Abstract is missing.
- Elastic Phoenix: Malleable MapReduce for Shared-Memory SystemsAdam Wolfe Gordon, Paul Lu. 1-16 [doi]
- A Load-Aware Data Placement Policy on Cluster File SystemYu Wang, Jing Xing, Jin Xiong, Dan Meng. 17-31 [doi]
- H-Fuzzing: A New Heuristic Method for Fuzzing Data GenerationJinjing Zhao, Yan Wen, Gang Zhao. 32-43 [doi]
- Improved Compact Routing Schemes for Power-Law NetworksMingdong Tang, Jianxun Liu, Guoqing Zhang. 44-58 [doi]
- Accelerating the Requirement Space Exploration through Coarse-Grained Parallel ExecutionZhongwei Lin, Yiping Yao. 59-70 [doi]
- A Global Benefit Maximization Task-Bundle AllocationMeiguang Zheng, Zhigang Hu, Peng Xiao, Meixia Zheng, Kai Zhang. 71-85 [doi]
- Service Quality Assurance Mechanisms for P2P SIP VoIPXiaofei Liao, Fengjiang Guo, Hai Jin. 86-98 [doi]
- VSCM: A Virtual Server Consolidation Manager for ClusterYang Liu, Yunchu Liu, Hanli Bai. 99-110 [doi]
- Informed Live Migration Strategies of Virtual Machines for Cluster Load BalancingXing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin. 111-122 [doi]
- Dynamic Advance Reservation for Grid System Using Resource PoolsZhiang Wu, Jie Cao, Youquan Wang. 123-134 [doi]
- A Way of Key Management in Cloud Storage Based on Trusted ComputingXin Yang, Qingni Shen, Yahui Yang, Sihan Qing. 135-145 [doi]
- A Trust-Based Defensive System Model for Cloud ComputingQian Zhou, Jiong Yu, Feiran Yu. 146-159 [doi]
- A New Method for Authentication Based on Covert ChannelYanan Sun, Xiaohong Guan, Ting Liu. 160-165 [doi]
- A Layered Detection Method for Malware IdentificationTing Liu, Xiaohong Guan, Yu Qu, Yanan Sun. 166-175 [doi]
- Pedestrian Detection and Tracking Using HOG and Oriented-LBP FeaturesYingdong Ma, Xiankai Chen, George Chen. 176-184 [doi]
- An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing EnvironmentDaeyong Jung, Sung-Ho Chin, Kwang-Sik Chung, Heon-Chang Yu, Joon-Min Gil. 185-200 [doi]
- Towards a Universal Sketch for Origin-Destination Network MeasurementsHaiquan (Chuck) Zhao, Nan Hua, Ashwin Lall, Ping Li, Jia Wang, Jun (Jim) Xu. 201-213 [doi]
- A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc NetworksJianrui Yuan, Jintao Meng. 214-231 [doi]
- Power-Aware Run-Time Incremental Mapping for 3-D Networks-on-ChipXiaohang Wang, Maurizio Palesi, Mei Yang, Yingtao Jiang, Michael C. Huang, Peng Liu 0016. 232-247 [doi]
- WeLe-RAID: A SSD-Based RAID for System Endurance and PerformanceYimo Du, Fang Liu, Zhiguang Chen, Xin Ma. 248-262 [doi]
- Reorder the Write Sequence by Virtual Write Buffer to Extend SSD's LifespanZhiguang Chen, Fang Liu, Yimo Du. 263-276 [doi]
- Memory-Side Acceleration for XML ParsingJie Tang, Shaoshan Liu, Zhimin Gu, Chen Liu, Jean-Luc Gaudiot. 277-292 [doi]
- Hardware Performance Monitoring for the Rest of Us: A Position and SurveyTipp Moseley, Neil Vachharajani, William Jalby. 293-312 [doi]
- An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-core SystemXiongli Gu, Jie Yang, Xiamin Wu, Chunming Huang, Peng Liu. 313-323 [doi]
- Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless NetworksSewon Han, Byung-Seo Kim. 324-333 [doi]
- Access Path Based Source Address Validation in Mobile IPv6Min Zhu, Ke Xu, Qi Li. 334-349 [doi]
- Improve Google Android User Experience with Regional Garbage CollectionYunan He, Chen Yang, Xiao-Feng Li. 350-365 [doi]