default search action
IEEE NAS 2007: Guilin, China
- International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China. IEEE Computer Society 2007, ISBN 0-7695-2927-5
- Xiaojun Yang, Dongdong Wu, Ninghui Sun:
Design of NIC Based on I/O Processor for Cluster Interconnect Network. 3-8 - Hao Zhang, Dongrui Fan:
Simplified Multi-Ported Cache in High Performance Processor. 9-14 - Jywe-Fei Fang, Chien-Hung Huang, Ko-Lin Lin, Chen-Hsiang Liao, Shr-Cheng Feng:
The bi-panconnectivity of the hypercube. 15-20 - Rong Ji, Xianjun Zeng, Liang Chen, Junfeng Zhang:
The Implementation and Design of a Low-Power Clock Distribution Microarchitecture. 21-30 - Jianqun Cui, Yanxiang He, Libing Wu:
More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer Multicast. 31-36 - Kai Ouyang, Xiaowen Chu, Lijun Dong, Hengqing Wang, Ting Cai:
MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology. 37-43 - Lijun Dong, Shengsheng Yu, Kai Ouyang:
The Dynamic Endpoint-Based Access Control Model on VPN. 44-54 - Zhongsheng Wu, Zhide Chen, Li Xu, Fuchun Guo:
Routing Protocols Based on Double Auction for Ad Hoc Networks. 55-61 - Yi-Wei Ting, Yeim-Kuan Chang:
A Novel Cooperative Caching Scheme for Wireless Ad Hoc Networks: GroupCaching. 62-68 - Chengcheng Li, Peng Li, Tijjani Mohammed:
An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested Networks. 69-76 - Jianhong Zhang:
An Improved Designated-Verifier Proxy Signature Scheme. 77-82 - Shushan Zhao, Akshai K. Aggarwal, Robert D. Kent:
PKI-Based Authentication Mechanisms in Grid Systems. 83-90 - Zhitang Li, Jie Lei, Li Wang, Dong Li:
Assessing Attack Threat by the Probability of Following Attacks. 91-100 - Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong:
Mitigating Denial of Capability with An Notification Mechanism. 101-108 - Lin Lin, Xueming Li, Yong Cheng:
HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast. 109-114 - Aifang Zhang, Zhitang Li, Dong Li, Li Wang:
Discovering Novel Multistage Attack Patterns in Alert Streams. 115-121 - Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan:
Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. 122-132 - Yuanguo Cheng, Xiongwei Ren:
Mining Moving Patterns Based on Frequent Patterns Growth in Sensor Networks. 133-138 - Xiongzi Ge, Dan Feng, Lei Tian:
An Active Region-based Storage Mechanism in Large Wireless Sensor Networks. 139-145 - Jun Li, Shunyi Zhang, Zailong Zhang, Pan Wang:
A Novel Network Management Architecture for Self-organizing Network. 146-154 - Hui Liu, Wenfeng Feng, Yongfeng Huang, Xing Li:
A Peer-To-Peer Traffic Identification Method Using Machine Learning. 155-160 - Jincai Chen, Gongye Zhou:
GSM-R: A Hybrid Scheduling Approach to Dynamic Load Balancing in Hierarchical Cluster of Servers. 161-167 - Jirong Sun, Zhishu Li, Jiancheng Ni, Feng Yin:
Software Fault Localization Based on Testing Requirement and Program Slice. 168-176 - Jiwu Shu, Yang Wang, Wei Xue, Yifeng Luo:
An Efficient SAN-Level Caching Method Based on Chunk-Aging. 177-184 - Zhikun Wang, Ke Zhou, Dan Feng, Lingfang Zeng, Junping Liu:
FTRAID: A Fat-tree Based Parallel Storage Architecture for Very Large Disk Array. 185-192 - Wei Hu, Diqing Hu, Changsheng Xie, Fan Chen:
A New Data Format and a New Error Control Scheme for Optical-Storage Systems. 193-198 - Ramani Routray, Sandeep Gopisetty, Pallavi Galgali, Amit Modi, Shripad Nadgowda:
iSAN: Storage Area Network Management Modeling Simulation. 199-208 - Qiang Cao, Tian-jie Guo, Changsheng Xie:
Dynamics Process of Long-running Allocation/Collection in Linear Storage Space. 209-216 - Huaiyang Li, Changsheng Xie, Yan Liu:
A New Method of Pefetching I/O Requests. 217-224 - Bin Cai, Changsheng Xie, Guangxi Zhu:
Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Synthetic Workload Simulation. 225-232 - Lanyue Lu, Peter J. Varman, Jun Wang:
DiskGroup: Energy Efficient Disk Layout for RAID1 Systems. 233-242 - Pengyong Ma, Shuming Chen:
M2SI: An Improved Coherency Protocol in CMP. 243-244 - Haishan Li, Ming Zhang, Wei Zheng, Dongxiao Li:
An Adaptive Arbitration Algorithm for SoC Bus. 245-246 - Ming Wu, Changsheng Xie, Qingdong Wang:
The System Design and Performance Analysis of WiMAX Base Station MAC Based on Intel Network Processor. 247-248 - Lei Miao, Yong Qi, Di Hou, Chang-li Wu, Yue-hua Dai:
Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems. 249-250 - Guo-Song Jiang, Changsheng Xie, Bo Wang:
Research and Implementation of RAID Algorithm base on RAID Controller. 251-252 - Gongye Zhou, Lanlan Yuan, Jincai Chen:
B+ Tree Management Method of Object Attributes for Object-Based Storage. 253-254 - Mohammad Mehdi Hassani, Reza Berangi, Hamid Tavakolaie:
An analytical model for evaluating utilization of TCP TAHOE using markovian model. 257-258 - Jiafu Hu, Yongliang Dong:
Sliding Window Based Security Event Correlation. 259-260 - Beizhan Wang, Yue Wang, Fei Cheng, Qi Duan:
Safety Critical Network Based on Fibre Channel. 261-262 - Ruyan Wang, Jiaofa Chang, Keping Long, Xiaolong Yang, Dan Liu:
Distributed Fault Monitoring Scheme Based on Optical Power for Optical Burst Switching Network. 263-264 - Xiaojing Ma, Zhitang Li, Yao Li, Jiping Zhang:
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. 265-266 - Gongye Zhou, Peng Chen:
RH-SCSI: A Reliable HyperSCSI Protocol for Networking Storage. 269-270 - Zhi-hu Tan, Changsheng Xie, Jiguang Wan:
A New Method for RAID Consistency Initialization. 271-272 - Guang Yang, Jingli Zhou, Chao Liu:
Implementation and performance evaluation of an iSCSI-Based Storage Virtualization. 273-274 - Shuibing He, Dan Feng:
An Object-based Storage Controller Based on Switch Fabric. 275-276 - Xiaojia Xiang, Jiwu Shu, Wei Xue, Weimin Zheng:
Design and Implementation of an Efficient Multi-version File System. 277-278
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.