600 | -- | 613 | Wenzheng Xu, Weifa Liang, Xiaola Lin. Approximation Algorithms for Min-Max Cycle Cover Problems |
614 | -- | 626 | Cristiano G. Rezende, Azzedine Boukerche, Heitor S. Ramos, Antonio A. F. Loureiro. A Reactive and Scalable Unicast Solution for Video Streaming over VANETs |
627 | -- | 639 | Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn. A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks |
640 | -- | 653 | Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia. A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks |
654 | -- | 667 | Sheng Zhang, Jie Wu, Sanglu Lu. Collaborative Mobile Charging |
668 | -- | 681 | Abdallah Jarray, Ahmed Karmouch. Cost-Efficient Mapping for Fault-Tolerant Virtual Networks |
682 | -- | 697 | Dan Xu, Xin Liu, Bin Fan. Efficient Server Provisioning and Offloading Policies for Internet Data Centers with Dynamic Load-Demand |
698 | -- | 706 | Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar. Exploring the Feasibility of Fully Homomorphic Encryption |
707 | -- | 719 | Dan Chen, Xiaoli Li, Lizhe Wang, Samee U. Khan, Juan Wang, Ke Zeng, Chang Cai. Fast and Scalable Multi-Way Analysis of Massive Neural Data |
720 | -- | 732 | Heekwon Park, Jongmoo Choi, Donghee Lee, Sam H. Noh. iBuddy: Inverse Buddy for Enhancing Memory Allocation/Deallocation Performanceon Multi-Core Systems |
733 | -- | 746 | Jeyavijayan Rajendran, Ramesh Karri, Garrett S. Rose. Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors |
747 | -- | 762 | Songtao Guo, Changyin Dang, Yuanyuan Yang. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics |
763 | -- | 777 | Sheng Ma, Zhiying Wang, Zonglin Liu, Natalie D. Enright Jerger. Leaving One Slot Empty: Flit Bubble Flow Control for Torus Cache-Coherent NoCs |
778 | -- | 790 | Chester Rebeiro, Debdeep Mukhopadhyay. Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation |
791 | -- | 804 | Mieczyslaw Jessa. On the Quality of Random Sequences Produced with a Combined Random Bit Generator |
805 | -- | 817 | Spiridon F. Beldianu, Sotirios G. Ziavras. Performance-Energy Optimizations for Shared Vector Accelerators in Multicores |
819 | -- | 832 | Liang Liu, Yuning Song, Haiyang Zhang, Huadong Ma, Athanasios V. Vasilakos. Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks |
832 | -- | 846 | Yousif Al Ridhawi, Ahmed Karmouch. QoS-Based Composition of Service Specific Overlay Networks |
847 | -- | 861 | Rakan Maddah, Rami G. Melhem, Sangyeun Cho. RDIS: Tolerating Many Stuck-At Faults in Resistive Memory |
862 | -- | 867 | Jiangtao Han, Haining Fan. n) Shifted Polynomial Basis Multipliers Based on Subquadratic Toeplitz Matrix-Vector Product Approach for All Irreducible Pentanomials |
868 | -- | 875 | En-Jui Chang, Hsien-Kai Hsin, Chih-Hao Chao, Shu-Yen Lin, An-Yeu Andy Wu. Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems |
876 | -- | 881 | Jin-Xin Zhou, Zhen-Lin Wu, Shi-Chen Yang, Kui-Wu Yuan. Symmetric Property and Reliability of Balanced Hypercube |
882 | -- | 883 | Chen Li, Le Chen, Rongxing Lu, Hui Li. Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding" |