


default search action
NPC 2012: Gwangju, Korea
- James J. Park, Albert Y. Zomaya, Sang-Soo Yeo, Sartaj Sahni:

Network and Parallel Computing, 9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6-8, 2012. Proceedings. Lecture Notes in Computer Science 7513, Springer 2012, ISBN 978-3-642-35605-6
Algorithms, Scheduling, Analysis, and Data Mining
- Jian Xiao, Yu Zhang, Shuwei Chen, Huashan Yu:

An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments. 1-13 - Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng:

DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph. 14-21 - Yizhuo Wang

, Weixing Ji, Feng Shi, Qi Zuo, Ning Deng:
Knowledge-Based Adaptive Self-Scheduling. 22-32 - Shahnawaz Talpur, Feng Shi, Yizhuo Wang

:
Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor. 33-41 - Jae-Young Lee:

A Scoring System for Short Answers on the Test in a Large Group. 42-47
Network Architecture and Protocol Design
- Ralph Duncan, Peder Jungck, Kenneth Ross, Dwight Mulcahy:

Reference Variables for Dynamic, Reliable Packet Operations. 48-60 - Shelly Salim, Christian Henry Wijaya Oey, Sangman Moh:

Are Heterogeneous Cellular Networks Superior to Homogeneous Ones? 61-68 - Longbo Zhang, Chen Yu, Hai Jin:

Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks. 69-76 - Narjes Soltani

, Ehsan Mousavi Khaneghah
, Mohsen Sharifi
, Seyedeh Leili Mirtaheri:
A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems. 77-84 - Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu:

NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation. 85-93
Network Security
- Muhammad Ahmed, Xu Huang, Dharmendra Sharma

:
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network. 94-100 - Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Hyuk Park:

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis. 101-109 - Ding Wang

, Chunguang Ma, Sendong Zhao, Chang-li Zhou:
Breaking a Robust Remote User Authentication Scheme Using Smart Cards. 110-118 - Irfana Memon:

An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs. 119-128 - Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park

, Dongho Won:
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing. 138-144
Parallel, Distributed, and Virtualization Techniques
- Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng:

Small World Asynchronous Parallel Model for Genome Assembly. 145-155 - Haitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen:

UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines. 156-163 - Yongnan Li, Limin Xiao, Aihua Liang, Yao Zheng, Li Ruan:

Fast Parallel Garner Algorithm for Chinese Remainder Theorem. 164-171 - Xu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan:

dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing. 172-179 - M. M. Hafizur Rahman, Asadullah Shah

, Yasushi Inoguchi:
On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network. 180-187
Performance Modeling, Prediction, and Tuning
- Yunji Chen

, Tianshi Chen, Qi Guo, Zhiwei Xu, Lei Zhang:
An Elastic Architecture Adaptable to Millions of Application Scenarios. 188-195 - Daniel A. Orozco, Elkin Garcia, Robert S. Pavel, Orlando Ayala, Lian-Ping Wang

, Guang R. Gao:
Demystifying Performance Predictions of Distributed FFT3D Implementations. 196-207 - Qiuming Luo, Chengjian Liu, Chang Kong, Ye Cai:

MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms. 208-216 - Gangfeng Liu, Yunlan Wang, Tianhai Zhao, Jianhua Gu, Dongyang Li:

mHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing Cluster. 217-224
Resource Management
- Wei Feng, Jian Liu, Jiannong Cao

, Liang Yang, Qin Xin:
Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks. 225-232 - Boo-Hyoung Lee, Chi-Su Kim, Heon-Tag Kong:

Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method. 233-240 - Jong Bok Park:

Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case Study. 241-247 - Youngsik Kwak, YoonJung Nam:

The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples. 248-255
Ubiquitous Communications and Networks
- Jianbin Jia, Yingwen Chen, Ming Xu:

An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records. 256-263 - Zeeshan Hameed Mir, Hyeon Park, Young Bag Moon, Naesoo Kim, Cheol Sig Pyo:

Design and Deployment of Testbed for Experimental Sensor Network Research. 264-272 - Yoonsik Kwak:

Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device. 273-278
Web, Communication, and Cloud Computing
- Lei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu:

Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center. 279-288 - Huajian Mao, Hang Zhang, Xianqiang Bao, Nong Xiao, Weisong Shi, Yutong Lu:

EaSync: A Transparent File Synchronization Service across Multiple Machines. 289-296 - Phan Trung Huy, Nguyen Hai Thanh, Cheonsick Kim:

Relationship between Correcting Code and Module Technique in Hiding Secret Data. 297-307 - Woo-Sik Lee, Min Choi, Namgi Kim:

Different Characteristics of Radio Modules in Wireless Body Sensor Network Systems. 308-314 - Hyeog-In Kwon, Hi-Yeob Joo, Dae-Jin Kim, Jong-Seok Park:

The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services. 315-319 - Namje Park

, Yeonghae Ko:
Computer Education's Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education. 320-327
ATIMCN
- Chien-Erh Weng, Chien-Hung Chen, Chiung-Hsing Chen, Jyh-Horng Wen:

The Performances Study of EDCF with Block_Ack in WLANs. 328-335 - Wen-Hsu Hsiao, Hui-Kai Su, Yu-Siang Wei, Wei-Sheng Ho, Kim-Joan Chen:

A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System. 336-348 - Hsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng:

A New Approach for Detecting SMTPFA Based on Entropy Measurement. 349-359 - Hui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu:

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services. 360-372
ATSME
- Ching-Hui Shih:

The Effects of Governmental Subsidy on the Quality of Education in Taiwan's Private Universities and Colleges. 373-380 - Chiou-Fen Lin, Meei-Ling Shyu, Meei-Shiow Lu, Chung-I Huang:

Examining the Effectiveness of a Distant Learning Education Program: Use of Patient Safety and Reporting Law and Ethics as Example. 381-385 - Hung-Chang Lin, Yao-Hua Wang:

The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill Training. 386-393 - Li-Jia Chiu, Neng-Tang Norman Huang:

The Difference Analysis between Demographic Variables and Personal Attributes - The Case of Internal Auditors in Taiwan. 394-400 - Mey-Tyng Wang, Guo-Hong Lei:

Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example. 401-408 - Shiang-Lan Kuo:

Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness. 409-413 - Hui-Min Ko:

Soft Power: A Critical Factor for the Effectiveness and Development of a School. 414-420
Cloud & Grid
- Ying-Hong Wang, Yu-Wei Lin, Yu-Yu Lin, Han-Ming Chang:

Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor Networks. 421-428 - JongBeom Lim, Kwang-Sik Chung

, Heon-Chang Yu
:
A Termination Detection Technique Using Gossip in Cloud Computing Environments. 429-436 - Zhiming Zhao, Paola Grosso

, Cees de Laat:
OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science. 437-444 - Chao-Tung Yang

, Hsien-Yi Wang, Yu-Tso Liu:
Using PCI Pass-Through for GPU Virtualization with CUDA. 445-452
DATICS
- Nan Zhang, Ka Lok Man:

Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options. 453-462 - Jieming Ma

, Ka Lok Man, T. O. Ting
, Hyunshin Lee, Taikyeong Jeong, Jong-Kug Sean, Sheng-Uei Guan, Prudence W. H. Wong:
Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems. 463-471 - Nan Zhang, Ka Lok Man, Eng Gee Lim

:
Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model. 472-481 - Ting Wang, Sheng-Uei Guan, T. O. Ting

, Ka Lok Man, Fei Liu
:
Evolving Linear Discriminant in a Continuously Growing Dimensional Space for Incremental Attribute Learning. 482-491 - Ming Ming Wong, Mou Ling Dennis Wong

, Ka Lok Man:
Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem. 492-499 - T. O. Ting

, Kaiyu Wan, Ka Lok Man, Sanghyuk Lee:
Space Exploration of Multi-agent Robotics via Genetic Algorithm. 500-507 - T. O. Ting

, Ka Lok Man, Sheng-Uei Guan, Mohamed Nayel, Kaiyu Wan:
Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems. 508-515 - Mouna Karmani, Chiraz Khedhiri, Belgacem Hamdi

, Amir-Mohammad Rahmani, Ka Lok Man, Kaiyu Wan:
Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units. 516-523
UMAS
- YouSik Hong, Hongkyun Kim, Cheonshik Kim

, Geuk Lee:
New Electronic Acupuncture System Using Intelligence. 524-531 - Oliver Mroß, Klaus Meißner:

A Runtime Environment for Distributed Mashups in Multi-device Scenarios. 532-541 - Le The Dung

, Beongku An:
A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks. 542-549 - Imtiaz Ahmed Khan, Nam-Yeol Yun, Soo-Hyun Park:

Nibble-CRC for Underwater Acoustic Communication. 550-558 - Sangyong Lee, Cheonshik Kim

, Seongah Chin:
An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations. 559-564 - HyunJu Lee, Taehyun Kim, Dongkyoo Shin, HeeWon Park, Soohan Kim, Dongil Shin:

Research on a Smart Input Device Using Multimodal Bio-signal Interface. 565-574 - Eun-Jun Yoon:

Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader. 575-580 - Hae-Jung Kim, Eun-Jun Yoon:

Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme. 581-588 - Luu Hoang Long, Eunmi Choi:

Energy-Efficiency Protocol for Securing the Wireless Sensor Networks. 589-598 - Do-Hoon Kim, Jungwook Wee, Kyu-Sung Hwang:

A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI. 599-607 - Kyu-Sung Hwang:

SNR-Based Partial Relay Selection Scheme over Multiple Relay Network. 608-615 - Guoqing Li, Guangling Sun, Xinpeng Zhang:

Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency. 616-624 - Dang Quyet Thang, Nguyen Dinh Han, Phan Trung Huy:

Algorithms Based on Finite Automata for Testing of Z-codes. 625-635 - Sooill Lee:

Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor. 636-644

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














