


default search action
IPCCC 2011: Orlando, Florida, USA
- Sheng Zhong, Dejing Dou, Yu Wang:

30th IEEE International Performance Computing and Communications Conference, IPCCC 2011, Orlando, Florida, USA, November 17-19, 2011. IEEE Computer Society 2011, ISBN 978-1-4673-0010-0
Wireless Networks I
- Duy Nguyen, Jose Joaquin Garcia-Luna-Aceves, Cédric Westphal:

Multi-rate adaptation with interference and congestion awareness. 1-8 - Agnieszka Lezanska, Muhammad Faisal Hayat:

Performance modelling of energy efficient wireless nodes. 1-7 - Amitangshu Pal, Asis Nasipuri:

JRCA: A joint routing and channel assignment scheme for wireless mesh networks. 1-8
Cloud Computing and Parallel Systems
- Jianzhe Tai, Juemin Zhang, Jun Li, Waleed Meleis, Ningfang Mi:

ArA: Adaptive resource allocation for cloud computing environments under bursty workloads. 1-8 - Ziming Zhang, Song Fu

:
Macropower: A coarse-grain power profiling framework for energy-efficient cloud computing. 1-8 - David Dillow, Galen M. Shipman, Sarp Oral, Zhe Zhang, Youngjae Kim:

Enhancing I/O throughput via efficient routing and placement for large-scale parallel file systems. 1-9 - Qishi Wu, Mengxia Zhu, Yi Gu, Xukang Lu, Patrick Brown, Michael A. Reuter, Stephen D. Miller:

A distributed workflow management system with case study of real-life scientific applications. 1-8
Sensor Networks I
- Mingyuan Yan, Jing He, Shouling Ji, Yingshu Li

:
Minimum latency scheduling for Multi-Regional Query in Wireless Sensor Networks. 1-8 - Young-Hun Kim, Keon-Taek Lee, Semin Sim, Seung-Jae Han:

A simple myopic mobile sink strategy for wireless sensor networks. 1-8 - Mihaela Cardei, Anthony Marcus, Ionut Cardei, Timur Tavtilov:

Web-based heterogeneous WSN integration using pervasive communication. 1-6 - Liehuang Zhu, Meng Li

:
An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks. 1-6
Computer System
- Thuan Duong-Ba, Thinh P. Nguyen, Patrick Chiang:

Network coding in multicore processors. 1-7 - Shu Yin, Yun Tian, Jiong Xie, Xiao Qin

, Mohammed I. Alghamdi
, Xiaojun Ruan, Meikang Qiu:
Reliability analysis of an energy-aware RAID system. 1-8 - Xiaomin Zhu, Chuan He, Jianjiang Wang:

Energy-efficient elastic scheduling in heterogeneous computing systems. 1-8
Internet
- Patricio A. Galdames, Qinghua Zheng, Ying Cai:

A subscription overlay network for large-scale and cost-efficient any source multicast. 1-8 - M. Engin Tozal, Kamil Saraç:

Subnet level network topology mapping. 1-8 - Dinil Mon Divakaran:

Using spikes to deal with elephants. 1-8 - Ning Jing, Ming Yang, Shaoyin Cheng, Qunfeng Dong, Hui Xiong:

An efficient SVM-based method for multi-class network traffic classification. 1-8
Fundamental Theory
- Shahin Kamali

, Pedram Ghodsnia, Khuzaima Daudjee:
Dynamic data allocation with replication in distributed systems. 1-8 - Zhi Zhang, Fei Li:

Optimizing energy consumption under flow and stretch constraints. 1-8 - Aleksi Penttinen, Esa Hyytiä

, Samuli Aalto
:
Energy-aware dispatching in parallel queues with on-off energy consumption. 1-8 - Tharwat Morsy, Jürgen Götze, Hamed Nassar

:
Using hidden convexity in structured communication problems. 1-7
Wireless Networks II
- Cherine Fathy

, Mahmoud T. El-Hadidi, Mohamad Abou El-Nasr:
Fuzzy-based adaptive cross layer routing protocol for mobile ad hoc networks. 1-10 - Yueming Duan, Shouling Ji, Zhipeng Cai:

Generalized broadcast scheduling in duty-cycle multi-hop wireless networks. 1-6 - Haoran Zhang, Liusheng Huang, Hongli Xu:

Cooperative optimal pricing for stochastic access control in heterogeneous wireless networks. 1-6 - Maulik Desai, Nicholas F. Maxemchuk:

A case for packet deflection in structured wireless topologies. 1-6
P2P and Streaming Systems
- Haibo Wu

, Hai Jiang, Jing Liu, Yi Sun, Jun Li, Zhongcheng Li:
How P2P live streaming systems scale quickly under a flash crowd? 1-8 - Jung Ki So, Douglas S. Reeves:

Adaptive neighbor management for cooperative P2P video-on-demand streaming. 1-10 - Christopher Jarabek, Mea Wang:

Can P2P help the cloud go green? 1-10 - Stamatia Rizou

, Frank Dürr
, Kurt Rothermel:
Fulfilling end-to-end latency constraints in large-scale streaming environments. 1-8
Sensor Networks II
- Jinbao Li, Xiaohang Guo, Longjiang Guo:

Joint routing, scheduling and channel assignment in multi-power multi-radio wireless sensor networks. 1-8 - Siddharth Kamath, Asis Nasipuri:

Integrated load balanced and energy aware routing in large scale wireless sensor networks. 1-8 - Yantao Li, Xin Qi, Zhen Ren, Gang Zhou, Di Xiao, Shaojiang Deng:

Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks. 1-8 - Abdelmajid Khelil

, Hanbin Chang, Neeraj Suri
:
Assessing the comparative effectiveness of map construction protocols in wireless sensor networks. 1-6
Security
- Ren Zhang

, Jianyu Zhang, Yu Chen, Nanhao Qin, Bingshuang Liu, Yuan Zhang:
Making eclipse attacks computationally infeasible in large-scale DHTs. 1-8 - Vivek Natarajan, Yi Yang, Sencun Zhu:

Resource-misuse attack detection in delay-tolerant networks. 1-8 - Nihat Altiparmak

, Ali Tekeoglu, Ali Saman Tosun:
DoS resilience of real time streaming protocol. 1-8 - Rodney Owens, Weichao Wang:

Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines. 1-8
Poster Session
- Pollawat Thanarungroj, Chen Liu

:
Power and energy consumption analysis on intel SCC many-core system. 1-2 - Gordana Gardasevic

, Dejan Stjepanovic, Aleksandar Damljanovic, Dejan Cvijanovic:
A SOA-based framework for cross-layer QoS adaptation in next generation networks. 1-2 - Muhammad Asif, Zhili Sun

, Haitham S. Cruickshank, Naveed Ahmad:
QoS assurance in MANETs using flow aware admission control - Multipath protocol. 1-2 - Ifeanyi P. Egwutuoha, David Levy, Bran Selic:

Evaluation of process level redundant checkpointing/restart for HPC systems. 1-2 - Yingjie Zhou, Guangmin Hu:

GNAED: A data mining framework for network-wide abnormal event detection in backbone networks. 1-2 - Mathias Fischer, Sebastian Delling, Sascha Grau, Guenter Schaefer:

Underlay-robust application layer multicast. 1-2 - Jagmohan Chauhan, Dwight J. Makaroff, Anthony J. Arkles:

VM clock synchronization measurements. 1-2 - Pingan Zhu, Jervis Pinto, Alan Fern, Thinh P. Nguyen:

Adaptation-based programming for network protocol design: An 802.11x case study (abstract). 1-2 - Saddam Quirem, Fahian Ahmed, Byeong Kil Lee:

CUDA acceleration of P7Viterbi algorithm in HMMER 3.0. 1-2 - Holly French, Jie Lin, Tung Phan, Amy Csizmar Dalal

:
Real time video QoE analysis of RTMP streams. 1-2
High Performance Computing
- Pablo Barrio, Carlos Carreras

:
Mesh traversal and sorting for efficient memory usage in scientific codes. 1-8 - Lena Mashayekhy, Daniel Grosu

:
A merge-and-split mechanism for dynamic virtual organization formation in grids. 1-8
Workshop: HOTWISEC I
- Antonio M. Carianha, Luciano Barreto, George Lima:

Improving location privacy in mix-zones for VANETs. 1-6 - Oliver Hanka:

The cost of location privacy in locator/identifier-split architectures. 1-6 - Swapnoneel Roy, Amlan K. Das, Yu Li:

Cryptanalysis and security enhancement of an advanced authentication scheme using smart cards, and a key agreement scheme for two-party communication. 1-7
Wireless Networks III
- Baljeet Malhotra, Ioanis Nikolaidis, Mario A. Nascimento, Stéphane Bressan:

Biased shortest path trees in wireless networks. 1-6 - Yi Yao, Bo Sheng

, Ningfang Mi:
DAT: An AP scheduler using dynamically adjusted time windows for crowded WLANs. 1-6 - Joseph Issa, Silvia Figueira:

Performance and power-consumption analysis of Mobile Internet Devices. 1-6
Workshop: HOTWISEC II
- John Solis, Philip Ginzboorg

, N. Asokan
, Jörg Ott:
Best-effort authentication for opportunistic networks. 1-6 - Mateus A. S. Santos, Cíntia B. Margi

:
Design and implementation of data survival in unattended wireless sensor networks. 1-6 - Yu Li:

A reputation system for wireless mesh network using multi-path routing protocol. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














