


default search action
IEEE Transactions on Computers, Volume 62
Volume 62, Number 1, January 2013
- Albert Y. Zomaya

:
State of the Journal. 1-5 - Kyueun Yi, Won Woo Ro, Jean-Luc Gaudiot:

Importance of Coherence Protocols with Network Applications on Multicore Processors. 6-15 - Giuliana Santos Veronese, Miguel Correia

, Alysson Neves Bessani
, Lau Cheuk Lung, Paulo Veríssimo
:
Efficient Byzantine Fault-Tolerance. 16-30 - Stanislavs Golubcovs, Delong Shang, Fei Xia, Andrey Mokhov, Alex Yakovlev

:
Concurrent Multiresource Arbiter: Design and Applications. 31-44 - Emiliano Betti, Stanley Bak, Rodolfo Pellizzoni, Marco Caccamo, Lui Sha:

Real-Time I/O Management System with COTS Peripherals. 45-58 - Michel A. Kinsy, Myong Hyon Cho, Keun Sup Shim, Mieszko Lis, G. Edward Suh

, Srinivas Devadas:
Optimal and Heuristic Application-Aware Oblivious Routing. 59-73 - Andrea Bianco

, Paolo Giaccone
, Guido Masera
, Marco Ricca:
Power Control for Crossbar-Based Input-Queued Switches. 74-82 - Ze Li, Haiying Shen:

SEDUM: Exploiting Social Networks in Utility-Based Distributed Routing for DTNs. 83-97 - Michele Lombardi

, Michela Milano, Luca Benini
:
Robust Scheduling of Task Graphs under Execution Time Uncertainty. 98-111 - Kazuya Sakai, Wei-Shinn Ku

, Roger Zimmermann
, Min-Te Sun:
Dynamic Bit Encoding for Privacy Protection against Correlation Attacks in RFID Backward Channel. 112-123 - Zhimin Chen, Ambuj Sinha, Patrick Schaumont

:
Using Virtual Secure Circuit to Protect Embedded Software from Side-Channel Attacks. 124-136 - Rui Chu, Lin Gu, Yunhao Liu, Mo Li

, Xicheng Lu:
SenSmart: Adaptive Stack Management for Multitasking Sensor Networks. 137-150 - Xinxin Liu, Han Zhao, Xin Yang, Xiaolin Li:

SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks. 151-162 - T. Nandha Kumar

, Fabrizio Lombardi:
A Novel Heuristic Method for Application-Dependent Testing of a SRAM-Based FPGA Interconnect. 163-172 - Thé Van Luong

, Nouredine Melab, El-Ghazali Talbi:
GPU Computing for Parallel Local Search Metaheuristic Algorithms. 173-185 - Bo Zhou, Hiroyuki Okamura

, Tadashi Dohi
:
Enhancing Performance of Random Testing through Markov Chain Monte Carlo Methods. 186-192 - Jithra Adikari, Ayad F. Barsoum, M. Anwar Hasan, Ashkan Hosseinzadeh Namin, Christophe Nègre:

Improved Area-Time Tradeoffs for Field Multiplication Using Optimal Normal Bases. 193-199 - Pranava K. Jha:

Comments on "Multiple-Radix Gray Codes in Lee Metric". 200
Volume 62, Number 2, 2013
- Hansu Cho, Lochi Yu, Samar Abdi:

Automatic Generation of Transducer Models for Bus-Based MPSoC Design. 211-224 - Luigi Di Guglielmo, Franco Fummi, Graziano Pravadelli

, Francesco Stefanni, Sara Vinco:
UNIVERCM: The UNIversal VERsatile Computational Model for Heterogeneous System Integration. 225-241 - Kyle Balston, Mehdi Karimibiuki, Alan J. Hu, André Ivanov, Steven J. E. Wilton:

Post-Silicon Code Coverage for Multiprocessor System-on-Chip Designs. 242-246 - Rajwinder Singh, Mayank Dave

:
Antecedence Graph Approach to Checkpointing for Fault Tolerance in Mobile Agent Systems. 247-258 - Chang-Hsiung Tsai:

A Quick Pessimistic Diagnosis Algorithm for Hypercube-Like Multiprocessor Systems under the PMC Model. 259-267 - Ozcan Ozturk, Mahmut T. Kandemir, Guangyu Chen:

Compiler-Directed Energy Reduction Using Dynamic Voltage Scaling and Voltage Islands for Embedded Systems. 268-278 - Debrup Chakraborty

, Cuauhtemoc Mancillas-López
, Francisco Rodríguez-Henríquez, Palash Sarkar:
Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes. 279-294 - George Michelogiannakis

, William J. Dally:
Elastic Buffer Flow Control for On-Chip Networks. 295-309 - Cong Liu, Jie Wu:

Fast Deep Packet Inspection with a Dual Finite Automata. 310-321 - Ricardo Quislant

, Eladio Gutiérrez
, Oscar G. Plata
, Emilio L. Zapata:
LS-Sig: Locality-Sensitive Signatures for Transactional Memory. 322-335 - Yi Wang

, Duo Liu, Zhiwei Qin, Zili Shao
:
Optimally Removing Intercore Communication Overhead for Streaming Applications on MPSoCs. 336-350 - Fangming Liu, Bo Li, Baochun Li, Hai Jin:

Peer-Assisted On-Demand Streaming: Characterizing Demands and Optimizing Supplies. 351-361 - Cong Wang

, Sherman S. M. Chow
, Qian Wang
, Kui Ren
, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. 362-375 - Dehao Chen, Neil Vachharajani, Robert Hundt

, Xinliang D. Li
, Stéphane Eranian, Wenguang Chen, Weimin Zheng:
Taming Hardware Event Samples for Precise and Versatile Feedback Directed Optimizations. 376-389 - Wei Zang, Ann Gordon-Ross:

T-SPaCS - A Two-Level Single-Pass Cache Simulation Methodology. 390-403 - Irith Pomeranz:

An Adjacent Switching Activity Metric under Functional Broadside Tests. 404-410 - Aleksandar Radonjic

, Vladimir Vujicic:
Integer Codes Correcting Burst Errors within a Byte. 411-415
Volume 62, Number 3, March 2013
- Zhiping Cai, Zhijun Wang, Kai Zheng, Jiannong Cao

:
A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching, Policy Filtering, and Content Filtering. 417-427 - Chia-Yu Lu, Shang-Ming Jen, Chi-Sung Laih:

A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication. 428-438 - Cheng-Kuan Lin, Tzu-Liang Kung, Jimmy J. M. Tan:

An Algorithmic Approach to Conditional-Fault Local Diagnosis of Regular Multiprocessor Interconnected Systems under the PMC Model. 439-451 - Dara Rahmati

, Srinivasan Murali, Luca Benini
, Federico Angiolini, Giovanni De Micheli, Hamid Sarbazi-Azad:
Computing Accurate Performance Bounds for Best Effort Networks-on-Chip. 452-467 - Chen-Wei Lin, Hung-Hsin Chen, Hao-Yu Yang, Chin-Yuan Huang, Mango Chia-Tso Chao, Rei-Fu Huang:

Fault Models and Test Methods for Subthreshold SRAMs. 468-481 - Blas Cuesta, Alberto Ros

, María Engracia Gómez, Antonio Robles
, José Duato
:
Increasing the Effectiveness of Directory Caches by Avoiding the Tracking of Noncoherent Memory Blocks. 482-495 - Martin Omaña, Daniele Rossi

, Nicolò Bosio, Cecilia Metra:
Low Cost NBTI Degradation Detection and Masking Approaches. 496-509 - Qiang Zheng, Guohong Cao:

Minimizing Probing Cost and Achieving Identifiability in Probe-Based Network Link Monitoring. 510-523 - Phillip Kinsman, Nicola Nicolici:

NoC-Based FPGA Acceleration for Monte Carlo Simulations with Applications to SPECT Imaging. 524-535 - Bin Liu, Bevan M. Baas:

Parallel AES Encryption Engines for Many-Core Processor Arrays. 536-547 - Liang Lu, Weiqiang Liu, Máire O'Neill, Earl E. Swartzlander Jr.:

QCA Systolic Array Design. 548-560 - Rohit Sunkam Ramanujam, Bill Lin:

Randomized Throughput-Optimal Oblivious Routing for Torus Networks. 561-574 - Ruhi Sarikaya, Canturk Isci, Alper Buyuktosunoglu:

Runtime Application Behavior Prediction Using a Statistical Metric Model. 575-588 - Ren Ping Liu

, Mark Hedley, Xun Yang:
WLAN Location Service with TXOP. 589-598 - Yiwei Zhang, Joseph McGeehan, Edward Regan, Stephen Kelly, José Luis Núñez-Yáñez

:
Biophysically Accurate Foating Point Neuroprocessors for Reconfigurable Logic. 599-608 - Florentine Dubois, Abbas Sheibanyrad, Frédéric Pétrot, Maryam Bahmani:

Elevator-First: A Deadlock-Free Distributed Routing Algorithm for Vertically Partially Connected 3D-NoCs. 609-615 - Daojing He

, Jiajun Bu, Sammy Chan
, Chun Chen:
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks. 616-622 - Mary Flahive, Bella Bose:

On Resource Placement in Gaussian and EJ Interconnection Networks. 623-626
Volume 62, Number 4, April 2013
- Chih-Yuan Lien, Chien-Chuan Huang, Pei-Yin Chen

, Yi-Fan Lin:
An Efficient Denoising Architecture for Removal of Impulse Noise in Images. 631-643 - Haibo Zeng, Marco Di Natale

:
An Efficient Formulation of the Real-Time Feasibility Region for Design Optimization. 644-661 - Hung-Chang Hsiao, Che-Wei Chang:

A Symmetric Load Balancing Algorithm with Performance Guarantees for Distributed Hash Tables. 662-675 - Leandro A. Villas

, Azzedine Boukerche, Heitor S. Ramos
, Horacio A. B. F. de Oliveira, Regina Borges de Araujo, Antonio Alfredo Ferreira Loureiro:
DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless Sensor Networks. 676-689 - Christos Ttofis, Stavros Hadjitheophanous, Athinodoros S. Georghiades, Theocharis Theocharides:

Edge-Directed Hardware Architecture for Real-Time Disparity Map Computation. 690-704 - Hyung Beom Jang, Jinhang Choi, Ikroh Yoon, Sung-Soo Lim, Seungwon Shin

, Naehyuck Chang, Sung Woo Chung:
Exploiting Application/System-Dependent Ambient Temperature for Accurate Microarchitectural Simulation. 705-715 - Shan Chu, Xin Wang, Yuanyuan Yang

:
Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks. 716-729 - Sourav Sen Gupta

, Anupam Chattopadhyay, Koushik Sinha
, Subhamoy Maitra, Bhabani P. Sinha:
High-Performance Hardware Implementation for RC4 Stream Cipher. 730-743 - Reza Azarderakhsh, Arash Reyhani-Masoleh:

Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases. 744-757 - Duhee Lee, Jong-Chan Kim, Chang-Gun Lee, Kanghee Kim:

mRT-PLRU: A General Framework for Real-Time Multitask Executions on NAND Flash Memory. 758-771 - Douglas Hakkarinen, Zizhong Chen

:
Multilevel Diskless Checkpointing. 772-783 - Jung-Sang Ahn, Dongwon Kang, Dawoon Jung, Jin-Soo Kim, Seungryoul Maeng:

μ*-Tree: An Ordered Index Structure for NAND Flash Memory with Adaptive Page Layout Scheme. 784-797 - Yuan-Po Cheng, Chia-Yi Wu, Yao-Jen Tang, Ming-Jer Tsai:

Retrieval-Guaranteed Location-Aware Information Brokerage Scheme in 3D Wireless Ad Hoc Networks. 798-812 - Alessandro Morari, Carlos Boneti, Francisco J. Cazorla

, Roberto Gioiosa, Chen-Yong Cher, Alper Buyuktosunoglu, Pradip Bose, Mateo Valero
:
SMT Malleability in IBM POWER5 and POWER6 Processors. 813-826 - Rong-Xia Hao, Yan-Quan Feng

, Jin-Xin Zhou
:
Conditional Diagnosability of Alternating Group Graphs. 827-831 - Jui-Chieh Lin, Sao-Jie Chen

, Yu Hen Hu:
Cycle-Efficient LFSR Implementation on Word-Based Microarchitecture. 832-838 - Sun-Yuan Hsieh, Chi-Ya Kao:

The Conditional Diagnosability of k-Ary n-Cubes under the Comparison Diagnosis Model. 839-843
Volume 62, Number 5, May 2013
- Hoang Le, Viktor K. Prasanna:

A Memory-Efficient and Modular Approach for Large-Scale String Pattern Matching. 844-857 - Joshua Yung Lih Low, Ching-Chuen Jong

:
A Memory-Efficient Tables-and-Additions Method for Accurate Computation of Elementary Functions. 858-872 - Xiaoyan Yin, Xiaomin Ma, Kishor S. Trivedi:

An Interacting Stochastic Models Approach for the Performance Evaluation of DSRC Vehicular Safety Communication. 873-885 - Qinru Qiu, Qing Wu, Morgan Bishop, Robinson E. Pino, Richard W. Linderman:

A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster. 886-899 - David M. Russinoff:

Computation and Formal Verification of SRT Quotient and Square Root Digit Selection Tables. 900-913 - Christian Fensch, Nick Barrow-Williams, Robert D. Mullins

, Simon W. Moore
:
Designing a Physical Locality Aware Coherence Protocol for Chip-Multiprocessors. 914-928 - Alessandro Cilardo:

Fast Parallel GF(2^m) Polynomial Multiplication for All Degrees. 929-943 - Rafael Ubal, Julio Sahuquillo

, Salvador Petit
, Pedro López, José Duato
:
Hardware-Based Generation of Independent Subtraces of Instructions in Clustered Processors. 944-955 - Liu Han, Seok-Bum Ko

:
High-Speed Parallel Decimal Multiplication with Redundant Internal Encodings. 956-968 - Shouwen Lai, Binoy Ravindran

:
Least-Latency Routing over Time-Dependent Wireless Sensor Networks. 969-983 - Noha Elarief, Bella Bose, Samir Elmougy

:
Limited Magnitude Error Detecting Codes over Z_{q}. 984-989 - Jasma Balasangameshwara

, Nedunchezhian Raju
:
Performance-Driven Load Balancing with a Primary-Backup Approach for Computational Grids with Low Communication Cost and Replication Cost. 990-1003 - Lin Gao, Lian Li, Jingling Xue

, Pen-Chung Yew
:
SEED: A Statically Greedy and Dynamically Adaptive Approach for Speculative Loop Execution. 1004-1016 - Mario Baldi, Guido Marchetto:

Time-Driven Priority Router Implementation: Analysis and Experiments. 1017-1030 - Udi Ben-Porat, Anat Bremler-Barr

, Hanoch Levy:
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. 1031-1043 - Christos Liaskos

, Georgios I. Papadimitriou:
Generalizing the Square Root Rule for Optimal Periodic Scheduling in Push-Based Wireless Environments. 1044-1050 - Yangyang Pan, Guiqiang Dong, Ningde Xie, Tong Zhang:

Using Quasi-EZ-NAND Flash Memory to Build Large-Capacity Solid-State Drives in Computing Systems. 1051-1057
Volume 62, Number 6, June 2013
- Dimiter R. Avresky:

Guest Editors' introduction: Special section on optimizing the cloud. 1058-1059 - Chrysa Papagianni

, Aris Leivadeas, Symeon Papavassiliou, Vasilis Maglaris
, Cristina Cervello-Pastor
, Álvaro Monje:
On the Optimal Allocation of Virtual Resources in Cloud Computing Networks. 1060-1071 - Dario Bruneo

, Salvatore Distefano
, Francesco Longo
, Antonio Puliafito, Marco Scarpa:
Workload-Based Software Rejuvenation in Cloud Systems. 1072-1085 - Lakshmi Ganesh, Hakim Weatherspoon, Tudor Marian, Ken Birman

:
Integrated Approach to Data Center Power Management. 1086-1096 - Chun-An Chen, Sun-Yuan Hsieh:

Component-Composition Graphs: (t, k)-Diagnosability and Its Application. 1097-1110 - Salvatore Pontarelli

, Marco Ottavi
:
Error Detection and Correction in Content Addressable Memories by Using Bloom Filters. 1111-1126 - Ori Rottenstreich, Rami Cohen, Danny Raz, Isaac Keslassy

:
Exact Worst Case TCAM Rule Expansion. 1127-1140 - Yang Hu, Hong Jiang, Dan Feng, Lei Tian, Hao Luo, Chao Ren

:
Exploring and Exploiting the Multilevel Parallelism Inside SSDs for Improved Performance and Endurance. 1141-1155 - Xinyan Zha, Sartaj Sahni:

GPU-to-GPU and Host-to-Host Multipattern String Matching on a GPU. 1156-1169 - Jiafeng Xie, Pramod Kumar Meher, Jianjun He:

Hardware-Efficient Realization of Prime-Length DCT Based on Distributed Arithmetic. 1170-1178 - Hung-Manh Pham, Sébastien Pillement

, Stanislaw J. Piestrak
:
Low-Overhead Fault-Tolerance Technique for a Dynamically Reconfigurable Softcore Processor. 1179-1192 - Silvio Cesare, Yang Xiang

, Wanlei Zhou
:
Malwise - An Effective and Efficient Classification System for Packed and Polymorphic Malware. 1193-1206 - Richard G. Clegg

, Stuart Clayman, George Pavlou, Lefteris Mamatas
, Alex Galis:
On the Selection of Management/Monitoring Nodes in Highly Dynamic Networks. 1207-1220 - Hanjiang Lai

, Yan Pan, Cong Liu, Liang Lin, Jie Wu:
Sparse Learning-to-Rank via an Efficient Primal-Dual Algorithm. 1221-1233 - Tobias Nopper, Christoph Scholl:

Symbolic Model Checking for Incomplete Designs with Flexible Modeling of Unknowns. 1234-1254 - Jianjun Li, Ming Xiong, Victor C. S. Lee

, LihChyun Shu, Guohui Li:
Workload-Efficient Deadline and Period Assignment for Maintaining Temporal Consistency under EDF. 1255-1268 - Mohamed-Slim Bouguerra, Denis Trystram, Frédéric Wagner:

Complexity Analysis of Checkpoint Scheduling with Variable Costs. 1269-1275
Volume 62, Number 7, July 2013
- Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou

:
Architecting against Software Cache-Based Side-Channel Attacks. 1276-1288 - Ramon Bertran

, Marc González, Xavier Martorell
, Nacho Navarro, Eduard Ayguadé
:
A Systematic Methodology to Generate Decomposable and Responsive Power Models for CMPs. 1289-1302 - Deke Guo, Tao Chen

, Dan Li, Mo Li
, Yunhao Liu, Guihai Chen
:
Expandable and Cost-Effective Network Structures for Data Centers Using Dual-Port Servers. 1303-1317 - Po-Yuan Chen, Chin-Lung Su, Chao-Hsun Chen, Cheng-Wen Wu

:
Generalization of an Enhanced ECC Methodology for Low Power PSRAM. 1318-1331 - Chuliang Weng, Minyi Guo, Yuan Luo, Minglu Li:

Hybrid CPU Management for Adapting to the Diversity of Virtual Machines. 1332-1344 - Murat Cenk

, Christophe Nègre, M. Anwar Hasan:
Improved Three-Way Split Formulas for Binary Polynomial and Toeplitz Matrix Vector Products. 1345-1361 - Cristobal Camarero, Carmen Martínez

, Ramón Beivide:
L-Networks: A Topological Model for Regular 2D Interconnection Networks. 1362-1375 - Michail Maniatakos

, Prabhakar Kudva, Bruce M. Fleischer, Yiorgos Makris
:
Low-Cost Concurrent Error Detection for Floating-Point Unit (FPU) Controllers. 1376-1388 - Amin Farmahini Farahani, Henry J. Duwe III, Michael J. Schulte, Katherine Compton:

Modular Design of High-Throughput, Low-Latency Sorting Units. 1389-1402 - Tingting Chen, Fan Wu, Sheng Zhong:

On Designing Protocols for Noncooperative, Multiradio Channel Assignment in Multiple Collision Domains. 1403-1416 - Yu Li, Sai Tung On, Jianliang Xu

, Byron Choi, Haibo Hu
:
Optimizing Nonindexed Join Processing in Flash Storage-Based Systems. 1417-1431 - Mayur Deshpande, Kyungbaek Kim

, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
ReCREW: A Reliable Flash-Dissemination System. 1432-1446 - Jullawadee Maneesilp, Chong Wang, Hongyi Wu, Nian-Feng Tzeng:

RFID Support for Accurate 3D Localization. 1447-1459 - M. Anwar Hasan, Christophe Nègre:

Multiway Splitting Method for Toeplitz Matrix Vector Product. 1467-1471 - Sun-Yuan Hsieh, Cheng-Yen Tsai, Chun-An Chen:

Strong Diagnosability and Conditional Diagnosability of Multiprocessor Systems and Folded Hypercubes. 1472-1477
Volume 62, Number 8, August 2013
- Khaled Benkrid, Didier Keymeulen, Umeshkumar D. Patel, David Merodio Codinachs:

Guest Editors' introduction: Special section on adaptive hardware and systems. 1478-1480 - Rubén Salvador

, Andrés Otero
, Javier Mora
, Eduardo de la Torre, Teresa Riesgo, Lukás Sekanina:
Self-Reconfigurable Evolvable Hardware System for Adaptive Image Processing. 1481-1493 - Lars Bauer, Claus Braun, Michael E. Imhof, Michael A. Kochte, Eric Schneider, Hongyan Zhang, Jörg Henkel, Hans-Joachim Wunderlich:

Test Strategies for Reliable Runtime Reconfigurable Architectures. 1494-1507 - Luca Sterpone

, Mario Porrmann
, Jens Hagemeyer:
A Novel Fault Tolerant and Runtime Reconfigurable Platform for Satellite Payload Processing. 1508-1525 - Rizwan A. Ashraf

, Ronald F. DeMara
:
Scalable FPGA Refurbishment Using Netlist-Driven Evolutionary Algorithms. 1526-1541 - Xabier Iturbe

, Khaled Benkrid, Chuan Hong, Ali Ebrahim
, Raul Torrego
, Imanol Martinez
, Tughrul Arslan, Jon Pérez
:
R3TOS: A Novel Reliable Reconfigurable Real-Time Operating System for Highly Adaptive, Efficient, and Dependable Computing on FPGAs. 1542-1556 - Marisha Rawlins, Ann Gordon-Ross:

A Cache Tuning Heuristic for Multicore Architectures. 1570-1583 - James Alfred Walker, Martin Trefzer

, Simon J. Bale, Andy M. Tyrrell:
PAnDA: A Reconfigurable Architecture that Adapts to Physical Substrate Variations. 1584-1596 - Michael Soltiz, Dhireesha Kudithipudi, Cory E. Merkel, Garrett S. Rose

, Robinson E. Pino:
Memristor-Based Neural Logic Blocks for Nonlinearly Separable Functions. 1597-1606 - Louis-Marie Aubert, Roger F. Woods

, Scott Fischaber, Richard Veitch:
Optimization of Weighted Finite State Transducer for Speech Recognition. 1607-1615 - Jie Tang, Shaoshan Liu, Chen Liu

, Zhimin Gu
, Jean-Luc Gaudiot:
Acceleration of XML Parsing through Prefetching. 1616-1628 - Guillaume Dabosville, Julien Doget, Emmanuel Prouff:

A New Second-Order Side Channel Attack Based on Linear Regression. 1629-1640 - Sahar Foroutan, Yvain Thonnart

, Frédéric Pétrot:
An Iterative Computational Technique for Performance Evaluation of Networks-on-Chip. 1641-1655 - Jing Liu, Qiong Huang, Bo Yang, Yang Zhang:

Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures. 1656-1672 - Robert M. Hierons

:
Verifying and Comparing Finite State Machines for Systems that Have Distributed Interfaces. 1673-1683
Volume 62, Number 9, September 2013
- Hong Shen, Longkun Guo:

An Eight-Approximation Algorithm for Computing Rooted Three-Vertex Connected Minimum Steiner Networks. 1684-1693 - Jinghang Liang, Jie Han, Fabrizio Lombardi:

Analysis of Error Masking and Restoring Properties of Sequential Circuits. 1694-1704 - Shicong Meng, Ling Liu:

Enhanced Monitoring-as-a-Service for Effective Cloud Management. 1705-1720 - Álvaro Vázquez, Javier D. Bruguera:

Iterative Algorithm and Architecture for Exponential, Logarithm, Powering, and Root Extraction. 1721-1731 - Yunji Chen

, Tianshi Chen, Ling Li, Lei Li, Liang Yang, Menghao Su, Weiwu Hu:
LDet: Determinizing Asynchronous Transfer for Postsilicon Debugging. 1732-1744 - Ze Li, Haiying Shen, Karan Sapra:

Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks. 1745-1759 - Jinghang Liang, Jie Han, Fabrizio Lombardi:

New Metrics for the Reliability of Approximate and Probabilistic Adders. 1760-1771 - Kimish Patel, Murali Annavaram

, Massoud Pedram:
NFRA: Generalized Network Flow-Based Resource Allocation for Hosting Centers. 1772-1785 - Amir Moradi

, Oliver Mischke, Christof Paar:
One Attack to Rule Them All: Collision Timing Attack versus 42 AES ASIC Cores. 1786-1798 - Hao Jin, Deng Pan, Jason Liu

, Niki Pissinou:
OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches. 1799-1812 - Ismael Ripoll

, Rafael Ballester-Ripoll
:
Period Selection for Minimal Hyperperiod in Periodic Task Systems. 1813-1822 - Ajay D. Kshemkalyani

, Jiannong Cao
:
Predicate Detection in Asynchronous Pervasive Environments. 1823-1836 - Wei Dong, Yunhao Liu, Chun Chen, Jiajun Bu, Chao Huang, Zhiwei Zhao:

R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems. 1837-1849 - Octav Chipara

, Chenyang Lu
, Gruia-Catalin Roman:
Real-Time Query Scheduling for Wireless Sensor Networks. 1850-1865 - Daniel Cederman, Philippas Tsigas

:
Supporting Lock-Free Composition of Concurrent Data Objects: Moving Data between Containers. 1866-1878 - Enric Herrero

, José González, Ramon Canal, Dean M. Tullsen
:
Thread Row Buffers: Improving Memory Performance Isolation and Throughput in Multiprogrammed Environments. 1879-1892 - Lein Harn:

Group Authentication. 1893-1898 - Salvatore Pontarelli

, Pedro Reviriego
, Chris J. Bleakley
, Juan Antonio Maestro
:
Low Complexity Concurrent Error Detection for Complex Multiplication. 1899-1903 - Dirk Müller, Matthias Werner

:
A Note on "New Strategies for Assigning Real-Time Tasks to Multiprocessor Systems". 1904-1905
Volume 62, Number 10, October 2013
- Cheng-Hung Lin, Chen-Hsiung Liu, Lung-Sheng Chien, Shih-Chieh Chang

:
Accelerating Pattern Matching Using a Novel Parallel Algorithm on GPUs. 1906-1916 - Soumyajit Dey, Dipankar Sarkar, Anupam Basu:

A Kleene Algebra of Tagged System Actors for Reasoning about Heterogeneous Embedded Systems. 1917-1931 - Weifa Liang

, Pascal Schweitzer
, Zichuan Xu:
Approximation Algorithms for Capacitated Minimum Forest Problems in Wireless Sensor Networks with a Mobile Sink. 1932-1944 - Yong Lu

, Youjian Zhao, Fuchun Sun, Hongbo Li, Dianjun Wang:
Dynamic Fault-Tolerant Routing Based on FSA for LEO Satellite Networks. 1945-1958 - Zhemin Zhang, Zhiyang Guo, Yuanyuan Yang

:
Efficient All-to-All Broadcast in Gaussian On-Chip Networks. 1959-1971 - Zhiyang Guo, Yuanyuan Yang

:
High-Speed Multicast Scheduling in Hybrid Optical Packet Switches with Guaranteed Latency. 1972-1987 - Jonathan Lee, Shin-Jie Lee, Hsi-Min Chen, Kuo-Hsun Hsu

:
Itinerary-Based Mobile Agent as a Basis for Distributed OSGi Services. 1988-2000 - Giorgos Dimitrakopoulos

, Emmanouil Kalligeros, Costas Galanopoulos:
Merged Switch Allocation and Traversal in Network-on-Chip Switches. 2001-2012 - Javier Hormigo

, Julio Villalba
, Emilio L. Zapata:
Multioperand Redundant Adders on FPGAs. 2013-2025 - Heng Yu

, Yajun Ha, Bharadwaj Veeravalli:
Quality-Driven Dynamic Scheduling for Real-Time Adaptive Applications on Multiprocessor Systems. 2026-2040 - Andrey Bogdanov

, Miroslav Knezevic, Gregor Leander
, Deniz Toz, Kerem Varici, Ingrid Verbauwhede
:
SPONGENT: The Design Space of Lightweight Cryptographic Hashing. 2041-2053 - Satish Mahadevan Srinivasan, Azad H. Azadmanesh:

Survivable Data Aggregation in Multiagent Network Systems with Hybrid Faults. 2054-2068 - Jiang Lin, Hongzhong Zheng, Zhichun Zhu, Zhao Zhang:

Thermal Modeling and Management of DRAM Systems. 2069-2082 - Qi Wu, Fei Sun, Wei Xu, Tong Zhang:

Using Multilevel Phase Change Memory to Build Data Storage: A Time-Aware System Design Perspective. 2083-2095 - Chi Cheng, Tao Jiang:

An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding. 2096-2100 - Shadi Atalla

, Davide Cuda, Paolo Giaccone
, Marco Pretti
:
Belief-Propagation-Assisted Scheduling in Input-Queued Switches. 2101-2107 - Menglan Hu, Bharadwaj Veeravalli:

Requirement-Aware Scheduling of Bag-of-Tasks Applications on Grids with Dynamic Resilience. 2108-2114
Volume 62, Number 11, November 2013
- Haiying Shen, Guoxin Liu:

A Lightweight and Cooperative Multifactor Considered File Replication Method in Structured P2P Systems. 2115-2130 - Nicolas Van Wambeke, Ernesto Exposito

, Christophe Chassot, Michel Diaz:
ATP: A Microprotocol Approach to Autonomic Communication. 2131-2140 - Sungjin Lee, Dongkun Shin, Jihong Kim:

BAGC: Buffer-Aware Garbage Collection for Flash-Based Storage Systems. 2141-2154 - Jianfeng Zhan, Lei Wang, Xiaona Li, Weisong Shi, Chuliang Weng, Wenyao Zhang, Xiutao Zang:

Cost-Aware Cooperative Resource Provisioning for Heterogeneous Workloads in Data Centers. 2155-2168 - Weirong Jiang

, Viktor K. Prasanna:
Data Structure Optimization for Power- Efficient IP Lookup Architectures. 2169-2182 - Seetharam Narasimhan, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis G. Wolff, Christos A. Papachristou

, Kaushik Roy, Swarup Bhunia
:
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis. 2183-2195 - Ioannis Kouretas

, Charalambos Basetas, Vassilis Paliouras
:
Low-Power Logarithmic Number System Addition/Subtraction and Their Impact on Digital Filters. 2196-2209 - Yang Wang, Paul Lu:

Maximizing Active Storage Resources with Deadlock Avoidance in Workflow-Based Computations. 2210-2223 - Sushmita Ruj

, Amiya Nayak
, Ivan Stojmenovic:
Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications. 2224-2237 - Jonghun Yoo, Jaesoo Lee, Seongsoo Hong:

Petri Net-Based FTL Architecture for Parametric WCET Estimation via FTL Operation Sequence Derivation. 2238-2251 - Bo Zhao, Yu Du, Jun Yang, Youtao Zhang:

Process Variation-Aware Nonuniform Cache Management in a 3D Die-Stacked Multicore Processor. 2252-2265 - Peng Xu

, Hai Jin, Qianhong Wu, Wei Wang:
Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack. 2266-2277 - Hao Liu, Yaoxue Zhang, Yuezhi Zhou, Xiaoming Fu

, Laurence T. Yang:
Receiving Buffer Adaptation for High-Speed Data Transfer. 2278-2291 - Karthik Pattabiraman, Nithin Nakka, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:

SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework. 2292-2307 - Minsu Huang, Siyuan Chen, Ying Zhu, Yu Wang:

Topology Control for Time-Evolving and Predictable Delay-Tolerant Networks. 2308-2321 - Salvatore Pontarelli

, Giuseppe Bianchi
, Simone Teofili:
Traffic-Aware Design of a High-Speed FPGA Network Intrusion Detection System. 2322-2334 - Yi-Ning Liu

, Chi Cheng, Jianyu Cao
, Tao Jiang:
An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing. 2335-2336 - Qiang Zhu, Xinke Wang, Guanglan Cheng:

Reliability Evaluation of BC Networks. 2337-2340
Volume 62, Number 12, December 2013
- Bang Wang, Han Xu, Wenyu Liu

, Hui Liang:
A Novel Node Placement for Long Belt Coverage in Wireless Networks. 2341-2353 - Yue-Ru Chuang, Hsueh-Wen Tseng

, Shiann-Tsong Sheu:
A Performance Study of Discrete-Error-Checking Scheme (DECS) with the Optimal Division Locations for IEEE 802.16-Based Multihop Networks. 2354-2365 - Silvia Franchini

, Antonio Gentile, Filippo Sorbello, Giorgio Vassallo, Salvatore Vitabile
:
Design and Implementation of an Embedded Coprocessor with Native Support for 5D, Quadruple-Based Clifford Algebra. 2366-2381 - Sujay Deb

, Kevin Chang, Xinmin Yu, Suman Prasad Sah, Miralem Cosic, Amlan Ganguly, Partha Pratim Pande, Benjamin Belzer, Deuk Hyoun Heo:
Design of an Energy-Efficient CMOS-Compatible NoC Architecture with Millimeter-Wave Wireless Interconnects. 2382-2396 - Hamid Reza Pourshaghaghi, José Pineda de Gyvez:

Fuzzy-Controlled Voltage Scaling Based on Supply Current Tracking. 2397-2410 - Zhen Ling, Xinwen Fu

, Weijia Jia
, Wei Yu
, Dong Xuan, Junzhou Luo:
Novel Packet Size-Based Covert Channel Attacks against Anonymizer. 2411-2426 - Zaixin Lu, Weili Wu, Bin Fu:

Optimal Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments. 2427-2439 - Stefan Rührup, Ivan Stojmenovic:

Optimizing Communication Overhead while Reducing Path Length in Beaconless Georouting with Guaranteed Delivery for Wireless Sensor Networks. 2440-2453 - Steve B. Furber, David R. Lester

, Luis A. Plana, Jim D. Garside, Eustace Painkras, Steve Temple, Andrew D. Brown:
Overview of the SpiNNaker System Architecture. 2454-2467 - Sook-Yeon Kim, Jung-Heum Park

:
Paired Many-to-Many Disjoint Path Covers in Recursive Circulants $(G(2^m, 4))$. 2468-2475 - Deepak Unnikrishnan, Ramakrishna Vadlamani, Yong Liao, Jérémie Crenne, Lixin Gao, Russell Tessier:

Reconfigurable Data Planes for Scalable Network Virtualization. 2476-2488 - Cristiana Bolchini

, Antonio Miele
:
Reliability-Driven System-Level Synthesis for Mixed-Critical Embedded Systems. 2489-2502 - Yuan-Hao Chang

, Po-Chun Huang, Pei-Han Hsu, Lue-Jane Lee, Tei-Wei Kuo
, David Hung-Chang Du:
Reliability Enhancement of Flash-Memory Storage Systems: An Efficient Version-Based Design. 2503-2515 - Minjang Kim, Nagesh B. Lakshminarayana, Hyesoon Kim, Chi-Keung Luk:

SD3: An Efficient Dynamic Data-Dependence Profiling Mechanism. 2516-2530 - Hagit Attiya

, Eshcar Hillel:
The Cost of Privatization in Software Transactional Memory. 2531-2543 - Irith Pomeranz:

Signal-Transition Patterns of Functional Broadside Tests. 2544-2549

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














