index - Network and Parallel Computing Access content directly
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Network and Parallel Computing
James Park, Albert Zomaya, Sang-Soo Yeo, Sartaj Sahni (Eds.)
Front Matter

Algorithms, Scheduling, Analysis, and Data Mining


An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments
Jian Xiao, Yu Zhang, Shuwei Chen, Huashan Yu
1-13
DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph
Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng
14-21
Knowledge-Based Adaptive Self-Scheduling
Yizhuo Wang, Weixing Ji, Feng Shi, Qi Zuo, Ning Deng
22-32
Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor
Shahnawaz Talpur, Feng Shi, Yizhuo Wang
33-41
A Scoring System for Short Answers on the Test in a Large Group
Jae-Young Lee
42-47

Network Architecture and Protocol Design


Reference Variables for Dynamic, Reliable Packet Operations
Ralph Duncan, Peder Jungck, Kenneth Ross, Dwight Mulcahy
48-60
Are Heterogeneous Cellular Networks Superior to Homogeneous Ones?
Shelly Salim, Christian Oey, Sangman Moh
61-68
Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks
Longbo Zhang, Chen Yu, Hai Jin
69-76
A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems
Narjes Soltani, Ehsan Khaneghah, Mohsen Sharifi, Seyedeh Mirtaheri
77-84
NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation
Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu
85-93

Network Security


Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network
Muhammad Ahmed, Xu Huang, Dharmendra Sharma
94-100
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis
Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Park
101-109
Breaking a Robust Remote User Authentication Scheme Using Smart Cards
Ding Wang, Chun-Guang Ma, Sen-Dong Zhao, Chang-Li Zhou
110-118
An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs
Irfana Memon
119-128
Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites
R. Krishnaveni, C. Chellappan, R. Dhanalakshmi
129-137
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing
Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won
138-144

Parallel, Distributed, and Virtualization Techniques


Small World Asynchronous Parallel Model for Genome Assembly
Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng
145-155
UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines
Haitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen
156-163
Fast Parallel Garner Algorithm for Chinese Remainder Theorem
Yongnan Li, Limin Xiao, Aihua Liang, Yao Zheng, Li Ruan
164-171
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing
Xu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan
172-179
On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network
M. Rahman, Asadullah Shah, Yasushi Inoguchi
180-187

Performance Modeling, Prediction, and Tuning


An Elastic Architecture Adaptable to Millions of Application Scenarios
Yunji Chen, Tianshi Chen, Qi Guo, Zhiwei Xu, Lei Zhang
188-195
Demystifying Performance Predictions of Distributed FFT3D Implementations
Daniel Orozco, Elkin Garcia, Robert Pavel, Orlando Ayala, Lian-Ping Wang, Guang Gao
196-207
MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms
Qiuming Luo, Chenjian Liu, Chang Kong, Ye Cai
208-216
mHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing Cluster
Gangfeng Liu, Yunlan Wang, Tianhai Zhao, Jianhua Gu, Dongyang Li
217-224

Resource Management


Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks
Wei Feng, Jian Liu, Jiannong Cao, Liang Yang, Qin Xin
225-232
Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method
Boo-Hyoung Lee, Chi-Su Kim, Heon-Tag Kong
233-240
Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case Study
Jong Park
241-247
The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples
Youngsik Kwak, Yoonjung Nam
248-255

Ubiquitous Communications and Networks


An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records
Jia Jianbin, Chen Yingwen, Xu Ming
256-263
Design and Deployment of Testbed for Experimental Sensor Network Research
Zeeshan Mir, Hyeon Park, Young Moon, Nae Kim, Cheol Pyo
264-272
Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device
Yoonsik Kwak
273-278

Web, Communication, and Cloud Computing


Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center
Lei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu
279-288
EaSync: A Transparent File Synchronization Service across Multiple Machines
Huajian Mao, Hang Zhang, Xianqiang Bao, Nong Xiao, Weisong Shi, Yutong Lu
289-296
Relationship between Correcting Code and Module Technique in Hiding Secret Data
Phan Huy, Nguyen Thanh, Cheonsick Kim
297-307
Different Characteristics of Radio Modules in Wireless Body Sensor Network Systems
Woosik Lee, Min Choi, Namgi Kim
308-314
The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services
Hyeog-In Kwon, Hi-Yeob Joo, Dae-Jin Kim, Jong-Seok Park
315-319
Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education
Namje Park, Yeonghae Ko
320-327

ATIMCN


The Performances Study of EDCF with Block_Ack in WLANs
Chien-Erh Weng, Chien-Hung Chen, Chiung-Hsing Chen, Jyh-Horng Wen
328-335
A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System
Wen-Hsu Hsiao, Hui-Kai Su, Yu-Siang Wei, Wei-Sheng Ho, Kim-Joan Chen
336-348
A New Approach for Detecting SMTPFA Based on Entropy Measurement
Hsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng
349-359
A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services
Hui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu
360-372

ATSME


The Effects of Governmental Subsidy on the Quality of Education in Taiwan’s Private Universities and Colleges
Ching-Hui Shih
373-380
Examining the Effectiveness of a Distant Learning Education Program: Use of Patient Safety and Reporting Law and Ethics as Example
Chiou-Fen Lin, Meei-Ling Shyu, Meei-Shiow Lu, Chung-I Huang
381-385
The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill Training
Hung-Chang Lin, Yao-Hua Wang
386-393
The Difference Analysis between Demographic Variables and Personal Attributes – The Case of Internal Auditors in Taiwan
Li-Jia Chiu, Neng-Tang Huang
394-400
Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example
Guo-Hong Lei, Mey-Tyng Wang
401-408
Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness
Shiang-Lan Kuo
409-413
Soft Power: A Critical Factor for the Effectiveness and Development of a School
Hui-Min Ko
414-420

Cloud & Grid


Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor Networks
Ying-Hong Wang, Yu-Wei Lin, Yu-Yu Lin, Hang-Ming Chang
421-428
A Termination Detection Technique Using Gossip in Cloud Computing Environments
Jongbeom Lim, Kwang-Sik Chung, Heon-Chang Yu
429-436
OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science
Zhiming Zhao, Paola Grosso, Cees Laat
437-444
Using PCI Pass-Through for GPU Virtualization with CUDA
Chao-Tung Yang, Hsien-Yi Wang, Yu-Tso Liu
445-452

DATICS


Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options
Nan Zhang, Ka Man
453-462
Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems
Jieming Ma, Ka Man, T. Ting, Hyunshin Lee, Taikyeong Jeong, Jong-Kug Sean, Sheng-Uei Guan, Prudence Wong
463-471
Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model
Nan Zhang, Ka Man, Eng Lim
472-481
Evolving Linear Discriminant in a Continuously Growing Dimensional Space for Incremental Attribute Learning
Ting Wang, Sheng-Uei Guan, T. Ting, Ka Man, Fei Liu
482-491
Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem
M. Wong, Ka Man
492-499
Space Exploration of Multi-agent Robotics via Genetic Algorithm
T. Ting, Kaiyu Wan, Ka Man, Sanghyuk Lee
500-507
Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems
T. Ting, Ka Man, Sheng-Uei Guan, Mohamed Nayel, Kaiyu Wan
508-515
Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units
Mouna Karmani, Chiraz Khedhiri, Belgacem Hamdi, Amir-Mohammad Rahmani, Ka Man, Kaiyu Wan
516-523

UMAS


New Electronic Acupuncture System Using Intelligence
You-Sik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee
524-531
A Runtime Environment for Distributed Mashups in Multi-device Scenarios
Oliver Mroß, Klaus Meißner
532-541
A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks
Le Dung, Beongku An
542-549
Nibble-CRC for Underwater Acoustic Communication
Imtiaz Khan, Nam-Yeol Yun, Soo-Hyun Park
550-558
An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations
Sangyong Lee, Cheonshik Kim, Seongah Chin
559-564
Research on a Smart Input Device Using Multimodal Bio-signal Interface
Hyunju Lee, Taehyun Kim, Dongkyoo Shin, Heewon Park, Soohan Kim, Dongil Shin
565-574
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader
Eun-Jun Yoon
575-580
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme
Hae-Jung Kim, Eun-Jun Yoon
581-588
Energy-Efficiency Protocol for Securing the Wireless Sensor Networks
Luu Long, Eunmi Choi
589-598
A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI
Do-Hoon Kim, Jungwook Wee, Kyu-Sung Hwang
599-607
SNR-Based Partial Relay Selection Scheme over Multiple Relay Network
Kyu-Sung Hwang
608-615
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency
Guoqing Li, Guangling Sun, Xinpeng Zhang
616-624
Algorithms Based on Finite Automata for Testing of Z-codes
Dang Thang, Nguyen Han, Phan Huy
625-635
Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor
Sooill Lee
636-644

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/