Abstract is missing.
- Effect of unstable routing in location-aware mobile ad hoc networks on a geographic DHT protocolDae Woong Kim, Woo-Ram Park, Chan-Ik Park. 1-8 [doi]
- A faster closure algorithm for pattern matching in partial-order event dataMatthew Nichols, David Taylor. 1-9 [doi]
- SWEVM: a software EVM for embedded system programmingJian-Hong Liu, Jing Chen, Chen-Yung Wang. 1-7 [doi]
- The design of effective low cost embedded processor development kits for supporting take-home self-practice pedagogiesNicholas Vun, Wooi-Boon Goh. 1-7 [doi]
- Issues and challenges of embedded processor education for working professionalsNicholas Vun, Wooi-Boon Goh. 1-8 [doi]
- A dual-time vector clock based synchronization mechanism for key-value data in the SILENUS file systemMax Berger, Michael W. Sobolewski. 1-8 [doi]
- Early containment of worms using dummy addresses and connection trace backTaro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada. 1-8 [doi]
- Design methodology and hands-on practices for Embedded Operating SystemsYu-Lun Huang, Jwu-Sheng Hu. 1-6 [doi]
- Virtualization aware job schedulers for checkpoint-restartR. Badrinath, R. Krishnakumar, R. K. Palanivel Rajan. 1-7 [doi]
- Using synchronized atoms to check distributed programsHon Fung Li, Eslam Al Maghayreh. 1-8 [doi]
- Performance analysis on mobile agent-based parallel information retrieval approachesWenyu Qu, Masaru Kitsuregawa, Keqiu Li. 1-8 [doi]
- An Embedded Systems graduate education for SingaporeIan McLoughlin, Douglas L. Maskell, Thambipillai Srikanthan, Wooi-Boon Goh. 1-5 [doi]
- Embedded education for Computer Rank ExaminationTianzhou Chen, Weihua Hu, Qingsong Shi, Hui Yan. 1-4 [doi]
- Teaching complete embedded systems design process with graphical system design methodologiesShekhar Sharad, Karl Muecke. 1-6 [doi]
- Virtual Exclusion: An architectural approach to reducing leakage energy in caches for multiprocessor systemsMrinmoy Ghosh, Hsien-Hsin S. Lee. 1-8 [doi]
- Analytical modelling of communication in the rectangular mesh NoCMahmoud Moadeli, Alireza Shahrabi, Wim Vanderbauwhede. 1-8 [doi]
- Persistence and communication state transfer in an asynchronous pipe mechanismPhilip Chan, David Abramson. 1-8 [doi]
- Performance study of data stream approximation algorithms in wireless sensor networksYing Li, Seng W. Lokey, M. V. Ramakrishna. 1-8 [doi]
- ADENS: Efficient address determination for mobile gridsNian-Feng Tzeng, Hongyi Wu, Gui Liang Feng. 1-8 [doi]
- Adaptive computation offloading for energy conservation on battery-powered systemsChangjiu Xian, Yung-Hsiang Lu, Zhiyuan Li. 1-8 [doi]
- ECHoP2P: Emergency call handling over peer-to-peer overlaysKalman Graffi, Aleksandra Kovacevic, Kyra Wulffert, Ralf Steinmetz. 1-10 [doi]
- Scheduling algorithm for multi-item requests with time constraints in mobile computing environmentsJun Chen, Ganping Huang, Victor C. S. Lee. 1-7 [doi]
- Message from P2P-NVE Program ChairJehn-Ruey Jiang. 1 [doi]
- A push-based prefetching for cooperative caching RAM GridRui Chu, Nong Xiao, Lei Chen 0002, Xicheng Lu. 1-8 [doi]
- Network energy consumption in ad-hoc networks under different radio modelsTao Yang, Leonard Barolli, Makoto Ikeda, Arjan Durresi, Fatos Xhafa. 1-8 [doi]
- RTMG: Scheduling real-time distributable threads in large-scale, unreliable networks with low message overheadKai Han, Binoy Ravindran, E. Douglas Jensen. 1-8 [doi]
- Optimization on distributed user management in Wireless Sensor NetworksMingJian Tang, Jinli Cao. 1-8 [doi]
- Resource reclamation using meta-events in a real time java systemCedric Curcio, Serge Midonnet. 1-6 [doi]
- An MCU description methodology for initialization code generation softwareYunfei Bai, Chng Eng Siong, Gorthi Prashant Bhanu. 1-7 [doi]
- Diameter bounds of cubelike recursive networksZhoujun Li, Yun Sun, Deqiang Wang. 1-8 [doi]
- LORM: Supporting low-overhead P2P-based range-query and multi-attribute resource management in gridsHaiying (Helen) Shen, Amy W. Apon, Cheng-Zhong Xu. 1-8 [doi]
- CAVENET: Description and analysis of a toolbox for vehicular networks simulationGiuseppe De Marco, Masaharu Tadauchi, Leonard Barolli. 1-6 [doi]
- Ants vs. faults: A swarm intelligence approach for diagnosing distributed computing networksMourad Elhadef, Amiya Nayak, Ni Zeng. 1-8 [doi]
- Secure random number agreement for peer-to-peer applicationsAmy Beth Corman, Peter Schachte, Vanessa Teague. 1-8 [doi]
- Communication performance of a modular high-bandwidth multiprocessor systemFong Pong, Nian-Feng Tzeng, Koray Öner, Chun Ning, Kwong-Tak Chui, Manoj Ekbote, Yanping Lu. 1-8 [doi]
- Efficient search in file-sharing networksPaul Burstein, Alan Jay Smith. 1-9 [doi]
- Minimum-delay energy-efficient source to multisink routing in wireless sensor networksShun-Yu Chuang, Chien Chen, Chang-Jie Jiang. 1-8 [doi]
- Federated clusters using the transparent remote Execution (TREx) environmentRichert Wang, Enrique Cauich, Isaac D. Scherson. 1-8 [doi]
- Parallel Minimum Spanning Tree Heuristic for the steiner problem in graphsHoda Akbari, Zeinab Iranmanesh, Mohammad Ghodsi. 1-8 [doi]
- Peer-to-Peer AOI voice chatting for massively multiplayer online gamesJehn-Ruey Jiang, Hung-Shiang Chen. 1-8 [doi]
- RAASP: Resource allocation analysis service and portalRoger Curry, Cameron Kiddle, Rob Simmonds. 1-8 [doi]
- Message from the general chairLionel M. Ni. 1 [doi]
- A Voronoi dEtection Range Adjustment (VERA) approach for energy saving of wireless sensor networksHung-Chin Jang, Hon-Chung Lee. 1-7 [doi]
- Evaluation and modeling of power consumption of a heterogeneous dual-core processorChun-Hao Hsu, Jian Jhen Chen, Shiao Li Tsao. 1-8 [doi]
- Message from the program chairChung-Ta King. 1 [doi]
- A clustering model for memory resource sharing in large scale distributed systemRui Chu, Nong Xiao, Xicheng Lu. 1-8 [doi]
- A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environmentThanukrishnan Srinivasan, R. Balakrishnan, S. A. Gangadharan, V. Hayawardh. 1-8 [doi]
- Lifetime analysis of the logical topology constructed by homogeneous topology control in wireless mobile networksAbbas Nayebi, Hamid Sarbazi-Azad. 1-8 [doi]
- A QoS-aware service selection algorithm for multimedia service overlay networksWenzhong Li, Yilin Wang, Chunhong Li, Sanglu Lu, Daoxu Chen. 1-8 [doi]
- Embedding cycles and paths in a k-ary n-cubeSun-Yuan Hsieh, Tsong-Jie Lin. 1-7 [doi]
- Conditional edge-fault-tolerant Hamiltonian cycle embedding of star graphsSun-Yuan Hsieh, Chang-De Wu, Chao-Wen Huang. 1-8 [doi]
- A curriculum design on embedded system education for first-year graduate studentsJing Chen, Hui-Ming Su, Jian-Horng Liu. 1-6 [doi]
- Directions for Peer-to-Peer based mobile pervasive augmented reality gamingChao Huang, Aaron Harwood, Shanika Karunasekera. 1-8 [doi]
- Sharing information of three-dimensional geographic locations through mobile devicesCheng-Lung Lin, Xin-Zhong Chen, Kuan-Ju Lin, Shiao Li Tsao. 1-8 [doi]
- An integration platform for developing digital life applicationsChing-Shine Hwang, Tzuu-Shaang Wey, Yuan-Hung Lo. 1-2 [doi]
- Message from APESER organization committeeShiao Li Tsao, Tai-Yi Huang, John Kar-kin Zao, Jogesh K. Muppala, Chi-Sheng Shih. 1 [doi]
- Prohibition-based MAC protocols for QoS-enhanced mesh networks and high-throughput WLANsChi-Hsiang Yeh, Richard Wu. 1-5 [doi]
- Grid scheduling simulations with GSSIMKrzysztof Kurowski, Jarek Nabrzyski, Ariel Oleksiak, Jan Weglarz. 1-8 [doi]
- Linux as a teaching aid for embedded systemsIan McLoughlin, Anton J. R. Aendenroomer. 1-8 [doi]
- SSEST: Summer school on embedded system technologiesYutaka Matsubara, Midori Sugaya, Ittetsu Taniguchi, Yasuaki Murakami, Hayato Kanai, Hiroaki Takada. 1-8 [doi]
- Statistical trust establishment in wireless sensor networksMatthew J. Probst, Sneha Kumar Kasera. 1-8 [doi]
- Comparative evaluation of the non-contiguous processor allocation strategies based on a real workload and a stochastic workload on multicomputersSaad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie. 1-7 [doi]
- A dual scale heterogeneous organizational network modelXudong Liu, Xiaoxuan Ma, Jun Han, Xuelian Lin. 1-8 [doi]
- Stepping-stone detection algorithm based on order preserving mappingYing-Wei Kuo, Shou-Hsuan Stephen Huang. 1-8 [doi]
- Improving quality-of-service of file migration policies in high-performance serversNathaniel Pettis, Yung-Hsiang Lu. 1-8 [doi]
- Fault-free Hamiltonian cycles in locally twisted cubes under conditional edge faultsSun-Yuan Hsieh, Chang-yu Wu, Chia-Wei Lee. 1-8 [doi]
- New power aware routing algorithm for MANETs using gateway nodeG. Varaprasad. 1-4 [doi]
- A two-tier semantic overlay network for P2P searchTao Gu, Daqing Zhang, Hung Keng Pung. 1-8 [doi]
- From ISA to application design via RTOS— a course design framework for embedded softwarePao-Ann Hsiung, Shang-Wei Lin. 1-6 [doi]
- Subscription-aware publish/subscribe tree construction in mobile ad hoc networksXiang Cao, Chien-Chung Shen. 1-9 [doi]
- Optimizing resource allocation for multiple concurrent jobs in grid environmentSarbani Roy, Madhulina Sarkar, Nandini Mukherjee. 1-8 [doi]
- An FPGA implementation of a snoop cache with synchronization for a multiprocessor system-on-chipAkira Yamawaki, Masahiko Iwane. 1-8 [doi]
- Morphisms from IEEE 802.11 DCF specifications to its EDCA QoS practice with cross-layer interfaceChao-Lieh Chen. 1-8 [doi]
- Novel critical-path based low-energy scheduling algorithms for heterogeneous multiprocessor real-time embedded systemsYanhong Liu, Bharadwaj Veeravalli, Sivakumar Viswanathan. 1-8 [doi]
- Scalable networked virtual environments using unstructured overlaysSandeep K. Singhal. 1-8 [doi]
- S/Kademlia: A practicable approach towards secure key-based routingIngmar Baumgart, Sebastian Mies. 1-8 [doi]
- Message from the honorary chairWen-Tsuen Chen. 1 [doi]
- Supporting deadline monotonic policy over 802.11 average service time analysisInès El Korbi, Leïla Azouz Saïdane. 1-8 [doi]
- On the relative value of local scheduling versus routing in parallel server systemsRong Wu, Douglas G. Down. 1-9 [doi]
- A scheduling algorithm for revenue maximisation for cluster-based Internet servicesJames Wen Jun Xue, Ligang He, Stephen A. Jarvis. 1-8 [doi]
- Toward ubiquitous searchingMiaomiao Wang, Jiannong Cao, Yan Sun, Jing Li. 1-8 [doi]
- Cost evaluation on secure routing over powerlines for WMNsSuk Yu Hui, Kai Hau Yeung, Kin Yeung Wong. 1-7 [doi]
- Teaching embedded systems software: The HKUST experienceJogesh K. Muppala, Zonghua Gu, S. C. Cheung. 1-6 [doi]
- Data representations for mobile devicesHenry Larkin. 1-6 [doi]
- A Peer-To-Peer platform for simulating distributed virtual environmentsSilvia Rueda, Pedro Morillo, Juan M. Orduña. 1-8 [doi]
- Delay sensitive identity protection in peer-to-peer online gaming environmentsAaron Harwood, Santosh Kulkani. 1-6 [doi]
- A fast joining operation for highly dynamic chord systemXiao-Jin Ren, Guo-An Wang, Zhi-Min Gu, Zhi-Wei Gao. 1-5 [doi]
- Design of a dynamic distributed mobile computing environmentWen-Yew Liang, Yu-Ming Hsieh, Zong-Ying Lyu. 1-8 [doi]
- Effect of number of faults on NoC power and performanceMahdiar Hosein Ghadiry, Mahdieh Nadi Senjani, M. T. Manzuri-Shalmani, Dara Rahmati. 1-9 [doi]
- Message from PMAC-2WN Program Co-ChairsAli Shahrabi, Irfan Awan. 1 [doi]
- Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETsAbdalla M. Hanashi, Aamir Siddique, Irfan Awan, Michael E. Woodward. 1-6 [doi]
- A group-based multi-channel MAC protocol for wireless ad hoc networksYung-Da Cheng, Jang-Ping Sheu. 1-8 [doi]
- Access point selection algorithms for maximizing throughputs in wireless LAN environmentAkihiro Fujiwara, Yasuhiro Sagara, Masahiko Nakamura. 1-8 [doi]
- Formal verification of concurrent scheduling strategies using TLAGudmund Grov, Greg Michaelson, Andrew Ireland. 1-6 [doi]
- CrossTree: A new HTC architecture with high reliability and scalabilityXiaoguang Liu, Meng Yu, Gang Wang, Jing Liu. 1-7 [doi]
- Design and analysis of a low power wireless portable media playerWen-Yew Liang, Hung-Che Lee, Yang-Lang Chang, Jyh Perng Fang, Jywe-Fei Fang. 1-7 [doi]
- Enhanced resource management capabilities using standardized job management and data access interfaces within UNICORE GridsM. Shahbaz Memon, A. Shiraz Memon, Morris Riedel, Bernd Schuller, Daniel Mallmann, Bastian Tweddell, Achim Streit, Sven van den Berghe, David F. Snelling, Vivian Li, Moreno Marzolla, Paolo Andreetto. 1-6 [doi]
- Mathematical performance analysis of product networksReza Moraveji, Hamid Sarbazi-Azad. 1-8 [doi]
- Accelerating 3-D capacitance extraction in deep sub-micron VLSI design using vector/parallel computingNima Shahbazi, Hamid Sarbazi-Azad. 1-8 [doi]
- Efficient generation of stream programs from loopsXuejun Yang, Yu Deng, Xiaobo Yan, Li Wang, Jing Du, Ying Zhang. 1-8 [doi]
- Privacy-preserving logical vector clocks using secure computation techniquesFlorian Kerschbaum, Julien Vayssière. 1-8 [doi]
- Computation and communication schedule optimization for jobs with shared dataEn-Jan Chou, Pangfeng Liu, Jan-Jan Wu. 1-8 [doi]
- Energy-efficient anonymous multicast in mobile ad-hoc networksJung-Chun Kao, Radu Marculescu. 1-8 [doi]
- Comparative evaluation of multi-core cache occupancy strategiesFeiqi Su, Xudong Shi, Gang Liu, Ye Xia, Jih-Kwon Peir. 1-8 [doi]
- FairTrust: Toward secure and high performance P2P networksHaiying (Helen) Shen, Yingwu Zhu. 1-8 [doi]
- A comparative study on Peer-to-Peer failure rate estimationLei Ni, Aaron Harwood. 1-7 [doi]
- Speculative and distributed simulation of many-particle collision systemsRuipeng Li, Hai Jiang, Hung-Chi Su, Bin Zhang, Jeff Jenness. 1-8 [doi]
- Optimizing Katsevich image reconstruction algorithm on multicore processorsEric Fontaine, Hsien-Hsin S. Lee. 1-8 [doi]
- Vision-based fuzzy 8051 surveillance systems designHsuan-Ming Feng, Chih-Yung Chen, Chia-Yun Wu. 1-2 [doi]
- On the teaching of embedded Linux systemSung-Yuan Ko. 1-2 [doi]
- A forwarding model for Voronoi-based Overlay NetworkJui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun Hu. 1-7 [doi]
- Loop recreation for thread-level speculationLin Gao 0002, Lian Li 0002, Jingling Xue, Tin-Fook Ngai. 1-10 [doi]
- P2P-based geometric computation method for extracting ROI from ubiquitous video camerasRyo Nishide, Masaaki Ohnishi, Shinji Tsuboi, Shinichi Ueshima. 1-8 [doi]
- A weighted interference estimation scheme for interface switching wireless mesh networksYunxia Feng, Minglu Li, Min-You Wu. 1-8 [doi]
- Extending GridSim with an architecture for failure detectionAgustín C. Caminero, Anthony Sulistio, Blanca Caminero, Carmen Carrión, Rajkumar Buyya. 1-8 [doi]
- A new MAC protocol design for long-term applications in wireless sensor networksYunhuai Liu, Lionel M. Ni. 1-8 [doi]
- Finding candidate spots for replica servers based on demand fluctuationMasato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono. 1-10 [doi]
- Message from SRMPDS Program ChairRajkumar Kettimuthu. 1 [doi]
- A Legal Information flow (LIF) scheduler for distributed systemsTomoya Enokido, Makoto Takizawa. 1-8 [doi]
- Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approachesGang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu. 1-8 [doi]
- A semantic overlay network for unstructured peer-to-peer protocolsJunfeng Xie, Zhenhua Li, Guihai Chen. 1-8 [doi]
- Ksensor: Multithreaded kernel-level probe for passive QoS monitoringAlejandro Muñoz, Armando Ferro, Fidel Liberal, Javier Lopez. 1-8 [doi]
- On incorporating an on-line strip packing algorithm into elastic Grid reservation-based systemsAnthony Sulistio, Kyong Hoon Kim, Rajkumar Buyya. 1-8 [doi]
- Scheduling multiple divisible loads on a linear processor networkMatthieu Gallet, Yves Robert, Frédéric Vivien. 1-8 [doi]
- Parallel algorithms for chains and anti-chains of points on a planeGur Saran Adhar. 1-7 [doi]
- Modeling and analysis of regional registration based mobile multicast service managementIng-Ray Chen, Ding-Chau Wang. 1-6 [doi]
- Extended Prefix Hash Trees for a distributed phone book applicationFabian Stäber, Gerald Kunzmann, Jörg P. Müller. 1-8 [doi]
- Mining temporal mobile sequential patterns in location-based service environmentsVincent S. Tseng, Eric Hsueh-Chan Lu, Cheng-Hsien Huang. 1-8 [doi]
- Parallel association rule mining based on FI-growth algorithmBundit Manaskasemsak, Nunnapus Benjamas, Arnon Rungsawang, Athasit Surarerks, Putchong Uthayopas. 1-8 [doi]
- A cooperative game theoretical replica placement techniqueSamee Ullah Khan, Ishfaq Ahmad. 1-8 [doi]