Journal: IEEE Transactions on Computers

Volume 64, Issue 9

2421 -- 2432Kimmo Järvinen, Vassil S. Dimitrov, Reza Azarderakhsh. A Generalization of Addition Chains and Fast Inversions in Binary Fields
2433 -- 2446Seokin Hong, Soontae Kim. A Low-Cost Mechanism Exploiting Narrow-Width Values for Tolerating Hard Faults in ALU
2447 -- 2459Yan Wu, ChunGang Yan, Lu Liu, Zhijun Ding, Changjun Jiang. An Adaptive Multilevel Indexing Method for Disaster Service Discovery
2460 -- 2475Joonho Kong, Farinaz Koushanfar, Sung Woo Chung. An Energy-Efficient Last-Level Cache Architecture for Process Variation-Tolerant 3D Microprocessors
2476 -- 2489Vasilios A. Mardiris, Georgios Ch. Sirakoulis, Ioannis G. Karafyllidis. Automated Design Architecture for 1-D Cellular Automata Using Quantum Cellular Automata
2490 -- 2505Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, Yves Le Traon. Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets
2506 -- 2518Ziming Zhong, Vladimir Rychkov, Alexey L. Lastovetsky. Data Partitioning on Multicore and Multi-GPU Platforms Using Functional Performance Models
2519 -- 2533Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Jiankun Hu. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
2534 -- 2544Dan Li, Yunfei Shang, Wu He, Congjie Chen. EXR: Greening Data Center Network with Software Defined Exclusive Routing
2545 -- 2558Ji Wang, Weidong Bao, Xiaomin Zhu, Laurence T. Yang, Yang Xiang. FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds
2559 -- 2572Gang Feng, Turgay Korkmaz. Finding Multi-Constrained Multiple Shortest Paths
2573 -- 2585Heshan Kumarage, Ibrahim Khalil, Zahir Tari. Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria
2586 -- 2594Jenq-Shiou Leu, Jheng-Huei Chen, Kuen-Han Li. Hybrid Search Scheme for Social Networks Supported by Dynamic Weighted Distributed Label Clustering
2595 -- 2608Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou. k-Times Attribute-Based Anonymous Access Control for Cloud Computing
2609 -- 2622Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen. MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
2623 -- 2636Wangdong Yang, Kenli Li, Zeyao Mo, Keqin Li. Performance Optimization Using Partitioned SpMV on GPUs and Multicore CPUs
2637 -- 2651Suzhen Wu, Hong Jiang, Bo Mao. Proactive Data Migration for Improved Storage Availability in Large-Scale Data Centers
2652 -- 2663Jo C. Ebergen, Navaneeth Jamadagni. Radix-2 Division Algorithms with an Over-Redundant Digit Set
2664 -- 2674Michail Maniatakos, Maria K. Michael, Chandra Tirumurti, Yiorgos Makris. Revisiting Vulnerability Analysis in Modern Microprocessors
2675 -- 2690Wanchun Jiang, Fengyuan Ren, Ran Shu, Yongwei Wu, Chuang Lin. Sliding Mode Congestion Control for Data Center Ethernet Networks
2691 -- 2707Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar. STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data
2708 -- 2715Nilanka T. Rajapaksha, Arjuna Madanayake, Renato J. Cintra, Jithra Adikari, Vassil S. Dimitrov. VLSI Computational Architectures for the Arithmetic Cosine Transform
2716 -- 2729Yang Wang 0006, Paul Lu, Kenneth B. Kent. WaFS: A Workflow-Aware File System for Effective Storage Utilization in the Cloud

Volume 64, Issue 8

2103 -- 2118Noureddine Lasla, Mohamed F. Younis, Abdelraouf Ouadjaout, Nadjib Badache. An Effective Area-Based Localization Algorithm for Wireless Networks
2119 -- 2131Hsien-Kai Hsin, En-Jui Chang, Kuan-Yu Su, An-Yeu Andy Wu. Ant Colony Optimization-Based Adaptive Network-on-Chip Routing Framework Using Network Information Region
2132 -- 2144Masoud Dehyadegari, Andrea Marongiu, Mohammad Reza Kakoee, Siamak Mohammadi, Naser Yazdani, Luca Benini. Architecture Support for Tightly-Coupled Multi-Core Clusters with Shared-Memory HW Accelerators
2145 -- 2157Yunfeng Zhu, Jian Lin, Patrick P. C. Lee, Yinlong Xu. Boosting Degraded Reads in Heterogeneous Erasure-Coded Storage Systems
2158 -- 2168Zhen Huang, Cheng Wang, Milos Stojmenovic, Amiya Nayak. Characterization of Cascading Failures in Interdependent Cyber-Physical Systems
2169 -- 2181Qing'an Li, Yanxiang He, Jianhua Li, Liang Shi, Yiran Chen, Chun Jason Xue. Compiler-Assisted Refresh Minimization for Volatile STT-RAM Cache
2182 -- 2203Rami Sheikh, James Tuck, Eric Rotenberg. Control-Flow Decoupling: An Approach for Timely, Non-Speculative Branching
2204 -- 2212Nicolas Meloni, M. Anwar Hasan. Efficient Double Bases for Scalar Multiplication
2213 -- 2225Cijo George, Sathish S. Vadhiyar. Fault Tolerance on Large Scale Systems using Adaptive Process Replication
2226 -- 2238Xinmu Wang, Yu Zheng, Abhishek Basak, Swarup Bhunia. IIPS: Infrastructure IP for Secure SoC Design
2239 -- 2252Etem Deniz, Alper Sen 0001, Brian Kahne, Jim Holt. MINIME: Pattern-Aware Multicore Benchmark Synthesizer
2253 -- 2266Lei Yang, Jiannong Cao, Hui Cheng, Yusheng Ji. Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud Applications
2267 -- 2278Xin Zhan, Sherief Reda. Power Budgeting Techniques for Data Centers
2279 -- 2292Shouvik Bardhan, Daniel A. Menascé. Predicting the Effect of Memory Contention in Multi-Core Computers Using Analytic Performance Models
2293 -- 2307Xuyun Zhang, Wan-Chun Dou, Jian Pei, Surya Nepal, Chi Yang, Chang Liu, Jinjun Chen. Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud
2308 -- 2322Umair Sadiq, Mohan Kumar, Andrea Passarella, Marco Conti. Service Composition in Opportunistic Networks: A Load and Mobility Aware Solution
2323 -- 2336Héctor J. García, Igor L. Markov. Simulation of Quantum Circuits via Stabilizer Frames
2337 -- 2352Seungcheol Baek, Hyung Gyu Lee, Chrysostomos Nicopoulos, JungHee Lee, Jongman Kim. Size-Aware Cache Management for Compressed Cache Architectures
2353 -- 2366Feng Gu, Khaled Shaban, Nasir Ghani, Samee Khan, Mahshid Rahnamay-Naeini, Majeed M. Hayat, Chadi Assi. Survivable Cloud Network Mapping for Disaster Recovery Support
2367 -- 2381Yanchao Lu, Bingsheng He, Xueyan Tang, Minyi Guo. Synergy of Dynamic Frequency Scaling and Demotion on DRAM Power Management: Models and Optimizations
2382 -- 2393Wei Xue, Chao Yang, Haohuan Fu, Xinliang Wang, Yangtong Xu, Junfeng Liao, Lin Gan, Yutong Lu, Rajiv Ranjan, Lizhe Wang. Ultra-Scalable CPU-MIC Acceleration of Mesoscale Atmospheric Modeling on Tianhe-2
2394 -- 2407Bhavesh Khemka, Ryan Friese, Luis Diego Briceno, Howard Jay Siegel, Anthony A. Maciejewski, Gregory A. Koenig, Chris Groër, Gene Okonski, Marcia Hilton, Rajendra Rambharos, Steve Poole. Utility Functions and Resource Management in an Oversubscribed Heterogeneous Computing Environment
2408 -- 2414Jiantao Zhou, Caihe Lan, William N. N. Hung, Xinrui Guo, Xiaoyu Song. A Quantitative Characterization of Cross Coverage
2415 -- 2420Irith Pomeranz. Piecewise-Functional Broadside Tests Based on Reachable States

Volume 64, Issue 7

1805 -- 1818Thi Huyen Chau Nguyen, Pascal Richard, Emmanuel Grolleau. An fptas for Response Time Analysis of Fixed Priority Real-Time Tasks with Resource Augmentation
1819 -- 1829Deze Zeng, Song Guo, Ahmed Barnawi, Shui Yu, Ivan Stojmenovic. An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS
1830 -- 1843Chuan Luo, Shaowei Cai, Wei Wu, Zhong Jie, Kaile Su. CCLS: An Efficient Local Search Algorithm for Weighted Maximum Satisfiability
1844 -- 1856Chunsheng Zhu, Victor C. M. Leung, Laurence T. Yang, Lei Shu. Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing
1857 -- 1869Feng Xia, Ahmedin Mohammed Ahmed, Laurence Tianruo Yang, Zhongxuan Luo. Community-Based Event Dissemination with Optimal Load Balancing
1870 -- 1883Xiaojiang Ren, Weifa Liang, Wenzheng Xu. Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling
1884 -- 1897Alejandro Valero, Julio Sahuquillo, Salvador Petit, Pedro López, José Duato. Design of Hybrid Second-Level Caches
1898 -- 1911Runhui Li, Jian Lin, Patrick P. C. Lee. Enabling Concurrent Failure Recovery for Regenerating-Coding-Based Storage Systems: From Theory to Practice
1912 -- 1926Zhiyang Guo, Yuanyuan Yang. Exploring Server Redundancy in Nonblocking Multicast Data Center Networks
1927 -- 1939Jongmin Lee 0002, Soontae Kim. Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven byMiss Cost Reduction
1940 -- 1953Giovanni Causapruno, Marco Vacca, Mariagrazia Graziano, Maurizio Zamboni. Interleaving in Systolic-Arrays: A Throughput Breakthrough
1954 -- 1967Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann. Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
1968 -- 1982Md. Zakirul Alam Bhuiyan, Guojun Wang, Athanasios V. Vasilakos. Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks
1983 -- 1997Shengyan Hong, Thidapat Chantem, Xiaobo Sharon Hu. Local-Deadline Assignment for Distributed Real-Time Systems
1998 -- 2011Md. Mamunur Rashid, Iqbal Gondal, Joarder Kamruzzaman. Mining Associated Patterns from Wireless Sensor Networks
2012 -- 2019David W. Matula, Mihai T. Panu, Jonathan Y. Zhang. Multiplicative Division Employing Independent Factors
2020 -- 2035Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong. New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis
2036 -- 2048Shin-Haeng Kang, Hae-woo Park, Sungchan Kim, Hyunok Oh, Soonhoi Ha. Optimal Checkpoint Selection with Dual-Modular Redundancy Hardening
2049 -- 2059Lin Gu, Deze Zeng, Ahmed Barnawi, Song Guo, Ivan Stojmenovic. Optimal Task Placement with QoS Constraints in Geo-Distributed Data Centers Using DVFS
2060 -- 2070James Demmel, Hong Diep Nguyen. Parallel Reproducible Summation
2071 -- 2083Zhenzhe Zheng, Yang Gui, Fan Wu, Guihai Chen. STAR: Strategy-Proof Double Auctions for Multi-Cloud, Multi-Tenant Bandwidth Reservation
2084 -- 2091Igor Ikodinovic. Methodology for Cycle-Accurate DRAM Performance Analysis
2092 -- 2097Kazuteru Namba, Fabrizio Lombardi. Non-Binary Orthogonal Latin Square Codes for a Multilevel Phase Charge Memory (PCM)
2098 -- 2102Ting Cui, Chenhui Jin, Zhiyin Kong. On Compact Cauchy Matrices for Substitution-Permutation Networks

Volume 64, Issue 6

1506 -- 1508David Bader. State of the Journal
1509 -- 1521Yarkin Doröz, Erdinç Öztürk, Berk Sunar. Accelerating Fully Homomorphic Encryption in Hardware
1522 -- 1533Tao Zhang, Jianxin Wang, Jiawei Huang, Yi Huang, Jianer Chen, Yi Pan. Adaptive-Acceleration Data Center TCP
1534 -- 1547Alberto Ros, Polychronis Xekalakis, Marcelo Cintra, Manuel E. Acacio, José M. García 0001. Adaptive Selection of Cache Indexing Bits for Removing Conflict Misses
1548 -- 1563Baoxian Zhang, Xili Wan, Junzhou Luo, Xiaojun Shen. A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees
1564 -- 1578Bijan Alizadeh, Payman Behnam, Somayeh Sadeghi Kohan. A Scalable Formal Debugging Approach with Auto-Correction Capability Based on Static Slicing and Dynamic Ranking for RTL Datapath Designs
1579 -- 1593Samaneh Ghandali, Bijan Alizadeh, Masahiro Fujita, Zainalabedin Navabi. Automatic High-Level Data-Flow Synthesis and Optimization of Polynomial Datapaths Using Functional Decomposition
1594 -- 1606Naimah Yaakob, Ibrahim Khalil, Heshan Kumarage, Mohammed Atiquzzaman, Zahir Tari. By-Passing Infected Areas in Wireless Sensor Networks Using BPR
1607 -- 1621Hao Zheng 0001, Zhen Zhang, Chris J. Myers, Emmanuel Rodriguez, Yingying Zhang. Compositional Model Checking of Concurrent Systems
1622 -- 1632Chun-An Chen, Guey-Yun Chang, Sun-Yuan Hsieh. Conditional (t, k)-Diagnosis in Graphs by Using the Comparison Diagnosis Model
1633 -- 1646Chulmin Kim, Kyu Ho Park. Credit-Based Runtime Placement of Virtual Machines on a Single NUMA System for QoS of Data Access Performance
1647 -- 1657Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra. Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions
1658 -- 1669Yan Lindsay Sun, Tin Yu Wu, Guotao Zhao, Mohsen Guizani. Efficient Rule Engine for Smart Building Systems
1670 -- 1679Peng Li, Song Guo, Jiankun Hu. Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks
1680 -- 1693Thomas Olutoyin Oshin, Stefan Poslad, Zelun Zhang. Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones
1694 -- 1706Tayyeb Mahmood, Seokin Hong, Soontae Kim. Ensuring Cache Reliability and Energy Scaling at Near-Threshold Voltage With Macho
1707 -- 1714Sanjit Chatterjee, Koray Karabina, Alfred Menezes. Fault Attacks on Pairing-Based Protocols Revisited
1715 -- 1728Haiying Shen, Ze Li, Jinwei Liu, Joseph Edward Grant. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1729 -- 1741Renhai Chen, Zhiwei Qin, Yi Wang, Duo Liu, Zili Shao, Yong Guan. On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems
1742 -- 1754Marco E. T. Gerards, Johann L. Hurink, Jan Kuper. On the Interplay between Global DVFS and Scheduling Tasks with Precedence Constraints
1755 -- 1768Sheng Di, Derrick Kondo, Cho-Li Wang. Optimization of Composite Cloud Service Processing with Virtual Machines
1769 -- 1782Andrew D. Brown, Stephen B. Furber, Jeffrey S. Reeve, Jim D. Garside, Kier J. Dugan, Luis A. Plana, Steve Temple. SpiNNaker - Programming Model
1783 -- 1797Joshua Yung Lih Low, Ching-Chuen Jong. Unified Mitchell-Based Approximation for Efficient Logarithmic Conversion Circuit
1798 -- 1804Muhammad Jawad, Sahibzada Muhammad Ali, Joel A. Jorgenson, Samee U. Khan. JEM: Just in Time/Just Enough Energy Management Methodology for Computing Systems

Volume 64, Issue 5

1217 -- 1229Walid Ibrahim, Marwa Shousha, John W. Chinneck. Accurate and Efficient Estimation of Logic Circuits Reliability Bounds
1230 -- 1240Shyue-Kung Lu, Tsu-Lin Li, Masaki Hashizume, Jiann-Liang Chen. Address Scrambling and Data Inversion Techniques for Yield Enhancement of NROM-Based ROMs
1241 -- 1253Alan Burns, Marina Gutierrez, Mario Aldea Rivas, Michael González Harbour. A Deadline-Floor Inheritance Protocol for EDF Scheduled Embedded Real-Time Systems with Resource Sharing
1254 -- 1267Yi Tang, Neil W. Bergmann. A Hardware Scheduler Based on Task Queues for FPGA-Based Embedded Real-Time Systems
1268 -- 1281Cong Liu, Jie Han, Fabrizio Lombardi. An Analytical Framework for Evaluating the Error Characteristics of Approximate Adders
1282 -- 1295Christos Liaskos, Ageliki Tsioliaridou. A Promise of Realizable, Ultra-Scalable Communications at Nano-Scale: A Multi-Modal Nano-Machine Architecture
1296 -- 1310Chao Wang, Xi Li, Junneng Zhang, Peng Chen 0004, Yunji Chen, Xuehai Zhou, Ray C. C. Cheung. Architecture Support for Task Out-of-Order Execution in MPSoCs
1311 -- 1322Waltenegus Dargie. A Stochastic Model for Estimating the Power Consumption of a Processor
1323 -- 1335WenPing Liu, Hongbo Jiang, Yang Yang, Xiaofei Liao, Hongzhi Lin, Zemeng Jin. A Unified Framework for Line-Like Skeleton Extraction in 2D/3D Sensor Networks
1336 -- 1348Michael Menzel, Rajiv Ranjan, Lizhe Wang, Samee U. Khan, Jinjun Chen. CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds
1349 -- 1360Eunji Lee, Seunghoon Yoo, Hyokyung Bahn. Design and Implementation of a Journaling File System for Phase-Change Memory
1361 -- 1374Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen. End-to-End Communication Delay Analysis in Industrial Wireless Networks
1375 -- 1388Youjip Won, Kyeongyeol Lim, Jaehong Min. MUCH: Multithreaded Content-Based File Chunking
1389 -- 1401Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi. PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency
1402 -- 1415Ziming Zheng, Li Yu, Zhiling Lan. Reliability-Aware Speedup Models for Parallel Applications with Coordinated Checkpointing/Restart
1416 -- 1428Milan Lukic, Ahmed Barnawi, Ivan Stojmenovic. Robot Coordination for Energy-Balanced Matching and Sequence Dispatch of Robots to Events
1429 -- 1441Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez. Software Implementation of an Attribute-Based Encryption Scheme
1442 -- 1455Tianshi Chen, Qi Guo, Olivier Temam, Yue Wu, Yungang Bao, Zhiwei Xu, Yunji Chen. Statistical Performance Comparisons of Computers
1456 -- 1469Gaofeng Zhang, Xiao Liu, Yun Yang. Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud
1470 -- 1482Chuliang Weng, Jianfeng Zhan, Yuan Luo. TSAC: Enforcing Isolation ofVirtual Machines in Clouds
1483 -- 1496Mark Gottscho, Luis Angel D. Bathen, Nikil Dutt, Alex Nicolau, Puneet Gupta. ViPZonE: Hardware Power Variability-Aware Virtual Memory Management for Energy Savings
1497 -- 1501Salvatore Pontarelli, Pedro Reviriego, Marco Ottavi, Juan Antonio Maestro. Low Delay Single Symbol Error Correction Codes Based on Reed Solomon Codes
1502 -- 1505Peter Kornerup. Reviewing High-Radix Signed-Digit Adders

Volume 64, Issue 4

884 -- 898Bo-Cheng Charles Lai, Hsien-Kai Kuo, Jing-Yang Jou. A Cache Hierarchy Aware Thread Mapping Methodology for GPGPUs
899 -- 911Dayong Ye, Minjie Zhang. A Self-Adaptive Strategy for Evolution of Cooperation in Distributed Networks
912 -- 924Paolo Di Francesco, Séamas McGettrick, Uchenna K. Anyanwu, James C. OSullivan, Allen B. MacKenzie, Luiz A. DaSilva. A Split MAC Approach for SDR Platforms
925 -- 940Jiantao Wang, Kam-yiu Lam, Yuan-Hao Chang, Jen-Wei Hsieh, Po-Chun Huang. +-Tree for Flash-Based Embedded Database Systems
941 -- 954JinKyu Lee, Kang G. Shin, Insik Shin, Arvind Easwaran. Composition of Schedulability Analyses for Real-Time Multiprocessor Systems
955 -- 970Silvia Franchini, Antonio Gentile, Filippo Sorbello, Giorgio Vassallo, Salvatore Vitabile. ConformalALU: A Conformal Geometric Algebra Coprocessor for Medical Image Processing
971 -- 983Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
984 -- 994Amir Momeni, Jie Han, Paolo Montuschi, Fabrizio Lombardi. Design and Analysis of Approximate Compressors for Multiplication
995 -- 1014Antonio García-Guirado, Ricardo Fernández Pascual, Jose M. Garcia. ICCI: In-Cache Coherence Information
1015 -- 1028Mustafa Ilhan Akbas, Melike Erol-Kantarci, Damla Turgut. Localization for Wireless Sensor and Actor Networks with Meandering Mobility
1029 -- 1042Kang Chen, Haiying Shen. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
1043 -- 1057Gregory Levitin, Liudong Xing, Barry W. Johnson, Yuan-Shun Dai. Mission Reliability, Cost and Time for Cold Standby Computing Systems with Periodic Backup
1058 -- 1073Zhiyang Guo, Yuanyuan Yang. On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy
1074 -- 1089Aurel Randolph, Hanifa Boucheneb, Abdessamad Imine, Alejandro Quintero. On Synthesizing a Consistent Operational Transformation Approach
1090 -- 1103Tarek Nechma, Mark Zwolinski. Parallel Sparse Matrix Solution for Circuit Simulation on FPGAs
1104 -- 1118Tania Banerjee, Sartaj Sahni, Gunasekaran S. Seetharaman. PC-TRIO: A Power Efficient TCAM Architecture for Packet Classifiers
1119 -- 1132Tania Banerjee-Mishra, Sartaj Sahni. Pubsub: An Efficient Publish/Subscribe System
1133 -- 1148Hui Sun, Xiao Qin, Hong Jiang, Jianzhong Huang, Changsheng Xie. RB-Explorer: An Accurate and Practical Approach to Write Amplification Measurement for SSDs
1149 -- 1161Pei Huang, Chen Wang, Li Xiao. RC-MAC: A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks
1162 -- 1176Wen Xia, Hong Jiang, Dan Feng, Yu Hua. Similarity and Locality Based Indexing for High Performance Data Deduplication
1177 -- 1190Hany Kashif, Sina Gholamian, Hiren D. Patel. SLA: A Stage-Level Latency Analysisfor Real-Time Communicationin a Pipelined Resource Model
1191 -- 1200David Lubicz, Nathalie Bochard. Towards an Oscillator Based TRNG with a Certified Entropy Rate
1201 -- 1207Alan A. Bertossi, Daniele Diodati, Cristina M. Pinotti. Storage Placement in Path Networks
1208 -- 1214Kamalika Datta, Indranil Sengupta, Hafizur Rahaman. A Post-Synthesis Optimization Technique for Reversible Circuits Exploiting Negative Control Lines
1215 -- 1216Arash Reyhani-Masoleh. m) Using Subquadratic Toeplitz Matrix-Vector Product Approach"

Volume 64, Issue 3

600 -- 613Wenzheng Xu, Weifa Liang, Xiaola Lin. Approximation Algorithms for Min-Max Cycle Cover Problems
614 -- 626Cristiano G. Rezende, Azzedine Boukerche, Heitor S. Ramos, Antonio A. F. Loureiro. A Reactive and Scalable Unicast Solution for Video Streaming over VANETs
627 -- 639Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn. A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks
640 -- 653Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia. A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks
654 -- 667Sheng Zhang, Jie Wu, Sanglu Lu. Collaborative Mobile Charging
668 -- 681Abdallah Jarray, Ahmed Karmouch. Cost-Efficient Mapping for Fault-Tolerant Virtual Networks
682 -- 697Dan Xu, Xin Liu, Bin Fan. Efficient Server Provisioning and Offloading Policies for Internet Data Centers with Dynamic Load-Demand
698 -- 706Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar. Exploring the Feasibility of Fully Homomorphic Encryption
707 -- 719Dan Chen, Xiaoli Li, Lizhe Wang, Samee U. Khan, Juan Wang, Ke Zeng, Chang Cai. Fast and Scalable Multi-Way Analysis of Massive Neural Data
720 -- 732Heekwon Park, Jongmoo Choi, Donghee Lee, Sam H. Noh. iBuddy: Inverse Buddy for Enhancing Memory Allocation/Deallocation Performanceon Multi-Core Systems
733 -- 746Jeyavijayan Rajendran, Ramesh Karri, Garrett S. Rose. Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors
747 -- 762Songtao Guo, Changyin Dang, Yuanyuan Yang. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics
763 -- 777Sheng Ma, Zhiying Wang, Zonglin Liu, Natalie D. Enright Jerger. Leaving One Slot Empty: Flit Bubble Flow Control for Torus Cache-Coherent NoCs
778 -- 790Chester Rebeiro, Debdeep Mukhopadhyay. Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation
791 -- 804Mieczyslaw Jessa. On the Quality of Random Sequences Produced with a Combined Random Bit Generator
805 -- 817Spiridon F. Beldianu, Sotirios G. Ziavras. Performance-Energy Optimizations for Shared Vector Accelerators in Multicores
819 -- 832Liang Liu, Yuning Song, Haiyang Zhang, Huadong Ma, Athanasios V. Vasilakos. Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks
832 -- 846Yousif Al Ridhawi, Ahmed Karmouch. QoS-Based Composition of Service Specific Overlay Networks
847 -- 861Rakan Maddah, Rami G. Melhem, Sangyeun Cho. RDIS: Tolerating Many Stuck-At Faults in Resistive Memory
862 -- 867Jiangtao Han, Haining Fan. n) Shifted Polynomial Basis Multipliers Based on Subquadratic Toeplitz Matrix-Vector Product Approach for All Irreducible Pentanomials
868 -- 875En-Jui Chang, Hsien-Kai Hsin, Chih-Hao Chao, Shu-Yen Lin, An-Yeu Andy Wu. Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems
876 -- 881Jin-Xin Zhou, Zhen-Lin Wu, Shi-Chen Yang, Kui-Wu Yuan. Symmetric Property and Reliability of Balanced Hypercube
882 -- 883Chen Li, Le Chen, Rongxing Lu, Hui Li. Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding"

Volume 64, Issue 2

303 -- 315Juan Luis Jerez, George A. Constantinides, Eric C. Kerrigan. A Low Complexity Scaling Method for the Lanczos Kernel in Fixed-Point Arithmetic
316 -- 328Abdullah Kayi, Olivier Serres, Tarek A. El-Ghazawi. Adaptive Cache Coherence Mechanisms with Producer-Consumer Sharing Optimization for Chip Multiprocessors
329 -- 341Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, François-Xavier Standaert, Paolo Ienne. Automatic Application of Power Analysis Countermeasures
342 -- 352Alex Chia-Chun Hsu, David S. L. Wei, C. C. Jay Kuo. Coexistence Wi-Fi MAC Design for Mitigating Interference Caused by Collocated Bluetooth
353 -- 367Haiying Shen, Yuhua Lin, Ting Li. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
368 -- 381Leonid Yavits, Amir Morad, Ran Ginosar. Computer Architecture with Associative Processor Replacing Last-Level Cache and SIMD Accelerator
382 -- 395Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu 0001. Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring
396 -- 409Itthichok Jangjaimon, Nian-Feng Tzeng. Effective Cost Reduction for Elastic Clouds under Spot Instance Pricing Through Adaptive Checkpointing
410 -- 424Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett S. Rose, Youngok Pino, Ozgur Sinanoglu, Ramesh Karri. Fault Analysis-Based Logic Encryption
425 -- 437Jin Li, Jingwei Li, Xiaofeng Chen 0001, Chunfu Jia, Wenjing Lou. Identity-Based Encryption with Outsourced Revocation in Cloud Computing
438 -- 451Ebrahim A. H. Abdulrahman, Arash Reyhani-Masoleh. New Regular Radix-8 Scheme for Elliptic Curve Scalar Multiplication without Pre-Computation
452 -- 463Daqiang Zhang, Daqing Zhang, Haoyi Xiong, Laurence T. Yang, Vincent Gauthier. NextCell: Predicting Location Using Social Interplay from Cell Phone Traces
464 -- 476Bin Xue, Sandeep K. Shukla, S. S. Ravi. Optimization of Latency Insensitive Systems Through Back Pressure Minimization
477 -- 491Abdulla Al-Qawasmeh, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel. Power and Thermal-Aware Workload Allocation in Heterogeneous Data Centers
492 -- 503Ching-Nung Yang, Zih-Yang Lin, Sheng-Lung Peng. Reducing Code Length of Second-Order Spectral-Null Code
504 -- 517Scott Schneider, Martin Hirzel, Bugra Gedik, Kun-Lung Wu. Safe Data Parallelism for General Streaming
518 -- 532Haiying Shen, Jinwei Liu, Kang Chen, Jianwei Liu, Stanley Moyer. SCPS: A Social-Aware Distributed Cyber-Physical Human-Centric Search Engine
533 -- 546Mehmet Kayaalp, Timothy Schmitt, Junaid Nomani, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh. Signature-Based Protection from Code Reuse Attacks
547 -- 555Shuming Zhou, Limei Lin, Li Xu, Dajin Wang. The t/k-Diagnosability of Star Graph Networks
556 -- 568Weikuan Yu, Yandong Wang, Xinyu Que, Cong Xu. Virtual Shuffling for Efficient Data Movement in MapReduce
569 -- 581Youngjae Lee, Jin-Soo Kim, Sang-Won Lee, Seungryoul Maeng. Zombie Chasing: Efficient Flash Management Considering Dirty Data in the Buffer Cache
582 -- 586Yu-Chieh Cheng, Pi-Chung Wang. Packet Classification Using Dynamically Generated Decision Trees
587 -- 592Bang Wang, Han Xu, Wenyu Liu, Laurence T. Yang. The Optimal Node Placement for Long Belt Coverage in Wireless Networks
593 -- 599Enrico Bini. The Quadratic Utilization Upper Bound for Arbitrary Deadline Real-Time Tasks

Volume 64, Issue 12

3322 -- 3334Leonel Sousa. n RNS Scalers for Extended 4-Moduli Sets
3335 -- 3347Urban Ingelsson, Sandeep Kumar Goel, Erik Larsson, Erik Jan Marinissen. Abort-on-Fail Test Scheduling for Modular SOCs without and with Preemption
3348 -- 3361Jen-Wei Hsieh, Chung-Wei Chen, Han-Yi Lin. Adaptive ECC Scheme for Hybrid SSD's
3362 -- 3375Myounggyu Won, Radu Stoleru. A Hybrid Multicast Routing for Large Scale Sensor Networks with Holes
3376 -- 3388David T. Lee, Jehoshua Bruck. Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits
3389 -- 3403Xiaomin Zhu, Chao Chen, Laurence T. Yang, Yang Xiang. ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds
3404 -- 3416Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee, Chao-Yi Chen. Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching
3417 -- 3429Linfeng Chen, Aijiao Cui, Chip-Hong Chang. Design of Optimal Scan Tree Based on Compact Test Patterns for Test Time Reduction
3430 -- 3443Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, Chun-Jen Chung. Efficient Attribute-Based Comparable Data Access Control
3444 -- 3460Che-Wei Tsao, Yuan-Hao Chang, Ming-Chang Yang, Po-Chun Huang. Efficient Victim Block Selection for Flash Storage Devices
3461 -- 3474Jeongseob Ahn, Seongwook Jin, Jaehyuk Huh. Fast Two-Level Address Translation for Virtualized Systems
3475 -- 3487Shadi G. Alawneh, Roelof Dragt, Dennis K. Peters, Claude Daley, Stephen Bruneau. Hyper-Real-Time Ice Simulation and Modeling Using GPGPU
3488 -- 3499Huawei Huang, Song Guo, Peng Li, Baoliu Ye, Ivan Stojmenovic. Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network
3500 -- 3514Jiang-bo Qian, Qiang Zhu, HuaHui Chen. Multi-Granularity Locality-Sensitive Bloom Filter
3515 -- 3527Hong Yao, Deze Zeng, Huawei Huang, Song Guo, Ahmed Barnawi, Ivan Stojmenovic. Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs
3528 -- 3540Meikang Qiu, Zhong Ming, Jiayin Li, Keke Gai, Ziliang Zong. Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm
3541 -- 3554Anna Ye Du, Sanjukta Das-Smith, Zhouhan Yang, Chunming Qiao, Ram Ramesh. Predicting Transient Downtime in Virtual Server Systems: An Efficient Sample Path Randomization Approach
3555 -- 3568Dominic DiTomaso, Avinash Karanth Kodi, Ahmed Louri, Razvan C. Bunescu. Resilient and Power-Efficient Multi-Function Channel Buffers in Network-on-Chip Architectures
3569 -- 3579Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Secure Distributed Deduplication Systems with Improved Reliability
3580 -- 3590Mitchell A. Thornton. Simulation and Implication Using a Transfer Function Model for Switching Logic
3591 -- 3604Ashkan Eghbal, Pooria M. Yaghini, Nader Bagherzadeh, Misagh Khayambashi. Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip
3605 -- 3618Anna Bernasconi, Valentina Ciriani, Gabriella Trucco, Tiziano Villa. Using Flexibility in P-Circuits by Boolean Relations
3619 -- 3620Young-Sik Kim. Comments on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding"

Volume 64, Issue 11

3022 -- 3036Sai Manoj P. D., Hao Yu, Kanwen Wang. 3D Many-Core Microprocessor Power Management by Space-Time Multiplexing Based Demand-Supply Matching
3037 -- 3050Jianzhong Huang, Xiao Qin, Xianhai Liang, Changsheng Xie. An Efficient I/O-Redirection-Based Reconstruction Scheme for Erasure-Coded Storage Clusters
3051 -- 3063Fangming Liu, Peng Shu, John C. S. Lui. AppATP: An Energy Conserving Adaptive Mobile-Cloud Transmission Protocol
3064 -- 3078Jing Mei, Kenli Li, Aijia Ouyang, Keqin Li. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
3079 -- 3090Yuan-Yao Shih, Ai-Chun Pang, Meng-Hsun Tsai, Chien-Han Chai. A Rewarding Framework for Network Resource Sharing in Co-Channel Hybrid Access Femtocell Networks
3091 -- 3101Jaeyong Chung, Lok-Won Kim. Bit-Width Optimization by Divide-and-Conquer for Fixed-Point Digital Signal Processing Systems
3102 -- 3114Nagesh B. Lakshminarayana, Hyesoon Kim. Block-Precise Processors: Low-Power Processors with Reduced Operand Store Accesses and Result Broadcasts
3115 -- 3127Jen-Wei Hsieh, Yuan-Hung Kuan. DCCS: Double Circular Caching Scheme for DRAM/PRAM Hybrid Cache
3128 -- 3139Deze Zeng, Peng Li, Song Guo, Toshiaki Miyazaki, Jiankun Hu, Yong Xiang. Energy Minimization in Multi-Task Software-Defined Sensor Networks
3140 -- 3152Alfonso Rodriguez, Félix Moreno. Evolutionary Computing and Particle Filtering: A Hardware-Based Motion Estimation System
3153 -- 3166Zhibin Yu, Lieven Eeckhout, Nilanjan Goswami, Tao Li, Lizy K. John, Hai Jin, Cheng-Zhong Xu, Junmin Wu. GPGPU-MiniBench: Accelerating GPGPU Micro-Architecture Simulation
3167 -- 3180Jaekyu Lee, Dong Hyuk Woo, Hyesoon Kim, Mani Azimi. GREEN Cache: Exploiting the Disciplined Memory Model of OpenCL on GPUs
3181 -- 3196Mwaffaq Otoom, JoAnn M. Paul. Multiprocessor Capacity Metric and Analysis
3197 -- 3209Juri Ranieri, Alessandro Vincenzi, Amina Chebira, David Atienza, Martin Vetterli. Near-Optimal Thermal Monitoring Framework for Many-Core Systems-on-Chip
3210 -- 3222Dawei Li, Jie Wu 0001. On Data Center Network Architectures for Interconnecting Dual-Port Servers
3223 -- 3236Zichen Xu, Yi-Cheng Tu, Xiaorui Wang. Online Energy Estimation of Relational Operations in Database Systems
3237 -- 3248Yunfei Shang, Dan Li, Jing Zhu, Mingwei Xu. On the Network Power Effectiveness of Data Center Architectures
3249 -- 3264Zhemin Zhang, Thomas G. Robertazzi. Scheduling Divisible Loads in Gaussian, Mesh and Torus Network of Processors
3265 -- 3277Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, Alvin Chan. STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems
3278 -- 3292Wenli Zheng, Kai Ma, Xiaorui Wang. TE-Shave: Reducing Data Center Capital and Operating Expenses with Thermal Energy Storage
3293 -- 3303Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang. Verifiable Auditing for Outsourced Database in Cloud Computing
3304 -- 3316Yunpeng Chai, Zhihui Du, Xiao Qin, David A. Bader. WEC: Improving Durability of SSD Cache Drives by Caching Write-Efficient Data
3317 -- 3321Irith Pomeranz. Test Vector Omission for Fault Coverage Improvement of Functional Test Sequences

Volume 64, Issue 10

2730 -- 3740Yu-Chun Cheng, Cheng-Fu Chou, Eric Hsiao-Kuang Wu, Gen-Huey Chen. A Cognitive TCP Design for a Cognitive Radio Network with an Unstable-Bandwidth Link
2741 -- 2751Wenzhi Chen, Lei Xu, Guoxi Li, Yang Xiang. A Lightweight Virtualization Solution for Android Devices
2752 -- 2766Hanying Zheng, Xueyan Tang. Analysis of Server Provisioning for Distributed Interactive Applications
2767 -- 2780Sheng-Wei Cheng, Ling-Chia Ku, Pi-Cheng Hsiu. Dynamic Antenna Management for Uplink Energy Efficiency on 802.11n Mobile Devices
2781 -- 2795Dong Yuan, Xiao Liu, Yun Yang. Dynamic On-the-Fly Minimum Cost Benchmarking for Storing Generated Scientific Datasets in the Cloud
2796 -- 2808Roberto Baldoni, Silvia Bonomi, Marco Platania, Leonardo Querzoni. Efficient Notification Ordering for Geo-Distributed Pub/Sub Systems
2809 -- 2818Kaimin Wei, Song Guo, Deze Zeng, Ke Xu, Keqiu Li. Exploiting Small World Properties for Message Forwarding in Delay Tolerant Networks
2819 -- 2832Youyou Lu, Jiwu Shu, Jia Guo, Shuai Li, Onur Mutlu. High-Performance and Lightweight Transaction Support in Flash-Based SSDs
2833 -- 2846Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng. H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor
2847 -- 2861Francisco J. Andujar-Munoz, Juan A. Villar-Ortiz, José L. Sánchez 0002, Francisco José Alfaro, José Duato. N-Dimensional Twin Torus Topology
2862 -- 2874Keunsoo Kim, Benjamin Y. Cho, Won Woo Ro, Jean-Luc Gaudiot. Network Variation and Fault Tolerant Performance Acceleration in Mobile Devices with Simultaneous Remote Execution
2875 -- 2890Christophe Nègre, Jean-Marc Robert. New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic
2891 -- 2901Ioannis Voyiatzis, Dimitris J. Kavvadias. On the Generation of SIC Pairs in Optimal Time
2902 -- 2911Kazuteru Namba, Fabrizio Lombardi. Parallel Decodable Two-Level Unequal Burst Error Correcting Codes
2912 -- 2925Subhadeep Sarkar, Sudip Misra, Bitan Bandyopadhyay, Chandan Chakraborty, Mohammad S. Obaidat. Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime
2926 -- 2939Guiyuan Jiang, Jigang Wu, Yajun Ha, Yi Wang 0016, Jizhou Sun. Reconfiguring Three-Dimensional Processor Arrays for Fault-Tolerance: Hardness and Heuristic Algorithms
2940 -- 2952William P. McCartney, Nigamanth Sridhar. Stackless Multi-Threading for Embedded Systems
2953 -- 2967Haiying Shen, Guoxin Liu, Harrison Chandler. Swarm Intelligence Based File Replication and Consistency Maintenance in Structured P2P File Sharing Systems
2968 -- 2980Lin Chen, Kaigui Bian. The Telephone Coordination Game Revisited: From Random to Deterministic Algorithms
2981 -- 2993Carlo Condo, Guido Masera, Paolo Montuschi. Unequal Error Protection of Memories in LDPC Decoders
2994 -- 3008Saravanan Sundaresan, Robin Doss, Wanlei Zhou. Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags
3009 -- 3015Irith Pomeranz. Two-Dimensional Static Test Compaction for Functional Test Sequences
3016 -- 3021Juan Luo, Yaling Guo, Shan Fu, Keqin Li, Wenfeng He. Virtual Resource Allocation Based on Link Interference in Cayley Wireless Data Centers

Volume 64, Issue 1

1 -- 0Albert Y. Zomaya. Farewell State of the Journal Editorial
2 -- 0Paolo Montuschi. Editorial from the New Editor in Chief
3 -- 0Albert Y. Zomaya. In Memoriam [Ivan Stojmenovic]
4 -- 18Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao. A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems
19 -- 31Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen. A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks
32 -- 44Guangyan Zhang, Keqin Li, Jingzhe Wang, Weimin Zheng. Accelerate RDP RAID-6 Scaling by Reducing Disk I/Os and XOR Operations
45 -- 53Jose Luis Nunez-Yanez. Adaptive Voltage Scaling with In-Situ Detectors in Commercial FPGAs
54 -- 70Guoxin Liu, Haiying Shen, Lee Ward. An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System
71 -- 86Ting-Yu Lin, Kun-Ru Wu, Guang-Chuen Yin. Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks
87 -- 96Xiulong Liu, Keqiu Li, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu. Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way
97 -- 111Palden Lama, Xiaobo Zhou. Coordinated Power and Performance Guarantee with Fuzzy MIMO Control in Virtualized Server Clusters
112 -- 125Daehyun Kim, Krit Athikulwongse, Michael B. Healy, Mohammad M. Hossain, Moongon Jung, Ilya Khorosh, Gokul Kumar, Young-Joon Lee, Dean L. Lewis, Tzu-Wei Lin, Chang Liu, Shreepad Panth, Mohit Pathak, Minzhen Ren, Guanhao Shen, Taigon Song, Dong Hyuk Woo, Xin Zhao, Joungho Kim, Ho Choi, Gabriel H. Loh, Hsien-Hsin S. Lee, Sung Kyu Lim. Design and Analysis of 3D-MAPS (3D Massively Parallel Processor with Stacked Memory)
126 -- 138Zhibin Zhou, Dijiang Huang, Zhijie Wang. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
139 -- 151Shui Yu, Song Guo, Ivan Stojmenovic. Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace
152 -- 165Lluc Alvarez, Lluís Vilanova, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé. Hardware-Software Coherence Protocol for the Coexistence of Caches and Local Memories
166 -- 179Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi. Requester-Based Spin Lock: A Scalable and Energy Efficient Locking Scheme on Multicore Systems
191 -- 204Kenli Li, Xiaoyong Tang, Bharadwaj Veeravalli, Keqin Li. Scheduling Precedence Constrained Stochastic Tasks on Heterogeneous Cluster Systems
205 -- 218Khondaker M. Salehin, Roberto Rojas-Cessa, Chuan-Bi Lin, Ziqian Dong, Taweesak Kijkanjanarat. Scheme to Measure Packet Processing Time of a Remote Host through Estimation of End-Link Capacity
219 -- 232Zibin Zheng, Michael R. Lyu. Selecting an Optimal Fault Tolerance Strategy for Reliable Service-Oriented Systems with Local and Global Constraints
233 -- 246Amy Wang, Matthew Gaudet, Peng Wu, Martin Ohmacht, José Nelson Amaral, Christopher Barton, Raúl Silvera, Maged M. Michael. Software Support and Evaluation of Hardware Transactional Memory on Blue Gene/Q
247 -- 259Said Hamdioui, Mottaqiallah Taouil, Nor Zaidi Haron. Testing Open Defects in Memristor-Based Memories
260 -- 273Benedikt Dietrich, Dip Goswami, Samarjit Chakraborty, Apratim Guha, Matthias Gries. Time Series Characterization of Gaming Workload for Runtime Power Management
274 -- 279Chia-Wei Lee, Chao-Wen Huang, Wen-Hao Pi, Sun-Yuan Hsieh. An Improved Approximation Ratio to the Partial-Terminal Steiner Tree Problem
280 -- 285Fareena Saqib, Aindrik Dutta, Jim Plusquellic, Philip Ortiz, Marios S. Pattichis. Pipelined Decision Tree Classification Accelerator Implementation in FPGA (DT-CAIF)
286 -- 292Jae Min Kim, Young-geun Kim, Sung Woo Chung. Stabilizing CPU Frequency and Voltage for Temperature-Aware DVFS in Mobile Devices
293 -- 294Saeid Gorgin, Ghassem Jaberipur. Comment on "High Speed Parallel Decimal Multiplication With Redundant Internal Encodings"