default search action
IPCCC 2013: San Diego, CA, USA
- IEEE 32nd International Performance Computing and Communications Conference, IPCCC 2013, San Diego, CA, USA, December 6-8, 2013. IEEE Computer Society 2013
- Nhan Nguyen, Mohammad Maifi Hasan Khan:
Performance analysis of a fault-tolerant exact motif mining algorithm on the cloud. 1-9 - Zhipeng Cai, Zhiqiang Lin:
Message from the IPCCC 2013 technical program chairs. 1 - Yu Wang, Kuai Xu:
Message from the IPCCC 2013 general chairs. 1
Session 1: System Optimization
- Wei Yan, Vinod Muthusamy, Mingwen Chen, Yonghong Huang, Zheng Xiao, Xubin Pei, Songlin Hu:
Queue reorganization for subscription congestion avoidance in publish/subscribe systems. 1-10 - Li Tan, Zizhong Chen, Ziliang Zong, Dong Li, Rong Ge:
A2E: Adaptively aggressive energy efficient DVFS scheduling for data intensive applications. 1-10 - Guangping Xu, Sheng Lin, Hua Zhang, Xing Guo, Kai Shi:
Expander code: A scalable erasure-resilient code to keep up with data growth in distributed storage. 1-9 - Dannie M. Stanley, Dongyan Xu, Eugene H. Spafford:
Improved kernel security through memory layout randomization. 1-10 - Brian Romoser, Ziliang Zong, Ribel Fares, Joal Wood, Rong Ge:
Using intelligent prefetching to reduce the energy consumption of a large-scale storage system. 1-9
Session 2: Performance Analysis
- Lan Wu, Wei Zhang:
Reducing worst-case execution time of hybrid SPM-caches. 1-9 - Xu Ye, Bo Yan, Guanling Chen:
Providing diagnostic network feedback to end users on smartphones. 1-9 - Mingyang Wang, Yiming Hu:
Exploit real-time fine-grained access patterns to partition write buffer to improve SSD performance and life-span. 1-7 - Kurt Van Hautegem, Wouter Rogiest, Herwig Bruneel:
OPS/OBS scheduling algorithms: Incorporating a wavelength conversion cost in the performance analysis. 1-9
Session 3: Network Protocol
- Dongsoo Kim, Eric C. Noel, K. Wendy Tang:
Reliable and efficient routing protocol for graph theory based communication topology. 1-10 - Mihaela Cardei, Amalya Mihnea:
Distributed protocol for channel assignment in cognitive wireless sensor networks. 1-9 - Ashok N. Masilamani, Ali Dabirmoghaddam, J. J. Garcia-Luna-Aceves:
CSIR: Cellular scheduling with Interest-driven Routing. 1-10 - Jinbao Li, Zhigang Wang, Longjiang Guo:
A novel multi-radio MAC protocol based union mechanism in wireless sensor networks. 1-8
Session 4: Wireless Networks
- Yali Wang, J. J. Garcia-Luna-Aceves:
Minimizing routing overhead with Two-Hop Coordinate Awareness in ad hoc networks. 1-9 - Rumi Ghosh, J. J. Garcia-Luna-Aceves:
Automatic incremental routing using multiple roots. 1-9 - Songsong Li, Yuqing Zhu, Deying Li, Donghyun Kim, Hejiao Huang:
Rumor restriction in Online Social Networks. 1-10 - Xian Chen, Lester Lipsky, Kyoungwon Suh, Bing Wang, Wei Wei:
Session lengths and IP address usage of smartphones in a university campus WiFi network: Characterization and analytical models. 1-9
Session 5: Cloud Computing
- Ethan Blanton, Mehmet Engin Tozal, Kamil Saraç, Sonia Fahmy:
Location matters: Eliciting responses to direct probes. 1-10 - Zhangjie Fu, Xingming Sun, Zhihua Xia, Lu Zhou, Jiangang Shu:
Multi-keyword ranked search supporting synonym query over encrypted data in cloud computing. 1-8 - Saurabh Dey, Srinivas Sampalli, Qiang Ye:
Message digest as authentication entity for mobile cloud computing. 1-6 - Wei Yan, Yuan Xue, Bradley A. Malin:
Scalable load balancing for mapreduce-based record linkage. 1-10
Session 6: System Analysis
- Bahman Javadi, Kenan M. Matawie, David P. Anderson:
Modeling and analysis of resources availability in volunteer computing systems. 1-9 - Emrah Çem, Mehmet Engin Tozal, Kamil Saraç:
Impact of sampling design in estimation of graph characteristics. 1-10 - Ivan Zecena, Martin Burtscher, Tongdan Jin, Ziliang Zong:
Evaluating the performance and energy efficiency of n-body codes on multi-core CPUs and GPUs. 1-8 - Jonathan Kirchhoff, Jan Bauer, Raphael Ernst, Christoph Fuchs, Sascha Jopen, Nils Aschenbruck:
Extending ODMRP for on-site deployments in disaster area scenarios. 1-10
Session 7: Social Networks
- Bow-Nan Cheng, James Wheeler, Brian Hung, Scott Moore, Prasanna Sukumar:
A comparison of IP header compression schemes in MANETs. 1-9 - Jing He, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah:
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences. 1-8 - Guoliang Liu, Janani Krishnamani, Rajshekhar Sunderraman, Yingshu Li:
Prediction-based routing with packet scheduling under temporal constraint in delay tolerant networks. 1-7 - Fan Li, Hong Jiang, Yu Wang, Xin Li, Mingzhong Wang, Tabouche Abdeldjalil:
SEBAR: Social Energy Based Routing scheme for mobile social Delay Tolerant Networks. 1-8
Session 8: Resource Management
- Mohamed Said Seddiki, Bilel Nefzi, Ye-Qiong Song, Mounir Frikha:
Automated controllers for bandwidth allocation in network virtualization. 1-7 - Shuo Chen, Xiaoming Li:
A hybrid GPU/CPU FFT library for large FFT problems. 1-10 - Peng Yang, Ertong Zhang, Lisong Xu:
Sizing router buffer for the Internet with heterogeneous TCP. 1-9 - Dongliang Chu, Chase Qishi Wu, Jinzhu Gao, Li Wang:
On a generalized approach to order-independent image composition in parallel visualization. 1-10
Poster Session
- Guangping Xu, Xing Guo, Hua Zhang, Sheng Lin, Chunxia Yang:
Optimization for reliable erasure-coded storage allocation under multiple constraints. 1-2 - Kathlene Hurt, Byeong Kil Lee:
Proposed enhancements to fixed segmented LRU cache replacement policy. 1-2 - Nemroud Youssouf, Xin Li, Fan Li, Huiying Yuan:
Magnetic field modeling-based energy efficient routing in wireless sensor networks. 1-2 - Zheng Wang, An-Lei Hu:
Predicting DNS Server Load Distribution. 1-2 - Zheng Wang, An-Lei Hu:
A lightweight solution to remote DNS. 1-3 - Wei Zhang:
Defend GPUs against DoS attacks. 1-2 - Zaid Hijaz, Victor S. Frost:
The impact of interference from a covert link on a data link using OFDM, AMC, and hybrid ARQ. 1-2 - Wenjia Li, Lindah Kotut:
Trustworthy data management for wireless networks in Cyber-Physical Systems. 1-2 - Silvia Elena Restrepo, Philippe Pinaud, Jorge E. Pezoa, Sergio K. Sobarzo:
Energy-aware image allocation for distributed video processing on handheld devices. 1-2 - José Núñez-Martínez, Jorge Baranda, Josep Mangues-Bafalluy:
Backpressure routing for the backhaul in sparse small cell deployments. 1-2 - Liliana F. B. Soares, Diogo A. B. Fernandes, Mário M. Freire, Pedro R. M. Inácio:
Secure user authentication in cloud computing management interfaces. 1-2 - Christian Horn, Jörg Krüger:
Enhanced infrastructure security through inter-level anomaly detection. 1-2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.