


default search action
IEEE Transactions on Computers, Volume 64
Volume 64, Number 1, January 2015
- Albert Y. Zomaya

:
Farewell State of the Journal Editorial. 1 - Paolo Montuschi

:
Editorial from the New Editor in Chief. 2 - Albert Y. Zomaya:

In Memoriam [Ivan Stojmenovic]. 3 - Xinyu Yang, Jie Lin, Wei Yu

, Paul-Marie Moulema, Xinwen Fu
, Wei Zhao
:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. 4-18 - Yuan Le, Liran Ma

, Wei Cheng, Xiuzhen Cheng, Biao Chen:
A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks. 19-31 - Guangyan Zhang, Keqin Li, Jingzhe Wang, Weimin Zheng:

Accelerate RDP RAID-6 Scaling by Reducing Disk I/Os and XOR Operations. 32-44 - José Luis Núñez-Yáñez

:
Adaptive Voltage Scaling with In-Situ Detectors in Commercial FPGAs. 45-53 - Guoxin Liu, Haiying Shen, Lee Ward:

An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System. 54-70 - Ting-Yu Lin, Kun-Ru Wu

, Guang-Chuen Yin:
Channel-Hopping Scheme and Channel-Diverse Routing in Static Multi-Radio Multi-Hop Wireless Networks. 71-86 - Xiulong Liu, Keqiu Li, Geyong Min

, Yanming Shen, Alex X. Liu, Wenyu Qu:
Completely Pinpointing the Missing RFID Tags in a Time-Efficient Way. 87-96 - Palden Lama, Xiaobo Zhou:

Coordinated Power and Performance Guarantee with Fuzzy MIMO Control in Virtualized Server Clusters. 97-111 - Daehyun Kim, Krit Athikulwongse, Michael B. Healy, Mohammad M. Hossain, Moongon Jung, Ilya Khorosh, Gokul Kumar, Young-Joon Lee, Dean L. Lewis, Tzu-Wei Lin, Chang Liu, Shreepad Panth, Mohit Pathak, Minzhen Ren, Guanhao Shen, Taigon Song, Dong Hyuk Woo, Xin Zhao, Joungho Kim, Ho Choi, Gabriel H. Loh, Hsien-Hsin S. Lee, Sung Kyu Lim

:
Design and Analysis of 3D-MAPS (3D Massively Parallel Processor with Stacked Memory). 112-125 - Zhibin Zhou, Dijiang Huang

, Zhijie Wang:
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption. 126-138 - Shui Yu

, Song Guo
, Ivan Stojmenovic:
Fool Me If You Can: Mimicking Attacks and Anti-Attacks in Cyberspace. 139-151 - Lluc Alvarez

, Lluís Vilanova
, Marc González, Xavier Martorell
, Nacho Navarro, Eduard Ayguadé
:
Hardware-Software Coherence Protocol for the Coexistence of Caches and Local Memories. 152-165 - Yan Cui, Yingxin Wang, Yu Chen, Yuanchun Shi:

Requester-Based Spin Lock: A Scalable and Energy Efficient Locking Scheme on Multicore Systems. 166-179 - Kenli Li, Xiaoyong Tang, Bharadwaj Veeravalli, Keqin Li:

Scheduling Precedence Constrained Stochastic Tasks on Heterogeneous Cluster Systems. 191-204 - Khondaker Musfakus Salehin, Roberto Rojas-Cessa, Chuan-Bi Lin, Ziqian Dong

, Taweesak Kijkanjanarat:
Scheme to Measure Packet Processing Time of a Remote Host through Estimation of End-Link Capacity. 205-218 - Zibin Zheng

, Michael R. Lyu:
Selecting an Optimal Fault Tolerance Strategy for Reliable Service-Oriented Systems with Local and Global Constraints. 219-232 - Amy Wang, Matthew Gaudet, Peng Wu, Martin Ohmacht

, José Nelson Amaral, Christopher Barton, Raúl Silvera, Maged M. Michael:
Software Support and Evaluation of Hardware Transactional Memory on Blue Gene/Q. 233-246 - Said Hamdioui, Mottaqiallah Taouil, Nor Zaidi Haron:

Testing Open Defects in Memristor-Based Memories. 247-259 - Benedikt Dietrich, Dip Goswami, Samarjit Chakraborty

, Apratim Guha, Matthias Gries
:
Time Series Characterization of Gaming Workload for Runtime Power Management. 260-273 - Chia-Wei Lee

, Chao-Wen Huang, Wen-Hao Pi, Sun-Yuan Hsieh:
An Improved Approximation Ratio to the Partial-Terminal Steiner Tree Problem. 274-279 - Fareena Saqib, Aindrik Dutta, Jim Plusquellic, Philip Ortiz, Marios S. Pattichis

:
Pipelined Decision Tree Classification Accelerator Implementation in FPGA (DT-CAIF). 280-285 - Jae Min Kim, Young Geun Kim, Sung Woo Chung:

Stabilizing CPU Frequency and Voltage for Temperature-Aware DVFS in Mobile Devices. 286-292 - Saeid Gorgin

, Ghassem Jaberipur:
Comment on "High Speed Parallel Decimal Multiplication With Redundant Internal Encodings". 293-294
Volume 64, Number 2, February 2015
- Juan Luis Jerez, George A. Constantinides, Eric C. Kerrigan:

A Low Complexity Scaling Method for the Lanczos Kernel in Fixed-Point Arithmetic. 303-315 - Abdullah Kayi, Olivier Serres, Tarek A. El-Ghazawi:

Adaptive Cache Coherence Mechanisms with Producer-Consumer Sharing Optimization for Chip Multiprocessors. 316-328 - Ali Galip Bayrak, Francesco Regazzoni

, David Novo, Philip Brisk
, François-Xavier Standaert
, Paolo Ienne:
Automatic Application of Power Analysis Countermeasures. 329-341 - Alex Chia-Chun Hsu, David S. L. Wei, C.-C. Jay Kuo

:
Coexistence Wi-Fi MAC Design for Mitigating Interference Caused by Collocated Bluetooth. 342-352 - Haiying Shen, Yuhua Lin, Ting Li:

Combining Efficiency, Fidelity, and Flexibility in Resource Information Services. 353-367 - Leonid Yavits, Amir Morad, Ran Ginosar:

Computer Architecture with Associative Processor Replacing Last-Level Cache and SIMD Accelerator. 368-381 - Md. Zakirul Alam Bhuiyan

, Guojun Wang, Jiannong Cao
, Jie Wu:
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring. 382-395 - Itthichok Jangjaimon, Nian-Feng Tzeng:

Effective Cost Reduction for Elastic Clouds under Spot Instance Pricing Through Adaptive Checkpointing. 396-409 - Jeyavijayan Rajendran, Huan Zhang, Chi Zhang, Garrett S. Rose

, Youngok K. Pino, Ozgur Sinanoglu
, Ramesh Karri
:
Fault Analysis-Based Logic Encryption. 410-424 - Jin Li, Jingwei Li

, Xiaofeng Chen, Chunfu Jia, Wenjing Lou:
Identity-Based Encryption with Outsourced Revocation in Cloud Computing. 425-437 - Ebrahim A. Hasan Abdulrahman, Arash Reyhani-Masoleh:

New Regular Radix-8 Scheme for Elliptic Curve Scalar Multiplication without Pre-Computation. 438-451 - Daqiang Zhang, Daqing Zhang, Haoyi Xiong

, Laurence T. Yang, Vincent Gauthier
:
NextCell: Predicting Location Using Social Interplay from Cell Phone Traces. 452-463 - Bin Xue, Sandeep K. Shukla, S. S. Ravi:

Optimization of Latency Insensitive Systems Through Back Pressure Minimization. 464-476 - Abdulla Al-Qawasmeh, Sudeep Pasricha, Anthony A. Maciejewski

, Howard Jay Siegel:
Power and Thermal-Aware Workload Allocation in Heterogeneous Data Centers. 477-491 - Ching-Nung Yang

, Zih-Yang Lin, Sheng-Lung Peng:
Reducing Code Length of Second-Order Spectral-Null Code. 492-503 - Scott Schneider, Martin Hirzel, Bugra Gedik, Kun-Lung Wu:

Safe Data Parallelism for General Streaming. 504-517 - Haiying Shen, Jinwei Liu, Kang Chen, Jianwei Liu, Stanley Moyer:

SCPS: A Social-Aware Distributed Cyber-Physical Human-Centric Search Engine. 518-532 - Mehmet Kayaalp, Timothy Schmitt, Junaid Nomani, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh

:
Signature-Based Protection from Code Reuse Attacks. 533-546 - Shuming Zhou, Limei Lin, Li Xu, Dajin Wang:

The t/k-Diagnosability of Star Graph Networks. 547-555 - Weikuan Yu

, Yandong Wang, Xinyu Que, Cong Xu:
Virtual Shuffling for Efficient Data Movement in MapReduce. 556-568 - Youngjae Lee, Jin-Soo Kim, Sang-Won Lee, Seungryoul Maeng:

Zombie Chasing: Efficient Flash Management Considering Dirty Data in the Buffer Cache. 569-581 - Yu-Chieh Cheng, Pi-Chung Wang

:
Packet Classification Using Dynamically Generated Decision Trees. 582-586 - Bang Wang, Han Xu, Wenyu Liu

, Laurence T. Yang:
The Optimal Node Placement for Long Belt Coverage in Wireless Networks. 587-592 - Enrico Bini

:
The Quadratic Utilization Upper Bound for Arbitrary Deadline Real-Time Tasks. 593-599
Volume 64, Number 3, March 2015
- Wenzheng Xu, Weifa Liang

, Xiaola Lin
:
Approximation Algorithms for Min-Max Cycle Cover Problems. 600-613 - Cristiano G. Rezende, Azzedine Boukerche, Heitor S. Ramos

, Antonio A. F. Loureiro:
A Reactive and Scalable Unicast Solution for Video Streaming over VANETs. 614-626 - Mohammad Sayad Haghighi

, Yang Xiang
, Vijay Varadharajan
, Barry G. Quinn
:
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks. 627-639 - Sheng Wen

, Mohammad Sayad Haghighi
, Chao Chen, Yang Xiang
, Wanlei Zhou
, Weijia Jia
:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. 640-653 - Sheng Zhang, Jie Wu, Sanglu Lu:

Collaborative Mobile Charging. 654-667 - Abdallah Jarray, Ahmed Karmouch:

Cost-Efficient Mapping for Fault-Tolerant Virtual Networks. 668-681 - Dan Xu, Xin Liu, Bin Fan:

Efficient Server Provisioning and Offloading Policies for Internet Data Centers with Dynamic Load-Demand. 682-697 - Wei Wang, Yin Hu, Lianmu Chen, Xinming Huang, Berk Sunar:

Exploring the Feasibility of Fully Homomorphic Encryption. 698-706 - Dan Chen, Xiaoli Li

, Lizhe Wang, Samee U. Khan
, Juan Wang, Ke Zeng, Chang Cai:
Fast and Scalable Multi-Way Analysis of Massive Neural Data. 707-719 - Heekwon Park, Jongmoo Choi, Donghee Lee, Sam H. Noh:

iBuddy: Inverse Buddy for Enhancing Memory Allocation/Deallocation Performanceon Multi-Core Systems. 720-732 - Jeyavijayan Rajendran, Ramesh Karri

, Garrett S. Rose
:
Improving Tolerance to Variations in Memristor-Based Applications Using Parallel Memristors. 733-746 - Songtao Guo, Chuangyin Dang

, Yuanyuan Yang
:
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics. 747-762 - Sheng Ma, Zhiying Wang, Zonglin Liu, Natalie D. Enright Jerger

:
Leaving One Slot Empty: Flit Bubble Flow Control for Torus Cache-Coherent NoCs. 763-777 - Chester Rebeiro

, Debdeep Mukhopadhyay:
Micro-Architectural Analysis of Time-Driven Cache Attacks: Quest for the Ideal Implementation. 778-790 - Mieczyslaw Jessa

:
On the Quality of Random Sequences Produced with a Combined Random Bit Generator. 791-804 - Spiridon F. Beldianu, Sotirios G. Ziavras

:
Performance-Energy Optimizations for Shared Vector Accelerators in Multicores. 805-817 - Liang Liu, Yuning Song, Haiyang Zhang, Huadong Ma, Athanasios V. Vasilakos

:
Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks. 819-832 - Yousif Al Ridhawi, Ahmed Karmouch:

QoS-Based Composition of Service Specific Overlay Networks. 832-846 - Rakan Maddah, Rami G. Melhem, Sangyeun Cho:

RDIS: Tolerating Many Stuck-At Faults in Resistive Memory. 847-861 - Jiangtao Han, Haining Fan:

GF(2n) Shifted Polynomial Basis Multipliers Based on Subquadratic Toeplitz Matrix-Vector Product Approach for All Irreducible Pentanomials. 862-867 - En-Jui Chang

, Hsien-Kai Hsin, Chih-Hao Chao, Shu-Yen Lin, An-Yeu Andy Wu
:
Regional ACO-Based Cascaded Adaptive Routing for Traffic Balancing in Mesh-Based Network-on-Chip Systems. 868-875 - Jin-Xin Zhou

, Zhen-Lin Wu, Shi-Chen Yang, Kui-Wu Yuan:
Symmetric Property and Reliability of Balanced Hypercube. 876-881 - Chen Li, Le Chen, Rongxing Lu, Hui Li:

Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding". 882-883
Volume 64, Number 4, April 2015
- Bo-Cheng Charles Lai

, Hsien-Kai Kuo, Jing-Yang Jou:
A Cache Hierarchy Aware Thread Mapping Methodology for GPGPUs. 884-898 - Dayong Ye

, Minjie Zhang
:
A Self-Adaptive Strategy for Evolution of Cooperation in Distributed Networks. 899-911 - Paolo Di Francesco, Séamas McGettrick, Uchenna K. Anyanwu, James C. O'Sullivan, Allen B. MacKenzie

, Luiz A. DaSilva:
A Split MAC Approach for SDR Platforms. 912-924 - Jiantao Wang, Kam-yiu Lam

, Yuan-Hao Chang
, Jen-Wei Hsieh, Po-Chun Huang:
Block-Based Multi-Version B+-Tree for Flash-Based Embedded Database Systems. 925-940 - Jinkyu Lee, Kang G. Shin, Insik Shin, Arvind Easwaran

:
Composition of Schedulability Analyses for Real-Time Multiprocessor Systems. 941-954 - Silvia Franchini

, Antonio Gentile, Filippo Sorbello, Giorgio Vassallo, Salvatore Vitabile
:
ConformalALU: A Conformal Geometric Algebra Coprocessor for Medical Image Processing. 955-970 - Xinyi Huang, Joseph K. Liu

, Shaohua Tang, Yang Xiang
, Kaitai Liang
, Li Xu, Jianying Zhou
:
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. 971-983 - Amir Momeni, Jie Han, Paolo Montuschi

, Fabrizio Lombardi:
Design and Analysis of Approximate Compressors for Multiplication. 984-994 - Antonio García-Guirado, Ricardo Fernández-Pascual

, José M. García:
ICCI: In-Cache Coherence Information. 995-1014 - Mustafa Ilhan Akbas

, Melike Erol-Kantarci, Damla Turgut:
Localization for Wireless Sensor and Actor Networks with Meandering Mobility. 1015-1028 - Kang Chen, Haiying Shen:

Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing. 1029-1042 - Gregory Levitin, Liudong Xing, Barry W. Johnson, Yuan-Shun Dai:

Mission Reliability, Cost and Time for Cold Standby Computing Systems with Periodic Backup. 1043-1057 - Zhiyang Guo, Yuanyuan Yang

:
On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy. 1058-1073 - Aurel Randolph, Hanifa Boucheneb, Abdessamad Imine, Alejandro Quintero:

On Synthesizing a Consistent Operational Transformation Approach. 1074-1089 - Tarek Nechma, Mark Zwolinski

:
Parallel Sparse Matrix Solution for Circuit Simulation on FPGAs. 1090-1103 - Tania Banerjee

, Sartaj Sahni, Gunasekaran S. Seetharaman:
PC-TRIO: A Power Efficient TCAM Architecture for Packet Classifiers. 1104-1118 - Tania Banerjee-Mishra

, Sartaj Sahni:
Pubsub: An Efficient Publish/Subscribe System. 1119-1132 - Hui Sun, Xiao Qin

, Hong Jiang, Jianzhong Huang, Changsheng Xie:
RB-Explorer: An Accurate and Practical Approach to Write Amplification Measurement for SSDs. 1133-1148 - Pei Huang, Chen Wang, Li Xiao:

RC-MAC: A Receiver-Centric MAC Protocol for Event-Driven Wireless Sensor Networks. 1149-1161 - Wen Xia, Hong Jiang, Dan Feng, Yu Hua:

Similarity and Locality Based Indexing for High Performance Data Deduplication. 1162-1176 - Hany Kashif, Sina Gholamian, Hiren D. Patel:

SLA: A Stage-Level Latency Analysisfor Real-Time Communicationin a Pipelined Resource Model. 1177-1190 - David Lubicz, Nathalie Bochard:

Towards an Oscillator Based TRNG with a Certified Entropy Rate. 1191-1200 - Alan A. Bertossi, Daniele Diodati

, Cristina M. Pinotti
:
Storage Placement in Path Networks. 1201-1207 - Kamalika Datta, Indranil Sengupta, Hafizur Rahaman

:
A Post-Synthesis Optimization Technique for Reversible Circuits Exploiting Negative Control Lines. 1208-1214 - Arash Reyhani-Masoleh:

Comments on "Low-Latency Digit-Serial Systolic Double Basis Multiplier over GF(2m) Using Subquadratic Toeplitz Matrix-Vector Product Approach". 1215-1216
Volume 64, Number 5, May 2015
- Walid Ibrahim

, Marwa Shousha, John W. Chinneck:
Accurate and Efficient Estimation of Logic Circuits Reliability Bounds. 1217-1229 - Shyue-Kung Lu, Tsu-Lin Li, Masaki Hashizume, Jiann-Liang Chen:

Address Scrambling and Data Inversion Techniques for Yield Enhancement of NROM-Based ROMs. 1230-1240 - Alan Burns, Marina Gutiérrez, Mario Aldea Rivas

, Michael González Harbour:
A Deadline-Floor Inheritance Protocol for EDF Scheduled Embedded Real-Time Systems with Resource Sharing. 1241-1253 - Yi Tang, Neil W. Bergmann

:
A Hardware Scheduler Based on Task Queues for FPGA-Based Embedded Real-Time Systems. 1254-1267 - Cong Liu, Jie Han, Fabrizio Lombardi:

An Analytical Framework for Evaluating the Error Characteristics of Approximate Adders. 1268-1281 - Christos Liaskos

, Ageliki Tsioliaridou:
A Promise of Realizable, Ultra-Scalable Communications at Nano-Scale: A Multi-Modal Nano-Machine Architecture. 1282-1295 - Chao Wang, Xi Li, Junneng Zhang, Peng Chen, Yunji Chen

, Xuehai Zhou, Ray C. C. Cheung
:
Architecture Support for Task Out-of-Order Execution in MPSoCs. 1296-1310 - Waltenegus Dargie

:
A Stochastic Model for Estimating the Power Consumption of a Processor. 1311-1322 - Wenping Liu, Hongbo Jiang, Yang Yang, Xiaofei Liao, Hongzhi Lin, Zemeng Jin:

A Unified Framework for Line-Like Skeleton Extraction in 2D/3D Sensor Networks. 1323-1335 - Michael Menzel, Rajiv Ranjan

, Lizhe Wang
, Samee U. Khan
, Jinjun Chen:
CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds. 1336-1348 - Eunji Lee, Seunghoon Yoo, Hyokyung Bahn:

Design and Implementation of a Journaling File System for Phase-Change Memory. 1349-1360 - Abusayeed Saifullah, You Xu, Chenyang Lu, Yixin Chen:

End-to-End Communication Delay Analysis in Industrial Wireless Networks. 1361-1374 - Youjip Won, Kyeongyeol Lim, Jaehong Min

:
MUCH: Multithreaded Content-Based File Chunking. 1375-1388 - Gang Lu, Jianfeng Zhan, Haining Wang, Lin Yuan, Yunwei Gao, Chuliang Weng, Yong Qi:

PowerTracer: Tracing Requests in Multi-Tier Services to Reduce Energy Inefficiency. 1389-1401 - Ziming Zheng, Li Yu, Zhiling Lan:

Reliability-Aware Speedup Models for Parallel Applications with Coordinated Checkpointing/Restart. 1402-1415 - Milan Lukic

, Ahmed Barnawi, Ivan Stojmenovic:
Robot Coordination for Energy-Balanced Matching and Sequence Dispatch of Robots to Events. 1416-1428 - Eric Zavattoni, Luis J. Dominguez Perez

, Shigeo Mitsunari
, Ana H. Sánchez-Ramírez, Tadanori Teruya
, Francisco Rodríguez-Henríquez:
Software Implementation of an Attribute-Based Encryption Scheme. 1429-1441 - Tianshi Chen, Qi Guo, Olivier Temam, Yue Wu, Yungang Bao, Zhiwei Xu, Yunji Chen

:
Statistical Performance Comparisons of Computers. 1442-1455 - Gaofeng Zhang, Xiao Liu

, Yun Yang:
Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud. 1456-1469 - Chuliang Weng, Jianfeng Zhan, Yuan Luo:

TSAC: Enforcing Isolation ofVirtual Machines in Clouds. 1470-1482 - Mark Gottscho, Luis Angel D. Bathen, Nikil D. Dutt

, Alex Nicolau, Puneet Gupta
:
ViPZonE: Hardware Power Variability-Aware Virtual Memory Management for Energy Savings. 1483-1496 - Salvatore Pontarelli

, Pedro Reviriego
, Marco Ottavi
, Juan Antonio Maestro
:
Low Delay Single Symbol Error Correction Codes Based on Reed Solomon Codes. 1497-1501 - Peter Kornerup:

Reviewing High-Radix Signed-Digit Adders. 1502-1505
Volume 64, Number 6, June 2015
- David A. Bader

:
State of the Journal. 1506-1508 - Yarkin Doröz, Erdinç Öztürk, Berk Sunar:

Accelerating Fully Homomorphic Encryption in Hardware. 1509-1521 - Tao Zhang, Jianxin Wang, Jiawei Huang, Yi Huang, Jianer Chen, Yi Pan

:
Adaptive-Acceleration Data Center TCP. 1522-1533 - Alberto Ros

, Polychronis Xekalakis, Marcelo Cintra, Manuel E. Acacio
, José M. García:
Adaptive Selection of Cache Indexing Bits for Removing Conflict Misses. 1534-1547 - Baoxian Zhang

, Xili Wan, Junzhou Luo, Xiaojun Shen:
A Nearly Optimal Packet Scheduling Algorithm for Input Queued Switches with Deadline Guarantees. 1548-1563 - Bijan Alizadeh, Payman Behnam, Somayeh Sadeghi Kohan:

A Scalable Formal Debugging Approach with Auto-Correction Capability Based on Static Slicing and Dynamic Ranking for RTL Datapath Designs. 1564-1578 - Samaneh Ghandali, Bijan Alizadeh, Masahiro Fujita, Zainalabedin Navabi:

Automatic High-Level Data-Flow Synthesis and Optimization of Polynomial Datapaths Using Functional Decomposition. 1579-1593 - Naimah Yaakob

, Ibrahim Khalil
, Heshan Kumarage, Mohammed Atiquzzaman
, Zahir Tari
:
By-Passing Infected Areas in Wireless Sensor Networks Using BPR. 1594-1606 - Hao Zheng, Zhen Zhang, Chris J. Myers

, Emmanuel Rodriguez, Yingying Zhang:
Compositional Model Checking of Concurrent Systems. 1607-1621 - Chun-An Chen, Guey-Yun Chang, Sun-Yuan Hsieh:

Conditional (t, k)-Diagnosis in Graphs by Using the Comparison Diagnosis Model. 1622-1632 - Chulmin Kim, Kyu Ho Park:

Credit-Based Runtime Placement of Virtual Machines on a Single NUMA System for QoS of Data Access Performance. 1633-1646 - Santanu Sarkar

, Subhadeep Banik
, Subhamoy Maitra:
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions. 1647-1657 - Yan Sun, Tin Yu Wu, Guotao Zhao, Mohsen Guizani:

Efficient Rule Engine for Smart Building Systems. 1658-1669 - Peng Li, Song Guo

, Jiankun Hu
:
Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks. 1670-1679 - Thomas Olutoyin Oshin, Stefan Poslad, Zelun Zhang:

Energy-Efficient Real-Time Human Mobility State Classification Using Smartphones. 1680-1693 - Tayyeb Mahmood, Seokin Hong, Soontae Kim:

Ensuring Cache Reliability and Energy Scaling at Near-Threshold Voltage With Macho. 1694-1706 - Sanjit Chatterjee, Koray Karabina, Alfred Menezes:

Fault Attacks on Pairing-Based Protocols Revisited. 1707-1714 - Haiying Shen, Ze Li, Jinwei Liu, Joseph Edward Grant:

Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications. 1715-1728 - Renhai Chen, Zhiwei Qin, Yi Wang

, Duo Liu, Zili Shao
, Yong Guan:
On-Demand Block-Level Address Mapping in Large-Scale NAND Flash Storage Systems. 1729-1741 - Marco E. T. Gerards

, Johann L. Hurink
, Jan Kuper:
On the Interplay between Global DVFS and Scheduling Tasks with Precedence Constraints. 1742-1754 - Sheng Di, Derrick Kondo, Cho-Li Wang:

Optimization of Composite Cloud Service Processing with Virtual Machines. 1755-1768 - Andrew D. Brown, Stephen B. Furber, Jeffrey S. Reeve, Jim D. Garside, Kier J. Dugan, Luis A. Plana, Steve Temple:

SpiNNaker - Programming Model. 1769-1782 - Joshua Yung Lih Low, Ching-Chuen Jong

:
Unified Mitchell-Based Approximation for Efficient Logarithmic Conversion Circuit. 1783-1797 - Muhammad Jawad

, Sahibzada Muhammad Ali, Joel A. Jorgenson, Samee U. Khan
:
JEM: Just in Time/Just Enough Energy Management Methodology for Computing Systems. 1798-1804
Volume 64, Number 7, July 2015
- Thi Huyen Chau Nguyen, Pascal Richard, Emmanuel Grolleau:

An fptas for Response Time Analysis of Fixed Priority Real-Time Tasks with Resource Augmentation. 1805-1818 - Deze Zeng, Song Guo

, Ahmed Barnawi, Shui Yu
, Ivan Stojmenovic:
An Improved Stochastic Modeling of Opportunistic Routing in Vehicular CPS. 1819-1829 - Chuan Luo, Shaowei Cai

, Wei Wu, Zhong Jie, Kaile Su
:
CCLS: An Efficient Local Search Algorithm for Weighted Maximum Satisfiability. 1830-1843 - Chunsheng Zhu, Victor C. M. Leung, Laurence T. Yang, Lei Shu

:
Collaborative Location-Based Sleep Scheduling for Wireless Sensor Networks Integratedwith Mobile Cloud Computing. 1844-1856 - Feng Xia

, Ahmedin Mohammed Ahmed, Laurence Tianruo Yang, Zhongxuan Luo:
Community-Based Event Dissemination with Optimal Load Balancing. 1857-1869 - Xiaojiang Ren, Weifa Liang

, Wenzheng Xu:
Data Collection Maximization in Renewable Sensor Networks via Time-Slot Scheduling. 1870-1883 - Alejandro Valero

, Julio Sahuquillo, Salvador Petit
, Pedro López, José Duato
:
Design of Hybrid Second-Level Caches. 1884-1897 - Runhui Li, Jian Lin, Patrick P. C. Lee

:
Enabling Concurrent Failure Recovery for Regenerating-Coding-Based Storage Systems: From Theory to Practice. 1898-1911 - Zhiyang Guo, Yuanyuan Yang

:
Exploring Server Redundancy in Nonblocking Multicast Data Center Networks. 1912-1926 - Jongmin Lee, Soontae Kim:

Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven byMiss Cost Reduction. 1927-1939 - Giovanni Causapruno, Marco Vacca, Mariagrazia Graziano, Maurizio Zamboni

:
Interleaving in Systolic-Arrays: A Throughput Breakthrough. 1940-1953 - Tim Güneysu

, Vadim Lyubashevsky, Thomas Pöppelmann:
Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware. 1954-1967 - Md. Zakirul Alam Bhuiyan

, Guojun Wang, Athanasios V. Vasilakos
:
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. 1968-1982 - Shengyan Hong, Thidapat Chantem

, Xiaobo Sharon Hu
:
Local-Deadline Assignment for Distributed Real-Time Systems. 1983-1997 - Md. Mamunur Rashid

, Iqbal Gondal
, Joarder Kamruzzaman
:
Mining Associated Patterns from Wireless Sensor Networks. 1998-2011 - David W. Matula, Mihai T. Panu, Jonathan Y. Zhang:

Multiplicative Division Employing Independent Factors. 2012-2019 - Hayssam El-Razouk, Arash Reyhani-Masoleh, Guang Gong:

New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis. 2020-2035 - Shin-Haeng Kang, Hae-woo Park, Sungchan Kim, Hyunok Oh, Soonhoi Ha:

Optimal Checkpoint Selection with Dual-Modular Redundancy Hardening. 2036-2048 - Lin Gu, Deze Zeng, Ahmed Barnawi, Song Guo

, Ivan Stojmenovic:
Optimal Task Placement with QoS Constraints in Geo-Distributed Data Centers Using DVFS. 2049-2059 - James Demmel, Hong Diep Nguyen:

Parallel Reproducible Summation. 2060-2070 - Zhenzhe Zheng, Yang Gui, Fan Wu, Guihai Chen

:
STAR: Strategy-Proof Double Auctions for Multi-Cloud, Multi-Tenant Bandwidth Reservation. 2071-2083 - Igor Ikodinovic:

Methodology for Cycle-Accurate DRAM Performance Analysis. 2084-2091 - Kazuteru Namba, Fabrizio Lombardi:

Non-Binary Orthogonal Latin Square Codes for a Multilevel Phase Charge Memory (PCM). 2092-2097 - Ting Cui, Chenhui Jin, Zhiyin Kong:

On Compact Cauchy Matrices for Substitution-Permutation Networks. 2098-2102
Volume 64, Number 8, August 2015
- Noureddine Lasla

, Mohamed F. Younis
, Abdelraouf Ouadjaout
, Nadjib Badache:
An Effective Area-Based Localization Algorithm for Wireless Networks. 2103-2118 - Hsien-Kai Hsin, En-Jui Chang

, Kuan-Yu Su, An-Yeu Andy Wu
:
Ant Colony Optimization-Based Adaptive Network-on-Chip Routing Framework Using Network Information Region. 2119-2131 - Masoud Dehyadegari

, Andrea Marongiu, Mohammad Reza Kakoee, Siamak Mohammadi
, Nasser Yazdani, Luca Benini
:
Architecture Support for Tightly-Coupled Multi-Core Clusters with Shared-Memory HW Accelerators. 2132-2144 - Yunfeng Zhu, Jian Lin, Patrick P. C. Lee

, Yinlong Xu:
Boosting Degraded Reads in Heterogeneous Erasure-Coded Storage Systems. 2145-2157 - Zhen Huang, Cheng Wang, Milos Stojmenovic, Amiya Nayak

:
Characterization of Cascading Failures in Interdependent Cyber-Physical Systems. 2158-2168 - Qing'an Li, Yanxiang He, Jianhua Li, Liang Shi, Yiran Chen, Chun Jason Xue:

Compiler-Assisted Refresh Minimization for Volatile STT-RAM Cache. 2169-2181 - Rami Sheikh, James Tuck

, Eric Rotenberg
:
Control-Flow Decoupling: An Approach for Timely, Non-Speculative Branching. 2182-2203 - Nicolas Méloni, M. Anwar Hasan:

Efficient Double Bases for Scalar Multiplication. 2204-2212 - Cijo George, Sathish S. Vadhiyar:

Fault Tolerance on Large Scale Systems using Adaptive Process Replication. 2213-2225 - Xinmu Wang, Yu Zheng, Abhishek Basak, Swarup Bhunia

:
IIPS: Infrastructure IP for Secure SoC Design. 2226-2238 - Etem Deniz

, Alper Sen
, Brian Kahne, Jim Holt:
MINIME: Pattern-Aware Multicore Benchmark Synthesizer. 2239-2252 - Lei Yang, Jiannong Cao

, Hui Cheng
, Yusheng Ji:
Multi-User Computation Partitioning for Latency Sensitive Mobile Cloud Applications. 2253-2266 - Xin Zhan, Sherief Reda:

Power Budgeting Techniques for Data Centers. 2267-2278 - Shouvik Bardhan, Daniel A. Menascé:

Predicting the Effect of Memory Contention in Multi-Core Computers Using Analytic Performance Models. 2279-2292 - Xuyun Zhang

, Wan-Chun Dou, Jian Pei
, Surya Nepal
, Chi Yang, Chang Liu, Jinjun Chen:
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud. 2293-2307 - Umair Sadiq

, Mohan Kumar, Andrea Passarella
, Marco Conti:
Service Composition in Opportunistic Networks: A Load and Mobility Aware Solution. 2308-2322 - Héctor J. García, Igor L. Markov:

Simulation of Quantum Circuits via Stabilizer Frames. 2323-2336 - Seungcheol Baek

, Hyung Gyu Lee, Chrysostomos Nicopoulos
, Junghee Lee
, Jongman Kim:
Size-Aware Cache Management for Compressed Cache Architectures. 2337-2352 - Feng Gu, Khaled B. Shaban

, Nasir Ghani, Samee Khan
, Mahshid Rahnamay-Naeini, Majeed M. Hayat, Chadi Assi:
Survivable Cloud Network Mapping for Disaster Recovery Support. 2353-2366 - Yanchao Lu

, Bingsheng He
, Xueyan Tang, Minyi Guo:
Synergy of Dynamic Frequency Scaling and Demotion on DRAM Power Management: Models and Optimizations. 2367-2381 - Wei Xue, Chao Yang

, Haohuan Fu, Xinliang Wang, Yangtong Xu, Junfeng Liao, Lin Gan, Yutong Lu, Rajiv Ranjan
, Lizhe Wang:
Ultra-Scalable CPU-MIC Acceleration of Mesoscale Atmospheric Modeling on Tianhe-2. 2382-2393 - Bhavesh Khemka, Ryan D. Friese

, Luis Diego Briceno, Howard Jay Siegel, Anthony A. Maciejewski
, Gregory A. Koenig, Chris Groër, Gene Okonski, Marcia Hilton, Rajendra Rambharos, Steve Poole:
Utility Functions and Resource Management in an Oversubscribed Heterogeneous Computing Environment. 2394-2407 - Jiantao Zhou, Caihe Lan, William N. N. Hung

, Xinrui Guo, Xiaoyu Song:
A Quantitative Characterization of Cross Coverage. 2408-2414 - Irith Pomeranz:

Piecewise-Functional Broadside Tests Based on Reachable States. 2415-2420
Volume 64, Number 9, September 2015
- Kimmo Järvinen, Vassil S. Dimitrov, Reza Azarderakhsh:

A Generalization of Addition Chains and Fast Inversions in Binary Fields. 2421-2432 - Seokin Hong, Soontae Kim:

A Low-Cost Mechanism Exploiting Narrow-Width Values for Tolerating Hard Faults in ALU. 2433-2446 - Yan Wu, ChunGang Yan, Lu Liu

, Zhijun Ding, Changjun Jiang:
An Adaptive Multilevel Indexing Method for Disaster Service Discovery. 2447-2459 - Joonho Kong, Farinaz Koushanfar

, Sung Woo Chung:
An Energy-Efficient Last-Level Cache Architecture for Process Variation-Tolerant 3D Microprocessors. 2460-2475 - Vasilios A. Mardiris

, Georgios Ch. Sirakoulis, Ioannis G. Karafyllidis
:
Automated Design Architecture for 1-D Cellular Automata Using Quantum Cellular Automata. 2476-2489 - Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, Yves Le Traon

:
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. 2490-2505 - Ziming Zhong, Vladimir Rychkov, Alexey L. Lastovetsky

:
Data Partitioning on Multicore and Multi-GPU Platforms Using Functional Performance Models. 2506-2518 - Zhiyuan Tan

, Aruna Jamdagni, Xiangjian He
, Priyadarsi Nanda, Ren Ping Liu
, Jiankun Hu
:
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. 2519-2533 - Dan Li, Yunfei Shang, Wu He, Congjie Chen:

EXR: Greening Data Center Network with Software Defined Exclusive Routing. 2534-2544 - Ji Wang, Weidong Bao, Xiaomin Zhu, Laurence T. Yang, Yang Xiang

:
FESTAL: Fault-Tolerant Elastic Scheduling Algorithm for Real-Time Tasks in Virtualized Clouds. 2545-2558 - Gang Feng, Turgay Korkmaz:

Finding Multi-Constrained Multiple Shortest Paths. 2559-2572 - Heshan Kumarage, Ibrahim Khalil

, Zahir Tari
:
Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria. 2573-2585 - Jenq-Shiou Leu, Jheng-Huei Chen, Kuen-Han Li:

Hybrid Search Scheme for Social Networks Supported by Dynamic Weighted Distributed Label Clustering. 2586-2594 - Tsz Hon Yuen

, Joseph K. Liu
, Man Ho Au
, Xinyi Huang, Willy Susilo
, Jianying Zhou
:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. 2595-2608 - Chang Liu, Rajiv Ranjan

, Chi Yang, Xuyun Zhang
, Lizhe Wang
, Jinjun Chen:
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. 2609-2622 - Wangdong Yang, Kenli Li, Zeyao Mo, Keqin Li:

Performance Optimization Using Partitioned SpMV on GPUs and Multicore CPUs. 2623-2636 - Suzhen Wu, Hong Jiang, Bo Mao:

Proactive Data Migration for Improved Storage Availability in Large-Scale Data Centers. 2637-2651 - Jo C. Ebergen, Navaneeth Jamadagni:

Radix-2 Division Algorithms with an Over-Redundant Digit Set. 2652-2663 - Michail Maniatakos

, Maria K. Michael, Chandra Tirumurti, Yiorgos Makris
:
Revisiting Vulnerability Analysis in Modern Microprocessors. 2664-2674 - Wanchun Jiang, Fengyuan Ren, Ran Shu, Yongwei Wu, Chuang Lin:

Sliding Mode Congestion Control for Data Center Ethernet Networks. 2675-2690 - Debrup Chakraborty

, Cuauhtemoc Mancillas-López
, Palash Sarkar:
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data. 2691-2707 - Nilanka T. Rajapaksha, Arjuna Madanayake

, Renato J. Cintra
, Jithra Adikari, Vassil S. Dimitrov:
VLSI Computational Architectures for the Arithmetic Cosine Transform. 2708-2715 - Yang Wang, Paul Lu, Kenneth B. Kent

:
WaFS: A Workflow-Aware File System for Effective Storage Utilization in the Cloud. 2716-2729
Volume 64, Number 10, October 2015
- Christophe Nègre, Jean-Marc Robert:

New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic. 2875-2890 - Subhadeep Sarkar

, Sudip Misra
, Bitan Bandyopadhyay, Chandan Chakraborty, Mohammad S. Obaidat
:
Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime. 2912-2925 - Juan Luo

, Yaling Guo, Shan Fu, Keqin Li, Wenfeng He:
Virtual Resource Allocation Based on Link Interference in Cayley Wireless Data Centers. 3016-3021 - Saravanan Sundaresan, Robin Doss

, Wanlei Zhou
:
Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags. 2994-3008 - Francisco J. Andujar-Munoz, Juan A. Villar-Ortiz, José L. Sánchez, Francisco José Alfaro, José Duato:

N-Dimensional Twin Torus Topology. 2847-2861 - Youyou Lu, Jiwu Shu, Jia Guo, Shuai Li, Onur Mutlu

:
High-Performance and Lightweight Transaction Support in Flash-Based SSDs. 2819-2832 - Roberto Baldoni, Silvia Bonomi

, Marco Platania, Leonardo Querzoni
:
Efficient Notification Ordering for Geo-Distributed Pub/Sub Systems. 2796-2808 - Kazuteru Namba, Fabrizio Lombardi:

Parallel Decodable Two-Level Unequal Burst Error Correcting Codes. 2902-2911 - Haiying Shen, Guoxin Liu, Harrison Chandler:

Swarm Intelligence Based File Replication and Consistency Maintenance in Structured P2P File Sharing Systems. 2953-2967 - Wenzhi Chen, Lei Xu, Guoxi Li, Yang Xiang

:
A Lightweight Virtualization Solution for Android Devices. 2741-2751 - William P. McCartney, Nigamanth Sridhar:

Stackless Multi-Threading for Embedded Systems. 2940-2952 - Kaimin Wei, Song Guo

, Deze Zeng, Ke Xu, Keqiu Li:
Exploiting Small World Properties for Message Forwarding in Delay Tolerant Networks. 2809-2818 - Keunsoo Kim, Benjamin Y. Cho, Won Woo Ro, Jean-Luc Gaudiot:

Network Variation and Fault Tolerant Performance Acceleration in Mobile Devices with Simultaneous Remote Execution. 2862-2874 - Dong Yuan

, Xiao Liu
, Yun Yang:
Dynamic On-the-Fly Minimum Cost Benchmarking for Storing Generated Scientific Datasets in the Cloud. 2781-2795 - Hanying Zheng, Xueyan Tang:

Analysis of Server Provisioning for Distributed Interactive Applications. 2752-2766 - Sheng-Wei Cheng, Ling-Chia Ku, Pi-Cheng Hsiu

:
Dynamic Antenna Management for Uplink Energy Efficiency on 802.11n Mobile Devices. 2767-2780 - Yu-Chun Cheng, Cheng-Fu Chou, Eric Hsiao-Kuang Wu, Gen-Huey Chen:

A Cognitive TCP Design for a Cognitive Radio Network with an Unstable-Bandwidth Link. 2730-3740 - Seongwook Jin, Jeongseob Ahn

, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng:
H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor. 2833-2846 - Ioannis Voyiatzis, Dimitris J. Kavvadias:

On the Generation of SIC Pairs in Optimal Time. 2891-2901 - Guiyuan Jiang

, Jigang Wu, Yajun Ha, Yi Wang
, Jizhou Sun:
Reconfiguring Three-Dimensional Processor Arrays for Fault-Tolerance: Hardness and Heuristic Algorithms. 2926-2939 - Lin Chen, Kaigui Bian:

The Telephone Coordination Game Revisited: From Random to Deterministic Algorithms. 2968-2980 - Carlo Condo, Guido Masera

, Paolo Montuschi:
Unequal Error Protection of Memories in LDPC Decoders. 2981-2993 - Irith Pomeranz:

Two-Dimensional Static Test Compaction for Functional Test Sequences. 3009-3015
Volume 64, Number 11, November 2015
- Sai Manoj P. D.

, Hao Yu
, Kanwen Wang:
3D Many-Core Microprocessor Power Management by Space-Time Multiplexing Based Demand-Supply Matching. 3022-3036 - Jianzhong Huang, Xiao Qin

, Xianhai Liang, Changsheng Xie:
An Efficient I/O-Redirection-Based Reconstruction Scheme for Erasure-Coded Storage Clusters. 3037-3050 - Fangming Liu, Peng Shu, John C. S. Lui:

AppATP: An Energy Conserving Adaptive Mobile-Cloud Transmission Protocol. 3051-3063 - Jing Mei, Kenli Li, Aijia Ouyang, Keqin Li:

A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing. 3064-3078 - Yuan-Yao Shih

, Ai-Chun Pang, Meng-Hsun Tsai
, Chien-Han Chai:
A Rewarding Framework for Network Resource Sharing in Co-Channel Hybrid Access Femtocell Networks. 3079-3090 - Jaeyong Chung, Lok-Won Kim:

Bit-Width Optimization by Divide-and-Conquer for Fixed-Point Digital Signal Processing Systems. 3091-3101 - Nagesh B. Lakshminarayana, Hyesoon Kim:

Block-Precise Processors: Low-Power Processors with Reduced Operand Store Accesses and Result Broadcasts. 3102-3114 - Jen-Wei Hsieh

, Yuan-Hung Kuan
:
DCCS: Double Circular Caching Scheme for DRAM/PRAM Hybrid Cache. 3115-3127 - Deze Zeng, Peng Li, Song Guo

, Toshiaki Miyazaki, Jiankun Hu
, Yong Xiang:
Energy Minimization in Multi-Task Software-Defined Sensor Networks. 3128-3139 - Alfonso Rodríguez, Félix Moreno:

Evolutionary Computing and Particle Filtering: A Hardware-Based Motion Estimation System. 3140-3152 - Zhibin Yu, Lieven Eeckhout, Nilanjan Goswami, Tao Li, Lizy K. John, Hai Jin, Cheng-Zhong Xu

, Junmin Wu:
GPGPU-MiniBench: Accelerating GPGPU Micro-Architecture Simulation. 3153-3166 - Jaekyu Lee

, Dong Hyuk Woo, Hyesoon Kim, Mani Azimi:
GREEN Cache: Exploiting the Disciplined Memory Model of OpenCL on GPUs. 3167-3180 - Mwaffaq Otoom

, JoAnn M. Paul:
Multiprocessor Capacity Metric and Analysis. 3181-3196 - Juri Ranieri, Alessandro Vincenzi, Amina Chebira, David Atienza, Martin Vetterli

:
Near-Optimal Thermal Monitoring Framework for Many-Core Systems-on-Chip. 3197-3209 - Dawei Li

, Jie Wu:
On Data Center Network Architectures for Interconnecting Dual-Port Servers. 3210-3222 - Zichen Xu, Yi-Cheng Tu, Xiaorui Wang:

Online Energy Estimation of Relational Operations in Database Systems. 3223-3236 - Yunfei Shang, Dan Li, Jing Zhu, Mingwei Xu:

On the Network Power Effectiveness of Data Center Architectures. 3237-3248 - Zhemin Zhang, Thomas G. Robertazzi:

Scheduling Divisible Loads in Gaussian, Mesh and Torus Network of Processors. 3249-3264 - Xuan Liu, Bin Xiao

, Shigeng Zhang, Kai Bu, Alvin Chan:
STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems. 3265-3277 - Wenli Zheng

, Kai Ma, Xiaorui Wang:
TE-Shave: Reducing Data Center Capital and Operating Expenses with Thermal Energy Storage. 3278-3292 - Jianfeng Wang

, Xiaofeng Chen, Xinyi Huang, Ilsun You, Yang Xiang:
Verifiable Auditing for Outsourced Database in Cloud Computing. 3293-3303 - Yunpeng Chai

, Zhihui Du
, Xiao Qin
, David A. Bader
:
WEC: Improving Durability of SSD Cache Drives by Caching Write-Efficient Data. 3304-3316 - Irith Pomeranz:

Test Vector Omission for Fault Coverage Improvement of Functional Test Sequences. 3317-3321
Volume 64, Number 12, December 2015
- Leonel Sousa

:
2n RNS Scalers for Extended 4-Moduli Sets. 3322-3334 - Urban Ingelsson, Sandeep Kumar Goel, Erik Larsson

, Erik Jan Marinissen
:
Abort-on-Fail Test Scheduling for Modular SOCs without and with Preemption. 3335-3347 - Jen-Wei Hsieh

, Chung-Wei Chen, Han-Yi Lin:
Adaptive ECC Scheme for Hybrid SSD's. 3348-3361 - Myounggyu Won, Radu Stoleru:

A Hybrid Multicast Routing for Large Scale Sensor Networks with Holes. 3362-3375 - David T. Lee, Jehoshua Bruck

:
Algorithms for Generating Probabilities with Multivalued Stochastic Relay Circuits. 3376-3388 - Xiaomin Zhu, Chao Chen, Laurence T. Yang, Yang Xiang

:
ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds. 3389-3403 - Cheng-Shang Chang, Jay Cheng, Tien-Ke Huang, Xuan-Chao Huang, Duan-Shin Lee, Chao-Yi Chen:

Bit-Stuffing Algorithms for Crosstalk Avoidance in High-Speed Switching. 3404-3416 - Linfeng Chen, Aijiao Cui, Chip-Hong Chang

:
Design of Optimal Scan Tree Based on Compact Test Patterns for Test Time Reduction. 3417-3429 - Zhijie Wang, Dijiang Huang

, Yan Zhu
, Bing Li, Chun-Jen Chung:
Efficient Attribute-Based Comparable Data Access Control. 3430-3443 - Che-Wei Tsao, Yuan-Hao Chang

, Ming-Chang Yang, Po-Chun Huang:
Efficient Victim Block Selection for Flash Storage Devices. 3444-3460 - Jeongseob Ahn

, Seongwook Jin, Jaehyuk Huh:
Fast Two-Level Address Translation for Virtualized Systems. 3461-3474 - Shadi G. Alawneh

, Roelof Dragt, Dennis K. Peters
, Claude Daley
, Stephen Bruneau:
Hyper-Real-Time Ice Simulation and Modeling Using GPGPU. 3475-3487 - Huawei Huang

, Song Guo
, Peng Li, Baoliu Ye, Ivan Stojmenovic:
Joint Optimization of Rule Placement and Traffic Engineering for QoS Provisioning in Software Defined Network. 3488-3499 - Jiang-Bo Qian

, Qiang Zhu, Huahui Chen:
Multi-Granularity Locality-Sensitive Bloom Filter. 3500-3514 - Hong Yao, Deze Zeng, Huawei Huang

, Song Guo
, Ahmed Barnawi, Ivan Stojmenovic:
Opportunistic Offloading of Deadline-Constrained Bulk Cellular Traffic in Vehicular DTNs. 3515-3527 - Meikang Qiu, Zhong Ming, Jiayin Li, Keke Gai

, Ziliang Zong:
Phase-Change Memory Optimization for Green Cloud with Genetic Algorithm. 3528-3540 - Anna Ye Du, Sanjukta Das Smith, Zhouhan Yang, Chunming Qiao, Ram Ramesh:

Predicting Transient Downtime in Virtual Server Systems: An Efficient Sample Path Randomization Approach. 3541-3554 - Dominic DiTomaso, Avinash Karanth Kodi, Ahmed Louri, Razvan C. Bunescu:

Resilient and Power-Efficient Multi-Function Channel Buffers in Network-on-Chip Architectures. 3555-3568 - Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang

, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Distributed Deduplication Systems with Improved Reliability. 3569-3579 - Mitchell A. Thornton

:
Simulation and Implication Using a Transfer Function Model for Switching Logic. 3580-3590 - Ashkan Eghbal, Pooria M. Yaghini

, Nader Bagherzadeh
, Misagh Khayambashi:
Analytical Fault Tolerance Assessment and Metrics for TSV-Based 3D Network-on-Chip. 3591-3604 - Anna Bernasconi

, Valentina Ciriani
, Gabriella Trucco
, Tiziano Villa:
Using Flexibility in P-Circuits by Boolean Relations. 3605-3618 - Young-Sik Kim

:
Comments on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding". 3619-3620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














