


default search action
IPCCC 2013: San Diego, CA, USA
- IEEE 32nd International Performance Computing and Communications Conference, IPCCC 2013, San Diego, CA, USA, December 6-8, 2013. IEEE Computer Society 2013

- Nhan Nguyen, Mohammad Maifi Hasan Khan:

Performance analysis of a fault-tolerant exact motif mining algorithm on the cloud. 1-9 - Zhipeng Cai, Zhiqiang Lin:

Message from the IPCCC 2013 technical program chairs. 1 - Yu Wang, Kuai Xu

:
Message from the IPCCC 2013 general chairs. 1
Session 1: System Optimization
- Wei Yan, Vinod Muthusamy, Mingwen Chen, Yonghong Huang, Zheng Xiao, Xubin Pei, Songlin Hu

:
Queue reorganization for subscription congestion avoidance in publish/subscribe systems. 1-10 - Li Tan, Zizhong Chen

, Ziliang Zong, Dong Li, Rong Ge:
A2E: Adaptively aggressive energy efficient DVFS scheduling for data intensive applications. 1-10 - Guangping Xu

, Sheng Lin, Hua Zhang, Xing Guo, Kai Shi:
Expander code: A scalable erasure-resilient code to keep up with data growth in distributed storage. 1-9 - Dannie M. Stanley, Dongyan Xu, Eugene H. Spafford

:
Improved kernel security through memory layout randomization. 1-10 - Brian Romoser, Ziliang Zong, Ribel Fares, Joal Wood, Rong Ge:

Using intelligent prefetching to reduce the energy consumption of a large-scale storage system. 1-9
Session 2: Performance Analysis
- Lan Wu, Wei Zhang

:
Reducing worst-case execution time of hybrid SPM-caches. 1-9 - Xu Ye, Bo Yan, Guanling Chen:

Providing diagnostic network feedback to end users on smartphones. 1-9 - Mingyang Wang, Yiming Hu:

Exploit real-time fine-grained access patterns to partition write buffer to improve SSD performance and life-span. 1-7 - Kurt Van Hautegem, Wouter Rogiest, Herwig Bruneel:

OPS/OBS scheduling algorithms: Incorporating a wavelength conversion cost in the performance analysis. 1-9
Session 3: Network Protocol
- Dongsoo Kim, Eric C. Noel, K. Wendy Tang:

Reliable and efficient routing protocol for graph theory based communication topology. 1-10 - Mihaela Cardei, Amalya Mihnea:

Distributed protocol for channel assignment in cognitive wireless sensor networks. 1-9 - Ashok N. Masilamani, Ali Dabirmoghaddam, J. J. Garcia-Luna-Aceves:

CSIR: Cellular scheduling with Interest-driven Routing. 1-10 - Jinbao Li, Zhigang Wang, Longjiang Guo:

A novel multi-radio MAC protocol based union mechanism in wireless sensor networks. 1-8
Session 4: Wireless Networks
- Yali Wang, J. J. Garcia-Luna-Aceves:

Minimizing routing overhead with Two-Hop Coordinate Awareness in ad hoc networks. 1-9 - Rumi Ghosh, J. J. Garcia-Luna-Aceves:

Automatic incremental routing using multiple roots. 1-9 - Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, Hejiao Huang:

Rumor restriction in Online Social Networks. 1-10 - Xian Chen, Lester Lipsky, Kyoungwon Suh, Bing Wang, Wei Wei:

Session lengths and IP address usage of smartphones in a university campus WiFi network: Characterization and analytical models. 1-9
Session 5: Cloud Computing
- Ethan Blanton, Mehmet Engin Tozal, Kamil Saraç, Sonia Fahmy

:
Location matters: Eliciting responses to direct probes. 1-10 - Zhangjie Fu, Xingming Sun, Zhihua Xia

, Lu Zhou, Jiangang Shu
:
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. 1-8 - Saurabh Dey, Srinivas Sampalli, Qiang Ye

:
Message digest as authentication entity for mobile cloud computing. 1-6 - Wei Yan, Yuan Xue, Bradley A. Malin

:
Scalable load balancing for mapreduce-based record linkage. 1-10
Session 6: System Analysis
- Bahman Javadi, Kenan M. Matawie

, David P. Anderson:
Modeling and analysis of resources availability in volunteer computing systems. 1-9 - Emrah Çem, Mehmet Engin Tozal, Kamil Saraç:

Impact of sampling design in estimation of graph characteristics. 1-10 - Ivan Zecena, Martin Burtscher, Tongdan Jin, Ziliang Zong:

Evaluating the performance and energy efficiency of n-body codes on multi-core CPUs and GPUs. 1-8 - Jonathan Kirchhoff, Jan Bauer, Raphael Ernst, Christoph Fuchs, Sascha Jopen, Nils Aschenbruck:

Extending ODMRP for on-site deployments in disaster area scenarios. 1-10
Session 7: Social Networks
- Bow-Nan Cheng, James Wheeler, Brian Hung, Scott Moore, Prasanna Sukumar:

A comparison of IP header compression schemes in MANETs. 1-9 - Jing He, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah

:
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences. 1-8 - Guoliang Liu, Janani Krishnamani, Rajshekhar Sunderraman, Yingshu Li

:
Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks. 1-7 - Fan Li, Hong Jiang, Yu Wang, Xin Li, Mingzhong Wang

, Tabouche Abdeldjalil
:
SEBAR: Social Energy Based Routing scheme for mobile social Delay Tolerant Networks. 1-8
Session 8: Resource Management
- Mohamed Said Seddiki, Bilel Nefzi, Ye-Qiong Song

, Mounir Frikha
:
Automated controllers for bandwidth allocation in network virtualization. 1-7 - Shuo Chen, Xiaoming Li:

A hybrid GPU/CPU FFT library for large FFT problems. 1-10 - Peng Yang, Ertong Zhang, Lisong Xu:

Sizing router buffer for the Internet with heterogeneous TCP. 1-9 - Dongliang Chu, Chase Qishi Wu, Jinzhu Gao, Li Wang:

On a generalized approach to order-independent image composition in parallel visualization. 1-10
Poster Session
- Guangping Xu

, Xing Guo, Hua Zhang, Sheng Lin, Chunxia Yang:
Optimization for reliable erasure-coded storage allocation under multiple constraints. 1-2 - Kathlene Hurt, Byeong Kil Lee:

Proposed enhancements to fixed segmented LRU cache replacement policy. 1-2 - Nemroud Youssouf, Xin Li, Fan Li, Huiying Yuan:

Magnetic field modeling-based energy efficient routing in wireless sensor networks. 1-2 - Zheng Wang, An-Lei Hu:

Predicting DNS Server Load Distribution. 1-2 - Zheng Wang, An-Lei Hu:

A lightweight solution to remote DNS. 1-3 - Wei Zhang:

Defend GPUs against DoS attacks. 1-2 - Zaid Hijaz, Victor S. Frost:

The impact of interference from a covert link on a data link using OFDM, AMC, and hybrid ARQ. 1-2 - Wenjia Li

, Lindah Kotut:
Trustworthy data management for wireless networks in Cyber-Physical Systems. 1-2 - Silvia Elena Restrepo

, Philippe Pinaud, Jorge E. Pezoa, Sergio K. Sobarzo:
Energy-aware image allocation for distributed video processing on handheld devices. 1-2 - José Núñez-Martínez, Jorge Baranda, Josep Mangues-Bafalluy

:
Backpressure routing for the backhaul in sparse small cell deployments. 1-2 - Liliana F. B. Soares, Diogo A. B. Fernandes, Mário M. Freire

, Pedro R. M. Inácio
:
Secure user authentication in cloud computing management interfaces. 1-2 - Christian Horn, Jörg Krüger:

Enhanced infrastructure security through inter-level anomaly detection. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














