Abstract is missing.
- A centralized latency optimization solution for tree-based application layer multicastXinchang Zhang, Weidong Gu, Lu Wang, Xiaomin Zhu, Meng Sun. 1-2 [doi]
- Delay-impact-based local deadline assignment for online scheduling of distributed soft real-time applicationsMiao Song 0004, Shuhui Li, Shangping Ren, Gang Quan. 1-8 [doi]
- An encryption and probability based access control model for named data networkingTao Chen, Kai Lei, Kuai Xu. 1-8 [doi]
- RainbowRate: MIMO rate adaptation in 802.11n WiLD linksZenghua Zhao, Fucheng Zhang, Shaoping Guo, Xiang-Yang Li, Junze Han. 1-8 [doi]
- Secure data provenance compression using arithmetic coding in wireless sensor networksSyed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino. 1-10 [doi]
- Optimal phase control for joint transmission and reception with beamformingSeonghyun Kim, Hojae Lee, Beom Kwon, Inwoong Lee, Sang-Hoon Lee. 1-2 [doi]
- Application-aware video-sharing services via provenance in cloud storageJinjun Liu, Dan Feng, Yu Hua, Bin Peng, Pengfei Zuo. 1-8 [doi]
- A new multi-objective microgrid restoration via semidefinite programmingLiang Zhao, Wen-Zhan Song. 1-8 [doi]
- A novel method to estimate performance for a high performance computation workloadJoseph Issa. 1-2 [doi]
- JLMC: A clustering method based on Jordan-Form of Laplacian-MatrixJianwei Niu, Jinyang Fan, Ivan Stojmenovic. 1-8 [doi]
- EPPI: An E-cent-based privacy-preserving incentive mechanism for participatory sensing systemsXiaoguang Niu, Meng Li, Qianyuan Chen, Qingqing Cao, Houzhen Wang. 1-8 [doi]
- Session-based access control in information-centric networks: Design and analysesYu Wang, Mingwei Xu, Zhen Feng, Qing Li, Qi Li. 1-8 [doi]
- Analyzing I/O patterns for the design of energy-efficient image serversJaemyoun Lee, Kyungtae Kang, Chang Song. 1-8 [doi]
- Hot topic analysis and content mining in social mediaQian Yu, WeiTao Weng, Kai Zhang, Kai Lei, Kuai Xu. 1-8 [doi]
- Maximizing system's total accrued utility value for parallel and time-sensitive applicationsShuhui Li, Miao Song 0004, Peng-Jun Wan, Shangping Ren. 1-8 [doi]
- An extended contention period protocol for MIMO wireless networksKittipong Warasup, Masanori Hamamura. 1-2 [doi]
- Replica placement in content delivery networks with stochastic demands and M/M/1 serversChenkai Yang, Liusheng Huang, Bing Leng, Hongli Xu, Xinglong Wang. 1-8 [doi]
- Virtual structures and heterogeneous nodes in dependency graphs for detecting metamorphic malwareGilbert Breves Martins, Rosiane de Freitas, Eduardo Souto. 1-8 [doi]
- A hybrid erasure-coded ECC scheme to improve performance and reliability of solid state drivesPradeep Subedi, Ping Huang, Xubin He, Ming Zhang, Jizhong Han. 1-8 [doi]
- Low-latency last-level cache structure based on grouped cores in Chip Multi-ProcessorJinbo Xu, Weixia Xu, Kefei Wang, Zhengbin Pang. 1-2 [doi]
- Smoothly truncated levy walks: Toward a realistic mobility modelLijuan Cao, Michael Grabchak. 1-8 [doi]
- Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systemsDanda B. Rawat, Swetha Reddy Lenkala, Nimish Sharma, Sachin Shetty. 1-2 [doi]
- Data analytics workloads: Characterization and similarity analysisReena Panda, Lizy Kurian John. 1-9 [doi]
- File-system-level flash caching for improving application launch time on logical hybrid disksChanghee Han, Junhee Ryu, Dongeun Lee, Jaemyoun Lee, Kyungtae Kang, Heonshik Shin. 1-2 [doi]
- A novel thermal-constrained energy-aware partitioning algorithm for heterogeneous multiprocessor real-time systemsBjörn Barrefors, Ying Lu, Shivashis Saha, Jitender S. Deogun. 1-8 [doi]
- Empirical capacity modeling and evaluation of delay tolerant network routing protocolsJeremiah D. Deng. 1-2 [doi]
- Online combinatorial double auction for mobile cloud computing marketsKe Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen. 1-8 [doi]
- Enhancing the I/O system for virtual machines using high performance SSDsMyoungwon Oh, Hyeonsang Eom, Heon Young Yeom. 1-8 [doi]
- Achieving transparent coexistence in a multi-hop secondary network through distributed computationXu Yuan, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Scott F. Midkiff, Sastry Kompella. 1-7 [doi]
- Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose modelMeng Shen, Lixin Gao, Ke Xu, Liehuang Zhu. 1-8 [doi]
- Proximity-driven social interactions and their impact on the throughput scaling of wireless networksAli Dabirmoghaddam, J. J. Garcia-Luna-Aceves. 1-10 [doi]
- Combinatorial JPT based on orthogonal beamforming for two-cell cooperationHojae Lee, Beom Kwon, Seonghyun Kim, Inwoong Lee, Sanghoon Lee. 1-2 [doi]
- GPU acceleration of finding LPRs in DNA sequence based on SUA indexShufang Du, Longjiang Guo, Chunyu Ai, Meirui Ren, Hao Qu, Jinbao Li. 1-8 [doi]
- An efficient time-stamping solution for long-term digital archivingMartín A. Gagliotti Vigil, Christian Weinert, Denise Demirel, Johannes Buchmann. 1-8 [doi]
- An efficient certificate revocation scheme for large-scale AMI networksMohamed M. E. A. Mahmoud, Kemal Akkaya, Khaled Rabieh, Samet Tonyali. 1-8 [doi]
- Design and analysis of fault tolerance mechanism for sparrowWenzhuo Li, Chuang Lin. 1-7 [doi]
- Load scheduling in smart buildings with bidirectional energy tradingAbdullah Al Hasib, Nikita Nikitin, Lasse Natvig. 1-2 [doi]
- Characterizing the workload dynamics of a mobile phone network during the FIFA 2014 World CupHayala N. Curto, Artur Ziviani, Josemar A. Caetano, Carlos Henrique S. Malab, Jussara M. Almeida, Humberto T. Marques Neto. 1-2 [doi]
- Embedded system based on microcontroller for generating I-V curves of electronic devicesMario J. Illera, Sergio B. Sepulveda. 1-2 [doi]
- Automated estimation of power consumption for rapid system level designYasaman Samei Syahkal, Rainer Dömer. 1-8 [doi]
- Continuous user identification via touch and movement behavioral biometricsCheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, Yu Wang. 1-8 [doi]
- A flexible and scalable high-performance OpenFlow switch on heterogeneous SoC platformsShijie Zhou, Weirong Jiang, Viktor K. Prasanna. 1-8 [doi]
- Resisting label-neighborhood attacks in outsourced social networksYang Wang, Fudong Qiu, Fan Wu, Guihai Chen. 1-8 [doi]
- Blackbox security evaluation of chromecast network communicationsAli Tekeoglu, Ali Saman Tosun. 1-2 [doi]
- A light-weight authentication scheme based on message digest and location for mobile cloud computingSaurabh Dey, Srinivas Sampalli, Qiang Ye. 1-2 [doi]
- A novel algorithm for sparse FFT pruning and its applications to OFDMA technologyShakeel S. Abdulla, Haewoon Nam, Jacob A. Abraham. 1-7 [doi]
- POLA: A privacy-preserving protocol for location-based real-time advertisingYiming Pang, Yichen Chen, Peiyuan Liu, Fudong Qiu, Fan Wu, Guihai Chen. 1-8 [doi]
- Accurate statistical performance modeling and validation of out-of-order processors using Monte Carlo methodsWaleed Alkohlani, Jeanine Cook, Jonathan Cook. 1-10 [doi]
- Effects of quality of service schemes on the capacity and dimensioning of LTE networksFatima Furqan, Doan B. Hoang, Iain B. Collings. 1-8 [doi]
- A portable flood detection system using heterogeneous sensor networksYanwei Wu, Yun Wang. 1-2 [doi]
- A promising CUDA-accelerated vehicular area network simulator using NS-3Chok M. Yip, Abu Asaduzzaman. 1-2 [doi]
- SLA aware cost efficient virtual machines placement in cloud computingJiangtao Zhang, Zhixiang He, Hejiao Huang, Xuan Wang, Chonglin Gu, Lingmin Zhang. 1-8 [doi]
- Performance enhancement in shared-memory multiprocessors using dynamically classified sharing informationNilufar Ferdous, Byeong Kil Lee, Eugene John. 1-8 [doi]
- The automatic configuration of transmit power in LTE networks based on throughput estimationMariusz Slabicki, Krzysztof Grochla. 1-2 [doi]
- Randomized routing in multi-party internet video conferencingYousuk Seung, Quan Leng, Wei Dong, Lili Qiu, Yin Zhang. 1-8 [doi]
- Shaping HTTP adaptive streams using receive window tuning method in home gatewayChiheb Ben Ameur, Emmanuel Mory, Bernard Cousin. 1-2 [doi]
- Analysis of cache tuner architectural layouts for multicore embedded systemsTosiron Adegbija, Ann Gordon-Ross, Marisha Rawlins. 1-8 [doi]
- Measuring path divergence in the InternetNazim Ahmed, Kamil Saraç. 1-8 [doi]
- ZigBee vs WiFi: Understanding issues and measuring performances of their coexistenceZenghua Zhao, Xuanxuan Wu, Xin Zhang, Jing Zhao, Xiang-Yang Li. 1-8 [doi]
- Marbor: A novel large-scale graph data storage and processing frameworkWei Zhou, Yun Gao, Jizhong Han, Zhiyong Xu. 1-2 [doi]
- Provenance logic: Enabling multi-event based trust in mobile sensingXinlei Wang, Hao Fu, Chao Xu, Prasant Mohapatra. 1-8 [doi]
- Distributed compressive data gathering in low duty cycled wireless sensor networksYimao Wang, Yanmin Zhu, Ruobing Jiang, Juan Li. 1-8 [doi]
- ERUPT: Energy-efficient trustworthy provenance trees for wireless sensor networksS. M. Iftekharul Alam, David K. Y. Yau, Sonia Fahmy. 1-10 [doi]
- Performance and energy evaluation of RESTful web services in Raspberry PiLuiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura, Heitor De Freitas Vieira, Rafael Mira De Oliveira Libardi, Edvard Martins de Oliveira, Júlio Cezar Estrella, Stephan Reiff-Marganiec. 1-9 [doi]
- Energy efficient distributed grouping and scaling for real-time data compression in sensor networksTommy Szalapski, Sanjay Kumar Madria. 1-9 [doi]
- Test oriented formal model of SDN applicationsJiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, YaHui Li. 1-2 [doi]
- A heuristic for logical data buffer allocation in multicore platformsBenjamin Ries, Walter Unger, Maximilian Odendahl, Rainer Leupers. 1-2 [doi]
- An efficient spin-lock based multi-core resource sharing protocolMartin Alfranseder, Michael Deubzer, Benjamin Justus, Jürgen Mottok, Christian Siemers. 1-7 [doi]
- Challenges and opportunities for analysis based research in big dataNick G. Duffield, Jie Wu. 1 [doi]
- A domain-specific language to facilitate software defined radio parallel executable patterns deployment on heterogeneous architecturesLerato J. Mohapi, Simon Winberg, Michael Inggs. 1-8 [doi]
- Network agile preference-based prefetching for mobile devicesJunze Han, Xiang-Yang Li, Taeho Jung, JuMin Zhao, Zenghua Zhao. 1-8 [doi]
- §Tiantian Ren, Xinli Huang. 1-2 [doi]
- A hybrid link protection scheme for link-state routing networksHaijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao. 1-2 [doi]
- Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devicesHengky Susanto, Bhanu Kaushik, Benyuan Liu, Byung-Guk Kim. 1-8 [doi]
- A combinatorial double auction mechanism for cloud resource group-buyingZehao Sun, Zhenyu Zhu, Long Chen, Hongli Xu, Liusheng Huang. 1-8 [doi]
- Efficient and enhanced broadcast authentication protocols based on multilevel μTESLAXiang Li, Na Ruan, Fan Wu, Jie Li, Mengyuan Li. 1-8 [doi]
- Virtual data center allocation with dynamic clustering in cloudsLi Shi, Dimitrios Katramatos, Dantong Yu. 1-10 [doi]
- Let more nodes have a second choiceHaijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao. 1-2 [doi]
- Sensitivity analysis of availability of video streaming service in cloud computingRosangela Melo, Maria Clara Bezerra, Jamilson Dantas, Rubens Romero Martins Matos, Ivanildo Melo Filho, Paulo Romero Martins Maciel. 1-2 [doi]
- ReMA: Real-time 3D video streaming system for mobile devicesSuk-Kyu Lee, Hyunsoon Kim, Woonghee Lee, Hwantae Kim, Jongtack Jung, Hwangnam Kim. 1-8 [doi]
- QGrid: Q-learning based routing protocol for vehicular ad hoc networksRuiling Li, Fan Li, Xin Li, Yu Wang. 1-8 [doi]
- Joint power optimization through VM placement and flow scheduling in data centersDawei Li, Jie Wu, Zhiyong Liu, Fa Zhang. 1-8 [doi]
- Evaluation of a platform for the provisioning of community-contributed web servicesDaniel Vijayakumar, Qusay H. Mahmoud. 1-8 [doi]
- Patterns and modeling of group growth in online social networksJianwei Niu, Shaluo Huang, Milica Stojmenovic. 1-8 [doi]
- Prediction and correction of traffic matrix in an IP backbone networkWei Liu, Ao Hong, Liang Ou, Wenchao Ding, Ge Zhang. 1-9 [doi]
- Design of antenna arrays for isoflux radiation in satellite systemsMiguel Ibarra, Ángel G. Andrade, Marco A. Panduro, Aldo Mendez. 1-2 [doi]
- WCET analysis of static NUCA cachesYiqiang Ding, Wei Zhang. 1-6 [doi]
- Parallelization of tree-to-TLV serializationMakoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka, Hironori Kasahara. 1-8 [doi]
- Worst-case performance guaranteed data cacheYijie Huangfu, Wei Zhang. 1-2 [doi]
- TMODF: Trajectory-based multi-objective optimal data forwarding in vehicular networksMaocai Fu, Xin Li, Fan Li, Xinyu Guo, Zhili Wu. 1-8 [doi]
- Reducing (m, k)-missing rate for overloaded real-time systemsAlemayehu Mengste, Linwei Niu. 1-2 [doi]
- Financial fraud detection using social media crowdsourcingTimothy Matti, Yuntao Zhu, Kuai Xu. 1-2 [doi]
- A knowledge management approach for testing open source software systemsTamer Abdou, Pankaj Kamthan. 1-2 [doi]
- Thread mapping using system-level throughput prediction model for shared memory multicoresReshmi Mitra, Bharat S. Joshi, Ryan S. Adams. 1-2 [doi]