Abstract is missing.
- Proposed enhancements to fixed segmented LRU cache replacement policyKathlene Hurt, Byeong Kil Lee. 1-2 [doi]
- Multi-keyword ranked search supporting synonym query over encrypted data in cloud computingZhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, Jiangang Shu. 1-8 [doi]
- Impact of sampling design in estimation of graph characteristicsEmrah Çem, Mehmet Engin Tozal, Kamil Saraç. 1-10 [doi]
- A hybrid GPU/CPU FFT library for large FFT problemsShuo Chen, Xiaoming Li. 1-10 [doi]
- Extending ODMRP for on-site deployments in disaster area scenariosJonathan Kirchhoff, Jan Bauer, Raphael Ernst, Christoph Fuchs, Sascha Jopen, Nils Aschenbruck. 1-10 [doi]
- Sizing router buffer for the Internet with heterogeneous TCPPeng Yang, Ertong Zhang, Lisong Xu. 1-9 [doi]
- Enhanced infrastructure security through inter-level anomaly detectionChristian Horn, Jörg Krüger. 1-2 [doi]
- A lightweight solution to remote DNSZheng Wang, An-Lei Hu. 1-3 [doi]
- Predicting DNS Server Load DistributionZheng Wang, An-Lei Hu. 1-2 [doi]
- Magnetic field modeling-based energy efficient routing in wireless sensor networksNemroud Youssouf, Xin Li, Fan Li, Huiying Yuan. 1-2 [doi]
- Performance analysis of a fault-tolerant exact motif mining algorithm on the cloudNhan Nguyen, Mohammad Maifi Hasan Khan. 1-9 [doi]
- Minimizing routing overhead with Two-Hop Coordinate Awareness in ad hoc networksYali Wang, J. J. Garcia-Luna-Aceves. 1-9 [doi]
- Reliable and efficient routing protocol for graph theory based communication topologyDongsoo Kim, Eric C. Noel, K. Wendy Tang. 1-10 [doi]
- Reducing worst-case execution time of hybrid SPM-cachesLan Wu, Wei Zhang 0002. 1-9 [doi]
- A2E: Adaptively aggressive energy efficient DVFS scheduling for data intensive applicationsLi Tan, Zizhong Chen, Ziliang Zong, Dong Li, Rong Ge. 1-10 [doi]
- SEBAR: Social Energy Based Routing scheme for mobile social Delay Tolerant NetworksFan Li, Hong Jiang, Yu Wang, Xin Li, Mingzhong Wang, Tabouche Abdeldjalil. 1-8 [doi]
- A novel multi-radio MAC protocol based union mechanism in wireless sensor networksJinbao Li, Zhigang Wang, Longjiang Guo. 1-8 [doi]
- Exploit real-time fine-grained access patterns to partition write buffer to improve SSD performance and life-spanMingyang Wang, Yiming Hu. 1-7 [doi]
- On a generalized approach to order-independent image composition in parallel visualizationDongliang Chu, Chase Qishi Wu, Jinzhu Gao, Li Wang. 1-10 [doi]
- Rumor restriction in Online Social NetworksSongsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, Hejiao Huang. 1-10 [doi]
- Trustworthy data management for wireless networks in Cyber-Physical SystemsWenjia Li, Lindah Kotut. 1-2 [doi]
- Using intelligent prefetching to reduce the energy consumption of a large-scale storage systemBrian Romoser, Ziliang Zong, Ribel Fares, Joal Wood, Rong Ge. 1-9 [doi]
- Providing diagnostic network feedback to end users on smartphonesXu Ye, Bo Yan, Guanling Chen. 1-9 [doi]
- Session lengths and IP address usage of smartphones in a university campus WiFi network: Characterization and analytical modelsXian Chen, Lester Lipsky, Kyoungwon Suh, Bing Wang, Wei Wei. 1-9 [doi]
- Energy-aware image allocation for distributed video processing on handheld devicesSilvia Elena Restrepo, Philippe Pinaud, Jorge E. Pezoa, Sergio K. Sobarzo. 1-2 [doi]
- Message from the IPCCC 2013 technical program chairsZhipeng Cai, Zhiqiang Lin. 1 [doi]
- A comparison of IP header compression schemes in MANETsBow-Nan Cheng, James Wheeler, Brian Hung, Scott Moore, Prasanna Sukumar. 1-9 [doi]
- Evaluating the performance and energy efficiency of n-body codes on multi-core CPUs and GPUsIvan Zecena, Martin Burtscher, Tongdan Jin, Ziliang Zong. 1-8 [doi]
- Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networksGuoliang Liu, Janani Krishnamani, Rajshekhar Sunderraman, Yingshu Li. 1-7 [doi]
- Expander code: A scalable erasure-resilient code to keep up with data growth in distributed storageGuangping Xu, Sheng Lin, Hua Zhang, Xing Guo, Kai Shi. 1-9 [doi]
- CSIR: Cellular scheduling with Interest-driven RoutingAshok N. Masilamani, Ali Dabirmoghaddam, J. J. Garcia-Luna-Aceves. 1-10 [doi]
- Optimization for reliable erasure-coded storage allocation under multiple constraintsGuangping Xu, Xing Guo, Hua Zhang, Sheng Lin, Chunxia Yang. 1-2 [doi]
- Scalable load balancing for mapreduce-based record linkageWei Yan, Yuan Xue, Bradley Malin. 1-10 [doi]
- OPS/OBS scheduling algorithms: Incorporating a wavelength conversion cost in the performance analysisKurt Van Hautegem, Wouter Rogiest, Herwig Bruneel. 1-9 [doi]
- Automatic incremental routing using multiple rootsRumi Ghosh, J. J. Garcia-Luna-Aceves. 1-9 [doi]
- Message from the IPCCC 2013 general chairsYu Wang, Kuai Xu. 1 [doi]
- Automated controllers for bandwidth allocation in network virtualizationMohamed Said Seddiki, Bilel Nefzi, Ye-Qiong Song, Mounir Frikha. 1-7 [doi]
- Improved kernel security through memory layout randomizationDannie M. Stanley, Dongyan Xu, Eugene H. Spafford. 1-10 [doi]
- Message digest as authentication entity for mobile cloud computingSaurabh Dey, Srinivas Sampalli, Qiang Ye. 1-6 [doi]
- Modeling and analysis of resources availability in volunteer computing systemsBahman Javadi, Kenan Matawie, David P. Anderson. 1-9 [doi]
- Backpressure routing for the backhaul in sparse small cell deploymentsJosé Núñez-Martínez, Jorge Baranda, Josep Mangues-Bafalluy. 1-2 [doi]
- Location matters: Eliciting responses to direct probesEthan Blanton, Mehmet Engin Tozal, Kamil Saraç, Sonia Fahmy. 1-10 [doi]
- Secure user authentication in cloud computing management interfacesLiliana F. B. Soares, Diogo A. B. Fernandes, Mário M. Freire, Pedro R. M. Inácio. 1-2 [doi]
- Defend GPUs against DoS attacksWei Zhang. 1-2 [doi]
- Distributed protocol for channel assignment in cognitive wireless sensor networksMihaela Cardei, Amalya Mihnea. 1-9 [doi]
- Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influencesJing He, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah. 1-8 [doi]
- Queue reorganization for subscription congestion avoidance in publish/subscribe systemsWei Yan, Vinod Muthusamy, Mingwen Chen, Yonghong Huang, Zheng Xiao, Xubin Pei, Songlin Hu. 1-10 [doi]
- The impact of interference from a covert link on a data link using OFDM, AMC, and hybrid ARQZaid Hijaz, Victor S. Frost. 1-2 [doi]