Abstract is missing.
- Keynote talk: New frontiers through information technologiesFrederica Darema. 1 [doi]
- Economic grid fault tolerance scheduling using modified Genetic AlgorithmAmir I. Alfoly, Mohamed B. Abdelhalim, Samah Senbel. 1-8 [doi]
- Keynote talk: Fighting Amdahl's law in many-core and GPU parallel architectures with value predictionJean-Luc Gaudiot. 1 [doi]
- Keynote talk: Environmentally sustainable large scale distributed systemsAlbert Y. Zomaya. 1 [doi]
- Application-centric Cloud managementSunirmal Khatua, Anirban Ghosh, Nandini Mukherjee. 9-15 [doi]
- Impact of parallel programming models and CPUs clock frequency on energy consumption of HPC systemsJavier Balladini, Remo Suppi, Dolores Rexachs, Emilio Luque. 16-21 [doi]
- Stochastically robust static resource allocation for energy minimization with a makespan constraint in a heterogeneous computing environmentJonathan Apodaca, Bobby Dalton Young, Luis Diego Briceno, Jay Smith, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel, Shirish Bahirat, Bhavesh Khemka, Adrian Ramirez, Yong Zou. 22-31 [doi]
- A reliable peer-to-peer protocol for mobile Ad-Hoc wireless networksMayez A. Al-Mouhamed, Irfan Ali Khan, Syed Naeem Firdous. 32-37 [doi]
- Defending against energy efficient link layer jamming denial of service attack in wireless sensor networksAhmed R. Mahmood, Hussein H. Aly, Mohamed N. El-Derini. 38-45 [doi]
- Reliable distributed data fusion scheme in unsafe sensor networksJacques M. Bahi, Mourad Hakem, Abdallah Makhoul. 46-53 [doi]
- MSR: A multipath secure reliable routing protocol for WSNsMariam Ahmed Moustafa, Moustafa A. Youssef, Mohamed N. El-Derini. 54-59 [doi]
- Fuzz-SSVS: A Fuzzy logic based voting scheme to improve protein secondary structure predictionJavid Taheri, Albert Y. Zomaya, Flávia Coimbra Delicato, Paulo F. Pires. 60-66 [doi]
- Averaging measurement strategies for identifying single nucleotide polymorphisms from redundant data setsTai-Chun Wang, Javid Taheri, Albert Y. Zomaya. 67-74 [doi]
- AudioGene: Computer-based prediction of genetic factors involved in non-syndromic hearing impairmentKyle R. Taylor, Adam P. DeLuca, Corey W. Goodman, Bruce W. Tompkins, Todd E. Scheetz, Michael S. Hildebrand, Patrick L. M. Huygen, Richard J. H. Smith, Terry A. Braun, Thomas L. Casavant. 75-79 [doi]
- Sequencing and disease variation detection tools and techniquesAdam P. DeLuca, Alex H. Wagner, Kyle R. Taylor, Ben Faga, David Thole, Val C. Sheffield, Edwin M. Stone, Thomas L. Casavant, Todd E. Scheetz, Terry A. Braun. 80-83 [doi]
- New methodology for modeling large scale manufacturing process: Using process mining methods and experts' knowledgePamela Viale, Claudia S. Frydman, Jacques Pinaton. 84-89 [doi]
- Satellite image classification using a classifier integration modelDong-Chul Park, Taekyung Jeong, Yunsik Lee, Soo-Young Min. 90-94 [doi]
- CudaRF: A CUDA-based implementation of Random ForestsHåkan Grahn, Niklas Lavesson, Mikael Hellborg Lapajne, Daniel Slat. 95-101 [doi]
- A comparative analysis of database connection pooling implementations with emphasis on the added value of aspect orientationLamya A. Othman, Hoda Mohammed Hosny, Sherif G. Aly. 102-111 [doi]
- Estimating the effect of cache misses on the performance of parallel applications using analytical modelsDiego Rodriguez Martínez, Vicente Blanco Pérez, José Carlos Cabaleiro, Tomás Fernandez Pena, Francisco F. Rivera. 112-119 [doi]
- On the influence of selection function on the performance of fat-trees under hot-spot trafficAbeer Farouk, Hatem M. El-Boghdadi. 120-127 [doi]
- Stochastic modeling of Scouting Switching for adaptively-routed mesh networksMohammad Zebardast, Farshad Safaei. 128-134 [doi]
- Sunspot series prediction using adaptively trained Multiscale-Bilinear Recurrent Neural NetworkDong-Chul Park. 135-139 [doi]
- On optimal strategies in protecting computer networksFerenc Szidarovszky, Yi Luo. 140-143 [doi]
- A comparative study of PVD-based schemes for data hiding in digital imagesEl-Sayed M. El-Alfy, Azzat A. Al-Sadi. 144-149 [doi]
- Application attack detection system (AADS): An anomaly based behavior analysis approachRam Prasad Viswanathan, Youssif B. Al-Nashif, Salim Hariri. 150-156 [doi]
- A taxonomy of capabilities based DDoS defense architecturesVamsi Kambhampati, Christos Papadopoulos, Daniel Massey. 157-164 [doi]
- An architecture-based dynamic adaptation model and framework for adaptive software systemsMohamed Hussein, Hassan Gomaa. 165-172 [doi]
- Characteristics of multi-attribute resources/queries and implications on P2P resource discoveryH. M. N. Dilum Bandara, Anura P. Jayasumana. 173-180 [doi]
- Modelling the performance of an SSD-Aware storage system using least squares regressionAbdullah Aldahlawi, Esam El-Araby, Suboh A. Suboh, Tarek A. El-Ghazawi. 181-187 [doi]
- Multi-level concurrency in a framework for integrated loosely coupled plasma simulationsWael R. Elwasif, David E. Bernholdt, Samantha S. Foley, Aniruddha G. Shet, Randall Bramley. 188-195 [doi]
- FIS-PNN: A hybrid computational method for protein-protein interaction predictionSakhinah Abu Bakar, Javid Taheri, Albert Y. Zomaya. 196-203 [doi]
- Modeling gene regulatory networks: A surveyWalid E. Gomaa. 204-208 [doi]
- GPU acceleration of an image characterization algorithm for document similarity analysisGuochun Shi, Volodymyr V. Kindratenko, Rob Kooper, Peter Bajcsy. 209-216 [doi]
- LU factorization for accelerator-based systemsEmmanuel Agullo, Cédric Augonnet, Jack Dongarra, Mathieu Faverge, Julien Langou, Hatem Ltaief, Stanimire Tomov. 217-224 [doi]
- Performance analysis of streamed video over mobile IP based networksHeba Nashaat, Rawya Rizk, Hani Mahdi. 225-232 [doi]
- Using semantic Web to build and execute ad-hoc processesReginaldo Mendes, Paulo F. Pires, Flávia Coimbra Delicato, Thaís Vasconcelos Batista, Javid Taheri, Albert Y. Zomaya. 233-240 [doi]
- A methodology for evaluating JavaScript execution behavior in interactive web applicationsJan Kasper Martinsen, Håkan Grahn. 241-248 [doi]
- Cooperative web caching of dynamic web contentMohamed R. Atassi, Sherif G. Aly, Amr El-Kadi. 249-254 [doi]
- Verification of decimal floating-point fused-multiply-add operationAmr A. R. Sayed-Ahmed, Hossam A. H. Fahmy, Rodina Samy. 255-262 [doi]
- A buffer-space allocation approach for application-specific Network-on-ChipMohamed Bakhouya, Abderrahim Chariete, Jaafar Gaber, Maxime Wack. 263-267 [doi]
- A novel approach for system level synthesis of multi-core system architectures from TPG modelsKarim Yehia, Mona Safar, Hassan A. Youness, Mohamed AbdElSalam, Ashraf Salem. 268-275 [doi]
- Two-level checkpoint/restart modeling for GPGPUSupada Laosooksathit, Nichamon Naksinehaboon, Chokchai Leangsuksun. 276-283 [doi]
- Approaches to prediction of protein structureWalaa Fathy Ahmed, Walid E. Gomaa. 284 [doi]
- Instruction and data cache peak temperature reduction using cache access balancing in embedded processorsMohsen Taherian, Amirali Baniasadi, Hamid Noori. 285-286 [doi]
- Measuring "Sybil attacks" in Kademlia-based networksXiangtao Liu, Kai Cai, Yang Li. 287-288 [doi]
- Challenges to development of multipurpose global federated testbed for Future Internet experimentationMofassir Haque, Krzysztof Pawlikowski, Sayan Kumar Ray. 289-292 [doi]
- Arabic text categorization based on rough set classificationMoawia Elfaki Yahia. 293-294 [doi]
- Comparing approaches to prepare data in classification problemsPaulo M. Goncalves, Roberto Souto Maior de Barros. 295-296 [doi]
- A comparson of receiver initiated DLB schemes via Parallel DFSMustafa B. Hamad, Sami M. Sharif. 297-298 [doi]
- Predicting parallel applications performance using signatures: The workload effectJ. Martinez Canillas, Alvaro Wong, Dolores Rexachs, Emilio Luque. 299-300 [doi]
- Real-time motion object tracking using GPULubomir Riha, Hoda El-Sayed. 301-304 [doi]