Journal: IEEE Trans. Parallel Distrib. Syst.

Volume 24, Issue 9

1706 -- 1716Yunsheng Wang, Wei-Shih Yang, Jie Wu 0001. Analysis of a Hypercube-Based Social Feature Multipath Routing in Delay Tolerant Networks
1717 -- 1726Kan Yang, Xiaohua Jia. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
1727 -- 1740Bin Tang, Baoliu Ye, Sanglu Lu, Song Guo. Coding-Aware Proportional-Fair Scheduling in OFDMA Relay Networks
1741 -- 1751Yantao Li, Xin Qi, Matthew Keally, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng. Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks
1752 -- 1762H. M. N. Dilum Bandara, Anura P. Jayasumana. Community-Based Caching for Enhanced Lookup Performance in P2P Systems
1763 -- 1772WenPing Liu, Hongbo Jiang, Xiang Bai, Guang Tan, Chonggang Wang, Wenyu Liu, Kechao Cai. Distance Transform-Based Skeleton Extraction and Its Applications in Sensor Networks
1773 -- 1782Xun Yi, San Ling, Huaxiong Wang. Efficient Two-Server Password-Only Authenticated Key Exchange
1783 -- 1796Hai Liu, Xiaowen Chu, Yiu-Wing Leung, Rui Du. Minimum-Cost Sensor Placement for Required Lifetime in Wireless Sensor-Target Surveillance Networks
1797 -- 1806Francesca Martelli, Maurizio A. Bonuccelli. Minimum Message Waiting Time Scheduling in Distributed Systems
1807 -- 1817Yi Xie, Jiankun Hu, Yang Xiang, Shui Yu, Shensheng Tang, Yu Wang. Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration
1818 -- 1826Miaoqing Huang, David L. Andrews. Modular Design of Fully Pipelined Reduction Circuits on FPGAs
1827 -- 1840Weifa Liang, Xiaojiang Ren, Xiaohua Jia, Xu Xu. Monitoring Quality Maximization through Fair Rate Allocation in Harvesting Sensor Networks
1841 -- 1851Henry M. Monti, Ali Raza Butt, Sudharshan S. Vazhkudai. On Timely Staging of HPC Job Input Data
1852 -- 1862Maryam Mehri Dehnavi, David M. Fernandez, Jean-Luc Gaudiot, Dennis D. Giannacopoulos. Parallel Sparse Approximate Inverse Preconditioning on Graphic Processing Units
1863 -- 1873Rajesh Krishna Panta, Rittwik Jana, Fan Cheng, Yih-Farn Robin Chen, Vinay A. Vaishampayan. Phoenix: Storage Using an Autonomous Mobile Infrastructure
1874 -- 1883Xiaocheng Liu, Chen Wang, Bing Bing Zhou, Junliang Chen, Ting Yang, Albert Y. Zomaya. Priority-Based Consolidation of Parallel Workloads in the Cloud
1884 -- 1893Yanfeng Zhang, Qinxin Gao, Lixin Gao, Cuirong Wang. PrIter: A Distributed Framework for Prioritizing Iterative Computations
1894 -- 1907Hao Wang, Bill Lin, Jun Jim Xu. Robust Statistics Counter Arrays with Interleaved Memories
1908 -- 1917Ye Tian, Ratan Dey, Yong Liu, Keith W. Ross. Topology Mapping and Geolocating for China's Internet

Volume 24, Issue 8

1479 -- 1488Chi-Yeh Chen, Chih-Ping Chu. A 3.42-Approximation Algorithm for Scheduling Malleable Tasks under Precedence Constraints
1489 -- 1499Francesco Paterna, Andrea Acquaviva, Luca Benini. Aging-Aware Energy-Efficient Workload Allocation for Mobile Multimedia Platforms
1500 -- 1513Shenggang Wan, Xubin He, Jianzhong Huang, Qiang Cao, Shiyi Li, Changsheng Xie. An Efficient Penalty-Aware Cache to Improve the Performance of Parity-Based Disk Arrays under Faulty Conditions
1514 -- 1524Weiyi Zhao, Jiang Xie. DoMaIN: A Novel Dynamic Location Management Solution for Internet-Based Infrastructure Wireless Mesh Networks
1525 -- 1534Chun Tung Chou, Aleksandar Ignjatovic, Wen Hu. Efficient Computation of Robust Average of Compressive Sensing Data in Wireless Sensor Networks in the Presence of Sensor Faults
1535 -- 1545Adam C. Champion, Zhimin Yang, Boying Zhang, Jiangpeng Dai, Dong Xuan, Du Li. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity
1546 -- 1555Yiling Yang, Yu Huang 0002, Jiannong Cao, Xiaoxing Ma, Jian Lu. Formal Specification and Runtime Detection of Dynamic Properties in Asynchronous Pervasive Computing Environments
1556 -- 1566Samer Al-Kiswany, Abdullah Gharaibeh, Matei Ripeanu. GPUs as Storage System Accelerators
1567 -- 1576Bin Xu, Guodong Sun, Ran Yu, Zheng Yang. High-Accuracy TDOA-Based Localization without Time Synchronization
1577 -- 1588Xiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin, Yixin Chen. Intelligent Sensor Placement for Hot Server Detection in Data Centers
1589 -- 1601Harris Papadakis, Paraskevi Fragopoulou, Evangelos P. Markatos, Mema Roussopoulos. ITA: Innocuous Topology Awareness for Unstructured P2P Networks
1602 -- 1612Kai J. Kohlhoff, Vijay S. Pande, Russ B. Altman. K-Means for Parallel Architectures Using All-Prefix-Sum Sorting and Updating Steps
1613 -- 1621Jakub Kurzak, Piotr Luszczek, Mathieu Faverge, Jack Dongarra. LU Factorization with Partial Pivoting for a Multicore System with Accelerators
1622 -- 1632Zhibin Huang, Mingfa Zhu, Limin Xiao. LvtPPP: Live-Time Protected Pseudopartitioning of Multicore Shared Caches
1633 -- 1643Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia. Modeling Propagation Dynamics of Social Network Worms
1644 -- 1650Savio S. H. Tse. Online Balancing Two Independent Criteria upon Placements and Deletions
1651 -- 1660Enrico Gregori, Luciano Lenzini, Simone Mainardi. Parallel $(k)$-Clique Community Detection on Large-Scale Networks
1661 -- 1670Miao Xie, Jiankun Hu, Song Han, Hsiao-Hwa Chen. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks
1671 -- 1681Yichuan Jiang, Yifeng Zhou, Wanyuan Wang. Task Allocation for Undependable Multiagent Systems in Social Networks
1682 -- 1694Qing-Chao Cai, Kwok-Tung Lo. Two Blocks Are Enough: On the Feasibility of Using Network Coding to Ameliorate the Content Availability of BitTorrent Swarms
1695 -- 1705Yefu Wang, Xiaorui Wang. Virtual Batching: Request Batching for Server Energy Conservation in Virtualized Data Centers

Volume 24, Issue 7

1267 -- 1276Hao Chen, Lin Shi, Jianhua Sun, Kenli Li, Ligang He. A Fast RPC System for Virtual Machines
1277 -- 1288Chen Qian, Yunhuai Liu, Raymond Hoilun Ngan, Lionel M. Ni. ASAP: Scalable Collision Arbitration for Large RFID Systems
1289 -- 1299Lu Wang, Kaishun Wu, Mounir Hamdi. Attached-RTS: Eliminating an Exposed Terminal Problem in Wireless Networks
1300 -- 1309Kaishun Wu, Jiang Xiao, Youwen Yi, Dihu Chen, Xiaonan Luo, Lionel M. Ni. CSI-Based Indoor Localization
1310 -- 1320Yu Gu 0003, Yusheng Ji, Jie Li, Baohua Zhao. ESWC: Efficient Scheduling for the Mobile Sink in Wireless Sensor Networks with Delay Constraint
1321 -- 1330Hong Liu, Huansheng Ning, Yan Zhang, Daojing He, Qingxu Xiong, Laurence T. Yang. Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems
1331 -- 1340Konstantinos Tsakalozos, Mema Roussopoulos, Alex Delis. Hint-Based Execution of Workloads in Clouds with Nefeli
1341 -- 1354Xu Li, Nathalie Mitton, Isabelle Simplot-Ryl, David Simplot-Ryl. Hypocomb: Bounded-Degree Localized Geometric Planar Graphs for Wireless Ad Hoc Networks
1355 -- 1365Deke Guo, Yuan He, Yunhao Liu, Panlong Yang, Xiang-Yang Li, Xin Wang. Link Scheduling for Exploiting Spatial Reuse in Multihop MIMO Networks
1366 -- 1379Anton Beloglazov, Rajkumar Buyya. Managing Overloaded Hosts for Dynamic Consolidation of Virtual Machines in Cloud Data Centers under Quality of Service Constraints
1380 -- 1389Hao Wang, Bill Lin. Per-Flow Queue Management with Succinct Priority Indexing Structures for High Speed Packet Scheduling
1390 -- 1400Yanmin Zhu, Xuemei Liu, Minglu Li, Qian Zhang. POVA: Traffic Light Sensing with Probe Vehicles
1401 -- 1410Yi Xie, S. Tang, Y. Xiang, J. Hu. Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior
1411 -- 1421Faizal Arya Samman, Thomas Hollstein, Manfred Glesner. Runtime Contention and Bandwidth-Aware Adaptive Routing Selection Strategies for Networks-on-Chip
1422 -- 1435Ahmed Elwhishi, Pin-Han Ho, K. Naik, Basem Shihada. Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
1436 -- 1446Jiliang Wang, Zhenjiang Li, Mo Li, Yunhao Liu, Zheng Yang. Sensor Network Navigation without Locations
1447 -- 1464Sergey Zhuravlev, Juan Carlos Saez, Sergey Blagodurov, Alexandra Fedorova, Manuel Prieto. Survey of Energy-Cognizant Scheduling Techniques
1465 -- 1478Daniel Fajardo-Delgado, José Alberto Fernández-Zepeda, Anu G. Bourgeois. The Bodyguard Allocation Problem

Volume 24, Issue 6

1062 -- 1065Vojislav B. Misic, Rajkumar Buyya, Dejan S. Milojicic, Yong Cui. Guest Editors' Introduction: Special Issue on Cloud Computing
1066 -- 1076Hong Xu, Baochun Li. Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud
1077 -- 1086Aris Leivadeas, Chrysa A. Papagianni, Symeon Papavassiliou. Efficient Resource Mapping Framework over Networked Clouds via Iterated Local Search-Based Request Partitioning
1087 -- 1096Junwei Cao, Kai Hwang, Keqin Li, Albert Y. Zomaya. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1097 -- 1106Sheng Di, Cho-Li Wang. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
1107 -- 1117Zhen Xiao, Weijia Song, Qi Chen. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
1118 -- 1128Haibing Guan, Yaozu Dong, Ruhui Ma, Dongxiao Xu, Yang Zhang, Jian Li. Performance Enhancement for Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive-Side Scaling
1129 -- 1138Dingding Li, Xiaofei Liao, Hai Jin, Bing Bing Zhou, Qi Zhang. A New Disk I/O Model of Virtualized Cloud Environment
1139 -- 1148Fung Po Tso, Dimitrios P. Pezaros. Improving Data Center Network Utilization Using Near-Optimal Traffic Engineering
1149 -- 1160Yuanxiong Guo, Yuguang Fang. Electricity Cost Saving Strategy in Data Centers by Using Energy Storage
1161 -- 1171Tan Lu, Minghua Chen, Lachlan L. H. Andrew. Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
1172 -- 1181Cong Wang, Kui Ren, Jia Wang, Qian Wang. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
1182 -- 1191Xuefeng Liu, Yuqing Zhang, Boyang Wang, Jingbo Yan. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
1192 -- 1202Xuyun Zhang, Chang Liu, Surya Nepal, Suraj Pandey, Jinjun Chen. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
1203 -- 1212Hamid Mohammadi Fard, Radu Prodan, Thomas Fahringer. A Truthful Dynamic Workflow Scheduling Mechanism for Commercial Multicloud Environments
1213 -- 1222Zibin Zheng, Xinmiao Wu, Yilei Zhang, Michael R. Lyu, Jianmin Wang 0002. QoS Ranking Prediction for Cloud Services
1223 -- 1233Byung-Chul Tak, Bhuvan Urgaonkar, Anand Sivasubramaniam. Cloudy with a Chance of Cost Savings
1234 -- 1244Dong Yuan, Yun Yang, Xiao Liu, Wenhao Li, Li-zhen Cui, Meng Xu, Jinjun Chen. A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud
1245 -- 1255Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, Hua Cai. Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems
1256 -- 1266Andrew Turner, Andrew Fox, John I. Payne, Hyong S. Kim. C-MART: Benchmarking the Cloud

Volume 24, Issue 5

849 -- 861Hamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic, Saeed Rashwand. Analysis of a Pool Management Scheme for Cloud Computing Centers
862 -- 870Jiaoyun Yang, Yun Xu, Guangzhong Sun, Yi Shang. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
871 -- 880Ahmed Elwhishi, Pin-Han Ho, K. Naik, Basem Shihada. A Novel Message Scheduling Framework for Delay Tolerant Networks Routing
881 -- 892Fengyuan Ren, Jiao Zhang, Yongwei Wu, Tao He, Canfeng Chen, Chuang Lin. Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks
893 -- 905Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo. DCNS: An Adaptable High Throughput RFID Reader-to-Reader Anticollision Protocol
906 -- 915Oliver Pell, Jacob A. Bower, Robert G. Dimond, Oskar Mencer, Michael J. Flynn. Finite-Difference Wave Propagation Modeling on Special-Purpose Dataflow Machines
916 -- 925Xiumin Wang, Jianping Wang, Kejie Lu, Yinlong Xu. GKAR: A Novel Geographic $(K)$-Anycast Routing for Wireless Sensor Networks
926 -- 937Olivier Beaumont, Lionel Eyraud-Dubois, Christopher Thraves Caro, Hejer Rejeb. Heterogeneous Resource Allocation under Degree Constraints
938 -- 950Yawen Wei, Yong Guan. Lightweight Location Verification Algorithms for Wireless Sensor Networks
951 -- 962Hung-Chang Hsiao, Hsueh-Yi Chung, Haiying Shen, Yu-Chang Chao. Load Rebalancing for Distributed File Systems in Clouds
963 -- 976Hannes Frey. Lower and Upper Bounds for Multicasting under Distance Dependent Forwarding Cost Functions
977 -- 986Xing Liu, Pushkar R. Pande, Henning Meyerhenke, David A. Bader. PASQUAL: Parallel Techniques for Next Generation Genome Sequence Assembly
987 -- 995Ata Turk, Kerim Yasin Oktay, Cevdet Aykanat. Query-Log Aware Replicated Declustering
996 -- 1008Dian Zhang, Yunhuai Liu, Xiaonan Guo, Lionel M. Ni. RASS: A Real-Time, Accurate, and Scalable System for Tracking Transceiver-Free Objects
1009 -- 1021Edans Flavius de Oliveira Sandes, Alba Cristina Magalhaes Alves de Melo. Retrieving Smith-Waterman Alignments with Optimizations for Megabase Biological Sequences Using GPU
1022 -- 1029Hristo Djidjev, Melih Onus. Scalable and Accurate Graph Clustering and Community Structure Detection
1030 -- 1041Cheng Wang, Changjun Jiang, ShaoJie Tang, Xiang-Yang Li. Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models
1042 -- 1051Dayong Ye, Minjie Zhang, Danny Sutanto. Self-Adaptation-Based Dynamic Coalition Formation in a Distributed Agent Network: A Mechanism and a Brief Survey
1052 -- 1061Xi Chen, Xiao-Wen Chang, Xue Liu. SyRaFa: Synchronous Rate and Frequency Adjustment for Utilization Control in Distributed Real-Time Embedded Systems

Volume 24, Issue 4

625 -- 628Ivan Stojmenovic. Editor's Note: Reviewer Appreciation Program
629 -- 641Raquel Lacuesta Gilaberte, Jaime Lloret, Miguel Garcia, Lourdes Peñalver Herrero. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
642 -- 651Xiwang Yang, Yang Guo, Yong Liu. Bayesian-Inference-Based Recommendation in Online Social Networks
652 -- 661David Hongwei Du, Weili Wu, Qiang Ye, Deying Li, Wonjun Lee, Xuepeng Xu. CDS-Based Virtual Backbone Construction with Guaranteed Routing Cost in Wireless Sensor Networks
662 -- 671Damiano Carra, Moritz Steiner, Pietro Michiardi, Ernst W. Biersack, Wolfgang Effelsberg, Taoufik En-Najjary. Characterization and Management of Popular Content in KAD
672 -- 680Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu. Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs
681 -- 690Xiangping Bu, Jia Rao, Cheng-Zhong Xu. Coordinated Self-Configuration of Virtual Machines and Appliances Using a Model-Free Learning Approach
691 -- 700Yi Gao, Jiajun Bu, Wei Dong, Chun Chen, Lei Rao, Xue Liu. Exploiting Concurrency for Efficient Dissemination in Wireless Sensor Networks
701 -- 715Bharath Balasubramanian, Vijay K. Garg. Fault Tolerance in Distributed Systems Using Fused Data Structures
716 -- 723Taisuke Izumi, Tomoko Izumi, Sayaka Kamei, Fukuhito Ooshita. Feasibility of Polynomial-Time Randomized Gathering for Oblivious Mobile Robots
724 -- 733Carlos Eduardo Rodrigues Alves, Edson Norberto Cáceres, Siang Wun Song. Finding All Maximal Contiguous Subsequences of a Sequence of Numbers in O(1) Communication Rounds
734 -- 743Jialu Fan, Jiming Chen, Yuan Du, Wei Gao, Jie Wu, Youxian Sun. Geocommunity-Based Broadcasting for Data Dissemination in Mobile Social Networks
744 -- 753Guoxing Zhan, Weisong Shi. LOBOT: Low-Cost, Self-Contained Localization of Small-Sized Ground Robotic Vehicles
754 -- 766Xinbing Wang, Tuo Yu, Yuanzhong Xu. Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks
767 -- 777Weichen Liu, Yu Wang 0002, Xuan Wang, Jiang Xu, Huazhong Yang. On-Chip Sensor Network for Efficient Management of Power Gating-Induced Power/Ground Noise in Multiprocessor System on Chip
778 -- 788Alexander W. Min, Kang G. Shin. Robust Tracking of Small-Scale Mobile Primary User in Cognitive Radio Networks
789 -- 802Wenbo Zhao, Xueyan Tang. Scheduling Sensor Data Collection with Dynamic Traffic Patterns
803 -- 813A. Selcuk Uluagac, Raheem A. Beyah, John A. Copeland. Secure SOurce-BAsed Loose Synchronization (SOBAS) for Wireless Sensor Networks
814 -- 824Pranab Kini, Konstantin Beznosov. Speculative Authorization
825 -- 838Yang Wang, Bharadwaj Veeravalli, Chen-Khong Tham. On Data Staging Algorithms for Shared Data Accesses in Clouds
839 -- 848Chenshu Wu, Zheng Yang, Yunhao Liu, Wei Xi. WILL: Wireless Indoor Localization without Site Survey

Volume 24, Issue 3

417 -- 427Yongpeng Zhang, Frank Mueller. Autogeneration and Autotuning of 3D Stencil Codes on Homogeneous and Heterogeneous GPU Clusters
428 -- 438Chi-Yuan Yeh, Yu-Ting Peng, Shie-Jue Lee. An Iterative Divide-and-Merge-Based Approach for Solving Large-Scale Least Squares Problems
439 -- 449Gabriel Scalosub, Peter Marbach, Jörg Liebeherr. Buffer Management for Aggregated Streaming Data with Packet Dependencies
450 -- 463Weigang Wu, Jiannong Cao, Xiaopeng Fan. Design and Performance Evaluation of Overhearing-Aided Data Caching in Wireless Ad Hoc Networks
464 -- 478Sheng Di, Cho-Li Wang. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
479 -- 492Da Zhang, Chai Kiat Yeo. Enabling Efficient WiFi-Based Vehicular Content Distribution
493 -- 505Jichiang Tsai. Flexible Symmetrical Global-Snapshot Algorithms for Large-Scale Distributed Systems
506 -- 519Ricardo Quislant, Eladio Gutiérrez, Oscar G. Plata, Emilio L. Zapata. Hardware Signature Designs to Deal with Asymmetry in Transactional Data Sets
520 -- 534Jia Zhao, Chunming Qiao, Raghuram S. Sudhaakar, Seokhoon Yoon. Improve Efficiency and Reliability in Single-Hop WSNs with Transmit-Only Nodes
535 -- 549Zhezhe Chen, Qi Gao, Wenbin Zhang, Feng Qin. Improving the Reliability of MPI Libraries via Message Flow Checking
550 -- 564Pan Gun Park, Piergiuseppe Di Marco, Carlo Fischione, Karl Henrik Johansson. Modeling and Optimization of the IEEE 802.15.4 Protocol for Reliable and Timely Communications
565 -- 575Hiroshi Nishida, Thinh P. Nguyen. Optimal Client-Server Assignment for Internet Distributed Systems
576 -- 586Yongmin Tan, Vinay Venkatesh, Xiaohui Gu. Resilient Self-Compressive Monitoring for Large-Scale Hosting Infrastructures
587 -- 600Gang Chen 0002, Abdolhossein Sarrafzadeh, Shaoning Pang. Service Provision Control in Federated Service Providing Systems
601 -- 613Eva Jaho, Merkourios Karaliopoulos, Ioannis Stavrakakis. Social Similarity Favors Cooperation: The Distributed Content Replication Case
614 -- 624Rongxing Lu, Xiaodong Lin, Xuemin (Sherman) Shen. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

Volume 24, Issue 2

209 -- 224Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
225 -- 238Keqin Li. Analysis of Distance-Based Location Management in Wireless Communication Networks
239 -- 249Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Jie Yang 0008, Nei Kato. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks
250 -- 259Shih Heng Cheng, Ching-Yao Huang. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks
260 -- 274Nguyen H. Tran, Choong Seon Hong, Sungwon Lee. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
275 -- 287Kien Nguyen, Thinh P. Nguyen, Yevgeniy Kovchegov, Viet Le. Distributed Data Replenishment
288 -- 300Alberto Montresor, Francesco De Pellegrini, Daniele Miorandi. Distributed k-Core Decomposition
301 -- 311Benyuan Liu, Olivier Dousse, Philippe Nain, Don Towsley. Dynamic Coverage of Mobile Sensor Networks
312 -- 326Zhenjiang Li, Yunhao Liu, Mo Li, Jiliang Wang, Zhichao Cao. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
327 -- 341Xiaohua Tian, Yu Cheng, Xuemin (Sherman) Shen. Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery
342 -- 355Yun Wang, Weihuang Fu, Dharma P. Agrawal. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks
356 -- 367Ke Liang, Beomjoo Seo, Andrew Kryczka, Roger Zimmermann. IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments
368 -- 380Haitao Zhang, Huadong Ma, Xiang-Yang Li, ShaoJie Tang. In-Network Estimation with Delay Constraints in Wireless Sensor Networks
381 -- 391Dan Li, Jiong Chen, Chuanxiong Guo, Yunxin Liu, Jinyu Zhang, Zhi-Li Zhang, Yongguang Zhang. IP-Geolocation Mapping for Moderately Connected Internet Regions
392 -- 405Davor Capalija, Tarek S. Abdelrahman. Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor
406 -- 416Jun Liu, Zhong Zhou, Zheng Peng, Jun-Hong Cui, Michael Zuba, Lance Fiondella. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks

Volume 24, Issue 12

2322 -- 2323Ivan Stojmenovic. Editor's Note: EIC Farewell and New EIC Introduction
2324 -- 2333Sang-Won Ha, Tack-Don Han. A Scalable Work-Efficient and Depth-Optimal Parallel Scan for the GPGPU Environment
2334 -- 2343Quan Chen, Minyi Guo, Zhiyi Huang 0001. Adaptive Cache Aware Bitier Work-Stealing in Multisocket Multicore Architectures
2344 -- 2354Yuzhe Tang, Bugra Gedik. Autopipelining for Data Stream Processing
2355 -- 2364Hsu-Feng Hsiao, Chen-Tsang Wu. Balanced Parallel Scheduling for Video Encoding with Adaptive GOP Structure
2365 -- 2374Yong Cui, Hongyi Wang, Xiuzhen Cheng, Dan Li, Antti Ylä-Jääski. Dynamic Scheduling for Wireless Data Center Networks
2375 -- 2385Ayad F. Barsoum, M. Anwar Hasan. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
2386 -- 2395Paolo Bellavista, Antonio Corradi, Luca Foschini. Enhancing Intradomain Scalability of IMS-Based Services
2396 -- 2406Xufei Mao, Yunhao Liu, ShaoJie Tang, Huafu Liu, Jiankang Han, Xiang-Yang Li. Finding Best and Worst k-Coverage Paths in Multihop Wireless Sensor Networks
2407 -- 2417Yan Cai, W. K. Chan. Lock Trace Reduction for Multithreaded Programs
2418 -- 2428Luoyi Fu, Xinbing Wang. Multicast Scaling Law in Multichannel Multiradio Wireless Networks
2429 -- 2438Hamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic. Performance of Cloud Centers with High Degree of Virtualization under Batch Task Arrivals
2439 -- 2450Haiying Shen, Yuhua Lin, Ze Li. Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks
2451 -- 2461Snaider Carrillo, Jim Harkin, Liam McDaid, Fearghal Morgan, Sandeep Pande, Seamus Cawley, Brian McGinley. Scalable Hierarchical Network-on-Chip Architecture for Spiking Neural Network Hardware Implementations
2462 -- 2471Miguel Matos, Pascal Felber, Rui Oliveira, José Orlando Pereira, Etienne Riviere. Scaling Up Publish/Subscribe Overlays Using Interest Correlation for Link Sharing
2472 -- 2481Tamer Abdelkader, Kshirasagar Naik, Amiya Nayak, Nishith Goel, Vineet Srivastava. SGBR: A Routing Protocol for Delay Tolerant Networks Using Social Grouping
2482 -- 2491Fengyuan Xu, Xiaojun Zhu, Chiu Chiang Tan, Qun Li, Guanhua Yan, Jie Wu 0001. SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput
2492 -- 2502Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li. SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks
2503 -- 2512Adele Lu Jia, Rameez Rahman, Tamás Vinkó, Johan A. Pouwelse, Dick H. J. Epema. Systemic Risk and User-Level Performance in Private P2P Communities
2513 -- 2525Petar Radojkovic, Vladimir Cakarevic, Javier Verdú, Alex Pajuelo, Francisco J. Cazorla, Mario Nemirovsky, Mateo Valero. Thread Assignment of Multithreaded Network Applications in Multicore/Multithreaded Processors
2526 -- 2537Jiaqing Luo, Bin Xiao, Kai Bu, Shijie Zhou. Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol

Volume 24, Issue 11

2121 -- 2124Ivan Stojmenovic. Editor's Note
2125 -- 2137Haiying Shen, Ze Li, Jin Li. A DHT-Aided Chunk-Driven Overlay for Scalable and Efficient Peer-to-Peer Live Streaming
2138 -- 2147Hamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic. A Fine-Grained Performance Model of Cloud Computing Centers
2148 -- 2159Haiying Shen, Guoxin Liu. A Geographically Aware Poll-Based Distributed File Consistency Maintenance Method for P2P Systems
2160 -- 2170Hongxing Li, Chuan Wu, Dongxiao Yu, Qiang-Sheng Hua, Francis C. M. Lau. Aggregation Latency-Energy Tradeoff in Wireless Sensor Networks with Successive Interference Cancellation
2171 -- 2180Junbeom Hur. Attribute-Based Secure Data Sharing with Hidden Policies in Smart Grid
2181 -- 2191Zhenhua Li, Yan Huang, Gang Liu, Fuchen Wang, Yunhao Liu, Zhi-Li Zhang, Yafei Dai. Challenges, Designs, and Performances of Large-Scale Open-P2SP Content Distribution
2192 -- 2201J. Rubén Titos Gil, Anurag Negi, Manuel E. Acacio, José M. García, Per Stenström. Eager Beats Lazy: Improving Store Management in Eager Hardware Transactional Memory
2202 -- 2210Huawei Zhao, Jing Qin, Jiankun Hu. An Energy Efficient Key Management Scheme for Body Sensor Networks
2211 -- 2219Keqiu Li, Yuanping Mu, Keqin Li, Geyong Min. Exchanged Crossed Cube: A Novel Interconnection Network for Parallel Computation
2220 -- 2229David Ediger, Karl Jiang, E. Jason Riedy, David A. Bader. GraphCT: Multithreaded Algorithms for Massive Graph Analysis
2230 -- 2239Woojin Choi, Jeffrey T. Draper. Improving Utilization of Hardware Signatures in Transactional Memory
2240 -- 2250Yao Liu, Fei Li, Lei Guo, Bo Shen, Songqing Chen, Yingjie Lan. Measurement and Analysis of an Internet Streaming Service to Mobile Devices
2251 -- 2260Peng Li, Song Guo. On the Multicast Capacity in Energy-Constrained Lossy Wireless Networks by Exploiting Intrabatch and Interbatch Network Coding
2261 -- 2272Deke Guo, Hai Jin, Tao Chen, Jie Wu, Li Lu, Dongsheng Li, Xiaolei Zhou. Partial Probing for Scaling Overlay Routing
2273 -- 2282Juan Gómez-Luna, José María González-Linares, Jose Ignacio Benavides Benitez, Nicolás Guil Mata. Performance Modeling of Atomic Additions on GPU Scratchpad Memory
2283 -- 2292Yi-Hua E. Yang, Viktor K. Prasanna. Robust and Scalable String Pattern Matching for Deep Packet Inspection on Multicore Processors
2293 -- 2303Hongkun Li, Yu Cheng, Chi Zhou, Weihua Zhuang. Routing Metrics for Minimizing End-to-End Delay in Multiradio Multichannel Wireless Networks
2304 -- 2318Uichin Lee, Seung-Hoon Lee, Kang-Won Lee, Mario Gerla. Understanding Processing Overheads of Network Coding-Based Content Distribution in VANETs
2319 -- 2321Aijun Ge, Jiang Zhang, Rui Zhang 0002, Chuangui Ma, Zhenfeng Zhang. Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme

Volume 24, Issue 10

1918 -- 1929Jesús Escudero-Sahuquillo, Pedro Javier García, Francisco J. Quiles, Jose Flich, José Duato. An Effective and Feasible Congestion Management Technique for High-Performance MINs with Tag-Based Distributed Routing
1930 -- 1940Vasileios Karakasis, Theodoros Gkountouvas, Kornilios Kourtis, Georgios I. Goumas, Nectarios Koziris. An Extended Compression Format for the Optimization of Sparse Matrix-Vector Multiplication
1941 -- 1950Mingsen Xu, Wen-Zhan Song, Yichuan Zhao. Collaborative Data Collection with Opportunistic Network Erasure Coding
1951 -- 1960Chia-Wen Cheng, Chia-Wei Lee, Sun-Yuan Hsieh. Conditional Edge-Fault Hamiltonicity of Cartesian Product Graphs
1961 -- 1971Zhengrui Qin, Qun Li, Mooi Choo Chuah. Defending against Unidentifiable Attacks in Electric Power Grids
1972 -- 1982Zhipeng Yang, Ting Ning, Hongyi Wu. Distributed Data Query in Intermittently Connected Passive RFID Networks
1983 -- 1993Yunhao Liu, Yuan He, Mo Li, Jiliang Wang, Kebin Liu, Xiang-Yang Li. Does Wireless Sensor Network Scale? A Measurement Study on GreenOrbs
1994 -- 2003Rossano Gaeta, Marco Grangetto. Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique
2004 -- 2014João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, Mário M. Freire, Paulo P. Monteiro. Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties
2015 -- 2024Abdallah Khreishah, Issa Khalil, Jie Wu 0001. Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks
2025 -- 2035Jin Wang, Jianping Wang, Kejie Lu, Bin Xiao, Naijie Gu. Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams
2036 -- 2045Yanbo Wu, Quan Z. Sheng, Hong Shen, Sherali Zeadally. Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing
2046 -- 2059Yin Xu, Ben Leong, Daryl Seah, Ali Razeen. mPath: High-Bandwidth Data Transfers with Massively Multipath Source Routing
2060 -- 2068Zhiwei Yan, Jong-Hyouk Lee, Sean Shen, Chunming Qiao. Novel Branching-Router-Based Multicast Routing Protocol with Mobility Support
2069 -- 2078Guangtao Xue, Qi He, Hongzi Zhu, Tian He, Yunhuai Liu. Sociality-Aware Access Point Selection in Enterprise Wireless LANs
2079 -- 2089Yuanteng Pei, Matt W. Mutka. STARS: Static Relays for Remote Sensing in Multirobot Real-Time Search and Monitoring
2090 -- 2099Dario Bruneo, Salvatore Distefano, Francesco Longo, Marco Scarpa. Stochastic Evaluation of QoS in Service-Based Systems
2100 -- 2108Qilian Liang, Baoju Zhang, Chenglin Zhao, Yiming Pi. TDoA for Passive Localization: Underwater versus Terrestrial Environment
2109 -- 2120Kun-Chih Chen, Shu-Yen Lin, Hui-Shun Hung, An-Yeu Andy Wu. Topology-Aware Adaptive Routing for Nonstationary Irregular Mesh in Throttled 3D NoC Systems

Volume 24, Issue 1

4 -- 18Hui-Tang Lin, Ying-You Lin, Hung-Jung Kang. Adaptive Network Coding for Broadband Wireless Access Networks
19 -- 31Haifeng Wu, Yu Zeng, Jihua Feng, Yu Gu. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision
32 -- 43Milan Erdelj, Tahiry Razafindralambo, David Simplot-Ryl. Covering Points of Interest with Mobile Sensors
44 -- 58Jie Yang 0003, Yingying Chen, Wade Trappe, Jerry Cheng. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
59 -- 71J. Rubén Titos Gil, Manuel E. Acacio, José M. García. Efficient Eager Management of Conflicts for Scalable Hardware Transactional Memory
72 -- 84Kyle Chard, Kris Bubendorfer. High Performance Resource Allocation Strategies for Computational Economies
85 -- 91Gerald R. Morris, Khalid H. Abed. Mapping a Jacobi Iterative Solver onto a High-Performance Heterogeneous Computer
92 -- 103Hao Wang, Shi Pu, Gabe Knezek, Jyh-Charn Liu. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching
104 -- 117Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, Yong Guan. Network Traffic Classification Using Correlation Information
118 -- 130Ya-Shu Chen, Han Chiang Liao, Ting-Hao Tsai. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip
131 -- 143Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, Wenjing Lou. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
144 -- 157Dong Li, Bronis R. de Supinski, Martin Schulz, Dimitrios S. Nikolopoulos, Kirk W. Cameron. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models
158 -- 169Saba Sehrish, Grant Mackey, Pengju Shang, Jun Wang 0001, John Bent. Supporting HPC Analytics Applications with Access Patterns Using Data Restructuring and Data-Centric Scheduling Techniques in MapReduce
170 -- 183Andrea Bartolini, Matteo Cacciari, Andrea Tilli, Luca Benini. Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller
184 -- 197Ravishankar Ravindran, Changcheng Huang, Krishnaiyan Thulasiraman. Topology Abstraction Service for IP-VPNs