Warehouse Stock Clearance Sale

Grab a bargain today!


Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Network and Parallel ­Computing
IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004. Proceedings (Lecture Notes in Computer Science)
By Hai Jin (Volume editor), Guangrong Gao (Volume editor), Zhiwei Xu, Hao Chen (Volume editor)

Rating
Format
Paperback, 700 pages
Published
Germany, 1 October 2004

This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three reviewers.Each paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the conference.Wealso accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.


Secure Grid Computing with Trusted Resources and Internet Datamining.- Secure Grid Computing with Trusted Resources and Internet Datamining.- Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops Computing.- In-VIGO: Making the Grid Virtually Yours.- Productivity in HPC Clusters.- Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems.- Session 1: Grid Computing.- Fuzzy Trust Integration for Security Enforcement in Grid Computing.- Atomic Commitment in Grid Database Systems.- A Data Grid Security System Based on Shared Context.- A Study on Performance Monitoring Techniques for Traditional Parallel Systems and Grid.- A Workflow-Based Grid Portal for Problem Solving Environment.- A Real-Time Transaction Approach for Grid Services: A Model and Algorithms.- QoS Quorum-Constrained Resource Management in Wireless Grid.- A Data-Aware Resource Broker for Data Grids.- Managing Service-Oriented Grids: Experiences from VEGA System Software.- An Efficient Parallel Loop Self-scheduling on Grid Environments.- ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing.- Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System.- A Heuristic Algorithm for the Job Shop Scheduling Problem.- Coordinating Distributed Resources for Complex Scientific Computation.- Efficiently Rationing Resources for Grid and P2P Computing.- Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network.- Collaborative Process Execution for Service Composition with StarWebService.- Session 2: Peer-to-Peer Computing.- Efficient Gnutella-like P2P Overlay Construction.- Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer Overlays.- Layer Allocation Algorithms in Layered Peer-to-Peer Streaming.- Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network.- Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems.- Session 3: Web Techniques.- Cache Design for Transcoding Proxy Caching.- Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication Services.- Domain-Based Proxy for Efficient Location Tracking of Mobile Agents.- Session 4: Cluster Computing.- Inhambu: Data Mining Using Idle Cycles in Clusters of PCs.- Request Distribution for Fairness with a New Load-Update Mechanism in Web Server Cluster.- Profile Oriented User Distributions in Enterprise Systems with Clustering.- CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers.- SuperNBD: An Efficient Network Storage Software for Cluster.- I/O Response Time in a Fault-Tolerant Parallel Virtual File System.- SARCNFS: Self-Adaptive Redundancy Clustered NAS File System.- Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery.- Session 5: Parallel Programming and Environment.- GOOMPI: A Generic Object Oriented Message Passing Interface.- Simulating Complex Dynamical Systems in a Distributed Programming Environment.- Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems.- Session 6: Network Architecture.- Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated Traffic.- Leader Election in Hyper-Butterfly Graphs.- A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks.- Graph-Theoretic Analysis of Kautz Topology and DHT Schemes.- A Parameterized Model of TCP Slow Start.- SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc Networks.- A Dioid Linear Algebra Approach to Study a Class of Continuous Petri Nets.- A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate Nodes.- Extended DBP for (m,k)-Firm Based QoS.- Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches.- A Scalable Distributed Architecture for Multi-party Conferencing Using SIP.- DC-mesh: A Contracted High-Dimensional Mesh for Dynamic Clustering.- The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic Patterns.- An Empirical Autocorrelation Form for Modeling LRD Traffic Series.- Statistical Error Analysis on Recording LRD Traffic Time Series.- Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture.- Session 7: Network Security.- Reversible Cellular Automata Based Encryption.- Ontology Based Cooperative Intrusion Detection System.- Adding Security to Network Via Network Processors.- A Method to Obtain Signatures from Honeypots Data.- A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.- Design and Analysis of Improved GSM Authentication Protocol for Roaming Users.- A Novel Intrusion Detection Method.- Session 8: Network Storage.- An Implementation of Storage-Based Synchronous Remote Mirroring for SANs.- A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees.- Paramecium: Assembling Raw Nodes into Composite Cells.- The Flexible Replication Method in an Object-Oriented Data Storage System.- Enlarge Bandwidth of Multimedia Server with Network Attached Storage System.- The NDMP-Plus Prototype Design and Implementation for Network Based Data Management.- Session 9: Multimedia Service.- Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components Graph.- The Transmitted Strategy of Proxy Cache Based on Segmented Video.- The Strategy of Batch Using Dynamic Cache for Streaming Media.- New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications.- Workshop1: Building Intelligent Sensor Networks.- Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic Screening.- The Development of Biosensors and Biochips in IECAS.- Open Issues on Intelligent Sensor Networks.- Enabling Anytime Anywhere Wireless Sensor Networks.- A Query-Aware Routing Algorithm in Sensor Networks.- Sensors Network Optimization by a Novel Genetic Algorithm.- Online Mining in Sensor Networks.- The HKUST Frog Pond - A Case Study of Sensory Data Analysis.- BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive Scale.- A Pervasive Sensor Node Architecture.- Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications.- Accurate Emulation of Wireless Sensor Networks.- LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment.- Reliable Splitted Multipath Routing for Wireless Sensor Networks.- Reliable Data Aggregation for Real-Time Queries in Wireless Sensor Systems.- Workshop2: Multimedia Modeling and the Security in the Next Generation Network Information Systems.- The Design of a DRM System Using PKI and a Licensing Agent.- Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile Networks.- Fuzzy Logic Adaptive Mobile Location Estimation.- A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability.- A Design and Implementation of Network Traffic Monitoring System for PC-room Management.- A Vulnerability Assessment Tool Based on OVAL in Linux System.- Performance Analysis of Delay Estimation Models for Signalized Intersection Networks.- Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.- Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting Networks.- Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks.

Show more

Our Price
HK$1,000
Ships from UK Estimated delivery date: 22nd Apr - 29th Apr from UK
Free Shipping Worldwide

Buy Together
HK$1,800

Product Description

This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three reviewers.Each paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the conference.Wealso accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.


Secure Grid Computing with Trusted Resources and Internet Datamining.- Secure Grid Computing with Trusted Resources and Internet Datamining.- Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops Computing.- In-VIGO: Making the Grid Virtually Yours.- Productivity in HPC Clusters.- Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems.- Session 1: Grid Computing.- Fuzzy Trust Integration for Security Enforcement in Grid Computing.- Atomic Commitment in Grid Database Systems.- A Data Grid Security System Based on Shared Context.- A Study on Performance Monitoring Techniques for Traditional Parallel Systems and Grid.- A Workflow-Based Grid Portal for Problem Solving Environment.- A Real-Time Transaction Approach for Grid Services: A Model and Algorithms.- QoS Quorum-Constrained Resource Management in Wireless Grid.- A Data-Aware Resource Broker for Data Grids.- Managing Service-Oriented Grids: Experiences from VEGA System Software.- An Efficient Parallel Loop Self-scheduling on Grid Environments.- ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing.- Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System.- A Heuristic Algorithm for the Job Shop Scheduling Problem.- Coordinating Distributed Resources for Complex Scientific Computation.- Efficiently Rationing Resources for Grid and P2P Computing.- Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network.- Collaborative Process Execution for Service Composition with StarWebService.- Session 2: Peer-to-Peer Computing.- Efficient Gnutella-like P2P Overlay Construction.- Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer Overlays.- Layer Allocation Algorithms in Layered Peer-to-Peer Streaming.- Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network.- Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems.- Session 3: Web Techniques.- Cache Design for Transcoding Proxy Caching.- Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication Services.- Domain-Based Proxy for Efficient Location Tracking of Mobile Agents.- Session 4: Cluster Computing.- Inhambu: Data Mining Using Idle Cycles in Clusters of PCs.- Request Distribution for Fairness with a New Load-Update Mechanism in Web Server Cluster.- Profile Oriented User Distributions in Enterprise Systems with Clustering.- CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers.- SuperNBD: An Efficient Network Storage Software for Cluster.- I/O Response Time in a Fault-Tolerant Parallel Virtual File System.- SARCNFS: Self-Adaptive Redundancy Clustered NAS File System.- Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery.- Session 5: Parallel Programming and Environment.- GOOMPI: A Generic Object Oriented Message Passing Interface.- Simulating Complex Dynamical Systems in a Distributed Programming Environment.- Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems.- Session 6: Network Architecture.- Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated Traffic.- Leader Election in Hyper-Butterfly Graphs.- A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks.- Graph-Theoretic Analysis of Kautz Topology and DHT Schemes.- A Parameterized Model of TCP Slow Start.- SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc Networks.- A Dioid Linear Algebra Approach to Study a Class of Continuous Petri Nets.- A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate Nodes.- Extended DBP for (m,k)-Firm Based QoS.- Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches.- A Scalable Distributed Architecture for Multi-party Conferencing Using SIP.- DC-mesh: A Contracted High-Dimensional Mesh for Dynamic Clustering.- The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic Patterns.- An Empirical Autocorrelation Form for Modeling LRD Traffic Series.- Statistical Error Analysis on Recording LRD Traffic Time Series.- Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture.- Session 7: Network Security.- Reversible Cellular Automata Based Encryption.- Ontology Based Cooperative Intrusion Detection System.- Adding Security to Network Via Network Processors.- A Method to Obtain Signatures from Honeypots Data.- A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.- Design and Analysis of Improved GSM Authentication Protocol for Roaming Users.- A Novel Intrusion Detection Method.- Session 8: Network Storage.- An Implementation of Storage-Based Synchronous Remote Mirroring for SANs.- A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees.- Paramecium: Assembling Raw Nodes into Composite Cells.- The Flexible Replication Method in an Object-Oriented Data Storage System.- Enlarge Bandwidth of Multimedia Server with Network Attached Storage System.- The NDMP-Plus Prototype Design and Implementation for Network Based Data Management.- Session 9: Multimedia Service.- Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components Graph.- The Transmitted Strategy of Proxy Cache Based on Segmented Video.- The Strategy of Batch Using Dynamic Cache for Streaming Media.- New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications.- Workshop1: Building Intelligent Sensor Networks.- Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic Screening.- The Development of Biosensors and Biochips in IECAS.- Open Issues on Intelligent Sensor Networks.- Enabling Anytime Anywhere Wireless Sensor Networks.- A Query-Aware Routing Algorithm in Sensor Networks.- Sensors Network Optimization by a Novel Genetic Algorithm.- Online Mining in Sensor Networks.- The HKUST Frog Pond - A Case Study of Sensory Data Analysis.- BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive Scale.- A Pervasive Sensor Node Architecture.- Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications.- Accurate Emulation of Wireless Sensor Networks.- LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment.- Reliable Splitted Multipath Routing for Wireless Sensor Networks.- Reliable Data Aggregation for Real-Time Queries in Wireless Sensor Systems.- Workshop2: Multimedia Modeling and the Security in the Next Generation Network Information Systems.- The Design of a DRM System Using PKI and a Licensing Agent.- Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile Networks.- Fuzzy Logic Adaptive Mobile Location Estimation.- A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability.- A Design and Implementation of Network Traffic Monitoring System for PC-room Management.- A Vulnerability Assessment Tool Based on OVAL in Linux System.- Performance Analysis of Delay Estimation Models for Signalized Intersection Networks.- Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.- Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting Networks.- Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks.

Show more
Product Details
EAN
9783540233886
ISBN
3540233881
Publisher
Other Information
Illustrated
Dimensions
23.4 x 15.6 x 3.7 centimeters (1.00 kg)

Promotional Information

Springer Book Archives

Table of Contents

Secure Grid Computing with Trusted Resources and Internet Datamining.- Session 1: Grid Computing.- Session 2: Peer-to-Peer Computing.- Session 3: Web Techniques.- Session 4: Cluster Computing.- Session 5: Parallel Programming and Environment.- Session 6: Network Architecture.- Session 7: Network Security.- Session 8: Network Storage.- Session 9: Multimedia Service.- Workshop1: Building Intelligent Sensor Networks.- Workshop2: Multimedia Modeling and the Security in the Next Generation Network Information Systems.

Review this Product
Ask a Question About this Product More...
 
Item ships from and is sold by Fishpond World Ltd.

Back to top