The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Parallel and Distributed Systems (ICPADS) (icpads)
2007 (conf/icpads/2007)


  1. Design and analysis of a low power wireless portable media player. [Citation Graph (, )][DBLP]


  2. Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. [Citation Graph (, )][DBLP]


  3. Mining temporal mobile sequential patterns in location-based service environments. [Citation Graph (, )][DBLP]


  4. Virtualization aware job schedulers for checkpoint-restart. [Citation Graph (, )][DBLP]


  5. Delay sensitive identity protection in peer-to-peer online gaming environments. [Citation Graph (, )][DBLP]


  6. A cooperative game theoretical replica placement technique. [Citation Graph (, )][DBLP]


  7. Message from the general chair. [Citation Graph (, )][DBLP]


  8. Secure random number agreement for peer-to-peer applications. [Citation Graph (, )][DBLP]


  9. Mathematical performance analysis of product networks. [Citation Graph (, )][DBLP]


  10. Resource reclamation using meta-events in a real time java system. [Citation Graph (, )][DBLP]


  11. Comparative evaluation of multi-core cache occupancy strategies. [Citation Graph (, )][DBLP]


  12. Improving quality-of-service of file migration policies in high-performance servers. [Citation Graph (, )][DBLP]


  13. Access point selection algorithms for maximizing throughputs in wireless LAN environment. [Citation Graph (, )][DBLP]


  14. Effect of number of faults on NoC power and performance. [Citation Graph (, )][DBLP]


  15. Formal verification of concurrent scheduling strategies using TLA. [Citation Graph (, )][DBLP]


  16. A weighted interference estimation scheme for interface switching wireless mesh networks. [Citation Graph (, )][DBLP]


  17. Speculative and distributed simulation of many-particle collision systems. [Citation Graph (, )][DBLP]


  18. CrossTree: A new HTC architecture with high reliability and scalability. [Citation Graph (, )][DBLP]


  19. Ants vs. faults: A swarm intelligence approach for diagnosing distributed computing networks. [Citation Graph (, )][DBLP]


  20. RAASP: Resource allocation analysis service and portal. [Citation Graph (, )][DBLP]


  21. Efficient search in file-sharing networks. [Citation Graph (, )][DBLP]


  22. Subscription-aware publish/subscribe tree construction in mobile ad hoc networks. [Citation Graph (, )][DBLP]


  23. Performance study of data stream approximation algorithms in wireless sensor networks. [Citation Graph (, )][DBLP]


  24. A scheduling algorithm for revenue maximisation for cluster-based Internet services. [Citation Graph (, )][DBLP]


  25. Supporting deadline monotonic policy over 802.11 average service time analysis. [Citation Graph (, )][DBLP]


  26. Analytical modelling of communication in the rectangular mesh NoC. [Citation Graph (, )][DBLP]


  27. Toward ubiquitous searching. [Citation Graph (, )][DBLP]


  28. Optimizing resource allocation for multiple concurrent jobs in grid environment. [Citation Graph (, )][DBLP]


  29. Data representations for mobile devices. [Citation Graph (, )][DBLP]


  30. Loop recreation for thread-level speculation. [Citation Graph (, )][DBLP]


  31. CAVENET: Description and analysis of a toolbox for vehicular networks simulation. [Citation Graph (, )][DBLP]


  32. Optimizing Katsevich image reconstruction algorithm on multicore processors. [Citation Graph (, )][DBLP]


  33. Parallel Minimum Spanning Tree Heuristic for the steiner problem in graphs. [Citation Graph (, )][DBLP]


  34. Comparative evaluation of the non-contiguous processor allocation strategies based on a real workload and a stochastic workload on multicomputers. [Citation Graph (, )][DBLP]


  35. An FPGA implementation of a snoop cache with synchronization for a multiprocessor system-on-chip. [Citation Graph (, )][DBLP]


  36. From ISA to application design via RTOS— a course design framework for embedded software. [Citation Graph (, )][DBLP]


  37. Privacy-preserving logical vector clocks using secure computation techniques. [Citation Graph (, )][DBLP]


  38. RTMG: Scheduling real-time distributable threads in large-scale, unreliable networks with low message overhead. [Citation Graph (, )][DBLP]


  39. Statistical trust establishment in wireless sensor networks. [Citation Graph (, )][DBLP]


  40. Message from P2P-NVE Program Chair. [Citation Graph (, )][DBLP]


  41. Performance analysis on mobile agent-based parallel information retrieval approaches. [Citation Graph (, )][DBLP]


  42. Vision-based fuzzy 8051 surveillance systems design. [Citation Graph (, )][DBLP]


  43. Message from the honorary chair. [Citation Graph (, )][DBLP]


  44. Message from the program chair. [Citation Graph (, )][DBLP]


  45. Energy-efficient anonymous multicast in mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  46. Efficient generation of stream programs from loops. [Citation Graph (, )][DBLP]


  47. Persistence and communication state transfer in an asynchronous pipe mechanism. [Citation Graph (, )][DBLP]


  48. Computation and communication schedule optimization for jobs with shared data. [Citation Graph (, )][DBLP]


  49. SSEST: Summer school on embedded system technologies. [Citation Graph (, )][DBLP]


  50. Using synchronized atoms to check distributed programs. [Citation Graph (, )][DBLP]


  51. Design of a dynamic distributed mobile computing environment. [Citation Graph (, )][DBLP]


  52. A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment. [Citation Graph (, )][DBLP]


  53. Prohibition-based MAC protocols for QoS-enhanced mesh networks and high-throughput WLANs. [Citation Graph (, )][DBLP]


  54. Extended Prefix Hash Trees for a distributed phone book application. [Citation Graph (, )][DBLP]


  55. Teaching embedded systems software: The HKUST experience. [Citation Graph (, )][DBLP]


  56. Early containment of worms using dummy addresses and connection trace back. [Citation Graph (, )][DBLP]


  57. Adaptive computation offloading for energy conservation on battery-powered systems. [Citation Graph (, )][DBLP]


  58. FairTrust: Toward secure and high performance P2P networks. [Citation Graph (, )][DBLP]


  59. Scalable networked virtual environments using unstructured overlays. [Citation Graph (, )][DBLP]


  60. A new MAC protocol design for long-term applications in wireless sensor networks. [Citation Graph (, )][DBLP]


  61. Evaluation and modeling of power consumption of a heterogeneous dual-core processor. [Citation Graph (, )][DBLP]


  62. Scheduling algorithm for multi-item requests with time constraints in mobile computing environments. [Citation Graph (, )][DBLP]


  63. A push-based prefetching for cooperative caching RAM Grid. [Citation Graph (, )][DBLP]


  64. ADENS: Efficient address determination for mobile grids. [Citation Graph (, )][DBLP]


  65. Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETs. [Citation Graph (, )][DBLP]


  66. On the teaching of embedded Linux system. [Citation Graph (, )][DBLP]


  67. A group-based multi-channel MAC protocol for wireless ad hoc networks. [Citation Graph (, )][DBLP]


  68. Virtual Exclusion: An architectural approach to reducing leakage energy in caches for multiprocessor systems. [Citation Graph (, )][DBLP]


  69. Issues and challenges of embedded processor education for working professionals. [Citation Graph (, )][DBLP]


  70. Novel critical-path based low-energy scheduling algorithms for heterogeneous multiprocessor real-time embedded systems. [Citation Graph (, )][DBLP]


  71. Embedded education for Computer Rank Examination. [Citation Graph (, )][DBLP]


  72. A two-tier semantic overlay network for P2P search. [Citation Graph (, )][DBLP]


  73. New power aware routing algorithm for MANETs using gateway node. [Citation Graph (, )][DBLP]


  74. Stepping-stone detection algorithm based on order preserving mapping. [Citation Graph (, )][DBLP]


  75. On incorporating an on-line strip packing algorithm into elastic Grid reservation-based systems. [Citation Graph (, )][DBLP]


  76. Parallel algorithms for chains and anti-chains of points on a plane. [Citation Graph (, )][DBLP]


  77. Directions for Peer-to-Peer based mobile pervasive augmented reality gaming. [Citation Graph (, )][DBLP]


  78. Parallel association rule mining based on FI-growth algorithm. [Citation Graph (, )][DBLP]


  79. Sharing information of three-dimensional geographic locations through mobile devices. [Citation Graph (, )][DBLP]


  80. A curriculum design on embedded system education for first-year graduate students. [Citation Graph (, )][DBLP]


  81. Diameter bounds of cubelike recursive networks. [Citation Graph (, )][DBLP]


  82. Design methodology and hands-on practices for Embedded Operating Systems. [Citation Graph (, )][DBLP]


  83. On the relative value of local scheduling versus routing in parallel server systems. [Citation Graph (, )][DBLP]


  84. Network energy consumption in ad-hoc networks under different radio models. [Citation Graph (, )][DBLP]


  85. A dual scale heterogeneous organizational network model. [Citation Graph (, )][DBLP]


  86. Optimization on distributed user management in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  87. An Embedded Systems graduate education for Singapore. [Citation Graph (, )][DBLP]


  88. A faster closure algorithm for pattern matching in partial-order event data. [Citation Graph (, )][DBLP]


  89. Communication performance of a modular high-bandwidth multiprocessor system. [Citation Graph (, )][DBLP]


  90. Fault-free Hamiltonian cycles in locally twisted cubes under conditional edge faults. [Citation Graph (, )][DBLP]


  91. A dual-time vector clock based synchronization mechanism for key-value data in the SILENUS file system. [Citation Graph (, )][DBLP]


  92. A clustering model for memory resource sharing in large scale distributed system. [Citation Graph (, )][DBLP]


  93. Morphisms from IEEE 802.11 DCF specifications to its EDCA QoS practice with cross-layer interface. [Citation Graph (, )][DBLP]


  94. A semantic overlay network for unstructured peer-to-peer protocols. [Citation Graph (, )][DBLP]


  95. Extending GridSim with an architecture for failure detection. [Citation Graph (, )][DBLP]


  96. Effect of unstable routing in location-aware mobile ad hoc networks on a geographic DHT protocol. [Citation Graph (, )][DBLP]


  97. A forwarding model for Voronoi-based Overlay Network. [Citation Graph (, )][DBLP]


  98. Modeling and analysis of regional registration based mobile multicast service management. [Citation Graph (, )][DBLP]


  99. Teaching complete embedded systems design process with graphical system design methodologies. [Citation Graph (, )][DBLP]


  100. Cost evaluation on secure routing over powerlines for WMNs. [Citation Graph (, )][DBLP]


  101. P2P-based geometric computation method for extracting ROI from ubiquitous video cameras. [Citation Graph (, )][DBLP]


  102. Message from PMAC-2WN Program Co-Chairs. [Citation Graph (, )][DBLP]


  103. Message from APESER organization committee. [Citation Graph (, )][DBLP]


  104. A Voronoi dEtection Range Adjustment (VERA) approach for energy saving of wireless sensor networks. [Citation Graph (, )][DBLP]


  105. Lifetime analysis of the logical topology constructed by homogeneous topology control in wireless mobile networks. [Citation Graph (, )][DBLP]


  106. An integration platform for developing digital life applications. [Citation Graph (, )][DBLP]


  107. Conditional edge-fault-tolerant Hamiltonian cycle embedding of star graphs. [Citation Graph (, )][DBLP]


  108. Finding candidate spots for replica servers based on demand fluctuation. [Citation Graph (, )][DBLP]


  109. Federated clusters using the transparent remote Execution (TREx) environment. [Citation Graph (, )][DBLP]


  110. A Peer-To-Peer platform for simulating distributed virtual environments. [Citation Graph (, )][DBLP]


  111. Embedding cycles and paths in a k-ary n-cube. [Citation Graph (, )][DBLP]


  112. A Legal Information flow (LIF) scheduler for distributed systems. [Citation Graph (, )][DBLP]


  113. Peer-to-Peer AOI voice chatting for massively multiplayer online games. [Citation Graph (, )][DBLP]


  114. An MCU description methodology for initialization code generation software. [Citation Graph (, )][DBLP]


  115. Scheduling multiple divisible loads on a linear processor network. [Citation Graph (, )][DBLP]


  116. ECHoP2P: Emergency call handling over peer-to-peer overlays. [Citation Graph (, )][DBLP]


  117. Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approaches. [Citation Graph (, )][DBLP]


  118. SWEVM: a software EVM for embedded system programming. [Citation Graph (, )][DBLP]


  119. Enhanced resource management capabilities using standardized job management and data access interfaces within UNICORE Grids. [Citation Graph (, )][DBLP]


  120. A comparative study on Peer-to-Peer failure rate estimation. [Citation Graph (, )][DBLP]


  121. LORM: Supporting low-overhead P2P-based range-query and multi-attribute resource management in grids. [Citation Graph (, )][DBLP]


  122. A QoS-aware service selection algorithm for multimedia service overlay networks. [Citation Graph (, )][DBLP]


  123. Grid scheduling simulations with GSSIM. [Citation Graph (, )][DBLP]


  124. Message from SRMPDS Program Chair. [Citation Graph (, )][DBLP]


  125. The design of effective low cost embedded processor development kits for supporting take-home self-practice pedagogies. [Citation Graph (, )][DBLP]


  126. A fast joining operation for highly dynamic chord system. [Citation Graph (, )][DBLP]


  127. Linux as a teaching aid for embedded systems. [Citation Graph (, )][DBLP]


  128. Accelerating 3-D capacitance extraction in deep sub-micron VLSI design using vector/parallel computing. [Citation Graph (, )][DBLP]


  129. S/Kademlia: A practicable approach towards secure key-based routing. [Citation Graph (, )][DBLP]


  130. Minimum-delay energy-efficient source to multisink routing in wireless sensor networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002