default search action
NPC 2004: Wuhan, China
- Hai Jin, Guang R. Gao, Zhiwei Xu, Hao Chen:
Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings. Lecture Notes in Computer Science 3222, Springer 2004, ISBN 3-540-23388-1 - Kai Hwang:
Secure Grid Computing with Trusted Resources and Internet Datamining. 1 - Thomas L. Sterling:
Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops Computing. 2 - José A. B. Fortes:
In-VIGO: Making the Grid Virtually Yours. 3 - Bob Kuhn:
Productivity in HPC Clusters. 4 - C. Richard Attanasio, Jong-Deok Choi, Niteesh Dubey, Kattamuri Ekanadham, Manish Gupta, Tatsushi Inagaki, Kazuaki Ishizaki, Joefon Jann, Robert D. Johnson, Toshio Nakatani, Il Park, Pratap Pattnaik, Mauricio J. Serrano, Stephen E. Smith, Ian M. Steiner, Yefim Shuf:
Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems. 5-8
Session 1: Grid Computing
- Shanshan Song, Kai Hwang, Mikin Macwan:
Fuzzy Trust Integration for Security Enforcement in Grid Computing. 9-21 - Sushant Goel, Hema Sharda, David Taniar:
Atomic Commitment in Grid Database Systems. 22-29 - Nong Xiao, Xiaonian Wu, Wei Fu, Xiangli Qu:
A Data Grid Security System Based on Shared Context. 30-37 - Sarbani Roy, Nandini Mukherjee:
A Study on Performance Monitoring Techniques for Traditional Parallel Systems and Grid. 38-46 - Yong-won Kwon, So-Hyun Ryu, Jin-Sung Park, Chang-Sung Jeong:
A Workflow-Based Grid Portal for Problem Solving Environment. 47-56 - Feilong Tang, Minglu Li, Joshua Zhexue Huang, Lei Cao, Yi Wang:
A Real-Time Transaction Approach for Grid Services: A Model and Algorithms. 57-64 - Chan-Hyun Youn, Byungsang Kim, Dong Su Nam, Eung-Suk An, Bong-Hwan Lee, Eun Bo Shim, Gari D. Clifford:
QoS Quorum-Constrained Resource Management in Wireless Grid. 65-72 - Huy Le, Paul D. Coddington, Andrew L. Wendelborn:
A Data-Aware Resource Broker for Data Grids. 73-82 - Yuzhong Sun, Haiyan Yu, JiPing Cai, Li Zha, Yili Gong:
Managing Service-Oriented Grids: Experiences from VEGA System Software. 83-91 - Chao-Tung Yang, Kuan-Wei Cheng, Kuan-Ching Li:
An Efficient Parallel Loop Self-scheduling on Grid Environments. 92-100 - Yong Meng Teo, Xianbing Wang:
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing. 101-109 - Ganmei You, Huaming Liao, Yuzhong Sun:
Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System. 110-117 - Ai-Hua Yin:
A Heuristic Algorithm for the Job Shop Scheduling Problem. 118-128 - Huashan Yu, Zhuoqun Xu, Wenkui Ding:
Coordinating Distributed Resources for Complex Scientific Computation. 129-132 - Ming Chen, Yongwei Wu, Guangwen Yang, Xuezheng Liu:
Efficiently Rationing Resources for Grid and P2P Computing. 133-136 - Fei Liu, Fanyuan Ma, Shui Yu, Minglu Li:
Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network. 137-140 - Bixin Liu, Yufeng Wang, Bin Zhou, Yan Jia:
Collaborative Process Execution for Service Composition with StarWebService. 141-145
Session 2: Peer-to-Peer Computing
- Yunhao Liu, Li Xiao, Lionel M. Ni, Baijian Yang:
Efficient Gnutella-like P2P Overlay Construction. 146-153 - Xuezheng Liu, Guangwen Yang, Jinfeng Hu, Ming Chen, Yongwei Wu:
Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer Overlays. 154-166 - Yajie Liu, Wenhua Dou, Zhifeng Liu:
Layer Allocation Algorithms in Layered Peer-to-Peer Streaming. 167-174 - Yin Li, Futai Zou, Fanyuan Ma, Minglu Li:
Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network. 175-182 - Hairong Jin, Shanping Li, Gang Peng, Tianchi Ma:
Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems. 183-186
Session 3: Web Techniques
- Keqiu Li, Hong Shen, Keishi Tajima:
Cache Design for Transcoding Proxy Caching. 187-194 - Su Myeon Kim, Jinwon Lee, SungJae Jo, Junehwa Song:
Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication Services. 195-204 - Sanghoon Song, Taekyoung Kwon:
Domain-Based Proxy for Efficient Location Tracking of Mobile Agents. 205-212
Session 4: Cluster Computing
- Hermes Senger, Eduardo R. Hruschka, Fabrício Alves Barbosa da Silva, Liria Matsumoto Sato, Calebe De Paula Bianchini, Marcelo D. Esperidiãao:
Inhambu: Data Mining Using Idle Cycles in Clusters of PCs. 213-220 - MinHwan Ok, Myong-Soon Park:
Request Distribution for Fairness with a New Load-Update Mechanism in Web Server Cluster. 221-229 - Ping-Yu Hsu, Ping-Ho Ting:
Profile Oriented User Distributions in Enterprise Systems with Clustering. 230-237 - Dafu Deng, Hai Jin, Xiaofei Liao, Hao Chen:
CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers. 238-243 - Rongfeng Tang, Dan Meng, Jin Xiong:
SuperNBD: An Efficient Network Storage Software for Cluster. 244-247 - Dan Feng, Hong Jiang, Yifeng Zhu:
I/O Response Time in a Fault-Tolerant Parallel Virtual File System. 248-251 - Bin Cai, Changsheng Xie, Jin Ren, Faling Yi:
SARCNFS: Self-Adaptive Redundancy Clustered NAS File System. 252-255 - Yong Feng, Yan-yuan Zhang, Rui-yong Jia:
Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery. 256-260
Session 5: Parallel Programming and Environment
- Zhen Yao, Qilong Zheng, Guoliang Chen:
GOOMPI: A Generic Object Oriented Message Passing Interface. 261-271 - E. V. Krishnamurthy, Vikram Krishnamurthy:
Simulating Complex Dynamical Systems in a Distributed Programming Environment. 272-279 - Jung Hee Kim, Hyun-chul Sim, Yong-hyeog Kang, Young Ik Eom:
Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems. 280-283
Session 6: Network Architecture
- Geyong Min, Mohamed Ould-Khaoua:
Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated Traffic. 284-291 - Wei Shi, Pradip K. Srimani:
Leader Election in Hyper-Butterfly Graphs. 292-299 - Zhi Li, Yu-Kwong Kwok:
A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks. 300-307 - Dongsheng Li, Xicheng Lu, Jinshu Su:
Graph-Theoretic Analysis of Kautz Topology and DHT Schemes. 308-315 - Xiaoheng Deng, Zhigang Chen, Lianming Zhang:
A Parameterized Model of TCP Slow Start. 316-324 - Qing Zhang, Huiqiong Chen, Weiwei Sun, Bole Shi:
SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc Networks. 325-332 - Duan Zhang, Huaping Dai, Youxian Sun:
A Dioid Linear Algebra Approach to Study a Class of Continuous Petri Nets. 333-340 - Nils Agne Nordbotten, María Engracia Gómez, José Flich, Pedro López, Antonio Robles, Tor Skeie, Olav Lysne, José Duato:
A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate Nodes. 341-356 - Jiming Chen, Zhi Wang, Yeqiong Song, Youxian Sun:
Extended DBP for (m, k)-Firm Based QoS. 357-365 - Sang-Ho Lee, Dong Ryeol Shin, Hee Yong Youn:
Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches. 366-373 - Young-Hoon Cho, Moon-Sang Jeong, Jong-Tae Park:
A Scalable Distributed Architecture for Multi-party Conferencing Using SIP. 374-381 - Masaru Takesue:
DC-mesh: A Contracted High-Dimensional Mesh for Dynamic Clustering. 382-389 - Hashem Hashemi Najaf-abadi, Hamid Sarbazi-Azad:
The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic Patterns. 390-398 - Ming Li, Jingao Liu, Dongyang Long:
An Empirical Autocorrelation Form for Modeling LRD Traffic Series. 399-402 - Ming Li:
Statistical Error Analysis on Recording LRD Traffic Time Series. 403-406 - Furong Wang, Ye Wu:
Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture. 407-410
Session 7: Network Security
- Marcin Seredynski, Krzysztof Pienkosz, Pascal Bouvry:
Reversible Cellular Automata Based Encryption. 411-418 - Yanxiang He, Wei Chen, Min Yang, Wenling Peng:
Ontology Based Cooperative Intrusion Detection System. 419-426 - Hao Yin, Zhangxi Tan, Chuang Lin, Guangxi Zhu:
Adding Security to Network Via Network Processors. 427-434 - Chi-Hung Chi, Ming Li, Dongxi Liu:
A Method to Obtain Signatures from Honeypots Data. 435-442 - Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan:
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description. 443-450 - GeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song:
Design and Analysis of Improved GSM Authentication Protocol for Roaming Users. 451-458 - Shengyi Jiang, Qinghua Li, Hui Wang:
A Novel Intrusion Detection Method. 459-462
Session 8: Network Storage
- Jiwu Shu, Rui Yan, Dongchan Wen, Weimin Zheng:
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs. 463-472 - Young Jin Nam, Junkil Ryu, Chanik Park, Jong Suk Ahn:
A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees. 473-480 - Ming Chen, Guangwen Yang, Yongwei Wu, Xuezheng Liu:
Paramecium: Assembling Raw Nodes into Composite Cells. 481-484 - Youhui Zhang, Jinfeng Hu, Weimin Zheng:
The Flexible Replication Method in an Object-Oriented Data Storage System. 485-488 - Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang:
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System. 489-492 - Kai Ouyang, Jingli Zhou, Tao Xia, Shengsheng Yu:
The NDMP-Plus Prototype Design and Implementation for Network Based Data Management. 493-497
Session 9: Multimedia Service
- Haifang Zhou, Xuejun Yang, Yu Tang, Nong Xiao:
Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components Graph. 498-501 - Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang:
The Transmitted Strategy of Proxy Cache Based on Segmented Video. 502-507 - Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang:
The Strategy of Batch Using Dynamic Cache for Streaming Media. 508-512 - Li-bao Zhang, Ke Wang:
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. 513-516
Workshop 1: Building Intelligent Sensor Networks
- Jonathan M. Cooper, Erik A. Johannessen, David R. S. Cumming:
Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic Screening. 517-521 - Xinxia Cai, Dafu Cui:
The Development of Biosensors and Biochips in IECAS. 522-525 - Yiqiang Chen, Wen Gao, Junfa Liu:
Open Issues on Intelligent Sensor Networks. 526-526 - John Crawford:
Enabling Anytime Anywhere Wireless Sensor Networks. 527-527 - Jinbao Li, Jianzhong Li, Shengfei Shi:
A Query-Aware Routing Algorithm in Sensor Networks. 528-535 - Henry (Hui) Wang, Anna L. Buczak, Hong Jin, Hongan Wang, Baosen Li:
Sensor Network Optimization by a Novel Genetic Algorithm. 536-543 - Xiuli Ma, Dongqing Yang, Shiwei Tang, Qiong Luo, Dehui Zhang, Shuangfeng Li:
Online Mining in Sensor Networks. 544-550 - Wenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo:
The HKUST Frog Pond - A Case Study of Sensory Data Analysis. 551-558 - Wen Gao, Lionel M. Ni, Zhiwei Xu:
BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive Scale. 559-564 - Li Cui, Fei Wang, Haiyong Luo, Hailing Ju, Tianpu Li:
A Pervasive Sensor Node Architecture. 565-567 - Chang Xu, Shing-Chi Cheung, Cindy Lo, Ka-Chung Leung, Jun Wei:
Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications. 568-575 - Hejun Wu, Qiong Luo, Pei Zheng, Bingsheng He, Lionel M. Ni:
Accurate Emulation of Wireless Sensor Networks. 576-583 - Qiang Yang, Yiqiang Chen, Jie Yin, Xiaoyong Chai:
LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment. 584-591 - Jian Wu, Stefan Dulman, Paul J. M. Havinga:
Reliable Splitted Multipath Routing for Wireless Sensor Network. 592-600 - Kam-yiu Lam, Henry Chi-Wai Pang, Sang Hyuk Son, BiYu Liang:
Reliable Data Aggregation for Real-Time Queries in Wireless Sensor Systems. 601-610
Workshop 2: Multimedia Modeling and the Security in the Next Generation Network Information Systems
- Keun-Wang Lee, Jae-Pyo Park, Kwang-Hyoung Lee, Jong-Hee Lee, HeeSook Kim:
The Design of a DRM System Using PKI and a Licensing Agent. 611-617 - Gi-sung Lee, Hong-Jin Kim, Il-Sun Hwang:
Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile Networks. 618-625 - Jongchan Lee, Seung-Jae Yoo, Dong Chun Lee:
Fuzzy Logic Adaptive Mobile Location Estimation. 626-634 - Hyuncheol Kim, Sunghae Kim, Seong-Jin Ahn, Jin-Wook Chung:
A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability. 635-643 - Yonghak Ahn, Oksam Chae:
A Design and Implementation of Network Traffic Monitoring System for PC-room Management. 644-652 - Youngmi Kwon, Hui Jae Lee, Geuk Lee:
A Vulnerability Assessment Tool Based on OVAL in Linux System. 653-660 - Hyung Jin Kim, Bongsoo Son, Soobeom Lee:
Performance Analysis of Delay Estimation Models for Signalized Intersection Networks. 661-669 - Min Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee:
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy. 670-675 - Sang Woon Lee, Kyoo Jin Han, Keum Chan Whang:
Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting Networks. 676-683 - Dong Chun Lee, Hong-Jin Kim, Jae-Young Koh:
Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks. 684-690
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.