default search action
IPCCC 2010: Albuquerque, NM, USA
- 29th International Performance Computing and Communications Conference, IPCCC 2010, 9-11 December 2010, Albuquerque, NM, USA. IEEE Computer Society 2010, ISBN 978-1-4244-9330-2
Session C1: Network Security
- Honglong Chen, Wei Lou:
From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks. 1-8 - Guangzhi Qu, Michael M. Nefcy:
RAPiD: An indirect rogue access points detection system. 9-16 - Sun-il Kim, Nnamdi Nwanze, Jasen Kintner:
Towards dynamic self-tuning for intrusion detection systems. 17-24 - Honglong Chen, Wei Lou, Zhi Wang:
Secure localization against wormhole attacks using conflicting sets. 25-33
Session C2: Mobile Ad Hoc and Mesh Networks
- Wooseong Kim, Andreas J. Kassler, Marco Di Felice, Mario Gerla:
Cognitive Multi-Radio Mesh Networks on ISM bands: A cross-layer architecture. 34-41 - Xiaoguang Zhang, Zheng Da Wu:
A non-uniform node deployment approach for event detection sensor networks. 42-49 - Fatma Outay, Véronique Vèque, Ridha Bouallegue:
EASARD: Towards an efficient Energy-Aware Service and Route Discovery scheme in MANET. 50-58 - Manki Min, Bipin C. Neupane:
Incremental minimality: A property of optimal solutions for the minimum power broadcast tree problem in wireless ad hoc networks. 59-66 - Pham Van Tien, Nguyen Thuy Chi, Nguyen Manh Thiep, Nguyen Van Tuyen, Dang Van Tuan, Nguyen Thanh Thuy, Nguyen Thi Thu Trang:
Sender - Receiver cooperation and buffer observation for fine-grained adaptive transmission of video over mobile ad hoc networks. 67-72
Session C3: Parallel and Distributed Systems
- Qiang Guan, Song Fu:
auto-AID: A data mining framework for autonomic anomaly identification in networked computer systems. 73-80 - Raja S. Kushalnagar, Jehan-François Pâris:
Evaluation of a scalable and distributed mobile device video recording approach for accessible presentations. 81-88 - Nan Wang, Jizhong Han, Haiping Fu, Xubin He, Jinyun Fang:
Reproducing non-deterministic bugs with lightweight recording in production environments. 89-96 - Arny Ambrose, Mihaela Cardei, Ionut Cardei:
Patient-centric hurricane evacuation management system. 97-104 - Faraz Ahmed Memon, Daniel Tiebler, Frank Dürr, Kurt Rothermel:
Optimized information discovery using self-adapting indices over Distributed Hash Tables. 105-113
Session C4: Wireless Sensor Networks
- Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li:
ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNs. 114-121 - Mirela I. Fonoage, Mihaela Cardei, Arny Ambrose:
A QoS based routing protocol for wireless sensor networks. 122-129 - Anthony Plummer Jr., Mahmoud Taghizadeh, Subir Biswas:
Statistical bandwidth scavenging for prioritized device coexistence. 130-137 - Feng Wang, Jianhua Gao:
Behavior monitoring framework in large-scale wireless sensor networks. 138-145 - Salimur Choudhury, Kamrul Islam, Selim G. Akl:
A primal-dual approximation algorithm for the Minimum Cost Stashing problem in wireless sensor networks. 146-152
Session C5: Embedded Systems and Storage Systems
- Linwei Niu:
Energy efficient scheduling for hard real-time systems with fixed-priority assignment. 153-160 - Xiaojun Ruan, Qing Yang, Mohammed I. Alghamdi, Shu Yin, Zhiyang Ding, Jiong Xie, Joshua Lewis, Xiao Qin:
ES-MPICH2: A Message Passing Interface with enhanced security. 161-168 - David Clerc, Luis Garcés-Erice, Sean Rooney:
OS streaming deployment. 169-179 - Joshua Lewis, Mohammed I. Alghamdi, Maen M. Al Assaf, Xiaojun Ruan, Zhiyang Ding, Xiao Qin:
An automatic prefetching and caching system. 180-187 - Jan Stender, Mikael Högqvist, Björn Kolbeck:
Loosely time-synchronized snapshots in object-based file systems. 188-197
Session C6: Network Protocols and Network Management
- Sireesha Muppala, Xiaobo Zhou, Liqiang Zhang:
Regression based multi-tier resource provisioning for session slowdown guarantees. 198-205 - Zhi Zhang, Fei Li, Songqing Chen:
Online learning approaches in maximizing weighted throughput. 206-213 - Ghazale Hosseinabadi, Nitin H. Vaidya:
Selfish misbehavior in scheduling algorithms of wireless networks. 214-221 - Osamah S. Badarneh, Michel Kadoch:
Multiple description video multicast in MANETs. 222-230 - Thilan Ganegedara, Weirong Jiang, Viktor K. Prasanna:
FRuG: A benchmark for packet forwarding in future networks. 231-238
Session C7: Performance Evaluation and Modeling
- Sha Li, Xiaoming Li:
Soft error propagation in floating-point programs. 239-246 - Sara Casolari, Michele Colajanni, Stefania Tosi, Francesco Lo Presti:
Real-time models supporting resource management decisions in highly variable systems. 247-254 - Qiong Rong, Guangxing Zhang, Gaogang Xie, Kavé Salamatian:
Mnemonic Lossy Counting: An efficient and accurate heavy-hitters identification algorithm. 255-262 - Joanna Tomasik, Marc-Antoine Weisser:
Internet topology on as-level: Model, generation methods and tool. 263-270 - Kunjie Xu, Siriluck Tipmongkonsilp, David Tipper, Prashant Krishnamurthy, Yi Qian:
A time dependent performance model for multihop wireless networks with CBR traffic. 271-280 - Geir Egeland, Paal E. Engelstad:
Modelling the behavior of a beacon-based link sensing mechanism with variable sensing range. 281-288
Session W1: CR-RAN Workshop
- Mankanala N. SreeRangaRaju, Jitendranath Mungara:
Tuning ZRP framework for CR networks and MANETs. 289-293 - Vasanth Iyer, S. Sitharama Iyengar, Garimella Rama Murthy, Nandan Parameswaran, Dhananjay Singh, Mandalika B. Srinivas:
Effects of channel SNR in mobile cognitive radios and coexisting deployment of cognitive wireless sensor networks. 294-301 - Khaled Daabaj, Michael W. Dixon, Terry Koziniec:
Traffic eavesdropping based scheme to deliver time-sensitive data in sensor networks. 302-308 - Jen-Shiun Chen:
Performance evaluation of CDMA packet networks in Nakagami fading. 309-314 - Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki:
Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. 315-324
Session P1: Poster Session
- Brandon Maharrey:
A gateway-based approach for information retrieval from data-centric wireless sensor networks from IP hosts. 325-326 - Jed Kao-Tung Chang, Shaoshan Liu, Jean-Luc Gaudiot, Chen Liu:
Hardware-assisted security mechanism: The acceleration of cryptographic operations with low hardware cost. 327-328 - Ziming Zhang, Song Fu:
Profiling and analysis of power consumption for virtualized systems and applications. 329-330 - Rodolpho G. de Siqueira, Rodrigo Perazzo, Djamel Sadok:
Modeling of non-gaussian noise effect on DSL lines. 331-332 - Yang Wang, Mengyu Qiao:
Virtual machine auto-configuration for web application. 333-334
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.