Abstract is missing.
- P-Cache: Providing Prioritized Caching Service for Storage SystemXiaoxuan Meng, Chengxiang Si, Wenwu Na, Lu Xu. 3-10 [doi]
- An Efficient Task Allocation Protocol for P2P Multi-agent SystemsDayong Ye, Quan Bai, Minjie Zhang, Khin Than Win, Zhiqi Shen. 11-18 [doi]
- Scheduling Jobs in Grids AdaptivelyRuay Shiung Chang, Chih-Yuan Lin, Chun-fu Lin. 19-25 [doi]
- MM-DSM: Multi-threaded Multi-home Distributed Shared Memory SystemsChonglei Mei, Hai Jiang, Jeff Jenness. 26-33 [doi]
- Bandwidth Sensitive Co-allocation Scheme for Parallel Downloading in Data GridChing-Hsien Hsu, Chia-Wei Chu, Chih-Hsun Chou. 34-39 [doi]
- An Adaptive Resource Monitoring Method for Distributed Heterogeneous Computing EnvironmentGang Yang, Kaibo Wang, Xingshe Zhou. 40-44 [doi]
- DLBS: Duplex Loading Balancing Strategy on Object Storage SystemZhipeng Tan, Dan Feng, Xudong Tu, Fei He. 45-52 [doi]
- A Replacement Algorithm Designed for the Web Search Engine and Its Application in Storage CacheXiaoxuan Meng, Chengxiang Si, Xiaoming Han, Jiangang Zhang, Lu Xu. 53-59 [doi]
- A Hardware-Software Cooperative Approach for the Exhaustive Verification of the Collatz ConjectureYasuaki Ito, Koji Nakano. 63-70 [doi]
- Analysing Internet Information Propagation Using Quality of Service Methodology Based on Algebra of SystemTianju Wang, Qu Qu, Benjamin Koo. 71-78 [doi]
- A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based ServiceJung-Ho Um, Mi-Young Jang, Kyoung-Jin Jo, Jae-Woo Chang. 79-85 [doi]
- Centralized Botnet Detection by Traffic AggregationTao Wang, Shun-Zheng Yu. 86-93 [doi]
- Managing Large-Scale Scientific Computing in Ensemble Prediction Using BPELCancan Liu, Weimin Zhang, Zhigang Luo, Xiaoqun Cao, Hai Liu. 94-101 [doi]
- Software Viterbi Decoder with SSE4 Parallel Processing Instructions for Software DVB-T ReceiverShu-Ming Tseng, Yu-Chin Kuo, Yen-Chih Ku, Yueh-Teng Hsu. 102-105 [doi]
- Distributed Execution of Workflow Using Parallel PartitioningMaryam Khademi Hedayat, Wentong Cai, Stephen John Turner, Shayan Shahand. 106-112 [doi]
- An Efficient Algorithm for Multimedia Delivery in Pervasive SpaceSheng Zhang, Zhuzhong Qian, Minyi Guo, Sanglu Lu. 113-118 [doi]
- CISP-Growth: A Contiguous Item Sequential Pattern Mining Algorithm with Application Level IO PatternsJingliang Zhang, Junwei Zhang, Jian-Gang Zhang, Xiaoming Han, Lu Xu. 119-126 [doi]
- Solo: A Lightweight Virtual MachineXiang Zhang, Jie Ma, Yanchao Miao, Qingwei Meng, Dan Meng. 129-136 [doi]
- Virtual Machine Resource Management for High Performance Computing ApplicationsZhiyuan Shao, Hai Jin, Yong Li. 137-144 [doi]
- An Active Trusted Model for Virtual Machine SystemsWentao Qu, Minglu Li, Chuliang Weng. 145-152 [doi]
- Secure Logging for Auditable File System Using Separate Virtual MachinesSiqin Zhao, Kang Chen, Weimin Zheng. 153-160 [doi]
- REMOCA: Hypervisor Remote Disk CacheHaogang Chen, Xiaolin Wang, Zhenlin Wang, Xiang Wen, Xinxin Jin, Yingwei Luo, Xiaoming Li. 161-169 [doi]
- Load Balancing in Server ConsolidationDeshi Ye, Hua Chen, Qinming He. 170-174 [doi]
- A Synchronization-Based Alternative to Directory ProtocolHe Huang, Lei Liu, Nan Yuan, Wei Lin 0004, Fenglong Song, Junchao Zhang, Dongrui Fan. 175-181 [doi]
- Characterizing Betweenness Centrality Algorithm on Multi-core ArchitecturesDengbiao Tu, Guangming Tan. 182-189 [doi]
- Balancing Parallel Applications on Multi-core Processors Based on Cache PartitioningGuang Suo, Xuejun Yang. 190-195 [doi]
- I-Cache Tag Reduction for Low Power Chip MultiprocessorLong Zheng, Mianxiong Dong, Song Guo, Minyi Guo, Li Li 0012. 196-202 [doi]
- Performance Analysis of ClearSpeed's CSX600 InterconnectsYuri Nishikawa, Michihiro Koibuchi, Masato Yoshimi, Akihiro Shitara, Kenichi Miura, Hideharu Amano. 203-210 [doi]
- Survivable Virtual Topology Reconfiguration Problem on WDM Networks with Reconfiguration ConstraintDer-Rong Din, Yu-Sheng Chiu. 211-218 [doi]
- Program Optimization of Stencil Based Application on the GPU-Accelerated SystemGuibin Wang, Xuejun Yang, Ying Zhang, Tao Tang, Xudong Fang. 219-225 [doi]
- Accelerating Partitional Algorithms for Flow Cytometry on GPUsJeremy Espenshade, Andrew Pangborn, Gregor von Laszewski, Douglas Roberts, James S. Cavenaugh. 226-233 [doi]
- An Empirically Optimized Radix Sort for GPUBonan Huang, Jinlan Gao, Xiaoming Li. 234-241 [doi]
- ARRAY: A Non-application-Related, Secure, Wide-Area Disaster Recovery Storage SystemLingfang Zeng, Dan Feng, Bharadwaj Veeravalli, Qingsong Wei. 245-252 [doi]
- One New Research about IPSec Communication Based on HTTP TunnelMei Song, Zhang Yun-he. 253-257 [doi]
- Semantic Security Policy for Web ServiceZhengqiu He, Lifa Wu, Zheng Hong, Haiguang Lai. 258-262 [doi]
- Supporting Reconfigurable Fault Tolerance on Application ServersJunguo Li, Gang Huang 0001, Xingrun Chen, Franck Chauvel, Hong Mei. 263-271 [doi]
- Security System for Overlapping Non-dedicated ClustersMartin Stáva, Pavel Tvrdík. 272-281 [doi]
- Performance, Fault-Tolerance and Scalability Analysis of Virtual Infrastructure Management SystemXiangzhen Kong, Jiwei Huang, Chuang Lin, Peter D. Ungsunan. 282-289 [doi]
- A Two-Phase Log-Based Fault Recovery Mechanism in Master/Worker Based Computing EnvironmentTing Chen, Yongjian Wang, Yuanqiang Huang, Cheng Luo, Depei Qian, Zhongzhi Luan. 290-297 [doi]
- Fault-Tolerant Routing Schemes for Wormhole MeshXinming Duan, Dakun Zhang, Xuemei Sun. 298-301 [doi]
- Semantically Reliable Multicast Based on the (m-k)-Firm TechniqueWilian Queiroz, Lau Cheuk Lung, Luciana de Oliveira Rech, Luiz A. de Paula Lima Jr.. 302-308 [doi]
- An Alliance Based Reputation Model for Internet Autonomous System Trust EvaluationNing Hu, Peidong Zhu, Peng Zou. 309-314 [doi]
- Optimize Multiple Mobile Elements Touring in Wireless Sensor NetworksLiang He, Jingdong Xu, Yuntao Yu. 317-323 [doi]
- Random Scheduling for Wireless Sensor NetworksJie Jiang, Li Fang, Jun Wen, Guofu Wu, Heying Zhang. 324-332 [doi]
- Consistent Message Ordering in Wireless Sensor and Actor NetworksYang Wang 0015, Liusheng Huang, Hongli Xu, Gang Wang. 333-339 [doi]
- Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor NetworksWei Ren, Yi Ren, Hui Zhang. 340-347 [doi]
- Transport and Routing Redundancy for MANETs RobustnessAmadou Baba Bagayoko, Béatrice Paillassa, Cláudia Betous-Almeida. 348-353 [doi]
- VoIP Performance in Multi-radio Mobile DevicesAbiodun Iwayemi, Chi Zhou. 354-360 [doi]
- A Low Latency Handoff Scheme Based on the Location and Movement PatternFei Shi, Keqiu Li, Yanming Shen. 361-365 [doi]
- A Case-Based Component Selection Framework for Mobile Context-Aware ApplicationsFan Dong, Li Zhang, Dexter H. Hu, Cho-Li Wang. 366-373 [doi]
- DDSA: A Sampling and Validation Based Spectrum Access Algorithm in Wireless NetworksPanlong Yang, Hai Wang, Guihai Chen. 374-381 [doi]
- Design and Implementation of a RFID Based Real-Time Location-Aware System in Clean RoomKun-Ming Yu, Ming-Gong Lee, Chien-Tung Liao, Hung-Jui Lin. 382-388 [doi]
- Web Service Locating Unit in RFID-Centric Anti-counterfeit SystemZhiyuan Tan, Xiangjian He, Priyadarsi Nanda. 389-393 [doi]
- A Forwarding Migration Algorithm for Multipath TransmissionLaiquan Han, Jinkuan Wang, Jianhua Tang, Peijun He. 397-400 [doi]
- Utility Proportional Optimization Flow Control for Overlay MulticastAli Jafari, Hosein Shafiei, Baharan Mirzasoleiman, Ghodrat Sepidnam. 401-407 [doi]
- A Designated Path Scheme for Energy-Efficient Data Aggregation in Wireless Sensor NetworksYong-Ki Kim, Rabindra Bista, Jae-Woo Chang. 408-415 [doi]
- Tool Support for Security-Oriented Virtual Research CollaborationsJohn P. Watt, Richard O. Sinnott, Jipu Jiang, Tom Doherty, Chris Higgins, Michael Koutroumpas. 419-424 [doi]
- Towards a Trustable Virtual OrganisationJun Ho Huh, Andrew Martin. 425-431 [doi]
- USGPA: A User-Centric and Secure Grid Portal Architecture for High-Performance ComputingRongqiang Cao, Xuebin Chi, Zongyan Cao, Zhihui Dai, Haili Xiao. 432-438 [doi]
- Enhancing Privacy and Security in RFID-Enabled BanknotesChing-Nung Yang, Jie-Ru Chen, Chih-Yang Chiu, Gen-Chin Wu, Chih-Cheng Wu. 439-444 [doi]
- Active Attacks on Reputable Mix NetworksLonghai Li, Shaofeng Fu, XiangQuan Che. 447-450 [doi]
- Reverse Analysis and Vulnerability Detection for Network System SoftwareWei Pan, Weihua Li. 451-456 [doi]
- ZDCF: An Improved DCF Solution of IEEE 802.11Jianli Zhang, Zhiyi Fang, YunLong Zhang, Yunlong Ma. 457-462 [doi]
- Fuzzy Decision Tree Based Inference Technology for Spam Behavior RecognitionMeizhen Wang, Zhitang Li, Sheng Zhong. 463-468 [doi]
- Dynamic Forensics Based on Intrusion ToleranceLin Chen, Zhitang Li, Cuixia Gao, Lan Liu. 469-473 [doi]
- An Identity-Based Restricted Deniable Authentication ProtocolChengyu Fan, Shijie Zhou, Fagen Li. 474-478 [doi]
- Grey Theory Based Nodes Risk Assessment in P2P NetworksCai Fu, Fugui Tang, Yongquan Cui, Ming Liu, Bing Peng. 479-483 [doi]
- A Method of In-Depth-Defense for Network Security Based on Immunity PrinciplesYaping Jiang, Jianhua Zhou, Yong Gan, Zengyu Cai. 484-487 [doi]
- A Case Study: File Access Privacy Control Using Filter Hook DriverAiguo He, Tomohiro Ohdaira. 488-493 [doi]
- Extended PEG Algorithm for High Rate LDPC CodesZhiheng Zhou, Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li. 494-498 [doi]
- A Business-Oriented Fault Localization Approach Using DigraphLianzhong Liu, Chunfang Li, Yanping Zhang. 499-504 [doi]
- Development of ISEE: An Information Security Engineering EnvironmentJingde Cheng, Yuichi Goto, Daisuke Horie, Junichi Miura, Toshio Kasahara, Ahmad Iqbal. 505-510 [doi]
- Distributed Transfer Network Learning Based Intrusion DetectionShuiping Gou, Yuqin Wang, Licheng Jiao, Jing Feng, Yao Yao. 511-515 [doi]
- A Simple Cache Partitioning Approach in a Virtualized EnvironmentXinxin Jin, Haogang Chen, Xiaolin Wang, Zhenlin Wang, Xiang Wen, Yingwei Luo, Xiaoming Li. 519-524 [doi]
- Using Pcache to Speedup Interpretation in Dynamic Binary TranslationWei Chen 0009, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao. 525-530 [doi]
- Block-Based In-Place Replacement Strategy for x86 Sensitive Instructions in Virtual MachineYusong Tan, Weihua Zhang, Qingbo Wu. 531-536 [doi]
- Luvalley-Lite: An Effort to Balance Re-use and Re-codingXiao-Jian Liu, Xiaodong Yi, Yi Ren. 537-542 [doi]
- A Virtualized Self-Adaptive Parallel Programming Framework for Heterogeneous High Productivity ComputersHua Cheng, Zuoning Chen, Ninghui Sun, Fenbin Qi, Chaoqun Dong, Laiwang Cheng. 543-548 [doi]
- System Monitoring and Controlling Mechanism Based on HypervisorQingbo Wu, Chunguang Wang, Yusong Tan. 549-554 [doi]
- A Parallel Gibbs Sampling Algorithm for Motif Finding on GPULinbin Yu, Yun Xu. 555-558 [doi]
- Data Management: The Spirit to Pursuit Peak Performance on Many-Core ProcessorYongbin Zhou, Junchao Zhang, Shuai Zhang, Nan Yuan, Dongrui Fan. 559-564 [doi]
- Using GPU to Accelerate Cache SimulationHan Wan, Xiaopeng Gao, Zhiqiang Wang, Yi Li. 565-570 [doi]
- Evaluation Method of Synchronization for Shared-Memory On-Chip Many-Core ProcessorFenglong Song, Zhiyong Liu, Dongrui Fan, He Huang, Nan Yuan, Lei Yu, Junchao Zhang. 571-576 [doi]
- Workflow Based Approach for Eliminating Redundancy in Virtual EnterprisingReggie Davidrajuh. 579-583 [doi]
- A Web Based Workflow System for Distributed Atmospheric Data ProcessingJie Cheng, Xiaoguang Lin, Yuanchun Zhou, Jianhui Li. 584-588 [doi]
- A Quality Optimization Method for Service Process ModelHaiyan Zhao, Jian Cao, Xiaohan Sun. 589-594 [doi]
- A Global QoS-Driven Evaluation Strategy for Web Services CompositionXuyun Zhang, Wanchun Dow. 595-600 [doi]
- Workflow Model Performance Analysis Concerning Instance Dwelling Times DistributionSheng Liu, Yushun Fan. 601-605 [doi]
- An Adaptive Scheduler for Enhancing the Efficiency of Multi-engine BPM SystemsJunyi Sun, Houfu Li, Yanbo Han. 606-610 [doi]
- Completion Time Estimation for Instances of Generalized Well-Formed WorkflowZuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Hai-yan Yang. 611-616 [doi]
- Research on Services Selection Based on Credible Alliance in Web Services CombinationChunhua Hu, Xiaohong Chen, Jianxun Liu, Jibo Liu. 617-622 [doi]
- Generation of Web Knowledge Flow for Personalized ServicesJie Yu, Xiangfeng Luo, Feiyue Ye, Yongmei Lei. 623-628 [doi]
- A Multiple QoS Constrained Scheduling Strategy of Multiple Workflows for Cloud ComputingMeng Xu, Li-zhen Cui, Haiyang Wang, Yanbing Bi. 629-634 [doi]
- Change Sequence Mining in Context-Aware Scientific WorkflowYi Wang 0001, Jian Cao, Minglu Li. 635-640 [doi]
- A Time Exception Handling Algorithm of Temporal WorkflowTing Xie, Yang Yu, Guoshen Kuang. 641-646 [doi]
- Implementation of a Visual Modeling Tool for Defining Instance Aspect in WorkflowJianxun Liu, Zefeng Zhu, Yiping Wen, Jinjun Chen. 647-652 [doi]
- A Domain Specific Language and Workflow Execution Engine to Enable Dynamic WorkflowsGerhard Stürmer, Jürgen Mangler, Erich Schikuta. 653-658 [doi]
- Composition and Reduction of Web Service Based on Dynamic Timed Colored Petri NetsYaojun Han, Xuemei Luo. 659-663 [doi]
- Adaptive Processor Allocation with Estimated Job Execution Time in Heterogeneous Computing GridKuo-Chan Huang, Kuan-Po Lai, Hsi-Ya Chang. 664-669 [doi]
- Optimizing Message Passing Programs Based on Task Section DuplicationYin Ye, Zhihui Du, Song Hao. 673-678 [doi]
- A Task-Pool Parallel I/O Paradigm for an I/O Intensive ApplicationJianjiang Li, Lin Yan, Zhe Gao, Dan Hei. 679-684 [doi]
- Extended Combination Testing: Generates Array Test SuiteXiaodong Xie, Yansheng Lu. 685-690 [doi]
- SimSync: A Table-Based Constraint Processing Language For Synchronization ControlKe Huang, Zhihong Li, Benjamin Koo, Tianju Wang. 691-695 [doi]
- The Conditional Diagnosability of Twisted Cubes under the Comparison ModelShuming Zhou. 696-701 [doi]
- Proving Total Correctness of Refinement Based on TableauXiaolei Gao, Huaikou Miao. 702-707 [doi]
- Semi-automatic Transformation of Sequential Code to Distributed Code Using Model Driven Architecture ApproachSiamak Najjar Karimi, Saeed Parsa. 708-714 [doi]
- Multi-Source Traffic Data Fusion Method Based on Regulation and ReliabilityXinhong Wu, Hai Jin. 715-718 [doi]