Abstract is missing.
- Secure Remote Storage through Authenticated EncryptionFangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang. 3-9 [doi]
- Reliability Assurance of RAID Storage Systems for a Wide Range of Latent Sector ErrorsIlias Iliadis, Xiao-Yu Hu. 10-19 [doi]
- Design and Analysis of a Scalable Third-Party Storage Security ProtocolJianzhong Huang, Changsheng Xie, Haifeng Zhong. 20-27 [doi]
- Optimal Implementation of Continuous Data Protection (CDP) in Linux KernelXu Li, Changsheng Xie, Qing Yang. 28-35 [doi]
- Fault Surviving Optimisation within Brick Based Storage SystemConnor L. C. Gray, Michael Hobbs. 36-43 [doi]
- EBEM: An Event-driven Bandwidth Estimation Method for Mobile Ad Hoc NetworkHeming Cui, Cong Lin, Yong Xiang. 47-52 [doi]
- Dynamic Route Diversion in Connectionless Mobile Ad Hoc NetworksYao Hua Ho, Kien A. Hua, Ning Jiang, Fei Xie. 53-61 [doi]
- A Dynamic Congestion Control Based Multipath Routing Protocol for Video Transmission over Ad Hoc NetworksYang He, Zhenyong Chen, Yuheng Liu, Zhang Xiong. 62-69 [doi]
- Joint Topology-Transparent Scheduling and QoS Routing in Mobile Ad Hoc NetworksYi-Sheng Su, Szu-Lin Su, Jung-Shian Li. 70-77 [doi]
- POND: The Power of Zone Overlapping in DHT NetworksZhiyong Xu, Jizhong Han, Laxmi N. Bhuyan. 81-88 [doi]
- Adaptive Consistency Guarantees for Large-Scale Replicated ServicesYijun Lu, Ying Lu, Hong Jiang. 89-96 [doi]
- Applications of Bloom Filters in Peer-to-peer Systems: Issues and QuestionsHailong Cai, Ping Ge, Jun Wang. 97-103 [doi]
- A Effective Algorithm for Counting Active Flows Based on Loop Bloom FilterYong Sun, Zhibin Zhang, Li Guo, Shuo Bai, Jianlong Tan. 104-109 [doi]
- The Mobile Router Forwarding Scheme for Multicast in the NEMOLong-Sheng Li, Yong-Yu Yang, Jhu-Syuan Mei. 113-120 [doi]
- Hard Real-Time Communication over Multi-hop Switched EthernetMinghu Zhang, Jian Shi, Ting Zhang, Yong Hu. 121-128 [doi]
- Efficient Event Matching in Publish/subscribe: Based on Routing Destination and Matching HistoryXiangfeng Guo, Jun Wei, Dongli Han. 129-136 [doi]
- A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu. 137-143 [doi]
- Formation and Network Chain Control in Sparse Robot ad hoc Networks based on Potential FieldHong Jiang, Yu Qing Huang, Guo Ying Yang. 147-148 [doi]
- Peer-assisted Content Delivery Network for Live Streaming: Architecture and PracticeYu Liu, Hao Yin, Guangxi Zhu, Xuening Liu. 149-150 [doi]
- A K-hop Based Clustering Algorithm in Ad Hoc NetworksGe He, Shangbo Zhou, Shan Liu. 151-152 [doi]
- A Novel Interoperable Model of Distributed UDDILibing Wu, Yanxiang He, Dan Wu, Jianqun Cui. 153-154 [doi]
- A Spam Filter System Based on P2P ArchitectureDafan Dong, Jianzhong Zhang, Ying Wu, Hongbo Lu, Gongyi Wu. 155-156 [doi]
- A Dynamic Interface Activation Scheme for Vertical HandoffsQingyang Song, Xingwei Wang, Zhongfeng Wen, Yao Lv, Feifei Xu. 157-158 [doi]
- A Trace-Driven Simulation Study of Load Balancing on Distributed NIDSFengna Gu, Zhibin Zhang, Lihong Wang. 159-160 [doi]
- Formal Proof of the IDOP_SP Protocol Based on the Petri NetYingjiu Guo, Chuang Lin, Hao Yin. 161-162 [doi]
- An EPN-based Method for Web Service CompositionMin Gao, Lily Sun, Zhongfu Wu, Feng Jiang. 163-164 [doi]
- A Cluster Maintenance Algorithm Based on LEACH-DCHS ProtoclolYuhua Liu, Jingju Gao, Yongcan Jia, Longquan Zhu. 165-166 [doi]
- Towards More Reliable Source Routing in Wireless NetworksImad Jawhar, Zouheir Trabelsi, Jameela Al-Jaroodi. 167-168 [doi]
- Revocation in an Attribute-Based Delegation ModelChunxiao Ye, Zhongfu Wu, Jiang Zhong, Yong Feng. 171-172 [doi]
- Intrusion Detection Based on Density Level Sets EstimationJiang Zhong, Luosheng Wen, Yong Feng, Chunxiao Ye. 173-174 [doi]
- Design of a Secure Network Mirroring System for Data SharingJianzhong Huang, Changsheng Xie, Haifeng Zhong. 175-176 [doi]
- A Network Memory Architecture Model and Performance AnalysisLi Liu, Mingyu Chen, Yungang Bao, Jianwei Xu, Jianping Fan. 177-178 [doi]
- Storage Aware Resource Allocation for Grid Data Streaming PipelinesWen Zhang, Junwei Cao, Yisheng Zhong, Lianchen Liu, Cheng Wu. 179-180 [doi]
- A Precise Interrupts Mechanism Based on Micro-Operation Tracing of Instruction Boundary for Embedded ProcessorJun Zhang, Xiao-Ya Fan, Song-He Liu. 181-182 [doi]
- Design and Implement of Snapshots in Linux Block LevelHuaiyang Li, Changsheng Xie, Yan Liu, Qiang Cao. 183-184 [doi]
- An Ontology-based Virtual Storage SystemZhaobin Liu, Haitao Li. 185-186 [doi]
- Enabling RDMA Capability of InfiniBand Network for Java ApplicationsWan Huang, Jizhong Han, Jin He, Lisheng Zhang, Yao Lin. 187-188 [doi]
- Component-based Network Protocol Architecture for Multi-coreTianzhou Chen, Mingteng Cao, Qingsong Shi. 189-190 [doi]
- Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection FrameworkYijun Lu, Xueming Li, Hong Jiang. 193-200 [doi]
- Characterization of Behavior Anomalies in a Representative File SystemQiang Zou, Dan Feng. 201-206 [doi]
- Modelling Threshold Secret Sharing Schemes in Ad Hoc NetworksWeifeng Chen, Huan Li. 207-214 [doi]
- A Novel Adaptive Failure Detector for Distributed SystemsDong Tian, Kaigui Wu, Xueming Li. 215-221 [doi]
- Fibre Channel Arbitrated Loop - Performance Analysis of Loop Tenancy OverheadMikkel Hagen, Elizabeth Varki. 225-232 [doi]
- Experimental Analysis of InfiniBand Transport Services on WANWeikuan Yu, Nageswara S. V. Rao, Jeffrey S. Vetter. 233-240 [doi]
- An Evaluation of Transport Protocols in Peer-to-Peer Media StreamingJeng-Yuh Chang, Xiao Su. 241-247 [doi]
- An Energy-Efficient Clustering Technique for Wireless Sensor NetworksGuan Xin, Wang YongXin, Liu Fang. 248-252 [doi]
- An Analytical Performance Model of IP-SANMin Wang, Liu Liu, Wei Xu, Lu Xu. 255-262 [doi]
- Spatial-Locality-Aware Virtual Storage Devices with Tangible QoS ExpressionsPei Yan, Song Jiang. 263-270 [doi]
- Goal-based Dependability Analysis and Improvement Framework for Network Storage SystemsHua Wang, Ke Zhou. 271-277 [doi]
- VDMS: A Vector Data Management System for GIS ApplicationsXuhui Liu, Shubin Zhang, Jin He, Jizhong Han, Chengde Han, Zhiyong Xu. 278-284 [doi]
- Efficient and Locality-aware Resource Management in Wide-area Distributed SystemsHaiying Shen, Yingwu Zhu, Wing Ning Li. 287-294 [doi]
- Performance Characterization of a Dual Quad-Core Based Application Oriented Networking SystemAbdul Waheed, Jianxun Jason Ding, Jingnan Yao, Laxmi N. Bhuyan. 295-302 [doi]
- Software Barrier Performance on Dual Quad-Core OpteronsJie Chen, William A. Watson III. 303-309 [doi]
- A Pollution Alleviative L2 Cache Replacement Policy for Chip Multiprocessor ArchitectureJun Zhang, Xiao-Ya Fan, Song-He Liu. 310-316 [doi]
- MemoryIO: An Extended I/O Technology in Embedded SystemsXiaojun Yang, Tao Liu, Fei Chen, Hailiang Cheng. 319-325 [doi]
- Parallel Job Scheduling with Overhead: A Benchmark StudyRichard A. Dutton, Weizhen Mao, Jie Chen, William A. Watson III. 326-333 [doi]
- Rectangularly Multi-Module Memory System with Table-Based Dynamic Addressing SchemeJinbo Xu, Yong Dou, Jie Zhou. 334-341 [doi]
- An e-Learning Services Discovery Algorithm Based on User SatisfactionZheng-Zhou Zhu, Zhongfu Wu, Shangbo Zhou. 342-348 [doi]
- On the Security of Group Signature Scheme and Designated Verifier Signature SchemeJianhong Zhang, Qin Geng. 351-358 [doi]
- Event-based Trust Framework Model in Wireless Sensor NetworksHaiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Gao. 359-364 [doi]
- A Novel Embedded Accelerator for Online Detection of Shrew DDoS AttacksHao Chen, Yu Chen. 365-372 [doi]
- Research on Trust Evaluation Model of Grid ServicesXiaohua Dong, Zhongfu Wu. 373-380 [doi]