Journal: IEEE Transactions on Computers

Volume 64, Issue 3

600 -- 613Wenzheng Xu, Weifa Liang, Xiaola Lin. Approximation Algorithms for Min-Max Cycle Cover Problems
614 -- 626Cristiano G. Rezende, Azzedine Boukerche, Heitor S. Ramos, Antonio A. F. Loureiro. A Reactive and Scalable Unicast Solution for Video Streaming over VANETs
627 -- 639Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn. A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks
640 -- 653Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia. A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks
654 -- 667Sheng Zhang, Jie Wu, Sanglu Lu. Collaborative Mobile Charging
668 -- 681Abdallah Jarray, Ahmed Karmouch. Cost-Efficient Mapping for Fault-Tolerant Virtual Networks
682 -- 697Dan Xu, Xin Liu, Bin Fan. Efficient Server Provisioning and Offloading Policies for Internet Data Centers with Dynamic Load-Demand
698 -- 706Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar. Exploring the Feasibility of Fully Homomorphic Encryption
707 -- 719Dan Chen, Xiaoli Li, Lizhe Wang, Samee U. Khan, Juan Wang, Ke Zeng, Chang Cai. Fast and Scalable Multi-Way Analysis of Massive Neural Data
720 -- 732Heekwon Park, Jongmoo Choi, Donghee Lee, Sam H. Noh. iBuddy: Inverse Buddy for Enhancing Memory Allocation/Deallocation Performanceon Multi-Core Systems
733 -- 746Jeyavijayan Rajendran, Ramesh Karri, Garrett S. Rose. Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors
747 -- 762Songtao Guo, Changyin Dang, Yuanyuan Yang. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
763 -- 777Sheng Ma, Zhiying Wang, Zonglin Liu, Natalie D. Enright Jerger. Leaving One Slot Empty: Flit Bubble Flow Control for Torus Cache-Coherent NoCs
778 -- 790Chester Rebeiro, Debdeep Mukhopadhyay. Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation
791 -- 804Mieczyslaw Jessa. On the Quality of Random Sequences Produced with a Combined Random Bit Generator
805 -- 817Spiridon F. Beldianu, Sotirios G. Ziavras. Performance-Energy Optimizations for Shared Vector Accelerators in Multicores
819 -- 832Liang Liu, Yuning Song, Haiyang Zhang, Huadong Ma, Athanasios V. Vasilakos. Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks
832 -- 846Yousif Al Ridhawi, Ahmed Karmouch. QoS-Based Composition of Service Specific Overlay Networks
847 -- 861Rakan Maddah, Rami G. Melhem, Sangyeun Cho. RDIS: Tolerating Many Stuck-At Faults in Resistive Memory
862 -- 867Jiangtao Han, Haining Fan. n) Shifted Polynomial Basis Multipliers Based on Subquadratic Toeplitz Matrix-Vector Product Approach for All Irreducible Pentanomials
868 -- 875En-Jui Chang, Hsien-Kai Hsin, Chih-Hao Chao, Shu-Yen Lin, An-Yeu Andy Wu. Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems
876 -- 881Jin-Xin Zhou, Zhen-Lin Wu, Shi-Chen Yang, Kui-Wu Yuan. Symmetric Property and Reliability of Balanced Hypercube
882 -- 883Chen Li, Le Chen, Rongxing Lu, Hui Li. Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding"