


default search action
IPCCC 2009: Phoenix, Arizona, USA
- 28th International Performance Computing and Communications Conference, IPCCC 2009, 14-16 December 2009, Phoenix, Arizona, USA. IEEE Computer Society 2009, ISBN 978-1-4244-5737-3

Sensor Networks
- Chinh T. Vu, Guantao Chen, Yi Zhao, Yingshu Li

:
A universal framework for partial coverage in Wireless Sensor Networks. 1-8 - Taekkyeun Lee, Chunming Qiao, Murat Demirbas, Jinhui Xu:

ABC-MC: A simple multi-channel geographic forwarding scheme for wireless sensor networks. 9-16 - Yu Liu, Wei Zhang, Kemal Akkaya:

Static worst-case energy and lifetime estimation of wireless sensor networks. 17-24 - Ying Guo, Feng Hong

, Zhongwen Guo, Zongke Jin, Yuan Feng:
EDA: Event-oriented data aggregation in sensor networks. 25-32 - Longjiang Guo, Chunyu Ai, Xiaoming Wang, Zhipeng Cai, Yingshu Li

:
Real time clustering of sensory data in wireless sensor networks. 33-40
Transportation and Performance
- Xukang Lu, Qishi Wu, Nageswara S. V. Rao

, Zongmin Wang:
On Performance-Adaptive flow control for large data transfer in high speed networks. 49-56 - Mayutan Arumaithurai, Rüdiger Geib, Rene Rex, Xiaoming Fu

:
Pre-congestion notification-based flow management in MPLS-based DiffServ networks. 57-64 - Jing Chen, Wei Tan, Lixiang Liu, Xiaohui Hu, Fanjiang Xu:

Towards zero loss for TCP in wireless networks. 65-70 - Jia Zhou, Fengyuan Ren, Chuang Lin:

Saturation aware TCP throughput prediction. 71-78
Energy Efficiency
- Xiaojun Ruan, Shu Yin, Adam Manzanares, Jiong Xie, Zhiyang Ding, James Majors, Xiao Qin

:
ECOS: An energy-efficient cluster storage system. 79-86 - Shu Yin, Xiaojun Ruan, Adam Manzanares, Zhiyang Ding, Jiong Xie, James Majors, Xiao Qin

:
Improving reliability of energy-efficient parallel storage systems by disk swapping. 87-94 - Javad Vazifehdan, Ramin Hekmat, R. Venkatesha Prasad

, Ignas G. Niemegeers:
Performance evaluation of power-aware routing algorithms in Personal Networks. 95-102 - Manki Min, Bipin C. Neupane:

Virtual Center: A characteristic of minimum power broadcast trees in wireless ad hoc networks. 103-110 - David Essary, Ahmed Amer:

Avoiding state-space explosion of predictive metadata with SESH. 111-120
Performance in Computing and Communications
- Xiaorong Li, Terence Hung, Sharad Singhal:

A user-centric dynamic cluster partitioning approach for HPC service optimization. 121-128 - Jehan-François Pâris

, Ahmed Amer:
Using shared parity disks to improve the reliability of RAID arrays. 129-136 - Lydia Y. Chen, Wolfgang E. Denzel, Ronald P. Luijten:

Optimization of link bandwidth for parallel communication performance. 137-144 - Carl Henrik Lunde, Håvard Espeland, Håkon Kvale Stensland, Pål Halvorsen:

Improving file tree traversal performance by scheduling I/O operations in user space. 145-152 - Wei Hao, Jicheng Fu, I-Ling Yen, Zhonghang Xia:

Achieving high performance web applications by service and database replications at edge servers. 153-160
Wireless Networks
- Thang N. Dinh

, Ying Xuan, My T. Thai:
Towards social-aware routing in dynamic communication networks. 161-168 - Tamer Nadeem

:
Opportunistic mechanisms for IEEE 802.11 networks using directional antennas. 169-176 - Guo-Kai Zeng, Bo Wang, Matt W. Mutka

, Li Xiao, Eric Torng:
Efficient multicast for link-heterogeneous wireless mesh networks. 177-184 - Weihuang Fu, Xiaoyuan Wang, Dharma P. Agrawal:

Characterizing deployment and distribution of self-powered mesh routers in wireless mesh networks. 185-192 - Jun Li, Yifeng Zhou, Louise Lamont:

Analysis of the impact of swarm mobility on performance of routing protocols in MANETs. 193-199
Security
- Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala

:
LWRM: A lightweight response mechanism for TCG TOCTOU attack. 200-207 - Zesheng Chen, Todor Cooklev, Chao Chen

, Carlos A. Pomalaza-Raez
:
Modeling primary user emulation attacks and defenses in cognitive radio networks. 208-215 - Amar A. Rasheed, Rabi N. Mahapatra:

Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks. 216-222 - Ying Xuan, Yilin Shen, Incheol Shin, My T. Thai:

On trigger detection against reactive Jamming Attacks: A clique-independent set based approach. 223-230
Optimization and Architecture
- Lauro B. Costa

, Samer Al-Kiswany, Matei Ripeanu:
GPU support for batch oriented workloads. 231-238 - Santhosh Verma, Benjamin Maderazo, David M. Koppelman:

Spotlight - a low complexity highly accurate profile-based branch predictor. 239-247 - Alejandro Segovia, Xiaoming Li, Guang R. Gao:

Iterative layer-based raytracing on CUDA. 248-255 - Murat Bolat, Xiaoming Li:

Context-aware code optimization. 256-263
Location, Efficiency and Reliability
- Mourad Elhadef

, Amiya Nayak
:
Efficient symmetric comparison-based self-diagnosis using backpropagation artificial neural networks. 264-271 - Jian Zhu, Mohammad Oliya, Hung Keng Pung:

A pragmatic approach to location-aware service organization and discovery. 272-279 - Baris Tas, Nihat Altiparmak

, Ali Saman Tosun:
Low cost indoor location management system using infrared leds and Wii Remote Controller. 280-288 - Lizhe Wang

, Gregor von Laszewski
, Jai Dayal, Thomas R. Furlani
:
Thermal aware workload scheduling with backfilling for green data centers. 289-296 - Xinhua Yang, Tracy Camp:

A-MAC: Efficient Medium Access for cluster-based wireless sensor networks. 297-306
Distributed Systems
- Bibudh Lahiri, Srikanta Tirthapura

:
Finding correlated heavy-hitters over data streams. 307-314 - Yang Cao, Shikharesh Majumdar, Chung-Horng Lung:

Caching techniques for XML message filtering. 315-322 - Haitao Li, Xu Ke, James Seng, Po Hu:

Towards health of replication in large-scale P2P-VoD systems. 323-330 - Chentao Wu, Xubin He, Shenggang Wan, Qiang Cao, Changsheng Xie:

Hotspot Prediction and cache in distributed stream-processing storage systems. 331-340 - Jinglei Wang, Yibo Xue, Haixia Wang, Dongsheng Wang:

Network caching for Chip Multiprocessors. 341-348
Broadband Wireless and Cognitive Radio Networks Workshop, Part I
- Ye Ouyang

, M. Hosein Fallah:
A study of throughput for Iu-CS and Iu-PS interface in UMTS core network. 349-353 - Myounghwan Lee, John A. Copeland:

An adaptive polling algorithm with differentiation strategy in IEEE 802.16 multi-hop networks with IEEE 802.11e WLANs. 354-359 - Adam Flizikowski

, Rafal Kozik
, Mateusz Majewski, Marcin Przybyszewski:
Performance comparison of guard channel admission control schemes for IEEE 802.16 system with various turbo code FEC schemes. 360-365 - Lambros Lambrinos

, Constantinos Djouvas
:
Applying scheduling policies to improve QoE in wireless Voice-over-IP. 366-370 - Ye Ouyang

, M. Hosein Fallah:
A study of throughput for Nb, Mc and Nc interface in UMTS core network. 371-375
Data and Information Assurance Workshop
- Tobias Limmer, Falko Dressler

:
Flow-based TCP connection analysis. 376-383 - Kevin S. Bauer, Dirk Grunwald, Douglas C. Sicker

:
Predicting Tor path compromise by exit port. 384-387 - Hong Zhao:

Multiscale analysis and prediction of network traffic. 388-393 - Felix Leder, Peter Martini, André Wichmann:

Finding and extracting crypto routines from malware. 394-401 - Guangping Xu

, Hua Zhang, Jing Liu, Gang Wang, Xiaoguang Liu:
Network measurement based redundancy model and maintenance in dynamic P2P storage systems. 402-409 - Samee Ullah Khan

:
A goal programming approach for the joint optimization of energy consumption and response time in computational grids. 410-417
Broadband Wireless and Cognitive Radio Networks Workshop, Part II
- Alain Mourad, Ismael Gutiérrez:

System level evaluation for WiMAX IEEE 802.16m. 418-424 - Danda B. Rawat, Dimitrie C. Popescu:

Joint precoder and power adaptation for cognitive radios in interference systems. 425-430 - Muhammad Waheed, Anni Cai:

Evolutionary algorithms for radio resource management in cognitive radio network. 431-436 - Vinod Namboodiri:

Are cognitive radios energy efficient? A study of the Wireless LAN scenario. 437-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














