


default search action
13th ICPADS 2007: Hsinchu, Taiwan
- 13th International Conference on Parallel and Distributed Systems, ICPADS 2007, Hsinchu, Taiwan, December 5-7, 2007. IEEE Computer Society 2007, ISBN 978-1-4244-1889-3

Volume 1
- Lionel M. Ni:

Message from the general chair. 1 - Wen-Tsuen Chen:

Message from the honorary chair. 1 - Chung-Ta King:

Message from the program chair. 1 - Chun-Hao Hsu, Jian Jhen Chen, Shiao-Li Tsao:

Evaluation and modeling of power consumption of a heterogeneous dual-core processor. 1-8 - Alejandro Muñoz, Armando Ferro, Fidel Liberal

, Javier López:
Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. 1-8 - Lin Gao, Lian Li, Jingling Xue

, Tin-Fook Ngai:
Loop recreation for thread-level speculation. 1-10 - Miaomiao Wang, Jiannong Cao

, Yan Sun, Jing Li:
Toward ubiquitous searching. 1-8 - Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:

Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approaches. 1-8 - Jung-Chun Kao, Radu Marculescu

:
Energy-efficient anonymous multicast in mobile ad-hoc networks. 1-8 - Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada:

Early containment of worms using dummy addresses and connection trace back. 1-8 - Wenzhong Li, Yilin Wang, Chunhong Li, Sanglu Lu, Daoxu Chen:

A QoS-aware service selection algorithm for multimedia service overlay networks. 1-8 - Zhoujun Li, Yun Sun, Deqiang Wang:

Diameter bounds of cubelike recursive networks. 1-8 - Cheng-Lung Lin, Xin-Zhong Chen, Kuan-Ju Lin, Shiao-Li Tsao:

Sharing information of three-dimensional geographic locations through mobile devices. 1-8 - Thanukrishnan Srinivasan, R. Balakrishnan, S. A. Gangadharan, Hayawardh Vijayakumar:

A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment. 1-8 - Ruipeng Li, Hai Jiang, Hung-Chi Su, Bin Zhang, Jeff Jenness:

Speculative and distributed simulation of many-particle collision systems. 1-8 - En-Jan Chou, Pangfeng Liu

, Jan-Jan Wu:
Computation and communication schedule optimization for jobs with shared data. 1-8 - Changjiu Xian, Yung-Hsiang Lu, Zhiyuan Li:

Adaptive computation offloading for energy conservation on battery-powered systems. 1-8 - Vincent S. Tseng, Eric Hsueh-Chan Lu

, Cheng-Hsien Huang:
Mining temporal mobile sequential patterns in location-based service environments. 1-8 - Hoda Akbari, Zeinab Iranmanesh, Mohammad Ghodsi:

Parallel Minimum Spanning Tree Heuristic for the steiner problem in graphs. 1-8 - Nathaniel Pettis, Yung-Hsiang Lu:

Improving quality-of-service of file migration policies in high-performance servers. 1-8 - Roger Curry, Cameron Kiddle, Rob Simmonds:

RAASP: Resource allocation analysis service and portal. 1-8 - Akira Yamawaki, Masahiko Iwane:

An FPGA implementation of a snoop cache with synchronization for a multiprocessor system-on-chip. 1-8 - Eric Fontaine, Hsien-Hsin S. Lee:

Optimizing Katsevich image reconstruction algorithm on multicore processors. 1-8 - Fong Pong, Nian-Feng Tzeng, Koray Öner, Chun Ning, Kwong-Tak Chui, Manoj Ekbote, Yanping Lu:

Communication performance of a modular high-bandwidth multiprocessor system. 1-8 - Chi-Hsiang Yeh, Richard Wu:

Prohibition-based MAC protocols for QoS-enhanced mesh networks and high-throughput WLANs. 1-5 - Haiying (Helen) Shen, Yingwu Zhu:

FairTrust: Toward secure and high performance P2P networks. 1-8 - Philip Chan, David Abramson

:
Persistence and communication state transfer in an asynchronous pipe mechanism. 1-8 - Fabian Stäber, Gerald Kunzmann, Jörg P. Müller:

Extended Prefix Hash Trees for a distributed phone book application. 1-8 - Matthew J. Probst, Sneha Kumar Kasera:

Statistical trust establishment in wireless sensor networks. 1-8 - Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono:

Finding candidate spots for replica servers based on demand fluctuation. 1-10 - Anthony Sulistio, Kyong Hoon Kim, Rajkumar Buyya:

On incorporating an on-line strip packing algorithm into elastic Grid reservation-based systems. 1-8 - Mrinmoy Ghosh, Hsien-Hsin S. Lee:

Virtual Exclusion: An architectural approach to reducing leakage energy in caches for multiprocessor systems. 1-8 - Ying Li, Seng Wai Loke, M. V. Ramakrishna:

Performance study of data stream approximation algorithms in wireless sensor networks. 1-8 - Nian-Feng Tzeng, Hongyi Wu, Gui Liang Feng:

ADENS: Efficient address determination for mobile grids. 1-8 - Paul Burstein, Alan Jay Smith:

Efficient search in file-sharing networks. 1-9 - Bundit Manaskasemsak, Nunnapus Benjamas, Arnon Rungsawang, Athasit Surarerks, Putchong Uthayopas:

Parallel association rule mining based on FI-growth algorithm. 1-8 - Henry Larkin:

Data representations for mobile devices. 1-6 - Tao Yang, Leonard Barolli, Makoto Ikeda, Arjan Durresi, Fatos Xhafa

:
Network energy consumption in ad-hoc networks under different radio models. 1-8 - Akihiro Fujiwara, Yasuhiro Sagara, Masahiko Nakamura:

Access point selection algorithms for maximizing throughputs in wireless LAN environment. 1-8 - Hon Fung Li, Eslam Al Maghayreh:

Using synchronized atoms to check distributed programs. 1-8 - Gur Saran Adhar:

Parallel algorithms for chains and anti-chains of points on a plane. 1-7 - Yung-Da Cheng, Jang-Ping Sheu:

A group-based multi-channel MAC protocol for wireless ad hoc networks. 1-8 - Samee Ullah Khan

, Ishfaq Ahmad:
A cooperative game theoretical replica placement technique. 1-8 - Rong Wu, Douglas G. Down:

On the relative value of local scheduling versus routing in parallel server systems. 1-9 - Shun-Yu Chuang, Chien Chen, Chang-Jie Jiang:

Minimum-delay energy-efficient source to multisink routing in wireless sensor networks. 1-8 - Yanhong Liu, Bharadwaj Veeravalli, Sivakumar Viswanathan:

Novel critical-path based low-energy scheduling algorithms for heterogeneous multiprocessor real-time embedded systems. 1-8 - Tao Gu, Daqing Zhang, Hung Keng Pung:

A two-tier semantic overlay network for P2P search. 1-8 - Matthew Nichols, David Taylor:

A faster closure algorithm for pattern matching in partial-order event data. 1-9 - Agustín C. Caminero

, Anthony Sulistio, María Blanca Caminero, Carmen Carrión
, Rajkumar Buyya:
Extending GridSim with an architecture for failure detection. 1-8 - Junfeng Xie, Zhenhua Li, Guihai Chen

:
A semantic overlay network for unstructured peer-to-peer protocols. 1-8 - Xuejun Yang, Yu Deng, Xiaobo Yan, Li Wang, Jing Du, Ying Zhang:

Efficient generation of stream programs from loops. 1-8 - Sun-Yuan Hsieh, Chang-Yu Wu, Chia-Wei Lee:

Fault-free Hamiltonian cycles in locally twisted cubes under conditional edge faults. 1-8 - Xudong Liu, Xiaoxuan Ma, Jun Han, Xuelian Lin:

A dual scale heterogeneous organizational network model. 1-8 - MingJian Tang, Jinli Cao

:
Optimization on distributed user management in Wireless Sensor Networks. 1-8 - Yunhuai Liu, Lionel M. Ni:

A new MAC protocol design for long-term applications in wireless sensor networks. 1-8 - Kai Han, Binoy Ravindran

, E. Douglas Jensen:
RTMG: Scheduling real-time distributable threads in large-scale, unreliable networks with low message overhead. 1-8 - Feiqi Su, Xudong Shi, Gang Liu, Ye Xia, Jih-Kwon Peir:

Comparative evaluation of multi-core cache occupancy strategies. 1-8 - Wenyu Qu, Masaru Kitsuregawa, Keqiu Li:

Performance analysis on mobile agent-based parallel information retrieval approaches. 1-8 - Mahdiar Hosein Ghadiry, Mahdieh Nadi Senjani

, M. T. Manzuri-Shalmani
, Dara Rahmati
:
Effect of number of faults on NoC power and performance. 1-9 - Mourad Elhadef

, Amiya Nayak
, Ni Zeng:
Ants vs. faults: A swarm intelligence approach for diagnosing distributed computing networks. 1-8 - Matthieu Gallet, Yves Robert

, Frédéric Vivien
:
Scheduling multiple divisible loads on a linear processor network. 1-8 - Yunxia Feng, Minglu Li, Min-You Wu:

A weighted interference estimation scheme for interface switching wireless mesh networks. 1-8 - Rui Chu, Nong Xiao, Lei Chen

, Xicheng Lu:
A push-based prefetching for cooperative caching RAM Grid. 1-8 - Xiang Cao, Chien-Chung Shen:

Subscription-aware publish/subscribe tree construction in mobile ad hoc networks. 1-9 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang:

Stepping-stone detection algorithm based on order preserving mapping. 1-8 - Florian Kerschbaum, Julien Vayssière:

Privacy-preserving logical vector clocks using secure computation techniques. 1-8 - Haiying (Helen) Shen, Amy W. Apon, Cheng-Zhong Xu

:
LORM: Supporting low-overhead P2P-based range-query and multi-attribute resource management in grids. 1-8 - Sun-Yuan Hsieh, Tsong-Jie Lin:

Embedding cycles and paths in a k-ary n-cube. 1-7 - Sun-Yuan Hsieh, Chang-De Wu, Chao-Wen Huang:

Conditional edge-fault-tolerant Hamiltonian cycle embedding of star graphs. 1-8 - Hung-Chin Jang

, Hon-Chung Lee:
A Voronoi dEtection Range Adjustment (VERA) approach for energy saving of wireless sensor networks. 1-7
Volume 2
- Nicholas Vun, Wooi-Boon Goh:

The design of effective low cost embedded processor development kits for supporting take-home self-practice pedagogies. 1-7 - Ian McLoughlin

, Douglas L. Maskell, Thambipillai Srikanthan, Wooi-Boon Goh:
An Embedded Systems graduate education for Singapore. 1-5 - Sung-Yuan Ko:

On the teaching of embedded Linux system. 1-2 - Yu-Lun Huang, Jwu-Sheng Hu:

Design methodology and hands-on practices for Embedded Operating Systems. 1-6 - Hsuan-Ming Feng, Chih-Yung Chen, Chia-Yun Wu:

Vision-based fuzzy 8051 surveillance systems design. 1-2 - Yutaka Matsubara

, Midori Sugaya, Ittetsu Taniguchi
, Yasuaki Murakami, Hayato Kanai, Hiroaki Takada:
SSEST: Summer school on embedded system technologies. 1-8 - Jing Chen, Hui-Ming Su, Jian-Horng Liu:

A curriculum design on embedded system education for first-year graduate students. 1-6 - Jogesh K. Muppala

, Zonghua Gu
, Shing-Chi Cheung
:
Teaching embedded systems software: The HKUST experience. 1-6 - Ching-Shine Hwang, Tzuu-Shaang Wey, Yuan-Hung Lo:

An integration platform for developing digital life applications. 1-2 - Tianzhou Chen, Weihua Hu, Qingsong Shi, Hui Yan:

Embedded education for Computer Rank Examination. 1-4 - Chao-Lieh Chen:

Morphisms from IEEE 802.11 DCF specifications to its EDCA QoS practice with cross-layer interface. 1-8 - Shekhar Sharad, Karl Muecke:

Teaching complete embedded systems design process with graphical system design methodologies. 1-6 - Jian-Hong Liu, Jing Chen, Chen-Yung Wang:

SWEVM: a software EVM for embedded system programming. 1-7 - Pao-Ann Hsiung

, Shang-Wei Lin
:
From ISA to application design via RTOS - a course design framework for embedded software. 1-6 - Wen-Yew Liang, Hung-Che Lee, Yang-Lang Chang, Jyh-Perng Fang, Jywe-Fei Fang:

Design and analysis of a low power wireless portable media player. 1-7 - Wen-Yew Liang, Yu-Ming Hsieh, Zong-Ying Lyu:

Design of a dynamic distributed mobile computing environment. 1-8 - Yunfei Bai, Chng Eng Siong

, Gorthi Prashant Bhanu:
An MCU description methodology for initialization code generation software. 1-7 - Ian McLoughlin

, Anton J. R. Aendenroomer:
Linux as a teaching aid for embedded systems. 1-8 - Nicholas Vun, Wooi-Boon Goh:

Issues and challenges of embedded processor education for working professionals. 1-8 - Shiao-Li Tsao, Tai-Yi Huang, John Kar-Kin Zao, Jogesh K. Muppala

, Chi-Sheng Shih
:
Message from APESER organization committee. 1 - Jehn-Ruey Jiang:

Message from P2P-NVE Program Chair. 1 - Ali Shahrabi

, Irfan Awan:
Message from PMAC-2WN Program Co-Chairs. 1 - Rajkumar Kettimuthu:

Message from SRMPDS Program Chair. 1 - Sandeep K. Singhal:

Scalable networked virtual environments using unstructured overlays. 1-8 - Ingmar Baumgart

, Sebastian Mies:
S/Kademlia: A practicable approach towards secure key-based routing. 1-8 - Kalman Graffi

, Aleksandra Kovacevic, Kyra Wulffert, Ralf Steinmetz
:
ECHoP2P: Emergency call handling over peer-to-peer overlays. 1-10 - Rui Chu, Nong Xiao, Xicheng Lu:

A clustering model for memory resource sharing in large scale distributed system. 1-8 - Aaron Harwood

, Santosh Kulkani:
Delay sensitive identity protection in peer-to-peer online gaming environments. 1-6 - Dae Woong Kim, Woo-Ram Park, Chan-Ik Park:

Effect of unstable routing in location-aware mobile ad hoc networks on a geographic DHT protocol. 1-8 - Chao Huang, Aaron Harwood

, Shanika Karunasekera
:
Directions for Peer-to-Peer based mobile pervasive augmented reality gaming. 1-8 - Ryo Nishide, Masaaki Ohnishi, Shinji Tsuboi, Shinichi Ueshima:

P2P-based geometric computation method for extracting ROI from ubiquitous video cameras. 1-8 - Lei Ni, Aaron Harwood

:
A comparative study on Peer-to-Peer failure rate estimation. 1-7 - Jehn-Ruey Jiang, Hung-Shiang Chen:

Peer-to-Peer AOI voice chatting for massively multiplayer online games. 1-8 - Xiao-Jin Ren, Guo-An Wang, Zhi-Min Gu, Zhi-Wei Gao:

A fast joining operation for highly dynamic chord system. 1-5 - Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun Hu:

A forwarding model for Voronoi-based Overlay Network. 1-7 - Silvia Rueda

, Pedro Morillo
, Juan M. Orduña
:
A Peer-To-Peer platform for simulating distributed virtual environments. 1-8 - Amy Beth Corman

, Peter Schachte
, Vanessa Teague:
Secure random number agreement for peer-to-peer applications. 1-8 - Giuseppe De Marco, Masaharu Tadauchi, Leonard Barolli:

CAVENET: Description and analysis of a toolbox for vehicular networks simulation. 1-6 - Suk Yu Hui, Kai-Hau Yeung

, Kin Yeung Wong:
Cost evaluation on secure routing over powerlines for WMNs. 1-7 - Ing-Ray Chen, Ding-Chau Wang:

Modeling and analysis of regional registration based mobile multicast service management. 1-6 - G. Varaprasad:

New power aware routing algorithm for MANETs using gateway node. 1-4 - Abbas Nayebi, Hamid Sarbazi-Azad:

Lifetime analysis of the logical topology constructed by homogeneous topology control in wireless mobile networks. 1-8 - Mahmoud Moadeli, Alireza Shahrabi

, Wim Vanderbauwhede:
Analytical modelling of communication in the rectangular mesh NoC. 1-8 - Nima Shahbazi, Hamid Sarbazi-Azad:

Accelerating 3-D capacitance extraction in deep sub-micron VLSI design using vector/parallel computing. 1-8 - Reza Moraveji, Hamid Sarbazi-Azad:

Mathematical performance analysis of product networks. 1-8 - Abdalla M. Hanashi, Aamir Siddique, Irfan Awan, Michael E. Woodward:

Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETs. 1-6 - Tomoya Enokido, Makoto Takizawa

:
A Legal Information flow (LIF) scheduler for distributed systems. 1-8 - Richert Wang, Enrique Cauich, Isaac D. Scherson:

Federated clusters using the transparent remote Execution (TREx) environment. 1-8 - Jun Chen, Ganping Huang, Victor C. S. Lee

:
Scheduling algorithm for multi-item requests with time constraints in mobile computing environments. 1-7 - Cedric Curcio, Serge Midonnet:

Resource reclamation using meta-events in a real time java system. 1-6 - M. Shahbaz Memon, A. Shiraz Memon

, Morris Riedel
, Bernd Schuller
, Daniel Mallmann
, Bastian Tweddell, Achim Streit, Sven van den Berghe, David F. Snelling, Vivian Li, Moreno Marzolla
, Paolo Andreetto:
Enhanced resource management capabilities using standardized job management and data access interfaces within UNICORE Grids. 1-6 - Krzysztof Kurowski, Jarek Nabrzyski, Ariel Oleksiak

, Jan Weglarz
:
Grid scheduling simulations with GSSIM. 1-8 - Inès El Korbi, Leïla Azouz Saïdane:

Supporting deadline monotonic policy over 802.11 average service time analysis. 1-8 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:

Comparative evaluation of the non-contiguous processor allocation strategies based on a real workload and a stochastic workload on multicomputers. 1-7 - Gudmund Grov, Greg Michaelson, Andrew Ireland:

Formal verification of concurrent scheduling strategies using TLA. 1-6 - Sarbani Roy

, Madhulina Sarkar, Nandini Mukherjee:
Optimizing resource allocation for multiple concurrent jobs in grid environment. 1-8 - James Wen Jun Xue, Ligang He, Stephen A. Jarvis

:
A scheduling algorithm for revenue maximisation for cluster-based Internet services. 1-8 - Max Berger, Michael W. Sobolewski:

A dual-time vector clock based synchronization mechanism for key-value data in the SILENUS file system. 1-8 - Xiaoguang Liu, Meng Yu, Gang Wang, Jing Liu:

CrossTree: A new HTC architecture with high reliability and scalability. 1-7 - R. Badrinath, R. Krishnakumar, R. K. Palanivel Rajan:

Virtualization aware job schedulers for checkpoint-restart. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














