default search action
IEEE Transactions on Parallel and Distributed Systems, Volume 25
Volume 25, Number 1, January 2014
- David A. Bader:
State of the Journal. 1 - Shaojie Tang, Jing Yuan, Cheng Wang, Xiang-Yang Li:
A Framework for Amazon EC2 Bidding Strategy under SLA Constraints. 2-11 - Nancy Samaan:
A Novel Economic Sharing Model in a Federation of Selfish Cloud Providers. 12-21 - Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao:
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks. 22-32 - Xiaohu Wu, Yinlong Xu, Chau Yuen, Liping Xiang:
A Tag Encoding Scheme against Pollution Attack to Linear Network Coding. 33-42 - Eugenio Rustico, Giuseppe Bilotta, Alexis Hérault, Ciro Del Negro, Giovanni Gallo:
Advances in Multi-GPU Smoothed Particle Hydrodynamics Simulations. 43-52 - Wei Peng, Feng Li, Xukai Zou, Jie Wu:
Behavioral Malware Detection in Delay Tolerant Networks. 53-63 - Gregory Hackmann, Weijun Guo, Guirong Yan, Zhuoxiong Sun, Chenyang Lu, Shirley Dyke:
Cyber-Physical Codesign of Distributed Structural Health Monitoring with Wireless Sensor Networks. 63-72 - Yongxiang Zhao, Yong Liu, Changjia Chen, Jianyin Zhang:
Enabling P2P One-View Multiparty Video Conferencing. 73-82 - Randy Morris, Evan Jolley, Avinash Karanth Kodi:
Extending the Performance and Energy-Efficiency of Shared Memory Multicores with Nanophotonic Technology. 83-92 - Yan Qiao, Tao Li, Shigang Chen:
Fast Bloom Filters and Their Generalization. 93-103 - Mai Zheng, Vignesh T. Ravi, Feng Qin, Gagan Agrawal:
GMRace: Detecting Data Races in GPU Programs via a Low-Overhead Scheme. 104-115 - Albert-Jan Nicholas Yzelman, Dirk Roose:
High-Level Strategies for Parallel Shared-Memory Sparse Matrix-Vector Multiplication. 116-125 - Alessandro Margara, Gianpaolo Cugola:
High-Performance Publish-Subscribe Matching Using Parallel Hardware. 126-135 - Xiaodong Liu, Mo Li, Shanshan Li, Shaoliang Peng, Xiangke Liao, Xiaopei Lu:
IMGPU: GPU-Accelerated Influence Maximization in Large-Scale Social Networks. 136-145 - Tao Chen, Zheng Yang, Yunhao Liu, Deke Guo, Xueshan Luo:
Localization-Oriented Network Adjustment in Wireless Ad Hoc and Sensor Networks. 146-155 - Yongwei Wu, Feng Ye, Kang Chen, Weimin Zheng:
Modeling of Distributed File Systems for Practical Performance Analysis. 156-166 - Xiaoyan Wang, Jie Li:
Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks. 167-179 - Deke Guo, Yuan He, Yunhao Liu:
On the Feasibility of Gradient-Based Data-Centric Routing Using Bloom Filters. 180-190 - Deze Zeng, Song Guo, Yong Xiang, Hai Jin:
On the Throughput of Two-Way Relay Networks Using Network Coding. 191-199 - Yuan Yao, Longbo Huang, Abhishek B. Sharma, Leana Golubchik, Michael J. Neely:
Power Cost Reduction in Distributed Data Centers: A Two-Time-Scale Approach for Delay Tolerant Workloads. 200-211 - Jiawei Yuan, Shucheng Yu:
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing. 212-221 - Ning Cao, Cong Wang, Ming Li, Kui Ren, Wenjing Lou:
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data. 222-233 - Linghe Kong, Ming-Chen Zhao, Xiao-Yang Liu, Jialiang Lu, Yunhuai Liu, Min-You Wu, Wei Shu:
Surface Coverage in Sensor Networks. 234-243 - Kasim Sinan Yildirim, Aylin Kantarci:
Time Synchronization Based on Slow-Flooding in Wireless Sensor Networks. 244-253 - Reiley Jeyapaul, Fei Hong, Abhishek Rhisheekesan, Aviral Shrivastava, Kyoungwoo Lee:
UnSync-CMP: Multicore CMP Architecture for Energy-Efficient Soft-Error Reliability. 254-263 - Huaqun Wang, Yuqing Zhang:
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage. 264-267
Volume 25, Number 2, February 2014
- Zhenfu Cao, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. 279-282 - Eric Osterweil, Daniel Massey, Danny McPherson, Lixia Zhang:
Verifying Keys through Publicity and Communities of Trust: Quantifying Off-Axis Corroboration. 283-291 - Konstantinos Pelechrinis, Prashant Krishnamurthy, Christos Gkantsidis:
Trustworthy Operations in Cellular Networks: The Case of PF Scheduler. 292-300 - Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah, Nei Kato:
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks. 301-309 - Xiaohui Liang, Xiaodong Lin, Xuemin (Sherman) Shen:
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks. 310-320 - Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright:
ReDS: A Framework for Reputation-Enhanced DHTs. 321-331 - Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak:
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. 332-342 - Ming Li, Sergio Salinas, Pan Li:
LocaWard: A Security and Privacy Aware Location-Based Rewarding System. 343-352 - Taehong Kim, Seong Hoon Kim, Jinyoung Yang, Seongeun Yoo, Daeyoung Kim:
Internet Traffic Privacy Enhancement with Masking: Optimization and Tradeoffs. 353-362 - Xuyun Zhang, Laurence T. Yang, Chang Liu, Jinjun Chen:
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud. 363-373 - Rinku Dewri, Ramakrishna Thurimella:
Exploiting Service Similarity for Privacy in Location-Based Search Queries. 374-383 - Sushmita Ruj, Milos Stojmenovic, Amiya Nayak:
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. 384-394 - Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley:
RRE: A Game-Theoretic Intrusion Response and Recovery Engine. 395-406 - Henry C. H. Chen, Patrick P. C. Lee:
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation. 407-416 - Marian Kamal Iskander, Tucker Trainor, Dave W. Wilkinson, Adam J. Lee, Panos K. Chrysanthis:
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions. 417-426 - Yuanchao Shu, Yu (Jason) Gu, Jiming Chen:
Dynamic Authentication with Sensory Information for the Access Control Systems. 427-436 - Luca Ferretti, Michele Colajanni, Mirco Marchetti:
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases. 437-446 - Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. 447-456 - Arlindo Luis Marcon Jr., Altair Olivo Santin, Maicon Stihler, Juliana Bachtold:
A (UCONABC) Resilient Authorization Evaluation for Cloud Computing. 457-467 - Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. 468-477 - Emmanuelle Anceaume, Yann Busnel:
A Distributed Information Divergence Estimation over Data Streams. 478-487 - Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma:
FLAP: An Efficient WLAN Initial Access Authentication Protocol. 488-497 - Weili Han, Zheran Fang, Laurence Tianruo Yang, Gang Pan, Zhaohui Wu:
Collaborative Policy Administration. 498-507 - Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen:
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks. 508-517 - Muhammad Adnan Tariq, Boris Koldehofe, Kurt Rothermel:
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption. 518-528
Volume 25, Number 3, March 2014
- Chiara Petrioli, Michele Nati, Paolo Casari, Michele Zorzi, Stefano Basagni:
ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks. 529-539 - Lena Mashayekhy, Daniel Grosu:
A Merge-and-Split Mechanism for Dynamic Virtual Organization Formation in Grids. 540-549 - Jing Wu, Joseph F. JáJá, Elias Balaras:
An Optimized FFT-Based Direct Poisson Solver on CUDA GPUs. 550-559 - Dario Bruneo:
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems. 560-569 - Jordi Arjona Aroca, Antonio Fernández Anta:
Bisection (Band)Width of Product Networks with Application to Data Centers. 570-580 - Josué Feliu, Salvador Petit, Julio Sahuquillo, José Duato:
Cache-Hierarchy Contention-Aware Scheduling in CMPs. 581-590 - Qingquan Zhang, Lingkun Fu, Yu (Jason) Gu, Lin Gu, Qing Cao, Jiming Chen, Tian He:
Collaborative Scheduling in Dynamic Environments Using Error Inference. 591-601 - Weikuan Yu, Yandong Wang, Xinyu Que:
Design and Evaluation of Network-Levitated Merge for Hadoop Acceleration. 602-611 - Weijie Wu, Richard T. B. Ma, John C. S. Lui:
Distributed Caching via Rewarding: An Incentive Scheme Design in P2P-VoD Systems. 612-621 - Ding-Yong Hong, Jan-Jan Wu, Pen-Chung Yew, Wei-Chung Hsu, Chun-Chen Hsu, Pangfeng Liu, Chien-Min Wang, Yeh-Ching Chung:
Efficient and Retargetable Dynamic Binary Translation on Multicores. 622-632 - Kasim Sinan Yildirim, Aylin Kantarci:
External Gradient Time Synchronization in Wireless Sensor Networks. 633-641 - Tao Li, Feng Tan, Qixin Wang, Lei Bu, Jiannong Cao, Xue Liu:
From Offline toward Real Time: A Hybrid Systems Model Checking and CPS Codesign Approach for Medical Device Plug-and-Play Collaborations. 642-652 - Chentao Wu, Xubin He, Qiang Cao, Changsheng Xie, Shenggang Wan:
Hint-K: An Efficient Multilevel Cache Using K-Step Hints. 653-662 - Yue Zhao, Francis Chung-Ming Lau:
Implementation of Decoders for LDPC Block Codes and LDPC Convolutional Codes Based on GPUs. 663-672 - Manel Bourguiba, Kamel Haddadou, Inès El Korbi, Guy Pujolle:
Improving Network I/O Virtualization for Cloud Computing. 673-681 - Hamid Arabnejad, Jorge G. Barbosa:
List Scheduling Algorithm for Heterogeneous Systems by an Optimistic Cost Table. 682-694 - Kentaro Sano, Yoshiaki Hatsuda, Satoru Yamamoto:
Multi-FPGA Accelerator for Scalable Stencil Computation with Constant Memory Bandwidth. 695-705 - Taehong Kim, Seong Hoon Kim, Jinyoung Yang, Seongeun Yoo, Daeyoung Kim:
Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks. 706-716 - Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, Wei Zhao:
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures. 717-729 - Juan Du, Daniel Joseph Dean, Yongmin Tan, Xiaohui Gu, Ting Yu:
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 730-739 - Minh Ngoc Dinh, David Abramson, Chao Jin:
Scalable Relative Debugging. 740-749 - Huang Lu, Jie Li, Mohsen Guizani:
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks. 750-761 - Lei Yu, Jianzhong Li, Siyao Cheng, Shuguang Xiong, Haiying Shen:
Secure Continuous Aggregation in Wireless Sensor Networks. 762-774 - Jianying Luo, Lei Rao, Xue Liu:
Temporal Load Balancing with Service Delay Guarantees for Data Center Energy Cost Optimization. 775-784 - Lu Zhang, Xueyan Tang:
The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation. 785-795 - Yaxiong Zhao, Jie Wu:
The Design and Evaluation of An Information Sharing System for Human Networks. 796-805 - Ruitao Xie, Xiaohua Jia:
Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing. 806-815 - Sheng Zhang, Zhuzhong Qian, Jie Wu, Sanglu Lu, Leah Epstein:
Virtual Network Embedding with Opportunistic Resource Sharing. 816-827
Volume 25, Number 4, April 2014
- Chenxi Qiu, Haiying Shen:
A Delaunay-Based Coordinate-Free Mechanism for Full Coverage in Wireless Sensor Networks. 828-839 - Guoyue Jiang, Zhaolin Li, Fang Wang, Shaojun Wei:
A High-Utilization Scheduling Schemeof Stream Programs on ClusteredVLIW Stream Architectures. 840-850 - Malith Jayasinghe, Zahir Tari, Panlop Zeephongsekul, Albert Y. Zomaya:
ADAPT-POLICY: Task Assignment in Server Farms when the Service Time Distributionof Tasks is Not Known A Priori. 851-861 - Haiying Shen, Guoxin Liu:
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing. 862-875 - Yanfei Guo, Palden Lama, Changjun Jiang, Xiaobo Zhou:
Automated and Agile Server ParameterTuning by Coordinated Learning and Control. 876-886 - Dayong Ye, Minjie Zhang, Danny Sutanto:
Cloning, Resource Exchange, and RelationAdaptation: An Integrative Self-Organisation Mechanism in a Distributed Agent Network. 887-897 - Jeffrey Lok Tin Woo, Mahesh V. Tripunitara:
Composing Kerberos and Multimedia Internet KEYing (MIKEY) for AuthenticatedTransport of Group Keys. 898-907 - Hongbo Jiang, Shengkai Zhang, Guang Tan, Chonggang Wang:
Connectivity-Based Boundary Extractionof Large-Scale 3D Sensor Networks: Algorithm and Applications. 908-918 - Eyuphan Bulut, Boleslaw K. Szymanski:
Constructing Limited Scale-Free Topologiesover Peer-to-Peer Networks. 919-928 - Jigang Wu, Thambipillai Srikanthan, Guiyuan Jiang, Kai Wang:
Constructing Sub-Arrays with ShortInterconnects from Degradable VLSI Arrays. 929-938 - Guojun Wang, Md. Zakirul Alam Bhuiyan, Jiannong Cao, Jie Wu:
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks. 939-949 - Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. 950-959 - Jiansheng Wei, Hong Jiang, Ke Zhou, Dan Feng:
Efficiently Representing Membershipfor Variable Large Data Sets. 960-970 - Yulai Yuan, Yongwei Wu, Weimin Zheng, Keqin Li:
Guarantee Strict Fairness and UtilizePrediction Better in Parallel Job Scheduling. 971-981 - Siyuan Liu, Lei Kang, Lei Chen, Lionel M. Ni:
How to Conduct Distributed IncompletePattern Matching. 982-992 - Emmanuel Jeannot, Guillaume Mercier, Francois Tessier:
Process Placement in Multicore Clusters: Algorithmic Issues and Practical Techniques. 993-1002 - Jiliang Wang, Yunhao Liu, Yuan He, Wei Dong, Mo Li:
QoF: Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks. 1003-1013 - Valerio Bioglio, Rossano Gaeta, Marco Grangetto, Matteo Sereno:
Rateless Codes and Random Walksfor P2P Resource Discovery in Grids. 1014-1023 - Jinkyu Lee, Buyoung Yun, Kang G. Shin:
Reducing Peak Power Consumption inMulti-Core Systems without ViolatingReal-Time Constraints. 1024-1033 - Jorge E. Pezoa, Majeed M. Hayat:
Reliability of Heterogeneous Distributed Computing Systems in the Presence of Correlated Failures. 1034-1043 - Vinit Padhye, Anand Tripathi:
Resource Availability Characteristicsand Node Selection in CooperativelyShared Computing Platforms. 1044-1054 - Jianping He, Jiming Chen, Peng Cheng, Xianghui Cao:
Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach. 1055-1065 - Haiying Shen, Ze Li, Guoxin Liu, Jin Li:
SOS: A Distributed Mobile Q&A SystemBased on Social Networks. 1066-1077 - Martin Biely, Peter Robinson, Ulrich Schmid:
The Generalized Loneliness Detector and Weak System Models for k-Set Agreement. 1078-1088 - Yanmin Zhu, Yuchen Wu, Bo Li:
Trajectory Improves Data Delivery in Urban Vehicular Networks. 1089-1100
Volume 25, Number 5, May 2014
- Ke Xu, Meng Shen, Yong Cui, Mingjiang Ye, Yifeng Zhong:
A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices. 1101-1111 - Ping Guo, Liqiang Wang, Po Chen:
A Performance Modeling and OptimizationAnalysis Tool for Sparse Matrix-VectorMultiplication on GPUs. 1112-1123 - Haiying Shen, Ze Li, Kang Chen:
A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks. 1124-1134 - Thilan Ganegedara, Weirong Jiang, Viktor K. Prasanna:
A Scalable and Modular Architecture for High-Performance Packet Classification. 1135-1144 - Arturo González-Escribano, Yuri Torres, Javier Fresno, Diego R. Llanos:
An Extensible System for Multilevel Automatic Data Partition and Mapping. 1145-1154 - Yinjin Fu, Hong Jiang, Nong Xiao, Lei Tian, Fang Liu, Lei Xu:
Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage. 1155-1165 - Sandeep Chandran, Prathmesh Kallurkar, Parul Gupta, Smruti R. Sarangi:
Architectural Support for Handling Jitterin Shared Memory Based Parallel Applications. 1166-1176 - Rubén Cuevas, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez:
BitTorrent Locality and Transit TrafficReduction: When, Why, and at What Cost? 1177-1189 - Ajoy Kumar Datta, Rajesh Patel:
CPU Scheduling for Power/Energy Management on Multicore Processors Using Cache Miss and Context Switch Data. 1190-1199