Abstract is missing.
- Texture Classification by Matching Co-occurrence Matrices on Statistical ManifoldsJian Zou, Chuan-Cai Liu. 1-7 [doi]
- A Learning Automaton Based Approach for Data Fragments Allocation in Distributed Database SystemsAli Safari Mamaghani, Mostafa Mahi, Mohammad Reza Meybodi. 8-12 [doi]
- Providing Context-awareness in the Smart Car EnvironmentJie Sun, Yongping Zhang, Kejia He. 13-19 [doi]
- Term Weighting Approaches for Mining Significant Locations from Personal Location LogsZhengwei Qiu, Cathal Gurrin, Aiden R. Doherty, Alan F. Smeaton. 20-25 [doi]
- Experience with Hardware-Software Codesign of Network Protocol Stacks Supporting Real-Time Inter-Task CommunicationTaehoon Kim, Sungwoo Tak. 26-32 [doi]
- Dynamically Programmable Image Processor for Compact Vision SystemsAndreas Loos, Michael Schmidt, Dietmar Fey, Jens Grobel. 33-40 [doi]
- Performance Comparison of IPv4 and IPv6 in Peer-Peer and Client Server Local Area NetworksSamad S. Kolahi, Burjiz K. Soorty, Navneet Chand, Zhang Qu. 41-45 [doi]
- Analysis of Software Rejuvenation in Clustered Computing System with Dependency Relation between NodesMenghui Yang, Zhituo Li, Weikang Yang, Tonghong Li. 46-53 [doi]
- Distributed Memory Management Units Architecture for NoC-based CMPsMan Cao, Bin Xin, Fuming Qiao, Qingsong Shi, Tianzhou Chen, Like Yan. 54-61 [doi]
- Homogeneous NoC-based FPGA: The Foundation for Virtual FPGAJie Yang, Like Yan, Lihan Ju, Yuan Wen, Shaobin Zhang, Tianzhou Chen. 62-67 [doi]
- Adaptive Algorithms for Efficient Content Management in Social Network ServicesClaudia Canali, Michele Colajanni, Riccardo Lancellotti. 68-75 [doi]
- A Self-Adaptable Approach for Easing the Development of Grid-Oriented ServicesAndre Lage Freitas, Jean-Louis Pazat. 76-82 [doi]
- A P2P REcommender System based on Gossip Overlays (PREGO)Matteo Mordacchini, Ranieri Baraglia, Patrizio Dazzi, Laura Ricci. 83-90 [doi]
- A Triggering and Scheduling Approach for ETL in a Real-time Data WarehouseJie Song, Yubin Bao, Jingang Shi. 91-98 [doi]
- Improving the Efficiency of Scheduling and Placement in FPGA by Small-world Model Based Genetic AlgorithmJie Cui, Xue Chen, Yongmei Lei, Weimin Xu. 99-106 [doi]
- Low Power Branch Predictor for Embedded ProcessorsSunwook Kim, Eutteum Jo, Hyungshin Kim. 107-114 [doi]
- Speeding up K-Means Algorithm by GPUsYou Li, Kaiyong Zhao, Xiaowen Chu, Jiming Liu. 115-122 [doi]
- Effects of Allocation Request Shape Changes on Performance in 2D Mesh-Connected MulticomputersIsmail Ababneh, Wail Mardini, Hilal Alawneh, Mohammad Hamed, Saad Bani-Mohammad. 123-130 [doi]
- Optimizing Adaptive Synchronization in Parallel Simulators for Large-scale Parallel Systems and ApplicationsChuanfu Xu, Yonggang Che, Jianbin Fang, Zhenghua Wang. 131-138 [doi]
- A Data Communication Scheduler for Stream Programs on CPU-GPU PlatformTao Tang, Xinhai Xu, Yisong Lin. 139-146 [doi]
- Collective Communication in Recursive Dual-Net: An Interconnection Network for High-Performance Parallel Computer Systems of the Next GenerationYamin Li, Shietung Peng, Wanming Chu. 147-154 [doi]
- A Causal Model Method for Fault Diagnosis in Wireless Sensor NetworksShih-Hao Chang, Madjid Merabti, Hala M. Mokhtar. 155-162 [doi]
- On-Chip Operating System Design for NoC-Based CMPChao Wang, Bin Xie, Jiexiang Kang, Tianzhou Chen, Wei Hu, Zhenwei Zheng. 163-170 [doi]
- An Efficient Power-Aware Optimization for Task Scheduling on NoC-based Many-core SystemWei Hu, Xingsheng Tang, Bin Xie, Tianzhou Chen, Dazhou Wang. 171-178 [doi]
- TMemCanal: A VM-oblivious Dynamic Memory Optimization Scheme for Virtual Machines in Cloud ComputingYaqiong Li, Yongbing Huang. 179-186 [doi]
- A Multi-criteria Job Scheduling Framework for Large Computing FarmsRanieri Baraglia, Patrizio Dazzi, Gabriele Capannini, Giancarlo Pagano. 187-194 [doi]
- Resource Pricing and Equilibrium Allocation Policy in Cloud ComputingFei Teng, Frédéric Magoulès. 195-202 [doi]
- An Efficient Data Mining Framework on Hadoop using Java Persistence APILai Yang, Zhongzhi Shi. 203-209 [doi]
- Developing a Cloud Computing Charging Model for High-Performance Computing ResourcesMatthew Woitaszek, Henry M. Tufo. 210-217 [doi]
- Distributed Bottleneck Node Detection in Wireless Sensor NetworkHaosong Gou, Younghwan Yoo. 218-224 [doi]
- Ad hoc Grid: An Adaptive and Self-Organizing Peer-to-Peer Computing GridPablo G. S. Tiburcio, Marco Aurélio Spohn. 225-232 [doi]
- Using the Software Process Improvement approach for Defining a Methodology for Embedded Systems Development using the CMMI-DEV v1.2I. Garcia, I. Andrea. 233-240 [doi]
- The Impact of Acceptance Tests on Analyzing Component-Based Systems Specifications: An Experimental EvaluationSajjad Mahmood. 241-248 [doi]
- Software Stage-Effort Estimation Based on Association Rule Mining and Fuzzy Set TheoryMohammad Azzeh, Peter I. Cowling, Daniel Neagu. 249-256 [doi]
- A Recognizer of Rational Trace LanguagesFederico Maggi. 257-264 [doi]
- A Framework for Distributed Management of Dynamic Self-adaptation in Heterogeneous EnvironmentsMohamed Zouari, Maria-Teresa Segarra, Françoise André. 265-272 [doi]
- A New Private Data Aggregation Scheme for Wireless Sensor NetworksRabindra Bista, Kim Hee-Dae, Jae-Woo Chang. 273-280 [doi]
- Ferry Route Design with Delay Bounds in Delay-Tolerant NetworksWei Peng, BaoKang Zhao, Wanrong Yu, Chunqing Wu, Xiaorong Yan. 281-288 [doi]
- Fuzzy Location Service for Mobile Ad Hoc NetworksYongming Xie, Guojun Wang, Jie Wu. 289-296 [doi]
- Analysis of Anomalies on a Virtualized Network TestbedChunghan Lee, Hirotake Abe, Toshio Hirotsu, Kyoji Umemura. 297-304 [doi]
- AOMDV with Sufficient Bandwidth AwarePattana Wannawilai, Chanboon Sathitwiriyawong. 305-312 [doi]
- Metadata-Based Adaptive Sampling for Energy-Efficient Collaborative Target Tracking in Wireless Sensor NetworksYousef E. M. Hamouda, Chris Phillips. 313-320 [doi]
- QoS Algorithm for Localised Routing Based on Bandwidth as the Dominant Metric for Candidate Path SelectionTurki A. AlGhamdi, Mike E. Woodward. 321-328 [doi]
- Delta-Multiplexing: A Novel Technique to Improve VoIP Bandwidth Utilization between VoIP GatewaysMosleh M. Abu-Alhaj, Manjur S. Kolhar, Lingeswari V. Chandra, Omar Amer Abouabdalla, Ahmed M. Manasrah. 329-335 [doi]
- Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh NetworksLiang Zhao, Ahmed Yassin Al-Dubai, Imed Romdhani. 336-342 [doi]
- Evaluation of QoS Parameters for Real-time Rich Media Applications Using a Test-bed ImplementationSivanantharasa Panchadcharam, Qiang Ni, Gareth A. Taylor. 343-348 [doi]
- Server Placement for Peer-to-Peer Live Streaming SystemsXiaoqun Yuan, Hao Yin, Xuening Liu, Changlai Du, Geyong Min. 349-355 [doi]
- A Sofrware Framework for Robust Packet Delivery in Wireless Multi-hop NetworksTaehoon Kim, Bora Kang, Sungwoo Tak. 356-363 [doi]
- Enhanced Packet Buffering for DiffServ in Fast Handover Mobile IPJaehyun Choi, Seungwok Han, Chang Hoon Lyu, Hee Yong Youn. 364-370 [doi]
- Active Analysis of BT with a Modified Azureus ClientZhe Yang, Lingzhi Li, ZhiHao Wang, Linqing Li. 371-376 [doi]
- Analyzing Performance for Complex Protocol using Validated CP-nets ModelsJing Liu, Xinming Ye, Jun Li. 377-384 [doi]
- Distributed Energy Balanced Clustering for Wireless Sensor NetworksFuad Bajaber, Irfan Awan. 385-392 [doi]
- Impact of Peers Similarity on Recommendations in P2P SystemsLoubna Mekouar, Youssef Iraqi, Raouf Boutaba. 393-399 [doi]
- Dynamic Single Frequency Networks in Wireless Multihop Networks - Energy Aware Routing Algorithms with Performance AnalysisMagnus Eriksson, Arif Mahmud. 400-406 [doi]
- A Query based Formal Security Analysis Framework for Enterprise LANP. Bera, Soumya Maity, S. K. Ghosh, Pallab Dasgupta. 407-414 [doi]
- Distributed Adaptive Interference-Avoidance Multi-channel MAC Protocol for ZigBee NetworksWei Yuan, Xiaolei Cui, Ignas G. Niemegeers. 415-419 [doi]
- A Comparative Study on Iterative Methods Regarding Cross-Layer Optimization for OFDMA SystemsCharilaos C. Zarakovitis, Ilias G. Nikolaros, Dionysios Skordoulis, Marios G. Hadjinicolaou, Qiang Ni. 420-425 [doi]
- An Efficient Method to Set RBF Network Paramters Based on SOM TrainingKazuhiko Yamashita, Goutam Chakraborty, Hiroshi Mabuchi, Masafumi Matsuhara. 426-431 [doi]
- Fuzzy Expert System Based Intelligent Website Assessment SystemHuan Liu, Shuang Zhang, Shixiong Zhang. 432-437 [doi]
- Training Recurrent Neuro-Fuzzy System Using Two Novel Population-Based Algorithms for Temperature ForecastingZahra Khanmirzaei. 438-445 [doi]
- A Novel Neural Network-Based Approach for Multiple Instance LearningCheng Hua Li, Iker Gondra. 451-456 [doi]
- The Logical Difference for Fuzzy OntologiesSha-sha Feng, Dan-tong Ou-yang, Yong-gang Zhang. 457-463 [doi]
- Multiobjective Evolutionary Algorithms and a Combined Heuristic for Route Reconnection Applied to Multicast Flow RoutingMarcos L. P. Bueno, Gina M. B. Oliveira. 464-471 [doi]
- A Model of Intelligent Controller for Hypothyroidism TreatmentLuiz G. A. Martins, Luiz H. A. Monteiro. 472-479 [doi]
- Intelligent Modelling for Benign Tumour Growth with Cell-Cell and Cell-Matrix Adhesion and MovementN. Kazmi, M. A. Hossain, R. Phillips. 480-486 [doi]
- Moving Object Tracking Method Based on Adaptive On-line Clustering and Prediction-based Cross-correlationJian Wu, Hengjun Yue, Zhiming Cui, Jianming Chen. 487-494 [doi]
- Robust Detection of Corners and Corner-line Links in ImagesAndres Solis Montero, Milos Stojmenovic, Amiya Nayak. 495-502 [doi]
- Flame Recognition Algorithm Research under Complex BackgroundQing Liu, Sun an Wang, Xiaohui Zhang, Yun Hou. 503-510 [doi]
- Accuracy Enhancement for License Plate RecognitionLihong Zheng, Xiangjian He, Bijan Samali, Laurence Tianruo Yang. 511-516 [doi]
- Moving Object Detection based on Clausius EntropyJ. H. Park, G. S. Lee, W. H. Cho, N. Toan, S. H. Kim, S. Y. Park. 517-521 [doi]
- Non-negative Matrix Factorization for Inferring Implicit Preference of Potential CustomerMasakatsu Ohta. 522-528 [doi]
- Voting Based Text Line Segmentation in Handwritten Document ImagesToan Nguyen Dinh, Jonghyun Park, Gueesang Lee. 529-535 [doi]
- Object Recognition using Full Pixel MatchingJun Ma, Long Zheng, Yuichi Yaguchi, Mianxiong Dong, Ryuichi Oka. 536-543 [doi]
- An Extraction Method of Moving Object Based on Visual Cognition MechanismMin Li, Huibin Wang, Xijun Yan, Lizhong Xu. 544-551 [doi]
- Detecting the Orientation of N-gonal Cropped Sub-images and Its ApplicationJong Woo Kim, Woo-Keun Chung, Seon-Yeong Kim, Hwan-Gue Cho. 552-559 [doi]
- A Photo Visualization System Considering Region of InterestDong-Sung Ryu, Seon-Yeong Kim, Hwan-Gue Cho. 560-566 [doi]
- A Framework for Building Trust Based Communities in P2P Mobile Social NetworksBasit Qureshi, Geyong Min, Demetres D. Kouvatsos. 567-574 [doi]
- High Speed NIDS using Dynamic Cluster and Comparator LogicMonis Akhlaq, Faeiz Alserhani, Ahsan Subhan, Irfan-Ullah Awan, John Mellor, Pravin Mirchandani. 575-581 [doi]
- Concurrent Error Detection for Multiplicative Inversion of Advanced Encryption StandardFlavius Opritoiu, Mircea Vladutiu, Mihai Udrescu, Lucian Prodan. 582-588 [doi]
- Quantifying Information Leakage for Fully Probabilistic SystemsYunchuan Guo, Lihua Yin, Yuan Zhou, Binxing Fang. 589-595 [doi]
- A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum MechanismsQiongxiao Wang, Jiwu Jing, Jingqiang Lin. 596-603 [doi]
- Selective and Early Threat Detection in Large Networked SystemsMichele Colajanni, Mirco Marchetti, Michele Messori. 604-611 [doi]
- Enforcing Access Control to Web DatabasesAhlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene. 612-619 [doi]
- New GML Storage Schema Models for Spatial and Non-spatial InformationYong-Ki Kim 0001, Hye-Kyeom Yoo, Jae-Woo Chang. 620-626 [doi]
- An Efficient Technique for Continuous K-Nearest Neighbor Query Processing on Moving Objects in a Road NetworkGuohui Li, Ping Fan, Yanhong Li, Jianqiang Du. 627-634 [doi]
- F-KDB: An K-D-B Tree Implementation over Flash MemoryGuohui Li, Pei Zhao, Sheng Gao, Jianqiang Du. 635-642 [doi]
- A Smart Filtering System for Newly Coined Profanities by Using Approximate String AlignmentTaijin Yoon, Sun Young Park, Hwan-Gue Cho. 643-650 [doi]
- Two Novel Semantics of Top-k Queries Processing in Uncertain DatabaseDexi Liu, Changxuan Wan, Naixue Xiong, Laurence Tianruo Yang, Lei Chen 0002. 651-659 [doi]
- Robust Top-k Query Evaluation in Wireless Sensor NetworksBaichen Chen, Geyong Min. 660-667 [doi]
- Failure Semantic of Neighbour Replication Grid Transaction ModelNoraziah Ahmad, Mohammad Fadel Jamil Klaib, Roslina Mohd Sidek. 668-673 [doi]
- How to Apply the Skip List to the Management of a Massive Set of Replying Comments in Web Bulletins by Exploiting the Power-Law DistributionYun-Jung Lee, Sung-Min Yoon, Jeong-Hoon Ji, Hwan-Gue Cho, Gyun Woo. 674-681 [doi]
- iDARE: Proactive Data Replication Mechanism for P2P VoD SystemXiaofei Liao, Fan Zhang, Hai Jin, Linchen Yu. 682-689 [doi]
- Information Retrieval via Truncated Hilbert Space ExpansionsPatricio Galeas, Ralph Kretschmer, Bernd Freisleben. 690-697 [doi]
- Delivering Categorized News Items Using RSS Feeds and Web ServicesSubrata Saha, Atul Sajjanhar, Shang Gao, Robert Dew, Ying Zhao. 698-702 [doi]
- Fuzzy Neural Networks to Detect Cardiovascular Diseases HierarchicallyJun Shi, Booma Devi Sekar, Ming-Chui Dong, Wai Kei Lei. 703-708 [doi]
- A New Congestion Control Mechanism for WSNsVasilis Michopoulos, Lin Guan, Iain W. Phillips. 709-714 [doi]
- Maximal Weight Topology Discovery in Ad hoc Wireless Sensor NetworksYasir Fayyaz, Mehwish Nasim, Muhammad Younus Javed. 715-722 [doi]
- Error-Tolerant Coverage Control based on Bio-inspired Attractor Selection Model for Wireless Sensor NetworksTakuya Iwai, Naoki Wakamiya, Masayuki Murata. 723-729 [doi]
- Pattern Recognition Comparative Analysis Applied to Fingerprint Indoor Mobile Sensors LocalizationJose Vicente Marti Aviles, Raul Marin Prades. 730-736 [doi]
- Concept and Prototype for a Real-Time Enabled Publish/Subscribe SystemMatthias Andree, Alexander Gebel, Holger Karl. 737-742 [doi]
- A Lifetime Extended Routing Protocol Based on Data Threshold in Wireless Sensor NetworksNing Sun, Nai-bin Su, Sang Ho Lee. 743-748 [doi]
- Enhanced Fibonacci Backoff Algorithm for Mobile Ad-Hoc NetworkMuneer Bani Yassein, Osama Al Oqaily, Geyong Min, Wail Mardini, Yaser Khamayseh, Saher S. Manaseer. 749-754 [doi]
- Facilitating Mobile Communication with Annotated MessagesGhaidaa Al-Sultany, Maozhen Li, Sadaqat Jan, Hamed S. Al-Raweshidy. 755-760 [doi]
- A SIP Signaling Retransmission Scheme for Efficient Mobile IPTV Service over 3G Wireless NetworksByung Jun Lee, Kyung Tae Kim, Hyung Do Lee, Hee Yong Youn. 761-766 [doi]
- Effective Video Transport over WiMAX with Data Partitioning and Rateless CodingLaith Al-Jobouri, Martin Fleury, Salah S. Al-Majeed, Mohammed Ghanbari. 767-772 [doi]
- Fastest-Vehicle Multi-hop Routing in Vehicular Ad hoc NetworksM. Bilal, P. M. L. Chan, P. Pillai. 773-778 [doi]
- Discrete-Time Simulator for Wireless Mobile AgentsDamien Martin-Guillerez, Jean Fanchon. 779-784 [doi]
- Collective Behaviour in a Square Lattice of Driven Duffing Resonators Coupled to van der Pol OscillatorsMichel F. Randrianandrasana, Xueyong Wei, David Lowe. 785-790 [doi]
- Self-organizing Load Balancing for Relay Based Cellular NetworksLexi Xu, Yue Chen, Yue Gao. 791-796 [doi]
- Towards Secure and Reliable Data Storage with Multi-coefficient Secret SharingFeng Shen, Chonglei Mei, Hai Jiang, Zhiqian Xu. 797-802 [doi]
- A Model of Security Information Flow on Entities for Trust ComputationSerif Bahtiyar, Murat Cihan, Mehmet Ufuk Çaglayan. 803-808 [doi]
- Toward a Target Function of an Information Security Management SystemWolfgang Boehmer. 809-816 [doi]
- Trust Model for Open Resource Control ArchitectureLusha Wang, Raquel Hill. 817-823 [doi]
- Are the Con Artists Back? A Preliminary Analysis of Modern Phone FraudsFederico Maggi. 824-831 [doi]
- A Privacy-Preserving Trust Model for VANETsAyman Tajeddine, Ayman I. Kayssi, Ali Chehab. 832-837 [doi]
- Linguistic Fuzzy Logic Enhancement of a Trust Mechanism for Distributed NetworksFélix Gómez Mármol, Javier G. Marín-Blázquez, Gregorio Martínez Pérez. 838-845 [doi]
- Enabling Use of Single Password over Multiple Servers in Two-Server ModelYanjiang Yang, Feng Bao. 846-850 [doi]
- Virtual Security Kernel: A Component-Based OS Architecture for Self-ProtectionRuan He, Marc Lacoste, Jean Leneutre. 851-858 [doi]
- Spyware Security Management via a Public Key Infrastructure for Client-Side Web Communicating ApplicationsPeter Clutterbuck. 859-864 [doi]
- A Secure User Interface for Web Applications Running Under an Untrusted Operating SystemChunxiao Li, Anand Raghunathan, Niraj K. Jha. 865-870 [doi]
- Efficient Encryption-Authentication of Shared Bus-Memory in SMP SystemFangyong Hou, Hongjun He, Nong Xiao, Fang Liu, Guangjun Zhong. 871-876 [doi]
- An Analytical Framework for Evaluating Survivability of SCADA SystemsCarlos Queiroz, Abdun Naser Mahmood, Zahir Tari. 877-881 [doi]
- An Authentication Framework for Wireless Sensor Networks using Identity-Based SignaturesRehana Yasmin, Eike Ritter, Guilin Wang. 882-889 [doi]
- Secure Secret Key Distribution and Storage in Wireless Sensor NetworksJuliano F. Kazienko, Célio Vinicius N. de Albuquerque. 890-895 [doi]
- Trust Management Scheme for Mobile Ad-Hoc NetworksRaihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar. 896-901 [doi]
- Learning Autonomic Security Reconfiguration PoliciesJuan E. Tapiador, John A. Clark. 902-909 [doi]
- Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor NetworksLei Zhang 0004, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini. 910-915 [doi]
- Tin-Key: Effective Key-Establishment for Wireless Sensor NetworksSomanath Tripathy. 916-921 [doi]
- Efficient Sharing of Secure Cloud Storage ServicesQin Liu, Guojun Wang, Jie Wu. 922-929 [doi]
- Designing Cloud Services Adhering to Government Privacy LawsFrank Dölitzscher, Christoph Reich, Anthony Sulistio. 930-935 [doi]
- A Practical Approach to Improve the Data Privacy of Virtual MachinesJinzhu Kong. 936-941 [doi]
- Incorporating Trust in Network VirtualizationLoubna Mekouar, Youssef Iraqi, Raouf Boutaba. 942-947 [doi]
- A Security Management Architecture for the Protection of Kernel Virtual MachinesFlavio Lombardi, Roberto Di Pietro. 948-953 [doi]
- MobiTrust: Trust Management System in Mobile Social ComputingJuan Li, Zonghua Zhang, Weiyi Zhang. 954-959 [doi]
- Hiding Short Secret Messages based on Linguistic Steganography and Manual AnnotationAlfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Alvarez. 960-964 [doi]
- Measuring the Security of Linguistic Steganography in Spanish based on Synonymous Paraphrasing with WSDAlfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Alvarez. 965-970 [doi]
- Bi-directional RPROB-based Location Anonymizer System for Location-Based ServicesMinh-Triet Tran, Vi-Minh Luong, Anh Duc Duong, Isao Echizen. 971-977 [doi]
- Using Game Theory to Reveal Vulnerability for Complex NetworksXiaoying Zhang, Chi Guo, Lina Wang. 978-984 [doi]
- A Privacy Enhanced Data Aggregation ModelShu Qin Ren, Khin Mi Mi Aung, Jong Sou Park. 985-990 [doi]
- A Culture of Trust Threatens Security and Privacy in QatarMariam Al-Hamar, Ray Dawson, Lin Guan. 991-995 [doi]
- Image Steganography and Chrominance ComponentsAdel Almohammad, Gheorghita Ghinea. 996-1001 [doi]
- Distinguishing the Master to Defend DDoS Attack in Peer-to-Peer NetworksLei Hou, Hai-Xin Duan, Jianping Wu. 1002-1008 [doi]
- Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection MethodJie Wang 0001, Raphael C.-W. Phan, John N. Whitley, David J. Parish. 1009-1014 [doi]
- Simultaneous Analysis of Time and Space for Conflict Detection in Time-Based Firewall PoliciesSubana Thanasegaran, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi. 1015-1021 [doi]
- On Small Subgroup Non-confinement AttackFeng Hao. 1022-1025 [doi]
- Compressing Attack Graphs Through Reference EncodingPengsu Cheng, Lingyu Wang, Tao Long. 1026-1031 [doi]
- Decentralized XACML Overlay NetworkAli Alzahrani, Helge Janicke, Sarshad Abubaker. 1032-1037 [doi]
- Cryptanalysis of the Bisectional MQ Equations SystemXiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Mingrui Chen, Yongzhe Zhao. 1038-1043 [doi]
- Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security PropertyKun Peng, Feng Bao. 1044-1049 [doi]
- Fault Propagation Pattern Based DFA on Feistel Ciphers, with Application to CamelliaHaiNing Chen, Yongbin Zhou, Wenling Wu, Na Wang. 1050-1057 [doi]
- Offline Submission with RSA Time-Lock PuzzlesYves Igor Jerschow, Martin Mauve. 1058-1064 [doi]
- Attacks on an Efficient RFID Authentication ProtocolImran Erguler, Emin Anarim. 1065-1069 [doi]
- Think Before Your LFSRs JumpMujahid Mohsin, Mehreen Afzal, Muhammad Arif Wahla. 1070-1074 [doi]
- Distinguishing Attack on BiviumZainab Noferesti, Neda Rohani, Javad Mohajeri, Mohammad Reza Aref. 1075-1078 [doi]
- Security and Trust of Public Key Cryptography Options for HIPHarri Forsgren, Kaj Grahn, Timo Karvi, Göran Pulkkis. 1079-1084 [doi]
- CATRAC: Context-Aware Trust- and Role-Based Access Control for Composite Web ServicesCesar Ghali, Ali Chehab, Ayman I. Kayssi. 1085-1089 [doi]
- Enabling Privacy-preserving Credential-based Access Control with XACML and SAMLClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio. 1090-1095 [doi]
- Security in Outsourced Storage: Efficiently Checking Integrity and Service Level Agreement ComplianceRoberto Bragantini, Mauro Conti, Roberto Di Pietro. 1096-1101 [doi]
- A Novel Dynamic ID-based Remote User Authentication and Access Control Scheme for Multi-server EnvironmentMin-Hua Shao, Ying-Chih Chin. 1102-1107 [doi]
- Recommending Access to Web Resources based on User s Profile and TraceabilityNuno Bettencourt, Nuno Silva. 1108-1113 [doi]
- Privacy-Aware Access Control and Authorization in Passive Network Monitoring InfrastructuresFotios Gogoulos, Anna Antonakopoulou, Georgios V. Lioudakis, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris. 1114-1121 [doi]
- Efficiently Using a CUDA-enabled GPU as Shared ResourceHagen Peters, Martin Koper, Norbert Luttenberger. 1122-1127 [doi]
- Efficient Independent Component Analysis on a GPURui Ramalho, Pedro Tomás, Leonel Sousa. 1128-1133 [doi]
- XMalloc: A Scalable Lock-free Dynamic Memory Allocator for Many-core MachinesXiaohuang Huang, Christopher I. Rodrigues, Stephen Jones, Ian Buck, Wen-mei W. Hwu. 1134-1139 [doi]
- Parallel Best Neighborhood Matching Algorithm Implementation on GPU PlatformGuangyong Zhang, Liqiang He, Yanyan Zhang. 1140-1145 [doi]
- Improving the Performance of the Sparse Matrix Vector Product with GPUsF. Vazquez, G. Ortega, José-Jesús Fernández, Ester M. Garzón. 1146-1151 [doi]
- Memory Saving Discrete Fourier Transform on GPUsDaniel Kauker, Harald Sanftmann, Steffen Frey, Thomas Ertl. 1152-1157 [doi]
- The GPU-based String Matching System in Advanced AC AlgorithmJiang-Feng Peng, Hu Chen, Shaohuai Shi. 1158-1163 [doi]
- GPUMP: A Multiple-Precision Integer Library for GPUsKaiyong Zhao, Xiaowen Chu. 1164-1168 [doi]
- Accelerating Linpack Performance with Mixed Precision Algorithm on CPU+GPGPU Heterogeneous ClusterLei Wang, Yunquan Zhang, Xianyi Zhang, Fangfang Liu. 1169-1174 [doi]
- Exploiting More Parallelism from Applications Having Generalized Reductions on GPU ArchitecturesXiao-Long Wu, Nady Obeid, Wen-mei Hwu. 1175-1180 [doi]
- Astrophysical Particle Simulations with Custom GPU ClustersR. Spurzem, P. Berczik, K. Nitadori, G. Marcus, Andreas Kugel, Reinhard Männer, I. Berentzen, R. Klessen, R. Banerjee. 1189-1195 [doi]
- Massively Parallel Finite Element Simulator for Full-Chip STI Stress AnalysisJiying Xue, Xiaomeng Jiao, Yangdong Deng, Hao Qian, Dajie Zeng, Guoyu Li, Zhiping Yu. 1196-1201 [doi]
- CUDA-based Signed Distance Field Calculation for Adaptive GridsTaejung Park, Sung-Ho Lee, Jong-Hyun Kim, Chang-Hun Kim. 1202-1206 [doi]
- GPU Accelerated VLSI Design VerificationYangdong Steve Deng. 1213-1218 [doi]
- Realtime Simulation of Burning Solids on GPU with CUDAJian Zhu, Youquan Liu, Kai Bao, Yuanzhang Chang, Enhua Wu. 1219-1224 [doi]
- Tibetan Language Speech Recognition Model Based on Active Learning and Semi-Supervised LearningXiuqin Pan, Yongcun Cao, Yong Lu, Yue Zhao. 1225-1228 [doi]
- Geomagnetic Precursor Z Component Diurnal Variation Phase Anomaly Recognition based on the Pattern DistanceShaochun Wu, Tongyu Yuan, Yan Tang, Bofeng Zhang, Daming Wei. 1229-1234 [doi]
- Scaling the iHMM: Parallelization versus HadoopSebastien Bratieres, Jurgen Van Gael, Andreas Vlachos, Zoubin Ghahramani. 1235-1240 [doi]
- Stochastic Mirror Descent Algorithm for L1-Regularized Risk MinimizationsHua Ouyang, Alexander Gray. 1241-1245 [doi]
- An Approach on Service Component Selection and Analysis of the Resulting System ReliabilityLin Xi, Qinglei Zhou, Linlin Xie. 1246-1250 [doi]
- MMPI: A Scalable Fault Tolerance Mechanism for MPI Large Scale Parallel ComputingZhiyuan Wang, Xuejun Yang, Yun Zhou. 1251-1256 [doi]
- Implementation of Non-Pipelined and Pipelined Data Encryption Standard (DES) Using Xilinx Virtex-6 FPGA TechnologySaeid Taherkhani, Enver Ever, Orhan Gemikonakli. 1257-1262 [doi]
- Testing the Effectiveness of Dynamic Binding in Web ServicesAnthony Sargeant, David Webster, Karim Djemame, Jie Xu. 1263-1268 [doi]
- Realizing Network Enabled Capability Through Dependable Dynamic Systems IntegrationDuncan Russell, Lu Liu, Zongyang Luo, Colin C. Venters, David Webster, Jie Xu. 1269-1274 [doi]
- A P2P e-Commerce Reputation Model Based on Fuzzy LogicJi Li, Lu Liu, Jie Xu. 1275-1279 [doi]
- Noise Robustness Evaluation of Audio Features in Segment SearchMasaki Kuwabara, Masahide Sugiyama. 1285-1291 [doi]
- Context-based Ontology Matching: Concept and Application CasesFeiyu Lin, Jonathan Butters, Kurt Sandkuhl, Fabio Ciravegna. 1292-1298 [doi]
- CCA-Secure Type-based Proxy Re-encryption with Invisible ProxyXiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu. 1299-1305 [doi]
- Classification of Closed Frequent Patterns Improved by Feature Space TransformationCheng Hao Jin, Gouchol Pok, Hi-Seok Kim, Eun Jong Cha, Keun Ho Ryu. 1306-1311 [doi]
- Towards Garbage Collection Mechanism for RTSJ-Oriented Embedded Java ProcessorGuang Hu, ZhiLei Chai, Wenke Zhao, Shi-liang Tu. 1312-1316 [doi]
- Power Measurements and Analyses of Massive Object Storage SystemYong Dong, Juan Chen, Tao Tang. 1317-1322 [doi]
- Scalable and Parallel Implementation of a Financial Application on a GPU: With Focus on Out-of-Core CaseMyungho Lee, Jin-Hong Jeon, Joonsuk Kim, Joonhyun Song. 1323-1327 [doi]
- Information Security Risk Management Framework for the Cloud Computing EnvironmentsXuan Zhang, Nattapong Wuwong, Hao Li, Xuejie Zhang. 1328-1334 [doi]
- Pervasive Service Computing: Visions and ChallengesJiehan Zhou, Ekaterina Gilman, Mika Ylianttila, Jukka Riekki. 1335-1339 [doi]
- Reasoning for Smart Space Application: Comparing Three Reasoning Engines CLIPS, Jess and Win-prologEkaterina Gilman, Iván Sánchez, Timo Saloranta, Jukka Riekki. 1340-1345 [doi]
- User Adaptive Recommendation Model by Using User Clustering based on Decision TreeSanghyun Ryu, Kang-hak Han, Hyun-Su Jang, Young Ik Eom. 1346-1351 [doi]
- Co-Locating Virtual Machine Logging and Replay for Recording System FailuresJin Kawasaki, Shuichi Oikawa. 1352-1357 [doi]
- Complementary Classification Techniques based Personalized Software Requirements Retrieval with Semantic Ontology and User FeedbackTao Zhang, Byungjeong Lee. 1358-1363 [doi]
- Assessing Object-Oriented Software Systems Based on Change Impact SimulationLin Li, Li Zhang, Linqing Lu, Zhiqiang Fan. 1364-1369 [doi]
- Implementation of x86 Binary-to-C Translator by Using GNU ToolsKirill Makankov, Seon Wook Kim. 1370-1375 [doi]
- A Tree Based Strategy for Test Data Generation and Cost Calculation for Uniform and Non-Uniform Parametric ValuesMohammad F. J. Klaib, Sangeetha Muthuraman, Noraziah Ahmad, Roslina Mohd Sidek. 1376-1383 [doi]
- Applying Feature Selection for Effective Classification of Microcalcification Clusters in MammogramsDong Wang, Jinchang Ren, Jianmin Jiang, Stanley S. Ipson. 1384-1387 [doi]
- Disparity Adjustment for Local Stereo MatchingXia Hu, Caiming Zhang, Wei Wang, Xifeng Gao. 1388-1392 [doi]
- A Rotate-based Best Neighborhood Matching Algorithm for High Definition Image Error ConcealmentLiqiang He, Yanyan Zhang. 1393-1396 [doi]
- Local Hybrid Level-set Method for MRA Image SegmentationQingqi Hong, Qingde Li, Jie Tian. 1397-1402 [doi]
- Research on the Recognition Method of Bridge Target in SAR ImageDong Yin, Rong Zhang. 1403-1406 [doi]
- Face Recognition using Layered Linear Discriminant Analysis and Small SubspaceMuhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar, Rubiyah Yousaf. 1407-1412 [doi]
- Text Detection using Multilayer Separation in Real Scene ImagesManoj Kumar, Young-Chul Kim, Gueesang Lee. 1413-1417 [doi]
- Awareness Program and AI based Tool to Reduce Risk of Phishing AttacksO. Salem, A. Hossain, M. Kamala. 1418-1423 [doi]
- Incremental Emerging Patterns Mining for Identifying Safe and Non-safe Power Load LinesJong Bum Lee, Minghao Piao, Keun Ho Ryu. 1424-1429 [doi]
- Methods of Pattern Extraction and Interval Prediction for Equipment MaintenanceYongjun Fei, Bofeng Zhang, Wenhao Zhu, Jianbo Hu. 1430-1435 [doi]
- Teachers and Students Attitudes Towards Traditional and Computer Assisted Blended Teaching and Learning Processes in Mechanical Engineering Subjects AreaSalah Abdulrasool, R. Mishra, Haifa Khalaf. 1436-1441 [doi]
- Feature Selection of Gene Expression Data Using Regression ModelHo-Sun Shon, Keun Ho Ryu, Kyung-Sook Yang. 1442-1447 [doi]
- Conceptual Multi-Level Hierarchy for Evaluation and ClassificationDoug Won Choi, Jin Gyu Shin. 1448-1455 [doi]
- QoS Assessment over Multiple AttributesHmood Al-Dossari, Jianhua Shao, Alun D. Preece. 1456-1461 [doi]
- The Effects of Network Density of a New Counter-based Broadcasting Scheme in Mobile Ad Hoc NetworksMuneer Masadeh, Sanabel Fathi Nimer, Ahmed Yassin Al-Dubai. 1462-1467 [doi]
- An Energy Efficient Clustering Scheme for Self-Organizing Distributed Wireless Sensor NetworksKyung Tae Kim, Han Ku Yoo, Byung Ha Son, Hee Yong Youn. 1468-1473 [doi]
- Scalable Orchestration Strategy for Automatic Service CompositionHiroshi Mizugai, Incheon Paik, Wuhui Chen. 1474-1479 [doi]
- Evaluation of Drowsiness During Driving using Electrocardiogram - A Driving Simulation StudyMasaru Tasaki, Motoaki Sakai, Mai Watanabe, Hui Wang, Daming Wei. 1480-1485 [doi]
- A SOA Based Approach to User-Oriented System MigrationZhuo Zhang, Hongji Yang, Dongdai Zhou, Shaochun Zhong. 1486-1491 [doi]
- Towards Exhibiting Ability of Service Communication ModelsFangfang Liu, Jie Yu, Bofeng Zhang, Chengling Li. 1492-1497 [doi]
- Experimenting Scheduling Policies with Continuation-based ServicesClaudia Di Napoli, Maurizio Giordano. 1498-1503 [doi]
- Using Chemical Metaphor to Express Workflow and Service OrchestrationChen Wang, Jean-Louis Pazat. 1504-1511 [doi]
- A Key Management Scheme for Multicast Based on Layer 2 ControlZheng Cao, Pengpeng Yin, Zhengjun Lu. 1512-1518 [doi]
- Selective and Heterogeneous SVM Ensemble for Demand ForecastingYue Liu, Zhenjiang Liao, Yafeng Yin, Zaixia Teng, Junjun Gao, Bofeng Zhang. 1519-1524 [doi]
- Performance Comparison of Category 5e vs. Category 6 Cabling Systems for both IPv4 and IPv6 in Gigabit EthernetBurjiz K. Soorty, Samad S. Kolahi, Navneet Chand, Zhang Qu. 1525-1529 [doi]
- Adding Standards Based Job Submission to a Commodity Grid BrokerDave Colling, Andrew Stephen McGough, Tiejun Ma, Vesso Novov, Jazz Mack Smith, David Wallom, Xin Xiong. 1530-1535 [doi]
- Semantic Service Discovery Exploiting Efficient Concept Match over Large Amount of Heterogeneous OntologiesDohyun Kim, Younghee Lee. 1536-1541 [doi]
- SRCP: Sensor Reliability and Congestion Control ProtocolRaees Khan, Farrukh Aslam Khan. 1542-1548 [doi]
- A Novel Adaptive FEC Scheme Integrating Multi-Layer FunctionsXuefen Chi, Wei Zhang, Kun Zhao, Lin Guan, Jiao Feng. 1549-1553 [doi]
- A Lossless Data Hiding based on Discrete Haar Wavelet TransformHu-Yu Huang, Shih-Hsu Chang. 1554-1559 [doi]
- Methods of Improving Communications by a Life-Like Animated Pedagogical AgentJie Yan, Ruth Agada. 1560-1565 [doi]
- Researching on Simulation of Traffic Accidents Scene by OpenGLShuang Zhang, Huan Liu, Shixiong Zhang. 1566-1570 [doi]
- A Tracking Model for Enhancing Social Video Integration and SharingZhuhua Liao, Jing Yang, Chuan Fu, Guoqing Zhang. 1571-1576 [doi]
- An Efficient Multi Recipient Signcryption Scheme Offering Non RepudiationFahad Ahmed, Asif Masood, Firdous Kausar. 1577-1581 [doi]
- Modifed Re-sampling Based Particle Filter for Visual Tracking with MPHMd. Zahidul Islam, Chi-Min Oh, Chil-Woo Lee. 1582-1587 [doi]
- Text Detection in Binarized Text Images of Korean Signboard by Stroke Width FeatureHuy Le Phat, Toan Nguyen Dinh, Soo-Hyung Kim, Gueesang Lee. 1588-1592 [doi]
- Exploiting Context in Location-Based Information SystemsChristos Mettouris, George A. Papadopoulos. 1593-1598 [doi]
- Automatic Segmentation for Breast Skin-lineZhiyong Zhang, Joan Lu, Yau Jim Yip. 1599-1604 [doi]
- A Novel Two-Server Password Authentication Scheme with Provable SecurityDexin Yang, Bo Yang. 1605-1609 [doi]
- Improved Kerberos Security Protocol Evaluation using Modified BAN LogicN. T. Abdelmajid, M. A. Hossain, S. Shepherd, K. Mahmoud. 1610-1615 [doi]
- Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity ProtectionFangyong Hou, Hongjun He, Nong Xiao, Fang Liu, Guangjun Zhong. 1616-1621 [doi]
- Information Flow Analysis of Web Service NetXing Jin-Liang, Li Xiao-Hong, Cao Yan, Feng Zhi-Yong, Liu Ran. 1622-1626 [doi]
- Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANETMin-Hua Shao, Ji-Bin Lin, Yi-Ping Lee. 1627-1632 [doi]
- TMN-tree: New Trajectory Index Structure for Moving Objects in Spatial NetworksJae-Woo Chang, Myoung-Seon Song, Jung-Ho Um. 1633-1638 [doi]
- Group-Based Prime Number Labeling Scheme for XML DataDong Chan An, Seog Park. 1639-1644 [doi]
- An Information Extraction Method for Digitized Textbooks of Traditional Chinese MedicineWenhao Zhu, Shunlai Bai, Bofeng Zhang, Weimin Xu, Daming Wei. 1645-1648 [doi]
- Using Significant Classification Rules to Analyze Korean Customers Power Consumption Behavior: Incremental Tree Induction using Cascading-and-Sharing MethodMinghao Piao, Meijing Li, Keun Ho Ryu. 1649-1653 [doi]
- Transitive Association Rule Discovery by Considering Strategic ImportanceDoug Won Choi, Young Jun Hyun. 1654-1659 [doi]
- Algorithms for Data Retrieval from Online Social Network GraphsRuqayya Abdulrahman, Sophia Alim, Daniel Neagu, Mick J. Ridley. 1660-1666 [doi]
- Wearable Video Retrieval and Navigation System using GPS DataDatchakorn Tancharoen, Kiyoharu Aizawa. 1667-1672 [doi]
- Gait Symmetry Analysis Based on Affinity Propagation ClusteringSusu Jiang, Bofeng Zhang, Weimin Xu, Daming Wei. 1673-1678 [doi]
- Studying Filter Cache Bypassing on Embedded SystemsJie Tao, Dominic Hillenbrand, Lizhe Wang, Holger Marten. 1679-1686 [doi]
- SEPL: Smart Evicted Page List Buffer for NAND Flash Storage SystemXin Jin, Sanghyuk Jung, Yong Ho Song. 1687-1694 [doi]
- CSDA: An Adaptive Data Storage Strategy for Predictive Branch Path on Multi-Core ArchitectureZhang Jun, Mei Kui-Zhi, Zhao Ji-Zhong. 1695-1702 [doi]
- Touchware: A Software based Implementation for High Resolution Multi-touch ApplicationsXiaoling Wu, Bang Won Lee, Chulyong Joung, Seeun Jang. 1703-1710 [doi]
- SAT: A Stream Architecture Template for Embedded ApplicationsQianming Yang, Nan Wu, Mei Wen, Yi He, Huayou Su, Chunyuan Zhang. 1711-1718 [doi]
- Flexible Static Scheduling of Software with Logical Execution Time ConstraintsPatricia Derler, Stefan Resmerita. 1719-1726 [doi]
- Efficient PC-FPGA Communication over Gigabit EthernetNikolaos Alachiotis, Simon A. Berger, Alexandros Stamatakis. 1727-1734 [doi]
- Towards Free Task Overloading in Passive Replication Based Real-time MultiprocessorsWei Sun, Naixue Xiong, Laurence Tianruo Yang, Chunming Rong. 1735-1742 [doi]
- Real-time Adaptation and Load Balancing Aware OS Services for Distributed Reconfigurable System on ChipSufyan Samara, Gunnar Schomaker. 1743-1750 [doi]
- A Sufficient Condition for Rate Monotonic Schedulability Based on Response Time AnalysisSangchul Han, Moonju Park, Minkyu Park. 1751-1757 [doi]
- Performance and Power Consumption Analysis of DVFS-Enabled H.264 Decoder on Heterogeneous Multi-Core PlatformShau-Yin Tseng, Kuo-Hung Lin, Wen-Shan Wang, Chung-Ta King, Shih-Hsueh Chang. 1758-1763 [doi]
- Locality and Duplication-Aware Garbage Collection for Flash Memory-Based Virtual Memory SystemsSeunggu Ji, Dongkun Shin. 1764-1771 [doi]
- Guaranteeing Optional Task Completions on (m, k)-Firm Real-Time SystemsClaude Evéquoz. 1772-1779 [doi]
- Hybrid of Job Sequencing and DVFS for Peak Temperature Reduction with Nondeterministic ApplicationsShaobo Liu, Meikang Qiu, Wenzhong Gao, Xiao-jun Tang, Bin Guo. 1780-1787 [doi]
- A Bypass Optimization Method for Network on ChipWei Hu, Binbin Wu, Bin Xie, Tianzhou Chen, Lianghua Miao. 1788-1795 [doi]
- Adaptive Router Architecture for Optimising Quality of Service in Networks-on-ChipAli Ahmadinia, Alireza Shahrabi. 1796-1801 [doi]
- Leakage Aware Scheduling on Maximum Temperature Minimization for Periodic Hard Real-Time SystemsVivek Chaturvedi, Huang Huang, Gang Quan. 1802-1809 [doi]
- Leakage-Aware Scheduling for Real-Time Systems with (m, k)-ConstraintsLinwei Niu, Gang Quan. 1810-1817 [doi]
- Global Register Alias Table: Executing Sequential Program on Multi-CoreChunhao Wang, Lihan Ju, Di Wu, Lingxiang Xiang, Wei Hu, Tianzhou Chen. 1818-1824 [doi]
- Combining Behavioural Real-time Software Modelling with the OSCI TLM-2.0 Communication StandardKe Yu, Neil C. Audsley. 1825-1832 [doi]
- Predicting Events for the Simulation of Hybrid SystemsKerstin Bauer, Klaus Schneider. 1833-1840 [doi]
- Dynamic Workload Prediction for Soft Real-Time ApplicationsFlorian Kluge, Sascha Uhrig, Jörg Mische, Benjamin Satzger, Theo Ungerer. 1841-1848 [doi]
- Dynamic Resource Provision in Multi-Channel P2P Live Streaming SystemsXiaoqun Yuan, Hao Yin, Xuening Liu, Changlai Du, Geyong Min. 1849-1855 [doi]
- Timely Recovery from Task Failures in Non-preemptive, Deadline-driven SchedulersMichael Short, Imran Sheikh. 1856-1863 [doi]
- Mixed-Criticality Real-Time Scheduling for Multicore SystemsMalcolm S. Mollison, Jeremy P. Erickson, James H. Anderson, Sanjoy K. Baruah, John A. Scoredos. 1864-1871 [doi]
- R-BATCH: Task Partitioning for Fault-tolerant Multiprocessor Real-Time SystemsJunsung Kim, Karthik Lakshmanan, Ragunathan Rajkumar. 1872-1879 [doi]
- SESAM: An MPSoC Simulation Environment for Dynamic Application ProcessingNicolas Ventroux, Alexandre Guerre, T. Sassolas, L. Moutaoukil, G. Blanc, C. Bechara, Raphael David. 1880-1886 [doi]
- Model-Level Debugging of Embedded Real-Time SystemsWolfgang Haberl, Markus Herrmannsdörfer, Jan Birke, Uwe Baumgarten. 1887-1894 [doi]
- Combining Target-independent Analysis with Dynamic Profiling to Build the Performance Model of a DSPMarco Lattuada, Fabrizio Ferrandi. 1895-1901 [doi]
- Introducing Hardware-in-Loop Concept to the Hardware/Software Co-design of Real-time Embedded SystemsDogan Fennibay, Arda Yurdakul, Alper Sen. 1902-1909 [doi]
- A Model Checking Approach for Multi-core Time Partitions DesignGeorgiana Macariu. 1910-1917 [doi]
- Superblock-Based Source Code Optimizations for WCET ReductionPaul Lokuciejewski, Timon Kelter, Peter Marwedel. 1918-1925 [doi]
- Coverage and Profiling for Real-Time Tiny KernelsSital Prasad Kedia, Anusree Bhattacharjee, Rajeshwar Kailash, Saurabh Dongre. 1926-1931 [doi]
- Timing Analysis and Optimization of FlexRay Dynamic SegmentHaibo Zeng, Arkadeb Ghosal, Marco Di Natale. 1932-1939 [doi]
- Towards a Generic Design Space Exploration FrameworkTripti Saxena, Gabor Karsai. 1940-1947 [doi]
- Reorganizing Data Blocks in Flash Memory by Program TranslationJoon-Young Paik, Eun-Sun Cho, Tae-Sun Chung. 1948-1953 [doi]
- Response Time Analysis of the Abort-and-Restart Model under Symmetric MultiprocessingJim Ras, Albert M. K. Cheng. 1954-1961 [doi]
- Achieving Scalable Privacy Preserving Data Aggregation for Wireless Sensor NetworksRabindra Bista, Hye-Kyeom Yoo, Jae-Woo Chang. 1962-1969 [doi]
- Virtual Machine for Software Defined Radio: Evaluating the Software VM ApproachRiadh Ben Abdallah, Tanguy Risset, Antoine Fraboulet, Jerome Martin. 1970-1977 [doi]
- Real-time Non-invasive Detection of Timing-constraint Violations in Time-triggered Embedded SystemsKam L. Chan, Michael J. Pont. 1978-1986 [doi]
- Dynamic Priority Assignment Scheme for Contract-Based Resource ManagementMarisol García-Valls, Iria Estévez-Ayres, Pablo Basanta-Val. 1987-1994 [doi]
- An Algorithm of Micromouse Maze SolvingJianping Cai, Xuting Wan, Meimei Huo, Jianzhong Wu. 1995-2000 [doi]
- The Research on Teaching Method of Basics Course of Computer based on Cluster AnalysisZhiXin Tie, Rong Jin, Hong Zhuang, Zhaoqing Wang. 2001-2004 [doi]
- Study on the Industry Oriented Education for Computing of Ireland and Its ApplicationWu Tao, Chen Ya-ping, Ning Feng, Gu Xi-Qian. 2005-2009 [doi]
- Teaching Practice of Project-based VB ProgrammingHong Zhuang, Li Liu. 2010-2013 [doi]
- Research on J2EE Teaching Based on Mainstream Open Source FrameworksXiaoliang Xu, Weihua Hu. 2014-2017 [doi]
- Research and Reformation of Online Practice Oriented Teaching in Programming Foundation CourseGuiping Wang, Rui Feng. 2018-2024 [doi]
- Construction of Role-Switch Model in College Information Technology Experiment CourseNanli Zhu, Tang Yun-ting, Jianghua Xuan, Bo Guan, Man Zhao. 2025-2028 [doi]
- Applying Role-Switch Model in College Information Technology CourseNanli Zhu, Meng Cheng, Jianbo Fan, Rina Shu. 2029-2032 [doi]
- Research and Practice on Constructing the Course of Programming LanguageKaiyu Dai, Yiming Zhao, Ronghua Chen. 2033-2038 [doi]
- A Software Architecture for Adapating Virtual Reality Content to Mobile DevicesJosé Barbosa Dias Jr., Marlus Dias Silva, Alexandre Cardoso, Edgard Afonso Lamounier Jr.. 2039-2045 [doi]
- Design and Implementation of Smartphone s Efficient E-mail Client SoftwareWen-Xiang Zhang, Xuan Zhang. 2046-2051 [doi]
- Mobile Payment based on RFID-SIM CardJunwei Zou, Chu Zhang, Chongbo Dong, Chunxiao Fan, Zhigang Wen. 2052-2054 [doi]
- xFace: A Lightweight Web Application Engine on Multiple Mobile PlatformsFan Jiang, Zhigang Feng, Lei Luo. 2055-2060 [doi]
- Research on Mobile Web Applications End to End TechnologySiyu Mi, Zhijie Qiu, Lei Luo. 2061-2065 [doi]
- Decompression Method for Massive Compressed Files in Mobile Rich Media ApplicationsHouchen Li, Zhijie Qiu, Lei Luo. 2066-2071 [doi]
- Component-based Mobile Web Application of Cross-platformBiao Pan, Kun Xiao, Lei Luo. 2072-2077 [doi]
- Research on Mobile Web Application Phone SimulatorZiqiong Wang, Yanhong Peng, Lei Luo. 2078-2083 [doi]
- The Coal Mining Safety Equipment s Intelligent Monitoring and Management of Being based on the Web-environmentShu-Fang Zhao, Li-Chao Chen. 2084-2088 [doi]
- A Learning Spectrum Hole Prediction Model for Cognitive Radio SystemsZhigang Wen, Chunxiao Fan, Xiaoying Zhang, Yuexin Wu, Junwei Zou, Jie Liu. 2089-2093 [doi]
- CFCSS without Aliasing for SPARC ArchitectureChao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, Bin Li, Lin Chen, Zexu Zhang, Yuying Wang, Gang Cui. 2094-2100 [doi]
- Research on Case Learning System for Engineering Subject - Software Engineering as an ExampleZhaocheng Wang, Cheng Yang. 2101-2104 [doi]
- Industry/University Collaboration: An Effective Way to Conduct Engineering Education Towards UndergraduatesHuang Xiao Tao, Wu Chi, Li Guilan. 2105-2108 [doi]
- Applying Two New Methods to the Teaching of Computer ArchitectureZhigang Gao, Ganggang Xue, Guojun Dai, Xuehui Wei. 2109-2113 [doi]
- Technical Research of Streaming Media Video Course Development PlatformQingsheng Li, Jipeng Wang. 2114-2119 [doi]
- Discussion on the Teaching Reform of Single-chip Computer Base on Mode CDIO at Vocational CollegeBaiqing Zhou, Xiuhui Kui, Youtian Qu. 2120-2123 [doi]
- Study on Evaluation Method of Practical Teaching: A Practical Teaching Test AnalysisHaiwei Jin. 2124-2128 [doi]
- Improvement of the Optimal Hamilton Circuit for Undirected Complete GraphHua Liu, Huilai Zou, Lili Zhong, Chaonan Wang, Youtian Qu. 2129-2133 [doi]
- Non-recursive Algorithm of Tower of Hanoi ProblemFuwan Ren, Qifan Yang, Jiexin Zheng, Hui Yan. 2134-2137 [doi]
- Optimized Application and Practice of A* Algorithm in Game Map Path-FindingHuilai Zou, Lili Zong, Hua Liu, Chaonan Wang, Zening Qu, Youtian Qu. 2138-2142 [doi]
- Remainder Sign Analysis in Fixed-point DivisionXuting Wan, Jianping Cai, Qifan Yang. 2143-2147 [doi]
- The Strategy of Advancing Mobile Web Application s Layout and DrawingLiankui Qiu, Panlong He, Lei Luo. 2148-2152 [doi]
- Caching Strategy on Mobile Rich Media EngineXin Min, Jixian Zhang, Lei Luo. 2153-2156 [doi]
- Porting Mobile Web Application Engine to the Android PlatformYonghong Wu, Jianchao Luo, Lei Luo. 2157-2161 [doi]
- The Development of Online Innovative Education Program in Our UniversityWei-Hua Hu, Jiang-tao Du, Qi-li Zhou, Dao-ping Hong, Xiao-kai Wu. 2162-2165 [doi]
- Research and Practice of Experimental Teaching System for OPhone Technology CoursesJiali Bian, Jian Kuang, Xiaojun Chen, Zhiwen Nie. 2166-2169 [doi]
- Exploration on Cultivating OPhone Technology Talents in UniversitiesJian Kuang, Zhiwen Nie, Jiali Bian, Lin Han. 2170-2173 [doi]
- Micromouse Competition Training Method Based on 3D Simulation PlatformMeimei Huo, Jianzhong Wu, Jianping Cai, Bin Song. 2174-2179 [doi]
- Smartphone Software Development Course Design Based on AndroidWei Hu, Tianzhou Chen, Qingsong Shi, Xueqing Lou. 2180-2184 [doi]
- ISTS: An Integrated Simulation Training System for Education in Police CollegeShulong Li. 2185-2190 [doi]
- Promoting Multi-Core Education via Special Training and Workshop ProgramWei Hu, Tianzhou Chen, Jingwei Liu, Qingsong Shi. 2191-2195 [doi]
- Application of Concept Maps-based Anchored Instruction in Programming CourseLiu Li, Haijun Mao, Licheng Xu. 2196-2200 [doi]
- Reform and Practice in the Course ???The Principle of Computer Organization???Qifan Yang, Jianping Cai. 2201-2204 [doi]
- Reform and Practice of Programming Teaching Based on Applied Ability BuildingYong Zhang, Hui Yan. 2205-2208 [doi]
- Design of Teaching System for Computer Network Application LearningLiu Li, Tianzhou Chen, Qingsong Shi, Wei Hu. 2209-2213 [doi]
- Centralized Project-Based Teaching Approach in Database Application Development TrainingGaoyan Zhang, Haifeng Ke, Minghui Wu, Jun Liu. 2214-2217 [doi]
- The Curriculum Reform of Database System Principle Based on Paperless Examination PlatformHaifeng Ke, Gaoyan Zhang, Minghui Wu. 2218-2221 [doi]
- Research on Key Technologies of Building Home Control Based on the Wireless NetworkSi-You Xiao, Xuan Zhang. 2222-2227 [doi]
- An Innovative Course about Network Storage and System Virtualization Technologies in PKUXiaolin Wang, Xinxin Jin, Yingwei Luo, Zhenlin Wang. 2228-2232 [doi]
- Research on PID Control Algorithm of BP Network based on Two Axis Digital Control TurntableJie Hao, Wenxiang Zhang, Mingqing Ling. 2233-2238 [doi]
- The Research and Application of ???PBL Didactics??? in the Computer Network Technology CourseHaijun Mao, Li Liu. 2239-2243 [doi]
- Implementation of Virtual Machine Monitor for ARM ArchitectureAkihiro Suzuki, Shuichi Oikawa. 2244-2249 [doi]
- Virtual I/O Based on ScratchPad Memory for Embedded SystemBinbin Wu, Xiangsheng Tang, Hui Yuan, Qingsong Shi, Jiexiang Kang, Tianzhou Chen. 2250-2254 [doi]
- A Virtual Timing Device for Program Performance AnalysisWen-Chang Hsu, Shih-Hao Hung, Chia-Heng Tu. 2255-2260 [doi]
- Cache Effects of Virtual Machine Placement on Multi-Core ProcessorsWesley Emeneker, Amy W. Apon. 2261-2266 [doi]
- I/O Virtualization Architecture for SecurityJ. Lakshmi, S. K. Nandy. 2267-2272 [doi]
- Detecting and Analyzing VM-exitsXiaolin Wang, Binbin Zhang, Haogang Chen, Xinxin Jin, Yingwei Luo, Xiaoming Li, Zhenlin Wang. 2273-2277 [doi]
- Data Hiding in Virtual Machine Disk ImagesYu Su, Xiaofei Liao, Hai Jin, Tim Bell. 2278-2283 [doi]
- A Dynamic Binary Translation Framework Based on Page Fault Mechanism in Linux KernelFan Xu, Li Shen, Zhiying Wang. 2284-2289 [doi]
- Sorena: New on Chip Network Topology Featuring Efficient Mapping and Simple Deadlock Free Routing AlgorithmMajid Janidarmian, Vahhab Samadi Bokharaie, Ahmad Khademzadeh, Misagh Tavanpour. 2290-2299 [doi]
- Augmenting NoC with Naming Service for Slot-based Reconfigurable Devices on ChipLike Yan, Yuan Wen, Man Cao, Tianzhou Chen, Degui Feng. 2300-2305 [doi]
- Sparse Matrix-Vector Multiplication Based on Network-on-Chip in FPGAChi-Chia Sun, Jürgen Götze, Hong-Yuan Jheng, Shanq-Jang Ruan. 2306-2310 [doi]
- A New Specification-based Test Data Generation Strategy for OSEK OSLin Zhou, Min Yao, Yongjun Li, Chengshuo Zhang, Liujie Yao. 2311-2316 [doi]
- Project-Oriented Laboratory with Cross Platform Software Programming for Embedded System EducationWenjing Lv, Lili Ye, Zhewen Wang, Zhengguo Yang, Yikui Zhang. 2317-2322 [doi]
- PUF-based Encryption Processor for the RFID SystemsWonseok Choi, Sungsoo Kim, YongHwan Kim, Yongsoo Park, KwangSeon Ahn. 2323-2328 [doi]
- Design and Implementation of a Heterogeneous High-performance Computing Framework using Dynamic and Partial Reconfigurable FPGAsXingjun Zhang, Yanfei Ding, Yiyuan Huang, Xiaoshe Dong. 2329-2334 [doi]
- A Rectangle-Intersection Algorithm with Limited Resource RequirementsFrank Dévai, László Neumann. 2335-2340 [doi]
- Towards a Cyber-Physical Architecture for Industrial Systems via Real-Time Java TechnologyPablo Basanta-Val, Marisol García-Valls, Iria Estévez-Ayres. 2341-2346 [doi]
- A Time-Triggered Communication Protocol for CAN-based Networks with a Fault-Tolerant Star TopologyAmir Muhammad, Michael J. Pont. 2347-2354 [doi]
- Scheduling Approach for Static Segment using Hybrid Genetic Algorithm in FlexRay SystemsShan Ding. 2355-2360 [doi]
- Interpretation of AADL Behavior Annex into Synchronous Formalism Using SSAYue Ma, Jean-Pierre Talpin, Thierry Gautier. 2361-2366 [doi]
- Integer Promotion Elimination on Abstract Syntax TreeQing an Li, Yanxiang He, Lei Zhou, Wei Wu, Yong Chen. 2367-2372 [doi]
- Separating Functional and Dependability Requirements of Embedded SystemsZhe Chen, Gilles Motet. 2373-2380 [doi]
- Towards Estimating Physical Properties of Embedded Systems using Software Quality MetricsUlisses Brisolara Correa, Luís C. Lamb, Luigi Carro, Lisane B. de Brisolara, Júlio C. B. de Mattos. 2381-2386 [doi]
- FPGA-based Implementation of Efficient Sample Rate Conversion for Software Defined RadiosMuhammad Ali Siddiqi, Nabeel Samad, Shahid Masud, Faheem Sheikh. 2387-2390 [doi]
- Implementing Medical CT Algorithms on Stand-alone FPGA Based Systems Using an Efficient Workflow with SysGen and SimulinkZhiqiang Que, Yongxin Zhu, Xuan Wang, Jibo Yu, Tian Huang, Zhe Zheng, Li Yang, Feng Zhao, Yuzhuo Fu. 2391-2396 [doi]
- Tour-Guide: Providing Location-Based Tourist Information on Mobile PhonesXiaoyu Shi, Ting Sun, Yanming Shen, Keqiu Li, Wenyu Qu. 2397-2401 [doi]
- A Pervasive Temporal Error Concealment Algorithm for H.264/AVC DecoderXingang Liu, Kwanghoon Sohn, Laurence Tianruo Yang, Wei Zhu. 2402-2406 [doi]
- An Extensible Hash Function Construction Based on Embedded Chaos MapsXiaohong Zhang, Yixian Yang, Lixiang Li, Haipeng Peng. 2407-2414 [doi]
- Embedded Implementation of a SIP Server Gateway with Forward Error Correction to a Mobile NetworkI. Lopetegui, R. A. Carrasco, S. Boussakta, O. Azpitarte. 2415-2420 [doi]
- Android on Mobile Devices: An Energy PerspectiveKolin Paul, Tapas Kumar Kundu. 2421-2426 [doi]
- The Embedded Application of Wireless Short-distance Communication Technology in Vehicle Diagnosis ProcessHaijun Zhao, Yikui Zhang. 2427-2432 [doi]
- Low Effort Evaluation of Real-Time and Reliability Requirements for Embedded SystemsRalf Mitsching, Carsten Weise, Thomas Gatterdam, Stefan Kowalewski. 2433-2440 [doi]
- A Novel Power Tuning Anchors Localization Algorithm for Mobile Wireless Sensor NodesSohail Jabbar, Muhammad Zubair Aziz, Abid Ali Minhas, Danial Hussain. 2441-2446 [doi]
- Private and Secure Service Discovery Using Incrementally Progressive Exposure and Random MatchZhong Yuan Li, Sung-Keun Song, Sukjung Yong, Hee Yong Youn. 2447-2454 [doi]
- EBDA: An Effective Bottom-up Discretization Algorithm for Continuous AttributesYu Sang, Keqiu Li, Yanming Shen. 2455-2462 [doi]
- A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor NetworksRabindra Bista, Hye-Kyeom Yoo, Jae-Woo Chang. 2463-2470 [doi]
- Robust H.264/AVC Video Transmission using Data Partitioning and Unequal Loss ProtectionXingjun Zhang, Xiaohong Peng, Scott Fowler, Dajun Wu. 2471-2477 [doi]
- Dynamic Load Balancing in Parallel KD-Tree k-MeansGiuseppe Di Fatta, David Pettinger. 2478-2485 [doi]
- System Design of a Super-Peer Network for Content-Based Image RetrievalSahar M. Ghanem, Mohamed A. Ismail, Samia G. Omar. 2486-2493 [doi]
- A Hierachical VoIP System Based on Peer-to-Peer SIP: A Manageable ApproachLinchen Yu, Xiaofei Liao, Hai Jin, Pengcheng Qin. 2494-2500 [doi]
- A Rental-Based Approach in a Cluster or a Grid EnvironmentAmril Nazir, Hao Liu, Søren-Aksel Sørensen. 2501-2508 [doi]
- A Novel Approach for Finding Candidate Locations for Online FPGA PlacementW. Hu, C. Wang, J. L. Ma, T. Z. Chen, D. Chen. 2509-2515 [doi]
- Network Main Memory Architecture for NoC-Based ChipsXingsheng Tang, Binbin Wu, Tianzhou Chen, Wei Hu, Jiexiang Kang, Zhenwei Zheng. 2516-2523 [doi]
- A Framework for Sharing Heterogeneous Grid Resources in a Campus EnvironmentTiejun Ma, Xin Xiong, David Wallom. 2524-2531 [doi]
- Understanding Resource Provisioning for ClimatePrediction.netMalik Shahzad Kaleem Awan, Stephen A. Jarvis. 2532-2539 [doi]
- An Extended SNMP-based Management of Digital Convergence DevicesGil Heo, Eunhoe Kim, Jaeyoung Choi. 2540-2547 [doi]
- Collusion Detection and Prevention with FIRE+ Trust and Reputation ModelBasit Qureshi, Geyong Min, Demetres D. Kouvatsos. 2548-2555 [doi]
- On the Study of Radio Resource Allocation of Heterogeneous Services with Soft QoS Traffics in OFDMA-based Wireless NetworksXing Zhang, Lei Fu, Xin Wu, Wenbo Wang. 2556-2561 [doi]
- Queue Analysis of Finite Buffer for Self-Similar Traffic in Three-node Cooperative Relay Wireless NetworksJing Xiao, Xiaodong Ji, Xing Zhang, Shuping Chen, Wenbo Wang. 2562-2569 [doi]
- Bargaining Game and Cross-layer Design Based Optimization Strategy in Wireless Multi-hop NetworkXinyu Chen, Li Xu, Jie Li. 2570-2575 [doi]
- Research on Performance Estimation Model of Distributed Network Simulation Based on PDNS Conservative Synchronization Mechanism in Complex EnvironmentYu Xiangzhan, Wu Gang, Jin Dailiang, Li Wei. 2576-2580 [doi]
- Investigation of PHY, MAC and APP Layers for Adaptive and Cross-Layer Optimization in IEEE802.11 WLANMirghiasaldin Seyedebrahimi, Xiao-Hong Peng. 2581-2588 [doi]
- An Efficient VoD Scheme Providing Service Continuity for Mobile IPTV in Heterogeneous NetworksSun Sik Park, Myung Jin Hwang, Sung Soo Moon, Hee Yong Youn. 2589-2595 [doi]
- Multi-Phase Correlator-based Realistic Clock Synchronization for Wireless Networks on IEEE 802.15.4Hyuntae Cho, Hyunsung Jang, Yunju Baek. 2596-2603 [doi]
- Implementation of a PTP Bridge to Extend IEEE 1588 to Zigbee NetworksHyuntae Cho, Youngwoo Jin, Jusik Heo, Yunju Baek. 2604-2611 [doi]
- P2P-TV Service and User CharacterizationJose Mendes, Paulo Salvador, António Nogueira. 2612-2620 [doi]
- A Novel Routing Algorithm for Achieving Static Fault-Tolerance in 2-D MeshesF. Safaei, A. Mortazavi. 2621-2627 [doi]
- SAFE: A Secure Area of Interests Filter for P2P-based MMOGsJianan Hao, Suiping Zhou. 2628-2634 [doi]
- Implementation and Performance for Lawful Intercept of VoIP Calls based on SIP Session Border ControllerMenghui Yang, Hua Liu, Tonghong Li. 2635-2642 [doi]
- Prediction Model for Tiered Accuracy Requirements in Large-scale Object Tracking Sensor NetworksGuangcheng Qin, Panlong Yang, Qiang Chen, Hao Yin, Kai Lin. 2643-2648 [doi]
- Cross-layer Design for Multiuser OFDMA Systems with Cooperative Game and MMPP Queuing ConsiderationsIlias G. Nikolaros, Charilaos C. Zarakovitis, Dionysios Skordoulis, Marios G. Hadjinicolaou, Qiang Ni. 2649-2654 [doi]
- Performance Analysis of Secondary Users in Dynamic Spectrum Access under Interference Temperature ConstraintsZhi Yan, Xing Zhang, Wenbo Wang. 2655-2661 [doi]
- A New Link Lifetime Prediction Method for Greedy and Contention-based Routing in Mobile Ad Hoc NetworksHadi Noureddine, Qiang Ni, Geyong Min, Hamed S. Al-Raweshidy. 2662-2667 [doi]
- Fair Early Drop: An Active Queue Management Scheme for the Control of Unresponsive FlowsGhadah Aldabbagh, Miguel Rio, Izzat Darwazeh. 2668-2675 [doi]
- A New Approach in Improving Operational Efficiency of Wireless Response SystemJoan Lua, Zhaozong Meng, Gehao Lu, John B. Stav. 2676-2683 [doi]
- Performance of Structure Based Multicast Routing Protocols in Wireless Ad hoc NetworksM. Bala Krishna, M. N. Doja. 2684-2691 [doi]
- Impacts of Inaccurate Information on Resource Allocation for Multi-Core Embedded SystemsJiayin Li, Meikang Qiu, Jianwei Niu, Meiqin Liu, Bin Wang, Jingtong Hu. 2692-2697 [doi]
- On Post-Generation Data Operations in Secure Distributed Storage Systems with Internal PaddingFeng Shen, Hai Jiang, Zhiqian Xu. 2698-2705 [doi]
- Distributed Lock Manager for Distributed File System in Shared-Disk EnvironmentSung Chune Choi, Minseuk Choi, Chunkyeong Lee, Hee Yong Youn. 2706-2713 [doi]
- An Asymmetric Data Conversion Scheme based on Binary TagsZhu Wang, Chonglei Mei, Hai Jiang, Gregory A. Wilkin. 2714-2721 [doi]
- A Synthesized Data Mining Algorithm Based on Clustering and Decision TreeDan Ji, Jianlin Qiu, Xiang Gu, Li Chen, Peng He. 2722-2728 [doi]
- Hybrid OpenCL: Connecting Different OpenCL Implementations over NetworkRyo Aoki, Shuichi Oikawa, Ryoji Tsuchiyama, Takashi Nakamura. 2729-2735 [doi]
- SAMR: A Self-adaptive MapReduce Scheduling Algorithm in Heterogeneous EnvironmentQuan Chen, Daqiang Zhang, Minyi Guo, Qianni Deng, Song Guo. 2736-2743 [doi]
- A Framework for Performance Evaluation of Large-scale Interactive Distributed Virtual EnvironmentsDuong Ta, Thang Nguyen, Suiping Zhou, Xueyan Tang, Wentong Cai, Rassul Ayani. 2744-2751 [doi]
- Service Level Agreements in a Rental-based SystemAmril Nazir, Hao Liu, Søren-Aksel Sørensen. 2752-2759 [doi]
- Distributed On-Chip Operating System for Network on ChipWei Hu, Jianliang Ma, Binbin Wu, Lihan Ju, Tianzhou Chen. 2760-2767 [doi]
- Dynamic Reconfigurable Networks in NoC for I/O Supported Parallel ApplicationsJ. L. Ma, C. Wang, Y. Wen, T. Z. Chen, W. Hu, J. Chen. 2768-2775 [doi]
- Predictive and Dynamic Resource Allocation for Enterprise ApplicationsM. Al-Ghamdi, Adam P. Chester, Stephen A. Jarvis. 2776-2783 [doi]
- Spectrum Usage Prediction Based on High-order Markov Model for Cognitive Radio NetworksYang Li, Yu-ning Dong, Hui Zhang, Hai-tao Zhao, Hai-xian Shi, Xin-xing Zhao. 2784-2788 [doi]
- Synchronization in Wireless Local Area Networks for Practical MIMO OFDM systemsMuhammad Khurram Kiyani, Muhammad Usman Ahmed, Asim Loan. 2789-2792 [doi]
- Impact of Scatterer Density on the Performances of Double-Scattering MIMO ChannelsG.-C. Zhang, X.-H. Peng, X.-Y. Gu. 2793-2799 [doi]
- Minimum Node Degree and Connectivity of Two-dimensional MANETs under Random Waypoint Mobility ModelHuihui Xiang, Jiakang Liu, Jingming Kuang. 2800-2805 [doi]
- Semantic Video Adaptation using a Preprocessing Method for Mobile EnvironmentHong-jie Huang, Xingming Zhang, Zhi-Wei Xu. 2806-2810 [doi]
- An Efficient Collaborative Traceback Scheme Based on Packet Digests LoggingDong Yan, Yulong Wang, Sen Su, Fangchun Yang. 2811-2815 [doi]
- An Efficient Group Signature Scheme in Ferry-Based Delay-Tolerant NetworksZiming Song, Chunqing Wu, Zhu Tang. 2816-2821 [doi]
- The Research of Component-Based Dependable Software DevelopmentBo Deng, Shuanghui Yi. 2822-2824 [doi]
- Mix-zones Deployment for Location Privacy Preservation in Vehicular CommunicationsYipin Sun, Xiangyu Su, BaoKang Zhao, Jinshu Su. 2825-2830 [doi]
- Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor NetworksWeini Zeng, Yaping Lin, Lei Wang. 2831-2836 [doi]
- A Distributed Query Protocol for Continuous Privacy Preserving in Wireless Sensor NetworksBaoKang Zhao, Xiangyu Su, Yipin Sun, Jinshu Su, Shanshan Li. 2837-2842 [doi]
- Towards Detecting the Interaction Vulnerabilities in Large Distributed SystemJinjing Zhao, Gang Zhao, Yan Wen, Xiang Li. 2843-2848 [doi]
- Analyzing and Correlating Security Events Using State MachineXuewei Feng, Dongxia Wang, Jiemei Zeng, Guoqing Ma, Jin Li. 2849-2854 [doi]
- Reliable Hybrid Service Discovery Protocol in Mobile Ad-Hoc GridAskari Parichehreh, Bahman Javadi, Mehdi Sarikhani, Fereshte Momeni. 2855-2860 [doi]
- Query-based Energy-aware Protocol for Real-time Routing in Wireless Sensor NetworkAbid Ali Minhas, Sohail Jabbar, Raja Adeel Akhtar, Waiser Mehmood. 2861-2866 [doi]
- Model Checking of a Target Tracking Protocol for Wireless Sensor NetworksSania Bhatti, Jie Xu, Mohsin Memon. 2867-2872 [doi]
- Context-awareness in Battlefield using Ubiquitous Computing: Network Centric WarfareYong-Woon Moon, Hae-Sun Jung, Chang-Sung Jeong. 2873-2877 [doi]
- An Extensible Sensor based Inferencing Framework for Context Aware ApplicationsHenry Bruce, Giuseppe Raffa, Louis Legrand, Jonathan Huang, Bernie Keany, Rick Edgecombe. 2878-2883 [doi]
- Efficient Localized Detection of Erroneous Nodes (ELDEN)Ralf Behnke, Jakob Salzmann, Stephan Simanowski, Dirk Timmermann. 2884-2890 [doi]
- Tessellating Cell Shapes for Geographical ClusteringJakob Salzmann, Ralf Behnke, Dirk Timmermann. 2891-2896 [doi]
- A Reconfigurable Processor Architecture Combining Multi-core and Reconfigurable Processing UnitLike Yan, Binbin Wu, Yuan Wen, Shaobin Zhang, Tianzhou Chen. 2897-2902 [doi]
- Tree-Based Task Scheduling Model and Dynamic Load-Balancing Algorithm for P2P ComputingWeiwei Lin, Wuyao Shen. 2903-2907 [doi]
- Evaluating the Performance and Accuracy Impact of Trace Generation to the BigSim EmulatorYonggang Che, Chuanfu Xu, Pingjing Lu. 2908-2913 [doi]
- A Study on XML and Ontology-based Web Data IntegrationYan-heng Li, Jin Zhang, Ying Peng. 2914-2919 [doi]
- iLife: A Novel Mobile Social Network Services on Mobile PhonesTing Sun, Xiaoyu Shi, Yanming Shen, Keqiu Li, Wenyu Qu. 2920-2924 [doi]
- Consistency Aware Dead Reckoning Threshold Tuning with Server Assistance in Client-Server-Based DVEsYusen Li, Wentong Cai. 2925-2932 [doi]
- Comparative Performance Evaluation of Non-Contiguous Allocation Algorithms in 2D Mesh-Connected MulticomputersSaad Bani-Mohammad, Ismail Ababneh, Mazen Hamdan. 2933-2939 [doi]
- Minimization Algorithm of Unate Logic FunctionsJianlin Qiu, Xiang Gu, Fen Li, Dan Ji, Peng He. 2940-2945 [doi]
- cCell: A S2S Compiler with Profiling Support for the Cell BE ArchitectureXiuxiu Bai, Xingjun Zhang, Guofu Feng, Jinghua Feng, Xiaoshe Dong. 2946-2951 [doi]
- Cross Comparison on C Compilers Reliability Impact on UNIX Based Fedora OSAnil Kumar Karna, Hengming Zou. 2952-2957 [doi]
- Toward an Automatic Load Balanced Distribution Model in Conjugate Gradient Method for One-Dimensional One-Phase Oil Reservoir SimulationLeila Ismail, J. H. Abou-Kassem. 2958-2963 [doi]
- A Federated Broker Architecture for Large Scale Context DisseminationSaad Liaquat Kiani, Michael Knappmeyer, Nigel Baker, Boris Moltchanov. 2964-2969 [doi]
- User Centred Mobile Aided Learning System: Student Response System (SRS)Joan Lu, Raoul Pascal Pein, Gabrielle Hansen, Kjetil L. Nielsen, John B. Stav. 2970-2975 [doi]
- A Scalable, Bidirectional-Based Search Strategy to Generate Attack GraphsJunchun Ma, Yongjun Wang, Jiyin Sun, Xiaofeng Hu. 2976-2981 [doi]
- An Efficient Search Mechanism in Unstructured P2P Networks Based on Semantic GroupWenwu Shen, Sen Su, Kai Shuang, Fangchun Yang, Jingshu Xia. 2982-2986 [doi]