Table of Contents
|
Network and Parallel Computing Erik Altman, Weisong Shi |
Front Matter |
Session 1: Filesystems and Data
|
Elastic Phoenix: Malleable MapReduce for Shared-Memory Systems Adam Wolfe Gordon, Paul Lu |
1-16 |
A Load-Aware Data Placement Policy on Cluster File System Yu Wang, Jing Xing, Jin Xiong, Dan Meng |
17-31 |
H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation Jinjing Zhao, Yan Wen, Gang Zhao |
32-43 |
Improved Compact Routing Schemes for Power-Law Networks Mingdong Tang, Jianxun Liu, Guoqing Zhang |
44-58 |
Session 2: Network and Parallel Algorithms
|
Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution Zhongwei Lin, Yiping Yao |
59-70 |
A Global Benefit Maximization Task-Bundle Allocation Meiguang Zheng, Zhigang Hu, Peng Xiao, Kai Zhang |
71-85 |
Service Quality Assurance Mechanisms for P2P SIP VoIP Xiaofei Liao, Fengjiang Guo, Hai Jin |
86-98 |
Session 3: Cluster and Grid
|
VSCM: A Virtual Server Consolidation Manager for Cluster Yang Liu, Hanli Bai |
99-110 |
Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin |
111-122 |
Dynamic Advance Reservation for Grid System Using Resource Pools Zhiang Wu, Jie Cao, Youquan Wang |
123-134 |
Session 4: Trust and Authentication
|
A Way of Key Management in Cloud Storage Based on Trusted Computing Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing |
135-145 |
A Trust-Based Defensive System Model for Cloud Computing Qian Zhou, Jiong Yu, Feiran Yu |
146-159 |
A New Method for Authentication Based on Covert Channel Yanan Sun, Xiaohong Guan, Ting Liu |
160-165 |
Session 5: Monitor, Diagnose, and Then Optimize
|
A Layered Detection Method for Malware Identification Ting Liu, Xiaohong Guan, Yu Qu, Yanan Sun |
166-175 |
Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features Yingdong Ma, Xiankai Chen, George Chen |
176-184 |
An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung, Sungho Chin, Kwangsik Chung, Heonchang Yu, Joonmin Gil |
185-200 |
Session 6: Best Paper – 1
|
Towards a Universal Sketch for Origin-Destination Network Measurements Haiquan Zhao, Nan Hua, Ashwin Lall, Ping Li, Jia Wang, Jun Xu |
201-213 |
A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks Jianrui Yuan, Jintao Meng |
214-231 |
Power-Aware Run-Time Incremental Mapping for 3-D Networks-on-Chip Xiaohang Wang, Maurizio Palesi, Mei Yang, Yingtao Jiang, Michael Huang, Peng Liu |
232-247 |
Session 7: Best Paper – 2
|
WeLe-RAID: A SSD-Based RAID for System Endurance and Performance Du Yimo, Liu Fang, Chen Zhiguang, Ma Xin |
248-262 |
Reorder the Write Sequence by Virtual Write Buffer to Extend SSD’s Lifespan Zhiguang Chen, Fang Liu, Yimo Du |
263-276 |
Memory-Side Acceleration for XML Parsing Jie Tang, Shaoshan Liu, Zhimin Gu, Chen Liu, Jean-Luc Gaudiot |
277-292 |
Session 8: Microarchitecture
|
Hardware Performance Monitoring for the Rest of Us: A Position and Survey Tipp Moseley, Neil Vachharajani, William Jalby |
293-312 |
An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-core System Xiongli Gu, Jie Yang, Xiamin Wu, Chunming Huang, Peng Liu |
313-323 |
Session 9: Network and Mobile Computing
|
Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless Networks Sewon Han, Byung-Seo Kim |
324-333 |
Access Path Based Source Address Validation in Mobile IPv6 Min Zhu, Ke Xu, Qi Li |
334-349 |
Improve Google Android User Experience with Regional Garbage Collection Yunan He, Chen Yang, Xiao-Feng Li |
350-365 |