IFIP TC6 Open Digital Library

NPC 2004: Wuhan, China

Network and Parallel Computing, IFIP International Conference, NPC 2004, Wuhan, China, October 18-20, 2004, Proceedings

Hai Jin, Guang R. Gao, Zhiwei Xu, Hao Chen

Springer, Lecture Notes in Computer Science 3222, ISBN: 3-540-23388-1



Contents

Secure Grid Computing with Trusted Resources and Internet Datamining.

Kai Hwang

 1

Towards Memory Oriented Scalable Computer Architecture and High Efficiency Petaflops Computing.

Thomas L. Sterling

 2

In-VIGO: Making the Grid Virtually Yours.

José A. B. Fortes

 3

Productivity in HPC Clusters.

Bob Kuhn

 4

Whole-Stack Analysis and Optimization of Commercial Workloads on Server Systems.

C. Richard Attanasio, Jong-Deok Choi, Niteesh Dubey, Kattamuri Ekanadham, Manish Gupta, Tatsushi Inagaki, Kazuaki Ishizaki, Joefon Jann, Robert D. Johnson, Toshio Nakatani, Il Park, Pratap Pattnaik, Mauricio J. Serrano, Stephen E. Smith, Ian M. Steiner, Yefim Shuf

 5-8

Session 1: Grid Computing

Fuzzy Trust Integration for Security Enforcement in Grid Computing.

Shanshan Song, Kai Hwang, Mikin Macwan

 9-21

Atomic Commitment in Grid Database Systems.

Sushant Goel, Hema Sharda, David Taniar

 22-29

A Data Grid Security System Based on Shared Context.

Nong Xiao, Xiaonian Wu, Wei Fu, Xiangli Qu

 30-37

A Study on Performance Monitoring Techniques for Traditional Parallel Systems and Grid.

Sarbani Roy, Nandini Mukherjee

 38-46

A Workflow-Based Grid Portal for Problem Solving Environment.

Yong-won Kwon, So-Hyun Ryu, Jin-Sung Park, Chang-Sung Jeong

 47-56

A Real-Time Transaction Approach for Grid Services: A Model and Algorithms.

Feilong Tang, Minglu Li, Joshua Zhexue Huang, Lei Cao, Yi Wang 0001

 57-64

QoS Quorum-Constrained Resource Management in Wireless Grid.

Chan-Hyun Youn, Byungsang Kim, Dong Su Nam, Eung-Suk An, Bong-Hwan Lee, Eun Bo Shim, Gari Clifford

 65-72

A Data-Aware Resource Broker for Data Grids.

Huy Le, Paul D. Coddington, Andrew L. Wendelborn

 73-82

Managing Service-Oriented Grids: Experiences from VEGA System Software.

Yuzhong Sun, Haiyan Yu, JiPing Cai, Li Zha, Yili Gong

 83-91

An Efficient Parallel Loop Self-scheduling on Grid Environments.

Chao-Tung Yang, Kuan-Wei Cheng, Kuan-Ching Li

 92-100

ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing.

Yong Meng Teo, Xianbing Wang

 101-109

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System.

Ganmei You, Huaming Liao, Yuzhong Sun

 110-117

A Heuristic Algorithm for the Job Shop Scheduling Problem.

Ai-Hua Yin

 118-128

Coordinating Distributed Resources for Complex Scientific Computation.

Huashan Yu, Zhuoqun Xu, Wenkui Ding

 129-132

Efficiently Rationing Resources for Grid and P2P Computing.

Ming Chen 0004, Yongwei Wu, Guangwen Yang, Xuezheng Liu

 133-136

Grid Resource Discovery Model Based on the Hierarchical Architecture and P2P Overlay Network.

Fei Liu, Fanyuan Ma, Shui Yu, Minglu Li

 137-140

Collaborative Process Execution for Service Composition with StarWebService.

Bixin Liu, Yufeng Wang, Bin Zhou, Yan Jia

 141-145

Session 2: Peer-to-Peer Computing

Efficient Gnutella-like P2P Overlay Construction.

Yunhao Liu, Li Xiao, Lionel M. Ni, Baijian Yang

 146-153

Lookup-Ring: Building Efficient Lookups for High Dynamic Peer-to-Peer Overlays.

Xuezheng Liu, Guangwen Yang, Jinfeng Hu, Ming Chen 0004, Yongwei Wu

 154-166

Layer Allocation Algorithms in Layered Peer-to-Peer Streaming.

Yajie Liu, Wenhua Dou, Zhifeng Liu

 167-174

Build a Distributed Repository for Web Service Discovery Based on Peer-to-Peer Network.

Yin Li, Futai Zou, Fanyuan Ma, Minglu Li

 175-182

Performance Improvement of Hint-Based Locating & Routing Mechanism in P2P File-Sharing Systems.

Hairong Jin, Shanping Li, Gang Peng, Tianchi Ma

 183-186

Session 3: Web Techniques

Cache Design for Transcoding Proxy Caching.

Keqiu Li, Hong Shen, Keishi Tajima

 187-194

Content Aggregation Middleware (CAM) for Fast Development of High Performance Web Syndication Services.

Su Myeon Kim, Jinwon Lee, SungJae Jo, Junehwa Song

 195-204

Domain-Based Proxy for Efficient Location Tracking of Mobile Agents.

Sanghoon Song, Taekyoung Kwon

 205-212

Session 4: Cluster Computing

Inhambu: Data Mining Using Idle Cycles in Clusters of PCs.

Hermes Senger, Eduardo R. Hruschka, Fabrício Alves Barbosa da Silva, Liria Matsumoto Sato, Calebe De Paula Bianchini, Marcelo D. Esperidiãao

 213-220

Request Distribution for Fairness with a New Load-Update Mechanism in Web Server Cluster.

MinHwan Ok, Myong-Soon Park

 221-229

Profile Oriented User Distributions in Enterprise Systems with Clustering.

Ping-Yu Hsu, Ping-Ho Ting

 230-237

CBBS: A Content-Based Bandwidth Smoothing Scheme for Clustered Video Servers.

Dafu Deng, Hai Jin, Xiaofei Liao, Hao Chen

 238-243

SuperNBD: An Efficient Network Storage Software for Cluster.

Rongfeng Tang, Dan Meng, Jin Xiong

 244-247

I/O Response Time in a Fault-Tolerant Parallel Virtual File System.

Dan Feng, Hong Jiang, Yifeng Zhu

 248-251

SARCNFS: Self-Adaptive Redundancy Clustered NAS File System.

Bin Cai, Changsheng Xie, Jin Ren, Faling Yi

 252-255

Research and Implementation of a Snapshot Facility Suitable for Soft-Failure Recovery.

Yong Feng, Yan-yuan Zhang, Rui-yong Jia

 256-260

Session 5: Parallel Programming and Environment

GOOMPI: A Generic Object Oriented Message Passing Interface.

Zhen Yao, Qilong Zheng, Guoliang Chen

 261-271

Simulating Complex Dynamical Systems in a Distributed Programming Environment.

E. V. Krishnamurthy, Vikram Krishnamurthy

 272-279

Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes in Embedded Linux Systems.

Jung Hee Kim, Hyun-chul Sim, Yong-hyeog Kang, Young Ik Eom

 280-283

Session 6: Network Architecture

Performance Evaluation of Hypercubes in the Presence of Multiple Time-Scale Correlated Traffic.

Geyong Min, Mohamed Ould-Khaoua

 284-291

Leader Election in Hyper-Butterfly Graphs.

Wei Shi, Pradip K. Srimani

 292-299

A New Approach to Local Route Recovery for Multihop TCP in Ad Hoc Wireless Networks.

Zhi Li 0013, Yu-Kwong Kwok

 300-307

Graph-Theoretic Analysis of Kautz Topology and DHT Schemes.

Dongsheng Li, Xicheng Lu, Jinshu Su

 308-315

A Parameterized Model of TCP Slow Start.

Xiaoheng Deng, Zhigang Chen, Lianming Zhang

 316-324

SMM: A Truthful Mechanism for Maximum Lifetime Routing in Wireless Ad Hoc Networks.

Qing Zhang, Huiqiong Chen, Weiwei Sun, Bole Shi

 325-332

A Dioid Linear Algebra Approach to Study a Class of Continuous Petri Nets.

Duan Zhang, Huaping Dai, Youxian Sun

 333-340

A Fully Adaptive Fault-Tolerant Routing Methodology Based on Intermediate Nodes.

Nils Agne Nordbotten, María Engracia Gómez, Jose Flich, Pedro López, Antonio Robles, Tor Skeie, Olav Lysne, José Duato

 341-356

Extended DBP for (m, k)-Firm Based QoS.

Jiming Chen, Zhi Wang, Yeqiong Song, Youxian Sun

 357-365

Weighted Fair Scheduling Algorithm for QoS of Input-Queued Switches.

Sang-Ho Lee, Dong Ryeol Shin, Hee Yong Youn

 366-373

A Scalable Distributed Architecture for Multi-party Conferencing Using SIP.

Young-Hoon Cho, Moon-Sang Jeong, Jong-Tae Park

 374-381

DC-mesh: A Contracted High-Dimensional Mesh for Dynamic Clustering.

Masaru Takesue

 382-389

The Effect of Adaptivity on the Performance of the OTIS-Hypercube Under Different Traffic Patterns.

Hashem Hashemi Najaf-abadi, Hamid Sarbazi-Azad

 390-398

An Empirical Autocorrelation Form for Modeling LRD Traffic Series.

Ming Li, Jingao Liu, Dongyang Long

 399-402

Statistical Error Analysis on Recording LRD Traffic Time Series.

Ming Li

 403-406

Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture.

Furong Wang, Ye Wu

 407-410

Session 7: Network Security

Reversible Cellular Automata Based Encryption.

Marcin Seredynski, Krzysztof Pienkosz, Pascal Bouvry

 411-418

Ontology Based Cooperative Intrusion Detection System.

Yanxiang He, Wei Chen 0006, Min Yang, Wenling Peng

 419-426

Adding Security to Network Via Network Processors.

Hao Yin, Zhangxi Tan, Chuang Lin, Guangxi Zhu

 427-434

A Method to Obtain Signatures from Honeypots Data.

Chi-Hung Chi, Ming Li, Dongxi Liu

 435-442

A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.

Min Yang, Huanguo Zhang, Jianming Fu, Fei Yan

 443-450

Design and Analysis of Improved GSM Authentication Protocol for Roaming Users.

GeneBeck Hahn, Taekyoung Kwon, Sinkyu Kim, JooSeok Song

 451-458

A Novel Intrusion Detection Method.

Shengyi Jiang, Qinghua Li, Hui Wang

 459-462

Session 8: Network Storage

An Implementation of Storage-Based Synchronous Remote Mirroring for SANs.

Jiwu Shu, Rui Yan, Dongchan Wen, Weimin Zheng

 463-472

A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees.

Young Jin Nam, Junkil Ryu, Chanik Park, Jong Suk Ahn

 473-480

Paramecium: Assembling Raw Nodes into Composite Cells.

Ming Chen 0004, Guangwen Yang, Yongwei Wu, Xuezheng Liu

 481-484

The Flexible Replication Method in an Object-Oriented Data Storage System.

Youhui Zhang, Jinfeng Hu, Weimin Zheng

 485-488

Enlarge Bandwidth of Multimedia Server with Network Attached Storage System.

Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang

 489-492

The NDMP-Plus Prototype Design and Implementation for Network Based Data Management.

Kai Ouyang, Jingli Zhou, Tao Xia, Shengsheng Yu

 493-497

Session 9: Multimedia Service

Further Optimized Parallel Algorithm of Watershed Segmentation Based on Boundary Components Graph.

Haifang Zhou, Xuejun Yang, Yu Tang, Nong Xiao

 498-501

The Transmitted Strategy of Proxy Cache Based on Segmented Video.

Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang

 502-507

The Strategy of Batch Using Dynamic Cache for Streaming Media.

Zhiwen Xu, Xiaoxin Guo, Yunjie Pang, Zhengxuan Wang

 508-512

New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications.

Li-bao Zhang, Ke Wang

 513-516

Workshop 1: Building Intelligent Sensor Networks

Bridging the Gap Between Micro and Nanotechnology: Using Lab-on-a-Chip to Enable Nanosensors for Genomics, Proteomics, and Diagnostic Screening.

Jonathan M. Cooper, Erik A. Johannessen, David R. S. Cumming

 517-521

The Development of Biosensors and Biochips in IECAS.

Xinxia Cai, Dafu Cui

 522-525

Open Issues on Intelligent Sensor Networks.

Yiqiang Chen, Wen Gao, Junfa Liu

 526-526

Enabling Anytime Anywhere Wireless Sensor Networks.

John Crawford

 527-527

A Query-Aware Routing Algorithm in Sensor Networks.

Jinbao Li, Jianzhong Li, Shengfei Shi

 528-535

Sensor Network Optimization by a Novel Genetic Algorithm.

Henry (Hui) Wang, Anna L. Buczak, Hong Jin, Hongan Wang, Baosen Li

 536-543

Online Mining in Sensor Networks.

Xiuli Ma, Dongqing Yang, Shiwei Tang, Qiong Luo, Dehui Zhang, Shuangfeng Li

 544-550

The HKUST Frog Pond - A Case Study of Sensory Data Analysis.

Wenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo

 551-558

BLOSSOMS: A CAS/HKUST Joint Project to Build Lightweight Optimized Sensor Systems on a Massive Scale.

Wen Gao, Lionel M. Ni, Zhiwei Xu

 559-564

A Pervasive Sensor Node Architecture.

Li Cui, Fei Wang, Haiyong Luo, Hailing Ju, Tianpu Li

 565-567

Cabot: On the Ontology for the Middleware Support of Context-Aware Pervasive Applications.

Chang Xu, Shing-Chi Cheung, Cindy Lo, K. C. Leung, Jun Wei

 568-575

Accurate Emulation of Wireless Sensor Networks.

Hejun Wu, Qiong Luo, Pei Zheng, Bingsheng He, Lionel M. Ni

 576-583

LEAPS: A Location Estimation and Action Prediction System in a Wireless LAN Environment.

Qiang Yang 0001, Yiqiang Chen, Jie Yin, Xiaoyong Chai

 584-591

Reliable Splitted Multipath Routing for Wireless Sensor Network.

Jian Wu, Stefan Dulman, Paul J. M. Havinga

 592-600

Reliable Data Aggregation for Real-Time Queries in Wireless Sensor Systems.

Kam-yiu Lam, Henry Chi-Wai Pang, Sang Hyuk Son, BiYu Liang

 601-610

Workshop 2: Multimedia Modeling and the Security in the Next Generation Network Information Systems

The Design of a DRM System Using PKI and a Licensing Agent.

Keun-Wang Lee, Jae-Pyo Park, Kwang-Hyoung Lee, Jong-Hee Lee, HeeSook Kim

 611-617

Multimedia Synchronization for Handoff Control with MPEG in All-IP Mobile Networks.

Gi-sung Lee, Hong-Jin Kim, Il-Sun Hwang

 618-625

Fuzzy Logic Adaptive Mobile Location Estimation.

Jongchan Lee, Seung-Jae Yoo, Dong Chun Lee

 626-634

A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability.

Hyuncheol Kim, Sunghae Kim, Seong-Jin Ahn, Jin-Wook Chung

 635-643

A Design and Implementation of Network Traffic Monitoring System for PC-room Management.

Yonghak Ahn, Oksam Chae

 644-652

A Vulnerability Assessment Tool Based on OVAL in Linux System.

Youngmi Kwon, Hui Jae Lee, Geuk Lee

 653-660

Performance Analysis of Delay Estimation Models for Signalized Intersection Networks.

Hyung Jin Kim, Bongsoo Son, Soobeom Lee

 661-669

Network Intrusion Protection System Using Rule-Based DB and RBAC Policy.

Min Wook Kil, Sijung Kim, Youngmi Kwon, Geuk Lee

 670-675

Effective FM Bandwidth Estimate Scheme with the DARC in Broadcasting Networks.

Sang Woon Lee, Kyoo Jin Han, Keum Chan Whang

 676-683

Enhanced Algorithm of TCP Performance on Handover in Wireless Internet Networks.

Dong Chun Lee, Hong-Jin Kim, Jae-Young Koh

 684-690