default search action
PDCAT 2006: Taipei, Taiwan
- Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan. IEEE Computer Society 2006, ISBN 0-7695-2736-1
Interconnection Networks
- (Withdrawn) An Intrusion Detection Architecture for Ad Hoc Network Based on Artificial Immune System. 1-4
- Jung-Sheng Fu:
Conditional Fault-Tolerant Hamiltonicity of Twisted Cubes. 5-10 - Jung-Sheng Fu:
Conditional Fault-Tolerant Hamiltonicity of Star Graphs. 11-16 - Xuesong Tan, Shuo-Yen Robert Li:
Mixed Preservation of Conditionally Nonblocking Switches under 2-stage Interconnection. 17-22
Communication and Telecommunication
- Xiaoyong Li, Xiaolin Gui:
Merging Source and Shared Trees Multicast in MPLS Networks. 23-28 - Naian Liu, Dechun Sun, Wuqiang Li, Changxing Pei:
A Link Adaptation Solution to IEEE 802.16d WMAN. 29-32 - Mingyue Zhai:
On Power Lines Communications Channels' Characteristics of Markov. 33-37 - Hong Zhu, Zhaolin Yin, Ying Ding:
Java Annotated Concurrency Based on the Concurrent Package. 38-43
Image Processing and Computer Graphics
- Tze-Yun Sung, Yaw-Shih Shieh, Chun-Wang Yu, Hsi-Chin Hsin:
A High-Efficiency Vector Interpolator Using Redundant CORDIC Arithmetic in Power-Aware 3-D Graphics Rendering. 44-49 - Ken-Chung Ho, Jr-Shian Juang:
Error-Diffusion Kernel Estimation Using Least Squares. 50-55 - Yu-Chang Tzeng:
Remote Sensing Images Classification/Data Fusion Using Distance Weighted Multiple Classifiers Systems. 56-60 - Chao-Shen Chen, Rong-Jian Chen:
Image Encryption and Decryption Using SCAN Methodology. 61-66
Access Control and Authorization
- Ousmane Thiare, Abdelhak Mourad Guéroui, Mohamed Naimi:
Distributed Groups Mutual Exclusion Based on Clients/Servers Model. 67-73 - Haibo Shen, Fan Hong:
An Attribute-Based Access Control Model for Web Services. 74-79 - Nan Guo, Chen Chen, Changxing Pei:
Dynamic TXOP Assignment for Fairness (DTAF) in IEEE 802.11e WLAN under Heavy Load Conditions. 80-85 - Fan Hong, Yongquan Cui:
Administrative Usage Control Model for Secure Interoperability. 86-89
Interconnection Networks
- Hao-Shun Hung, Gen-Huey Chen, Jung-Sheng Fu:
Conditional Fault-Tolerant Cycle-Embedding of Crossed Cube. 90-95 - Jung-Sheng Fu:
Hamiltonian Connectedness of the Faulty WK-Recursive Network. 96-101 - Sun-Yuan Hsieh, Pei-Yu Yu:
Cycle Embedding on Twisted Cubes. 102-104
Wireless Networks and Mobile Computing
- Masahiro Yamane, Shigeaki Tagashira, Satoshi Fujita:
An Efficient Assignment of Transmission Opportunity in QoS Guaranteed Wireless LAN. 105-108 - Yamin Li, Shietung Peng, Wanming Chu:
K-MCore for Multicasting on Mobile Ad Hoc Networks. 109-114 - Ying Wang, Guangrong Zhou, Tong Li:
Design of a Wireless Sensor Network for Detecting Occupancy of Vehicle Berth in Car Park. 115-118
Database Applications and Data Mining
- Jian Yin, Duanning Zhou, Qiong-Qiong Xie:
A Clustering Algorithm for Time Series Data. 119-122 - Yunlan Wang, Xingshe Zhou, Peiqi Liu:
A Database-Reduction-Based Algorithm for Episode Mining. 123-127 - Bo Wang, Mingwei Zhang, Bin Zhang, Wei-Jie Wei:
Data Mining Application to Syndrome Differentiation in Traditional Chinese Medicine. 128-131
Parallelizing Compilers
- Xue-rong Gong, Yong-hong Sheng, Lin-sheng Lu, Ping Zhang:
An Improved Automatic MPI Code Generation Algorithm for Distributed Memory Machine. 132-137 - Xiaoqi Yang, Qilong Zheng, Guoliang Chen, Zhen Yao:
Reverse Compilation for Speculative Parallel Threading. 138-143 - Dong Liu, Chunyuan Zhang, Rui Li:
Prediction-Table Based Fault-Tolerant Real-Time Scheduling Algorithm. 144-149
Parallel/Distributed Architectures
- Yu-Kuen Lai, Gregory T. Byrd:
Stream-Based Implementation of Hash Functions for Multi-Gigabit Message Authentication Codes. 150-155 - Yufeng Li, Han Qiu, Julong Lan, Jianwen Yang:
Analysis of the Centralized Algorithm and the Distributed Algorithm for Parallel Packet Switch. 156-161 - Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang:
Server-Initiated Byzantine Agreement over Two-Level Combined Wired/Wireless Networks. 162-165
Wireless Networks and Mobile Computing
- Nen-Chung Wang, Jhu-Chan Chen:
A Stable On-Demand Routing Protocol for Mobile Ad Hoc Networks with Weight-Based Strategy. 166-169 - Gwo-Chuan Lee, Long-Sheng Li, Wei-Yu Chien:
Heterogeneous RSVP Extension for End-to-End QoS Support in UMTS/WLAN Interworking Systems. 170-175 - Shu-Chin Wang, Kuo-Qin Yan, G. Y. Zheng, C. T. Chih:
Reaching Byzantine Agreement in a Processor Fallible Virtual Subnet Network. 176-179
Intelligent Computing and Neural Networks
- Ichiro Iimura, Toshiya Ito, Shigeru Nakayama:
A Study of Stimulative Queen Ant Strategy in Ant Colony Optimization Method. 180-184 - Tze-Yun Sung, Yaw-Shih Shieh, Chun-Wang Yu, Hsi-Chin Hsin:
Low-Power Multiplierless 2-D DWT and IDWT Architectures Using 4-tap Daubechies Filters. 185-190 - Tze-Yun Sung, Yaw-Shih Shieh, Chun-Wang Yu, Hsi-Chin Hsin:
High-Efficiency and Low-Power Architectures for 2-D DCT and IDCT Based on CORDIC Rotation. 191-196
Internet Computing
- Xiaoling Dai, Oluwatomi Ayoade, John C. Grundy:
Off-Line Micro-Payment Protocol for Multiple Vendors in Mobile Commerce. 197-202 - Weishi Zhang, Xiuguo Zhang:
Modeling Service Interactions Using Kahn Process Network. 203-208 - Dionisis X. Adamopoulos:
Extending Object-Oriented Middleware for Location-Aware Services. 209-212
Parallel/Distributed Architectures
- Tsang-Long Pao, Jian-Bo Chen:
The Scalability of Heterogeneous Dispatcher-Based Web Server Load Balancing Architecture. 213-216 - Caixia Sun, Hong-Wei Tang, Minxuan Zhang:
Controlling Performance of a Time-Criticial Thread in SMT Processors by Instruction Fetch Policy. 217-222 - Yan-mei Huo, Jiubin Ju, Liang Hu:
UFCR: An Efficient I/O Method for Parallel File System. 223-228
Wireless Networks and Mobile Computing
- Chen Chen, Changxing Pei, Liunai An:
Available Bandwidth Estimation in IEEE802.11b Network Based on Non-Intrusive Measurement. 229-233 - Fan Zhang, Benxiong Huang, Lai Tu, Jian Zhang:
Adaptive MAC Scheme Ready for Delay Assurances in Wireless Networks. 234-239 - Toshihiko Yamakami:
A Zipf-Like Distribution of Popularity and Hits in the Mobile Web Pages with Short Life Time. 240-243
Network Routing and Communication Algorithms
- Xingwei Wang, Qi Wang, Min Huang:
A Gaming Fuzzy QoS Multicast Routing Scheme in NGI. 244-249 - Junwei Wang, Xingwei Wang, Pengcheng Liu, Min Huang:
A Differential Evolution Based Flexible QoS Multicast Routing Algorithm in NGI. 250-253 - Keiichi Kaneko, Shietung Peng:
Disjoint Paths Routing in Pancake Graphs. 254-259
Web Technologies
- Dionisis X. Adamopoulos:
Enhancing Web Services in the Framework of Service-Oriented Architectures. 260-265 - Frode Eika Sandnes, Yo-Ping Huang:
Temporal Load-Balancing of Web-Server Traffic. 266-271 - Chao-Tung Yang, Chien-Tung Pan, Ping-I Chen:
Using PVFS2 to Construct a Large File System in Data Grids. 272-277
Parallel/Distributed Architectures
- Yunfei Zhang, Changjia Chen, Xiaoping Wang:
Recent Advances in Research on P2P Networks. 278-284 - Brian J. d'Auriol, Tanushree Ghosh:
A Systems Model for Computation, Communication, Command and Control (C4) in a Spacecraft or Satellite Cluster. 285-290 - Chi-Chang Chen, Meng-Xiang Chen:
A Generic Parallel Computing Model for the Distributed Environment. 291-294
Wireless Networks and Mobile Computing
- Toshihiko Yamakami:
A Social View on Unsolicited Bulk Email Impacts on Mobile Mail Addresses. 295-299 - Ken'ichi Yasuda, Shigeaki Tagashira, Satoshi Fujita:
Adaptive MAC Scheme for Wireless LAN Based on Dynamic Group Constructions. 300-305 - Cheng-Ting Kuo, Chiu-Kuo Liang:
A Meshed Multipath Routing Protocol in Mobile Ad Hoc Networks. 306-310
Network Routing and Communication Algorithms
- Xiaohui Li, Ming Han, Kechu Yi, Changxing Pei, Naian Liu:
Radio Resource Management Algorithm Based on Cross-Layer Design for OFDM Systems. 311-314 - Yingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan, Naixue Xiong:
Secure Data Aggregation in Wireless Sensor Networks: A Survey. 315-320 - Diego Arias, Wilson Rivera:
Using Grid Computing to Enable Distributed Radar Data Retrieval and Processing. 321-326
Web Technologies & 2-05 Agent Technologies
- Yonghua Zhang, Feng Hong, Minglu Li, Guangtao Xue:
Building Interest-Oriented Web Search Union. 327-332 - Xiuguo Zhang, Weishi Zhang:
A Cooperative Service Composition Language and Its Formal Semantics. 333-338 - Sunil Kr. Pandey, R. B. Mishra:
Intelligent Web Mining Model to Enhance Knowledge Discovery on the Web. 339-343
Ubiquitous Computing Systems
- Zheng Liang, Juha Plosila, Lu Yan, Kaisa Sere:
Implementing a Self-Timed Low-Power Java Accelerator for Network-on-Chip Applications. 344-347 - Jie Sun, Zhaohui Wu:
Adaptive to Context in Ubiquitous Computing Environments. 348-351
Wireless Networks and Mobile Computing
- Baode Fan, Zhaolin Yin, Sainan Zhang:
A Mobile Service Middleware Supported 4G Adaptive Multimedia Applications. 352-357 - Jiun-Long Huang, Jui-Nan Lin:
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network. 358-363
Task Mapping and Job Scheduling
- Linping Wu, Chao Ren, Dan Meng, Jianfeng Zhan, Bibo Tu:
The Failure-rate Aware Scheduling Policies for Large-scale Cluster Systems. 364-367 - Guangzhong Sun, Bin Fan, Guoliang Chen, Yinghua Zhou:
Study on Scheduling Strategy for Global Computing Application. 368-372 - Petros Lampsas, Thanasis Loukopoulos, Fedon Dimopoulos, Marouso Athanasiou:
Scheduling Independent Tasks in Heterogeneous Environments under Communication Constraints. 373-378
Security Protocols
- Zeng Qingguang, Cui Yanling, Luo Juan:
A Lightweight Key Management Protocol for Hierarchical Sensor Networks. 379-382 - Chun-I Fan, Yu-Kuang Liang, Bo-Wei Lin:
Fair Transaction Protocols Based on Electronic Cash. 383-388 - Zongkai Yang, Haitao Xie, Wenqing Cheng, Yunmeng Tan:
An Identity-Based Fault-Tolerant Conference Key Distribution Scheme. 389-392
Computer Networks
- He Huang, Jin Wang, Bo Yang, Peng Li:
Multi-Class MPLS Resilience Mechanism Supporting Traffic Engineering. 393-398 - Shihong Xu, Hong Shen:
An O(nh) Algorithm for Dual-Server Coordinated En-Route Caching in Tree Networks. 399-404 - Manman Peng, Yuming Wang:
A Self-Tuning Algorithm for Managing Reconfigurable Cache. 405-410
Formal Methods and Programming Languages
- Ali Hamie:
On the Relationship between the Object Constraint Language (OCL) and the Java Modeling Language (JML). 411-414 - Bibo Tu, Ming Zou, Jianfeng Zhan, Lei Wang, Jianping Fan:
Design Patterns of Scalable Cluster System Software. 415-420 - Li Bao, Weishi Zhang, Xiuguo Zhang:
Describing and Verifying Web Service Using CCS. 421-426
Parallel/Distributed Algorithms
- S. Viswanadha Raju, S. R. Mantena, A. Vinaya Babu, G. V. S. Raju:
Efficient Parallel Pattern Matching Using Partition Method. 427-430 - Limin Xiang, Kai Cheng, Kazuo Ushijima:
Sequence Analysis in Constant Time on BSR. 431-436 - Xiaoling Liu, Shou-Ping Gao, De-Liang Gong, Kenli Li:
A Parallel Algorithm by Sampling for the Knapsack Problem Based on MIMD Parallel Computers. 437-441
Intrusion Detection and Survivability
- Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu:
Hacking Tricks Toward Security on Network Environments. 442-447 - Xiong Yang, Jing Lu, Yuguang Zhu, Ping Wang:
Simulation and Evaluation of a New Algorithm of Worm Detection and Containment. 448-453 - Wenqi Liu, Jianhua Yang, Lei Wei:
A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. 454-459
Grid Computing Systems
- Kuo-Qin Yan, Shu-Chin Wang, Chiu-Ping Chang, L. Y. Tseng:
The Anatomy Study of Load Balancing in Distributed System. 460-463 - Libing Wu, Chanle Wu, Jianqun Cui, Huyin Zhang, Gang Ye:
An Overtime-Tolerance Strategy for Advance Reservation. 464-469 - Chen Jing, Kong Ling-fu:
Integrating Reservation Mechanism into Grid Resource Management. 470-473
Applied Cryptography
- Jui-Cheng Yen, Hun-Chen Chen, Jui-Hsiang Juan:
Blind Watermarking Based on the Wavelet Transform. 474-478 - Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Threshold Signature Scheme Resistible for Conspiracy Attack. 479-483
Parallel/Distributed Algorithms
- Mao-yuan Zhang, Ruixuan Li, Zhengding Lu, Chun-yan Zou:
An ECG Parallel Scheduling Algorithm for the Distributed Systems. 484-487 - Hsu-Shen Lin, Chang-Biau Yang, Kuo-Tsung Tseng:
1-Fair Alternator Designs for the de Bruijn Network. 488-491 - Sanya Attari, Ayaz Isazadeh:
Processor Allocation in Mesh Multiprocessors Using a Hybrid Method. 492-496
P2P & Ad Hoc Networks
- (Withdrawn) Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. 497-502
- Yang Li, Binxing Fang, Li Guo:
TTSF: A Novel Two-Tier Spam Filter. 503-508 - Yongjian Li, Jun Pang:
Generalized Unsolicited Tests for Authentication Protocol Analysis. 509-514
Grid Computing Systems
- Wen-Chung Shih, Chao-Tung Yang, Ping-I Chen, Shian-Shyong Tseng:
Performance-Based Content Retrieval for Learning Object Repositories on Grid Environments. 515-520 - Wen-Chung Shih, Chao-Tung Yang, Shian-Shyong Tseng, Chun-Jen Chen:
A Peer-to-Peer Based Framework of InterLibrary Cooperation for Digital Libraries. 521-524 - Hong Liu, Wei Li, Xiaoning Wang, Yili Gong, Tian Luo:
A Service-Oriented Virtual Machine for Grid Applications. 525-530 - Babak Behsaz, Pooya Jaferian, Mohammad Reza Meybodi:
Comparison of Global Computing with Grid Computing. 531-534
Reliability and Fault-Tolerance
- Zhongwen Li, Yefeng Jiang:
An Optimal Adaptive Checkpoint Strategy for DMR with Energy-Aware. 535-538 - Guey-Yun Chang, Gen-Huey Chen:
c-Step Diagnosis. 539-544 - Indranil Saha, Debapriyay Mukhopadhyay, Satyajit Banerjee:
Designing Reliable Architecture for Stateful Fault Tolerance. 545-551 - Hsun-Wen Chang, San-Yu Chen:
The 3-Wide-Diameter of the Hyper-L Triple-Loop Network. 552-557
Parallel/Distributed Algorithms
- Zunce Wei, Hon Fung Li, Dhrubajyoti Goswami:
A Locality-Driven Atomic Group Checkpoint Protocol. 558-564 - Sun-Yuan Hsieh, Huang-Ming Gao:
Hardness and Approximation of the Selected-Leaf-Terminal Steiner Tree Problem. 565-568 - Paul Werstein, Hailing Situ, Zhiyi Huang:
Load Balancing in a Cluster Computer. 569-577 - Chao-Tung Yang, Chun-Sheng Liao, Ping-I Chen, Hao-Yu Tung:
A Information Monitoring and Job Scheduling System for Multiple Linux PC Clusters. 578-582
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.