The proceedings contain 99 papers. The special focus in this conference is on Grid computing and Peer-to-Peer computing. The topics include: Secure grid computing with trusted resources and internet datamining;towards...
ISBN:
(纸本)3540233881
The proceedings contain 99 papers. The special focus in this conference is on Grid computing and Peer-to-Peer computing. The topics include: Secure grid computing with trusted resources and internet datamining;towards memory oriented scalable computer architecture and high efficiency petaflops computing;making the grid virtually yours;productivity in HPC clusters;whole-stack analysis and optimization of commercial workloads on server systems;fuzzy trust integration for security enforcement in grid computing;atomic commitment in grid database systems;a data grid security system based on shared context;a study on performance monitoring techniques for traditional parallel systems and grid;a workflow-based grid portal for problem solving environment;a data-aware resource broker for data grids;managing service-oriented grids: experiences from vega system software;an efficient parallel loop self-scheduling on grid environments;a scalable runtime infrastructure for high performance grid computing;mapping publishing and mapping adaptation in the middleware of railway information grid system and a heuristic algorithm for the job shop scheduling problem.
The proceedings contain 73 papers. The special focus in this conference is on Grid computing, Peer-to-Peer computing, Web techniques, Cluster computing, parallel programming and environment and network architecture. T...
ISBN:
(纸本)354029810X
The proceedings contain 73 papers. The special focus in this conference is on Grid computing, Peer-to-Peer computing, Web techniques, Cluster computing, parallel programming and environment and network architecture. The topics include: An adaptable stream-integrated grid monitoring system;performance modeling and analysis for resource scheduling in data grids;study on π-calculus based equipment grid service chain model;a performance-based parallel loop self-scheduling on grid computing environments;a resource-based server performance control for grid computing systems;an index-based XML parser model;a stochastic control model for hierarchical grid service;service-based grid resource monitoring with common information model;distributed gridflow model and implementation;a secure P2P video conference system for enterprise environments;adaptive query-caching in peer-to-peer systems;design and deployment of locality-aware overlay multicast protocol for live streaming services;dynamic thread management in kernel pipeline web server;QoS aware service composition with multiple quality constraints;performance modelling and optimization of memory access on cellular computer architecture Cyclops64;a parallel file system based on spatial information object;topology-aware multi-cluster architecture based on efficient index techniques;a parallel routing algorithm on circulant networks employing the hamiltonian circuit latin square;an efficient load balancing algorithm for cluster system;a greedy algorithm for capacity-constrained surrogate placement in CDNs;an improved scheme of wavelength assignment for parallel FFT communication pattern on a class of regular optical networks and distributed active measuring link bandwidth in IP networks.
The proceedings contain 32 papers. The special focus in this conference is on network Technologies, network Applications, parallel Architectures and Distributed Software. The topics include: An AIAD-based adaptive rou...
ISBN:
(纸本)3540881395
The proceedings contain 32 papers. The special focus in this conference is on network Technologies, network Applications, parallel Architectures and Distributed Software. The topics include: An AIAD-based adaptive routing protocol in ad-hoc wireless networks;adaptive neighbor selection for service discovery in mobile ad hoc networks;a formal approach to robustness testing of network protocol;a kind of session reconstruction DFA;feedback control-based database connection management for proportional delay differentiation-enabled web application servers;research on the detection of distributed denial of service attacks based on the characteristics of IP flow;password-authenticated key exchange between clients in a cross-realm setting;forward secure password-based authenticated key distribution in the three-party setting;key management using certificateless public key cryptography in ad hoc networks;a locality bounded flat hash location service;accelerating the propagation of active worms by employing multiple target discovery techniques;a hybrid replication strategy for exhaustive p2p search;a trusted resource discovery and automatic invocation p2p framework;a novel approach to manage asymmetric traffic flows for secure network proxies;automatic transformation for overlapping communication and computation;cooperative communication system for parallelcomputing agents in multi-cluster grid;online balancing two independent criteria;procrastination scheduling for fixed-priority tasks with preemption thresholds;towards resource reliability support for grid workflows;an efficient authentication and key agreement protocol in RFID system and ontology-based semantic method for service modeling in grid.
The proceedings contain 41 papers. The special focus in this conference is on network and parallelcomputing. The topics include: Vectorization for Java;just-in-time compiler assisted object reclamation and space reus...
ISBN:
(纸本)3642156711
The proceedings contain 41 papers. The special focus in this conference is on network and parallelcomputing. The topics include: Vectorization for Java;just-in-time compiler assisted object reclamation and space reuse;optimization of triangular matrix functions in BLAS library on Loongson2F;exposing tunable parameters in multi-threaded numerical code;LU decomposition on cell broadband engine: an empirical study to exploit heterogeneous chip multiprocessors;block level data migration policy in tiered storage system;scale-adaptable recrawl strategies for DHT-Based distributed web crawling system;power efficient scheduling for hard real-time systems on a multiprocessor platform;storage device performance prediction with selective bagging classification and regression tree;embedding algorithms for bubble-sort, macro-star, and transposition graphs;an efficient simulation algorithm for cache of random replacement policy;a double auction bayesian game-based pricing model in cloud market;a network performance aware BitTorrent traffic optimization mechanism;user behavior pattern analysis and prediction based on mobile phone sensors;a peer-to-peer framework for QoS-Aware service composition;identifying nearest neighbor nodes and connectivity in three-dimensional wireless sensor networks using poisson point field;a novel trust evaluation model for mobile P2P networks;evaluating and optimizing I/O virtualization in kernel-based virtual machine (KVM);distributed stream processing with DUP;a complemental clustering index on distributed ordered tables for multi-dimensional range queries;online event correlations analysis in system logs of large-scale cluster systems and differentiated replication strategy in data centers.
The proceedings contain 91 papers. The topics discussed include: synchronization of discrete chaotic dynamical systems using active control;secure prophet address allocation for mobile ad hoc networks;two security pro...
ISBN:
(纸本)9780769533544
The proceedings contain 91 papers. The topics discussed include: synchronization of discrete chaotic dynamical systems using active control;secure prophet address allocation for mobile ad hoc networks;two security problems of RFID security method with ownership transfer;novel stream cipher Using 2-D hybrid CA and variable ordered recursive CA substitutions;a dynamic and self-adaptive network security policy realization mechanism;a dual-head cluster based secure aggregation scheme for sensor networks;ontology-based knowledge representation for a P2P multi-agent distributed intrusion detection system;secure bit enhanced canary: hardware enhanced buffer-overflow protection;an improved method for ranking of search results based on user interest;characterization of attackers' activities in honeypot traffic using principal component analysis;and a novel sliding window based change detection algorithm for asymmetric traffic.
The proceedings contain 172 papers. The topics discussed include: the info-plosion project;keyword search on relational databases;efficient algorithms for on-line analysis processing on compressed data warehouses;quer...
详细信息
ISBN:
(纸本)0769529437
The proceedings contain 172 papers. The topics discussed include: the info-plosion project;keyword search on relational databases;efficient algorithms for on-line analysis processing on compressed data warehouses;querying graph-structured data;content-based search using term aggregation and classification over hybrid peer-to-peer systems;collaborative legal information sharing on P2P network;a reliable SLA-based admission controller for MPLS networks;a conceptual framework for a SIM-based electronic transaction authentication system;constructing role-based access control and delegation based on hierarchical IBS;DoS evading mechanism upon service hopping;a novel gray hole attack detection scheme for mobile ad hoc networks;sharing software resources with floating license in grid environment;anti-phishing by smart mobile device;and an efficient sensor observation data registration based on asynchronous service middleware.
The proceedings contain 22 papers. The special focus in this conference is on network and parallelcomputing. The topics include: Balancing the QOS and security in dijkstra algorithm by SDN technology;labeled network ...
ISBN:
(纸本)9783030056766
The proceedings contain 22 papers. The special focus in this conference is on network and parallelcomputing. The topics include: Balancing the QOS and security in dijkstra algorithm by SDN technology;labeled network stack: A co-designed stack for low tail-latency and high concurrency in datacenter services;A deep learning approach for network anomaly detection based on AMF-LSTM;FSObserver: A performance measurement and monitoring tool for distributed storage systems;VGrouper: Optimizing the performance of parallel jobs in xen by increasing synchronous execution of virtual machines;systolic array based accelerator and algorithm mapping for deep learning algorithms;A fine-grained performance bottleneck analysis method for HDFS;mimir+: An optimized framework of mapreduce on heterogeneous high-performance computing system;DLIR: An intermediate representation for deep learning processors;ALOR: Adaptive layout optimization of raft groups for heterogeneous distributed key-value stores;GPU memory management solution supporting incomplete pages;Leveraging subgraph extraction for performance portable programming frameworks on DL accelerators;an intelligent parking scheduling algorithm based on traffic and driver behavior predictions;StrieGD: A sampling trie indexed compression algorithm for large-scale gene data;On retargeting the AI programming framework to new hardwares;An efficient method for determining full point-to-point latency of arbitrary indirect HPC networks;KT-store: A key-order and write-order hybrid key-value store with high write and range-query performance;GRAM: A GPU-based property graph traversal and query for HPC rich metadata management;GPU-Accelerated clique tree propagation for pouch latent tree models;HPC-SFI: System-level fault injection for high performance computing systems.
The proceedings contain 27 papers. The special focus in this conference is on Filesystems and Data. The topics include: Malleable mapreduce for shared-memory systems;a load-aware data placement policy on cluster file ...
ISBN:
(纸本)9783642244025
The proceedings contain 27 papers. The special focus in this conference is on Filesystems and Data. The topics include: Malleable mapreduce for shared-memory systems;a load-aware data placement policy on cluster file system;a new heuristic method for fuzzing data generation;improved compact routing schemes for power-law networks;accelerating the requirement space exploration through coarse-grained parallel execution;a global benefit maximization task-bundle allocation;service quality assurance mechanisms for P2P SIP VoIP;a virtual server consolidation manager for cluster;informed live migration strategies of virtual machines for cluster load balancing;dynamic advance reservation for grid system using resource pools;a way of key management in cloud storage based on trusted computing;a trust-based defensive system model for cloud computing;a new method for authentication based on covert channel;a layered detection method for malware identification;pedestrian detection and tracking using HOG and oriented-LBP features;an efficient checkpointing scheme using price history of spot instances in cloud computing environment;towards a universal sketch for origin-destination network measurements;a power adjusting algorithm on mobility control in mobile ad hoc networks;power-aware run-time incremental mapping for 3-D networks-on-chip;a SSD-based RAID for system endurance and performance;reorder the write sequence by virtual write buffer to extend SSD’s lifespan;memory-side acceleration for XML parsing;hardware performance monitoring for the rest of us and an efficient architectural design of hardware interface for heterogeneous multi-core system.
暂无评论