The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 04 - April (vol. 20)
ISSN: 1045-9219

Communication-Aware Supernode Shape (Abstract)

G. Goumas , Nat. Tech. Univ. of Athens, Athens
N. Drosinos , Nat. Tech. Univ. of Athens, Athens
N. Koziris , Nat. Tech. Univ. of Athens, Athens
pp. 0
REGULAR PAPERS

Virtual-Force-Based Geometric Routing Protocol in MANETs (Abstract)

Cong Liu , Florida Atlantic University, Boca Raton
Jie Wu , Florida Atlantic University, Boca Raton
pp. 433-445

AVMON: Optimal and Scalable Discovery of Consistent Availability Monitoring Overlays for Distributed Systems (Abstract)

Indranil Gupta , University of Illinois at Urbana-Champaign, Urbana
Ramsés Morales , University of Illinois at Urbana-Champaign, Urbana
pp. 446-459

Fault-Aware Runtime Strategies for High-Performance Computing (Abstract)

Prashasta Gujrati , Illinois Institute of Technology, Chicago
Zhiling Lan , Illinois Institute of Technology, Chicago
Yawei Li , Illinois Institute of Technology, Chicago
Xian-He Sun , Illinois Institute of Technology, Chicago
pp. 460-473

Detecting Threats in Star Graphs (Abstract)

Hamid Sarbazi-Azad , Sharif University of Technology and IPM, Tehran
Albert Y. Zomaya , The University of Sydney, Sydney
Navid Imani , Simon Frasier University, Vancouver
Parya Moinzadeh , Sharif University of Technology and IPM, Tehran
pp. 474-483

LID Assignment in InfiniBand Networks (Abstract)

Zhenhai Duan , Florida State University, Tallahassee
Wickus Nienaber , Florida State University, Tallahassee
Xin Yuan , Florida State University, Tallahassee
pp. 484-497

Communication-Aware Supernode Shape (Abstract)

Nectarios Koziris , National Technical University of Athens, Heroon Polytechniou, Zografou
Nikolaos Drosinos , National Technical University of Athens, Heroon Polytechniou, Zografou
Georgios Goumas , National Technical University of Athens, Heroon Polytechniou, Zografou
pp. 498-511

Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach (Abstract)

Mudhakar Srivatsa , IBM T.J. Watson Research Center, Hawthorne
Ling Liu , Georgia Institute of Technology, Atlanta
pp. 512-527

VOVO: VCR-Oriented Video-on-Demand in Large-Scale Peer-to-Peer Networks (Abstract)

Yunhao Liu , Hong Kong Universtiy of Science and Technology, Hong Kong
Yuan He , Hong Kong Universtiy of Science and Technology, Hong Kong
pp. 528-539

Information Leakage as a Model for Quality of Anonymity Networks (Abstract)

Riccardo Bettati , Texas A&M University, College Station
Ye Zhu , Cleveland State University, Cleveland
pp. 540-552

Schedulability Analysis of Global Scheduling Algorithms on Multiprocessor Platforms (Abstract)

Marko Bertogna , Scuola Superiore Sant' Anna, Pisa
Michele Cirinei , Scuola Superiore Sant' Anna, Pisa
Giuseppe Lipari , Scuola Superiore Sant' Anna, Pisa
pp. 553-566

Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks (Abstract)

Wanlei Zhou , Deakin University, Melbourne
Minyi Guo , Shanghai Jiao Tong University, Shanghai
Yang Xiang , Central Queensland University, Rockhampton
pp. 567-580

Conditional Edge-Fault Hamiltonicity of Matching Composition Networks (Abstract)

Sun-Yuan Hsieh , National Cheng Kung University, Tainan
Chia-Wei Lee , National Cheng Kung University, Tainan
pp. 581-592
102 ms
(Ver 3.1 (10032016))