index - Network and Parallel Computing Access content directly
   


Full Text Documents

27

Search


Table of Contents
Network and Parallel Computing
Erik Altman, Weisong Shi
Front Matter

Session 1: Filesystems and Data


Elastic Phoenix: Malleable MapReduce for Shared-Memory Systems
Adam Wolfe Gordon, Paul Lu
1-16
A Load-Aware Data Placement Policy on Cluster File System
Yu Wang, Jing Xing, Jin Xiong, Dan Meng
17-31
H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation
Jinjing Zhao, Yan Wen, Gang Zhao
32-43
Improved Compact Routing Schemes for Power-Law Networks
Mingdong Tang, Jianxun Liu, Guoqing Zhang
44-58

Session 2: Network and Parallel Algorithms


Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution
Zhongwei Lin, Yiping Yao
59-70
A Global Benefit Maximization Task-Bundle Allocation
Meiguang Zheng, Zhigang Hu, Peng Xiao, Kai Zhang
71-85
Service Quality Assurance Mechanisms for P2P SIP VoIP
Xiaofei Liao, Fengjiang Guo, Hai Jin
86-98

Session 3: Cluster and Grid


VSCM: A Virtual Server Consolidation Manager for Cluster
Yang Liu, Hanli Bai
99-110
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing
Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin
111-122
Dynamic Advance Reservation for Grid System Using Resource Pools
Zhiang Wu, Jie Cao, Youquan Wang
123-134

Session 4: Trust and Authentication


A Way of Key Management in Cloud Storage Based on Trusted Computing
Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing
135-145
A Trust-Based Defensive System Model for Cloud Computing
Qian Zhou, Jiong Yu, Feiran Yu
146-159
A New Method for Authentication Based on Covert Channel
Yanan Sun, Xiaohong Guan, Ting Liu
160-165

Session 5: Monitor, Diagnose, and Then Optimize


A Layered Detection Method for Malware Identification
Ting Liu, Xiaohong Guan, Yu Qu, Yanan Sun
166-175
Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features
Yingdong Ma, Xiankai Chen, George Chen
176-184
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment
Daeyong Jung, Sungho Chin, Kwangsik Chung, Heonchang Yu, Joonmin Gil
185-200

Session 6: Best Paper – 1


Towards a Universal Sketch for Origin-Destination Network Measurements
Haiquan Zhao, Nan Hua, Ashwin Lall, Ping Li, Jia Wang, Jun Xu
201-213
A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks
Jianrui Yuan, Jintao Meng
214-231
Power-Aware Run-Time Incremental Mapping for 3-D Networks-on-Chip
Xiaohang Wang, Maurizio Palesi, Mei Yang, Yingtao Jiang, Michael Huang, Peng Liu
232-247

Session 7: Best Paper – 2


WeLe-RAID: A SSD-Based RAID for System Endurance and Performance
Du Yimo, Liu Fang, Chen Zhiguang, Ma Xin
248-262
Reorder the Write Sequence by Virtual Write Buffer to Extend SSD’s Lifespan
Zhiguang Chen, Fang Liu, Yimo Du
263-276
Memory-Side Acceleration for XML Parsing
Jie Tang, Shaoshan Liu, Zhimin Gu, Chen Liu, Jean-Luc Gaudiot
277-292

Session 8: Microarchitecture


Hardware Performance Monitoring for the Rest of Us: A Position and Survey
Tipp Moseley, Neil Vachharajani, William Jalby
293-312
An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-core System
Xiongli Gu, Jie Yang, Xiamin Wu, Chunming Huang, Peng Liu
313-323

Session 9: Network and Mobile Computing


Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless Networks
Sewon Han, Byung-Seo Kim
324-333
Access Path Based Source Address Validation in Mobile IPv6
Min Zhu, Ke Xu, Qi Li
334-349
Improve Google Android User Experience with Regional Garbage Collection
Yunan He, Chen Yang, Xiao-Feng Li
350-365

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/