Network and parallel computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings

Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: IFIP Internatioal Conference on Network and Parallel Computing 2008, Cao, Jian
Format: E-Book Buch
Sprache:Englisch
Veröffentlicht: Berlin Springer 2008
Springer Berlin / Heidelberg
Ausgabe:1
Schriftenreihe:Lecture Notes in Computer Science
Schlagworte:
ISBN:9783540881391, 3540881395
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota.
AbstractList Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota.
Author IFIP Internatioal Conference on Network and Parallel Computing 2008
Cao, Jian
Author_xml – sequence: 1
  fullname: IFIP Internatioal Conference on Network and Parallel Computing 2008
– sequence: 2
  fullname: Cao, Jian
BackLink https://cir.nii.ac.jp/crid/1130282269880717184$$DView record in CiNii
BookMark eNqNkE1Lw0AQhle0otX-hz0IIqQw-5XsetNgtSBWULyGTTJpY-NuzaZ68cebth705hxmGHh4ZniH5MB5h3tkZBItlAStmYRk__cuDBuQIQfQRihtkkNyLEBKo4DDERmF8Ap9CWYYF8fk6wG7T98uqXUlXdnWNg02tPBvq3VXuzm9pNPJ9JFOXYets13tnW1o6l2FLboCI_rwmNLNsYg-LaybL2wd0XRROxvRWdH5HFvK9JhDtKV636r1BWLZy8MpGVS2CTj6mSfkZXLznN6N72e30_Tqfmylig2MRa6sBMNEUWEuQTKZQ17qmJWF4boClnCueqnlqgLNylhgYgXaXOhS9hmIE3KxE9uwxM-w8E0Xso8Gc--XIfuTZc-e79j-0fc1hi7bYgW6rk8nu7lOY77h1T9IAbFQycZ5tiNdXWdFvemMCeCa89hoDQlLmJbiG1TghdM
ContentType eBook
Book
DBID RYH
DEWEY 004.35
DatabaseName CiNii Complete
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783540881407
3540881409
Edition 1
2008 edition
ExternalDocumentID 9783540881407
EBC6283545
EBC3063577
BB0088895X
GroupedDBID 089
0D6
0DA
2HV
38.
6IE
6IF
6IK
6IL
6IN
A4J
AABBV
AABFA
AAJGR
AAJYQ
AARBI
AATVQ
AAUKK
AAWTH
ABBUY
ABBVZ
ABCYT
ABGTP
ABMNI
ACANT
ACDTA
ACDUY
ACHXG
ACKTP
AEDXK
AEHEY
AEJLV
AEKFX
AETDV
AEZAY
AHNNE
ALMA_UNASSIGNED_HOLDINGS
ATJMZ
AZZ
BBABE
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CZZ
E6I
IERZE
IEZ
IW-
JJU
MA.
MMI
MW~
NUU
OCL
RIE
RIL
RYH
SBO
SVJCK
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-7M
-7Q
-BG
AAFYB
LDH
NUC
SAO
Z82
Z8R
Z8W
Z92
ID FETCH-LOGICAL-a45690-3b5a40913cfeb40414b0bd861dc928f017225ceea25f081d63e7a3eab38d45893
ISBN 9783540881391
3540881395
IngestDate Fri Nov 08 03:50:56 EST 2024
Tue Sep 09 06:53:14 EDT 2025
Tue Sep 09 06:54:38 EDT 2025
Thu Jun 26 23:59:44 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2008935897
LCCallNum_Ident QA76.58 -- .N63 2008eb
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a45690-3b5a40913cfeb40414b0bd861dc928f017225ceea25f081d63e7a3eab38d45893
Notes Includes bibliographical references and index
OCLC 304495020
PQID EBC3063577
PageCount 372
ParticipantIDs askewsholts_vlebooks_9783540881407
proquest_ebookcentral_EBC6283545
proquest_ebookcentral_EBC3063577
nii_cinii_1130282269880717184
PublicationCentury 2000
PublicationDate c2008
2008
2008-10-11
PublicationDateYYYYMMDD 2008-01-01
2008-10-11
PublicationDate_xml – year: 2008
  text: 2008
PublicationDecade 2000
PublicationPlace Berlin
PublicationPlace_xml – name: Berlin
– name: Berlin/Heidelberg
– name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationYear 2008
Publisher Springer
Springer Berlin / Heidelberg
Publisher_xml – name: Springer
– name: Springer Berlin / Heidelberg
SSID ssj0000319123
Score 1.9240699
Snippet Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a...
SourceID askewsholts
proquest
nii
SourceType Aggregation Database
Publisher
SubjectTerms Computer network architectures
Computer network architectures -- Congresses
Congresses
Parallel processing (Electronic computers)
Parallel processing (Electronic computers) -- Congresses
TableOfContents Intro -- Preface -- Organization -- Table of Contents -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Introduction -- Expanding Ring Search and Related Works -- Expanding Ring Search -- Related Works -- A Control Packet Minimized AODV Protocol -- Performance Evaluations -- The Experiments for the Node Mobility -- The Experiments for Node Velocity -- The Experiments for Node Density -- Concluding Remarks -- References -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- Introduction -- Existing Approaches for Service Discovery -- Proposed Service Discovery Architecture -- Single Mobile Device Architecture -- System Model -- Proposed Service Discovery Protocol -- Cooperative Neighbor Caching of Service Information -- The Lower ID-Based Service Discovery -- Cache Management -- Results and Analysis of Simulation -- Environment of Simulation -- Results of Simulation -- Conclusion -- References -- A Formal Approach to Robustness Testing of Network Protocol -- Introduction -- Related Works -- Formal Model and Testing Framework -- Model Definition -- Robustness Requirement and Normal-Verification Sequence -- Test Case Generation -- Invalid Inputs Generation -- Robustness Test Case Generation -- TTCN-3 Extensions and Test System -- Case Study: OSPFv2 -- Conclusions and Future Work -- References -- Deadline Probing: Towards Timely Cognitive Wireless Network -- Introduction -- Related Work -- Problem Formation -- Deadline Probing Model -- Channel Quality Probing and Scheduling -- Deadline Probing Algorithm -- Threshold Based Filtering -- Relative Direction and Velocity Awareness -- Channel Assignment with Job Complete Deadline -- Model Description -- General Results -- Reward on Transmitting Packets -- Sub-optimal Criteria -- Simulation Results and Numerical Analysis -- Conclusions -- References
SRDFA: A Kind of Session Reconstruction DFA -- Introduction -- Related Work -- SRDFA -- Webpages without Frame -- Webpages with Frame -- Path Supplement Based on Multi Window -- Session Reconstruction DFA -- Experimental Results -- Conclusion -- The References Section -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Introduction -- Rationale of the Proposed Scheme -- Stack Distance Model for Temporal Locality -- Profiling the Access Behavior -- Detection Scheme -- Experiments and Numerical Results -- Statistical Analysis for Observed Data -- Detection Based on HsMM -- Conclusion -- References -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Introduction -- Proportional Delay Differentiation in Database Connection Pools -- ConnectionManagement in DBCP -- PDD in DBCP -- Design of a Feedback Controller -- System Identification -- Controller Design -- The Closed-Loop System -- System Implementation and Extension -- Experiments -- Test-Bed andWorkloads -- Experimental Setup and Results -- Related Work -- Conclusion -- References -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Introduction -- IP Flow Based Feature Selection -- The Concepts of Micro-Flow and Macro Flow -- IP Flow Based Features -- Neural Network Classifier -- Detecting Experiments -- Conclusion -- References -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Introduction -- Security Model for Password-Based Key Exchange -- Protocol Syntax -- The Security Model -- Security Notions -- Algorithmic Assumptions -- CDH Assumption -- Security of Message Authentication Scheme -- Our Password-Based Protocol -- Description -- Security -- Conclusion -- References
The Overlap of Communication and Computation -- Inter-procedural Data-Flow Analysis for Message-Passing Programs -- Constructing the Minimal Region from the Producer to Consumer -- Transformation Algorithm -- Experimental Results -- Related Work -- Conclusions -- References -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- Introduction -- Architecture of MCG -- CCMS Structure -- Descriptions of CCMS Process -- CCMS Start-Up -- Operation for CCMS -- CCMS Communication Process -- Computation for Density Factor -- Analysis and Experiments -- Analysis for CCMS -- Experiments -- Analysis and Experiments -- References -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Introduction -- Related Work -- Replication System Model and QoS-Aware Replica Placement Problem Definition -- Three-Phase Placement Algorithm -- Pharos-Based Clustering Algorithm -- Pharos Determination Policy -- Local Replica Placing Process -- Partition Integrating Mechanism -- Theoretical Analysis -- Experiments and Evaluation -- The Choice of Parameter \mathcal{N} -- Time Complexity and Space -- The Effect of Replica Placement -- Conclusion -- References -- Online Balancing Two Independent Criteria -- Introduction -- Related Works -- Our Contribution -- Definitions and Models -- The First Result -- The Feasible Region for Values of t_l and t_s -- Remarks on Algorithm FIRST -- The Second Result -- References -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Introduction -- System Model -- Task Model -- Power Consumption and Execution Models -- Critical Speed -- Problem definition -- Proposed Algorithms -- An On-Line Procrastination Algorithm to Minimize the Energy Leakage: LA-FPPT -- Case Studies and Simulations -- Conclusions -- References -- Survey on Parallel Programming Model
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Introduction -- Security Model for Three-Party Key Exchange -- The Security Model -- Security Notions -- Algorithmic Assumptions -- GDH-Assumption -- PCGDH-Assumption -- Rmarks on Raymond Choo's protocol -- Our Three-Party Password-Based Protocol -- Description -- Security -- Conclusion -- References -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- Introduction -- Related Work -- Preliminaries -- Certificateless Public Key Cryptography -- Threshold Secret Sharing -- Proposed Security Solution -- Assumptions -- Proposed Security Scheme -- Conclusions -- References -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- Introduction -- System Overview -- Multi-channel Overlay -- Network Scale Distribution -- Data Storage Status Maintenance -- Multi-channel overlay -- Optimization strategy -- Performance Measurement and Analysis -- Simulation Environment -- Network Scale Difference -- System Performance -- Related Work -- Conclusions -- References -- HTL: A Locality Bounded Flat Hash Location Service -- Introduction -- Related Works -- Locality Problem in Flat Hash Based Location Services -- HTL: A Hash Table Localized -- Map to Physical Space -- Divide the Physical Space -- Location Servers Selection and Location Information Update -- Perform Query -- AnalysisonHTL -- Experiments -- Experiment Method and Metrics -- Results on Static Network -- Results on Mobile Network -- Results on Scalability -- Conclusion -- References -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Introduction -- Related Work -- Mathematical Analysis and the Proposed Model -- Simulation Experiments -- Simple Scenarios -- Scenarios with Moderate Complexity -- Complex Scenarios
Introduction
Conclusions and Future Work -- References -- Online Accumulation: Reconstruction of Worm Propagation Path -- Introduction -- Related Work -- Problem Formulation -- Accumulation Algorithm -- Algorithm Specification -- Analysis and Prove -- Online Accumulation Algorithm -- Simulation Experiments -- EvaluationMethodology -- Simulation Methodology -- Preferences of Accumulation Algorithm -- Preferences of Online Accumulation Algorithm -- Effect of Containment -- Conclusions -- References -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- Introduction -- Related Work -- Query Popularity Aware Replication -- Query Popularity Independent Replication -- System Model and Problem Statement -- HRS Replication -- HRS Strategy -- Implementation of HRS -- Performance Evaluation -- Simulation Methodology -- Results -- Conclusions -- References -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Introduction -- Motivation -- Solution Overview -- Design -- Routing and Searching in the ResourceDog Framework -- Automatic Invocation -- Reputation and Recommendation -- Experiments -- Routing and Searching -- Resource Automatic Invocation -- Reputation and Recommendation Simulation -- Related Works -- Conclusions and Future Work -- References -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Background and Motivation -- Introduction -- Problems and Motivation -- Related Work -- System Architecture -- Overview -- Cluster Control-Channel Management -- Cluster Control-Channel Packet Formats -- Cluster Connection Database Management -- Traffic Flow Forwarding Module -- Discussion -- Conclusion and Future Work -- References -- Automatic Transformation for Overlapping Communication and Computation -- Introduction -- Control-Flow Graph for Message-Passing Program
References -- SRDFA: A Kind of Session Reconstruction DFA -- Introduction -- Related Work -- SRDFA -- Webpages without Frame -- Webpages with Frame -- Path Supplement Based on Multi Window -- Session Reconstruction DFA -- Experimental Results -- Conclusion -- The References Section -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Introduction -- Rationale of the Proposed Scheme -- Stack Distance Model for Temporal Locality -- Profiling the Access Behavior -- Detection Scheme -- Experiments and Numerical Results -- Statistical Analysis for Observed Data -- Detection Based on HsMM -- Conclusion -- References -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Introduction -- Proportional Delay Differentiation in Database Connection Pools -- ConnectionManagement in DBCP -- PDD in DBCP -- Design of a Feedback Controller -- System Identification -- Controller Design -- The Closed-Loop System -- System Implementation and Extension -- Experiments -- Test-Bed andWorkloads -- Experimental Setup and Results -- Related Work -- Conclusion -- References -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Introduction -- IP Flow Based Feature Selection -- The Concepts of Micro-Flow and Macro Flow -- IP Flow Based Features -- Neural Network Classifier -- Detecting Experiments -- Conclusion -- References -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Introduction -- Security Model for Password-Based Key Exchange -- Protocol Syntax -- The Security Model -- Security Notions -- Algorithmic Assumptions -- CDH Assumption -- Security of Message Authentication Scheme -- Our Password-Based Protocol -- Description -- Security -- Conclusion -- References
Intro -- Title Page -- Preface -- Organization -- Table of Contents -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Introduction -- Expanding Ring Search and Related Works -- Expanding Ring Search -- Related Works -- A Control Packet Minimized AODV Protocol -- Performance Evaluations -- The Experiments for the Node Mobility -- The Experiments for Node Velocity -- The Experiments for Node Density -- Concluding Remarks -- References -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- Introduction -- Existing Approaches for Service Discovery -- Proposed Service Discovery Architecture -- Single Mobile Device Architecture -- System Model -- Proposed Service Discovery Protocol -- Cooperative Neighbor Caching of Service Information -- The Lower ID-Based Service Discovery -- Cache Management -- Results and Analysis of Simulation -- Environment of Simulation -- Results of Simulation -- Conclusion -- References -- A Formal Approach to Robustness Testing of Network Protocol -- Introduction -- Related Works -- Formal Model and Testing Framework -- Model Definition -- Robustness Requirement and Normal-Verification Sequence -- Test Case Generation -- Invalid Inputs Generation -- Robustness Test Case Generation -- TTCN-3 Extensions and Test System -- Case Study: OSPFv2 -- Conclusions and Future Work -- References -- Deadline Probing: Towards Timely Cognitive Wireless Network -- Introduction -- Related Work -- Problem Formation -- Deadline Probing Model -- Channel Quality Probing and Scheduling -- Deadline Probing Algorithm -- Threshold Based Filtering -- Relative Direction and Velocity Awareness -- Channel Assignment with Job Complete Deadline -- Model Description -- General Results -- Reward on Transmitting Packets -- Sub-optimal Criteria -- Simulation Results and Numerical Analysis -- Conclusions
Title Network and parallel computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings
URI https://cir.nii.ac.jp/crid/1130282269880717184
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=3063577
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6283545
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783540881407
Volume 5245
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Na9swFH-sYYPlsq3bWNp1iLHbbIhjyZJ6TGhZYXQ5lJKbkS0Zwoo34rT0sD--7ymWnaTQscMuxhHKk3g_4ff0PgG-GKfHpLbHVtiEWpilsXJCxMYKU0ly3Pg629ff5eWlWiz0vG3p1_h2ArKu1f29_v1focYxBJtSZ_8B7o4oDuA7go5PhB2fexpx9zNUYPIR3ZvUf7OiJik3PmT81oc2093_4vxivmcE7FP-_MGYz6jIoPJGUbIlt-2qfZttevlRrikW-2tC7KABmu1p96KwU9P3lttZjbwU2zuehx3Puh0T6d5HsnERhdMcDBVqz1ARDJU7F1iyOimFWmjSy6MuSnA6RSpKabE4gAOZyU12XmdBo_wrlLttwo6nIl50tqwN1SEMTfMTxQWKknWD-kO9XD6Sul6VuHoNA0oveQPPXH0Ir0JTDdZ-Yw9huFUh8i38aVnEkEUsgMo6UNkpIx6zHUhZz-SIIaCM2BSxAGfEPJgRa6FkHsrIz0J6WzC-g-vzs6vZt7htmBEb1IM1CtRCGE6VXsvKFXzME16MC6uyxJZ6oiq6708EEjETUaEuaLPUSZM6U6TKcoGq63sY1L9q9wGYkaqkWkLWczO1RZEJN-Eu0dpVVVGM4PMWZ_O7G-_cb_Ke_XwsR3CCDM_LJT0T8pGjPppplBkyQaWIj4AFKHL__zYiOT-bzvAumwopn5qSUbFALo7-ssoxvOzP40cYrFe37gSel3frZbP65A_VA8eka2c
linkProvider IEEE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Network+and+parallel+computing+%3A+IFIP+International+Conference%2C+NPC+2008%2C+Shanghai%2C+China%2C+October+18-20%2C+2008+%3A+proceedings&rft.au=IFIP+Internatioal+Conference+on+Network+and+Parallel+Computing+2008&rft.au=Cao%2C+Jian&rft.date=2008-01-01&rft.pub=Springer&rft.isbn=9783540881391&rft.externalDocID=BB0088895X
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97835408%2F9783540881407.jpg