researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2006
2008
Filter by Tag
[+]
OR
AND
NOT
1
Java
Meta-Environment
analysis
architecture
caching
context-aware
data-flow
design
meta-model
meta-objects
mobile
modeling
open-source
p2p
peer-to-peer
protocol
routing
rule-based
security
source-to-source
Filter by Author
[+]
OR
AND
NOT
1
Changsheng Xie
Chengde Han
Chunxiao Ye
Dan Feng
Haifeng Zhong
Hao Yin
Hong Jiang
Hu Wei
Jiang Zhong
Jianzhong Huang
Jie Chen
Jie Wu
Jizhong Han
Ke Zhou
Qiang Zou
Tianzhou Chen
Xueming Li
Yijun Lu
Yong Feng
Zhongfu Wu
Filter by Top terms
[+]
OR
AND
NOT
1
ad
algorithm
analysis
architecture
data
design
distributed
dynamic
embedded
hoc
mobile
model
network
networks
performance
protocol
routing
storage
system
systems
IWNAS (iwnas)
Editions
Publications
Viewing Publication 1 - 100 from 101
2008
Proceedings of The 2008 IEEE International Conference on Networking, Architecture, and Storage, NAS 2008, June 12-14, 2008, Chongqing, China
IEEE Computer Society,
2008.
Applications of Bloom Filters in Peer-to-peer Systems: Issues and Questions
Hailong Cai
,
Ping Ge
,
Jun Wang
.
iwnas 2008
:
97-103
[doi]
An Evaluation of Transport Protocols in Peer-to-Peer Media Streaming
Jeng-Yuh Chang
,
Xiao Su
.
iwnas 2008
:
241-247
[doi]
Component-based Network Protocol Architecture for Multi-core
Tianzhou Chen
,
Mingteng Cao
,
Qingsong Shi
.
iwnas 2008
:
189-190
[doi]
Event-based Trust Framework Model in Wireless Sensor Networks
Haiguang Chen
,
Huafeng Wu
,
Jinchu Hu
,
Chuanshan Gao
.
iwnas 2008
:
359-364
[doi]
Software Barrier Performance on Dual Quad-Core Opterons
Jie Chen
,
William A. Watson III
.
iwnas 2008
:
303-309
[doi]
Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks
Weifeng Chen
,
Huan Li
.
iwnas 2008
:
207-214
[doi]
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
Hao Chen
,
Yu Chen
.
iwnas 2008
:
365-372
[doi]
EBEM: An Event-driven Bandwidth Estimation Method for Mobile Ad Hoc Network
Heming Cui
,
Cong Lin
,
Yong Xiang
.
iwnas 2008
:
47-52
[doi]
Research on Trust Evaluation Model of Grid Services
Xiaohua Dong
,
Zhongfu Wu
.
iwnas 2008
:
373-380
[doi]
A Spam Filter System Based on P2P Architecture
Dafan Dong
,
Jianzhong Zhang
,
Ying Wu
,
Hongbo Lu
,
Gongyi Wu
.
iwnas 2008
:
155-156
[doi]
Parallel Job Scheduling with Overhead: A Benchmark Study
Richard A. Dutton
,
Weizhen Mao
,
Jie Chen
,
William A. Watson III
.
iwnas 2008
:
326-333
[doi]
A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6
Yong Feng
,
Zhongfu Wu
,
Jiang Zhong
,
Chunxiao Ye
,
Kaigui Wu
.
iwnas 2008
:
137-143
[doi]
An EPN-based Method for Web Service Composition
Min Gao
,
Lily Sun
,
Zhongfu Wu
,
Feng Jiang
.
iwnas 2008
:
163-164
[doi]
Fault Surviving Optimisation within Brick Based Storage System
Connor L. C. Gray
,
Michael Hobbs
.
iwnas 2008
:
36-43
[doi]
A Trace-Driven Simulation Study of Load Balancing on Distributed NIDS
Fengna Gu
,
Zhibin Zhang
,
Lihong Wang
.
iwnas 2008
:
159-160
[doi]
Efficient Event Matching in Publish/subscribe: Based on Routing Destination and Matching History
Xiangfeng Guo
,
Jun Wei
,
Dongli Han
.
iwnas 2008
:
129-136
[doi]
Formal Proof of the IDOP_SP Protocol Based on the Petri Net
Yingjiu Guo
,
Chuang Lin
,
Hao Yin
.
iwnas 2008
:
161-162
[doi]
Fibre Channel Arbitrated Loop - Performance Analysis of Loop Tenancy Overhead
Mikkel Hagen
,
Elizabeth Varki
.
iwnas 2008
:
225-232
[doi]
A Dynamic Congestion Control Based Multipath Routing Protocol for Video Transmission over Ad Hoc Networks
Yang He
,
Zhenyong Chen
,
Yuheng Liu
,
Zhang Xiong
.
iwnas 2008
:
62-69
[doi]
A K-hop Based Clustering Algorithm in Ad Hoc Networks
Ge He
,
Shangbo Zhou
,
Shan Liu
.
iwnas 2008
:
151-152
[doi]
Dynamic Route Diversion in Connectionless Mobile Ad Hoc Networks
Yao Hua Ho
,
Kien A. Hua
,
Ning Jiang
,
Fei Xie
.
iwnas 2008
:
53-61
[doi]
Secure Remote Storage through Authenticated Encryption
Fangyong Hou
,
Dawu Gu
,
Nong Xiao
,
Yuhua Tang
.
iwnas 2008
:
3-9
[doi]
Design of a Secure Network Mirroring System for Data Sharing
Jianzhong Huang
,
Changsheng Xie
,
Haifeng Zhong
.
iwnas 2008
:
175-176
[doi]
Design and Analysis of a Scalable Third-Party Storage Security Protocol
Jianzhong Huang
,
Changsheng Xie
,
Haifeng Zhong
.
iwnas 2008
:
20-27
[doi]
Enabling RDMA Capability of InfiniBand Network for Java Applications
Wan Huang
,
Jizhong Han
,
Jin He
,
Lisheng Zhang
,
Yao Lin
.
iwnas 2008
:
187-188
[doi]
Reliability Assurance of RAID Storage Systems for a Wide Range of Latent Sector Errors
Ilias Iliadis
,
Xiao-Yu Hu
.
iwnas 2008
:
10-19
[doi]
Towards More Reliable Source Routing in Wireless Networks
Imad Jawhar
,
Zouheir Trabelsi
,
Jameela Al-Jaroodi
.
iwnas 2008
:
167-168
[doi]
Formation and Network Chain Control in Sparse Robot ad hoc Networks based on Potential Field
Hong Jiang
,
Yu Qing Huang
,
Guo Ying Yang
.
iwnas 2008
:
147-148
[doi]
The Mobile Router Forwarding Scheme for Multicast in the NEMO
Long-Sheng Li
,
Yong-Yu Yang
,
Jhu-Syuan Mei
.
iwnas 2008
:
113-120
[doi]
Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel
Xu Li
,
Changsheng Xie
,
Qing Yang
.
iwnas 2008
:
28-35
[doi]
Design and Implement of Snapshots in Linux Block Level
Huaiyang Li
,
Changsheng Xie
,
Yan Liu
,
Qiang Cao
.
iwnas 2008
:
183-184
[doi]
A Cluster Maintenance Algorithm Based on LEACH-DCHS Protoclol
Yuhua Liu
,
Jingju Gao
,
Yongcan Jia
,
Longquan Zhu
.
iwnas 2008
:
165-166
[doi]
VDMS: A Vector Data Management System for GIS Applications
Xuhui Liu
,
Shubin Zhang
,
Jin He
,
Jizhong Han
,
Chengde Han
,
Zhiyong Xu
.
iwnas 2008
:
278-284
[doi]
Peer-assisted Content Delivery Network for Live Streaming: Architecture and Practice
Yu Liu
,
Hao Yin
,
Guangxi Zhu
,
Xuening Liu
.
iwnas 2008
:
149-150
[doi]
An Ontology-based Virtual Storage System
Zhaobin Liu
,
Haitao Li
.
iwnas 2008
:
185-186
[doi]
A Network Memory Architecture Model and Performance Analysis
Li Liu
,
Mingyu Chen
,
Yungang Bao
,
Jianwei Xu
,
Jianping Fan
.
iwnas 2008
:
177-178
[doi]
Adaptive Consistency Guarantees for Large-Scale Replicated Services
Yijun Lu
,
Ying Lu
,
Hong Jiang
.
iwnas 2008
:
89-96
[doi]
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework
Yijun Lu
,
Xueming Li
,
Hong Jiang
.
iwnas 2008
:
193-200
[doi]
Efficient and Locality-aware Resource Management in Wide-area Distributed Systems
Haiying Shen
,
Yingwu Zhu
,
Wing Ning Li
.
iwnas 2008
:
287-294
[doi]
A Dynamic Interface Activation Scheme for Vertical Handoffs
Qingyang Song
,
Xingwei Wang
,
Zhongfeng Wen
,
Yao Lv
,
Feifei Xu
.
iwnas 2008
:
157-158
[doi]
Joint Topology-Transparent Scheduling and QoS Routing in Mobile Ad Hoc Networks
Yi-Sheng Su
,
Szu-Lin Su
,
Jung-Shian Li
.
iwnas 2008
:
70-77
[doi]
A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter
Yong Sun
,
Zhibin Zhang
,
Li Guo
,
Shuo Bai
,
Jianlong Tan
.
iwnas 2008
:
104-109
[doi]
A Novel Adaptive Failure Detector for Distributed Systems
Dong Tian
,
Kaigui Wu
,
Xueming Li
.
iwnas 2008
:
215-221
[doi]
Performance Characterization of a Dual Quad-Core Based Application Oriented Networking System
Abdul Waheed
,
Jianxun Jason Ding
,
Jingnan Yao
,
Laxmi N. Bhuyan
.
iwnas 2008
:
295-302
[doi]
Goal-based Dependability Analysis and Improvement Framework for Network Storage Systems
Hua Wang
,
Ke Zhou
.
iwnas 2008
:
271-277
[doi]
An Analytical Performance Model of IP-SAN
Min Wang
,
Liu Liu
,
Wei Xu
,
Lu Xu
.
iwnas 2008
:
255-262
[doi]
A Novel Interoperable Model of Distributed UDDI
Libing Wu
,
Yanxiang He
,
Dan Wu
,
Jianqun Cui
.
iwnas 2008
:
153-154
[doi]
An Energy-Efficient Clustering Technique for Wireless Sensor Networks
Guan Xin
,
Wang YongXin
,
Liu Fang
.
iwnas 2008
:
248-252
[doi]
POND: The Power of Zone Overlapping in DHT Networks
Zhiyong Xu
,
Jizhong Han
,
Laxmi N. Bhuyan
.
iwnas 2008
:
81-88
[doi]
Rectangularly Multi-Module Memory System with Table-Based Dynamic Addressing Scheme
Jinbo Xu
,
Yong Dou
,
Jie Zhou
.
iwnas 2008
:
334-341
[doi]
Spatial-Locality-Aware Virtual Storage Devices with Tangible QoS Expressions
Pei Yan
,
Song Jiang
.
iwnas 2008
:
263-270
[doi]
MemoryIO: An Extended I/O Technology in Embedded Systems
Xiaojun Yang
,
Tao Liu
,
Fei Chen
,
Hailiang Cheng
.
iwnas 2008
:
319-325
[doi]
Revocation in an Attribute-Based Delegation Model
Chunxiao Ye
,
Zhongfu Wu
,
Jiang Zhong
,
Yong Feng
.
iwnas 2008
:
171-172
[doi]
Experimental Analysis of InfiniBand Transport Services on WAN
Weikuan Yu
,
Nageswara S. V. Rao
,
Jeffrey S. Vetter
.
iwnas 2008
:
233-240
[doi]
On the Security of Group Signature Scheme and Designated Verifier Signature Scheme
Jianhong Zhang
,
Qin Geng
.
iwnas 2008
:
351-358
[doi]
Hard Real-Time Communication over Multi-hop Switched Ethernet
Minghu Zhang
,
Jian Shi
,
Ting Zhang
,
Yong Hu
.
iwnas 2008
:
121-128
[doi]
A Precise Interrupts Mechanism Based on Micro-Operation Tracing of Instruction Boundary for Embedded Processor
Jun Zhang
,
Xiao-Ya Fan
,
Song-He Liu
.
iwnas 2008
:
181-182
[doi]
A Pollution Alleviative L2 Cache Replacement Policy for Chip Multiprocessor Architecture
Jun Zhang
,
Xiao-Ya Fan
,
Song-He Liu
.
iwnas 2008
:
310-316
[doi]
Storage Aware Resource Allocation for Grid Data Streaming Pipelines
Wen Zhang
,
Junwei Cao
,
Yisheng Zhong
,
Lianchen Liu
,
Cheng Wu
.
iwnas 2008
:
179-180
[doi]
Intrusion Detection Based on Density Level Sets Estimation
Jiang Zhong
,
Luosheng Wen
,
Yong Feng
,
Chunxiao Ye
.
iwnas 2008
:
173-174
[doi]
An e-Learning Services Discovery Algorithm Based on User Satisfaction
Zheng-Zhou Zhu
,
Zhongfu Wu
,
Shangbo Zhou
.
iwnas 2008
:
342-348
[doi]
Characterization of Behavior Anomalies in a Representative File System
Qiang Zou
,
Dan Feng
.
iwnas 2008
:
201-206
[doi]
2006
2006 International Workshop on Networking, Architecture and Storages (IWNAS 2006), 1-3 August 2006, Shenyang, China
IEEE Computer Society,
2006.
High Reliability and Flexibility Storage Cluster in Decentralized Organization
Bin Cai
,
Changsheng Xie
.
iwnas 2006
:
194-202
[doi]
Caching Personalized and Database-related Dynamic Web Pages
Yeim-Kuan Chang
,
Yu-Ren Lin
,
Yi-Wei Ting
.
iwnas 2006
:
149-156
[doi]
Smart File System: Embedded File System Based on NAND-Flash
Tianzhou Chen
,
Hu Wei
,
Wang Xiangsheng
.
iwnas 2006
:
65-66
[doi]
Microkernel of Embedded Operating System in SRAM
Tianzhou Chen
,
Hu Wei
,
Lian Yi
.
iwnas 2006
:
57-58
[doi]
Assigning Program To Cache-Aware Scratchpad Concerning The Influence Of The Whole Embedded System
Tianzhou Chen
,
Zhao Yi
,
Hu Wei
.
iwnas 2006
:
133-137
[doi]
A Real-Time Scheduling Algorithm for Embedded Systems With Various Resource Requirements
Tianzhou Chen
,
Hu Wei
,
Bin Xie
,
Like Yan
.
iwnas 2006
:
43-46
[doi]
An Analytical Model for Scheduling Policies in Storage Networks
Diqing Hu
,
Qiang Cao
,
Changsheng Xie
.
iwnas 2006
:
157-161
[doi]
Design and Analysis of a Third-Party Security Protocol for Storage System
Jian-zhong Huang
,
Chang-Sheng Xie
,
Guang-x Zhu
,
Zhou Gang
,
Wu Wei
.
iwnas 2006
:
177-182
[doi]
Mobility Control with Local Views of Neighborhood in Mobile Networks
Zhen Jiang
,
Jie Wu
,
Robert Kline
.
iwnas 2006
:
9-14
[doi]
A Two-Way Selective Encryption Algorithm for MPEG Video
Liu Jun
,
Zou LingLing
,
Xie Changsheng
,
Huang Hao
.
iwnas 2006
:
183-187
[doi]
Hint-based Routing in WSNs using Scope Decay Bloom Filters
Xiuqi Li
,
Jie Wu
,
Jun (Jim) Xu
.
iwnas 2006
:
111-118
[doi]
A Framework for Accessing General Object Storage
Qun Liu
,
Dan Feng
,
Qin Ling-jun
,
Zeng Ling-fang
.
iwnas 2006
:
145-148
[doi]
Automatic Selection of Redundancy Scheme in Cluster-based Storage Systems
Gang Liu
,
Jingli Zhou
,
Yu Wang
.
iwnas 2006
:
67-68
[doi]
An Analytical Study of FairOM: A Fair Overlay Multicast Protocol for Internet-Scale Distributed Systems
Yijun Lu
,
Xueming Li
.
iwnas 2006
:
51-52
[doi]
A Fast Read/Write Process to Reduce RDMA Communication Latency
Li Ou
,
Jizhong Han
.
iwnas 2006
:
138-144
[doi]
Supporting Time-Critical Clients in Scalable Pub-Sub Systems
Sibabrata Ray
,
Mark Lindermann
,
Danyang Zhang
.
iwnas 2006
:
125-132
[doi]
NVD: the Network Virtual Device for HA-SonD
Hai-Ying Tang
,
Feng Shuo
,
Zhang Huan
,
Yin Yang
,
Xu Lu
.
iwnas 2006
:
162-169
[doi]
A New Dynamic Multicast Routing Model and Its Immune Optimization Algorithm in Integrated Network
Jiang-qing Wang
,
Jun Qin
,
Lishan Kang
.
iwnas 2006
:
53-54
[doi]
A novel technique of recognizing multi-stage attack behaviour
Li Wang
,
Zhitang Li
,
Qi-hong Wang
.
iwnas 2006
:
188-193
[doi]
An Improved Direct Digital Frequency Synthesis System Design
Qingdong Wang
,
Changsheng Xie
,
Haiwei Wang
,
Chun Liu
.
iwnas 2006
:
170-176
[doi]
Hierarchical MESH Architecture: Toward Practical Applications
Xiaoxin Wu
.
iwnas 2006
:
69-72
[doi]
Queue Network Modeling Approach to Analysis of the Optimal Stripe Unit Size for Disk Arrays under Synchronous I/O Workloads
Ming Wu
,
Xiao-Ming Dong
,
Huai-yang Li
.
iwnas 2006
:
36-42
[doi]
A Loop Optimization Technique for Speculative Chip Multiprocessors
Chao-Chin Wu
,
Kuan-Chou Lai
.
iwnas 2006
:
55-56
[doi]
Research of Integrating Military Storage Resources Based on Storage Virtualization
Qichao Xia
,
Lianxing Jia
,
Qicong Shen
,
Dan Feng
.
iwnas 2006
:
59-60
[doi]
Design and Performance Evaluation of IPoIB Gateway
Zifeng Xiao
,
Hongwei Zhang
,
Yonghao Zhou
,
Jizhong Han
.
iwnas 2006
:
3-8
[doi]
TEA: Transmission Error Approximation for Distance Estimation between Two Zigbee Devices
Weijun Xiao
,
Yan Sun
,
Yinan Liu
,
Qing Yang
.
iwnas 2006
:
15-22
[doi]
Towards a More Accurate Availability Evaluation
Zhi Yang
,
Jing Tian
,
Yafei Dai
.
iwnas 2006
:
73-80
[doi]
Creation of a Java-based Interactive Modeling Environment with Tape Library Model Example
Lingfang Zeng
,
Dan Feng
,
Fang Wang
,
Zhuo Cheng
,
Qiang Zou
.
iwnas 2006
:
93-102
[doi]
Design and Implementation of Reconfigurable Gateway Array of Multiple Fabrics (RGAMF)
Qin Zhang
,
Peng Li
,
Jizhong Han
,
Chengde Han
.
iwnas 2006
:
81-86
[doi]
Call Routing Algorithm for NGN Multimedia Communication Based on Quasi-homo-administrative Domain
Yu Zhanwu
,
Li Rui
,
Pan Shaoming
.
iwnas 2006
:
119-124
[doi]
A Domain-Based Storage Management Framework for the WAN
Ke Zhou
,
Ze Deng
.
iwnas 2006
:
63-64
[doi]
Self-Similarity in Data Traffic for Object-Based Storage System
Ke Zhou
,
Qiang Zou
,
Dan Feng
,
Lingfang Zeng
.
iwnas 2006
:
23-28
[doi]
P2P Traffic Identification by TCP Flow Analysis
Lijuan Zhou
,
Zhitong Li
,
Bin Liu
.
iwnas 2006
:
47-50
[doi]
A Distributed Object Tracing System
Ke Zhou
,
Chun-hua Li
,
Dan Feng
,
Yang Wang
,
Liang Lu
,
Yong-guang Ji
.
iwnas 2006
:
29-35
[doi]
Resilient P2P Anonymous Routing by Using Redu
Yingwu Zhu
.
iwnas 2006
:
103-110
[doi]
Comparisons of Three Kalman Filter Tracking Algorithms in Sensor Network
Yifeng Zhu
,
Ali Shareef
.
iwnas 2006
:
61-62
[doi]
Sign in
or
sign up
to see more results.