index - Network and Parallel Computing
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Network and Parallel Computing
James Park, Albert Zomaya, Sang-Soo Yeo, Sartaj Sahni (Eds.)
Front Matter

Algorithms, Scheduling, Analysis, and Data Mining


An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments
Jian Xiao, Yu Zhang, Shuwei Chen, Huashan Yu
1-13
DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph
Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng
14-21
Knowledge-Based Adaptive Self-Scheduling
Yizhuo Wang, Weixing Ji, Feng Shi, Qi Zuo, Ning Deng
22-32
Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor
Shahnawaz Talpur, Feng Shi, Yizhuo Wang
33-41
A Scoring System for Short Answers on the Test in a Large Group
Jae-Young Lee
42-47

Network Architecture and Protocol Design


Reference Variables for Dynamic, Reliable Packet Operations
Ralph Duncan, Peder Jungck, Kenneth Ross, Dwight Mulcahy
48-60
Are Heterogeneous Cellular Networks Superior to Homogeneous Ones?
Shelly Salim, Christian Oey, Sangman Moh
61-68
Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks
Longbo Zhang, Chen Yu, Hai Jin
69-76
A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems
Narjes Soltani, Ehsan Khaneghah, Mohsen Sharifi, Seyedeh Mirtaheri
77-84
NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation
Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu
85-93

Network Security


Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network
Muhammad Ahmed, Xu Huang, Dharmendra Sharma
94-100
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis
Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Park
101-109
Breaking a Robust Remote User Authentication Scheme Using Smart Cards
Ding Wang, Chun-Guang Ma, Sen-Dong Zhao, Chang-Li Zhou
110-118
An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs
Irfana Memon
119-128
Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites
R. Krishnaveni, C. Chellappan, R. Dhanalakshmi
129-137
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing
Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won
138-144

Parallel, Distributed, and Virtualization Techniques


Small World Asynchronous Parallel Model for Genome Assembly
Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng
145-155
UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines
Haitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen
156-163
Fast Parallel Garner Algorithm for Chinese Remainder Theorem
Yongnan Li, Limin Xiao, Aihua Liang, Yao Zheng, Li Ruan
164-171
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing
Xu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan
172-179
On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network
M. Rahman, Asadullah Shah, Yasushi Inoguchi
180-187

Performance Modeling, Prediction, and Tuning


An Elastic Architecture Adaptable to Millions of Application Scenarios
Yunji Chen, Tianshi Chen, Qi Guo, Zhiwei Xu, Lei Zhang
188-195
Demystifying Performance Predictions of Distributed FFT3D Implementations
Daniel Orozco, Elkin Garcia, Robert Pavel, Orlando Ayala, Lian-Ping Wang, Guang Gao
196-207
MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms
Qiuming Luo, Chenjian Liu, Chang Kong, Ye Cai
208-216
mHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing Cluster
Gangfeng Liu, Yunlan Wang, Tianhai Zhao, Jianhua Gu, Dongyang Li
217-224

Resource Management


Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks
Wei Feng, Jian Liu, Jiannong Cao, Liang Yang, Qin Xin
225-232
Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method
Boo-Hyoung Lee, Chi-Su Kim, Heon-Tag Kong
233-240
Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case Study
Jong Park
241-247
The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples
Youngsik Kwak, Yoonjung Nam
248-255

Ubiquitous Communications and Networks


An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records
Jia Jianbin, Chen Yingwen, Xu Ming
256-263
Design and Deployment of Testbed for Experimental Sensor Network Research
Zeeshan Mir, Hyeon Park, Young Moon, Nae Kim, Cheol Pyo
264-272
Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device
Yoonsik Kwak
273-278

Web, Communication, and Cloud Computing


Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center
Lei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu
279-288
EaSync: A Transparent File Synchronization Service across Multiple Machines
Huajian Mao, Hang Zhang, Xianqiang Bao, Nong Xiao, Weisong Shi, Yutong Lu
289-296
Relationship between Correcting Code and Module Technique in Hiding Secret Data
Phan Huy, Nguyen Thanh, Cheonsick Kim
297-307
Different Characteristics of Radio Modules in Wireless Body Sensor Network Systems
Woosik Lee, Min Choi, Namgi Kim
308-314
The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services
Hyeog-In Kwon, Hi-Yeob Joo, Dae-Jin Kim, Jong-Seok Park
315-319
Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education
Namje Park, Yeonghae Ko
320-327

ATIMCN


The Performances Study of EDCF with Block_Ack in WLANs
Chien-Erh Weng, Chien-Hung Chen, Chiung-Hsing Chen, Jyh-Horng Wen
328-335
A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System
Wen-Hsu Hsiao, Hui-Kai Su, Yu-Siang Wei, Wei-Sheng Ho, Kim-Joan Chen
336-348
A New Approach for Detecting SMTPFA Based on Entropy Measurement
Hsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng
349-359
A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services
Hui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu
360-372

ATSME


The Effects of Governmental Subsidy on the Quality of Education in Taiwan’s Private Universities and Colleges
Ching-Hui Shih
373-380
Examining the Effectiveness of a Distant Learning Education Program: Use of Patient Safety and Reporting Law and Ethics as Example
Chiou-Fen Lin, Meei-Ling Shyu, Meei-Shiow Lu, Chung-I Huang
381-385
The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill Training
Hung-Chang Lin, Yao-Hua Wang
386-393
The Difference Analysis between Demographic Variables and Personal Attributes – The Case of Internal Auditors in Taiwan
Li-Jia Chiu, Neng-Tang Huang
394-400
Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example
Guo-Hong Lei, Mey-Tyng Wang
401-408
Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness
Shiang-Lan Kuo
409-413
Soft Power: A Critical Factor for the Effectiveness and Development of a School
Hui-Min Ko
414-420

Cloud & Grid


Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor Networks
Ying-Hong Wang, Yu-Wei Lin, Yu-Yu Lin, Hang-Ming Chang
421-428
A Termination Detection Technique Using Gossip in Cloud Computing Environments
Jongbeom Lim, Kwang-Sik Chung, Heon-Chang Yu
429-436
OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science
Zhiming Zhao, Paola Grosso, Cees Laat
437-444
Using PCI Pass-Through for GPU Virtualization with CUDA
Chao-Tung Yang, Hsien-Yi Wang, Yu-Tso Liu
445-452

DATICS


Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options
Nan Zhang, Ka Man
453-462
Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems
Jieming Ma, Ka Man, T. Ting, Hyunshin Lee, Taikyeong Jeong, Jong-Kug Sean, Sheng-Uei Guan, Prudence Wong
463-471
Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model
Nan Zhang, Ka Man, Eng Lim
472-481
Evolving Linear Discriminant in a Continuously Growing Dimensional Space for Incremental Attribute Learning
Ting Wang, Sheng-Uei Guan, T. Ting, Ka Man, Fei Liu
482-491
Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem
M. Wong, Ka Man
492-499
Space Exploration of Multi-agent Robotics via Genetic Algorithm
T. Ting, Kaiyu Wan, Ka Man, Sanghyuk Lee
500-507
Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems
T. Ting, Ka Man, Sheng-Uei Guan, Mohamed Nayel, Kaiyu Wan
508-515
Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units
Mouna Karmani, Chiraz Khedhiri, Belgacem Hamdi, Amir-Mohammad Rahmani, Ka Man, Kaiyu Wan
516-523

UMAS


New Electronic Acupuncture System Using Intelligence
You-Sik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee
524-531
A Runtime Environment for Distributed Mashups in Multi-device Scenarios
Oliver Mroß, Klaus Meißner
532-541
A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks
Le Dung, Beongku An
542-549
Nibble-CRC for Underwater Acoustic Communication
Imtiaz Khan, Nam-Yeol Yun, Soo-Hyun Park
550-558
An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations
Sangyong Lee, Cheonshik Kim, Seongah Chin
559-564
Research on a Smart Input Device Using Multimodal Bio-signal Interface
Hyunju Lee, Taehyun Kim, Dongkyoo Shin, Heewon Park, Soohan Kim, Dongil Shin
565-574
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader
Eun-Jun Yoon
575-580
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme
Hae-Jung Kim, Eun-Jun Yoon
581-588
Energy-Efficiency Protocol for Securing the Wireless Sensor Networks
Luu Long, Eunmi Choi
589-598
A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI
Do-Hoon Kim, Jungwook Wee, Kyu-Sung Hwang
599-607
SNR-Based Partial Relay Selection Scheme over Multiple Relay Network
Kyu-Sung Hwang
608-615
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency
Guoqing Li, Guangling Sun, Xinpeng Zhang
616-624
Algorithms Based on Finite Automata for Testing of Z-codes
Dang Thang, Nguyen Han, Phan Huy
625-635
Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor
Sooill Lee
636-644

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/