Default Cover Image

2009 IEEE 28th International Performance Computing and Communications Conference (IPCCC 2009)

Dec. 14 2009 to Dec. 16 2009

Scottsdale, AZ

Table of Contents

Message from the program chairsFreely available from IEEE.pp. 1-1
A user-centric dynamic cluster partitioning approach for HPC service optimizationFull-text access may be available. Sign in or learn about subscription options.
A universal framework for partial coverage in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.
Opportunistic mechanisms for IEEE 802.11 networks using directional antennasFull-text access may be available. Sign in or learn about subscription options.
Towards health of replication in large-scale P2P-VoD systemsFull-text access may be available. Sign in or learn about subscription options.
Static worst-case energy and lifetime estimation of wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
GPU support for batch oriented workloadsFull-text access may be available. Sign in or learn about subscription options.
Hotspot Prediction and cache in distributed stream-processing storage systemsFull-text access may be available. Sign in or learn about subscription options.
LWRM: A lightweight response mechanism for TCG TOCTOU attackFull-text access may be available. Sign in or learn about subscription options.
Spotlight - a low complexity highly accurate profile-based branch predictorFull-text access may be available. Sign in or learn about subscription options.
ECOS: An energy-efficient cluster storage systemFull-text access may be available. Sign in or learn about subscription options.
Modeling primary user emulation attacks and defenses in cognitive radio networksFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Towards zero loss for TCP in wireless networksFull-text access may be available. Sign in or learn about subscription options.
Efficient multicast for link-heterogeneous wireless mesh networksFull-text access may be available. Sign in or learn about subscription options.
Using shared parity disks to improve the reliability of RAID arraysFull-text access may be available. Sign in or learn about subscription options.
EDA: Event-oriented data aggregation in sensor networksFull-text access may be available. Sign in or learn about subscription options.
Finding correlated heavy-hitters over data streamsFull-text access may be available. Sign in or learn about subscription options.
Thermal aware workload scheduling with backfilling for green data centersFull-text access may be available. Sign in or learn about subscription options.
Saturation aware TCP throughput predictionFull-text access may be available. Sign in or learn about subscription options.
A-MAC: Efficient Medium Access for cluster-based wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Efficient symmetric comparison-based self-diagnosis using backpropagation artificial neural networksFull-text access may be available. Sign in or learn about subscription options.
Network caching for Chip MultiprocessorsFull-text access may be available. Sign in or learn about subscription options.
A pragmatic approach to location-aware service organization and discoveryFull-text access may be available. Sign in or learn about subscription options.
Avoiding state-space explosion of predictive metadata with SESHFull-text access may be available. Sign in or learn about subscription options.
Low cost indoor location management system using infrared leds and Wii Remote ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 280-288
Virtual Center: A characteristic of minimum power broadcast trees in wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.
On Performance-Adaptive flow control for large data transfer in high speed networksFull-text access may be available. Sign in or learn about subscription options.
Optimization of link bandwidth for parallel communication performanceFull-text access may be available. Sign in or learn about subscription options.
Analysis of the impact of swarm mobility on performance of routing protocols in MANETsFull-text access may be available. Sign in or learn about subscription options.
Context-aware code optimizationFull-text access may be available. Sign in or learn about subscription options.
Caching techniques for XML message filteringFull-text access may be available. Sign in or learn about subscription options.
Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Real time clustering of sensory data in wireless sensor networksFull-text access may be available. Sign in or learn about subscription options.
Iterative layer-based raytracing on CUDAFull-text access may be available. Sign in or learn about subscription options.
Towards social-aware routing in dynamic communication networksFull-text access may be available. Sign in or learn about subscription options.
Flow-based TCP connection analysisFull-text access may be available. Sign in or learn about subscription options.
Joint precoder and power adaptation for cognitive radios in interference systemsFull-text access may be available. Sign in or learn about subscription options.
A study of throughput for Iu-CS and Iu-PS interface in UMTS core networkFull-text access may be available. Sign in or learn about subscription options.
A study of throughput for Nb, Mc and Nc interface in UMTS core networkFull-text access may be available. Sign in or learn about subscription options.
Evolutionary algorithms for radio resource management in cognitive radio networkFull-text access may be available. Sign in or learn about subscription options.
Predicting Tor path compromise by exit portFull-text access may be available. Sign in or learn about subscription options.
System level evaluation for WiMAX IEEE 802.16mFull-text access may be available. Sign in or learn about subscription options.
Applying scheduling policies to improve QoE in wireless Voice-over-IPFull-text access may be available. Sign in or learn about subscription options.
Multiscale analysis and prediction of network trafficFull-text access may be available. Sign in or learn about subscription options.
Are cognitive radios energy efficient? A study of the Wireless LAN scenarioFull-text access may be available. Sign in or learn about subscription options.
Finding and extracting crypto routines from malwareFull-text access may be available. Sign in or learn about subscription options.
Showing 59 out of 59