Abstract is missing.
- McDisc: A Reliable Neighbor Discovery Protocol in Low Duty Cycle and Multi-channel Wireless NetworksMaotian Zhang, Lei Zhang, Panlong Yang, Yubo Yan. 1-7 [doi]
- E-HiLow: Extended Hierarchical Routing Protocol in 6LoWPAN Wireless Sensor NetworkLi Yue, Dongliang Xie, Jiatong Zhao, Jie Zhang. 8-12 [doi]
- An Energy Aware Protocol for Cyclic Monitoring Wireless Sensor NetworksIttipong Khemapech, Ishbel Duncan, Alan Miller. 13-22 [doi]
- A HW/SW Co-design of Execution Migration for Shared-ISA Heterogeneous Chip MultiprocessorsHongwei Liu, Bo Sang, Jing Huang, Ji Qiu, Xiang Gao. 23-30 [doi]
- Spontaneous Reload Cache: Mimicking a Larger Cache with Minimal Hardware RequirementLunkai Zhang, Mingzhe Zhang, Lingjun Fan, Da Wang, Paolo Ienne. 31-40 [doi]
- BFEPM: Best Fit Energy Prediction Modeling Based on CPU UtilizationXiao Zhang, Jian-Jun Lu, Xiao Qin. 41-49 [doi]
- Improve Effective Capacity and Lifetime of Solid State DrivesPing Huang, Guangping Wan, Ke Zhou, Miaoqing Huang, Chun-hua Li, Hua Wang. 50-59 [doi]
- A New Metadata Update Method for Fast Recovery of SSD CacheJing Yang, Qing Yang. 60-67 [doi]
- Performance Analysis of NAND Flash Based Cache for Network Storage SystemLin Han, Hao Huang, Changsheng Xie. 68-75 [doi]
- A Mechanism of Maintaining the Survivability of Streaming Media Service in Overlay NetworksBo Bai, Ji-hong Zhao, Hua Qu. 76-80 [doi]
- A Specific Scheme for Rate-Controlled Smooth Scheduling Based on Timeslot-IterationJi Li, Zheng Wan, Zhonghua Li, Naixue Xiong. 81-87 [doi]
- MCD: Overcoming the Data Download Bottleneck in Data CentersJürgen Kaiser, Dirk Meister, Viktor Gottfried, André Brinkmann. 88-97 [doi]
- A Congestion Control Algorithm for DatacentersZhengwei Zhao, Zhixiong Jiang, Chunyang Lu, Yushan Cai, Jingping Bi. 98-104 [doi]
- PEAM: Predictive Energy-Aware Management for Storage SystemsXunfei Jiang, Ji Zhang, Mohammed I. Alghamdi, Xiao Qin, Minghua Jiang. 105-114 [doi]
- DynaM: Dynamic Multiresolution Data Representation for Large-Scale Scientific AnalysisYuan Tian, Scott Klasky, Weikuan Yu, Bin Wang, Hasan Abbasi, Norbert Podhorszki, Ray W. Grout. 115-124 [doi]
- Comparisons of Memory Virtualization Solutions for Architectures with Software-Managed TLBsYunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang, Wenzhi Wang. 125-130 [doi]
- Chariot: A High Compatible Architecture to Improve Virtual Machine ReliabilityHao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Weifeng Gong, Xingjun Zhang. 131-140 [doi]
- An Evolvable Locator/ID Separation Internet Architecture (ELISIA)Haitao Zhang, Xing Li, CongXiao Bao. 141-150 [doi]
- Mining User Interests in Web Logs of an Online News Service Based on Memory ModelWei Wang, Dongyan Zhao, Haining Luo, Xin Wang. 151-155 [doi]
- High-Speed Multicast Scheduling for All-Optical Packet SwitchesZhiyang Guo, Yuanyuan Yang. 156-165 [doi]
- IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor NetworkPeipeng Liu, Jinqiao Shi, Lihong Wang, Xiao Wang, Qingfeng Tan. 166-172 [doi]
- REPAIR: A Reliable Partial-Redundancy-Based Router in NoCLei Xie, Kuizhi Mei, Yuhai Li. 173-177 [doi]
- Robustness Analysis of Mesh-Based Network-on-Chip Architecture under Flooding-Based Denial of Service AttacksDabin Fang, Huikai Li, Jun Han, Xiaoyang Zeng. 178-186 [doi]
- SPC: An Approach to Guarantee Performance in Cost Oriented Mapping Algorithm for NoC ArchitecturesQinghua Wu, Leibo Liu, Shouyi Yin, Yu Ren, Shaojun Wei. 187-190 [doi]
- The Prediction Mathematical Model for HO Performance in LTE NetworksXiaohui Zhao, Xinlong Luo, Tong Wu, Dengkun Xiao. 191-197 [doi]
- A Novel Method for Computing Encoding Delay and Bandwidth on Network Coding NodeYuxing Wu, Xingjun Zhang, Song Cen, Li Wang, Xiaoshe Dong. 198-204 [doi]
- Scheduling Algorithms for Handling Updates in Shingled Magnetic RecordingKalyana Sundaram Venkataraman, Tong Zhang 0002, Wenzhe Zhao, Hongbin Sun, Nanning Zheng. 205-214 [doi]
- A Vulnerability Optimization Method for Security-Critical Real-Time SystemsXia Zhang, Jinyu Zhan, Wei Jiang, Yue Ma. 215-221 [doi]
- An Optimized GP-GPU Warp Scheduling Algorithm for Sparse Matrix-Vector MultiplicationLifeng Liu, Meilin Liu, Chong-Jun Wang. 222-231 [doi]
- Multiple Channel Assignment and Recovery Algorithm for MR-MC NetworkPing Ren. 232-236 [doi]
- Defence against Botnets: A Formal Definition and a General FrameworkLei Cao, Xiaofeng Qiu. 237-241 [doi]
- A New Interest-Sensitive and Network-Sensitive Method for User RecommendationYanmin Shang, Peng Zhang, Yanan Cao. 242-246 [doi]
- Research on English Learning Strategy Usage in Web-Based and Conventional EnvironmentsZhi-Wen. 247-251 [doi]
- Luminance and Chrominance Parallelization of H.264/AVC Decoding on a Multi-core ProcessorXiaofu Meng, Xiang Gao, Qian Yu, Shuangshuang Zhang, Xiaochun Zhang, Jing Huang. 252-256 [doi]
- Parallel Algorithm for Approximate String Matching with K DifferencesLongjiang Guo, Shufang Du, Meirui Ren, Yu Liu, Jinbao Li, Jing He, Ning Tian, Keqin Li. 257-261 [doi]
- Analysis of Sparse Matrix-Vector Multiplication Using Iterative Method in CUDARashid Hassani, Amirreza Fazely, Riaz-Ul-Ahsan Choudhury, Peter Luksch. 262-266 [doi]
- Design of a Quadruple Precision Floating-Point Fused Multiply-Add Unit Based on 4-Way SIMD DeviceHe Jun, Wang Biao, Zhu Ying. 267-271 [doi]
- Optimize Multidimensional Arrays Queries with Heterogeneous Replica MethodMeiqi Zhu, Xiaomeng Huang, Songbin Liu, Haohuan Fu, Qiming Fang, Guangwen Yang. 272-276 [doi]
- An FPGA-based Random Functional Verification Method for CacheTiejun Li, Jianmin Zhang, Sikun Li. 277-281 [doi]
- Evaluating Memory Compression and DeduplicationYuhui Deng, Liangshan Song, Xinyu Huang. 282-286 [doi]
- One Wide-Sense Circuit Tree per Traffic Class Based Inter-domain MulticastYue Chen, Chaoling Li, Kaixiang Huang, Xiaobo Zhang. 287-291 [doi]
- A Pre-buffer Mechanism in Multi-channel P2P Live StreamingPan Wang, Hao Huang, Changsheng Xie. 292-296 [doi]
- Battery-Aware MAC Analytical Modeling for Extending Lifetime of Low Duty-Cycled Wireless Sensor NetworkYulin Li, Shouyi Yin, Leibo Liu, Shaojun Wei, Dong Wang. 297-301 [doi]
- A Variant-Hop Algorithm in Forming Bluetooth Sensor NetworksChih-Min Yu, Yih-Bin Yu. 302-306 [doi]
- An Effective Feature Selection Approach for Network Intrusion DetectionFengli Zhang, Dan Wang. 307-311 [doi]
- An Improved Ant Colony Clustering Method for Network Intrusion DetectionLingxi Meng, Guang Sun. 312-316 [doi]
- An Optimization Algorithm for PAPR Reduction in OFDM System Based on Tabu SearchShuyan Ding, Ruo Shu, Shibao Li, Zhaozhi Gu. 317-320 [doi]
- A Novel Web Service Composition Recommendation Approach Based on Reliable QoSDenghui Wang, Hao Huang, Changsheng Xie. 321-325 [doi]
- Dynamic Workflow Planning on Programmable InfrastructureWenchao Jiang, Zhiming Zhao, Adianto Wibisono, Paola Grosso, Cees de Laat. 326-330 [doi]
- A New Approach to Multi-objective Virtual Machine Placement in Virtualized Data CenterSinong Wang, Huaxi Gu, Gang Wu. 331-335 [doi]
- D-PALD: A Dynamic Power-Aware Load Dispatcher with Response Time Percentile Guarantee in Heterogeneous ClustersXu Zhou, Qiang Cao, Changsheng Xie, Xubin He. 336-340 [doi]