


default search action
NPC 2011: Changsha, China
- Erik R. Altman, Weisong Shi:

Network and Parallel Computing - 8th IFIP International Conference, NPC 2011, Changsha, China, October 21-23, 2011. Proceedings. Lecture Notes in Computer Science 6985, Springer 2011, ISBN 978-3-642-24402-5
Session 1: Filesystems and Data
- Adam Wolfe Gordon, Paul Lu:

Elastic Phoenix: Malleable MapReduce for Shared-Memory Systems. 1-16 - Yu Wang, Jing Xing, Jin Xiong, Dan Meng:

A Load-Aware Data Placement Policy on Cluster File System. 17-31 - Jinjing Zhao, Yan Wen, Gang Zhao:

H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation. 32-43 - Mingdong Tang, Jianxun Liu, Guoqing Zhang:

Improved Compact Routing Schemes for Power-Law Networks. 44-58
Session 2: Network and Parallel Algorithms
- Zhongwei Lin, Yiping Yao:

Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution. 59-70 - Meiguang Zheng, Zhigang Hu, Peng Xiao, Meixia Zheng, Kai Zhang:

A Global Benefit Maximization Task-Bundle Allocation. 71-85 - Xiaofei Liao, Fengjiang Guo, Hai Jin:

Service Quality Assurance Mechanisms for P2P SIP VoIP. 86-98
Session 3: Cluster and Grid
- Yang Liu, Yunchu Liu, Hanli Bai:

VSCM: A Virtual Server Consolidation Manager for Cluster. 99-110 - Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin:

Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing. 111-122 - Zhiang Wu, Jie Cao

, Youquan Wang:
Dynamic Advance Reservation for Grid System Using Resource Pools. 123-134
Session 4: Trust and Authentication
- Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing:

A Way of Key Management in Cloud Storage Based on Trusted Computing. 135-145 - Qian Zhou, Jiong Yu, Feiran Yu:

A Trust-Based Defensive System Model for Cloud Computing. 146-159 - Yanan Sun, Xiaohong Guan, Ting Liu:

A New Method for Authentication Based on Covert Channel. 160-165
Session 5: Monitor, Diagnose, and Then Optimize
- Ting Liu, Xiaohong Guan, Yu Qu

, Yanan Sun:
A Layered Detection Method for Malware Identification. 166-175 - Yingdong Ma, Xiankai Chen, George Chen:

Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features. 176-184 - Daeyong Jung, Sung-Ho Chin, Kwang-Sik Chung

, Heon-Chang Yu
, Joon-Min Gil:
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment. 185-200
Session 6: Best Paper - 1
- Haiquan (Chuck) Zhao, Nan Hua, Ashwin Lall, Ping Li, Jia Wang, Jun (Jim) Xu:

Towards a Universal Sketch for Origin-Destination Network Measurements. 201-213 - Jianrui Yuan, Jintao Meng:

A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks. 214-231 - Xiaohang Wang, Maurizio Palesi, Mei Yang, Yingtao Jiang, Michael C. Huang, Peng Liu:

Power-Aware Run-Time Incremental Mapping for 3-D Networks-on-Chip. 232-247
Session 7: Best Paper - 2
- Yimo Du, Fang Liu, Zhiguang Chen, Xin Ma:

WeLe-RAID: A SSD-Based RAID for System Endurance and Performance. 248-262 - Zhiguang Chen, Fang Liu, Yimo Du:

Reorder the Write Sequence by Virtual Write Buffer to Extend SSD's Lifespan. 263-276 - Jie Tang, Shaoshan Liu, Zhimin Gu, Chen Liu

, Jean-Luc Gaudiot:
Memory-Side Acceleration for XML Parsing. 277-292
Session 8: Microarchitecture
- Tipp Moseley, Neil Vachharajani, William Jalby:

Hardware Performance Monitoring for the Rest of Us: A Position and Survey. 293-312 - Xiongli Gu, Jie Yang, Xiamin Wu, Chunming Huang, Peng Liu:

An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-core System. 313-323
Session 9: Network and Mobile Computing
- Sewon Han, Byung-Seo Kim:

Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless Networks. 324-333 - Min Zhu, Ke Xu, Qi Li:

Access Path Based Source Address Validation in Mobile IPv6. 334-349 - Yunan He, Chen Yang, Xiao-Feng Li:

Improve Google Android User Experience with Regional Garbage Collection. 350-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














