The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 11 - Nov. (vol. 62)
ISSN: 0018-9340

A Lightweight and Cooperative Multifactor Considered File Replication Method in Structured P2P Systems (Abstract)

Haiying Shen , Clemson University, Clemson
Guoxin Liu , Clemson University, Clemson
pp. 2115-2130

ATP: A Microprotocol Approach to Autonomic Communication (Abstract)

Nicolas Van Wambeke , CNRS;LAAS, Toulouse and Université de Toulouse, Toulouse
Ernesto Exposito , CNRS;LAAS, Toulouse and Université de Toulouse, Toulouse
Christophe Chassot , CNRS;LAAS, Toulouse and Université de Toulouse, Toulouse
Michel Diaz , CNRS;LAAS, Toulouse and Université de Toulouse, Toulouse
pp. 2131-2140

BAGC: Buffer-Aware Garbage Collection for Flash-Based Storage Systems (Abstract)

Sungjin Lee , Massachusetts Institute of Technology, Cambridge, MA
Dongkun Shin , Sungkyunkwan University, Suwon
Jihong Kim , Seoul National University, Seoul
pp. 2141-2154

Cost-Aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers (Abstract)

Jianfeng Zhan , Chinese Academy of Sciences, Beijing
Lei Wang , Chinese Academy of Sciences, Beijing
Xiaona Li , Chinese Academy of Sciences, Beijing
Weisong Shi , Wayne State University, Detroit
Chuliang Weng , Shanghai Jiaotong University, Shanghai
Wenyao Zhang , Beijing Institute of Technology, Beijing
Xiutao Zang , Chinese Academy of Sciences, Haidian
pp. 2155-2168

Data Structure Optimization for Power- Efficient IP Lookup Architectures (Abstract)

Weirong Jiang , Xilinx, Inc., San Jose, CA
Viktor K. Prasanna , University of Southern California, Los Angeles
pp. 2169-2182

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis (Abstract)

Seetharam Narasimhan , Case Western Reserve University, Cleveland
Dongdong Du , Hyland Software, Cleveland
Rajat Subhra Chakraborty , Indian Institute of Technology, Kharagpur
Somnath Paul , Intel Corp, Hillsboro
Francis G. Wolff , Case Western Reserve University, Cleveland
Christos A. Papachristou , Case Western Reserve University, Cleveland
Kaushik Roy , Purdue University, West Lafayette
Swarup Bhunia , Case Western Reserve University, Cleveland
pp. 2183-2195

Low-Power Logarithmic Number System Addition/Subtraction and Their Impact on Digital Filters (Abstract)

Ioannis Kouretas , University of Patras, Patras
Charalambos Basetas , University of Patras, Patras
Vassilis Paliouras , University of Patras, Patras
pp. 2196-2209

Maximizing Active Storage Resources with Deadlock Avoidance in Workflow-Based Computations (Abstract)

Yang Wang , University of New Brunswick, Fredericton
Paul Lu , University of Alberta, Edmonton
pp. 2210-2223

Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications (Abstract)

Sushmita Ruj , Indian Statistical Institute, Kolkata, India
Amiya Nayak , University of Ottawa, Ottawa
Ivan Stojmenovic , University of Ottawa, Ottawa
pp. 2224-2237

Petri Net-Based FTL Architecture for Parametric WCET Estimation via FTL Operation Sequence Derivation (Abstract)

Jonghun Yoo , Dept. of Electr. & Comput. Eng., Seoul Nat. Univ., Seoul, South Korea
Jaesoo Lee , Dept. of Electr. & Comput. Eng., Seoul Nat. Univ., Seoul, South Korea
Seongsoo Hong , Dept. of Electr. & Comput. Eng., Seoul Nat. Univ., Seoul, South Korea
pp. 2238-2251

Process Variation-Aware Nonuniform Cache Management in a 3D Die-Stacked Multicore Processor (Abstract)

Bo Zhao , University of Pittsburgh, Pittsburgh
Yu Du , University of Pittsburgh, Pittsburgh
Jun Yang , University of Pittsburgh, Pittsburgh
Youtao Zhang , University of Pittsburgh, Pittsburgh
pp. 2252-2265

Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack (Abstract)

Peng Xu , Huazhong University of Science and Technology, Wuhan
Hai Jin , Huazhong University of Science and Technology, Wuhan
Qianhong Wu , Beihang Univerisity, Beijing
Wei Wang , Peking University, Shenzhen
pp. 2266-2277

Receiving Buffer Adaptation for High-Speed Data Transfer (Abstract)

Hao Liu , Tsinghua University, Beijing
Yaoxue Zhang , Tsinghua University, Beijing
Yuezhi Zhou , Tsinghua University, Beijing
Xiaoming Fu , Georg-August-University of Goettingen, Goettingen
Laurence T. Yang , St. Francis Xavier University, Antigonish
pp. 2278-2291

SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework (Abstract)

Karthik Pattabiraman , University of British Columbia, Vancouver
Nithin M. Nakka , Nexstest Systems, San Jose
Zbigniew T. Kalbarczyk , University of Illinois at Urbana-Champaign, Urbana
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign, Urbana
pp. 2292-2307

Topology Control for Time-Evolving and Predictable Delay-Tolerant Networks (Abstract)

Minsu Huang , University of North Carolina at Charlotte, Charlotte
Siyuan Chen , University of North Carolina at Charlotte, Charlotte
Ying Zhu , University of North Carolina at Charlotte, Charlotte
Yu Wang , University of North Carolina at Charlotte, Charlotte
pp. 2308-2321

Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System (Abstract)

Salvatore Pontarelli , University of Rome "Tor Vergata," Rome
Giuseppe Bianchi , University of Rome "Tor Vergata," Rome
Simone Teofili , University of Rome "Tor Vergata," Rome
pp. 2322-2334

An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing (Abstract)

Yining Liu , Huazhong University of Science and Technology, Wuhan
Chi Cheng , Wuhan National Laboratory for Optoelectronics, Wuhan
Jianyu Cao , Guilin University of Electronic Technology, Guilin
Tao Jiang , Huazhong University of Science and Technology, Wuhan
pp. 2335-2336

Reliability Evaluation of BC Networks (Abstract)

Qiang Zhu , Xidian University, Xi'an
Xin-Ke Wang , Xidian University, Xi'an
Guanglan Cheng , Xidian University, Xi'an
pp. 2337-2340
99 ms
(Ver )