default search action
ISPA 2009: Chengdu, Sichuan, China
- IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3747-4
Session 1: Distributed Systems and Applications
- Xiaoxuan Meng, Chengxiang Si, Wenwu Na, Lu Xu:
P-Cache: Providing Prioritized Caching Service for Storage System. 3-10 - Dayong Ye, Quan Bai, Minjie Zhang, Khin Than Win, Zhiqi Shen:
An Efficient Task Allocation Protocol for P2P Multi-agent Systems. 11-18 - Ruay-Shiung Chang, Chih-Yuan Lin, Chun-Fu Lin:
Scheduling Jobs in Grids Adaptively. 19-25 - Chonglei Mei, Hai Jiang, Jeff Jenness:
MM-DSM: Multi-threaded Multi-home Distributed Shared Memory Systems. 26-33 - Ching-Hsien Hsu, Chia-Wei Chu, Chih-Hsun Chou:
Bandwidth Sensitive Co-allocation Scheme for Parallel Downloading in Data Grid. 34-39 - Gang Yang, Kaibo Wang, Xingshe Zhou:
An Adaptive Resource Monitoring Method for Distributed Heterogeneous Computing Environment. 40-44 - Zhipeng Tan, Dan Feng, Xudong Tu, Fei He:
DLBS: Duplex Loading Balancing Strategy on Object Storage System. 45-52 - Xiaoxuan Meng, Chengxiang Si, Xiaoming Han, Jiangang Zhang, Lu Xu:
A Replacement Algorithm Designed for the Web Search Engine and Its Application in Storage Cache. 53-59
Session 2: Algorithm and Applications
- Yasuaki Ito, Koji Nakano:
A Hardware-Software Cooperative Approach for the Exhaustive Verification of the Collatz Conjecture. 63-70 - Tianju Wang, Qu Qu, Benjamin Koo:
Analysing Internet Information Propagation Using Quality of Service Methodology Based on Algebra of System. 71-78 - Jung-Ho Um, Mi-Young Jang, Kyoung-Jin Jo, Jae-Woo Chang:
A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service. 79-85 - Tao Wang, Shun-Zheng Yu:
Centralized Botnet Detection by Traffic Aggregation. 86-93 - Cancan Liu, Weimin Zhang, Zhigang Luo, Xiaoqun Cao, Hai Liu:
Managing Large-Scale Scientific Computing in Ensemble Prediction Using BPEL. 94-101 - Shu-Ming Tseng, Yu-Chin Kuo, Yen-Chih Ku, Yueh-Teng Hsu:
Software Viterbi Decoder with SSE4 Parallel Processing Instructions for Software DVB-T Receiver. 102-105 - Maryam Khademi Hedayat, Wentong Cai, Stephen John Turner, Shayan Shahand:
Distributed Execution of Workflow Using Parallel Partitioning. 106-112 - Sheng Zhang, Zhuzhong Qian, Minyi Guo, Sanglu Lu:
An Efficient Algorithm for Multimedia Delivery in Pervasive Space. 113-118 - Jingliang Zhang, Junwei Zhang, Jian-Gang Zhang, Xiaoming Han, Lu Xu:
CISP-Growth: A Contiguous Item Sequential Pattern Mining Algorithm with Application Level IO Patterns. 119-126
Session 3: Architecture, Virtualization and GPU
- Xiang Zhang, Jie Ma, Yanchao Miao, Qingwei Meng, Dan Meng:
Solo: A Lightweight Virtual Machine. 129-136 - Zhiyuan Shao, Hai Jin, Yong Li:
Virtual Machine Resource Management for High Performance Computing Applications. 137-144 - Wentao Qu, Minglu Li, Chuliang Weng:
An Active Trusted Model for Virtual Machine Systems. 145-152 - Siqin Zhao, Kang Chen, Weimin Zheng:
Secure Logging for Auditable File System Using Separate Virtual Machines. 153-160 - Haogang Chen, Xiaolin Wang, Zhenlin Wang, Xiang Wen, Xinxin Jin, Yingwei Luo, Xiaoming Li:
REMOCA: Hypervisor Remote Disk Cache. 161-169 - Deshi Ye, Hua Chen, Qinming He:
Load Balancing in Server Consolidation. 170-174 - He Huang, Lei Liu, Nan Yuan, Wei Lin, Fenglong Song, Junchao Zhang, Dongrui Fan:
A Synchronization-Based Alternative to Directory Protocol. 175-181 - Dengbiao Tu, Guangming Tan:
Characterizing Betweenness Centrality Algorithm on Multi-core Architectures. 182-189 - Guang Suo, Xuejun Yang:
Balancing Parallel Applications on Multi-core Processors Based on Cache Partitioning. 190-195 - Long Zheng, Mianxiong Dong, Song Guo, Minyi Guo, Li Li:
I-Cache Tag Reduction for Low Power Chip Multiprocessor. 196-202 - Yuri Nishikawa, Michihiro Koibuchi, Masato Yoshimi, Akihiro Shitara, Kenichi Miura, Hideharu Amano:
Performance Analysis of ClearSpeed's CSX600 Interconnects. 203-210 - Der-Rong Din, Yu-Sheng Chiu:
Survivable Virtual Topology Reconfiguration Problem on WDM Networks with Reconfiguration Constraint. 211-218 - Guibin Wang, Xuejun Yang, Ying Zhang, Tao Tang, Xudong Fang:
Program Optimization of Stencil Based Application on the GPU-Accelerated System. 219-225 - Jeremy Espenshade, Andrew Pangborn, Gregor von Laszewski, Douglas Roberts, James S. Cavenaugh:
Accelerating Partitional Algorithms for Flow Cytometry on GPUs. 226-233 - Bonan Huang, Jinlan Gao, Xiaoming Li:
An Empirically Optimized Radix Sort for GPU. 234-241
Session 4: Security, Fault-Tolerance and Reliability
- Lingfang Zeng, Dan Feng, Bharadwaj Veeravalli, Qingsong Wei:
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage System. 245-252 - Mei Song, Zhang Yun-he:
One New Research about IPSec Communication Based on HTTP Tunnel. 253-257 - Zhengqiu He, Lifa Wu, Zheng Hong, Haiguang Lai:
Semantic Security Policy for Web Service. 258-262 - Junguo Li, Gang Huang, Xingrun Chen, Franck Chauvel, Hong Mei:
Supporting Reconfigurable Fault Tolerance on Application Servers. 263-271 - Martin Stáva, Pavel Tvrdík:
Security System for Overlapping Non-dedicated Clusters. 272-281 - Xiangzhen Kong, Jiwei Huang, Chuang Lin, Peter D. Ungsunan:
Performance, Fault-Tolerance and Scalability Analysis of Virtual Infrastructure Management System. 282-289 - Ting Chen, Yongjian Wang, Yuanqiang Huang, Cheng Luo, Depei Qian, Zhongzhi Luan:
A Two-Phase Log-Based Fault Recovery Mechanism in Master/Worker Based Computing Environment. 290-297 - Xinming Duan, Dakun Zhang, Xuemei Sun:
Fault-Tolerant Routing Schemes for Wormhole Mesh. 298-301 - Wilian Queiroz, Lau Cheuk Lung, Luciana de Oliveira Rech, Luiz A. de Paula Lima Jr.:
Semantically Reliable Multicast Based on the (m-k)-Firm Technique. 302-308 - Ning Hu, Peidong Zhu, Peng Zou:
An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation. 309-314
Session 5: Mobile, Wireless and Sensor Networks
- Liang He, Jingdong Xu, Yuntao Yu:
Optimize Multiple Mobile Elements Touring in Wireless Sensor Networks. 317-323 - Jie Jiang, Li Fang, Jun Wen, Guofu Wu, Heying Zhang:
Random Scheduling for Wireless Sensor Networks. 324-332 - Yang Wang, Liusheng Huang, Hongli Xu, Gang Wang:
Consistent Message Ordering in Wireless Sensor and Actor Networks. 333-339 - Wei Ren, Yi Ren, Hui Zhang:
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. 340-347 - Amadou Baba Bagayoko, Béatrice Paillassa, Cláudia Betous-Almeida:
Transport and Routing Redundancy for MANETs Robustness. 348-353 - Abiodun Iwayemi, Chi Zhou:
VoIP Performance in Multi-radio Mobile Devices. 354-360 - Fei Shi, Keqiu Li, Yanming Shen:
A Low Latency Handoff Scheme Based on the Location and Movement Pattern. 361-365 - Fan Dong, Li Zhang, Dexter H. Hu, Cho-Li Wang:
A Case-Based Component Selection Framework for Mobile Context-Aware Applications. 366-373 - Panlong Yang, Hai Wang, Guihai Chen:
DDSA: A Sampling and Validation Based Spectrum Access Algorithm in Wireless Networks. 374-381 - Kun-Ming Yu, Ming-Gong Lee, Chien-Tung Liao, Hung-Jui Lin:
Design and Implementation of a RFID Based Real-Time Location-Aware System in Clean Room. 382-388 - Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda:
Web Service Locating Unit in RFID-Centric Anti-counterfeit System. 389-393
Session 6: Network and Routing
- Laiquan Han, Jinkuan Wang, Jianhua Tang, Peijun He:
A Forwarding Migration Algorithm for Multipath Transmission. 397-400 - Ali Jafari, Hosein Shafiei, Baharan Mirzasoleiman, Ghodrat Sepidnam:
Utility Proportional Optimization Flow Control for Overlay Multicast. 401-407 - Yong-Ki Kim, Rabindra Bista, Jae-Woo Chang:
A Designated Path Scheme for Energy-Efficient Data Aggregation in Wireless Sensor Networks. 408-415
ISSR: Security in e-Science and e-Research
- John P. Watt, Richard O. Sinnott, Jipu Jiang, Tom Doherty, Christopher I. Higgins, Michael Koutroumpas:
Tool Support for Security-Oriented Virtual Research Collaborations. 419-424 - Jun Ho Huh, Andrew P. Martin:
Towards a Trustable Virtual Organisation. 425-431 - Rongqiang Cao, Xuebin Chi, Zongyan Cao, Zhihui Dai, Haili Xiao:
USGPA: A User-Centric and Secure Grid Portal Architecture for High-Performance Computing. 432-438 - Ching-Nung Yang, Jie-Ru Chen, Chih-Yang Chiu, Gen-Chin Wu, Chih-Cheng Wu:
Enhancing Privacy and Security in RFID-Enabled Banknotes. 439-444
CSS: Cyberspace Safety and Security
- LongHai Li, ShaoFeng Fu, XiangQuan Che:
Active Attacks on Reputable Mix Networks. 447-450 - Wei Pan, Weihua Li:
Reverse Analysis and Vulnerability Detection for Network System Software. 451-456 - Jianli Zhang, Zhiyi Fang, Yunlong Zhang, Yunlong Ma:
ZDCF: An Improved DCF Solution of IEEE 802.11. 457-462 - Meizhen Wang, Zhitang Li, Sheng Zhong:
Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition. 463-468 - Lin Chen, Zhitang Li, Cuixia Gao, Lan Liu:
Dynamic Forensics Based on Intrusion Tolerance. 469-473 - Chengyu Fan, Shijie Zhou, Fagen Li:
An Identity-Based Restricted Deniable Authentication Protocol. 474-478 - Cai Fu, Fugui Tang, Yongquan Cui, Ming Liu, Bing Peng:
Grey Theory Based Nodes Risk Assessment in P2P Networks. 479-483 - Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai:
A Method of In-Depth-Defense for Network Security Based on Immunity Principles. 484-487 - Aiguo He, Tomohiro Ohdaira:
A Case Study: File Access Privacy Control Using Filter Hook Driver. 488-493 - Zhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:
Extended PEG Algorithm for High Rate LDPC Codes. 494-498 - Lianzhong Liu, Chunfang Li, Yanping Zhang:
A Business-Oriented Fault Localization Approach Using Digraph. 499-504 - Jingde Cheng, Yuichi Goto, Daisuke Horie, Junichi Miura, Toshio Kasahara, Ahmad Iqbal:
Development of ISEE: An Information Security Engineering Environment. 505-510 - Shuiping Gou, Yuqin Wang, Licheng Jiao, Jing Feng, Yao Yao:
Distributed Transfer Network Learning Based Intrusion Detection. 511-515
IWASVT: Architecture Support on Virtualization Techniques
- Xinxin Jin, Haogang Chen, Xiaolin Wang, Zhenlin Wang, Xiang Wen, Yingwei Luo, Xiaoming Li:
A Simple Cache Partitioning Approach in a Virtualized Environment. 519-524 - Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao:
Using Pcache to Speedup Interpretation in Dynamic Binary Translation. 525-530 - Yusong Tan, Weihua Zhang, Qingbo Wu:
Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual Machine. 531-536 - Xiao-Jian Liu, Xiaodong Yi, Yi Ren:
Luvalley-Lite: An Effort to Balance Re-use and Re-coding. 537-542 - Hua Cheng, Zuoning Chen, Ninghui Sun, Fenbin Qi, Chaoqun Dong, Laiwang Cheng:
A Virtualized Self-Adaptive Parallel Programming Framework for Heterogeneous High Productivity Computers. 543-548 - Qingbo Wu, Chunguang Wang, Yusong Tan:
System Monitoring and Controlling Mechanism Based on Hypervisor. 549-554 - Linbin Yu, Yun Xu:
A Parallel Gibbs Sampling Algorithm for Motif Finding on GPU. 555-558 - Yongbin Zhou, Junchao Zhang, Shuai Zhang, Nan Yuan, Dongrui Fan:
Data Management: The Spirit to Pursuit Peak Performance on Many-Core Processor. 559-564 - Han Wan, Xiaopeng Gao, Zhiqiang Wang, Yi Li:
Using GPU to Accelerate Cache Simulation. 565-570 - Fenglong Song, Zhiyong Liu, Dongrui Fan, He Huang, Nan Yuan, Lei Yu, Junchao Zhang:
Evaluation Method of Synchronization for Shared-Memory On-Chip Many-Core Processor. 571-576
WMSC: Workflow Management in Service and Cloud Computing
- Reggie Davidrajuh:
Workflow Based Approach for Eliminating Redundancy in Virtual Enterprising. 579-583 - Jie Cheng, Xiaoguang Lin, Yuanchun Zhou, Jianhui Li:
A Web Based Workflow System for Distributed Atmospheric Data Processing. 584-588 - Haiyan Zhao, Jian Cao, Xiaohan Sun:
A Quality Optimization Method for Service Process Model. 589-594 - Xuyun Zhang, Wanchun Dou:
A Global QoS-Driven Evaluation Strategy for Web Services Composition. 595-600 - Sheng Liu, Yushun Fan:
Workflow Model Performance Analysis Concerning Instance Dwelling Times Distribution. 601-605 - Junyi Sun, Houfu Li, Yanbo Han:
An Adaptive Scheduler for Enhancing the Efficiency of Multi-engine BPM Systems. 606-610 - Zuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Haiyan Yang:
Completion Time Estimation for Instances of Generalized Well-Formed Workflow. 611-616 - Chunhua Hu, Xiaohong Chen, Jianxun Liu, Jibo Liu:
Research on Services Selection Based on Credible Alliance in Web Services Combination. 617-622 - Jie Yu, Xiangfeng Luo, Feiyue Ye, Yongmei Lei:
Generation of Web Knowledge Flow for Personalized Services. 623-628 - Meng Xu, Li-zhen Cui, Haiyang Wang, Yanbing Bi:
A Multiple QoS Constrained Scheduling Strategy of Multiple Workflows for Cloud Computing. 629-634 - Yi Wang, Jian Cao, Minglu Li:
Change Sequence Mining in Context-Aware Scientific Workflow. 635-640 - Ting Xie, Yang Yu, Guoshen Kuang:
A Time Exception Handling Algorithm of Temporal Workflow. 641-646 - Jianxun Liu, Zefeng Zhu, Yiping Wen, Jinjun Chen:
Implementation of a Visual Modeling Tool for Defining Instance Aspect in Workflow. 647-652 - Gerhard Stürmer, Jürgen Mangler, Erich Schikuta:
A Domain Specific Language and Workflow Execution Engine to Enable Dynamic Workflows. 653-658 - Yaojun Han, Xuemei Luo:
Composition and Reduction of Web Service Based on Dynamic Timed Colored Petri Nets. 659-663 - Kuo-Chan Huang, Kuan-Po Lai, Hsi-Ya Chang:
Adaptive Processor Allocation with Estimated Job Execution Time in Heterogeneous Computing Grid. 664-669
DSAA: Distributed Systems, Algorithms and Applications
- Yin Ye, Zhihui Du, Song Hao:
Optimizing Message Passing Programs Based on Task Section Duplication. 673-678 - Jianjiang Li, Lin Yan, Zhe Gao, Dan Hei:
A Task-Pool Parallel I/O Paradigm for an I/O Intensive Application. 679-684 - Xiaodong Xie, Yansheng Lu:
Extended Combination Testing: Generates Array Test Suite. 685-690 - Ke Huang, Zhihong Li, Benjamin Koo, Tianju Wang:
SimSync: A Table-Based Constraint Processing Language For Synchronization Control. 691-695 - Shuming Zhou:
The Conditional Diagnosability of Twisted Cubes under the Comparison Model. 696-701 - Xiaolei Gao, Huaikou Miao:
Proving Total Correctness of Refinement Based on Tableau. 702-707 - Siamak Najjar Karimi, Saeed Parsa:
Semi-automatic Transformation of Sequential Code to Distributed Code Using Model Driven Architecture Approach. 708-714 - Xinhong Wu, Hai Jin:
Multi-Source Traffic Data Fusion Method Based on Regulation and Reliability. 715-718
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.