default search action
IEEE Transactions on Computers, Volume 64
Volume 64, Number 1, January 2015
- Albert Y. Zomaya:
Farewell State of the Journal Editorial. 1 - Paolo Montuschi:
Editorial from the New Editor in Chief. 2 - Albert Y. Zomaya:
In Memoriam [Ivan Stojmenovic]. 3 - Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. 4-18 - Yuan Le, Liran Ma, Wei Cheng, Xiuzhen Cheng, Biao Chen:
A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks. 19-31 - Guangyan Zhang, Keqin Li, Jingzhe Wang, Weimin Zheng:
Accelerate RDP RAID-6 Scaling by Reducing Disk I/Os and XOR Operations. 32-44 - José Luis Núñez-Yáñez:
Adaptive Voltage Scaling with In-Situ Detectors in Commercial FPGAs. 45-53 - Guoxin Liu, Haiying Shen, Lee Ward:
An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System. 54-70 - Ting-Yu Lin, Kun-Ru Wu, Guang-Chuen Yin:
Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks. 71-86 - Xiulong Liu, Keqiu Li, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu:
Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way. 87-96 - Palden Lama, Xiaobo Zhou:
Coordinated Power and Performance Guarantee with Fuzzy MIMO Control in Virtualized Server Clusters. 97-111 - Daehyun Kim, Krit Athikulwongse, Michael B. Healy, Mohammad M. Hossain, Moongon Jung, Ilya Khorosh, Gokul Kumar, Young-Joon Lee, Dean L. Lewis, Tzu-Wei Lin, Chang Liu, Shreepad Panth, Mohit Pathak, Minzhen Ren, Guanhao Shen, Taigon Song, Dong Hyuk Woo, Xin Zhao, Joungho Kim, Ho Choi, Gabriel H. Loh, Hsien-Hsin S. Lee, Sung Kyu Lim:
Design and Analysis of 3D-MAPS (3D Massively Parallel Processor with Stacked Memory). 112-125 - Zhibin Zhou, Dijiang Huang, Zhijie Wang:
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption. 126-138 - Shui Yu, Song Guo, Ivan Stojmenovic:
Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace. 139-151 - Lluc Alvarez, Lluís Vilanova, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé:
Hardware-Software Coherence Protocol for the Coexistence of Caches and Local Memories. 152-165 - Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi:
Requester-Based Spin Lock: A Scalable and Energy Efficient Locking Scheme on Multicore Systems. 166-179 - Kenli Li, Xiaoyong Tang, Bharadwaj Veeravalli, Keqin Li:
Scheduling Precedence Constrained Stochastic Tasks on Heterogeneous Cluster Systems. 191-204 - Khondaker Musfakus Salehin, Roberto Rojas-Cessa, Chuan-Bi Lin, Ziqian Dong, Taweesak Kijkanjanarat:
Scheme to Measure Packet Processing Time of a Remote Host through Estimation of End-Link Capacity. 205-218 - Zibin Zheng, Michael R. Lyu:
Selecting an Optimal Fault Tolerance Strategy for Reliable Service-Oriented Systems with Local and Global Constraints. 219-232 - Amy Wang, Matthew Gaudet, Peng Wu, Martin Ohmacht, José Nelson Amaral, Christopher Barton, Raúl Silvera, Maged M. Michael:
Software Support and Evaluation of Hardware Transactional Memory on Blue Gene/Q. 233-246 - Said Hamdioui, Mottaqiallah Taouil, Nor Zaidi Haron:
Testing Open Defects in Memristor-Based Memories. 247-259 - Benedikt Dietrich, Dip Goswami, Samarjit Chakraborty, Apratim Guha, Matthias Gries:
Time Series Characterization of Gaming Workload for Runtime Power Management. 260-273 - Chia-Wei Lee, Chao-Wen Huang, Wen-Hao Pi, Sun-Yuan Hsieh:
An Improved Approximation Ratio to the Partial-Terminal Steiner Tree Problem. 274-279 - Fareena Saqib, Aindrik Dutta, Jim Plusquellic, Philip Ortiz, Marios S. Pattichis:
Pipelined Decision Tree Classification Accelerator Implementation in FPGA (DT-CAIF). 280-285 - Jae Min Kim, Young Geun Kim, Sung Woo Chung:
Stabilizing CPU Frequency and Voltage for Temperature-Aware DVFS in Mobile Devices. 286-292 - Saeid Gorgin, Ghassem Jaberipur:
Comment on "High Speed Parallel Decimal Multiplication With Redundant Internal Encodings". 293-294
Volume 64, Number 2, February 2015
- Juan Luis Jerez, George A. Constantinides, Eric C. Kerrigan:
A Low Complexity Scaling Method for the Lanczos Kernel in Fixed-Point Arithmetic. 303-315 - Abdullah Kayi, Olivier Serres, Tarek A. El-Ghazawi:
Adaptive Cache Coherence Mechanisms with Producer-Consumer Sharing Optimization for Chip Multiprocessors. 316-328 - Ali Galip Bayrak, Francesco Regazzoni, David Novo, Philip Brisk, François-Xavier Standaert, Paolo Ienne:
Automatic Application of Power Analysis Countermeasures. 329-341 - Alex Chia-Chun Hsu, David S. L. Wei, C.-C. Jay Kuo:
Coexistence Wi-Fi MAC Design for Mitigating Interference Caused by Collocated Bluetooth. 342-352 - Haiying Shen, Yuhua Lin, Ting Li:
Combining Efficiency, Fidelity, and Flexibility in Resource Information Services. 353-367 - Leonid Yavits, Amir Morad, Ran Ginosar:
Computer Architecture with Associative Processor Replacing Last-Level Cache and SIMD Accelerator. 368-381 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Jiannong Cao, Jie Wu:
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring. 382-395 - Itthichok Jangjaimon, Nian-Feng Tzeng:
Effective Cost Reduction for Elastic Clouds under Spot Instance Pricing Through Adaptive Checkpointing. 396-409 - Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett S. Rose, Youngok K. Pino, Ozgur Sinanoglu, Ramesh Karri:
Fault Analysis-Based Logic Encryption. 410-424 - Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Wenjing Lou:
Identity-Based Encryption with Outsourced Revocation in Cloud Computing. 425-437 - Ebrahim A. Hasan Abdulrahman, Arash Reyhani-Masoleh:
New Regular Radix-8 Scheme for Elliptic Curve Scalar Multiplication without Pre-Computation. 438-451 - Daqiang Zhang, Daqing Zhang, Haoyi Xiong, Laurence T. Yang, Vincent Gauthier:
NextCell: Predicting Location Using Social Interplay from Cell Phone Traces. 452-463 - Bin Xue, Sandeep K. Shukla, S. S. Ravi:
Optimization of Latency Insensitive Systems Through Back Pressure Minimization. 464-476 - Abdulla Al-Qawasmeh, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel:
Power and Thermal-Aware Workload Allocation in Heterogeneous Data Centers. 477-491 - Ching-Nung Yang, Zih-Yang Lin, Sheng-Lung Peng:
Reducing Code Length of Second-Order Spectral-Null Code. 492-503 - Scott Schneider, Martin Hirzel, Bugra Gedik, Kun-Lung Wu:
Safe Data Parallelism for General Streaming. 504-517 - Haiying Shen, Jinwei Liu, Kang Chen, Jianwei Liu, Stanley Moyer:
SCPS: A Social-Aware Distributed Cyber-Physical Human-Centric Search Engine. 518-532 - Mehmet Kayaalp, Timothy Schmitt, Junaid Nomani, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh:
Signature-Based Protection from Code Reuse Attacks. 533-546 - Shuming Zhou, Limei Lin, Li Xu, Dajin Wang:
The t/k-Diagnosability of Star Graph Networks. 547-555 - Weikuan Yu, Yandong Wang, Xinyu Que, Cong Xu:
Virtual Shuffling for Efficient Data Movement in MapReduce. 556-568 - Youngjae Lee, Jin-Soo Kim, Sang-Won Lee, Seungryoul Maeng:
Zombie Chasing: Efficient Flash Management Considering Dirty Data in the Buffer Cache. 569-581 - Yu-Chieh Cheng, Pi-Chung Wang:
Packet Classification Using Dynamically Generated Decision Trees. 582-586 - Bang Wang, Han Xu, Wenyu Liu, Laurence T. Yang:
The Optimal Node Placement for Long Belt Coverage in Wireless Networks. 587-592 - Enrico Bini:
The Quadratic Utilization Upper Bound for Arbitrary Deadline Real-Time Tasks. 593-599
Volume 64, Number 3, March 2015
- Wenzheng Xu, Weifa Liang, Xiaola Lin:
Approximation Algorithms for Min-Max Cycle Cover Problems. 600-613 - Cristiano G. Rezende, Azzedine Boukerche, Heitor S. Ramos, Antonio A. F. Loureiro:
A Reactive and Scalable Unicast Solution for Video Streaming over VANETs. 614-626 - Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn:
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks. 627-639 - Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. 640-653 - Sheng Zhang, Jie Wu, Sanglu Lu:
Collaborative Mobile Charging. 654-667 - Abdallah Jarray, Ahmed Karmouch:
Cost-Efficient Mapping for Fault-Tolerant Virtual Networks. 668-681 - Dan Xu, Xin Liu, Bin Fan:
Efficient Server Provisioning and Offloading Policies for Internet Data Centers with Dynamic Load-Demand. 682-697 - Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar:
Exploring the Feasibility of Fully Homomorphic Encryption. 698-706 - Dan Chen, Xiaoli Li, Lizhe Wang, Samee U. Khan, Juan Wang, Ke Zeng, Chang Cai:
Fast and Scalable Multi-Way Analysis of Massive Neural Data. 707-719 - Heekwon Park, Jongmoo Choi, Donghee Lee, Sam H. Noh:
iBuddy: Inverse Buddy for Enhancing Memory Allocation/Deallocation Performanceon Multi-Core Systems. 720-732 - Jeyavijayan Rajendran, Ramesh Karri, Garrett S. Rose:
Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors. 733-746 - Songtao Guo, Chuangyin Dang, Yuanyuan Yang:
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics. 747-762 - Sheng Ma, Zhiying Wang, Zonglin Liu, Natalie D. Enright Jerger:
Leaving One Slot Empty: Flit Bubble Flow Control for Torus Cache-Coherent NoCs. 763-777 - Chester Rebeiro, Debdeep Mukhopadhyay:
Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation. 778-790 - Mieczyslaw Jessa:
On the Quality of Random Sequences Produced with a Combined Random Bit Generator. 791-804 - Spiridon F. Beldianu, Sotirios G. Ziavras:
Performance-Energy Optimizations for Shared Vector Accelerators in Multicores. 805-817 - Liang Liu, Yuning Song, Haiyang Zhang, Huadong Ma, Athanasios V. Vasilakos:
Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks. 819-832 - Yousif Al Ridhawi, Ahmed Karmouch:
QoS-Based Composition of Service Specific Overlay Networks. 832-846 - Rakan Maddah, Rami G. Melhem, Sangyeun Cho:
RDIS: Tolerating Many Stuck-At Faults in Resistive Memory. 847-861 - Jiangtao Han, Haining Fan:
GF(2n) Shifted Polynomial Basis Multipliers Based on Subquadratic Toeplitz Matrix-Vector Product Approach for All Irreducible Pentanomials. 862-867 - En-Jui Chang, Hsien-Kai Hsin, Chih-Hao Chao, Shu-Yen Lin, An-Yeu Andy Wu:
Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems. 868-875 - Jin-Xin Zhou, Zhen-Lin Wu, Shi-Chen Yang, Kui-Wu Yuan:
Symmetric Property and Reliability of Balanced Hypercube. 876-881 - Chen Li, Le Chen, Rongxing Lu, Hui Li:
Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding". 882-883
Volume 64, Number 4, April 2015
- Bo-Cheng Charles Lai, Hsien-Kai Kuo, Jing-Yang Jou:
A Cache Hierarchy Aware Thread Mapping Methodology for GPGPUs. 884-898 - Dayong Ye, Minjie Zhang:
A Self-Adaptive Strategy for Evolution of Cooperation in Distributed Networks. 899-911 - Paolo Di Francesco, Séamas McGettrick, Uchenna K. Anyanwu, James C. O'Sullivan, Allen B. MacKenzie, Luiz A. DaSilva:
A Split MAC Approach for SDR Platforms. 912-924 - Jiantao Wang, Kam-yiu Lam, Yuan-Hao Chang, Jen-Wei Hsieh, Po-Chun Huang:
Block-Based Multi-Version B+-Tree for Flash-Based Embedded Database Systems. 925-940 - Jinkyu Lee, Kang G. Shin, Insik Shin, Arvind Easwaran:
Composition of Schedulability Analyses for Real-Time Multiprocessor Systems. 941-954 - Silvia Franchini, Antonio Gentile, Filippo Sorbello, Giorgio Vassallo, Salvatore Vitabile:
ConformalALU: A Conformal Geometric Algebra Coprocessor for Medical Image Processing. 955-970 - Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. 971-983 - Amir Momeni, Jie Han, Paolo Montuschi, Fabrizio Lombardi:
Design and Analysis of Approximate Compressors for Multiplication. 984-994 - Antonio García-Guirado, Ricardo Fernández Pascual, José M. García:
ICCI: In-Cache Coherence Information. 995-1014 - Mustafa Ilhan Akbas, Melike Erol-Kantarci, Damla Turgut:
Localization for Wireless Sensor and Actor Networks with Meandering Mobility. 1015-1028 - Kang Chen, Haiying Shen:
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing. 1029-1042 - Gregory Levitin, Liudong Xing, Barry W. Johnson, Yuan-Shun Dai:
Mission Reliability, Cost and Time for Cold Standby Computing Systems with Periodic Backup. 1043-1057 - Zhiyang Guo, Yuanyuan Yang:
On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy. 1058-1073 - Aurel Randolph, Hanifa Boucheneb, Abdessamad Imine, Alejandro Quintero:
On Synthesizing a Consistent Operational Transformation Approach. 1074-1089 - Tarek Nechma, Mark Zwolinski:
Parallel Sparse Matrix Solution for Circuit Simulation on FPGAs. 1090-1103 - Tania Banerjee, Sartaj Sahni, Gunasekaran S. Seetharaman:
PC-TRIO: A Power Efficient TCAM Architecture for Packet Classifiers. 1104-1118 - Tania Banerjee-Mishra, Sartaj Sahni:
Pubsub: An Efficient Publish/Subscribe System. 1119-1132 - Hui Sun, Xiao Qin, Hong Jiang, Jianzhong Huang, Changsheng Xie:
RB-Explorer: An Accurate and Practical Approach to Write Amplification Measurement for SSDs. 1133-1148 - Pei Huang, Chen Wang, Li Xiao:
RC-MAC: A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks. 1149-1161 - Wen Xia, Hong Jiang, Dan Feng, Yu Hua:
Similarity and Locality Based Indexing for High Performance Data Deduplication. 1162-1176 - Hany Kashif, Sina Gholamian, Hiren D. Patel:
SLA: A Stage-Level Latency Analysisfor Real-Time Communicationin a Pipelined Resource Model. 1177-1190 - David Lubicz, Nathalie Bochard:
Towards an Oscillator Based TRNG with a Certified Entropy Rate. 1191-1200 - Alan A. Bertossi, Daniele Diodati, Cristina M. Pinotti:
Storage Placement in Path Networks. 1201-1207 - Kamalika Datta, Indranil Sengupta, Hafizur Rahaman:
A Post-Synthesis Optimization Technique for Reversible Circuits Exploiting Negative Control Lines. 1208-1214 - Arash Reyhani-Masoleh:
Comments on "Low-Latency Digit-Serial Systolic Double Basis Multiplier over GF(2m) Using Subquadratic Toeplitz Matrix-Vector Product Approach". 1215-1216
Volume 64, Number 5, May 2015
- Walid Ibrahim, Marwa Shousha, John W. Chinneck:
Accurate and Efficient Estimation of Logic Circuits Reliability Bounds. 1217-1229 - Shyue-Kung Lu, Tsu-Lin Li, Masaki Hashizume, Jiann-Liang Chen:
Address Scrambling and Data Inversion Techniques for Yield Enhancement of NROM-Based ROMs. 1230-1240 - Alan Burns, Marina Gutiérrez, Mario Aldea Rivas, Michael González Harbour:
A Deadline-Floor Inheritance Protocol for EDF Scheduled Embedded Real-Time Systems with Resource Sharing. 1241-1253 - Yi Tang, Neil W. Bergmann:
A Hardware Scheduler Based on Task Queues for FPGA-Based Embedded Real-Time Systems. 1254-1267 - Cong Liu, Jie Han, Fabrizio Lombardi:
An Analytical Framework for Evaluating the Error Characteristics of Approximate Adders. 1268-1281 - Christos Liaskos, Ageliki Tsioliaridou:
A Promise of Realizable, Ultra-Scalable Communications at Nano-Scale: A Multi-Modal Nano-Machine Architecture. 1282-1295 - Chao Wang, Xi Li, Junneng Zhang, Peng Chen, Yunji Chen, Xuehai Zhou, Ray C. C. Cheung:
Architecture Support for Task Out-of-Order Execution in MPSoCs. 1296-1310 - Waltenegus Dargie:
A Stochastic Model for Estimating the Power Consumption of a Processor. 1311-1322 - Wenping Liu, Hongbo Jiang, Yang Yang, Xiaofei Liao, Hongzhi Lin, Zemeng Jin:
A Unified Framework for Line-Like Skeleton Extraction in 2D/3D Sensor Networks. 1323-1335 - Michael Menzel, Rajiv Ranjan, Lizhe Wang, Samee U. Khan, Jinjun Chen:
CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds. 1336-1348 - Eunji Lee, Seunghoon Yoo, Hyokyung Bahn:
Design and Implementation of a Journaling File System for Phase-Change Memory. 1349-1360 - Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen:
End-to-End Communication Delay Analysis in Industrial Wireless Networks. 1361-1374 - Youjip Won, Kyeongyeol Lim, Jaehong Min:
MUCH: Multithreaded Content-Based File Chunking. 1375-1388 - Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi:
PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency. 1389-1401 - Ziming Zheng, Li Yu, Zhiling Lan:
Reliability-Aware Speedup Models for Parallel Applications with Coordinated Checkpointing/Restart. 1402-1415 - Milan Lukic, Ahmed Barnawi, Ivan Stojmenovic:
Robot Coordination for Energy-Balanced Matching and Sequence Dispatch of Robots to Events. 1416-1428 - Eric Zavattoni, Luis J. Dominguez Perez, Shigeo Mitsunari, Ana H. Sánchez-Ramírez, Tadanori Teruya, Francisco Rodríguez-Henríquez:
Software Implementation of an Attribute-Based Encryption Scheme. 1429-1441 - Tianshi Chen, Qi Guo, Olivier Temam, Yue Wu, Yungang Bao, Zhiwei Xu, Yunji Chen:
Statistical Performance Comparisons of Computers. 1442-1455 - Gaofeng Zhang, Xiao Liu, Yun Yang:
Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud. 1456-1469 - Chuliang Weng, Jianfeng Zhan, Yuan Luo:
TSAC: Enforcing Isolation ofVirtual Machines in Clouds. 1470-1482 - Mark Gottscho, Luis Angel D. Bathen, Nikil D. Dutt, Alex Nicolau, Puneet Gupta:
ViPZonE: Hardware Power Variability-Aware Virtual Memory Management for Energy Savings. 1483-1496 - Salvatore Pontarelli, Pedro Reviriego, Marco Ottavi, Juan Antonio Maestro:
Low Delay Single Symbol Error Correction Codes Based on Reed Solomon Codes. 1497-1501 - Peter Kornerup:
Reviewing High-Radix Signed-Digit Adders. 1502-1505
Volume 64, Number 6, June 2015
- David A. Bader:
State of the Journal. 1506-1508 - Yarkin Doröz, Erdinç Öztürk, Berk Sunar:
Accelerating Fully Homomorphic Encryption in Hardware. 1509-1521 - Tao Zhang, Jianxin Wang, Jiawei Huang, Yi Huang, Jianer Chen, Yi Pan:
Adaptive-Acceleration Data Center TCP. 1522-1533 - Alberto Ros, Polychronis Xekalakis, Marcelo Cintra, Manuel E. Acacio, José M. García:
Adaptive Selection of Cache Indexing Bits for Removing Conflict Misses. 1534-1547 - Baoxian Zhang, Xili Wan, Junzhou Luo, Xiaojun Shen:
A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees. 1548-1563 - Bijan Alizadeh, Payman Behnam, Somayeh Sadeghi Kohan:
A Scalable Formal Debugging Approach with Auto-Correction Capability Based on Static Slicing and Dynamic Ranking for RTL Datapath Designs. 1564-1578 - Samaneh Ghandali, Bijan Alizadeh, Masahiro Fujita, Zainalabedin Navabi:
Automatic High-Level Data-Flow Synthesis and Optimization of Polynomial Datapaths Using Functional Decomposition. 1579-1593 - Naimah Yaakob, Ibrahim Khalil, Heshan Kumarage, Mohammed Atiquzzaman, Zahir Tari:
By-Passing Infected Areas in Wireless Sensor Networks Using BPR. 1594-1606 - Hao Zheng, Zhen Zhang, Chris J. Myers, Emmanuel Rodriguez, Yingying Zhang:
Compositional Model Checking of Concurrent Systems. 1607-1621 - Chun-An Chen, Guey-Yun Chang, Sun-Yuan Hsieh:
Conditional (t, k)-Diagnosis in Graphs by Using the Comparison Diagnosis Model. 1622-1632 - Chulmin Kim, Kyu Ho Park:
Credit-Based Runtime Placement of Virtual Machines on a Single NUMA System for QoS of Data Access Performance. 1633-1646 - Santanu Sarkar, Subhadeep Banik, Subhamoy Maitra:
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions. 1647-1657 - Yan Sun, Tin Yu Wu, Guotao Zhao, Mohsen Guizani:
Efficient Rule Engine for Smart Building Systems. 1658-1669 - Peng Li, Song Guo, Jiankun Hu:
Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks. 1670-1679 - Thomas Olutoyin Oshin, Stefan Poslad, Zelun Zhang:
Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. 1680-1693 - Tayyeb Mahmood, Seokin Hong, Soontae Kim:
Ensuring Cache Reliability and Energy Scaling at Near-Threshold Voltage With Macho. 1694-1706 - Sanjit Chatterjee, Koray Karabina, Alfred Menezes:
Fault Attacks on Pairing-Based Protocols Revisited. 1707-1714 - Haiying Shen, Ze Li, Jinwei Liu, Joseph Edward Grant:
Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications. 1715-1728 - Renhai Chen, Zhiwei Qin, Yi Wang, Duo Liu, Zili Shao, Yong Guan:
On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems. 1729-1741 - Marco E. T. Gerards, Johann L. Hurink, Jan Kuper:
On the Interplay between Global DVFS and Scheduling Tasks with Precedence Constraints. 1742-1754 - Sheng Di, Derrick Kondo, Cho-Li Wang:
Optimization of Composite Cloud Service Processing with Virtual Machines. 1755-1768 - Andrew D. Brown, Stephen B. Furber, Jeffrey S. Reeve, Jim D. Garside, Kier J. Dugan, Luis A. Plana, Steve Temple:
SpiNNaker - Programming Model. 1769-1782 - Joshua Yung Lih Low, Ching-Chuen Jong:
Unified Mitchell-Based Approximation for Efficient Logarithmic Conversion Circuit. 1783-1797 - Muhammad Jawad, Sahibzada Muhammad Ali, Joel A. Jorgenson, Samee U. Khan:
JEM: Just in Time/Just Enough Energy Management Methodology for Computing Systems. 1798-1804
Volume 64, Number 7, July 2015
- Thi Huyen Chau Nguyen, Pascal Richard, Emmanuel Grolleau:
An fptas for Response Time Analysis of Fixed Priority Real-Time Tasks with Resource Augmentation. 1805-1818 - Deze Zeng, Song Guo, Ahmed Barnawi, Shui Yu, Ivan Stojmenovic:
An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS. 1819-1829 - Chuan Luo, Shaowei Cai, Wei Wu, Zhong Jie, Kaile Su:
CCLS: An Efficient Local Search Algorithm for Weighted Maximum Satisfiability. 1830-1843 - Chunsheng Zhu, Victor C. M. Leung, Laurence T. Yang, Lei Shu:
Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing. 1844-1856 - Feng Xia, Ahmedin Mohammed Ahmed, Laurence Tianruo Yang, Zhongxuan Luo:
Community-Based Event Dissemination with Optimal Load Balancing. 1857-1869 - Xiaojiang Ren, Weifa Liang, Wenzheng Xu:
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling. 1870-1883 - Alejandro Valero, Julio Sahuquillo, Salvador Petit, Pedro López, José Duato:
Design of Hybrid Second-Level Caches. 1884-1897 - Runhui Li, Jian Lin, Patrick P. C. Lee:
Enabling Concurrent Failure Recovery for Regenerating-Coding-Based Storage Systems: From Theory to Practice. 1898-1911 - Zhiyang Guo, Yuanyuan Yang:
Exploring Server Redundancy in Nonblocking Multicast Data Center Networks. 1912-1926 - Jongmin Lee, Soontae Kim:
Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven byMiss Cost Reduction. 1927-1939 - Giovanni Causapruno, Marco Vacca, Mariagrazia Graziano, Maurizio Zamboni:
Interleaving in Systolic-Arrays: A Throughput Breakthrough. 1940-1953 - Tim Güneysu, Vadim Lyubashevsky, Thomas Pöppelmann:
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. 1954-1967 - Md. Zakirul Alam Bhuiyan, Guojun Wang, Athanasios V. Vasilakos:
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. 1968-1982 - Shengyan Hong, Thidapat Chantem, Xiaobo Sharon Hu:
Local-Deadline Assignment for Distributed Real-Time Systems. 1983-1997 - Md. Mamunur Rashid, Iqbal Gondal, Joarder Kamruzzaman:
Mining Associated Patterns from Wireless Sensor Networks. 1998-2011 - David W. Matula, Mihai T. Panu, Jonathan Y. Zhang:
Multiplicative Division Employing Independent Factors. 2012-2019 - Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong:
New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis. 2020-2035 - Shin-Haeng Kang, Hae-woo Park, Sungchan Kim, Hyunok Oh, Soonhoi Ha:
Optimal Checkpoint Selection with Dual-Modular Redundancy Hardening. 2036-2048 - Lin Gu, Deze Zeng, Ahmed Barnawi, Song Guo, Ivan Stojmenovic:
Optimal Task Placement with QoS Constraints in Geo-Distributed Data Centers Using DVFS. 2049-2059 - James Demmel, Hong Diep Nguyen:
Parallel Reproducible Summation. 2060-2070 - Zhenzhe Zheng, Yang Gui, Fan Wu, Guihai Chen:
STAR: Strategy-Proof Double Auctions for Multi-Cloud, Multi-Tenant Bandwidth Reservation. 2071-2083 - Igor Ikodinovic:
Methodology for Cycle-Accurate DRAM Performance Analysis. 2084-2091 - Kazuteru Namba, Fabrizio Lombardi:
Non-Binary Orthogonal Latin Square Codes for a Multilevel Phase Charge Memory (PCM). 2092-2097 - Ting Cui, Chenhui Jin, Zhiyin Kong:
On Compact Cauchy Matrices for Substitution-Permutation Networks. 2098-2102
Volume 64, Number 8, August 2015
- Noureddine Lasla, Mohamed F. Younis, Abdelraouf Ouadjaout, Nadjib Badache:
An Effective Area-Based Localization Algorithm for Wireless Networks. 2103-2118 - Hsien-Kai Hsin, En-Jui Chang, Kuan-Yu Su, An-Yeu Andy Wu:
Ant Colony Optimization-Based Adaptive Network-on-Chip Routing Framework Using Network Information Region. 2119-2131 - Masoud Dehyadegari, Andrea Marongiu, Mohammad Reza Kakoee, Siamak Mohammadi, Nasser Yazdani, Luca Benini:
Architecture Support for Tightly-Coupled Multi-Core Clusters with Shared-Memory HW Accelerators. 2132-2144 - Yunfeng Zhu, Jian Lin, Patrick P. C. Lee, Yinlong Xu:
Boosting Degraded Reads in Heterogeneous Erasure-Coded Storage Systems. 2145-2157 - Zhen Huang, Cheng Wang, Milos Stojmenovic, Amiya Nayak:
Characterization of Cascading Failures in Interdependent Cyber-Physical Systems. 2158-2168 - Qing'an Li, Yanxiang He, Jianhua Li, Liang Shi, Yiran Chen, Chun Jason Xue:
Compiler-Assisted Refresh Minimization for Volatile STT-RAM Cache. 2169-2181 - Rami Sheikh, James Tuck, Eric Rotenberg:
Control-Flow Decoupling: An Approach for Timely, Non-Speculative Branching. 2182-2203 - Nicolas Méloni, M. Anwar Hasan:
Efficient Double Bases for Scalar Multiplication. 2204-2212 - Cijo George, Sathish S. Vadhiyar:
Fault Tolerance on Large Scale Systems using Adaptive Process Replication. 2213-2225 - Xinmu Wang, Yu Zheng, Abhishek Basak, Swarup Bhunia:
IIPS: Infrastructure IP for Secure SoC Design. 2226-2238 - Etem Deniz, Alper Sen, Brian Kahne, Jim Holt:
MINIME: Pattern-Aware Multicore Benchmark Synthesizer. 2239-2252 - Lei Yang, Jiannong Cao, Hui Cheng, Yusheng Ji:
Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud Applications. 2253-2266 - Xin Zhan, Sherief Reda:
Power Budgeting Techniques for Data Centers. 2267-2278 - Shouvik Bardhan, Daniel A. Menascé:
Predicting the Effect of Memory Contention in Multi-Core Computers Using Analytic Performance Models. 2279-2292 - Xuyun Zhang, Wan-Chun Dou, Jian Pei, Surya Nepal, Chi Yang, Chang Liu, Jinjun Chen:
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud. 2293-2307 - Umair Sadiq, Mohan Kumar, Andrea Passarella, Marco Conti:
Service Composition in Opportunistic Networks: A Load and Mobility Aware Solution. 2308-2322 - Héctor J. García, Igor L. Markov:
Simulation of Quantum Circuits via Stabilizer Frames. 2323-2336 - Seungcheol Baek, Hyung Gyu Lee, Chrysostomos Nicopoulos, Junghee Lee, Jongman Kim:
Size-Aware Cache Management for Compressed Cache Architectures. 2337-2352 - Feng Gu, Khaled B. Shaban, Nasir Ghani, Samee Khan, Mahshid Rahnamay-Naeini, Majeed M. Hayat, Chadi Assi:
Survivable Cloud Network Mapping for Disaster Recovery Support. 2353-2366 - Yanchao Lu, Bingsheng He, Xueyan Tang, Minyi Guo:
Synergy of Dynamic Frequency Scaling and Demotion on DRAM Power Management: Models and Optimizations. 2367-2381 - Wei Xue, Chao Yang, Haohuan Fu, Xinliang Wang, Yangtong Xu, Junfeng Liao, Lin Gan, Yutong Lu, Rajiv Ranjan, Lizhe Wang:
Ultra-Scalable CPU-MIC Acceleration of Mesoscale Atmospheric Modeling on Tianhe-2. 2382-2393 - Bhavesh Khemka, Ryan D. Friese, Luis Diego Briceno, Howard Jay Siegel, Anthony A. Maciejewski, Gregory A. Koenig, Chris Groër, Gene Okonski, Marcia Hilton, Rajendra Rambharos, Steve Poole:
Utility Functions and Resource Management in an Oversubscribed Heterogeneous Computing Environment. 2394-2407 - Jiantao Zhou, Caihe Lan, William N. N. Hung, Xinrui Guo, Xiaoyu Song:
A Quantitative Characterization of Cross Coverage. 2408-2414 - Irith Pomeranz:
Piecewise-Functional Broadside Tests Based on Reachable States. 2415-2420
Volume 64, Number 9, September 2015
- Kimmo Järvinen, Vassil S. Dimitrov, Reza Azarderakhsh:
A Generalization of Addition Chains and Fast Inversions in Binary Fields. 2421-2432 - Seokin Hong, Soontae Kim:
A Low-Cost Mechanism Exploiting Narrow-Width Values for Tolerating Hard Faults in ALU. 2433-2446 - Yan Wu, ChunGang Yan, Lu Liu, Zhijun Ding, Changjun Jiang:
An Adaptive Multilevel Indexing Method for Disaster Service Discovery. 2447-2459 - Joonho Kong, Farinaz Koushanfar, Sung Woo Chung:
An Energy-Efficient Last-Level Cache Architecture for Process Variation-Tolerant 3D Microprocessors. 2460-2475 - Vasilios A. Mardiris, Georgios Ch. Sirakoulis, Ioannis G. Karafyllidis:
Automated Design Architecture for 1-D Cellular Automata Using Quantum Cellular Automata. 2476-2489 - Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, Yves Le Traon:
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. 2490-2505 - Ziming Zhong, Vladimir Rychkov, Alexey L. Lastovetsky:
Data Partitioning on Multicore and Multi-GPU Platforms Using Functional Performance Models. 2506-2518 - Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Jiankun Hu:
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. 2519-2533 - Dan Li, Yunfei Shang, Wu He, Congjie Chen:
EXR: Greening Data Center Network with Software Defined Exclusive Routing. 2534-2544 - Ji Wang, Weidong Bao, Xiaomin Zhu, Laurence T. Yang, Yang Xiang:
FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds. 2545-2558 - Gang Feng, Turgay Korkmaz:
Finding Multi-Constrained Multiple Shortest Paths. 2559-2572 - Heshan Kumarage, Ibrahim Khalil, Zahir Tari:
Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria. 2573-2585 - Jenq-Shiou Leu, Jheng-Huei Chen, Kuen-Han Li:
Hybrid Search Scheme for Social Networks Supported by Dynamic Weighted Distributed Label Clustering. 2586-2594 - Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. 2595-2608 - Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen:
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. 2609-2622 - Wangdong Yang, Kenli Li, Zeyao Mo, Keqin Li:
Performance Optimization Using Partitioned SpMV on GPUs and Multicore CPUs. 2623-2636 - Suzhen Wu, Hong Jiang, Bo Mao:
Proactive Data Migration for Improved Storage Availability in Large-Scale Data Centers. 2637-2651 - Jo C. Ebergen, Navaneeth Jamadagni:
Radix-2 Division Algorithms with an Over-Redundant Digit Set. 2652-2663 - Michail Maniatakos, Maria K. Michael, Chandra Tirumurti, Yiorgos Makris:
Revisiting Vulnerability Analysis in Modern Microprocessors. 2664-2674 - Wanchun Jiang, Fengyuan Ren, Ran Shu, Yongwei Wu, Chuang Lin:
Sliding Mode Congestion Control for Data Center Ethernet Networks. 2675-2690 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data. 2691-2707 - Nilanka T. Rajapaksha, Arjuna Madanayake, Renato J. Cintra, Jithra Adikari, Vassil S. Dimitrov:
VLSI Computational Architectures for the Arithmetic Cosine Transform. 2708-2715 - Yang Wang, Paul Lu, Kenneth B. Kent:
WaFS: A Workflow-Aware File System for Effective Storage Utilization in the Cloud. 2716-2729
Volume 64, Number 10, October 2015
- Christophe Nègre, Jean-Marc Robert:
New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic. 2875-2890 - Subhadeep Sarkar, Sudip Misra, Bitan Bandyopadhyay, Chandan Chakraborty, Mohammad S. Obaidat:
Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime. 2912-2925 - Juan Luo, Yaling Guo, Shan Fu, Keqin Li, Wenfeng He:
Virtual Resource Allocation Based on Link Interference in Cayley Wireless Data Centers. 3016-3021 - Saravanan Sundaresan, Robin Doss, Wanlei Zhou:
Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags. 2994-3008 - Francisco J. Andujar-Munoz, Juan A. Villar-Ortiz, José L. Sánchez, Francisco José Alfaro, José Duato:
N-Dimensional Twin Torus Topology. 2847-2861 - Youyou Lu, Jiwu Shu, Jia Guo, Shuai Li, Onur Mutlu:
High-Performance and Lightweight Transaction Support in Flash-Based SSDs. 2819-2832 - Roberto Baldoni, Silvia Bonomi, Marco Platania, Leonardo Querzoni:
Efficient Notification Ordering for Geo-Distributed Pub/Sub Systems. 2796-2808 - Kazuteru Namba, Fabrizio Lombardi:
Parallel Decodable Two-Level Unequal Burst Error Correcting Codes. 2902-2911 - Haiying Shen, Guoxin Liu, Harrison Chandler:
Swarm Intelligence Based File Replication and Consistency Maintenance in Structured P2P File Sharing Systems. 2953-2967 - Wenzhi Chen, Lei Xu, Guoxi Li, Yang Xiang:
A Lightweight Virtualization Solution for Android Devices. 2741-2751 - William P. McCartney, Nigamanth Sridhar:
Stackless Multi-Threading for Embedded Systems. 2940-2952 - Kaimin Wei, Song Guo, Deze Zeng, Ke Xu, Keqiu Li:
Exploiting Small World Properties for Message Forwarding in Delay Tolerant Networks. 2809-2818 - Keunsoo Kim, Benjamin Y. Cho, Won Woo Ro, Jean-Luc Gaudiot:
Network Variation and Fault Tolerant Performance Acceleration in Mobile Devices with Simultaneous Remote Execution. 2862-2874 - Dong Yuan, Xiao Liu, Yun Yang:
Dynamic On-the-Fly Minimum Cost Benchmarking for Storing Generated Scientific Datasets in the Cloud. 2781-2795 - Hanying Zheng, Xueyan Tang:
Analysis of Server Provisioning for Distributed Interactive Applications. 2752-2766 - Sheng-Wei Cheng, Ling-Chia Ku, Pi-Cheng Hsiu:
Dynamic Antenna Management for Uplink Energy Efficiency on 802.11n Mobile Devices. 2767-2780 - Yu-Chun Cheng, Cheng-Fu Chou, Eric Hsiao-Kuang Wu, Gen-Huey Chen:
A Cognitive TCP Design for a Cognitive Radio Network with an Unstable-Bandwidth Link. 2730-3740 - Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng:
H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor. 2833-2846 - Ioannis Voyiatzis, Dimitris J. Kavvadias:
On the Generation of SIC Pairs in Optimal Time. 2891-2901 - Guiyuan Jiang, Jigang Wu, Yajun Ha, Yi Wang, Jizhou Sun:
Reconfiguring Three-Dimensional Processor Arrays for Fault-Tolerance: Hardness and Heuristic Algorithms. 2926-2939 - Lin Chen, Kaigui Bian:
The Telephone Coordination Game Revisited: From Random to Deterministic Algorithms. 2968-2980 - Carlo Condo, Guido Masera, Paolo Montuschi:
Unequal Error Protection of Memories in LDPC Decoders. 2981-2993 - Irith Pomeranz:
Two-Dimensional Static Test Compaction for Functional Test Sequences. 3009-3015
Volume 64, Number 11, November 2015
- Sai Manoj P. D., Hao Yu, Kanwen Wang:
3D Many-Core Microprocessor Power Management by Space-Time Multiplexing Based Demand-Supply Matching. 3022-3036 - Jianzhong Huang, Xiao Qin, Xianhai Liang, Changsheng Xie:
An Efficient I/O-Redirection-Based Reconstruction Scheme for Erasure-Coded Storage Clusters. 3037-3050 - Fangming Liu, Peng Shu, John C. S. Lui:
AppATP: An Energy Conserving Adaptive Mobile-Cloud Transmission Protocol. 3051-3063 - Jing Mei, Kenli Li, Aijia Ouyang, Keqin Li:
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing. 3064-3078 - Yuan-Yao Shih, Ai-Chun Pang, Meng-Hsun Tsai, Chien-Han Chai:
A Rewarding Framework for Network Resource Sharing in Co-Channel Hybrid Access Femtocell Networks. 3079-3090 - Jaeyong Chung, Lok-Won Kim:
Bit-Width Optimization by Divide-and-Conquer for Fixed-Point Digital Signal Processing Systems. 3091-3101 - Nagesh B. Lakshminarayana, Hyesoon Kim:
Block-Precise Processors: Low-Power Processors with Reduced Operand Store Accesses and Result Broadcasts. 3102-3114 - Jen-Wei Hsieh, Yuan-Hung Kuan:
DCCS: Double Circular Caching Scheme for DRAM/PRAM Hybrid Cache. 3115-3127 - Deze Zeng, Peng Li, Song Guo, Toshiaki Miyazaki, Jiankun Hu, Yong Xiang:
Energy Minimization in Multi-Task Software-Defined Sensor Networks. 3128-3139 - Alfonso Rodríguez, Félix Moreno:
Evolutionary Computing and Particle Filtering: A Hardware-Based Motion Estimation System. 3140-3152 - Zhibin Yu, Lieven Eeckhout, Nilanjan Goswami, Tao Li, Lizy K. John, Hai Jin, Cheng-Zhong Xu, Junmin Wu:
GPGPU-MiniBench: Accelerating GPGPU Micro-Architecture Simulation. 3153-3166 - Jaekyu Lee, Dong Hyuk Woo, Hyesoon Kim, Mani Azimi:
GREEN Cache: Exploiting the Disciplined Memory Model of OpenCL on GPUs. 3167-3180 - Mwaffaq Otoom, JoAnn M. Paul:
Multiprocessor Capacity Metric and Analysis. 3181-3196 - Juri Ranieri, Alessandro Vincenzi, Amina Chebira, David Atienza, Martin Vetterli:
Near-Optimal Thermal Monitoring Framework for Many-Core Systems-on-Chip. 3197-3209 - Dawei Li, Jie Wu:
On Data Center Network Architectures for Interconnecting Dual-Port Servers. 3210-3222 - Zichen Xu, Yi-Cheng Tu, Xiaorui Wang:
Online Energy Estimation of Relational Operations in Database Systems. 3223-3236 - Yunfei Shang, Dan Li, Jing Zhu, Mingwei Xu:
On the Network Power Effectiveness of Data Center Architectures. 3237-3248 - Zhemin Zhang, Thomas G. Robertazzi:
Scheduling Divisible Loads in Gaussian, Mesh and Torus Network of Processors. 3249-3264 - Xuan Liu, Bin Xiao, Shigeng Zhang, Kai Bu, Alvin Chan:
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems. 3265-3277 - Wenli Zheng, Kai Ma, Xiaorui Wang:
TE-Shave: Reducing Data Center Capital and Operating Expenses with Thermal Energy Storage. 3278-3292 - Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. 3293-3303 - Yunpeng Chai, Zhihui Du, Xiao Qin, David A. Bader:
WEC: Improving Durability of SSD Cache Drives by Caching Write-Efficient Data. 3304-3316 - Irith Pomeranz:
Test Vector Omission for Fault Coverage Improvement of Functional Test Sequences. 3317-3321
Volume 64, Number 12, December 2015
- Leonel Sousa:
2n RNS Scalers for Extended 4-Moduli Sets. 3322-3334 - Urban Ingelsson, Sandeep Kumar Goel, Erik Larsson, Erik Jan Marinissen:
Abort-on-Fail Test Scheduling for Modular SOCs without and with Preemption. 3335-3347 - Jen-Wei Hsieh, Chung-Wei Chen, Han-Yi Lin:
Adaptive ECC Scheme for Hybrid SSD's. 3348-3361 - Myounggyu Won, Radu Stoleru:
A Hybrid Multicast Routing for Large Scale Sensor Networks with Holes. 3362-3375 - David T. Lee, Jehoshua Bruck:
Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits. 3376-3388 - Xiaomin Zhu, Chao Chen, Laurence T. Yang, Yang Xiang:
ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds. 3389-3403 - Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee, Chao-Yi Chen:
Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching. 3404-3416 - Linfeng Chen, Aijiao Cui, Chip-Hong Chang:
Design of Optimal Scan Tree Based on Compact Test Patterns for Test Time Reduction. 3417-3429 - Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, Chun-Jen Chung:
Efficient Attribute-Based Comparable Data Access Control. 3430-3443 - Che-Wei Tsao, Yuan-Hao Chang, Ming-Chang Yang, Po-Chun Huang:
Efficient Victim Block Selection for Flash Storage Devices. 3444-3460 - Jeongseob Ahn, Seongwook Jin, Jaehyuk Huh:
Fast Two-Level Address Translation for Virtualized Systems. 3461-3474 - Shadi G. Alawneh, Roelof Dragt, Dennis K. Peters, Claude Daley, Stephen Bruneau:
Hyper-Real-Time Ice Simulation and Modeling Using GPGPU. 3475-3487 - Huawei Huang, Song Guo, Peng Li, Baoliu Ye, Ivan Stojmenovic:
Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network. 3488-3499 - Jiang-Bo Qian, Qiang Zhu, Huahui Chen:
Multi-Granularity Locality-Sensitive Bloom Filter. 3500-3514 - Hong Yao, Deze Zeng, Huawei Huang, Song Guo, Ahmed Barnawi, Ivan Stojmenovic:
Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs. 3515-3527 - Meikang Qiu, Zhong Ming, Jiayin Li, Keke Gai, Ziliang Zong:
Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm. 3528-3540 - Anna Ye Du, Sanjukta Das Smith, Zhouhan Yang, Chunming Qiao, Ram Ramesh:
Predicting Transient Downtime in Virtual Server Systems: An Efficient Sample Path Randomization Approach. 3541-3554 - Dominic DiTomaso, Avinash Karanth Kodi, Ahmed Louri, Razvan C. Bunescu:
Resilient and Power-Efficient Multi-Function Channel Buffers in Network-on-Chip Architectures. 3555-3568 - Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. 3569-3579 - Mitchell A. Thornton:
Simulation and Implication Using a Transfer Function Model for Switching Logic. 3580-3590 - Ashkan Eghbal, Pooria M. Yaghini, Nader Bagherzadeh, Misagh Khayambashi:
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip. 3591-3604 - Anna Bernasconi, Valentina Ciriani, Gabriella Trucco, Tiziano Villa:
Using Flexibility in P-Circuits by Boolean Relations. 3605-3618 - Young-Sik Kim:
Comments on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding". 3619-3620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.