Abstract is missing.
- Keynote: Assertion Based Parallel DebuggingDavid Abramson. 1 [doi]
- Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor NetworksHongjuan Li, Keqiu Li, Wenyu Qu, Ivan Stojmenovic. 2-13 [doi]
- Dynamic Data Race Detection for Correlated VariablesAli Jannesari, Markus Westphal-Furuya, Walter F. Tichy. 14-26 [doi]
- Improving the Parallel Schnorr-Euchner LLL AlgorithmWerner Backes, Susanne Wetzel. 27-39 [doi]
- Distributed Mining of Constrained Frequent Sets from Uncertain DataAlfredo Cuzzocrea, Carson Kai-Sang Leung. 40-53 [doi]
- Set-to-Set Disjoint-Paths Routing in Recursive Dual-NetYamin Li, Shietung Peng, Wanming Chu. 54-65 [doi]
- Redflag: A Framework for Analysis of Kernel-Level ConcurrencyJustin Seyster, Prabakar Radhakrishnan, Samriti Katoch, Abhinav Duggal, Scott D. Stoller, Erez Zadok. 66-79 [doi]
- Exploiting Parallelism in the H.264 Deblocking Filter by Operation ReorderingTsung-Hsi Weng, Yi-ting Wang, Chung-Ping Chung. 80-92 [doi]
- Compiler Support for Concurrency SynchronizationTzong-Yen Lin, Cheng-Yu Lee, Chia-Jung Chen, Rong-Guey Chang. 93-105 [doi]
- Fault-Tolerant Routing Based on Approximate Directed Routable Probabilities for HypercubesThuy Dinh Duong, Keiichi Kaneko. 106-116 [doi]
- Finding a Hamiltonian Cycle in a Hierarchical Dual-Net with Base Network of p -Ary q -CubeYamin Li, Shietung Peng, Wanming Chu. 117-128 [doi]
- Adaptive Resource Remapping through Live Migration of Virtual MachinesMuhammad Atif, Peter E. Strazdins. 129-143 [doi]
- LUTS: A Lightweight User-Level Transaction SchedulerDaniel Nicácio, Alexandro Baldassin, Guido Araujo. 144-157 [doi]
- Verification of Partitioning and Allocation Techniques on Teradata DBMSLadjel Bellatreche, Soumia Benkrid, Ahmad Ghazal, Alain Crolotte, Alfredo Cuzzocrea. 158-169 [doi]
- Memory Performance and SPEC OpenMP Scalability on Quad-Socket x86_64 SystemsDaniel Molka, Robert Schöne, Daniel Hackenberg, Matthias S. Müller. 170-181 [doi]
- Anonymous Communication over Invisible Mix RingsMing Zheng, Hai-Xin Duan, Jianping Wu. 182-193 [doi]
- Game-Based Distributed Resource Allocation in Horizontal Dynamic Cloud Federation PlatformMohammad Mehedi Hassan, Biao Song, Eui-nam Huh. 194-205 [doi]
- Stream Management within the CloudMinerYuzhang Han, Peter Brezany, Andrzej Goscinski. 206-217 [doi]
- Security Architecture for Virtual MachinesUdaya Kiran Tupakula, Vijay Varadharajan, Abhishek Bichhawat. 218-229 [doi]
- Fast and Accurate Similarity Searching of Biopolymer Sequences with GPU and CUDARobert Pawlowski, Bozena Malysiak-Mrozek, Stanislaw Kozielski, Dariusz Mrozek. 230-243 [doi]
- Read Invisibility, Virtual World Consistency and Probabilistic Permissiveness are CompatibleTyler Crain, Damien Imbs, Michel Raynal. 244-257 [doi]
- Parallel Implementations of Gusfield's Cut Tree AlgorithmJaime Cohen, Luiz A. Rodrigues, Fabiano Silva, Renato Carmo, André Luiz Pires Guedes, Elias Procópio Duarte Jr.. 258-269 [doi]
- Efficient Parallel Implementations of Controlled Optimization of Traffic PhasesSameh Samra, Ahmed El-Mahdy, Walid Gomaa, Yasutaka Wada, Amin Shoukry. 270-281 [doi]
- Scheduling Concurrent Workflows in HPC Cloud through Exploiting Schedule GapsHe-Jhan Jiang, Kuo-Chan Huang, Hsi-Ya Chang, Di-Syuan Gu, Po-Jen Shih. 282-293 [doi]
- Efficient Decoding of QC-LDPC Codes Using GPUsYue Zhao, Xu Chen, Chiu-Wing Sham, Wai Man Tam, Francis Chung-Ming Lau. 294-305 [doi]
- A Combined Arithmetic Logic Unit and Memory Element for the Design of a Parallel ComputerMohammed Ziaur Rahman. 306-317 [doi]
- Parallel Implementation of External Sort and Join Operations on a Multi-core Network-Optimized System on a ChipElahe Khorasani, Brent Paulovicks, Vadim Sheinin, Hangu Yeo. 318-325 [doi]
- STM with Transparent API Considered HarmfulFernando Miguel Carvalho, João P. Cachopo. 326-337 [doi]
- A Global Snapshot Collection Algorithm with Concurrent Initiators with Non-FIFO ChannelDiganta Goswami, Soumyadip Majumder. 338-348 [doi]
- An Approach for Code Compression in Run Time for Embedded Systems - A Preliminary ResultsWanderson Roger Azevedo Dias, Edward David Moreno, Raimundo da Silva Barreto. 349-359 [doi]
- Optimized Two Party Privacy Preserving Association Rule Mining Using Fully Homomorphic EncryptionMd. Golam Kaosar, Russell Paulet, Xun Yi. 360-370 [doi]
- SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud DatacenterSaurabh Kumar Garg, Srinivasa K. Gopalaiyengar, Rajkumar Buyya. 371-384 [doi]
- ΣC: A Programming Model and Language for Embedded ManycoresThierry Goubier, Renaud Sirdey, Stéphane Louise, Vincent David. 385-394 [doi]
- Provisioning Spot Market Cloud Resources to Create Cost-Effective Virtual ClustersWilliam Voorsluys, Saurabh Kumar Garg, Rajkumar Buyya. 395-408 [doi]
- A Principled Approach to Grid Middleware - Status Report on the Minimum Intrusion GridJost Berthold, Jonas Bardino, Brian Vinter. 409-418 [doi]
- Performance Analysis of Preemption-Aware Scheduling in Multi-cluster Grid EnvironmentsMohsen Amini Salehi, Bahman Javadi, Rajkumar Buyya. 419-432 [doi]
- Performance Evaluation of Open Source Seismic Data Processing PackagesIzzatdin A. Aziz, Andrzej M. Goscinski, Michael Hobbs. 433-442 [doi]
- Reputation-Based Resource Allocation in Market-Oriented Distributed SystemsMasnida Hussin, Young Choon Lee, Albert Y. Zomaya. 443-452 [doi]
- Cooperation-Based Trust Model and Its Application in Network Security ManagementWu Liu, Hai-Xin Duan, Ping Ren. 453-459 [doi]
- Performance Evaluation of the Three-Dimensional Finite-Difference Time-Domain(FDTD) Method on Fermi Architecture GPUsKaixi Hou, Ying Zhao, Jiumei Huang, Lingjie Zhang. 460-469 [doi]
- The Probability Model of Peer-to-Peer Botnet PropagationYini Wang, Sheng Wen, Wei Zhou, Wanlei Zhou, Yang Xiang. 470-480 [doi]
- A Parallelism Extended Approach for the Enumeration of Orthogonal ArraysHien Phan, Ben Soh, Man Nguyen. 481-493 [doi]