IFIP TC6 Open Digital Library

NPC 2011: Changsha, China

Network and Parallel Computing - 8th IFIP International Conference, NPC 2011, Changsha, China, October 21-23, 2011. Proceedings

Erik R. Altman, Weisong Shi

Springer, Lecture Notes in Computer Science 6985, ISBN: 978-3-642-24402-5



Contents

Session 1: Filesystems and Data

Elastic Phoenix: Malleable MapReduce for Shared-Memory Systems.

Adam Wolfe Gordon, Paul Lu

 1-16

A Load-Aware Data Placement Policy on Cluster File System.

Yu Wang, Jing Xing, Jin Xiong, Dan Meng

 17-31

H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation.

Jinjing Zhao, Yan Wen, Gang Zhao

 32-43

Improved Compact Routing Schemes for Power-Law Networks.

Mingdong Tang, Jianxun Liu, Guoqing Zhang

 44-58

Session 2: Network and Parallel Algorithms

Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution.

Zhongwei Lin, Yiping Yao

 59-70

A Global Benefit Maximization Task-Bundle Allocation.

Meiguang Zheng, Zhigang Hu, Peng Xiao, Meixia Zheng, Kai Zhang

 71-85

Service Quality Assurance Mechanisms for P2P SIP VoIP.

Xiaofei Liao, Fengjiang Guo, Hai Jin

 86-98

Session 3: Cluster and Grid

VSCM: A Virtual Server Consolidation Manager for Cluster.

Yang Liu, Yunchu Liu, Hanli Bai

 99-110

Informed Live Migration Strategies of Virtual Machines for Cluster Load Balancing.

Xing Li, Qinming He, Jianhai Chen, Kejiang Ye, Ting Yin

 111-122

Dynamic Advance Reservation for Grid System Using Resource Pools.

Zhiang Wu, Jie Cao, Youquan Wang

 123-134

Session 4: Trust and Authentication

A Way of Key Management in Cloud Storage Based on Trusted Computing.

Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing

 135-145

A Trust-Based Defensive System Model for Cloud Computing.

Qian Zhou, Jiong Yu, Feiran Yu

 146-159

A New Method for Authentication Based on Covert Channel.

Yanan Sun, Xiaohong Guan, Ting Liu

 160-165

Session 5: Monitor, Diagnose, and Then Optimize

A Layered Detection Method for Malware Identification.

Ting Liu, Xiaohong Guan, Yu Qu, Yanan Sun

 166-175

Pedestrian Detection and Tracking Using HOG and Oriented-LBP Features.

Yingdong Ma, Xiankai Chen, George Chen

 176-184

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment.

Daeyong Jung, Sung-Ho Chin, Kwang-Sik Chung, Heon-Chang Yu, Joon-Min Gil

 185-200

Session 6: Best Paper - 1

Towards a Universal Sketch for Origin-Destination Network Measurements.

Haiquan (Chuck) Zhao, Nan Hua, Ashwin Lall, Ping Li, Jia Wang, Jun (Jim) Xu

 201-213

A Power Adjusting Algorithm on Mobility Control in Mobile Ad Hoc Networks.

Jianrui Yuan, Jintao Meng

 214-231

Power-Aware Run-Time Incremental Mapping for 3-D Networks-on-Chip.

Xiaohang Wang, Maurizio Palesi, Mei Yang, Yingtao Jiang, Michael C. Huang, Peng Liu 0016

 232-247

Session 7: Best Paper - 2

WeLe-RAID: A SSD-Based RAID for System Endurance and Performance.

Yimo Du, Fang Liu, Zhiguang Chen, Xin Ma

 248-262

Reorder the Write Sequence by Virtual Write Buffer to Extend SSD's Lifespan.

Zhiguang Chen, Fang Liu, Yimo Du

 263-276

Memory-Side Acceleration for XML Parsing.

Jie Tang, Shaoshan Liu, Zhimin Gu, Chen Liu, Jean-Luc Gaudiot

 277-292

Session 8: Microarchitecture

Hardware Performance Monitoring for the Rest of Us: A Position and Survey.

Tipp Moseley, Neil Vachharajani, William Jalby

 293-312

An Efficient Architectural Design of Hardware Interface for Heterogeneous Multi-core System.

Xiongli Gu, Jie Yang, Xiamin Wu, Chunming Huang, Peng Liu 0016

 313-323

Session 9: Network and Mobile Computing

Evaluations on Effectiveness of Bump-Slot over DAP-NAD-Based Tactical Wideband Wireless Networks.

Sewon Han, Byung-Seo Kim

 324-333

Access Path Based Source Address Validation in Mobile IPv6.

Min Zhu, Ke Xu, Qi Li

 334-349

Improve Google Android User Experience with Regional Garbage Collection.

Yunan He, Chen Yang, Xiao-Feng Li

 350-365