Welcome to the proceedings of GCC2004 and the city of Wuhan. Grid computing has become a mainstream research area in computer science and the GCC conference has become one of the premier forums for presentation of new...
详细信息
ISBN:
(数字)9783540302087
ISBN:
(纸本)9783540235644
Welcome to the proceedings of GCC2004 and the city of Wuhan. Grid computing has become a mainstream research area in computer science and the GCC conference has become one of the premier forums for presentation of new and exciting research in all aspectsofgridandcooperativecomputing. Theprogramcommitteeispleasedtopresent the proceedings of the 3rd International Conference on Grid and Cooperative Comp- ing (GCC2004), which comprises a collection of excellent technical papers, posters, workshops, and keynote speeches. The papers accepted cover a wide range of exciting topics, including resource grid and service grid, information grid and knowledge grid, grid monitoring,managementand organizationtools, grid portal, grid service, Web s- vices and their QoS, service orchestration, grid middleware and toolkits, software glue technologies, grid security, innovative grid applications, advanced resource reservation andscheduling,performanceevaluationandmodeling,computer-supportedcooperative work, P2P computing, automatic computing, and meta-information management. The conference continues to grow and this year a record total of 581 manuscripts (including workshop submissions) were submitted for consideration. Expecting this growth, the size of the program committee was increased from 50 members for GCC 2003 for 70 in GCC 2004. Relevant differences from previous editions of the conf- ence: it is worth mentioning a signi?cant increase in the number of papers submitted by authors from outside China; and the acceptance rate was much lower than for p- vious GCC conferences. From the 427 papers submitted to the main conference, the program committee selected only 96 regular papers for oral presentation and 62 short papers for poster presentation in the program.
We produced a large-throughput optical interconnection for a distributedparallel computing system. It transmits optical data at a rate of over 800-Mbit/s×10-bit through a 50-m single-mode fiber, using a CMOS MUX...
详细信息
We produced a large-throughput optical interconnection for a distributedparallel computing system. It transmits optical data at a rate of over 800-Mbit/s/spl times/10-bit through a 50-m single-mode fiber, using a CMO...
详细信息
We produced a large-throughput optical interconnection for a distributedparallel computing system. It transmits optical data at a rate of over 800-Mbit/s/spl times/10-bit through a 50-m single-mode fiber, using a CMOS MUX/DEMUX and retiming circuits. We measured the BER to be less than 10/sup -9/.
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t...
详细信息
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field that requires users to be on their toes every time they try to connect to this enormous interconnection of networks. Reports and Surveys have said that in the coming years, Cybercrime could become the biggest threat. In this proposed work, the authors have deployed applications and designed malware for the purpose of simulating various kinds of cyber-attacks so that they could study their effects & affects and ultimately devise solutions to resolve the vulnerabilities in a system. These applications included networking concepts & protocols and a software based keylogger which was developed with no malicious intent, but to analyse the architectural view or design of a malware and to study the stages of a malware attack like entry, distribution, exploitation, infection and execution. Efforts have been made to demonstrate spooting attacks with an idea of identifying vulnerabilities and security loopholes in a particular system that can be exploited by an attacker if not resolved within time.
暂无评论