NPC 2004

Front Cover
Springer Science & Business Media, Oct 6, 2004 - Computers - 694 pages
This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three reviewers.Each paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the conference.Wealso accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program.
 

Contents

Secure Grid Computing with Trusted Resources and Internet
1
Atomic Commitment in Grid Database Systems
22
A Study on Performance Monitoring Techniques for Traditional Parallel
38
A Model
57
QoS QuorumConstrained Resource Management in Wireless Grid
65
Experiences from VEGA System
83
A Scalable Runtime Infrastructure for High Performance Grid
101
A Heuristic Algorithm for the Job Shop Scheduling Problem
118
A Scalable Distributed Architecture for Multiparty Conferencing
374
The Effect of Adaptivity on the Performance of the OTISHypercube
390
Statistical Error Analysis on Recording LRD Traffic Time Series
403
Ontology Based Cooperative Intrusion Detection System Yanxiang He Wei Chen Min Yang Wenling Peng
419
A Method to Obtain Signatures from Honeypots Data ChiHung Chi Ming Li Dongxi Liu
435
Design and Analysis of Improved GSM Authentication Protocol
451
An Implementation of StorageBased Synchronous Remote Mirroring
463
Assembling Raw Nodes into Composite Cells
481

Efficiently Rationing Resources for Grid and P2P Computing
133
PeertoPeer Computing
146
Layer Allocation Algorithms in Layered PeertoPeer Streaming Yajie Liu Wenhua Dou Zhifeng Liu
167
Build a Distributed Repository for Web Service Discovery Based
175
Keqiu Li Hong Shen Keishi Tajima
195
Cluster Computing
213
Profile Oriented User Distributions in Enterprise Systems with
230
An Efficient Network Storage Software for Cluster
244
Parallel Programming and Environment
261
Design and Implementation of a Remote Debugger for Concurrent
280
Wei Shi Pradip K Srimani
300
A Parameterized Model of TCP Slow Start
316
A Dioid Linear Algebra Approach to Study a Class of Continuous Petri
333
Extended DBP for mkFirm Based QoS
357
Multimedia Service
498
New Regions of Interest Image Coding Using UpDown Bitplanes Shift
513
The Development of Biosensors and Biochips in IECAS Xinxia Cai Dafu Cui
522
Sensor Network Optimization by a Novel Genetic Algorithm
536
The HKUST Frog Pond A Case Study of Sensory Data Analysis Wenwei Xue Bingsheng He Hejun Wu Qiong Luo
551
A Pervasive Sensor Node Architecture
565
A Location Estimation and Action Prediction System in
584
Reliable Data Aggregation for RealTime Queries in Wireless Sensor
601
KeunWang Lee JaePyo Park KwangHyoung Lee JongHee Lee
618
A Host Protection Framework Against Unauthorized Access
635
A Vulnerability Assessment Tool Based on OVAL in Linux System
653
Network Intrusion Protection System Using RuleBased DB and RBAC
670
Enhanced Algorithm of TCP Performance on Handover in Wireless
684
Copyright

Other editions - View all

Common terms and phrases