
PDCAT 2005: Dalian, China
- Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China. IEEE Computer Society 2005, ISBN 0-7695-2405-2
Cover
- Title Page.
- Copyright.
Introduction
- Preface.
Keynote Speeches
- Tadashi Watanabe:
Future Technological Challenges for High Performance Computers. 2 - Zhiwei Xu, Chengchun Shu, Haiyan Yu, Haozhi Liu:
An Agile Programming Model for Grid End Users. 3-7 - S. Q. Zheng:
Scalable and Practical Nonblocking Switching Networks (Extended Abstract). 8-10
Session 1B1: Interconnection Networks
- Xuesong Tan, Shuo-Yen Robert Li, Yuxiu Shen:
Rearrangeability of the Tandem Cascade of Banyan-type Networks. 11-15 - Jianyang Zeng, Wen-Jing Hsu:
ReCord: A Distributed Hash Table with Recursive Structure. 16-20 - Fangai Liu, Liancheng Xu:
The Topological Properties and Network Embedding of RP(k). 21-25 - Shuo-Yen Robert Li, Xuesong Tan:
Theory on Switch Preservation under 2-stage Interconnection. 26-30 - Lei Li, Zheng Cao, Mingyu Chen, Jianping Fan:
A Reconfigurable Optical Interconnect System for DSAG. 31-34
Session 1B2: Parallelization Techniques
- Jisheng Zhao, Ian Rogers, Chris C. Kirkham, Ian Watson:
Loop Parallelisation for the Jikes RVM. 35-39 - Hua Yang, Gang Cui, Xiaozong Yang:
Eliminating Inter-Thread Interference in Register File for SMT Processors. 40-45 - Takashi Yokota
, Moriyuki Saito, Fumihito Furukawa, Kanemitsu Ootsu, Takanobu Baba:
Two-Path Limited Speculation Method for Static/Dynamic Optimization in Multithreaded Systems. 46-50 - Rongfeng Tang, Jin Xiong, Jie Ma, Dan Meng:
A New Way to High Performance NFS for Clusters. 51-55 - Wen-Chung Shih, Chao-Tung Yang
, Ping-I Chen, Shian-Shyong Tseng:
A Hybrid Parallel Loop Scheduling Scheme on Heterogeneous PC Clusters. 56-58 - Sung-Lim Yun, Se Man Oh:
Table-Driven Code Optimizer. 59-64
Session 1B3: Wireless Networks and Mobile Computing - 1
- Di Wu, Yan Qu, Zhongxian Chi:
A Voronoi-Trajectory Based Hybrid Routing (VTBR) Algorithm for Wireless Ad Hoc Networks with Obstacles. 65-69 - Tongchit Tantikul, D. Manivannan
:
A Communication-Induced Checkpointing and Asynchronous Recovery Protocol for Mobile Computing Systems. 70-74 - Yamin Li, Shietung Peng, Wanming Chu:
An Efficient Distributed Broadcasting Algorithm forWireless Ad Hoc Networks. 75-79 - Yaqin Yang, Jincai Yang, Jiwei Cao:
A Ring Removal Movement-Based Mobility Location Update Scheme. 80-84 - Ying Wang, Mudi Xiong:
Monte Carlo Simulation of LEACH Protocol for Wireless Sensor Networks. 85-88
Session 1B4: Grid Computing Systems - I
- Quan Zhou, Geng Yang, Jiangang Shen, Chunming Rong:
A Scalable Security Architecture for Grid. 89-93 - Jianwei Liao, Hongbin Cai, Pandeng Jiang, Meirong Chen:
Design and Implementation of Grid Monitoring System Based on GMA. 94-96 - Lulai Yuan, Guosun Zeng, Xiongwei Mao:
A Resource Price-adjusting Mechanism for Supply and Demand Balance in Grid Computing. 97-99 - Yu Hua, Chanle Wu, Huyin Zhang, Libing Wu:
Heterogeneous Resource Selection with Portfolio Optimization in Grid Economy. 100-102 - Jianghu Yang, Ming Li, Changlai Huang, Chuanshan Gao:
WGMDS: A WSRF-Compliant Information Service on Wireless Grids. 103-105 - Xiuying Wu, Geng Yang, Jiangang Shen, Quan Zhou:
A Novel Security Model Based on Virtual Organization for Grid. 106-109
Session 1B5: Security, Reliability, and Fault-Tolerance - I
- Yonggen Gu, Yuxi Fu, Guoqiang Li:
A Simple Process Calculus for the analysis of Security Protocols. 110-114 - Junfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang:
D-S Evidence Theory and its Data Fusion Application in Intrusion Detection. 115-119 - Xixiang Lv, Bo Yang, Changxing Pei:
Efficient Traitor Tracing Scheme Based On NTRU. 120-124 - Junfeng Tian, Jian-ling Wang, Xiao-hui Yang, Ren-ling Li:
A Study of Intrusion Signature Based on Honeypot. 125-129 - Yonggang Chu, Jun Li, Yixian Yang:
The Architecture of the Large-scale Distributed Intrusion Detection System. 130-133
Session 1C1: Network Architectures
- Changhua Zhu, Changxing Pei, Yunhui Yi, Dongxiao Quan:
Active Probe of Available Bandwidth: Analysis and Improvement. 134-138 - Ximing Hu, Jing Qu, Binqiang Wang, Xiaobei Li:
CISOQ: A Practical High-Performance Packet Switch Architecture for the Support of Multicast Traffic. 139-143 - Xiao Chen, Ruijun Yang, Qi Xia, Weinong Wang:
Overlay Multicasting over Multihomed Proxie. 144-148 - Yan Wang, Mengqin Xia, Fasheng Yi, Jiazhi Zeng:
Research on New Types of Network Architecture. 149-153 - Wei Yuan, Changxing Pei, Haiyun Xiao, Changhua Zhu, Nan Chen, Yunhui Yi:
Study on Network Topology Visualization Algorithm and Implement Based on A Algorithm. 154-157
Session 1C2: Communication and Multimedia Systems
- Masahiro Watanabe, Motoi Okuda, Teruo Matsuzawa:
Construction of a Prototype of a Volume Communications Environment. 158-162 - Feng Lin, Xin Wang, Xiangyang Xue:
VoD Service Model and Performance Evaluation on the China's High Performance Broadband Information Network (3Tnet). 163-167 - HaiYing Liang, Guowen Teng, Hongjun Wang, Yuan Gao:
Detecting BGP Misconfiguration for BGP/MPLS VPNs. 168-170 - Gengsheng Zheng, Zhiping Xie, Bo Wang, Guiming He:
A New Tunnel Scheme for Multimedia Communications Traversing NAT/Firewall in NGN. 171-173 - Zhai Mingyue, Liu Chunying, Bi Haiying:
Study of Channel Characteristics of Power Line Communications Networks. 174-176 - Haibin Kan, Hong Shen:
The maximal rates of more general complex orthogonal designs. 177-180
Session 1C3: Wireless Networks and Mobile Computing - II
- Lianggui Liu, Guangzeng Feng:
Research on Multi-constrained QoS Routing Scheme Using Mean Field Annealing. 181-185 - KwangJin Park, MoonBae Song, Ki-Sik Kong:
Data Dissemination Model for Location-Based Services. 186-190 - Jian Zhang, Benxiong Huang, Lai Tu, Fan Zhang:
A Cluster-Based Energy-Efficient Scheme for Sensor Networks. 191-195 - Hui Tian, Hong Shen, Teruo Matsuzawa:
RandomWalk Routing for Wireless Sensor Networks. 196-200 - Ruijun Yang, Qi Xia, Weinong Wang, Qunhua Pan, Xinli Huang, Minglu Li:
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks. 201-204
Session 1C4: Optical Networks
- Rongxi He, Bin Lin, Lemin Li, Chen Gu:
Dynamic Shared Path Protection Algorithm in WDM Mesh Networks under Service Level Agreement Constraints. 205-209 - Zhanqi Xu, Chunting Wang, Changxin Pei, Aijun Wen:
A Unified Framing Protocol for Hybrid Data Transport. 210-214 - Arun Vishwanath, Weifa Liang
:
On-Line Routing in WDM-TDM Switched Optical Mesh Networks. 215-219 - Yawen Chen, Hong Shen:
Wavelength Assignment for Parallel FFT Communication Pattern on Linear Arrays by Lattice Embedding. 220-224 - Tian Hu, Bao-Hua Zhao:
Splitter Placement Problem on Directed Fiber Trees. 225-228
Session 1C5: Security, Reliability, and Fault-Tolerance - II
- Hui He, Mingzeng Hu, Hongli Zhang, Zhenjiang Tang:
On the Effectiveness of multi-similarity for early detection of worms. 229-233 - Di Wu, Ji Dai, Zhongxian Chi:
Intrusion Detection Based on An Improved ART2 Neural Network. 234-238 - Mingjun Xiao, Liusheng Huang, Yonglong Luo, Hong Shen:
Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data. 239-243 - Di Wu, Qingi Li, Zhongxian Chi:
Computing the Reliability for Clustered Ad Hoc Networks. 244-246 - Kun Wang, Lihua Zhou, Zhen Cai, Zengxin Li:
A Disaster Recovery System Model in an E-government System. 247-250
Session 2A1: Security, Reliability, and Fault-Tolerance - III
- Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang:
Trusted Computing-Based Security Architecture For 4G Mobile Networks. 251-255 - Junfeng Tian, Yue Fu, Ying Xu, Jian-ling Wang:
Intrusion Detection Combining Multiple Decision Trees by Fuzzy logic. 256-258 - Ping Wang, Binxing Fang, Xiao-chun Yun:
A New Approach to Automatically Detect Worms. 259-263 - Khaja Mohammad Shazzad, Jong Sou Park:
Optimization of Intrusion Detection through Fast Hybrid Feature Selection. 264-267 - Peng Zhang, Chengqing Ye, Xin Li, Xuying Ma:
An Efficient Keys Agreement for Multi-party's Communication. 267-269 - Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen:
Worm Detection in Large Scale Network by Traffic. 270-273
Session 2A2: Wireless Networks and Mobile Computing - III
- Jacir Luiz Bordim, Thomas Hunziker, Koji Nakano:
Adaptive Carrier Sensing and Packet Sending - An Alternative to Boost the Performance in Directional Communications. 274-279 - RuiYing Du, HuiJuan Tu, Wen Song:
An Efficient Key Management Scheme for Secure Sensor Networks. 279-283 - Xiaohui Li, Naian Liu, Changxing Pei, Kechu Yi, Weidong Kou:
Design and Analysis of High Speed WLAN Systems with Adaptive Margin Technology. 284-287 - Zhong Shen, Yilin Chang, Xin Zhang, Can Cui:
An Efficient Topology Maintenance Algorithm Based on Shortest Path Tree for Wireless Sensor Networks. 288-292 - Naian Liu, Xiaohui Li, Changxing Pei, Bo Yang:
Delay Character of a Novel Architecture for IEEE 802.16 Systems. 293-296
Session 2A3: Ubiquitous Computing Systems
- Jie Sun, Zhaohui Wu:
Developing context-aware applications in ubiquitous computing environments. 297-301 - Lu Yan, Zheng Liang:
Reconfigurable Computing in Ubiquitous Computers: A Roadmap. 302-305 - Zhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Bae, Sangwook Kim, Soongju Kang:
Design of a Security Management Middleware in Ubiquitous Computing Environments. 306-308 - Songqiao Han, Shensheng Zhang, Yong Zhang, Change Fan:
An adaptable software architecture based on mobile components in pervasive computing. 309-311 - Zheng Liang, Juha Plosila, Lu Yan, Kaisa Sere:
On-chip Debug for an Asynchronous Java Accelerator. 312-315 - Xiaoli Su, Faqiong Jiang, Hongzhou Shi, Zhenmin Zhu, Jintao Li:
Design of Virtual Personal Computing Environment for Ubiquitous Computing. 316-319
Session 2A4: Internet Computing and Web Technology - II
- Sangok Kim, Kanghee Lee, Zhefan Jiang, Sangwook Kim:
Web Media Service based on Streaming Player supporting ubiquitous environment. 320-322 - Zhenchun Huang, He Chuan:
Design and Implementation of A Script Language Based On-Demand Service Framework. 323-327 - Xiang Ma, Qunhua Pan, Minglu Li:
Integration and Share of Spatial Data Based on Web Service. 328-332 - Xinjuan Zhu, Xin Zhang:
Ontology-Based 3d Body Scanning Data Sharing System. 333-335 - Yan Gao, Bin Zhang, Jun Na, Lei Yang, Yu Dai, Qiang Gong:
Optimal Selection of Web Services for Composition Based on Interface-Matching and Weighted Multistage Graph. 336-338 - Shaomin Zhang, Baoyi Wang:
Research on Improved Role Hierarchy Model in Extended Organization PKI Networks. 339-342
Session 2A5: Simulation and Performance Evaluation - I
- Zhiyi Huang, Martin K. Purvis, Paul Werstein:
Performance Comparison between VOPP and MPI. 343-347 - Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju:
Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2. 348-352 - Jin Guo, Mingyuan Liu, Lifang Liu:
Research on the Performance Analysis of the Concurrent System. 353-355 - Hong Xiao, Ling Zhang, Di Wu:
Component based performance prediction for network processor based system. 356-358 - Saqlain Akhtar, He Linshu:
Simulation-Based Optimization Strategy for Liquid Fueled Multi-stage Space Launch Vehicle. 359-365
Session 2B1: Security, Reliability, and Fault-Tolerance - IV
- He Guo, Chunyan Guo, Feng Chen, Hongji Yang:
Wrapping Client-Server Application to Web Services for Internet Computing. 366-370 - Jun Wang, Min Song:
A New Algorithm to Solve Synchronous Consensus for Dependent Failures. 371-375 - Ruishan Zhang, Kefei Chen:
An Efficient Asynchronous Proactive RSA Scheme. 376-380 - Zhang Jun, Fanyuan Ma, Dawu Gu, Yingcai Bai:
An Efficient Group Key Management Scheme: Link Tree Protocol. 381-385 - Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju:
Fast Two Phrases PPM for IP Traceback. 386-389
Session 2B2: Grid Computing Systems - II
- Ran Zheng, Hai Jin, Qin Zhang, Ying Li:
Workflow-based Remote-Sensing Image Processing Application in ImageGrid. 390-394 - Yifeng Shao, Feng Hong, Minglu Li:
JSChord: A Peer-to-Peer System to Achieve Max Throughput. 395-399 - Libing Wu, Jianbing Xing, Chanle Wu, Jianqun Cui:
An Adaptive Advance Reservation Mechanism for Grid Computing. 400-403 - Hanbing Yao, Heping Hu, Baohua Huang, Ruixuan Li:
Dynamic Role and Context-Based Access Control for Grid Applications. 404-406 - Zhengli Zhai, Yang Yang, Wencai Guo, Zhimin Tian:
Integrating Agent and Web Service into Grid Service Workflow System. 407-410
Session 2B3: Software Technology and Programming Language
- Chengwan He, Wenjie Tu, Keqing He:
Role Based Platform Independent Web Application Modeling. 411-415 - Kazuhiro Ogata, Masahiro Nakano, Masaki Nakamura, Kokichi Futatsugi:
Chocolat/SMV: A Translator from CafeOBJ into SMV. 416-420 - Jinkui Xie, Linpeng Huang:
Formal Description and Complexity Analysis of Routing in Mobile Ad Hoc System. 421-423 - Sun Meng, Bernhard K. Aichernig
, Zhang Naixiao:
Coalgebraic Component Specification and Verification in RSL. 424-426 - Hong Xiao, Ling Zhang, Di Wu:
Software Component Model for Network Processor Based System. 427-429 - Yu-an Tan, Ji-yan Zheng, Yuan-Da Cao:
A Segment-based Approach of Defending Against Buffer Overflow Attacks. 430-433
Session 2B4: Agent Technology - I
- Jianxing Li, XinJun Mao, Yao Shu:
An OO-based Design Model of Software Agent. 434-440 - Kun Xiao, Ji Zheng, Xin Wang, Xiangyang Xue:
A Novel Peer-to-Peer Intrusion Detection System. 441-445 - Wenyu Qu, Hong Shen, Xavier Défago
:
A Survey of Mobile Agent-Based Fault-Tolerant Technology. 446-450 - Jianxing Li, Zhichang Qi, Zuobin Chen:
Agent-Oriented Early Requirement Analysis of Distributed Simulation Environment of Fluid Flow. 451-455 - Yong-mei Zhang, Yan Han:
Research of Multi-Agent System Model and Learning Method. 456-460
Session 2B5: Simulation and Performance Evaluation - II
- Yalin Chen, Xianjia Wang, Guangmin Wang:
How the Enterprise Choosing Strategic Action: Modeling, Algorithm and Simulation. 461-465 - Ming Chen, Benting Wan:
An Asynchronous Event Relation Model for Monitoring Distributed System. 466-470 - Hongjie Sun, Binxing Fang, Hongli Zhang:
A Distributed Architecture for Network Performance Measurement and Evaluation System. 471-475 - Dingqing Hu, Changsheng Xie, Bin Cai:
A Study of Parallel Prefetching Algorithms Using Trace-Driven Simulation. 476-478 - Chao-Tung Yang
, Ping-I Chen, Ya-Ling Chen:
Performance Evaluation of SLIM and DRBL Diskless PC Clusters on Fedora Core 3. 479-482
Session 2C1: Security, Reliability, and Fault-Tolerance - V
- Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Kim, Sunkyung Kim:
Access Control List Mediation System for Large-Scale Network. 483-487 - Yingpeng Sang, Hong Shen, Zonghua Zhang:
An Efficient Protocol for the Problem of Secure Two-party Vector Dominance. 488-492 - Zonghua Zhang, Hong Shen, Xavier Défago
, Yingpeng Sang:
A Brief Comparative Study on Analytical Models of Computer System Dependability and Security. 493-497 - Jason Zurawski, Dajin Wang:
Fault-Tolerance Schemes for Hierarchical Mesh Networks. 498-502 - Xinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma:
Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme. 503-506
Session 2C2: Grid Computing Systems - III
- Kazuhiro Takeda, Satoshi Ono
, Christopher J. Ashley, Shigeru Nakayama:
JSGrid: An Environment for Heterogenous Cluster Computing. 507-512 - Nguyen The Loc, Said Elnaffar, Takuya Katayama, Tu Bao Ho:
A Scheduling Method for Divisible Workload Problem in Grid Environments. 513-517 - Chao-Tung Yang
, Kuan-Ching Li
, Wen-Chung Chiang, Po-Chi Shih:
Design and Implementation of TIGER Grid: an Integrated Metropolitan-Scale Grid Environment. 518-520 - Hui Jin, Yanxiang He, Weidong Wen, Haowen Liu:
A Run-Time Scheduling Policy for Dependent Tasks in Grid Computing Systems. 521-523 - Xiangli Qu, Xuejun Yang, Jingwei Zhong, Xuefeng Lv:
Integration Patterns of Grid Security Service. 524-528 - Chun Ye, Ke-Fan Xie, Ya-Lin Chen, Xian-Jia Wang:
MAS organization: design, enforcement and instantiation. 529-532
Session 2C3: Internet Computing and Web Technology - I
- Guangzhong Sun, Guoliang Chen, Junmin Wu:
Incentives for Participating in a Hybrid Peer-to-Peer System. 533-536 - Ximin Zhang, Junding Sun, Lihua Zhou:
Development of an Internet Home Automation System using Java and Dynamic DNS Service. 537-539 - Wang Huiran, Ma Ruifang:
Remote Monitoring of Air-Quality over Internet. 540-542 - Di Wu, Jian Lin, Yabo Dong, Miaoliang Zhu:
Using Semantic Web Technologies to Specify Constraints of RBAC. 543-545 - Yanping Yang, QingPing Tan, Yong Xiao, Jinshan Yu, Feng Liu:
Verifying Web Services Composition: A Transformation-Based Approach. 546-548 - Zhensheng Liu, Guiming He:
A Case of Application-level Multicast for Real-time Video Delivery over Internet. 549-552