Abstract is missing.
- Maximizing Profit in Cloud Computing System via Resource AllocationHadi Goudarzi, Massoud Pedram. 1-6 [doi]
- Multi-dimensional Resource Integrated Scheduling in a Shared Data CenterXin Sun, Sen Su, Peng Xu, Shuang Chi, Yan Luo. 7-13 [doi]
- Exploiting Resource Usage Patterns for Better Utilization PredictionJian Tan, Parijat Dube, Xiaoqiao Meng, Li Zhang 0002. 14-19 [doi]
- Improving Fairness of Quantized Congestion Notification for Data Center Ethernet NetworksYuki Hayashi, Hayato Itsumi, Miki Yamamoto. 20-25 [doi]
- A Probabilistic Approach to Address TCP Incast in Data Center NetworksSantosh Kulkarni, Prathima Agrawal. 26-33 [doi]
- A Model of Storage I/O Performance Interference in Virtualized SystemsGiuliano Casale, Stephan Kraft, Diwakar Krishnamurthy. 34-39 [doi]
- The Edge of SmartnessCarey Williamson. 40-46 [doi]
- Scaling OS Streaming through Minimizing Cache RedundancyLuis Garcés-Erice, Sean Rooney. 47-53 [doi]
- Energy Efficiency Assessment for Data Center in Finland: Case StudyXiaoshu Lu, Tao Lu, Matias Remes, Martti Viljanen. 54-60 [doi]
- SHHC: A Scalable Hybrid Hash Cluster for Cloud Backup Services in Data CentersLei Xu, Jian Hu, Stephen Mkandawire, Hong Jiang. 61-65 [doi]
- Towards Optimal Data Replication Across Data CentersFan Ping, Xiaohu Li, Christopher McConnell, Rohini Vabbalareddy, Jeong-Hyon Hwang. 66-71 [doi]
- Cross-Examination of Datacenter Workload Modeling TechniquesChristina Delimitrou, Christos Kozyrakis. 72-79 [doi]
- PARSE 2.0: A Tool for Parallel Application Run Time Behavior EvaluationJeffrey J. Evans, Charles E. Lucas. 80-86 [doi]
- Modelling of Cloud Computing Centers Using M/G/m QueuesHamzeh Khazaei, Jelena V. Misic, Vojislav B. Misic. 87-92 [doi]
- DC-PET: A System for Data Center Performance EstimationPeer Hasselmeyer, Nico d Heureuse. 93-99 [doi]
- Broadcasting Method Based on Topology Control for Fault-Tolerant MANETDaisuke Kasamatsu, Yuta Kawamura, Masahiro Oki, Norihiko Shinomiya. 105-110 [doi]
- Fine-Grained Localization with Pairwise Nodes CoverageXiaoguang Li, Jie Wu. 111-117 [doi]
- Scale-free Networking without Routing TablesJ. J. Garcia-Luna-Aceves. 118 [doi]
- Secure Location Verification with Randomly-Selected Base StationsMatthew Holiday, Neeraj Mittal, Subbarayan Venkatesan. 119-122 [doi]
- Understanding Graph Sampling Algorithms for Social Network AnalysisTianyi Wang, Yang Chen, Zengbin Zhang, Tianyin Xu, Long Jin, Pan Hui, Beixing Deng, Xing Li. 123-128 [doi]
- Preserving Social Locality in Data Replication for Online Social NetworksKhanh Nguyen, Cuong Pham, Duc A. Tran, Feng Zhang. 129-133 [doi]
- k-clique Communities in the Internet AS-level Topology GraphEnrico Gregori, Luciano Lenzini, Chiara Orsini. 134-139 [doi]
- Link-Level Network Topology GenerationMehmet Burak Akgun, Mehmet Hadi Gunes. 140-145 [doi]
- A Geometric Approach to Robustness in Complex NetworksGyan Ranjan, Zhi-Li Zhang. 146-153 [doi]
- Understanding Social Networks Properties for Trustworthy ComputingAbedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim. 154-159 [doi]
- Approximation and Inapproximation for the Influence Maximization Problem in Social Networks under Deterministic Linear Threshold ModelZaixin Lu, Wei Zhang, Weili Wu, Bin Fu, Ding-Zhu Du. 160-165 [doi]
- Finding a Kneedle in a Haystack: Detecting Knee Points in System BehaviorVille Satopaa, Jeannie R. Albrecht, David Irwin, Barath Raghavan. 166-171 [doi]
- A Low Energy and Adaptive Architecture for Efficient Routing and Robust Mobility Management in Wireless Sensor NetworksF. J. Atero, Juan J. Vinagre, Eduardo Morgado, Mark Wilby. 172-181 [doi]
- A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SMBilal Abu Bakr, Leszek Lilien. 182-191 [doi]
- Localized Energy-Aware Fault Management in Relay Based Sensor NetworksAtaul Bari, Subir Bandyopadhyay, Arunita Jaekel. 192-197 [doi]
- An Efficient Multi-path Data Collection Scheme in Wireless Sensor NetworksHai Van Luu, Xueyan Tang. 198-207 [doi]
- Marina-Scale Water Temperature Sensing in Real Time Using MicrotomographyAndrew Goodney, D. Negandhi, K. Joshi, Young H. Cho. 208-217 [doi]
- A Weighted Average Based External Clock Synchronization Protocol for Wireless Sensor NetworksAmulya Ratna Swain, R. C. Hansdah. 218-229 [doi]
- SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security EvaluationYi-Tao Wang, Rajive Bagrodia. 230-239 [doi]
- Exploiting Rush Hours for Energy-Efficient Contact Probing in Opportunistic Data CollectionXiuchao Wu, Kenneth N. Brown, Cormac J. Sreenan. 240-247 [doi]
- A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud ComputingJakub Szefer, Ruby B. Lee. 248-252 [doi]
- Enforcing Policy and Data Consistency of Cloud TransactionsMarian Kamal Iskander, Dave W. Wilkinson, Adam J. Lee, Panos K. Chrysanthis. 253-262 [doi]
- Private Editing Using Untrusted Cloud ServicesYan Huang, David Evans. 263-272 [doi]
- Privacy-Aware BedTree Based Solution for Fuzzy Multi-keyword Search over Encrypted DataM. Chuah, W. Hu. 273-281 [doi]
- Towards Secure and Effective Utilization over Encrypted Cloud DataCong Wang, Qian Wang, Kui Ren. 282-286 [doi]
- Connected Point Coverage in Wireless Sensor Networks Using Robust Spanning TreesPouya Ostovari, Mehdi Dehghan, Jie Wu. 287-293 [doi]
- On Guided Navigation in Target Tracking Sensor Networks Using Alpha-Beta FiltersSurendra Sharma, Sarang Deshpande, Krishna M. Sivalingam. 294-303 [doi]
- Democratic Leader Finding Algorithm for Large Mobile Ad Hoc NetworksShantanu Sharma, Awadhesh Kumar Singh. 304-312 [doi]
- Mitigating Wireless Jamming Attacks via Channel MigrationSangwon Hyun, Peng Ning, An Liu. 313-322 [doi]
- ID-based Safety Message Authentication for Security and Trust in Vehicular NetworksSubir Biswas, Jelena V. Misic, Vojislav B. Misic. 323-331 [doi]
- A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor NetworksSalmin Sultana, Elisa Bertino, Mohamed Shehab. 332-338 [doi]
- Cooperative File Sharing in Hybrid Delay Tolerant NetworksCong Liu, Jie Wu, Xin Guan, Li Chen. 339-344 [doi]
- Transmission Rate Enhancement of Cooperative Communications in Wireless NetworksXiaoyan Wang, Jie Li, Kui Wu. 345-349 [doi]
- Predict Energy Consumption of Trigger-Driven Sensor Network by Markov ChainsWei Zha, Wee Keong Ng. 350-356 [doi]