


default search action
IPCCC 2012: Austin, TX, USA
- 31st IEEE International Performance Computing and Communications Conference, IPCCC 2012, Austin, TX, USA, December 1-3, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4881-2

- Ben Zhao, Taieb Znati:

A double-edged sword: Implications of crowdsourcing for the future of web security. 1-2 - Andriy Panchenko, Fabian Lanze, Thomas Engel:

Improving performance and anonymity in the Tor network. 1-10 - Qiang Zou, Jianhui Yue, Bruce Segee, Yifeng Zhu:

Temporal characterization of SPEC CPU2006 workloads: Analysis and synthesis. 11-20 - Jie Luo, Kathlene Morales, Byeong Kil Lee, Eugene John

, Young Kyu Choi:
Performance-sensitivity and performance-similarity based workload reduction. 21-30 - Xunfei Jiang, Mohammed I. Alghamdi

, Ji Zhang, Maen M. Al Assaf
, Xiaojun Ruan, Tausif Muzaffar, Xiao Qin
:
Thermal modeling and analysis of storage systems. 31-40 - Linwei Niu, Jia Xu:

Improving schedulability and energy performance for weakly hard real-time systems. 41-50 - Ziming Zhang, Qiang Guan, Song Fu

:
An adaptive power management framework for autonomic resource configuration in cloud computing infrastructures. 51-60 - Dilip Kumar Krishnappa, David E. Irwin, Eric Lyons, Michael Zink

:
CloudCast: Cloud computing for short-term mobile weather forecasts. 61-70 - Husanbir Singh Pannu, Jianguo Liu, Qiang Guan, Song Fu

:
AFD: Adaptive failure detection system for cloud computing infrastructures. 71-80 - Ji Zhang, Xunfei Jiang, Yun Tian, Xiao Qin

, Mohammed I. Alghamdi
, Maen M. Al Assaf
, Meikang Qiu:
ORCA: An offloading framework for I/O-intensive applications on clusters. 81-90 - Ridha Soua, Pascale Minet, Erwan Livolant:

MODESA: An optimized multichannel slot assignment for raw data convergecast in wireless sensor networks. 91-100 - David Fotue, Houda Labiod, Thomas Engel:

An arbitrary mobility model of Mini-Sinks using controlled data collection for reducing congestion appearance in wireless sensor networks. 101-109 - Milos Blagojevic, Marc Geilen

, Twan Basten
, Teun Hendriks:
Fast sink placement for Gossip-based Wireless Sensor Networks. 110-119 - Hannes Hannak, Wolfgang Blochinger, Sven Trieflinger:

A Desktop Grid enabled parallel Barnes-Hut algorithm. 120-129 - Zhike Zhang, Deepavali Bhagwat, Witold Litwin, Darrell D. E. Long, Thomas J. E. Schwarz:

Improved deduplication through parallel Binning. 130-141 - Zhiyong Xu, Ruixuan Li, Cheng-Zhong Xu

:
CAST: A page-level FTL with compact address mapping and parallel data blocks. 142-151 - Md. Tauhiduzzaman, Mea Wang:

A system analysis of reputation-base defences against pollution attacks in P2P streaming. 152-161 - Longjiang Guo, Jinsheng Duan, Jinbao Li, Lei Yu

, Haiying Shen:
HAS: Hidden anti-theft system based on wireless sensor networks. 162-170 - Nabil Hachem, Hervé Debar

, Joaquín García-Alfaro
:
HADEGA: A novel MPLS-based mitigation solution to handle network attacks. 171-180 - Patrick Brown, Mengxia Michelle Zhu, Qishi Wu, Daqing Yun, Jason Zurawski

:
Exploring the optimal strategy for large-scale data movement in high-performance networks. 181-182 - Shravan Garlapati, Haris Ioannis Volos, P. Teja Kuruganti, R. Michael Buehrer, Jeffrey H. Reed:

PHY and MAC layer design of Hybrid Spread Spectrum based smart meter network. 183-184 - Chao Tong, Jianwei Niu

, Bin Dai, Jing Peng, Jinyang Fan:
Complex networks clustering algorithm based on the core influence of the nodes. 185-186 - Yuanfang Chen, Xiaoming Li:

Static micro-scheduling: Resource contention relief in multithreaded programs. 187-188 - Gbenga Owojaiye, Yichuang Sun:

Co-efficient vector based distributed quasi-orthogonal codes in cooperative networks. 189-190 - Andrea Martínez, Anna Sikora

, Eduardo César
, Joan Sorribes
:
Hierarchical MATE's approach for dynamic performance tuning of large-scale parallel applications. 191-192 - Xiaolin Chang, Bin Wang, Jiqiang Liu:

Network state aware virtual network parallel embedding. 193-194 - Pham Ngoc Thanh, Keecheon Kim:

A methodology for implementation and integration Two-Factor Authentication into VPN. 195-196 - Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:

Sensor allocation to multiple applications in shared wireless sensor networks. 197-198 - Kathlene Morales, Byeong Kil Lee:

Fixed Segmented LRU cache replacement scheme with selective caching. 199-200 - Jing Liu, Haibo Wu

:
Make systematic conformance testing for BitTorrent protocol feasible: A CP-nets model based testing approach. 201-202 - Saddam Quirem, Byeong Kil Lee:

AES decryption using warp-synchronous programming. 203-204 - Sabrina Merkel, Christian Werner Becker, Hartmut Schmeck

:
Firefly-inspired synchronization for energy-efficient distance estimation in mobile ad-hoc networks. 205-214 - Harshavardhan Chenji, Wei Zhang, Myounggyu Won, Radu Stoleru, Clint Arnett:

A wireless system for reducing response time in Urban Search & Rescue. 215-224 - Kerri Stone, Tracy Camp:

CAIRN: Creating Anchors for Localization in Realistic Networks. 225-235 - Dongsoo Kim, Eric C. Noel, K. Wendy Tang:

Graph theoretic expansion of Borei Cayley Graphs with an optimal and distributed routing algorithm. 236-245 - Guangping Xu

, Sheng Lin, Gang Wang, Xiaoguang Liu, Kai Shi, Hua Zhang:
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks. 246-255 - Mengxia Michelle Zhu, Qishi Wu, Yang Zhao:

A cost-effective scheduling algorithm for scientific workflows in clouds. 256-265 - Xiaojun Ruan, Ziliang Zong, Mohammed I. Alghamdi

, Yun Tian, Xunfei Jiang, Xiao Qin
:
Improving write performance by enhancing internal parallelism of Solid State Drives. 266-274 - Ewnetu Bayuh Lakew, Francisco Hernández-Rodriguez, Lei Xu, Erik Elmroth:

Management of distributed resource allocations in multi-cluster environments. 275-284 - Li Wang, Zheng Li, Miao Song, Shangping Ren:

A genetic algorithm based approach to maximizing real-time system value under resource constraints. 285-294 - Kirill Kogan

, Alejandro López-Ortiz, Sergey I. Nikolenko
, Alexander Sirotkin
:
A taxonomy of Semi-FIFO policies. 295-304 - Jianwei Niu

, Jing Peng, Chao Tong, Wanjiun Liao
:
Evolution of disconnected components in social networks: Patterns and a generative model. 305-313 - Rajvir Gill, Ravinder Paul, Ljiljana Trajkovic

:
Effect of MRAI timers and routing policies on BGP convergence times. 314-323 - Jehan-François Pâris

, Thomas J. E. Schwarz, Ahmed Amer, Darrell D. E. Long:
Highly reliable two-dimensional RAID arrays for archival storage. 324-331 - Safraz Rampersaud, Lena Mashayekhy, Daniel Grosu

:
Computing Nash equilibria in bimatrix games: GPU-based parallel support enumeration. 332-341 - Dung Vu, Yang Yang, Laxmi N. Bhuyan:

An efficient dynamic multiple-candidate motion vector approach for GPU-based hierarchical motion estimation. 342-351 - Hemanth Meka, Sanjay Kumar Madria, Mark Linderman:

Incentive based approach to find selfish nodes in Mobile P2P networks. 352-359 - Haibo Wu

, Jing Liu, Hai Jiang, Yi Sun, Jun Li, Zhongcheng Li:
Bandwidth-aware peer selection for P2P live streaming systems under flash crowds. 360-367 - Brian Romoser, Ribel Fares, Peter Janovics, Xiaojun Ruan, Xiao Qin

, Ziliang Zong:
Global workload characterization of a large scale satellite image distribution system. 368-375 - Norman Lim, Shikharesh Majumdar, Vineet Srivastava:

Devising Secure Sockets Layer-based distributed systems: A performance-aware approach. 376-383 - Yong Wang, Jing Peng, Long-Ping He, Ting-Ting Zhang, Hong-Zong Li:

LBSs privacy preserving for continuous query based on semi-honest third parties. 384-391 - Te-En Wei, Albert B. Jeng, Hahn-Ming Lee:

GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack. 392-399 - Kaiqi Xiong, David J. Thuente:

Locating jamming attackers in malicious wireless sensor networks. 400-407 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:

Secure multipath routing for AMI network in Smart Grid. 408-415 - Arslan Munir

, Ann Gordon-Ross, Sanjay Ranka
:
Parallelized benchmark-driven performance evaluation of SMPs and tiled multi-core architectures for embedded systems. 416-423 - Indrani Paul, Sudhakar Yalamanchili, Lizy K. John:

Performance impact of virtual machine placement in a datacenter. 424-431 - Shayan Pooya, Paul Lu, Mike H. MacGregor:

Structured Message Transport. 432-439 - Yanjun Yao, Lipeng Wan, Qing Cao, Rukun Mao:

PhoneCon: Voice-driven SmartPhone Controllable Wireless Sensor Networks. 440-447 - Dan Zhao, Hongjun Liu, Xiaofeng Hu, Chunqing Wu:

Towards network convergence and traffic engineering optimization. 448-455 - Grace Oletu, Predrag B. Rapajic, Kwashie Amartei Anang, Ruiheng Wu:

Channel impulse noise minimization using digital smear and desmear filter. 456-462 - Jinbao Li, Li Zhang, Longjiang Guo, Liang Yao:

A path-transfer based multi-path reliable routing in wireless sensor networks. 463-470 - Mini Mathew, Ning Weng, Lucas Vespa:

Quality-of-information modeling and adapting for delay-sensitive sensor network applications. 471-477

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














