skip to main content
Volume 71, Issue 8August, 2011
Publisher:
  • Academic Press, Inc.
  • 6277 Sea Harbor Drive Orlando, FL
  • United States
ISSN:0743-7315
Reflects downloads up to 21 Jan 2025Bibliometrics
Skip Table Of Content Section
article
Some observations on optimal frequency selection in DVFS-based energy consumption minimization

In recent years, the issue of energy consumption in parallel and distributed computing systems has attracted a great deal of attention. In response to this, many energy-aware scheduling algorithms have been developed primarily using the dynamic voltage-...

article
Research note: On the uniformity of peer sampling based on view shuffling

Consider a group of peers, an ideal random peer sampling service should return a peer, which is a uniform independent random sample of the group. This paper focuses on the implementation and analysis of a peer sampling service based on symmetric view ...

article
Toward a practical approach for BGP stability with root cause check

The instability issues of the Border Gateway Protocol (BGP), such as route oscillations and path explorations, can decrease the performance of packet forwarding and place heavy workload on routers. While BGP instability has been extensively studied, ...

article
FPGA implementation and performance evaluation of a high throughput crypto coprocessor

This paper describes the FPGA implementation of FastCrypto, which extends a general-purpose processor with a crypto coprocessor for encrypting/decrypting data. Moreover, it studies the trade-offs between FastCrypto performance and design parameters, ...

article
HD Tree: A novel data structure to support multi-dimensional range query for P2P networks

There are two basic concerns for supporting multi-dimensional range query in P2P overlay networks. The first is to preserve data locality in the process of data space partitioning, and the second is the maintenance of data locality among data ranges ...

article
Strategic behavior modeling of multi-service overlay multicast networks based on auction mechanism design

Since the users of overlay multicast networks belong to different administrative domains, they are selfish in nature; resulting in degradation of performance. That is why strategic behavior modeling is a hot topic in the area of the overlay multicast ...

article
Secure message transmission in asynchronous networks

In the Perfectly Secure Message Transmission (PSMT) problem, a sender S and a receiver R are part of a distributed network and connected through n node disjoint paths, also called as wires, among which at most t wires are controlled by a static, ...

article
Fuzzy online location management in mobile computing environments

This paper presents a new approach, namely Intelligent Fuzzy Online Location Management Strategy (IFOLMS), based on Fuzzy clustering techniques to solve the mobile location management problem. Using a Fuzzy location estimator in this technique, mobile ...

article
Capability information: A cost-effective information model for multi-hop routing of wireless ad hoc networks in the real environment

In greedy routing, each relay node forwards the message to a neighbor (also called the successor) that is closer to the destination. However, the successor candidate set (SCS) is different every time the relative location of the relay node to the ...

Comments