default search action
NPC 2012: Gwangju, Korea
- James J. Park, Albert Y. Zomaya, Sang-Soo Yeo, Sartaj Sahni:
Network and Parallel Computing, 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6-8, 2012. Proceedings. Lecture Notes in Computer Science 7513, Springer 2012, ISBN 978-3-642-35605-6
Algorithms, Scheduling, Analysis, and Data Mining
- Jian Xiao, Yu Zhang, Shuwei Chen, Huashan Yu:
An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments. 1-13 - Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng:
DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph. 14-21 - Yizhuo Wang, Weixing Ji, Feng Shi, Qi Zuo, Ning Deng:
Knowledge-Based Adaptive Self-Scheduling. 22-32 - Shahnawaz Talpur, Feng Shi, Yizhuo Wang:
Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor. 33-41 - Jae-Young Lee:
A Scoring System for Short Answers on the Test in a Large Group. 42-47
Network Architecture and Protocol Design
- Ralph Duncan, Peder Jungck, Kenneth Ross, Dwight Mulcahy:
Reference Variables for Dynamic, Reliable Packet Operations. 48-60 - Shelly Salim, Christian Henry Wijaya Oey, Sangman Moh:
Are Heterogeneous Cellular Networks Superior to Homogeneous Ones? 61-68 - Longbo Zhang, Chen Yu, Hai Jin:
Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks. 69-76 - Narjes Soltani, Ehsan Mousavi Khaneghah, Mohsen Sharifi, Seyedeh Leili Mirtaheri:
A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems. 77-84 - Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu:
NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation. 85-93
Network Security
- Muhammad Ahmed, Xu Huang, Dharmendra Sharma:
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. 94-100 - Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Hyuk Park:
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis. 101-109 - Ding Wang, Chunguang Ma, Sendong Zhao, Chang-li Zhou:
Breaking a Robust Remote User Authentication Scheme Using Smart Cards. 110-118 - Irfana Memon:
An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs. 119-128 - Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won:
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing. 138-144
Parallel, Distributed, and Virtualization Techniques
- Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng:
Small World Asynchronous Parallel Model for Genome Assembly. 145-155 - Haitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen:
UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines. 156-163 - Yongnan Li, Limin Xiao, Aihua Liang, Yao Zheng, Li Ruan:
Fast Parallel Garner Algorithm for Chinese Remainder Theorem. 164-171 - Xu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan:
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing. 172-179 - M. M. Hafizur Rahman, Asadullah Shah, Yasushi Inoguchi:
On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network. 180-187
Performance Modeling, Prediction, and Tuning
- Yunji Chen, Tianshi Chen, Qi Guo, Zhiwei Xu, Lei Zhang:
An Elastic Architecture Adaptable to Millions of Application Scenarios. 188-195 - Daniel A. Orozco, Elkin Garcia, Robert S. Pavel, Orlando Ayala, Lian-Ping Wang, Guang R. Gao:
Demystifying Performance Predictions of Distributed FFT3D Implementations. 196-207 - Qiuming Luo, Chengjian Liu, Chang Kong, Ye Cai:
MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms. 208-216 - Gangfeng Liu, Yunlan Wang, Tianhai Zhao, Jianhua Gu, Dongyang Li:
mHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing Cluster. 217-224
Resource Management
- Wei Feng, Jian Liu, Jiannong Cao, Liang Yang, Qin Xin:
Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks. 225-232 - Boo-Hyoung Lee, Chi-Su Kim, Heon-Tag Kong:
Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method. 233-240 - Jong Bok Park:
Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case Study. 241-247 - Youngsik Kwak, YoonJung Nam:
The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples. 248-255
Ubiquitous Communications and Networks
- Jianbin Jia, Yingwen Chen, Ming Xu:
An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records. 256-263 - Zeeshan Hameed Mir, Hyeon Park, Young Bag Moon, Naesoo Kim, Cheol Sig Pyo:
Design and Deployment of Testbed for Experimental Sensor Network Research. 264-272 - Yoonsik Kwak:
Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device. 273-278
Web, Communication, and Cloud Computing
- Lei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu:
Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center. 279-288 - Huajian Mao, Hang Zhang, Xianqiang Bao, Nong Xiao, Weisong Shi, Yutong Lu:
EaSync: A Transparent File Synchronization Service across Multiple Machines. 289-296 - Phan Trung Huy, Nguyen Hai Thanh, Cheonsick Kim:
Relationship between Correcting Code and Module Technique in Hiding Secret Data. 297-307 - Woo-Sik Lee, Min Choi, Namgi Kim:
Different Characteristics of Radio Modules in Wireless Body Sensor Network Systems. 308-314 - Hyeog-In Kwon, Hi-Yeob Joo, Dae-Jin Kim, Jong-Seok Park:
The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services. 315-319 - Namje Park, Yeonghae Ko:
Computer Education's Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education. 320-327
ATIMCN
- Chien-Erh Weng, Chien-Hung Chen, Chiung-Hsing Chen, Jyh-Horng Wen:
The Performances Study of EDCF with Block_Ack in WLANs. 328-335 - Wen-Hsu Hsiao, Hui-Kai Su, Yu-Siang Wei, Wei-Sheng Ho, Kim-Joan Chen:
A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System. 336-348 - Hsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng:
A New Approach for Detecting SMTPFA Based on Entropy Measurement. 349-359 - Hui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu:
A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services. 360-372
ATSME
- Ching-Hui Shih:
The Effects of Governmental Subsidy on the Quality of Education in Taiwan's Private Universities and Colleges. 373-380 - Chiou-Fen Lin, Meei-Ling Shyu, Meei-Shiow Lu, Chung-I Huang:
Examining the Effectiveness of a Distant Learning Education Program: Use of Patient Safety and Reporting Law and Ethics as Example. 381-385 - Hung-Chang Lin, Yao-Hua Wang:
The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill Training. 386-393 - Li-Jia Chiu, Neng-Tang Norman Huang:
The Difference Analysis between Demographic Variables and Personal Attributes - The Case of Internal Auditors in Taiwan. 394-400 - Mey-Tyng Wang, Guo-Hong Lei:
Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example. 401-408 - Shiang-Lan Kuo:
Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness. 409-413 - Hui-Min Ko:
Soft Power: A Critical Factor for the Effectiveness and Development of a School. 414-420
Cloud & Grid
- Ying-Hong Wang, Yu-Wei Lin, Yu-Yu Lin, Han-Ming Chang:
Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor Networks. 421-428 - JongBeom Lim, Kwang-Sik Chung, Heon-Chang Yu:
A Termination Detection Technique Using Gossip in Cloud Computing Environments. 429-436 - Zhiming Zhao, Paola Grosso, Cees de Laat:
OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science. 437-444 - Chao-Tung Yang, Hsien-Yi Wang, Yu-Tso Liu:
Using PCI Pass-Through for GPU Virtualization with CUDA. 445-452
DATICS
- Nan Zhang, Ka Lok Man:
Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options. 453-462 - Jieming Ma, Ka Lok Man, T. O. Ting, Hyunshin Lee, Taikyeong Jeong, Jong-Kug Sean, Sheng-Uei Guan, Prudence W. H. Wong:
Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems. 463-471 - Nan Zhang, Ka Lok Man, Eng Gee Lim:
Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model. 472-481 - Ting Wang, Sheng-Uei Guan, T. O. Ting, Ka Lok Man, Fei Liu:
Evolving Linear Discriminant in a Continuously Growing Dimensional Space for Incremental Attribute Learning. 482-491 - Ming Ming Wong, Mou Ling Dennis Wong, Ka Lok Man:
Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem. 492-499 - T. O. Ting, Kaiyu Wan, Ka Lok Man, Sanghyuk Lee:
Space Exploration of Multi-agent Robotics via Genetic Algorithm. 500-507 - T. O. Ting, Ka Lok Man, Sheng-Uei Guan, Mohamed Nayel, Kaiyu Wan:
Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems. 508-515 - Mouna Karmani, Chiraz Khedhiri, Belgacem Hamdi, Amir-Mohammad Rahmani, Ka Lok Man, Kaiyu Wan:
Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units. 516-523
UMAS
- YouSik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee:
New Electronic Acupuncture System Using Intelligence. 524-531 - Oliver Mroß, Klaus Meißner:
A Runtime Environment for Distributed Mashups in Multi-device Scenarios. 532-541 - Le The Dung, Beongku An:
A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks. 542-549 - Imtiaz Ahmed Khan, Nam-Yeol Yun, Soo-Hyun Park:
Nibble-CRC for Underwater Acoustic Communication. 550-558 - Sangyong Lee, Cheonshik Kim, Seongah Chin:
An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations. 559-564 - HyunJu Lee, Taehyun Kim, Dongkyoo Shin, HeeWon Park, Soohan Kim, Dongil Shin:
Research on a Smart Input Device Using Multimodal Bio-signal Interface. 565-574 - Eun-Jun Yoon:
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. 575-580 - Hae-Jung Kim, Eun-Jun Yoon:
Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme. 581-588 - Luu Hoang Long, Eunmi Choi:
Energy-Efficiency Protocol for Securing the Wireless Sensor Networks. 589-598 - Do-Hoon Kim, Jungwook Wee, Kyu-Sung Hwang:
A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI. 599-607 - Kyu-Sung Hwang:
SNR-Based Partial Relay Selection Scheme over Multiple Relay Network. 608-615 - Guoqing Li, Guangling Sun, Xinpeng Zhang:
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency. 616-624 - Dang Quyet Thang, Nguyen Dinh Han, Phan Trung Huy:
Algorithms Based on Finite Automata for Testing of Z-codes. 625-635 - Sooill Lee:
Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor. 636-644
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.