Abstract is missing.
- Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P EnvironmentsDi Wu, Ye Tian, Kam-Wing Ng. 1-8 [doi]
- On Building and Updating Distributed LSI for P2P SystemsSanfeng Zhang, Guoxin Wu, Gang Chen, Libo Xu. 9-16 [doi]
- Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer NetworkYin Li, Fanyuan Ma, Liang Zhang. 17-26 [doi]
- Characterization of P2P File-Sharing SystemHanyu Liu, Yu Peng, Mao Yang, Yafei Dai. 27-34 [doi]
- Analysis of GHT in Mobile Ad Hoc NetworksLiu Fang, Rao Ruonan. 35-44 [doi]
- Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective ImmunizationXinli Huang, Fanyuan Ma, Yin Li. 45-53 [doi]
- A P2P Market Place Based on Aggregate SignaturesDario Catalano, Giancarlo Ruffo, Rossano Schifanella. 54-63 [doi]
- Proof of Service in a Hybrid P2P EnvironmentJun Li, Xun Kang. 64-73 [doi]
- Construct Optimal Diameter Network and d-partition Routing AlgorithmQiang Ding, Ke Xu, Hui-shan Liu. 74-81 [doi]
- Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation SystemGayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth. 82-90 [doi]
- VTarget: An Improved Software Target Emulator for SANsHongcan Zhang, Jiwu Shu, Wei Xue, Dingxing Wang. 91-100 [doi]
- Design and Implementation of an Efficient Multipath for a SAN EnvironmentJun Luo, Jiwu Shu, Wei Xue. 101-110 [doi]
- Research of Hot-Spot Selection Algorithm in Virtual Address SwitchTao Cai, Shiguang Ju, JuenJie Zhao, Dejiao Niu. 111-119 [doi]
- An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk ArraysYulin Wang, Guangjun Li, Xiaojun Wu, Shuisheng Lin. 120-129 [doi]
- An NFSv4-Based Security Scheme for NASXiangguo Li, Jianhua Yang, Zhaohui Wu. 130-139 [doi]
- Using Blocks Correlations to Improve the I/O Performance of Large Network Storage SystemChangsheng Xie, Zhen Zhao, Jian Liu, Wei Wu. 140-148 [doi]
- A Cluster LVM for SAN EnvironmentsBigang Li, Jiwu Shu, Fei Mu, Weimin Zheng. 149-158 [doi]
- COMPACT: A Comparative Package for Clustering AssessmentRoy Varshavsky, Michal Linial, David Horn. 159-167 [doi]
- Fast Sequence Similarity Computing with LCS on LARPBSXiao-hua Xu, Ling Chen, Ping He. 168-175 [doi]
- Fast Scalable Algorithm on LARPBS for Sequence AlignmentLing Chen, Juan Chen, Yi Pan. 176-185 [doi]
- Identification, Expansion, and Disambiguation of Acronyms in Biomedical TextsDavid B. Bracewell, Scott Russell, Annie S. Wu. 186-195 [doi]
- A Knowledge-Driven Method to Evaluate Multi-source ClusteringChengyong Yang, Erliang Zeng, Tao Li, Giri Narasimhan. 196-202 [doi]
- Understanding Protein Structure Prediction Using SVM_DTJieyue He, Hae-Jin Hu, Robert W. Harrison, Phang C. Tai, Yisheng Dong, Yi Pan. 203-212 [doi]
- Various Features with Integrated Strategies for Protein Name ClassificationBudi Ongkowijaya, Shilin Ding, Xiaoyan Zhu. 213-222 [doi]
- Uniform Authorization Management in ChinaGrid Support PlatformHai Jin, Chuanjiang Yi, Song Wu, Li Qi, Deqing Zou. 223-231 [doi]
- Introduction to ChinaGrid Support PlatformYongwei Wu, Song Wu, Huashan Yu, Chunming Hu. 232-240 [doi]
- A Microeconomics-Based Resource Assignment Model for Grid ComputingXingwei Wang, Nan Jiang, Jialin Wang, Min Huang. 241-248 [doi]
- The Campus Resource Management Based on Constellation Model in the ChinaGridXiaoshe Dong, Yinfeng Wang, Xiuqiang He, Hua Guo, Fang Zheng, Weiguo Wu. 249-256 [doi]
- Grid Computing Methodology for Protein Structure Prediction and AnalysisShoubin Dong, Pengfei Liu, Yicheng Cao, Zhengping Du. 257-266 [doi]
- Applying Service Composition in Digital Museum GridXiangxu Meng, Shijun Liu, Rui Wang, Chenglei Yang, Hai Guo. 267-275 [doi]
- Grid Supporting Platform for AMS Data ProcessingJunzhou Luo, Aibo Song, Ye Zhu, Xiaopeng Wang, Teng Ma, Zhiang Wu, Yaobin Xu, Liang Ge. 276-285 [doi]
- A CGSP-Based Grid Application for University Digital MuseumsXiaowu Chen, Xixi Luo, Zhangsheng Pan, Qinping Zhao. 286-296 [doi]
- FleMA: A Flexible Measurement Architecture for ChinaGridWeimin Zheng, Meizhi Hu, Lin Liu, Yongwei Wu, Jing Tie. 297-304 [doi]
- A Resource Scheduling Strategy for the CFD Application on the GridMinglu Li, Chuliang Weng, Xinda Lu, Yong Yin, Qianni Deng. 305-314 [doi]
- A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous SignersMingwen Wang, Qingxin Zhu, Li Qing. 315-322 [doi]
- A Novel ID-Based Partial Delegation with Warrant Proxy Signature SchemeHaifeng Qian, Zhenfu Cao. 323-331 [doi]
- An Efficient Proxy-Protected Signature Scheme Based on FactoringYuan Zhou, Zhenfu Cao, Zhenchuan Chai. 332-341 [doi]
- Security of an Efficient ID-Based Authenticated Key Agreement Protocol from PairingsShengbao Wang, Zhenfu Cao, Haiyong Bao. 342-349 [doi]
- Encryption Based on Reversible Second-Order Cellular AutomataZhenchuan Chai, Zhenfu Cao, Yuan Zhou. 350-358 [doi]
- ID-Based Proxy Signature Using Bilinear PairingsJing Xu, Zhenfeng Zhang, Dengguo Feng. 359-367 [doi]
- Efficient Fair Certified E-Mail Delivery Based on RSAZhenfeng Zhang, Dengguo Feng. 368-377 [doi]
- Intrusion Tolerant CA Scheme with Cheaters Detection AbilityLiwu Zhang, Dengguo Feng. 378-386 [doi]
- Improvement of Protocol Anomaly Detection Based on Markov Chain and Its ApplicationZheng Qin, Na Li, Da-Fang Zhang, Nai-Zheng Bian. 387-396 [doi]
- Research and Implementation of Workflow Interoperability Crossing OrganizationsDingsheng Wan, Qing Li, Guihai Chen. 397-402 [doi]
- LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor NetworksPeng Han, Haiguang Chen, Bo Yu, Dan Xu, Chuanshan Gao. 403-411 [doi]
- Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc NetworksPanlong Yang, Chang Tian. 412-421 [doi]
- Low-Latency Routing in Ad Hoc Wireless Networks Using Finite HorizonsAmer Filipovic, Amitava Datta, Chris McDonald. 422-433 [doi]
- Energy Usage in Biomimetic Models for Massively-Deployed Sensor NetworksKennie H. Jones, Kenneth N. Lodding, Stephan Olariu, Larry Wilson, Chunsheng Xin. 434-443 [doi]
- Probabilistic Behavior of Sensor Network LocalizationXunxue Cui, Zhan Zhao, Qing Tao. 444-453 [doi]
- Hybrid Authentication and Key Management Scheme for WSANsXiaomei Cao, Maolin Huang, YueQuan Chen, Guihai Chen. 454-465 [doi]
- Storage-Optimal Key Sharing with Authentication in Sensor NetworksJian Wang, ZhengYou Xia, Lein Harn, Guihai Chen. 466-474 [doi]
- An Asynchronous Replica Consistency Model in Data GridJiafu Hu, Nong Xiao, Yingjie Zhao, Wei Fu. 475-484 [doi]
- Distributed Access Control for Grid Environments Using Trust Management ApproachGang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen. 485-495 [doi]
- Research on Database Access and Integration in UDMGridZhangsheng Pan, Xiaowu Chen, Xiangyu Ji. 496-505 [doi]
- Resource Allocation Based on Pricing for Grid Computing EnvironmentsJiadi Yu, Minglu Li, Feng Hong. 506-513 [doi]
- CMSA: A Method for Construction and Maintenance of Semantic AnnotationsLixin Han, Guihai Chen, Linping Sun, Li Xie. 514-519 [doi]
- NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network SimulationsKun Wu, Dai Han, Yang Zhang, Sanglu Lu, Daoxu Chen, Li Xie. 520-529 [doi]
- Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and AnalysisYaojun Han, Changjun Jiang, Xuemei Luo. 530-539 [doi]
- The Design and Implementation of Service Adapter in ShanghaiGrid CoreHongbo Wan, Qianni Deng, Xinhua Lin, Xinda Lu, Minglu Li. 540-548 [doi]
- MCRM System: CIM-Based Multiple Clusters ManagerYutong Lu, Zhiyu Shen, Enqiang Zhou, Min Zhu. 549-558 [doi]
- Introduction to an Agent-Based Grid Workflow Management SystemLei Cao, Minglu Li, Jian Cao, Yi Wang. 559-568 [doi]
- An XML Query Mechanism with Ontology IntegrationHeping Chen, Jinguang Gu, Xiaohui Li, Hongping Fang. 569-578 [doi]
- Implementation of Cooperative Cognition Under Web EnvironmentWan-Chun Dou, Guihai Chen, Feng Su, Shijie Cai. 579-588 [doi]
- Access Authorization Policy for XML Document SecuritySun-Moon Jo, Ki Tae Kim, Hoon-Joon Kouh, Weon-Hee Yoo. 589-598 [doi]
- OWL2Jess: A Transformational Implementation of the OWL SemanticsJing Mei, Elena Paslaru Bontas, Zuoquan Lin. 599-608 [doi]
- Security Frameworks for Open LBS Based on Web Services Security MechanismKiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou. 609-618 [doi]
- Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial MethodLei Xu, Baowen Xu, Changhai Nie. 619-626 [doi]
- A ::::K::::-Anonymizing Approach for Preventing Link Attacks in Data PublishingXiaochun Yang, Xiangyu Liu, Bin Wang, Ge Yu. 627-636 [doi]
- Transformation-Driven Development of Composite Web ServicesYanping Yang, Qingping Tan, Yong Xiao. 637-646 [doi]
- Badness Information Audit Based on Image Character FilteringFei Yu, Huang Huang, Cheng Xu, Xiao-peng Dai, Miaoliang Zhu. 647-656 [doi]
- User s Rough Set Based Fuzzy Interest Model in Mining WWW CacheWeifeng Zhang, Baowen Xu, Guoqiang Zhou. 657-665 [doi]