Abstract is missing.
- Provisioning a Multi-tiered Data Staging Area for Extreme-Scale MachinesRamya Prabhakar, Sudharshan S. Vazhkudai, Youngjae Kim, Ali Raza Butt, Min Li, Mahmut T. Kandemir. 1-12 [doi]
- Design and Analysis of a Distributed Multi-leg Stock Trading SystemJia Zou, Gong Su, Arun Iyengar, Yu Yuan, Yi Ge. 13-24 [doi]
- YSmart: Yet Another SQL-to-MapReduce TranslatorRubao Lee, Tian Luo, Yin Huai, Fusheng Wang, Yongqiang He, Xiaodong Zhang. 25-36 [doi]
- PET: Probabilistic Estimating Tree for Large-Scale RFID EstimationYuanqing Zheng, Mo Li, Chen Qian. 37-46 [doi]
- End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based ApproachHuanzhong Li, Xue Liu, Wenbo He, Jian Li, Wenhua Dou. 47-56 [doi]
- Randomized Distributed Algorithms for Neighbor Discovery in Multi-hop Multi-channel Heterogeneous Wireless NetworksNeeraj Mittal, Yanyan Zeng, S. Venkatesan, R. Chandrasekaran. 57-66 [doi]
- An Energy-Efficient Markov Chain-Based Randomized Duty Cycling Scheme for Wireless Sensor NetworksGiacomo Ghidini, Sajal K. Das. 67-76 [doi]
- M-PSM: Mobility-Aware Power Save Mode for IEEE 802.11 WLANsXi Chen, Sunggeun Jin, Daji Qiao. 77-86 [doi]
- SOFA: A Sleep-Optimal Fair-Attention Scheduler for the Power-Saving Mode of WLANsZheng Zeng, Yan Gao, P. R. Kumar. 87-98 [doi]
- Meeting the Digital Rights Requirements of Live Broadcast in a Peer-to-Peer NetworkWenjie Wang, Hyunseok Chang, Adam Goodman, Eric Wucherer, Sugih Jamin. 99-108 [doi]
- Peer-to-Peer Data Replication Meets Delay Tolerant NetworkingPeter Gilbert, Venugopalan Ramasubramanian, Patrick Stuedi, Douglas B. Terry. 109-120 [doi]
- On the Dependencies between Source Neighbors in Optimally DoS-stable P2P Streaming TopologiesSascha Grau, Mathias Fischer, Guenter Schaefer. 121-130 [doi]
- Intelligent Placement of Datacenters for Internet ServicesIñigo Goiri, Kien Le, Jordi Guitart, Jordi Torres, Ricardo Bianchini. 131-142 [doi]
- Data Migration in Heterogeneous Storage SystemsChadi Kari, Yoo Ah Kim, Alexander Russell. 143-150 [doi]
- Supporting Cooperative Caching in Disruption Tolerant NetworksWei Gao, Guohong Cao, Arun Iyengar, Mudhakar Srivatsa. 151-161 [doi]
- Effective Channel Exploitation in IEEE 802.16j Networks for Maritime CommunicationsHanwu Wang, Weijia Jia, Geyong Min. 162-171 [doi]
- Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor NetworksJun Huang, Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Liusheng Huang. 172-181 [doi]
- Coolest Path: Spectrum Mobility Aware Routing Metrics in Cognitive Ad Hoc NetworksXiaoxia Huang, Dianjie Lu, Pan Li, Yuguang Fang. 182-191 [doi]
- A MapReduce-Based Maximum-Flow Algorithm for Large Small-World Network GraphsFelix Halim, Roland H. C. Yap, Yongzheng Wu. 192-202 [doi]
- The Client Assignment Problem for Continuous Distributed Interactive ApplicationsLu Zhang, Xueyan Tang. 203-214 [doi]
- Guidelines for the Verification of Population ProtocolsJulien Clément, Carole Delporte-Gallet, Hugues Fauconnier, Mihaela Sighireanu. 215-224 [doi]
- Scaling Construction of Low Fan-out Overlays for Topic-Based Publish/Subscribe SystemsChen Chen, Roman Vitenberg, Hans-Arno Jacobsen. 225-236 [doi]
- Efficient Online WiFi Delivery of Layered-Coding Media Using Inter-layer Network CodingDimitrios Koutsonikolas, Y. Charlie Hu, Chih-Chun Wang, Mary L. Comer, Amr Mahmoud Salem Mohamed. 237-247 [doi]
- Dissecting Video Server Selection Strategies in the YouTube CDNRuben Torres, Alessandro Finamore, Jin Ryong Kim, Marco Mellia, Maurizio M. Munafò, Sanjay G. Rao. 248-257 [doi]
- Resource Allocation for Medium Grain Scalable Videos over Femtocell Cognitive Radio NetworksDonglin Hu, Shiwen Mao. 258-267 [doi]
- CloudMedia: When Cloud on Demand Meets Video on DemandYu Wu, Chuan Wu, Bo Li, Xuanjia Qiu, Francis C. M. Lau. 268-277 [doi]
- Correlated Resource Models of Internet End HostsEric Martin Heien, Derrick Kondo, David P. Anderson. 278-287 [doi]
- Time-Dependent Broadband Pricing: Feasibility and BenefitsCarlee Joe-Wong, Sangtae Ha, Mung Chiang. 288-298 [doi]
- Partitioning Network Testbed ExperimentsWei-Min Yao, Sonia Fahmy. 299-309 [doi]
- TCP Congestion Avoidance Algorithm IdentificationPeng Yang, Wen Luo, Lisong Xu, Jitender S. Deogun, Ying Lu. 310-321 [doi]
- What is Missing in Current Checkpoint Interval Models?Leonardo Fialho, Dolores Rexachs, Emilio Luque. 322-332 [doi]
- Scalable Symbolic Execution of Distributed SystemsRaimondas Sasnauskas, Oscar Soria Dustmann, Benjamin Lucien Kaminski, Klaus Wehrle, Carsten Weise, Stefan Kowalewski. 333-342 [doi]
- A Scheduling and Certification Algorithm for Defeating Collusion in Desktop GridsLouis-Claude Canon, Emmanuel Jeannot, Jon B. Weissman. 343-352 [doi]
- A Self-stabilizing (k, r)-clustering Algorithm with Multiple Paths for Wireless Ad-hoc NetworksAndreas Larsson, Philippas Tsigas. 353-362 [doi]
- SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile PhonesDaniele Quercia, Ilias Leontiadis, Liam McNamara, Cecilia Mascolo, Jon Crowcroft. 363-372 [doi]
- HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency HealthcareJinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang. 373-382 [doi]
- Authorized Private Keyword Search over Encrypted Data in Cloud ComputingMing Li, Shucheng Yu, Ning Cao, Wenjing Lou. 383-392 [doi]
- Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud ComputingNing Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing Lou. 393-402 [doi]
- Delay-Cognizant Reliable Delivery for Publish/Subscribe Overlay NetworksShuo Guo, Kyriakos Karenos, Minkyong Kim, Hui Lei, Johnathan M. Reason. 403-412 [doi]
- Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G NetworksBo Zhao, Byung-Chul Tak, Guohong Cao. 413-422 [doi]
- Energy-Aware Scheduling in Disk Storage SystemsJerry Chou, Jinoh Kim, Doron Rotem. 423-433 [doi]
- Tians Scheduling: Using Partial Processing in Best-Effort ApplicationsYuxiong He, Sameh Elnikety, Hongyang Sun. 434-445 [doi]
- Starlink: Runtime Interoperability between Heterogeneous Middleware ProtocolsYérom-David Bromberg, Paul Grace, Laurent Réveillère. 446-455 [doi]
- WHISPER: Middleware for Confidential Communication in Large-Scale NetworksValerio Schiavoni, Etienne Riviere, Pascal Felber. 456-466 [doi]
- sfatables: A Firewall-like Policy Engine for Federated SystemsSapan Bhatia, Andy C. Bavier, Larry L. Peterson, Soner Sevinc. 467-476 [doi]
- Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor NetworksXiao Wang, Xinbing Wang, Jun Zhao. 477-487 [doi]
- Cool: On Coverage with Solar-Powered SensorsShaoJie Tang, Xiang-Yang Li, Xingfa Shen, Jianhui Zhang, Guojun Dai, Sajal K. Das. 488-496 [doi]
- LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor NetworksRui Zhang, Yanchao Zhang. 497-506 [doi]
- Competitive and Fair Medium Access Despite Reactive JammingAndréa W. Richa, Christian Scheideler, Stefan Schmid, Jin Zhang. 507-516 [doi]
- Localizing Multiple Jamming Attackers in Wireless NetworksHongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu. 517-528 [doi]
- JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc NetworksRui Zhang, Yanchao Zhang, Xiaoxia Huang. 529-538 [doi]
- Cloud4Home - Enhancing Data Services with @Home CloudsSudarsun Kannan, Ada Gavrilovska, Karsten Schwan. 539-548 [doi]
- Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear EquationsCong Wang, Kui Ren, Jia Wang, Karthik Mahendra Raje Urs. 549-558 [doi]
- A Cost-Aware Elasticity Provisioning System for the CloudUpendra Sharma, Prashant J. Shenoy, Sambit Sahu, Anees Shaikh. 559-570 [doi]
- Economical and Robust Provisioning of N-Tier Cloud Workloads: A Multi-level Control ApproachPengCheng Xiong, Zhikui Wang, Simon Malkowski, Qingyang Wang, Deepal Jayasinghe, Calton Pu. 571-580 [doi]
- Secure Aggregation with Malicious Node Revocation in Sensor NetworksBinbin Chen, Haifeng Yu. 581-592 [doi]
- Defending Against Traffic Analysis in Wireless Networks through Traffic ReshapingFan Zhang, Wenbo He, Xue Liu. 593-602 [doi]
- Confidential GossipChryssis Georgiou, Seth Gilbert, Dariusz R. Kowalski. 603-612 [doi]
- Understanding the Network and User-Targeting Properties of Web Advertising NetworksYong Wang, Daniel Burgener, Aleksandar Kuzmanovic, Gabriel Maciá-Fernández. 613-622 [doi]
- Cache Miss Analysis for GPU Programs Based on Stack Distance ProfileTao Tang, Xuejun Yang, Yisong Lin. 623-634 [doi]
- BloomFlash: Bloom Filter on Flash-Based StorageBiplob K. Debnath, Sudipta Sengupta, Jin Li, David J. Lilja, David Hung-Chang Du. 635-644 [doi]
- Understanding Vicious Cycles in Server ClustersMohammad Maifi Hasan Khan, Jin Heo, Shen Li, Tarek F. Abdelzaher. 645-654 [doi]
- Searching for Bandwidth-Constrained ClustersSukhyun Song, Peter J. Keleher, Alan Sussman. 655-664 [doi]
- Smart Redundancy for Distributed ComputationYuriy Brun, George Edwards, Jae young Bang, Nenad Medvidovic. 665-676 [doi]
- Fused Data Structures for Handling Multiple Faults in Distributed SystemsBharath Balasubramanian, Vijay K. Garg. 677-688 [doi]
- Low-Overhead Fault Tolerance for High-Throughput Data Processing SystemsAndre Martin, Thomas Knauth, Stephan Creutz, Diogo Becker de Brum, Stefan Weigert, Christof Fetzer, Andrey Brito. 689-699 [doi]
- Guaranteeing High Availability Goals for Virtual Machine PlacementEyal Bin, Ofer Biran, Odellia Boni, Erez Hadad, Elliot K. Kolodner, Yosef Moatti, Dean H. Lorenz. 700-709 [doi]
- Efficient and Private Access to Outsourced DataSabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati. 710-719 [doi]
- Towards Fine-Grained Access Control in JavaScript ContextsKailas Patil, Xinshu Dong, Xiaolei Li, Zhenkai Liang, Xuxian Jiang. 720-729 [doi]
- A New Class of Buffer Overflow AttacksAshish Kundu, Elisa Bertino. 730-739 [doi]
- Location Cheating: A Security Challenge to Location-Based Social Network ServicesWenbo He, Xue Liu, Mai Ren. 740-749 [doi]
- A Monte Carlo Method for Mobile Target CountingDengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen, Wei Zhao. 750-759 [doi]
- Whistle: Synchronization-Free TDOA for LocalizationBin Xu, Ran Yu, Guodong Sun, Zheng Yang. 760-769 [doi]
- Bubble Trace: Mobile Target Tracking under Insufficient Anchor CoveragePengpeng Chen, Ziguo Zhong, Tian He. 770-779 [doi]
- Efficient and Robust Localization of Multiple Radiation Sources in Complex EnvironmentsJren-Chit Chin, David K. Y. Yau, Nageswara S. V. Rao. 780-789 [doi]
- Towards Approximate Event Processing in a Large-Scale Content-Based NetworkYaxiong Zhao, Jie Wu. 790-799 [doi]
- Foundations for Highly Available Content-Based Publish/Subscribe OverlaysYoung Yoon, Vinod Muthusamy, Hans-Arno Jacobsen. 800-811 [doi]
- Green Resource Allocation Algorithms for Publish/Subscribe SystemsAlex King Yeung Cheung, Hans-Arno Jacobsen. 812-823 [doi]
- Split and Subsume: Subscription Normalization for Effective Content-Based MessagingK. R. Jayaram, Patrick Eugster. 824-835 [doi]
- One More Weight is Enough: Toward the Optimal Traffic Engineering with OSPFKe Xu, Hongying Liu, Jiangchuan Liu, Meng Shen. 836-846 [doi]
- The Routing Continuum from Shortest-Path to All-Path: A Unifying TheoryYanhua Li, Zhi-Li Zhang, Daniel Boley. 847-856 [doi]
- Greedy Distance Vector RoutingChen Qian, Simon S. Lam. 857-868 [doi]
- Making CDN and ISP Routings SymbioticVarun Khare, Beichuan Zhang. 869-878 [doi]
- SID: Ship Intrusion Detection with Wireless Sensor NetworksHanjiang Luo, Kaishun Wu, Zhongwen Guo, Lin Gu, Zhong Yang, Lionel M. Ni. 879-888 [doi]
- Compressive Sensing Approach to Urban Traffic SensingZhi Li, Yanmin Zhu, Hongzi Zhu, Minglu Li. 889-898 [doi]
- Towards Optimal Sensor Placement for Hot Server Detection in Data CentersXiaodong Wang, Xiaorui Wang, Guoliang Xing, Jinzhu Chen, Cheng-Xian Lin, Yixin Chen. 899-908 [doi]
- E-Shadow: Lubricating Social Interaction Using Mobile PhonesJin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan. 909-918 [doi]