default search action
33rd IPCCC 2014: Austin, TX, USA
- IEEE 33rd International Performance Computing and Communications Conference, IPCCC 2014, Austin, TX, USA, December 5-7, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7575-4
- Nick G. Duffield, Jie Wu:
Challenges and opportunities for analysis based research in big data. 1
Session 1: Internet
- Wei Liu, Ao Hong, Liang Ou, Wenchao Ding, Ge Zhang:
Prediction and correction of traffic matrix in an IP backbone network. 1-9 - Nazim Ahmed, Kamil Saraç:
Measuring path divergence in the Internet. 1-8 - Shijie Zhou, Weirong Jiang, Viktor K. Prasanna:
A flexible and scalable high-performance OpenFlow switch on heterogeneous SoC platforms. 1-8 - Wenzhuo Li, Chuang Lin:
Design and analysis of fault tolerance mechanism for sparrow. 1-7 - Xu Yuan, Yi Shi, Yiwei Thomas Hou, Wenjing Lou, Scott F. Midkiff, Sastry Kompella:
Achieving transparent coexistence in a multi-hop secondary network through distributed computation. 1-7
Session 2: Wireless Networks
- Fatima Furqan, Doan B. Hoang, Iain B. Collings:
Effects of quality of service schemes on the capacity and dimensioning of LTE networks. 1-8 - Lijuan Cao, Michael Grabchak:
Smoothly truncated levy walks: Toward a realistic mobility model. 1-8 - Junze Han, Xiang-Yang Li, Taeho Jung, Jumin Zhao, Zenghua Zhao:
Network agile preference-based prefetching for mobile devices. 1-8 - Tommy Szalapski, Sanjay Madria:
Energy efficient distributed grouping and scaling for real-time data compression in sensor networks. 1-9 - Ali Dabirmoghaddam, J. J. Garcia-Luna-Aceves:
Proximity-driven social interactions and their impact on the throughput scaling of wireless networks. 1-10
Session 3: New Fields
- Waleed Alkohlani, Jeanine E. Cook, Jonathan E. Cook:
Accurate statistical performance modeling and validation of out-of-order processors using Monte Carlo methods. 1-10 - Mohamed Mahmoud, Kemal Akkaya, Khaled Rabieh, Samet Tonyali:
An efficient certificate revocation scheme for large-scale AMI networks. 1-8 - Maocai Fu, Xin Li, Fan Li, Xinyu Guo, Zhili Wu:
TMODF: Trajectory-based multi-objective optimal data forwarding in vehicular networks. 1-8 - Liang Zhao, Wen-Zhan Song:
A new multi-objective microgrid restoration via semidefinite programming. 1-8 - Ruiling Li, Fan Li, Xin Li, Yu Wang:
QGrid: Q-learning based routing protocol for vehicular ad hoc networks. 1-8
Session 4: Communications
- Shakeel S. Abdulla, Haewoon Nam, Jacob A. Abraham:
A novel algorithm for sparse FFT pruning and its applications to OFDMA technology. 1-7 - Zenghua Zhao, Xuanxuan Wu, Xin Zhang, Jing Zhao, Xiang-Yang Li:
ZigBee vs WiFi: Understanding issues and measuring performances of their coexistence. 1-8 - Lerato J. Mohapi, Simon Winberg, Michael Inggs:
A domain-specific language to facilitate software defined radio parallel executable patterns deployment on heterogeneous architectures. 1-8 - Zenghua Zhao, Fucheng Zhang, Shaoping Guo, Xiang-Yang Li, Junze Han:
RainbowRate: MIMO rate adaptation in 802.11n WiLD links. 1-8
Session 5: Power Consumption
- Yasaman Samei Syahkal, Rainer Dömer:
Automated estimation of power consumption for rapid system level design. 1-8 - Luiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura, Heitor de Freitas Vieira, Rafael Mira De Oliveira Libardi, Edvard Martins de Oliveira, Júlio Cezar Estrella, Stephan Reiff-Marganiec:
Performance and energy evaluation of RESTful web services in Raspberry Pi. 1-9 - Jaemyoun Lee, Kyungtae Kang, Chang Song:
Analyzing I/O patterns for the design of energy-efficient image servers. 1-8 - Dawei Li, Jie Wu, Zhiyong Liu, Fa Zhang:
Joint power optimization through VM placement and flow scheduling in data centers. 1-8 - S. M. Iftekharul Alam, David K. Y. Yau, Sonia Fahmy:
ERUPT: Energy-efficient trustworthy provenance trees for wireless sensor networks. 1-10
Session 6: Computer Architecture
- Martin Alfranseder, Michael Deubzer, Benjamin Justus, Jürgen Mottok, Christian Siemers:
An efficient spin-lock based multi-core resource sharing protocol. 1-7 - Tosiron Adegbija, Ann Gordon-Ross, Marisha Rawlins:
Analysis of cache tuner architectural layouts for multicore embedded systems. 1-8 - Björn Barrefors, Ying Lu, Shivashis Saha, Jitender S. Deogun:
A novel thermal-constrained energy-aware partitioning algorithm for heterogeneous multiprocessor real-time systems. 1-8 - Yiqiang Ding, Wei Zhang:
WCET analysis of static NUCA caches. 1-6 - Yu Wang, Mingwei Xu, Zhen Feng, Qing Li, Qi Li:
Session-based access control in information-centric networks: Design and analyses. 1-8
Session 7: Data Storage and Distribution
- Pradeep Subedi, Ping Huang, Xubin He, Ming Zhang, Jizhong Han:
A hybrid erasure-coded ECC scheme to improve performance and reliability of solid state drives. 1-8 - Myoungwon Oh, Hyeonsang Eom, Heon Young Yeom:
Enhancing the I/O system for virtual machines using high performance SSDs. 1-8 - Jinjun Liu, Dan Feng, Yu Hua, Bin Peng, Pengfei Zuo:
Application-aware video-sharing services via provenance in cloud storage. 1-8 - Chenkai Yang, Liusheng Huang, Bing Leng, Hongli Xu, Xinglong Wang:
Replica placement in content delivery networks with stochastic demands and M/M/1 servers. 1-8 - Martín A. Gagliotti Vigil, Christian Weinert, Denise Demirel, Johannes Buchmann:
An efficient time-stamping solution for long-term digital archiving. 1-8 - Tao Chen, Kai Lei, Kuai Xu:
An encryption and probability based access control model for named data networking. 1-8
Session 8: Cloud Computing
- Jiangtao Zhang, Zhixiang He, Hejiao Huang, Xuan Wang, Chonglin Gu, Lingmin Zhang:
SLA aware cost efficient virtual machines placement in cloud computing. 1-8 - Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu:
Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model. 1-8 - Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen:
Online combinatorial double auction for mobile cloud computing markets. 1-8 - Zehao Sun, Zhenyu Zhu, Long Chen, Hongli Xu, Liusheng Huang:
A combinatorial double auction mechanism for cloud resource group-buying. 1-8 - Li Shi, Dimitrios Katramatos, Dantong Yu:
Virtual data center allocation with dynamic clustering in clouds. 1-10 - Yang Wang, Fudong Qiu, Fan Wu, Guihai Chen:
Resisting label-neighborhood attacks in outsourced social networks. 1-8
Session 9: Security and Data Services
- Xinlei Wang, Hao Fu, Chao Xu, Prasant Mohapatra:
Provenance logic: Enabling multi-event based trust in mobile sensing. 1-8 - Yiming Pang, Yichen Chen, Peiyuan Liu, Fudong Qiu, Fan Wu, Guihai Chen:
POLA: A privacy-preserving protocol for location-based real-time advertising. 1-8 - Xiang Li, Na Ruan, Fan Wu, Jie Li, Mengyuan Li:
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA. 1-8 - Yousuk Seung, Quan Leng, Wei Dong, Lili Qiu, Yin Zhang:
Randomized routing in multi-party internet video conferencing. 1-8 - Suk Kyu Lee, Hyunsoon Kim, Woonghee Lee, Hwantae Kim, Jongtack Jung, Hwangnam Kim:
ReMA: Real-time 3D video streaming system for mobile devices. 1-8 - Hengky Susanto, Bhanu Kaushik, Benyuan Liu, Byung-Guk Kim:
Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devices. 1-8 - Yimao Wang, Yanmin Zhu, Ruobing Jiang, Juan Li:
Distributed compressive data gathering in low duty cycled wireless sensor networks. 1-8
Session 10: Social Networks and Theory
- Qian Yu, WeiTao Weng, Kai Zhang, Kai Lei, Kuai Xu:
Hot topic analysis and content mining in social media. 1-8 - Daniel Vijayakumar, Qusay H. Mahmoud:
Evaluation of a platform for the provisioning of community-contributed web services. 1-8 - Jianwei Niu, Shaluo Huang, Milica Stojmenovic:
Patterns and modeling of group growth in online social networks. 1-8 - Makoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka, Hironori Kasahara:
Parallelization of tree-to-TLV serialization. 1-8 - Jianwei Niu, Jinyang Fan, Ivan Stojmenovic:
JLMC: A clustering method based on Jordan-Form of Laplacian-Matrix. 1-8 - Miao Song, Shuhui Li, Shangping Ren, Gang Quan:
Delay-impact-based local deadline assignment for online scheduling of distributed soft real-time applications. 1-8 - Shuhui Li, Miao Song, Peng-Jun Wan, Shangping Ren:
Maximizing system's total accrued utility value for parallel and time-sensitive applications. 1-8
Session 11: Performance
- Nilufar Ferdous, Byeong Kil Lee, Eugene John:
Performance enhancement in shared-memory multiprocessors using dynamically classified sharing information. 1-8 - Shufang Du, Longjiang Guo, Chunyu Ai, Meirui Ren, Hao Qu, Jinbao Li:
GPU acceleration of finding LPRs in DNA sequence based on SUA index. 1-8 - Reena Panda, Lizy Kurian John:
Data analytics workloads: Characterization and similarity analysis. 1-9
Session 12: Security and Trust
- Xiaoguang Niu, Meng Li, Qianyuan Chen, Qingqing Cao, Houzhen Wang:
EPPI: An E-cent-based privacy-preserving incentive mechanism for participatory sensing systems. 1-8 - Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, Yu Wang:
Continuous user identification via touch and movement behavioral biometrics. 1-8 - Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:
Secure data provenance compression using arithmetic coding in wireless sensor networks. 1-10 - Gilbert Breves Martins, Rosiane de Freitas, Eduardo Souto:
Virtual structures and heterogeneous nodes in dependency graphs for detecting metamorphic malware. 1-8
Poster Session
- Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao:
Let more nodes have a second choice. 1-2 - Changhee Han, Junhee Ryu, Dongeun Lee, Jaemyoun Lee, Kyungtae Kang, Heonshik Shin:
File-system-level flash caching for improving application launch time on logical hybrid disks. 1-2 - Mariusz Slabicki, Krzysztof Grochla:
The automatic configuration of transmit power in LTE networks based on throughput estimation. 1-2 - Jinbo Xu, Weixia Xu, Kefei Wang, Zhengbin Pang:
Low-latency last-level cache structure based on grouped cores in Chip Multi-Processor. 1-2 - Tamer Abdou, Pankaj Kamthan:
A knowledge management approach for testing open source software systems. 1-2 - Timothy Matti, Yuntao Zhu, Kuai Xu:
Financial fraud detection using social media crowdsourcing. 1-2 - Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:
Test oriented formal model of SDN applications. 1-2 - Kittipong Warasup, Masanori Hamamura:
An extended contention period protocol for MIMO wireless networks. 1-2 - Yanwei Wu, Yun Wang:
A portable flood detection system using heterogeneous sensor networks. 1-2 - Joseph Issa:
A novel method to estimate performance for a high performance computation workload. 1-2 - Miguel Ibarra, Ángel G. Andrade, Marco A. Panduro, Aldo Mendez:
Design of antenna arrays for isoflux radiation in satellite systems. 1-2 - Rosangela Melo, Maria Clara Bezerra, Jamilson Dantas, Rúbens de Souza Matos Júnior, Ivanildo José de Melo Filho, Paulo Romero Martins Maciel:
Sensitivity analysis of availability of video streaming service in cloud computing. 1-2 - Xinchang Zhang, Weidong Gu, Lu Wang, Xiaomin Zhu, Meng Sun:
A centralized latency optimization solution for tree-based application layer multicast. 1-2 - Wei Zhou, Yun Gao, Jizhong Han, Zhiyong Xu:
Marbor: A novel large-scale graph data storage and processing framework. 1-2 - Danda B. Rawat, Swetha Reddy Lenkala, Nimish Sharma, Sachin Shetty:
Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systems. 1-2 - Mario J. Illera, Sergio B. Sepulveda:
Embedded system based on microcontroller for generating I-V curves of electronic devices. 1-2 - Hayala N. Curto, Artur Ziviani, Josemar Alves Caetano, Carlos Henrique S. Malab, Jussara M. Almeida, Humberto T. Marques-Neto:
Characterizing the workload dynamics of a mobile phone network during the FIFA 2014 World Cup. 1-2 - Alemayehu Mengste, Linwei Niu:
Reducing (m, k)-missing rate for overloaded real-time systems. 1-2 - Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao:
A hybrid link protection scheme for link-state routing networks. 1-2 - Seonghyun Kim, Hojae Lee, Beom Kwon, Inwoong Lee, Sanghoon Lee:
Optimal phase control for joint transmission and reception with beamforming. 1-2 - Abdullah Al Hasib, Nikita Nikitin, Lasse Natvig:
Load scheduling in smart buildings with bidirectional energy trading. 1-2 - Benjamin Ries, Walter Unger, Maximilian Odendahl, Rainer Leupers:
A heuristic for logical data buffer allocation in multicore platforms. 1-2 - Saurabh Dey, Srinivas Sampalli, Qiang Ye:
A light-weight authentication scheme based on message digest and location for mobile cloud computing. 1-2 - Chiheb Ben Ameur, Emmanuel Mory, Bernard Cousin:
Shaping HTTP adaptive streams using receive window tuning method in home gateway. 1-2 - Hojae Lee, Beom Kwon, Seonghyun Kim, Inwoong Lee, Sanghoon Lee:
Combinatorial JPT based on orthogonal beamforming for two-cell cooperation. 1-2 - Yijie Huangfu, Wei Zhang:
Worst-case performance guaranteed data cache. 1-2 - Reshmi Mitra, Bharat S. Joshi, Ryan S. Adams:
Thread mapping using system-level throughput prediction model for shared memory multicores. 1-2 - Jeremiah D. Deng:
Empirical capacity modeling and evaluation of delay tolerant network routing protocols. 1-2 - Tiantian Ren, Xinli Huang:
A modified max-min ant colony optimization algorithm for virtual machines replacement in cloud datacenter§. 1-2 - Chok M. Yip, Abu Asaduzzaman:
A promising CUDA-accelerated vehicular area network simulator using NS-3. 1-2 - Ali Tekeoglu, Ali Saman Tosun:
Blackbox security evaluation of chromecast network communications. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.