33rd IEEE -- International Performance Computing and Communications Conference |
IPCCC 2014 (December 5-7) Austin Texas USA |
| ||||||||||
The program can be found below and also here.
International Performance Computing and
Communications Conference (IPCCC 2014)
December 5th - December 7th,
2014
Austin, Texas, USA
Dec 5th |
Dec 6th |
Dec 7th |
|||||
7:45
– 8:00 |
Welcome and Introduction: Dr. Yu Wang TPC Chair Report: Dr. Mea Wang and Dr. Weichao Wang |
7:45
– 8:00 |
Conference
Updates |
7:45
– 8:00 |
Conference
Updates |
||
8:00
– 10:00 |
Session
1: Internet |
8:00
– 9:15 |
Keynote
1: Nick Duffield, Texas A&M University |
8:00
– 9:15 |
Session
11: Performance |
||
10:00
– 10:15 |
Break |
9:15
– 9:30 |
Break |
9:15
– 9:30 |
Break |
||
10:15
– 12:15 |
Session
2: Wireless Networks |
9:30
– 12:00 |
Session
7: Data Storage and Distribution |
Session
8: Cloud Computing |
9:30
– 11:30 |
Session
12: Security and Trust |
|
12:15
– 13:30 |
Lunch |
12:15
– 13:30 |
Lunch |
11:30 |
Conference
Adjourn |
||
13:30
– 15:30 |
Session
3: New Fields |
Session
4: Communications |
13:30
– 14:45 |
Keynote
2: Jie Wu, Temple University |
|
||
15:30
– 15:45 |
Break |
14:45
– 15:00 |
Break |
||||
15:45
– 17:45 |
Session
5: Power Consumption |
Session
6: Computer Architecture |
15:00
– 17:45 |
Session
9: Security and Data Services |
Session
10: Social Networks and Theory |
|
|
|
|
18:00
– 19:45 |
Reception
and Poster Session |
|
Session 1: Internet 1.1 Prediction and
Correction of Traffic Matrix in an IP Backbone Network Wei Liu; Ao Hong; Liang Ou; Wenchao Ding; Ge Zhang 1.2 Measuring Path
Divergence in the Internet Nazim U Ahmed; Kamil Sarac 1.3 A Programmable and
Scalable OpenFlow Switch on Heterogeneous SoC Platforms Shijie Zhou; Weirong Jiang; Viktor K. Prasanna 1.4 Design and Analysis
of Fault Tolerance Mechanism for Sparrow Wenzhuo Li; Chuang Lin 1.5 Achieving
Transparent Coexistence in a Multi-hop Secondary Network Through Distributed
Computation Xu Yuan; Yi Shi; Thomas Hou; Wenjing Lou; Scott F Midkiff; Sastry Kompella |
Session 2: Wireless Networks 2.1 Effects of Quality
of Service Schemes on the Capacity and Dimensioning of LTE Networks Fatima Furqan; Doan B Hoang; Iain B. Collings 2.2 Smoothly Truncated
Levy Walks: Toward a Realistic Mobility Model Lijuan Cao; Michael Grabchak 2.3 Network Agile
Preference-Based Prefetching for Mobile Devices JunZe Han; Xiang-Yang Li; Zenghua Zhao; Zhao Ju-min 2.4 Energy Efficient
Distributed Grouping and Scaling for Real-Time Data Compression in Sensor
Networks Thomas Szalapski; Sanjay Madria 2.5 Proximity-driven
Social Interactions and Their Impact on the Throughput Scaling of Wireless
Networks Ali Dabirmoghaddam; JJ Garcia-Luna-Aceves |
Session 3: New Fields 3.1 Accurate
Statistical Performance Modeling and Validation of Out-of-Order Processors
Using Monte Carlo Methods Waleed Alkohlani;
Jeanine Cook; Jonathan Cook 3.2 An Efficient
Certificate Revocation Scheme for Large-Scale AMI Networks Mohamed M E A Mahmoud;
Kemal Akkaya; Khaled Rabieh; Samet Tonyali 3.3 TMODF:
Trajectory-based Multi-objective Optimal Data Forwarding in Vehicular
Networks Maocai Fu; Xin Li; Fan Li; Xinyu Guo; Zhili Wu 3.4 A New
Multi-objective Microgrid Restoration Via Semidefinite Programming Liang Zhao; Wen-Zhan
Song 3.5 QGrid: Q-learning Based Routing Protocol for Vehicular Ad
Hoc Networks Ruiling Li; Fan Li; Xin Li; Yu Wang |
Session 4: Communications 4.1 A Novel Algorithm
for Sparse FFT pruning and its Applications to OFDMA Technology Shakeel Abdulla; Haewoon Nam; Jacob Abraham 4.2 An Efficient Burst
Detection Algorithm for CDMA/Adaptive TDMA based Wideband Networking SDR
Waveform Muhammad Zeeshan; Shoab Khan 4.3 ZigBee vs WiFi:
Understanding Issues and Measuring Performances of IEEE 802.11n and IEEE
802.15.4 Coexistence Zenghua Zhao; Xuanxuan Wu; Jing Zhao; Xiang-Yang Li 4.4 A Domain-specific
Language to Facilitate Software Defined Radio Parallel Executable Patterns
Deployment on Heterogeneous Architectures Lerato Mohapi 4.5 RainbowRate: MIMO Rate Adaptation in 802.11n WiLD Links Zenghua Zhao; Fucheng
Zhang; Shaoping Guo;
Xiang-Yang Li; JunZe Han |
Session 5: Power Consumption 5.1 Automated
Estimation of Power Consumption for Rapid System Level Design Yasaman Samei;
Rainer Dšmer 5.2 Performance and
Energy Evaluation of RESTful Web Services in
Raspberry Pi Luiz Nunes;
Julio Cezar Estrella;
Luis Hideo V. Nakamura; Stephan Reiff-Marganiec; Edvard Martins de Oliveira; Rafael Libardi;
Heitor Vieira 5.3 Analyzing I/O
Patterns for the Design of Energy Efficient Messenger Servers Jaemyoun Lee; Kyungtae Kang 5.4 Joint Power
Optimization Through VM Placement and Flow Scheduling in Data Centers Dawei Li; Jie Wu; Zhiyong Liu; Fa Zhang 5.5 ERUPT: Energy-efficient tRUstworthy Provenance Trees for Wireless Sensor
Networks S. M. Iftekharul Alam; David Yau; Sonia Fahmy |
Session 6: Computer Architecture 6.1 An Efficient
Spin-Lock Based Multi-Core Resource Sharing Protocol Martin Alfranseder; Michael Deubzer;
Benjamin Justus; JŸrgen Mottok; Christian Siemers 6.2 Analysis of Cache
Tuner Architectural Layouts for Multicore Embedded Systems Tosiron Adegbija;
Ann Gordon-Ross; Marisha Rawlins 6.3 A Novel
Thermal-Constrained Energy-Aware Partitioning Algorithm for Heterogeneous
Multiprocessor Real-Time Systems Bjorn Barrefors; Ying Lu; Shivashis Saha; Jitender Singh Deogun 6.4 WCET Analysis of
Static NUCA Caches Yiqiang Ding; Wei Zhang 6.5 Session-based
Access Control in Information-Centric Networks: Design and Analyses Yu Wang; Mingwei Xu; Zhen Feng; Qing Li; Qi Li |
Session 7: Data Storage and Distribution 7.1 A Hybrid
Erasure-Coded ECC Scheme to Improve Performance and Reliability of Solid
State Drives Pradeep Subedi;
Ping Huang; Xubin He; Ming Zhang;
; Jizhong Han 7.2 Enhancing the I/O
System for Virtual Machines Using High Performance SSDs Myoungwon Oh; Hyeonsang Eom; Heon Y. Yeom 7.3 Application-aware
Video-Sharing Services via Provenance in Cloud Storage Jinjun Liu; Dan Feng; Yu Hua; Bin Peng; Pengfei Zuo 7.4 Replica Placement
in Content Delivery Networks with Stochastic Demands and M/M/1 Servers Chenkai Yang; Liusheng Huang; Bing Leng; Hongli Xu; Xinglong
Wang 7.5 An Efficient
Time-Stamping Solution for Long-Term Digital Archiving Martin
Vigil; Christian Weinert; Denise Demirel; Johannes Buchmann 7.6 An Encryption and
Probability based Access Control Model for Named Data Networking Tao Chen; Kai Lei; Kuai Xu |
Session 8: Cloud Computing 8.1 SLA Aware Cost
Efficient Virtual Machines Placement in Cloud Computing Jiangtao Zhang; Zhixiang He; Hejiao Huang; Xuan Wang; Chonglin Gu; Lingmin Zhang 8.2 Achieving
Bandwidth Guarantees in Multi-tenant Cloud Networks Using A Dual-Hose Model Meng Shen;
Lixin Gao; Ke Xu; Liehuang
Zhu 8.3 Online
Combinatorial Double Auction for Mobile Cloud Computing Markets Ke Xu;
Yuchao Zhang; Xuelin Shi;
Haiyang Wang; Yong Wang; Meng
Shen 8.4 A Combinatorial
Double Auction Mechanism for Cloud Resource Group-buying Zehao Sun; Zhenyu Zhu; Long Chen; Hongli Xu; Liusheng Huang 8.5 Virtual Data
Center Allocation with Dynamic Clustering in Clouds Li Shi; Dimitrios Katramatos; Dantong Yu 8.6 Resisting Label-Neighborhood
Attacks in Outsourced Social Networks Yang Wang; Fudong Qiu; Fan Wu; Guihai Chen |
Session 9: Security and Data Services 9.1 Provenance Logic:
Enabling Multi-Event Based Trust in Mobile Sensing Xinlei (Oscar) Wang; Hao Fu; Chao Xu; Prasant Mohapatra 9.2 POLA: A
Privacy-Preserving Protocol for Location-Based Real-Time Advertising Yiming Pang; Yichen Chen; Peiyuan Liu; Fudong Qiu; Fan Wu; Guihai Chen 9.3 Efficient and
Enhanced Broadcast Authentication Protocols based on Multilevel µTESLA Xiang Li; Mengyuan Li; Na Ruan; Fan Wu; Jie Li 9.4 Randomized Routing
in Multi-Party Internet Video Conferencing Yousuk Seung;
Quan Leng; Wei Dong; Lili Qiu; Yin Zhang 9.5 ReMA: Real-Time 3D Video Streaming System for Mobile
Devices Suk Kyu Lee; Hyunsoon Kim; Woonghee Lee; Hwantae Kim; Jongtack Jung; Hwangnam Kim 9.6 Pricing and
Revenue Sharing Mechanism for Secondary Re-distribution of Data Service for
Mobile Devices Hengky Susanto;
Bhanu Kaushik; Benyuan Liu; Byung-Guk Kim 9.7 Distributed
Compressive Data Gathering in Low Duty Cycle Wireless Sensor Network Yimao Wang; Yanmin Zhu; Ruobing Jiang; Juan
Li |
Session 10: Social Networks and Theory 10.1 Hot Topic
Analysis and Content Mining in Social Media Qian Yu; Kai Zhang; Wei
Tao Weng; Kai Lei; Kuai Xu 10.2 Evaluation of a
Platform for the Provisioning of Community-Contributed Web Services Daniel
T. Vijayakumar; Qusay
Mahmoud 10.3 Patterns and
Modeling of Group Growth in Online Social Networks Jianwei Niu;
Shaluo Huang; Milica Stojmenovic 10.4 Parallelization
of Tree-to-TLV Serialization Makoto Nakayama;
Kenichi Yamazaki; Satoshi Tanaka; Hironori Kasahara 10.5 JLMC: A
Clustering Method based on Jordan-Form of Laplacian-Matrix Jianwei Niu;
Jinyang Fan; Ivan Stojmenovic 10.6
Delay-Impact-Based Local Deadline Assignment for Online Scheduling of
Distributed Soft Real-Time Applications Miao Song; Shuhui Li; Shangping Ren; Gang Quan 10.7 Maximizing
System's Total Accrued Utility Value for Parallel and Time-Sensitive
Applications Shuhui Li; Miao Song; Peng-Jun Wan; Shangping Ren |
Session 11: Performance 11.1 Performance
Enhancement in Shared-Memory Multiprocessors Using Dynamically Classified
Sharing Information Nilufar Ferdous;
Byeong Kil Lee; Eugene
John 11.2 GPU Acceleration
of Finding LPRs in DNA Sequence Based on SUA Index Shufang Du; Longjiang Guo; Chunyu Ai; Meirui Ren; Hao Qu;
Jinbao Li 11.3 Characterization
of Analytics Workloads & Similarity Analysis of Analytics, SPEC CPU and
SPEC JBB Workloads Reena Panda; Lizy K John |
Session 12: Security and Trust 12.1 EPPI: An
E-cent-based Privacy-preserving Incentive Mechanism for Participatory Sensing
Systems Xiaoguang Niu;
Meng Li; Qianyuan Chen; Qingqing Cao; Houzhen Wang 12.2 Continuous User
Identification via Touch and Movement Behavioral Biometrics Cheng Bo; Lan Zhang; Taeho Jung; JunZe Han; Xiang-Yang Li; Yu Wang 12.3 Secure Data
Provenance Compression Using Arithmetic Coding in Wireless Sensor Networks Syed Rafiul Hussain; Changda Wang; Salmin Sultana;
Elisa Bertino 12.4 Virtual
Structures and Heterogeneous Nodes in Dependency Graphs for Detecting
Metamorphic Malware Gilbert Martins;
Eduardo Souto; Rosiane deFreitas |
Poster Session: P.1 Let More Nodes
Have a Second Choice Haijun Geng,
Xingang Shi, Xia Yin, Zhiliang
Wang, and Han Zhang P.2 File-System-Level
Flash Caching for Improving Application Launch Time on Logical Hybrid Disks Changhee Han, Junhee Ryu, Dongeun
Lee, Kyungtae Kang, and Heonshik
Shin P.3 The Automatic
Configuration of Transmit Power in LTE Networks Based on Throughput Estimation Mariusz Słabicki
and Krzysztof Grochla P.4 Low-Latency
Last-Level Cache Structure Based on Grouped Cores in Chip Multi-Processor Jinbo Xu,
Kefei Wang, and Zhengbin
Pang P.5 A Knowledge
Management Approach for Testing Open Source Software Systems Tamer Abdou and Pankaj Kamthan P.6 Financial Fraud
Detection Using Social Media Crowdsourcing Timothy Matti, Yuntao Zhu, and Kuai Xu P.7 Test Oriented
Formal Model of SDN Applications Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang
Shi, Jianping Wu, and Yahui
Li P.8 An Extended
Contention Period Protocol for MIMO Wireless Networks Kittipong Warasup
and Masanori Hamamura P.9 A Portable Flood
Detection System in Oregon Rural Areas Using Heterogeneous Sensor Networks Yanwei Wu and Yun Wang P.10 A Novel Method to
Estimate Performance for a High Performance Computation Workload Joseph Issa P.11 Design of Antenna
Arrays for Isoflux Radiation in Satellite Systems Miguel Ibarra, Marco Panduro, Angel G Andrade, and Aldo Mendez P.12 Sensitivity
Analysis of Availability of Video Streaming Service in Cloud Computing Rosangela Melo P.13 A Centralized
Latency Optimization Solution for Tree-based Application Layer Multicast Xinchang Zhang, Weidong Gu, Lu Wang, Wei Zhang,
and Meng Sun P.14 Marbor: A Novel Large-Scale Graph Data Storage and
Processing Framework Wei Zhou, Yun Gao, Jizhong Han, and Zhiyong Xu P.15 Cloud-assisted
Dynamic Spectrum Access for VANET in Transportation Cyber-Physical Systems Danda B. Rawat, Nimish Sharma, Swetha Reddy, and Sachin Shetty P.16 Embedded System
Based on Microcontroller for Generating I-V Curves of Electronic Devices Mario Illera and Sergio B Sepulveda P.17 Characterizing
the Workload Dynamics of a Mobile Phone Network During the FIFA 2014 World
Cup Hayala N Curto,
Artur Ziviani, and Jussara M. Almeida |
P.18 Reducing (m,k)-Missing Rate for Overloaded
Real-Time Systems Alemayehu Mengste
and Linwei Niu P.19 Efficient
Physical Register File Allocation in Simultaneous Multi-Threading CPUs Yilin Zhang and Wei-Ming
Lin P.20 A Hybrid Link Protection
Scheme for Link-state Routing Networks Haijun Geng,
Xingang Shi, Xia Yin, Zhiliang
Wang, and Han Zhang P.21 Optimal Phase
Control for Joint Transmission and Reception with Beamforming Seonghyun Kim, Hojae Lee, Beom Kwon, Inwoong Lee, and Sanghoon Lee P.22 Cost-Comfort
Balancing in a Smart Residential Building with Bidirectional Energy Trading Abdullah Al Hasib, Nikita Nikitin, and Lasse Natvig P.23 A Heuristic for
Logical Data Buffer Allocation in Multicore Platforms Benjamin Ries, Walter Unger, Maximilian Odendahl,
and Rainer Leupers P.24 A Light-weight
Authentication Scheme Based on Message Digest and Location for Mobile Cloud
Computing Saurabh Dey,
Srinivas Sampalli, and Qiang Ye P.25 Shaping HTTP
Adaptive Streams using Receive Window Tuning Method in Home Gateway Chiheb Ben Ameur, Emmanuel Mory, and
Bernard Cousin P.26 Combinatorial JPT
based on Orthogonal Beamforming for Two-cell
Cooperation Inwoong Lee, Beom Kwon, Seonghyun Kim, Hojae Lee, and Sanghoon Lee P.27 Real-Time Data
Caches with Guaranteed Performance Enhancement Yijie Huangfu
and Wei Zhang P.28 Thread Mapping
using System-level Throughput Prediction Model for Shared Memory Multicores Reshmi Mitra,
Bharat Joshi, and Ryan Adams P.29 Empirical
Capacity Modeling and Evaluation of Delay Tolerant Network Routing Protocols Jeremiah D. Deng and
Michael Abrams P.30 A Modified
Max-Min Ant Colony Optimization Algorithm for Virtual Machines Replacement in
Cloud Datacenter Tiantian Ren P.31 A Promising
CUDA-Accelerated Vehicular Area Network Simulator Using NS-3 Abu S Asaduzzaman and Chok Yip P.32 A New Graph
Construction Method Based on K-SVD Meysam Hosseini P.33 Blackbox Security Evaluation of Chromecast
Network Communications Ali Tekeoglu and Ali Saman Tosun |
| ||
For questions, suggestions, or problems with the IPCCC website, please email the webmaster. | ||