Abstract is missing.
- Secure Grid Computing with Trusted Resources and Internet DataminingKai Hwang. 1 [doi]
- Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops ComputingThomas L. Sterling. 2 [doi]
- In-VIGO: Making the Grid Virtually YoursJosé A. B. Fortes. 3 [doi]
- Productivity in HPC ClustersBob Kuhn. 4 [doi]
- Whole-Stack Analysis and Optimization of Commercial Workloads on Server SystemsC. Richard Attanasio, Jong-Deok Choi, Niteesh Dubey, Kattamuri Ekanadham, Manish Gupta, Tatsushi Inagaki, Kazuaki Ishizaki, Joefon Jann, Robert D. Johnson, Toshio Nakatani, Il Park, Pratap Pattnaik, Mauricio J. Serrano, Stephen E. Smith, Ian M. Steiner, Yefim Shuf. 5-8 [doi]
- Fuzzy Trust Integration for Security Enforcement in Grid ComputingShanshan Song, Kai Hwang, Mikin Macwan. 9-21 [doi]
- Atomic Commitment in Grid Database SystemsSushant Goel, Hema Sharda, David Taniar. 22-29 [doi]
- A Data Grid Security System Based on Shared ContextNong Xiao, Xiaonian Wu, Wei Fu, Xiangli Qu. 30-37 [doi]
- A Study on Performance Monitoring Techniques for Traditional Parallel Systems and GridSarbani Roy, Nandini Mukherjee. 38-46 [doi]
- A Workflow-Based Grid Portal for Problem Solving EnvironmentYong-won Kwon, So-Hyun Ryu, Jin-Sung Park, Chang-Sung Jeong. 47-56 [doi]
- A Real-Time Transaction Approach for Grid Services: A Model and AlgorithmsFeilong Tang, Minglu Li, Joshua Zhexue Huang, Lei Cao, Yi Wang. 57-64 [doi]
- QoS Quorum-Constrained Resource Management in Wireless GridChan-Hyun Youn, Byungsang Kim, Dong Su Nam, Eung-Suk An, Bong-Hwan Lee, Eun Bo Shim, Gari Clifford. 65-72 [doi]
- A Data-Aware Resource Broker for Data GridsHuy Le, Paul D. Coddington, Andrew L. Wendelborn. 73-82 [doi]
- Managing Service-Oriented Grids: Experiences from VEGA System SoftwareYuzhong Sun, Haiyan Yu, JiPing Cai, Li Zha, Yili Gong. 83-91 [doi]
- An Efficient Parallel Loop Self-scheduling on Grid EnvironmentsChao-Tung Yang, Kuan-Wei Cheng, Kuan-Ching Li. 92-100 [doi]
- ALiCE: A Scalable Runtime Infrastructure for High Performance Grid ComputingYong Meng Teo, Xianbing Wang. 101-109 [doi]
- Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid SystemGanmei You, Huaming Liao, Yuzhong Sun. 110-117 [doi]
- A Heuristic Algorithm for the Job Shop Scheduling ProblemAi-Hua Yin. 118-128 [doi]
- Coordinating Distributed Resources for Complex Scientific ComputationHuashan Yu, Zhuoqun Xu, Wenkui Ding. 129-132 [doi]
- Efficiently Rationing Resources for Grid and P2P ComputingMing Chen, Yongwei Wu, Guangwen Yang, Xuezheng Liu. 133-136 [doi]
- Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay NetworkFei Liu, Fanyuan Ma, Shui Yu, Minglu Li. 137-140 [doi]
- Collaborative Process Execution for Service Composition with StarWebServiceBixin Liu, Yufeng Wang, Bin Zhou, Yan Jia. 141-145 [doi]
- Efficient Gnutella-like P2P Overlay ConstructionYunhao Liu, Li Xiao, Lionel M. Ni, Baijian Yang. 146-153 [doi]
- Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer OverlaysXuezheng Liu, Guangwen Yang, Jinfeng Hu, Ming Chen, Yongwei Wu. 154-166 [doi]
- Layer Allocation Algorithms in Layered Peer-to-Peer StreamingYajie Liu, Wenhua Dou, Zhifeng Liu. 167-174 [doi]
- Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer NetworkYin Li, Futai Zou, Fanyuan Ma, Minglu Li. 175-182 [doi]
- Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing SystemsHairong Jin, Shanping Li, Gang Peng, Tianchi Ma. 183-186 [doi]
- Cache Design for Transcoding Proxy CachingKeqiu Li, Hong Shen, Keishi Tajima. 187-194 [doi]
- Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication ServicesSu Myeon Kim, Jinwon Lee, SungJae Jo, Junehwa Song. 195-204 [doi]
- Domain-Based Proxy for Efficient Location Tracking of Mobile AgentsSanghoon Song, Taekyoung Kwon. 205-212 [doi]
- Inhambu: Data Mining Using Idle Cycles in Clusters of PCsHermes Senger, Eduardo R. Hruschka, FabrÃcio Alves Barbosa da Silva, Liria Matsumoto Sato, Calebe De Paula Bianchini, Marcelo D. Esperidiãao. 213-220 [doi]
- Request Distribution for Fairness with a New Load-Update Mechanism in Web Server ClusterMinHwan Ok, Myong-Soon Park. 221-229 [doi]
- Profile Oriented User Distributions in Enterprise Systems with ClusteringPing-Yu Hsu, Ping-Ho Ting. 230-237 [doi]
- CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video ServersDafu Deng, Hai Jin, Xiaofei Liao, Hao Chen. 238-243 [doi]
- SuperNBD: An Efficient Network Storage Software for ClusterRongfeng Tang, Dan Meng, Jin Xiong. 244-247 [doi]
- I/O Response Time in a Fault-Tolerant Parallel Virtual File SystemDan Feng, Hong Jiang, Yifeng Zhu. 248-251 [doi]
- SARCNFS: Self-Adaptive Redundancy Clustered NAS File SystemBin Cai, Changsheng Xie, Ren Jin, Faling Yi. 252-255 [doi]
- Research and Implementation of a Snapshot Facility Suitable for Soft-Failure RecoveryYong Feng, Yan-yuan Zhang, Rui-yong Jia. 256-260 [doi]
- GOOMPI: A Generic Object Oriented Message Passing InterfaceZhen Yao, Qilong Zheng, Guoliang Chen. 261-271 [doi]
- Simulating Complex Dynamical Systems in a Distributed Programming EnvironmentE. V. Krishnamurthy, Vikram Krishnamurthy. 272-279 [doi]
- Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux SystemsJung Hee Kim, Hyun-chul Sim, Yong-hyeog Kang, Young Ik Eom. 280-283 [doi]
- Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated TrafficGeyong Min, Mohamed Ould-Khaoua. 284-291 [doi]
- Leader Election in Hyper-Butterfly GraphsWei Shi, Pradip K. Srimani. 292-299 [doi]
- A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless NetworksZhi Li, Yu-Kwong Kwok. 300-307 [doi]
- Graph-Theoretic Analysis of Kautz Topology and DHT SchemesDongsheng Li, Xicheng Lu, Jinshu Su. 308-315 [doi]
- A Parameterized Model of TCP Slow StartXiaoheng Deng, Zhigang Chen, Lianming Zhang. 316-324 [doi]
- SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc NetworksQing Zhang, Huiqiong Chen, Weiwei Sun, Bole Shi. 325-332 [doi]
- A Dioid Linear Algebra Approach to Study a Class of Continuous Petri NetsDuan Zhang, Huaping Dai, Youxian Sun. 333-340 [doi]
- A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate NodesNils Agne Nordbotten, MarÃa Engracia Gómez, Jose Flich, Pedro López, Antonio Robles, Tor Skeie, Olav Lysne, José Duato. 341-356 [doi]
- Extended DBP for (m, k)-Firm Based QoSJiming Chen, Zhi Wang, Yeqiong Song, Youxian Sun. 357-365 [doi]
- Weighted Fair Scheduling Algorithm for QoS of Input-Queued SwitchesSang Ho Lee, Dong Ryeol Shin, Hee Yong Youn. 366-373 [doi]
- A Scalable Distributed Architecture for Multi-party Conferencing Using SIPYoung-Hoon Cho, Moon-Sang Jeong, Jong-Tae Park. 374-381 [doi]
- DC-mesh: A Contracted High-Dimensional Mesh for Dynamic ClusteringMasaru Takesue. 382-389 [doi]
- The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic PatternsHashem Hashemi Najaf-abadi, Hamid Sarbazi-Azad. 390-398 [doi]
- An Empirical Autocorrelation Form for Modeling LRD Traffic SeriesMing Li, Jingao Liu, Dongyang Long. 399-402 [doi]
- Statistical Error Analysis on Recording LRD Traffic Time SeriesMing Li. 403-406 [doi]
- Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network ArchitectureFurong Wang, Ye Wu. 407-410 [doi]
- Reversible Cellular Automata Based EncryptionMarcin Seredynski, Krzysztof Pienkosz, Pascal Bouvry. 411-418 [doi]
- Ontology Based Cooperative Intrusion Detection SystemYanxiang He, Wei Chen, Min Yang, Wenling Peng. 419-426 [doi]
- Adding Security to Network Via Network ProcessorsHao Yin, Zhangxi Tan, Chuang Lin, Guangxi Zhu. 427-434 [doi]
- A Method to Obtain Signatures from Honeypots DataChi-Hung Chi, Ming Li, Dongxi Liu. 435-442 [doi]
- A Framework for Adaptive Anomaly Detection Based on Support Vector Data DescriptionMin Yang, Huanguo Zhang, Jianming Fu, Fei Yan. 443-450 [doi]
- Design and Analysis of Improved GSM Authentication Protocol for Roaming UsersGeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song. 451-458 [doi]
- A Novel Intrusion Detection MethodShengyi Jiang, Qinghua Li, Hui Wang. 459-462 [doi]
- An Implementation of Storage-Based Synchronous Remote Mirroring for SANsJiwu Shu, Rui Yan, Dong-chan Wen, Weimin Zheng. 463-472 [doi]
- A Network Bandwidth Computation Technique for IP Storage with QoS GuaranteesYoung Jin Nam, Junkil Ryu, Chanik Park, Jong Suk Ahn. 473-480 [doi]
- Paramecium: Assembling Raw Nodes into Composite CellsMing Chen, Guangwen Yang, Yongwei Wu, Xuezheng Liu. 481-484 [doi]
- The Flexible Replication Method in an Object-Oriented Data Storage SystemYouhui Zhang, Jinfeng Hu, Weimin Zheng. 485-488 [doi]
- Enlarge Bandwidth of Multimedia Server with Network Attached Storage SystemDan Feng, Yuhui Deng, Ke Zhou, Fang Wang. 489-492 [doi]
- The NDMP-Plus Prototype Design and Implementation for Network Based Data ManagementKai Ouyang, Jingli Zhou, Tao Xia, Shengsheng Yu. 493-497 [doi]
- Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components GraphHaifang Zhou, Xuejun Yang, Yu Tang, Nong Xiao. 498-501 [doi]
- The Transmitted Strategy of Proxy Cache Based on Segmented VideoZhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang. 502-507 [doi]
- The Strategy of Batch Using Dynamic Cache for Streaming MediaZhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang. 508-512 [doi]
- New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network ApplicationsLi-bao Zhang, Ke Wang. 513-516 [doi]
- Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic ScreeningJonathan M. Cooper, Erik A. Johannessen, David R. S. Cumming. 517-521 [doi]
- The Development of Biosensors and Biochips in IECASXinxia Cai, Dafu Cui. 522-525 [doi]
- Open Issues on Intelligent Sensor NetworksYiqiang Chen, Wen Gao, Junfa Liu. 526-526 [doi]
- Enabling Anytime Anywhere Wireless Sensor NetworksJohn Crawford. 527-527 [doi]
- A Query-Aware Routing Algorithm in Sensor NetworksJinbao Li, Jianzhong Li, Shengfei Shi. 528-535 [doi]
- Sensor Network Optimization by a Novel Genetic AlgorithmHui Wang, Anna L. Buczak, Hong Jin, Hongan Wang, Baosen Li. 536-543 [doi]
- Online Mining in Sensor NetworksXiuli Ma, Dongqing Yang, Shiwei Tang, Qiong Luo, Dehui Zhang, Shuangfeng Li. 544-550 [doi]
- The HKUST Frog Pond - A Case Study of Sensory Data AnalysisWenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo. 551-558 [doi]
- BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive ScaleWen Gao, Lionel M. Ni, Zhiwei Xu. 559-564 [doi]
- A Pervasive Sensor Node ArchitectureLi Cui, Fei Wang, Haiyong Luo, Hailing Ju, Tianpu Li. 565-567 [doi]
- Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive ApplicationsChang Xu, Shing-Chi Cheung, Cindy Lo, K. C. Leung, Jun Wei. 568-575 [doi]
- Accurate Emulation of Wireless Sensor NetworksHejun Wu, Qiong Luo, Pei Zheng, Bingsheng He, Lionel M. Ni. 576-583 [doi]
- LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN EnvironmentQiang Yang, Yiqiang Chen, Jie Yin, Xiaoyong Chai. 584-591 [doi]
- Reliable Splitted Multipath Routing for Wireless Sensor NetworkJian Wu, Stefan Dulman, Paul J. M. Havinga. 592-600 [doi]
- Reliable Data Aggregation for Real-Time Queries in Wireless Sensor SystemsKam-yiu Lam, Henry Chi-Wai Pang, Sang Hyuk Son, BiYu Liang. 601-610 [doi]
- The Design of a DRM System Using PKI and a Licensing AgentKeun-Wang Lee, Jae-Pyo Park, Kwang-Hyoung Lee, Jong-Hee Lee, HeeSook Kim. 611-617 [doi]
- Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile NetworksGi-sung Lee, Hong-Jin Kim, Il-Sun Hwang. 618-625 [doi]
- Fuzzy Logic Adaptive Mobile Location EstimationJongchan Lee, Seung-Jae Yoo, Dong Chun Lee. 626-634 [doi]
- A Host Protection Framework Against Unauthorized Access for Ensuring Network SurvivabilityHyuncheol Kim, Sunghae Kim, Seong-Jin Ahn, Jin-Wook Chung. 635-643 [doi]
- A Design and Implementation of Network Traffic Monitoring System for PC-room ManagementYonghak Ahn, Oksam Chae. 644-652 [doi]
- A Vulnerability Assessment Tool Based on OVAL in Linux SystemYoungmi Kwon, Hui Jae Lee, Geuk Lee. 653-660 [doi]
- Performance Analysis of Delay Estimation Models for Signalized Intersection NetworksHyung Jin Kim, Bongsoo Son, Soobeom Lee. 661-669 [doi]
- Network Intrusion Protection System Using Rule-Based DB and RBAC PolicyMin Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee. 670-675 [doi]
- Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting NetworksSang Woon Lee, Kyoo Jin Han, Keum-Chan Whang. 676-683 [doi]
- Enhanced Algorithm of TCP Performance on Handover in Wireless Internet NetworksDong Chun Lee, Hong-Jin Kim, Jae-Young Koh. 684-690 [doi]