callback( { "result":{ "query":":facetid:toc:\"db/conf/ipccc/ipccc2011.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"1152.69" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"60", "@dc":"60", "@oc":"60", "@id":"43294317", "text":":facetid:toc:db/conf/ipccc/ipccc2011.bht" } }, "hits":{ "@total":"60", "@computed":"60", "@sent":"60", "@first":"0", "hit":[{ "@score":"1", "@id":"4687124", "info":{"authors":{"author":[{"@pid":"21/8166","text":"Nihat Altiparmak"},{"@pid":"83/11198","text":"Ali Tekeoglu"},{"@pid":"05/3093","text":"Ali Saman Tosun"}]},"title":"DoS resilience of real time streaming protocol.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/AltiparmakTT11","doi":"10.1109/PCCC.2011.6108093","ee":"https://doi.org/10.1109/PCCC.2011.6108093","url":"https://dblp.org/rec/conf/ipccc/AltiparmakTT11"}, "url":"URL#4687124" }, { "@score":"1", "@id":"4687125", "info":{"authors":{"author":[{"@pid":"16/2961-6","text":"Muhammad Asif 0006"},{"@pid":"89/1871","text":"Zhili Sun"},{"@pid":"42/2102","text":"Haitham S. Cruickshank"},{"@pid":"82/6843-3","text":"Naveed Ahmad 0003"}]},"title":"QoS assurance in MANETs using flow aware admission control - Multipath protocol.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/AsifSCA11","doi":"10.1109/PCCC.2011.6108097","ee":"https://doi.org/10.1109/PCCC.2011.6108097","url":"https://dblp.org/rec/conf/ipccc/AsifSCA11"}, "url":"URL#4687125" }, { "@score":"1", "@id":"4687126", "info":{"authors":{"author":[{"@pid":"15/11199-1","text":"Pablo Barrio 0001"},{"@pid":"29/1144","text":"Carlos Carreras"}]},"title":"Mesh traversal and sorting for efficient memory usage in scientific codes.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/BarrioC11","doi":"10.1109/PCCC.2011.6108106","ee":"https://doi.org/10.1109/PCCC.2011.6108106","url":"https://dblp.org/rec/conf/ipccc/BarrioC11"}, "url":"URL#4687126" }, { "@score":"1", "@id":"4687127", "info":{"authors":{"author":[{"@pid":"c/MihaelaCardei","text":"Mihaela Cardei"},{"@pid":"37/10039","text":"Anthony Marcus"},{"@pid":"63/1597","text":"Ionut Cardei"},{"@pid":"42/11197","text":"Timur Tavtilov"}]},"title":"Web-based heterogeneous WSN integration using pervasive communication.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/CardeiMCT11","doi":"10.1109/PCCC.2011.6108065","ee":"https://doi.org/10.1109/PCCC.2011.6108065","url":"https://dblp.org/rec/conf/ipccc/CardeiMCT11"}, "url":"URL#4687127" }, { "@score":"1", "@id":"4687128", "info":{"authors":{"author":[{"@pid":"82/11199","text":"Antonio M. Carianha"},{"@pid":"89/7803","text":"Luciano Barreto"},{"@pid":"07/2481","text":"George Lima 0001"}]},"title":"Improving location privacy in mix-zones for VANETs.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/CarianhaBL11","doi":"10.1109/PCCC.2011.6108111","ee":"https://doi.org/10.1109/PCCC.2011.6108111","url":"https://dblp.org/rec/conf/ipccc/CarianhaBL11"}, "url":"URL#4687128" }, { "@score":"1", "@id":"4687129", "info":{"authors":{"author":[{"@pid":"79/11198","text":"Jagmohan Chauhan"},{"@pid":"05/5405","text":"Dwight J. Makaroff"},{"@pid":"57/9689","text":"Anthony J. Arkles"}]},"title":"VM clock synchronization measurements.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ChauhanMA11","doi":"10.1109/PCCC.2011.6108101","ee":"https://doi.org/10.1109/PCCC.2011.6108101","url":"https://dblp.org/rec/conf/ipccc/ChauhanMA11"}, "url":"URL#4687129" }, { "@score":"1", "@id":"4687130", "info":{"authors":{"author":[{"@pid":"63/4066","text":"Maulik Desai"},{"@pid":"97/5512","text":"Nicholas F. Maxemchuk"}]},"title":"A case for packet deflection in structured wireless topologies.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/DesaiM11","doi":"10.1109/PCCC.2011.6108082","ee":"https://doi.org/10.1109/PCCC.2011.6108082","url":"https://dblp.org/rec/conf/ipccc/DesaiM11"}, "url":"URL#4687130" }, { "@score":"1", "@id":"4687131", "info":{"authors":{"author":[{"@pid":"42/8142","text":"David Dillow"},{"@pid":"23/3104","text":"Galen M. Shipman"},{"@pid":"61/5178","text":"Sarp Oral"},{"@pid":"87/5809","text":"Zhe Zhang"},{"@pid":"19/5848","text":"Youngjae Kim 0001"}]},"title":"Enhancing I/O throughput via efficient routing and placement for large-scale parallel file systems.","venue":"IPCCC","pages":"1-9","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/DillowSOZK11","doi":"10.1109/PCCC.2011.6108062","ee":"https://doi.org/10.1109/PCCC.2011.6108062","url":"https://dblp.org/rec/conf/ipccc/DillowSOZK11"}, "url":"URL#4687131" }, { "@score":"1", "@id":"4687132", "info":{"authors":{"author":{"@pid":"87/2495","text":"Dinil Mon Divakaran"}},"title":"Using spikes to deal with elephants.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/Divakaran11","doi":"10.1109/PCCC.2011.6108073","ee":"https://doi.org/10.1109/PCCC.2011.6108073","url":"https://dblp.org/rec/conf/ipccc/Divakaran11"}, "url":"URL#4687132" }, { "@score":"1", "@id":"4687133", "info":{"authors":{"author":[{"@pid":"45/11197","text":"Yueming Duan"},{"@pid":"07/8388","text":"Shouling Ji"},{"@pid":"14/5155-1","text":"Zhipeng Cai 0001"}]},"title":"Generalized broadcast scheduling in duty-cycle multi-hop wireless networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/DuanJC11","doi":"10.1109/PCCC.2011.6108080","ee":"https://doi.org/10.1109/PCCC.2011.6108080","url":"https://dblp.org/rec/conf/ipccc/DuanJC11"}, "url":"URL#4687133" }, { "@score":"1", "@id":"4687134", "info":{"authors":{"author":[{"@pid":"18/11197","text":"Thuan Duong-Ba"},{"@pid":"18/1177","text":"Thinh P. Nguyen"},{"@pid":"13/1055","text":"Patrick Chiang 0001"}]},"title":"Network coding in multicore processors.","venue":"IPCCC","pages":"1-7","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/Duong-BaNC11","doi":"10.1109/PCCC.2011.6108067","ee":"https://doi.org/10.1109/PCCC.2011.6108067","url":"https://dblp.org/rec/conf/ipccc/Duong-BaNC11"}, "url":"URL#4687134" }, { "@score":"1", "@id":"4687135", "info":{"authors":{"author":[{"@pid":"63/11197","text":"Ifeanyi P. Egwutuoha"},{"@pid":"71/5381","text":"David Levy 0001"},{"@pid":"74/3493","text":"Bran Selic"}]},"title":"Evaluation of process level redundant checkpointing/restart for HPC systems.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/EgwutuohaLS11","doi":"10.1109/PCCC.2011.6108098","ee":"https://doi.org/10.1109/PCCC.2011.6108098","url":"https://dblp.org/rec/conf/ipccc/EgwutuohaLS11"}, "url":"URL#4687135" }, { "@score":"1", "@id":"4687136", "info":{"authors":{"author":[{"@pid":"69/11199","text":"Cherine Fathy"},{"@pid":"63/6762","text":"Mahmoud T. El-Hadidi"},{"@pid":"30/7909","text":"Mohamad Abou El-Nasr"}]},"title":"Fuzzy-based adaptive cross layer routing protocol for mobile ad hoc networks.","venue":"IPCCC","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/FathyEE11","doi":"10.1109/PCCC.2011.6108079","ee":"https://doi.org/10.1109/PCCC.2011.6108079","url":"https://dblp.org/rec/conf/ipccc/FathyEE11"}, "url":"URL#4687136" }, { "@score":"1", "@id":"4687137", "info":{"authors":{"author":[{"@pid":"76/3402-1","text":"Mathias Fischer 0001"},{"@pid":"83/11199","text":"Sebastian Delling"},{"@pid":"11/7947","text":"Sascha Grau"},{"@pid":"64/4710","text":"Guenter Schaefer"}]},"title":"Underlay-robust application layer multicast.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/FischerDGS11","doi":"10.1109/PCCC.2011.6108100","ee":"https://doi.org/10.1109/PCCC.2011.6108100","url":"https://dblp.org/rec/conf/ipccc/FischerDGS11"}, "url":"URL#4687137" }, { "@score":"1", "@id":"4687138", "info":{"authors":{"author":[{"@pid":"80/11198","text":"Holly French"},{"@pid":"88/6731","text":"Jie Lin"},{"@pid":"04/11198","text":"Tung Phan"},{"@pid":"76/568","text":"Amy Csizmar Dalal"}]},"title":"Real time video QoE analysis of RTMP streams.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/FrenchLPD11","doi":"10.1109/PCCC.2011.6108105","ee":"https://doi.org/10.1109/PCCC.2011.6108105","url":"https://dblp.org/rec/conf/ipccc/FrenchLPD11"}, "url":"URL#4687138" }, { "@score":"1", "@id":"4687139", "info":{"authors":{"author":[{"@pid":"59/4235","text":"Patricio Galdames"},{"@pid":"32/1858","text":"Qinghua Zheng"},{"@pid":"22/5861","text":"Ying Cai"}]},"title":"A subscription overlay network for large-scale and cost-efficient any source multicast.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/GaldamesZC11","doi":"10.1109/PCCC.2011.6108071","ee":"https://doi.org/10.1109/PCCC.2011.6108071","url":"https://dblp.org/rec/conf/ipccc/GaldamesZC11"}, "url":"URL#4687139" }, { "@score":"1", "@id":"4687140", "info":{"authors":{"author":[{"@pid":"25/7719","text":"Gordana Gardasevic"},{"@pid":"50/11197","text":"Dejan Stjepanovic"},{"@pid":"39/11199","text":"Aleksandar Damljanovic"},{"@pid":"15/11197","text":"Dejan Cvijanovic"}]},"title":"A SOA-based framework for cross-layer QoS adaptation in next generation networks.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/GardasevicSDC11","doi":"10.1109/PCCC.2011.6108096","ee":"https://doi.org/10.1109/PCCC.2011.6108096","url":"https://dblp.org/rec/conf/ipccc/GardasevicSDC11"}, "url":"URL#4687140" }, { "@score":"1", "@id":"4687141", "info":{"authors":{"author":{"@pid":"69/7723","text":"Oliver Hanka"}},"title":"The cost of location privacy in locator/identifier-split architectures.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/Hanka11","doi":"10.1109/PCCC.2011.6108112","ee":"https://doi.org/10.1109/PCCC.2011.6108112","url":"https://dblp.org/rec/conf/ipccc/Hanka11"}, "url":"URL#4687141" }, { "@score":"1", "@id":"4687142", "info":{"authors":{"author":[{"@pid":"64/11197","text":"Joseph Issa"},{"@pid":"82/5761","text":"Silvia Figueira"}]},"title":"Performance and power-consumption analysis of Mobile Internet Devices.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/IssaF11","doi":"10.1109/PCCC.2011.6108116","ee":"https://doi.org/10.1109/PCCC.2011.6108116","url":"https://dblp.org/rec/conf/ipccc/IssaF11"}, "url":"URL#4687142" }, { "@score":"1", "@id":"4687143", "info":{"authors":{"author":[{"@pid":"94/11198","text":"Christopher Jarabek"},{"@pid":"96/6774","text":"Mea Wang"}]},"title":"Can P2P help the cloud go green?","venue":"IPCCC","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/JarabekW11","doi":"10.1109/PCCC.2011.6108085","ee":"https://doi.org/10.1109/PCCC.2011.6108085","url":"https://dblp.org/rec/conf/ipccc/JarabekW11"}, "url":"URL#4687143" }, { "@score":"1", "@id":"4687144", "info":{"authors":{"author":[{"@pid":"32/831","text":"Ning Jing"},{"@pid":"98/2604","text":"Ming Yang"},{"@pid":"21/2249","text":"Shaoyin Cheng"},{"@pid":"49/6431","text":"Qunfeng Dong"},{"@pid":"262/1686","text":"Hui Xiong"}]},"title":"An efficient SVM-based method for multi-class network traffic classification.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/JingYCDX11","doi":"10.1109/PCCC.2011.6108074","ee":"https://doi.org/10.1109/PCCC.2011.6108074","url":"https://dblp.org/rec/conf/ipccc/JingYCDX11"}, "url":"URL#4687144" }, { "@score":"1", "@id":"4687145", "info":{"authors":{"author":[{"@pid":"59/577","text":"Shahin Kamali"},{"@pid":"99/2946","text":"Pedram Ghodsnia"},{"@pid":"d/KhuzaimaDaudjee","text":"Khuzaima Daudjee"}]},"title":"Dynamic data allocation with replication in distributed systems.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KamaliGD11","doi":"10.1109/PCCC.2011.6108075","ee":"https://doi.org/10.1109/PCCC.2011.6108075","url":"https://dblp.org/rec/conf/ipccc/KamaliGD11"}, "url":"URL#4687145" }, { "@score":"1", "@id":"4687146", "info":{"authors":{"author":[{"@pid":"96/11197","text":"Siddharth Kamath"},{"@pid":"93/6494","text":"Asis Nasipuri"}]},"title":"Integrated load balanced and energy aware routing in large scale wireless sensor networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KamathN11","doi":"10.1109/PCCC.2011.6108088","ee":"https://doi.org/10.1109/PCCC.2011.6108088","url":"https://dblp.org/rec/conf/ipccc/KamathN11"}, "url":"URL#4687146" }, { "@score":"1", "@id":"4687147", "info":{"authors":{"author":[{"@pid":"97/5874","text":"Abdelmajid Khelil"},{"@pid":"57/11197","text":"Hanbin Chang"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"}]},"title":"Assessing the comparative effectiveness of map construction protocols in wireless sensor networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KhelilCS11","doi":"10.1109/PCCC.2011.6108090","ee":"https://doi.org/10.1109/PCCC.2011.6108090","url":"https://dblp.org/rec/conf/ipccc/KhelilCS11"}, "url":"URL#4687147" }, { "@score":"1", "@id":"4687148", "info":{"authors":{"author":[{"@pid":"66/2627","text":"Young-Hun Kim"},{"@pid":"59/5666","text":"Keon-Taek Lee"},{"@pid":"97/984","text":"Semin Sim"},{"@pid":"65/5493","text":"Seung-Jae Han"}]},"title":"A simple myopic mobile sink strategy for wireless sensor networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KimLSH11","doi":"10.1109/PCCC.2011.6108064","ee":"https://doi.org/10.1109/PCCC.2011.6108064","url":"https://dblp.org/rec/conf/ipccc/KimLSH11"}, "url":"URL#4687148" }, { "@score":"1", "@id":"4687149", "info":{"authors":{"author":[{"@pid":"70/9975","text":"Agnieszka Lezanska"},{"@pid":"70/1896","text":"Muhammad Faisal Hayat"}]},"title":"Performance modelling of energy efficient wireless nodes.","venue":"IPCCC","pages":"1-7","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LezanskaH11","doi":"10.1109/PCCC.2011.6108058","ee":"https://doi.org/10.1109/PCCC.2011.6108058","url":"https://dblp.org/rec/conf/ipccc/LezanskaH11"}, "url":"URL#4687149" }, { "@score":"1", "@id":"4687150", "info":{"authors":{"author":{"@pid":"34/2997","text":"Yu Li"}},"title":"A reputation system for wireless mesh network using multi-path routing protocol.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/Li11","doi":"10.1109/PCCC.2011.6108118","ee":"https://doi.org/10.1109/PCCC.2011.6108118","url":"https://dblp.org/rec/conf/ipccc/Li11"}, "url":"URL#4687150" }, { "@score":"1", "@id":"4687151", "info":{"authors":{"author":[{"@pid":"31/712","text":"Jinbao Li"},{"@pid":"69/11197","text":"Xiaohang Guo"},{"@pid":"48/6459","text":"Longjiang Guo"}]},"title":"Joint routing, scheduling and channel assignment in multi-power multi-radio wireless sensor networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LiGG11","doi":"10.1109/PCCC.2011.6108087","ee":"https://doi.org/10.1109/PCCC.2011.6108087","url":"https://dblp.org/rec/conf/ipccc/LiGG11"}, "url":"URL#4687151" }, { "@score":"1", "@id":"4687152", "info":{"authors":{"author":[{"@pid":"19/9058","text":"Yantao Li"},{"@pid":"63/216-1","text":"Xin Qi 0001"},{"@pid":"33/5514","text":"Zhen Ren"},{"@pid":"67/4904","text":"Gang Zhou"},{"@pid":"43/5467-1","text":"Di Xiao 0001"},{"@pid":"15/4454","text":"Shaojiang Deng"}]},"title":"Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LiQRZXD11","doi":"10.1109/PCCC.2011.6108089","ee":"https://doi.org/10.1109/PCCC.2011.6108089","url":"https://dblp.org/rec/conf/ipccc/LiQRZXD11"}, "url":"URL#4687152" }, { "@score":"1", "@id":"4687153", "info":{"authors":{"author":[{"@pid":"80/5931","text":"Baljeet Malhotra"},{"@pid":"90/1785","text":"Ioanis Nikolaidis"},{"@pid":"n/MarioANascimento","text":"Mario A. Nascimento"},{"@pid":"b/SBressan","text":"Stéphane Bressan"}]},"title":"Biased shortest path trees in wireless networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MalhotraNNB11","doi":"10.1109/PCCC.2011.6108114","ee":"https://doi.org/10.1109/PCCC.2011.6108114","url":"https://dblp.org/rec/conf/ipccc/MalhotraNNB11"}, "url":"URL#4687153" }, { "@score":"1", "@id":"4687154", "info":{"authors":{"author":[{"@pid":"44/10956","text":"Lena Mashayekhy"},{"@pid":"g/DanielGrosu","text":"Daniel Grosu"}]},"title":"A merge-and-split mechanism for dynamic virtual organization formation in grids.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MashayekhyG11","doi":"10.1109/PCCC.2011.6108108","ee":"https://doi.org/10.1109/PCCC.2011.6108108","url":"https://dblp.org/rec/conf/ipccc/MashayekhyG11"}, "url":"URL#4687154" }, { "@score":"1", "@id":"4687155", "info":{"authors":{"author":[{"@pid":"48/11197","text":"Tharwat Morsy"},{"@pid":"43/6299","text":"Jürgen Götze"},{"@pid":"n/HNassar","text":"Hamed Nassar"}]},"title":"Using hidden convexity in structured communication problems.","venue":"IPCCC","pages":"1-7","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MorsyGN11","doi":"10.1109/PCCC.2011.6108078","ee":"https://doi.org/10.1109/PCCC.2011.6108078","url":"https://dblp.org/rec/conf/ipccc/MorsyGN11"}, "url":"URL#4687155" }, { "@score":"1", "@id":"4687156", "info":{"authors":{"author":[{"@pid":"51/11047","text":"Vivek Natarajan"},{"@pid":"33/4854-2","text":"Yi Yang 0002"},{"@pid":"40/2231","text":"Sencun Zhu"}]},"title":"Resource-misuse attack detection in delay-tolerant networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/NatarajanYZ11","doi":"10.1109/PCCC.2011.6108092","ee":"https://doi.org/10.1109/PCCC.2011.6108092","url":"https://dblp.org/rec/conf/ipccc/NatarajanYZ11"}, "url":"URL#4687156" }, { "@score":"1", "@id":"4687157", "info":{"authors":{"author":[{"@pid":"13/5240-1","text":"Duy Nguyen 0001"},{"@pid":"g/JJGarciaLunaAceves","text":"Jose Joaquin Garcia-Luna-Aceves"},{"@pid":"37/800","text":"Cédric Westphal"}]},"title":"Multi-rate adaptation with interference and congestion awareness.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/NguyenGW11","doi":"10.1109/PCCC.2011.6108057","ee":"https://doi.org/10.1109/PCCC.2011.6108057","url":"https://dblp.org/rec/conf/ipccc/NguyenGW11"}, "url":"URL#4687157" }, { "@score":"1", "@id":"4687158", "info":{"authors":{"author":[{"@pid":"72/10805","text":"Rodney Owens"},{"@pid":"79/1394","text":"Weichao Wang"}]},"title":"Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/OwensW11","doi":"10.1109/PCCC.2011.6108094","ee":"https://doi.org/10.1109/PCCC.2011.6108094","url":"https://dblp.org/rec/conf/ipccc/OwensW11"}, "url":"URL#4687158" }, { "@score":"1", "@id":"4687159", "info":{"authors":{"author":[{"@pid":"59/7987","text":"Amitangshu Pal"},{"@pid":"93/6494","text":"Asis Nasipuri"}]},"title":"JRCA: A joint routing and channel assignment scheme for wireless mesh networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/PalN11","doi":"10.1109/PCCC.2011.6108059","ee":"https://doi.org/10.1109/PCCC.2011.6108059","url":"https://dblp.org/rec/conf/ipccc/PalN11"}, "url":"URL#4687159" }, { "@score":"1", "@id":"4687160", "info":{"authors":{"author":[{"@pid":"45/1805","text":"Aleksi Penttinen"},{"@pid":"51/6565","text":"Esa Hyytiä"},{"@pid":"70/4170","text":"Samuli Aalto"}]},"title":"Energy-aware dispatching in parallel queues with on-off energy consumption.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/PenttinenHA11","doi":"10.1109/PCCC.2011.6108077","ee":"https://doi.org/10.1109/PCCC.2011.6108077","url":"https://dblp.org/rec/conf/ipccc/PenttinenHA11"}, "url":"URL#4687160" }, { "@score":"1", "@id":"4687161", "info":{"authors":{"author":[{"@pid":"62/11197","text":"Saddam Quirem"},{"@pid":"11/11198","text":"Fahian Ahmed"},{"@pid":"36/134","text":"Byeong Kil Lee"}]},"title":"CUDA acceleration of P7Viterbi algorithm in HMMER 3.0.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/QuiremAL11","doi":"10.1109/PCCC.2011.6108104","ee":"https://doi.org/10.1109/PCCC.2011.6108104","url":"https://dblp.org/rec/conf/ipccc/QuiremAL11"}, "url":"URL#4687161" }, { "@score":"1", "@id":"4687162", "info":{"authors":{"author":[{"@pid":"91/7353","text":"Stamatia Rizou"},{"@pid":"20/6521","text":"Frank Dürr"},{"@pid":"r/KurtRothermel","text":"Kurt Rothermel"}]},"title":"Fulfilling end-to-end latency constraints in large-scale streaming environments.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/RizouDR11","doi":"10.1109/PCCC.2011.6108086","ee":"https://doi.org/10.1109/PCCC.2011.6108086","url":"https://dblp.org/rec/conf/ipccc/RizouDR11"}, "url":"URL#4687162" }, { "@score":"1", "@id":"4687163", "info":{"authors":{"author":[{"@pid":"59/1987","text":"Swapnoneel Roy"},{"@pid":"46/10310","text":"Amlan K. Das"},{"@pid":"34/2997","text":"Yu Li"}]},"title":"Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication.","venue":"IPCCC","pages":"1-7","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/RoyDL11","doi":"10.1109/PCCC.2011.6108113","ee":"https://doi.org/10.1109/PCCC.2011.6108113","url":"https://dblp.org/rec/conf/ipccc/RoyDL11"}, "url":"URL#4687163" }, { "@score":"1", "@id":"4687164", "info":{"authors":{"author":[{"@pid":"74/9386","text":"Mateus A. S. Santos"},{"@pid":"66/1037","text":"Cíntia B. Margi"}]},"title":"Design and implementation of data survival in unattended wireless sensor networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/SantosM11","doi":"10.1109/PCCC.2011.6108117","ee":"https://doi.org/10.1109/PCCC.2011.6108117","url":"https://dblp.org/rec/conf/ipccc/SantosM11"}, "url":"URL#4687164" }, { "@score":"1", "@id":"4687165", "info":{"authors":{"author":[{"@pid":"85/9528","text":"Jung Ki So"},{"@pid":"r/DouglasSReeves","text":"Douglas S. Reeves"}]},"title":"Adaptive neighbor management for cooperative P2P video-on-demand streaming.","venue":"IPCCC","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/SoR11","doi":"10.1109/PCCC.2011.6108084","ee":"https://doi.org/10.1109/PCCC.2011.6108084","url":"https://dblp.org/rec/conf/ipccc/SoR11"}, "url":"URL#4687165" }, { "@score":"1", "@id":"4687166", "info":{"authors":{"author":[{"@pid":"31/5364","text":"John Solis"},{"@pid":"68/5081","text":"Philip Ginzboorg"},{"@pid":"39/2508","text":"N. Asokan"},{"@pid":"57/6706","text":"Jörg Ott"}]},"title":"Best-effort authentication for opportunistic networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/SolisGAO11","doi":"10.1109/PCCC.2011.6108110","ee":"https://doi.org/10.1109/PCCC.2011.6108110","url":"https://dblp.org/rec/conf/ipccc/SolisGAO11"}, "url":"URL#4687166" }, { "@score":"1", "@id":"4687167", "info":{"authors":{"author":[{"@pid":"88/2999","text":"Jianzhe Tai"},{"@pid":"96/285","text":"Juemin Zhang"},{"@pid":"116/1011","text":"Jun Li"},{"@pid":"m/WaleedMeleis","text":"Waleed Meleis"},{"@pid":"03/4718","text":"Ningfang Mi"}]},"title":"ArA: Adaptive resource allocation for cloud computing environments under bursty workloads.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/TaiZLMM11","doi":"10.1109/PCCC.2011.6108060","ee":"https://doi.org/10.1109/PCCC.2011.6108060","url":"https://dblp.org/rec/conf/ipccc/TaiZLMM11"}, "url":"URL#4687167" }, { "@score":"1", "@id":"4687168", "info":{"authors":{"author":[{"@pid":"92/11198","text":"Pollawat Thanarungroj"},{"@pid":"10/2639-1","text":"Chen Liu 0001"}]},"title":"Power and energy consumption analysis on intel SCC many-core system.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ThanarungrojL11","doi":"10.1109/PCCC.2011.6108095","ee":"https://doi.org/10.1109/PCCC.2011.6108095","url":"https://dblp.org/rec/conf/ipccc/ThanarungrojL11"}, "url":"URL#4687168" }, { "@score":"1", "@id":"4687169", "info":{"authors":{"author":[{"@pid":"29/9081","text":"M. Engin Tozal"},{"@pid":"15/542","text":"Kamil Saraç"}]},"title":"Subnet level network topology mapping.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/TozalS11","doi":"10.1109/PCCC.2011.6108072","ee":"https://doi.org/10.1109/PCCC.2011.6108072","url":"https://dblp.org/rec/conf/ipccc/TozalS11"}, "url":"URL#4687169" }, { "@score":"1", "@id":"4687170", "info":{"authors":{"author":[{"@pid":"30/4276-1","text":"Haibo Wu 0001"},{"@pid":"15/5983-4","text":"Hai Jiang 0004"},{"@pid":"72/2590-3","text":"Jing Liu 0003"},{"@pid":"65/2709-4","text":"Yi Sun 0004"},{"@pid":"l/JunLi2","text":"Jun Li 0002"},{"@pid":"20/6301","text":"Zhongcheng Li"}]},"title":"How P2P live streaming systems scale quickly under a flash crowd?","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/WuJLSLL11","doi":"10.1109/PCCC.2011.6108083","ee":"https://doi.org/10.1109/PCCC.2011.6108083","url":"https://dblp.org/rec/conf/ipccc/WuJLSLL11"}, "url":"URL#4687170" }, { "@score":"1", "@id":"4687171", "info":{"authors":{"author":[{"@pid":"76/2904","text":"Qishi Wu"},{"@pid":"z/MengxiaZhu","text":"Mengxia Zhu"},{"@pid":"83/5894","text":"Yi Gu"},{"@pid":"80/7704","text":"Xukang Lu"},{"@pid":"73/2868-2","text":"Patrick Brown 0002"},{"@pid":"68/3724","text":"Michael A. Reuter"},{"@pid":"49/5186","text":"Stephen D. Miller"}]},"title":"A distributed workflow management system with case study of real-life scientific applications.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/WuZGLBRM11","doi":"10.1109/PCCC.2011.6108109","ee":"https://doi.org/10.1109/PCCC.2011.6108109","url":"https://dblp.org/rec/conf/ipccc/WuZGLBRM11"}, "url":"URL#4687171" }, { "@score":"1", "@id":"4687172", "info":{"authors":{"author":[{"@pid":"53/11198","text":"Mingyuan Yan"},{"@pid":"85/93-1","text":"Jing He 0001"},{"@pid":"07/8388","text":"Shouling Ji"},{"@pid":"22/393","text":"Yingshu Li"}]},"title":"Minimum latency scheduling for Multi-Regional Query in Wireless Sensor Networks.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/YanHJL11","doi":"10.1109/PCCC.2011.6108063","ee":"https://doi.org/10.1109/PCCC.2011.6108063","url":"https://dblp.org/rec/conf/ipccc/YanHJL11"}, "url":"URL#4687172" }, { "@score":"1", "@id":"4687173", "info":{"authors":{"author":[{"@pid":"59/179","text":"Yi Yao"},{"@pid":"95/4434","text":"Bo Sheng"},{"@pid":"03/4718","text":"Ningfang Mi"}]},"title":"DAT: An AP scheduler using dynamically adjusted time windows for crowded WLANs.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/YaoSM11","doi":"10.1109/PCCC.2011.6108115","ee":"https://doi.org/10.1109/PCCC.2011.6108115","url":"https://dblp.org/rec/conf/ipccc/YaoSM11"}, "url":"URL#4687173" }, { "@score":"1", "@id":"4687174", "info":{"authors":{"author":[{"@pid":"88/7556","text":"Shu Yin"},{"@pid":"85/4928","text":"Yun Tian"},{"@pid":"54/7700","text":"Jiong Xie"},{"@pid":"q/XiaoQin","text":"Xiao Qin 0001"},{"@pid":"37/874","text":"Mohammed I. Alghamdi"},{"@pid":"60/6397","text":"Xiaojun Ruan"},{"@pid":"q/MeikangQiu","text":"Meikang Qiu"}]},"title":"Reliability analysis of an energy-aware RAID system.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/YinTXQARQ11","doi":"10.1109/PCCC.2011.6108068","ee":"https://doi.org/10.1109/PCCC.2011.6108068","url":"https://dblp.org/rec/conf/ipccc/YinTXQARQ11"}, "url":"URL#4687174" }, { "@score":"1", "@id":"4687175", "info":{"authors":{"author":[{"@pid":"44/5554","text":"Ziming Zhang"},{"@pid":"57/2335","text":"Song Fu"}]},"title":"Macropower: A coarse-grain power profiling framework for energy-efficient cloud computing.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangF11","doi":"10.1109/PCCC.2011.6108061","ee":"https://doi.org/10.1109/PCCC.2011.6108061","url":"https://dblp.org/rec/conf/ipccc/ZhangF11"}, "url":"URL#4687175" }, { "@score":"1", "@id":"4687176", "info":{"authors":{"author":[{"@pid":"95/4452","text":"Haoran Zhang"},{"@pid":"51/769","text":"Liusheng Huang"},{"@pid":"22/1748","text":"Hongli Xu"}]},"title":"Cooperative optimal pricing for stochastic access control in heterogeneous wireless networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangHX11","doi":"10.1109/PCCC.2011.6108081","ee":"https://doi.org/10.1109/PCCC.2011.6108081","url":"https://dblp.org/rec/conf/ipccc/ZhangHX11"}, "url":"URL#4687176" }, { "@score":"1", "@id":"4687177", "info":{"authors":{"author":[{"@pid":"36/5594","text":"Zhi Zhang"},{"@pid":"87/3534-1","text":"Fei Li 0001"}]},"title":"Optimizing energy consumption under flow and stretch constraints.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangL11","doi":"10.1109/PCCC.2011.6108076","ee":"https://doi.org/10.1109/PCCC.2011.6108076","url":"https://dblp.org/rec/conf/ipccc/ZhangL11"}, "url":"URL#4687177" }, { "@score":"1", "@id":"4687178", "info":{"authors":{"author":[{"@pid":"68/6577-3","text":"Ren Zhang 0003"},{"@pid":"63/4117","text":"Jianyu Zhang"},{"@pid":"87/1254","text":"Yu Chen"},{"@pid":"45/11199","text":"Nanhao Qin"},{"@pid":"44/11198","text":"Bingshuang Liu"},{"@pid":"48/2168","text":"Yuan Zhang"}]},"title":"Making eclipse attacks computationally infeasible in large-scale DHTs.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangZCQLZ11","doi":"10.1109/PCCC.2011.6108091","ee":"https://doi.org/10.1109/PCCC.2011.6108091","url":"https://dblp.org/rec/conf/ipccc/ZhangZCQLZ11"}, "url":"URL#4687178" }, { "@score":"1", "@id":"4687179", "info":{"authors":{"author":[{"@pid":"41/1572","text":"Yingjie Zhou"},{"@pid":"06/1031","text":"Guangmin Hu"}]},"title":"GNAED: A data mining framework for network-wide abnormal event detection in backbone networks.","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhouH11","doi":"10.1109/PCCC.2011.6108099","ee":"https://doi.org/10.1109/PCCC.2011.6108099","url":"https://dblp.org/rec/conf/ipccc/ZhouH11"}, "url":"URL#4687179" }, { "@score":"1", "@id":"4687180", "info":{"authors":{"author":[{"@pid":"09/4144-1","text":"Xiaomin Zhu 0001"},{"@pid":"76/4276","text":"Chuan He"},{"@pid":"60/11197","text":"Jianjiang Wang"}]},"title":"Energy-efficient elastic scheduling in heterogeneous computing systems.","venue":"IPCCC","pages":"1-8","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhuHW11","doi":"10.1109/PCCC.2011.6108069","ee":"https://doi.org/10.1109/PCCC.2011.6108069","url":"https://dblp.org/rec/conf/ipccc/ZhuHW11"}, "url":"URL#4687180" }, { "@score":"1", "@id":"4687181", "info":{"authors":{"author":[{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"70/1726-6","text":"Meng Li 0006"}]},"title":"An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks.","venue":"IPCCC","pages":"1-6","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhuL11","doi":"10.1109/PCCC.2011.6108066","ee":"https://doi.org/10.1109/PCCC.2011.6108066","url":"https://dblp.org/rec/conf/ipccc/ZhuL11"}, "url":"URL#4687181" }, { "@score":"1", "@id":"4687182", "info":{"authors":{"author":[{"@pid":"50/11199","text":"Pingan Zhu"},{"@pid":"89/7618","text":"Jervis Pinto"},{"@pid":"49/6764","text":"Alan Fern"},{"@pid":"18/1177","text":"Thinh P. Nguyen"}]},"title":"Adaptation-based programming for network protocol design: An 802.11x case study (abstract).","venue":"IPCCC","pages":"1-2","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhuPFN11","doi":"10.1109/PCCC.2011.6108103","ee":"https://doi.org/10.1109/PCCC.2011.6108103","url":"https://dblp.org/rec/conf/ipccc/ZhuPFN11"}, "url":"URL#4687182" }, { "@score":"1", "@id":"4742712", "info":{"authors":{"author":[{"@pid":"53/4506","text":"Sheng Zhong"},{"@pid":"26/2854","text":"Dejing Dou"},{"@pid":"w/YuWang3","text":"Yu Wang 0003"}]},"title":"30th IEEE International Performance Computing and Communications Conference, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011","venue":"IPCCC","publisher":"IEEE Computer Society","year":"2011","type":"Editorship","key":"conf/ipccc/2011","ee":"https://ieeexplore.ieee.org/xpl/conhome/6097202/proceeding","url":"https://dblp.org/rec/conf/ipccc/2011"}, "url":"URL#4742712" } ] } } } )