default search action
35th IPCCC 2016: Las Vegas, NV, USA
- 35th IEEE International Performance Computing and Communications Conference, IPCCC 2016, Las Vegas, NV, USA, December 9-11, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5252-3
- Ender Ayanoglu:
Fifth generation (5G) cellular wireless: Vision, goals, and challenges. 1-3 - Ines Khoufi, Pascale Minet, Erwan Livolant, Badr Rmili:
Building an IEEE 802.15.4e TSCH network. 1-2 - Roni F. Shigueta, Mauro Fonseca, Aline Carneiro Viana:
User behavior-aware channel allocation scheme for mobile ad hoc networks. 1-2 - James Hadley, Utz Roedig, Yehia Elkhatib:
Using context switches for VM scaling. 1-2 - Aiqin Hou, Chase Q. Wu, Dingyi Fang, Yongqiang Wang, Meng Wang, Tao Wang, Xiaoyang Zhang:
Bandwidth scheduling with multiple variable node-disjoint paths in high-performance networks. 1-4 - Manu Awasthi, Krishna T. Malladi:
KOVA : A tool for kernel visualization and analysis. 1-3 - Denise Ferebee, Vivek Shandilya, Chase Q. Wu, Janet Ricks, David Agular, Karyn Cole, Byron Ray, Aukii Franklin, Candice Titon, Zongmin Wang:
A secure framework for mHealth data analytics with visualization. 1-4 - Paul Townend, Jie Xu, Jon Summers, Daniel Ruprecht, Harvey Thompson:
Holistic data centres: Next generation data and thermal energy infrastructures. 1-2 - Swapnoneel Roy, Matt Rutherford, Charlene H. Crawshaw:
Towards designing and implementing a secure one time password (OTP) authentication system. 1-2 - Nader Mohamed, Jameela Al-Jaroodi, Sanja Lazarova-Molnar, Imad Jawhar:
Middleware to support cyber-physical systems. 1-3 - Emrah Çem, Kamil Saraç:
Estimating clustering coefficients via metropolis-hastings random walk and wedge sampling on large OSN graphs. 1-2 - Jehan-François Pâris, Thomas J. E. Schwarz, Darrell D. E. Long:
Improving disk array reliability through faster repairs (Extended abstract). 1-2 - Janki Bhimani, Ningfang Mi, Miriam Leeser:
Performance prediction techniques for scalable large data processing in distributed MPI systems. 1-2 - Shouq Alsubaihi, Jean-Luc Gaudiot:
PETS: Performance, energy and thermal aware scheduler for job mapping with resource allocation in heterogeneous systems. 1-2 - Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Thwart eavesdropping attacks on network communication based on moving target defense. 1-2 - Henry Griffith, Rajiv Ranganathan, Subir Biswas:
Towards a first-reflection ultrasonic sensor array for compensatory movement identification in stroke sufferers. 1-2 - Ali Aldarraji, Liang Hong, Sachin Shetty:
Polarized beamforming for enhanced countermeasure of wireless jamming attacks. 1-2 - Xiaohui Nie, Youjian Zhao, Kaixin Sui, Dan Pei, Yu Chen, Xianping Qu:
Mining causality graph for automatic web-based service diagnosis. 1-8 - Zuqin Ji, Jun Shen, Xiao Zhou, Delin Ding, Yujian Zhang:
The analysis of service extensibility in extensible network service model. 1-8 - Kasim Oztoprak, Mehmet Akif Yazici:
A hybrid asymmetric traffic classifier for deep packet inspection systems with route asymmetry. 1-8 - Feng Wang, Xiaozhe Shao, Lixin Gao, Hiroaki Harai, Kenji Fujikawa:
Towards variable length addressing for scalable Internet routing. 1-9 - Se-Young Yu, Aniket Mahanti, Mingwei Gong:
Benchmarking ISPs in New Zealand. 1-7 - Yueshi Wu, Mihaela Cardei:
A cognitive radio approach for data collection in border surveillance. 1-8 - Catalina Aranzazu Suescun, Mihaela Cardei:
Event-based clustering for composite event detection in wireless sensors networks. 1-8 - Prateek K. Singh, James H. Nguyen, Santosh K. Gupta, Koushik Kar, Daniel T. Ku:
High performance mass configuration protocols for MANETs using efficient broadcasting. 1-10 - Wei Yu, Hansong Xu, Amirshahram Hematian, David W. Griffith, Nada Golmie:
Towards energy efficiency in ultra dense networks. 1-8 - Mingchu Li, Shiyu Wang, Kun Lu:
A dynamic bandwidth pricing mechanism based on trust management in P2P streaming systems. 1-8 - Yi He, Qi Li:
Detecting and defending against inter-app permission leaks in android apps. 1-7 - Aimin Zhang, Yi He, Yong Jiang:
CrashFuzzer: Detecting input processing related crash bugs in android applications. 1-8 - Zhen Feng, Mingwei Xu, Yuan Yang, Yu Wang, Qing Li, Weichao Wang:
Optimizing content delivery in ICN networks by the supply chain model. 1-8 - Jue Chen, Jinbang Chen, Junchen Ling, Wei Zhang:
Failure recovery using vlan-tag in SDN: High speed with low memory requirement. 1-9 - Song Huang, Zhiang Deng, Song Fu:
Quantifying entity criticality for fault impact analysis and dependability enhancement in software-defined networks. 1-8 - Lauritz Thamsen, Ilya Verbitskiy, Florian Schmidt, Thomas Renner, Odej Kao:
Selecting resources for distributed dataflow systems according to runtime targets. 1-8 - Ting Zhang, Duc A. Tran:
On query-adaptive online partitioning: A study of evolutionary algorithms. 1-8 - Md. Amjad Hossain, Javed I. Khan:
Distributed dynamic MCU for video conferencing in peer-to-peer network. 1-8 - Qiu Tang, Lei Jiang, Majing Su, Qiong Dai:
A pipelined market data processing architecture to overcome financial data dependency. 1-8 - Mohak Chadha, Abhishek Srivastava, Santonu Sarkar:
Unified power and energy measurement API for HPC co-processors. 1-8 - Fan Li, Cheng Xu, Yang Liu, Yun Zhang, Zhuo Li, Kashif Sharif, Yu Wang:
Mo-sleep: Unobtrusive sleep and movement monitoring via Wi-Fi signal. 1-8 - Hang Yu, Bryan Ng, Winston K. G. Seah:
On-demand efficient polling for nanonetworks under dynamic IoT backhaul network conditions. 1-8 - Fredrik Saveros, Mingwei Gong, Niklas Carlsson, Aniket Mahanti:
An energy-efficient handover algorithm for wireless sensor networks. 1-8 - Ines Khoufi, Pascale Minet, Mohammed-Amine Koulali, Abdellatif Kobbane:
Path planning of mobile sinks in charge of data gathering: A coalitional game theory approach. 1-8 - Dongwei Wang, Weijun Xiao:
A reuse distance based performance analysis on GPU L1 data cache. 1-8 - Raed Al-Aaridhi, Kalman Graffi:
Sets, lists and trees: Distributed data structures on distributed hash tables. 1-8 - Xiaoheng Deng, Weijian Zhong, Ju Ren, Detian Zeng, Honggang Zhang:
An imbalanced data classification method based on automatic clustering under-sampling. 1-8 - Roman Seibel, Somayeh Taheri, Keyu Wang, Dieter Hogrefe:
Minimizing intra-flow interference in multi-channel mesh networks: An optimization approach. 1-10 - Mahmoud Khasawneh, Anjali Agarwal:
A secure routing algorithm based on nodes behavior during spectrum sensing in cognitive radio networks. 1-8 - Matthias Schwamborn, Nils Aschenbruck:
Towards an extensive map-oriented trace basis for human mobility modeling. 1-10 - Xin Wang, Wei Zhang:
Cache locking vs. partitioning for real-time computing on integrated CPU-GPU processors. 1-8 - Indar Sugiarto, Gengting Liu, Simon Davidson, Luis A. Plana, Steve B. Furber:
High performance computing on SpiNNaker neuromorphic platform: A case study for energy efficient image processing. 1-8 - Jing Ke, Tomasz Bednarz, Arcot Sowmya:
Optimized GPU implementation for dynamic programming in image data processing. 1-7 - Yujian Zhang, Yun Wang, Hui Wang:
Energy-efficient task scheduling for DVFS-enabled heterogeneous computing systems using a linear programming approach. 1-8 - Jiayin Wang, Teng Wang, Zhengyu Yang, Ningfang Mi, Bo Sheng:
eSplash: Efficient speculation in large scale heterogeneous computing systems. 1-8 - Haoran Cai, Qiang Cao, Feng Sheng, Manyi Zhang, Chuanyi Qi, Jie Yao, Changsheng Xie:
Montgolfier: Latency-aware power management system for heterogeneous servers. 1-8 - Janki Bhimani, Jingpei Yang, Zhengyu Yang, Ningfang Mi, Qiumin Xu, Manu Awasthi, Rajinikanth Pandurangan, Vijay Balakrishnan:
Understanding performance of I/O intensive containerized applications for NVMe SSDs. 1-8 - Vero Estrada-Galiñanes, Jehan-François Pâris, Pascal Felber:
Simple data entanglement layouts with high reliability. 1-8 - Ganesh Chennimala Sankaran, Krishna M. Sivalingam:
Time synchronization mechanisms for an optically groomed data center network. 1-8 - Bowen Tian, Yun Tian, Yijie Sun, Trevor Hurt, Brandon Huebert, Waymon Ho, Yuting Zhang, Danqi Chen:
A secure data allocation solution for heterogeneous Hadoop systems: SecHDFS. 1-8 - Yao Qin, Hua Wang, Zhiping Jia, Hui Xia:
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP. 1-8 - Weimiao Feng, Jianguo Sun, Liguo Zhang, Cuiling Cao, Qing Yang:
A support vector machine based naive Bayes algorithm for spam filtering. 1-8 - Mohamed Azard Rilvan, Kolby Isiah Lacy, Md. Shafaeat Hossain, Bing Wang:
User authentication and identification on smartphones by incorporating capacitive touchscreen. 1-8 - Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Data integrity attacks against the distributed real-time pricing in the smart grid. 1-8 - Zhengyu Yang, Jianzhe Tai, Janki Bhimani, Jiayin Wang, Ningfang Mi, Bo Sheng:
GReM: Dynamic SSD resource allocation in virtualized storage systems with heterogeneous IO workloads. 1-8 - Xi Tao, Qi Zeng, Jih-Kwon Peir, Shih-Lien Lu:
Small cache lookaside table for fast DRAM cache access. 1-10 - Wenjie Liu, Ping Huang, Tang Kun, Tao Lu, Ke Zhou, Chun-hua Li, Xubin He:
LAMS: A latency-aware memory scheduling policy for modern DRAM systems. 1-8 - Nafiul Alam Siddique, Abdel-Hameed A. Badawy, Jeanine E. Cook, David Resnick:
LMStr: Local memory store the case for hardware controlled scratchpad memory for general purpose processors. 1-8 - Alan J. Michaels, William C. Headley, Joseph M. Ernst, Seth D. Hitefield:
Enhanced PHY-layer security via co-channel underlays. 1-6 - Ngoc-Thuy Le, Doan B. Hoang:
Can maturity models support cyber security? 1-7 - Zhengyu Yang, Jiayin Wang, David Thomas Evans, Ningfang Mi:
AutoReplica: Automatic data replica manager in distributed caching and data processing systems. 1-6 - Sharaf J. Malebary, Wenyuan Xu, Chin-Tser Huang:
Jamming mobility in 802.11p networks: Modeling, evaluation, and detection. 1-7 - Sanja Lazarova-Molnar, Hamid Reza Shaker, Nader Mohamed:
Reliability of cyber physical systems with focus on building management systems. 1-6 - Amar Rasheed, M. Cotter, B. Smith, D. Levan, Shashi Phoha:
Dynamically reconfigurable AES cryptographic core for small, power limited mobile sensors. 1-7 - Ikram Syed, Byeong-Hee Roh:
Delay analysis of IEEE 802.11e EDCA with enhanced QoS for delay sensitive applications. 1-4 - Olabisi E. Falowo:
Optimal multicriteria RAT-selection decisions for multiple handoff calls in heterogeneous wireless networks. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.