


default search action
33rd IPCCC 2014: Austin, TX, USA
- IEEE 33rd International Performance Computing and Communications Conference, IPCCC 2014, Austin, TX, USA, December 5-7, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7575-4

- Nick G. Duffield, Jie Wu:

Challenges and opportunities for analysis based research in big data. 1
Session 1: Internet
- Wei Liu, Ao Hong, Liang Ou, Wenchao Ding, Ge Zhang:

Prediction and correction of traffic matrix in an IP backbone network. 1-9 - Nazim Ahmed, Kamil Saraç:

Measuring path divergence in the Internet. 1-8 - Shijie Zhou, Weirong Jiang

, Viktor K. Prasanna:
A flexible and scalable high-performance OpenFlow switch on heterogeneous SoC platforms. 1-8 - Wenzhuo Li, Chuang Lin:

Design and analysis of fault tolerance mechanism for sparrow. 1-7 - Xu Yuan, Yi Shi

, Yiwei Thomas Hou
, Wenjing Lou, Scott F. Midkiff, Sastry Kompella
:
Achieving transparent coexistence in a multi-hop secondary network through distributed computation. 1-7
Session 2: Wireless Networks
- Fatima Furqan, Doan B. Hoang, Iain B. Collings

:
Effects of quality of service schemes on the capacity and dimensioning of LTE networks. 1-8 - Lijuan Cao, Michael Grabchak:

Smoothly truncated levy walks: Toward a realistic mobility model. 1-8 - Junze Han, Xiang-Yang Li, Taeho Jung, Jumin Zhao, Zenghua Zhao:

Network agile preference-based prefetching for mobile devices. 1-8 - Tommy Szalapski, Sanjay Madria:

Energy efficient distributed grouping and scaling for real-time data compression in sensor networks. 1-9 - Ali Dabirmoghaddam, J. J. Garcia-Luna-Aceves:

Proximity-driven social interactions and their impact on the throughput scaling of wireless networks. 1-10
Session 3: New Fields
- Waleed Alkohlani, Jeanine E. Cook, Jonathan E. Cook:

Accurate statistical performance modeling and validation of out-of-order processors using Monte Carlo methods. 1-10 - Mohamed Mahmoud, Kemal Akkaya, Khaled Rabieh, Samet Tonyali

:
An efficient certificate revocation scheme for large-scale AMI networks. 1-8 - Maocai Fu, Xin Li, Fan Li, Xinyu Guo, Zhili Wu:

TMODF: Trajectory-based multi-objective optimal data forwarding in vehicular networks. 1-8 - Liang Zhao, Wen-Zhan Song

:
A new multi-objective microgrid restoration via semidefinite programming. 1-8 - Ruiling Li, Fan Li, Xin Li, Yu Wang:

QGrid: Q-learning based routing protocol for vehicular ad hoc networks. 1-8
Session 4: Communications
- Shakeel S. Abdulla, Haewoon Nam, Jacob A. Abraham:

A novel algorithm for sparse FFT pruning and its applications to OFDMA technology. 1-7 - Zenghua Zhao, Xuanxuan Wu, Xin Zhang, Jing Zhao, Xiang-Yang Li:

ZigBee vs WiFi: Understanding issues and measuring performances of their coexistence. 1-8 - Lerato J. Mohapi, Simon Winberg, Michael Inggs

:
A domain-specific language to facilitate software defined radio parallel executable patterns deployment on heterogeneous architectures. 1-8 - Zenghua Zhao, Fucheng Zhang, Shaoping Guo, Xiang-Yang Li, Junze Han:

RainbowRate: MIMO rate adaptation in 802.11n WiLD links. 1-8
Session 5: Power Consumption
- Yasaman Samei Syahkal, Rainer Dömer:

Automated estimation of power consumption for rapid system level design. 1-8 - Luiz Henrique Nunes, Luis Hideo Vasconcelos Nakamura

, Heitor de Freitas Vieira, Rafael Mira De Oliveira Libardi, Edvard Martins de Oliveira
, Júlio Cezar Estrella, Stephan Reiff-Marganiec
:
Performance and energy evaluation of RESTful web services in Raspberry Pi. 1-9 - Jaemyoun Lee, Kyungtae Kang, Chang Song:

Analyzing I/O patterns for the design of energy-efficient image servers. 1-8 - Dawei Li

, Jie Wu, Zhiyong Liu, Fa Zhang:
Joint power optimization through VM placement and flow scheduling in data centers. 1-8 - S. M. Iftekharul Alam, David K. Y. Yau, Sonia Fahmy

:
ERUPT: Energy-efficient trustworthy provenance trees for wireless sensor networks. 1-10
Session 6: Computer Architecture
- Martin Alfranseder, Michael Deubzer, Benjamin Justus, Jürgen Mottok, Christian Siemers:

An efficient spin-lock based multi-core resource sharing protocol. 1-7 - Tosiron Adegbija, Ann Gordon-Ross, Marisha Rawlins:

Analysis of cache tuner architectural layouts for multicore embedded systems. 1-8 - Björn Barrefors, Ying Lu, Shivashis Saha, Jitender S. Deogun:

A novel thermal-constrained energy-aware partitioning algorithm for heterogeneous multiprocessor real-time systems. 1-8 - Yiqiang Ding, Wei Zhang

:
WCET analysis of static NUCA caches. 1-6 - Yu Wang, Mingwei Xu, Zhen Feng, Qing Li

, Qi Li:
Session-based access control in information-centric networks: Design and analyses. 1-8
Session 7: Data Storage and Distribution
- Pradeep Subedi, Ping Huang, Xubin He, Ming Zhang, Jizhong Han

:
A hybrid erasure-coded ECC scheme to improve performance and reliability of solid state drives. 1-8 - Myoungwon Oh

, Hyeonsang Eom, Heon Young Yeom:
Enhancing the I/O system for virtual machines using high performance SSDs. 1-8 - Jinjun Liu, Dan Feng, Yu Hua, Bin Peng, Pengfei Zuo

:
Application-aware video-sharing services via provenance in cloud storage. 1-8 - Chenkai Yang, Liusheng Huang, Bing Leng, Hongli Xu, Xinglong Wang:

Replica placement in content delivery networks with stochastic demands and M/M/1 servers. 1-8 - Martín A. Gagliotti Vigil

, Christian Weinert
, Denise Demirel, Johannes Buchmann:
An efficient time-stamping solution for long-term digital archiving. 1-8 - Tao Chen, Kai Lei

, Kuai Xu
:
An encryption and probability based access control model for named data networking. 1-8
Session 8: Cloud Computing
- Jiangtao Zhang, Zhixiang He, Hejiao Huang, Xuan Wang, Chonglin Gu, Lingmin Zhang:

SLA aware cost efficient virtual machines placement in cloud computing. 1-8 - Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu:

Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model. 1-8 - Ke Xu, Yuchao Zhang, Xuelin Shi, Haiyang Wang, Yong Wang, Meng Shen:

Online combinatorial double auction for mobile cloud computing markets. 1-8 - Zehao Sun, Zhenyu Zhu, Long Chen, Hongli Xu, Liusheng Huang:

A combinatorial double auction mechanism for cloud resource group-buying. 1-8 - Li Shi, Dimitrios Katramatos, Dantong Yu:

Virtual data center allocation with dynamic clustering in clouds. 1-10 - Yang Wang, Fudong Qiu, Fan Wu, Guihai Chen

:
Resisting label-neighborhood attacks in outsourced social networks. 1-8
Session 9: Security and Data Services
- Xinlei Wang, Hao Fu, Chao Xu, Prasant Mohapatra:

Provenance logic: Enabling multi-event based trust in mobile sensing. 1-8 - Yiming Pang, Yichen Chen, Peiyuan Liu

, Fudong Qiu, Fan Wu, Guihai Chen
:
POLA: A privacy-preserving protocol for location-based real-time advertising. 1-8 - Xiang Li, Na Ruan, Fan Wu, Jie Li

, Mengyuan Li:
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA. 1-8 - Yousuk Seung, Quan Leng, Wei Dong, Lili Qiu, Yin Zhang:

Randomized routing in multi-party internet video conferencing. 1-8 - Suk Kyu Lee, Hyunsoon Kim, Woonghee Lee

, Hwantae Kim, Jongtack Jung, Hwangnam Kim:
ReMA: Real-time 3D video streaming system for mobile devices. 1-8 - Hengky Susanto, Bhanu Kaushik, Benyuan Liu, Byung-Guk Kim:

Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devices. 1-8 - Yimao Wang, Yanmin Zhu, Ruobing Jiang

, Juan Li
:
Distributed compressive data gathering in low duty cycled wireless sensor networks. 1-8
Session 10: Social Networks and Theory
- Qian Yu, WeiTao Weng, Kai Zhang, Kai Lei

, Kuai Xu
:
Hot topic analysis and content mining in social media. 1-8 - Daniel Vijayakumar, Qusay H. Mahmoud

:
Evaluation of a platform for the provisioning of community-contributed web services. 1-8 - Jianwei Niu

, Shaluo Huang, Milica Stojmenovic:
Patterns and modeling of group growth in online social networks. 1-8 - Makoto Nakayama, Kenichi Yamazaki, Satoshi Tanaka, Hironori Kasahara

:
Parallelization of tree-to-TLV serialization. 1-8 - Jianwei Niu

, Jinyang Fan, Ivan Stojmenovic:
JLMC: A clustering method based on Jordan-Form of Laplacian-Matrix. 1-8 - Miao Song, Shuhui Li, Shangping Ren, Gang Quan

:
Delay-impact-based local deadline assignment for online scheduling of distributed soft real-time applications. 1-8 - Shuhui Li, Miao Song, Peng-Jun Wan, Shangping Ren:

Maximizing system's total accrued utility value for parallel and time-sensitive applications. 1-8
Session 11: Performance
- Nilufar Ferdous, Byeong Kil Lee, Eugene John

:
Performance enhancement in shared-memory multiprocessors using dynamically classified sharing information. 1-8 - Shufang Du, Longjiang Guo, Chunyu Ai, Meirui Ren, Hao Qu, Jinbao Li:

GPU acceleration of finding LPRs in DNA sequence based on SUA index. 1-8 - Reena Panda, Lizy Kurian John:

Data analytics workloads: Characterization and similarity analysis. 1-9
Session 12: Security and Trust
- Xiaoguang Niu, Meng Li, Qianyuan Chen, Qingqing Cao, Houzhen Wang:

EPPI: An E-cent-based privacy-preserving incentive mechanism for participatory sensing systems. 1-8 - Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiang-Yang Li, Yu Wang:

Continuous user identification via touch and movement behavioral biometrics. 1-8 - Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:

Secure data provenance compression using arithmetic coding in wireless sensor networks. 1-10 - Gilbert Breves Martins

, Rosiane de Freitas, Eduardo Souto:
Virtual structures and heterogeneous nodes in dependency graphs for detecting metamorphic malware. 1-8
Poster Session
- Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao:

Let more nodes have a second choice. 1-2 - Changhee Han, Junhee Ryu, Dongeun Lee, Jaemyoun Lee, Kyungtae Kang, Heonshik Shin:

File-system-level flash caching for improving application launch time on logical hybrid disks. 1-2 - Mariusz Slabicki

, Krzysztof Grochla
:
The automatic configuration of transmit power in LTE networks based on throughput estimation. 1-2 - Jinbo Xu, Weixia Xu, Kefei Wang, Zhengbin Pang:

Low-latency last-level cache structure based on grouped cores in Chip Multi-Processor. 1-2 - Tamer Abdou, Pankaj Kamthan:

A knowledge management approach for testing open source software systems. 1-2 - Timothy Matti, Yuntao Zhu, Kuai Xu

:
Financial fraud detection using social media crowdsourcing. 1-2 - Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:

Test oriented formal model of SDN applications. 1-2 - Kittipong Warasup, Masanori Hamamura:

An extended contention period protocol for MIMO wireless networks. 1-2 - Yanwei Wu, Yun Wang:

A portable flood detection system using heterogeneous sensor networks. 1-2 - Joseph Issa:

A novel method to estimate performance for a high performance computation workload. 1-2 - Miguel Ibarra, Ángel G. Andrade

, Marco A. Panduro
, Aldo Mendez:
Design of antenna arrays for isoflux radiation in satellite systems. 1-2 - Rosangela Melo, Maria Clara Bezerra, Jamilson Dantas, Rúbens de Souza Matos Júnior, Ivanildo José de Melo Filho

, Paulo Romero Martins Maciel:
Sensitivity analysis of availability of video streaming service in cloud computing. 1-2 - Xinchang Zhang, Weidong Gu, Lu Wang, Xiaomin Zhu, Meng Sun:

A centralized latency optimization solution for tree-based application layer multicast. 1-2 - Wei Zhou, Yun Gao, Jizhong Han

, Zhiyong Xu:
Marbor: A novel large-scale graph data storage and processing framework. 1-2 - Danda B. Rawat, Swetha Reddy Lenkala, Nimish Sharma, Sachin Shetty

:
Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systems. 1-2 - Mario J. Illera

, Sergio B. Sepulveda
:
Embedded system based on microcontroller for generating I-V curves of electronic devices. 1-2 - Hayala N. Curto, Artur Ziviani

, Josemar Alves Caetano, Carlos Henrique S. Malab, Jussara M. Almeida, Humberto T. Marques-Neto
:
Characterizing the workload dynamics of a mobile phone network during the FIFA 2014 World Cup. 1-2 - Alemayehu Mengste, Linwei Niu:

Reducing (m, k)-missing rate for overloaded real-time systems. 1-2 - Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao:

A hybrid link protection scheme for link-state routing networks. 1-2 - Seonghyun Kim, Hojae Lee

, Beom Kwon
, Inwoong Lee, Sanghoon Lee
:
Optimal phase control for joint transmission and reception with beamforming. 1-2 - Abdullah Al Hasib, Nikita Nikitin, Lasse Natvig:

Load scheduling in smart buildings with bidirectional energy trading. 1-2 - Benjamin Ries, Walter Unger, Maximilian Odendahl, Rainer Leupers:

A heuristic for logical data buffer allocation in multicore platforms. 1-2 - Saurabh Dey, Srinivas Sampalli, Qiang Ye

:
A light-weight authentication scheme based on message digest and location for mobile cloud computing. 1-2 - Chiheb Ben Ameur, Emmanuel Mory, Bernard Cousin

:
Shaping HTTP adaptive streams using receive window tuning method in home gateway. 1-2 - Hojae Lee

, Beom Kwon
, Seonghyun Kim, Inwoong Lee, Sanghoon Lee
:
Combinatorial JPT based on orthogonal beamforming for two-cell cooperation. 1-2 - Yijie Huangfu, Wei Zhang

:
Worst-case performance guaranteed data cache. 1-2 - Reshmi Mitra, Bharat S. Joshi, Ryan S. Adams:

Thread mapping using system-level throughput prediction model for shared memory multicores. 1-2 - Jeremiah D. Deng:

Empirical capacity modeling and evaluation of delay tolerant network routing protocols. 1-2 - Tiantian Ren, Xinli Huang:

A modified max-min ant colony optimization algorithm for virtual machines replacement in cloud datacenter§. 1-2 - Chok M. Yip, Abu Asaduzzaman:

A promising CUDA-accelerated vehicular area network simulator using NS-3. 1-2 - Ali Tekeoglu, Ali Saman Tosun:

Blackbox security evaluation of chromecast network communications. 1-2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














