NPC C

33 papers

YearTitle / Authors
2008A Data Storage Mechanism for P2P VoD Based on Multi-channel Overlay.
Xiaofei Liao, Hao Wang, Song Wu, Hai Jin
2008A Formal Approach to Robustness Testing of Network Protocol.
Chuanming Jing, Zhiliang Wang, Xia Yin, Jianping Wu
2008A Novel Approach to Manage Asymmetric Traffic Flows for Secure Network Proxies.
Qing Li
2008A Scalable and Adaptive Distributed Service Discovery Mechanism in SOC Environments.
Xiao Zheng, Junzhou Luo, Aibo Song
2008A SyncML Middleware-Based Solution for Pervasive Relational Data Synchronization.
Haitao Yang, Peng Yang, Pingjing Lu, Zhenghua Wang
2008Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques.
Xiang Fan, Yang Xiang
2008Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks.
Eunyoung Kang, Yongsoon Im, Ung-Mo Kim
2008An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks.
Youn-Sik Hong, Ki-Young Lee
2008An Efficient Authentication and Key Agreement Protocol in RFID System.
Eun-Jun Yoon, Kee-Young Yoo
2008An Integrated Framework for Wireless Sensor Web Service and Its Performance Analysis Based on Queue Theory.
Luqun Li
2008Automatic Transformation for Overlapping Communication and Computation.
Changjun Hu, Yewei Shao, Jue Wang, Jianjiang Li
2008CPI: A Novel Three-Phase Algorithm for QoS-Aware Replica Placement Problem.
Wei Fu, Yingjie Zhao, Nong Xiao, Xicheng Lu
2008Cooperative Communication System for Parallel Computing Agents in Multi-cluster Grid.
Qingkui Chen, Wei Wang
2008Deadline Probing: Towards Timely Cognitive Wireless Network.
Panlong Yang, Guihai Chen, Qihui Wu
2008Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers.
Wenping Pan, Dejun Mu, Hangxing Wu, Xinjia Zhang, Lei Yao
2008Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting.
Shuhua Wu, Yuefei Zhu
2008Grid Computing: A Case Study in Hybrid GMRES Method.
Ye Zhang, Guy Bergére, Serge G. Petiton
2008Grid Service Discovery Based on Cross-VO Service Domain Model.
Jingya Zhou, Junzhou Luo, Aibo Song
2008HRS: A Hybrid Replication Strategy for Exhaustive P2P Search.
Hanhua Chen, Hai Jin, Xucheng Luo, Zhiguang Qin
2008HTL: A Locality Bounded Flat Hash Location Service.
Ruonan Rao, Shuying Liang, Jinyuan You
2008Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2008Measuring the Normality of Web Proxies' Behavior Based on Locality Principles.
Yi Xie, Shun-Zheng Yu
2008Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings
Jian Cao, Minglu Li, Min-You Wu, Jinjun Chen
2008Online Accumulation: Reconstruction of Worm Propagation Path.
Yang Xiang, Qiang Li, Dong Guo
2008Online Balancing Two Independent Criteria.
Savio S. H. Tse
2008Ontology-Based Semantic Method for Service Modeling in Grid.
Bin Cheng, Xingang Wang, Weiqin Tong
2008Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting.
Shuhua Wu, Yuefei Zhu
2008Procrastination Scheduling for Fixed-Priority Tasks with Preemption Thresholds.
Xiaochuan He, Yan Jia
2008Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow.
Dongqi Wang, Guiran Chang, Xiaoshuo Feng, Rui Guo
2008ResourceDog: A Trusted Resource Discovery and Automatic Invocation P2P Framework.
Bowei Yang, Guanghua Song, Yao Zheng
2008SRDFA: A Kind of Session Reconstruction DFA.
Jinjing Huang, Lei Zhao, Jiwen Yang
2008Survey on Parallel Programming Model.
Henry Kasim, Verdi March, Rita Zhang, Simon See
2008Towards Resource Reliability Support for Grid Workflows.
Jiong Yu, Guozhong Tian, Yuanda Cao, Xianhe Sun