We use cookies to improve your experience with our site.

Preface
Erik Altman, Wei-Song Shi
2013, 28(1): 1-2. DOI: 10.1007/s11390-013-1307-7
Abstract
Pinned OS/Services: A Case Study of XML Parsing on Intel SCC
Jie Tang, Pollawat Thanarungroj, Chen Liu, Shao-Shan Liu, Zhi-Min Gu, Jean-Luc Gaudiot
2013, 28(1): 3-13. DOI: 10.1007/s11390-013-1308-6
Abstract
Reorder Write Sequence by Hetero-Buffer to Extend SSD's Lifespan
Zhi-Guang Chen, Nong Xiao, Fang Liu, Yi-Mo Du
2013, 28(1): 14-27. DOI: 10.1007/s11390-013-1309-5
Abstract
CSWL: Cross-SSD Wear-Leveling Method in SSD-Based RAID Systems for System Endurance and Performance
Yi-Mo Du, Nong Xiao, Fang Liu, Zhi-Guang Chen
2013, 28(1): 28-41. DOI: 10.1007/s11390-013-1310-z
Abstract
Power Adjusting Algorithm: A New Cross-Layer Power Saving Mechanism for Mobile Ad-Hoc Networks
Jin-Tao Meng, Jian-Rui Yuan, Sheng-Zhong Feng, Lian-Sheng Tan
2013, 28(1): 42-53. DOI: 10.1007/s11390-013-1311-y
Abstract
Energy Efficient Run-Time Incremental Mapping for 3-D Networks-on-Chip
Xiao-Hang Wang, Peng Liu, Mei Yang, Maurizio Palesi, Ying-Tao Jiang, Michael C Huang
2013, 28(1): 54-71. DOI: 10.1007/s11390-013-1312-x
Abstract
Design and Implementation of an Extended Collectives Library for Unified Parallel C
Carlos Teijeiro, Guillermo L. Taboada, Juan Touriño, Ramón Doallo, José C. Mouriño, Damián A. Mallón, Brian Wibecan
2013, 28(1): 72-89. DOI: 10.1007/s11390-013-1313-9
Abstract
MPFFT: An Auto-Tuning FFT Library for OpenCL GPUs
Yan Li, Yun-Quan Zhang, Yi-Qun Liu, Guo-Ping Long, Hai-Peng Jia
2013, 28(1): 90-105. DOI: 10.1007/s11390-013-1314-8
Abstract
Resources Snapshot Model for Concurrent Transactions in Multi-Core Processors
Lei Zhao, Ji-Wen Yang
2013, 28(1): 106-118. DOI: 10.1007/s11390-013-1315-7
Abstract
TSV Minimization for Circuit — Partitioned 3D SoC Test Wrapper Design
Yuan-Qing Cheng, Lei Zhang, Yin-He Han, Xiao-Wei Li
2013, 28(1): 119-128. DOI: 10.1007/s11390-013-1316-6
Abstract
Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD
Gao-Li Wang
2013, 28(1): 129-143. DOI: 10.1007/s11390-013-1317-5
Abstract
A New Batch Verifying Scheme for Identifying Illegal Signatures
Adrian Atanasiu
2013, 28(1): 144-151. DOI: 10.1007/s11390-013-1318-4
Abstract
A Secure Scalar Product Protocol Against Malicious Adversaries
Bo Yang, Yong Yu, Chung-Huang Yang
2013, 28(1): 152-158. DOI: 10.1007/s11390-013-1319-3
Abstract
Cryptanalysis of Reduced-Round DASH
Shu-Sheng Liu, Zheng Gong, Li-Bin Wang
2013, 28(1): 159-164. DOI: 10.1007/s11390-013-1320-x
Abstract
Fuzzy Self-Adaptation of Mission-Critical Software Under Uncertainty
Qi-Liang Yang, Jian Lv, Xian-Ping Tao, Xiao-Xing Ma, Jian-Chun Xing, Wei Song
2013, 28(1): 165-187. DOI: 10.1007/s11390-013-1321-9
Abstract
Towards a Formal Semantics for UML/MARTE State Machines Based on Hierarchical Timed Automata
Yu Zhou, Luciano Baresi, Matteo Rossi
2013, 28(1): 188-202. DOI: 10.1007/s11390-013-1322-8
Abstract
Nondeterministic Probabilistic Petri Net — A New Method to Study Qualitative and Quantitative Behaviors of System
Yang Liu, Huai-Kou Miao, Hong-Wei Zeng, Yan Ma, Pan Liu
2013, 28(1): 203-216. DOI: 10.1007/s11390-013-1323-7
Abstract