Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDCS
ICDCS 2015
Generate Citations
2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS)
June 29 2015 to July 2 2015
Columbus, OH, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xiv
Message from the General Chair
Freely available from IEEE.
pp. xv-xv
Message from the Program Chair
Freely available from IEEE.
pp. xvi-xvi
Organizing Committee
Freely available from IEEE.
pp. xvii-xvii
Technical Program Committee
Freely available from IEEE.
pp. xviii-xxiii
Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Si Chen
,
Muyuan Li
,
Kui Ren
,
Chunming Qiao
Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Jihun Hamm
,
Adam C. Champion
,
Guoxing Chen
,
Mikhail Belkin
,
Dong Xuan
Urban Traffic Monitoring with the Help of Bus Riders
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Pengfei Zhou
,
Shiqi Jiang
,
Mo Li
Privacy-Preserving Compressive Sensing for Crowdsensing Based Trajectory Recovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Linghe Kong
,
Liang He
,
Xiao-Yang Liu
,
Yu Gu
,
Min-You Wu
,
Xue Liu
Optimizing Roadside Advertisement Dissemination in Vehicular Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Huanyang Zheng
,
Jie Wu
Point-to-Point Traffic Volume Measurement through Variable-Length Bit Array Masking in Vehicular Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Yian Zhou
,
Shigang Chen
,
Zhen Mo
,
Qingjun Xiao
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-72
by
Jie Lin
,
Wei Yu
,
Xinyu Yang
,
Qingyu Yang
,
Xinwen Fu
,
Wei Zhao
Community-Based Bus System as Routing Backbone for Vehicular Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Fusang Zhang
,
Hai Liu
,
Yiu-Wing Leung
,
Xiaowen Chu
,
Beihong Jin
Asynchronous Adaptive Task Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-92
by
Sotirios Kentros
,
Chadi Kari
,
Aggelos Kiayias
,
Alexander Russell
Competitive Strategies for Online Cloud Resource Allocation with Discounts: The 2-Dimensional Parking Permit Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-102
by
Xinhui Hu
,
Arne Ludwig
,
Andrea Richa
,
Stefan Schmid
Cost-Effective Low-Delay Cloud Video Conferencing
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-112
by
Mohammad H. Hajiesmaili
,
Lok To Mak
,
Zhi Wang
,
Chuan Wu
,
Minghua Chen
,
Ahmad Khonsari
eTrain: Making Wasted Energy Useful by Utilizing Heartbeats for Mobile Data Transmissions
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Tan Zhang
,
Xian Zhang
,
Fangming Liu
,
Hongkun Leng
,
Qian Yu
,
Guanfeng Liang
TIDE: A User-centric Tool for Identifying Energy Hungry Applications on Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-132
by
Tuan Dao
,
Indrajeet Singh
,
Harsha V. Madhyastha
,
Srikanth V. Krishnamurthy
,
Guohong Cao
,
Prasant Mohapatra
Improve Charging Capability for Wireless Rechargeable Sensor Networks Using Resonant Repeaters
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-142
by
Cong Wang
,
Ji Li
,
Fan Ye
,
Yuanyuan Yang
Ostro: Scalable Placement Optimization of Complex Application Topologies in Large-Scale Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-152
by
Gueyoung Jung
,
Matti Hiltunen
,
Kaustubh Joshi
,
Rajesh Panta
,
Richard Schlichting
eBay in the Clouds: False-Name-Proof Auctions for Cloud Resource Allocation
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-162
by
Qinhui Wang
,
Baoliu Ye
,
Bin Tang
,
Song Guo
,
Sanglu Lu
T-Chain: A General Incentive Scheme for Cooperative Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-174
by
Kyuyong Shin
,
Carlee Joe-Wong
,
Sangtae Ha
,
Yung Yi
,
Injong Rhee
,
Douglas Reeves
Data Center Sprinting: Enabling Computational Sprinting at the Data Center Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-184
by
Wenli Zheng
,
Xiaorui Wang
Phase Detection with Hidden Markov Models for DVFS on Many-Core Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-195
by
Joshua Dennis Booth
,
Jagadish Kotra
,
Hui Zhao
,
Mahmut Kandemir
,
Padma Raghavan
Low Radiation Efficient Wireless Energy Transfer in Wireless Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-204
by
Sotiris Nikoletseas
,
Theofanis P. Raptis
,
Christoforos Raptopoulos
Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-214
by
Zaobo He
,
Zhipeng Cai
,
Xiaoming Wang
Optimizing Inter-server Communication for Online Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-224
by
Jing Tang
,
Xueyan Tang
,
Junsong Yuan
Efficient Customized Privacy Preserving Friend Discovery in Mobile Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-234
by
Hongjuan Li
,
Xiuzhen Cheng
,
Keqiu Li
,
Zhi Tian
Combating Friend Spam Using Social Rejections
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-244
by
Qiang Cao
,
Michael Sirivianos
,
Xiaowei Yang
,
Kamesh Munagala
Prebaked µVMs: Scalable, Instant VM Startup for IaaS Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-255
by
Kaveh Razavi
,
Gerrit Van Der Kolk
,
Thilo Kielmann
ECO-DNS: Expected Consistency Optimization for DNS
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-267
by
Chen Chen
,
Stephanos Matsumoto
,
Adrian Perrig
An Online Method for Minimizing Network Monitoring Overhead
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-277
by
Simone Silvestri
,
Rahul Urgaonkar
,
Murtaza Zafer
,
Bong Jun Ko
Thread Migration in a Replicated-Kernel OS
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-287
by
David Katz
,
Antonio Barbalace
,
Saif Ansary
,
Akshay Ravichandran
,
Binoy Ravindran
Towards Understanding the Advertiser's Perspective of Smartphone User Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-297
by
Yan Wang
,
Yingying Chen
,
Fan Ye
,
Jie Yang
,
Hongbo Liu
Advertiser and Publisher-centric Privacy Aware Online Behavioral Advertising
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-307
by
Jingyu Hua
,
An Tang
,
Sheng Zhong
POP: Privacy-Preserving Outsourced Photo Sharing and Searching for Mobile Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-317
by
Lan Zhang
,
Taeho Jung
,
Cihang Liu
,
Xuan Ding
,
Xiang-Yang Li
,
Yunhao Liu
Privacy-Preserving Machine Learning Algorithms for Big Data Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-327
by
Kaihe Xu
,
Hao Yue
,
Linke Guo
,
Yuanxiong Guo
,
Yuguang Fang
Fault-Tolerant and Elastic Streaming MapReduce with Decentralized Coordination
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-338
by
Alok Kumbhare
,
Marc Frincu
,
Yogesh Simmhan
,
Viktor K. Prasanna
Task-Cloning Algorithms in a MapReduce Cluster with Competitive Performance Bounds
Full-text access may be available. Sign in or learn about subscription options.
pp. 339-348
by
Huanle Xu
,
Wing Cheong Lau
FLOWPROPHET: Generic and Accurate Traffic Prediction for Data-Parallel Cluster Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-358
by
Hao Wang
,
Li Chen
,
Kai Chen
,
Ziyang Li
,
Yiming Zhang
,
Haibing Guan
,
Zhengwei Qi
,
Dongsheng Li
,
Yanhui Geng
Towards Energy Efficiency in Heterogeneous Hadoop Clusters by Adaptive Task Assignment
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-368
by
Dazhao Cheng
,
Palden Lama
,
Changjun Jiang
,
Xiaobo Zhou
Experimental Study for Multi-layer Parameter Configuration of WSN Links
Full-text access may be available. Sign in or learn about subscription options.
pp. 369-378
by
Songwei Fu
,
Yan Zhang
,
Yuming Jiang
,
Chengchen Hu
,
Chia-Yen Shih
,
Pedro Jose Marron
PTZ Camera Scheduling for Selected Area Coverage in Visual Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-388
by
Ling Guo
,
Yuqing Zhu
,
Deying Li
,
Donghyun Kim
On Multipath Link Characterization and Adaptation for Device-Free Human Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-398
by
Zimu Zhou
,
Zheng Yang
,
Chenshu Wu
,
Yunhao Liu
,
Lionel M. Ni
Elastic Stream Processing with Latency Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-410
by
Bjorn Lohrmann
,
Peter Janacik
,
Odej Kao
DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-420
by
Tom Z.J. Fu
,
Jianbing Ding
,
Richard T.B. Ma
,
Marianne Winslett
,
Yin Yang
,
Zhenjie Zhang
An Application-Aware Scheduling Policy for Real-Time Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-430
by
Xu Zheng
,
Zhipeng Cai
,
Jianzhong Li
,
Hong Gao
UStore: A Low Cost Cold and Archival Data Storage System for Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-441
by
Quanlu Zhang
,
Yafei Dai
,
Fengqian Li
,
Lintao Zhang
Aurora: Adaptive Block Replication in Distributed File Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 442-451
by
Qi Zhang
,
Sai Qian Zhang
,
Alberto Leon-Garcia
,
Raouf Boutaba
Fast Compaction Algorithms for NoSQL Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-461
by
Mainak Ghosh
,
Indranil Gupta
,
Shalmoli Gupta
,
Nirman Kumar
Minimizing the Communication Cost of Aggregation in Publish/Subscribe Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-473
by
Navneet Kumar Pandey
,
Kaiwen Zhang
,
Stephane Weiss
,
Hans-Arno Jacobsen
,
Roman Vitenberg
Weighted Overlay Design for Topic-Based Publish/Subscribe Systems on Geo-Distributed Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 474-485
by
Chen Chen
,
Yoav Tock
,
Hans-Arno Jacobsen
,
Roman Vitenberg
Dynamoth: A Scalable Pub/Sub Middleware for Latency-Constrained Applications in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-496
by
Julien Gascon-Samson
,
Franz-Philippe Garcia
,
Bettina Kemme
,
Jorg Kienzle
Discrete Load Balancing in Heterogeneous Networks with a Focus on Second-Order Diffusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 497-506
by
Hoda Akbari
,
Petra Berenbrink
,
Robert Elsasser
,
Dominik Kaaser
Weighted Restless Bandit and Its Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 507-516
by
Peng-Jun Wan
,
Xiaohua Xu
Deterministic Symmetry Breaking in Ring Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-526
by
Leszek Gasieniec
,
Tomasz Jurdzinski
,
Russell Martin
,
Grzegorz Stachowicz
DISCO: A Distributed Localization Scheme for Mobile Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 527-536
by
Jie Cheng
,
Qiang Ye
,
Hongwei Du
,
Chuang Liu
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes
Full-text access may be available. Sign in or learn about subscription options.
pp. 537-546
by
Qian Wang
,
Man Zhou
,
Kui Ren
,
Tao Lei
,
Jikun Li
,
Zhibo Wang
ABCCC: An Advanced Cube Based Network for Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-556
by
Zhenhua Li
,
Yuanyuan Yang
Congestion Avoidance with Incremental Filter Aggregation in Content-Based Routing Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 557-568
by
Mingwen Chen
,
Songlin Hu
,
Vinod Muthusamy
,
Hans-Arno Jacobsen
Rewiring 2 Links Is Enough: Accelerating Failure Recovery in Production Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 569-578
by
Guo Chen
,
Youjian Zhao
,
Dan Pei
,
Dan Li
Synthesizing Self-Stabilizing Protocols under Average Recovery Time Constraints
Full-text access may be available. Sign in or learn about subscription options.
pp. 579-588
by
Saba Aflaki
,
Fathiyeh Faghih
,
Borzoo Bonakdarpour
Space-Optimal Time-Efficient Silent Self-Stabilizing Constructions of Constrained Spanning Trees
Full-text access may be available. Sign in or learn about subscription options.
pp. 589-598
by
Lelia Blin
,
Pierre Fraigniaud
Replica Placement for Availability in the Worst Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 599-608
by
Peng Li
,
Debin Gao
,
Michael K. Reiter
Privacy Preserving String Matching for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 609-618
by
Bruhadeshwar Bezawada
,
Alex X. Liu
,
Bargav Jayaraman
,
Ann L. Wang
,
Rui Li
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 619-629
by
Shankar Karuppayah
,
Stefanie Roos
,
Christian Rossow
,
Max Muhlhauser
,
Mathias Fischer
Systematic Mining of Associated Server Herds for Malware Campaign Discovery
Full-text access may be available. Sign in or learn about subscription options.
pp. 630-641
by
Jialong Zhang
,
Sabyasachi Saha
,
Guofei Gu
,
Sung-Ju Lee
,
Marco Mellia
MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 642-652
by
Javid Habibi
,
Aditi Gupta
,
Stephen Carlsony
,
Ajay Panicker
,
Elisa Bertino
Shuttle: Intrusion Recovery for PaaS
Full-text access may be available. Sign in or learn about subscription options.
pp. 653-663
by
Dario Nascimento
,
Miguel Correia
Accelerating Apache Hive with MPI for Data Warehouse Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 664-673
by
Lu Chao
,
Chundian Li
,
Fan Liang
,
Xiaoyi Lu
,
Zhiwei Xu
RStore: A Direct-Access DRAM-based Data Store
Full-text access may be available. Sign in or learn about subscription options.
pp. 674-685
by
Animesh Trivedi
,
Patrick Stuedi
,
Bernard Metzler
,
Clemens Lutz
,
Martin Schmatz
,
Thomas R. Gross
Cache Serializability: Reducing Inconsistency in Edge Transactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 686-695
by
Ittay Eyal
,
Ken Birman
,
Robbert Van Renesse
A Novel Approximation for Multi-hop Connected Clustering Problem in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 696-705
by
Jun Li
,
Xudong Zhu
,
Xiaofeng Gao
,
Fan Wu
,
Guihai Chen
,
Ding-Zhu Du
,
Shaojie Tang
Multi-path Based Avoidance Routing in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 706-715
by
Kazuya Sakai
,
Min-Te Sun
,
Wei-Shinn Ku
,
Jie Wu
,
Ten H. Lai
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 716-725
by
Daibo Liu
,
Zhichao Cao
,
Xiaopei Wu
,
Yuan He
,
Xiaoyu Ji
,
Mengshu Hou
Towards Redundancy-Aware Data Utility Maximization in Crowdsourced Sensing with Smartphones
Full-text access may be available. Sign in or learn about subscription options.
pp. 726-727
by
Juan Li
,
Yanmin Zhu
,
Jiadi Yu
,
Qian Zhang
,
Lionel M. Ni
Improving the Energy Benefit for 802.3az Using Dynamic Coalescing Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 728-729
by
Angelos Chatzipapas
,
Vincenzo Mancuso
Policy-Aware Virtual Machine Management in Data Center Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 730-731
by
Lin Cui
,
Fung Po Tso
,
Dimitrios P. Pezaros
,
Weijia Jia
,
Wei Zhao
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 732-733
by
Yiqing Hu
,
Yan Xiong
,
Wenchao Huang
,
Xiang-Yang Li
,
Yanan Zhang
,
Xufei Mao
,
Panlong Yang
,
Caimei Wang
Leveraging Fog to Extend Cloud Gaming for Thin-Client MMOG with High Quality of Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 734-735
by
Yuhua Lin
,
Haiying Shen
EcoFlow: An Economical and Deadline-Driven Inter-datacenter Video Flow Scheduling System
Full-text access may be available. Sign in or learn about subscription options.
pp. 736-737
by
Yuhua Lin
,
Haiying Shen
,
Liuhua Chen
Harnessing the Power of Multiple Cloud Service Providers: An Economical and SLA-Guaranteed Cloud Storage Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 738-739
by
Guoxin Liu
,
Haiying Shen
Approximate Holistic Aggregation in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 740-741
by
Ji Li
,
Siyao Cheng
,
Yingshu Li
,
Zhipeng Cai
Planning Battery Swapping Stations for Urban Electrical Taxis
Full-text access may be available. Sign in or learn about subscription options.
pp. 742-743
by
Yang Wang
,
Liusheng Huang
,
Hao Wei
,
Wei Zheng
,
Tianbo Gu
,
Hengchang Liu
Interference-Aware Component Scheduling for Reducing Tail Latency in Cloud Interactive Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 744-745
by
Rui Han
,
Junwei Wang
,
Siguang Huang
,
Chenrong Shao
,
Shulin Zhan
,
Jianfeng Zhan
,
Jose Luis Vazquez-Poletti
Foreseer: Workload-Aware Data Storage for MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 746-747
by
Jia Zou
,
Juwei Shi
,
Tongping Liu
,
Zhao Cao
,
Chen Wang
Operational Transformation for Real-Time Synchronization of Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 748-749
by
Agustina
,
Chengzheng Sun
A Route Scheduling Algorithm for the Sweep Coverage Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 750-751
by
Zhiyin Chen
,
Shuang Wu
,
Xudong Zhu
,
Xiaofeng Gao
,
Jian Gu
,
Guihai Chen
WhiFind: A Matrix Completion Approach for Indoor White Space Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 752-753
by
Xiao Hu
,
Fan Wu
,
Xiaofeng Gao
,
Guihai Chen
mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 754-755
by
Hongxu Zhang
,
Yufeng Wang
,
Chiu C. Tan
,
Yifan Zhang
An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens
Full-text access may be available. Sign in or learn about subscription options.
pp. 756-757
by
Min Chen
,
Shigang Chen
On Privacy Preserving Partial Image Sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 758-759
by
Jianping He
,
Bin Liu
,
Xuan Bao
,
Hongxia Jin
,
George Kesidis
Inspecting Coding Dependency in Layered Video Coding for Efficient Unequal Error Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 760-761
by
Mohammad Reza Zakerinasab
,
Mea Wang
Fast Total Ordering for Modern Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 762-763
by
Amy Babay
,
Yair Amir
On Preserving Data Integrity of Transactional Applications on Multicore Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 764-765
by
Mohamed Mohamedin
,
Roberto Palmieri
,
Binoy Ravindran
On Exploiting Locality for Generalized Consensus
Full-text access may be available. Sign in or learn about subscription options.
pp. 766-767
by
Sebastiano Peluso
,
Alexandru Turcu
,
Roberto Palmieri
,
Binoy Ravindran
Less Transmissions, More Throughput: Bringing Carpool to Public WLANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 768-769
by
Wei Wang
,
Yingjie Chen
,
Qian Zhang
,
Kaishun Wu
,
Jin Zhang
Showing 100 out of 120
Load More
Load All