Abstract is missing.
- An Energy-efficient Broadcast Control Protocol for Wireless Sensor NetworksBin Zeng 0002, Lu Yao, YongQian He. 3-8 [doi]
- A Data Transmission Mechanism for Survivable Sensor NetworksRuiping Ma, Liudong Xing, Tongdan Jin, Tailiang Song. 9-15 [doi]
- Preserving Relay Connectivity and Coverage in Heterogeneous Wireless Sensor NetworksJun Wen, Jie Jiang, Guofu Wu, Dongsong Ban, Wenhua Dou. 16-23 [doi]
- TinyBee: Mobile-Agent-Based Data Gathering System in Wireless Sensor NetworksKaoru Ota, Mianxiong Dong, Xiaolin Li. 24-31 [doi]
- A Performance Isolation Algorithm for Shared Virtualization Storage SystemJian Ke, Xudong Zhu, Wenwu Na, Junwei Zhang, Xiaoming Han, Jiangang Zhang, Lu Xu. 35-42 [doi]
- Virtual Disk Image Reclamation for Software Updates in Virtual Machine EnvironmentsBin Chen, Nong Xiao, Zhiping Cai, Fuyong Chu, Zhiying Wang. 43-50 [doi]
- Performance and Consistency Improvements of Hash Tree Based Disk Storage ProtectionFangyong Hou, Dawu Gu, Nong Xiao, Fang Liu, Hongjun He. 51-56 [doi]
- Data Currency in Replicated Distributed Storage SystemBingheng Yan, Depei Qian, Yuanqiang Huang. 57-63 [doi]
- Dynamic Grid Resource Scheduling Model Using Learning AgentBin Zeng 0002, Jun Wei 0004, Haiqin Liu. 67-73 [doi]
- Evaluating the Effect of Huge Page on Large Scale ApplicationsPanyong Zhang, Bo Li, Zhigang Huo, Dan Meng. 74-81 [doi]
- Group-by Query Process in Middleware of Large Scale Data Intensive SystemsHuaiming Song, Mingyuan An, Yang Wang 0011, Weiping Wang 0005, Ninghui Sun. 82-89 [doi]
- Virtual Machine Scalability on Multi-Core Processors Based Servers for Cloud Computing WorkloadsMuhammad Hasan Jamal, Abdul Qadeer, Waqar Mahmood, Abdul Waheed, Jianxun Jason Ding. 90-97 [doi]
- An HTTP Extension for Secure Transfer of Confidential DataMasaru Takesue. 101-108 [doi]
- An Aggregation-Based Raw Reputation Generation ApproachJianzhong Zhang 0003, Tianyan Zhang, Xiaofeng Lan, Jingdong Xu. 109-113 [doi]
- Reliable Lightpath Routing in Optical Mesh Networks under Multiple Link FailuresShengli Yuan. 114-120 [doi]
- Community-base Fault Diagnosis Using Incremental Belief RevisionYongning Tang, Guang Cheng, Zhiwei Xu, Ehab Al-Shaer. 121-128 [doi]
- Reconstruction of Worm Propagation Path by CausalityWei Shi, Qiang Li, Jian Kang, Dong Guo. 129-132 [doi]
- Context-Aware Routing for Peer-to-Peer Network on MANETsNadir Shah, Depei Qian. 135-139 [doi]
- A Teletraffic Perspective on Relay-Node Selection Strategy in VoP2P SystemWen-Kang Jia, Yaw-Chung Chen. 140-147 [doi]
- Analysis of Internet Specific Area Topology PropertiesZhenhan Wei, Ming Chen, Honghua Zhao. 148-155 [doi]
- Probabilistic QoS Guarantees, Downlink and Uplink Scheduling Studies in a Bluetooth PiconetKarima Maâlaoui, Leïla Azouz Saïdane. 156-163 [doi]
- A Comprehensive Evaluation of Routing Protocols for Ordinary and Large-Scale Wireless MANETsHossein Ashtiani, Mohsen Nikpour, Hamed Moradipour. 167-170 [doi]
- Network Access Control Mechanism Based on Locator/Identifier SplitRui Tu, Jinshu Su, Feng Chen. 171-174 [doi]
- Network of Multi-Agent Traffic ControllersOngard Sirisaengtaksin, Danil Safin. 175-179 [doi]
- Application of Residuation Theory in Network CalculusBaohua Fan, Heying Zhang, Wenhua Dou. 180-183 [doi]
- Clustering and Constraints for Real-time MulticastWei Cheng, Shi Cheng, Chanle Wu, Jun Yue, Gang Ye, Lian He. 184-187 [doi]
- A Case for a Packet Management in a Network TerminalYul Chu, Yan Bai, Amit Uppal, Jae Sok-Son. 188-191 [doi]
- A Packet-Based Anomaly Detection Model for Inter-domain RoutingHuayang Cao, Miao Wang, Xiaoqiang Wang, Peidong Zhu. 192-195 [doi]
- Distributed k-Coverage Verification Algorithm Based on Localized Distance Information in WSNsXia Zhang, Cheng Wang. 196-199 [doi]
- Formal Specification and Analysis of Intelligent Network Management System by Using Colored Petri NetFeng Yu, Junzhou Luo, Wei Li, La-Lin Jiang. 200-203 [doi]
- Unattended Remote Attestation Delegation for Grid ComputingGe Cheng. 204-207 [doi]
- Feedback-Based Energy-aware Scheduling Algorithm for Hard Real-time TasksDong-song Zhang, Shiyao Jin, Tong Wu, Hua-wei Li. 211-214 [doi]
- An Enhanced HyperTransport Controller with Cache Coherence Support for Multiple-CMPHuandong Wang, Dan Tang, Xiang Gao, Yunji Chen. 215-218 [doi]
- A Parallel Memory System Model for Multi-core ProcessorMengxiao Liu, Weixing Ji, Xing Pu, Jiaxin Li. 219-222 [doi]
- Efficiency-Aware QoS DRAM SchedulerMenghao Su, Xiang Gao, Yunji Chen, Qi Liu, Longbing Zhang. 223-226 [doi]
- Stress Distributions on the Slider with Different Accommodation CoefficientsJincai Chen, Gongye Zhou, Wei Sun, Libang Zhang. 227-230 [doi]
- A Scalability Analysis of the Symmetric Multiprocessing Architecture in Multi-Core SystemQingbo Yuan, Yungang Bao, Mingyu Chen, Ninghui Sun. 231-234 [doi]
- Fast Way-Prediction Instruction Cache for Energy Efficiency and High PerformanceCuiping Xu, Ge Zhang, Shouqing Hao. 235-238 [doi]
- An Approach of Scalable MPEG-4 Video Bitstreams with Network Coding for P2P Swarming SystemQuan Gu, Jingli Zhou, Kai Ouyang. 239-242 [doi]
- Implementation of G.729 Codec Based on Mediastreamer TechnologyLiting Hu, Xiangping Kong, Lianfen Huang, Hezhi Lin, Jianan Lin, Yan Yao, Xueyuan Jiang. 243-246 [doi]
- HMF: High-available Message-passing Framework for Cluster File SystemDong Yang, Zhuan Chen, Rongfeng Tang, Jin Xiong, Dan Meng. 249-252 [doi]
- VSD: A Framework of Stackable Virtual Snapshot DeviceWenwu Na, Xudong Zhu, Jian Ke, Jin-ping Xu, Junwei Zhang, Qingzhong Bu, Lu Xu. 253-256 [doi]
- Enhancing the Scalability of Blue Whale Cluster File System in Video-editing EnvironmentChengxiang Si, Xiaoxuan Meng, Junwei Zhang, Lu Xu. 257-260 [doi]
- TS-A: A Hierarchy Extended Cellular Automata Model for Complex Networking Storage SystemJincai Chen, Lanlan Yuan, Gongye Zhou. 261-264 [doi]
- Change State Capture in Service Aware StorageZhaobin Liu, HuiHui Zhang, Wenyu Qu, Tianquan Li. 265-268 [doi]
- BCD: To Achieve the Theoretical Optimum of Spatial Locality Based Cache Replacement AlgorithmXudong Zhu, Jian Ke, Lu Xu. 269-272 [doi]
- Research of P2P Routing Security Based on Positive Detection MechanismChuiwei Lu. 273-276 [doi]
- Transmission Scheduling in Data-Driven Peer-to-Peer Streaming towards Optimal ThroughputJiqing Wu, Yuxing Peng, Feng Liu. 277-280 [doi]
- A Global Trust Model of P2P Network Based on Distance-Weighted RecommendationXueming Li, Jianke Wang. 281-284 [doi]
- 3DNBS: A Data De-duplication Disk-Based Network Backup SystemTianming Yang, Dan Feng, Jingning Liu, Yaping Wan, Zhongying Niu, Yuchang Ke. 287-294 [doi]
- A Storage Slab Allocator for Disk Storage Management in File SystemJunwei Zhang, Jingliang Zhang, Xiaoming Han, Lu Xu. 295-302 [doi]
- Early Experiences with Write-Write Design of NFS over RDMABo Li, Panyong Zhang, Zhigang Huo, Dan Meng. 303-308 [doi]
- FAXtrac: Fast Extraction of Disk LayoutXiaowen Chu, Kai Ouyang, Xiaolei Chang. 309-314 [doi]
- MHPR: Multi-head Parallelism and Redundancy Disk ModelYang Hu, Dan Feng, Shu-Ping Zhang, Jingning Liu. 315-322 [doi]
- Simulation Analysis of Probabilistic Timing Covert ChannelsYunchuan Guo, Lihua Yin, Yuan Zhou, Chao Li, Li Guo. 325-332 [doi]
- Synchronizing Parallel Data Streams via Cross-Stream CodingShaofeng Liu, Jürgen P. Schulze, Thomas A. DeFanti. 333-340 [doi]
- A Trace Measurement and Analysis System for the Multi-Links CERNET BackboneGuang Cheng, Yongning Tang, Jiexin Jiang, Wei Ding 0001. 341-346 [doi]
- Reducing Communication Overhead in Threshold Monitoring with Arithmetic AggregationYuanqiang Huang, Yongjian Wang, Yinan Ren, Bingheng Yan, Zhongzhi Luan, Depei Qian. 347-353 [doi]
- The Design of Asynchronous Microprocessor Based on Optimized NCL_X Design-FlowGang Jin, Lei Wang, Zhiying Wang. 357-364 [doi]
- Efficient Physical Design Methodology for Reducing Test Power Dissipation of Scan-Based DesignsJun Xu, Xiangku Li. 365-370 [doi]
- Hardware/Software Co-Simulation for Last Level Cache ExplorationTao Wang, Qigang Wang, Dong Liu, Michael Liao, Kevin Wang, Lu Cao, Li Zhao, Ravi R. Iyer, Ramesh Illikkal, John Du, Liang Wang. 371-378 [doi]
- Implementation of OpenVG Path and Paint Algorithms on Synchronous Data Triggered Architecture with OptimizationSheng Ma, Libo Huang, Zhiying Wang, Kui Dai. 379-385 [doi]
- Architecture Level Energy Modeling and Optimization for Multi-Ported Giga-Hz Physical Register FileGe Zhang, Xu Yang, YiWei Zhang. 386-391 [doi]
- TH-CDP: An Efficient Block Level Continuous Data Protection SystemYonghong Sheng, Dongsheng Wang, Jinyang He, Dapeng Ju. 395-404 [doi]
- Design and Implementation of Self-securing DiskMengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang, Tao Cheng. 405-412 [doi]
- Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin. 413-420 [doi]
- Identification and Authentication in Large-Scale Storage SystemsZhongying Niu, Ke Zhou, Hong Jiang, Tianming Yang, Wei Yan. 421-427 [doi]
- Update Maps - A New Abstraction for High-Throughput Batch ProcessingSteffen Viken Valvåg, Dag Johansen. 431-438 [doi]
- Gemini NI: An Integration of Two Network InterfacesKai Wang, Xiaomin Li, Xuejun An, Ninghui Sun. 439-446 [doi]
- An Array Computer for Low-and Intermediate-Level Image ProcessingKaikun Dong, Yang Liu, Li Guo, Mingzeng Hu. 447-451 [doi]
- Fault-Tolerant Online Backup Service: Formal Modeling and ReasoningHua Wang, Ke Zhou, Ling Yuan. 452-460 [doi]