default search action
4th Infoscale 2009: Hong Kong, China
- Peter Mueller, Jiannong Cao, Cho-Li Wang:
Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 18, Springer 2009, ISBN 978-3-642-10484-8 - Yuzhong Jiao, Xin'an Wang, Xuewen Ni:
A Fully Data-Driven Reconfigurable Architecture with Very Coarse-Grained Execution Units. 1-13 - Li Han, Songxiang Cen, Jian Ma, Yan Ma:
Identify Intimate Social Relationship in Blogsphere. 14-25 - András Faragó:
Local vs. Global Scalability in Ad Hoc and Sensor Networks. 26-45 - Xia Yin, Xin Wu, Zhiliang Wang:
Measuring IP Address Fragmentation from BGP Routing Dynamics. 46-57 - Yun-Chiu Ching, Ching-Hsien Hsu, Kuan-Ching Li
:
On Improving Network Locality in BitTorrent-Like Systems. 58-75 - Chia-Wei Chu, Ching-Hsien Hsu, Hsi-Ya Chang, Shuen-Tai Wang, Kuan-Ching Li
:
Parallel File Transfer for Grid Economic. 76-89 - Frank Schell, Jochen Dinger, Hannes Hartenstein:
Performance Evaluation of Identity and Access Management Systems in Federated Environments. 90-107 - Yen-Jun Chen, Ching-Hsien Hsu, Kuan-Ching Li
, Hsi-Ya Chang, Shuen-Tai Wang:
Power Consumption Optimization of MPI Programs on Multi-core Clusters. 108-120 - Baoning Niu, Jian Shi:
Scalable Workload Adaptation for Mixed Workload. 121-134 - Rui Wang, Depei Qian, Danfeng Zhu, Qinglin Zhu, Zhongzhi Luan:
Tuning Performance of P2P Mesh Streaming System Using a Network Evolution Approach. 135-151 - Ma Xiu-ying, Lin Jia-jun:
HVS-Based Imperceptibility Evaluation for Steganography. 152-161 - Siti M. Wasikon, Mustafa Mat Deris:
Hasten Dynamic Frame Slotted ALOHA Algorithm for Fast Identification in RFID System. 162-174 - Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li:
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. 175-191 - Zhixin Sun, Kai Bu, Ke Ding:
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT. 192-205 - Tien-Hsiung Weng, Sheng-Wei Huang, Ruey-Kuen Perng, Ching-Hsien Hsu, Kuan-Ching Li
:
A Practical OpenMP Implementation of Bit-Reversal for Fast Fourier Transform. 206-216 - Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu:
A Scalable, Vulnerability Modeling and Correlating Method for Network Security. 217-227 - Wei Xiao, Ming Xu, Yingwen Chen:
A Self-adaptive Fault-Tolerant Mechanism in Wireless Sensor Networks. 228-240 - Alexander J. Aved
, Kien A. Hua, Antoniya Petkova:
CAWA: Continuous Approximate Where-About Queries. 241-257 - Kun-Ming Yu, Yi-Yan Chang, Jiayi Zhou, Chun-Yuan Huang, Whei-meih Chang, Chun-Yuan Lin, Chuan Yi Tang:
Chemical Compounds with Path Frequency Using Multi-Core Technology. 258-271 - Hsu-Kuang Chang, I-Chang Jou:
Distance Dimension Reduction on QR Factorization for Efficient Clustering Semantic XML Document Using the QR Fuzzy C-Mean (QR-FCM). 272-287 - Neil Zhenqiang Gong, Guangzhong Sun, Jing Yuan, Yanjing Zhong:
Efficient Top-k Query Algorithms Using K-Skyband Partition. 288-305 - Yong Liu, John Markus Bjørndalen, Otto J. Anshus:
Using Multi-threading and Server Update Pushing to Improve the Performance of VNC for a Wall-Sized Tiled Display Wall. 306-321
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.