


default search action
35th IPCCC 2016: Las Vegas, NV, USA
- 35th IEEE International Performance Computing and Communications Conference, IPCCC 2016, Las Vegas, NV, USA, December 9-11, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5252-3

- Ender Ayanoglu:

Fifth generation (5G) cellular wireless: Vision, goals, and challenges. 1-3 - Ines Khoufi, Pascale Minet, Erwan Livolant, Badr Rmili:

Building an IEEE 802.15.4e TSCH network. 1-2 - Roni F. Shigueta, Mauro Fonseca

, Aline Carneiro Viana
:
User behavior-aware channel allocation scheme for mobile ad hoc networks. 1-2 - James Hadley, Utz Roedig

, Yehia Elkhatib
:
Using context switches for VM scaling. 1-2 - Aiqin Hou, Chase Q. Wu, Dingyi Fang, Yongqiang Wang, Meng Wang, Tao Wang, Xiaoyang Zhang:

Bandwidth scheduling with multiple variable node-disjoint paths in high-performance networks. 1-4 - Manu Awasthi, Krishna T. Malladi:

KOVA : A tool for kernel visualization and analysis. 1-3 - Denise Ferebee, Vivek Shandilya, Chase Q. Wu, Janet Ricks, David Agular, Karyn Cole, Byron Ray, Aukii Franklin, Candice Titon, Zongmin Wang:

A secure framework for mHealth data analytics with visualization. 1-4 - Paul Townend, Jie Xu, Jon Summers, Daniel Ruprecht

, Harvey Thompson:
Holistic data centres: Next generation data and thermal energy infrastructures. 1-2 - Swapnoneel Roy, Matt Rutherford, Charlene H. Crawshaw:

Towards designing and implementing a secure one time password (OTP) authentication system. 1-2 - Nader Mohamed, Jameela Al-Jaroodi, Sanja Lazarova-Molnar

, Imad Jawhar:
Middleware to support cyber-physical systems. 1-3 - Emrah Çem, Kamil Saraç:

Estimating clustering coefficients via metropolis-hastings random walk and wedge sampling on large OSN graphs. 1-2 - Jehan-François Pâris, Thomas J. E. Schwarz, Darrell D. E. Long:

Improving disk array reliability through faster repairs (Extended abstract). 1-2 - Janki Bhimani, Ningfang Mi, Miriam Leeser

:
Performance prediction techniques for scalable large data processing in distributed MPI systems. 1-2 - Shouq Alsubaihi, Jean-Luc Gaudiot:

PETS: Performance, energy and thermal aware scheduler for job mapping with resource allocation in heterogeneous systems. 1-2 - Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:

Thwart eavesdropping attacks on network communication based on moving target defense. 1-2 - Henry Griffith, Rajiv Ranganathan

, Subir Biswas:
Towards a first-reflection ultrasonic sensor array for compensatory movement identification in stroke sufferers. 1-2 - Ali Aldarraji, Liang Hong, Sachin Shetty

:
Polarized beamforming for enhanced countermeasure of wireless jamming attacks. 1-2 - Xiaohui Nie, Youjian Zhao, Kaixin Sui, Dan Pei

, Yu Chen, Xianping Qu:
Mining causality graph for automatic web-based service diagnosis. 1-8 - Zuqin Ji, Jun Shen, Xiao Zhou, Delin Ding, Yujian Zhang:

The analysis of service extensibility in extensible network service model. 1-8 - Kasim Oztoprak, Mehmet Akif Yazici

:
A hybrid asymmetric traffic classifier for deep packet inspection systems with route asymmetry. 1-8 - Feng Wang

, Xiaozhe Shao, Lixin Gao, Hiroaki Harai, Kenji Fujikawa:
Towards variable length addressing for scalable Internet routing. 1-9 - Se-Young Yu, Aniket Mahanti

, Mingwei Gong:
Benchmarking ISPs in New Zealand. 1-7 - Yueshi Wu, Mihaela Cardei:

A cognitive radio approach for data collection in border surveillance. 1-8 - Catalina Aranzazu Suescun, Mihaela Cardei:

Event-based clustering for composite event detection in wireless sensors networks. 1-8 - Prateek K. Singh, James H. Nguyen, Santosh K. Gupta, Koushik Kar, Daniel T. Ku:

High performance mass configuration protocols for MANETs using efficient broadcasting. 1-10 - Wei Yu

, Hansong Xu, Amirshahram Hematian, David W. Griffith, Nada Golmie:
Towards energy efficiency in ultra dense networks. 1-8 - Mingchu Li

, Shiyu Wang, Kun Lu:
A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems. 1-8 - Yi He, Qi Li:

Detecting and defending against inter-app permission leaks in android apps. 1-7 - Aimin Zhang, Yi He, Yong Jiang:

CrashFuzzer: Detecting input processing related crash bugs in android applications. 1-8 - Zhen Feng, Mingwei Xu, Yuan Yang, Yu Wang, Qing Li

, Weichao Wang:
Optimizing content delivery in ICN networks by the supply chain model. 1-8 - Jue Chen, Jinbang Chen, Junchen Ling, Wei Zhang:

Failure recovery using vlan-tag in SDN: High speed with low memory requirement. 1-9 - Song Huang, Zhiang Deng, Song Fu

:
Quantifying entity criticality for fault impact analysis and dependability enhancement in software-defined networks. 1-8 - Lauritz Thamsen, Ilya Verbitskiy, Florian Schmidt, Thomas Renner, Odej Kao:

Selecting resources for distributed dataflow systems according to runtime targets. 1-8 - Ting Zhang, Duc A. Tran

:
On query-adaptive online partitioning: A study of evolutionary algorithms. 1-8 - Md. Amjad Hossain

, Javed I. Khan:
Distributed dynamic MCU for video conferencing in peer-to-peer network. 1-8 - Qiu Tang, Lei Jiang, Majing Su, Qiong Dai:

A pipelined market data processing architecture to overcome financial data dependency. 1-8 - Mohak Chadha, Abhishek Srivastava

, Santonu Sarkar:
Unified power and energy measurement API for HPC co-processors. 1-8 - Fan Li, Cheng Xu, Yang Liu, Yun Zhang, Zhuo Li, Kashif Sharif

, Yu Wang:
Mo-sleep: Unobtrusive sleep and movement monitoring via Wi-Fi signal. 1-8 - Hang Yu

, Bryan C. K. Ng, Winston K. G. Seah
:
On-demand efficient polling for nanonetworks under dynamic IoT backhaul network conditions. 1-8 - Fredrik Saveros, Mingwei Gong, Niklas Carlsson, Aniket Mahanti:

An energy-efficient handover algorithm for wireless sensor networks. 1-8 - Ines Khoufi, Pascale Minet, Mohammed-Amine Koulali, Abdellatif Kobbane

:
Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach. 1-8 - Dongwei Wang, Weijun Xiao:

A reuse distance based performance analysis on GPU L1 data cache. 1-8 - Raed Al-Aaridhi, Kalman Graffi

:
Sets, lists and trees: Distributed data structures on distributed hash tables. 1-8 - Xiaoheng Deng, Weijian Zhong, Ju Ren, Detian Zeng, Honggang Zhang:

An imbalanced data classification method based on automatic clustering under-sampling. 1-8 - Roman Seibel, Somayeh Taheri, Keyu Wang, Dieter Hogrefe:

Minimizing intra-flow interference in multi-channel mesh networks: An optimization approach. 1-10 - Mahmoud Khasawneh

, Anjali Agarwal:
A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks. 1-8 - Matthias Schwamborn, Nils Aschenbruck:

Towards an extensive map-oriented trace basis for human mobility modeling. 1-10 - Xin Wang, Wei Zhang

:
Cache locking vs. partitioning for real-time computing on integrated CPU-GPU processors. 1-8 - Indar Sugiarto

, Gengting Liu, Simon Davidson
, Luis A. Plana
, Steve B. Furber
:
High performance computing on SpiNNaker neuromorphic platform: A case study for energy efficient image processing. 1-8 - Jing Ke, Tomasz Bednarz

, Arcot Sowmya:
Optimized GPU implementation for dynamic programming in image data processing. 1-7 - Yujian Zhang, Yun Wang, Hui Wang:

Energy-efficient task scheduling for DVFS-enabled heterogeneous computing systems using a linear programming approach. 1-8 - Jiayin Wang, Teng Wang, Zhengyu Yang

, Ningfang Mi, Bo Sheng
:
eSplash: Efficient speculation in large scale heterogeneous computing systems. 1-8 - Haoran Cai, Qiang Cao, Feng Sheng, Manyi Zhang, Chuanyi Qi, Jie Yao, Changsheng Xie:

Montgolfier: Latency-aware power management system for heterogeneous servers. 1-8 - Janki Bhimani, Jingpei Yang, Zhengyu Yang

, Ningfang Mi, Qiumin Xu, Manu Awasthi, Rajinikanth Pandurangan, Vijay Balakrishnan:
Understanding performance of I/O intensive containerized applications for NVMe SSDs. 1-8 - Vero Estrada-Galiñanes

, Jehan-François Pâris, Pascal Felber
:
Simple data entanglement layouts with high reliability. 1-8 - Ganesh Chennimala Sankaran, Krishna M. Sivalingam

:
Time synchronization mechanisms for an optically groomed data center network. 1-8 - Bowen Tian, Yun Tian, Yijie Sun, Trevor Hurt, Brandon Huebert, Waymon Ho, Yuting Zhang, Danqi Chen:

A secure data allocation solution for heterogeneous Hadoop systems: SecHDFS. 1-8 - Yao Qin, Hua Wang, Zhiping Jia, Hui Xia:

A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP. 1-8 - Weimiao Feng, Jianguo Sun, Liguo Zhang, Cuiling Cao, Qing Yang:

A support vector machine based naive Bayes algorithm for spam filtering. 1-8 - Mohamed Azard Rilvan, Kolby Isiah Lacy, Md. Shafaeat Hossain, Bing Wang:

User authentication and identification on smartphones by incorporating capacitive touchscreen. 1-8 - Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu

, Xinwen Fu
, Wei Zhao
:
Data integrity attacks against the distributed real-time pricing in the smart grid. 1-8 - Zhengyu Yang

, Jianzhe Tai, Janki Bhimani, Jiayin Wang, Ningfang Mi, Bo Sheng
:
GReM: Dynamic SSD resource allocation in virtualized storage systems with heterogeneous IO workloads. 1-8 - Xi Tao, Qi Zeng, Jih-Kwon Peir, Shih-Lien Lu:

Small cache lookaside table for fast DRAM cache access. 1-10 - Wenjie Liu, Ping Huang, Tang Kun, Tao Lu, Ke Zhou, Chun-hua Li, Xubin He:

LAMS: A latency-aware memory scheduling policy for modern DRAM systems. 1-8 - Nafiul Alam Siddique

, Abdel-Hameed A. Badawy, Jeanine E. Cook, David Resnick:
LMStr: Local memory store the case for hardware controlled scratchpad memory for general purpose processors. 1-8 - Alan J. Michaels, William C. Headley

, Joseph M. Ernst, Seth D. Hitefield:
Enhanced PHY-layer security via co-channel underlays. 1-6 - Ngoc-Thuy Le

, Doan B. Hoang:
Can maturity models support cyber security? 1-7 - Zhengyu Yang

, Jiayin Wang, David Thomas Evans, Ningfang Mi:
AutoReplica: Automatic data replica manager in distributed caching and data processing systems. 1-6 - Sharaf J. Malebary

, Wenyuan Xu, Chin-Tser Huang:
Jamming mobility in 802.11p networks: Modeling, evaluation, and detection. 1-7 - Sanja Lazarova-Molnar

, Hamid Reza Shaker
, Nader Mohamed:
Reliability of cyber physical systems with focus on building management systems. 1-6 - Amar Rasheed, M. Cotter, B. Smith, D. Levan, Shashi Phoha:

Dynamically reconfigurable AES cryptographic core for small, power limited mobile sensors. 1-7 - Ikram Syed, Byeong-Hee Roh

:
Delay analysis of IEEE 802.11e EDCA with enhanced QoS for delay sensitive applications. 1-4 - Olabisi E. Falowo

:
Optimal multicriteria RAT-selection decisions for multiple handoff calls in heterogeneous wireless networks. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














