


default search action
8. GPC 2013: Seoul, Korea
- James J. Park, Hamid R. Arabnia, Cheonshik Kim

, Weisong Shi, Joon-Min Gil:
Grid and Pervasive Computing - 8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings. Lecture Notes in Computer Science 7861, Springer 2013, ISBN 978-3-642-38026-6
Cloud, Cluster and Grid I
- Jonas Repschlaeger:

Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics. 1-10 - Marcus Hilbrich

, René Jäkel
:
Distributed Accounting in Scope of Privacy Preserving. 11-22 - Li Ruan, Jinbing Peng, Limin Xiao, Mingfa Zhu:

Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration. 23-31 - Shyamala Loganathan

, Saswati Mukherjee:
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment. 32-39 - Lun-Chi Chen

, Ping-Jen Kuo, I-En Liao, Jyun-Yao Huang:
Scaling Out Recommender System for Digital Libraries with MapReduce. 40-47 - Muhammad Imran, Helmut Hlavacs:

Layering of the Provenance Data for Cloud Computing. 48-58 - Tyng-Yeu Liang, Yu-Jie Lin:

JCL: An OpenCL Programming Toolkit for Heterogeneous Computing. 59-72 - Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, Jong Hyuk Park:

Network-Aware Multiway Join for MapReduce. 73-80 - Ching-Chi Lin

, Jan-Jan Wu, Pangfeng Liu
, Jeng-An Lin, Li-Chung Song:
Automatic Resource Scaling for Web Applications in the Cloud. 81-90 - Maxim Schnjakin, Christoph Meinel:

Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. 91-102 - Soheil Anousha, Mahmood Ahmadi

:
An Improved Min-Min Task Scheduling Algorithm in Grid Computing. 103-113
Cloud, Cluster and Grid II
- Jin-Neng Wu, Yao-Hsing Ko, Kuo-Ming Huang, Mu-Kai Huang:

Heterogeneous Diskless Remote Booting System on Cloud Operating System. 114-123 - Xiaohu Bai, Hai Jin, Xiaofei Liao, Xuanhua Shi, Zhiyuan Shao:

RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System. 124-133 - Seonyoung Park, Youngseok Lee

:
Secure Hadoop with Encrypted HDFS. 134-141 - Daeyong Jung, Sung-Ho Chin, Kwang-Sik Chung

, Heon-Chang Yu
:
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing. 142-151 - Mansura Habiba, Shamim Akhter

:
A Cloud Based Natural Disaster Management System. 152-161 - Mohamed Ben Belgacem, Haithem Hafsi, Nabil Abdennadher:

A Hybrid Grid/Cloud Distributed Platform: A Case Study. 162-169 - Mohammad Mahdi Kashef, Azamat Uzbekov, Jörn Altmann

, Matthias Hovestadt:
Comparison of Two Yield Management Strategies for Cloud Service Providers. 170-180 - Oliver Maye, Michael Maaser:

Comparing Java Virtual Machines for Sensor Nodes - First Glance: Takatuka and Darjeeling. 181-188 - Jianyong Zhang, Qihui Mi, Longji Hu, Yue Tang:

Research on Opinion Formation of Microblog in the View of Multi-agent Simulation. 189-198 - Chao-Tung Yang

, Kuan-Lung Huang, William Cheng-Chung Chu, Fang-Yie Leu, Shao-Feng Wang:
Implementation of Cloud IaaS for Virtualization with Live Migration. 199-207
Middleware, Resource Management
- Sang-Soo Yeo

, Jong Hyuk Park:
Security Considerations in Cloud Computing Virtualization Environment. 208-215 - Shuai Li, Fei Hao

, Mei Li, Hee-Cheol Kim:
Medicine Rating Prediction and Recommendation in Mobile Social Networks. 216-223 - Antero Taivalsaari

, Tommi Mikkonen, Kari Systä
:
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface. 224-233 - Francisco Lepe Salazar

, Tatsuo Nakajima, Todorka Alexandrova
:
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment. 234-243 - Glaucio H. S. Carvalho, Isaac Woungang, Md. Mizanur Rahman, Alagan Anpalagan

:
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks. 244-252 - Leila Abidi, Christophe Cérin, Mohamed Jemni

:
Desktop Grid Computing at the Age of the Web. 253-261 - Miran Baek, Myeongbae Lee, Honggean Kim, Taehyung Kim, Namjin Bae, Yongyun Cho

, Jangwoo Park, Chang-Sun Shin:
A Novel Model for Greenhouse Control Architecture. 262-269
Mobile, Peer-to-Peer and Pervasive Computing
- Chittaranjan Hota

, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, Antti Ylä-Jääski:
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks. 270-279 - Chulhee Cho, Jae Young Choi, Younghwa Cho, Jong Pil Jeong

:
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments. 280-287 - Kevin I-Kai Wang, HeeJong Park, Zoran Salcic

, Panith Ratnayaka:
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications. 288-298 - Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba, Cheonshik Kim

:
Architecture of a Context Aware Framework for Automated Mobile Device Configuration. 299-308 - Seung Yoon Park, Jae Young Choi, Jong Pil Jeong

:
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 Networks. 309-316
Multi-core and High Performance Computing
- Ying Zhang, Gen Li, Yongjin Li, Caixia Sun, Pingjing Lu:

The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor. 317-325 - Yu Zhang, Hai Jin, Xiaofei Liao:

DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM. 326-335 - Lei Zhu, Jianhua Gu, Tianhai Zhao, Yunlan Wang:

Research on Log Pre-processing for Exascale System Using Sparse Representation. 336-347
Other GPC Related Topics
- Truong Giang Le, Olivier Hermant

, Matthieu Manceny, Renaud Pawlak, Renaud Rioboo:
Using Event-Based Style for Developing M2M Applications. 348-357 - (Withdrawn) Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic Algorithm. 358-366

- Erratum: Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic Algorithm.

- Young-Sung Cho, Si Choon Noh, Song Chul Moon:

Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System. 367-375 - Bangjie Jiang, Junmin Wu, Xiaodong Zhu, Die Hu:

Priority-Based Live Migration of Virtual Machine. 376-385 - Youngguk Kim, Heung-Gyoon Ryu:

Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK. 386-392 - Richelle LeMay, Sangil Choi, Jong-Hoon Youn, Jay Newstorm:

Postural Transition Detection Using a Wireless Sensor Activity Monitoring System. 393-402
Parallel and Distributed Systems
- Yong Wan, Dan Feng, Fang Wang, Tingwei Zhu:

A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication. 403-412 - Jinzhou Huang, Hai Jin:

Friends Based Keyword Search over Online Social Networks. 413-422 - Chih-Yuan Yeh, Chung-Yao Kao, Wei-Shu Hung, Ching-Chi Lin, Pangfeng Liu

, Jan-Jan Wu, Kuang-Chih Liu:
GPU Virtualization Support in Cloud System. 423-432 - Yi Chen, Zhi Qiao

, Hai Jiang, Kuan-Ching Li
, Won Woo Ro:
MGMR: Multi-GPU Based MapReduce. 433-442
Security and Privacy
- Sung-ju Kim, Byung-Chul Kim, Jae Yong Lee

:
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity. 443-452 - Jyun-Yao Huang, Cheng-Kang Chiang, I-En Liao:

An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment. 453-463 - Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin:

Active One-Time Password Mechanism for User Authentication. 464-471 - Jed Kao-Tung Chang, Chen Liu

, Jean-Luc Gaudiot:
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection. 472-481 - Junyeong Bok, Heung-Gyoon Ryu:

Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security. 482-490 - Yuliang Shi, Zhen Jiang, Kun Zhang:

Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications. 491-500 - Yao Ma, Hongwei Lu, Zaobin Gan:

QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments. 501-508 - Yi Qin, Dan Feng, Wei Tong

, Jingning Liu, Yang Hu, Zhiming Zhu:
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs. 509-516 - Isaac Woungang, Sanjay Kumar Dhurandher, Michael Sahai:

An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath. 517-525 - Mi-Young Jang, Jae-Woo Chang:

A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services. 526-535 - Hyunjo Lee

, Jae-Woo Chang:
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based Services. 536-545
Ubiquitous Communications, Sensor Networking, and RFID
- Chih-Hsiao Tsai

, Kai-Ti Chang, Cheng-Han Tsai, Ying-Hong Wang:
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks. 546-555 - Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Byung-Jun Lee, Seulbi Lee, Dae-Yong Im:

Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles. 556-562 - Kyungkoo Jun:

Enabling Massive Machine-to-Machine Communications in LTE-Advanced. 563-569 - Hyun-Ho Shin, Seungjin Lee, Byung-Seo Kim:

Enhancements for Local Repair in AODV-Based Ad-Hoc Networks. 570-576 - Dong-Min Shin, Dongil Shin, Dongkyoo Shin:

Smart Watch and Monitoring System for Dementia Patients. 577-584 - Daesik Kim, Seongkee Lee, Mirim Ahn:

A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems. 585-593 - HyunJu Lee, Dongil Shin, Dongkyoo Shin, Soohan Kim:

A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services. 594-601 - Tae-Gyu Lee, Gi-Soo Chung:

DNA-S: Dynamic Cellular Network Architecture for Smart Communications. 602-611
Ubiquitous and Multimedia Application Systems
- Jaewan Shin, Dongkyoo Shin, Dongil Shin:

Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment. 612-622 - Sunghee Lee, Seongah Chin:

Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features. 623-630 - Guyoun Hwang, Heejun Cho, Dongkyoo Shin, Dongil Shin:

Emotion Recognition Technique Using Complex Biomedical Signal Analysis. 631-640 - Soo Young Shin, Soo-Hyun Park:

RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network. 641-648 - Phan Trung Huy, Cheonshik Kim

, Nguyen Tuan Anh, Le Quang Hoa, Ching-Nung Yang
:
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules. 649-658 - Jin-Hong Kim, Seung-Cheon Kim:

Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering. 659-664
Design, Analysis and Tools for Integrated Circuits and Systems
- Nan Zhang, Dejun Xie, Eng Gee Lim

, Kaiyu Wan, Ka Lok Man:
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates. 665-675 - Nan Zhang, Kaiyu Wan, Eng Gee Lim

, Ka Lok Man:
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees. 676-685 - Kaiyu Wan, Vangalur S. Alagar:

A Resource-Centric Architecture for Service-Oriented Cyber Physical System. 686-693 - Jin Zheng, Nan Zhang, Dejun Xie:

Implied Volatilities of S&P 100 Index with Applications to Financial Market. 694-699 - Meng Zhang, Eng Gee Lim

, Zhao Wang, Tammam Tillo, Ka Lok Man, Jing Chen Wang:
RF Characteristics of Wireless Capsule Endoscopy in Human Body. 700-706 - Chi-Un Lei

, J. K. Seon, Zhun Shen, Ka Lok Man, Danny Hughes, Youngmin Kim:
Building a Laboratory Surveillance System via a Wireless Sensor Network. 707-714 - Danny Hughes, Nelly Bencomo, Brice Morin, Christophe Huygens

, Zhun Shen, Ka Lok Man:
S-Theory: A Unified Theory of Multi-paradigm Software Development. 715-722
Future Science Technologies and Applications
- Taekyeong Kang, Namje Park

:
Design of J-VTS Middleware Based on IVEF Protocol. 723-729 - Youngsook Lee, Dongho Won:

On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol. 730-736 - I-Hui Li, Jyun-Yao Huang, I-En Liao, Jin-Han Lin:

A Sequence Classification Model Based on Pattern Coverage Rate. 737-745 - Yeonghae Ko, Namje Park

:
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School. 746-751 - Youngseok Chung, Youngsook Lee, Dongho Won:

Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. 752-760 - Mijin Kim

, Namje Park
, Dongho Won:
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. 761-766 - Jaeho An, Namje Park

:
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School. 767-772 - Namje Park

, Yeonghae Ko:
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection. 773-780 - Mijin Kim

, Namje Park
:
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System. 781-787 - Hyun-Jung Lee, Youngsook Lee, Dongho Won:

Security Requirement of End Point Security Software. 788-795 - Inkyung Jeun, Youngsook Lee, Dongho Won:

Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. 796-802 - Hyunsik Yang, Qiuyan Jin, Hanwook Lee

, Kwang-Woo Lee, Dongho Won:
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity. 803-810 - Chun-Cheng Lin

, Yi-Ling Lin, Wan-Yu Liu
:
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing. 811-818
Green and Human Information Technology
- Hoyoung Hwang, Seungcheon Kim:

Topology Information Based Spare Capacity Provisioning in WDM Networks. 819-825 - Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong, Yong Lee:

A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics. 826-831 - Jin-Hong Kim, Seung-Cheon Kim:

Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System. 832-837 - Heejung Yu:

Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users. 838-845 - Byung Joon Oh, Ki Young Lee:

H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC. 846-853 - Xin Wang, Heung-Gyoon Ryu:

Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm. 854-859 - Jaeho Lee, Yongjin Lee, Seung-Cheon Kim:

A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. 860-865 - Shu Chen, Rashid Ahmad

, Byung-Gil Lee, Byung-Doo Kim, Do-Hyeun Kim:
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway. 866-872 - Won-Hyuk Yang, Mohamed A. Ahmed

, Ki-Beom Lee, Young-Chon Kim:
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks. 873-879 - Le The Dung

, Seungwan Jo, Beongku An:
VLC Based Multi-hop Audio Data Transmission System. 880-885 - Le The Dung

, Sue Hyung Ha, Beongku An:
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless Networks. 886-892 - Sue Hyung Ha, Le The Dung

, Beongku An:
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless Networks. 893-898 - Dae-Man Do, Maeng-Hwan Hyun, Young-Bok Choi:

RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation Support. 899-906 - Joongjin Kook

:
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor Networks. 907-913 - Jun-Pill Boo, Sang-Chul Kim, Dong-Hwan Park, Hyo-Chan Bang, Do-Hyeun Kim:

A Study of Fire Refuge Guide Simulator Based on Sensor Networks. 914-919 - Kee-Won Kim

, Jun-Cheol Jeon:
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array. 920-925 - Jae-Wook Seol, Kwang-Yong Jeong, Kyung-Soon Lee:

Follower Classification through Social Network Analysis in Twitter. 926-931 - Yalin Wu, Sun-Woo Ko:

An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264. 932-938 - Seok-Pil Lee, Euiseok Nahm:

The Development of Privacy Telephone Sets in Encryption System against Eavesdropping. 939-944 - Eun-Jun Yoon, Yong Soo Choi, Cheonshik Kim

:
New ID-Based Proxy Signature Scheme with Message Recovery. 945-951

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














