Abstract is missing.
- Unified power and energy measurement API for HPC co-processorsMohak Chadha, Abhishek Srivastava, Santonu Sarkar. 1-8 [doi]
- Path planning of mobile sinks in charge of data gathering: A coalitional game theory approachInes Khoufi, Pascale Minet, Mohammed-Amine Koulali, Abdellatif Kobbane. 1-8 [doi]
- Towards designing and implementing a secure one time password (OTP) authentication systemSwapnoneel Roy, Matt Rutherford, Charlene H. Crawshaw. 1-2 [doi]
- Estimating clustering coefficients via metropolis-hastings random walk and wedge sampling on large OSN graphsEmrah Çem, Kamil Saraç. 1-2 [doi]
- A support vector machine based naive Bayes algorithm for spam filteringWeimiao Feng, Jianguo Sun, Liguo Zhang, Cuiling Cao, Qing Yang. 1-8 [doi]
- On query-adaptive online partitioning: A study of evolutionary algorithmsTing Zhang, Duc A. Tran. 1-8 [doi]
- Event-based clustering for composite event detection in wireless sensors networksCatalina Aranzazu Suescun, Mihaela Cardei. 1-8 [doi]
- An imbalanced data classification method based on automatic clustering under-samplingXiaoheng Deng, Weijian Zhong, Ju Ren, Detian Zeng, Honggang Zhang. 1-8 [doi]
- GReM: Dynamic SSD resource allocation in virtualized storage systems with heterogeneous IO workloadsZhengyu Yang, Jianzhe Tai, Janki Bhimani, Jiayin Wang, Ningfang Mi, Bo Sheng. 1-8 [doi]
- Failure recovery using vlan-tag in SDN: High speed with low memory requirementJue Chen, Jinbang Chen, Junchen Ling, Wei Zhang. 1-9 [doi]
- Optimizing content delivery in ICN networks by the supply chain modelZhen Feng, Mingwei Xu, Yuan Yang, Yu Wang, Qing Li, Weichao Wang. 1-8 [doi]
- Thwart eavesdropping attacks on network communication based on moving target defenseDuohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li. 1-2 [doi]
- Holistic data centres: Next generation data and thermal energy infrastructuresPaul Townend, Jie Xu, Jon Summers, Daniel Ruprecht, Harvey Thompson. 1-2 [doi]
- Using context switches for VM scalingJames Hadley, Utz Roedig, Yehia Elkhatib. 1-2 [doi]
- A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIPYao Qin, Hua Wang, Zhiping Jia, Hui Xia. 1-8 [doi]
- Towards energy efficiency in ultra dense networksWei Yu 0002, Hansong Xu, Amirshahram Hematian, David W. Griffith, Nada Golmie. 1-8 [doi]
- LMStr: Local memory store the case for hardware controlled scratchpad memory for general purpose processorsNafiul Alam Siddique, Abdel-Hameed A. Badawy, Jeanine Cook, David Resnick. 1-8 [doi]
- Delay analysis of IEEE 802.11e EDCA with enhanced QoS for delay sensitive applicationsIkram Syed, Byeong-hee Roh. 1-4 [doi]
- Mo-sleep: Unobtrusive sleep and movement monitoring via Wi-Fi signalFan Li, Cheng Xu, Yang Liu, Yun Zhang, Zhuo Li, Kashif Sharif, Yu Wang. 1-8 [doi]
- Improving disk array reliability through faster repairs (Extended abstract)Jehan-François Pâris, Thomas J. E. Schwarz, Darrell D. E. Long. 1-2 [doi]
- A reuse distance based performance analysis on GPU L1 data cacheDongwei Wang, Weijun Xiao. 1-8 [doi]
- LAMS: A latency-aware memory scheduling policy for modern DRAM systemsWenjie Liu, Ping Huang, Tang Kun, Tao Lu, Ke Zhou, Chun-hua Li, Xubin He. 1-8 [doi]
- A secure data allocation solution for heterogeneous Hadoop systems: SecHDFSBowen Tian, Yun Tian, Yijie Sun, Trevor Hurt, Brandon Huebert, Waymon Ho, Yuting Zhang, Danqi Chen. 1-8 [doi]
- High performance computing on SpiNNaker neuromorphic platform: A case study for energy efficient image processingIndar Sugiarto, Gengting Liu, Simon Davidson, Luis A. Plana, Steve B. Furber. 1-8 [doi]
- CrashFuzzer: Detecting input processing related crash bugs in android applicationsAimin Zhang, Yi He, Yong Jiang. 1-8 [doi]
- eSplash: Efficient speculation in large scale heterogeneous computing systemsJiayin Wang, Teng Wang, Zhengyu Yang, Ningfang Mi, Bo Sheng. 1-8 [doi]
- Selecting resources for distributed dataflow systems according to runtime targetsLauritz Thamsen, Ilya Verbitskiy, Florian Schmidt, Thomas Renner, Odej Kao. 1-8 [doi]
- On-demand efficient polling for nanonetworks under dynamic IoT backhaul network conditionsHang Yu, Bryan Ng, Winston K. G. Seah. 1-8 [doi]
- Can maturity models support cyber security?Ngoc T. Le, Doan B. Hoang. 1-7 [doi]
- A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systemsMingChu Li, Shiyu Wang, Kun Lu. 1-8 [doi]
- The analysis of service extensibility in extensible network service modelZuqin Ji, Jun Shen, Xiao Zhou, Delin Ding, Yujian Zhang. 1-8 [doi]
- Montgolfier: Latency-aware power management system for heterogeneous serversHaoran Cai, Qiang Cao, Feng Sheng, Manyi Zhang, Chuanyi Qi, Jie Yao, Changsheng Xie. 1-8 [doi]
- Dynamically reconfigurable AES cryptographic core for small, power limited mobile sensorsAmar Rasheed, M. Cotter, B. Smith, D. Levan, Shashi Phoha. 1-7 [doi]
- An energy-efficient handover algorithm for wireless sensor networksFredrik Saveros, Mingwei Gong, Niklas Carlsson, Aniket Mahanti. 1-8 [doi]
- Sets, lists and trees: Distributed data structures on distributed hash tablesRaed Al-Aaridhi, Kalman Graffi. 1-8 [doi]
- User authentication and identification on smartphones by incorporating capacitive touchscreenMohamed Azard Rilvan, Kolby Isiah Lacy, Md Shafaeat Hossain, Bing Wang. 1-8 [doi]
- A cognitive radio approach for data collection in border surveillanceYueshi Wu, Mihaela Cardei. 1-8 [doi]
- Detecting and defending against inter-app permission leaks in android appsYi He, Qi Li. 1-7 [doi]
- Simple data entanglement layouts with high reliabilityVero Estrada-Galiñanes, Jehan-Francois Paris, Pascal Felber. 1-8 [doi]
- A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networksMahmoud Khasawneh, Anjali Agarwal. 1-8 [doi]
- Jamming mobility in 802.11p networks: Modeling, evaluation, and detectionSharaf Malebary, Wenyuan Xu, Chin-Tser Huang. 1-7 [doi]
- Enhanced PHY-layer security via co-channel underlaysAlan J. Michaels, William C. Headley, Joseph M. Ernst, Seth D. Hitefield. 1-6 [doi]
- Quantifying entity criticality for fault impact analysis and dependability enhancement in software-defined networksSong Huang, Zhiang Deng, Song Fu. 1-8 [doi]
- Optimal multicriteria RAT-selection decisions for multiple handoff calls in heterogeneous wireless networksOlabisi E. Falowo. 1-5 [doi]
- Middleware to support cyber-physical systemsNader Mohamed, Jameela Al-Jaroodi, Sanja Lazarova-Molnar, Imad Jawhar. 1-3 [doi]
- Small cache lookaside table for fast DRAM cache accessXi Tao, Qi Zeng, Jih-Kwon Peir, Shih-Lien Lu. 1-10 [doi]
- Data integrity attacks against the distributed real-time pricing in the smart gridXinyu Yang, Xialei Zhang, Jie Lin, Wei Yu 0002, Xinwen Fu, Wei Zhao. 1-8 [doi]
- Reliability of cyber physical systems with focus on building management systemsSanja Lazarova-Molnar, Hamid Reza Shaker, Nader Mohamed. 1-6 [doi]
- AutoReplica: Automatic data replica manager in distributed caching and data processing systemsZhengyu Yang, Jiayin Wang, David Evans, Ningfang Mi. 1-6 [doi]
- A hybrid asymmetric traffic classifier for deep packet inspection systems with route asymmetryKasim Oztoprak, Mehmet Akif Yazici. 1-8 [doi]
- Building an IEEE 802.15.4e TSCH networkInes Khoufi, Pascale Minet, Erwan Livolant, Badr Rmili. 1-2 [doi]
- Distributed dynamic MCU for video conferencing in peer-to-peer networkMd. Amjad Hossain, Javed I. Khan. 1-8 [doi]
- Time synchronization mechanisms for an optically groomed data center networkGanesh Chennimala Sankaran, Krishna M. Sivalingam. 1-8 [doi]
- Cache locking vs. partitioning for real-time computing on integrated CPU-GPU processorsXin Wang, Wei Zhang. 1-8 [doi]
- KOVA : A tool for kernel visualization and analysisManu Awasthi, Krishna T. Malladi. 1-3 [doi]
- Bandwidth scheduling with multiple variable node-disjoint paths in high-performance networksAiqin Hou, Chase Q. Wu, Dingyi Fang, Yongqiang Wang, Meng Wang, Tao Wang, Xiaoyang Zhang. 1-4 [doi]
- User behavior-aware channel allocation scheme for mobile ad hoc networksRoni F. Shigueta, Mauro Fonseca, Aline Carneiro Viana. 1-2 [doi]
- High performance mass configuration protocols for MANETs using efficient broadcastingPrateek K. Singh, James H. Nguyen, Santosh K. Gupta, Koushik Kar, Daniel Ku. 1-10 [doi]
- Towards a first-reflection ultrasonic sensor array for compensatory movement identification in stroke sufferersHenry Griffith, Rajiv Ranganathan, Subir Biswas. 1-2 [doi]
- Benchmarking ISPs in New ZealandSe-Young Yu, Aniket Mahanti, Mingwei Gong. 1-7 [doi]
- Fifth generation (5G) cellular wireless: Vision, goals, and challengesEnder Ayanoglu. 1-3 [doi]
- Performance prediction techniques for scalable large data processing in distributed MPI systemsJanki Bhimani, Ningfang Mi, Miriam Leeser. 1-2 [doi]
- PETS: Performance, energy and thermal aware scheduler for job mapping with resource allocation in heterogeneous systemsShouq Alsubaihi, Jean-Luc Gaudiot. 1-2 [doi]
- Towards an extensive map-oriented trace basis for human mobility modelingMatthias Schwamborn, Nils Aschenbruck. 1-10 [doi]
- A secure framework for mHealth data analytics with visualizationDenise Ferebee, Vivek Shandilya, Chase Q. Wu, Janet Ricks, David Agular, Karyn Cole, Byron Ray, Aukii Franklin, Candice Titon, Zongmin Wang. 1-4 [doi]
- A pipelined market data processing architecture to overcome financial data dependencyQiu Tang, Lei Jiang, Majing Su, Qiong Dai. 1-8 [doi]
- Mining causality graph for automatic web-based service diagnosisXiaohui Nie, Youjian Zhao, Kaixin Sui, Dan Pei, Yu Chen, Xianping Qu. 1-8 [doi]
- Towards variable length addressing for scalable Internet routingFeng Wang, Xiaozhe Shao, Lixin Gao, Hiroaki Harai, Kenji Fujikawa. 1-9 [doi]
- Minimizing intra-flow interference in multi-channel mesh networks: An optimization approachRoman Seibel, Somayeh Taheri, Keyu Wang, Dieter Hogrefe. 1-10 [doi]
- Understanding performance of I/O intensive containerized applications for NVMe SSDsJanki Bhimani, Jingpei Yang, Zhengyu Yang, Ningfang Mi, Qiumin Xu, Manu Awasthi, Rajinikanth Pandurangan, Vijay Balakrishnan. 1-8 [doi]
- Polarized beamforming for enhanced countermeasure of wireless jamming attacksAli Aldarraji, Liang Hong, Sachin Shetty. 1-2 [doi]
- Energy-efficient task scheduling for DVFS-enabled heterogeneous computing systems using a linear programming approachYujian Zhang, Yun Wang, Hui Wang. 1-8 [doi]
- Optimized GPU implementation for dynamic programming in image data processingJing Ke, Tomasz Bednarz, Arcot Sowmya. 1-7 [doi]