13. ICPADS 2007:
Hsinchu,
Taiwan
13th International Conference on Parallel and Distributed Systems (ICPADS 2007), December 5-7, 2007, Hsinchu, Taiwan.
IEEE Computer Society 2007
Volume 1
- Lionel M. Ni:
Message from the general chair.
1
- Wen-Tsuen Chen:
Message from the honorary chair.
1
- Chung-Ta King:
Message from the program chair.
1
- Chun-Hao Hsu, Jian Jhen Chen, Shiao-Li Tsao:
Evaluation and modeling of power consumption of a heterogeneous dual-core processor.
1-8
- Alejandro Muñoz, Armando Ferro, Fidel Liberal, Javier Lopez:
Ksensor: Multithreaded kernel-level probe for passive QoS monitoring.
1-8
- Lin Gao, Lian Li, Jingling Xue, Tin-Fook Ngai:
Loop recreation for thread-level speculation.
1-10
- Miaomiao Wang, Jiannong Cao, Yan Sun, Jing Li:
Toward ubiquitous searching.
1-8
- Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:
Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approaches.
1-8
- Jung-Chun Kao, Radu Marculescu:
Energy-efficient anonymous multicast in mobile ad-hoc networks.
1-8
- Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada:
Early containment of worms using dummy addresses and connection trace back.
1-8
- Wenzhong Li, Yilin Wang, Chunhong Li, Sanglu Lu, Daoxu Chen:
A QoS-aware service selection algorithm for multimedia service overlay networks.
1-8
- Zhoujun Li, Yun Sun, Deqiang Wang:
Diameter bounds of cubelike recursive networks.
1-8
- Cheng-Lung Lin, Xin-Zhong Chen, Kuan-Ju Lin, Shiao-Li Tsao:
Sharing information of three-dimensional geographic locations through mobile devices.
1-8
- Thanukrishnan Srinivasan, R. Balakrishnan, S. A. Gangadharan, V. Hayawardh:
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment.
1-8
- Ruipeng Li, Hai Jiang, Hung-Chi Su, Bin Zhang, Jeff Jenness:
Speculative and distributed simulation of many-particle collision systems.
1-8
- En-Jan Chou, Pangfeng Liu, Jan-Jan Wu:
Computation and communication schedule optimization for jobs with shared data.
1-8
- Changjiu Xian, Yung-Hsiang Lu, Zhiyuan Li:
Adaptive computation offloading for energy conservation on battery-powered systems.
1-8
- Vincent S. Tseng, Eric Hsueh-Chan Lu, Cheng-Hsien Huang:
Mining temporal mobile sequential patterns in location-based service environments.
1-8
- Hoda Akbari, Zeinab Iranmanesh, Mohammad Ghodsi:
Parallel Minimum Spanning Tree Heuristic for the steiner problem in graphs.
1-8
- Nathaniel Pettis, Yung-Hsiang Lu:
Improving quality-of-service of file migration policies in high-performance servers.
1-8
- Roger Curry, Cameron Kiddle, Rob Simmonds:
RAASP: Resource allocation analysis service and portal.
1-8
- Akira Yamawaki, Masahiko Iwane:
An FPGA implementation of a snoop cache with synchronization for a multiprocessor system-on-chip.
1-8
- Eric Fontaine, Hsien-Hsin S. Lee:
Optimizing Katsevich image reconstruction algorithm on multicore processors.
1-8
- Fong Pong, Nian-Feng Tzeng, Koray Öner, Chun Ning, Kwong-Tak Chui, Manoj Ekbote, Yanping Lu:
Communication performance of a modular high-bandwidth multiprocessor system.
1-8
- Chi-Hsiang Yeh, Richard Wu:
Prohibition-based MAC protocols for QoS-enhanced mesh networks and high-throughput WLANs.
1-5
- Haiying (Helen) Shen, Yingwu Zhu:
FairTrust: Toward secure and high performance P2P networks.
1-8
- Philip Chan, David Abramson:
Persistence and communication state transfer in an asynchronous pipe mechanism.
1-8
- Fabian Stäber, Gerald Kunzmann, Jörg P. Müller:
Extended Prefix Hash Trees for a distributed phone book application.
1-8
- Matthew J. Probst, Sneha Kumar Kasera:
Statistical trust establishment in wireless sensor networks.
1-8
- Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono:
Finding candidate spots for replica servers based on demand fluctuation.
1-10
- Anthony Sulistio, Kyong Hoon Kim, Rajkumar Buyya:
On incorporating an on-line strip packing algorithm into elastic Grid reservation-based systems.
1-8
- Mrinmoy Ghosh, Hsien-Hsin S. Lee:
Virtual Exclusion: An architectural approach to reducing leakage energy in caches for multiprocessor systems.
1-8
- Ying Li, Seng Wai Loke, M. V. Ramakrishna:
Performance study of data stream approximation algorithms in wireless sensor networks.
1-8
- Nian-Feng Tzeng, Hongyi Wu, Gui Liang Feng:
ADENS: Efficient address determination for mobile grids.
1-8
- Paul Burstein, Alan Jay Smith:
Efficient search in file-sharing networks.
1-9
- Bundit Manaskasemsak, Nunnapus Benjamas, Arnon Rungsawang, Athasit Surarerks, Putchong Uthayopas:
Parallel association rule mining based on FI-growth algorithm.
1-8
- Henry Larkin:
Data representations for mobile devices.
1-6
- Tao Yang, Leonard Barolli, Makoto Ikeda, Arjan Durresi, Fatos Xhafa:
Network energy consumption in ad-hoc networks under different radio models.
1-8
- Akihiro Fujiwara, Yasuhiro Sagara, Masahiko Nakamura:
Access point selection algorithms for maximizing throughputs in wireless LAN environment.
1-8
- Hon Fung Li, Eslam Al Maghayreh:
Using synchronized atoms to check distributed programs.
1-8
- Gur Saran Adhar:
Parallel algorithms for chains and anti-chains of points on a plane.
1-7
- Yung-Da Cheng, Jang-Ping Sheu:
A group-based multi-channel MAC protocol for wireless ad hoc networks.
1-8
- Samee Ullah Khan, Ishfaq Ahmad:
A cooperative game theoretical replica placement technique.
1-8
- Rong Wu, Douglas G. Down:
On the relative value of local scheduling versus routing in parallel server systems.
1-9
- Shun-Yu Chuang, Chien Chen, Chang-Jie Jiang:
Minimum-delay energy-efficient source to multisink routing in wireless sensor networks.
1-8
- Yanhong Liu, Bharadwaj Veeravalli, Sivakumar Viswanathan:
Novel critical-path based low-energy scheduling algorithms for heterogeneous multiprocessor real-time embedded systems.
1-8
- Tao Gu, Daqing Zhang, Hung Keng Pung:
A two-tier semantic overlay network for P2P search.
1-8
- Matthew Nichols, David Taylor:
A faster closure algorithm for pattern matching in partial-order event data.
1-9
- Agustín C. Caminero, Anthony Sulistio, Blanca Caminero, Carmen Carrión, Rajkumar Buyya:
Extending GridSim with an architecture for failure detection.
1-8
- Junfeng Xie, Zhenhua Li, Guihai Chen:
A semantic overlay network for unstructured peer-to-peer protocols.
1-8
- Xuejun Yang, Yu Deng, Xiaobo Yan, Li Wang, Jing Du, Ying Zhang:
Efficient generation of stream programs from loops.
1-8
- Sun-Yuan Hsieh, Chang-Yu Wu, Chia-Wei Lee:
Fault-free Hamiltonian cycles in locally twisted cubes under conditional edge faults.
1-8
- Xudong Liu, Xiaoxuan Ma, Jun Han, Xuelian Lin:
A dual scale heterogeneous organizational network model.
1-8
- MingJian Tang, Jinli Cao:
Optimization on distributed user management in Wireless Sensor Networks.
1-8
- Yunhuai Liu, Lionel M. Ni:
A new MAC protocol design for long-term applications in wireless sensor networks.
1-8
- Kai Han, Binoy Ravindran, E. Douglas Jensen:
RTMG: Scheduling real-time distributable threads in large-scale, unreliable networks with low message overhead.
1-8
- Feiqi Su, Xudong Shi, Gang Liu, Ye Xia, Jih-Kwon Peir:
Comparative evaluation of multi-core cache occupancy strategies.
1-8
- Wenyu Qu, Masaru Kitsuregawa, Keqiu Li:
Performance analysis on mobile agent-based parallel information retrieval approaches.
1-8
- Mahdiar Hosein Ghadiry, Mahdieh Nadi Senjani, M. T. Manzuri-Shalmani, Dara Rahmati:
Effect of number of faults on NoC power and performance.
1-9
- Mourad Elhadef, Amiya Nayak, Ni Zeng:
Ants vs. faults: A swarm intelligence approach for diagnosing distributed computing networks.
1-8
- Matthieu Gallet, Yves Robert, Frédéric Vivien:
Scheduling multiple divisible loads on a linear processor network.
1-8
- Yunxia Feng, Minglu Li, Min-You Wu:
A weighted interference estimation scheme for interface switching wireless mesh networks.
1-8
- Rui Chu, Nong Xiao, Lei Chen, Xicheng Lu:
A push-based prefetching for cooperative caching RAM Grid.
1-8
- Xiang Cao, Chien-Chung Shen:
Subscription-aware publish/subscribe tree construction in mobile ad hoc networks.
1-9
- Ying-Wei Kuo, Shou-Hsuan Stephen Huang:
Stepping-stone detection algorithm based on order preserving mapping.
1-8
- Florian Kerschbaum, Julien Vayssière:
Privacy-preserving logical vector clocks using secure computation techniques.
1-8
- Haiying (Helen) Shen, Amy W. Apon, Cheng-Zhong Xu:
LORM: Supporting low-overhead P2P-based range-query and multi-attribute resource management in grids.
1-8
- Sun-Yuan Hsieh, Tsong-Jie Lin:
Embedding cycles and paths in a k-ary n-cube.
1-7
- Sun-Yuan Hsieh, Chang-De Wu, Chao-Wen Huang:
Conditional edge-fault-tolerant Hamiltonian cycle embedding of star graphs.
1-8
- Hung-Chin Jang, Hon-Chung Lee:
A Voronoi dEtection Range Adjustment (VERA) approach for energy saving of wireless sensor networks.
1-7
Volume 2
- Nicholas Vun, Wooi-Boon Goh:
The design of effective low cost embedded processor development kits for supporting take-home self-practice pedagogies.
1-7
- Ian McLoughlin, Douglas L. Maskell, Thambipillai Srikanthan, Wooi-Boon Goh:
An Embedded Systems graduate education for Singapore.
1-5
- Sung-Yuan Ko:
On the teaching of embedded Linux system.
1-2
- Yu-Lun Huang, Jwu-Sheng Hu:
Design methodology and hands-on practices for Embedded Operating Systems.
1-6
- Hsuan-Ming Feng, Chih-Yung Chen, Chia-Yun Wu:
Vision-based fuzzy 8051 surveillance systems design.
1-2
- Yutaka Matsubara, Midori Sugaya, Ittetsu Taniguchi, Yasuaki Murakami, Hayato Kanai, Hiroaki Takada:
SSEST: Summer school on embedded system technologies.
1-8
- Jing Chen, Hui-Ming Su, Jian-Horng Liu:
A curriculum design on embedded system education for first-year graduate students.
1-6
- Jogesh K. Muppala, Zonghua Gu, S. C. Cheung:
Teaching embedded systems software: The HKUST experience.
1-6
- Ching-Shine Hwang, Tzuu-Shaang Wey, Yuan-Hung Lo:
An integration platform for developing digital life applications.
1-2
- Tianzhou Chen, Weihua Hu, Qingsong Shi, Hui Yan:
Embedded education for Computer Rank Examination.
1-4
- Chao-Lieh Chen:
Morphisms from IEEE 802.11 DCF specifications to its EDCA QoS practice with cross-layer interface.
1-8
- Shekhar Sharad, Karl Muecke:
Teaching complete embedded systems design process with graphical system design methodologies.
1-6
- Jian-Hong Liu, Jing Chen, Chen-Yung Wang:
SWEVM: a software EVM for embedded system programming.
1-7
- Pao-Ann Hsiung, Shang-Wei Lin:
From ISA to application design via RTOS a course design framework for embedded software.
1-6
- Wen-Yew Liang, Hung-Che Lee, Yang-Lang Chang, Jyh-Perng Fang, Jywe-Fei Fang:
Design and analysis of a low power wireless portable media player.
1-7
- Wen-Yew Liang, Yu-Ming Hsieh, Zong-Ying Lyu:
Design of a dynamic distributed mobile computing environment.
1-8
- Yunfei Bai, Chng Eng Siong, Gorthi Prashant Bhanu:
An MCU description methodology for initialization code generation software.
1-7
- Ian McLoughlin, Anton J. R. Aendenroomer:
Linux as a teaching aid for embedded systems.
1-8
- Nicholas Vun, Wooi-Boon Goh:
Issues and challenges of embedded processor education for working professionals.
1-8
- Shiao-Li Tsao, Tai-Yi Huang, John Kar-kin Zao, Jogesh K. Muppala, Chi-Sheng Shih:
Message from APESER organization committee.
1
- Jehn-Ruey Jiang:
Message from P2P-NVE Program Chair.
1
- Ali Shahrabi, Irfan Awan:
Message from PMAC-2WN Program Co-Chairs.
1
- Rajkumar Kettimuthu:
Message from SRMPDS Program Chair.
1
- Sandeep K. Singhal:
Scalable networked virtual environments using unstructured overlays.
1-8
- Ingmar Baumgart, Sebastian Mies:
S/Kademlia: A practicable approach towards secure key-based routing.
1-8
- Kalman Graffi, Aleksandra Kovacevic, Kyra Wulffert, Ralf Steinmetz:
ECHoP2P: Emergency call handling over peer-to-peer overlays.
1-10
- Rui Chu, Nong Xiao, Xicheng Lu:
A clustering model for memory resource sharing in large scale distributed system.
1-8
- Aaron Harwood, Santosh Kulkani:
Delay sensitive identity protection in peer-to-peer online gaming environments.
1-6
- Dae Woong Kim, Woo-Ram Park, Chan-Ik Park:
Effect of unstable routing in location-aware mobile ad hoc networks on a geographic DHT protocol.
1-8
- Chao Huang, Aaron Harwood, Shanika Karunasekera:
Directions for Peer-to-Peer based mobile pervasive augmented reality gaming.
1-8
- Ryo Nishide, Masaaki Ohnishi, Shinji Tsuboi, Shinichi Ueshima:
P2P-based geometric computation method for extracting ROI from ubiquitous video cameras.
1-8
- Lei Ni, Aaron Harwood:
A comparative study on Peer-to-Peer failure rate estimation.
1-7
- Jehn-Ruey Jiang, Hung-Shiang Chen:
Peer-to-Peer AOI voice chatting for massively multiplayer online games.
1-8
- Xiao-Jin Ren, Guo-An Wang, Zhi-Min Gu, Zhi-Wei Gao:
A fast joining operation for highly dynamic chord system.
1-5
- Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun Hu:
A forwarding model for Voronoi-based Overlay Network.
1-7
- Silvia Rueda, Pedro Morillo, Juan M. Orduña:
A Peer-To-Peer platform for simulating distributed virtual environments.
1-8
- Amy Beth Corman, Peter Schachte, Vanessa Teague:
Secure random number agreement for peer-to-peer applications.
1-8
- Giuseppe De Marco, Masaharu Tadauchi, Leonard Barolli:
CAVENET: Description and analysis of a toolbox for vehicular networks simulation.
1-6
- Suk Yu Hui, Kai Hau Yeung, Kin Yeung Wong:
Cost evaluation on secure routing over powerlines for WMNs.
1-7
- Ing-Ray Chen, Ding-Chau Wang:
Modeling and analysis of regional registration based mobile multicast service management.
1-6
- G. Varaprasad:
New power aware routing algorithm for MANETs using gateway node.
1-4
- Abbas Nayebi, Hamid Sarbazi-Azad:
Lifetime analysis of the logical topology constructed by homogeneous topology control in wireless mobile networks.
1-8
- Mahmoud Moadeli, Alireza Shahrabi, Wim Vanderbauwhede:
Analytical modelling of communication in the rectangular mesh NoC.
1-8
- Nima Shahbazi, Hamid Sarbazi-Azad:
Accelerating 3-D capacitance extraction in deep sub-micron VLSI design using vector/parallel computing.
1-8
- Reza Moraveji, Hamid Sarbazi-Azad:
Mathematical performance analysis of product networks.
1-8
- Abdalla M. Hanashi, Aamir Siddique, Irfan Awan, Michael E. Woodward:
Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETs.
1-6
- Tomoya Enokido, Makoto Takizawa:
A Legal Information flow (LIF) scheduler for distributed systems.
1-8
- Richert Wang, Enrique Cauich, Isaac D. Scherson:
Federated clusters using the transparent remote Execution (TREx) environment.
1-8
- Jun Chen, Ganping Huang, Victor C. S. Lee:
Scheduling algorithm for multi-item requests with time constraints in mobile computing environments.
1-7
- Cedric Curcio, Serge Midonnet:
Resource reclamation using meta-events in a real time java system.
1-6
- M. Shahbaz Memon, A. Shiraz Memon, Morris Riedel, Bernd Schuller, Daniel Mallmann, Bastian Tweddell, Achim Streit, Sven van den Berghe, David F. Snelling, Vivian Li, Moreno Marzolla, Paolo Andreetto:
Enhanced resource management capabilities using standardized job management and data access interfaces within UNICORE Grids.
1-6
- Krzysztof Kurowski, Jarek Nabrzyski, Ariel Oleksiak, Jan Weglarz:
Grid scheduling simulations with GSSIM.
1-8
- Inès El Korbi, Leïla Azouz Saïdane:
Supporting deadline monotonic policy over 802.11 average service time analysis.
1-8
- Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:
Comparative evaluation of the non-contiguous processor allocation strategies based on a real workload and a stochastic workload on multicomputers.
1-7
- Gudmund Grov, Greg Michaelson, Andrew Ireland:
Formal verification of concurrent scheduling strategies using TLA.
1-6
- Sarbani Roy, Madhulina Sarkar, Nandini Mukherjee:
Optimizing resource allocation for multiple concurrent jobs in grid environment.
1-8
- James Wen Jun Xue, Ligang He, Stephen A. Jarvis:
A scheduling algorithm for revenue maximisation for cluster-based Internet services.
1-8
- Max Berger, Michael W. Sobolewski:
A dual-time vector clock based synchronization mechanism for key-value data in the SILENUS file system.
1-8
- Xiaoguang Liu, Meng Yu, Gang Wang, Jing Liu:
CrossTree: A new HTC architecture with high reliability and scalability.
1-7
- R. Badrinath, R. Krishnakumar, R. K. Palanivel Rajan:
Virtualization aware job schedulers for checkpoint-restart.
1-7
Copyright © Fri Mar 12 17:14:51 2010
by Michael Ley (ley@uni-trier.de)