4. Infoscale 2009:
Hong Kong,
China
Peter Mueller, Jian-Nong Cao, Cho-Li Wang (Eds.):
Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 18 Springer 2009, ISBN 978-3-642-10484-8
- Yuzhong Jiao, Xin'an Wang, Xuewen Ni:
A Fully Data-Driven Reconfigurable Architecture with Very Coarse-Grained Execution Units.
1-13
- Li Han, Songxiang Cen, Jian Ma, Yan Ma:
Identify Intimate Social Relationship in Blogsphere.
14-25
- András Faragó:
Local vs. Global Scalability in Ad Hoc and Sensor Networks.
26-45
- Xia Yin, Xin Wu, Zhiliang Wang:
Measuring IP Address Fragmentation from BGP Routing Dynamics.
46-57
- Yun-Chiu Ching, Ching-Hsien Hsu, Kuan-Ching Li:
On Improving Network Locality in BitTorrent-Like Systems.
58-75
- Chia-Wei Chu, Ching-Hsien Hsu, Hsi-Ya Chang, Shuen-Tai Wang, Kuan-Ching Li:
Parallel File Transfer for Grid Economic.
76-89
- Frank Schell, Jochen Dinger, Hannes Hartenstein:
Performance Evaluation of Identity and Access Management Systems in Federated Environments.
90-107
- Yen-Jun Chen, Ching-Hsien Hsu, Kuan-Ching Li, Hsi-Ya Chang, Shuen-Tai Wang:
Power Consumption Optimization of MPI Programs on Multi-core Clusters.
108-120
- Baoning Niu, Jian Shi:
Scalable Workload Adaptation for Mixed Workload.
121-134
- Rui Wang, Depei Qian, Danfeng Zhu, Qinglin Zhu, Zhongzhi Luan:
Tuning Performance of P2P Mesh Streaming System Using a Network Evolution Approach.
135-151
- Ma Xiu-ying, Lin Jia-jun:
HVS-Based Imperceptibility Evaluation for Steganography.
152-161
- Siti M. Wasikon, Mustafa Mat Deris:
Hasten Dynamic Frame Slotted ALOHA Algorithm for Fast Identification in RFID System.
162-174
- Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li:
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
175-191
- Zhixin Sun, Kai Bu, Ke Ding:
A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT.
192-205
- Tien-Hsiung Weng, Sheng-Wei Huang, Ruey-Kuen Perng, Ching-Hsien Hsu, Kuan-Ching Li:
A Practical OpenMP Implementation of Bit-Reversal for Fast Fourier Transform.
206-216
- Xuejiao Liu, Debao Xiao, Nian Ma, Jie Yu:
A Scalable, Vulnerability Modeling and Correlating Method for Network Security.
217-227
- Wei Xiao, Ming Xu, Yingwen Chen:
A Self-adaptive Fault-Tolerant Mechanism in Wireless Sensor Networks.
228-240
- Alexander J. Aved, Kien A. Hua, Antoniya Petkova:
CAWA: Continuous Approximate Where-About Queries.
241-257
- Kun-Ming Yu, Yi-Yan Chang, Jiayi Zhou, Chun-Yuan Huang, Whei-meih Chang, Chun-Yuan Lin, Chuan Yi Tang:
Chemical Compounds with Path Frequency Using Multi-Core Technology.
258-271
- Hsu-Kuang Chang, I-Chang Jou:
Distance Dimension Reduction on QR Factorization for Efficient Clustering Semantic XML Document Using the QR Fuzzy C-Mean (QR-FCM).
272-287
- Zhenqiang Gong, Guangzhong Sun, Jing Yuan, Yanjing Zhong:
Efficient Top-k Query Algorithms Using K-Skyband Partition.
288-305
- Yong Liu, John Markus Bjørndalen, Otto J. Anshus:
Using Multi-threading and Server Update Pushing to Improve the Performance of VNC for a Wall-Sized Tiled Display Wall.
306-321
Copyright © Tue Mar 16 00:47:05 2010
by Michael Ley (ley@uni-trier.de)