Kai Hwang (auth.), Hai Jin, Guang R. Gao, Zhiwei Xu, Hao Chen (eds.)9783540233886, 3540233881
Table of contents :
Front Matter….Pages –
Secure Grid Computing with Trusted Resources and Internet Datamining….Pages 1-1
Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops Computing….Pages 2-2
In-VIGO: Making the Grid Virtually Yours….Pages 3-3
Productivity in HPC Clusters….Pages 4-4
Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems….Pages 5-8
Fuzzy Trust Integration for Security Enforcement in Grid Computing….Pages 9-21
Atomic Commitment in Grid Database Systems….Pages 22-29
A Data Grid Security System Based on Shared Context….Pages 30-37
A Study on Performance Monitoring Techniques for Traditional Parallel Systems and Grid….Pages 38-46
A Workflow-Based Grid Portal for Problem Solving Environment….Pages 47-56
A Real-Time Transaction Approach for Grid Services: A Model and Algorithms….Pages 57-64
QoS Quorum-Constrained Resource Management in Wireless Grid….Pages 65-72
A Data-Aware Resource Broker for Data Grids….Pages 73-82
Managing Service-Oriented Grids: Experiences from VEGA System Software….Pages 83-91
An Efficient Parallel Loop Self-scheduling on Grid Environments….Pages 92-100
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing….Pages 101-109
Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System….Pages 110-117
A Heuristic Algorithm for the Job Shop Scheduling Problem….Pages 118-128
Coordinating Distributed Resources for Complex Scientific Computation….Pages 129-132
Efficiently Rationing Resources for Grid and P2P Computing….Pages 133-136
Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network….Pages 137-140
Collaborative Process Execution for Service Composition with StarWebService….Pages 141-145
Efficient Gnutella-like P2P Overlay Construction….Pages 146-153
Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer Overlays….Pages 154-166
Layer Allocation Algorithms in Layered Peer-to-Peer Streaming….Pages 167-174
Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network….Pages 175-182
Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems….Pages 183-186
Cache Design for Transcoding Proxy Caching….Pages 187-194
Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication Services….Pages 195-204
Domain-Based Proxy for Efficient Location Tracking of Mobile Agents….Pages 205-212
Inhambu: Data Mining Using Idle Cycles in Clusters of PCs….Pages 213-220
Request Distribution for Fairness with a New Load-Update Mechanism in Web Server Cluster….Pages 221-229
Profile Oriented User Distributions in Enterprise Systems with Clustering….Pages 230-237
CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers….Pages 238-243
SuperNBD: An Efficient Network Storage Software for Cluster….Pages 244-247
I/O Response Time in a Fault-Tolerant Parallel Virtual File System….Pages 248-251
SARCNFS: Self-Adaptive Redundancy Clustered NAS File System….Pages 252-255
Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery….Pages 256-260
GOOMPI: A Generic Object Oriented Message Passing Interface….Pages 261-271
Simulating Complex Dynamical Systems in a Distributed Programming Environment….Pages 272-279
Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems….Pages 280-283
Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated Traffic….Pages 284-291
Leader Election in Hyper-Butterfly Graphs….Pages 292-299
A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks….Pages 300-307
Graph-Theoretic Analysis of Kautz Topology and DHT Schemes….Pages 308-315
A Parameterized Model of TCP Slow Start….Pages 316-324
SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc Networks….Pages 325-332
A Dioid Linear Algebra Approach to Study a Class of Continuous Petri Nets….Pages 333-340
A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate Nodes….Pages 341-356
Extended DBP for (m,k)-Firm Based QoS….Pages 357-365
Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches….Pages 366-373
A Scalable Distributed Architecture for Multi-party Conferencing Using SIP….Pages 374-381
DC-mesh: A Contracted High-Dimensional Mesh for Dynamic Clustering….Pages 382-389
The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic Patterns….Pages 390-398
An Empirical Autocorrelation Form for Modeling LRD Traffic Series….Pages 399-402
Statistical Error Analysis on Recording LRD Traffic Time Series….Pages 403-406
Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture….Pages 407-410
Reversible Cellular Automata Based Encryption….Pages 411-418
Ontology Based Cooperative Intrusion Detection System….Pages 419-426
Adding Security to Network Via Network Processors….Pages 427-434
A Method to Obtain Signatures from Honeypots Data….Pages 435-442
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description….Pages 443-450
Design and Analysis of Improved GSM Authentication Protocol for Roaming Users….Pages 451-458
A Novel Intrusion Detection Method….Pages 459-462
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs….Pages 463-472
A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees….Pages 473-480
Paramecium: Assembling Raw Nodes into Composite Cells….Pages 481-484
The Flexible Replication Method in an Object-Oriented Data Storage System….Pages 485-488
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System….Pages 489-492
The NDMP-Plus Prototype Design and Implementation for Network Based Data Management….Pages 493-497
Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components Graph….Pages 498-501
The Transmitted Strategy of Proxy Cache Based on Segmented Video….Pages 502-507
The Strategy of Batch Using Dynamic Cache for Streaming Media….Pages 508-512
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications….Pages 513-516
Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic Screening….Pages 517-521
The Development of Biosensors and Biochips in IECAS….Pages 522-525
Open Issues on Intelligent Sensor Networks….Pages 526-526
Enabling Anytime Anywhere Wireless Sensor Networks….Pages 527-527
A Query-Aware Routing Algorithm in Sensor Networks….Pages 528-535
Sensors Network Optimization by a Novel Genetic Algorithm….Pages 536-543
Online Mining in Sensor Networks….Pages 544-550
The HKUST Frog Pond – A Case Study of Sensory Data Analysis….Pages 551-558
BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive Scale….Pages 559-564
A Pervasive Sensor Node Architecture….Pages 565-567
Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications….Pages 568-575
Accurate Emulation of Wireless Sensor Networks….Pages 576-583
LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment….Pages 584-591
Reliable Splitted Multipath Routing for Wireless Sensor Networks….Pages 592-600
Reliable Data Aggregation for Real-Time Queries in Wireless Sensor Systems….Pages 601-610
The Design of a DRM System Using PKI and a Licensing Agent….Pages 611-617
Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile Networks….Pages 618-625
Fuzzy Logic Adaptive Mobile Location Estimation….Pages 626-634
A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability….Pages 635-643
A Design and Implementation of Network Traffic Monitoring System for PC-room Management….Pages 644-652
A Vulnerability Assessment Tool Based on OVAL in Linux System….Pages 653-660
Performance Analysis of Delay Estimation Models for Signalized Intersection Networks….Pages 661-669
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy….Pages 670-675
Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting Networks….Pages 676-683
Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks….Pages 684-690
Back Matter….Pages –
Reviews
There are no reviews yet.