


default search action
AICCSA 2011: Sharm El-Sheikh, Egypt
- Howard Jay Siegel, Amr El-Kadi:
The 9th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2011, Sharm El-Sheikh, Egypt, December 27-30, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0475-8
Keynotes
- Albert Y. Zomaya:
Keynote talk: Environmentally sustainable large scale distributed systems. 1 - Jean-Luc Gaudiot:
Keynote talk: Fighting Amdahl's law in many-core and GPU parallel architectures with value prediction. 1 - Frederica Darema:
Keynote talk: New frontiers through information technologies. 1
Clouds and Green Computing
- Amir I. Alfoly, Mohamed B. Abdelhalim
, Samah A. Senbel:
Economic grid fault tolerance scheduling using modified Genetic Algorithm. 1-8 - Sunirmal Khatua
, Anirban Ghosh, Nandini Mukherjee:
Application-centric Cloud management. 9-15 - Javier Aldo Balladini, Remo Suppi
, Dolores Rexachs
, Emilio Luque
:
Impact of parallel programming models and CPUs clock frequency on energy consumption of HPC systems. 16-21 - Jonathan Apodaca, Bobby Dalton Young, Luis Diego Briceno, Jay Smith, Sudeep Pasricha, Anthony A. Maciejewski
, Howard Jay Siegel, Shirish Bahirat, Bhavesh Khemka, Adrian Ramirez, Yong Zou:
Stochastically robust static resource allocation for energy minimization with a makespan constraint in a heterogeneous computing environment. 22-31
Wireless Systems and Sensor Networks
- Mayez A. Al-Mouhamed, Irfan Ali Khan, Syed Naeem Firdous
:
A reliable peer-to-peer protocol for mobile Ad-Hoc wireless networks. 32-37 - Ahmed R. Mahmood, Hussein H. Aly, Mohamed N. El-Derini:
Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks. 38-45 - Jacques M. Bahi, Mourad Hakem, Abdallah Makhoul
:
Reliable distributed data fusion scheme in unsafe sensor networks. 46-53 - Mariam Ahmed Moustafa, Moustafa A. Youssef
, Mohamed N. El-Derini:
MSR: A multipath secure reliable routing protocol for WSNs. 54-59
Bioinformatics and Biomedical Computing
- Javid Taheri, Albert Y. Zomaya
, Flávia Coimbra Delicato, Paulo F. Pires
:
Fuzz-SSVS: A Fuzzy logic based voting scheme to improve protein secondary structure prediction. 60-66 - Tai-Chun Wang, Javid Taheri, Albert Y. Zomaya
:
Averaging measurement strategies for identifying single nucleotide polymorphisms from redundant data sets. 67-74 - Kyle R. Taylor, Adam P. DeLuca
, Corey W. Goodman, Bruce W. Tompkins, Todd E. Scheetz
, Michael S. Hildebrand
, Patrick L. M. Huygen, Richard J. H. Smith
, Terry A. Braun, Thomas L. Casavant:
AudioGene: Computer-based prediction of genetic factors involved in non-syndromic hearing impairment. 75-79 - Adam P. DeLuca
, Alex H. Wagner
, Kyle R. Taylor, Ben Faga, David Thole, Val C. Sheffield
, Edwin M. Stone
, Thomas L. Casavant, Todd E. Scheetz
, Terry A. Braun:
Sequencing and disease variation detection tools and techniques. 80-83
Information Retrieval, Database, and Data Mining
- Pamela Viale, Claudia S. Frydman, Jacques Pinaton:
New methodology for modeling large scale manufacturing process: Using process mining methods and experts' knowledge. 84-89 - Dong-Chul Park, Taekyung Jeong, Yunsik Lee, Soo-Young Min:
Satellite image classification using a classifier integration model. 90-94 - Håkan Grahn
, Niklas Lavesson
, Mikael Hellborg Lapajne, Daniel Slat:
CudaRF: A CUDA-based implementation of Random Forests. 95-101 - Lamya A. Othman, Hoda Mohammed Hosny, Sherif G. Aly
:
A comparative analysis of database connection pooling implementations with emphasis on the added value of aspect orientation. 102-111
Parallel Processing and Neural Networks
- Diego Rodríguez Martínez
, Vicente Blanco Pérez
, José Carlos Cabaleiro
, Tomás Fernandez Pena
, Francisco F. Rivera
:
Estimating the effect of cache misses on the performance of parallel applications using analytical models. 112-119 - Abeer Farouk
, Hatem M. El-Boghdadi:
On the influence of selection function on the performance of fat-trees under hot-spot traffic. 120-127 - Mohammad Zebardast, Farshad Safaei:
Stochastic modeling of Scouting Switching for adaptively-routed mesh networks. 128-134 - Dong-Chul Park:
Sunspot series prediction using adaptively trained Multiscale-Bilinear Recurrent Neural Network. 135-139
Computer Security
- Ferenc Szidarovszky, Yi Luo:
On optimal strategies in protecting computer networks. 140-143 - El-Sayed M. El-Alfy
, Azzat A. Al-Sadi:
A comparative study of PVD-based schemes for data hiding in digital images. 144-149 - Ram Prasad Viswanathan, Youssif B. Al-Nashif, Salim Hariri:
Application attack detection system (AADS): An anomaly based behavior analysis approach. 150-156 - Vamsi Kambhampati, Christos Papadopoulos, Daniel Massey:
A taxonomy of capabilities based DDoS defense architectures. 157-164
Systems Frameworks and Modeling
- Mohamed Hussein, Hassan Gomaa:
An architecture-based dynamic adaptation model and framework for adaptive software systems. 165-172 - H. M. N. Dilum Bandara
, Anura P. Jayasumana:
Characteristics of multi-attribute resources/queries and implications on P2P resource discovery. 173-180 - Abdullah Aldahlawi, Esam El-Araby
, Suboh A. Suboh, Tarek A. El-Ghazawi:
Modelling the performance of an SSD-Aware storage system using least squares regression. 181-187 - Wael R. Elwasif
, David E. Bernholdt
, Samantha S. Foley, Aniruddha G. Shet, Randall Bramley:
Multi-level concurrency in a framework for integrated loosely coupled plasma simulations. 188-195
Applications
- Sakhinah Abu Bakar, Javid Taheri, Albert Y. Zomaya
:
FIS-PNN: A hybrid computational method for protein-protein interaction prediction. 196-203 - Walid E. Gomaa
:
Modeling gene regulatory networks: A survey. 204-208 - Guochun Shi, Volodymyr V. Kindratenko
, Rob Kooper
, Peter Bajcsy:
GPU acceleration of an image characterization algorithm for document similarity analysis. 209-216 - Emmanuel Agullo, Cédric Augonnet
, Jack J. Dongarra, Mathieu Faverge, Julien Langou, Hatem Ltaief
, Stanimire Tomov
:
LU factorization for accelerator-based systems. 217-224
Networks and Web-Based Systems
- Heba Nashaat
, Rawya Rizk
, Hani Mahdi
:
Performance analysis of streamed video over mobile IP based networks. 225-232 - Reginaldo Mendes, Paulo F. Pires
, Flávia Coimbra Delicato, Thaís Vasconcelos Batista
, Javid Taheri, Albert Y. Zomaya
:
Using semantic Web to build and execute ad-hoc processes. 233-240 - Jan Kasper Martinsen, Håkan Grahn
:
A methodology for evaluating JavaScript execution behavior in interactive web applications. 241-248 - Mohamed R. Atassi, Sherif G. Aly
, Amr El-Kadi:
Cooperative web caching of dynamic web content. 249-254
Computer Architecture and Accelerator-Based Computing
- Amr A. R. Sayed-Ahmed, Hossam A. H. Fahmy, Rodina Samy:
Verification of decimal floating-point fused-multiply-add operation. 255-262 - Mohamed Bakhouya
, Abderrahim Chariete, Jaafar Gaber
, Maxime Wack:
A buffer-space allocation approach for application-specific Network-on-Chip. 263-267 - Karim Yehia, Mona Safar, Hassan A. Youness
, Mohamed Abdelsalam, Ashraf Salem
:
A novel approach for system level synthesis of multi-core system architectures from TPG models. 268-275 - Supada Laosooksathit, Nichamon Naksinehaboon, Chokchai Leangsuksun:
Two-level checkpoint/restart modeling for GPGPU. 276-283
Posters
- Walaa Fathy Ahmed, Walid E. Gomaa
:
Approaches to prediction of protein structure. 284 - Mohsen Taherian, Amirali Baniasadi, Hamid Noori
:
Instruction and data cache peak temperature reduction using cache access balancing in embedded processors. 285-286 - Xiangtao Liu, Kai Cai, Yang Li:
Measuring "Sybil attacks" in Kademlia-based networks. 287-288 - Mofassir Haque, Krzysztof Pawlikowski, Sayan Kumar Ray
:
Challenges to development of multipurpose global federated testbed for Future Internet experimentation. 289-292 - Moawia Elfaki Yahia
:
Arabic text categorization based on rough set classification. 293-294 - Paulo M. Goncalves, Roberto Souto Maior de Barros:
Comparing approaches to prepare data in classification problems. 295-296 - Mustafa B. Hamad, Sami M. Sharif:
A comparson of receiver initiated DLB schemes via Parallel DFS. 297-298 - J. Martinez Canillas, Alvaro Wong
, Dolores Rexachs
, Emilio Luque
:
Predicting parallel applications performance using signatures: The workload effect. 299-300 - Lubomir Riha
, Hoda El-Sayed:
Real-time motion object tracking using GPU. 301-304

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.