Abstract is missing.
- Biased shortest path trees in wireless networksBaljeet Malhotra, Ioanis Nikolaidis, Mario A. Nascimento, Stéphane Bressan. 1-6 [doi]
- DAT: An AP scheduler using dynamically adjusted time windows for crowded WLANsYi Yao, Bo Sheng, Ningfang Mi. 1-6 [doi]
- Generalized broadcast scheduling in duty-cycle multi-hop wireless networksYueming Duan, Shouling Ji, Zhipeng Cai. 1-6 [doi]
- Web-based heterogeneous WSN integration using pervasive communicationMihaela Cardei, Anthony Marcus, Ionut Cardei, Timur Tavtilov. 1-6 [doi]
- Best-effort authentication for opportunistic networksJohn Solis, Philip Ginzboorg, N. Asokan, Jörg Ott. 1-6 [doi]
- Underlay-robust application layer multicastMathias Fischer, Sebastian Delling, Sascha Grau, Guenter Schaefer. 1-2 [doi]
- Real time video QoE analysis of RTMP streamsHolly French, Jie Lin, Tung Phan, Amy Csizmar Dalal. 1-2 [doi]
- Performance and power-consumption analysis of Mobile Internet DevicesJoseph Issa, Silvia Figueira. 1-6 [doi]
- Integrated load balanced and energy aware routing in large scale wireless sensor networksSiddharth Kamath, Asis Nasipuri. 1-8 [doi]
- Design and implementation of data survival in unattended wireless sensor networksMateus A. S. Santos, Cintia B. Margi. 1-6 [doi]
- Fulfilling end-to-end latency constraints in large-scale streaming environmentsStamatia Rizou, Frank Dürr, Kurt Rothermel. 1-8 [doi]
- QoS assurance in MANETs using flow aware admission control - Multipath protocolMuhammad Asif, Zhili Sun, Haitham S. Cruickshank, Naveed Ahmad. 1-2 [doi]
- A merge-and-split mechanism for dynamic virtual organization formation in gridsLena Mashayekhy, Daniel Grosu. 1-8 [doi]
- Enhancing I/O throughput via efficient routing and placement for large-scale parallel file systemsDavid Dillow, Galen M. Shipman, Sarp Oral, Zhe Zhang, Youngjae Kim. 1-9 [doi]
- A distributed workflow management system with case study of real-life scientific applicationsQishi Wu, Mengxia Zhu, Yi Gu, Xukang Lu, Patrick Brown, Michael A. Reuter, Stephen D. Miller. 1-8 [doi]
- Using spikes to deal with elephantsDinil Mon Divakaran. 1-8 [doi]
- Optimizing energy consumption under flow and stretch constraintsZhi Zhang, Fei Li. 1-8 [doi]
- Evaluation of process level redundant checkpointing/restart for HPC systemsIfeanyi P. Egwutuoha, David Levy, Bran Selic. 1-2 [doi]
- Assessing the comparative effectiveness of map construction protocols in wireless sensor networksAbdelmajid Khelil, Hanbin Chang, Neeraj Suri. 1-6 [doi]
- Using hidden convexity in structured communication problemsTharwat Morsy, Jürgen Götze, Hamed Nassar. 1-7 [doi]
- Adaptation-based programming for network protocol design: An 802.11x case study (abstract)Pingan Zhu, Jervis Pinto, Alan Fern, Thinh P. Nguyen. 1-2 [doi]
- A simple myopic mobile sink strategy for wireless sensor networksYoung-Hun Kim, Keon-Taek Lee, Semin Sim, Seung-Jae Han. 1-8 [doi]
- How P2P live streaming systems scale quickly under a flash crowd?Haibo Wu, Hai Jiang, Jing Liu, Yi Sun, Jun Li 0002, Zhongcheng Li. 1-8 [doi]
- Energy-aware dispatching in parallel queues with on-off energy consumptionAleksi Penttinen, Esa Hyytiä, Samuli Aalto. 1-8 [doi]
- Energy-efficient elastic scheduling in heterogeneous computing systemsXiaomin Zhu, Chuan He, Jianjiang Wang. 1-8 [doi]
- Can P2P help the cloud go green?Christopher Jarabek, Mea Wang. 1-10 [doi]
- Reliability analysis of an energy-aware RAID systemShu Yin, Yun Tian, Jiong Xie, Xiao Qin, Mohammed I. Alghamdi, Xiaojun Ruan, Meikang Qiu. 1-8 [doi]
- An efficient SVM-based method for multi-class network traffic classificationNing Jing, Ming Yang, Shaoyin Cheng, Qunfeng Dong, Hui Xiong. 1-8 [doi]
- Mesh traversal and sorting for efficient memory usage in scientific codesPablo Barrio, Carlos Carreras. 1-8 [doi]
- Improving location privacy in mix-zones for VANETsAntonio M. Carianha, Luciano Barreto, George Lima. 1-6 [doi]
- Subnet level network topology mappingM. Engin Tozal, Kamil Saraç. 1-8 [doi]
- CUDA acceleration of P7Viterbi algorithm in HMMER 3.0Saddam Quirem, Fahian Ahmed, Byeong Kil Lee. 1-2 [doi]
- JRCA: A joint routing and channel assignment scheme for wireless mesh networksAmitangshu Pal, Asis Nasipuri. 1-8 [doi]
- A reputation system for wireless mesh network using multi-path routing protocolYu Li. 1-6 [doi]
- VM clock synchronization measurementsJagmohan Chauhan, Dwight J. Makaroff, Anthony J. Arkles. 1-2 [doi]
- A case for packet deflection in structured wireless topologiesMaulik Desai, Nicholas F. Maxemchuk. 1-6 [doi]
- Network coding in multicore processorsThuan Duong-Ba, Thinh P. Nguyen, Patrick Chiang. 1-7 [doi]
- Cooperative optimal pricing for stochastic access control in heterogeneous wireless networksHaoran Zhang, Liusheng Huang, Hongli Xu. 1-6 [doi]
- Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communicationSwapnoneel Roy, Amlan K. Das, Yu Li. 1-7 [doi]
- Adaptive neighbor management for cooperative P2P video-on-demand streamingJung Ki So, Douglas S. Reeves. 1-10 [doi]
- DoS resilience of real time streaming protocolNihat Altiparmak, Ali Tekeoglu, Ali Saman Tosun. 1-8 [doi]
- ArA: Adaptive resource allocation for cloud computing environments under bursty workloadsJianzhe Tai, Juemin Zhang, Jun Li, Waleed Meleis, Ningfang Mi. 1-8 [doi]
- Macropower: A coarse-grain power profiling framework for energy-efficient cloud computingZiming Zhang, Song Fu. 1-8 [doi]
- GNAED: A data mining framework for network-wide abnormal event detection in backbone networksYingjie Zhou, Guangmin Hu. 1-2 [doi]
- Performance modelling of energy efficient wireless nodesAgnieszka Lezanska, Muhammad Faisal Hayat. 1-7 [doi]
- The cost of location privacy in locator/identifier-split architecturesOliver Hanka. 1-6 [doi]
- Multi-rate adaptation with interference and congestion awarenessDuy Nguyen, Jose Joaquin Garcia-Luna-Aceves, Cédric Westphal. 1-8 [doi]
- Energy modeling and optimization through joint packet size analysis of BSN and WiFi networksYantao Li, Xin Qi, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng. 1-8 [doi]
- Non-interactive OS fingerprinting through memory de-duplication technique in virtual machinesRodney Owens, Weichao Wang. 1-8 [doi]
- A SOA-based framework for cross-layer QoS adaptation in next generation networksGordana Gardasevic, Dejan Stjepanovic, Aleksandar Damljanovic, Dejan Cvijanovic. 1-2 [doi]
- Minimum latency scheduling for Multi-Regional Query in Wireless Sensor NetworksMingyuan Yan, Jing He, Shouling Ji, Yingshu Li. 1-8 [doi]
- An energy efficient and integrity-preserving aggregation protocol in wireless sensor networksLiehuang Zhu, Meng Li. 1-6 [doi]
- A subscription overlay network for large-scale and cost-efficient any source multicastPatricio Galdames, Qinghua Zheng, Ying Cai. 1-8 [doi]
- Fuzzy-based adaptive cross layer routing protocol for mobile ad hoc networksCherine Fathy, Mahmoud T. El-Hadidi, Mohamad Abou El-Nasr. 1-10 [doi]
- Dynamic data allocation with replication in distributed systemsShahin Kamali, Pedram Ghodsnia, Khuzaima Daudjee. 1-8 [doi]
- Power and energy consumption analysis on intel SCC many-core systemPollawat Thanarungroj, Chen Liu. 1-2 [doi]
- Joint routing, scheduling and channel assignment in multi-power multi-radio wireless sensor networksJinbao Li, Xiaohang Guo, Longjiang Guo. 1-8 [doi]
- Making eclipse attacks computationally infeasible in large-scale DHTsRen Zhang, Jianyu Zhang, Yu Chen, Nanhao Qin, Bingshuang Liu, Yuan Zhang. 1-8 [doi]
- Resource-misuse attack detection in delay-tolerant networksVivek Natarajan, Yi Yang, Sencun Zhu. 1-8 [doi]