L. Zhang, G. Liu, X. Zhang, and .. , Song Jiang, and Enhong Chen Embedding Algorithms for Bubble-Sort, Macro-Star, and Transposition Graphs, 134 HyeongOk Lee

J. Jin, Y. Zhang, Y. Cao, and .. , Xing Pu, and Jiaxin Li Identifying Nearest Neighbor Nodes and Connectivity in Three-Dimensional Wireless Sensor Networks Using Poisson Point Field

Y. Qu, P. Networks, and .. , Jianan Fang, and Shuai Zhang A Novel Trust Evaluation Model for Mobile, p.210

W. Zhou, J. Zhan, and .. , Dan Meng, and Zhihong Zhang Differentiated Replication Strategy in Data Centers, p.277

T. Nguyen, A. Cutway, and .. , and Weisong Shi Efficient Pipelining Parallel Methods for Image Compositing in Sort-Last Rendering, p.289

W. Fang, G. Sun, P. Zheng, G. Platform, and .. , Tiening He, and Guoliang Chen Session 5: GPU and Multicore memCUDA: Map Device Memory to Host Memory on, p.299

L. Zheng, M. Dong, H. Jin, M. Guo, and .. , Song Guo, and Xuping Tu XII Table of Contents Session 6: Cloud and Grid Infrastructure Improve Throughput of Storage Cluster Interconnected with a TCP/IP Network Using Intelligent Server Grouping, p.373

X. Zhang, G. Liu, and S. , 390 Kejiang Ye, Xiaohong Jiang, Qinming He, Xing Li, and Jianhai Chen A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme, p.402

J. Peng and X. Lu, Boqun Cheng, and Li Zha User-Centric Privacy Preservation in Data-Sharing Applications, p.423

H. Liu, F. Cao, D. Liu, and N. , Xuecheng Zou, and Zhigang Zhang A Worst Case Performance Model for TDM Virtual Circuit in NoCs, 452 Zhipeng Chen and Axel Jantsch Convex-Based DOR Routing for Virtualization, p.462