Network and Parallel Computing: IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three reviewers.Each paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the conference.Wealso accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.

Author(s): Kai Hwang (auth.), Hai Jin, Guang R. Gao, Zhiwei Xu, Hao Chen (eds.)
Series: Lecture Notes in Computer Science 3222
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 700
City: Hoboken
Tags: Computer Communication Networks; Software Engineering; Operating Systems; Algorithm Analysis and Problem Complexity; Information Systems Applications (incl.Internet); Multimedia Information Systems

Front Matter....Pages -
Secure Grid Computing with Trusted Resources and Internet Datamining....Pages 1-1
Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops Computing....Pages 2-2
In-VIGO: Making the Grid Virtually Yours....Pages 3-3
Productivity in HPC Clusters....Pages 4-4
Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems....Pages 5-8
Fuzzy Trust Integration for Security Enforcement in Grid Computing....Pages 9-21
Atomic Commitment in Grid Database Systems....Pages 22-29
A Data Grid Security System Based on Shared Context....Pages 30-37
A Study on Performance Monitoring Techniques for Traditional Parallel Systems and Grid....Pages 38-46
A Workflow-Based Grid Portal for Problem Solving Environment....Pages 47-56
A Real-Time Transaction Approach for Grid Services: A Model and Algorithms....Pages 57-64
QoS Quorum-Constrained Resource Management in Wireless Grid....Pages 65-72
A Data-Aware Resource Broker for Data Grids....Pages 73-82
Managing Service-Oriented Grids: Experiences from VEGA System Software....Pages 83-91
An Efficient Parallel Loop Self-scheduling on Grid Environments....Pages 92-100
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing....Pages 101-109
Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System....Pages 110-117
A Heuristic Algorithm for the Job Shop Scheduling Problem....Pages 118-128
Coordinating Distributed Resources for Complex Scientific Computation....Pages 129-132
Efficiently Rationing Resources for Grid and P2P Computing....Pages 133-136
Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network....Pages 137-140
Collaborative Process Execution for Service Composition with StarWebService....Pages 141-145
Efficient Gnutella-like P2P Overlay Construction....Pages 146-153
Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer Overlays....Pages 154-166
Layer Allocation Algorithms in Layered Peer-to-Peer Streaming....Pages 167-174
Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network....Pages 175-182
Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems....Pages 183-186
Cache Design for Transcoding Proxy Caching....Pages 187-194
Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication Services....Pages 195-204
Domain-Based Proxy for Efficient Location Tracking of Mobile Agents....Pages 205-212
Inhambu: Data Mining Using Idle Cycles in Clusters of PCs....Pages 213-220
Request Distribution for Fairness with a New Load-Update Mechanism in Web Server Cluster....Pages 221-229
Profile Oriented User Distributions in Enterprise Systems with Clustering....Pages 230-237
CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers....Pages 238-243
SuperNBD: An Efficient Network Storage Software for Cluster....Pages 244-247
I/O Response Time in a Fault-Tolerant Parallel Virtual File System....Pages 248-251
SARCNFS: Self-Adaptive Redundancy Clustered NAS File System....Pages 252-255
Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery....Pages 256-260
GOOMPI: A Generic Object Oriented Message Passing Interface....Pages 261-271
Simulating Complex Dynamical Systems in a Distributed Programming Environment....Pages 272-279
Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems....Pages 280-283
Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated Traffic....Pages 284-291
Leader Election in Hyper-Butterfly Graphs....Pages 292-299
A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks....Pages 300-307
Graph-Theoretic Analysis of Kautz Topology and DHT Schemes....Pages 308-315
A Parameterized Model of TCP Slow Start....Pages 316-324
SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc Networks....Pages 325-332
A Dioid Linear Algebra Approach to Study a Class of Continuous Petri Nets....Pages 333-340
A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate Nodes....Pages 341-356
Extended DBP for (m,k)-Firm Based QoS....Pages 357-365
Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches....Pages 366-373
A Scalable Distributed Architecture for Multi-party Conferencing Using SIP....Pages 374-381
DC-mesh: A Contracted High-Dimensional Mesh for Dynamic Clustering....Pages 382-389
The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic Patterns....Pages 390-398
An Empirical Autocorrelation Form for Modeling LRD Traffic Series....Pages 399-402
Statistical Error Analysis on Recording LRD Traffic Time Series....Pages 403-406
Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture....Pages 407-410
Reversible Cellular Automata Based Encryption....Pages 411-418
Ontology Based Cooperative Intrusion Detection System....Pages 419-426
Adding Security to Network Via Network Processors....Pages 427-434
A Method to Obtain Signatures from Honeypots Data....Pages 435-442
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description....Pages 443-450
Design and Analysis of Improved GSM Authentication Protocol for Roaming Users....Pages 451-458
A Novel Intrusion Detection Method....Pages 459-462
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs....Pages 463-472
A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees....Pages 473-480
Paramecium: Assembling Raw Nodes into Composite Cells....Pages 481-484
The Flexible Replication Method in an Object-Oriented Data Storage System....Pages 485-488
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System....Pages 489-492
The NDMP-Plus Prototype Design and Implementation for Network Based Data Management....Pages 493-497
Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components Graph....Pages 498-501
The Transmitted Strategy of Proxy Cache Based on Segmented Video....Pages 502-507
The Strategy of Batch Using Dynamic Cache for Streaming Media....Pages 508-512
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications....Pages 513-516
Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic Screening....Pages 517-521
The Development of Biosensors and Biochips in IECAS....Pages 522-525
Open Issues on Intelligent Sensor Networks....Pages 526-526
Enabling Anytime Anywhere Wireless Sensor Networks....Pages 527-527
A Query-Aware Routing Algorithm in Sensor Networks....Pages 528-535
Sensors Network Optimization by a Novel Genetic Algorithm....Pages 536-543
Online Mining in Sensor Networks....Pages 544-550
The HKUST Frog Pond – A Case Study of Sensory Data Analysis....Pages 551-558
BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive Scale....Pages 559-564
A Pervasive Sensor Node Architecture....Pages 565-567
Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications....Pages 568-575
Accurate Emulation of Wireless Sensor Networks....Pages 576-583
LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment....Pages 584-591
Reliable Splitted Multipath Routing for Wireless Sensor Networks....Pages 592-600
Reliable Data Aggregation for Real-Time Queries in Wireless Sensor Systems....Pages 601-610
The Design of a DRM System Using PKI and a Licensing Agent....Pages 611-617
Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile Networks....Pages 618-625
Fuzzy Logic Adaptive Mobile Location Estimation....Pages 626-634
A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability....Pages 635-643
A Design and Implementation of Network Traffic Monitoring System for PC-room Management....Pages 644-652
A Vulnerability Assessment Tool Based on OVAL in Linux System....Pages 653-660
Performance Analysis of Delay Estimation Models for Signalized Intersection Networks....Pages 661-669
Network Intrusion Protection System Using Rule-Based DB and RBAC Policy....Pages 670-675
Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting Networks....Pages 676-683
Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks....Pages 684-690
Back Matter....Pages -