Table of Contents
|
Network and Parallel Computing James Park, Albert Zomaya, Sang-Soo Yeo, Sartaj Sahni (Eds.)
|
Front Matter |
Algorithms, Scheduling, Analysis, and Data Mining
|
An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments Jian Xiao, Yu Zhang, Shuwei Chen, Huashan Yu |
1-13 |
DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng |
14-21 |
Knowledge-Based Adaptive Self-Scheduling Yizhuo Wang, Weixing Ji, Feng Shi, Qi Zuo, Ning Deng |
22-32 |
Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor Shahnawaz Talpur, Feng Shi, Yizhuo Wang |
33-41 |
A Scoring System for Short Answers on the Test in a Large Group Jae-Young Lee |
42-47 |
Network Architecture and Protocol Design
|
Reference Variables for Dynamic, Reliable Packet Operations Ralph Duncan, Peder Jungck, Kenneth Ross, Dwight Mulcahy |
48-60 |
Are Heterogeneous Cellular Networks Superior to Homogeneous Ones? Shelly Salim, Christian Oey, Sangman Moh |
61-68 |
Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks Longbo Zhang, Chen Yu, Hai Jin |
69-76 |
A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems Narjes Soltani, Ehsan Khaneghah, Mohsen Sharifi, Seyedeh Mirtaheri |
77-84 |
NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation Jinzhi Lin, Ying Wu, Gongyi Wu, Jingdong Xu |
85-93 |
Network Security
|
Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network Muhammad Ahmed, Xu Huang, Dharmendra Sharma |
94-100 |
MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis Bo-Chao Cheng, Guo-Tan Liao, Ching-Kai Lin, Shih-Chun Hsu, Ping-Hai Hsu, Jong Park |
101-109 |
Breaking a Robust Remote User Authentication Scheme Using Smart Cards Ding Wang, Chun-Guang Ma, Sen-Dong Zhao, Chang-Li Zhou |
110-118 |
An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs Irfana Memon |
119-128 |
Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites R. Krishnaveni, C. Chellappan, R. Dhanalakshmi |
129-137 |
Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing Taeseung Lee, Giyoun Won, Seongje Cho, Namje Park, Dongho Won |
138-144 |
Parallel, Distributed, and Virtualization Techniques
|
Small World Asynchronous Parallel Model for Genome Assembly Jintao Meng, Jianrui Yuan, Jiefeng Cheng, Yanjie Wei, Shengzhong Feng |
145-155 |
UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines Haitao Jiang, Yun Xu, Yin Liao, Guojie Jin, Guoliang Chen |
156-163 |
Fast Parallel Garner Algorithm for Chinese Remainder Theorem Yongnan Li, Limin Xiao, Aihua Liang, Yao Zheng, Li Ruan |
164-171 |
dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing Xu Zhou, Kai Lu, Xicheng Lu, Xiaoping Wang, Baohua Fan |
172-179 |
On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network M. Rahman, Asadullah Shah, Yasushi Inoguchi |
180-187 |
Performance Modeling, Prediction, and Tuning
|
An Elastic Architecture Adaptable to Millions of Application Scenarios Yunji Chen, Tianshi Chen, Qi Guo, Zhiwei Xu, Lei Zhang |
188-195 |
Demystifying Performance Predictions of Distributed FFT3D Implementations Daniel Orozco, Elkin Garcia, Robert Pavel, Orlando Ayala, Lian-Ping Wang, Guang Gao |
196-207 |
MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms Qiuming Luo, Chenjian Liu, Chang Kong, Ye Cai |
208-216 |
mHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing Cluster Gangfeng Liu, Yunlan Wang, Tianhai Zhao, Jianhua Gu, Dongyang Li |
217-224 |
Resource Management
|
Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks Wei Feng, Jian Liu, Jiannong Cao, Liang Yang, Qin Xin |
225-232 |
Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method Boo-Hyoung Lee, Chi-Su Kim, Heon-Tag Kong |
233-240 |
Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case Study Jong Park |
241-247 |
The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples Youngsik Kwak, Yoonjung Nam |
248-255 |
Ubiquitous Communications and Networks
|
An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records Jia Jianbin, Chen Yingwen, Xu Ming |
256-263 |
Design and Deployment of Testbed for Experimental Sensor Network Research Zeeshan Mir, Hyeon Park, Young Moon, Nae Kim, Cheol Pyo |
264-272 |
Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device Yoonsik Kwak |
273-278 |
Web, Communication, and Cloud Computing
|
Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center Lei Xu, Wenzhi Chen, Zonghui Wang, Huafei Ni, Jiajie Wu |
279-288 |
EaSync: A Transparent File Synchronization Service across Multiple Machines Huajian Mao, Hang Zhang, Xianqiang Bao, Nong Xiao, Weisong Shi, Yutong Lu |
289-296 |
Relationship between Correcting Code and Module Technique in Hiding Secret Data Phan Huy, Nguyen Thanh, Cheonsick Kim |
297-307 |
Different Characteristics of Radio Modules in Wireless Body Sensor Network Systems Woosik Lee, Min Choi, Namgi Kim |
308-314 |
The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services Hyeog-In Kwon, Hi-Yeob Joo, Dae-Jin Kim, Jong-Seok Park |
315-319 |
Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education Namje Park, Yeonghae Ko |
320-327 |
ATIMCN
|
The Performances Study of EDCF with Block_Ack in WLANs Chien-Erh Weng, Chien-Hung Chen, Chiung-Hsing Chen, Jyh-Horng Wen |
328-335 |
A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System Wen-Hsu Hsiao, Hui-Kai Su, Yu-Siang Wei, Wei-Sheng Ho, Kim-Joan Chen |
336-348 |
A New Approach for Detecting SMTPFA Based on Entropy Measurement Hsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng |
349-359 |
A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services Hui-Kai Su, Wen-Hsu Hsiao, Jian-Ting Pan, Chen-Hung Liao, Kim-Joan Chen, Chien-Min Wu |
360-372 |
ATSME
|
The Effects of Governmental Subsidy on the Quality of Education in Taiwan’s Private Universities and Colleges Ching-Hui Shih |
373-380 |
Examining the Effectiveness of a Distant Learning Education Program: Use of Patient Safety and Reporting Law and Ethics as Example Chiou-Fen Lin, Meei-Ling Shyu, Meei-Shiow Lu, Chung-I Huang |
381-385 |
The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill Training Hung-Chang Lin, Yao-Hua Wang |
386-393 |
The Difference Analysis between Demographic Variables and Personal Attributes – The Case of Internal Auditors in Taiwan Li-Jia Chiu, Neng-Tang Huang |
394-400 |
Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example Guo-Hong Lei, Mey-Tyng Wang |
401-408 |
Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness Shiang-Lan Kuo |
409-413 |
Soft Power: A Critical Factor for the Effectiveness and Development of a School Hui-Min Ko |
414-420 |
Cloud & Grid
|
Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor Networks Ying-Hong Wang, Yu-Wei Lin, Yu-Yu Lin, Hang-Ming Chang |
421-428 |
A Termination Detection Technique Using Gossip in Cloud Computing Environments Jongbeom Lim, Kwang-Sik Chung, Heon-Chang Yu |
429-436 |
OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science Zhiming Zhao, Paola Grosso, Cees Laat |
437-444 |
Using PCI Pass-Through for GPU Virtualization with CUDA Chao-Tung Yang, Hsien-Yi Wang, Yu-Tso Liu |
445-452 |
DATICS
|
Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options Nan Zhang, Ka Man |
453-462 |
Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems Jieming Ma, Ka Man, T. Ting, Hyunshin Lee, Taikyeong Jeong, Jong-Kug Sean, Sheng-Uei Guan, Prudence Wong |
463-471 |
Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model Nan Zhang, Ka Man, Eng Lim |
472-481 |
Evolving Linear Discriminant in a Continuously Growing Dimensional Space for Incremental Attribute Learning Ting Wang, Sheng-Uei Guan, T. Ting, Ka Man, Fei Liu |
482-491 |
Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem M. Wong, Ka Man |
492-499 |
Space Exploration of Multi-agent Robotics via Genetic Algorithm T. Ting, Kaiyu Wan, Ka Man, Sanghyuk Lee |
500-507 |
Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems T. Ting, Ka Man, Sheng-Uei Guan, Mohamed Nayel, Kaiyu Wan |
508-515 |
Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units Mouna Karmani, Chiraz Khedhiri, Belgacem Hamdi, Amir-Mohammad Rahmani, Ka Man, Kaiyu Wan |
516-523 |
UMAS
|
New Electronic Acupuncture System Using Intelligence You-Sik Hong, Hongkyun Kim, Cheonshik Kim, Geuk Lee |
524-531 |
A Runtime Environment for Distributed Mashups in Multi-device Scenarios Oliver Mroß, Klaus Meißner |
532-541 |
A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks Le Dung, Beongku An |
542-549 |
Nibble-CRC for Underwater Acoustic Communication Imtiaz Khan, Nam-Yeol Yun, Soo-Hyun Park |
550-558 |
An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations Sangyong Lee, Cheonshik Kim, Seongah Chin |
559-564 |
Research on a Smart Input Device Using Multimodal Bio-signal Interface Hyunju Lee, Taehyun Kim, Dongkyoo Shin, Heewon Park, Soohan Kim, Dongil Shin |
565-574 |
Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader Eun-Jun Yoon |
575-580 |
Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme Hae-Jung Kim, Eun-Jun Yoon |
581-588 |
Energy-Efficiency Protocol for Securing the Wireless Sensor Networks Luu Long, Eunmi Choi |
589-598 |
A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI Do-Hoon Kim, Jungwook Wee, Kyu-Sung Hwang |
599-607 |
SNR-Based Partial Relay Selection Scheme over Multiple Relay Network Kyu-Sung Hwang |
608-615 |
Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency Guoqing Li, Guangling Sun, Xinpeng Zhang |
616-624 |
Algorithms Based on Finite Automata for Testing of Z-codes Dang Thang, Nguyen Han, Phan Huy |
625-635 |
Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor Sooill Lee |
636-644 |