default search action
ISPA Workshops 2005: Nanjing, China
- Guihai Chen, Yi Pan, Minyi Guo, Jian Lu:
Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings. Lecture Notes in Computer Science 3759, Springer 2005, ISBN 3-540-29770-7
International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005)
- Di Wu, Ye Tian, Kam-Wing Ng:
Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments. 1-8 - Sanfeng Zhang, Guoxin Wu, Gang Chen, Libo Xu:
On Building and Updating Distributed LSI for P2P Systems. 9-16 - Yin Li, Fanyuan Ma, Liang Zhang:
Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network. 17-26 - Hanyu Liu, Yu Peng, Mao Yang, Yafei Dai:
Characterization of P2P File-Sharing System. 27-34 - Liu Fang, Ruonan Rao:
Analysis of GHT in Mobile Ad Hoc Networks. 35-44 - Xinli Huang, Fanyuan Ma, Yin Li:
Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization. 45-53 - Dario Catalano, Giancarlo Ruffo, Rossano Schifanella:
A P2P Market Place Based on Aggregate Signatures. 54-63 - Jun Li, Xun Kang:
Proof of Service in a Hybrid P2P Environment. 64-73 - Qiang Ding, Ke Xu, Hui-shan Liu:
Construct Optimal Diameter Network and d-partition Routing Algorithm. 74-81 - Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth:
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System. 82-90
International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005)
- Hongcan Zhang, Jiwu Shu, Wei Xue, Dingxing Wang:
VTarget: An Improved Software Target Emulator for SANs. 91-100 - Jun Luo, Jiwu Shu, Wei Xue:
Design and Implementation of an Efficient Multipath for a SAN Environment. 101-110 - Tao Cai, Shiguang Ju, JuenJie Zhao, DeJiao Niu:
Research of Hot-Spot Selection Algorithm in Virtual Address Switch. 111-119 - Yulin Wang, Guangjun Li, Xiaojun Wu, Shuisheng Lin:
An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays. 120-129 - Xiangguo Li, Jianhua Yang, Zhaohui Wu:
An NFSv4-Based Security Scheme for NAS. 130-139 - Changsheng Xie, Zhen Zhao, Jian Liu, Wei Wu:
Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System. 140-148 - Bigang Li, Jiwu Shu, Fei Mu, Weimin Zheng:
A Cluster LVM for SAN Environments. 149-158
International Workshop on Bioinformatics (BIOS 2005)
- Roy Varshavsky, Michal Linial, David Horn:
COMPACT: A Comparative Package for Clustering Assessment. 159-167 - Xiao-hua Xu, Ling Chen, Ping He:
Fast Sequence Similarity Computing with LCS on LARPBS. 168-175 - Ling Chen, Juan Chen, Yi Pan:
Fast Scalable Algorithm on LARPBS for Sequence Alignment. 176-185 - David B. Bracewell, Scott Russell, Annie S. Wu:
Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts. 186-195 - Chengyong Yang, Erliang Zeng, Tao Li, Giri Narasimhan:
A Knowledge-Driven Method to Evaluate Multi-source Clustering. 196-202 - Jieyue He, Hae-Jin Hu, Robert W. Harrison, Phang C. Tai, Yisheng Dong, Yi Pan:
Understanding Protein Structure Prediction Using SVM_DT. 203-212 - Budi Ongkowijaya, Shilin Ding, Xiaoyan Zhu:
Various Features with Integrated Strategies for Protein Name Classification. 213-222
International Workshop on Grid Computing in China (GCIC 2005)
- Hai Jin, Chuanjiang Yi, Song Wu, Li Qi, Deqing Zou:
Uniform Authorization Management in ChinaGrid Support Platform. 223-231 - Yongwei Wu, Song Wu, Huashan Yu, Chunming Hu:
Introduction to ChinaGrid Support Platform. 232-240 - Xingwei Wang, Nan Jiang, Jialin Wang, Min Huang:
A Microeconomics-Based Resource Assignment Model for Grid Computing. 241-248 - Xiaoshe Dong, Yinfeng Wang, Xiuqiang He, Hua Guo, Fang Zheng, Weiguo Wu:
The Campus Resource Management Based on Constellation Model in the ChinaGrid. 249-256 - Shoubin Dong, Pengfei Liu, Yicheng Cao, Zhengping Du:
Grid Computing Methodology for Protein Structure Prediction and Analysis. 257-266 - Xiangxu Meng, Shijun Liu, Rui Wang, Chenglei Yang, Hai Guo:
Applying Service Composition in Digital Museum Grid. 267-275 - Junzhou Luo, Aibo Song, Ye Zhu, Xiaopeng Wang, Teng Ma, Zhiang Wu, Yaobin Xu, Liang Ge:
Grid Supporting Platform for AMS Data Processing. 276-285 - Xiaowu Chen, Xixi Luo, Zhangsheng Pan, Qinping Zhao:
A CGSP-Based Grid Application for University Digital Museums. 286-296 - Weimin Zheng, Meizhi Hu, Lin Liu, Yongwei Wu, Jing Tie:
FleMA: A Flexible Measurement Architecture for ChinaGrid. 297-304 - Minglu Li, Chuliang Weng, Xinda Lu, Yong Yin, Qianni Deng:
A Resource Scheduling Strategy for the CFD Application on the Grid. 305-314
International Workshop on Information Assurance in Distributed Systems (IADS 2005)
- Mingwen Wang, Qingxin Zhu, Li Qing:
A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. 315-322 - Haifeng Qian, Zhenfu Cao:
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. 323-331 - Yuan Zhou, Zhenfu Cao, Zhenchuan Chai:
An Efficient Proxy-Protected Signature Scheme Based on Factoring. 332-341 - Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. 342-349 - Zhenchuan Chai, Zhenfu Cao, Yuan Zhou:
Encryption Based on Reversible Second-Order Cellular Automata. 350-358 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:
ID-Based Proxy Signature Using Bilinear Pairings. 359-367 - Zhenfeng Zhang, Dengguo Feng:
Efficient Fair Certified E-Mail Delivery Based on RSA. 368-377 - Liwu Zhang, Dengguo Feng:
Intrusion Tolerant CA Scheme with Cheaters Detection Ability. 378-386 - Zheng Qin, Na Li, Dafang Zhang, Nai-Zheng Bian:
Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. 387-396 - Dingsheng Wan, Qing Li, Guihai Chen:
Research and Implementation of Workflow Interoperability Crossing Organizations. 397-402
International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005)
- Peng Han, Haiguang Chen, Bo Yu, Dan Xu, Chuanshan Gao:
LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks. 403-411 - Panlong Yang, Chang Tian:
Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks. 412-421 - Amer Filipovic, Amitava Datta, Chris McDonald:
Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. 422-433 - Kennie H. Jones, Kenneth N. Lodding, Stephan Olariu, Larry Wilson, Chunsheng Xin:
Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks. 434-443 - Xunxue Cui, Zhan Zhao, Qing Tao:
Probabilistic Behavior of Sensor Network Localization. 444-453 - Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai Chen:
Hybrid Authentication and Key Management Scheme for WSANs. 454-465 - Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen:
Storage-Optimal Key Sharing with Authentication in Sensor Networks. 466-474
International Workshop on Service Grid Computing and Applications (SGCA 2005)
- Jiafu Hu, Nong Xiao, Yingjie Zhao, Wei Fu:
An Asynchronous Replica Consistency Model in Data Grid. 475-484 - Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen:
Distributed Access Control for Grid Environments Using Trust Management Approach. 485-495 - Zhangsheng Pan, Xiaowu Chen, Xiangyu Ji:
Research on Database Access and Integration in UDMGrid. 496-505 - Jiadi Yu, Minglu Li, Feng Hong:
Resource Allocation Based on Pricing for Grid Computing Environments. 506-513 - Lixin Han, Guihai Chen, Linping Sun, Li Xie:
CMSA: A Method for Construction and Maintenance of Semantic Annotations. 514-519 - Kun Wu, Han Dai, Yang Zhang, Sanglu Lu, Daoxu Chen, Li Xie:
NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations. 520-529 - Yaojun Han, Changjun Jiang, Xuemei Luo:
Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis. 530-539 - Hongbo Wan, Qianni Deng, Xinhua Lin, Xinda Lu, Minglu Li:
The Design and Implementation of Service Adapter in ShanghaiGrid Core. 540-548 - Yutong Lu, Zhiyu Shen, Enqiang Zhou, Min Zhu:
MCRM System: CIM-Based Multiple Clusters Manager. 549-558
International Workshop on Web Information Systems and Applications (WISA 2005)
- Lei Cao, Minglu Li, Jian Cao, Yi Wang:
Introduction to an Agent-Based Grid Workflow Management System. 559-568 - Heping Chen, Jinguang Gu, Xiaohui Li, Hongping Fang:
An XML Query Mechanism with Ontology Integration. 569-578 - Wan-Chun Dou, Guihai Chen, Feng Su, Shijie Cai:
Implementation of Cooperative Cognition Under Web Environment. 579-588 - Sun-Moon Jo, Ki-Tae Kim, Hoon-Joon Kouh, Weon-Hee Yoo:
Access Authorization Policy for XML Document Security. 589-598 - Jing Mei, Elena Paslaru Bontas, Zuoquan Lin:
OWL2Jess: A Transformational Implementation of the OWL Semantics. 599-608 - Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou:
Security Frameworks for Open LBS Based on Web Services Security Mechanism. 609-618 - Lei Xu, Baowen Xu, Changhai Nie:
Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method. 619-626 - Xiaochun Yang, Xiangyu Liu, Bin Wang, Ge Yu:
A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing. 627-636 - Yanping Yang, QingPing Tan, Yong Xiao:
Transformation-Driven Development of Composite Web Services. 637-646 - Fei Yu, Huang Huang, Cheng Xu, Xiao-peng Dai, Miaoliang Zhu:
Badness Information Audit Based on Image Character Filtering. 647-656 - Weifeng Zhang, Baowen Xu, Guoqiang Zhou:
User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache. 657-665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.