canini", "nedeljko vasic", "dejan kosti\u016b"], "keyword": ["software defined networking", "computer science", "consistency", "acid"], "paperid": "7F02D59E", "author_id": ["2990D76B", "79279A52", "7BF33803", "7E63F0C2", "84A98632"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["somaya arianfar", "jorg ott", "pasi sarolahti"], "keyword": ["resource management", "transport", "design"], "paperid": "7C1D74C7", "author_id": ["58E0952A", "78BDB00F", "861C306A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["david wetherall", "haichen shen", "xiao sophia wang"], "keyword": ["web", "mobile web", "cloud"], "paperid": "7F082089", "author_id": ["7876F595", "80765AB2", "82D9812D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["andrew d ferguson", "rodrigo fonseca", "shriram krishnamurthi", "arjun guha", "chen liang"], "keyword": ["openflow", "software defined networks"], "paperid": "7B73CECD", "author_id": ["7D66F0DC", "7ED1C6C5", "7F283270", "8361C27E", "84C48054"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["cedric westphal", "abhishek chanda"], "keyword": ["openflow", "software defined networking", "networks"], "paperid": "7C9EEE0F", "author_id": ["7616FA2F", "7D54F6C9"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["pakawat pupatwibul", "ameen banjar", "robin braun"], "keyword": ["distributed systems", "openflow", "networks", "network protocols"], "paperid": "75126C6C", "author_id": ["0DE63C5E", "79673BB8", "7DEC9A4F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["lorenzo saino", "ioannis psaras", "george pavlou"], "keyword": ["network architectures", "networks"], "paperid": "7BE5C600", "author_id": ["79945E50", "79947921", "7C7E3AF5"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jussi kangasharju", "jorg ott", "esa hyytia", "suzan bayhan"], "keyword": ["mobile search", "networks", "network architectures"], "paperid": "7BE12DF5", "author_id": ["7400092E", "78BDB00F", "7983C872", "7A41FB35"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["kevin benton", "l jean camp", "chris small"], "keyword": ["openflow", "vulnerability assessment", "denial of service", "software defined networking", "man in the middle attack", "network design", "networks"], "paperid": "7B0A3646", "author_id": ["7983B4B4", "7DFC716B", "84D0182C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nahid ebrahimi majd", "satyajayant misra", "reza tourani"], "keyword": ["access control", "security"], "paperid": "7F57AE08", "author_id": ["7CE91A8C", "80FAD95D", "85064015"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["diego r lopez", "wenfeng xia", "haiyong xie", "qiong sun", "tina tsou", "felix lu"], "keyword": ["software defined network", "networks", "operating systems", "process control", "openflow", "hardware", "ipv6", "ipv4 address space", "internet", "tunneling", "transport protocols", "protocols"], "paperid": "75EA6E70", "author_id": ["7DCD416B", "7E4EABB3", "7EE5513B", "802167A1", "82247DA1", "84BB0C74"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jon crowcroft", "ennan zhai", "zhong chen", "ruichuan chen", "zhuhua cai", "eng keong lua"], "keyword": ["system performance", "p2p", "self organization"], "paperid": "5A6C349B", "author_id": ["7575972F", "79D5112C", "7E8D8BF7", "7ED82621", "7F0D4B74", "860C82DF"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["amar phanishayee", "a j bernheim brush", "arjmand samuel", "ratul mahajan", "rayman preet singh", "evgeni filippov", "danny huang", "khurshed mazhar"], "keyword": ["home automation"], "paperid": "75AB73DF", "author_id": ["0B8169E7", "289DF75C", "7695EA66", "7E57D209", "7EB7D56F", "7F6B20EF", "8009E87B", "80FC20A7"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["zafar ayyub qazi", "minlan yu", "chengchun tu", "vyas sekar", "rui miao", "luis chiang"], "keyword": ["network management", "software defined networking", "networks", "network architectures"], "paperid": "7F5EF9AD", "author_id": ["7AD1AD87", "7D82CA42", "7E28D46E", "7E3BB59C", "7F65F16B", "80C4EAB7"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["roshan thapliya", "chaoxin hu"], "keyword": ["qos"], "paperid": "78826F92", "author_id": ["10B4C2BB", "84F65C71"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["george xylomenos", "christos tsilopoulos", "george c polyzos", "yannis thomas"], "keyword": ["multipath", "transport", "networks", "network architectures"], "paperid": "7751ABB7", "author_id": ["119AB49D", "130DE0B2", "1455D39D", "7E17FC6C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["gaogang xie", "zhenyu li", "qinghua wu"], "keyword": ["ccn", "network coding"], "paperid": "7702D2E5", "author_id": ["7E8B2C6E", "8145304D", "8173ABB6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["masoud moshref", "ramesh govindan", "minlan yu"], "keyword": ["software defined networking", "data center"], "paperid": "7EB7D8CE", "author_id": ["7AFAD970", "7D4AA4F2", "7D82CA42"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["vasileios kotronis", "dominik schatzmann", "bernhard ager"], "keyword": ["sdn", "testbed", "networks", "network architectures"], "paperid": "759873F9", "author_id": ["415D4C74", "70ACE07D", "793344A3"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ravishankar ravindran", "trisha biswas", "xinwen zhang", "guoqiang wang", "asit chakraborti"], "keyword": ["policy based routing", "service discovery", "networks", "network protocols"], "paperid": "7851DB11", "author_id": ["7D66AEA4", "7DE926D2", "7E38F856", "7EB43D21", "851665D0"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["costin raiciu", "mohamed ahmed", "joao martins", "felipe huici"], "keyword": ["sdn", "nfv", "virtualization", "networks", "network protocols"], "paperid": "7BAE9848", "author_id": ["0D51713C", "7D286F4F", "8109620D", "81535721"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["carlos m s cabral", "mauricio ferreira magalhaes", "christian esteve rothenberg"], "keyword": ["emulation", "routing", "ccn", "prototyping", "network protocols", "networks"], "paperid": "7C1353A7", "author_id": ["7D6F5CD6", "7D7C5484", "8068D0EB"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["boris koldehofe", "david lillethun", "beate ottenwalder", "umakishore ramachandran", "kirak hong"], "keyword": ["cloud computing", "internet of things", "programming model"], "paperid": "7A9AB72D", "author_id": ["06FE4754", "1306443A", "78757FDE", "7B2588C4", "7F7F241D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yohei kuga", "osamu nakamura", "kenjiro cho", "hiroaki hazeyama", "takeshi matsuya"], "keyword": ["ethernet", "shell script", "sdn"], "paperid": "770805E5", "author_id": ["76CB073D", "7EF88F97", "80AFBC1C", "84DC185F", "84E21E4E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dah ming chiu", "paul barford", "srinivasan seshan", "jia wang"], "keyword": [], "paperid": "8626261F", "author_id": ["7FD4D29B", "7BE7790A", "7CCEBFE2", "85972309"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["paul barford", "joel sommers", "mukta gupta"], "keyword": ["openflow", "software defined networks", "network flows", "simulation", "networks", "network management", "modeling and simulation"], "paperid": "7C94D341", "author_id": ["7BE7790A", "7E66D30F", "84904CF6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["syed obaid amin", "beichuan zhang", "lan wang", "lixia zhang", "a k m mahmudul hoque", "adam alyyan"], "keyword": ["design", "routing", "routing protocols", "network layer protocols", "network protocols", "networks"], "paperid": "7F5C56F0", "author_id": ["7EB1BFC0", "806738F5", "80964E66", "815F4B3F", "84A75075", "84AAC638"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mayutan arumaithurai", "k k ramakrishnan", "xiaoming fu", "jiachen chen"], "keyword": ["ccn", "reliability", "multicast", "pub sub", "congestion control", "networks", "network architectures"], "paperid": "7DFEB4A2", "author_id": ["02CDB597", "7F26F553", "80E7C369", "84EE985E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xavier costaperez", "andreas festag", "martin stiemerling", "joerg swetina", "hansjoerg kolbe", "juergen quittek", "hans van der veen", "stefan schmid"], "keyword": ["nfv", "ieee 802 11", "network protocols", "networks"], "paperid": "78291217", "author_id": ["05EA6950", "0C26D800", "3231D9F5", "77384E54", "791518D8", "7CD2756F", "7E86D28C", "856572CE"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ethan katzbassett", "nandita dukkipati", "barath raghavan", "tobias flach", "yuchung cheng", "neal cardwell", "shuai hao", "ankur jain", "ramesh govindan", "andreas terzis"], "keyword": ["redundancy", "congestion control", "packet loss", "tcp", "recovery"], "paperid": "804A1BA1", "author_id": ["00710F54", "0296DF21", "71D929A5", "7CE416A5", "7CFAF2C8", "7EBE9361", "7F31F051", "80A76374", "8495D5CB", "84EA5411"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["chris haseman", "susan e mcgregor", "monica s lam", "t j purtell", "willem bult", "madeline k b ross", "mathias lecuyer", "augustin chaintreau", "kanak biscuitwala"], "keyword": [], "paperid": "804F1823", "author_id": ["7EA8344C", "7EE43844", "7F535E45", "7FA64B45", "806E1F71", "80707CD7", "8205025D", "84AB2166", "84E5FF22"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["syed obaid amin", "yaoqing liu", "lan wang"], "keyword": ["routing", "scalability", "networks", "hardware"], "paperid": "7BA0FBC8", "author_id": ["7EB1BFC0", "8022CB26", "80964E66"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["gabor retvari", "janos tapolcai", "zalan heszberger", "attila k\u0151rosi", "andras majdan"], "keyword": ["data compression", "prefix tree", "data structures", "information systems", "networks", "compressors", "indexes", "entropy"], "paperid": "7F14E1C0", "author_id": ["03B080F4", "10926C15", "270A0B2A", "7C08330A", "8072143F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["john heidemann", "yuri pradkin", "lin quan"], "keyword": ["bayesian inference"], "paperid": "7E0DE237", "author_id": ["1042D22A", "6EFF9DD8", "7B17CAE6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jussi kangasharju", "suzan bayhan", "liang wang"], "keyword": ["game theory"], "paperid": "760E447A", "author_id": ["7400092E", "7A41FB35", "85FE215E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dinesh bharadia", "emily mcmilin", "sachin katti"], "keyword": ["interference cancellation", "full duplex", "networks"], "paperid": "80BF746C", "author_id": ["75306C2B", "788DB547", "7EF9A66F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["vincent liu", "david j wetherall", "arvind krishnamurthy", "qifan pu", "thomas anderson", "simon peter", "seungyeop han"], "keyword": ["privacy", "ipv6", "network security", "networks"], "paperid": "776906D6", "author_id": ["7AF0CE25", "7B7FE2DC", "7C7EE0D1", "7E7BFF5E", "80152511", "80654B3D", "812C1701"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["cingyu chu", "chiennan chen", "haohua chu", "polly huang", "suling yeh", "yuchuan yen"], "keyword": ["voip"], "paperid": "7FDBAB0C", "author_id": ["7CFA3AEA", "7D2BCE2B", "7E316AE2", "7F7EE74E", "80B2AD97", "84F87A98"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["scott shenker", "bruce m maggs", "ali ghodsi", "amin tootoonchian", "seyed kaveh fayazbakhsh", "teemu koponen", "vyas sekar", "yin lin", "k c ng"], "keyword": ["computer and information science", "network protocols", "network architectures", "networks"], "paperid": "80838AAD", "author_id": ["2AE7B5AF", "2B9D8E01", "70588ECB", "77EF2D57", "79D294F2", "7A838B21", "7E3BB59C", "803119D5", "84B6D74F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xiang wang", "chang chen", "jun li"], "keyword": ["algorithms", "network management", "network monitoring", "networks"], "paperid": "7A45DBFD", "author_id": ["7DB51B60", "7F1B46EA", "85D1C505"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick mckeown", "scott shenker", "mohammad alizadeh", "balaji prabhakar", "sachin katti", "milad sharif", "shuang yang"], "keyword": ["network architectures", "networks"], "paperid": "7E3C5B20", "author_id": ["0D02BCA6", "2AE7B5AF", "7B11B1F4", "7E144623", "7EF9A66F", "84957A72", "E51B833F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yanan sun", "xiaohong guan", "jiahe liu", "ting liu", "yang liu"], "keyword": ["smart grid", "network security"], "paperid": "7A109AAC", "author_id": ["7E2FD03B", "7E4E1D65", "84E4AC08", "85139A37", "8539503A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["david oran", "ashok narayanan", "mark stapp", "won so"], "keyword": [], "paperid": "7F907786", "author_id": ["5D20B354", "7DF6EFE6", "8005B045", "84AAA80E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["arjuna sathiaseelan", "jon crowcroft"], "keyword": ["internet", "network protocols", "networks"], "paperid": "764A32DC", "author_id": ["1155F851", "7575972F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["damien saucez", "benoit donnet", "luigi iannone"], "keyword": ["measurement", "lisp", "networks", "network protocols"], "paperid": "78BD3CBB", "author_id": ["0189E965", "515B2CB2", "769B992A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mark allman"], "keyword": ["measurement", "internet"], "paperid": "7ABBD5EE", "author_id": ["736074A1"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["roger wattenhofer", "mohan nanduri", "srikanth kandula", "chiyao hong", "vijay gill", "ratul mahajan", "ming zhang"], "keyword": ["software defined networking", "network architectures", "networks"], "paperid": "7D4B5C5E", "author_id": ["757E13D7", "7B26B458", "7C857356", "7D9B78CC", "7E572D49", "7E57D209", "7F5AD428"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["levente csikor", "balazs sonkoly", "andras gulyas", "felician nemeth"], "keyword": ["openflow", "sdn", "networks"], "paperid": "80239393", "author_id": ["00153EED", "020AD5A1", "7C056608", "81BBF5DE"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["roberto roverso", "sameh elansary", "mikael hogqvist"], "keyword": ["private networks", "computer and information science", "network protocols", "networks"], "paperid": "7CF369E4", "author_id": ["019D47CE", "7D04B718", "8486171A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["holger karl", "philip wette"], "keyword": ["openflow"], "paperid": "7D6CDF7F", "author_id": ["7E8C521F", "783F41B1"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["anja feldmann", "marco canini", "dan levin", "stefan schmid"], "keyword": ["software defined network", "operating systems"], "paperid": "7E7D49EF", "author_id": ["795F7D7D", "7BF33803", "7D269D6C", "85F093B2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["francesco gringoli", "saverio niccolini", "maurizio dusi", "davide simoncelli"], "keyword": ["data analysis", "distributed computing"], "paperid": "7EDB996C", "author_id": ["057D1E48", "0F34C30E", "5C37F380", "77B4040E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick mckeown", "patrick w bosshart", "george varghese", "martin izzard", "glen gibb", "mark horowitz", "hunseok kim", "fernando mujica"], "keyword": ["sdn", "network protocols", "networks"], "paperid": "7F3A2DEF", "author_id": ["0D02BCA6", "2BC48EE4", "799EFB29", "7CDD6097", "7D82F953", "7DFAA11D", "7FF7DC8D", "849C085B"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jun bi", "kuangching wang", "pingping lin", "masayoshi kobayashi", "umesh krishnaswamy", "jonathan hart", "ali alshabibi", "tetsuya murakami"], "keyword": ["software defined networking"], "paperid": "7DD17B0C", "author_id": ["752C7C61", "7D46E980", "814B7187", "82A23814", "84F46E0B", "84FB6885", "8504B157", "850B6E41"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["panagiotis papadimitriou", "amr rizk", "david dietrich"], "keyword": ["network architectures", "networks"], "paperid": "7604BC7A", "author_id": ["78D45BF5", "7DCE0F71", "8535C2A7"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yong li", "depeng jin", "zhongjin liu", "li su", "lieguang zeng"], "keyword": ["sdn", "multi tenant", "network architectures", "networks"], "paperid": "75C8AB66", "author_id": ["7E22A7B0", "7E288A95", "7E4EDF30", "7EF1ED28", "7F25C89A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["shaowu ma", "mao yang", "yong li", "depeng jin", "li su", "lieguang zeng"], "keyword": ["software defined network", "radio access network", "networks"], "paperid": "7FBD31FE", "author_id": ["75F17943", "7DA9F03B", "7E22A7B0", "7E288A95", "7EF1ED28", "7F25C89A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["andreas voellmy", "bryan ford", "y richard yang", "paul hudak", "junchang wang"], "keyword": ["software defined networking", "openflow"], "paperid": "7E2EC914", "author_id": ["29ED4EBD", "7D38FC50", "7EBD82A2", "80B654A3", "8168ED6A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["abderrahmen mtibaa", "afnan fahim", "mostafa ammar", "khaled a harras"], "keyword": ["resource sharing"], "paperid": "7FF64F84", "author_id": ["7C12D742", "7D2D68BD", "7F031230", "85FB4A59"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["damien saucez", "richard gass"], "keyword": ["cloud computing"], "paperid": "7A553D84", "author_id": ["0189E965", "7DA71821"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yao liang", "rui liu"], "keyword": ["compressed sensing", "wireless sensor networks", "networks"], "paperid": "7BC494CE", "author_id": ["804223DB", "67618FE6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["hungyu wei", "kate chingju lin", "bosi chen"], "keyword": ["diversity gain", "multi user mimo"], "paperid": "774A608E", "author_id": ["80D05435", "8125D1BD", "84BC727C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xuelong li", "haigang gong", "yonggang wen", "peng sun", "ming liu", "jinqi gao", "jianxiong yin", "cynthia lin", "h you"], "keyword": ["data visualization"], "paperid": "7D18EB6E", "author_id": ["7D975913", "7DBE038A", "7E14EDEC", "811B8F8F", "844537CA", "84A7A061", "84B770E7", "84CB01E7", "84F4BC4F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick mckeown"], "keyword": ["collaboration", "opinion"], "paperid": "7CBFD309", "author_id": ["0D02BCA6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["paolo gasti", "gene tsudik", "mishari almishari", "naveen nathan"], "keyword": ["performance", "network management", "hardware", "networks"], "paperid": "7A042396", "author_id": ["0B08CF9D", "1BBDD3AC", "7C199526", "7F26268F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ratul mahajan", "yingying chen", "zhili zhang", "baskar sridharan"], "keyword": ["web services", "performance", "information systems", "world wide web", "web applications"], "paperid": "80E2C137", "author_id": ["7E57D209", "80EF83E1", "81027109", "84B43493"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["roger wattenhofer", "ming zhang", "lihua yuan", "hongqiang harry liu", "david a maltz", "xin wu"], "keyword": ["network architectures", "networks"], "paperid": "80E5DC8C", "author_id": ["757E13D7", "7F5AD428", "82E04689", "837FA51A", "84835476", "859AA511"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ahmed elmokashfi", "amogh dhamdhere"], "keyword": ["routing protocols", "network layer protocols", "network protocols", "networks"], "paperid": "7B1353E9", "author_id": ["3F17FFDE", "76D56B49"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ricky k p mok", "lei xue", "rocky k c chang"], "keyword": ["metrics", "measurement"], "paperid": "7B3B622F", "author_id": ["77ADE161", "84D68F2F", "8563F5E4"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["georgios smaragdakis", "ingmar poese", "bruce m maggs", "steve uhlig", "anja feldmann", "jannis rake", "benjamin frank", "yin lin", "richard e weber"], "keyword": [], "paperid": "7B7BE8EF", "author_id": ["00D940B5", "08404F18", "2B9D8E01", "76475CCE", "795F7D7D", "7B6E457A", "7D9D3B77", "803119D5", "804E647C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["michael walfish", "sebastian angel"], "keyword": ["online advertising", "electronic commerce", "network security"], "paperid": "7CF28D57", "author_id": ["773E1710", "80885BF6"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick mckeown", "amin vahdat", "patrick w bosshart", "dan talayco", "jennifer rexford", "george varghese", "martin izzard", "david w walker", "cole schlesinger", "dan daly"], "keyword": [], "paperid": "76E8299D", "author_id": ["0D02BCA6", "119654C5", "2BC48EE4", "47E899B6", "77221471", "799EFB29", "7CDD6097", "7D28A222", "7DC0D8B8", "85511FBC"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["hitesh ballani", "peter druschel", "stevens le blond", "paul francis", "wenxuan zhou", "david choffnes"], "keyword": ["network architectures", "networks"], "paperid": "75B85B6A", "author_id": ["0072B820", "03C0D031", "7DD60015", "7F3D5D62", "7FDD8F91", "83C519B9"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mohit tawarmalani", "ashiwan sivakumar", "shankaranarayanan p n", "sanjay rao"], "keyword": [], "paperid": "7D3D695D", "author_id": ["0176F61E", "7EC6F570", "8162E3AB", "84E47941"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["marios iliofotou", "aleksandar kuzmanovic", "ning xia", "yong liao", "zhili zhang", "antonio nucci", "han hee song"], "keyword": ["mobile network", "privacy", "security"], "paperid": "804B49A1", "author_id": ["0E1EFC30", "629E0F66", "7D4D36D9", "7D6333FB", "81027109", "82B332F7", "84E754FE"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["larry peterson"], "keyword": ["network architecture", "networks", "network protocols"], "paperid": "7B369E67", "author_id": ["7FD27A36"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["emiliano de cristofaro", "mohamed ali kaafar", "abdelberi chaabane", "ersin uzun"], "keyword": ["privacy", "network protocols", "networks"], "paperid": "81786D02", "author_id": ["0D339F85", "77765DEF", "7AFCFB58", "81006E1D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dimitri staessens", "piet demeester", "mario pickavet", "sachin sharma", "didier colle"], "keyword": ["virtualization", "design", "openflow", "management", "networks", "network architectures"], "paperid": "783B3B01", "author_id": ["0DD46E6C", "7C645EA4", "7D90FEEA", "7ECE7EC7", "8007A92F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ji fang", "wenjun hu", "kun tan", "jiansong zhang", "hongyi yao", "xiaoxiao li", "yongguang zhang", "qing yang"], "keyword": ["mu mimo", "software radio", "networks"], "paperid": "78E20060", "author_id": ["7E0454C2", "7F402939", "7F449570", "7F59C808", "84D37683", "84FD2772", "8548C23E", "85BF4F76"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mark allman"], "keyword": ["queues", "tcp", "bufferbloat", "networks", "network protocols", "transport protocols"], "paperid": "76FFB149", "author_id": ["7F00F51A"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["konstantinos pelechrinis", "prashant krishnamurthy", "martin b h weiss", "taieb znati"], "keyword": ["cellular networks", "cognitive radio networks"], "paperid": "7E7FAF8A", "author_id": ["094A7831", "7D555F18", "80258182", "8292E3CD"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["shlomo berkovsky", "benoit donnet", "mohamed ali kaafar"], "keyword": ["personalization"], "paperid": "761FFAC8", "author_id": ["05268684", "515B2CB2", "77765DEF"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["alex forencich", "amin vahdat", "tajana simunic rosing", "george c papen", "yeshaiahu fainman", "nathan farrington", "george porter", "richard strong", "pang chensun"], "keyword": ["measurement", "networks"], "paperid": "803FDB55", "author_id": ["03582282", "119654C5", "75E23ADE", "761DE7C7", "7876A2F5", "7CFCBF30", "7E93B345", "7F58671D", "84C8A02E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["praveen yalagandula", "jeffrey c mogul", "yoshio turner", "lucian popa", "jose renato santos", "sujata banerjee"], "keyword": ["cloud computing"], "paperid": "75CF2C11", "author_id": ["14BCDC74", "774515B3", "7A947B97", "7C8AFAED", "7D50E682", "7E20E79C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["arjuna sathiaseelan", "jon crowcroft"], "keyword": ["broadband", "internet", "mobile", "resource pooling", "wireless", "networks"], "paperid": "7928DB1B", "author_id": ["1155F851", "805BC96F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["venkat padmanabhan", "krishna chintalapudi", "rajalakshmi nandakumar", "ramarathnam venkatesan"], "keyword": ["wireless", "nfc", "security"], "paperid": "7FAC5F49", "author_id": ["76033C60", "7E0CC466", "7E9876A7", "7EBD1108"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jinshu su", "ziling wei", "bo liu", "chunqing wu", "baokang zhao", "fei wang", "wanrong yu", "shihai sun"], "keyword": ["steganography", "quantum communication", "voip", "security"], "paperid": "7ED02ABB", "author_id": ["7DC1A648", "7ED92182", "7F56ABD0", "7F97A18D", "808DE58B", "80F9A7EA", "8161CBA8", "831DAF72"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["swati roy", "nick feamster"], "keyword": ["performance", "measurement", "network monitoring", "networks"], "paperid": "8085B9A5", "author_id": ["848E86C9", "51D985F7"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["engin arslan", "mehmet hadi gunes", "murat yuksel"], "keyword": ["graphic user interface", "network management", "networks", "computer science education", "internet", "computer animation", "network simulation"], "paperid": "7B0968F9", "author_id": ["80749000", "843FE09E", "85882E69"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["aditya akella", "srinivasan seshan", "dongsu han", "robert grandl"], "keyword": ["transport protocol", "congestion control"], "paperid": "7F6EA615", "author_id": ["7A07BE0C", "7CCEBFE2", "7F7D23B4", "84CC1E35"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xiaoke jiang", "jun bi"], "keyword": ["transport", "network architectures", "networks"], "paperid": "7B97AFAE", "author_id": ["7E37A4FF", "752C7C61"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dina katabi", "shyamnath gollakota", "diego cifuentes", "swarun kumar"], "keyword": ["wireless", "sdn", "mimo", "network protocols", "networks"], "paperid": "7E9BC2DA", "author_id": ["0B9370B1", "7997DF6E", "7FCE4EFF", "856DE597"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["amin vahdat", "leon poutievski", "urs holzle", "junlan zhou", "jim wanderer", "joon ong", "min zhu", "subbaiah venkata", "subhasree mandal", "alok kumar", "stephen stuart", "jon zolla", "arjun singh", "sushant jain"], "keyword": ["routing", "openflow", "software defined networking"], "paperid": "7EC4BE28", "author_id": ["119654C5", "499D5D3E", "7CF0644A", "7D428757", "7E4E5EB1", "7EB8325E", "7F74C22F", "7F75AC2C", "83568E2B", "84A594F1", "84B196FD", "850D788A", "85166106", "8537E90F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mitch gusat", "daniel crisan", "cyriel minkenberg", "robert birke", "gilles cressier"], "keyword": ["lossless", "overlay networks", "virtualization", "networks", "network architectures"], "paperid": "7F23F539", "author_id": ["4B0A389A", "789277C2", "7AC7A32B", "7CA57A2A", "84D9D926"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["marco mellia"], "keyword": ["interview"], "paperid": "787C66F2", "author_id": ["7B15CAFF"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["dina katabi", "jue wang"], "keyword": ["rfid", "localization", "sar"], "paperid": "80A1DAB9", "author_id": ["0B9370B1", "B1A260FD"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["ethan katzbassett", "italo cunha", "arvind krishnamurthy", "thomas anderson", "david choffnes", "umar javed"], "keyword": ["bgp", "root cause analysis", "measurement", "network monitoring", "networks"], "paperid": "7F5E50E8", "author_id": ["00710F54", "77FE7021", "7C7EE0D1", "80152511", "83C519B9", "85065CF8"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["vamsi talla", "shyamnath gollakota", "vincent liu", "david wetherall", "aaron parks", "j r smith"], "keyword": ["wireless", "backscatter", "internet of things", "energy harvesting", "networks"], "paperid": "7D233D11", "author_id": ["27ECF0DE", "7997DF6E", "7AF0CE25", "7B0A42B7", "80327A4C", "8070463C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mihaela ion", "jianqing zhang", "eve m schooler"], "keyword": ["privacy", "security", "attribute based encryption", "network architectures", "networks"], "paperid": "7F1EB383", "author_id": ["7AF8E83A", "84FCCC42", "856D7F49"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["sharon goldberg", "michael schapira", "phillipa gill"], "keyword": ["networks", "network protocols", "network layer protocols", "routing protocols"], "paperid": "797A4220", "author_id": ["7D9BE912", "81290874", "857CC57C"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yan grunenberger", "jonathan m smith"], "keyword": ["security", "mobility", "mobile telephony", "wireless networking", "hardware", "networks"], "paperid": "7C790148", "author_id": ["797CED7B", "7FEC3B56"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["xiangke liao", "shaoliang peng", "xiaodong liu", "bin lin", "he huang", "shanshan li"], "keyword": ["networks", "network protocols"], "paperid": "7E69ADE9", "author_id": ["7AD62040", "7D6281CD", "816490FA", "83301F4E", "854D1889", "85D4E813"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["vinod yegneswaran", "yan chen", "hongyu gao", "phillip a porras", "haixin duan", "jian jiang", "shalini ghosh"], "keyword": ["dns", "measurement", "networks", "network protocols", "application layer protocols"], "paperid": "80A397F5", "author_id": ["7A5615E3", "7D51F344", "7E01A353", "7F055EC0", "7FFF6BA9", "8551D798", "863B3B48"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["feng qian", "subhabrata sen", "yuanyuan zhou", "z morley mao", "junxian huang", "qiang xu", "oliver spatscheck", "yihua guo"], "keyword": ["lte"], "paperid": "805FF371", "author_id": ["7E3272A0", "7ED7D1A9", "8075880A", "80B96CB2", "812DA911", "81320C77", "82C37D47", "84A8E057"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yeonhee lee"], "keyword": ["packet", "analysis", "netflow"], "paperid": "7C7668D0", "author_id": ["7D01AEE2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["hani jamjoom", "karim awara", "panos kanlis"], "keyword": ["bulk synchronous parallel", "network topology"], "paperid": "812BBAEB", "author_id": ["127FB6B8", "59ECF604", "8508397D"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["aditya akella", "srinivasan seshan", "hui zhang", "vyas sekar", "athula balachandran", "ion stoica"], "keyword": ["human factors", "video quality", "measurement", "performance", "metrics"], "paperid": "8116524A", "author_id": ["7A07BE0C", "7CCEBFE2", "7D279314", "7E3BB59C", "803D3562", "80D58ED8"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["balachander krishnamurthy", "pierreandre noel", "raissa m dsouza", "s felix wu", "chennee chuah", "mohammad rezaur rahman"], "keyword": ["cascade", "web applications", "world wide web", "information systems"], "paperid": "7C64BB95", "author_id": ["7765FA2E", "797B6B95", "808BD3DA", "815DD06E", "821A2BEE", "8545A67B"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["matthew p grosvenor", "malte schwarzkopf", "andrew w moore"], "keyword": ["ethernet", "latency", "scheduling", "data centers", "broadcast", "transport protocols", "network protocols", "networks"], "paperid": "7D1B369B", "author_id": ["77BA3F34", "7DF99380", "81612F0E"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["alberto caponi", "nicola blefari melazzi", "andrea detti", "giuseppe bianchi"], "keyword": ["digital signatures"], "paperid": "7A9EDA68", "author_id": ["491DD78F", "797D81C6", "7B138094", "84D15D31"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["guevara noubir", "zafar ayyub qazi", "manfred arndt", "jeongkeun lee", "gowtham bellala", "tao jin"], "keyword": ["networks", "network architectures"], "paperid": "814C5508", "author_id": ["10A615DD", "7AD1AD87", "85032C6E", "862678B7", "86275490", "DC1595CC"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["nick feamster", "sam burnett"], "keyword": ["network monitoring", "networks"], "paperid": "75ABE65E", "author_id": ["51D985F7", "811D8059"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["keith winstein", "hari balakrishnan"], "keyword": ["congestion control", "network protocols", "networks"], "paperid": "768D5C93", "author_id": ["6C19AD81", "771E2668"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jun bi", "sen wang", "jianping wu"], "keyword": ["network protocols", "networks"], "paperid": "79581E24", "author_id": ["752C7C61", "7D31AFFB", "7D4BABA7"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["simon knight"], "keyword": ["emulation", "configuration management", "network management", "networks"], "paperid": "7B58A31A", "author_id": ["7F5818D2"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["aaron gember", "robert grandl", "aditya akella", "junaid khalid"], "keyword": ["software defined networking", "networks", "network management"], "paperid": "7A34A341", "author_id": ["772D3FFA", "78941ECB", "7A07BE0C", "84BF5CAE"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["marios zikos", "ashwin murthy", "parveen patel", "randy kern", "changhoon kim", "albert greenberg", "deepak bansal", "naveen karri", "hongyu wu", "hemant kumar", "lihua yuan", "david a maltz"], "keyword": ["software defined networking", "distributed systems", "server load balancing"], "paperid": "7D8C64C5", "author_id": ["13A99B79", "780657D3", "7D06C105", "7D2ACEFD", "7D3B654A", "7F3291A5", "7FA5D6DF", "7FEED765", "81308498", "821E9B8D", "82E04689", "84835476"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["yu hua", "dan feng", "xue liu"], "keyword": ["deduplication", "software defined network", "networks", "network architectures"], "paperid": "7E2463FE", "author_id": ["77DDC5D2", "7DEFB4BD", "7F339A86"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["jun bi", "jianping wu", "baobao zhang"], "keyword": ["traffic engineering", "networks", "network protocols", "network layer protocols", "routing protocols"], "paperid": "7E3B9BFD", "author_id": ["752C7C61", "7D4BABA7", "7E0035E4"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["robert lychev", "sharon goldberg", "michael schapira"], "keyword": ["routing", "security", "bgp"], "paperid": "7F6BA9BE", "author_id": ["05B42143", "7E286F06", "81290874"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["srikanth kandula", "ion stoica", "mosharaf chowdhury"], "keyword": [], "paperid": "7D2565B0", "author_id": ["7C857356", "80D58ED8", "8105E2ED"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["peter pietzuch", "matteo migliavacca", "lukas rupprecht", "paolo costa", "luo mai", "alexander l wolf"], "keyword": ["networks", "network architectures", "network protocols"], "paperid": "8057DFE6", "author_id": ["275DF53A", "7641CCB0", "786E34BE", "7F60F4B1", "80EFC84B", "856D855F"], "year": 2013}, {"conf_id": "44B13001", "conf": "acm special interest group on data communication", "author_name": ["mark allman", "tom callahan", "michael rabinovich"], "keyword": ["measurement", "dns", "network protocols", "networks"], "paperid": "81621138", "author_id": ["736074A1", "807BC220", "84A9FC0F"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["suguru tamaki", "kazuhisa seto"], "keyword": ["computability", "computational complexity", "boolean algebra", "reactive power", "satisfiability", "encoding", "polynomials", "informatics", "algorithm design and analysis", "formula", "logic gates"], "paperid": "7D6D2C27", "author_id": ["7F66893C", "80AC23BA"], "year": 2013}, {"conf_id": "45465CC4", "conf": "compiler construction", "author_name": ["ronen shaltiel", "sergei artemenko"], "keyword": [], "paperid": "7929EFA8", "author_id": ["0FC8F6FF", "7FDA673A"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["periklis a papakonstantinou", "matei david"], "keyword": ["lower bound", "turing machine", "communication complexity", "stack"], "paperid": "7FF30AC4", "author_id": ["7EB82D65", "85E232C7"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["jeremie roland", "troy lee"], "keyword": ["computational complexity", "probability", "probability distribution", "boolean functions", "quantum mechanics", "registers", "quantum computing", "additives"], "paperid": "812D1E0F", "author_id": ["7CCA5A26", "801608CA"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["maurice jansen", "meena mahajan", "b v raghavendra rao"], "keyword": [], "paperid": "7CDDB015", "author_id": ["7D7A6BA1", "7DCE52E9", "81301B55"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["martin mundhenk", "felix weis"], "keyword": ["heyting algebra", "model checking", "intuitionistic logic"], "paperid": "7B8E4C11", "author_id": ["75E32EA8", "80DBF907"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["a yu olshanskii"], "keyword": [], "paperid": "7E34CFE7", "author_id": ["23AC9D98"], "year": 2013}, {"conf_id": "440ED19A", "conf": "compiler construction", "author_name": ["eyal kushilevitz", "amos beimel", "enav weinreb", "sebastian ben daniel"], "keyword": [], "paperid": "7997AC4A", "author_id": ["1256F0EB", "14CF2CE7", "7638EE6C", "7F388815"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["ramprasad saptharishi", "chandan saha", "nitin saxena"], "keyword": [], "paperid": "759C3F7D", "author_id": ["481C7496", "7531CA0C", "7F23F3F1"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["richard j lipton", "ryan williams"], "keyword": ["amplifiers", "polynomials", "turing machines", "boolean functions", "computational modeling", "lower bound", "polynomial time", "logic gates", "circuit complexity"], "paperid": "7E6E3E26", "author_id": ["28697F4E", "84DD6A35"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["eric schost", "adrien poteaux"], "keyword": ["complexity", "finite fields"], "paperid": "765D1D48", "author_id": ["044ECD77", "0E326543"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["tamaki suguru", "seto kazuhisa"], "keyword": ["computability", "computational complexity", "boolean algebra", "reactive power", "satisfiability", "encoding", "polynomials", "informatics", "algorithm design and analysis", "formula", "logic gates"], "paperid": "6E83CE07", "author_id": ["80C12E54", "80DD6332"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["grigorescu elena", "kaufman tali", "sudan madhu"], "keyword": ["information theory", "cryptography", "coding theory", "theory of computation", "mathematical analysis", "numerical analysis", "complexity classes", "computational complexity", "property testing", "galois fields", "testing", "polynomials", "binary codes", "affine transformation", "system testing"], "paperid": "81BE8C12", "author_id": ["8197EC6E", "819FF020", "81F56EE9"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["grigoriev dima"], "keyword": [], "paperid": "60A9A459", "author_id": ["7DA530B6"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["poteaux adrien", "schost eric"], "keyword": [], "paperid": "80ED7F85", "author_id": ["7D6AA0AC", "7E0090A6"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["irit dinur", "boaz barak"], "keyword": [], "paperid": "7A89962F", "author_id": ["05A117A4", "831E1257"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["omer reingold", "parikshit gopalan", "raghu meka"], "keyword": ["approximation algorithms", "boolean functions", "switches", "algorithm design and analysis", "cnf", "generators", "disjunctive normal form", "polynomials", "computational complexity", "approximation", "additives"], "paperid": "805A69DA", "author_id": ["06847F77", "8077D17F", "80ABFAB6"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["dell holger", "kabanets valentine", "watanabe osamu", "melkebeek dieter"], "keyword": ["boolean algebra", "probability", "algorithm design and analysis", "computability", "boolean circuit", "polynomials", "upper bound"], "paperid": "8528341A", "author_id": ["82C11B69", "8528DDA5", "852FBACD", "856D84CE"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["amir shpilka", "christopher umans", "noga alon"], "keyword": ["group theory", "vectors", "zinc", "computer science", "matrix multiplication"], "paperid": "8163B4DD", "author_id": ["08896227", "0F5F6512", "7DEB55E8"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["valentine kabanets", "holger dell", "osamu watanabe", "dieter van melkebeek"], "keyword": ["boolean algebra", "probability", "algorithm design and analysis", "computability", "boolean circuit", "polynomials", "upper bound"], "paperid": "7EA9E568", "author_id": ["2B7E1C77", "79617F6F", "7F4FDABA", "8587624B"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["umans christopher", "alon noga", "shpilka amir"], "keyword": ["group theory", "vectors", "zinc", "computer science", "matrix multiplication"], "paperid": "84900E93", "author_id": ["84B4818A", "80EB597F", "85090B19"], "year": 2013}, {"conf_id": null, "conf": "compiler construction", "author_name": ["dima grigoriev"], "keyword": [], "paperid": "76A725A2", "author_id": ["82E8D697"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["ronen shaltiel"], "keyword": ["length measurement", "computational complexity", "cryptography", "computer science", "game theory", "sampling methods"], "paperid": "7F387F8E", "author_id": ["0FC8F6FF"], "year": 2013}, {"conf_id": "4542EB6A", "conf": "compiler construction", "author_name": ["ilias diakonikolas", "roccoa servedio"], "keyword": ["hypercubes", "boolean functions", "approximation", "probability distribution", "probability", "approximation theory", "computer science", "linear approximation", "computational complexity", "upper bound"], "paperid": "818276C5", "author_id": ["0C437ED5", "764E7285"], "year": 2013}]