Abstract is missing.
- A universal framework for partial coverage in Wireless Sensor NetworksChinh T. Vu, Guantao Chen, Yi Zhao, Yingshu Li. 1-8 [doi]
- ABC-MC: A simple multi-channel geographic forwarding scheme for wireless sensor networksTaekkyeun Lee, Chunming Qiao, Murat Demirbas, Jinhui Xu. 9-16 [doi]
- Static worst-case energy and lifetime estimation of wireless sensor networksYu Liu, Wei Zhang, Kemal Akkaya. 17-24 [doi]
- EDA: Event-oriented data aggregation in sensor networksYing Guo, Feng Hong, Zhongwen Guo, Zongke Jin, Yuan Feng. 25-32 [doi]
- Real time clustering of sensory data in wireless sensor networksLongjiang Guo, Chunyu Ai, Xiaoming Wang, Zhipeng Cai, Yingshu Li. 33-40 [doi]
- On Performance-Adaptive flow control for large data transfer in high speed networksXukang Lu, Qishi Wu, Nageswara S. V. Rao, Zongmin Wang. 49-56 [doi]
- Pre-congestion notification-based flow management in MPLS-based DiffServ networksMayutan Arumaithurai, Rüdiger Geib, Rene Rex, Xiaoming Fu. 57-64 [doi]
- Towards zero loss for TCP in wireless networksJing Chen, Wei Tan, Lixiang Liu, Xiaohui Hu, Fanjiang Xu. 65-70 [doi]
- Saturation aware TCP throughput predictionJia Zhou, Fengyuan Ren, Chuang Lin. 71-78 [doi]
- ECOS: An energy-efficient cluster storage systemXiaojun Ruan, Shu Yin, Adam Manzanares, Jiong Xie, Zhiyang Ding, James Majors, Xiao Qin. 79-86 [doi]
- Improving reliability of energy-efficient parallel storage systems by disk swappingShu Yin, Xiaojun Ruan, Adam Manzanares, Zhiyang Ding, Jiong Xie, James Majors, Xiao Qin. 87-94 [doi]
- Performance evaluation of power-aware routing algorithms in Personal NetworksJavad Vazifehdan, Ramin Hekmat, R. Venkatesha Prasad, Ignas G. Niemegeers. 95-102 [doi]
- Virtual Center: A characteristic of minimum power broadcast trees in wireless ad hoc networksManki Min, Bipin C. Neupane. 103-110 [doi]
- Avoiding state-space explosion of predictive metadata with SESHDavid Essary, Ahmed Amer. 111-120 [doi]
- A user-centric dynamic cluster partitioning approach for HPC service optimizationXiaorong Li, Terence Hung, Sharad Singhal. 121-128 [doi]
- Using shared parity disks to improve the reliability of RAID arraysJehan-François Påris, Ahmed Amer. 129-136 [doi]
- Optimization of link bandwidth for parallel communication performanceLydia Y. Chen, Wolfgang E. Denzel, Ronald P. Luijten. 137-144 [doi]
- Improving file tree traversal performance by scheduling I/O operations in user spaceCarl Henrik Lunde, Håvard Espeland, Håkon Kvale Stensland, Pål Halvorsen. 145-152 [doi]
- Achieving high performance web applications by service and database replications at edge serversWei Hao, Jicheng Fu, I-Ling Yen, Zhonghang Xia. 153-160 [doi]
- Towards social-aware routing in dynamic communication networksThang N. Dinh, Ying Xuan, My T. Thai. 161-168 [doi]
- Opportunistic mechanisms for IEEE 802.11 networks using directional antennasTamer Nadeem. 169-176 [doi]
- Efficient multicast for link-heterogeneous wireless mesh networksGuo-Kai Zeng, Bo Wang 0001, Matt W. Mutka, Li Xiao, Eric Torng. 177-184 [doi]
- Characterizing deployment and distribution of self-powered mesh routers in wireless mesh networksWeihuang Fu, Xiaoyuan Wang, Dharma P. Agrawal. 185-192 [doi]
- Analysis of the impact of swarm mobility on performance of routing protocols in MANETsJun Li, Yifeng Zhou, Louise Lamont. 193-199 [doi]
- LWRM: A lightweight response mechanism for TCG TOCTOU attackXiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala. 200-207 [doi]
- Modeling primary user emulation attacks and defenses in cognitive radio networksZesheng Chen, Todor Cooklev, Chao Chen, Carlos A. Pomalaza-Raez. 208-215 [doi]
- Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networksAmar Rasheed, Rabi N. Mahapatra. 216-222 [doi]
- On trigger detection against reactive Jamming Attacks: A clique-independent set based approachYing Xuan, Yilin Shen, Incheol Shin, My T. Thai. 223-230 [doi]
- GPU support for batch oriented workloadsLauro B. Costa, Samer Al-Kiswany, Matei Ripeanu. 231-238 [doi]
- Spotlight - a low complexity highly accurate profile-based branch predictorSanthosh Verma, Benjamin Maderazo, David M. Koppelman. 239-247 [doi]
- Iterative layer-based raytracing on CUDAAlejandro Segovia, Xiaoming Li, Guang R. Gao. 248-255 [doi]
- Context-aware code optimizationMurat Bolat, Xiaoming Li. 256-263 [doi]
- Efficient symmetric comparison-based self-diagnosis using backpropagation artificial neural networksMourad Elhadef, Amiya Nayak. 264-271 [doi]
- A pragmatic approach to location-aware service organization and discoveryJian Zhu, Mohammad Oliya, Hung Keng Pung. 272-279 [doi]
- Low cost indoor location management system using infrared leds and Wii Remote ControllerBaris Tas, Nihat Altiparmak, Ali Saman Tosun. 280-288 [doi]
- Thermal aware workload scheduling with backfilling for green data centersLizhe Wang, Gregor von Laszewski, Jai Dayal, Thomas R. Furlani. 289-296 [doi]
- A-MAC: Efficient Medium Access for cluster-based wireless sensor networksXinhua Yang, Tracy Camp. 297-306 [doi]
- Finding correlated heavy-hitters over data streamsBibudh Lahiri, Srikanta Tirthapura. 307-314 [doi]
- Caching techniques for XML message filteringYang Cao, Shikharesh Majumdar, Chung-Horng Lung. 315-322 [doi]
- Towards health of replication in large-scale P2P-VoD systemsHaitao Li, Xu Ke, J. Seng, Po Hu. 323-330 [doi]
- Hotspot Prediction and cache in distributed stream-processing storage systemsChentao Wu, Xubin He, Shenggang Wan, Qiang Cao, Changsheng Xie. 331-340 [doi]
- Network caching for Chip MultiprocessorsJinglei Wang, Yibo Xue, Haixia Wang, Dongsheng Wang. 341-348 [doi]
- A study of throughput for Iu-CS and Iu-PS interface in UMTS core networkYe Ouyang, M. Hosein Fallah. 349-353 [doi]
- An adaptive polling algorithm with differentiation strategy in IEEE 802.16 multi-hop networks with IEEE 802.11e WLANsMyounghwan Lee, John A. Copeland. 354-359 [doi]
- Performance comparison of guard channel admission control schemes for IEEE 802.16 system with various turbo code FEC schemesAdam Flizikowski, Rafal Kozik, Mateusz Majewski, Marcin Przybyszewski. 360-365 [doi]
- Applying scheduling policies to improve QoE in wireless Voice-over-IPLambros Lambrinos, Constantinos Djouvas. 366-370 [doi]
- A study of throughput for Nb, Mc and Nc interface in UMTS core networkYe Ouyang, M. Hosein Fallah. 371-375 [doi]
- Flow-based TCP connection analysisTobias Limmer, Falko Dressler. 376-383 [doi]
- Predicting Tor path compromise by exit portKevin S. Bauer, Dirk Grunwald, Douglas C. Sicker. 384-387 [doi]
- Multiscale analysis and prediction of network trafficHong Zhao. 388-393 [doi]
- Finding and extracting crypto routines from malwareFelix Leder, Peter Martini, André Wichmann. 394-401 [doi]
- Network measurement based redundancy model and maintenance in dynamic P2P storage systemsGuangping Xu, Hua Zhang, Jing Liu, Gang Wang, Xiaoguang Liu. 402-409 [doi]
- A goal programming approach for the joint optimization of energy consumption and response time in computational gridsSamee Ullah Khan. 410-417 [doi]
- System level evaluation for WiMAX IEEE 802.16mAlain Mourad, Ismael Gutiérrez. 418-424 [doi]
- Joint precoder and power adaptation for cognitive radios in interference systemsDanda B. Rawat, Dimitrie C. Popescu. 425-430 [doi]
- Evolutionary algorithms for radio resource management in cognitive radio networkMuhammad Waheed, Anni Cai. 431-436 [doi]
- Are cognitive radios energy efficient? A study of the Wireless LAN scenarioVinod Namboodiri. 437-442 [doi]