


default search action
IPCCC 2010: Albuquerque, NM, USA
- 29th International Performance Computing and Communications Conference, IPCCC 2010, 9-11 December 2010, Albuquerque, NM, USA. IEEE Computer Society 2010, ISBN 978-1-4244-9330-2

Session C1: Network Security
- Honglong Chen, Wei Lou

:
From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks. 1-8 - Guangzhi Qu, Michael M. Nefcy:

RAPiD: An indirect rogue access points detection system. 9-16 - Sun-il Kim, Nnamdi Nwanze, Jasen Kintner:

Towards dynamic self-tuning for intrusion detection systems. 17-24 - Honglong Chen, Wei Lou

, Zhi Wang:
Secure localization against wormhole attacks using conflicting sets. 25-33
Session C2: Mobile Ad Hoc and Mesh Networks
- Wooseong Kim

, Andreas J. Kassler
, Marco Di Felice, Mario Gerla:
Cognitive Multi-Radio Mesh Networks on ISM bands: A cross-layer architecture. 34-41 - Xiaoguang Zhang, Zheng Da Wu:

A non-uniform node deployment approach for event detection sensor networks. 42-49 - Fatma Outay

, Véronique Vèque, Ridha Bouallegue
:
EASARD: Towards an efficient Energy-Aware Service and Route Discovery scheme in MANET. 50-58 - Manki Min, Bipin C. Neupane:

Incremental minimality: A property of optimal solutions for the minimum power broadcast tree problem in wireless ad hoc networks. 59-66 - Pham Van Tien

, Nguyen Thuy Chi, Nguyen Manh Thiep, Nguyen Van Tuyen, Dang Van Tuan, Nguyen Thanh Thuy, Nguyen Thi Thu Trang:
Sender - Receiver cooperation and buffer observation for fine-grained adaptive transmission of video over mobile ad hoc networks. 67-72
Session C3: Parallel and Distributed Systems
- Qiang Guan, Song Fu

:
auto-AID: A data mining framework for autonomic anomaly identification in networked computer systems. 73-80 - Raja S. Kushalnagar

, Jehan-François Pâris
:
Evaluation of a scalable and distributed mobile device video recording approach for accessible presentations. 81-88 - Nan Wang, Jizhong Han

, Haiping Fu, Xubin He, Jinyun Fang:
Reproducing non-deterministic bugs with lightweight recording in production environments. 89-96 - Arny Ambrose, Mihaela Cardei, Ionut Cardei:

Patient-centric hurricane evacuation management system. 97-104 - Faraz Ahmed Memon, Daniel Tiebler, Frank Dürr

, Kurt Rothermel:
Optimized information discovery using self-adapting indices over Distributed Hash Tables. 105-113
Session C4: Wireless Sensor Networks
- Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li

:
ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNs. 114-121 - Mirela I. Fonoage, Mihaela Cardei, Arny Ambrose:

A QoS based routing protocol for wireless sensor networks. 122-129 - Anthony Plummer Jr., Mahmoud Taghizadeh, Subir Biswas:

Statistical bandwidth scavenging for prioritized device coexistence. 130-137 - Feng Wang

, Jianhua Gao:
Behavior monitoring framework in large-scale wireless sensor networks. 138-145 - Salimur Choudhury, Kamrul Islam, Selim G. Akl:

A primal-dual approximation algorithm for the Minimum Cost Stashing problem in wireless sensor networks. 146-152
Session C5: Embedded Systems and Storage Systems
- Linwei Niu:

Energy efficient scheduling for hard real-time systems with fixed-priority assignment. 153-160 - Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi

, Shu Yin, Zhiyang Ding, Jiong Xie, Joshua Lewis, Xiao Qin
:
ES-MPICH2: A Message Passing Interface with enhanced security. 161-168 - David Clerc, Luis Garcés-Erice

, Sean Rooney:
OS streaming deployment. 169-179 - Joshua Lewis, Mohammed I. Alghamdi

, Maen M. Al Assaf
, Xiaojun Ruan, Zhiyang Ding, Xiao Qin
:
An automatic prefetching and caching system. 180-187 - Jan Stender, Mikael Högqvist, Björn Kolbeck:

Loosely time-synchronized snapshots in object-based file systems. 188-197
Session C6: Network Protocols and Network Management
- Sireesha Muppala, Xiaobo Zhou, Liqiang Zhang:

Regression based multi-tier resource provisioning for session slowdown guarantees. 198-205 - Zhi Zhang, Fei Li, Songqing Chen:

Online learning approaches in maximizing weighted throughput. 206-213 - Ghazale Hosseinabadi, Nitin H. Vaidya:

Selfish misbehavior in scheduling algorithms of wireless networks. 214-221 - Osamah S. Badarneh, Michel Kadoch

:
Multiple description video multicast in MANETs. 222-230 - Thilan Ganegedara, Weirong Jiang

, Viktor K. Prasanna:
FRuG: A benchmark for packet forwarding in future networks. 231-238
Session C7: Performance Evaluation and Modeling
- Sha Li, Xiaoming Li:

Soft error propagation in floating-point programs. 239-246 - Sara Casolari, Michele Colajanni

, Stefania Tosi, Francesco Lo Presti
:
Real-time models supporting resource management decisions in highly variable systems. 247-254 - Qiong Rong, Guangxing Zhang, Gaogang Xie, Kavé Salamatian

:
Mnemonic Lossy Counting: An efficient and accurate heavy-hitters identification algorithm. 255-262 - Joanna Tomasik, Marc-Antoine Weisser:

Internet topology on as-level: Model, generation methods and tool. 263-270 - Kunjie Xu, Siriluck Tipmongkonsilp, David Tipper

, Prashant Krishnamurthy, Yi Qian:
A time dependent performance model for multihop wireless networks with CBR traffic. 271-280 - Geir Egeland, Paal E. Engelstad:

Modelling the behavior of a beacon-based link sensing mechanism with variable sensing range. 281-288
Session W1: CR-RAN Workshop
- Mankanala N. SreeRangaRaju, Jitendranath Mungara:

Tuning ZRP framework for CR networks and MANETs. 289-293 - Vasanth Iyer

, S. Sitharama Iyengar
, Garimella Rama Murthy, Nandan Parameswaran, Dhananjay Singh
, Mandalika B. Srinivas:
Effects of channel SNR in mobile cognitive radios and coexisting deployment of cognitive wireless sensor networks. 294-301 - Khaled Daabaj, Michael W. Dixon, Terry Koziniec

:
Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networks. 302-308 - Jen-Shiun Chen:

Performance evaluation of CDMA packet networks in Nakagami fading. 309-314 - Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki:

Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. 315-324
Session P1: Poster Session
- Brandon Maharrey:

A gateway-based approach for information retrieval from data-centric wireless sensor networks from IP hosts. 325-326 - Jed Kao-Tung Chang, Shaoshan Liu, Jean-Luc Gaudiot, Chen Liu

:
Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost. 327-328 - Ziming Zhang, Song Fu

:
Profiling and analysis of power consumption for virtualized systems and applications. 329-330 - Rodolpho G. de Siqueira, Rodrigo Perazzo, Djamel Sadok:

Modeling of non-gaussian noise effect on DSL lines. 331-332 - Yang Wang, Mengyu Qiao:

Virtual machine auto-configuration for web application. 333-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














