Search - IFIP Open Digital Library Access content directly

Filter your results

63 results
Structure: Internal structure identifier : 302677
Image document

Internet-Based Virtual Computing Environment

Huaimin Wang
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.2-2, ⟨10.1007/978-3-642-15672-4_2⟩
Conference papers hal-01054973v1
Image document

Accelerating the Requirement Space Exploration through Coarse-Grained Parallel Execution

Zhongwei Lin , Yiping Yao
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.59-70, ⟨10.1007/978-3-642-24403-2_5⟩
Conference papers hal-01593012v1
Image document

A Novel Chaining Approach to Indirect Control Transfer Instructions

Wei Chen , Zhiying Wang , Qiang Dou , Yongwen Wang
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.309-320, ⟨10.1007/978-3-642-23300-5_24⟩
Conference papers hal-01590412v1
Image document

Evaluation of Topological Vulnerability of the Internet under Regional Failures

Wei Peng , Zimu Li , Jinshu Su , Muwei Dong
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.164-175, ⟨10.1007/978-3-642-23300-5_13⟩
Conference papers hal-01590391v1
Image document

WeLe-RAID: A SSD-Based RAID for System Endurance and Performance

Du Yimo , Liu Fang , Chen Zhiguang , Ma Xin
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.248-262, ⟨10.1007/978-3-642-24403-2_20⟩
Conference papers hal-01593031v1
Image document

Reorder the Write Sequence by Virtual Write Buffer to Extend SSD’s Lifespan

Zhiguang Chen , Fang Liu , Yimo Du
8th Network and Parallel Computing (NPC), Oct 2011, Changsha,, China. pp.263-276, ⟨10.1007/978-3-642-24403-2_21⟩
Conference papers hal-01593016v1
Image document

dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing

Xu Zhou , Kai Lu , Xicheng Lu , Xiaoping Wang , Baohua Fan
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.172-179, ⟨10.1007/978-3-642-35606-3_20⟩
Conference papers hal-01551348v1
Image document

A Scalable Inline Cluster Deduplication Framework for Big Data Protection

Yinjin Fu , Hong Jiang , Nong Xiao
13th International Middleware Conference (MIDDLEWARE), Dec 2012, Montreal, QC, Canada. pp.354-373, ⟨10.1007/978-3-642-35170-9_18⟩
Conference papers hal-01555548v1
Image document

How to Break EAP-MD5

Fanbao Liu , Tao Xie
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.49-57, ⟨10.1007/978-3-642-30955-7_6⟩
Conference papers hal-01534313v1
Image document

Characterizing Inter-domain Rerouting after Japan Earthquake

Yujing Liu , Xiapu Luo , Rocky Chang , Jinshu Su
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.124-135, ⟨10.1007/978-3-642-30054-7_10⟩
Conference papers hal-01531953v1
Image document

An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records

Jia Jianbin , Chen Yingwen , Xu Ming
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.256-263, ⟨10.1007/978-3-642-35606-3_30⟩
Conference papers hal-01551313v1
Image document

Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control

Chengjun Wang , Baokang Zhao , Wanrong Yu , Chunqing Wu , Zhenghu Gong
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.488-500, ⟨10.1007/978-3-642-32498-7_37⟩
Conference papers hal-01542435v1
Image document

EaSync: A Transparent File Synchronization Service across Multiple Machines

Huajian Mao , Hang Zhang , Xianqiang Bao , Nong Xiao , Weisong Shi , et al.
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.289-296, ⟨10.1007/978-3-642-35606-3_34⟩
Conference papers hal-01551377v1
Image document

A Fine-Grained Pipelined Implementation of LU Decomposition on SIMD Processors

Kai Zhang , Shuming Chen , Wei Liu , Xi Ning
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.39-48, ⟨10.1007/978-3-642-40820-5_4⟩
Conference papers hal-01513757v1
Image document

Roadside Infrastructure Placement for Information Dissemination in Urban ITS Based on a Probabilistic Model

Bo Xie , Geming Xia , Yingwen Chen , Ming Xu
10th International Conference on Network and Parallel Computing (NPC), Sep 2013, Guiyang, China. pp.322-331, ⟨10.1007/978-3-642-40820-5_27⟩
Conference papers hal-01513754v1
Image document

An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core Processors

Wentao Jia , Rui Li , Chunyan Zhang
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.337-342, ⟨10.1007/978-3-642-36818-9_37⟩
Conference papers hal-01480191v1
Image document

A Pipeline Optimization Model for QKD Post-processing System

Jianyi Zhou , Bo Liu , Baokang Zhao , Bo Liu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.472-481, ⟨10.1007/978-3-642-55032-4_48⟩
Conference papers hal-01397256v1
Image document

Efficient DVFS to Prevent Hard Faults for Many-Core Architectures

Zhiquan Lai , Baokang Zhao , Jinshu Su
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.674-679, ⟨10.1007/978-3-642-55032-4_69⟩
Conference papers hal-01397285v1
Image document

A High-Speed Network Content Filtering System

Guohong Zhao , Shuhui Chen , Baokang Zhao , Ilsun You , Jinshu Su , et al.
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.257-269, ⟨10.1007/978-3-319-10975-6_20⟩
Conference papers hal-01404003v1
Image document

A Component Data-Focused Method to Build the Executable Model for a DoDAF Compliant Architecture

Li Huang , Guangqi Huang , Yaohong Zhang , Weizi Li , Xueshan Luo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.221-230, ⟨10.1007/978-3-642-55355-4_22⟩
Conference papers hal-01350927v1
Image document

Improving Availability through Energy-Saving Optimization in LEO Satellite Networks

Zhu Tang , Chunqing Wu , Zhenqian Feng , Baokang Zhao , Wanrong Yu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.680-689, ⟨10.1007/978-3-642-55032-4_70⟩
Conference papers hal-01397287v1
Image document

System Structure Risk Metric Method Based on Information Flow

Mengmeng Zhang , Junxian Liu , Aimin Luo , Xueshan Luo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.253-262, ⟨10.1007/978-3-642-55355-4_26⟩
Conference papers hal-01350931v1
Image document

A Semantic-Based Malware Detection System Design Based on Channels

Peige Ren , Xiaofeng Wang , Chunqing Wu , Baokang Zhao , Hao Sun
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.653-662, ⟨10.1007/978-3-642-55032-4_67⟩
Conference papers hal-01397283v1
Image document

An Agent-Based Autonomous Management Approach to Dynamic Services

Fu Hou , Xinjun Mao , Junwen Yin , Wei Wu
8th International Conference on Intelligent Information Processing (IIP), Oct 2014, Hangzhou, China. pp.122-132, ⟨10.1007/978-3-662-44980-6_14⟩
Conference papers hal-01383325v1
Image document

Rationality of Service Composition of Workflow Net in a Service Oriented Architecture

Guangqi Huang , Li Huang , Xiuxiu Chen , Lily Sun
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.155-165, ⟨10.1007/978-3-642-55355-4_16⟩
Conference papers hal-01350920v1
Image document

An UML-Based Meta-modeling Method of Building Architecture Product

Jiong Fu , Aimin Luo , Xueshan Luo
15th International Conference on Informatics and Semiotics in Organisations (ICISO), May 2014, Shanghai, China. pp.210-220, ⟨10.1007/978-3-642-55355-4_21⟩
Conference papers hal-01350926v1
Image document

An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources

Peige Ren , Xiaofeng Wang , Hao Sun , Baokang Zhao , Chunqing Wu
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.663-673, ⟨10.1007/978-3-642-55032-4_68⟩
Conference papers hal-01397284v1
Image document

A Structure P2P Based Web Services Registry with Access and Control

He Qian , Zhao Baokang , Long Yunjian , Su Jinshu , Ilsun You
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.286-297, ⟨10.1007/978-3-319-10975-6_23⟩
Conference papers hal-01404009v1
Image document

Towards a Key Consuming Detection in QKD-VoIP Systems

Guohong Zhao , Wanrong Yu , Baokang Zhao , Chunqing Wu
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.281-285, ⟨10.1007/978-3-319-10975-6_22⟩
Conference papers hal-01404007v1
Image document

Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution

Bo Liu , Baokang Zhao , Chunqing Wu , Wanrong Yu , Ilsun You
3rd International Conference on Information and Communication Technology-EurAsia (ICT-EURASIA) and 9th International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS), Oct 2015, Daejon, South Korea. pp.282-285, ⟨10.1007/978-3-319-24315-3_29⟩
Conference papers hal-01466229v1