default search action
IEEE Transactions on Parallel and Distributed Systems, Volume 20
Volume 20, Number 1, January 2009
- Lee Kee Goh, Bharadwaj Veeravalli, Sivakumar Viswanathan:
Design of Fast and Efficient Energy-Aware Gradient-Based Scheduling Algorithms Heterogeneous Embedded Multiprocessor Systems. 1-12 - Alejandro Martínez, Pedro Javier García, Francisco José Alfaro, José L. Sánchez, José Flich, Francisco J. Quiles, José Duato:
A Switch Architecture Guaranteeing QoS Provision and HOL Blocking Elimination. 13-24 - Iain A. Stewart, Yonghong Xiang:
Bipanconnectivity and Bipancyclicity in k-ary n-cubes. 25-33 - Shushan Wen, Yuguang Fang, Hairong Sun:
Differentiated Bandwidth Allocation with TCP Protection in Core Routers. 34-47 - Chin-Fu Kuo, Ai-Chun Pang, Sheng-Kun Chan:
Dynamic Routing with Security Considerations. 48-58 - Jian-Guang Luo, Qian Zhang, Yun Tang, Shi-Qiang Yang:
A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service. 59-70 - Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni:
Difficulty-Aware Hybrid Search in Peer-to-Peer Networks. 71-82 - Ke Chen, Kai Hwang, Gang Chen:
Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. 83-96 - Meng Zhang, Yongqiang Xiong, Qian Zhang, Lifeng Sun, Shiqiang Yang:
Optimizing the Throughput of Data-Driven Peer-to-Peer Streaming. 97-110 - Sumantra R. Kundu, Sourav Pal, Kalyan Basu, Sajal K. Das:
An Architectural Framework for Accurate Characterization of Network Traffic. 111-123 - Maleq Khan, Gopal Pandurangan, V. S. Anil Kumar:
Distributed Algorithms for Constructing Approximate Minimum Spanning Trees in Wireless Sensor Networks. 124-139
Volume 20, Number 2, February 2009
- Donghyun Kim, Yiwei Wu, Yingshu Li, Feng Zou, Ding-Zhu Du:
Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks. 147-157 - Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. 158-170 - Jie Gao, Li Zhang:
Trade-Offs between Stretch Factor and Load-Balancing Ratio in Routing on Growth-Restricted Graphs. 171-179 - Maria Chtepen, Filip H. A. Claeys, Bart Dhoedt, Filip De Turck, Piet Demeester, Peter A. Vanrolleghem:
Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids. 180-190 - Alper Tugay Mizrak, Stefan Savage, Keith Marzullo:
Detecting Malicious Packet Losses. 191-206 - Menno Dobber, Robert D. van der Mei, Ger Koole:
Dynamic Load Balancing and Job Replication in a Global-Scale Grid Environment: A Comparison. 207-218 - Zhen Yang, Huadong Ma:
Hotspot Avoidance for P2P Streaming Distribution Application: A Game Theoretic Approach. 219-232 - Hui Guo, Kwok-Tung Lo, Yi Qian, Jiang Li:
Peer-to-Peer Live Video Distribution under Heterogeneous Bandwidth Constraints. 233-245 - Azzedine Boukerche, YunFeng Gu:
An Efficient Adaptive Transmission Control Scheme for Large-Scale Distributed Simulation Systems. 246-260 - Guangming Tan, Ninghui Sun, Guang R. Gao:
Improving Performance of Dynamic Programming via Parallelism and Locality on Multicore Architectures. 261-274 - Qiang Wei, Matei Ripeanu, Konstantin Beznosov:
Cooperative Secondary Authorization Recycling. 275-288
Volume 20, Number 3, March 2009
- Hwangnam Kim, E-yong Kim:
PReSENt: A Collaboration Framework for Resource Sharing in Wireless Mesh Networks. 289-302 - Chen Wang, Bing Bing Zhou, Albert Y. Zomaya:
A Decentralized Method for Scaling Up Genome Similarity Search Services. 303-315 - Maurizio Palesi, Rickard Holsmark, Shashi Kumar, Vincenzo Catania:
Application Specific Routing Algorithms for Networks on Chip. 316-330 - Shuyi Shao, Alex K. Jones, Rami G. Melhem:
Compiler Techniques for Efficient Communications in Circuit Switched Networks for Multiprocessor Systems. 331-345 - Samee Ullah Khan, Ishfaq Ahmad:
A Cooperative Game Theoretical Technique for Joint Optimization of Energy Consumption and Response Time in Computational Grids. 346-360 - Weidong Chen, Wenjun Xiao, Behrooz Parhami:
Swapped (OTIS) Networks Built of Connected Basis Networks Are Maximally Fault Tolerant. 361-366 - Sun-Yuan Hsieh, Tsung-Yen Chuang:
The Strong Diagnosability of Regular Networks and Product Networks under the PMC Model. 367-378 - Savio S. H. Tse:
Online Bicriteria Load Balancing Using Object Reallocation. 379-388 - Hui Wang, Rama Sangireddy, Sandeep Baldawa:
Optimizing Instruction Scheduling through Combined In-Order and O-O-O Execution in SMT Processors. 389-403 - Eduard Ayguadé, Nawal Copty, Alejandro Duran, Jay P. Hoeflinger, Yuan Lin, Federico Massaioli, Xavier Teruel, Priya Unnikrishnan, Guansong Zhang:
The Design of OpenMP Tasks. 404-418 - Alysson Neves Bessani, Miguel Correia, Joni da Silva Fraga, Lau Cheuk Lung:
Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces. 419-432
Volume 20, Number 4, April 2009
- Cong Liu, Jie Wu:
Virtual-Force-Based Geometric Routing Protocol in MANETs. 433-445 - Ramsés Morales, Indranil Gupta:
AVMON: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems. 446-459 - Yawei Li, Zhiling Lan, Prashasta Gujrati, Xian-He Sun:
Fault-Aware Runtime Strategies for High-Performance Computing. 460-473 - Navid Imani, Hamid Sarbazi-Azad, Albert Y. Zomaya, Paria Moinzadeh:
Detecting Threats in Star Graphs. 474-483 - Wickus Nienaber, Xin Yuan, Zhenhai Duan:
LID Assignment in InfiniBand Networks. 484-497 - Georgios I. Goumas, Nikolaos Drosinos, Nectarios Koziris:
Communication-Aware Supernode Shape. 498-511 - Mudhakar Srivatsa, Ling Liu:
Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach. 512-527 - Yuan He, Yunhao Liu:
VOVO: VCR-Oriented Video-on-Demand in Large-Scale Peer-to-Peer Networks. 528-539 - Ye Zhu, Riccardo Bettati:
Information Leakage as a Model for Quality of Anonymity Networks. 540-552 - Marko Bertogna, Michele Cirinei, Giuseppe Lipari:
Schedulability Analysis of Global Scheduling Algorithms on Multiprocessor Platforms. 553-566 - Yang Xiang, Wanlei Zhou, Minyi Guo:
Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks. 567-580 - Sun-Yuan Hsieh, Chia-Wei Lee:
Conditional Edge-Fault Hamiltonicity of Matching Composition Networks. 581-592
Volume 20, Number 5, May 2009
- Kuan-Ta Chen, Polly Huang, Chin-Laung Lei:
Effect of Network Quality on Player Departure Behavior in Online Games. 593-606 - Abdelmounaam Rezgui, Mohamed Eltoweissy:
µRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks. 607-622 - Konstantinos Kyriakopoulos, Kleanthis Psarris:
Nonlinear Symbolic Analysis for Advanced Program Parallelization. 623-640 - Yichuan Jiang, Jiuchuan Jiang:
Contextual Resource Negotiation-Based Task Allocation and Load Balancing in Complex Software Systems. 641-653 - Tsungnan Lin, Pochiang Lin, Hsinping Wang, Chia Hung Chen:
Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks. 654-666 - Hasan Guclu, Murat Yuksel:
Limited Scale-Free Overlay Topologies for Unstructured Peer-to-Peer Networks. 667-679 - John Risson, Aaron Harwood, Tim Moors:
Topology Dissemination for Reliable One-Hop Distributed Hash Tables. 680-694 - Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham, Yong Guan:
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis. 695-709 - Feng Wang, Mounir Hamdi, Jogesh K. Muppala:
Using Parallel DRAM to Scale Router Buffers. 710-724 - Kang Li, Zhenyu Zhong, Lakshmish Ramaswamy:
Privacy-Aware Collaborative Spam Filtering. 725-739 - Hongzi Zhu, Minglu Li, Yanmin Zhu, Lionel M. Ni:
HERO: Online Real-Time Vehicle Tracking. 740-752
Volume 20, Number 6, June 2009
- Weigang Wu, Jiannong Cao, Michel Raynal:
Eventual Clusterer: A Modular Approach to Designing Hierarchical Consensus Protocols in MANETs. 753-765 - Alex X. Liu, Mohamed G. Gouda:
Firewall Policy Queries. 766-777 - Achour Mostéfaoui, Michel Raynal, Gilles Trédan:
On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System. 778-787 - Jinoh Kim, Abhishek Chandra, Jon B. Weissman:
Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems. 788-801 - Crispín Gómez Requena, María Engracia Gómez Requena, Pedro Juan López Rodríguez, J. F. D. Marin:
FT2EI: A Dynamic Fault-Tolerant Routing Methodology for Fat Trees with Exclusion Intervals. 802-817 - Lotfi Mhamdi:
On the Integration of Unicast and Multicast Cell Scheduling in Buffered Crossbar Switches. 818-830 - Michael Brinkmeier, Günter Schäfer, Thorsten Strufe:
Optimally DoS Resistant P2P Topologies for Live Multimedia Streaming. 831-844 - Hyeonjoong Cho, Binoy Ravindran, Chewoo Na:
Garbage Collector Scheduling in Dynamic, Multiprocessor Real-Time Systems. 845-856 - Doruk Bozdag, Füsun Özgüner, Ümit V. Çatalyürek:
Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling. 857-871 - Habib M. Ammari, Sajal K. Das:
Critical Density for Coverage and Connectivity in Three-Dimensional Wireless Sensor Networks Using Continuum Percolation. 872-885 - Hongbin Chen, C. K. Michael Tse, Jiuchao Feng:
Impact of Topology on Performance and Energy Efficiency in Wireless Sensor Networks for Source Extraction. 886-897 - Weijun Xiao, Jin Ren, Qing Yang:
A Case for Continuous Data Protection at Block Level in Disk Array Storages. 898-911
Volume 20, Number 7, July 2009
- Mehmet Baysan, Kamil Saraç, R. Chandrasekaran, Sergey Bereg:
A Polynomial Time Solution to Minimum Forwarding Set Problem in Wireless Networks under Unit Disk Coverage Model. 913-924 - Ying Zhu, Baochun Li, Ken Q. Pu:
Dynamic Multicast in Overlay Networks with Linear Capacity Constraints. 925-939 - Pierre-François Dutot, Tchimou N'Takpé, Frédéric Suter, Henri Casanova:
Scheduling Parallel Task Graphs on (Almost) Homogeneous Multicluster Platforms. 940-952 - Nirmalya Roy, Sajal K. Das:
Enhancing Availability of Grid Computational Services to Ubiquitous Computing Applications. 953-967 - Thomas Repantis, Xiaohui Gu, Vana Kalogeraki:
QoS-Aware Shared Component Composition for Distributed Stream Processing Systems. 968-982 - Edi Shmueli, Dror G. Feitelson:
On Simulation and Design of Parallel-Systems Schedulers: Are We Doing the Right Thing? 983-996 - John Paul Walters, Vipin Chaudhary:
Replication-Based Fault Tolerance for MPI Applications. 997-1010 - Bithika Khargharia, Salim Hariri, Mazin S. Yousif:
An Adaptive Interleaving Technique for Memory Performance-per-Watt Management. 1011-1022 - Hung-Chang Hsiao, Yung-Chih Lin, Hao Liao:
Building Small-World Peer-to-Peer Networks Based on Hierarchical Structures. 1023-1037 - Wenbin Zhu, Patrick G. Bridges, Arthur B. Maccabe:
Lightweight Online Performance Monitoring and Tuning with Embedded Gossip. 1038-1049 - Daojing He, Lin Cui, Hejiao Huang, Maode Ma:
Design and Verification of Enhanced Secure Localization Scheme in Wireless Sensor Networks. 1050-1058 - Saikat Chakrabarti, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert:
An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences. 1059-1072
Volume 20, Number 8, August 2009
- Laxmi N. Bhuyan:
Editor's Note. 1073-1074 - Michal Feldman, Kevin Lai, Li Zhang:
The Proportional-Share Allocation Market for Computational Resources. 1075-1088 - Nandan Garg, Daniel Grosu:
A Faithful Distributed Mechanism for Sharing the Cost of Multicast Transmissions. 1089-1101 - Husni Hamad E. Al-Mistarihi, Chan Huah Yong:
On Fairness, Optimizing Replica Selection in Data Grids. 1102-1111 - Ibrahim Al-Oqily, Ahmed Karmouch:
SORD: A Fault-Resilient Service Overlay for MediaPort Resource Discovery. 1112-1125 - Hiroki Matsutani, Michihiro Koibuchi, Yutaka Yamada, D. Frank Hsu, Hideharu Amano:
Fat H-Tree: A Cost-Efficient Tree-Based On-Chip Network. 1126-1141 - Xuejun Yang, Xiaobo Yan, Zuocheng Xing, Yu Deng, Jiang Jiang, Jing Du, Ying Zhang:
Fei Teng 64 Stream Processing System: Architecture, Compiler, and Programming. 1142-1157 - Nagavijayalakshmi Vydyanathan, Sriram Krishnamoorthy, Gerald M. Sabin, Ümit V. Çatalyürek, Tahsin M. Kurç, P. Sadayappan, Joel H. Saltz:
An Integrated Approach to Locality-Conscious Processor Allocation and Scheduling of Mixed-Parallel Applications. 1158-1172 - Anders Gidenstam, Marina Papatriantafilou, Håkan Sundell, Philippas Tsigas:
Efficient and Reliable Lock-Free Memory Reclamation Based on Reference Counting. 1173-1187 - Kranthi K. Mamidisetty, Minlan Duan, Shivakumar Sastry, P. S. Sastry:
Multipath Dissemination in Regular Mesh Topologies. 1188-1201 - Murat Demirbas, Xuming Lu, Puneet Singla:
An In-Network Querying Framework for Wireless Sensor Networks. 1202-1215 - Ferruccio Barsi, Alan A. Bertossi, Francesco Betti Sorbelli, Roberto Ciotti, Stephan Olariu, Maria Cristina Pinotti:
Asynchronous Corona Training Protocols in Wireless Sensor and Actor Networks. 1216-1230
Volume 20, Number 9, September 2009
- Chih-Wei Yi:
A Unified Analytic Framework Based on Minimum Scan Statistics for Wireless Ad Hoc and Sensor Networks. 1233-1245 - Paul Groth, Luc Moreau:
Recording Process Documentation for Provenance. 1246-1259 - Ann L. Chervenak, Robert Schuler, Matei Ripeanu, Muhammad Ali Amer, Shishir Bharathi, Ian T. Foster, Adriana Iamnitchi, Carl Kesselman:
The Globus Replica Location Service: Design and Experience. 1260-1272 - Young Choon Lee, Riky Subrata, Albert Y. Zomaya:
On the Performance of a Dual-Objective Optimization Model for Workflow Applications on Grid Platforms. 1273-1284 - Salvador Coll, Francisco J. Mora, José Duato, Fabrizio Petrini:
Efficient and Scalable Hardware-Based Multicast in Fat-Tree Networks. 1285-1298 - Zongpeng Li, Carey L. Williamson:
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows. 1299-1308 - Jaejin Lee, Changhee Jung, Daeseob Lim, Yan Solihin:
Prefetching with Helper Threads for Loosely Coupled Multiprocessor Systems. 1309-1324 - Cong Liu, Jie Wu:
Scalable Routing in Cyclic Mobile Networks. 1325-1338 - Pedro Fonseca, Rodrigo Rodrigues, Anjali Gupta, Barbara Liskov:
Full-Information Lookups for Peer-to-Peer Overlays. 1339-1351 - Yong Ding, Chen Wang, Li Xiao:
An Adaptive Partitioning Scheme for Sleep Scheduling and Topology Control in Wireless Sensor Networks. 1352-1365 - Ameer Ahmed Abbasi, Mohamed F. Younis, Kemal Akkaya:
Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks. 1366-1379 - Oh-Heum Kwon, Ha-Joo Song, Sangjoon Park:
The Effects of Stitching Orders in Patch-and-Stitch WSN Localization Algorithms. 1380-1391
Volume 20, Number 10, October 2009
- Xiaoying Zheng, Feng Chen, Ye Xia, Yuguang Fang:
A Class of Cross-Layer Optimization Algorithms for Performance and Complexity Trade-Offs in Wireless Networks. 1393-1407 - Xiang-Yang Li, Yu Wang, Haiming Chen, Xiaowen Chu, Yanwei Wu, Yong Qi:
Reliable and Energy-Efficient Routing for Static Wireless Ad Hoc Networks with Unreliable Links. 1408-1421 - James Caverlee, Steve Webb, Ling Liu, William B. Rouse:
A Parameterized Approach to Spam-Resilient Link Analysis of the Web. 1422-1438 - Sangeetha Seshadri, Vibhore Kumar, Brian F. Cooper, Ling Liu:
A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment. 1439-1453 - David Sun, Chengzheng Sun:
Context-Based Operational Transformation in Distributed Collaborative Editing Systems. 1454-1470 - Xuejun Yang, Yunfei Du, Panfeng Wang, Hongyi Fu, Jia Jia:
FTPA: Supporting Fault-Tolerant Parallel Computing through Parallel Recomputing. 1471-1486 - Krishna P. N. Puttaswamy, Heather Zheng, Ben Y. Zhao:
Securing Structured Overlays against Identity Attacks. 1487-1498 - György Dán, Viktória Fodor:
Delay Asymptotics and Scalability for Peer-to-Peer Live Streaming. 1499-1511 - Mark Kai Ho Yeung, Yu-Kwong Kwok:
On Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming. 1512-1525 - Haibo Zhang, Hong Shen:
Balancing Energy Consumption to Maximize Network Lifetime in Data-Gathering Sensor Networks. 1526-1539 - Yun Wang, Xiaodong Wang, Demin Wang, Dharma P. Agrawal:
Range-Free Localization Using Expected Hop Progress in Wireless Sensor Networks. 1540-1552
Volume 20, Number 11, November 2009
- Amit Banerjee, Chung-Ta King:
Building Ring-Like Overlays on Wireless Ad Hoc and Sensor Networks. 1553-1566 - Chryssis Georgiou, Peter M. Musial, Alexander A. Shvartsman:
Developing a Consistent Domain-Oriented Distributed Object Service. 1567-1585 - Nitin Auluck, Dharma P. Agrawal:
Enhancing the Schedulability of Real-Time Heterogeneous Networks of Workstations (NOWs). 1586-1599 - Abhinav Sarje, Srinivas Aluru:
Parallel Genomic Alignments on the Cell Broadband Engine. 1600-1610 - Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, Wei Zhao:
An Invisible Localization Attack to Internet Threat Monitors. 1611-1625 - Jing Chen, Jianping Wang, Hui Yu, Si-Qing Zheng:
Opportunistic Optical Hyperchannel and Its Distributed QoS Assuring Access Control. 1626-1640 - Pan Li, Nicola Scalabrino, Yuguang Fang, Enrico Gregori, Imrich Chlamtac:
How to Effectively Use Multiple Channels in Wireless Mesh Networks. 1641-1652 - Yunfeng Lin, Ben Liang, Baochun Li:
Priority Random Linear Codes in Distributed Storage Systems. 1653-1667 - Hung-Chang Hsiao, Hao Liao, Cheng-Chyun Huang:
Resolving the Topology Mismatch Problem in Unstructured Peer-to-Peer Networks. 1668-1681 - Kannan Rajah, Sanjay Ranka, Ye Xia:
Advance Reservations and Scheduling for Bulk Transfers in Research Networks. 1682-1697 - Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. 1698-1712
Volume 20, Number 12, December 2009
- Laxmi N. Bhuyan:
Editorial: EIC Farewell and New EIC Introduction. 1713 - Xiuduan Fang, Malathi Veeraraghavan:
A Hybrid Network Architecture for File Transfers. 1714-1725 - Sheng-Hsiung Chen, Ting-Lu Huang:
Bounded-Bypass Mutual Exclusion with Minimum Number of Registers. 1726-1737 - Sylvain Dahan, Laurent Philippe, Jean-Marc Nicod:
The Distributed Spanning Tree Structure. 1738-1751 - Xudong Shi, Feiqi Su, Jih-Kwon Peir, Ye Xia, Zhen Yang:
Modeling and Stack Simulation of CMP Cache Capacity and Accessibility. 1752-1763 - Keke Chen, Ling Liu:
Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation. 1764-1776 - Mikhail Nesterenko, Sébastien Tixeuil:
Discovering Network Topology in the Presence of Byzantine Faults. 1777-1789 - Hongbin Luo, Yajuan Qin, Hongke Zhang:
A DHT-Based Identifier-to-Locator Mapping Approach for a Scalable Internet. 1790-1802 - Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. 1803-1815 - Xiaowen Chu, Kaiyong Zhao, Zongpeng Li, Anirban Mahanti:
Auction-Based On-Demand P2P Min-Cost Media Streaming with Network Coding. 1816-1829 - Kenneth M. Hopkinson, Kate Jenkins, Kenneth P. Birman, James S. Thorp, Gregory Toussaint, Manu Parashar:
Adaptive Gravitational Gossip: A Gossip-Based Communication Protocol with User-Selectable Rates. 1830-1843 - Moustafa A. Youssef, Adel M. Youssef, Mohamed F. Younis:
Overlapping Multihop Clustering for Wireless Sensor Networks. 1844-1856
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.