This book constitutes the refereed joint proceedings of eight internationl workshops held in conjunction with the Third International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005, held in Nanjing, China in November 2005 (see LNCS 3758).
The 71 revised full papers presented were carefully reviewed and selected from 323 submissions. The papers of the eight workshops are very specific and contribute to enlarging the spectrum of the more general topics treated in the ISPA 2005 main conference. Topics addressed are applications and economics of peer-to-peer systems (AEPP 2005), advanced storage technology and autonomic distributed data (ASTD 2005), bioinformatics (BIOS 2005), grid computing in china (GCIC 2005), information assurance in distributed systems (IADS 2005), mobile ad-hoc and ubiquitous sensor networks (MASN 2005), service grid computing and applications (SGCA 2005), and Web information systems and applications (WISA 2005).
Author(s): Di Wu, Ye Tian, Kam-Wing Ng (auth.), Guihai Chen, Yi Pan, Minyi Guo, Jian Lu (eds.)
Series: Lecture Notes in Computer Science 3759 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 672
Tags: Algorithm Analysis and Problem Complexity; Computer Communication Networks; Information Systems Applications (incl.Internet); System Performance and Evaluation; Software Engineering; Bioinformatics
Front Matter....Pages -
Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments....Pages 1-8
On Building and Updating Distributed LSI for P2P Systems....Pages 9-16
Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network....Pages 17-26
Characterization of P2P File-Sharing System....Pages 27-34
Analysis of GHT in Mobile Ad Hoc Networks....Pages 35-44
Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization....Pages 45-53
A P2P Market Place Based on Aggregate Signatures....Pages 54-63
Proof of Service in a Hybrid P2P Environment....Pages 64-73
Construct Optimal Diameter Network and d-partition Routing Algorithm....Pages 74-81
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System....Pages 82-90
VTarget: An Improved Software Target Emulator for SANs....Pages 91-100
Design and Implementation of an Efficient Multipath for a SAN Environment....Pages 101-110
Research of Hot-Spot Selection Algorithm in Virtual Address Switch....Pages 111-119
An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays....Pages 120-129
An NFSv4-Based Security Scheme for NAS....Pages 130-139
Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System....Pages 140-148
A Cluster LVM for SAN Environments....Pages 149-158
COMPACT: A Comparative Package for Clustering Assessment....Pages 159-167
Fast Sequence Similarity Computing with LCS on LARPBS....Pages 168-175
Fast Scalable Algorithm on LARPBS for Sequence Alignment....Pages 176-185
Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts....Pages 186-195
A Knowledge-Driven Method to Evaluate Multi-source Clustering....Pages 196-202
Understanding Protein Structure Prediction Using SVM_DT....Pages 203-212
Various Features with Integrated Strategies for Protein Name Classification....Pages 213-222
Uniform Authorization Management in ChinaGrid Support Platform....Pages 223-231
Introduction to ChinaGrid Support Platform....Pages 232-240
A Microeconomics-Based Resource Assignment Model for Grid Computing....Pages 241-248
The Campus Resource Management Based on Constellation Model in the ChinaGrid....Pages 249-256
Grid Computing Methodology for Protein Structure Prediction and Analysis....Pages 257-266
Applying Service Composition in Digital Museum Grid....Pages 267-275
Grid Supporting Platform for AMS Data Processing....Pages 276-285
A CGSP-Based Grid Application for University Digital Museums....Pages 286-296
FleMA: A Flexible Measurement Architecture for ChinaGrid....Pages 297-304
A Resource Scheduling Strategy for the CFD Application on the Grid....Pages 305-314
A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers....Pages 315-322
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme....Pages 323-331
An Efficient Proxy-Protected Signature Scheme Based on Factoring....Pages 332-341
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings....Pages 342-349
Encryption Based on Reversible Second-Order Cellular Automata....Pages 350-358
ID-Based Proxy Signature Using Bilinear Pairings....Pages 359-367
Efficient Fair Certified E-Mail Delivery Based on RSA....Pages 368-377
Intrusion Tolerant CA Scheme with Cheaters Detection Ability....Pages 378-386
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application....Pages 387-396
Research and Implementation of Workflow Interoperability Crossing Organizations....Pages 397-402
LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks....Pages 403-411
Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks....Pages 412-421
Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons....Pages 422-433
Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks....Pages 434-443
Probabilistic Behavior of Sensor Network Localization....Pages 444-453
Hybrid Authentication and Key Management Scheme for WSANs....Pages 454-465
Storage-Optimal Key Sharing with Authentication in Sensor Networks....Pages 466-474
An Asynchronous Replica Consistency Model in Data Grid....Pages 475-484
Distributed Access Control for Grid Environments Using Trust Management Approach....Pages 485-495
Research on Database Access and Integration in UDMGrid....Pages 496-505
Resource Allocation Based on Pricing for Grid Computing Environments....Pages 506-513
CMSA: A Method for Construction and Maintenance of Semantic Annotations....Pages 514-519
NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations....Pages 520-529
Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis....Pages 530-539
The Design and Implementation of Service Adapter in ShanghaiGrid Core....Pages 540-548
MCRM System: CIM-Based Multiple Clusters Manager....Pages 549-558
Introduction to an Agent-Based Grid Workflow Management System....Pages 559-568
An XML Query Mechanism with Ontology Integration....Pages 569-578
Implementation of Cooperative Cognition Under Web Environment....Pages 579-588
Access Authorization Policy for XML Document Security....Pages 589-598
OWL2Jess: A Transformational Implementation of the OWL Semantics....Pages 599-608
Security Frameworks for Open LBS Based on Web Services Security Mechanism....Pages 609-618
Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method....Pages 619-626
A K -Anonymizing Approach for Preventing Link Attacks in Data Publishing....Pages 627-636
Transformation-Driven Development of Composite Web Services....Pages 637-646
Badness Information Audit Based on Image Character Filtering....Pages 647-656
User’s Rough Set Based Fuzzy Interest Model in Mining WWW Cache....Pages 657-665
Back Matter....Pages -