


default search action
IEEE Transactions on Parallel and Distributed Systems, Volume 20
Volume 20, Number 1, January 2009
- Lee Kee Goh, Bharadwaj Veeravalli, Sivakumar Viswanathan:

Design of Fast and Efficient Energy-Aware Gradient-Based Scheduling Algorithms Heterogeneous Embedded Multiprocessor Systems. 1-12 - Alejandro Martínez, Pedro Javier García

, Francisco José Alfaro
, José L. Sánchez
, José Flich
, Francisco J. Quiles
, José Duato
:
A Switch Architecture Guaranteeing QoS Provision and HOL Blocking Elimination. 13-24 - Iain A. Stewart

, Yonghong Xiang:
Bipanconnectivity and Bipancyclicity in k-ary n-cubes. 25-33 - Shushan Wen, Yuguang Fang

, Hairong Sun:
Differentiated Bandwidth Allocation with TCP Protection in Core Routers. 34-47 - Chin-Fu Kuo, Ai-Chun Pang, Sheng-Kun Chan:

Dynamic Routing with Security Considerations. 48-58 - Jian-Guang Luo, Qian Zhang

, Yun Tang, Shi-Qiang Yang:
A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service. 59-70 - Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni:

Difficulty-Aware Hybrid Search in Peer-to-Peer Networks. 71-82 - Ke Chen, Kai Hwang, Gang Chen:

Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. 83-96 - Meng Zhang, Yongqiang Xiong, Qian Zhang

, Lifeng Sun, Shiqiang Yang:
Optimizing the Throughput of Data-Driven Peer-to-Peer Streaming. 97-110 - Sumantra R. Kundu, Sourav Pal, Kalyan Basu, Sajal K. Das

:
An Architectural Framework for Accurate Characterization of Network Traffic. 111-123 - Maleq Khan, Gopal Pandurangan

, V. S. Anil Kumar:
Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks. 124-139
Volume 20, Number 2, February 2009
- Donghyun Kim, Yiwei Wu, Yingshu Li

, Feng Zou, Ding-Zhu Du:
Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks. 147-157 - Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi

:
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. 158-170 - Jie Gao, Li Zhang:

Trade-Offs between Stretch Factor and Load-Balancing Ratio in Routing on Growth-Restricted Graphs. 171-179 - Maria Chtepen, Filip H. A. Claeys, Bart Dhoedt, Filip De Turck

, Piet Demeester, Peter A. Vanrolleghem
:
Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids. 180-190 - Alper Tugay Mizrak, Stefan Savage, Keith Marzullo:

Detecting Malicious Packet Losses. 191-206 - Menno Dobber, Robert D. van der Mei, Ger Koole

:
Dynamic Load Balancing and Job Replication in a Global-Scale Grid Environment: A Comparison. 207-218 - Zhen Yang, Huadong Ma:

Hotspot Avoidance for P2P Streaming Distribution Application: A Game Theoretic Approach. 219-232 - Hui Guo, Kwok-Tung Lo, Yi Qian, Jiang Li:

Peer-to-Peer Live Video Distribution under Heterogeneous Bandwidth Constraints. 233-245 - Azzedine Boukerche, YunFeng Gu:

An Efficient Adaptive Transmission Control Scheme for Large-Scale Distributed Simulation Systems. 246-260 - Guangming Tan, Ninghui Sun, Guang R. Gao:

Improving Performance of Dynamic Programming via Parallelism and Locality on Multicore Architectures. 261-274 - Qiang Wei, Matei Ripeanu, Konstantin Beznosov:

Cooperative Secondary Authorization Recycling. 275-288
Volume 20, Number 3, March 2009
- Hwangnam Kim, E-yong Kim:

PReSENt: A Collaboration Framework for Resource Sharing in Wireless Mesh Networks. 289-302 - Chen Wang

, Bing Bing Zhou
, Albert Y. Zomaya
:
A Decentralized Method for Scaling Up Genome Similarity Search Services. 303-315 - Maurizio Palesi, Rickard Holsmark, Shashi Kumar, Vincenzo Catania:

Application Specific Routing Algorithms for Networks on Chip. 316-330 - Shuyi Shao, Alex K. Jones

, Rami G. Melhem:
Compiler Techniques for Efficient Communications in Circuit Switched Networks for Multiprocessor Systems. 331-345 - Samee Ullah Khan

, Ishfaq Ahmad:
A Cooperative Game Theoretical Technique for Joint Optimization of Energy Consumption and Response Time in Computational Grids. 346-360 - Weidong Chen, Wenjun Xiao, Behrooz Parhami:

Swapped (OTIS) Networks Built of Connected Basis Networks Are Maximally Fault Tolerant. 361-366 - Sun-Yuan Hsieh, Tsung-Yen Chuang:

The Strong Diagnosability of Regular Networks and Product Networks under the PMC Model. 367-378 - Savio S. H. Tse:

Online Bicriteria Load Balancing Using Object Reallocation. 379-388 - Hui Wang, Rama Sangireddy, Sandeep Baldawa:

Optimizing Instruction Scheduling through Combined In-Order and O-O-O Execution in SMT Processors. 389-403 - Eduard Ayguadé

, Nawal Copty, Alejandro Duran, Jay P. Hoeflinger, Yuan Lin, Federico Massaioli, Xavier Teruel
, Priya Unnikrishnan, Guansong Zhang:
The Design of OpenMP Tasks. 404-418 - Alysson Neves Bessani

, Miguel Correia
, Joni da Silva Fraga, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces. 419-432
Volume 20, Number 4, April 2009
- Cong Liu, Jie Wu:

Virtual-Force-Based Geometric Routing Protocol in MANETs. 433-445 - Ramsés Morales, Indranil Gupta:

AVMON: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems. 446-459 - Yawei Li, Zhiling Lan, Prashasta Gujrati, Xian-He Sun:

Fault-Aware Runtime Strategies for High-Performance Computing. 460-473 - Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya

, Paria Moinzadeh:
Detecting Threats in Star Graphs. 474-483 - Wickus Nienaber, Xin Yuan, Zhenhai Duan:

LID Assignment in InfiniBand Networks. 484-497 - Georgios I. Goumas, Nikolaos Drosinos, Nectarios Koziris:

Communication-Aware Supernode Shape. 498-511 - Mudhakar Srivatsa, Ling Liu:

Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach. 512-527 - Yuan He, Yunhao Liu:

VOVO: VCR-Oriented Video-on-Demand in Large-Scale Peer-to-Peer Networks. 528-539 - Ye Zhu, Riccardo Bettati:

Information Leakage as a Model for Quality of Anonymity Networks. 540-552 - Marko Bertogna

, Michele Cirinei, Giuseppe Lipari
:
Schedulability Analysis of Global Scheduling Algorithms on Multiprocessor Platforms. 553-566 - Yang Xiang

, Wanlei Zhou
, Minyi Guo:
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. 567-580 - Sun-Yuan Hsieh, Chia-Wei Lee

:
Conditional Edge-Fault Hamiltonicity of Matching Composition Networks. 581-592
Volume 20, Number 5, May 2009
- Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:

Effect of Network Quality on Player Departure Behavior in Online Games. 593-606 - Abdelmounaam Rezgui, Mohamed Eltoweissy:

µRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks. 607-622 - Konstantinos Kyriakopoulos, Kleanthis Psarris:

Nonlinear Symbolic Analysis for Advanced Program Parallelization. 623-640 - Yichuan Jiang, Jiuchuan Jiang:

Contextual Resource Negotiation-Based Task Allocation and Load Balancing in Complex Software Systems. 641-653 - Tsungnan Lin

, Pochiang Lin, Hsinping Wang, Chia Hung Chen:
Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks. 654-666 - Hasan Guclu

, Murat Yuksel:
Limited Scale-Free Overlay Topologies for Unstructured Peer-to-Peer Networks. 667-679 - John Risson, Aaron Harwood

, Tim Moors:
Topology Dissemination for Reliable One-Hop Distributed Hash Tables. 680-694 - Xinwen Fu

, Wei Yu
, Shu Jiang, Steve Graham, Yong Guan:
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis. 695-709 - Feng Wang, Mounir Hamdi

, Jogesh K. Muppala
:
Using Parallel DRAM to Scale Router Buffers. 710-724 - Kang Li, Zhenyu Zhong, Lakshmish Ramaswamy:

Privacy-Aware Collaborative Spam Filtering. 725-739 - Hongzi Zhu, Minglu Li, Yanmin Zhu, Lionel M. Ni:

HERO: Online Real-Time Vehicle Tracking. 740-752
Volume 20, Number 6, June 2009
- Weigang Wu, Jiannong Cao

, Michel Raynal:
Eventual Clusterer: A Modular Approach to Designing Hierarchical Consensus Protocols in MANETs. 753-765 - Alex X. Liu, Mohamed G. Gouda:

Firewall Policy Queries. 766-777 - Achour Mostéfaoui, Michel Raynal, Gilles Trédan:

On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System. 778-787 - Jinoh Kim, Abhishek Chandra, Jon B. Weissman:

Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems. 788-801 - Crispín Gómez Requena, María Engracia Gómez Requena

, Pedro Juan López Rodríguez, J. F. D. Marin:
FT2EI: A Dynamic Fault-Tolerant Routing Methodology for Fat Trees with Exclusion Intervals. 802-817 - Lotfi Mhamdi

:
On the Integration of Unicast and Multicast Cell Scheduling in Buffered Crossbar Switches. 818-830 - Michael Brinkmeier, Günter Schäfer, Thorsten Strufe:

Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming. 831-844 - Hyeonjoong Cho, Binoy Ravindran

, Chewoo Na:
Garbage Collector Scheduling in Dynamic, Multiprocessor Real-Time Systems. 845-856 - Doruk Bozdag, Füsun Özgüner, Ümit V. Çatalyürek

:
Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling. 857-871 - Habib M. Ammari, Sajal K. Das

:
Critical Density for Coverage and Connectivity in Three-Dimensional Wireless Sensor Networks Using Continuum Percolation. 872-885 - Hongbin Chen, C. K. Michael Tse

, Jiuchao Feng:
Impact of Topology on Performance and Energy Efficiency in Wireless Sensor Networks for Source Extraction. 886-897 - Weijun Xiao, Jin Ren, Qing Yang:

A Case for Continuous Data Protection at Block Level in Disk Array Storages. 898-911
Volume 20, Number 7, July 2009
- Mehmet Baysan

, Kamil Saraç, R. Chandrasekaran, Sergey Bereg:
A Polynomial Time Solution to Minimum Forwarding Set Problem in Wireless Networks under Unit Disk Coverage Model. 913-924 - Ying Zhu, Baochun Li, Ken Q. Pu:

Dynamic Multicast in Overlay Networks with Linear Capacity Constraints. 925-939 - Pierre-François Dutot, Tchimou N'Takpé, Frédéric Suter

, Henri Casanova:
Scheduling Parallel Task Graphs on (Almost) Homogeneous Multicluster Platforms. 940-952 - Nirmalya Roy, Sajal K. Das

:
Enhancing Availability of Grid Computational Services to Ubiquitous Computing Applications. 953-967 - Thomas Repantis, Xiaohui Gu, Vana Kalogeraki

:
QoS-Aware Shared Component Composition for Distributed Stream Processing Systems. 968-982 - Edi Shmueli, Dror G. Feitelson

:
On Simulation and Design of Parallel-Systems Schedulers: Are We Doing the Right Thing? 983-996 - John Paul Walters, Vipin Chaudhary

:
Replication-Based Fault Tolerance for MPI Applications. 997-1010 - Bithika Khargharia, Salim Hariri, Mazin S. Yousif:

An Adaptive Interleaving Technique for Memory Performance-per-Watt Management. 1011-1022 - Hung-Chang Hsiao, Yung-Chih Lin, Hao Liao:

Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures. 1023-1037 - Wenbin Zhu, Patrick G. Bridges

, Arthur B. Maccabe
:
Lightweight Online Performance Monitoring and Tuning with Embedded Gossip. 1038-1049 - Daojing He

, Lin Cui, Hejiao Huang, Maode Ma:
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks. 1050-1058 - Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert:

An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences. 1059-1072
Volume 20, Number 8, August 2009
- Laxmi N. Bhuyan:

Editor's Note. 1073-1074 - Michal Feldman, Kevin Lai, Li Zhang:

The Proportional-Share Allocation Market for Computational Resources. 1075-1088 - Nandan Garg, Daniel Grosu

:
A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions. 1089-1101 - Husni Hamad E. Al-Mistarihi, Chan Huah Yong:

On Fairness, Optimizing Replica Selection in Data Grids. 1102-1111 - Ibrahim Al-Oqily

, Ahmed Karmouch:
SORD: A Fault-Resilient Service Overlay for MediaPort Resource Discovery. 1112-1125 - Hiroki Matsutani, Michihiro Koibuchi, Yutaka Yamada, D. Frank Hsu, Hideharu Amano:

Fat H-Tree: A Cost-Efficient Tree-Based On-Chip Network. 1126-1141 - Xuejun Yang, Xiaobo Yan, Zuocheng Xing, Yu Deng, Jiang Jiang, Jing Du, Ying Zhang:

Fei Teng 64 Stream Processing System: Architecture, Compiler, and Programming. 1142-1157 - Nagavijayalakshmi Vydyanathan, Sriram Krishnamoorthy

, Gerald M. Sabin, Ümit V. Çatalyürek
, Tahsin M. Kurç, P. Sadayappan, Joel H. Saltz:
An Integrated Approach to Locality-Conscious Processor Allocation and Scheduling of Mixed-Parallel Applications. 1158-1172 - Anders Gidenstam, Marina Papatriantafilou

, Håkan Sundell, Philippas Tsigas
:
Efficient and Reliable Lock-Free Memory Reclamation Based on Reference Counting. 1173-1187 - Kranthi K. Mamidisetty, Minlan Duan, Shivakumar Sastry, P. S. Sastry:

Multipath Dissemination in Regular Mesh Topologies. 1188-1201 - Murat Demirbas, Xuming Lu, Puneet Singla

:
An In-Network Querying Framework for Wireless Sensor Networks. 1202-1215 - Ferruccio Barsi, Alan A. Bertossi, Francesco Betti Sorbelli

, Roberto Ciotti, Stephan Olariu, Maria Cristina Pinotti
:
Asynchronous Corona Training Protocols in Wireless Sensor and Actor Networks. 1216-1230
Volume 20, Number 9, September 2009
- Chih-Wei Yi

:
A Unified Analytic Framework Based on Minimum Scan Statistics for Wireless Ad Hoc and Sensor Networks. 1233-1245 - Paul Groth

, Luc Moreau
:
Recording Process Documentation for Provenance. 1246-1259 - Ann L. Chervenak, Robert Schuler, Matei Ripeanu, Muhammad Ali Amer, Shishir Bharathi, Ian T. Foster, Adriana Iamnitchi

, Carl Kesselman
:
The Globus Replica Location Service: Design and Experience. 1260-1272 - Young Choon Lee

, Riky Subrata, Albert Y. Zomaya
:
On the Performance of a Dual-Objective Optimization Model for Workflow Applications on Grid Platforms. 1273-1284 - Salvador Coll, Francisco J. Mora, José Duato

, Fabrizio Petrini:
Efficient and Scalable Hardware-Based Multicast in Fat-Tree Networks. 1285-1298 - Zongpeng Li, Carey L. Williamson:

Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows. 1299-1308 - Jaejin Lee, Changhee Jung, Daeseob Lim, Yan Solihin:

Prefetching with Helper Threads for Loosely Coupled Multiprocessor Systems. 1309-1324 - Cong Liu, Jie Wu:

Scalable Routing in Cyclic Mobile Networks. 1325-1338 - Pedro Fonseca, Rodrigo Rodrigues

, Anjali Gupta, Barbara Liskov:
Full-Information Lookups for Peer-to-Peer Overlays. 1339-1351 - Yong Ding, Chen Wang, Li Xiao:

An Adaptive Partitioning Scheme for Sleep Scheduling and Topology Control in Wireless Sensor Networks. 1352-1365 - Ameer Ahmed Abbasi, Mohamed F. Younis

, Kemal Akkaya:
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks. 1366-1379 - Oh-Heum Kwon, Ha-Joo Song, Sangjoon Park:

The Effects of Stitching Orders in Patch-and-Stitch WSN Localization Algorithms. 1380-1391
Volume 20, Number 10, October 2009
- Xiaoying Zheng, Feng Chen, Ye Xia, Yuguang Fang

:
A Class of Cross-Layer Optimization Algorithms for Performance and Complexity Trade-Offs in Wireless Networks. 1393-1407 - Xiang-Yang Li, Yu Wang

, Haiming Chen, Xiaowen Chu
, Yanwei Wu, Yong Qi:
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links. 1408-1421 - James Caverlee, Steve Webb, Ling Liu, William B. Rouse:

A Parameterized Approach to Spam-Resilient Link Analysis of the Web. 1422-1438 - Sangeetha Seshadri, Vibhore Kumar, Brian F. Cooper, Ling Liu:

A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment. 1439-1453 - David Sun, Chengzheng Sun:

Context-Based Operational Transformation in Distributed Collaborative Editing Systems. 1454-1470 - Xuejun Yang, Yunfei Du

, Panfeng Wang, Hongyi Fu, Jia Jia:
FTPA: Supporting Fault-Tolerant Parallel Computing through Parallel Recomputing. 1471-1486 - Krishna P. N. Puttaswamy, Heather Zheng, Ben Y. Zhao:

Securing Structured Overlays against Identity Attacks. 1487-1498 - György Dán, Viktória Fodor:

Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming. 1499-1511 - Mark Kai Ho Yeung, Yu-Kwong Kwok:

On Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming. 1512-1525 - Haibo Zhang

, Hong Shen:
Balancing Energy Consumption to Maximize Network Lifetime in Data-Gathering Sensor Networks. 1526-1539 - Yun Wang, Xiaodong Wang, Demin Wang, Dharma P. Agrawal:

Range-Free Localization Using Expected Hop Progress in Wireless Sensor Networks. 1540-1552
Volume 20, Number 11, November 2009
- Amit Banerjee

, Chung-Ta King:
Building Ring-Like Overlays on Wireless Ad Hoc and Sensor Networks. 1553-1566 - Chryssis Georgiou

, Peter M. Musial, Alexander A. Shvartsman
:
Developing a Consistent Domain-Oriented Distributed Object Service. 1567-1585 - Nitin Auluck, Dharma P. Agrawal:

Enhancing the Schedulability of Real-Time Heterogeneous Networks of Workstations (NOWs). 1586-1599 - Abhinav Sarje, Srinivas Aluru:

Parallel Genomic Alignments on the Cell Broadband Engine. 1600-1610 - Wei Yu

, Xun Wang, Xinwen Fu
, Dong Xuan, Wei Zhao
:
An Invisible Localization Attack to Internet Threat Monitors. 1611-1625 - Jing Chen, Jianping Wang

, Hui Yu, Si-Qing Zheng:
Opportunistic Optical Hyperchannel and Its Distributed QoS Assuring Access Control. 1626-1640 - Pan Li

, Nicola Scalabrino, Yuguang Fang
, Enrico Gregori, Imrich Chlamtac:
How to Effectively Use Multiple Channels in Wireless Mesh Networks. 1641-1652 - Yunfeng Lin, Ben Liang

, Baochun Li:
Priority Random Linear Codes in Distributed Storage Systems. 1653-1667 - Hung-Chang Hsiao, Hao Liao, Cheng-Chyun Huang:

Resolving the Topology Mismatch Problem in Unstructured Peer-to-Peer Networks. 1668-1681 - Kannan Rajah, Sanjay Ranka

, Ye Xia:
Advance Reservations and Scheduling for Bulk Transfers in Research Networks. 1682-1697 - Riaz Ahmed Shaikh

, Hassan Jameel, Brian J. d'Auriol
, Heejo Lee, Sungyoung Lee, Young Jae Song:
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. 1698-1712
Volume 20, Number 12, December 2009
- Laxmi N. Bhuyan:

Editorial: EIC Farewell and New EIC Introduction. 1713 - Xiuduan Fang, Malathi Veeraraghavan:

A Hybrid Network Architecture for File Transfers. 1714-1725 - Sheng-Hsiung Chen, Ting-Lu Huang:

Bounded-Bypass Mutual Exclusion with Minimum Number of Registers. 1726-1737 - Sylvain Dahan, Laurent Philippe, Jean-Marc Nicod:

The Distributed Spanning Tree Structure. 1738-1751 - Xudong Shi, Feiqi Su, Jih-Kwon Peir, Ye Xia, Zhen Yang:

Modeling and Stack Simulation of CMP Cache Capacity and Accessibility. 1752-1763 - Keke Chen, Ling Liu:

Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation. 1764-1776 - Mikhail Nesterenko, Sébastien Tixeuil:

Discovering Network Topology in the Presence of Byzantine Faults. 1777-1789 - Hongbin Luo, Yajuan Qin, Hongke Zhang:

A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet. 1790-1802 - Kevin R. B. Butler

, Sunam Ryu, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. 1803-1815 - Xiaowen Chu

, Kaiyong Zhao, Zongpeng Li, Anirban Mahanti:
Auction-Based On-Demand P2P Min-Cost Media Streaming with Network Coding. 1816-1829 - Kenneth M. Hopkinson, Kate Jenkins, Kenneth P. Birman

, James S. Thorp, Gregory Toussaint, Manu Parashar:
Adaptive Gravitational Gossip: A Gossip-Based Communication Protocol with User-Selectable Rates. 1830-1843 - Moustafa A. Youssef

, Adel M. Youssef, Mohamed F. Younis
:
Overlapping Multihop Clustering for Wireless Sensor Networks. 1844-1856

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














