default search action
IPCCC 2012: Austin, TX, USA
- 31st IEEE International Performance Computing and Communications Conference, IPCCC 2012, Austin, TX, USA, December 1-3, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-4881-2
- Ben Zhao, Taieb Znati:
A double-edged sword: Implications of crowdsourcing for the future of web security. 1-2 - Andriy Panchenko, Fabian Lanze, Thomas Engel:
Improving performance and anonymity in the Tor network. 1-10 - Qiang Zou, Jianhui Yue, Bruce Segee, Yifeng Zhu:
Temporal characterization of SPEC CPU2006 workloads: Analysis and synthesis. 11-20 - Jie Luo, Kathlene Morales, Byeong Kil Lee, Eugene John, Young Kyu Choi:
Performance-sensitivity and performance-similarity based workload reduction. 21-30 - Xunfei Jiang, Mohammed I. Alghamdi, Ji Zhang, Maen M. Al Assaf, Xiaojun Ruan, Tausif Muzaffar, Xiao Qin:
Thermal modeling and analysis of storage systems. 31-40 - Linwei Niu, Jia Xu:
Improving schedulability and energy performance for weakly hard real-time systems. 41-50 - Ziming Zhang, Qiang Guan, Song Fu:
An adaptive power management framework for autonomic resource configuration in cloud computing infrastructures. 51-60 - Dilip Kumar Krishnappa, David E. Irwin, Eric Lyons, Michael Zink:
CloudCast: Cloud computing for short-term mobile weather forecasts. 61-70 - Husanbir Singh Pannu, Jianguo Liu, Qiang Guan, Song Fu:
AFD: Adaptive failure detection system for cloud computing infrastructures. 71-80 - Ji Zhang, Xunfei Jiang, Yun Tian, Xiao Qin, Mohammed I. Alghamdi, Maen M. Al Assaf, Meikang Qiu:
ORCA: An offloading framework for I/O-intensive applications on clusters. 81-90 - Ridha Soua, Pascale Minet, Erwan Livolant:
MODESA: An optimized multichannel slot assignment for raw data convergecast in wireless sensor networks. 91-100 - David Fotue, Houda Labiod, Thomas Engel:
An arbitrary mobility model of Mini-Sinks using controlled data collection for reducing congestion appearance in wireless sensor networks. 101-109 - Milos Blagojevic, Marc Geilen, Twan Basten, Teun Hendriks:
Fast sink placement for Gossip-based Wireless Sensor Networks. 110-119 - Hannes Hannak, Wolfgang Blochinger, Sven Trieflinger:
A Desktop Grid enabled parallel Barnes-Hut algorithm. 120-129 - Zhike Zhang, Deepavali Bhagwat, Witold Litwin, Darrell D. E. Long, Thomas J. E. Schwarz:
Improved deduplication through parallel Binning. 130-141 - Zhiyong Xu, Ruixuan Li, Cheng-Zhong Xu:
CAST: A page-level FTL with compact address mapping and parallel data blocks. 142-151 - Md. Tauhiduzzaman, Mea Wang:
A system analysis of reputation-base defences against pollution attacks in P2P streaming. 152-161 - Longjiang Guo, Jinsheng Duan, Jinbao Li, Lei Yu, Haiying Shen:
HAS: Hidden anti-theft system based on wireless sensor networks. 162-170 - Nabil Hachem, Hervé Debar, Joaquín García-Alfaro:
HADEGA: A novel MPLS-based mitigation solution to handle network attacks. 171-180 - Patrick Brown, Mengxia Michelle Zhu, Qishi Wu, Daqing Yun, Jason Zurawski:
Exploring the optimal strategy for large-scale data movement in high-performance networks. 181-182 - Shravan Garlapati, Haris Ioannis Volos, P. Teja Kuruganti, R. Michael Buehrer, Jeffrey H. Reed:
PHY and MAC layer design of Hybrid Spread Spectrum based smart meter network. 183-184 - Chao Tong, Jianwei Niu, Bin Dai, Jing Peng, Jinyang Fan:
Complex networks clustering algorithm based on the core influence of the nodes. 185-186 - Yuanfang Chen, Xiaoming Li:
Static micro-scheduling: Resource contention relief in multithreaded programs. 187-188 - Gbenga Owojaiye, Yichuang Sun:
Co-efficient vector based distributed quasi-orthogonal codes in cooperative networks. 189-190 - Andrea Martínez, Anna Sikora, Eduardo César, Joan Sorribes:
Hierarchical MATE's approach for dynamic performance tuning of large-scale parallel applications. 191-192 - Xiaolin Chang, Bin Wang, Jiqiang Liu:
Network state aware virtual network parallel embedding. 193-194 - Pham Ngoc Thanh, Keecheon Kim:
A methodology for implementation and integration Two-Factor Authentication into VPN. 195-196 - Navdeep Kaur Kapoor, Shikharesh Majumdar, Biswajit Nandy:
Sensor allocation to multiple applications in shared wireless sensor networks. 197-198 - Kathlene Morales, Byeong Kil Lee:
Fixed Segmented LRU cache replacement scheme with selective caching. 199-200 - Jing Liu, Haibo Wu:
Make systematic conformance testing for BitTorrent protocol feasible: A CP-nets model based testing approach. 201-202 - Saddam Quirem, Byeong Kil Lee:
AES decryption using warp-synchronous programming. 203-204 - Sabrina Merkel, Christian Werner Becker, Hartmut Schmeck:
Firefly-inspired synchronization for energy-efficient distance estimation in mobile ad-hoc networks. 205-214 - Harshavardhan Chenji, Wei Zhang, Myounggyu Won, Radu Stoleru, Clint Arnett:
A wireless system for reducing response time in Urban Search & Rescue. 215-224 - Kerri Stone, Tracy Camp:
CAIRN: Creating Anchors for Localization in Realistic Networks. 225-235 - Dongsoo Kim, Eric C. Noel, K. Wendy Tang:
Graph theoretic expansion of Borei Cayley Graphs with an optimal and distributed routing algorithm. 236-245 - Guangping Xu, Sheng Lin, Gang Wang, Xiaoguang Liu, Kai Shi, Hua Zhang:
HERO: Heterogeneity-aware erasure coded redundancy optimal allocation for reliable storage in distributed networks. 246-255 - Mengxia Michelle Zhu, Qishi Wu, Yang Zhao:
A cost-effective scheduling algorithm for scientific workflows in clouds. 256-265 - Xiaojun Ruan, Ziliang Zong, Mohammed I. Alghamdi, Yun Tian, Xunfei Jiang, Xiao Qin:
Improving write performance by enhancing internal parallelism of Solid State Drives. 266-274 - Ewnetu Bayuh Lakew, Francisco Hernández-Rodriguez, Lei Xu, Erik Elmroth:
Management of distributed resource allocations in multi-cluster environments. 275-284 - Li Wang, Zheng Li, Miao Song, Shangping Ren:
A genetic algorithm based approach to maximizing real-time system value under resource constraints. 285-294 - Kirill Kogan, Alejandro López-Ortiz, Sergey I. Nikolenko, Alexander Sirotkin:
A taxonomy of Semi-FIFO policies. 295-304 - Jianwei Niu, Jing Peng, Chao Tong, Wanjiun Liao:
Evolution of disconnected components in social networks: Patterns and a generative model. 305-313 - Rajvir Gill, Ravinder Paul, Ljiljana Trajkovic:
Effect of MRAI timers and routing policies on BGP convergence times. 314-323 - Jehan-François Pâris, Thomas J. E. Schwarz, Ahmed Amer, Darrell D. E. Long:
Highly reliable two-dimensional RAID arrays for archival storage. 324-331 - Safraz Rampersaud, Lena Mashayekhy, Daniel Grosu:
Computing Nash equilibria in bimatrix games: GPU-based parallel support enumeration. 332-341 - Dung Vu, Yang Yang, Laxmi N. Bhuyan:
An efficient dynamic multiple-candidate motion vector approach for GPU-based hierarchical motion estimation. 342-351 - Hemanth Meka, Sanjay Kumar Madria, Mark Linderman:
Incentive based approach to find selfish nodes in Mobile P2P networks. 352-359 - Haibo Wu, Jing Liu, Hai Jiang, Yi Sun, Jun Li, Zhongcheng Li:
Bandwidth-aware peer selection for P2P live streaming systems under flash crowds. 360-367 - Brian Romoser, Ribel Fares, Peter Janovics, Xiaojun Ruan, Xiao Qin, Ziliang Zong:
Global workload characterization of a large scale satellite image distribution system. 368-375 - Norman Lim, Shikharesh Majumdar, Vineet Srivastava:
Devising Secure Sockets Layer-based distributed systems: A performance-aware approach. 376-383 - Yong Wang, Jing Peng, Long-Ping He, Ting-Ting Zhang, Hong-Zong Li:
LBSs privacy preserving for continuous query based on semi-honest third parties. 384-391 - Te-En Wei, Albert B. Jeng, Hahn-Ming Lee:
GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack. 392-399 - Kaiqi Xiong, David J. Thuente:
Locating jamming attackers in malicious wireless sensor networks. 400-407 - Binod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah:
Secure multipath routing for AMI network in Smart Grid. 408-415 - Arslan Munir, Ann Gordon-Ross, Sanjay Ranka:
Parallelized benchmark-driven performance evaluation of SMPs and tiled multi-core architectures for embedded systems. 416-423 - Indrani Paul, Sudhakar Yalamanchili, Lizy K. John:
Performance impact of virtual machine placement in a datacenter. 424-431 - Shayan Pooya, Paul Lu, Mike H. MacGregor:
Structured Message Transport. 432-439 - Yanjun Yao, Lipeng Wan, Qing Cao, Rukun Mao:
PhoneCon: Voice-driven SmartPhone Controllable Wireless Sensor Networks. 440-447 - Dan Zhao, Hongjun Liu, Xiaofeng Hu, Chunqing Wu:
Towards network convergence and traffic engineering optimization. 448-455 - Grace Oletu, Predrag B. Rapajic, Kwashie Amartei Anang, Ruiheng Wu:
Channel impulse noise minimization using digital smear and desmear filter. 456-462 - Jinbao Li, Li Zhang, Longjiang Guo, Liang Yao:
A path-transfer based multi-path reliable routing in wireless sensor networks. 463-470 - Mini Mathew, Ning Weng, Lucas Vespa:
Quality-of-information modeling and adapting for delay-sensitive sensor network applications. 471-477
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.