Network and parallel computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings
Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the...
Gespeichert in:
| Hauptverfasser: | , |
|---|---|
| Format: | E-Book Buch |
| Sprache: | Englisch |
| Veröffentlicht: |
Berlin
Springer
2008
Springer Berlin / Heidelberg |
| Ausgabe: | 1 |
| Schriftenreihe: | Lecture Notes in Computer Science |
| Schlagworte: | |
| ISBN: | 9783540881391, 3540881395 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota. |
|---|---|
| AbstractList | Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the theories and technologies of network and parallel computing. The goal of NPC is to establish an international forum for researchers and practitioners to present their - cellent ideas and experiences in all system fields of network and parallel computing. The main focus of NPC 2008 was on the most critical areas of network and parallel computing, network technologies, network applications, network and parallel archit- tures, and parallel and distributed software. In total, the conference received more than 140 papers from researchers and prac- tioners. Each paper was reviewed by at least two internationally renowned referees and selected based on its originality, significance, correctness, relevance, and clarity of presentation. Among the high-quality submissions, only 32 regular papers were accepted by the conferences. All of the selected conference papers are included in the conference proceedings. After the conference, some high-quality papers will be r- ommended to be published in the special issue of international journals. We were delighted to host three well-known international scholars offering the k- note speeches, Sajal K. Das from University Texas at Arlington USA, Matt Mutka from Michigan State University and David Hung-Chang Du from University of M- nesota University of Minnesota. |
| Author | IFIP Internatioal Conference on Network and Parallel Computing 2008 Cao, Jian |
| Author_xml | – sequence: 1 fullname: IFIP Internatioal Conference on Network and Parallel Computing 2008 – sequence: 2 fullname: Cao, Jian |
| BackLink | https://cir.nii.ac.jp/crid/1130282269880717184$$DView record in CiNii |
| BookMark | eNqNkE1Lw0AQhle0otX-hz0IIqQw-5XsetNgtSBWULyGTTJpY-NuzaZ68cebth705hxmGHh4ZniH5MB5h3tkZBItlAStmYRk__cuDBuQIQfQRihtkkNyLEBKo4DDERmF8Ap9CWYYF8fk6wG7T98uqXUlXdnWNg02tPBvq3VXuzm9pNPJ9JFOXYets13tnW1o6l2FLboCI_rwmNLNsYg-LaybL2wd0XRROxvRWdH5HFvK9JhDtKV636r1BWLZy8MpGVS2CTj6mSfkZXLznN6N72e30_Tqfmylig2MRa6sBMNEUWEuQTKZQ17qmJWF4boClnCueqnlqgLNylhgYgXaXOhS9hmIE3KxE9uwxM-w8E0Xso8Gc--XIfuTZc-e79j-0fc1hi7bYgW6rk8nu7lOY77h1T9IAbFQycZ5tiNdXWdFvemMCeCa89hoDQlLmJbiG1TghdM |
| ContentType | eBook Book |
| DBID | RYH |
| DEWEY | 004.35 |
| DatabaseName | CiNii Complete |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISBN | 9783540881407 3540881409 |
| Edition | 1 2008 edition |
| ExternalDocumentID | 9783540881407 EBC6283545 EBC3063577 BB0088895X |
| GroupedDBID | 089 0D6 0DA 2HV 38. 6IE 6IF 6IK 6IL 6IN A4J AABBV AABFA AAJGR AAJYQ AARBI AATVQ AAUKK AAWTH ABBUY ABBVZ ABCYT ABGTP ABMNI ACANT ACDTA ACDUY ACHXG ACKTP AEDXK AEHEY AEJLV AEKFX AETDV AEZAY AHNNE ALMA_UNASSIGNED_HOLDINGS ATJMZ AZZ BBABE BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CZZ E6I IERZE IEZ IW- JJU MA. MMI MW~ NUU OCL RIE RIL RYH SBO SVJCK TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -7M -7Q -BG AAFYB LDH NUC SAO Z82 Z8R Z8W Z92 |
| ID | FETCH-LOGICAL-a45690-3b5a40913cfeb40414b0bd861dc928f017225ceea25f081d63e7a3eab38d45893 |
| ISBN | 9783540881391 3540881395 |
| IngestDate | Fri Nov 08 03:50:56 EST 2024 Tue Sep 09 06:53:14 EDT 2025 Tue Sep 09 06:54:38 EDT 2025 Thu Jun 26 23:59:44 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2008935897 |
| LCCallNum_Ident | QA76.58 -- .N63 2008eb |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a45690-3b5a40913cfeb40414b0bd861dc928f017225ceea25f081d63e7a3eab38d45893 |
| Notes | Includes bibliographical references and index |
| OCLC | 304495020 |
| PQID | EBC3063577 |
| PageCount | 372 |
| ParticipantIDs | askewsholts_vlebooks_9783540881407 proquest_ebookcentral_EBC6283545 proquest_ebookcentral_EBC3063577 nii_cinii_1130282269880717184 |
| PublicationCentury | 2000 |
| PublicationDate | c2008 2008 2008-10-11 |
| PublicationDateYYYYMMDD | 2008-01-01 2008-10-11 |
| PublicationDate_xml | – year: 2008 text: 2008 |
| PublicationDecade | 2000 |
| PublicationPlace | Berlin |
| PublicationPlace_xml | – name: Berlin – name: Berlin/Heidelberg – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationYear | 2008 |
| Publisher | Springer Springer Berlin / Heidelberg |
| Publisher_xml | – name: Springer – name: Springer Berlin / Heidelberg |
| SSID | ssj0000319123 |
| Score | 1.9240699 |
| Snippet | Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a... |
| SourceID | askewsholts proquest nii |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Computer network architectures Computer network architectures -- Congresses Congresses Parallel processing (Electronic computers) Parallel processing (Electronic computers) -- Congresses |
| TableOfContents | Intro -- Preface -- Organization -- Table of Contents -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Introduction -- Expanding Ring Search and Related Works -- Expanding Ring Search -- Related Works -- A Control Packet Minimized AODV Protocol -- Performance Evaluations -- The Experiments for the Node Mobility -- The Experiments for Node Velocity -- The Experiments for Node Density -- Concluding Remarks -- References -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- Introduction -- Existing Approaches for Service Discovery -- Proposed Service Discovery Architecture -- Single Mobile Device Architecture -- System Model -- Proposed Service Discovery Protocol -- Cooperative Neighbor Caching of Service Information -- The Lower ID-Based Service Discovery -- Cache Management -- Results and Analysis of Simulation -- Environment of Simulation -- Results of Simulation -- Conclusion -- References -- A Formal Approach to Robustness Testing of Network Protocol -- Introduction -- Related Works -- Formal Model and Testing Framework -- Model Definition -- Robustness Requirement and Normal-Verification Sequence -- Test Case Generation -- Invalid Inputs Generation -- Robustness Test Case Generation -- TTCN-3 Extensions and Test System -- Case Study: OSPFv2 -- Conclusions and Future Work -- References -- Deadline Probing: Towards Timely Cognitive Wireless Network -- Introduction -- Related Work -- Problem Formation -- Deadline Probing Model -- Channel Quality Probing and Scheduling -- Deadline Probing Algorithm -- Threshold Based Filtering -- Relative Direction and Velocity Awareness -- Channel Assignment with Job Complete Deadline -- Model Description -- General Results -- Reward on Transmitting Packets -- Sub-optimal Criteria -- Simulation Results and Numerical Analysis -- Conclusions -- References SRDFA: A Kind of Session Reconstruction DFA -- Introduction -- Related Work -- SRDFA -- Webpages without Frame -- Webpages with Frame -- Path Supplement Based on Multi Window -- Session Reconstruction DFA -- Experimental Results -- Conclusion -- The References Section -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Introduction -- Rationale of the Proposed Scheme -- Stack Distance Model for Temporal Locality -- Profiling the Access Behavior -- Detection Scheme -- Experiments and Numerical Results -- Statistical Analysis for Observed Data -- Detection Based on HsMM -- Conclusion -- References -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Introduction -- Proportional Delay Differentiation in Database Connection Pools -- ConnectionManagement in DBCP -- PDD in DBCP -- Design of a Feedback Controller -- System Identification -- Controller Design -- The Closed-Loop System -- System Implementation and Extension -- Experiments -- Test-Bed andWorkloads -- Experimental Setup and Results -- Related Work -- Conclusion -- References -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Introduction -- IP Flow Based Feature Selection -- The Concepts of Micro-Flow and Macro Flow -- IP Flow Based Features -- Neural Network Classifier -- Detecting Experiments -- Conclusion -- References -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Introduction -- Security Model for Password-Based Key Exchange -- Protocol Syntax -- The Security Model -- Security Notions -- Algorithmic Assumptions -- CDH Assumption -- Security of Message Authentication Scheme -- Our Password-Based Protocol -- Description -- Security -- Conclusion -- References The Overlap of Communication and Computation -- Inter-procedural Data-Flow Analysis for Message-Passing Programs -- Constructing the Minimal Region from the Producer to Consumer -- Transformation Algorithm -- Experimental Results -- Related Work -- Conclusions -- References -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- Introduction -- Architecture of MCG -- CCMS Structure -- Descriptions of CCMS Process -- CCMS Start-Up -- Operation for CCMS -- CCMS Communication Process -- Computation for Density Factor -- Analysis and Experiments -- Analysis for CCMS -- Experiments -- Analysis and Experiments -- References -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Introduction -- Related Work -- Replication System Model and QoS-Aware Replica Placement Problem Definition -- Three-Phase Placement Algorithm -- Pharos-Based Clustering Algorithm -- Pharos Determination Policy -- Local Replica Placing Process -- Partition Integrating Mechanism -- Theoretical Analysis -- Experiments and Evaluation -- The Choice of Parameter \mathcal{N} -- Time Complexity and Space -- The Effect of Replica Placement -- Conclusion -- References -- Online Balancing Two Independent Criteria -- Introduction -- Related Works -- Our Contribution -- Definitions and Models -- The First Result -- The Feasible Region for Values of t_l and t_s -- Remarks on Algorithm FIRST -- The Second Result -- References -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Introduction -- System Model -- Task Model -- Power Consumption and Execution Models -- Critical Speed -- Problem definition -- Proposed Algorithms -- An On-Line Procrastination Algorithm to Minimize the Energy Leakage: LA-FPPT -- Case Studies and Simulations -- Conclusions -- References -- Survey on Parallel Programming Model Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Introduction -- Security Model for Three-Party Key Exchange -- The Security Model -- Security Notions -- Algorithmic Assumptions -- GDH-Assumption -- PCGDH-Assumption -- Rmarks on Raymond Choo's protocol -- Our Three-Party Password-Based Protocol -- Description -- Security -- Conclusion -- References -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- Introduction -- Related Work -- Preliminaries -- Certificateless Public Key Cryptography -- Threshold Secret Sharing -- Proposed Security Solution -- Assumptions -- Proposed Security Scheme -- Conclusions -- References -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- Introduction -- System Overview -- Multi-channel Overlay -- Network Scale Distribution -- Data Storage Status Maintenance -- Multi-channel overlay -- Optimization strategy -- Performance Measurement and Analysis -- Simulation Environment -- Network Scale Difference -- System Performance -- Related Work -- Conclusions -- References -- HTL: A Locality Bounded Flat Hash Location Service -- Introduction -- Related Works -- Locality Problem in Flat Hash Based Location Services -- HTL: A Hash Table Localized -- Map to Physical Space -- Divide the Physical Space -- Location Servers Selection and Location Information Update -- Perform Query -- AnalysisonHTL -- Experiments -- Experiment Method and Metrics -- Results on Static Network -- Results on Mobile Network -- Results on Scalability -- Conclusion -- References -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Introduction -- Related Work -- Mathematical Analysis and the Proposed Model -- Simulation Experiments -- Simple Scenarios -- Scenarios with Moderate Complexity -- Complex Scenarios Introduction Conclusions and Future Work -- References -- Online Accumulation: Reconstruction of Worm Propagation Path -- Introduction -- Related Work -- Problem Formulation -- Accumulation Algorithm -- Algorithm Specification -- Analysis and Prove -- Online Accumulation Algorithm -- Simulation Experiments -- EvaluationMethodology -- Simulation Methodology -- Preferences of Accumulation Algorithm -- Preferences of Online Accumulation Algorithm -- Effect of Containment -- Conclusions -- References -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- Introduction -- Related Work -- Query Popularity Aware Replication -- Query Popularity Independent Replication -- System Model and Problem Statement -- HRS Replication -- HRS Strategy -- Implementation of HRS -- Performance Evaluation -- Simulation Methodology -- Results -- Conclusions -- References -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Introduction -- Motivation -- Solution Overview -- Design -- Routing and Searching in the ResourceDog Framework -- Automatic Invocation -- Reputation and Recommendation -- Experiments -- Routing and Searching -- Resource Automatic Invocation -- Reputation and Recommendation Simulation -- Related Works -- Conclusions and Future Work -- References -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Background and Motivation -- Introduction -- Problems and Motivation -- Related Work -- System Architecture -- Overview -- Cluster Control-Channel Management -- Cluster Control-Channel Packet Formats -- Cluster Connection Database Management -- Traffic Flow Forwarding Module -- Discussion -- Conclusion and Future Work -- References -- Automatic Transformation for Overlapping Communication and Computation -- Introduction -- Control-Flow Graph for Message-Passing Program References -- SRDFA: A Kind of Session Reconstruction DFA -- Introduction -- Related Work -- SRDFA -- Webpages without Frame -- Webpages with Frame -- Path Supplement Based on Multi Window -- Session Reconstruction DFA -- Experimental Results -- Conclusion -- The References Section -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Introduction -- Rationale of the Proposed Scheme -- Stack Distance Model for Temporal Locality -- Profiling the Access Behavior -- Detection Scheme -- Experiments and Numerical Results -- Statistical Analysis for Observed Data -- Detection Based on HsMM -- Conclusion -- References -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Introduction -- Proportional Delay Differentiation in Database Connection Pools -- ConnectionManagement in DBCP -- PDD in DBCP -- Design of a Feedback Controller -- System Identification -- Controller Design -- The Closed-Loop System -- System Implementation and Extension -- Experiments -- Test-Bed andWorkloads -- Experimental Setup and Results -- Related Work -- Conclusion -- References -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Introduction -- IP Flow Based Feature Selection -- The Concepts of Micro-Flow and Macro Flow -- IP Flow Based Features -- Neural Network Classifier -- Detecting Experiments -- Conclusion -- References -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Introduction -- Security Model for Password-Based Key Exchange -- Protocol Syntax -- The Security Model -- Security Notions -- Algorithmic Assumptions -- CDH Assumption -- Security of Message Authentication Scheme -- Our Password-Based Protocol -- Description -- Security -- Conclusion -- References Intro -- Title Page -- Preface -- Organization -- Table of Contents -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Introduction -- Expanding Ring Search and Related Works -- Expanding Ring Search -- Related Works -- A Control Packet Minimized AODV Protocol -- Performance Evaluations -- The Experiments for the Node Mobility -- The Experiments for Node Velocity -- The Experiments for Node Density -- Concluding Remarks -- References -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- Introduction -- Existing Approaches for Service Discovery -- Proposed Service Discovery Architecture -- Single Mobile Device Architecture -- System Model -- Proposed Service Discovery Protocol -- Cooperative Neighbor Caching of Service Information -- The Lower ID-Based Service Discovery -- Cache Management -- Results and Analysis of Simulation -- Environment of Simulation -- Results of Simulation -- Conclusion -- References -- A Formal Approach to Robustness Testing of Network Protocol -- Introduction -- Related Works -- Formal Model and Testing Framework -- Model Definition -- Robustness Requirement and Normal-Verification Sequence -- Test Case Generation -- Invalid Inputs Generation -- Robustness Test Case Generation -- TTCN-3 Extensions and Test System -- Case Study: OSPFv2 -- Conclusions and Future Work -- References -- Deadline Probing: Towards Timely Cognitive Wireless Network -- Introduction -- Related Work -- Problem Formation -- Deadline Probing Model -- Channel Quality Probing and Scheduling -- Deadline Probing Algorithm -- Threshold Based Filtering -- Relative Direction and Velocity Awareness -- Channel Assignment with Job Complete Deadline -- Model Description -- General Results -- Reward on Transmitting Packets -- Sub-optimal Criteria -- Simulation Results and Numerical Analysis -- Conclusions |
| Title | Network and parallel computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings |
| URI | https://cir.nii.ac.jp/crid/1130282269880717184 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=3063577 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=6283545 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9783540881407 |
| Volume | 5245 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3Na9swFH-sYYPlsq3bWNp1iLHbbIhjyZJ6TGhZYXQ5lJKbkS0Zwoo34rT0sD--7ymWnaTQscMuxhHKk3g_4ff0PgG-GKfHpLbHVtiEWpilsXJCxMYKU0ly3Pg629ff5eWlWiz0vG3p1_h2ArKu1f29_v1focYxBJtSZ_8B7o4oDuA7go5PhB2fexpx9zNUYPIR3ZvUf7OiJik3PmT81oc2093_4vxivmcE7FP-_MGYz6jIoPJGUbIlt-2qfZttevlRrikW-2tC7KABmu1p96KwU9P3lttZjbwU2zuehx3Puh0T6d5HsnERhdMcDBVqz1ARDJU7F1iyOimFWmjSy6MuSnA6RSpKabE4gAOZyU12XmdBo_wrlLttwo6nIl50tqwN1SEMTfMTxQWKknWD-kO9XD6Sul6VuHoNA0oveQPPXH0Ir0JTDdZ-Yw9huFUh8i38aVnEkEUsgMo6UNkpIx6zHUhZz-SIIaCM2BSxAGfEPJgRa6FkHsrIz0J6WzC-g-vzs6vZt7htmBEb1IM1CtRCGE6VXsvKFXzME16MC6uyxJZ6oiq6708EEjETUaEuaLPUSZM6U6TKcoGq63sY1L9q9wGYkaqkWkLWczO1RZEJN-Eu0dpVVVGM4PMWZ_O7G-_cb_Ke_XwsR3CCDM_LJT0T8pGjPppplBkyQaWIj4AFKHL__zYiOT-bzvAumwopn5qSUbFALo7-ssoxvOzP40cYrFe37gSel3frZbP65A_VA8eka2c |
| linkProvider | IEEE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Network+and+parallel+computing+%3A+IFIP+International+Conference%2C+NPC+2008%2C+Shanghai%2C+China%2C+October+18-20%2C+2008+%3A+proceedings&rft.au=IFIP+Internatioal+Conference+on+Network+and+Parallel+Computing+2008&rft.au=Cao%2C+Jian&rft.date=2008-01-01&rft.pub=Springer&rft.isbn=9783540881391&rft.externalDocID=BB0088895X |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97835408%2F9783540881407.jpg |

