


default search action
ISPA 2009: Chengdu, Sichuan, China
- IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3747-4

Session 1: Distributed Systems and Applications
- Xiaoxuan Meng, Chengxiang Si, Wenwu Na, Lu Xu:

P-Cache: Providing Prioritized Caching Service for Storage System. 3-10 - Dayong Ye

, Quan Bai
, Minjie Zhang
, Khin Than Win
, Zhiqi Shen:
An Efficient Task Allocation Protocol for P2P Multi-agent Systems. 11-18 - Ruay-Shiung Chang, Chih-Yuan Lin, Chun-Fu Lin:

Scheduling Jobs in Grids Adaptively. 19-25 - Chonglei Mei, Hai Jiang, Jeff Jenness:

MM-DSM: Multi-threaded Multi-home Distributed Shared Memory Systems. 26-33 - Ching-Hsien Hsu, Chia-Wei Chu, Chih-Hsun Chou:

Bandwidth Sensitive Co-allocation Scheme for Parallel Downloading in Data Grid. 34-39 - Gang Yang, Kaibo Wang, Xingshe Zhou:

An Adaptive Resource Monitoring Method for Distributed Heterogeneous Computing Environment. 40-44 - Zhipeng Tan, Dan Feng, Xudong Tu, Fei He:

DLBS: Duplex Loading Balancing Strategy on Object Storage System. 45-52 - Xiaoxuan Meng, Chengxiang Si, Xiaoming Han, Jiangang Zhang, Lu Xu:

A Replacement Algorithm Designed for the Web Search Engine and Its Application in Storage Cache. 53-59
Session 2: Algorithm and Applications
- Yasuaki Ito, Koji Nakano

:
A Hardware-Software Cooperative Approach for the Exhaustive Verification of the Collatz Conjecture. 63-70 - Tianju Wang, Qu Qu, Benjamin Koo:

Analysing Internet Information Propagation Using Quality of Service Methodology Based on Algebra of System. 71-78 - Jung-Ho Um, Mi-Young Jang, Kyoung-Jin Jo, Jae-Woo Chang:

A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Service. 79-85 - Tao Wang, Shun-Zheng Yu:

Centralized Botnet Detection by Traffic Aggregation. 86-93 - Cancan Liu, Weimin Zhang, Zhigang Luo, Xiaoqun Cao, Hai Liu:

Managing Large-Scale Scientific Computing in Ensemble Prediction Using BPEL. 94-101 - Shu-Ming Tseng

, Yu-Chin Kuo, Yen-Chih Ku, Yueh-Teng Hsu:
Software Viterbi Decoder with SSE4 Parallel Processing Instructions for Software DVB-T Receiver. 102-105 - Maryam Khademi Hedayat, Wentong Cai

, Stephen John Turner
, Shayan Shahand
:
Distributed Execution of Workflow Using Parallel Partitioning. 106-112 - Sheng Zhang, Zhuzhong Qian, Minyi Guo, Sanglu Lu:

An Efficient Algorithm for Multimedia Delivery in Pervasive Space. 113-118 - Jingliang Zhang, Junwei Zhang, Jian-Gang Zhang, Xiaoming Han, Lu Xu:

CISP-Growth: A Contiguous Item Sequential Pattern Mining Algorithm with Application Level IO Patterns. 119-126
Session 3: Architecture, Virtualization and GPU
- Xiang Zhang, Jie Ma, Yanchao Miao, Qingwei Meng, Dan Meng:

Solo: A Lightweight Virtual Machine. 129-136 - Zhiyuan Shao, Hai Jin, Yong Li:

Virtual Machine Resource Management for High Performance Computing Applications. 137-144 - Wentao Qu, Minglu Li, Chuliang Weng:

An Active Trusted Model for Virtual Machine Systems. 145-152 - Siqin Zhao, Kang Chen, Weimin Zheng:

Secure Logging for Auditable File System Using Separate Virtual Machines. 153-160 - Haogang Chen, Xiaolin Wang, Zhenlin Wang, Xiang Wen, Xinxin Jin, Yingwei Luo, Xiaoming Li:

REMOCA: Hypervisor Remote Disk Cache. 161-169 - Deshi Ye, Hua Chen, Qinming He:

Load Balancing in Server Consolidation. 170-174 - He Huang, Lei Liu, Nan Yuan, Wei Lin

, Fenglong Song, Junchao Zhang, Dongrui Fan
:
A Synchronization-Based Alternative to Directory Protocol. 175-181 - Dengbiao Tu

, Guangming Tan:
Characterizing Betweenness Centrality Algorithm on Multi-core Architectures. 182-189 - Guang Suo, Xuejun Yang:

Balancing Parallel Applications on Multi-core Processors Based on Cache Partitioning. 190-195 - Long Zheng, Mianxiong Dong

, Song Guo
, Minyi Guo, Li Li:
I-Cache Tag Reduction for Low Power Chip Multiprocessor. 196-202 - Yuri Nishikawa

, Michihiro Koibuchi, Masato Yoshimi, Akihiro Shitara, Kenichi Miura, Hideharu Amano:
Performance Analysis of ClearSpeed's CSX600 Interconnects. 203-210 - Der-Rong Din, Yu-Sheng Chiu:

Survivable Virtual Topology Reconfiguration Problem on WDM Networks with Reconfiguration Constraint. 211-218 - Guibin Wang, Xuejun Yang, Ying Zhang, Tao Tang, Xudong Fang:

Program Optimization of Stencil Based Application on the GPU-Accelerated System. 219-225 - Jeremy Espenshade, Andrew Pangborn, Gregor von Laszewski

, Douglas Roberts, James S. Cavenaugh:
Accelerating Partitional Algorithms for Flow Cytometry on GPUs. 226-233 - Bonan Huang, Jinlan Gao, Xiaoming Li:

An Empirically Optimized Radix Sort for GPU. 234-241
Session 4: Security, Fault-Tolerance and Reliability
- Lingfang Zeng

, Dan Feng, Bharadwaj Veeravalli, Qingsong Wei:
ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage System. 245-252 - Mei Song, Yun-he Zhang:

One New Research about IPSec Communication Based on HTTP Tunnel. 253-257 - Zhengqiu He, Lifa Wu, Zheng Hong, Haiguang Lai:

Semantic Security Policy for Web Service. 258-262 - Junguo Li, Gang Huang, Xingrun Chen, Franck Chauvel, Hong Mei:

Supporting Reconfigurable Fault Tolerance on Application Servers. 263-271 - Martin Stáva, Pavel Tvrdík:

Security System for Overlapping Non-dedicated Clusters. 272-281 - Xiangzhen Kong, Jiwei Huang, Chuang Lin, Peter D. Ungsunan:

Performance, Fault-Tolerance and Scalability Analysis of Virtual Infrastructure Management System. 282-289 - Ting Chen, Yongjian Wang, Yuanqiang Huang, Cheng Luo, Depei Qian, Zhongzhi Luan:

A Two-Phase Log-Based Fault Recovery Mechanism in Master/Worker Based Computing Environment. 290-297 - Xinming Duan, Dakun Zhang, Xuemei Sun:

Fault-Tolerant Routing Schemes for Wormhole Mesh. 298-301 - Wilian Queiroz, Lau Cheuk Lung, Luciana de Oliveira Rech, Luiz A. de Paula Lima Jr.:

Semantically Reliable Multicast Based on the (m-k)-Firm Technique. 302-308 - Ning Hu, Peidong Zhu, Peng Zou:

An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation. 309-314
Session 5: Mobile, Wireless and Sensor Networks
- Liang He, Jingdong Xu, Yuntao Yu:

Optimize Multiple Mobile Elements Touring in Wireless Sensor Networks. 317-323 - Jie Jiang, Li Fang, Jun Wen, Guofu Wu, Heying Zhang:

Random Scheduling for Wireless Sensor Networks. 324-332 - Yang Wang, Liusheng Huang, Hongli Xu, Gang Wang:

Consistent Message Ordering in Wireless Sensor and Actor Networks. 333-339 - Wei Ren

, Yi Ren, Hui Zhang:
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. 340-347 - Amadou Baba Bagayoko, Béatrice Paillassa, Cláudia Betous-Almeida:

Transport and Routing Redundancy for MANETs Robustness. 348-353 - Abiodun Iwayemi, Chi Zhou:

VoIP Performance in Multi-radio Mobile Devices. 354-360 - Fei Shi, Keqiu Li, Yanming Shen:

A Low Latency Handoff Scheme Based on the Location and Movement Pattern. 361-365 - Fan Dong, Li Zhang, Dexter H. Hu, Cho-Li Wang:

A Case-Based Component Selection Framework for Mobile Context-Aware Applications. 366-373 - Panlong Yang, Hai Wang, Guihai Chen

:
DDSA: A Sampling and Validation Based Spectrum Access Algorithm in Wireless Networks. 374-381 - Kun-Ming Yu, Ming-Gong Lee

, Chien-Tung Liao, Hung-Jui Lin:
Design and Implementation of a RFID Based Real-Time Location-Aware System in Clean Room. 382-388 - Zhiyuan Tan

, Xiangjian He
, Priyadarsi Nanda:
Web Service Locating Unit in RFID-Centric Anti-counterfeit System. 389-393
Session 6: Network and Routing
- Laiquan Han, Jinkuan Wang, Jianhua Tang, Peijun He:

A Forwarding Migration Algorithm for Multipath Transmission. 397-400 - Ali Jafari, Hosein Shafiei

, Baharan Mirzasoleiman, Ghodrat Sepidnam:
Utility Proportional Optimization Flow Control for Overlay Multicast. 401-407 - Yong-Ki Kim, Rabindra Bista, Jae-Woo Chang:

A Designated Path Scheme for Energy-Efficient Data Aggregation in Wireless Sensor Networks. 408-415
ISSR: Security in e-Science and e-Research
- John P. Watt, Richard O. Sinnott

, Jipu Jiang, Tom Doherty, Christopher I. Higgins, Michael Koutroumpas:
Tool Support for Security-Oriented Virtual Research Collaborations. 419-424 - Jun Ho Huh, Andrew P. Martin

:
Towards a Trustable Virtual Organisation. 425-431 - Rongqiang Cao, Xuebin Chi, Zongyan Cao, Zhihui Dai, Haili Xiao:

USGPA: A User-Centric and Secure Grid Portal Architecture for High-Performance Computing. 432-438 - Ching-Nung Yang

, Jie-Ru Chen, Chih-Yang Chiu, Gen-Chin Wu, Chih-Cheng Wu:
Enhancing Privacy and Security in RFID-Enabled Banknotes. 439-444
CSS: Cyberspace Safety and Security
- LongHai Li, ShaoFeng Fu, XiangQuan Che:

Active Attacks on Reputable Mix Networks. 447-450 - Wei Pan, Weihua Li:

Reverse Analysis and Vulnerability Detection for Network System Software. 451-456 - Jianli Zhang, Zhiyi Fang, Yunlong Zhang, Yunlong Ma:

ZDCF: An Improved DCF Solution of IEEE 802.11. 457-462 - Meizhen Wang, Zhitang Li, Sheng Zhong:

Fuzzy Decision Tree Based Inference Technology for Spam Behavior Recognition. 463-468 - Lin Chen, Zhitang Li, Cuixia Gao, Lan Liu:

Dynamic Forensics Based on Intrusion Tolerance. 469-473 - Chengyu Fan, Shijie Zhou, Fagen Li:

An Identity-Based Restricted Deniable Authentication Protocol. 474-478 - Cai Fu, Fugui Tang, Yongquan Cui, Ming Liu, Bing Peng:

Grey Theory Based Nodes Risk Assessment in P2P Networks. 479-483 - Yaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai:

A Method of In-Depth-Defense for Network Security Based on Immunity Principles. 484-487 - Aiguo He, Tomohiro Ohdaira:

A Case Study: File Access Privacy Control Using Filter Hook Driver. 488-493 - Zhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li:

Extended PEG Algorithm for High Rate LDPC Codes. 494-498 - Lianzhong Liu, Chunfang Li, Yanping Zhang:

A Business-Oriented Fault Localization Approach Using Digraph. 499-504 - Jingde Cheng, Yuichi Goto

, Daisuke Horie, Junichi Miura, Toshio Kasahara, Ahmad Iqbal:
Development of ISEE: An Information Security Engineering Environment. 505-510 - Shuiping Gou, Yuqin Wang, Licheng Jiao

, Jing Feng, Yao Yao:
Distributed Transfer Network Learning Based Intrusion Detection. 511-515
IWASVT: Architecture Support on Virtualization Techniques
- Xinxin Jin, Haogang Chen, Xiaolin Wang, Zhenlin Wang, Xiang Wen, Yingwei Luo, Xiaoming Li:

A Simple Cache Partitioning Approach in a Virtualized Environment. 519-524 - Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao:

Using Pcache to Speedup Interpretation in Dynamic Binary Translation. 525-530 - Yusong Tan, Weihua Zhang, Qingbo Wu:

Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual Machine. 531-536 - Xiaojian Liu, Xiaodong Yi, Yi Ren:

Luvalley-Lite: An Effort to Balance Re-use and Re-coding. 537-542 - Hua Cheng, Zuoning Chen, Ninghui Sun, Fenbin Qi, Chaoqun Dong, Laiwang Cheng:

A Virtualized Self-Adaptive Parallel Programming Framework for Heterogeneous High Productivity Computers. 543-548 - Qingbo Wu, Chunguang Wang, Yusong Tan:

System Monitoring and Controlling Mechanism Based on Hypervisor. 549-554 - Linbin Yu, Yun Xu:

A Parallel Gibbs Sampling Algorithm for Motif Finding on GPU. 555-558 - Yongbin Zhou, Junchao Zhang, Shuai Zhang, Nan Yuan, Dongrui Fan

:
Data Management: The Spirit to Pursuit Peak Performance on Many-Core Processor. 559-564 - Han Wan, Xiaopeng Gao, Zhiqiang Wang, Yi Li:

Using GPU to Accelerate Cache Simulation. 565-570 - Fenglong Song, Zhiyong Liu, Dongrui Fan

, He Huang, Nan Yuan, Lei Yu, Junchao Zhang:
Evaluation Method of Synchronization for Shared-Memory On-Chip Many-Core Processor. 571-576
WMSC: Workflow Management in Service and Cloud Computing
- Reggie Davidrajuh:

Workflow Based Approach for Eliminating Redundancy in Virtual Enterprising. 579-583 - Jie Cheng, Xiaoguang Lin, Yuanchun Zhou, Jianhui Li:

A Web Based Workflow System for Distributed Atmospheric Data Processing. 584-588 - Haiyan Zhao, Jian Cao, Xiaohan Sun:

A Quality Optimization Method for Service Process Model. 589-594 - Xuyun Zhang

, Wanchun Dou:
A Global QoS-Driven Evaluation Strategy for Web Services Composition. 595-600 - Sheng Liu, Yushun Fan:

Workflow Model Performance Analysis Concerning Instance Dwelling Times Distribution. 601-605 - Junyi Sun, Houfu Li, Yanbo Han:

An Adaptive Scheduler for Enhancing the Efficiency of Multi-engine BPM Systems. 606-610 - Zuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Haiyan Yang:

Completion Time Estimation for Instances of Generalized Well-Formed Workflow. 611-616 - Chunhua Hu, Xiaohong Chen, Jianxun Liu, Jibo Liu:

Research on Services Selection Based on Credible Alliance in Web Services Combination. 617-622 - Jie Yu, Xiangfeng Luo, Feiyue Ye, Yongmei Lei:

Generation of Web Knowledge Flow for Personalized Services. 623-628 - Meng Xu, Li-zhen Cui, Haiyang Wang, Yanbing Bi:

A Multiple QoS Constrained Scheduling Strategy of Multiple Workflows for Cloud Computing. 629-634 - Yi Wang, Jian Cao, Minglu Li:

Change Sequence Mining in Context-Aware Scientific Workflow. 635-640 - Ting Xie, Yang Yu, Guoshen Kuang:

A Time Exception Handling Algorithm of Temporal Workflow. 641-646 - Jianxun Liu, Zefeng Zhu, Yiping Wen, Jinjun Chen:

Implementation of a Visual Modeling Tool for Defining Instance Aspect in Workflow. 647-652 - Gerhard Stürmer, Jürgen Mangler, Erich Schikuta

:
A Domain Specific Language and Workflow Execution Engine to Enable Dynamic Workflows. 653-658 - Yaojun Han, Xuemei Luo:

Composition and Reduction of Web Service Based on Dynamic Timed Colored Petri Nets. 659-663 - Kuo-Chan Huang, Kuan-Po Lai, Hsi-Ya Chang:

Adaptive Processor Allocation with Estimated Job Execution Time in Heterogeneous Computing Grid. 664-669
DSAA: Distributed Systems, Algorithms and Applications
- Yin Ye, Zhihui Du

, Song Hao:
Optimizing Message Passing Programs Based on Task Section Duplication. 673-678 - Jianjiang Li, Lin Yan, Zhe Gao, Dan Hei:

A Task-Pool Parallel I/O Paradigm for an I/O Intensive Application. 679-684 - Xiaodong Xie, Yansheng Lu:

Extended Combination Testing: Generates Array Test Suite. 685-690 - Ke Huang, Zhihong Li, Benjamin Koo, Tianju Wang:

SimSync: A Table-Based Constraint Processing Language For Synchronization Control. 691-695 - Shuming Zhou:

The Conditional Diagnosability of Twisted Cubes under the Comparison Model. 696-701 - Xiaolei Gao, Huaikou Miao:

Proving Total Correctness of Refinement Based on Tableau. 702-707 - Siamak Najjar Karimi, Saeed Parsa

:
Semi-automatic Transformation of Sequential Code to Distributed Code Using Model Driven Architecture Approach. 708-714 - Xinhong Wu, Hai Jin:

Multi-Source Traffic Data Fusion Method Based on Regulation and Reliability. 715-718

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














