callback( { "result":{ "query":":facetid:toc:\"db/conf/ipccc/ipccc2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"243.22" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"63", "@dc":"63", "@oc":"63", "@id":"43395117", "text":":facetid:toc:db/conf/ipccc/ipccc2012.bht" } }, "hits":{ "@total":"63", "@computed":"63", "@sent":"63", "@first":"0", "hit":[{ "@score":"1", "@id":"4451706", "info":{"authors":{"author":[{"@pid":"76/8137","text":"Milos Blagojevic"},{"@pid":"86/2421","text":"Marc Geilen"},{"@pid":"b/TwanBasten","text":"Twan Basten"},{"@pid":"69/44","text":"Teun Hendriks"}]},"title":"Fast sink placement for Gossip-based Wireless Sensor Networks.","venue":"IPCCC","pages":"110-119","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/BlagojevicGBH12","doi":"10.1109/PCCC.2012.6407744","ee":"https://doi.org/10.1109/PCCC.2012.6407744","url":"https://dblp.org/rec/conf/ipccc/BlagojevicGBH12"}, "url":"URL#4451706" }, { "@score":"1", "@id":"4451707", "info":{"authors":{"author":[{"@pid":"73/2868-2","text":"Patrick Brown 0002"},{"@pid":"z/MengxiaZhu","text":"Mengxia Michelle Zhu"},{"@pid":"76/2904","text":"Qishi Wu"},{"@pid":"124/2230","text":"Daqing Yun"},{"@pid":"41/119","text":"Jason Zurawski"}]},"title":"Exploring the optimal strategy for large-scale data movement in high-performance networks.","venue":"IPCCC","pages":"181-182","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/BrownZWYZ12","doi":"10.1109/PCCC.2012.6407676","ee":"https://doi.org/10.1109/PCCC.2012.6407676","url":"https://dblp.org/rec/conf/ipccc/BrownZWYZ12"}, "url":"URL#4451707" }, { "@score":"1", "@id":"4451708", "info":{"authors":{"author":[{"@pid":"22/6882","text":"Xiaolin Chang"},{"@pid":"13/1898-39","text":"Bin Wang 0039"},{"@pid":"27/4749","text":"Jiqiang Liu"}]},"title":"Network state aware virtual network parallel embedding.","venue":"IPCCC","pages":"193-194","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ChangWL12","doi":"10.1109/PCCC.2012.6407697","ee":"https://doi.org/10.1109/PCCC.2012.6407697","url":"https://dblp.org/rec/conf/ipccc/ChangWL12"}, "url":"URL#4451708" }, { "@score":"1", "@id":"4451709", "info":{"authors":{"author":[{"@pid":"04/8276","text":"Yuanfang Chen"},{"@pid":"36/3071","text":"Xiaoming Li"}]},"title":"Static micro-scheduling: Resource contention relief in multithreaded programs.","venue":"IPCCC","pages":"187-188","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ChenL12","doi":"10.1109/PCCC.2012.6407691","ee":"https://doi.org/10.1109/PCCC.2012.6407691","url":"https://dblp.org/rec/conf/ipccc/ChenL12"}, "url":"URL#4451709" }, { "@score":"1", "@id":"4451710", "info":{"authors":{"author":[{"@pid":"70/4107","text":"Harshavardhan Chenji"},{"@pid":"10/4661-41","text":"Wei Zhang 0041"},{"@pid":"17/7223","text":"Myounggyu Won"},{"@pid":"05/4670","text":"Radu Stoleru"},{"@pid":"124/2316","text":"Clint Arnett"}]},"title":"A wireless system for reducing response time in Urban Search & Rescue.","venue":"IPCCC","pages":"215-224","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ChenjiZWSA12","doi":"10.1109/PCCC.2012.6407756","ee":"https://doi.org/10.1109/PCCC.2012.6407756","url":"https://dblp.org/rec/conf/ipccc/ChenjiZWSA12"}, "url":"URL#4451710" }, { "@score":"1", "@id":"4451711", "info":{"authors":{"author":[{"@pid":"25/7900","text":"David Fotue"},{"@pid":"18/5416","text":"Houda Labiod"},{"@pid":"e/ThomasEngel","text":"Thomas Engel 0001"}]},"title":"An arbitrary mobility model of Mini-Sinks using controlled data collection for reducing congestion appearance in wireless sensor networks.","venue":"IPCCC","pages":"101-109","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/FotueLE12","doi":"10.1109/PCCC.2012.6407743","ee":"https://doi.org/10.1109/PCCC.2012.6407743","url":"https://dblp.org/rec/conf/ipccc/FotueLE12"}, "url":"URL#4451711" }, { "@score":"1", "@id":"4451712", "info":{"authors":{"author":[{"@pid":"117/2582","text":"Shravan Garlapati"},{"@pid":"26/1498-2","text":"Haris Ioannis Volos"},{"@pid":"43/3467","text":"P. Teja Kuruganti"},{"@pid":"50/6804","text":"R. Michael Buehrer"},{"@pid":"42/564","text":"Jeffrey H. Reed"}]},"title":"PHY and MAC layer design of Hybrid Spread Spectrum based smart meter network.","venue":"IPCCC","pages":"183-184","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/GarlapatiVKBR12","doi":"10.1109/PCCC.2012.6407684","ee":"https://doi.org/10.1109/PCCC.2012.6407684","url":"https://dblp.org/rec/conf/ipccc/GarlapatiVKBR12"}, "url":"URL#4451712" }, { "@score":"1", "@id":"4451713", "info":{"authors":{"author":[{"@pid":"120/1669","text":"Rajvir Gill"},{"@pid":"120/1693","text":"Ravinder Paul"},{"@pid":"32/2766","text":"Ljiljana Trajkovic"}]},"title":"Effect of MRAI timers and routing policies on BGP convergence times.","venue":"IPCCC","pages":"314-323","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/GillPT12","doi":"10.1109/PCCC.2012.6407773","ee":"https://doi.org/10.1109/PCCC.2012.6407773","url":"https://dblp.org/rec/conf/ipccc/GillPT12"}, "url":"URL#4451713" }, { "@score":"1", "@id":"4451714", "info":{"authors":{"author":[{"@pid":"48/6459","text":"Longjiang Guo"},{"@pid":"117/5833","text":"Jinsheng Duan"},{"@pid":"31/712","text":"Jinbao Li"},{"@pid":"01/2775-2","text":"Lei Yu 0002"},{"@pid":"15/5579","text":"Haiying Shen"}]},"title":"HAS: Hidden anti-theft system based on wireless sensor networks.","venue":"IPCCC","pages":"162-170","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/GuoDLYS12","doi":"10.1109/PCCC.2012.6407749","ee":"https://doi.org/10.1109/PCCC.2012.6407749","url":"https://dblp.org/rec/conf/ipccc/GuoDLYS12"}, "url":"URL#4451714" }, { "@score":"1", "@id":"4451715", "info":{"authors":{"author":[{"@pid":"44/4141","text":"Nabil Hachem"},{"@pid":"86/4961","text":"Hervé Debar"},{"@pid":"g/JoaquinGarcia","text":"Joaquín García-Alfaro"}]},"title":"HADEGA: A novel MPLS-based mitigation solution to handle network attacks.","venue":"IPCCC","pages":"171-180","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/HachemDG12","doi":"10.1109/PCCC.2012.6407750","ee":"https://doi.org/10.1109/PCCC.2012.6407750","url":"https://dblp.org/rec/conf/ipccc/HachemDG12"}, "url":"URL#4451715" }, { "@score":"1", "@id":"4451716", "info":{"authors":{"author":[{"@pid":"32/7613","text":"Hannes Hannak"},{"@pid":"94/4371","text":"Wolfgang Blochinger"},{"@pid":"124/2116","text":"Sven Trieflinger"}]},"title":"A Desktop Grid enabled parallel Barnes-Hut algorithm.","venue":"IPCCC","pages":"120-129","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/HannakBT12","doi":"10.1109/PCCC.2012.6407745","ee":"https://doi.org/10.1109/PCCC.2012.6407745","url":"https://dblp.org/rec/conf/ipccc/HannakBT12"}, "url":"URL#4451716" }, { "@score":"1", "@id":"4451717", "info":{"authors":{"author":[{"@pid":"119/1693","text":"Xunfei Jiang"},{"@pid":"37/874","text":"Mohammed I. Alghamdi"},{"@pid":"86/1953-2","text":"Ji Zhang 0002"},{"@pid":"119/1651","text":"Maen M. Al Assaf"},{"@pid":"60/6397","text":"Xiaojun Ruan"},{"@pid":"124/2171","text":"Tausif Muzaffar"},{"@pid":"q/XiaoQin","text":"Xiao Qin 0001"}]},"title":"Thermal modeling and analysis of storage systems.","venue":"IPCCC","pages":"31-40","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/JiangAZARMQ12","doi":"10.1109/PCCC.2012.6407725","ee":"https://doi.org/10.1109/PCCC.2012.6407725","url":"https://dblp.org/rec/conf/ipccc/JiangAZARMQ12"}, "url":"URL#4451717" }, { "@score":"1", "@id":"4451718", "info":{"authors":{"author":[{"@pid":"47/8721","text":"Navdeep Kaur Kapoor"},{"@pid":"79/4577","text":"Shikharesh Majumdar"},{"@pid":"20/6730","text":"Biswajit Nandy"}]},"title":"Sensor allocation to multiple applications in shared wireless sensor networks.","venue":"IPCCC","pages":"197-198","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KapoorMN12","doi":"10.1109/PCCC.2012.6407705","ee":"https://doi.org/10.1109/PCCC.2012.6407705","url":"https://dblp.org/rec/conf/ipccc/KapoorMN12"}, "url":"URL#4451718" }, { "@score":"1", "@id":"4451719", "info":{"authors":{"author":[{"@pid":"61/2866","text":"Dongsoo Kim"},{"@pid":"67/4608","text":"Eric C. Noel"},{"@pid":"92/6397","text":"K. Wendy Tang"}]},"title":"Graph theoretic expansion of Borei Cayley Graphs with an optimal and distributed routing algorithm.","venue":"IPCCC","pages":"236-245","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KimNT12","doi":"10.1109/PCCC.2012.6407762","ee":"https://doi.org/10.1109/PCCC.2012.6407762","url":"https://dblp.org/rec/conf/ipccc/KimNT12"}, "url":"URL#4451719" }, { "@score":"1", "@id":"4451720", "info":{"authors":{"author":[{"@pid":"93/1311","text":"Kirill Kogan"},{"@pid":"l/ALopezOrtiz","text":"Alejandro López-Ortiz"},{"@pid":"50/1870","text":"Sergey I. Nikolenko"},{"@pid":"97/10623","text":"Alexander Sirotkin 0001"}]},"title":"A taxonomy of Semi-FIFO policies.","venue":"IPCCC","pages":"295-304","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KoganLNS12","doi":"10.1109/PCCC.2012.6407771","ee":"https://doi.org/10.1109/PCCC.2012.6407771","url":"https://dblp.org/rec/conf/ipccc/KoganLNS12"}, "url":"URL#4451720" }, { "@score":"1", "@id":"4451721", "info":{"authors":{"author":[{"@pid":"47/8364","text":"Dilip Kumar Krishnappa"},{"@pid":"28/760-1","text":"David E. Irwin 0001"},{"@pid":"36/6343","text":"Eric Lyons 0001"},{"@pid":"14/5092","text":"Michael Zink"}]},"title":"CloudCast: Cloud computing for short-term mobile weather forecasts.","venue":"IPCCC","pages":"61-70","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/KrishnappaILZ12","doi":"10.1109/PCCC.2012.6407739","ee":"https://doi.org/10.1109/PCCC.2012.6407739","url":"https://dblp.org/rec/conf/ipccc/KrishnappaILZ12"}, "url":"URL#4451721" }, { "@score":"1", "@id":"4451722", "info":{"authors":{"author":[{"@pid":"92/10810","text":"Ewnetu Bayuh Lakew"},{"@pid":"124/2106","text":"Francisco Hernández-Rodriguez"},{"@pid":"19/360-4","text":"Lei Xu 0004"},{"@pid":"36/2690","text":"Erik Elmroth"}]},"title":"Management of distributed resource allocations in multi-cluster environments.","venue":"IPCCC","pages":"275-284","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LakewHXE12","doi":"10.1109/PCCC.2012.6407768","ee":"https://doi.org/10.1109/PCCC.2012.6407768","url":"https://dblp.org/rec/conf/ipccc/LakewHXE12"}, "url":"URL#4451722" }, { "@score":"1", "@id":"4451723", "info":{"authors":{"author":[{"@pid":"31/712","text":"Jinbao Li"},{"@pid":"89/5992","text":"Li Zhang"},{"@pid":"48/6459","text":"Longjiang Guo"},{"@pid":"71/8496","text":"Liang Yao"}]},"title":"A path-transfer based multi-path reliable routing in wireless sensor networks.","venue":"IPCCC","pages":"463-470","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LiZGY12","doi":"10.1109/PCCC.2012.6407658","ee":"https://doi.org/10.1109/PCCC.2012.6407658","url":"https://dblp.org/rec/conf/ipccc/LiZGY12"}, "url":"URL#4451723" }, { "@score":"1", "@id":"4451724", "info":{"authors":{"author":[{"@pid":"71/8298","text":"Norman Lim"},{"@pid":"79/4577","text":"Shikharesh Majumdar"},{"@pid":"20/4197","text":"Vineet Srivastava 0002"}]},"title":"Devising Secure Sockets Layer-based distributed systems: A performance-aware approach.","venue":"IPCCC","pages":"376-383","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LimMS12","doi":"10.1109/PCCC.2012.6407780","ee":"https://doi.org/10.1109/PCCC.2012.6407780","url":"https://dblp.org/rec/conf/ipccc/LimMS12"}, "url":"URL#4451724" }, { "@score":"1", "@id":"4451725", "info":{"authors":{"author":[{"@pid":"72/2590-3","text":"Jing Liu 0003"},{"@pid":"30/4276-1","text":"Haibo Wu 0001"}]},"title":"Make systematic conformance testing for BitTorrent protocol feasible: A CP-nets model based testing approach.","venue":"IPCCC","pages":"201-202","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LiuW12","doi":"10.1109/PCCC.2012.6407713","ee":"https://doi.org/10.1109/PCCC.2012.6407713","url":"https://dblp.org/rec/conf/ipccc/LiuW12"}, "url":"URL#4451725" }, { "@score":"1", "@id":"4451726", "info":{"authors":{"author":[{"@pid":"29/186","text":"Jie Luo"},{"@pid":"124/2096","text":"Kathlene Morales"},{"@pid":"36/134","text":"Byeong Kil Lee"},{"@pid":"20/1517","text":"Eugene John"},{"@pid":"90/8053","text":"Young Kyu Choi"}]},"title":"Performance-sensitivity and performance-similarity based workload reduction.","venue":"IPCCC","pages":"21-30","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/LuoMLJC12","doi":"10.1109/PCCC.2012.6407717","ee":"https://doi.org/10.1109/PCCC.2012.6407717","url":"https://dblp.org/rec/conf/ipccc/LuoMLJC12"}, "url":"URL#4451726" }, { "@score":"1", "@id":"4451727", "info":{"authors":{"author":[{"@pid":"50/10928","text":"Andrea Martínez"},{"@pid":"87/6629","text":"Anna Sikora"},{"@pid":"61/1918","text":"Eduardo César"},{"@pid":"06/3363","text":"Joan Sorribes"}]},"title":"Hierarchical MATE's approach for dynamic performance tuning of large-scale parallel applications.","venue":"IPCCC","pages":"191-192","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MartinezSCS12","doi":"10.1109/PCCC.2012.6407696","ee":"https://doi.org/10.1109/PCCC.2012.6407696","url":"https://dblp.org/rec/conf/ipccc/MartinezSCS12"}, "url":"URL#4451727" }, { "@score":"1", "@id":"4451728", "info":{"authors":{"author":[{"@pid":"68/7330","text":"Mini Mathew"},{"@pid":"24/3415","text":"Ning Weng"},{"@pid":"50/1327","text":"Lucas Vespa"}]},"title":"Quality-of-information modeling and adapting for delay-sensitive sensor network applications.","venue":"IPCCC","pages":"471-477","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MathewWV12","doi":"10.1109/PCCC.2012.6407659","ee":"https://doi.org/10.1109/PCCC.2012.6407659","url":"https://dblp.org/rec/conf/ipccc/MathewWV12"}, "url":"URL#4451728" }, { "@score":"1", "@id":"4451729", "info":{"authors":{"author":[{"@pid":"91/8184","text":"Hemanth Meka"},{"@pid":"m/SanjayKumarMadria","text":"Sanjay Kumar Madria"},{"@pid":"03/5012","text":"Mark Linderman"}]},"title":"Incentive based approach to find selfish nodes in Mobile P2P networks.","venue":"IPCCC","pages":"352-359","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MekaML12","doi":"10.1109/PCCC.2012.6407777","ee":"https://doi.org/10.1109/PCCC.2012.6407777","url":"https://dblp.org/rec/conf/ipccc/MekaML12"}, "url":"URL#4451729" }, { "@score":"1", "@id":"4451730", "info":{"authors":{"author":[{"@pid":"19/9355","text":"Sabrina Merkel"},{"@pid":"266/9772","text":"Christian Werner Becker"},{"@pid":"s/HartmutSchmeck","text":"Hartmut Schmeck"}]},"title":"Firefly-inspired synchronization for energy-efficient distance estimation in mobile ad-hoc networks.","venue":"IPCCC","pages":"205-214","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MerkelBS12","doi":"10.1109/PCCC.2012.6407753","ee":"https://doi.org/10.1109/PCCC.2012.6407753","url":"https://dblp.org/rec/conf/ipccc/MerkelBS12"}, "url":"URL#4451730" }, { "@score":"1", "@id":"4451731", "info":{"authors":{"author":[{"@pid":"124/2096","text":"Kathlene Morales"},{"@pid":"36/134","text":"Byeong Kil Lee"}]},"title":"Fixed Segmented LRU cache replacement scheme with selective caching.","venue":"IPCCC","pages":"199-200","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MoralesL12","doi":"10.1109/PCCC.2012.6407712","ee":"https://doi.org/10.1109/PCCC.2012.6407712","url":"https://dblp.org/rec/conf/ipccc/MoralesL12"}, "url":"URL#4451731" }, { "@score":"1", "@id":"4451732", "info":{"authors":{"author":[{"@pid":"47/710","text":"Arslan Munir"},{"@pid":"47/5909","text":"Ann Gordon-Ross"},{"@pid":"r/SanjayRanka","text":"Sanjay Ranka"}]},"title":"Parallelized benchmark-driven performance evaluation of SMPs and tiled multi-core architectures for embedded systems.","venue":"IPCCC","pages":"416-423","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/MunirGR12","doi":"10.1109/PCCC.2012.6407785","ee":"https://doi.org/10.1109/PCCC.2012.6407785","url":"https://dblp.org/rec/conf/ipccc/MunirGR12"}, "url":"URL#4451732" }, { "@score":"1", "@id":"4451733", "info":{"authors":{"author":[{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"05/4333","text":"Jing Peng"},{"@pid":"18/5379-1","text":"Chao Tong 0001"},{"@pid":"10/3222","text":"Wanjiun Liao"}]},"title":"Evolution of disconnected components in social networks: Patterns and a generative model.","venue":"IPCCC","pages":"305-313","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/NiuPTL12","doi":"10.1109/PCCC.2012.6407772","ee":"https://doi.org/10.1109/PCCC.2012.6407772","url":"https://dblp.org/rec/conf/ipccc/NiuPTL12"}, "url":"URL#4451733" }, { "@score":"1", "@id":"4451734", "info":{"authors":{"author":[{"@pid":"13/3636","text":"Linwei Niu"},{"@pid":"95/3616","text":"Jia Xu"}]},"title":"Improving schedulability and energy performance for weakly hard real-time systems.","venue":"IPCCC","pages":"41-50","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/NiuX12","doi":"10.1109/PCCC.2012.6407732","ee":"https://doi.org/10.1109/PCCC.2012.6407732","url":"https://dblp.org/rec/conf/ipccc/NiuX12"}, "url":"URL#4451734" }, { "@score":"1", "@id":"4451735", "info":{"authors":{"author":[{"@pid":"94/9795","text":"Grace Oletu"},{"@pid":"18/2571","text":"Predrag B. Rapajic"},{"@pid":"52/9768","text":"Kwashie Amartei Anang"},{"@pid":"56/11473","text":"Ruiheng Wu"}]},"title":"Channel impulse noise minimization using digital smear and desmear filter.","venue":"IPCCC","pages":"456-462","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/OletuRAW12","doi":"10.1109/PCCC.2012.6407657","ee":"https://doi.org/10.1109/PCCC.2012.6407657","url":"https://dblp.org/rec/conf/ipccc/OletuRAW12"}, "url":"URL#4451735" }, { "@score":"1", "@id":"4451736", "info":{"authors":{"author":[{"@pid":"119/7841","text":"Gbenga Owojaiye"},{"@pid":"96/3449","text":"Yichuang Sun"}]},"title":"Co-efficient vector based distributed quasi-orthogonal codes in cooperative networks.","venue":"IPCCC","pages":"189-190","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/OwojaiyeS12","doi":"10.1109/PCCC.2012.6407692","ee":"https://doi.org/10.1109/PCCC.2012.6407692","url":"https://dblp.org/rec/conf/ipccc/OwojaiyeS12"}, "url":"URL#4451736" }, { "@score":"1", "@id":"4451737", "info":{"authors":{"author":[{"@pid":"82/5164-1","text":"Andriy Panchenko 0001"},{"@pid":"124/2208","text":"Fabian Lanze"},{"@pid":"e/ThomasEngel","text":"Thomas Engel 0001"}]},"title":"Improving performance and anonymity in the Tor network.","venue":"IPCCC","pages":"1-10","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/PanchenkoLE12","doi":"10.1109/PCCC.2012.6407715","ee":"https://doi.org/10.1109/PCCC.2012.6407715","url":"https://dblp.org/rec/conf/ipccc/PanchenkoLE12"}, "url":"URL#4451737" }, { "@score":"1", "@id":"4451738", "info":{"authors":{"author":[{"@pid":"214/8504","text":"Husanbir Singh Pannu"},{"@pid":"66/5828-1","text":"Jianguo Liu 0001"},{"@pid":"20/1255","text":"Qiang Guan"},{"@pid":"57/2335","text":"Song Fu"}]},"title":"AFD: Adaptive failure detection system for cloud computing infrastructures.","venue":"IPCCC","pages":"71-80","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/PannuLGF12","doi":"10.1109/PCCC.2012.6407740","ee":"https://doi.org/10.1109/PCCC.2012.6407740","url":"https://dblp.org/rec/conf/ipccc/PannuLGF12"}, "url":"URL#4451738" }, { "@score":"1", "@id":"4451739", "info":{"authors":{"author":[{"@pid":"p/JehanFrancoisParis","text":"Jehan-François Pâris"},{"@pid":"s/ThomasJESchwarz","text":"Thomas J. E. Schwarz"},{"@pid":"a/AhmedAmer","text":"Ahmed Amer"},{"@pid":"49/4298","text":"Darrell D. E. Long"}]},"title":"Highly reliable two-dimensional RAID arrays for archival storage.","venue":"IPCCC","pages":"324-331","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ParisSAL12","doi":"10.1109/PCCC.2012.6407774","ee":"https://doi.org/10.1109/PCCC.2012.6407774","url":"https://dblp.org/rec/conf/ipccc/ParisSAL12"}, "url":"URL#4451739" }, { "@score":"1", "@id":"4451740", "info":{"authors":{"author":[{"@pid":"46/353","text":"Indrani Paul"},{"@pid":"14/5230","text":"Sudhakar Yalamanchili"},{"@pid":"j/LizyKurianJohn","text":"Lizy K. John"}]},"title":"Performance impact of virtual machine placement in a datacenter.","venue":"IPCCC","pages":"424-431","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/PaulYJ12","doi":"10.1109/PCCC.2012.6407650","ee":"https://doi.org/10.1109/PCCC.2012.6407650","url":"https://dblp.org/rec/conf/ipccc/PaulYJ12"}, "url":"URL#4451740" }, { "@score":"1", "@id":"4451741", "info":{"authors":{"author":[{"@pid":"40/10768","text":"Shayan Pooya"},{"@pid":"87/289","text":"Paul Lu"},{"@pid":"m/MikeHMacGregor","text":"Mike H. MacGregor"}]},"title":"Structured Message Transport.","venue":"IPCCC","pages":"432-439","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/PooyaLM12","doi":"10.1109/PCCC.2012.6407651","ee":"https://doi.org/10.1109/PCCC.2012.6407651","url":"https://dblp.org/rec/conf/ipccc/PooyaLM12"}, "url":"URL#4451741" }, { "@score":"1", "@id":"4451742", "info":{"authors":{"author":[{"@pid":"62/11197","text":"Saddam Quirem"},{"@pid":"36/134","text":"Byeong Kil Lee"}]},"title":"AES decryption using warp-synchronous programming.","venue":"IPCCC","pages":"203-204","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/QuiremL12","doi":"10.1109/PCCC.2012.6407714","ee":"https://doi.org/10.1109/PCCC.2012.6407714","url":"https://dblp.org/rec/conf/ipccc/QuiremL12"}, "url":"URL#4451742" }, { "@score":"1", "@id":"4451743", "info":{"authors":{"author":[{"@pid":"124/2158","text":"Safraz Rampersaud"},{"@pid":"44/10956","text":"Lena Mashayekhy"},{"@pid":"g/DanielGrosu","text":"Daniel Grosu"}]},"title":"Computing Nash equilibria in bimatrix games: GPU-based parallel support enumeration.","venue":"IPCCC","pages":"332-341","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/RampersaudMG12","doi":"10.1109/PCCC.2012.6407775","ee":"https://doi.org/10.1109/PCCC.2012.6407775","url":"https://dblp.org/rec/conf/ipccc/RampersaudMG12"}, "url":"URL#4451743" }, { "@score":"1", "@id":"4451744", "info":{"authors":{"author":[{"@pid":"119/2657","text":"Brian Romoser"},{"@pid":"51/11454","text":"Ribel Fares"},{"@pid":"124/2032","text":"Peter Janovics"},{"@pid":"60/6397","text":"Xiaojun Ruan"},{"@pid":"q/XiaoQin","text":"Xiao Qin 0001"},{"@pid":"29/3905","text":"Ziliang Zong"}]},"title":"Global workload characterization of a large scale satellite image distribution system.","venue":"IPCCC","pages":"368-375","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/RomoserFJRQZ12","doi":"10.1109/PCCC.2012.6407779","ee":"https://doi.org/10.1109/PCCC.2012.6407779","url":"https://dblp.org/rec/conf/ipccc/RomoserFJRQZ12"}, "url":"URL#4451744" }, { "@score":"1", "@id":"4451745", "info":{"authors":{"author":[{"@pid":"60/6397","text":"Xiaojun Ruan"},{"@pid":"29/3905","text":"Ziliang Zong"},{"@pid":"37/874","text":"Mohammed I. Alghamdi"},{"@pid":"85/4928","text":"Yun Tian"},{"@pid":"119/1693","text":"Xunfei Jiang"},{"@pid":"q/XiaoQin","text":"Xiao Qin 0001"}]},"title":"Improving write performance by enhancing internal parallelism of Solid State Drives.","venue":"IPCCC","pages":"266-274","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/RuanZATJQ12","doi":"10.1109/PCCC.2012.6407767","ee":"https://doi.org/10.1109/PCCC.2012.6407767","url":"https://dblp.org/rec/conf/ipccc/RuanZATJQ12"}, "url":"URL#4451745" }, { "@score":"1", "@id":"4451746", "info":{"authors":{"author":[{"@pid":"51/10643","text":"Ridha Soua"},{"@pid":"03/3852","text":"Pascale Minet"},{"@pid":"48/1915","text":"Erwan Livolant"}]},"title":"MODESA: An optimized multichannel slot assignment for raw data convergecast in wireless sensor networks.","venue":"IPCCC","pages":"91-100","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/SouaML12","doi":"10.1109/PCCC.2012.6407742","ee":"https://doi.org/10.1109/PCCC.2012.6407742","url":"https://dblp.org/rec/conf/ipccc/SouaML12"}, "url":"URL#4451746" }, { "@score":"1", "@id":"4451747", "info":{"authors":{"author":[{"@pid":"90/4845","text":"Kerri Stone"},{"@pid":"91/2315","text":"Tracy Camp"}]},"title":"CAIRN: Creating Anchors for Localization in Realistic Networks.","venue":"IPCCC","pages":"225-235","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/StoneC12","doi":"10.1109/PCCC.2012.6407759","ee":"https://doi.org/10.1109/PCCC.2012.6407759","url":"https://dblp.org/rec/conf/ipccc/StoneC12"}, "url":"URL#4451747" }, { "@score":"1", "@id":"4451748", "info":{"authors":{"author":[{"@pid":"124/2198","text":"Md. Tauhiduzzaman"},{"@pid":"96/6774","text":"Mea Wang"}]},"title":"A system analysis of reputation-base defences against pollution attacks in P2P streaming.","venue":"IPCCC","pages":"152-161","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/TauhiduzzamanW12","doi":"10.1109/PCCC.2012.6407748","ee":"https://doi.org/10.1109/PCCC.2012.6407748","url":"https://dblp.org/rec/conf/ipccc/TauhiduzzamanW12"}, "url":"URL#4451748" }, { "@score":"1", "@id":"4451749", "info":{"authors":{"author":[{"@pid":"124/2301","text":"Pham Ngoc Thanh"},{"@pid":"27/622","text":"Keecheon Kim"}]},"title":"A methodology for implementation and integration Two-Factor Authentication into VPN.","venue":"IPCCC","pages":"195-196","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ThanhK12","doi":"10.1109/PCCC.2012.6407698","ee":"https://doi.org/10.1109/PCCC.2012.6407698","url":"https://dblp.org/rec/conf/ipccc/ThanhK12"}, "url":"URL#4451749" }, { "@score":"1", "@id":"4451750", "info":{"authors":{"author":[{"@pid":"18/5379-1","text":"Chao Tong 0001"},{"@pid":"25/4653-2","text":"Jianwei Niu 0002"},{"@pid":"79/292","text":"Bin Dai"},{"@pid":"05/4333","text":"Jing Peng"},{"@pid":"124/2135","text":"Jinyang Fan"}]},"title":"Complex networks clustering algorithm based on the core influence of the nodes.","venue":"IPCCC","pages":"185-186","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/TongNDPF12","doi":"10.1109/PCCC.2012.6407690","ee":"https://doi.org/10.1109/PCCC.2012.6407690","url":"https://dblp.org/rec/conf/ipccc/TongNDPF12"}, "url":"URL#4451750" }, { "@score":"1", "@id":"4451751", "info":{"authors":{"author":[{"@pid":"81/6255","text":"Binod Vaidya"},{"@pid":"27/526","text":"Dimitrios Makrakis"},{"@pid":"217/2530","text":"Hussein T. Mouftah"}]},"title":"Secure multipath routing for AMI network in Smart Grid.","venue":"IPCCC","pages":"408-415","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/VaidyaMM12","doi":"10.1109/PCCC.2012.6407784","ee":"https://doi.org/10.1109/PCCC.2012.6407784","url":"https://dblp.org/rec/conf/ipccc/VaidyaMM12"}, "url":"URL#4451751" }, { "@score":"1", "@id":"4451752", "info":{"authors":{"author":[{"@pid":"119/0166","text":"Dung Vu"},{"@pid":"48/450-111","text":"Yang Yang 0111"},{"@pid":"b/LaxmiNBhuyan","text":"Laxmi N. Bhuyan"}]},"title":"An efficient dynamic multiple-candidate motion vector approach for GPU-based hierarchical motion estimation.","venue":"IPCCC","pages":"342-351","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/VuYB12","doi":"10.1109/PCCC.2012.6407776","ee":"https://doi.org/10.1109/PCCC.2012.6407776","url":"https://dblp.org/rec/conf/ipccc/VuYB12"}, "url":"URL#4451752" }, { "@score":"1", "@id":"4451753", "info":{"authors":{"author":[{"@pid":"58/6810-11","text":"Li Wang 0011"},{"@pid":"10/1143-6","text":"Zheng Li 0006"},{"@pid":"s/MiaoSong4","text":"Miao Song 0004"},{"@pid":"03/6144","text":"Shangping Ren"}]},"title":"A genetic algorithm based approach to maximizing real-time system value under resource constraints.","venue":"IPCCC","pages":"285-294","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/WangL0R12","doi":"10.1109/PCCC.2012.6407769","ee":"https://doi.org/10.1109/PCCC.2012.6407769","url":"https://dblp.org/rec/conf/ipccc/WangL0R12"}, "url":"URL#4451753" }, { "@score":"1", "@id":"4451754", "info":{"authors":{"author":[{"@pid":"84/2694-28","text":"Yong Wang 0028"},{"@pid":"05/4333","text":"Jing Peng"},{"@pid":"119/3636","text":"Long-Ping He"},{"@pid":"82/5445","text":"Ting-Ting Zhang"},{"@pid":"119/3551","text":"Hong-Zong Li"}]},"title":"LBSs privacy preserving for continuous query based on semi-honest third parties.","venue":"IPCCC","pages":"384-391","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/WangPHZL12","doi":"10.1109/PCCC.2012.6407781","ee":"https://doi.org/10.1109/PCCC.2012.6407781","url":"https://dblp.org/rec/conf/ipccc/WangPHZL12"}, "url":"URL#4451754" }, { "@score":"1", "@id":"4451755", "info":{"authors":{"author":[{"@pid":"81/8477","text":"Te-En Wei"},{"@pid":"86/4452","text":"Albert B. Jeng"},{"@pid":"18/2674","text":"Hahn-Ming Lee"}]},"title":"GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack.","venue":"IPCCC","pages":"392-399","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/WeiJL12","doi":"10.1109/PCCC.2012.6407782","ee":"https://doi.org/10.1109/PCCC.2012.6407782","url":"https://dblp.org/rec/conf/ipccc/WeiJL12"}, "url":"URL#4451755" }, { "@score":"1", "@id":"4451756", "info":{"authors":{"author":[{"@pid":"30/4276-1","text":"Haibo Wu 0001"},{"@pid":"72/2590-3","text":"Jing Liu 0003"},{"@pid":"15/5983-4","text":"Hai Jiang 0004"},{"@pid":"65/2709-4","text":"Yi Sun 0004"},{"@pid":"l/JunLi2","text":"Jun Li 0002"},{"@pid":"20/6301","text":"Zhongcheng Li"}]},"title":"Bandwidth-aware peer selection for P2P live streaming systems under flash crowds.","venue":"IPCCC","pages":"360-367","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/WuLJSLL12","doi":"10.1109/PCCC.2012.6407778","ee":"https://doi.org/10.1109/PCCC.2012.6407778","url":"https://dblp.org/rec/conf/ipccc/WuLJSLL12"}, "url":"URL#4451756" }, { "@score":"1", "@id":"4451757", "info":{"authors":{"author":[{"@pid":"27/5547","text":"Kaiqi Xiong"},{"@pid":"58/3135","text":"David J. Thuente"}]},"title":"Locating jamming attackers in malicious wireless sensor networks.","venue":"IPCCC","pages":"400-407","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/XiongT12","doi":"10.1109/PCCC.2012.6407783","ee":"https://doi.org/10.1109/PCCC.2012.6407783","url":"https://dblp.org/rec/conf/ipccc/XiongT12"}, "url":"URL#4451757" }, { "@score":"1", "@id":"4451758", "info":{"authors":{"author":[{"@pid":"68/4014","text":"Guangping Xu"},{"@pid":"81/6595-2","text":"Sheng Lin 0002"},{"@pid":"71/4292-1","text":"Gang Wang 0001"},{"@pid":"25/1221-1","text":"Xiaoguang Liu 0001"},{"@pid":"39/4174-2","text":"Kai Shi 0002"},{"@pid":"69/2745-3","text":"Hua Zhang 0003"}]},"title":"HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks.","venue":"IPCCC","pages":"246-255","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/XuLWLSZ12","doi":"10.1109/PCCC.2012.6407765","ee":"https://doi.org/10.1109/PCCC.2012.6407765","url":"https://dblp.org/rec/conf/ipccc/XuLWLSZ12"}, "url":"URL#4451758" }, { "@score":"1", "@id":"4451759", "info":{"authors":{"author":[{"@pid":"54/3171-3","text":"Zhiyong Xu 0003"},{"@pid":"60/4429","text":"Ruixuan Li 0001"},{"@pid":"x/ChengZhongXu","text":"Cheng-Zhong Xu 0001"}]},"title":"CAST: A page-level FTL with compact address mapping and parallel data blocks.","venue":"IPCCC","pages":"142-151","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/XuLX12","doi":"10.1109/PCCC.2012.6407747","ee":"https://doi.org/10.1109/PCCC.2012.6407747","url":"https://dblp.org/rec/conf/ipccc/XuLX12"}, "url":"URL#4451759" }, { "@score":"1", "@id":"4451760", "info":{"authors":{"author":[{"@pid":"73/7821","text":"Yanjun Yao"},{"@pid":"124/2262","text":"Lipeng Wan"},{"@pid":"16/581","text":"Qing Cao"},{"@pid":"58/8333","text":"Rukun Mao"}]},"title":"PhoneCon: Voice-driven SmartPhone Controllable Wireless Sensor Networks.","venue":"IPCCC","pages":"440-447","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/YaoWCM12","doi":"10.1109/PCCC.2012.6407654","ee":"https://doi.org/10.1109/PCCC.2012.6407654","url":"https://dblp.org/rec/conf/ipccc/YaoWCM12"}, "url":"URL#4451760" }, { "@score":"1", "@id":"4451761", "info":{"authors":{"author":[{"@pid":"123/0739","text":"Zhike Zhang"},{"@pid":"60/4735","text":"Deepavali Bhagwat"},{"@pid":"12/2734","text":"Witold Litwin"},{"@pid":"49/4298","text":"Darrell D. E. Long"},{"@pid":"s/ThomasJESchwarz","text":"Thomas J. E. Schwarz"}]},"title":"Improved deduplication through parallel Binning.","venue":"IPCCC","pages":"130-141","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangBLLS12","doi":"10.1109/PCCC.2012.6407746","ee":"https://doi.org/10.1109/PCCC.2012.6407746","url":"https://dblp.org/rec/conf/ipccc/ZhangBLLS12"}, "url":"URL#4451761" }, { "@score":"1", "@id":"4451762", "info":{"authors":{"author":[{"@pid":"44/5554","text":"Ziming Zhang"},{"@pid":"20/1255","text":"Qiang Guan"},{"@pid":"57/2335","text":"Song Fu"}]},"title":"An adaptive power management framework for autonomic resource configuration in cloud computing infrastructures.","venue":"IPCCC","pages":"51-60","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangGF12","doi":"10.1109/PCCC.2012.6407738","ee":"https://doi.org/10.1109/PCCC.2012.6407738","url":"https://dblp.org/rec/conf/ipccc/ZhangGF12"}, "url":"URL#4451762" }, { "@score":"1", "@id":"4451763", "info":{"authors":{"author":[{"@pid":"86/1953-2","text":"Ji Zhang 0002"},{"@pid":"119/1693","text":"Xunfei Jiang"},{"@pid":"85/4928","text":"Yun Tian"},{"@pid":"q/XiaoQin","text":"Xiao Qin 0001"},{"@pid":"37/874","text":"Mohammed I. Alghamdi"},{"@pid":"119/1651","text":"Maen M. Al Assaf"},{"@pid":"q/MeikangQiu","text":"Meikang Qiu"}]},"title":"ORCA: An offloading framework for I/O-intensive applications on clusters.","venue":"IPCCC","pages":"81-90","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhangJTQAAQ12","doi":"10.1109/PCCC.2012.6407741","ee":"https://doi.org/10.1109/PCCC.2012.6407741","url":"https://dblp.org/rec/conf/ipccc/ZhangJTQAAQ12"}, "url":"URL#4451763" }, { "@score":"1", "@id":"4451764", "info":{"authors":{"author":[{"@pid":"10/3489-2","text":"Dan Zhao 0002"},{"@pid":"14/284","text":"Hongjun Liu"},{"@pid":"27/637","text":"Xiaofeng Hu"},{"@pid":"64/4714","text":"Chunqing Wu"}]},"title":"Towards network convergence and traffic engineering optimization.","venue":"IPCCC","pages":"448-455","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhaoLHW12","doi":"10.1109/PCCC.2012.6407656","ee":"https://doi.org/10.1109/PCCC.2012.6407656","url":"https://dblp.org/rec/conf/ipccc/ZhaoLHW12"}, "url":"URL#4451764" }, { "@score":"1", "@id":"4451765", "info":{"authors":{"author":[{"@pid":"43/7412","text":"Ben Zhao"},{"@pid":"z/TaiebZnati","text":"Taieb Znati"}]},"title":"A double-edged sword: Implications of crowdsourcing for the future of web security.","venue":"IPCCC","pages":"1-2","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhaoZ12","doi":"10.1109/PCCC.2012.6407662","ee":"https://doi.org/10.1109/PCCC.2012.6407662","url":"https://dblp.org/rec/conf/ipccc/ZhaoZ12"}, "url":"URL#4451765" }, { "@score":"1", "@id":"4451766", "info":{"authors":{"author":[{"@pid":"z/MengxiaZhu","text":"Mengxia Michelle Zhu"},{"@pid":"76/2904","text":"Qishi Wu"},{"@pid":"50/2082","text":"Yang Zhao"}]},"title":"A cost-effective scheduling algorithm for scientific workflows in clouds.","venue":"IPCCC","pages":"256-265","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZhuWZ12","doi":"10.1109/PCCC.2012.6407766","ee":"https://doi.org/10.1109/PCCC.2012.6407766","url":"https://dblp.org/rec/conf/ipccc/ZhuWZ12"}, "url":"URL#4451766" }, { "@score":"1", "@id":"4451767", "info":{"authors":{"author":[{"@pid":"32/1261","text":"Qiang Zou"},{"@pid":"23/6331","text":"Jianhui Yue"},{"@pid":"83/5907","text":"Bruce Segee"},{"@pid":"60/6001","text":"Yifeng Zhu"}]},"title":"Temporal characterization of SPEC CPU2006 workloads: Analysis and synthesis.","venue":"IPCCC","pages":"11-20","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/ipccc/ZouYSZ12","doi":"10.1109/PCCC.2012.6407716","ee":"https://doi.org/10.1109/PCCC.2012.6407716","url":"https://dblp.org/rec/conf/ipccc/ZouYSZ12"}, "url":"URL#4451767" }, { "@score":"1", "@id":"4514111", "info":{"title":"31st IEEE International Performance Computing and Communications Conference, IPCCC 2012, Austin, TX, USA, December 1-3, 2012","venue":"IPCCC","publisher":"IEEE Computer Society","year":"2012","type":"Editorship","key":"conf/ipccc/2012","ee":"https://ieeexplore.ieee.org/xpl/conhome/6389872/proceeding","url":"https://dblp.org/rec/conf/ipccc/2012"}, "url":"URL#4514111" } ] } } } )