Abstract is missing.
- A Discrete Event Simulation Model for Understanding Kernel Lock Thrashing on Multi-core ArchitecturesYan Cui, Weiyi Wu, Yingxin Wang, Xufeng Guo, Yu Chen, Yuanchun Shi. 1-8 [doi]
- Privacy Protection in Participatory Sensing Applications Requiring Fine-Grained LocationsKai Dong, Tao Gu, XianPing Tao, Jian Lu. 9-16 [doi]
- A Scheduling Method for Avoiding Kernel Lock Thrashing on Multi-coresYan Cui, Weida Zhang, Yu Chen, Yuanchun Shi. 17-26 [doi]
- Towards a P2P Cloud: Reliable Resource Reservations in Unreliable P2P SystemsKalman Graffi, Dominik Stingl, Christian Gross, Hoang Nguyen, Aleksandra Kovacevic, Ralf Steinmetz. 27-34 [doi]
- GMH: A Message Passing Toolkit for GPU ClustersJie Chen, William A. Watson III, Weizhen Mao. 35-42 [doi]
- An Effective Framework of Light-Weight Handling for Three-Level Fine-Grained Recoverable Temporal Violations in Scientific WorkflowsXiao Liu, Zhiwei Ni, Zhangjun Wu, Dong Yuan, Jinjun Chen, Yun Yang. 43-50 [doi]
- Resilient Virtual Network Service Provision in Network Virtualization EnvironmentsYang Chen, Jianxin Li, Tianyu Wo, Chunming Hu, Wantao Liu. 51-58 [doi]
- Towards a Common Interface for Overlay Network SimulatorsChristian Gross, Max Lehn, Dominik Stingl, Aleksandra Kovacevic, Alejandro P. Buchmann, Ralf Steinmetz. 59-66 [doi]
- VMGuard: An Integrity Monitoring System for Management Virtual MachinesHaifeng Fang, Yiqiang Zhao, Hongyong Zang, H. Howie Huang, Ying Song, Yuzhong Sun, Zhiyong Liu. 67-74 [doi]
- Detection of Behavioral Contextual Properties in Asynchronous Pervasive Computing EnvironmentsYu Huang 0002, Jianping Yu, Jiannong Cao, XianPing Tao. 75-82 [doi]
- Utilizing RF Interference to Enable Private Estimation in RFID SystemsLei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo Li, Qingsong Yao, Ying Chen, Xiao Zhong. 83-90 [doi]
- Automatic Thread Decomposition for Pipelined MultithreadingYuanming Zhang, Kanemitsu Ootsu, Takashi Yokota, Takanobu Baba. 91-98 [doi]
- PicFS: The Privacy-Enhancing Image-Based Collaborative File SystemChris Sosa, Blake C. Sutton, H. Howie Huang. 99-106 [doi]
- M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNsJinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. 107-114 [doi]
- Optimistic Localization: Avoiding Location Ambiguity in Wireless Ad-hoc NetworksXiaoping Wang, Zheng Yang, Jun Luo. 115-122 [doi]
- A Self-Stabilizing Locality-Aware Peer-to-Peer Network Combining Random Networks, Search Trees, and DHTsThomas Janson, Peter Mahlmann, Christian Schindelhauer. 123-130 [doi]
- Mixed-Parallel Implementations of Extrapolation Methods with Reduced Synchronization Overhead for Large Shared-Memory ComputersMatthias Korch, Thomas Rauber, Carsten Scholtes. 131-138 [doi]
- DSpam: Defending Against Spam in Tagging Systems via Users ReliabilityYonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhaojun Wang, Jian-bin Hu, Zhong Chen. 139-146 [doi]
- VirtCFT: A Transparent VM-Level Fault-Tolerant System for Virtual ClustersMinjia Zhang, Hai Jin, Xuanhua Shi, Song Wu. 147-154 [doi]
- Performance Data Extrapolation in Parallel CodesJuan Gonzalez, Judit Gimenez, Jesús Labarta. 155-163 [doi]
- Approximate Data Collection for Wireless Sensor NetworksChao Wang, Huadong Ma, Yuan He, Shuguang Xiong. 164-171 [doi]
- Scalable Authentication and Key Management in SCADALiangliang Xiao, I-Ling Yen, Farokh B. Bastani. 172-179 [doi]
- Packet Content Matching with packetC SearchsetsRalph Duncan, Peder Jungck, Kenneth Ross, Scott Tillman. 180-188 [doi]
- A Taxonomy of Autonomic Application Management in GridsMustafizur Rahman 0003, Rajiv Ranjan, Rajkumar Buyya. 189-196 [doi]
- ILGT: Group Reputation Aggregation Method for Unstructured Peer-to-Peer NetworksAsaki Matsumoto, Yo Mashimo, Masanori Yasutomi, Hiroshi Shigeno. 197-204 [doi]
- TRIP: Temporal Redundancy Integrated Performance Booster for Parity-Based RAID Storage SystemsChao Jin, Dan Feng, Hong Jiang, Lei Tian, Jingning Liu, Xiongzi Ge. 205-212 [doi]
- Semantics-Aware, Timely Prefetching of Linked Data StructureGang Liu, Zhuo Huang, Jih-Kwon Peir, Xudong Shi. 213-220 [doi]
- Simulating Large Scale Parallel Applications Using Statistical Models for Sequential Execution BlocksGengbin Zheng, Gagan Gupta, Eric J. Bohm, Isaac Dooley, Laxmikant V. Kalé. 221-228 [doi]
- Accelerating Spatial Data Processing with MapReduceKai Wang, Jizhong Han, Bibo Tu, Jiao Dai, Wei Zhou, Xuan Song. 229-236 [doi]
- Auto-tuning Dense Matrix Multiplication for GPGPU with CacheXiang Cui, Yifeng Chen, Changyou Zhang, Hong Mei. 237-242 [doi]
- A New Structured Peer-to-Peer Architecture Based on Physical DistanceSong Wang, Yong Ma, Gang Wang, Xiaoguang Liu. 243-250 [doi]
- Data Vitalization: A New Paradigm for Large-Scale Dataset AnalysisZhang Xiong, Wuman Luo, Lei Chen 0002, Lionel M. Ni. 251-258 [doi]
- Employing Multiple CUDA Devices to Accelerate LTL Model CheckingJiri Barnat, Petr Bauch, Lubos Brim, Milan Ceska. 259-266 [doi]
- Consensus Service to Solve Agreement ProblemsGiovani Pieri, Joni da Silva Fraga, Lau Cheuk Lung. 267-274 [doi]
- Enhanced Privilege Separation for Commodity Software on Virtualized PlatformMingyuan Xia, Miao Yu, Qian Lin, Zhengwei Qi, Haibing Guan. 275-282 [doi]
- On Sweep Coverage with Minimum Mobile SensorsJunzhao Du, Yawei Li, Hui Liu, Kewei Sha. 283-290 [doi]
- Data-Aware Task Scheduling on Multi-accelerator Based PlatformsCédric Augonnet, Jérôme Clet-Ortega, Samuel Thibault, Raymond Namyst. 291-298 [doi]
- Broadcasting Algorithm Via Shortest PathsHovhannes A. Harutyunyan, Wei Wang. 299-305 [doi]
- 4Sensing -- Decentralized Processing for Participatory Sensing DataHeitor Ferreira, Sérgio Duarte, Nuno M. Preguiça. 306-313 [doi]
- A Parallel XPath Engine Based on Concurrent NFA ExecutionYing Zhang, Yinfei Pan, Kenneth Chiu. 314-321 [doi]
- Kumoi: A High-Level Scripting Environment for Collective Virtual MachinesAkiyoshi Sugiki, Kazuhiko Kato, Yoshiaki Ishii, Hiroki Taniguchi, Nobuyuki Hirooka. 322-329 [doi]
- Unifying Buffer Replacement and Prefetching with Data Migration for Heterogeneous Storage DevicesSehwan Lee, Kern Koh, Hyokyung Bahn. 330-337 [doi]
- Detection of a Weak Conjunction of Unstable Predicates in Dynamic SystemsXinli Wang, Jean Mayo, Guy C. Hembroff. 338-346 [doi]
- Utility Accrual Object Distribution in Real-Time SystemsMorteza Mohaqeqi, Mehdi Kargahi. 347-354 [doi]
- Cost-Effective Congestion Management for Interconnection Networks Using Distributed Deterministic RoutingJesús Escudero-Sahuquillo, Pedro Javier GarcÃa, Francisco J. Quiles, José Flich, José Duato. 355-364 [doi]
- Smart: Service Model for Integrating Wireless Sensor Networks and the InternetJeisa P. O. Domingues, Antonio Vicente Lourenço Damaso, Nelson Souto Rosa. 365-372 [doi]
- Effective Performance Measurement at Petascale Using IPMKarl Fürlinger, Nicholas J. Wright, David Skinner. 373-380 [doi]
- Achieving Predictable High Performance in Imbalanced Fat TreesBartosz Bogdanski, Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Skeie, Line Holen, Lars Paul Huse. 381-388 [doi]
- Coordinated Selective Rejuvenation for Distributed ServicesGuanhua Tian, Dan Meng. 389-396 [doi]
- Enhancing MapReduce via Asynchronous Data ProcessingMarwa Elteir, Heshan Lin, Wu-chun Feng. 397-405 [doi]
- Dynamic Graph Traversals for Concurrent Rewriting Using Work-Stealing Frameworks for Multicore PlatformsMasahiro Yasugi, Tasuku Hiraishi, Seiji Umatani, Taiichi Yuasa. 406-414 [doi]
- Cloud Storage Design Based on Hybrid of Replication and Data PartitioningYunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh B. Bastani. 415-422 [doi]
- LADPM: Latency-Aware Dual-Partition Multicast Routing for Mesh-Based Network-on-ChipsJianhua Li, Chun Jason Xue, Yinlong Xu. 423-430 [doi]
- BLAST: Applying Streaming Ciphers Into Outsourced Cloud StorageKi-Woong Park, Chulmin Kim, Kyu Ho Park. 431-437 [doi]
- Multi-mapping Meshes: A New Communicating Fabric for Networks-on-ChipXinyu Wang, Dong Xiang. 438-445 [doi]
- Inter-Coding: An Interleaving and Erasure Coding Based Stable Routing Scheme in Multi-path DTNXiaoming Tang, Panlong Yang, Chang Tian, Laixian Peng, Yubo Yan. 446-451 [doi]
- Automatically Tuned Dynamic Programming with an Algorithm-by-BlocksJiajia Li, Guangming Tan, Mingyu Chen. 452-459 [doi]
- Acceleration of a High Order Accurate Method for Compressible Flows on SDSM Based GPU ClustersKonstantinos I. Karantasis, Eleftherios D. Polychronopoulos, John A. Ekaterinaris. 460-467 [doi]
- Gossiping Differential Evolution: A Decentralized Heuristic for Function Optimization in P2P NetworksMarco Biazzini, Alberto Montresor. 468-475 [doi]
- General vs. Interval Mappings for Streaming ApplicationsAnne Benoit, Hinde-Lilia Bouziane, Yves Robert. 476-483 [doi]
- Multi-task Downloading for P2P-VoD: An Empirical PerspectiveTieying Zhang, Zhenhua Li, Xueqi Cheng, Xianghui Sun. 484-491 [doi]
- SCAS: Sensing Channel ASsignment for Spectrum Sensing Using Dedicated Wireless Sensor NetworksMin Gao, Lan Cheng, Yunhuai Liu, Lionel M. Ni. 492-499 [doi]
- PinComm: Characterizing Intra-application Communication for the Many-Core EraWim Heirman, Dirk Stroobandt, Narasinga Rao Miniskar, Roel Wuyts, Francky Catthoor. 500-507 [doi]
- A Distributed Workflow Mapping Algorithm for Minimum End-to-End Delay under Fault-Tolerance ConstraintQishi Wu, Yi Gu. 508-515 [doi]
- Bandwidth Constrained Tree Construction for Live Streaming Systems in P2P NetworksYunyue Lin, Qishi Wu, Xukang Lu, Yi Gu. 516-523 [doi]
- Hybrid Checkpointing for MPI Jobs in HPC EnvironmentsChao Wang, Frank Mueller, Christian Engelmann, Stephen L. Scott. 524-533 [doi]
- Optimizing Energy-Latency Trade-off in Wireless Sensor Networks with Mobile ElementXiwei Zhang, Lili Zhang. 534-541 [doi]
- Fault Tolerant Network Routing through Software Overlays for Intelligent Power GridsChristopher Zimmer, Frank Mueller. 542-549 [doi]
- Approximate Algorithms for Sensor Deployment with k-coverage in Constrained 3D SpaceYunyue Lin, Qishi Wu. 550-557 [doi]
- Distributed Spatial Analysis in Wireless Sensor NetworksFarhana Jabeen, Alvaro A. A. Fernandes. 558-567 [doi]
- Multi-consistency Data ReplicationRaihan Al-Ekram, Richard C. Holt. 568-577 [doi]
- Downlink Resource Auction in a Tree Topology Structured Wireless Mesh NetworkZhen Kong, Cheng-Zhong Xu, Yu-Kwong Kwok. 578-584 [doi]
- 2F: A Special Cache for Mapping Table of Page-Level Flash Translation LayerZhiguang Chen, Nong Xiao, Fang Liu, Yimo Du. 585-592 [doi]
- Making Human Connectome Faster: GPU Acceleration of Brain Network AnalysisDi Wu, Tianji Wu, Yi Shan, Yu Wang 0002, Yong He, Ningyi Xu, Huazhong Yang. 593-600 [doi]
- Impacts of Asynchrony on Epidemic-Style Aggregation ProtocolsImran Rao, Aaron Harwood, Shanika Karunasekera. 601-608 [doi]
- Adaptive Audio Synchronization Scheme Based on Feedback Loop with Local Clock in Wireless Audio Sensor NetworksGuotao Zhao, Huadong Ma, Hong Luo, Yan Sun. 609-616 [doi]
- A Game-Theoretic Approach to Anti-jamming in Sensor NetworksYanmin Zhu, Yuan Jian. 617-624 [doi]
- A Pervasive Simplified Method for Human Movement Pattern AssessingMianbo Huang, Guoru Zhao, Lei Wang, Feng Yang. 625-628 [doi]
- Power Aware Scheduling for Parallel Tasks via Task ClusteringLizhe Wang, Jie Tao, Gregor von Laszewski, Dan Chen. 629-634 [doi]
- An Energy Efficient Clustering Scheme with Self-Organized ID Assignment for Wireless Sensor NetworksQingchao Zheng, Zhixin Liu, Liang Xue, Yusong Tan, Dan Chen, Xinping Guan. 635-639 [doi]
- Quantitative Evaluation of TBC Systems of Gas Turbine Blades Using TFECYong Li, Ying Mao, Zhenmao Chen. 640-645 [doi]
- Velocity Field Based Modelling and Simulation of Crowd in Confrontation OperationsCongcong Bian, Dan Chen, Shuaiting Wang. 646-651 [doi]
- Motion Tracking Based on Boolean Compressive Infrared SamplingJun Liu, Xuemei Guo, Min Liu, Guoli Wang. 652-657 [doi]
- A Qualitative Analysis of Uncertainty and Correlation Computing for the Business Processes of Enterprise InteroperabilityXiaofeng Liu, Xiaofei Xu, Shengchun Deng. 658-663 [doi]
- A Novel Chaining Approach for Direct Control Transfer InstructionsWeixia Xu, Wei Chen, Qiang Dou. 664-669 [doi]
- Vapor: Virtual Machine Based Parallel Program Profiling FrameworkYusong Tan, Wei Chen, Qingbo Wu. 670-675 [doi]
- Cooperative Work Systems for the Security of Digital Computing InfrastructureTianning Zang, Xiao-chun Yun, Tianyi Zang, Yongzheng Zhang 0002, Chaoguang Men. 676-681 [doi]
- Space Speedup and Its Relationship with Time SpeedupYue Hu, Weiqin Tong, Xiaoli Zhi, Zhi-xun Gong. 682-686 [doi]
- Building Similar Link Network in Large-Scale Web ResourcesXiangfeng Luo, Jingjing Ni, Jun Zhang, Lizhe Wang. 687-693 [doi]
- A Policy-Based Framework for Automated SLA Negotiation for Internet-Based Virtual Computing EnvironmentZan Xiao, Donggang Cao. 694-699 [doi]
- A Complex Network Based Virtual Computing Environment Topology Generating MethodXiao-heng Deng, Yi Liu, Fu-Yao Zhao, Zhi-Gang Chen. 700-705 [doi]
- A VMM-Based System Call Interposition Framework for Program MonitoringBo Li, Jianxin Li, Tianyu Wo, Chunming Hu, Liang Zhong. 706-711 [doi]
- A Prefetching Framework for the Streaming Loading of Virtual SoftwareLiang Zhong, Junbin Kang, Chunming Hu, Tianyu Wo, Haibing Zheng, Bo Li. 712-717 [doi]
- PGOS: An Architecture of a Personal Net Computing PlatformJie Liu, Yongqiang Zou. 718-723 [doi]
- PMSAI: A Novel Peer-to-Peer Multimedia Streaming Architecture over IMSRan Liu, Hao Yin, Wen Hui. 724-729 [doi]
- A General Distributed Object Locating Architecture in the Internet of ThingsWenmao Liu, Lihua Yin, Weizhe Zhang, Hongli Zhang. 730-735 [doi]
- Towards the Efficiency of Ontology-Based Context Reasoning in Virtual Computing EnvironmentShanshan Wang, Gang Wu, XiaoChong Cao. 736-739 [doi]
- Personalized Reputation Model in Cooperative Distributed SystemsWei Liu, Yang-Bin Tang, Huaimin Wang. 740-745 [doi]
- Design and Practice on iVCE for Memory SystemRui Chu, Tian Tian, Zhenli Lin. 746-751 [doi]
- Efficient Virtual Machine Deployment in Large Scale Resource EnvironmentFeng Huang, Dongsheng Li. 752-757 [doi]
- CANSE: A Churn Adaptive Approach to Network Size EstimationXing-Kong Ma, Yi-Jie Wang, Zhong Zheng. 758-763 [doi]
- Nexus: Speculative Execution for Event-Driven Networking ProgramsHuiba Li, Xicheng Lu, Yuxing Peng. 764-769 [doi]
- Small-World Social Relationship Awareness in Unstructured Peer-to-Peer NetworksHao Liao, Kuo-Chan Huang, Hung-Chang Hsiao. 770-775 [doi]
- Decentralized Search in Scale-Free P2P NetworksPraphul Chandra, Dushyant Arora. 776-781 [doi]
- Characteristics of Random Walk Search on Embedded Tree Structure for Unstructured P2PsPhouvieng Hieungmany, Shigeo Shioda. 782-787 [doi]
- A Hierarchical DHT for Fault Tolerant Management in P2P-SIP NetworksIbrahima Diane, Ibrahima Niang, Bamba Gueye. 788-793 [doi]
- Cooperative User Centric Information Dissemination in Human Content-Based NetworksM. Chuah, P. Yang, P. Hui. 794-799 [doi]
- Cloud Assisted P2P Media Streaming for Bandwidth Constrained Mobile SubscribersXin Jin, Yu-Kwong Kwok. 800-805 [doi]
- Discovering Free-Riders Before Trading: A Simple ApproachRaymond Lei Xia, Jogesh K. Muppala. 806-811 [doi]
- Multi-party Videoconferencing Based on Hybrid Multicast with Peer-ForwardingXuan Zhang, Chongrong Li, Xing Li. 812-816 [doi]
- Optimal Data Scheduling for P2P VoD Streaming SystemsQifeng Yu, Daoxu Chen. 817-822 [doi]
- A Two-Key Agreement Based Supervising Mechanism for Cluster-Based Peer-to-Peer ApplicationsChun-Chieh Huang, Chi-Chun Lo. 823-828 [doi]
- Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social NetworksJehn-Ruey Jiang, Chao-Wei Hung, Jih-Wei Wu. 829-834 [doi]
- Dual-Path Peer-to-Peer Anonymous ApproachEhsan Saboori, Maghsoud Abbaspour. 835-838 [doi]
- Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual EnvironmentsMahathir Almashor, Ibrahim Khalil. 839-844 [doi]
- Avatar Path Clustering in Networked Virtual EnvironmentsJehn-Ruey Jiang, Ching-Chuan Huang, Chung-Hsien Tsai. 845-850 [doi]
- Cross-Layer Design to Merge Structured P2P Networks over MANETNadir Shah, Depei Qian. 851-856 [doi]
- Achieving Lower Delay with Energy Efficiency in Extremely Low-Duty-Cycle and Unreliable WSNYubo Yan, Panlong Yang, Lei Zhang, Xiaoming Tang. 857-862 [doi]
- Distributed Real-Time Data Traffic Statistics Assisted Routing Protocol for Vehicular NetworksXiaomin Wang, Chao Song. 863-867 [doi]
- Load Aware Routing with Delay Threshold for Vehicular Ad Hoc NetworksYong Feng, Mingyu Fan, Qi Xiao, Lishu Wang. 868-873 [doi]
- A Primal Dual Approach for Dynamic Bid OptimizationLingfei Yu, Kun She, Changyuan Yu. 874-879 [doi]