default search action
NPC 2008: Shanghai, China
- Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen:
Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings. Lecture Notes in Computer Science 5245, Springer 2008, ISBN 978-3-540-88139-1
Network Technologies
- Youn-Sik Hong, Ki-Young Lee:
An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks. 1-12 - Eunyoung Kang, Yongsoon Im, Ung-Mo Kim:
Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks. 13-23 - Chuanming Jing, Zhiliang Wang, Xia Yin, Jianping Wu:
A Formal Approach to Robustness Testing of Network Protocol. 24-37 - Panlong Yang, Guihai Chen, Qihui Wu:
Deadline Probing: Towards Timely Cognitive Wireless Network. 38-49 - Jinjing Huang, Lei Zhao, Jiwen Yang:
SRDFA: A Kind of Session Reconstruction DFA. 50-60 - Yi Xie, Shun-Zheng Yu:
Measuring the Normality of Web Proxies' Behavior Based on Locality Principles. 61-73
Network Applications
- Wenping Pan, Dejun Mu, Hangxing Wu, Xinjia Zhang, Lei Yao:
Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers. 74-85 - Dongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo:
Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow. 86-93 - Shuhua Wu, Yuefei Zhu:
Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. 94-104 - Shuhua Wu, Yuefei Zhu:
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. 105-115 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. 116-126 - Xiaofei Liao, Hao Wang, Song Wu, Hai Jin:
A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay. 127-137 - Ruonan Rao, Shuying Liang, Jinyuan You:
HTL: A Locality Bounded Flat Hash Location Service. 138-149 - Xiang Fan, Yang Xiang:
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. 150-161 - Yang Xiang, Qiang Li, Dong Guo:
Online Accumulation: Reconstruction of Worm Propagation Path. 162-172 - Hanhua Chen, Hai Jin, Xucheng Luo, Zhiguang Qin:
HRS: A Hybrid Replication Strategy for Exhaustive P2P Search. 173-184 - Bowei Yang, Guanghua Song, Yao Zheng:
ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework. 185-195
Network and Parallel Architectures
- Qing Li:
A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies. 196-209 - Changjun Hu, Yewei Shao, Jue Wang, Jianjiang Li:
Automatic Transformation for Overlapping Communication and Computation. 210-220 - Qingkui Chen, Wei Wang:
Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid. 221-231 - Wei Fu, Yingjie Zhao, Nong Xiao, Xicheng Lu:
CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem. 232-243 - Savio S. H. Tse:
Online Balancing Two Independent Criteria. 244-254 - XiaoChuan He, Yan Jia:
Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds. 255-265
Parallel and Distributed Software
- Henry Kasim, Verdi March, Rita Zhang, Simon See:
Survey on Parallel Programming Model. 266-275 - Luqun Li:
An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory. 276-285 - Ye Zhang, Guy Bergére, Serge G. Petiton:
Grid Computing: A Case Study in Hybrid GMRES Method. 286-296 - Jiong Yu, Guozhong Tian, Yuanda Cao, Xianhe Sun:
Towards Resource Reliability Support for Grid Workflows. 297-307 - Haitao Yang, Peng Yang, Pingjing Lu, Zhenghua Wang:
A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization. 308-319 - Eun-Jun Yoon, Kee-Young Yoo:
An Efficient Authentication and Key Agreement Protocol in RFID System. 320-326 - Jingya Zhou, Junzhou Luo, Aibo Song:
Grid Service Discovery Based on Cross-VO Service Domain Model. 327-338 - Bin Cheng, Xingang Wang, Weiqin Tong:
Ontology-Based Semantic Method for Service Modeling in Grid. 339-348 - Xiao Zheng, Junzhou Luo, Aibo Song:
A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments. 349-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.