Abstract is missing.
- Scalable Wide-Area Multicast with Temporal Rate Filtering Distribution FrameworkK. Harald Gjermundrød, Carl Hauser, David E. Bakken. 1-8 [doi]
- The Potential of Using Network Coding with Geographical Forwarding Routing for Wireless Multimedia Sensor NetworksFahed Awad, Omar Banimelhem, Nadia Al-Rousan. 9-14 [doi]
- An Energy-Aware Clustering Scheme for Mobile ApplicationsCarmela Comito, Domenico Talia, Paolo Trunfio. 15-22 [doi]
- Dynamic Active Window Management: A Method for Improving Revenue Generation in Dynamic Enterprise SystemsM. Al-Ghamdi, Adam P. Chester, Ligang He, Stephen A. Jarvis, James Wen Jun Xue. 23-28 [doi]
- DRing: A Layered Scheme for Range Queries over DHTsNicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens, Xavier Bonnaire. 29-34 [doi]
- VoroStore - A Secure and Reliable Data Storage for Peer-to-Peer-Based MMVEsSebastian Holzapfel, Sebastian Schuster, Torben Weis. 35-40 [doi]
- Implementation and Evaluation of a P2P Service Discovery System: Application in a Dynamic Large Scale Computing InfrastructureEddy Caron, Florent Chuffart, Haiwu He, Cédric Tedeschi. 41-46 [doi]
- Probabilistic Dropping in Push and Pull Dissemination over Distributed Hash TablesEmanuele Carlini, Massimo Coppola, Laura Ricci. 47-52 [doi]
- Experiences with Complex User Profiles for Approximate P2P Community MatchingPatrizio Dazzi, Matteo Mordacchini, Fabio Baglini. 53-58 [doi]
- An Abstraction to Support Design of Deadlock-free Routing Algorithms for Large and Hierarchical NoCsRickard Holsmark, Shashi Kumar. 59-66 [doi]
- A Framework for Data Center Scale Dynamic Resource Allocation AlgorithmsAdam P. Chester, Matthew Leeke, M. Al-Ghamdi, Arshad Jhumka, Stephen A. Jarvis. 67-74 [doi]
- A Grid-Based Cloaking Scheme for Continuous Queries in Distributed SystemsHyeong-Il Kim, Young-Sung Shin, Jae-Woo Chang. 75-82 [doi]
- Proximity-Aware Resource Discovery Architecture in Peer-to-Peer Based Volunteer Computing SystemToktam Ghafarian-M., Hossein Deldari, H. Mohhamad, Mohhamad-H. Yaghmaee-M.. 83-90 [doi]
- Accelerating Circle Detection Based on Generalized Projection Method with GPUsSu Chen, Hai Jiang. 91-96 [doi]
- An Efficient Role Based Access Control System for Cloud ComputingTianyi Zhu, Weidong Liu 0001, Jiaxing Song. 97-102 [doi]
- WSRank: A Collaborative Ranking Approach for Web Service SelectionLinlin Meng, Jianxin Li, Hailong Sun. 103-108 [doi]
- SCENETester: A Testing Framework to Support Fault Diagnosis for Web Service CompositionZekun Zhu, Jianxin Li, Yongwang Zhao, Zhuqing Li. 109-114 [doi]
- Middleware Services at Cloud Virtual LayerImad M. Abbadi. 115-120 [doi]
- Cloud Computing: Characteristics and Deployment ApproachesZaigham Mahmood. 121-126 [doi]
- Towards a Data Complexity Metric Set for Web Service CompositionChengying Mao. 127-131 [doi]
- Critical Review of Analytical Modelling Approaches for Performability Evaluation of the Handover Phenomena in Mobile Communication SystemsYonal Kirsal, Enver Ever, Orhan Gemikonakli, Glenford E. Mapp. 132-137 [doi]
- SOHO Network Performance Optimization via Local Caching with the Presence of a Main Bottleneck, the Accessing WAN LinkDaniel James Waters, Jianjun Zhang. 138-143 [doi]
- MRF-based Particle Filters for Multi-touch Tracking and Gesture LikelihoodsChi-Min Oh, Md. Zahidul Islam, Chil-Woo Lee. 144-149 [doi]
- Geometric Active Model for Lesion Segmentation on Breast Ultrasound ImagesMyungeun Lee, Yanjuan Chen, Soohyung Kim, Kwanggi Kim. 150-157 [doi]
- A Bit Collision Detection Based Hybrid Query Tree Protocol for Anti-collision in RFID SystemHaosong Gou, Younghwan Yoo. 158-163 [doi]
- A Secure Recognition Based Graphical Password by WatermarkingArash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom. 164-170 [doi]
- Vehicle Detection on Aerial Images by Extracting Corner Features for Rotational Invariant Shape MatchingSheng Wang. 171-175 [doi]
- The Elderly Fall Risk Assessment and Prediction Based on Gait AnalysisSusu Jiang, Bofeng Zhang, Daming Wei. 176-180 [doi]
- Change Function of 2D/3D Network-on-ChipAlexander W. Yin, Thomas Canhao Xu, Bo Yang 0009, Pasi Liljeberg, Hannu Tenhunen. 181-188 [doi]
- Designing Efficient Parallel Prefix Sum Algorithms for GPUsGabriele Capannini. 189-196 [doi]
- Wavelet Filter Bank-Based Non Uniform Multi-tone Transceiver for Digital Subscriber LineS. Mustafa, V. Hikmat, S. Shekha. 197-203 [doi]
- Time Synchronization of Distributed Readers for a Large-Scale Active RFID NetworkHyuntae Cho, Sanghyun Son, Jongdeok Kim, Yunju Baek. 204-211 [doi]
- Design and Implementation of MAC Protocol for SmartGrid HAN EnvironmentMin-Seok Kim, Sungryul Kim, Jeonghyun Kim, Younghwan Yoo. 212-217 [doi]
- Policy-Driven Reconfiguration Incorporating Multi-objective Optimization for Performance Management in a Ship Backbone NetworkSungwoo Tak, Hyejin Kim. 218-223 [doi]
- LHCDS: A Novel Deployment Strategy of Proxy Caches for P2P Traffic in ISP NetworksHaibin Zhai, Hai Jiang, Yi Sun, Jun Li 0002, Jing Liu, Gengfa Fang, Eryk Dutkiewicz. 224-230 [doi]
- A Full-Distributed Architecture for PoC Application in Data Packet Voice CommunicationQi Wang, Hai Jiang, Albert K. Wong, Jun Li 0002, Zhongcheng Li. 231-237 [doi]
- Novel Multicast Operation Method in Metro Ethernet NetworksOmayma A. El-Mohsen, Hussein M. Harb. 238-244 [doi]
- Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 NetworkYou-ye Sun, Cui Zhang, Shao-qing Meng, Kai-ning Lu. 245-248 [doi]
- Survey, analysis and re-evaluation - How efficient and secure a mix network can beKun Peng. 249-254 [doi]
- A Poisson Based Bursty Model of Internet TrafficE. Kresch, S. Kulkarni. 255-260 [doi]
- A New Human Interactive Proof System Using Arbitrary and Fractal Polygon ImageSeon-Yeong Kim, Sora Kim, Hwan-Gue Cho. 261-268 [doi]
- Decreasing Change Impact Using Smart LSB Pixel Mapping and Data RearrangementSeptimiu Fabian Mare, Mircea Vladutiu, Lucian Prodan. 269-276 [doi]
- A Review of Gradient-Based and Edge-Based Feature Extraction Methods for Object DetectionSheng Wang. 277-282 [doi]
- Extracting the Path of Frame Center Points Using Spatial Transformation and Motion EstimationToan Nguyen Dinh, Jeong Hwan Kim, Gueesang Lee. 283-290 [doi]
- GPU Implementation of a Region Based Algorithm for Large Images SegmentationG. Perrot, Stéphane Domas, Raphaël Couturier, N. Bertaux. 291-298 [doi]
- Binarization of Degraded Characters Using Tensor Voting Based Color ClusteringKavitha Madhubalan, Gueesang Lee. 299-305 [doi]
- Lanes Detection in PCR Gel Electrophoresis ImagesSang-Cheol Park, In Seop Na, Soo-Hyung Kim, Gueesang Lee, Kang Han Oh, Jeong Hwan Kim, Tae Ho Han. 306-313 [doi]
- Open Multi Processing (OpenMP) of Gauss-Jordan Method for Solving System of Linear EquationsPanagiotis D. Michailidis, Konstantinos G. Margaritis. 314-319 [doi]
- Starting Model-Based Testing Based on Existing Test Cases Used for Model CreationChristoph Torens, Lars Ebrecht, Karsten Lemmer. 320-327 [doi]
- Model Tree Based Adaption Strategy for Software Effort Estimation by AnalogyMohammad Azzeh. 328-335 [doi]
- A Bug Rule Based Technique with Feedback for Classifying Bug ReportsTao Zhang, Byungjeong Lee. 336-343 [doi]
- A Software Architecture for Provision of Context-Aware Web-based m-Commerce ApplicationsPoulcheria Benou, Costas Vassilakis. 344-349 [doi]
- Why Groups are Used in Software System Modernization Decisions? Comparing Group Decision-Making in Private and Public SectorMiia-Maarit Saarelainen. 350-355 [doi]
- User-Defined Adaptive Fault-Tolerant Execution of Workflows in the GridF. P. Guimaraes, Alba Cristina Magalhaes Alves de Melo. 356-362 [doi]
- AOP4CSM: An Aspect-Oriented Programming Approach for Cloud Service MonitoringAfef Mdhaffar, Riadh Ben Halima, Ernst Juhnke, Mohamed Jmaiel, Bernd Freisleben. 363-370 [doi]
- Detecting Behavioral Variations in System Resources of Large Data CentersSara Casolari, Michele Colajanni, Stefania Tosi. 371-378 [doi]
- Application of Live Video Streaming over GRID and Cloud InfrastructuresDimitris Karakasilis, Fotis Georgatos, Lambros Lambrinos, Theodoros Alexopoulos. 379-383 [doi]
- On Application-Level Approaches to Cloudy Computing Service in Agent-Base Distributed SystemMi-young Kang, Hyung-Ok Lee, Ji-Seung Nam. 384-388 [doi]
- A Software Architecture for the Analysis of Large Sets of Data Streams in Cloud InfrastructuresMauro Andreolini, Michele Colajanni, Stefania Tosi. 389-394 [doi]
- Using Network Science to Understand the Structure of Brazilian Popular MusicCharith Gunaratna, Ronaldo Menezes. 395-402 [doi]
- An Interactive Web-Based Visualization Tool in Action: User Testing and Usability AspectsBahtijar Vogel, Arianit Kurti, Marcelo Milrad, Andreas Kerren. 403-408 [doi]
- Navigating Measurements by Cross-Classifications in Multi-use Data WarehouseJie Song, Yubin Bao, Zhiliang Zhu. 409-414 [doi]
- Design of a Hierarchical Based DHT Overlay P2P Routing AlgorithmPatrik Emanuel Mezö, Mircea Vladutiu, Lucian Prodan. 415-420 [doi]
- A New K-NN Query Processing Algorithm Enhancing Privacy Protection in Location-Based ServicesMi-Young Jang, Jae-Woo Chang. 421-428 [doi]
- Independent and Personal SMS Spam FilteringM. Taufiq Nuruzzaman, Changmoo Lee, Deokjai Choi. 429-435 [doi]
- Greedy and Randomized Feature Selection for Web Search RankingFeng Pan, Tim Converse, David Ahn, Franco Salvetti, Gianluca Donato. 436-442 [doi]
- Generation of Semantic Interactive Environment for Personalized SearchJie Yu, Jie Gong, Fangfang Liu. 443-448 [doi]
- Predicting the Virtual Temperature of Web-Blog Articles as a Measurement Tool for Online PopularitySu-Do Kim, Sung-Hwan Kim, Hwan-Gue Cho. 449-454 [doi]
- Utilizing SSTAG: A Novel Tag Recommendation Mechanism to Web Page SearchGuijia He, Tao Zhang, Byungjeong Lee, Jin Suk Kim. 455-460 [doi]
- A Fully Automatic Approach for Fixing Firewall MisconfigurationsNihel Ben Youssef, Adel Bouhoula. 461-466 [doi]
- Flexible Homecare Application Personalization and Integration Using Pattern-Based Service Tailoring: Supporting Independent Living of Elderly with ITMohammad Zarifi Eslami, Alireza Zarghami, Brahmananda Sapkota, Marten van Sinderen. 467-474 [doi]
- The Use of Electronic Health Record in Greece: Current StatusLeonidas L. Fragidis, Prodromos D. Chatzoglou. 475-480 [doi]
- Contourlet-based Feature Extraction for Computer Aided Diagnosis of Medical PatternsSherin M. Youssef, Ezzat A. Korany, Rana M. Salem. 481-486 [doi]
- Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road NetworksAmina Hossain, Al-Amin Hossain, Jae-Woo Chang. 487-490 [doi]
- Opportunistic Scheduling and Performance Analysis on Wireless Network CodingRui Zhang 0013, Quan Qian, Mingjun Xin, Bofeng Zhang. 491-498 [doi]
- Extending the Lifetime of Heterogeneous Sensor Networks Using a Two-Level TopologyMei Wu, Martin Collier. 499-504 [doi]
- Fast Augmentation Algorithms for Maximising the Flow in Repairable Flow Networks After a Component FailureMichael T. Todinov. 505-512 [doi]
- Design and Implementation of a Smartphone-Based Reliable Real-Time Wi-Fi Broadcast SystemSe-Mi Kim, Seung-Chur Yang, Jong-Deok Kim. 513-517 [doi]
- A Novel Adjustable Matrix Bloom Filter-Based Copy Detection System for Digital LibrariesShahabeddin Geravand, Mahmood Ahmadi. 518-525 [doi]
- A Global Dictionary Based Approach to Fast Similar Text Search in Document RepositorySun Young Park, Seon-Yeong Kim, Sung-Hwan Kim, Hwan-Gue Cho. 526-532 [doi]
- ArchMDE Approach for the Formal Verification of Real Time SystemsNourchène Elleuch, Adel Khalfallah, Samir Ben Ahmed. 533-538 [doi]
- A Clustering Data Fusion Method for Intrusion Detection SystemBoutheina A. Fessi, S. B. Abdallah, Yacine Djemaiel, Noureddine Boudriga. 539-545 [doi]
- Effects of Radio Triggered Sensor MAC Protocol over Wireless Sensor NetworkPranesh Sthapit, Jae-Young Pyun. 546-551 [doi]
- Effective SQL Injection Attack Reconstruction Using Network RecordingAllen Pomeroy, Qing Tan. 552-556 [doi]
- Extending Linear Discriminant Analysis by Using Unlabeled DataYoung Tae Lee, Yong Joon Shin, Cheong Hee Park. 557-562 [doi]
- Efficient Team Formation Based on Learning and Reorganization and Influence of Communication DelayRyota Katayanagi, Toshiharu Sugawara. 563-570 [doi]
- Machine Learning Approach to the Power Management of Server ClustersSatoru Ohta, Takehito Hirota. 571-578 [doi]
- New Approach to System Level Self-DiagnosisV. Mashkov. 579-584 [doi]
- Design and Evaluation of Hybrid Congestion Control Mechanism for Video StreamingHiroki Oda, Hiroyuki Hisamatsu, Hiroshi Noborio. 585-590 [doi]
- Exploring the Effect of Buffer Behaviour on Perceived Video QualityColin Bailey, Xiao-Hong Peng. 591-596 [doi]
- A Novel Mobility Model for Realistic Behavior in Vehicular Ad Hoc NetworkD. S. Gaikwad, M. Zaveri. 597-602 [doi]
- A Laxity-Aware Memory Access Scheduler for High Performance Multimedia SoCGuangfei Zhang, Yifei Jiang, Wenxiang Wang, Menghao Su. 603-608 [doi]
- Software and Hardware Co-designed Multi-level TLBs for Chip MultiprocessorsXiaohui Zhang, Ming Cong, Guangqiang Chen. 609-614 [doi]
- A Review on Task Performance Prediction in Multi-core Based SystemsFrédéric Pinel, Johnatan E. Pecero, Pascal Bouvry, Samee Ullah Khan. 615-620 [doi]
- An Instruction-Level Energy Estimation and Optimization Methodology for GPUYue Wang, N. Ranganathan. 621-628 [doi]
- Green Flexible Opportunistic Computing with VirtualizationHarold Castro, German Sotelo, Cesar O. Diaz, Pascal Bouvry. 629-634 [doi]
- Energy Efficiency on Scalable Computing ArchitecturesCarlos J. Barrios Hernandez, Daniel A. Sierra, Sébastien Varrette, Dino Lopez Pacheco. 635-640 [doi]
- Scalable and Energy-Efficient Scheduling Techniques for Large-Scale SystemsCesar O. Diaz, Mateusz Guzek, Johnatan E. Pecero, Pascal Bouvry, Samee Ullah Khan. 641-647 [doi]
- A Privacy Preserving System for Cloud ComputingUlrich Greveler, Benjamin Justus, Dennis Loehr. 648-653 [doi]
- Survivable Interaction Distribution NetworksShun-Yun Hu. 654-659 [doi]