default search action
IEEE Transactions on Computers, Volume 62
Volume 62, Number 1, January 2013
- Albert Y. Zomaya:
State of the Journal. 1-5 - Kyueun Yi, Won Woo Ro, Jean-Luc Gaudiot:
Importance of Coherence Protocols with Network Applications on Multicore Processors. 6-15 - Giuliana Santos Veronese, Miguel Correia, Alysson Neves Bessani, Lau Cheuk Lung, Paulo Veríssimo:
Efficient Byzantine Fault-Tolerance. 16-30 - Stanislavs Golubcovs, Delong Shang, Fei Xia, Andrey Mokhov, Alex Yakovlev:
Concurrent Multiresource Arbiter: Design and Applications. 31-44 - Emiliano Betti, Stanley Bak, Rodolfo Pellizzoni, Marco Caccamo, Lui Sha:
Real-Time I/O Management System with COTS Peripherals. 45-58 - Michel A. Kinsy, Myong Hyon Cho, Keun Sup Shim, Mieszko Lis, G. Edward Suh, Srinivas Devadas:
Optimal and Heuristic Application-Aware Oblivious Routing. 59-73 - Andrea Bianco, Paolo Giaccone, Guido Masera, Marco Ricca:
Power Control for Crossbar-Based Input-Queued Switches. 74-82 - Ze Li, Haiying Shen:
SEDUM: Exploiting Social Networks in Utility-Based Distributed Routing for DTNs. 83-97 - Michele Lombardi, Michela Milano, Luca Benini:
Robust Scheduling of Task Graphs under Execution Time Uncertainty. 98-111 - Kazuya Sakai, Wei-Shinn Ku, Roger Zimmermann, Min-Te Sun:
Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel. 112-123 - Zhimin Chen, Ambuj Sinha, Patrick Schaumont:
Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks. 124-136 - Rui Chu, Lin Gu, Yunhao Liu, Mo Li, Xicheng Lu:
SenSmart: Adaptive Stack Management for Multitasking Sensor Networks. 137-150 - Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li:
SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks. 151-162 - T. Nandha Kumar, Fabrizio Lombardi:
A Novel Heuristic Method for Application-Dependent Testing of a SRAM-Based FPGA Interconnect. 163-172 - Thé Van Luong, Nouredine Melab, El-Ghazali Talbi:
GPU Computing for Parallel Local Search Metaheuristic Algorithms. 173-185 - Bo Zhou, Hiroyuki Okamura, Tadashi Dohi:
Enhancing Performance of Random Testing through Markov Chain Monte Carlo Methods. 186-192 - Jithra Adikari, Ayad F. Barsoum, M. Anwar Hasan, Ashkan Hosseinzadeh Namin, Christophe Nègre:
Improved Area-Time Tradeoffs for Field Multiplication Using Optimal Normal Bases. 193-199 - Pranava K. Jha:
Comments on "Multiple-Radix Gray Codes in Lee Metric". 200
Volume 62, Number 2, 2013
- Hansu Cho, Lochi Yu, Samar Abdi:
Automatic Generation of Transducer Models for Bus-Based MPSoC Design. 211-224 - Luigi Di Guglielmo, Franco Fummi, Graziano Pravadelli, Francesco Stefanni, Sara Vinco:
UNIVERCM: The UNIversal VERsatile Computational Model for Heterogeneous System Integration. 225-241 - Kyle Balston, Mehdi Karimibiuki, Alan J. Hu, André Ivanov, Steven J. E. Wilton:
Post-Silicon Code Coverage for Multiprocessor System-on-Chip Designs. 242-246 - Rajwinder Singh, Mayank Dave:
Antecedence Graph Approach to Checkpointing for Fault Tolerance in Mobile Agent Systems. 247-258 - Chang-Hsiung Tsai:
A Quick Pessimistic Diagnosis Algorithm for Hypercube-Like Multiprocessor Systems under the PMC Model. 259-267 - Ozcan Ozturk, Mahmut T. Kandemir, Guangyu Chen:
Compiler-Directed Energy Reduction Using Dynamic Voltage Scaling and Voltage Islands for Embedded Systems. 268-278 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Francisco Rodríguez-Henríquez, Palash Sarkar:
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes. 279-294 - George Michelogiannakis, William J. Dally:
Elastic Buffer Flow Control for On-Chip Networks. 295-309 - Cong Liu, Jie Wu:
Fast Deep Packet Inspection with a Dual Finite Automata. 310-321 - Ricardo Quislant, Eladio Gutiérrez, Oscar G. Plata, Emilio L. Zapata:
LS-Sig: Locality-Sensitive Signatures for Transactional Memory. 322-335 - Yi Wang, Duo Liu, Zhiwei Qin, Zili Shao:
Optimally Removing Intercore Communication Overhead for Streaming Applications on MPSoCs. 336-350 - Fangming Liu, Bo Li, Baochun Li, Hai Jin:
Peer-Assisted On-Demand Streaming: Characterizing Demands and Optimizing Supplies. 351-361 - Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. 362-375 - Dehao Chen, Neil Vachharajani, Robert Hundt, Xinliang D. Li, Stéphane Eranian, Wenguang Chen, Weimin Zheng:
Taming Hardware Event Samples for Precise and Versatile Feedback Directed Optimizations. 376-389 - Wei Zang, Ann Gordon-Ross:
T-SPaCS - A Two-Level Single-Pass Cache Simulation Methodology. 390-403 - Irith Pomeranz:
An Adjacent Switching Activity Metric under Functional Broadside Tests. 404-410 - Aleksandar Radonjic, Vladimir Vujicic:
Integer Codes Correcting Burst Errors within a Byte. 411-415
Volume 62, Number 3, March 2013
- Zhiping Cai, Zhijun Wang, Kai Zheng, Jiannong Cao:
A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering. 417-427 - Chia-Yu Lu, Shang-Ming Jen, Chi-Sung Laih:
A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication. 428-438 - Cheng-Kuan Lin, Tzu-Liang Kung, Jimmy J. M. Tan:
An Algorithmic Approach to Conditional-Fault Local Diagnosis of Regular Multiprocessor Interconnected Systems under the PMC Model. 439-451 - Dara Rahmati, Srinivasan Murali, Luca Benini, Federico Angiolini, Giovanni De Micheli, Hamid Sarbazi-Azad:
Computing Accurate Performance Bounds for Best Effort Networks-on-Chip. 452-467 - Chen-Wei Lin, Hung-Hsin Chen, Hao-Yu Yang, Chin-Yuan Huang, Mango Chia-Tso Chao, Rei-Fu Huang:
Fault Models and Test Methods for Subthreshold SRAMs. 468-481 - Blas Cuesta, Alberto Ros, María Engracia Gómez, Antonio Robles, José Duato:
Increasing the Effectiveness of Directory Caches by Avoiding the Tracking of Noncoherent Memory Blocks. 482-495 - Martin Omaña, Daniele Rossi, Nicolò Bosio, Cecilia Metra:
Low Cost NBTI Degradation Detection and Masking Approaches. 496-509 - Qiang Zheng, Guohong Cao:
Minimizing Probing Cost and Achieving Identifiability in Probe-Based Network Link Monitoring. 510-523 - Phillip Kinsman, Nicola Nicolici:
NoC-Based FPGA Acceleration for Monte Carlo Simulations with Applications to SPECT Imaging. 524-535 - Bin Liu, Bevan M. Baas:
Parallel AES Encryption Engines for Many-Core Processor Arrays. 536-547 - Liang Lu, Weiqiang Liu, Máire O'Neill, Earl E. Swartzlander Jr.:
QCA Systolic Array Design. 548-560 - Rohit Sunkam Ramanujam, Bill Lin:
Randomized Throughput-Optimal Oblivious Routing for Torus Networks. 561-574 - Ruhi Sarikaya, Canturk Isci, Alper Buyuktosunoglu:
Runtime Application Behavior Prediction Using a Statistical Metric Model. 575-588 - Ren Ping Liu, Mark Hedley, Xun Yang:
WLAN Location Service with TXOP. 589-598 - Yiwei Zhang, Joseph McGeehan, Edward Regan, Stephen Kelly, José Luis Núñez-Yáñez:
Biophysically Accurate Foating Point Neuroprocessors for Reconfigurable Logic. 599-608 - Florentine Dubois, Abbas Sheibanyrad, Frédéric Pétrot, Maryam Bahmani:
Elevator-First: A Deadlock-Free Distributed Routing Algorithm for Vertically Partially Connected 3D-NoCs. 609-615 - Daojing He, Jiajun Bu, Sammy Chan, Chun Chen:
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks. 616-622 - Mary Flahive, Bella Bose:
On Resource Placement in Gaussian and EJ Interconnection Networks. 623-626
Volume 62, Number 4, April 2013
- Chih-Yuan Lien, Chien-Chuan Huang, Pei-Yin Chen, Yi-Fan Lin:
An Efficient Denoising Architecture for Removal of Impulse Noise in Images. 631-643 - Haibo Zeng, Marco Di Natale:
An Efficient Formulation of the Real-Time Feasibility Region for Design Optimization. 644-661 - Hung-Chang Hsiao, Che-Wei Chang:
A Symmetric Load Balancing Algorithm with Performance Guarantees for Distributed Hash Tables. 662-675 - Leandro A. Villas, Azzedine Boukerche, Heitor S. Ramos, Horacio A. B. F. de Oliveira, Regina Borges de Araujo, Antonio Alfredo Ferreira Loureiro:
DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless Sensor Networks. 676-689 - Christos Ttofis, Stavros Hadjitheophanous, Athinodoros S. Georghiades, Theocharis Theocharides:
Edge-Directed Hardware Architecture for Real-Time Disparity Map Computation. 690-704 - Hyung Beom Jang, Jinhang Choi, Ikroh Yoon, Sung-Soo Lim, Seungwon Shin, Naehyuck Chang, Sung Woo Chung:
Exploiting Application/System-Dependent Ambient Temperature for Accurate Microarchitectural Simulation. 705-715 - Shan Chu, Xin Wang, Yuanyuan Yang:
Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks. 716-729 - Sourav Sen Gupta, Anupam Chattopadhyay, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha:
High-Performance Hardware Implementation for RC4 Stream Cipher. 730-743 - Reza Azarderakhsh, Arash Reyhani-Masoleh:
Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases. 744-757 - Duhee Lee, Jong-Chan Kim, Chang-Gun Lee, Kanghee Kim:
mRT-PLRU: A General Framework for Real-Time Multitask Executions on NAND Flash Memory. 758-771 - Douglas Hakkarinen, Zizhong Chen:
Multilevel Diskless Checkpointing. 772-783 - Jung-Sang Ahn, Dongwon Kang, Dawoon Jung, Jin-Soo Kim, Seungryoul Maeng:
μ*-Tree: An Ordered Index Structure for NAND Flash Memory with Adaptive Page Layout Scheme. 784-797 - Yuan-Po Cheng, Chia-Yi Wu, Yao-Jen Tang, Ming-Jer Tsai:
Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks. 798-812 - Alessandro Morari, Carlos Boneti, Francisco J. Cazorla, Roberto Gioiosa, Chen-Yong Cher, Alper Buyuktosunoglu, Pradip Bose, Mateo Valero:
SMT Malleability in IBM POWER5 and POWER6 Processors. 813-826 - Rong-Xia Hao, Yan-Quan Feng, Jin-Xin Zhou:
Conditional Diagnosability of Alternating Group Graphs. 827-831 - Jui-Chieh Lin, Sao-Jie Chen, Yu Hen Hu:
Cycle-Efficient LFSR Implementation on Word-Based Microarchitecture. 832-838 - Sun-Yuan Hsieh, Chi-Ya Kao:
The Conditional Diagnosability of k-Ary n-Cubes under the Comparison Diagnosis Model. 839-843
Volume 62, Number 5, May 2013
- Hoang Le, Viktor K. Prasanna:
A Memory-Efficient and Modular Approach for Large-Scale String Pattern Matching. 844-857 - Joshua Yung Lih Low, Ching-Chuen Jong:
A Memory-Efficient Tables-and-Additions Method for Accurate Computation of Elementary Functions. 858-872 - Xiaoyan Yin, Xiaomin Ma, Kishor S. Trivedi:
An Interacting Stochastic Models Approach for the Performance Evaluation of DSRC Vehicular Safety Communication. 873-885 - Qinru Qiu, Qing Wu, Morgan Bishop, Robinson E. Pino, Richard W. Linderman:
A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster. 886-899 - David M. Russinoff:
Computation and Formal Verification of SRT Quotient and Square Root Digit Selection Tables. 900-913 - Christian Fensch, Nick Barrow-Williams, Robert D. Mullins, Simon W. Moore:
Designing a Physical Locality Aware Coherence Protocol for Chip-Multiprocessors. 914-928 - Alessandro Cilardo:
Fast Parallel GF(2^m) Polynomial Multiplication for All Degrees. 929-943 - Rafael Ubal, Julio Sahuquillo, Salvador Petit, Pedro López, José Duato:
Hardware-Based Generation of Independent Subtraces of Instructions in Clustered Processors. 944-955 - Liu Han, Seok-Bum Ko:
High-Speed Parallel Decimal Multiplication with Redundant Internal Encodings. 956-968 - Shouwen Lai, Binoy Ravindran:
Least-Latency Routing over Time-Dependent Wireless Sensor Networks. 969-983 - Noha Elarief, Bella Bose, Samir Elmougy:
Limited Magnitude Error Detecting Codes over Z_{q}. 984-989 - Jasma Balasangameshwara, Nedunchezhian Raju:
Performance-Driven Load Balancing with a Primary-Backup Approach for Computational Grids with Low Communication Cost and Replication Cost. 990-1003 - Lin Gao, Lian Li, Jingling Xue, Pen-Chung Yew:
SEED: A Statically Greedy and Dynamically Adaptive Approach for Speculative Loop Execution. 1004-1016 - Mario Baldi, Guido Marchetto:
Time-Driven Priority Router Implementation: Analysis and Experiments. 1017-1030 - Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy:
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. 1031-1043 - Christos Liaskos, Georgios I. Papadimitriou:
Generalizing the Square Root Rule for Optimal Periodic Scheduling in Push-Based Wireless Environments. 1044-1050 - Yangyang Pan, Guiqiang Dong, Ningde Xie, Tong Zhang:
Using Quasi-EZ-NAND Flash Memory to Build Large-Capacity Solid-State Drives in Computing Systems. 1051-1057
Volume 62, Number 6, June 2013
- Dimiter R. Avresky:
Guest Editors' introduction: Special section on optimizing the cloud. 1058-1059 - Chrysa Papagianni, Aris Leivadeas, Symeon Papavassiliou, Vasilis Maglaris, Cristina Cervello-Pastor, Álvaro Monje:
On the Optimal Allocation of Virtual Resources in Cloud Computing Networks. 1060-1071 - Dario Bruneo, Salvatore Distefano, Francesco Longo, Antonio Puliafito, Marco Scarpa:
Workload-Based Software Rejuvenation in Cloud Systems. 1072-1085 - Lakshmi Ganesh, Hakim Weatherspoon, Tudor Marian, Ken Birman:
Integrated Approach to Data Center Power Management. 1086-1096 - Chun-An Chen, Sun-Yuan Hsieh:
Component-Composition Graphs: (t, k)-Diagnosability and Its Application. 1097-1110 - Salvatore Pontarelli, Marco Ottavi:
Error Detection and Correction in Content Addressable Memories by Using Bloom Filters. 1111-1126 - Ori Rottenstreich, Rami Cohen, Danny Raz, Isaac Keslassy:
Exact Worst Case TCAM Rule Expansion. 1127-1140 - Yang Hu, Hong Jiang, Dan Feng, Lei Tian, Hao Luo, Chao Ren:
Exploring and Exploiting the Multilevel Parallelism Inside SSDs for Improved Performance and Endurance. 1141-1155 - Xinyan Zha, Sartaj Sahni:
GPU-to-GPU and Host-to-Host Multipattern String Matching on a GPU. 1156-1169 - Jiafeng Xie, Pramod Kumar Meher, Jianjun He:
Hardware-Efficient Realization of Prime-Length DCT Based on Distributed Arithmetic. 1170-1178 - Hung-Manh Pham, Sébastien Pillement, Stanislaw J. Piestrak:
Low-Overhead Fault-Tolerance Technique for a Dynamically Reconfigurable Softcore Processor. 1179-1192 - Silvio Cesare, Yang Xiang, Wanlei Zhou:
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware. 1193-1206 - Richard G. Clegg, Stuart Clayman, George Pavlou, Lefteris Mamatas, Alex Galis:
On the Selection of Management/Monitoring Nodes in Highly Dynamic Networks. 1207-1220 - Hanjiang Lai, Yan Pan, Cong Liu, Liang Lin, Jie Wu:
Sparse Learning-to-Rank via an Efficient Primal-Dual Algorithm. 1221-1233 - Tobias Nopper, Christoph Scholl:
Symbolic Model Checking for Incomplete Designs with Flexible Modeling of Unknowns. 1234-1254 - Jianjun Li, Ming Xiong, Victor C. S. Lee, LihChyun Shu, Guohui Li:
Workload-Efficient Deadline and Period Assignment for Maintaining Temporal Consistency under EDF. 1255-1268 - Mohamed-Slim Bouguerra, Denis Trystram, Frédéric Wagner:
Complexity Analysis of Checkpoint Scheduling with Variable Costs. 1269-1275
Volume 62, Number 7, July 2013
- Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou:
Architecting against Software Cache-Based Side-Channel Attacks. 1276-1288 - Ramon Bertran, Marc González, Xavier Martorell, Nacho Navarro, Eduard Ayguadé:
A Systematic Methodology to Generate Decomposable and Responsive Power Models for CMPs. 1289-1302 - Deke Guo, Tao Chen, Dan Li, Mo Li, Yunhao Liu, Guihai Chen:
Expandable and Cost-Effective Network Structures for Data Centers Using Dual-Port Servers. 1303-1317 - Po-Yuan Chen, Chin-Lung Su, Chao-Hsun Chen, Cheng-Wen Wu:
Generalization of an Enhanced ECC Methodology for Low Power PSRAM. 1318-1331 - Chuliang Weng, Minyi Guo, Yuan Luo, Minglu Li:
Hybrid CPU Management for Adapting to the Diversity of Virtual Machines. 1332-1344 - Murat Cenk, Christophe Nègre, M. Anwar Hasan:
Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products. 1345-1361 - Cristobal Camarero, Carmen Martínez, Ramón Beivide:
L-Networks: A Topological Model for Regular 2D Interconnection Networks. 1362-1375 - Michail Maniatakos, Prabhakar Kudva, Bruce M. Fleischer, Yiorgos Makris:
Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers. 1376-1388 - Amin Farmahini Farahani, Henry J. Duwe III, Michael J. Schulte, Katherine Compton:
Modular Design of High-Throughput, Low-Latency Sorting Units. 1389-1402 - Tingting Chen, Fan Wu, Sheng Zhong:
On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains. 1403-1416 - Yu Li, Sai Tung On, Jianliang Xu, Byron Choi, Haibo Hu:
Optimizing Nonindexed Join Processing in Flash Storage-Based Systems. 1417-1431 - Mayur Deshpande, Kyungbaek Kim, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
ReCREW: A Reliable Flash-Dissemination System. 1432-1446 - Jullawadee Maneesilp, Chong Wang, Hongyi Wu, Nian-Feng Tzeng:
RFID Support for Accurate 3D Localization. 1447-1459 - M. Anwar Hasan, Christophe Nègre:
Multiway Splitting Method for Toeplitz Matrix Vector Product. 1467-1471 - Sun-Yuan Hsieh, Cheng-Yen Tsai, Chun-An Chen:
Strong Diagnosability and Conditional Diagnosability of Multiprocessor Systems and Folded Hypercubes. 1472-1477
Volume 62, Number 8, August 2013
- Khaled Benkrid, Didier Keymeulen, Umeshkumar D. Patel, David Merodio Codinachs:
Guest Editors' introduction: Special section on adaptive hardware and systems. 1478-1480 - Rubén Salvador, Andrés Otero, Javier Mora, Eduardo de la Torre, Teresa Riesgo, Lukás Sekanina:
Self-Reconfigurable Evolvable Hardware System for Adaptive Image Processing. 1481-1493 - Lars Bauer, Claus Braun, Michael E. Imhof, Michael A. Kochte, Eric Schneider, Hongyan Zhang, Jörg Henkel, Hans-Joachim Wunderlich:
Test Strategies for Reliable Runtime Reconfigurable Architectures. 1494-1507 - Luca Sterpone, Mario Porrmann, Jens Hagemeyer:
A Novel Fault Tolerant and Runtime Reconfigurable Platform for Satellite Payload Processing. 1508-1525 - Rizwan A. Ashraf, Ronald F. DeMara:
Scalable FPGA Refurbishment Using Netlist-Driven Evolutionary Algorithms. 1526-1541 - Xabier Iturbe, Khaled Benkrid, Chuan Hong, Ali Ebrahim, Raul Torrego, Imanol Martinez, Tughrul Arslan, Jon Pérez:
R3TOS: A Novel Reliable Reconfigurable Real-Time Operating System for Highly Adaptive, Efficient, and Dependable Computing on FPGAs. 1542-1556 - Marisha Rawlins, Ann Gordon-Ross:
A Cache Tuning Heuristic for Multicore Architectures. 1570-1583 - James Alfred Walker, Martin Trefzer, Simon J. Bale, Andy M. Tyrrell:
PAnDA: A Reconfigurable Architecture that Adapts to Physical Substrate Variations. 1584-1596 - Michael Soltiz, Dhireesha Kudithipudi, Cory E. Merkel, Garrett S. Rose, Robinson E. Pino:
Memristor-Based Neural Logic Blocks for Nonlinearly Separable Functions. 1597-1606 - Louis-Marie Aubert, Roger F. Woods, Scott Fischaber, Richard Veitch:
Optimization of Weighted Finite State Transducer for Speech Recognition. 1607-1615 - Jie Tang, Shaoshan Liu, Chen Liu, Zhimin Gu, Jean-Luc Gaudiot:
Acceleration of XML Parsing through Prefetching. 1616-1628 - Guillaume Dabosville, Julien Doget, Emmanuel Prouff:
A New Second-Order Side Channel Attack Based on Linear Regression. 1629-1640 - Sahar Foroutan, Yvain Thonnart, Frédéric Pétrot:
An Iterative Computational Technique for Performance Evaluation of Networks-on-Chip. 1641-1655 - Jing Liu, Qiong Huang, Bo Yang, Yang Zhang:
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures. 1656-1672 - Robert M. Hierons:
Verifying and Comparing Finite State Machines for Systems that Have Distributed Interfaces. 1673-1683
Volume 62, Number 9, September 2013
- Hong Shen, Longkun Guo:
An Eight-Approximation Algorithm for Computing Rooted Three-Vertex Connected Minimum Steiner Networks. 1684-1693 - Jinghang Liang, Jie Han, Fabrizio Lombardi:
Analysis of Error Masking and Restoring Properties of Sequential Circuits. 1694-1704 - Shicong Meng, Ling Liu:
Enhanced Monitoring-as-a-Service for Effective Cloud Management. 1705-1720 - Álvaro Vázquez, Javier D. Bruguera:
Iterative Algorithm and Architecture for Exponential, Logarithm, Powering, and Root Extraction. 1721-1731 - Yunji Chen, Tianshi Chen, Ling Li, Lei Li, Liang Yang, Menghao Su, Weiwu Hu:
LDet: Determinizing Asynchronous Transfer for Postsilicon Debugging. 1732-1744 - Ze Li, Haiying Shen, Karan Sapra:
Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks. 1745-1759 - Jinghang Liang, Jie Han, Fabrizio Lombardi:
New Metrics for the Reliability of Approximate and Probabilistic Adders. 1760-1771 - Kimish Patel, Murali Annavaram, Massoud Pedram:
NFRA: Generalized Network Flow-Based Resource Allocation for Hosting Centers. 1772-1785 - Amir Moradi, Oliver Mischke, Christof Paar:
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores. 1786-1798 - Hao Jin, Deng Pan, Jason Liu, Niki Pissinou:
OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches. 1799-1812 - Ismael Ripoll, Rafael Ballester-Ripoll:
Period Selection for Minimal Hyperperiod in Periodic Task Systems. 1813-1822 - Ajay D. Kshemkalyani, Jiannong Cao:
Predicate Detection in Asynchronous Pervasive Environments. 1823-1836 - Wei Dong, Yunhao Liu, Chun Chen, Jiajun Bu, Chao Huang, Zhiwei Zhao:
R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems. 1837-1849 - Octav Chipara, Chenyang Lu, Gruia-Catalin Roman:
Real-Time Query Scheduling for Wireless Sensor Networks. 1850-1865 - Daniel Cederman, Philippas Tsigas:
Supporting Lock-Free Composition of Concurrent Data Objects: Moving Data between Containers. 1866-1878 - Enric Herrero, José González, Ramon Canal, Dean M. Tullsen:
Thread Row Buffers: Improving Memory Performance Isolation and Throughput in Multiprogrammed Environments. 1879-1892 - Lein Harn:
Group Authentication. 1893-1898 - Salvatore Pontarelli, Pedro Reviriego, Chris J. Bleakley, Juan Antonio Maestro:
Low Complexity Concurrent Error Detection for Complex Multiplication. 1899-1903 - Dirk Müller, Matthias Werner:
A Note on "New Strategies for Assigning Real-Time Tasks to Multiprocessor Systems". 1904-1905
Volume 62, Number 10, October 2013
- Cheng-Hung Lin, Chen-Hsiung Liu, Lung-Sheng Chien, Shih-Chieh Chang:
Accelerating Pattern Matching Using a Novel Parallel Algorithm on GPUs. 1906-1916 - Soumyajit Dey, Dipankar Sarkar, Anupam Basu:
A Kleene Algebra of Tagged System Actors for Reasoning about Heterogeneous Embedded Systems. 1917-1931 - Weifa Liang, Pascal Schweitzer, Zichuan Xu:
Approximation Algorithms for Capacitated Minimum Forest Problems in Wireless Sensor Networks with a Mobile Sink. 1932-1944 - Yong Lu, Youjian Zhao, Fuchun Sun, Hongbo Li, Dianjun Wang:
Dynamic Fault-Tolerant Routing Based on FSA for LEO Satellite Networks. 1945-1958 - Zhemin Zhang, Zhiyang Guo, Yuanyuan Yang:
Efficient All-to-All Broadcast in Gaussian On-Chip Networks. 1959-1971 - Zhiyang Guo, Yuanyuan Yang:
High-Speed Multicast Scheduling in Hybrid Optical Packet Switches with Guaranteed Latency. 1972-1987 - Jonathan Lee, Shin-Jie Lee, Hsi-Min Chen, Kuo-Hsun Hsu:
Itinerary-Based Mobile Agent as a Basis for Distributed OSGi Services. 1988-2000 - Giorgos Dimitrakopoulos, Emmanouil Kalligeros, Costas Galanopoulos:
Merged Switch Allocation and Traversal in Network-on-Chip Switches. 2001-2012 - Javier Hormigo, Julio Villalba, Emilio L. Zapata:
Multioperand Redundant Adders on FPGAs. 2013-2025 - Heng Yu, Yajun Ha, Bharadwaj Veeravalli:
Quality-Driven Dynamic Scheduling for Real-Time Adaptive Applications on Multiprocessor Systems. 2026-2040 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. 2041-2053 - Satish Mahadevan Srinivasan, Azad H. Azadmanesh:
Survivable Data Aggregation in Multiagent Network Systems with Hybrid Faults. 2054-2068 - Jiang Lin, Hongzhong Zheng, Zhichun Zhu, Zhao Zhang:
Thermal Modeling and Management of DRAM Systems. 2069-2082 - Qi Wu, Fei Sun, Wei Xu, Tong Zhang:
Using Multilevel Phase Change Memory to Build Data Storage: A Time-Aware System Design Perspective. 2083-2095 - Chi Cheng, Tao Jiang:
An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding. 2096-2100 - Shadi Atalla, Davide Cuda, Paolo Giaccone, Marco Pretti:
Belief-Propagation-Assisted Scheduling in Input-Queued Switches. 2101-2107 - Menglan Hu, Bharadwaj Veeravalli:
Requirement-Aware Scheduling of Bag-of-Tasks Applications on Grids with Dynamic Resilience. 2108-2114
Volume 62, Number 11, November 2013
- Haiying Shen, Guoxin Liu:
A Lightweight and Cooperative Multifactor Considered File Replication Method in Structured P2P Systems. 2115-2130 - Nicolas Van Wambeke, Ernesto Exposito, Christophe Chassot, Michel Diaz:
ATP: A Microprotocol Approach to Autonomic Communication. 2131-2140 - Sungjin Lee, Dongkun Shin, Jihong Kim:
BAGC: Buffer-Aware Garbage Collection for Flash-Based Storage Systems. 2141-2154 - Jianfeng Zhan, Lei Wang, Xiaona Li, Weisong Shi, Chuliang Weng, Wenyao Zhang, Xiutao Zang:
Cost-Aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers. 2155-2168 - Weirong Jiang, Viktor K. Prasanna:
Data Structure Optimization for Power- Efficient IP Lookup Architectures. 2169-2182 - Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis G. Wolff, Christos A. Papachristou, Kaushik Roy, Swarup Bhunia:
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis. 2183-2195 - Ioannis Kouretas, Charalambos Basetas, Vassilis Paliouras:
Low-Power Logarithmic Number System Addition/Subtraction and Their Impact on Digital Filters. 2196-2209 - Yang Wang, Paul Lu:
Maximizing Active Storage Resources with Deadlock Avoidance in Workflow-Based Computations. 2210-2223 - Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications. 2224-2237 - Jonghun Yoo, Jaesoo Lee, Seongsoo Hong:
Petri Net-Based FTL Architecture for Parametric WCET Estimation via FTL Operation Sequence Derivation. 2238-2251 - Bo Zhao, Yu Du, Jun Yang, Youtao Zhang:
Process Variation-Aware Nonuniform Cache Management in a 3D Die-Stacked Multicore Processor. 2252-2265 - Peng Xu, Hai Jin, Qianhong Wu, Wei Wang:
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. 2266-2277 - Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Xiaoming Fu, Laurence T. Yang:
Receiving Buffer Adaptation for High-Speed Data Transfer. 2278-2291 - Karthik Pattabiraman, Nithin Nakka, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework. 2292-2307 - Minsu Huang, Siyuan Chen, Ying Zhu, Yu Wang:
Topology Control for Time-Evolving and Predictable Delay-Tolerant Networks. 2308-2321 - Salvatore Pontarelli, Giuseppe Bianchi, Simone Teofili:
Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System. 2322-2334 - Yi-Ning Liu, Chi Cheng, Jianyu Cao, Tao Jiang:
An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing. 2335-2336 - Qiang Zhu, Xinke Wang, Guanglan Cheng:
Reliability Evaluation of BC Networks. 2337-2340
Volume 62, Number 12, December 2013
- Bang Wang, Han Xu, Wenyu Liu, Hui Liang:
A Novel Node Placement for Long Belt Coverage in Wireless Networks. 2341-2353 - Yue-Ru Chuang, Hsueh-Wen Tseng, Shiann-Tsong Sheu:
A Performance Study of Discrete-Error-Checking Scheme (DECS) with the Optimal Division Locations for IEEE 802.16-Based Multihop Networks. 2354-2365 - Silvia Franchini, Antonio Gentile, Filippo Sorbello, Giorgio Vassallo, Salvatore Vitabile:
Design and Implementation of an Embedded Coprocessor with Native Support for 5D, Quadruple-Based Clifford Algebra. 2366-2381 - Sujay Deb, Kevin Chang, Xinmin Yu, Suman Prasad Sah, Miralem Cosic, Amlan Ganguly, Partha Pratim Pande, Benjamin Belzer, Deuk Hyoun Heo:
Design of an Energy-Efficient CMOS-Compatible NoC Architecture with Millimeter-Wave Wireless Interconnects. 2382-2396 - Hamid Reza Pourshaghaghi, José Pineda de Gyvez:
Fuzzy-Controlled Voltage Scaling Based on Supply Current Tracking. 2397-2410 - Zhen Ling, Xinwen Fu, Weijia Jia, Wei Yu, Dong Xuan, Junzhou Luo:
Novel Packet Size-Based Covert Channel Attacks against Anonymizer. 2411-2426 - Zaixin Lu, Weili Wu, Bin Fu:
Optimal Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments. 2427-2439 - Stefan Rührup, Ivan Stojmenovic:
Optimizing Communication Overhead while Reducing Path Length in Beaconless Georouting with Guaranteed Delivery for Wireless Sensor Networks. 2440-2453 - Steve B. Furber, David R. Lester, Luis A. Plana, Jim D. Garside, Eustace Painkras, Steve Temple, Andrew D. Brown:
Overview of the SpiNNaker System Architecture. 2454-2467 - Sook-Yeon Kim, Jung-Heum Park:
Paired Many-to-Many Disjoint Path Covers in Recursive Circulants $(G(2^m, 4))$. 2468-2475 - Deepak Unnikrishnan, Ramakrishna Vadlamani, Yong Liao, Jérémie Crenne, Lixin Gao, Russell Tessier:
Reconfigurable Data Planes for Scalable Network Virtualization. 2476-2488 - Cristiana Bolchini, Antonio Miele:
Reliability-Driven System-Level Synthesis for Mixed-Critical Embedded Systems. 2489-2502 - Yuan-Hao Chang, Po-Chun Huang, Pei-Han Hsu, Lue-Jane Lee, Tei-Wei Kuo, David Hung-Chang Du:
Reliability Enhancement of Flash-Memory Storage Systems: An Efficient Version-Based Design. 2503-2515 - Minjang Kim, Nagesh B. Lakshminarayana, Hyesoon Kim, Chi-Keung Luk:
SD3: An Efficient Dynamic Data-Dependence Profiling Mechanism. 2516-2530 - Hagit Attiya, Eshcar Hillel:
The Cost of Privatization in Software Transactional Memory. 2531-2543 - Irith Pomeranz:
Signal-Transition Patterns of Functional Broadside Tests. 2544-2549
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.