Abstract is missing.
- Improving performance and anonymity in the Tor networkAndriy Panchenko, Fabian Lanze, Thomas Engel. 1-10 [doi]
- A double-edged sword: Implications of crowdsourcing for the future of web securityBen Zhao, Taieb Znati. 1-2 [doi]
- Temporal characterization of SPEC CPU2006 workloads: Analysis and synthesisQiang Zou, Jianhui Yue, Bruce Segee, Yifeng Zhu. 11-20 [doi]
- Performance-sensitivity and performance-similarity based workload reductionJie Luo, Kathlene Morales, Byeong Kil Lee, Eugene John, Young Kyu Choi. 21-30 [doi]
- Thermal modeling and analysis of storage systemsXunfei Jiang, Mohammed I. Alghamdi, Ji Zhang, Maen M. Al Assaf, Xiaojun Ruan, Tausif Muzaffar, Xiao Qin. 31-40 [doi]
- Improving schedulability and energy performance for weakly hard real-time systemsLinwei Niu, Jia Xu. 41-50 [doi]
- An adaptive power management framework for autonomic resource configuration in cloud computing infrastructuresZiming Zhang, Qiang Guan, Song Fu. 51-60 [doi]
- CloudCast: Cloud computing for short-term mobile weather forecastsDilip Kumar Krishnappa, David E. Irwin, Eric Lyons, Michael Zink. 61-70 [doi]
- AFD: Adaptive failure detection system for cloud computing infrastructuresHusanbir S. Pannu, Jianguo Liu, Qiang Guan, Song Fu. 71-80 [doi]
- ORCA: An offloading framework for I/O-intensive applications on clustersJi Zhang, Xunfei Jiang, Yun Tian, Xiao Qin, Mohammed I. Alghamdi, Maen M. Al Assaf, Meikang Qiu. 81-90 [doi]
- MODESA: An optimized multichannel slot assignment for raw data convergecast in wireless sensor networksRidha Soua, Pascale Minet, Erwan Livolant. 91-100 [doi]
- An arbitrary mobility model of Mini-Sinks using controlled data collection for reducing congestion appearance in wireless sensor networksDavid Fotue, Houda Labiod, Thomas Engel. 101-109 [doi]
- Fast sink placement for Gossip-based Wireless Sensor NetworksMilos Blagojevic, Marc Geilen, Twan Basten, Teun Hendriks. 110-119 [doi]
- A Desktop Grid enabled parallel Barnes-Hut algorithmHannes Hannak, Wolfgang Blochinger, Sven Trieflinger. 120-129 [doi]
- Improved deduplication through parallel BinningZhike Zhang, Deepavali Bhagwat, Witold Litwin, Darrell D. E. Long, S. J. Thomas Schwarz. 130-141 [doi]
- CAST: A page-level FTL with compact address mapping and parallel data blocksZhiyong Xu, Ruixuan Li, Cheng-Zhong Xu. 142-151 [doi]
- A system analysis of reputation-base defences against pollution attacks in P2P streamingMd. Tauhiduzzaman, Mea Wang. 152-161 [doi]
- HAS: Hidden anti-theft system based on wireless sensor networksLongjiang Guo, Jinsheng Duan, Jinbao Li, Lei Yu, Haiying Shen. 162-170 [doi]
- HADEGA: A novel MPLS-based mitigation solution to handle network attacksNabil Hachem, Hervé Debar, Joaquín García-Alfaro. 171-180 [doi]
- Exploring the optimal strategy for large-scale data movement in high-performance networksPatrick Brown, Mengxia Michelle Zhu, Qishi Wu, Daqing Yun, Jason Zurawski. 181-182 [doi]
- PHY and MAC layer design of Hybrid Spread Spectrum based smart meter networkShravan Garlapati, Haris Ioannis Volos, Teja Kuruganti, R. Michael Buehrer, Jeffrey H. Reed. 183-184 [doi]
- Complex networks clustering algorithm based on the core influence of the nodesChao Tong, Jianwei Niu, Bin Dai, Jing Peng, Jinyang Fan. 185-186 [doi]
- Static micro-scheduling: Resource contention relief in multithreaded programsYuanfang Chen, Xiaoming Li. 187-188 [doi]
- Co-efficient vector based distributed quasi-orthogonal codes in cooperative networksGbenga Owojaiye, Yichuang Sun. 189-190 [doi]
- Hierarchical MATE's approach for dynamic performance tuning of large-scale parallel applicationsAndrea Martínez, Anna Sikora, Eduardo César, Joan Sorribes. 191-192 [doi]
- Network state aware virtual network parallel embeddingXiaolin Chang, Bin Wang, Jiqiang Liu. 193-194 [doi]
- A methodology for implementation and integration Two-Factor Authentication into VPNPham Ngoc Thanh, Keecheon Kim. 195-196 [doi]
- Sensor allocation to multiple applications in shared wireless sensor networksNavdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy. 197-198 [doi]
- Fixed Segmented LRU cache replacement scheme with selective cachingKathlene Morales, Byeong Kil Lee. 199-200 [doi]
- Make systematic conformance testing for BitTorrent protocol feasible: A CP-nets model based testing approachJing Liu, Haibo Wu. 201-202 [doi]
- AES decryption using warp-synchronous programmingSaddam Quirem, Byeong Kil Lee. 203-204 [doi]
- Firefly-inspired synchronization for energy-efficient distance estimation in mobile ad-hoc networksSabrina Merkel, Christian Werner Becker, Hartmut Schmeck. 205-214 [doi]
- A wireless system for reducing response time in Urban Search & RescueHarshavardhan Chenji, Wei Zhang 0041, Myounggyu Won, Radu Stoleru, Clint Arnett. 215-224 [doi]
- CAIRN: Creating Anchors for Localization in Realistic NetworksKerri Stone, Tracy Camp. 225-235 [doi]
- Graph theoretic expansion of Borei Cayley Graphs with an optimal and distributed routing algorithmDongsoo Kim, Eric C. Noel, K. Wendy Tang. 236-245 [doi]
- HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networksGuangping Xu, Sheng Lin, Gang Wang, Xiaoguang Liu, Kai Shi, Hua Zhang. 246-255 [doi]
- A cost-effective scheduling algorithm for scientific workflows in cloudsMengxia Michelle Zhu, Qishi Wu, Yang Zhao. 256-265 [doi]
- Improving write performance by enhancing internal parallelism of Solid State DrivesXiaojun Ruan, Ziliang Zong, Mohammed I. Alghamdi, Yun Tian, Xunfei Jiang, Xiao Qin. 266-274 [doi]
- Management of distributed resource allocations in multi-cluster environmentsEwnetu Bayuh Lakew, Francisco Hernández-Rodriguez, Lei Xu 0004, Erik Elmroth. 275-284 [doi]
- A genetic algorithm based approach to maximizing real-time system value under resource constraintsLi Wang 0011, Zheng Li, Miao Song 0004, Shangping Ren. 285-294 [doi]
- A taxonomy of Semi-FIFO policiesKirill Kogan, Alejandro López-Ortiz, Sergey I. Nikolenko, Alexander Sirotkin. 295-304 [doi]
- Evolution of disconnected components in social networks: Patterns and a generative modelJianwei Niu, Jing Peng, Chao Tong, Wanjiun Liao. 305-313 [doi]
- Effect of MRAI timers and routing policies on BGP convergence timesRajvir Gill, Ravinder Paul, Ljiljana Trajkovic. 314-323 [doi]
- Highly reliable two-dimensional RAID arrays for archival storageJehan-François Pâris, Thomas J. E. Schwarz, Ahmed Amer, Darrell D. E. Long. 324-331 [doi]
- Computing Nash equilibria in bimatrix games: GPU-based parallel support enumerationSafraz Rampersaud, Lena Mashayekhy, Daniel Grosu. 332-341 [doi]
- An efficient dynamic multiple-candidate motion vector approach for GPU-based hierarchical motion estimationDung Vu, Yang Yang, Laxmi N. Bhuyan. 342-351 [doi]
- Incentive based approach to find selfish nodes in Mobile P2P networksHemanth Meka, Sanjay Kumar Madria, Mark Linderman. 352-359 [doi]
- Bandwidth-aware peer selection for P2P live streaming systems under flash crowdsHaibo Wu, Jing Liu, Hai Jiang, Yi Sun, Jun Li, Zhongcheng Li. 360-367 [doi]
- Global workload characterization of a large scale satellite image distribution systemBrian Romoser, Ribel Fares, Peter Janovics, Xiaojun Ruan, Xiao Qin, Ziliang Zong. 368-375 [doi]
- Devising Secure Sockets Layer-based distributed systems: A performance-aware approachNorman Lim, Shikharesh Majumdar, Vineet Srivastava. 376-383 [doi]
- LBSs privacy preserving for continuous query based on semi-honest third partiesYong Wang, Jing Peng, Long-Ping He, Ting-ting Zhang, Hong-Zong Li. 384-391 [doi]
- rd Party Human AttackTe-En Wei, Albert B. Jeng, Hahn-Ming Lee. 392-399 [doi]
- Locating jamming attackers in malicious wireless sensor networksKaiqi Xiong, David J. Thuente. 400-407 [doi]
- Secure multipath routing for AMI network in Smart GridBinod Vaidya, Dimitrios Makrakis, Hussein Mouftah. 408-415 [doi]
- Parallelized benchmark-driven performance evaluation of SMPs and tiled multi-core architectures for embedded systemsArslan Munir, Ann Gordon-Ross, Sanjay Ranka. 416-423 [doi]
- Performance impact of virtual machine placement in a datacenterIndrani Paul, Sudhakar Yalamanchili, Lizy K. John. 424-431 [doi]
- Structured Message TransportShayan Pooya, Paul Lu, M. H. MacGregor. 432-439 [doi]
- PhoneCon: Voice-driven SmartPhone Controllable Wireless Sensor NetworksYanjun Yao, Lipeng Wan, Qing Cao, Rukun Mao. 440-447 [doi]
- Towards network convergence and traffic engineering optimizationDan Zhao, Hongjun Liu, Xiaofeng Hu, Chunqing Wu. 448-455 [doi]
- Channel impulse noise minimization using digital smear and desmear filterGrace Oletu, Predrag B. Rapajic, Kwashie Amartei Anang, Ruiheng Wu. 456-462 [doi]
- A path-transfer based multi-path reliable routing in wireless sensor networksJinbao Li, Li Zhang, Longjiang Guo, Liang Yao. 463-470 [doi]
- Quality-of-information modeling and adapting for delay-sensitive sensor network applicationsMini Mathew, Ning Weng, Lucas Vespa. 471-477 [doi]