default search action
IPCCC 2009: Phoenix, Arizona, USA
- 28th International Performance Computing and Communications Conference, IPCCC 2009, 14-16 December 2009, Phoenix, Arizona, USA. IEEE Computer Society 2009, ISBN 978-1-4244-5737-3
Sensor Networks
- Chinh T. Vu, Guantao Chen, Yi Zhao, Yingshu Li:
A universal framework for partial coverage in Wireless Sensor Networks. 1-8 - Taekkyeun Lee, Chunming Qiao, Murat Demirbas, Jinhui Xu:
ABC-MC: A simple multi-channel geographic forwarding scheme for wireless sensor networks. 9-16 - Yu Liu, Wei Zhang, Kemal Akkaya:
Static worst-case energy and lifetime estimation of wireless sensor networks. 17-24 - Ying Guo, Feng Hong, Zhongwen Guo, Zongke Jin, Yuan Feng:
EDA: Event-oriented data aggregation in sensor networks. 25-32 - Longjiang Guo, Chunyu Ai, Xiaoming Wang, Zhipeng Cai, Yingshu Li:
Real time clustering of sensory data in wireless sensor networks. 33-40
Transportation and Performance
- Xukang Lu, Qishi Wu, Nageswara S. V. Rao, Zongmin Wang:
On Performance-Adaptive flow control for large data transfer in high speed networks. 49-56 - Mayutan Arumaithurai, Rüdiger Geib, Rene Rex, Xiaoming Fu:
Pre-congestion notification-based flow management in MPLS-based DiffServ networks. 57-64 - Jing Chen, Wei Tan, Lixiang Liu, Xiaohui Hu, Fanjiang Xu:
Towards zero loss for TCP in wireless networks. 65-70 - Jia Zhou, Fengyuan Ren, Chuang Lin:
Saturation aware TCP throughput prediction. 71-78
Energy Efficiency
- Xiaojun Ruan, Shu Yin, Adam Manzanares, Jiong Xie, Zhiyang Ding, James Majors, Xiao Qin:
ECOS: An energy-efficient cluster storage system. 79-86 - Shu Yin, Xiaojun Ruan, Adam Manzanares, Zhiyang Ding, Jiong Xie, James Majors, Xiao Qin:
Improving reliability of energy-efficient parallel storage systems by disk swapping. 87-94 - Javad Vazifehdan, Ramin Hekmat, R. Venkatesha Prasad, Ignas G. Niemegeers:
Performance evaluation of power-aware routing algorithms in Personal Networks. 95-102 - Manki Min, Bipin C. Neupane:
Virtual Center: A characteristic of minimum power broadcast trees in wireless ad hoc networks. 103-110 - David Essary, Ahmed Amer:
Avoiding state-space explosion of predictive metadata with SESH. 111-120
Performance in Computing and Communications
- Xiaorong Li, Terence Hung, Sharad Singhal:
A user-centric dynamic cluster partitioning approach for HPC service optimization. 121-128 - Jehan-François Pâris, Ahmed Amer:
Using shared parity disks to improve the reliability of RAID arrays. 129-136 - Lydia Y. Chen, Wolfgang E. Denzel, Ronald P. Luijten:
Optimization of link bandwidth for parallel communication performance. 137-144 - Carl Henrik Lunde, Håvard Espeland, Håkon Kvale Stensland, Pål Halvorsen:
Improving file tree traversal performance by scheduling I/O operations in user space. 145-152 - Wei Hao, Jicheng Fu, I-Ling Yen, Zhonghang Xia:
Achieving high performance web applications by service and database replications at edge servers. 153-160
Wireless Networks
- Thang N. Dinh, Ying Xuan, My T. Thai:
Towards social-aware routing in dynamic communication networks. 161-168 - Tamer Nadeem:
Opportunistic mechanisms for IEEE 802.11 networks using directional antennas. 169-176 - Guo-Kai Zeng, Bo Wang, Matt W. Mutka, Li Xiao, Eric Torng:
Efficient multicast for link-heterogeneous wireless mesh networks. 177-184 - Weihuang Fu, Xiaoyuan Wang, Dharma P. Agrawal:
Characterizing deployment and distribution of self-powered mesh routers in wireless mesh networks. 185-192 - Jun Li, Yifeng Zhou, Louise Lamont:
Analysis of the impact of swarm mobility on performance of routing protocols in MANETs. 193-199
Security
- Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala:
LWRM: A lightweight response mechanism for TCG TOCTOU attack. 200-207 - Zesheng Chen, Todor Cooklev, Chao Chen, Carlos A. Pomalaza-Raez:
Modeling primary user emulation attacks and defenses in cognitive radio networks. 208-215 - Amar A. Rasheed, Rabi N. Mahapatra:
Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks. 216-222 - Ying Xuan, Yilin Shen, Incheol Shin, My T. Thai:
On trigger detection against reactive Jamming Attacks: A clique-independent set based approach. 223-230
Optimization and Architecture
- Lauro B. Costa, Samer Al-Kiswany, Matei Ripeanu:
GPU support for batch oriented workloads. 231-238 - Santhosh Verma, Benjamin Maderazo, David M. Koppelman:
Spotlight - a low complexity highly accurate profile-based branch predictor. 239-247 - Alejandro Segovia, Xiaoming Li, Guang R. Gao:
Iterative layer-based raytracing on CUDA. 248-255 - Murat Bolat, Xiaoming Li:
Context-aware code optimization. 256-263
Location, Efficiency and Reliability
- Mourad Elhadef, Amiya Nayak:
Efficient symmetric comparison-based self-diagnosis using backpropagation artificial neural networks. 264-271 - Jian Zhu, Mohammad Oliya, Hung Keng Pung:
A pragmatic approach to location-aware service organization and discovery. 272-279 - Baris Tas, Nihat Altiparmak, Ali Saman Tosun:
Low cost indoor location management system using infrared leds and Wii Remote Controller. 280-288 - Lizhe Wang, Gregor von Laszewski, Jai Dayal, Thomas R. Furlani:
Thermal aware workload scheduling with backfilling for green data centers. 289-296 - Xinhua Yang, Tracy Camp:
A-MAC: Efficient Medium Access for cluster-based wireless sensor networks. 297-306
Distributed Systems
- Bibudh Lahiri, Srikanta Tirthapura:
Finding correlated heavy-hitters over data streams. 307-314 - Yang Cao, Shikharesh Majumdar, Chung-Horng Lung:
Caching techniques for XML message filtering. 315-322 - Haitao Li, Xu Ke, James Seng, Po Hu:
Towards health of replication in large-scale P2P-VoD systems. 323-330 - Chentao Wu, Xubin He, Shenggang Wan, Qiang Cao, Changsheng Xie:
Hotspot Prediction and cache in distributed stream-processing storage systems. 331-340 - Jinglei Wang, Yibo Xue, Haixia Wang, Dongsheng Wang:
Network caching for Chip Multiprocessors. 341-348
Broadband Wireless and Cognitive Radio Networks Workshop, Part I
- Ye Ouyang, M. Hosein Fallah:
A study of throughput for Iu-CS and Iu-PS interface in UMTS core network. 349-353 - Myounghwan Lee, John A. Copeland:
An adaptive polling algorithm with differentiation strategy in IEEE 802.16 multi-hop networks with IEEE 802.11e WLANs. 354-359 - Adam Flizikowski, Rafal Kozik, Mateusz Majewski, Marcin Przybyszewski:
Performance comparison of guard channel admission control schemes for IEEE 802.16 system with various turbo code FEC schemes. 360-365 - Lambros Lambrinos, Constantinos Djouvas:
Applying scheduling policies to improve QoE in wireless Voice-over-IP. 366-370 - Ye Ouyang, M. Hosein Fallah:
A study of throughput for Nb, Mc and Nc interface in UMTS core network. 371-375
Data and Information Assurance Workshop
- Tobias Limmer, Falko Dressler:
Flow-based TCP connection analysis. 376-383 - Kevin S. Bauer, Dirk Grunwald, Douglas C. Sicker:
Predicting Tor path compromise by exit port. 384-387 - Hong Zhao:
Multiscale analysis and prediction of network traffic. 388-393 - Felix Leder, Peter Martini, André Wichmann:
Finding and extracting crypto routines from malware. 394-401 - Guangping Xu, Hua Zhang, Jing Liu, Gang Wang, Xiaoguang Liu:
Network measurement based redundancy model and maintenance in dynamic P2P storage systems. 402-409 - Samee Ullah Khan:
A goal programming approach for the joint optimization of energy consumption and response time in computational grids. 410-417
Broadband Wireless and Cognitive Radio Networks Workshop, Part II
- Alain Mourad, Ismael Gutiérrez:
System level evaluation for WiMAX IEEE 802.16m. 418-424 - Danda B. Rawat, Dimitrie C. Popescu:
Joint precoder and power adaptation for cognitive radios in interference systems. 425-430 - Muhammad Waheed, Anni Cai:
Evolutionary algorithms for radio resource management in cognitive radio network. 431-436 - Vinod Namboodiri:
Are cognitive radios energy efficient? A study of the Wireless LAN scenario. 437-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.