the proceedings contain 41 papers. the topics discussed include: a protocol for the atomic capture of multiple molecules on large scale platforms;lifting the barriers - reducing latencies with transparent transactiona...
ISBN:
(纸本)9783642259586
the proceedings contain 41 papers. the topics discussed include: a protocol for the atomic capture of multiple molecules on large scale platforms;lifting the barriers - reducing latencies with transparent transactional memory;snap-stabilizing message forwarding algorithm on tree topologies;facilitating the design of fault tolerance in transaction level SystemC programs;competitive and deterministic embeddings of virtual networks;interplay between (im)perfectness, synchrony and connectivity: the case of reliable message transmission;hybrid approach for experimental networking research;towards optimal event detection and localization in acyclic flow networks;virtual tree: a robust overlay network for ensuring interval valid queries in dynamic distributed systems;distributed coverage-enhancing algorithms in directional sensor networks with rotatable sensors;and adaptive velocity based guided navigation in wireless sensor networks.
the proceedings contain 127 papers. the topics discussed include: a computational model of imitation and autonomous behavior;does talking to a robot in a high-pitched voice create a good impression of the robot?;the e...
ISBN:
(纸本)9780769547619
the proceedings contain 127 papers. the topics discussed include: a computational model of imitation and autonomous behavior;does talking to a robot in a high-pitched voice create a good impression of the robot?;the efficiency of interactive differential evolution in creation of sound contents: in comparison with interactive genetic algorithm;admission control strategy of serving peers in P2P VoD systems;understanding Botnet: from mathematical modelling to integrated detection and mitigation framework;a novel online event analysis framework for micro-blog based on incremental topic modeling;does it matter what they said? a text mining analysis of the state of the union addresses of USA presidents;enhance the multi-level fuzzy association rules based on cumulative probability distribution approach;and shared-cache simulation for multi-core system with LRU2-MRU collaborative cache replacement algorithm.
the proceedings contain 130 papers. the topics discussed include: an energy driven architecture for wireless sensor networks;a component based hybrid embedded framework for mobile robot;lightweight dynamic partitionin...
ISBN:
(纸本)9780769548791
the proceedings contain 130 papers. the topics discussed include: an energy driven architecture for wireless sensor networks;a component based hybrid embedded framework for mobile robot;lightweight dynamic partitioning for last level cache of multicore processor on real system;a virtual sample generation approach for speculative multithreading using feature sets and abstract syntax trees;layered models for general parallel computation based on heterogeneous system;can we make it faster? efficient may-happen-in-parallel analysis revisited;solving parameter selection problem of helper thread prefetching via real-time hardware performance monitoring;a non-blocking self-organizing linked list algorithm;a smart-card-based remote user authentication protocol with privacy support;length-constrained and connected tours for sensor networks;and an efficient mobile social network for enhancing contents sharing over mobile ad-hoc networks.
the 13thinternationalconference on Software Engineering, Artificial Intelligence, networking, and Parallel/distributedcomputing (SNPD 2012) is being held in Kyoto, Japan. the conference is sponsored by the Internat...
详细信息
this book constitutes the refereed proceedings of the 13th international conference on distributed computing and networking, icdcn 2012, held in Hong Kong, China, during January 3-6, 2012.;the 36 revised full papers a...
详细信息
ISBN:
(数字)9783642259593
ISBN:
(纸本)9783642259586
this book constitutes the refereed proceedings of the 13th international conference on distributed computing and networking, icdcn 2012, held in Hong Kong, China, during January 3-6, 2012.;the 36 revised full papers and 1 short paper presented together with 4 poster papers were carefully reviewed and selected from 100 submissions. the papers address all current issues in the field of distributedcomputing and networking. Being a leading forum for researchers and practitioners to exchange ideas and share best practices, icdcn also hosts as a forum for PhD students to discuss their research ideas and get quality feedback from the well-renowned experts in the field of distributedcomputing and computer networking.
Proxy signatures allow a proxy signer to sign messages on behalf of an original signer within a given context. they are widely used in distributed systems, grid computing, mobile agent applications, distributed shared...
详细信息
Today's large scale distributed systems are characterized by strong dynamics caused by the inherent unreliability of their constituting elements (e.g. process and link failures, processes joining or leaving the sy...
详细信息
the key infrastructure of Cloud computing is data center which is shared by many tenants. Each tenant's application competes for acquiring more network bandwidth in order to maximize its utility. However, this may...
详细信息
ISBN:
(纸本)9780769548791
the key infrastructure of Cloud computing is data center which is shared by many tenants. Each tenant's application competes for acquiring more network bandwidth in order to maximize its utility. However, this may cause interference among these diverse applications. Malicious competition not only degrades its performance, but also makes the overall performance of the data center poor and ineffective. To ensure the Quality of Services (QoS) and achieve high network utilization, in this paper, we propose a bandwidth allocation scheme for data center networks (DCNs), which is based on an application utility-based model. In our scheme, multi-path feature of DCN is leveraged to improve the network utilization, and utility functions are constructed to differentiate the throughput and delay sensibilities of different applications. Moreover, our scheme is suitable for arbitrary DCN topologies and without modification on current hardware. the numerical simulation shows that our scheme can provide bandwidth guarantee, fine-grained service differentiation and achieve high network utilization.
Searching frequent patterns in transactional databases is considered as one of the most important data mining problems and Apriori is one of the typical algorithms for this task. Developing fast and efficient algorith...
详细信息
It is an important task to tune performance for sparse matrix vector multiplication (SpMV), but it is also a difficult task because of its irregularity. In this paper, we propose a cache blocking method to improve the...
详细信息
暂无评论