default search action
NPC 2011: Changsha, China
- Erik R. Altman, Weisong Shi:
Network and Parallel Computing - 8th IFIP International Conference, NPC 2011, Changsha, China, October 21-23, 2011. Proceedings. Lecture Notes in Computer Science 6985, Springer 2011, ISBN 978-3-642-24402-5
Session 1: Filesystems and Data
- Adam Wolfe Gordon, Paul Lu:
Elastic Phoenix: Malleable MapReduce for Shared-Memory Systems. 1-16 - Yu Wang, Jing Xing, Jin Xiong, Dan Meng:
A Load-Aware Data Placement Policy on Cluster File System. 17-31 - Jinjing Zhao, Yan Wen, Gang Zhao:
H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation. 32-43 - Mingdong Tang, Jianxun Liu, Guoqing Zhang:
Improved Compact Routing Schemes for Power-Law Networks. 44-58
Session 2: Network and Parallel Algorithms
- Zhongwei Lin, Yiping Yao:
Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution. 59-70 - Meiguang Zheng, Zhigang Hu, Peng Xiao, Meixia Zheng, Kai Zhang:
A Global Benefit Maximization Task-Bundle Allocation. 71-85 - Xiaofei Liao, Fengjiang Guo, Hai Jin:
Service Quality Assurance Mechanisms for P2P SIP VoIP. 86-98
Session 3: Cluster and Grid
- Yang Liu, Yunchu Liu, Hanli Bai:
VSCM: A Virtual Server Consolidation Manager for Cluster. 99-110 - Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin:
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing. 111-122 - Zhiang Wu, Jie Cao, Youquan Wang:
Dynamic Advance Reservation for Grid System Using Resource Pools. 123-134
Session 4: Trust and Authentication
- Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing:
A Way of Key Management in Cloud Storage Based on Trusted Computing. 135-145 - Qian Zhou, Jiong Yu, Feiran Yu:
A Trust-Based Defensive System Model for Cloud Computing. 146-159 - Yanan Sun, Xiaohong Guan, Ting Liu:
A New Method for Authentication Based on Covert Channel. 160-165
Session 5: Monitor, Diagnose, and Then Optimize
- Ting Liu, Xiaohong Guan, Yu Qu, Yanan Sun:
A Layered Detection Method for Malware Identification. 166-175 - Yingdong Ma, Xiankai Chen, George Chen:
Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features. 176-184 - Daeyong Jung, Sung-Ho Chin, Kwang-Sik Chung, Heon-Chang Yu, Joon-Min Gil:
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment. 185-200
Session 6: Best Paper - 1
- Haiquan (Chuck) Zhao, Nan Hua, Ashwin Lall, Ping Li, Jia Wang, Jun (Jim) Xu:
Towards a Universal Sketch for Origin-Destination Network Measurements. 201-213 - Jianrui Yuan, Jintao Meng:
A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks. 214-231 - Xiaohang Wang, Maurizio Palesi, Mei Yang, Yingtao Jiang, Michael C. Huang, Peng Liu:
Power-Aware Run-Time Incremental Mapping for 3-D Networks-on-Chip. 232-247
Session 7: Best Paper - 2
- Yimo Du, Fang Liu, Zhiguang Chen, Xin Ma:
WeLe-RAID: A SSD-Based RAID for System Endurance and Performance. 248-262 - Zhiguang Chen, Fang Liu, Yimo Du:
Reorder the Write Sequence by Virtual Write Buffer to Extend SSD's Lifespan. 263-276 - Jie Tang, Shaoshan Liu, Zhimin Gu, Chen Liu, Jean-Luc Gaudiot:
Memory-Side Acceleration for XML Parsing. 277-292
Session 8: Microarchitecture
- Tipp Moseley, Neil Vachharajani, William Jalby:
Hardware Performance Monitoring for the Rest of Us: A Position and Survey. 293-312 - Xiongli Gu, Jie Yang, Xiamin Wu, Chunming Huang, Peng Liu:
An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-core System. 313-323
Session 9: Network and Mobile Computing
- Sewon Han, Byung-Seo Kim:
Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless Networks. 324-333 - Min Zhu, Ke Xu, Qi Li:
Access Path Based Source Address Validation in Mobile IPv6. 334-349 - Yunan He, Chen Yang, Xiao-Feng Li:
Improve Google Android User Experience with Regional Garbage Collection. 350-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.