


default search action
IEEE Transactions on Parallel and Distributed Systems, Volume 24
Volume 24, Number 1, 2013
- Hui-Tang Lin, Ying-You Lin, Hung-Jung Kang:

Adaptive Network Coding for Broadband Wireless Access Networks. 4-18 - Haifeng Wu, Yu Zeng, Jihua Feng, Yu Gu:

Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision. 19-31 - Milan Erdelj, Tahiry Razafindralambo

, David Simplot-Ryl:
Covering Points of Interest with Mobile Sensors. 32-43 - Jie Yang, Yingying Chen

, Wade Trappe, Jerry Cheng:
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. 44-58 - J. Rubén Titos Gil

, Manuel E. Acacio
, José M. García:
Efficient Eager Management of Conflicts for Scalable Hardware Transactional Memory. 59-71 - Kyle Chard, Kris Bubendorfer:

High Performance Resource Allocation Strategies for Computational Economies. 72-84 - Gerald R. Morris, Khalid H. Abed

:
Mapping a Jacobi Iterative Solver onto a High-Performance Heterogeneous Computer. 85-91 - Hao Wang, Shi Pu, Gabe Knezek, Jyh-Charn Liu:

MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching. 92-103 - Jun Zhang

, Yang Xiang
, Yu Wang
, Wanlei Zhou
, Yong Xiang, Yong Guan:
Network Traffic Classification Using Correlation Information. 104-117 - Ya-Shu Chen, Han Chiang Liao, Ting-Hao Tsai:

Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip. 118-130 - Ming Li, Shucheng Yu

, Yao Zheng
, Kui Ren
, Wenjing Lou:
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. 131-143 - Dong Li, Bronis R. de Supinski, Martin Schulz

, Dimitrios S. Nikolopoulos
, Kirk W. Cameron
:
Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. 144-157 - Saba Sehrish, Grant Mackey, Pengju Shang, Jun Wang

, John Bent:
Supporting HPC Analytics Applications with Access Patterns Using Data Restructuring and Data-Centric Scheduling Techniques in MapReduce. 158-169 - Andrea Bartolini, Matteo Cacciari, Andrea Tilli, Luca Benini:

Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller. 170-183 - Ravishankar Ravindran, Changcheng Huang, Krishnaiyan Thulasiraman:

Topology Abstraction Service for IP-VPNs. 184-197
Volume 24, Number 2, February 2013
- Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen

:
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks. 209-224 - Keqin Li:

Analysis of Distance-Based Location Management in Wireless Communication Networks. 225-238 - Wei Liu, Hiroki Nishiyama

, Nirwan Ansari
, Jie Yang, Nei Kato
:
Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks. 239-249 - Shih Heng Cheng, Ching-Yao Huang:

Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. 250-259 - Nguyen Hoang Tran

, Choong Seon Hong
, Sungwon Lee:
Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks. 260-274 - Kien Nguyen, Thinh P. Nguyen, Yevgeniy Kovchegov

, Viet Le:
Distributed Data Replenishment. 275-287 - Alberto Montresor

, Francesco De Pellegrini, Daniele Miorandi:
Distributed k-Core Decomposition. 288-300 - Benyuan Liu, Olivier Dousse, Philippe Nain, Don Towsley

:
Dynamic Coverage of Mobile Sensor Networks. 301-311 - Zhenjiang Li, Yunhao Liu, Mo Li

, Jiliang Wang, Zhichao Cao:
Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks. 312-326 - Xiaohua Tian, Yu Cheng

, Xuemin (Sherman) Shen
:
Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery. 327-341 - Yun Wang, Weihuang Fu, Dharma P. Agrawal:

Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks. 342-355 - Ke Liang, Beomjoo Seo, Andrew Kryczka, Roger Zimmermann

:
IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments. 356-367 - Haitao Zhang, Huadong Ma, Xiang-Yang Li, Shaojie Tang:

In-Network Estimation with Delay Constraints in Wireless Sensor Networks. 368-380 - Dan Li, Jiong Chen, Chuanxiong Guo

, Yunxin Liu, Jinyu Zhang, Zhi-Li Zhang, Yongguang Zhang:
IP-Geolocation Mapping for Moderately Connected Internet Regions. 381-391 - Davor Capalija, Tarek S. Abdelrahman:

Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor. 392-405 - Jun Liu, Zhong Zhou, Zheng Peng

, Jun-Hong Cui, Michael Zuba, Lance Fiondella:
Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks. 406-416
Volume 24, Number 3, March 2013
- Yongpeng Zhang, Frank Mueller:

Autogeneration and Autotuning of 3D Stencil Codes on Homogeneous and Heterogeneous GPU Clusters. 417-427 - Chi-Yuan Yeh, Yu-Ting Peng, Shie-Jue Lee:

An Iterative Divide-and-Merge-Based Approach for Solving Large-Scale Least Squares Problems. 428-438 - Gabriel Scalosub, Peter Marbach, Jörg Liebeherr:

Buffer Management for Aggregated Streaming Data with Packet Dependencies. 439-449 - Weigang Wu, Jiannong Cao

, Xiaopeng Fan:
Design and Performance Evaluation of Overhearing-Aided Data Caching in Wireless Ad Hoc Networks. 450-463 - Sheng Di, Cho-Li Wang:

Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds. 464-478 - Da Zhang, Chai Kiat Yeo

:
Enabling Efficient WiFi-Based Vehicular Content Distribution. 479-492 - Jichiang Tsai:

Flexible Symmetrical Global-Snapshot Algorithms for Large-Scale Distributed Systems. 493-505 - Ricardo Quislant

, Eladio Gutiérrez
, Oscar G. Plata
, Emilio L. Zapata:
Hardware Signature Designs to Deal with Asymmetry in Transactional Data Sets. 506-519 - Jia Zhao, Chunming Qiao, Raghuram S. Sudhaakar, Seokhoon Yoon

:
Improve Efficiency and Reliability in Single-Hop WSNs with Transmit-Only Nodes. 520-534 - Zhezhe Chen, Qi Gao, Wenbin Zhang, Feng Qin:

Improving the Reliability of MPI Libraries via Message Flow Checking. 535-549 - Pan Gun Park

, Piergiuseppe Di Marco
, Carlo Fischione
, Karl Henrik Johansson
:
Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications. 550-564 - Hiroshi Nishida, Thinh P. Nguyen:

Optimal Client-Server Assignment for Internet Distributed Systems. 565-575 - Yongmin Tan, Vinay Venkatesh, Xiaohui Gu:

Resilient Self-Compressive Monitoring for Large-Scale Hosting Infrastructures. 576-586 - Gang Chen, Abdolhossein Sarrafzadeh, Shaoning Pang

:
Service Provision Control in Federated Service Providing Systems. 587-600 - Eva Jaho

, Merkourios Karaliopoulos, Ioannis Stavrakakis
:
Social Similarity Favors Cooperation: The Distributed Content Replication Case. 601-613 - Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen

:
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. 614-624
Volume 24, Number 4, April 2013
- Ivan Stojmenovic:

Editor's Note: Reviewer Appreciation Program. 625-628 - Raquel Lacuesta Gilaberte

, Jaime Lloret, Miguel Garcia, Lourdes Peñalver
:
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation. 629-641 - Xiwang Yang, Yang Guo, Yong Liu

:
Bayesian-Inference-Based Recommendation in Online Social Networks. 642-651 - Hongwei Du, Weili Wu, Qiang Ye

, Deying Li, Wonjun Lee, Xuepeng Xu:
CDS-Based Virtual Backbone Construction with Guaranteed Routing Cost in Wireless Sensor Networks. 652-661 - Damiano Carra, Moritz Steiner, Pietro Michiardi, Ernst W. Biersack, Wolfgang Effelsberg, Taoufik En-Najjary:

Characterization and Management of Popular Content in KAD. 662-671 - Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:

Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs. 672-680 - Xiangping Bu, Jia Rao, Cheng-Zhong Xu

:
Coordinated Self-Configuration of Virtual Machines and Appliances Using a Model-Free Learning Approach. 681-690 - Yi Gao, Jiajun Bu, Wei Dong, Chun Chen, Lei Rao, Xue Liu:

Exploiting Concurrency for Efficient Dissemination in Wireless Sensor Networks. 691-700 - Bharath Balasubramanian, Vijay K. Garg:

Fault Tolerance in Distributed Systems Using Fused Data Structures. 701-715 - Taisuke Izumi, Tomoko Izumi, Sayaka Kamei

, Fukuhito Ooshita:
Feasibility of Polynomial-Time Randomized Gathering for Oblivious Mobile Robots. 716-723 - Carlos Eduardo Rodrigues Alves, Edson Norberto Cáceres, Siang Wun Song:

Finding All Maximal Contiguous Subsequences of a Sequence of Numbers in O(1) Communication Rounds. 724-733 - Jialu Fan, Jiming Chen, Yuan Du, Wei Gao, Jie Wu, Youxian Sun:

Geocommunity-Based Broadcasting for Data Dissemination in Mobile Social Networks. 734-743 - Guoxing Zhan, Weisong Shi:

LOBOT: Low-Cost, Self-Contained Localization of Small-Sized Ground Robotic Vehicles. 744-753 - Xinbing Wang, Tuo Yu, Yuanzhong Xu:

Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks. 754-766 - Weichen Liu

, Yu Wang
, Xuan Wang, Jiang Xu
, Huazhong Yang:
On-Chip Sensor Network for Efficient Management of Power Gating-Induced Power/Ground Noise in Multiprocessor System on Chip. 767-777 - Alexander W. Min, Kang G. Shin:

Robust Tracking of Small-Scale Mobile Primary User in Cognitive Radio Networks. 778-788 - Wenbo Zhao

, Xueyan Tang:
Scheduling Sensor Data Collection with Dynamic Traffic Patterns. 789-802 - A. Selcuk Uluagac

, Raheem A. Beyah
, John A. Copeland:
Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks. 803-813 - Pranab Kini, Konstantin Beznosov:

Speculative Authorization. 814-824 - Yang Wang, Bharadwaj Veeravalli, Chen-Khong Tham

:
On Data Staging Algorithms for Shared Data Accesses in Clouds. 825-838 - Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi:

WILL: Wireless Indoor Localization without Site Survey. 839-848
Volume 24, Number 5, May 2013
- Hamzeh Khazaei

, Jelena V. Misic, Vojislav B. Misic, Saeed Rashwand:
Analysis of a Pool Management Scheme for Cloud Computing Centers. 849-861 - Jiaoyun Yang, Yun Xu, Guangzhong Sun, Yi Shang:

A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization. 862-870 - Ahmed Elwhishi, Pin-Han Ho, Kshirasagar Naik, Basem Shihada

:
A Novel Message Scheduling Framework for Delay Tolerant Networks Routing. 871-880 - Fengyuan Ren, Jiao Zhang, Yongwei Wu, Tao He, Canfeng Chen, Chuang Lin:

Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks. 881-892 - Filippo Gandino

, Renato Ferrero
, Bartolomeo Montrucchio
, Maurizio Rebaudengo
:
DCNS: An Adaptable High Throughput RFID Reader-to-Reader Anticollision Protocol. 893-905 - Oliver Pell, Jacob A. Bower, Robert G. Dimond, Oskar Mencer, Michael J. Flynn:

Finite-Difference Wave Propagation Modeling on Special-Purpose Dataflow Machines. 906-915 - Xiumin Wang, Jianping Wang

, Kejie Lu, Yinlong Xu:
GKAR: A Novel Geographic $(K)$-Anycast Routing for Wireless Sensor Networks. 916-925 - Olivier Beaumont

, Lionel Eyraud-Dubois, Christopher Thraves Caro
, Hejer Rejeb:
Heterogeneous Resource Allocation under Degree Constraints. 926-937 - Yawen Wei, Yong Guan:

Lightweight Location Verification Algorithms for Wireless Sensor Networks. 938-950 - Hung-Chang Hsiao, Hsueh-Yi Chung, Haiying Shen, Yu-Chang Chao:

Load Rebalancing for Distributed File Systems in Clouds. 951-962 - Hannes Frey:

Lower and Upper Bounds for Multicasting under Distance Dependent Forwarding Cost Functions. 963-976 - Xing Liu, Pushkar R. Pande, Henning Meyerhenke

, David A. Bader
:
PASQUAL: Parallel Techniques for Next Generation Genome Sequence Assembly. 977-986 - Ata Turk, Kerim Yasin Oktay, Cevdet Aykanat:

Query-Log Aware Replicated Declustering. 987-995 - Dian Zhang, Yunhuai Liu, Xiaonan Guo, Lionel M. Ni:

RASS: A Real-Time, Accurate, and Scalable System for Tracking Transceiver-Free Objects. 996-1008 - Edans Flavius de Oliveira Sandes, Alba Cristina Magalhaes Alves de Melo

:
Retrieving Smith-Waterman Alignments with Optimizations for Megabase Biological Sequences Using GPU. 1009-1021 - Hristo N. Djidjev

, Melih Onus:
Scalable and Accurate Graph Clustering and Community Structure Detection. 1022-1029 - Cheng Wang, Changjun Jiang, Shaojie Tang, Xiang-Yang Li:

Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models. 1030-1041 - Dayong Ye

, Minjie Zhang
, Danny Sutanto
:
Self-Adaptation-Based Dynamic Coalition Formation in a Distributed Agent Network: A Mechanism and a Brief Survey. 1042-1051 - Xi Chen, Xiao-Wen Chang, Xue Liu:

SyRaFa: Synchronous Rate and Frequency Adjustment for Utilization Control in Distributed Real-Time Embedded Systems. 1052-1061
Volume 24, Number 6, June 2013
- Vojislav B. Misic, Rajkumar Buyya, Dejan S. Milojicic

, Yong Cui:
Guest Editors' Introduction: Special Issue on Cloud Computing. 1062-1065 - Hong Xu

, Baochun Li:
Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud. 1066-1076 - Aris Leivadeas, Chrysa Papagianni

, Symeon Papavassiliou:
Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search-Based Request Partitioning. 1077-1086 - Junwei Cao, Kai Hwang, Keqin Li, Albert Y. Zomaya

:
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing. 1087-1096 - Sheng Di, Cho-Li Wang:

Error-Tolerant Resource Allocation and Payment Minimization for Cloud System. 1097-1106 - Zhen Xiao, Weijia Song, Qi Chen:

Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment. 1107-1117 - Haibing Guan, Yaozu Dong, Ruhui Ma, Dongxiao Xu, Yang Zhang, Jian Li:

Performance Enhancement for Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive-Side Scaling. 1118-1128 - Dingding Li

, Xiaofei Liao, Hai Jin, Bing Bing Zhou
, Qi Zhang:
A New Disk I/O Model of Virtualized Cloud Environment. 1129-1138 - Fung Po Tso

, Dimitrios P. Pezaros
:
Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering. 1139-1148 - Yuanxiong Guo

, Yuguang Fang
:
Electricity Cost Saving Strategy in Data Centers by Using Energy Storage. 1149-1160 - Tan Lu, Minghua Chen

, Lachlan L. H. Andrew:
Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers. 1161-1171 - Cong Wang

, Kui Ren
, Jia Wang, Qian Wang
:
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations. 1172-1181 - Xuefeng Liu, Yuqing Zhang, Boyang Wang, Jingbo Yan:

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud. 1182-1191 - Xuyun Zhang

, Chang Liu, Surya Nepal
, Suraj Pandey, Jinjun Chen:
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. 1192-1202 - Hamid Mohammadi Fard, Radu Prodan

, Thomas Fahringer
:
A Truthful Dynamic Workflow Scheduling Mechanism for Commercial Multicloud Environments. 1203-1212 - Zibin Zheng

, Xinmiao Wu, Yilei Zhang, Michael R. Lyu, Jianmin Wang:
QoS Ranking Prediction for Cloud Services. 1213-1222 - Byung-Chul Tak, Bhuvan Urgaonkar, Anand Sivasubramaniam:

Cloudy with a Chance of Cost Savings. 1223-1233 - Dong Yuan

, Yun Yang, Xiao Liu
, Wenhao Li
, Li-zhen Cui, Meng Xu, Jinjun Chen:
A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud. 1234-1244 - Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, Hua Cai:

Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems. 1245-1255 - Andrew Turner, Andrew Fox

, John I. Payne, Hyong S. Kim:
C-MART: Benchmarking the Cloud. 1256-1266
Volume 24, Number 7, July 2013
- Hao Chen, Lin Shi, Jianhua Sun, Kenli Li, Ligang He:

A Fast RPC System for Virtual Machines. 1267-1276 - Chen Qian, Yunhuai Liu, Raymond Hoilun Ngan, Lionel M. Ni:

ASAP: Scalable Collision Arbitration for Large RFID Systems. 1277-1288 - Lu Wang

, Kaishun Wu
, Mounir Hamdi
:
Attached-RTS: Eliminating an Exposed Terminal Problem in Wireless Networks. 1289-1299 - Kaishun Wu

, Jiang Xiao, Youwen Yi, Dihu Chen, Xiaonan Luo, Lionel M. Ni:
CSI-Based Indoor Localization. 1300-1309 - Yu Gu, Yusheng Ji, Jie Li

, Baohua Zhao:
ESWC: Efficient Scheduling for the Mobile Sink in Wireless Sensor Networks with Delay Constraint. 1310-1320 - Hong Liu, Huansheng Ning

, Yan Zhang, Daojing He
, Qingxu Xiong, Laurence T. Yang:
Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems. 1321-1330 - Konstantinos Tsakalozos, Mema Roussopoulos, Alex Delis:

Hint-Based Execution of Workloads in Clouds with Nefeli. 1331-1340 - Xu Li, Nathalie Mitton, Isabelle Simplot-Ryl, David Simplot-Ryl:

Hypocomb: Bounded-Degree Localized Geometric Planar Graphs for Wireless Ad Hoc Networks. 1341-1354 - Deke Guo, Yuan He, Yunhao Liu, Panlong Yang, Xiang-Yang Li, Xin Wang:

Link Scheduling for Exploiting Spatial Reuse in Multihop MIMO Networks. 1355-1365 - Anton Beloglazov

, Rajkumar Buyya:
Managing Overloaded Hosts for Dynamic Consolidation of Virtual Machines in Cloud Data Centers under Quality of Service Constraints. 1366-1379 - Hao Wang, Bill Lin:

Per-Flow Queue Management with Succinct Priority Indexing Structures for High Speed Packet Scheduling. 1380-1389 - Yanmin Zhu, Xuemei Liu, Minglu Li, Qian Zhang

:
POVA: Traffic Light Sensing with Probe Vehicles. 1390-1400 - Yi Xie, Shensheng Tang, Yang Xiang

, Jiankun Hu
:
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior. 1401-1410 - Faizal Arya Samman

, Thomas Hollstein
, Manfred Glesner:
Runtime Contention and Bandwidth-Aware Adaptive Routing Selection Strategies for Networks-on-Chip. 1411-1421 - Ahmed Elwhishi, Pin-Han Ho, Kshirasagar Naik, Basem Shihada

:
Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks. 1422-1435 - Jiliang Wang, Zhenjiang Li, Mo Li

, Yunhao Liu, Zheng Yang:
Sensor Network Navigation without Locations. 1436-1446 - Sergey Zhuravlev, Juan Carlos Saez

, Sergey Blagodurov, Alexandra Fedorova, Manuel Prieto
:
Survey of Energy-Cognizant Scheduling Techniques. 1447-1464 - Daniel Fajardo-Delgado

, José Alberto Fernández-Zepeda, Anu G. Bourgeois:
The Bodyguard Allocation Problem. 1465-1478
Volume 24, Number 8, August 2013
- Chi-Yeh Chen, Chih-Ping Chu:

A 3.42-Approximation Algorithm for Scheduling Malleable Tasks under Precedence Constraints. 1479-1488 - Francesco Paterna, Andrea Acquaviva, Luca Benini

:
Aging-Aware Energy-Efficient Workload Allocation for Mobile Multimedia Platforms. 1489-1499 - Shenggang Wan, Xubin He

, Jianzhong Huang, Qiang Cao, Shiyi Li, Changsheng Xie:
An Efficient Penalty-Aware Cache to Improve the Performance of Parity-Based Disk Arrays under Faulty Conditions. 1500-1513 - Weiyi Zhao, Jiang Xie:

DoMaIN: A Novel Dynamic Location Management Solution for Internet-Based Infrastructure Wireless Mesh Networks. 1514-1524 - Chun Tung Chou

, Aleksandar Ignjatovic, Wen Hu
:
Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults. 1525-1534 - Adam C. Champion, Zhimin Yang, Boying Zhang, Jiangpeng Dai, Dong Xuan, Du Li:

E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity. 1535-1545 - Yiling Yang, Yu Huang

, Jiannong Cao
, Xiaoxing Ma
, Jian Lu:
Formal Specification and Runtime Detection of Dynamic Properties in Asynchronous Pervasive Computing Environments. 1546-1555 - Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripeanu:

GPUs as Storage System Accelerators. 1556-1566 - Bin Xu, Guodong Sun, Ran Yu, Zheng Yang:

High-Accuracy TDOA-Based Localization without Time Synchronization. 1567-1576 - Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin

, Yixin Chen:
Intelligent Sensor Placement for Hot Server Detection in Data Centers. 1577-1588 - Harris Papadakis

, Paraskevi Fragopoulou, Evangelos P. Markatos, Mema Roussopoulos:
ITA: Innocuous Topology Awareness for Unstructured P2P Networks. 1589-1601 - Kai J. Kohlhoff, Vijay S. Pande, Russ B. Altman:

K-Means for Parallel Architectures Using All-Prefix-Sum Sorting and Updating Steps. 1602-1612 - Jakub Kurzak, Piotr Luszczek, Mathieu Faverge, Jack J. Dongarra:

LU Factorization with Partial Pivoting for a Multicore System with Accelerators. 1613-1621 - Zhibin Huang, Mingfa Zhu, Limin Xiao:

LvtPPP: Live-Time Protected Pseudopartitioning of Multicore Shared Caches. 1622-1632 - Sheng Wen

, Wei Zhou, Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Weijia Jia
:
Modeling Propagation Dynamics of Social Network Worms. 1633-1643 - Savio S. H. Tse:

Online Balancing Two Independent Criteria upon Placements and Deletions. 1644-1650 - Enrico Gregori, Luciano Lenzini, Simone Mainardi:

Parallel $(k)$-Clique Community Detection on Large-Scale Networks. 1651-1660 - Miao Xie, Jiankun Hu

, Song Han, Hsiao-Hwa Chen:
Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks. 1661-1670 - Yichuan Jiang, Yifeng Zhou, Wanyuan Wang:

Task Allocation for Undependable Multiagent Systems in Social Networks. 1671-1681 - Qing-Chao Cai, Kwok-Tung Lo:

Two Blocks Are Enough: On the Feasibility of Using Network Coding to Ameliorate the Content Availability of BitTorrent Swarms. 1682-1694 - Yefu Wang, Xiaorui Wang:

Virtual Batching: Request Batching for Server Energy Conservation in Virtualized Data Centers. 1695-1705
Volume 24, Number 9, September 2013
- Yunsheng Wang, Wei-Shih Yang, Jie Wu:

Analysis of a Hypercube-Based Social Feature Multipath Routing in Delay Tolerant Networks. 1706-1716 - Kan Yang

, Xiaohua Jia
:
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. 1717-1726 - Bin Tang, Baoliu Ye, Sanglu Lu, Song Guo

:
Coding-Aware Proportional-Fair Scheduling in OFDMA Relay Networks. 1727-1740 - Yantao Li, Xin Qi, Matthew Keally, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:

Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks. 1741-1751 - H. M. N. Dilum Bandara

, Anura P. Jayasumana:
Community-Based Caching for Enhanced Lookup Performance in P2P Systems. 1752-1762 - Wenping Liu, Hongbo Jiang, Xiang Bai, Guang Tan, Chonggang Wang, Wenyu Liu

, Kechao Cai:
Distance Transform-Based Skeleton Extraction and Its Applications in Sensor Networks. 1763-1772 - Xun Yi, San Ling

, Huaxiong Wang:
Efficient Two-Server Password-Only Authenticated Key Exchange. 1773-1782 - Hai Liu

, Xiaowen Chu
, Yiu-Wing Leung, Rui Du:
Minimum-Cost Sensor Placement for Required Lifetime in Wireless Sensor-Target Surveillance Networks. 1783-1796 - Francesca Martelli

, Maurizio A. Bonuccelli:
Minimum Message Waiting Time Scheduling in Distributed Systems. 1797-1806 - Yi Xie, Jiankun Hu

, Yang Xiang
, Shui Yu
, Shensheng Tang, Yu Wang
:
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration. 1807-1817 - Miaoqing Huang, David Andrews

:
Modular Design of Fully Pipelined Reduction Circuits on FPGAs. 1818-1826 - Weifa Liang

, Xiaojiang Ren, Xiaohua Jia
, Xu Xu:
Monitoring Quality Maximization through Fair Rate Allocation in Harvesting Sensor Networks. 1827-1840 - Henry M. Monti, Ali Raza Butt

, Sudharshan S. Vazhkudai:
On Timely Staging of HPC Job Input Data. 1841-1851 - Rajesh Krishna Panta, Rittwik Jana, Fan Cheng, Yih-Farn Robin Chen, Vinay A. Vaishampayan

:
Phoenix: Storage Using an Autonomous Mobile Infrastructure. 1863-1873 - Xiaocheng Liu, Chen Wang

, Bing Bing Zhou
, Junliang Chen, Ting Yang, Albert Y. Zomaya
:
Priority-Based Consolidation of Parallel Workloads in the Cloud. 1874-1883 - Yanfeng Zhang, Qinxin Gao, Lixin Gao, Cuirong Wang:

PrIter: A Distributed Framework for Prioritizing Iterative Computations. 1884-1893 - Hao Wang, Bill Lin, Jun (Jim) Xu:

Robust Statistics Counter Arrays with Interleaved Memories. 1894-1907 - Ye Tian

, Ratan Dey, Yong Liu
, Keith W. Ross:
Topology Mapping and Geolocating for China's Internet. 1908-1917
Volume 24, Number 10, October 2013
- Jesús Escudero-Sahuquillo

, Pedro Javier García
, Francisco J. Quiles
, José Flich
, José Duato
:
An Effective and Feasible Congestion Management Technique for High-Performance MINs with Tag-Based Distributed Routing. 1918-1929 - Vasileios Karakasis, Theodoros Gkountouvas, Kornilios Kourtis, Georgios I. Goumas, Nectarios Koziris:

An Extended Compression Format for the Optimization of Sparse Matrix-Vector Multiplication. 1930-1940 - Mingsen Xu, Wen-Zhan Song

, Yichuan Zhao
:
Collaborative Data Collection with Opportunistic Network Erasure Coding. 1941-1950 - Chia-Wen Cheng, Chia-Wei Lee

, Sun-Yuan Hsieh:
Conditional Edge-Fault Hamiltonicity of Cartesian Product Graphs. 1951-1960 - Zhengrui Qin, Qun Li

, Mooi Choo Chuah:
Defending against Unidentifiable Attacks in Electric Power Grids. 1961-1971 - Zhipeng Yang, Ting Ning, Hongyi Wu:

Distributed Data Query in Intermittently Connected Passive RFID Networks. 1972-1982 - Yunhao Liu, Yuan He, Mo Li

, Jiliang Wang, Kebin Liu, Xiang-Yang Li:
Does Wireless Sensor Network Scale? A Measurement Study on GreenOrbs. 1983-1993 - Rossano Gaeta

, Marco Grangetto
:
Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique. 1994-2003 - João V. P. Gomes, Pedro R. M. Inácio

, Manuela Pereira
, Mário M. Freire
, Paulo P. Monteiro
:
Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties. 2004-2014 - Abdallah Khreishah

, Issa Khalil
, Jie Wu:
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks. 2015-2024 - Jin Wang, Jianping Wang

, Kejie Lu, Bin Xiao
, Naijie Gu:
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams. 2025-2035 - Yanbo Wu, Quan Z. Sheng

, Hong Shen, Sherali Zeadally:
Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing. 2036-2045 - Yin Xu, Ben Leong

, Daryl Seah, Ali Razeen:
mPath: High-Bandwidth Data Transfers with Massively Multipath Source Routing. 2046-2059 - Zhiwei Yan, Jong-Hyouk Lee, Sean Shen, Chunming Qiao:

Novel Branching-Router-Based Multicast Routing Protocol with Mobility Support. 2060-2068 - Guangtao Xue, Qi He, Hongzi Zhu, Tian He, Yunhuai Liu:

Sociality-Aware Access Point Selection in Enterprise Wireless LANs. 2069-2078 - Yuanteng Pei, Matt W. Mutka

:
STARS: Static Relays for Remote Sensing in Multirobot Real-Time Search and Monitoring. 2079-2089 - Dario Bruneo

, Salvatore Distefano
, Francesco Longo
, Marco Scarpa:
Stochastic Evaluation of QoS in Service-Based Systems. 2090-2099 - Qilian Liang, Baoju Zhang, Chenglin Zhao, Yiming Pi:

TDoA for Passive Localization: Underwater versus Terrestrial Environment. 2100-2108 - Kun-Chih Chen

, Shu-Yen Lin, Hui-Shun Hung, An-Yeu Andy Wu
:
Topology-Aware Adaptive Routing for Nonstationary Irregular Mesh in Throttled 3D NoC Systems. 2109-2120
Volume 24, Number 11, November 2013
- Ivan Stojmenovic:

Editor's Note. 2121-2124 - Haiying Shen, Ze Li, Jin Li:

A DHT-Aided Chunk-Driven Overlay for Scalable and Efficient Peer-to-Peer Live Streaming. 2125-2137 - Hamzeh Khazaei

, Jelena V. Misic, Vojislav B. Misic:
A Fine-Grained Performance Model of Cloud Computing Centers. 2138-2147 - Haiying Shen, Guoxin Liu:

A Geographically Aware Poll-Based Distributed File Consistency Maintenance Method for P2P Systems. 2148-2159 - Hongxing Li, Chuan Wu

, Dongxiao Yu, Qiang-Sheng Hua, Francis C. M. Lau:
Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation. 2160-2170 - Junbeom Hur:

Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid. 2171-2180 - Zhenhua Li, Yan Huang, Gang Liu, Fuchen Wang, Yunhao Liu, Zhi-Li Zhang, Yafei Dai:

Challenges, Designs, and Performances of Large-Scale Open-P2SP Content Distribution. 2181-2191 - J. Rubén Titos Gil

, Anurag Negi, Manuel E. Acacio
, José M. García, Per Stenström:
Eager Beats Lazy: Improving Store Management in Eager Hardware Transactional Memory. 2192-2201 - Huawei Zhao, Jing Qin

, Jiankun Hu
:
An Energy Efficient Key Management Scheme for Body Sensor Networks. 2202-2210 - Keqiu Li, Yuanping Mu, Keqin Li, Geyong Min

:
Exchanged Crossed Cube: A Novel Interconnection Network for Parallel Computation. 2211-2219 - David Ediger, Karl Jiang, E. Jason Riedy

, David A. Bader
:
GraphCT: Multithreaded Algorithms for Massive Graph Analysis. 2220-2229 - Woojin Choi, Jeffrey T. Draper:

Improving Utilization of Hardware Signatures in Transactional Memory. 2230-2239 - Yao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen, Yingjie Lan:

Measurement and Analysis of an Internet Streaming Service to Mobile Devices. 2240-2250 - Peng Li, Song Guo

:
On the Multicast Capacity in Energy-Constrained Lossy Wireless Networks by Exploiting Intrabatch and Interbatch Network Coding. 2251-2260 - Deke Guo, Hai Jin, Tao Chen

, Jie Wu, Li Lu, Dongsheng Li, Xiaolei Zhou:
Partial Probing for Scaling Overlay Routing. 2261-2272 - Juan Gómez-Luna

, José María González-Linares
, José Ignacio Benavides Benítez, Nicolás Guil Mata
:
Performance Modeling of Atomic Additions on GPU Scratchpad Memory. 2273-2282 - Yi-Hua E. Yang, Viktor K. Prasanna:

Robust and Scalable String Pattern Matching for Deep Packet Inspection on Multicore Processors. 2283-2292 - Hongkun Li, Yu Cheng

, Chi Zhou, Weihua Zhuang
:
Routing Metrics for Minimizing End-to-End Delay in Multiradio Multichannel Wireless Networks. 2293-2303 - Uichin Lee, Seung-Hoon Lee, Kang-Won Lee, Mario Gerla:

Understanding Processing Overheads of Network Coding-Based Content Distribution in VANETs. 2304-2318 - Aijun Ge

, Jiang Zhang
, Rui Zhang, Chuangui Ma, Zhenfeng Zhang:
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. 2319-2321
Volume 24, Number 12, December 2013
- Ivan Stojmenovic:

Editor's Note: EIC Farewell and New EIC Introduction. 2322-2323 - Sang-Won Ha, Tack-Don Han:

A Scalable Work-Efficient and Depth-Optimal Parallel Scan for the GPGPU Environment. 2324-2333 - Quan Chen, Minyi Guo, Zhiyi Huang:

Adaptive Cache Aware Bitier Work-Stealing in Multisocket Multicore Architectures. 2334-2343 - Yuzhe Tang, Bugra Gedik:

Autopipelining for Data Stream Processing. 2344-2354 - Hsu-Feng Hsiao, Chen-Tsang Wu:

Balanced Parallel Scheduling for Video Encoding with Adaptive GOP Structure. 2355-2364 - Yong Cui, Hongyi Wang, Xiuzhen Cheng, Dan Li, Antti Ylä-Jääski

:
Dynamic Scheduling for Wireless Data Center Networks. 2365-2374 - Ayad F. Barsoum, M. Anwar Hasan:

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems. 2375-2385 - Paolo Bellavista

, Antonio Corradi
, Luca Foschini
:
Enhancing Intradomain Scalability of IMS-Based Services. 2386-2395 - XuFei Mao, Yunhao Liu, Shaojie Tang, Huafu Liu, Jiankang Han, Xiang-Yang Li:

Finding Best and Worst k-Coverage Paths in Multihop Wireless Sensor Networks. 2396-2406 - Yan Cai

, W. K. Chan
:
Lock Trace Reduction for Multithreaded Programs. 2407-2417 - Luoyi Fu, Xinbing Wang:

Multicast Scaling Law in Multichannel Multiradio Wireless Networks. 2418-2428 - Hamzeh Khazaei

, Jelena V. Misic, Vojislav B. Misic:
Performance of Cloud Centers with High Degree of Virtualization under Batch Task Arrivals. 2429-2438 - Haiying Shen, Yuhua Lin, Ze Li:

Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks. 2439-2450 - Snaider Carrillo

, Jim Harkin
, Liam McDaid, Fearghal Morgan, Sandeep Pande, Seamus Cawley, Brian McGinley
:
Scalable Hierarchical Network-on-Chip Architecture for Spiking Neural Network Hardware Implementations. 2451-2461 - Miguel Matos

, Pascal Felber
, Rui Oliveira
, José Orlando Pereira
, Etienne Rivière:
Scaling Up Publish/Subscribe Overlays Using Interest Correlation for Link Sharing. 2462-2471 - Tamer Abdelkader

, Kshirasagar Naik, Amiya Nayak
, Nishith Goel, Vineet Srivastava:
SGBR: A Routing Protocol for Delay Tolerant Networks Using Social Grouping. 2472-2481 - Fengyuan Xu, Xiaojun Zhu

, Chiu C. Tan, Qun Li
, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. 2482-2491 - Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li

:
SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks. 2492-2502 - Adele Lu Jia, Rameez Rahman, Tamás Vinkó

, Johan A. Pouwelse
, Dick H. J. Epema:
Systemic Risk and User-Level Performance in Private P2P Communities. 2503-2512 - Petar Radojkovic

, Vladimir Cakarevic, Javier Verdú, Alex Pajuelo
, Francisco J. Cazorla
, Mario Nemirovsky, Mateo Valero
:
Thread Assignment of Multithreaded Network Applications in Multicore/Multithreaded Processors. 2513-2525 - Jiaqing Luo, Bin Xiao

, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. 2526-2537

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














