default search action
AICCSA 2011: Sharm El-Sheikh, Egypt
- Howard Jay Siegel, Amr El-Kadi:
The 9th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2011, Sharm El-Sheikh, Egypt, December 27-30, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0475-8
Keynotes
- Albert Y. Zomaya:
Keynote talk: Environmentally sustainable large scale distributed systems. 1 - Jean-Luc Gaudiot:
Keynote talk: Fighting Amdahl's law in many-core and GPU parallel architectures with value prediction. 1 - Frederica Darema:
Keynote talk: New frontiers through information technologies. 1
Clouds and Green Computing
- Amir I. Alfoly, Mohamed B. Abdelhalim, Samah A. Senbel:
Economic grid fault tolerance scheduling using modified Genetic Algorithm. 1-8 - Sunirmal Khatua, Anirban Ghosh, Nandini Mukherjee:
Application-centric Cloud management. 9-15 - Javier Aldo Balladini, Remo Suppi, Dolores Rexachs, Emilio Luque:
Impact of parallel programming models and CPUs clock frequency on energy consumption of HPC systems. 16-21 - Jonathan Apodaca, Bobby Dalton Young, Luis Diego Briceno, Jay Smith, Sudeep Pasricha, Anthony A. Maciejewski, Howard Jay Siegel, Shirish Bahirat, Bhavesh Khemka, Adrian Ramirez, Yong Zou:
Stochastically robust static resource allocation for energy minimization with a makespan constraint in a heterogeneous computing environment. 22-31
Wireless Systems and Sensor Networks
- Mayez A. Al-Mouhamed, Irfan Ali Khan, Syed Naeem Firdous:
A reliable peer-to-peer protocol for mobile Ad-Hoc wireless networks. 32-37 - Ahmed R. Mahmood, Hussein H. Aly, Mohamed N. El-Derini:
Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks. 38-45 - Jacques M. Bahi, Mourad Hakem, Abdallah Makhoul:
Reliable distributed data fusion scheme in unsafe sensor networks. 46-53 - Mariam Ahmed Moustafa, Moustafa A. Youssef, Mohamed N. El-Derini:
MSR: A multipath secure reliable routing protocol for WSNs. 54-59
Bioinformatics and Biomedical Computing
- Javid Taheri, Albert Y. Zomaya, Flávia Coimbra Delicato, Paulo F. Pires:
Fuzz-SSVS: A Fuzzy logic based voting scheme to improve protein secondary structure prediction. 60-66 - Tai-Chun Wang, Javid Taheri, Albert Y. Zomaya:
Averaging measurement strategies for identifying single nucleotide polymorphisms from redundant data sets. 67-74 - Kyle R. Taylor, Adam P. DeLuca, Corey W. Goodman, Bruce W. Tompkins, Todd E. Scheetz, Michael S. Hildebrand, Patrick L. M. Huygen, Richard J. H. Smith, Terry A. Braun, Thomas L. Casavant:
AudioGene: Computer-based prediction of genetic factors involved in non-syndromic hearing impairment. 75-79 - Adam P. DeLuca, Alex H. Wagner, Kyle R. Taylor, Ben Faga, David Thole, Val C. Sheffield, Edwin M. Stone, Thomas L. Casavant, Todd E. Scheetz, Terry A. Braun:
Sequencing and disease variation detection tools and techniques. 80-83
Information Retrieval, Database, and Data Mining
- Pamela Viale, Claudia S. Frydman, Jacques Pinaton:
New methodology for modeling large scale manufacturing process: Using process mining methods and experts' knowledge. 84-89 - Dong-Chul Park, Taekyung Jeong, Yunsik Lee, Soo-Young Min:
Satellite image classification using a classifier integration model. 90-94 - Håkan Grahn, Niklas Lavesson, Mikael Hellborg Lapajne, Daniel Slat:
CudaRF: A CUDA-based implementation of Random Forests. 95-101 - Lamya A. Othman, Hoda Mohammed Hosny, Sherif G. Aly:
A comparative analysis of database connection pooling implementations with emphasis on the added value of aspect orientation. 102-111
Parallel Processing and Neural Networks
- Diego Rodríguez Martínez, Vicente Blanco Pérez, José Carlos Cabaleiro, Tomás Fernandez Pena, Francisco F. Rivera:
Estimating the effect of cache misses on the performance of parallel applications using analytical models. 112-119 - Abeer Farouk, Hatem M. El-Boghdadi:
On the influence of selection function on the performance of fat-trees under hot-spot traffic. 120-127 - Mohammad Zebardast, Farshad Safaei:
Stochastic modeling of Scouting Switching for adaptively-routed mesh networks. 128-134 - Dong-Chul Park:
Sunspot series prediction using adaptively trained Multiscale-Bilinear Recurrent Neural Network. 135-139
Computer Security
- Ferenc Szidarovszky, Yi Luo:
On optimal strategies in protecting computer networks. 140-143 - El-Sayed M. El-Alfy, Azzat A. Al-Sadi:
A comparative study of PVD-based schemes for data hiding in digital images. 144-149 - Ram Prasad Viswanathan, Youssif B. Al-Nashif, Salim Hariri:
Application attack detection system (AADS): An anomaly based behavior analysis approach. 150-156 - Vamsi Kambhampati, Christos Papadopoulos, Daniel Massey:
A taxonomy of capabilities based DDoS defense architectures. 157-164
Systems Frameworks and Modeling
- Mohamed Hussein, Hassan Gomaa:
An architecture-based dynamic adaptation model and framework for adaptive software systems. 165-172 - H. M. N. Dilum Bandara, Anura P. Jayasumana:
Characteristics of multi-attribute resources/queries and implications on P2P resource discovery. 173-180 - Abdullah Aldahlawi, Esam El-Araby, Suboh A. Suboh, Tarek A. El-Ghazawi:
Modelling the performance of an SSD-Aware storage system using least squares regression. 181-187 - Wael R. Elwasif, David E. Bernholdt, Samantha S. Foley, Aniruddha G. Shet, Randall Bramley:
Multi-level concurrency in a framework for integrated loosely coupled plasma simulations. 188-195
Applications
- Sakhinah Abu Bakar, Javid Taheri, Albert Y. Zomaya:
FIS-PNN: A hybrid computational method for protein-protein interaction prediction. 196-203 - Walid E. Gomaa:
Modeling gene regulatory networks: A survey. 204-208 - Guochun Shi, Volodymyr V. Kindratenko, Rob Kooper, Peter Bajcsy:
GPU acceleration of an image characterization algorithm for document similarity analysis. 209-216 - Emmanuel Agullo, Cédric Augonnet, Jack J. Dongarra, Mathieu Faverge, Julien Langou, Hatem Ltaief, Stanimire Tomov:
LU factorization for accelerator-based systems. 217-224
Networks and Web-Based Systems
- Heba Nashaat, Rawya Rizk, Hani Mahdi:
Performance analysis of streamed video over mobile IP based networks. 225-232 - Reginaldo Mendes, Paulo F. Pires, Flávia Coimbra Delicato, Thaís Vasconcelos Batista, Javid Taheri, Albert Y. Zomaya:
Using semantic Web to build and execute ad-hoc processes. 233-240 - Jan Kasper Martinsen, Håkan Grahn:
A methodology for evaluating JavaScript execution behavior in interactive web applications. 241-248 - Mohamed R. Atassi, Sherif G. Aly, Amr El-Kadi:
Cooperative web caching of dynamic web content. 249-254
Computer Architecture and Accelerator-Based Computing
- Amr A. R. Sayed-Ahmed, Hossam A. H. Fahmy, Rodina Samy:
Verification of decimal floating-point fused-multiply-add operation. 255-262 - Mohamed Bakhouya, Abderrahim Chariete, Jaafar Gaber, Maxime Wack:
A buffer-space allocation approach for application-specific Network-on-Chip. 263-267 - Karim Yehia, Mona Safar, Hassan A. Youness, Mohamed Abdelsalam, Ashraf Salem:
A novel approach for system level synthesis of multi-core system architectures from TPG models. 268-275 - Supada Laosooksathit, Nichamon Naksinehaboon, Chokchai Leangsuksun:
Two-level checkpoint/restart modeling for GPGPU. 276-283
Posters
- Walaa Fathy Ahmed, Walid E. Gomaa:
Approaches to prediction of protein structure. 284 - Mohsen Taherian, Amirali Baniasadi, Hamid Noori:
Instruction and data cache peak temperature reduction using cache access balancing in embedded processors. 285-286 - Xiangtao Liu, Kai Cai, Yang Li:
Measuring "Sybil attacks" in Kademlia-based networks. 287-288 - Mofassir Haque, Krzysztof Pawlikowski, Sayan Kumar Ray:
Challenges to development of multipurpose global federated testbed for Future Internet experimentation. 289-292 - Moawia Elfaki Yahia:
Arabic text categorization based on rough set classification. 293-294 - Paulo M. Goncalves, Roberto Souto Maior de Barros:
Comparing approaches to prepare data in classification problems. 295-296 - Mustafa B. Hamad, Sami M. Sharif:
A comparson of receiver initiated DLB schemes via Parallel DFS. 297-298 - J. Martinez Canillas, Alvaro Wong, Dolores Rexachs, Emilio Luque:
Predicting parallel applications performance using signatures: The workload effect. 299-300 - Lubomir Riha, Hoda El-Sayed:
Real-time motion object tracking using GPU. 301-304
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.