Power Efficient Large Matrices Multiplication by Load Scheduling on Multi-core and GPU Platform with CUDA (Englisch)
- Neue Suche nach: Ren, DaQi
- Neue Suche nach: Suda, Reiji
- Neue Suche nach: Ren, DaQi
- Neue Suche nach: Suda, Reiji
In:
2009 International Conference on Computational Science and Engineering
;
1
;
424-429
;
2009
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Power Efficient Large Matrices Multiplication by Load Scheduling on Multi-core and GPU Platform with CUDA
-
Beteiligte:Ren, DaQi ( Autor:in ) / Suda, Reiji ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.08.2009
-
Format / Umfang:414115 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Noise Injection for Search Privacy ProtectionYe, Shaozhi / Wu, Felix / Pandey, Raju / Chen, Hao et al. | 2009
- 1
-
Performance Modelling and Analysis of Integrated WLANs and Internet-Access Mesh NetworksMin, Geyong / Wu, Yulei / Yang, Laurence T. et al. | 2009
- 1
-
Edge Anonymity in Social Network GraphsZhang, Lijie / Zhang, Weining et al. | 2009
- 1
-
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE TerminalsHessel, Sebastian / Szczesny, David / Traboulsi, Shadi / Bilgic, Attila / Hausner, Josef et al. | 2009
- 9
-
A Trade-Off Approach to Optimal Resource Allocation Algorithm with Cache Technology in Ubiquitous Computing EnvironmentDong, Mianxiong / Zheng, Long / Ota, Kaoru / Guo, Song / Guo, Minyi / Li, Li et al. | 2009
- 9
-
Privacy-Preserving Bayesian Network for Horizontally Partitioned DataSamet, Saeed / Miri, Ali et al. | 2009
- 9
-
A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded SystemsHuang, Sheng-Wei / Chiu, Yung-Chang / Chen, Zhong-Ho / Shieh, Ce-Kuen / Su, Alvin Wen-Yu / Liang, Tyng-Yeu et al. | 2009
- 9
-
Guanxi in the Chinese WebKing, Valerie / Yu, Louis / Zhuang, Yan et al. | 2009
- 16
-
Self-Tuning the Parameter of Adaptive Non-linear Sampling Method for Flow StatisticsHu, Chengchen / Liu, Bin et al. | 2009
- 17
-
Privacy-Preserving Multi-agent Constraint SatisfactionLeaute, Thomas / Faltings, Boi et al. | 2009
- 17
-
Better Than Optimal: Fast Identification of Custom Instruction CandidatesReddington, J. / Gutin, G. / Johnstone, A. / Scott, E. / Yeo, A. et al. | 2009
- 18
-
Anomaly Detection in Dynamic Social Systems Using Weak EstimatorsZhan, Justin / Oommen, B. John / Crisostomo, Johanna et al. | 2009
- 22
-
A Cognitive Approach to Achieve Fair Uplink and Downlink Utilities in Wireless NetworksWang, Chiapin / Liang, Kueihsiang et al. | 2009
- 25
-
Fast Inter Mode Decision Algorithm Based on the MB Activity for MPEG-2 to H.264/AVC TranscodingLiu, Xingang / Zhu, Wei / Yoo, Kook-Yeol et al. | 2009
- 26
-
Structure of Neighborhoods in a Large Social NetworkStoica, Alina / Prieur, Christophe et al. | 2009
- 26
-
FaceCloak: An Architecture for User Privacy on Social Networking SitesLuo, Wanying / Xie, Qi / Hengartner, Urs et al. | 2009
- 29
-
A Weighted-Dissimilarity-Based Anomaly Detection Method for Mobile Wireless NetworksBae, Ihn-Han / Olariu, Stephan et al. | 2009
- 31
-
Dynamic Reconfigurable Shaders with Load Balancing for Embedded Graphics ProcessingChen, Yi-Chi / Yang, Hui-Chin / Chung, Chung-Ping / Wang, Wei-Ting et al. | 2009
- 34
-
Adapting Privacy-Preserving Computation to the Service Provider ModelKerschbaum, Florian et al. | 2009
- 34
-
Deriving Expertise Profiles from TagsBudura, Adriana / Bourges-Waldegg, Daniela / Riordan, James et al. | 2009
- 35
-
A Novel Resource Management Scheme for Integrated Multiple Traffic Heterogeneous SystemsZhu, Cheng / Zeng, Qing-An / Agrawal, Dharma et al. | 2009
- 37
-
Real Time Multiple Object Tracking Using Tracking MatrixHao, Fei / Miao, Zhenjiang / Guo, Ping / Xu, Zhan et al. | 2009
- 40
-
A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0Mohammed, Sabah / Chamarette, Lyle F. / Fiaidhi, Jinan / Osborn, Sylvia et al. | 2009
- 42
-
Anonymity, Privacy, Onymity, and Identity: A Modal Logic ApproachTsukada, Yasuyuki / Mano, Ken / Sakurada, Hideki / Kawabe, Yoshinobu et al. | 2009
- 42
-
Visible and IR Data Fusion Technique Using the Contourlet TransformIbrahim, Soad / Wirth, Michael et al. | 2009
- 42
-
Probabilistic Generative Models of the Social Annotation ProcessKashoob, Said / Caverlee, James / Khabiri, Elham et al. | 2009
- 48
-
Rotation Scheduling and Voltage Assignment to Minimize Energy for SoCQiu, Meikang / Yang, Laurence T. / Sha, Edwin H.-M. et al. | 2009
- 48
-
Scalable APRIORI-Based Frequent Pattern DiscoveryChester, Sean / Sandler, Ian / Thomo, Alex et al. | 2009
- 50
-
Detecting Communities from Bipartite Networks Based on Bipartite ModularitiesMurata, Tsuyoshi et al. | 2009
- 52
-
Privacy-Enhanced Event SchedulingKellermann, Benjamin / Bohme, Rainer et al. | 2009
- 56
-
Event-Driven Approach for Logic-Based Complex Event ProcessingAnicic, Darko / Fodor, Paul / Stuhmer, Roland / Stojanovic, Nenad et al. | 2009
- 56
-
Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-MultiprocessorsHuang, Mu-Kai / Chang, J. Morris / Chen, Wei-Mei et al. | 2009
- 58
-
Visually and Acoustically Exploring the High-Dimensional Space of MusicBossard, Lukas / Kuhn, Michael / Wattenhofer, Roger et al. | 2009
- 60
-
Privacy Management, the Law & Business Strategies: A Case for Privacy Driven DesignWilliams, Mary-Anne et al. | 2009
- 64
-
Incremental Discovery of Sequential Patterns Using a Backward Mining ApproachLin, Ming-Yen / Hsueh, Sue-Chen / Chan, Chih-Chen et al. | 2009
- 64
-
K-Stage Pipelined Bloom Filter for Packet ClassificationAhmadi, Mahmood / Wong, Stephan et al. | 2009
- 66
-
A Semantic Imitation Model of Social Tag ChoicesFu, Wai-Tat / Kannampallil, Thomas George / Kang, Ruogu et al. | 2009
- 68
-
t-Plausibility: Semantic Preserving Text SanitizationJiang, Wei / Murugesan, Mummoorthy / Clifton, Chris / Si, Luo et al. | 2009
- 71
-
Data Distribution Methods for Communication Localization in Multi-clusters with Heterogeneous NetworkChen, Shih-Chang / Hsu, Ching-Hsien / Chiu, Chun-Te et al. | 2009
- 71
-
A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor NetworksMarchiori, Alan / Han, Qi et al. | 2009
- 74
-
A Visual Interface for Social Information FilteringO'Donovan, John / Gretarsson, Brynjar / Bostandjiev, Svetlin / Hollerer, Tobias / Smyth, Barry et al. | 2009
- 76
-
Policy-Based Malicious Peer Detection in Ad Hoc NetworksLi, Wenjia / Joshi, Anupam / Finin, Tim et al. | 2009
- 79
-
An Analytical Model of Communication Networks in Multi-cluster Systems in the Presence of Non-uniform TrafficSharifi, Hojjat / Akbari, Mohammad K. / Javadi, Bahman et al. | 2009
- 79
-
Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor NetworksCheng, Long / Chen, Canfeng / Ma, Jian / Shu, Lei / Chen, Hongyang / Yang, Laurence T. et al. | 2009
- 82
-
Equilibria and Efficiency Loss in Games on NetworksDavis, Joshua R. / Goldman, Zachary / Hilty, Jacob / Koch, Elizabeth N. / Liben-Nowell, David / Sharp, Alexa / Wexler, Tom / Zhou, Emma et al. | 2009
- 83
-
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response SystemsKanoun, Wael / Cuppens-Boulahia, Nora / Cuppens, Frédéric / Dubus, Samuel / Martin, Antony et al. | 2009
- 87
-
The More Relay Nodes, the More Energy Efficient?Zhu, Ying / Han, Qi et al. | 2009
- 87
-
Balanced and Efficient Data Placement and Replication Strategy for Distributed Backup Storage SystemsRenuga, K. / Tan, S.S. / Zhu, Y.Q. / Low, T.C. / Wang, Y.H. et al. | 2009
- 90
-
Ranking Comments on the Social WebHsu, Chiao-Fang / Khabiri, Elham / Caverlee, James et al. | 2009
- 92
-
Tuning Evidence-Based Trust ModelsStaab, Eugen / Engel, Thomas et al. | 2009
- 93
-
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor NetworksKrishnamurthy, Sudha / Thamilarasu, Geethapriya / Bauckhage, Christian et al. | 2009
- 95
-
Improvement on Scheduling Dependent Tasks for Grid ApplicationsMachtans, Elaine C. / Sato, Liria M. / Deppman, Airton et al. | 2009
- 98
-
Structure of Heterogeneous NetworksGhosh, Rumi / Lerman, Kristina et al. | 2009
- 100
-
Trust Is in the Eye of the BeholderDeFigueiredo, Dimitri / Barr, Earl / Wu, S. Felix et al. | 2009
- 101
-
Design of an RFID Air Protocol Filtering TechniquePark, Hyun-Sung / Kim, Jong-Deok et al. | 2009
- 103
-
Fault-Tolerance Scheduling by Using Rough Set Based Multi-checkpointing on Economic GridsBouyer, Asgarali / Abdullah, Abdul Hanan / Ebrahimpour, Hasan / Nasrollahi, Firouz et al. | 2009
- 106
-
Online User Activities Discovery Based on Time Dependent DataHong, Dan / Shen, Vincent Y. et al. | 2009
- 109
-
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor NetworksBrzozowski, Marcin / Salomon, Hendrik / Langendoerfer, Peter et al. | 2009
- 109
-
A Trust-Based Multiagent SystemSeymour, Richard / Peterson, Gilbert L. et al. | 2009
- 110
-
A Volunteer-Computing-Based Grid Environment for Connect6 ApplicationsWu, I-Chen / Chen, Chingping / Lin, Ping-Hung / Huang, Guo-Chan / Chen, Lung-Ping / Sun, Der-Johng / Chan, Yi-Chih / Tsou, Hsin-Yun et al. | 2009
- 114
-
Socio-semantic Dynamics in a Blog NetworkCointet, Jean-Philippe / Roth, Camille et al. | 2009
- 117
-
Towards Automating Social Engineering Using Social Networking SitesHuber, Markus / Kowalski, Stewart / Nohlberg, Marcus / Tjoa, Simon et al. | 2009
- 117
-
Implementation of Rate Control in Distributed Wireless Multicast by Neural Network PredictionXiong, Naixue / Yang, Laurence T. / Zeng, Yuanyuan / Chao, Ma / Park, Jong Hyuk et al. | 2009
- 118
-
Integration of Mobile Agents Technology and Globus for Assisted Design and Automated Development of Grid ServicesAversa, Rocco / Di Martino, Beniamino / Venticinque, Salvatore et al. | 2009
- 122
-
The Formation of Task-Oriented Groups: Exploring Combat Activities in Online GamesHuang, Yun / Zhu, Mengxiao / Wang, Jing / Pathak, Nishith / Shen, Cuihua / Keegan, Brian / Williams, Dmitri / Contractor, Noshir et al. | 2009
- 125
-
Social Inference Risk Modeling in Mobile and Social ApplicationsMotahari, Sara / Ziavras, Sotirios / Naaman, Mor / Ismail, Mohamed / Jones, Quentin et al. | 2009
- 125
-
Adaptive and Intelligent Route Learning for Mobile Assets Using Geo-tracking and Context ProfilesBalakrishnan, Dineshbalu / Nayak, Amiya / Dhar, Pulak et al. | 2009
- 126
-
Improvement of Directed Diffusion Protocol Based on Data AggregationHui, Chen / Yufeng, Shi / Ye, Wang / Yang, Laurence T. / Naixue, Xiong et al. | 2009
- 128
-
Incremental SVM Model for Spam Detection on Dynamic Email Social NetworksTseng, Chi-Yao / Chen, Ming-Syan et al. | 2009
- 132
-
An Energy Efficient Routing Protocol in Wireless Sensor NetworksKim, Kyung Tae / Lee, Byung Jun / Choi, Jae Hyun / Jung, Bo Yle / Youn, Hee Yong et al. | 2009
- 133
-
Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth ScansEvans, David / Warren, Robert H. et al. | 2009
- 133
-
Control-Channel-Reuse-Based Multiple-Channel MAC (CRM-MAC) for Ad Hoc NetworksSardana, Divya / Zeng, Qing-An et al. | 2009
- 136
-
Evaluating the Impact of Attacks in Collaborative Tagging EnvironmentsRamezani, Maryam / Sandvig, J.J. / Schimoler, Tom / Gemmell, Jonathan / Mobasher, Bamshad / Burke, Robin et al. | 2009
- 139
-
Privacy Requirements in Vehicular Communication SystemsSchaub, Florian / Ma, Zhendong / Kargl, Frank et al. | 2009
- 140
-
Location-Based Adaptive Mobile Learning Research Framework and TopicsTan, Qing / Kinshuk, / Kuo, Yen-Hung / Jeng, Yu-Lin / Wu, Po-Han / Huang, Yueh-Min / Liu, Tzu-Chien / Chang, Maiga et al. | 2009
- 140
-
Analysing BitTorrent's Seeding StrategiesChen, Xinuo / Jarvis, Stephen A. et al. | 2009
- 144
-
Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone DataEagle, Nathan / de Montjoye, Yves-Alexandre / Bettencourt, Luís M.A. et al. | 2009
- 146
-
A Framework to Balance Privacy and Data Usability Using Data Degradationvan Heerde, Harold / Fokkinga, Maarten / Anciaux, Nicolas et al. | 2009
- 148
-
Stable Bayesian Parameter Estimation for Biological Dynamical SystemsBusetto, Alberto Giovanni / Buhmann, Joachim M. et al. | 2009
- 150
-
A Middleware for Controlling the Execution of Composite ServicesYe, Xinfeng / Chen, Yi et al. | 2009
- 151
-
Social Synchrony: Predicting Mimicry of User Actions in Online Social MediaDe Choudhury, Munmun / Sundaram, Hari / John, Ajita / Seligmann, Dorée Duncan et al. | 2009
- 154
-
A Lattice-Based Privacy Aware Access Control ModelGhazinour, Kambiz / Majedi, Maryam / Barker, Ken et al. | 2009
- 158
-
On Performance Enhancement of Circuit Simulation Using Multithreaded TechniquesPerng, Ruey-Kuen / Weng, Tien-Hsiung / Li, Kuan-Ching et al. | 2009
- 158
-
2T-DHT: A Two Tier DHT for Implementing Publish/SubscribePandey, Mayank / Ahmed, Syed Mushtaq / Chaudhary, Banshi Dhar et al. | 2009
- 159
-
Representing Small Group EvolutionRichards, Whitman / Wormald, Nicholas et al. | 2009
- 160
-
Modelling of Pseudonymity under Probabilistic Linkability AttacksNeubauer, Martin et al. | 2009
- 166
-
mBrace: Action-Based Performance Monitoring of Multi-tier Web Applicationsvan der Zee, Andrej / Courbot, Alexandre / Nakajima, Tatsuo et al. | 2009
- 166
-
Private Buddy Search: Enabling Private Spatial Queries in Social NetworksKhoshgozaran, Ali / Shahabi, Cyrus et al. | 2009
- 166
-
A Software Architecture-Based Framework Supporting Suggestion of Medical Surveillance Level from Classification of Electronic Patient RecordsPollettini, Juliana T. / Nicolas, Flávia P. / Panico, Sylvia G. / Daneluzzi, Julio C. / Tinos, Renato / Baranauskas, José A. / Macedo, Alessandra A. et al. | 2009
- 168
-
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor NetworksTaban, Gelareh / Gligor, Virgil D. et al. | 2009
- 174
-
Multi-level Cellular Automata & Social DynamicsKoenderink, Jan J. / Richards, Whitman et al. | 2009
- 174
-
Robust Translational Motion of Single-Row SPCE by the Parallel BinocularLin, Gwo-Long et al. | 2009
- 174
-
Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA ProcessorWang, Jyh-Shian / Wu, I-Wei / Chen, Yu-Sheng / Shann, Jean Jyh-Jiun / Hsu, Wei-Chung et al. | 2009
- 176
-
User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting SystemsGarcia-Barrios, Victor Manuel et al. | 2009
- 180
-
Mining Frequent Patterns with Gaps and One-Off ConditionHuang, Yongming / Wu, Xindong / Hu, Xuegang / Xie, Fei / Gao, Jun / Wu, Gongqing et al. | 2009
- 181
-
Extended Social Tags: Identity Tags Meet Social NetworksLajmi, Sonia / Stan, Johann / Hacid, Hakim / Egyed-Zsigmond, Elöd / Maret, Pierre et al. | 2009
- 182
-
Optimization of Component Connections for an Embedded Component SystemAzumi, Takuya / Takada, Hiroaki / Oyama, Hiroshi et al. | 2009
- 182
-
An Empirical Study on Privacy and Secure Multi-party Computation Using ExponentiationWang, I-Cheng / Shen, Chih-Hao / Chen, Kung / Hsu, Tsan-sheng / Liau, Churn-Jung / Wang, Da-Wei et al. | 2009
- 187
-
An Evolutionary Approach for Multi-objective 3D Differentiated Sensor Network DeploymentKang, Chih-Wei / Chen, Jian-Hung et al. | 2009
- 188
-
Size Matters: Variation in Personal Network Size, Personality and Effect on Information TransmissionLu, Yu-En / Roberts, Sam / Lio, Pietro / Dunbar, Robin / Crowcroft, Jon et al. | 2009
- 189
-
Improving Hybrid Flash-Disk Storage by Incorporating Sequential Pattern Mining into Fully-Associative Sector TranslationYoon, Un-Keun / Kim, Han-joon et al. | 2009
- 189
-
A Hybrid Enforcement Model for Group-centric Secure Information SharingKrishnan, Ram / Sandhu, Ravi et al. | 2009
- 194
-
TagRec: Leveraging Tagging Wisdom for RecommendationZhou, Tom Chao / Ma, Hao / King, Irwin / Lyu, Michael R. et al. | 2009
- 194
-
Solving 0/1 Knapsack Problem for Light Communication SLA-Based Workflow Mapping Using CUDAQuan, Dang Minh / Yang, Laurence T. et al. | 2009
- 195
-
A Framework for Enforcing Constrained RBAC PoliciesCrampton, Jason / Khambhammettu, Hemanth et al. | 2009
- 197
-
Distributed Agents Network for Ubiquitous Monitoring and Services ExploitationAversa, Rocco / Di artino, Beniamino / Venticinque, Salvatore et al. | 2009
- 200
-
Development and Validation of an Agent-Based Simulation Model of Juvenile DelinquencyBosse, Tibor / Gerritsen, Charlotte / Klein, Michel C.A. / Weerman, Frank M. et al. | 2009
- 201
-
Guarantee-Based Access ControlHussain, Mohammed / Skillicorn, D.B. et al. | 2009
- 201
-
A Coarse-Grain Parallel Genetic Algorithm for Flexible Job-Shop Scheduling with Lot StreamingDefersha, Fantahun M. / Chen, Mingyuan et al. | 2009
- 205
-
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing EnvironmentsZhang, Daqiang / Cao, Jiannong / Zhou, Jingyu / Guo, Minyi et al. | 2009
- 207
-
Integrity Verification of Outsourced XML DatabasesLiu, Ruilin / Wang, Hui et al. | 2009
- 208
-
Using Hierarchical Bayesian Models to Learn about ReputationHendrix, Philip / Gal, Ya'akov / Pfeffer, Avi et al. | 2009
- 209
-
Parallel Computation of Nash Equilibria in N-Player GamesWidger, Jonathan / Grosu, Daniel et al. | 2009
- 213
-
Goal-Oriented Software Security Engineering: The Electronic Smart Card Case StudyHassan, Riham / Eltoweissy, Mohamed / Bohner, Shawn / El-Kassas, Sherif et al. | 2009
- 213
-
GUPSS: A Gateway-Based Ubiquitous Platform for Smart SpaceKawashima, Tomomi / Ma, Jianhua / Huang, Runhe / Apduhan, Bernady O. et al. | 2009
- 215
-
Web Science 2.0: Identifying Trends through Semantic Social Network AnalysisGloor, Peter A. / Krauss, Jonas / Nann, Stefan / Fischbach, Kai / Schoder, Detlef et al. | 2009
- 216
-
An Efficient Dynamic Load Balancing Scheme for Multi-agent System Reflecting Agent WorkloadKim, Yong Hee / Han, Seungwok / Lyu, Chang Hun / Youn, Hee Yong et al. | 2009
- 219
-
A Unified Approach to Intra-domain SecurityShue, Craig A. / Kalafut, Andrew J. / Gupta, Minaxi et al. | 2009
- 221
-
Leveraging Computation Sharing and Parallel Processing in Location-Based ServicesCazalas, Jonathan / Hua, Kien et al. | 2009
- 223
-
Social Awareness Concepts to Support Social ComputingRakotonirainy, Andry / Loke, Seng W. / Obst, Patricia et al. | 2009
- 224
-
Efficient Broadcast on Area of Interest in Voronoi OverlaysAlbano, Michele / Baraglia, Ranieri / Mordacchini, Matteo / Ricci, Laura et al. | 2009
- 225
-
A Low-Cost Green IT Design and Application of VHSP Based on Virtualization TechnologyChang, Chih-Hung et al. | 2009
- 229
-
A Recommendation Framework towards Personalized Services in Intelligent MuseumZhou, Shandan / Zhou, Xingshe / Yu, Zhiwen / Wang, Kaibo / Wang, Haipeng / Ni, Hongbo et al. | 2009
- 229
-
An Agent-Based Approach to Modeling and Analysis of Safety Culture in Air TrafficSharpanskykh, Alexei / Stroeve, Sybert et al. | 2009
- 231
-
Improving Host Profiling with Bidirectional FlowsMinarik, Pavel / Vykopal, Jan / Krmicek, Vojtech et al. | 2009
- 232
-
Hardware Supported Multicast in 2-D Mesh InfiniBand NetworksZhou, Jiazheng / Liu, Shen-En / Chung, Yeh-Ching et al. | 2009
- 237
-
Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data SetsTreinen, James J. / Thurimella, Ramakrishna et al. | 2009
- 237
-
Clustering Signature in Complex Social NetworksPeter, Ueli / Hruz, Tomas et al. | 2009
- 238
-
Nearby-Friend Discovery Protocol for Multiple UsersRaizada, Shashwat / Paul, Goutam / Pandey, Vineet et al. | 2009
- 240
-
Energy Consumption of Residential and Professional SwitchesHlavacs, Helmut / Da Costa, Georges / Pierson, Jean-Marc et al. | 2009
- 244
-
The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection MechanismJabbour, Ghassan "Gus" / Menasce, Daniel A. et al. | 2009
- 245
-
Inferring the Maximum Likelihood Hierarchy in Social NetworksMaiya, Arun S. / Berger-Wolf, Tanya Y. et al. | 2009
- 245
-
Self-Adaptation of Fault Tolerance Requirements Using ContractsRodrigues, André Luiz B. / Bezerra, Leila N. / Sztajnberg, Alexandre / Loques, Orlando et al. | 2009
- 247
-
A Comparative Study of Blocking Storage Methods for Sparse Matrices on Multicore ArchitecturesKarakasis, Vasileios / Goumas, Georgios / Koziris, Nectarios et al. | 2009
- 251
-
Is the Crowd's Wisdom Biased? A Quantitative Analysis of Three Online CommunitiesKostakos, Vassilis et al. | 2009
- 252
-
Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access ControlTrivellato, Daniel / Spiessens, Fred / Zannone, Nicola / Etalle, Sandro et al. | 2009
- 254
-
Architectural Support for Automated Software Attack Detection, Recovery, and PreventionSathre, Jesse / Baumgarten, Alex / Zambreno, Joseph et al. | 2009
- 256
-
Social Learning Applications in Resource Constrained NetworksSaidi, Ali / Tripunitara, Mahesh V. / Mohtashemi, Mojdeh et al. | 2009
- 257
-
MCD: Mesh Closure Detection for Localized Load Balancing in Scientific ApplicationsMei, Chonglei / Li, Ruipeng / Jiang, Hai / Jenness, Jeff et al. | 2009
- 259
-
How to overcome the 'Trusted Node Model' in Quantum CryptographySchartner, Peter / Rass, Stefan et al. | 2009
- 262
-
Swift Mode Changes in Memory Constrained Real-Time SystemsHolenderski, Mike / Bril, Reinder J. / Lukkien, Johan J. et al. | 2009
- 263
-
Analysis of a Location-Based Social NetworkLi, Nan / Chen, Guanling et al. | 2009
- 263
-
The Influence of Personalities Upon the Dynamics of Trust and ReputationHoogendoorn, Mark / Jaffry, S. Waqar et al. | 2009
- 265
-
Robust Optimization on Across-Chain Inventory Control of Cluster Supply ChainsLi, Jizi / Xiong, Naixue / Liu, Chunling / Sun, Linfu / Cao, Ming / Wan, Shaohua et al. | 2009
- 270
-
WCET Analysis of the mC/OS-II Real-Time KernelLv, Mingsong / Guan, Nan / Zhang, Yi / Chen, Rui / Deng, Qingxu / Yu, Ge / Yi, Wang et al. | 2009
- 271
-
Modeling User Perception of Interaction Opportunities for Effective TeamworkKamar, Ece / Gal, Ya'akov / Grosz, Barbara J. et al. | 2009
- 271
-
VFT: An Ontology-Based Tool for Visualization and Formalization of Web Service CompositionMa, Chao / He, Yanxiang / Xiong, Naixue / Yang, Laurence T. et al. | 2009
- 271
-
Large Online Social Footprints--An Emerging ThreatIrani, Danesh / Webb, Steve / Li, Kang / Pu, Calton et al. | 2009
- 277
-
Parameter Identifiability and Optimal Experimental DesignAugust, Elias et al. | 2009
- 277
-
Real Time Rectification for Stereo CorrespondenceJawed, Khurram / Morris, John / Khan, Tariq / Gimel'farb, Georgy et al. | 2009
- 277
-
A Case Study of Individual Trust Development in Computer Mediated Collaboration TeamsCheng, Xusen / Macaulay, Linda / Zarifis, Alex et al. | 2009
- 278
-
Finding Cohesive Subgroups and Relevant Members in the Nokia Friend View Mobile Social NetworkChin, Alvin et al. | 2009
- 283
-
On the Feasibility of Remote Attestation for Web ServicesLyle, John / Martin, Andrew et al. | 2009
- 284
-
Capturing On-Line Social Network Link Dynamics Using Event-Driven SamplingCorlette, Dan / Shipman III, Frank et al. | 2009
- 285
-
High Performance Printing: Increasing Personalized Documents Rendering through PPML Jobs Profiling and SchedulingNunes, Thiago / Raeder, Mateus / Kolberg, Mariana / Fernandes, Luiz Gustavo / Cabeda, Alexis / Giannetti, Fabio et al. | 2009
- 285
-
Coordinated Runtime Adaptations in Cooperative Open Real-Time SystemsNogueira, Luís / Pinho, Luís Miguel / Coelho, Jorge et al. | 2009
- 289
-
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented ArchitecturesBarletta, Michele / Ranise, Silvio / Vigano, Luca et al. | 2009
- 292
-
A P2P Hierarchical Metascheduler to Obtain QoS in a Grid Economy ServicesPeixoto, Maycon L.M. / Santana, Marcos J. / Santana, Regina H.C. et al. | 2009
- 292
-
How Did You Get to Know That? A Traceable Word-of-Mouth AlgorithmCebrian, Manuel / Frias-Martinez, Enrique / Hohwald, Heath / Lara, Ruben / Oliver, Nuria et al. | 2009
- 295
-
Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations ModelAl-Omari, Huthaifa / Wolff, Francis / Papachristou, Christos / McIntyre, David et al. | 2009
- 297
-
ProActive Caching: Generating Caching Heuristics for Business Process EnvironmentsKohler, Mathias / Brucker, Achim D. / Schaad, Andreas et al. | 2009
- 298
-
A Second-Order Markov Random Walk Approach for Collaborative FilteringChen, Su / Luo, Tiejian / Zhu, Tingshao et al. | 2009
- 298
-
An Architecture for Integrating Databases with Replication Support Based on the OGSA-DAI MiddlewareBrito, Mathias / Kakugawa, Fernando / Sato, Liria / Correa, Pedro / Ogiboski, Luciano / Leis, Rogerio et al. | 2009
- 303
-
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch DeviceAmstutz, Roman / Amft, Oliver / French, Brian / Smailagic, Asim / Siewiorek, Dan / Troster, Gerhard et al. | 2009
- 304
-
Towards Demarcation and Modeling of Small Sub-Communities/Groups in P2P Social NetworksGroh, Georg / Rappel, Verena et al. | 2009
- 305
-
Combining Attribute-Based and Access SystemsMalek, Behzad / Miri, Ali et al. | 2009
- 306
-
Performance Comparison of Four-Socket Server Architecture on HPC WorkloadKasim, Henry / March, Verdi / See, Simon et al. | 2009
- 310
-
Design and Implementation of WLAN-Based Automatic Vehicle IdentificationPark, Hyun-Sung / Yang, Seung-Chur / Oh, Doo-Hwan / Kim, Jong-Deok et al. | 2009
- 312
-
XML with Recursive QueryingTaha, Kamal / Elmasri, Ramez et al. | 2009
- 312
-
Extracting Multi-facet Community Structure from Bipartite NetworksSuzuki, Kenta / Wakita, Ken et al. | 2009
- 313
-
Analysis of the GMPLS Control Plane SecurityClement, Ayonote / Zavarsky, Pavol / Lindskog, Dale et al. | 2009
- 318
-
An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based RetrievalLee, Hyun-Jo / Kim, Hyeong-Il / Chang, Jae-Woo et al. | 2009
- 318
-
A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous ObjectsHuang, Runhe / Ma, Jianhua / Jin, Qun et al. | 2009
- 319
-
Diversity in Network Attacker Motivation: A Literature ReviewRounds, Mark / Pendgraft, Norman et al. | 2009
- 320
-
The Use of Online Videos in the 2008 U.S. Congressional ElectionsMustafaraj, Eni / Metaxas, Panagiotis Takis / Grevet, Catherine et al. | 2009
- 324
-
Emergency Privacy MeasuresOberholzer, Hendrik J.G. / Olivier, Martin S. et al. | 2009
- 324
-
IMBT--A Binary Tree for Efficient Support Counting of Incremental Data MiningYang, Chia-Han / Yang, Don-Lin et al. | 2009
- 326
-
A Lightweight Architecture for Secure Two-Party Mobile PaymentZhu, Y. / Rice, J.E. et al. | 2009
- 326
-
The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing GamesHuffaker, David / Wang, Jing / Treem, Jeffrey / Ahmad, Muhammad A. / Fullerton, Lindsay / Williams, Dmitri / Poole, Marshall Scott / Contractor, Noshir et al. | 2009
- 330
-
Optimization of Distributed SPARQL Queries Using Edmonds' Algorithm and Prim's AlgorithmVandervalk, Ben P. / McCarthy, E. Luke / Wilkinson, Mark D. et al. | 2009
- 330
-
Designing Privacy for Scalable Electronic Healthcare LinkageStell, Anthony / Sinnott, Richard / Ajayi, Oluwafemi / Jiang, Jipu et al. | 2009
- 332
-
First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXLBonsignore, Elizabeth M. / Dunne, Cody / Rotman, Dana / Smith, Marc / Capone, Tony / Hansen, Derek L. / Shneiderman, Ben et al. | 2009
- 334
-
Comparison of Bank Change Mechanisms for Banked Reduced Encoding ArchitecturesLee, Je-Hyung / Moon, Soo-Mook / Choi, Hyung-Kyu et al. | 2009
- 337
-
Routing Policy Conflict Detection without Violating ISP's PrivacyHu, Ning / Zhu, Peidong / Cao, Huayang / Chen, Kan et al. | 2009
- 338
-
An Effective Data Gathering Scheme in Heterogeneous Energy Wireless Sensor NetworksMao, Yingchi / Liu, Zhen / Zhang, Lili / Li, Xiaofang et al. | 2009
- 340
-
Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGsAhmad, Muhammad Aurangzeb / Keegan, Brian / Srivastava, Jaideep / Williams, Dmitri / Contractor, Noshir et al. | 2009
- 342
-
Optimizing Embedded Virtual MachinesKoshy, Joel / Pandey, Raju / Wirjawan, Ingwar et al. | 2009
- 343
-
Practical Values for PrivacyWasser, Benjamin / Zhan, Justin et al. | 2009
- 344
-
CA-MAC: Context Adaptive MAC Protocol for Wireless Sensor NetworksKim, Kyung Tae / Choi, Won Jun / Whang, Myung Jin / Youn, Hee Yong et al. | 2009
- 346
-
Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.comLauterbach, Debra / Truong, Hung / Shah, Tanuj / Adamic, Lada et al. | 2009
- 347
-
Phishpin: An Identity-Based Anti-phishing ApproachTout, Hicham / Hafner, William et al. | 2009
- 350
-
Spiral Grid Routing for Load Balance in Wireless Sensor NetworksLiang, Chiu-Kuo / Li, Chih-Shiuan et al. | 2009
- 352
-
Support of Paged Register Files for Improving Context Switching on Embedded ProcessorsHuang, Chung-Wen / Hsieh, Kun-Yuan / Li, Jia-Jhe / Lee, Jenq Kuen et al. | 2009
- 353
-
Security Implications of Virtualization: A Literature Studyvan Cleeff, André / Pieters, Wolter / Wieringa, Roel J. et al. | 2009
- 354
-
Virtually There: Exploring Proximity and Homophily in a Virtual WorldHuang, Yun / Shen, Cuihua / Williams, Dmitri / Contractor, Noshir et al. | 2009
- 356
-
SVM Based Hybrid Moment Features for Natural Scene CategorizationV, Devendran / Thiagarajan, Hemalatha / Wahi, Amitabh et al. | 2009
- 358
-
Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded SystemsYang, Yanqin / Wang, Meng / Shao, Zili / Guo, Minyi et al. | 2009
- 359
-
ViDPSec Visual Device Pairing Security ProtocolZisiadis, Dimitris / Kopsidas, Spyros / Tassiulas, Leandros et al. | 2009
- 360
-
The Altruistic SearcherSmyth, Barry / Coyle, Maurice / Briggs, Peter et al. | 2009
- 362
-
A Fast Backlight Module Luminance Inspection MethodLin, Wu-Ja / Ho, Chih-Wei et al. | 2009
- 365
-
Lightweight IDS Based on Features Selection and IDS Classification SchemeZaman, Safaa / Karray, Fakhri et al. | 2009
- 366
-
Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping ProblemMoein-darbari, Fahime / Khademzadeh, Ahmad / Gharooni-fard, Golnar et al. | 2009
- 368
-
On the Design of Collective ApplicationsDron, Jon / Anderson, Terry et al. | 2009
- 368
-
SOM-Based Hedge Ratio Estimation with Hierarchical Cluster ResamplingHsu, Yu-Chia / Chen, An-Pin et al. | 2009
- 371
-
A Study of the Methods for Improving Internet Usage Policy ComplianceSaran, Mandeep / Zavarsky, Pavol et al. | 2009
- 374
-
Reducing Leakage Power of JPEG Image on Asymmetric SRAMLin, Yu-Hsun / Lin, Xuan-Yi / Chung, Yeh-Ching et al. | 2009
- 374
-
Development of Integrated Retrieval Methods for OpenAPIs and Mash-Up Capable ServicesCha, Seung-Jun / Lee, Kyu-Chul et al. | 2009
- 375
-
Inferring Unobservable Inter-community Links in Large Social NetworksHohwald, Heath / Cebrian, Manuel / Canales, Arturo / Lara, Rubén / Oliver, Nuria et al. | 2009
- 379
-
Process-Oriented Approach for Validating Asset Value for Evaluating Information Security RiskCha, Shi-Cho / Liu, Li-Ting / Yu, Bo-Chen et al. | 2009
- 381
-
Social Relationship Identification: An Example of Social QueryDiehl, Christopher P. / Montemayor, Jaime / Pekala, Mike et al. | 2009
- 382
-
On the Design of Flexible Real-Time Schedulers for Embedded SystemsMarcondes, Hugo / Cancian, Rafael / Stemmer, Marcelo / Frohlich, Antônio Augusto et al. | 2009
- 382
-
Study on 3D Annotation in Virtual Space for CollaborationSin, Eun-Joo / Choy, Yoon-Chul / Lim, Soon-Bum et al. | 2009
- 386
-
An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002Huang, Zhitao / Zavarsky, Pavol / Ruhl, Ron et al. | 2009
- 388
-
Delayed Interrupt Processing Technique for Reducing Latency of Timer Interrupt in Embedded LinuxDai, Maobing / Ishikawa, Yutaka et al. | 2009
- 388
-
Minesweeper for Sensor Networks--Making Event Detection in Sensor Networks DependableHein, Karima B. / Weiss, Reinhold et al. | 2009
- 389
-
metaViz: Visualizing Computationally Identified Metaphors in Political BlogsBaumer, Eric P.S. / Sinclair, Jordan / Hubin, David / Tomlinson, Bill et al. | 2009
- 392
-
Ceremonies Formal Analysis in PKI's ContextMartina, Jean Everson / de Souza, Túlio Cícero Salavaro / Custodio, Ricardo Felipe et al. | 2009
- 394
-
An Evaluating Model for Anti-virus Ability Based on AHPLiu, Ming / Han, Lansheng / Zou, Mengsong / Liu, Qiwen et al. | 2009
- 394
-
Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded SystemsPelc, Mariusz / Anthony, Richard / Ward, Paul / Hawthorne, James et al. | 2009
- 395
-
Implementing Social Norms Using PoliciesKremer, Robert et al. | 2009
- 399
-
Activity and Artifact Views of a Secure Software Development ProcessKhan, Muhammad Umair Ahmed / Zulkernine, Mohammad et al. | 2009
- 399
-
Analysis of 2-State, 3-Neighborhood Cellular Automata Rules for Cryptographic Pseudorandom Number GenerationShin, Sang-Ho / Yoo, Kee-Young et al. | 2009
- 401
-
Usable Privacy Controls for BlogsHart, Michael / Castille, Claude / Johnson, Rob / Stent, Amanda et al. | 2009
- 402
-
Blocked-Z Test for Reducing Rasterization, Z Test and Shading WorkloadsChung, Chung-Ping / Chen, Hong-Wei / Yang, Hui-Chin et al. | 2009
- 405
-
An AHP-Based Framework for Quality and Security EvaluationCasola, V. / Fasolino, A.R. / Mazzocca, N. / Tramontana, P. et al. | 2009
- 405
-
A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic SynthesisShbair, Wazen M. / Bashandy, Ahmed R. / Shaheen, Samir I. et al. | 2009
- 408
-
A Hierarchical Primitive Lists Structure for Tile-Based RenderingHsiao, Chih-Chieh / Chung, Chung-Ping / Yang, Hui-Chin et al. | 2009
- 409
-
Feedback Loops of Attention in Peer ProductionWu, Fang / Wilkinson, Dennis M. / Huberman, Bernardo A. et al. | 2009
- 412
-
Assurance Process for Large Open Source Code BasesArdagna, Claudio A. / Banzi, Massimo / Damiani, Ernesto / Frati, Fulvio et al. | 2009
- 412
-
Implementation and Evaluation of Modular Neural Networks in a Multiple Processor System on Chip to Classify Electric DisturbanceLopes, Danniel C. / Magalhaes, Rafael M. / Melo, Jorge D. / Neto, Adrião D. Dória et al. | 2009
- 414
-
Methods for Precise False-Overlap Detection in Tile-Based RenderingHsieh, Hsiu-ching / Hsiao, Chih-Chieh / Yang, Hui-Chin / Chung, Chung-Ping / Shann, Jean Jyh-Jiun et al. | 2009
- 416
-
New Media Use in Context: Environmental Cues and Online Self-Disclosure via WeblogsStefanone, Michael A. / Jang, Chyng-Yang / Claes, Nathan et al. | 2009
- 418
-
A New Hierarchical Network Coordinate Algorithm Based on Community StructureYe, Zilong / Liu, Yabing / Chen, Siguang et al. | 2009
- 418
-
Code Obfuscation Using Pseudo-random Number GeneratorsAycock, John / Cardenas, Juan Manuel Gutiérrez / de Castro, Daniel Medeiro Nunes et al. | 2009
- 420
-
H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage MethodChung, Chung-Ping / Lu, Tung-Lin / Yang, Hui-Chin et al. | 2009
- 423
-
Churn Prediction in MMORPGs: A Social Influence Based ApproachKawale, Jaya / Pal, Aditya / Srivastava, Jaideep et al. | 2009
- 424
-
Power Efficient Large Matrices Multiplication by Load Scheduling on Multi-core and GPU Platform with CUDARen, DaQi / Suda, Reiji et al. | 2009
- 424
-
Misuse Cases + Assets + Security GoalsOkubo, Takao / Taguchi, Kenji / Yoshioka, Nobukazu et al. | 2009
- 426
-
HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P NetworksLin, Feiyu / Henricsson, Christopher / Abbas, Syed Muhammad / Sandkuhl, Kurt et al. | 2009
- 429
-
SpamClean: Towards Spam-Free Tagging SystemsZhai, Ennan / Sun, Huiping / Qing, Sihan / Chen, Zhong et al. | 2009
- 430
-
Specification of Fair Data Practice Principles Using Privacy Policy LanguagesNigusse, Girma / De Decker, Bart / Naessens, Vincent et al. | 2009
- 430
-
A Design Methodology for Self-Management in Distributed EnvironmentsAl-Shishtawy, Ahmad / Vlassov, Vladimir / Brand, Per / Haridi, Seif et al. | 2009
- 434
-
Caching-Based Multipath Routing ProtocolJoshi, Vineet / Zhu, Xuefu / Zeng, Qing-An et al. | 2009
- 436
-
Social Authentication Protocol for Mobile PhonesSoleymani, Bijan / Maheswaran, Muthucumaru et al. | 2009
- 437
-
Computer Simulation of the Anisotropy of Fluorescence in Ring Molecular Systems: Influence of Disorder and EllipticityHerman, Pavel / Zapletal, David / Barvik, Ivan et al. | 2009
- 438
-
Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance ModelEl Masri, Alaa Aref / Sousa, João Pedro et al. | 2009
- 440
-
A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless NetworksLeu, Fang-Yie / Huang, Yao-Tian / Leu, Pei-Xun et al. | 2009
- 442
-
Modeling Ethno-religious Conflicts as Prisoner's Dilemma Game in GraphsLuo, Lingzhi / Chakraborty, Nilanjan / Sycara, Katia et al. | 2009
- 443
-
Flattened Conservative Parallel Simulator for DEVS and CELL-DEVSJafer, Shafagh / Wainer, Gabriel et al. | 2009
- 444
-
A Privacy Framework for Personal Self-Improving Smart SpacesLiampotis, N. / Roussaki, I. / Papadopoulou, E. / Abu-Shaaban, Y. / Williams, M.H. / Taylor, N.K. / McBurney, S.M. / Dolinar, K. et al. | 2009
- 446
-
Analysis of Vehicular Roaming through Multiple WLAN APs in Container TerminalPark, Hyun-Sung / Han, Seung-Ho / Kim, Jong-Deok et al. | 2009
- 449
-
Supply Chain Design Model Based on Multi-supply HubsLi, Jizi / Xiong, Naixue / Sun, Linfu / Yuan, Aping / Chen, Jingyi / Cao, Ming et al. | 2009
- 450
-
Knowledge Acquisition and Insider Threat Prediction in Relational Database SystemsYaseen, Qussai / Panda, Brajendra et al. | 2009
- 450
-
Whither the Experts? Social Affordances and the Cultivation of Experts in Community Q&A SystemsWelser, Howard T. / Gleave, Eric / Barash, Vladimir / Smith, Marc / Meckes, Jessica et al. | 2009
- 452
-
Processing Approximate Moving Range Queries in Mobile Sensor EnvironmentsPetkova, Antoniya / Hua, Kien A. / Aved, Alexander et al. | 2009
- 455
-
Author Index - Volume 1| 2009
- 456
-
The Power of Grassroots Influentials: The Optimal Heterophily between Sender and ReceiverYamamoto, Hikaru / Matsumura, Naohiro et al. | 2009
- 456
-
Managing Risk of IT Security Outsourcing in the Decision-Making StageOladapo, Samuel / Zavarsky, Pavol / Ruhl, Ron / Lindskog, Dale / Igonor, Andy et al. | 2009
- 458
-
Service-Oriented Adaptation in Ubiquitous Computing EnvironmentsGeihs, Kurt / Reichle, Roland / Wagner, Michael / Khan, Mohammad Ullah et al. | 2009
- 458
-
Publisher's Information - Volume 1| 2009
- 462
-
Risk Perceptions of Information Security: A Measurement StudyFarahmand, Fariborz / Dark, Melissa / Liles, Sydney / Sorge, Brandon et al. | 2009
- 463
-
A Model of Tacit Knowledge and ActionGal, Ya'akov / Kasturirangan, Rajesh / Pfeffer, Avi / Richards, Whitman et al. | 2009
- 464
-
Rehoming Decision Algorithm: Design and Empirical EvaluationDhraief, Amine / Montavont, Nicolas et al. | 2009
- 469
-
iKnow Where You AreSubbu, Kalyan / Xu, Ning / Dantu, Ram et al. | 2009
- 470
-
Managing Risks on Critical IT Systems in Public Service OrganizationsHelgesson, Yeni Yuqin Li et al. | 2009
- 470
-
Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging ProblemYang, Yanqin / Guo, Minyi / Tang, Feilong / Zhang, Gongwei et al. | 2009
- 475
-
Incorporating Participant Reputation in Community-Driven Question Answering SystemsHong, Liangjie / Yang, Zaihan / Davison, Brian D. et al. | 2009
- 476
-
Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc NetworksBu, Shengrong / Liu, Peter et al. | 2009
- 476
-
Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders' Good Security BehaviorsBulgurcu, Burcu / Cavusoglu, Hasan / Benbasat, Izak et al. | 2009
- 481
-
Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational ExperienceAyoola, Olapeju Latifat / Phelan, Eleni Mangina et al. | 2009
- 481
-
Expertise Modeling and Recommendation in Online Question and Answer ForumsBudalakoti, Suratna / DeAngelis, David / Barber, K. Suzanne et al. | 2009
- 482
-
A Dynamic Trust Evaluation Model on C2C MarketplacesYang, Yun / Chen, Juhua et al. | 2009
- 486
-
Threat Modeling for CSRF AttacksLin, Xiaoli / Zavarsky, Pavol / Ruhl, Ron / Lindskog, Dale et al. | 2009
- 487
-
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing ProtocolPatel, Kunjan / Chern, Lim Jong / Bleakley, C.J. / Vanderbauwhede, Wim et al. | 2009
- 489
-
Quantifying Utility and Trustworthiness for Advice Shared on Online Social MediaMoturu, Sai T. / Yang, Jian / Liu, Huan et al. | 2009
- 492
-
A Novel Approach to DRM SystemsFrattolillo, F. / Landolfi, F. / Marulli, F. et al. | 2009
- 494
-
A Hierarchical Authentication Scheme for the Different Radio Ranges Sensor NetworksGao, Ang / Wei, Wei / Wang, Zhixiao / Wenyao, Yan et al. | 2009
- 495
-
A Language of Life: Characterizing People Using Cell Phone TracksKhrabrov, Alexy / Cybenko, George et al. | 2009
- 498
-
Worm Path Identification Using Visualization SystemShibaguchi, Seiji / Nakayama, Yuki / Okada, Ken-ichi et al. | 2009
- 502
-
On the Synergy of Conflict and Collective Creativity in Open Innovation Socio-technical EcologiesYilmaz, Levent et al. | 2009
- 502
-
Are You a Safe Driver?Langle, Lonnie / Dantu, Ram et al. | 2009
- 504
-
A Simulation of Various Variable Hacker PopulationsPendegraft, Norman / Rounds, Mark et al. | 2009
- 508
-
Performance Improvement for Flash Memories Using Loop OptimizationPaik, Joon-Young / Cho, Eun-Sun / Chung, Tae-Sun et al. | 2009
- 509
-
Investigating User Experience of Online Communities: The Influence of Community TypeChen, Vivian Hsueh-Hua / Duh, Henry Been-Lirn et al. | 2009
- 511
-
Author Index - Volume 3| 2009
- 514
-
Efficient and Adapted Component-Based Strategies for Embedded Software Device Drivers DevelopmentNavas, Juan / Babau, Jean-Philippe et al. | 2009
- 514
-
Publisher's Information - Volume 3| 2009
- 515
-
Enabling Video-Blogging without Relying on External Service-ProvidersBross, Justus / Oppermann, Janosch / Meinel, Christoph et al. | 2009
- 520
-
The Software and Hardware Integration Linker for Reconfigurable Embedded SystemChiu, Jih-Ching / Yeh, Ta-Li / Leong, Mun-Kit et al. | 2009
- 523
-
Improving Interobserver Reliability by Artificial Intelligence Techniques in Behavioural Researchvan Alphen, Arjen / Bosse, Tibor / Jonker, Catholijn M. / Koeman, Francien et al. | 2009
- 526
-
Codesign of Embedded Systems with Process/Module Level Real-Time DeadlinesKhan, Gul N. / Awwal, Anika et al. | 2009
- 530
-
Health Insurance Reform in an Experimental Market: Human Subjects, Agents Combined to Study Complex Regulatory Reform ProposalsRassenti, Stephen J. / Johnston, Carl A. et al. | 2009
- 532
-
Pricing the American Option Using Reconfigurable HardwareWynnyk, Chris / Magdon-Ismail, Malik et al. | 2009
- 537
-
QoS-Aware Power Management for Energy Harvesting Wireless Sensor Network Utilizing Reinforcement LearningHsu, Roy Chaoming / Liu, Cheng-Ting / Wang, Kuan-Chieh / Lee, Wei-Ming et al. | 2009
- 538
-
Social Interaction History: A Framework for Supporting Exploration of Social Information SpacesIndratmo, / Vassileva, Julita et al. | 2009
- 543
-
Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power SignalsYamamoto, Kenji R. / Flikkema, Paul G. et al. | 2009
- 546
-
Social Network Analysis and Geotemporal Reasoning in a Web 3.0 WorldAasman, Jans et al. | 2009
- 549
-
Emergence of Social Norms in Complex NetworksZhang, Yu / Leezer, Jason et al. | 2009
- 550
-
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor NetworksSakhaee, Ehssan / Wakamiya, Naoki / Murata, Masayuki et al. | 2009
- 556
-
Local Semi-linear Regression for River Runoff ForecastingMin, Fan / Wu, Xindong et al. | 2009
- 558
-
A New Energy-Balanced Data Aggregation Scheme in Wireless Sensor NetworksBista, Rabindra / Kim, Yong-Ki / Choi, Young-Ho / Chang, Jae-Woo et al. | 2009
- 562
-
Centrality and Power among Website Users: A Social Network Analysis ApplicationMcGrath, G. Michael et al. | 2009
- 564
-
Dispatch of Mobile Resources in Wireless Sensor NetworksChen, Tzung-Shi / Tsai, Hua-Wen / Wei, Chih-Wei et al. | 2009
- 568
-
Introducing Electronic Child Records: Balancing Personal Interests, System Perfomance, and Social Valuesvan Heck, Guido / Sharon, Itamar / Kampert, Paulus / van den Berg, Jan et al. | 2009
- 570
-
A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor NetworksBarnawi, Abdulaziz / Hafez, Roshdy et al. | 2009
- 576
-
Towards an Introduction to Collaborative FilteringZhou, Jia / Luo, Tiejian et al. | 2009
- 579
-
Precision Time Synchronization Using IEEE 1588 for Wireless Sensor NetworksCho, Hyuntae / Jung, Jeonsu / Cho, Bongrae / Jin, Youngwoo / Lee, Seung-Woo / Baek, Yunju et al. | 2009
- 582
-
Collaborative Mining in Multiple Social Networks Data for Criminal Group DiscoveryFard, Amin Milani / Ester, Martin et al. | 2009
- 587
-
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor NetworksAbbate, Stefano / Avvenuti, Marco / Corsini, Paolo / Vecchio, Alessio et al. | 2009
- 588
-
Web Page Classification Using Social TagsAliakbary, Sadegh / Abolhassani, Hassan / Rahmani, Hossein / Nobakht, Behrooz et al. | 2009
- 593
-
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor NetworksNourizadeh, Shahram / Song, Y.Q. / Thomesse, J.P. et al. | 2009
- 594
-
Davis Social Links or: How I Learned to Stop Worrying and Love the NetSpear, Matt / Lu, Xiaoming / Wu, S. Felix et al. | 2009
- 597
-
Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor NetworksLung, Chung-Horng / Yang, Oliver W.W. et al. | 2009
- 602
-
A Stigmergy Approach for Open Source Software Developer Community SimulationCui, Xiaohui / Beaver, Justin / Treadwell, Jim / Potok, Thomas / Pullum, Laura et al. | 2009
- 603
-
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GMLLee, Chang-Wu / Kim, Sung-Won / Lee, Heon-Jong / Han, Youn-Hee / Park, Doo-Soon / Jeong, Young-Sik et al. | 2009
- 607
-
Personality in Social Group DynamicsPrada, Rui / Ma, Samuel / Nunes, Maria Augusta et al. | 2009
- 609
-
A Resource Management System for Fault Tolerance in Grid ComputingLee, HwaMin / Park, DooSoon / Hong, Min / Yeo, Sang-Soo / Kim, SooKyun / Kim, SungHoon et al. | 2009
- 613
-
Lending Behavior and Community Structure in an Online Peer-to-Peer Economic NetworkKrumme, Katherine Ann / Herrero, Sergio et al. | 2009
- 615
-
A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MACKim, Jin-Woo / Hur, Kyeong / Hwang, Kwang-il / Eom, Doo-Seop et al. | 2009
- 619
-
Temporal Issue Trend Identifications in BlogsMoon, Il-Chul / Kim, Young-Min / Lee, Hyun-Jong / Oh, Alice H. et al. | 2009
- 621
-
Distributed Tag Access with Collision-Avoidance among Mobile RFID ReadersHwang, Kwang-il / Yeo, Sang-Soo / Park, Jong Hyuk et al. | 2009
- 627
-
Gaming On and Off the Social Graph: The Social Structure of Facebook GamesKirman, Ben / Lawson, Shaun / Linehan, Conor et al. | 2009
- 627
-
Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor NetworksKim, Seung-Ku / Lee, Jae-Ho / Hwang, Kwang-il / Hur, Kyeong / Eom, Doo-Seop et al. | 2009
- 633
-
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECCYoon, Eun-Jun / Yoo, Kee-Young et al. | 2009
- 633
-
The Socio-cultural Factors Influencing Online Female Consumers in Saudi ArabiaRambo, Khulood / Liu, Kecheng / Nakata, Keiichi et al. | 2009
- 639
-
Experience Search: Accessing the Emergent Knowledge from Annotated Blog PostingsNoh, Tae-Gil / Han, Yong-Jin / Son, Jeong-Woo / Song, Hyun-Jae / Yoon, Hee-Geun / Lee, Jae-Ahn / Lee, Sang-Do / Kim, Kye-Sung / Lee, Young-Hwa / Park, Seong-Bae et al. | 2009
- 641
-
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc NetworksCho, Jin-Hee / Swami, Ananthram / Chen, Ing-Ray et al. | 2009
- 645
-
Adaptive Tourism Modeling and Socialization SystemCoelho, Bruno / Martins, Constantino / Almeida, Ana et al. | 2009
- 651
-
Design and Validation of PATRICIA for the Mitigation of Network Flooding AttacksWang, Lan / Wu, Qishi / Liu, Yaoqing et al. | 2009
- 653
-
Open Editing Algorithm: A Collaborative News Promotion Algorithm Based on Users' Voting HistoryKo, Joonseong / Kim, Kanghak / Kweon, Ohyeon / Kim, Jongwook / Kim, Young-rin / Han, Sangki "Steve" et al. | 2009
- 659
-
Designing Social Computing Using Traditions of Symbolism, Personalization, and Gift CultureHe, Yin / Schiphorst, Thecla et al. | 2009
- 659
-
Data Deletion with Time-Aware Adversary ModelKlonowski, Marek / Przykucki, Michal / Struminski, Tomasz et al. | 2009
- 665
-
Obfuscation Mechanism in Conjunction with Tamper-Proof ModuleFukushima, Kazuhide / Kiyomoto, Shinsaku / Tanaka, Toshiaki et al. | 2009
- 667
-
Social Ability in Online Groups: Representing the Quality of Interactions in Social Computing EnvironmentsGoggins, Sean P. / Laffey, James / Galyen, Krista et al. | 2009
- 671
-
TBDRM: A TPM-Based Secure DRM ArchitectureYu, Aimin / Feng, Dengguo / Liu, Ren et al. | 2009
- 675
-
A Study of Information Diffusion over a Realistic Social Network ModelApolloni, Andrea / Channakeshava, Karthik / Durbeck, Lisa / Khan, Maleq / Kuhlman, Chris / Lewis, Bryan / Swarup, Samarth et al. | 2009
- 678
-
A Novel Server-Based Application Execution ArchitectureChen, Chao / Wang, Ke / Liao, Shuren / Zhang, Qiuyan / Dai, Yiqi et al. | 2009
- 683
-
Modeling Human, Social, Cultural or Behavioral Events for Real World Applications: Results and Implications from the State Stability ProjectRussell, Anne / Clark, Mark et al. | 2009
- 684
-
Multidimensional Dynamic Trust Management for Federated ServicesBoursas, Latifa / Hommel, Wolfgang et al. | 2009
- 690
-
Security Protocol Testing Using Attack TreesMorais, Anderson / Martins, Eliane / Cavalli, Ana / Jimenez, Willy et al. | 2009
- 691
-
System Theoretic Formalization of Social Group Processes and Optimal Evidence-Indicator DiscoverySaisan, Payam / Russell, Anne / Clark, Mark / Krotosky, Stephen et al. | 2009
- 697
-
Co-located Many-Player Gaming on Large High-Resolution DisplaysMachaj, David / Andrews, Christopher / North, Chris et al. | 2009
- 698
-
Optimal LFSR-Coding Test Data Compression Based on Test Cube DividingYi, Maoxiang / Liang, Huaguo / Zhan, Kaihua / Jiang, Cuiyun et al. | 2009
- 703
-
Quasi-classical Semantics and Tableau Calculus of Description Logics for Paraconsistent Reasoning in the Semantic WebHou, Hui / Wu, Jinzhao et al. | 2009
- 705
-
Analyzing Enterprise Social Media NetworksSmith, Marc / Hansen, Derek L. / Gleave, Eric et al. | 2009
- 709
-
Concurrency Control Strategy to Reduce Frequent Rollbacks in Mobile EnvironmentsMoiz, Salman Abdul / Rajamani, Lakshmi et al. | 2009
- 711
-
Mining and Analyzing Multirelational Social NetworksStroele, Victor / Oliveira, Jonice / Zimbrao, Geraldo / Souza, Jano M. et al. | 2009
- 715
-
An Efficient Privacy Preserving Keyword Search Scheme in Cloud ComputingLiu, Qin / Wang, Guojun / Wu, Jie et al. | 2009
- 717
-
Development of a Meeting Browser towards Supporting Public InvolvementShiramatsu, Shun / Ozono, Tadachika / Shintani, Toramatsu / Komatani, Kazunori / Ogata, Tetsuya / Takahashi, Toru / Okuno, Hiroshi G. et al. | 2009
- 721
-
A Direct Anonymous Attestation Protocol Based on Hierarchical Group SignatureYu, Rong-wei / Wang, Li-na / Ma, Xiao-yan / Kuang, Bo et al. | 2009
- 723
-
A Survey of Human Computation SystemsYuen, Man-Ching / Chen, Ling-Jyh / King, Irwin et al. | 2009
- 727
-
A Multi-party Contract Signing Protocol and Its Implementation via Trusted ComputingWang, Zhenyu / Huang, Jianhua / Wang, Yu / Li, Xiangdong / Sun, Xuetao / Wang, Ruimin et al. | 2009
- 729
-
Tag Sense Disambiguation for Clarifying the Vocabulary of Social TagsLee, Kangpyo / Kim, Hyunwoo / Shin, Hyopil / Kim, Hyoung-Joo et al. | 2009
- 732
-
An Anonymous Property-Based Attestation Protocol from Bilinear MapsYu, Qin / DengGuo, Feng / Zhen, Xu et al. | 2009
- 735
-
Predicting Interests of People on Online Social NetworksAgarwal, Apoorv / Rambow, Owen / Bhardwaj, Nandini et al. | 2009
- 739
-
Bio-chaotic Stream Cipher-Based Iris Image EncryptionAlghamdi, Abdullah Sharaf / Ullah, Hanif / Mahmud, Maqsood / Khan, Muhammad Khurram et al. | 2009
- 741
-
Will Networking Nerds Pay for Stuff That Matters? The Relationship between Social Networks and Subscriptions in Virtual CommunitiesBernier, Melanie / Ganley, Dale et al. | 2009
- 745
-
Trust-Based Countermeasures for Securing OLSR ProtocolAdnane, Asmaa / Bidan, Christophe / de Sousa Junior, Rafael Timoteo et al. | 2009
- 747
-
Names of Our LivesGross, Benjamin M. et al. | 2009
- 753
-
Using Qtag to Extract Dominant Public Opinion in Very Large-Scale ConversationLee, Sung Eob / Chun, Taeksoo / Han, "Steve" SangKi et al. | 2009
- 753
-
Fault Tolerance in MANETs Using a Task-to-Resource Reallocation FrameworkLauf, Adrian P. / Robinson, William H. et al. | 2009
- 759
-
An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time SystemsDing, Wanfu / Guo, Ruifeng et al. | 2009
- 759
-
Study on Collective Memory in the BlogosphereKim, Young Sik / Lee, Kibeom / Han, "Steve" Sangki et al. | 2009
- 765
-
Personal Management of Social Networks DataMartin, Mauro San / Gutierrez, Claudio et al. | 2009
- 765
-
RepCom: Towards Reputation Composition over Peer-to-Peer CommunitiesYin, Gang / Shi, Dianxi / Wang, Huaimin / Guo, Min et al. | 2009
- 771
-
The Effect of Trust and Perceived Risk on Consumers' Online Purchase IntentionZhu, Dauw-Song / O'Neal, Gwendolyn Sneed / Lee, Zui-Chih / Chen, Yen-Hsun et al. | 2009
- 772
-
HASS: Highly Available, Scalable and Secure Distributed Data Storage SystemsXu, Zhiqian / Jiang, Hai et al. | 2009
- 777
-
Ego-centric Network Sampling in Viral Marketing ApplicationsMa, Huaiyu / Gustafson, Steven / Moitra, Abha / Bracewell, David et al. | 2009
- 781
-
Reliable Identities Using Off-the-Shelf Hardware Security in MANETsKuntze, Nicolai / Fuchs, Andreas / Rudolph, Carsten et al. | 2009
- 783
-
Integration of User Experiences to Advancement of B2B-Software-on-Demand SystemsSchwartz, Eva-Maria et al. | 2009
- 787
-
Application of New A Priori Algorithm MDNC to Exchange Traded FundChiung-Fen, Huang / Wen-Chih, Tsai / An-Pin, Chen et al. | 2009
- 787
-
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc NetworksYu, F. Richard / Tang, Helen / Wang, Fei / Leung, Victor C.M. et al. | 2009
- 795
-
Enhancing Airline Customer Relationship Management Data by Inferring Ties between PassengersFarrugia, Michael / Quigley, Aaron et al. | 2009
- 795
-
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise EnvironmentsWang, Chenjia / Monaghan, Kevin P. / Shi, Weisong et al. | 2009
- 801
-
The Benefits of Synchronized Genuine Smiles in Face-to-Face Service EncountersKim, Kyunghee / Eckhardt, Micah / Bugg, Nandi / Picard, Rosalind W. et al. | 2009
- 802
-
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing ProtocolAyachi, Mohamed Ali / Bidan, Christophe / Abbes, Tarek / Bouhoula, Adel et al. | 2009
- 809
-
A Proposal of Discovering User Interest by Support Vector Machine and Decision Tree on Document ClassificationNguyen, Loc et al. | 2009
- 809
-
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous AttestationHuang, Wenchao / Xiong, Yan / Chen, Depin et al. | 2009
- 815
-
Analyzing Multi-source Social Data for Extracting and Mining Social NetworksTing, I-Hsien / Wu, Hui-Ju / Chang, Pei-Shan et al. | 2009
- 817
-
A GEP-Based Anomaly Detection Scheme in Wireless Sensor NetworksGao, Honglei / Chen, Guolong / Guo, Wenzhong et al. | 2009
- 821
-
A Study of Co-relational Personalities of the Social Network in OrganizationChang, Wei-Lun / Lin, Sian-Ting et al. | 2009
- 823
-
L-UCON: Towards Layered Access Control with UCONHu, Hao / Li, Hao / Feng, Dengguo et al. | 2009
- 826
-
Information Retrieval in Wikis Using an OntologyTobar, Carlos Miguel / Germer, Alessandro Santos / Adan-Coello, Juan Manuel / de Freitas, Ricardo Luís et al. | 2009
- 830
-
Hardware Containers for Software Components: A Trusted Platform for COTS-Based SystemsLeontie, Eugen / Bloom, Gedare / Narahari, Bhagirath / Simha, Rahul / Zambreno, Joseph et al. | 2009
- 832
-
The Effect of Network Position and Relationship Quality on Organizational Performance--The ABW FamilyLee, Ting-Lin / Lin, Chih-Wei et al. | 2009
- 837
-
A Software Based Approach for Trusted Agent Execution on Malicious HostHashmi, Sarosh / Brooke, John et al. | 2009
- 837
-
Concepts, Technology, and Assessment of the Social Music Game "Sync-in-Team'Leman, Marc / Demey, Michiel / Lesaffre, Micheline / van Noorden, Leon / Moelants, Dirk et al. | 2009
- 843
-
Toward a Real-Time Automated Measure of Empathy and DominanceVarni, Giovanna / Camurri, Antonio / Coletta, Paolo / Volpe, Gualtiero et al. | 2009
- 847
-
A Smart Card Power Analysis SimulatorThuillet, Céline / Andouard, Philippe / Ly, Olivier et al. | 2009
- 849
-
Reinforcement Learning of Listener Response for Mood Classification of AudioStockholm, Jack / Pasquier, Philippe et al. | 2009
- 853
-
TSGen: A UML Activity Diagram-Based Test Scenario Generation ToolSun, Chang-ai / Zhang, Baobao / Li, Jin et al. | 2009
- 854
-
Dynamic Social Interaction in a Collective Mobile Music PerformanceTahiroglu, Koray et al. | 2009
- 859
-
Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address AttackKao, Wen-Fu / Wu, S. Felix et al. | 2009
- 860
-
NetBeat and Net4Tet--Networked Performance Instruments for Electroacoustic Music StudentsEigenfeldt, Arne et al. | 2009
- 862
-
Sharing Application Sessions for Peer-to-Peer LearningArdaiz, Oscar / de Cerio, Luis Manuel Diaz / Del Campo, Jose Andres / Mondejar, Ruben et al. | 2009
- 867
-
RBAC-Based Secure Interoperation Using Constraint Logic ProgrammingHu, Jinwei / Li, Ruixuan / Lu, Zhengding et al. | 2009
- 868
-
Web2.0 Tools to Support the Instructional Method “Thinking Actively in a Creative Environment”Villanueva, Oscar Ardaiz / Chacon, Xabier Nicuesa / Artazcoz, Oscar Brene / Lizarraga, María Luisa Sanz de Acedo / Baquedano, María Teresa Sanz de Acedo et al. | 2009
- 873
-
Key Predistribution Schemes Using Block Designs in Wireless Sensor NetworksRuj, Sushmita / Seberry, Jennifer / Roy, Bimal et al. | 2009
- 874
-
Approach for Name Ambiguity Problem Using a Multiple-Layer ClusteringJiang, Wenrong / Wang, Anbao / Wu, Cuihong / Chen, Jian / Yan, Jihong et al. | 2009
- 879
-
Let's Meet: Integrating Social and Learning WorldsSiadaty, Melody / Gasevic, Dragan / Hatala, Marek et al. | 2009
- 879
-
HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance ManagementJara, Antonio J. / Zamora, Miguel A. / Skarmeta, Antonio F.G. et al. | 2009
- 885
-
A Decision Support System for Institutional Research Management in Higher Education: Data Mining to Determine Research Focus, Intensity and SynergyEhlers, Kobus / Joubert, Malan / Kinghorn, Johann / van Zyl, Arnold et al. | 2009
- 885
-
Autonomous Management and Control of Sensor Network-Based ApplicationsRuzzelli, A.G. / Muldoon, C. / Schoofs, A. / Campana, T. / O'Hare, G.M.P. / Tynan, R. et al. | 2009
- 891
-
Intelligent Middleware for Adaptive Sensing of Tennis Coaching SessionsTynan, Richard / Schoofs, Anthony / Muldoon, Conor / O'Hare, G.M.P. / O'Conaire, Ciaran / Kelly, Philip / O'Connor, Noel E. et al. | 2009
- 891
-
Online Presence in Adaptive Learning on the Social Semantic WebJovanovic, Jelena / Gasevic, Dragan / Stankovic, Milan / Jeremic, Zoran / Siadaty, Melody et al. | 2009
- 897
-
Design of a Platform of Popular Science Education Based on Social ComputingFang, Wang / Qian, Mo et al. | 2009
- 897
-
Petri Net Based Reconfigurable Wireless Sensor Networks for Intelligent Monitoring SystemsKuo, Chung-Hsien / Siao, Jia-Wun et al. | 2009
- 903
-
Spurring Design Thinking through Educational WebloggingBross, Justus / Acar, Ahmet Emre / Schilf, Patrick / Meinel, Christoph et al. | 2009
- 903
-
Architecture Synthesis Methodology for Run-Time Reconfigurable SystemsChun, Pil Woo / Kirischian, Lev et al. | 2009
- 909
-
Designing to Attract Participation in a Niche Community for Women in Science & EngineeringSahib, Zina / Vassileva, Julita et al. | 2009
- 909
-
Run-Time Component Relocation in Partially-Reconfigurable FPGAsDumitriu, Victor / Marcantonio, Dennis / Kirischian, Lev et al. | 2009
- 915
-
Efficient Translation of Algorithmic Kernels on Large-Scale Multi-coresPande, Amit / Zambreno, Joseph et al. | 2009
- 915
-
SCI: Towards a Social Collaborative Integrated Development EnvironmentBani-Salameh, Hani / Jeffery, Clinton / Al-Gharaibeh, Jafar et al. | 2009
- 921
-
An Empirical Study of Research Collaboration Using Social Network AnalysisLuo, Yu-Ling / Hsu, Chia-Hao et al. | 2009
- 921
-
Multi-objective Placement of Reconfigurable Hardware Tasks in Real-Time SystemLu, Chun-Hsien / Liao, Hsiao-Win / Hsiung, Pao-Ann et al. | 2009
- 926
-
From Reconfigurable Architectures to Self-Adaptive Autonomic SystemsSantambrogio, Marco D. et al. | 2009
- 927
-
Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile PhonesRyder, Jason / Longstaff, Brent / Reddy, Sasank / Estrin, Deborah et al. | 2009
- 932
-
A Fast H.264 Spatial Downscaling Transcoder for Wireless CommunicationLi, Min / Xiong, Naixue / Ma, Chao et al. | 2009
- 932
-
The Impact of Human Mobility on Spatial Disease DynamicsBelik, V.V. / Geisel, T. / Brockmann, D. et al. | 2009
- 936
-
Scaling Behaviors in the Communication Network between CitiesKrings, Gautier / Calabrese, Francesco / Ratti, Carlo / Blondel, Vincent D. et al. | 2009
- 937
-
Link-Aware Geographic Routing in Wireless Sensor NetworksChen, Heng / Qian, Depei / Wu, Weiguo / Fang, Weiwei et al. | 2009
- 940
-
The Importance of Data Collection for Modelling Contact NetworksYoneki, Eiko et al. | 2009
- 943
-
A Congestion Control Framework for Handling Video Surveillance Traffics on WSNMaimour, M. / Pham, C. / Hoang, D. et al. | 2009
- 944
-
Investigating Bimodal Clustering in Human MobilityBagrow, James P. / Koren, Tal et al. | 2009
- 948
-
Mining Mobility Behavior from Trajectory DataGiannotti, Fosca / Nanni, Mirco / Pedreschi, Dino / Renso, Chiara / Trasarti, Roberto et al. | 2009
- 949
-
Research on an Improved Genetic Algorithm Which Can Improve the Node Positioning Optimized Solution of Wireless Sensor NetworksJiang, Bing / Zhang, Wei / Zhang, Pan et al. | 2009
- 952
-
Decentralized Detection of Group Formations from Wearable Acceleration SensorsWirz, Martin / Roggen, Daniel / Troster, Gerhard et al. | 2009
- 955
-
A Self-Similarity Frame Traffic Model Based on the Frame Components in 802.11 NetworksXiang, Lin / Ge, Xiaohu / Zhang, Ke / Liu, Chuang et al. | 2009
- 960
-
Touch Me Wear: Getting Physical with Social NetworksBeach, Aaron / Raz, Baishakhi / Buechley, Leah et al. | 2009
- 961
-
Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor NetworksShu, Lei / Hauswirth, Manfred / Wang, Lei / Zhang, Yan / Park, Jong Hyuk et al. | 2009
- 966
-
Sensor-Based Feedback Systems in Organizational ComputingKim, Taemie / Olguin, Daniel Olguin / Waber, Benjamin N. / Pentland, Alex et al. | 2009
- 967
-
Prediction and Key Computer Programming of Mechanical Properties of Hot Rolled Plate Based on BP Neural NetworkZou, Qinghua / Chen, Li / Xiong, Naixue / Zou, Shengzhong / Wang, Chuanbing et al. | 2009
- 970
-
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social NetworksBanks, Lerone / Wu, Shyhtsun Felix et al. | 2009
- 972
-
Efficient UDD Architecture for Underwater Wireless Acoustic Sensor NetworkLee, Seung-Joo / Namgung, Jung-Il / Park, Soo-Hyun et al. | 2009
- 975
-
Privacy in Online Social Networking at WorkplaceWang, Yang / Kobsa, Alfred et al. | 2009
- 978
-
An Underwater Communication Modem Using TMS320C6416 DSKWon, Tae-Hee / Jeon, Jun-Ho / Park, Sung-Joon et al. | 2009
- 979
-
Towards Enabling Web 2.0 Content Sharing beyond Walled GardensSun, San-Tsai / Hawkey, Kirstie / Beznosov, Konstantin et al. | 2009
- 982
-
Neighbor Nodes Aware MAC Scheduling Scheme in Underwater Acoustic Sensor NetworksYun, Nam-Yeol / Cho, Hui-Jin / Park, Soo-Hyun et al. | 2009
- 985
-
Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network SitesLipford, Heather Richter / Hull, Gordon / Latulipe, Celine / Besmer, Andrew / Watson, Jason et al. | 2009
- 988
-
Design of OFDM System for High Speed Underwater CommunicationHan, Jeong-woo / Kim, Se-young / Kim, Ki-man / Chun, Seung-yong / Son, Kwon et al. | 2009
- 990
-
Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0Hawkey, Kirstie et al. | 2009
- 993
-
An Improved Chinese Segmentation Algorithm Based on New Dictionary ConstructionNiu, Yan / Li, Lala et al. | 2009
- 996
-
Trust Inference in Complex Trust-Oriented Social NetworksLiu, Guanfeng / Wang, Yan / Orgun, Mehmet et al. | 2009
- 997
-
Network Bandwidth Allocation Based on QoS in iSCSI OSD Storage SystemSu, Yong et al. | 2009
- 1002
-
Wireless ECG Monitoring System Based on OMAPLiang, Jing / Wu, Yinqin et al. | 2009
- 1002
-
Security and Trust through Electronic Social Network-Based InteractionsBichsel, Patrik / Muller, Samuel / Preiss, Franz-Stefan / Sommer, Dieter / Verdicchio, Mario et al. | 2009
- 1007
-
Routing in 802.11-Based Wireless Mesh NetworksZimian, Hao / Xiong, Wei / Naixue, Xiong / Yuhan, He et al. | 2009
- 1008
-
Witness-Based Collusion and Trust-Aware SocietiesSalehi-Abari, Amirali / White, Tony et al. | 2009
- 1013
-
An Improved SPECK Algorithm with Bit Plane Lifting and the Optimal Single Value PredictionZhang, Xubing / Zhu, Yong / Fu, Jianhong et al. | 2009