NPC 2004This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to establish an international forum for engineers and scientists to present their ideas and experiences in network and parallel computing. A total of 338 submissions were received in response to the call for papers. These papers werefrom Australia, Brazil,Canada,China, Finland, France, G- many, Hong Kong, India, Iran, Italy, Japan, Korea, Luxemburg, Malaysia, N- way, Spain, Sweden, Taiwan, UK, and USA. Each submission was sent to at least three reviewers.Each paper was judged according to its originality,inno- tion, readability, and relevance to the expected audience. Based on the reviews received, a total of 69 papers were accepted to be included in the proceedings. Among the 69 papers, 46 were accepted as full papers and were presented at the conference.Wealso accepted23papersasshortpapers;eachofthesepaperswas given an opportunity to have a brief presentation at the conference, followed by discussions in a poster session. Thus, due to the limited scope and time of the conference and the high number of submissions received, only 20% of the total submissions were included in the ?nal program. |
Contents
Secure Grid Computing with Trusted Resources and Internet | 1 |
Atomic Commitment in Grid Database Systems | 22 |
A Study on Performance Monitoring Techniques for Traditional Parallel | 38 |
A Model | 57 |
QoS QuorumConstrained Resource Management in Wireless Grid | 65 |
Experiences from VEGA System | 83 |
A Scalable Runtime Infrastructure for High Performance Grid | 101 |
A Heuristic Algorithm for the Job Shop Scheduling Problem | 118 |
A Scalable Distributed Architecture for Multiparty Conferencing | 374 |
The Effect of Adaptivity on the Performance of the OTISHypercube | 390 |
Statistical Error Analysis on Recording LRD Traffic Time Series | 403 |
Ontology Based Cooperative Intrusion Detection System Yanxiang He Wei Chen Min Yang Wenling Peng | 419 |
A Method to Obtain Signatures from Honeypots Data ChiHung Chi Ming Li Dongxi Liu | 435 |
Design and Analysis of Improved GSM Authentication Protocol | 451 |
An Implementation of StorageBased Synchronous Remote Mirroring | 463 |
Assembling Raw Nodes into Composite Cells | 481 |
Efficiently Rationing Resources for Grid and P2P Computing | 133 |
PeertoPeer Computing | 146 |
Layer Allocation Algorithms in Layered PeertoPeer Streaming Yajie Liu Wenhua Dou Zhifeng Liu | 167 |
Build a Distributed Repository for Web Service Discovery Based | 175 |
Keqiu Li Hong Shen Keishi Tajima | 195 |
Cluster Computing | 213 |
Profile Oriented User Distributions in Enterprise Systems with | 230 |
An Efficient Network Storage Software for Cluster | 244 |
Parallel Programming and Environment | 261 |
Design and Implementation of a Remote Debugger for Concurrent | 280 |
Wei Shi Pradip K Srimani | 300 |
A Parameterized Model of TCP Slow Start | 316 |
A Dioid Linear Algebra Approach to Study a Class of Continuous Petri | 333 |
Extended DBP for mkFirm Based QoS | 357 |
Multimedia Service | 498 |
New Regions of Interest Image Coding Using UpDown Bitplanes Shift | 513 |
The Development of Biosensors and Biochips in IECAS Xinxia Cai Dafu Cui | 522 |
Sensor Network Optimization by a Novel Genetic Algorithm | 536 |
The HKUST Frog Pond A Case Study of Sensory Data Analysis Wenwei Xue Bingsheng He Hejun Wu Qiong Luo | 551 |
A Pervasive Sensor Node Architecture | 565 |
A Location Estimation and Action Prediction System in | 584 |
Reliable Data Aggregation for RealTime Queries in Wireless Sensor | 601 |
KeunWang Lee JaePyo Park KwangHyoung Lee JongHee Lee | 618 |
A Host Protection Framework Against Unauthorized Access | 635 |
A Vulnerability Assessment Tool Based on OVAL in Linux System | 653 |
Network Intrusion Protection System Using RuleBased DB and RBAC | 670 |
Enhanced Algorithm of TCP Performance on Handover in Wireless | 684 |
Other editions - View all
Common terms and phrases
adaptive analysis AODV applications architecture average bandwidth block buffer cache client cluster Computer conference conferencing database delay denote detection distributed dynamic efficient encryption environment evaluation execution faults Federation for Information function global GOOMPI Grid Computing honeypots host hypercube IEEE IFIP International Federation implementation Information Processing 2004 input intermediate nodes Internet iSCSI Kautz graph latency layer Linux LNCS load mapping mechanism mesh middleware minimal mobile module monitoring multiple multiset ontology optimization output overlay network p-cube P-Start packet paper parallel parallel computing parameters path peer Peer-to-Peer performance port problem proposed protocol proxy query queue real-time request resource routing algorithm routing scheme scalability scheduling Section sensor network sensor nodes server shadow volume signal simulation storage stream target TCP Vegas Technology throughput traffic transaction transmission update virtual channels wireless