Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
IPCCC
IPCCC 2009
Generate Citations
2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC 2009)
Dec. 14 2009 to Dec. 16 2009
Scottsdale, AZ
Table of Contents
Message from the general Co-Chairs
Freely available from IEEE.
pp. 1-2
by
Warmest Regards
,
Maggie Cheng
,
Youtao Zhang
Message from the program chairs
Freely available from IEEE.
pp. 1-1
by
Sheng Zhong
,
Kuai Xu
A user-centric dynamic cluster partitioning approach for HPC service optimization
Full-text access may be available. Sign in or learn about subscription options.
by
Xiaorong Li
,
Terence Hung
,
Sharad Singhal
A universal framework for partial coverage in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Chinh Vu
,
Guantao Chen
,
Yi Zhao
,
Yingshu Li
Opportunistic mechanisms for IEEE 802.11 networks using directional antennas
Full-text access may be available. Sign in or learn about subscription options.
by
Tamer Nadeem
ABC-MC: A simple multi-channel geographic forwarding scheme for wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Taekkyeun Lee
,
Chunming Qiao
,
Murat Demirbas
,
Jinhui Xu
Towards health of replication in large-scale P2P-VoD systems
Full-text access may be available. Sign in or learn about subscription options.
by
Haitao Li
,
Xu Ke
,
James Seng
,
Po Hu
Static worst-case energy and lifetime estimation of wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Yu Liu
,
Wei Zhang
,
Kemal Akkaya
GPU support for batch oriented workloads
Full-text access may be available. Sign in or learn about subscription options.
by
Lauro B. Costa
,
Samer Al-Kiswany
,
Matei Ripeanu
Hotspot Prediction and cache in distributed stream-processing storage systems
Full-text access may be available. Sign in or learn about subscription options.
by
Chentao Wu
,
Xubin He
,
Shenggang Wan
,
Qiang Cao
,
Changsheng Xie
LWRM: A lightweight response mechanism for TCG TOCTOU attack
Full-text access may be available. Sign in or learn about subscription options.
by
Xiaolin Chang
,
Bin Xing
,
Jiqiang Liu
,
Jogesh K. Muppala
Achieving high performance web applications by service and database replications at edge servers
Full-text access may be available. Sign in or learn about subscription options.
by
Wei Hao
,
Jicheng Fu
,
I-Ling Yen
,
Zhonghang Xia
Spotlight - a low complexity highly accurate profile-based branch predictor
Full-text access may be available. Sign in or learn about subscription options.
by
Santhosh Verma
,
Benjamin Maderazo
,
David M. Koppelman
ECOS: An energy-efficient cluster storage system
Full-text access may be available. Sign in or learn about subscription options.
by
Xiaojun Ruan
,
Shu Yin
,
Adam Manzanares
,
Jiong Xie
,
Zhiyang Ding
,
James Majors
,
Xiao Qin
Modeling primary user emulation attacks and defenses in cognitive radio networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-215
by
Zesheng Chen
,
Todor Cooklev
,
Chao Chen
,
Carlos Pomalaza-Ráez
Towards zero loss for TCP in wireless networks
Full-text access may be available. Sign in or learn about subscription options.
by
Jing Chen
,
Wei Tan
,
Lixiang Liu
,
Xiaohui Hu
,
Fanjiang Xu
Efficient multicast for link-heterogeneous wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
by
Guokai Zeng
,
Bo Wang
,
Matt Mutka
,
Li Xiao
,
Eric Torng
Using shared parity disks to improve the reliability of RAID arrays
Full-text access may be available. Sign in or learn about subscription options.
by
Jehan-Francois Paris
,
Jehan-François Pâris
,
Ahmed Amer
EDA: Event-oriented data aggregation in sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Ying Guo
,
Feng Hong
,
Zhongwen Guo
,
Zongke Jin
,
Yuan Feng
Finding correlated heavy-hitters over data streams
Full-text access may be available. Sign in or learn about subscription options.
by
Bibudh Lahiri
,
Srikanta Tirthapura
Thermal aware workload scheduling with backfilling for green data centers
Full-text access may be available. Sign in or learn about subscription options.
by
Lizhe Wang
,
Gregor von Laszewski
,
Jai Dayal
,
Thomas R. Furlani
Improving reliability of energy-efficient parallel storage systems by disk swapping
Full-text access may be available. Sign in or learn about subscription options.
by
Shu Yin
,
Xiaojun Ruan
,
Adam Manzanares
,
Zhiyang Ding
,
Jiong Xie
,
James Majors
,
Xiao Qin
Saturation aware TCP throughput prediction
Full-text access may be available. Sign in or learn about subscription options.
by
Jia Zhou
,
Fengyuan Ren
,
Chuang Lin
A-MAC: Efficient Medium Access for cluster-based wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Xinhua Yang
,
Tracy Camp
Characterizing deployment and distribution of self-powered mesh routers in wireless mesh networks
Full-text access may be available. Sign in or learn about subscription options.
by
Weihuang Fu
,
Xiaoyuan Wang
,
Dharma P. Agrawal
Efficient symmetric comparison-based self-diagnosis using backpropagation artificial neural networks
Full-text access may be available. Sign in or learn about subscription options.
by
Mourad Elhadef
,
Amiya Nayak
Pre-congestion notification-based flow management in MPLS-based DiffServ networks
Full-text access may be available. Sign in or learn about subscription options.
by
Mayutan Arumaithurai
,
Ruediger Geib
,
Rene Rex
,
Xiaoming Fu
Performance evaluation of power-aware routing algorithms in Personal Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Javad Vazifehdan
,
Ramin Hekmat
,
R. Venkatesha Prasad
,
Ignas Niemegeers
Improving file tree traversal performance by scheduling I/O operations in user space
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-152
by
Carl Henrik Lunde
,
Håvard Espeland
,
Håkon Kvale Stensland
,
Pål Halvorsen
Network caching for Chip Multiprocessors
Full-text access may be available. Sign in or learn about subscription options.
by
Jinglei Wang
,
Yibo Xue
,
Haixia Wang
,
Dongsheng Wang
A pragmatic approach to location-aware service organization and discovery
Full-text access may be available. Sign in or learn about subscription options.
by
Jian Zhu
,
Mohammad Oliya
,
Hung Keng Pung
Avoiding state-space explosion of predictive metadata with SESH
Full-text access may be available. Sign in or learn about subscription options.
by
David Essary
,
Ahmed Amer
Low cost indoor location management system using infrared leds and Wii Remote Controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-288
by
Baris Tas
,
Nihat Altiparmak
,
Ali Şaman Tosun
Virtual Center: A characteristic of minimum power broadcast trees in wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Manki Min
,
Bipin C. Neupane
On Performance-Adaptive flow control for large data transfer in high speed networks
Full-text access may be available. Sign in or learn about subscription options.
by
Xukang Lu
,
Qishi Wu
,
Nageswara S. V. Rao
,
Zongmin Wang
Optimization of link bandwidth for parallel communication performance
Full-text access may be available. Sign in or learn about subscription options.
by
Lydia Y. Chen
,
Wolfgang Denzel
,
Ronald Luijten
Analysis of the impact of swarm mobility on performance of routing protocols in MANETs
Full-text access may be available. Sign in or learn about subscription options.
by
Jun Li
,
Yifeng Zhou
,
Louise Lamont
Context-aware code optimization
Full-text access may be available. Sign in or learn about subscription options.
by
Murat Bolat
,
Xiaoming Li
Caching techniques for XML message filtering
Full-text access may be available. Sign in or learn about subscription options.
by
Yang Cao
,
Shikharesh Majumdar
,
Chung-Horng Lung
Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Amar Rasheed
,
Rabi Mahapatra
Real time clustering of sensory data in wireless sensor networks
Full-text access may be available. Sign in or learn about subscription options.
by
Longjiang Guo
,
Chunyu Ai
,
Xiaoming Wang
,
Zhipeng Cai
,
Yingshu Li
On trigger detection against reactive Jamming Attacks: A clique-independent set based approach
Full-text access may be available. Sign in or learn about subscription options.
by
Ying Xuan
,
Yilin Shen
,
Incheol Shin
,
My T. Thai
Iterative layer-based raytracing on CUDA
Full-text access may be available. Sign in or learn about subscription options.
by
Alejandro Segovia
,
Xiaoming Li
,
Guang Gao
Towards social-aware routing in dynamic communication networks
Full-text access may be available. Sign in or learn about subscription options.
by
Thang N. Dinh
,
Ying Xuan
,
My T. Thai
Flow-based TCP connection analysis
Full-text access may be available. Sign in or learn about subscription options.
by
Tobias Limmer
,
Falko Dressler
Joint precoder and power adaptation for cognitive radios in interference systems
Full-text access may be available. Sign in or learn about subscription options.
by
Danda B. Rawat
,
Dimitrie C. Popescu
A study of throughput for Iu-CS and Iu-PS interface in UMTS core network
Full-text access may be available. Sign in or learn about subscription options.
by
Ye Ouyang
,
M. Hosein Fallah
A study of throughput for Nb, Mc and Nc interface in UMTS core network
Full-text access may be available. Sign in or learn about subscription options.
by
Ye Ouyang
,
M. Hosein Fallah
An adaptive polling algorithm with differentiation strategy in IEEE 802.16 multi-hop networks with IEEE 802.11e WLANs
Full-text access may be available. Sign in or learn about subscription options.
by
Myounghwan Lee
,
John A. Copeland
Evolutionary algorithms for radio resource management in cognitive radio network
Full-text access may be available. Sign in or learn about subscription options.
by
Muhammad Waheed
,
Anni Cai
Predicting Tor path compromise by exit port
Full-text access may be available. Sign in or learn about subscription options.
by
Kevin Bauer
,
Dirk Grunwald
,
Douglas Sicker
Performance comparison of guard channel admission control schemes for IEEE 802.16 system with various turbo code FEC schemes
Full-text access may be available. Sign in or learn about subscription options.
pp. 360-365
by
Adam Flizikowski
,
Rafal Kozik
,
Mateusz Majewski
,
Marcin Przybyszewski
System level evaluation for WiMAX IEEE 802.16m
Full-text access may be available. Sign in or learn about subscription options.
by
Alain Mourad
,
Ismael Gutierrez
Applying scheduling policies to improve QoE in wireless Voice-over-IP
Full-text access may be available. Sign in or learn about subscription options.
by
Lambros Lambrinos
,
Constantinos Djouvas
Multiscale analysis and prediction of network traffic
Full-text access may be available. Sign in or learn about subscription options.
by
Hong Zhao
Are cognitive radios energy efficient? A study of the Wireless LAN scenario
Full-text access may be available. Sign in or learn about subscription options.
by
Vinod Namboodiri
Finding and extracting crypto routines from malware
Full-text access may be available. Sign in or learn about subscription options.
by
Felix Leder
,
Peter Martini
,
Andre Wichmann
Network measurement based redundancy model and maintenance in dynamic P2P storage systems
Full-text access may be available. Sign in or learn about subscription options.
by
Guangping Xu
,
Hua Zhang
,
Jing Liu
,
Gang Wang
,
Xiaoguang Liu
A goal programming approach for the joint optimization of energy consumption and response time in computational grids
Full-text access may be available. Sign in or learn about subscription options.
by
Samee Ullah Khan
Showing 59 out of 59