Network and parallel computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008 : proceedings

Welcome to the proceedings of the 2008 IFIP International Conference on Network and Parallel Computing (NPC 2008) held in Shanghai, China. NPC has been a premier conference that has brought together researchers and pr- titioners from academia, industry and governments around the world to advance the...

Full description

Saved in:
Bibliographic Details
Main Authors: IFIP Internatioal Conference on Network and Parallel Computing 2008, Cao, Jian
Format: eBook Book
Language:English
Published: Berlin Springer 2008
Springer Berlin / Heidelberg
Edition:1
Series:Lecture Notes in Computer Science
Subjects:
ISBN:9783540881391, 3540881395
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro -- Preface -- Organization -- Table of Contents -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Introduction -- Expanding Ring Search and Related Works -- Expanding Ring Search -- Related Works -- A Control Packet Minimized AODV Protocol -- Performance Evaluations -- The Experiments for the Node Mobility -- The Experiments for Node Velocity -- The Experiments for Node Density -- Concluding Remarks -- References -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- Introduction -- Existing Approaches for Service Discovery -- Proposed Service Discovery Architecture -- Single Mobile Device Architecture -- System Model -- Proposed Service Discovery Protocol -- Cooperative Neighbor Caching of Service Information -- The Lower ID-Based Service Discovery -- Cache Management -- Results and Analysis of Simulation -- Environment of Simulation -- Results of Simulation -- Conclusion -- References -- A Formal Approach to Robustness Testing of Network Protocol -- Introduction -- Related Works -- Formal Model and Testing Framework -- Model Definition -- Robustness Requirement and Normal-Verification Sequence -- Test Case Generation -- Invalid Inputs Generation -- Robustness Test Case Generation -- TTCN-3 Extensions and Test System -- Case Study: OSPFv2 -- Conclusions and Future Work -- References -- Deadline Probing: Towards Timely Cognitive Wireless Network -- Introduction -- Related Work -- Problem Formation -- Deadline Probing Model -- Channel Quality Probing and Scheduling -- Deadline Probing Algorithm -- Threshold Based Filtering -- Relative Direction and Velocity Awareness -- Channel Assignment with Job Complete Deadline -- Model Description -- General Results -- Reward on Transmitting Packets -- Sub-optimal Criteria -- Simulation Results and Numerical Analysis -- Conclusions -- References
  • SRDFA: A Kind of Session Reconstruction DFA -- Introduction -- Related Work -- SRDFA -- Webpages without Frame -- Webpages with Frame -- Path Supplement Based on Multi Window -- Session Reconstruction DFA -- Experimental Results -- Conclusion -- The References Section -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Introduction -- Rationale of the Proposed Scheme -- Stack Distance Model for Temporal Locality -- Profiling the Access Behavior -- Detection Scheme -- Experiments and Numerical Results -- Statistical Analysis for Observed Data -- Detection Based on HsMM -- Conclusion -- References -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Introduction -- Proportional Delay Differentiation in Database Connection Pools -- ConnectionManagement in DBCP -- PDD in DBCP -- Design of a Feedback Controller -- System Identification -- Controller Design -- The Closed-Loop System -- System Implementation and Extension -- Experiments -- Test-Bed andWorkloads -- Experimental Setup and Results -- Related Work -- Conclusion -- References -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Introduction -- IP Flow Based Feature Selection -- The Concepts of Micro-Flow and Macro Flow -- IP Flow Based Features -- Neural Network Classifier -- Detecting Experiments -- Conclusion -- References -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Introduction -- Security Model for Password-Based Key Exchange -- Protocol Syntax -- The Security Model -- Security Notions -- Algorithmic Assumptions -- CDH Assumption -- Security of Message Authentication Scheme -- Our Password-Based Protocol -- Description -- Security -- Conclusion -- References
  • The Overlap of Communication and Computation -- Inter-procedural Data-Flow Analysis for Message-Passing Programs -- Constructing the Minimal Region from the Producer to Consumer -- Transformation Algorithm -- Experimental Results -- Related Work -- Conclusions -- References -- Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid -- Introduction -- Architecture of MCG -- CCMS Structure -- Descriptions of CCMS Process -- CCMS Start-Up -- Operation for CCMS -- CCMS Communication Process -- Computation for Density Factor -- Analysis and Experiments -- Analysis for CCMS -- Experiments -- Analysis and Experiments -- References -- CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem -- Introduction -- Related Work -- Replication System Model and QoS-Aware Replica Placement Problem Definition -- Three-Phase Placement Algorithm -- Pharos-Based Clustering Algorithm -- Pharos Determination Policy -- Local Replica Placing Process -- Partition Integrating Mechanism -- Theoretical Analysis -- Experiments and Evaluation -- The Choice of Parameter \mathcal{N} -- Time Complexity and Space -- The Effect of Replica Placement -- Conclusion -- References -- Online Balancing Two Independent Criteria -- Introduction -- Related Works -- Our Contribution -- Definitions and Models -- The First Result -- The Feasible Region for Values of t_l and t_s -- Remarks on Algorithm FIRST -- The Second Result -- References -- Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds -- Introduction -- System Model -- Task Model -- Power Consumption and Execution Models -- Critical Speed -- Problem definition -- Proposed Algorithms -- An On-Line Procrastination Algorithm to Minimize the Energy Leakage: LA-FPPT -- Case Studies and Simulations -- Conclusions -- References -- Survey on Parallel Programming Model
  • Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting -- Introduction -- Security Model for Three-Party Key Exchange -- The Security Model -- Security Notions -- Algorithmic Assumptions -- GDH-Assumption -- PCGDH-Assumption -- Rmarks on Raymond Choo's protocol -- Our Three-Party Password-Based Protocol -- Description -- Security -- Conclusion -- References -- Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks -- Introduction -- Related Work -- Preliminaries -- Certificateless Public Key Cryptography -- Threshold Secret Sharing -- Proposed Security Solution -- Assumptions -- Proposed Security Scheme -- Conclusions -- References -- A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay -- Introduction -- System Overview -- Multi-channel Overlay -- Network Scale Distribution -- Data Storage Status Maintenance -- Multi-channel overlay -- Optimization strategy -- Performance Measurement and Analysis -- Simulation Environment -- Network Scale Difference -- System Performance -- Related Work -- Conclusions -- References -- HTL: A Locality Bounded Flat Hash Location Service -- Introduction -- Related Works -- Locality Problem in Flat Hash Based Location Services -- HTL: A Hash Table Localized -- Map to Physical Space -- Divide the Physical Space -- Location Servers Selection and Location Information Update -- Perform Query -- AnalysisonHTL -- Experiments -- Experiment Method and Metrics -- Results on Static Network -- Results on Mobile Network -- Results on Scalability -- Conclusion -- References -- Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques -- Introduction -- Related Work -- Mathematical Analysis and the Proposed Model -- Simulation Experiments -- Simple Scenarios -- Scenarios with Moderate Complexity -- Complex Scenarios
  • Introduction
  • Conclusions and Future Work -- References -- Online Accumulation: Reconstruction of Worm Propagation Path -- Introduction -- Related Work -- Problem Formulation -- Accumulation Algorithm -- Algorithm Specification -- Analysis and Prove -- Online Accumulation Algorithm -- Simulation Experiments -- EvaluationMethodology -- Simulation Methodology -- Preferences of Accumulation Algorithm -- Preferences of Online Accumulation Algorithm -- Effect of Containment -- Conclusions -- References -- HRS: A Hybrid Replication Strategy for Exhaustive P2P Search -- Introduction -- Related Work -- Query Popularity Aware Replication -- Query Popularity Independent Replication -- System Model and Problem Statement -- HRS Replication -- HRS Strategy -- Implementation of HRS -- Performance Evaluation -- Simulation Methodology -- Results -- Conclusions -- References -- ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework -- Introduction -- Motivation -- Solution Overview -- Design -- Routing and Searching in the ResourceDog Framework -- Automatic Invocation -- Reputation and Recommendation -- Experiments -- Routing and Searching -- Resource Automatic Invocation -- Reputation and Recommendation Simulation -- Related Works -- Conclusions and Future Work -- References -- A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies -- Background and Motivation -- Introduction -- Problems and Motivation -- Related Work -- System Architecture -- Overview -- Cluster Control-Channel Management -- Cluster Control-Channel Packet Formats -- Cluster Connection Database Management -- Traffic Flow Forwarding Module -- Discussion -- Conclusion and Future Work -- References -- Automatic Transformation for Overlapping Communication and Computation -- Introduction -- Control-Flow Graph for Message-Passing Program
  • References -- SRDFA: A Kind of Session Reconstruction DFA -- Introduction -- Related Work -- SRDFA -- Webpages without Frame -- Webpages with Frame -- Path Supplement Based on Multi Window -- Session Reconstruction DFA -- Experimental Results -- Conclusion -- The References Section -- Measuring the Normality of Web Proxies' Behavior Based on Locality Principles -- Introduction -- Rationale of the Proposed Scheme -- Stack Distance Model for Temporal Locality -- Profiling the Access Behavior -- Detection Scheme -- Experiments and Numerical Results -- Statistical Analysis for Observed Data -- Detection Based on HsMM -- Conclusion -- References -- Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers -- Introduction -- Proportional Delay Differentiation in Database Connection Pools -- ConnectionManagement in DBCP -- PDD in DBCP -- Design of a Feedback Controller -- System Identification -- Controller Design -- The Closed-Loop System -- System Implementation and Extension -- Experiments -- Test-Bed andWorkloads -- Experimental Setup and Results -- Related Work -- Conclusion -- References -- Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow -- Introduction -- IP Flow Based Feature Selection -- The Concepts of Micro-Flow and Macro Flow -- IP Flow Based Features -- Neural Network Classifier -- Detecting Experiments -- Conclusion -- References -- Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting -- Introduction -- Security Model for Password-Based Key Exchange -- Protocol Syntax -- The Security Model -- Security Notions -- Algorithmic Assumptions -- CDH Assumption -- Security of Message Authentication Scheme -- Our Password-Based Protocol -- Description -- Security -- Conclusion -- References
  • Intro -- Title Page -- Preface -- Organization -- Table of Contents -- An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks -- Introduction -- Expanding Ring Search and Related Works -- Expanding Ring Search -- Related Works -- A Control Packet Minimized AODV Protocol -- Performance Evaluations -- The Experiments for the Node Mobility -- The Experiments for Node Velocity -- The Experiments for Node Density -- Concluding Remarks -- References -- Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks -- Introduction -- Existing Approaches for Service Discovery -- Proposed Service Discovery Architecture -- Single Mobile Device Architecture -- System Model -- Proposed Service Discovery Protocol -- Cooperative Neighbor Caching of Service Information -- The Lower ID-Based Service Discovery -- Cache Management -- Results and Analysis of Simulation -- Environment of Simulation -- Results of Simulation -- Conclusion -- References -- A Formal Approach to Robustness Testing of Network Protocol -- Introduction -- Related Works -- Formal Model and Testing Framework -- Model Definition -- Robustness Requirement and Normal-Verification Sequence -- Test Case Generation -- Invalid Inputs Generation -- Robustness Test Case Generation -- TTCN-3 Extensions and Test System -- Case Study: OSPFv2 -- Conclusions and Future Work -- References -- Deadline Probing: Towards Timely Cognitive Wireless Network -- Introduction -- Related Work -- Problem Formation -- Deadline Probing Model -- Channel Quality Probing and Scheduling -- Deadline Probing Algorithm -- Threshold Based Filtering -- Relative Direction and Velocity Awareness -- Channel Assignment with Job Complete Deadline -- Model Description -- General Results -- Reward on Transmitting Packets -- Sub-optimal Criteria -- Simulation Results and Numerical Analysis -- Conclusions