Abstract is missing.
- Decentralized Adaptive Helper Selection in Multi-channel P2P Streaming SystemsSeyed Akbar Mostafavi, Mehdi Dehghan. 1-7 [doi]
- Are Circles Communities? A Comparative Analysis of Selective Sharing in Google+Steffen Brauer, Thomas C. Schmidt. 8-15 [doi]
- Friend or Flood? Social Prevention of Flooding Attacks in Mobile Opportunistic NetworksIain Parris, Tristan Henderson. 16-21 [doi]
- Secure Fallback Authentication and the Trusted Friend AttackAshar Javed, David Bletgen, Florian Kohlar, Markus Durmuth, Jörg Schwenk. 22-28 [doi]
- Socially-Optimal ISP-Aware P2P Content Distribution via a Primal-Dual ApproachJian Zhao, Chuan Wu. 29-36 [doi]
- Let Our Browsers Socialize: Building User-Centric Content Communities on WebRTCMax Jonas Werner, Christian Vogt, Thomas C. Schmidt. 37-44 [doi]
- A Hybrid Cloud Architecture for a Social Science Research Computing Data CenterSteven Abramson, William Horka, Leonard F. Wisniewski. 45-50 [doi]
- Exercising High-Level Parallel Programming on Streams: A Systems Biology Use CaseMarco Aldinucci, Maurizio Drocco, Guilherme Peretti Pezzi, Claudia Misale, Fabio Tordini, Massimo Torquati. 51-56 [doi]
- Impact of Ethernet Multipath Routing on Data Center Network ConsolidationsDallal Belabed, Stefano Secci, Guy Pujolle, Deep Medhi. 57-62 [doi]
- Cayley-Graph-Based Data Centers and Space Requirements of a Routing Scheme Using AutomataMiguel Camelo, Pere Vilà, Lluís Fàbrega, Dimitri Papadimitriou. 63-69 [doi]
- Controlling the Delay of Small Flows in DatacentersDamiano Carra. 70-75 [doi]
- Deploying and Extending On-Premise Cloud Storage Based on ownCloudThomas Hildmann, Odej Kao. 76-81 [doi]
- Behavioral Security Threat Detection Strategies for Data Center Switches and RoutersRam Krishnan, Dilip Krishnaswamy, Dave Mcdysan. 82-87 [doi]
- Automated Modeling of I/O Performance and Interference Effects in Virtualized Storage SystemsQais Noorshams, Axel Busch, Andreas Rentschler, Dominik Bruhn, Samuel Kounev, Petr Tuma, Ralf Reussner. 88-93 [doi]
- OS-Assisted Task Preemption for HadoopMario Pastorelli, Matteo Dell'Amico, Pietro Michiardi. 94-99 [doi]
- Data Center Network Throughput Analysis Using Queueing Petri NetsPiotr Rygielski, Samuel Kounev. 100-105 [doi]
- On Balance among Energy, Performance and Recovery in Storage SystemsJunyao Zhang, Jiangling Yin, Jun Wang, Jian Zhou. 106-112 [doi]
- A Control Method of Guaranteeing Throughput for TCP Communication Considering Handover over WLANHiroyasu Obata, Ayaka Momota, Junichi Funasaka, Kenji Ishida. 113-118 [doi]
- Dynamic Scheduling for Speculative Execution to Improve MapReduce Performance in Heterogeneous EnvironmentHyungjae Jung, Hidenori Nakazato. 119-124 [doi]
- Preserving Routes during Fast ConvergenceJorge Arturo Cobb. 125-132 [doi]
- An Efficient Edge-Based Authentication for Network Coding against Entropy AttacksRyo Iguchi, Yoshifumi Manabe. 133-139 [doi]
- On Parameters for the Secure Dispersed Data Transfer Scheme Using a Multipath Routing MethodEitaro Kohno, Anri Kimura, Yoshiaki Kakuda. 140-145 [doi]
- Model-Based Engineering Techniques for QoS Auditing in Distributed Cloud ServicesKaliappa Ravindran. 146-153 [doi]
- Analysis of Permanent Faults in Transaction Level SystemC ModelsReza Hajisheykhi, Ali Ebnenasir, Sandeep S. Kulkarni. 154-160 [doi]
- Protection Mechanism in Privileged Memory Space for Embedded Systems, Real-Time OSShimpei Yamada, Yukikazu Nakamoto. 161-166 [doi]
- Vehicular Coordination via a Safety Kernel in the Gulliver Test-BedAntonio Casimiro, Oscar Morales Ponce, Thomas Petig, Elad Michael Schiller. 167-176 [doi]
- Machine-Learning-Based Feature Selection Techniques for Large-Scale Network Intrusion DetectionO. Y. Al-Jarrah, A. Siddiqui, M. Elsalamouny, Paul D. Yoo, Sami Muhaidat, K. Kim. 177-181 [doi]
- Privacy Preserving Statistics in the Smart GridIraklis Leontiadis, Refik Molva, Melek Önen. 182-187 [doi]
- Content and Popularity Analysis of Tor Hidden ServicesAlex Biryukov, Ivan Pustogarov, Fabrice Thill, Ralf-Philipp Weinmann. 188-193 [doi]
- A Criticism to Society (As Seen by Twitter Analytics)Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi, Roberto Di Pietro. 194-200 [doi]
- MDoctor: A Mobile Malware Prognosis ApplicationEemil Lagerspetz, Hien Thi Thu Truong, Sasu Tarkoma, N. Asokan. 201-206 [doi]
- A Software Architecture for Progressive Scanning of On-line CommunitiesRoberto Baldoni, Fabrizio d'Amore, Massimo Mecella, Daniele Ucci. 207-212 [doi]