Abstract is missing.
- Design of NIC Based on I/O Processor for Cluster Interconnect NetworkXiaojun Yang, Dongdong Wu, Ninghui Sun. 3-8 [doi]
- Simplified Multi-Ported Cache in High Performance ProcessorHao Zhang, Dongrui Fan. 9-14 [doi]
- The bi-panconnectivity of the hypercubeJywe-Fei Fang, Chien-Hung Huang, Ko-Lin Lin, Chen-Hsiang Liao, Shr-Cheng Feng. 15-20 [doi]
- The Implementation and Design of a Low-Power Clock Distribution MicroarchitectureRong Ji, Xianjun Zeng, Liang Chen, Junfeng Zhang. 21-30 [doi]
- More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer MulticastJianqun Cui, Yanxiang He, Libing Wu. 31-36 [doi]
- MLCC: A Multi Layered Correlative Control Mechanism for the VPN TopologyKai Ouyang, Xiaowen Chu, Lijun Dong, Hengqing Wang, Ting Cai. 37-43 [doi]
- The Dynamic Endpoint-Based Access Control Model on VPNLijun Dong, Shengsheng Yu, Kai Ouyang. 44-54 [doi]
- Routing Protocols Based on Double Auction for Ad Hoc NetworksZhongsheng Wu, Zhide Chen, Li Xu, Fuchun Guo. 55-61 [doi]
- A Novel Cooperative Caching Scheme for Wireless Ad Hoc Networks: GroupCachingYi-Wei Ting, Yeim-Kuan Chang. 62-68 [doi]
- An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested NetworksChengcheng Li, Peng Li, Tijjani Mohammed. 69-76 [doi]
- An Improved Designated-Verifier Proxy Signature SchemeJianhong Zhang. 77-82 [doi]
- PKI-Based Authentication Mechanisms in Grid SystemsShushan Zhao, Akshai K. Aggarwal, Robert D. Kent. 83-90 [doi]
- Assessing Attack Threat by the Probability of Following AttacksZhitang Li, Jie Lei, Li Wang, Dong Li. 91-100 [doi]
- Mitigating Denial of Capability with An Notification MechanismGuang Jin, Jiangang Yang, Wei Wei, Yabo Dong. 101-108 [doi]
- HKM: A Hybrid Key Management Scheme for Secure Mobile MulticastLin Lin, Xueming Li, Yong Cheng. 109-114 [doi]
- Discovering Novel Multistage Attack Patterns in Alert StreamsAifang Zhang, Zhitang Li, Dong Li, Li Wang. 115-121 [doi]
- Safeguarding Against Sybil Attacks via Social Networks and Multipath RoutingChittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan. 122-132 [doi]
- Mining Moving Patterns Based on Frequent Patterns Growth in Sensor NetworksYuanguo Cheng, Xiongwei Ren. 133-138 [doi]
- An Active Region-based Storage Mechanism in Large Wireless Sensor NetworksXiongzi Ge, Dan Feng, Lei Tian. 139-145 [doi]
- A Novel Network Management Architecture for Self-organizing NetworkLi Jun, Zhang Shunyi, Zhang Zailong, Wang Pan. 146-154 [doi]
- A Peer-To-Peer Traffic Identification Method Using Machine LearningHui Liu, Wenfeng Feng, Yongfeng Huang, Xing Li. 155-160 [doi]
- GSM-R: A Hybrid Scheduling Approach to Dynamic Load Balancing in Hierarchical Cluster of ServersJincai Chen, Gongye Zhou. 161-167 [doi]
- Software Fault Localization Based on Testing Requirement and Program SliceJirong Sun, Zhishu Li, Jiancheng Ni, Feng Yin. 168-176 [doi]
- An Efficient SAN-Level Caching Method Based on Chunk-AgingJiwu Shu, Yang Wang 0009, Wei Xue, Yifeng Luo. 177-184 [doi]
- FTRAID: A Fat-tree Based Parallel Storage Architecture for Very Large Disk ArrayZhikun Wang, Ke Zhou, Dan Feng, Lingfang Zeng, Junping Liu. 185-192 [doi]
- A New Data Format and a New Error Control Scheme for Optical-Storage SystemsWei Hu, Diqing Hu, Changsheng Xie, Fan Chen. 193-198 [doi]
- iSAN: Storage Area Network Management Modeling SimulationRamani Routray, Sandeep Gopisetty, Pallavi Galgali, Amit Modi, Shripad Nadgowda. 199-208 [doi]
- Dynamics Process of Long-running Allocation/Collection in Linear Storage SpaceQiang Cao, Tian-jie Guo, Changsheng Xie. 209-216 [doi]
- A New Method of Pefetching I/O RequestsHuaiyang Li, Changsheng Xie, Yan Liu. 217-224 [doi]
- Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Synthetic Workload SimulationBin Cai, Changsheng Xie, Guangxi Zhu. 225-232 [doi]
- DiskGroup: Energy Efficient Disk Layout for RAID1 SystemsLanyue Lu, Peter J. Varman, Jun Wang. 233-242 [doi]
- M:::2:::SI: An Improved Coherency Protocol in CMPPengyong Ma, Shuming Chen. 243-244 [doi]
- An Adaptive Arbitration Algorithm for SoC BusHaishan Li, Ming Zhang, Wei Zheng, Dongxiao Li. 245-246 [doi]
- The System Design and Performance Analysis of WiMAX Base Station MAC Based on Intel Network ProcessorMing Wu, Changsheng Xie, Qingdong Wang. 247-248 [doi]
- Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP SystemsLei Miao, Yong Qi, Di Hou, Chang-li Wu, Yue-hua Dai. 249-250 [doi]
- Research and Implementation of RAID Algorithm base on RAID ControllerGuo-Song Jiang, Changsheng Xie, Bo Wang. 251-252 [doi]
- B+ Tree Management Method of Object Attributes for Object-Based StorageGongye Zhou, Lanlan Yuan, Jincai Chen. 253-254 [doi]
- An analytical model for evaluating utilization of TCP TAHOE using markovian modelMohammad Mehdi Hassani, Reza Berangi, Hamid Tavakolaie. 257-258 [doi]
- Sliding Window Based Security Event CorrelationJiafu Hu, Yongliang Dong. 259-260 [doi]
- Safety Critical Network Based on Fibre ChannelBeizhan Wang, Yue Wang, Fei Cheng, Qi Duan. 261-262 [doi]
- Distributed Fault Monitoring Scheme Based on Optical Power for Optical Burst Switching NetworkRuyan Wang, Jiaofa Chang, Keping Long, Xiaolong Yang, Dan Liu. 263-264 [doi]
- A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKSXiaojing Ma 0002, Zhitang Li, Yao Li 0002, Jiping Zhang 0002. 265-266 [doi]
- RH-SCSI: A Reliable HyperSCSI Protocol for Networking StorageGongye Zhou, Peng Chen. 269-270 [doi]
- A New Method for RAID Consistency InitializationZhi-hu Tan, Changsheng Xie, Ji-Guang Wan. 271-272 [doi]
- Implementation and performance evaluation of an iSCSI-Based Storage VirtualizationGuang Yang 0005, Jingli Zhou, Chao Liu 0004. 273-274 [doi]
- An Object-based Storage Controller Based on Switch FabricShuibing He, Dan Feng. 275-276 [doi]
- Design and Implementation of an Efficient Multi-version File SystemXiaojia Xiang, Jiwu Shu, Wei Xue, Weimin Zheng. 277-278 [doi]