default search action
13th ICPADS 2007: Hsinchu, Taiwan
- 13th International Conference on Parallel and Distributed Systems, ICPADS 2007, Hsinchu, Taiwan, December 5-7, 2007. IEEE Computer Society 2007, ISBN 978-1-4244-1889-3
Volume 1
- Lionel M. Ni:
Message from the general chair. 1 - Wen-Tsuen Chen:
Message from the honorary chair. 1 - Chung-Ta King:
Message from the program chair. 1 - Chun-Hao Hsu, Jian Jhen Chen, Shiao-Li Tsao:
Evaluation and modeling of power consumption of a heterogeneous dual-core processor. 1-8 - Alejandro Muñoz, Armando Ferro, Fidel Liberal, Javier López:
Ksensor: Multithreaded kernel-level probe for passive QoS monitoring. 1-8 - Lin Gao, Lian Li, Jingling Xue, Tin-Fook Ngai:
Loop recreation for thread-level speculation. 1-10 - Miaomiao Wang, Jiannong Cao, Yan Sun, Jing Li:
Toward ubiquitous searching. 1-8 - Gang Wang, Xiaoguang Liu, Sheng Lin, Guangjun Xie, Jing Liu:
Constructing double- and triple-erasure-correcting codes with high availability using mirroring and parity approaches. 1-8 - Jung-Chun Kao, Radu Marculescu:
Energy-efficient anonymous multicast in mobile ad-hoc networks. 1-8 - Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada:
Early containment of worms using dummy addresses and connection trace back. 1-8 - Wenzhong Li, Yilin Wang, Chunhong Li, Sanglu Lu, Daoxu Chen:
A QoS-aware service selection algorithm for multimedia service overlay networks. 1-8 - Zhoujun Li, Yun Sun, Deqiang Wang:
Diameter bounds of cubelike recursive networks. 1-8 - Cheng-Lung Lin, Xin-Zhong Chen, Kuan-Ju Lin, Shiao-Li Tsao:
Sharing information of three-dimensional geographic locations through mobile devices. 1-8 - Thanukrishnan Srinivasan, R. Balakrishnan, S. A. Gangadharan, Hayawardh Vijayakumar:
A scalable parallelization of all-pairs shortest path algorithm for a high performance cluster environment. 1-8 - Ruipeng Li, Hai Jiang, Hung-Chi Su, Bin Zhang, Jeff Jenness:
Speculative and distributed simulation of many-particle collision systems. 1-8 - En-Jan Chou, Pangfeng Liu, Jan-Jan Wu:
Computation and communication schedule optimization for jobs with shared data. 1-8 - Changjiu Xian, Yung-Hsiang Lu, Zhiyuan Li:
Adaptive computation offloading for energy conservation on battery-powered systems. 1-8 - Vincent S. Tseng, Eric Hsueh-Chan Lu, Cheng-Hsien Huang:
Mining temporal mobile sequential patterns in location-based service environments. 1-8 - Hoda Akbari, Zeinab Iranmanesh, Mohammad Ghodsi:
Parallel Minimum Spanning Tree Heuristic for the steiner problem in graphs. 1-8 - Nathaniel Pettis, Yung-Hsiang Lu:
Improving quality-of-service of file migration policies in high-performance servers. 1-8 - Roger Curry, Cameron Kiddle, Rob Simmonds:
RAASP: Resource allocation analysis service and portal. 1-8 - Akira Yamawaki, Masahiko Iwane:
An FPGA implementation of a snoop cache with synchronization for a multiprocessor system-on-chip. 1-8 - Eric Fontaine, Hsien-Hsin S. Lee:
Optimizing Katsevich image reconstruction algorithm on multicore processors. 1-8 - Fong Pong, Nian-Feng Tzeng, Koray Öner, Chun Ning, Kwong-Tak Chui, Manoj Ekbote, Yanping Lu:
Communication performance of a modular high-bandwidth multiprocessor system. 1-8 - Chi-Hsiang Yeh, Richard Wu:
Prohibition-based MAC protocols for QoS-enhanced mesh networks and high-throughput WLANs. 1-5 - Haiying (Helen) Shen, Yingwu Zhu:
FairTrust: Toward secure and high performance P2P networks. 1-8 - Philip Chan, David Abramson:
Persistence and communication state transfer in an asynchronous pipe mechanism. 1-8 - Fabian Stäber, Gerald Kunzmann, Jörg P. Müller:
Extended Prefix Hash Trees for a distributed phone book application. 1-8 - Matthew J. Probst, Sneha Kumar Kasera:
Statistical trust establishment in wireless sensor networks. 1-8 - Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenji Kono:
Finding candidate spots for replica servers based on demand fluctuation. 1-10 - Anthony Sulistio, Kyong Hoon Kim, Rajkumar Buyya:
On incorporating an on-line strip packing algorithm into elastic Grid reservation-based systems. 1-8 - Mrinmoy Ghosh, Hsien-Hsin S. Lee:
Virtual Exclusion: An architectural approach to reducing leakage energy in caches for multiprocessor systems. 1-8 - Ying Li, Seng Wai Loke, M. V. Ramakrishna:
Performance study of data stream approximation algorithms in wireless sensor networks. 1-8 - Nian-Feng Tzeng, Hongyi Wu, Gui Liang Feng:
ADENS: Efficient address determination for mobile grids. 1-8 - Paul Burstein, Alan Jay Smith:
Efficient search in file-sharing networks. 1-9 - Bundit Manaskasemsak, Nunnapus Benjamas, Arnon Rungsawang, Athasit Surarerks, Putchong Uthayopas:
Parallel association rule mining based on FI-growth algorithm. 1-8 - Henry Larkin:
Data representations for mobile devices. 1-6 - Tao Yang, Leonard Barolli, Makoto Ikeda, Arjan Durresi, Fatos Xhafa:
Network energy consumption in ad-hoc networks under different radio models. 1-8 - Akihiro Fujiwara, Yasuhiro Sagara, Masahiko Nakamura:
Access point selection algorithms for maximizing throughputs in wireless LAN environment. 1-8 - Hon Fung Li, Eslam Al Maghayreh:
Using synchronized atoms to check distributed programs. 1-8 - Gur Saran Adhar:
Parallel algorithms for chains and anti-chains of points on a plane. 1-7 - Yung-Da Cheng, Jang-Ping Sheu:
A group-based multi-channel MAC protocol for wireless ad hoc networks. 1-8 - Samee Ullah Khan, Ishfaq Ahmad:
A cooperative game theoretical replica placement technique. 1-8 - Rong Wu, Douglas G. Down:
On the relative value of local scheduling versus routing in parallel server systems. 1-9 - Shun-Yu Chuang, Chien Chen, Chang-Jie Jiang:
Minimum-delay energy-efficient source to multisink routing in wireless sensor networks. 1-8 - Yanhong Liu, Bharadwaj Veeravalli, Sivakumar Viswanathan:
Novel critical-path based low-energy scheduling algorithms for heterogeneous multiprocessor real-time embedded systems. 1-8 - Tao Gu, Daqing Zhang, Hung Keng Pung:
A two-tier semantic overlay network for P2P search. 1-8 - Matthew Nichols, David Taylor:
A faster closure algorithm for pattern matching in partial-order event data. 1-9 - Agustín C. Caminero, Anthony Sulistio, María Blanca Caminero, Carmen Carrión, Rajkumar Buyya:
Extending GridSim with an architecture for failure detection. 1-8 - Junfeng Xie, Zhenhua Li, Guihai Chen:
A semantic overlay network for unstructured peer-to-peer protocols. 1-8 - Xuejun Yang, Yu Deng, Xiaobo Yan, Li Wang, Jing Du, Ying Zhang:
Efficient generation of stream programs from loops. 1-8 - Sun-Yuan Hsieh, Chang-Yu Wu, Chia-Wei Lee:
Fault-free Hamiltonian cycles in locally twisted cubes under conditional edge faults. 1-8 - Xudong Liu, Xiaoxuan Ma, Jun Han, Xuelian Lin:
A dual scale heterogeneous organizational network model. 1-8 - MingJian Tang, Jinli Cao:
Optimization on distributed user management in Wireless Sensor Networks. 1-8 - Yunhuai Liu, Lionel M. Ni:
A new MAC protocol design for long-term applications in wireless sensor networks. 1-8 - Kai Han, Binoy Ravindran, E. Douglas Jensen:
RTMG: Scheduling real-time distributable threads in large-scale, unreliable networks with low message overhead. 1-8 - Feiqi Su, Xudong Shi, Gang Liu, Ye Xia, Jih-Kwon Peir:
Comparative evaluation of multi-core cache occupancy strategies. 1-8 - Wenyu Qu, Masaru Kitsuregawa, Keqiu Li:
Performance analysis on mobile agent-based parallel information retrieval approaches. 1-8 - Mahdiar Hosein Ghadiry, Mahdieh Nadi Senjani, M. T. Manzuri-Shalmani, Dara Rahmati:
Effect of number of faults on NoC power and performance. 1-9 - Mourad Elhadef, Amiya Nayak, Ni Zeng:
Ants vs. faults: A swarm intelligence approach for diagnosing distributed computing networks. 1-8 - Matthieu Gallet, Yves Robert, Frédéric Vivien:
Scheduling multiple divisible loads on a linear processor network. 1-8 - Yunxia Feng, Minglu Li, Min-You Wu:
A weighted interference estimation scheme for interface switching wireless mesh networks. 1-8 - Rui Chu, Nong Xiao, Lei Chen, Xicheng Lu:
A push-based prefetching for cooperative caching RAM Grid. 1-8 - Xiang Cao, Chien-Chung Shen:
Subscription-aware publish/subscribe tree construction in mobile ad hoc networks. 1-9 - Ying-Wei Kuo, Shou-Hsuan Stephen Huang:
Stepping-stone detection algorithm based on order preserving mapping. 1-8 - Florian Kerschbaum, Julien Vayssière:
Privacy-preserving logical vector clocks using secure computation techniques. 1-8 - Haiying (Helen) Shen, Amy W. Apon, Cheng-Zhong Xu:
LORM: Supporting low-overhead P2P-based range-query and multi-attribute resource management in grids. 1-8 - Sun-Yuan Hsieh, Tsong-Jie Lin:
Embedding cycles and paths in a k-ary n-cube. 1-7 - Sun-Yuan Hsieh, Chang-De Wu, Chao-Wen Huang:
Conditional edge-fault-tolerant Hamiltonian cycle embedding of star graphs. 1-8 - Hung-Chin Jang, Hon-Chung Lee:
A Voronoi dEtection Range Adjustment (VERA) approach for energy saving of wireless sensor networks. 1-7
Volume 2
- Nicholas Vun, Wooi-Boon Goh:
The design of effective low cost embedded processor development kits for supporting take-home self-practice pedagogies. 1-7 - Ian McLoughlin, Douglas L. Maskell, Thambipillai Srikanthan, Wooi-Boon Goh:
An Embedded Systems graduate education for Singapore. 1-5 - Sung-Yuan Ko:
On the teaching of embedded Linux system. 1-2 - Yu-Lun Huang, Jwu-Sheng Hu:
Design methodology and hands-on practices for Embedded Operating Systems. 1-6 - Hsuan-Ming Feng, Chih-Yung Chen, Chia-Yun Wu:
Vision-based fuzzy 8051 surveillance systems design. 1-2 - Yutaka Matsubara, Midori Sugaya, Ittetsu Taniguchi, Yasuaki Murakami, Hayato Kanai, Hiroaki Takada:
SSEST: Summer school on embedded system technologies. 1-8 - Jing Chen, Hui-Ming Su, Jian-Horng Liu:
A curriculum design on embedded system education for first-year graduate students. 1-6 - Jogesh K. Muppala, Zonghua Gu, Shing-Chi Cheung:
Teaching embedded systems software: The HKUST experience. 1-6 - Ching-Shine Hwang, Tzuu-Shaang Wey, Yuan-Hung Lo:
An integration platform for developing digital life applications. 1-2 - Tianzhou Chen, Weihua Hu, Qingsong Shi, Hui Yan:
Embedded education for Computer Rank Examination. 1-4 - Chao-Lieh Chen:
Morphisms from IEEE 802.11 DCF specifications to its EDCA QoS practice with cross-layer interface. 1-8 - Shekhar Sharad, Karl Muecke:
Teaching complete embedded systems design process with graphical system design methodologies. 1-6 - Jian-Hong Liu, Jing Chen, Chen-Yung Wang:
SWEVM: a software EVM for embedded system programming. 1-7 - Pao-Ann Hsiung, Shang-Wei Lin:
From ISA to application design via RTOS - a course design framework for embedded software. 1-6 - Wen-Yew Liang, Hung-Che Lee, Yang-Lang Chang, Jyh-Perng Fang, Jywe-Fei Fang:
Design and analysis of a low power wireless portable media player. 1-7 - Wen-Yew Liang, Yu-Ming Hsieh, Zong-Ying Lyu:
Design of a dynamic distributed mobile computing environment. 1-8 - Yunfei Bai, Chng Eng Siong, Gorthi Prashant Bhanu:
An MCU description methodology for initialization code generation software. 1-7 - Ian McLoughlin, Anton J. R. Aendenroomer:
Linux as a teaching aid for embedded systems. 1-8 - Nicholas Vun, Wooi-Boon Goh:
Issues and challenges of embedded processor education for working professionals. 1-8 - Shiao-Li Tsao, Tai-Yi Huang, John Kar-Kin Zao, Jogesh K. Muppala, Chi-Sheng Shih:
Message from APESER organization committee. 1 - Jehn-Ruey Jiang:
Message from P2P-NVE Program Chair. 1 - Ali Shahrabi, Irfan Awan:
Message from PMAC-2WN Program Co-Chairs. 1 - Rajkumar Kettimuthu:
Message from SRMPDS Program Chair. 1 - Sandeep K. Singhal:
Scalable networked virtual environments using unstructured overlays. 1-8 - Ingmar Baumgart, Sebastian Mies:
S/Kademlia: A practicable approach towards secure key-based routing. 1-8 - Kalman Graffi, Aleksandra Kovacevic, Kyra Wulffert, Ralf Steinmetz:
ECHoP2P: Emergency call handling over peer-to-peer overlays. 1-10 - Rui Chu, Nong Xiao, Xicheng Lu:
A clustering model for memory resource sharing in large scale distributed system. 1-8 - Aaron Harwood, Santosh Kulkani:
Delay sensitive identity protection in peer-to-peer online gaming environments. 1-6 - Dae Woong Kim, Woo-Ram Park, Chan-Ik Park:
Effect of unstable routing in location-aware mobile ad hoc networks on a geographic DHT protocol. 1-8 - Chao Huang, Aaron Harwood, Shanika Karunasekera:
Directions for Peer-to-Peer based mobile pervasive augmented reality gaming. 1-8 - Ryo Nishide, Masaaki Ohnishi, Shinji Tsuboi, Shinichi Ueshima:
P2P-based geometric computation method for extracting ROI from ubiquitous video cameras. 1-8 - Lei Ni, Aaron Harwood:
A comparative study on Peer-to-Peer failure rate estimation. 1-7 - Jehn-Ruey Jiang, Hung-Shiang Chen:
Peer-to-Peer AOI voice chatting for massively multiplayer online games. 1-8 - Xiao-Jin Ren, Guo-An Wang, Zhi-Min Gu, Zhi-Wei Gao:
A fast joining operation for highly dynamic chord system. 1-5 - Jui-Fa Chen, Wei-Chuan Lin, Tsu-Han Chen, Shun-Yun Hu:
A forwarding model for Voronoi-based Overlay Network. 1-7 - Silvia Rueda, Pedro Morillo, Juan M. Orduña:
A Peer-To-Peer platform for simulating distributed virtual environments. 1-8 - Amy Beth Corman, Peter Schachte, Vanessa Teague:
Secure random number agreement for peer-to-peer applications. 1-8 - Giuseppe De Marco, Masaharu Tadauchi, Leonard Barolli:
CAVENET: Description and analysis of a toolbox for vehicular networks simulation. 1-6 - Suk Yu Hui, Kai-Hau Yeung, Kin Yeung Wong:
Cost evaluation on secure routing over powerlines for WMNs. 1-7 - Ing-Ray Chen, Ding-Chau Wang:
Modeling and analysis of regional registration based mobile multicast service management. 1-6 - G. Varaprasad:
New power aware routing algorithm for MANETs using gateway node. 1-4 - Abbas Nayebi, Hamid Sarbazi-Azad:
Lifetime analysis of the logical topology constructed by homogeneous topology control in wireless mobile networks. 1-8 - Mahmoud Moadeli, Alireza Shahrabi, Wim Vanderbauwhede:
Analytical modelling of communication in the rectangular mesh NoC. 1-8 - Nima Shahbazi, Hamid Sarbazi-Azad:
Accelerating 3-D capacitance extraction in deep sub-micron VLSI design using vector/parallel computing. 1-8 - Reza Moraveji, Hamid Sarbazi-Azad:
Mathematical performance analysis of product networks. 1-8 - Abdalla M. Hanashi, Aamir Siddique, Irfan Awan, Michael E. Woodward:
Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETs. 1-6 - Tomoya Enokido, Makoto Takizawa:
A Legal Information flow (LIF) scheduler for distributed systems. 1-8 - Richert Wang, Enrique Cauich, Isaac D. Scherson:
Federated clusters using the transparent remote Execution (TREx) environment. 1-8 - Jun Chen, Ganping Huang, Victor C. S. Lee:
Scheduling algorithm for multi-item requests with time constraints in mobile computing environments. 1-7 - Cedric Curcio, Serge Midonnet:
Resource reclamation using meta-events in a real time java system. 1-6 - M. Shahbaz Memon, A. Shiraz Memon, Morris Riedel, Bernd Schuller, Daniel Mallmann, Bastian Tweddell, Achim Streit, Sven van den Berghe, David F. Snelling, Vivian Li, Moreno Marzolla, Paolo Andreetto:
Enhanced resource management capabilities using standardized job management and data access interfaces within UNICORE Grids. 1-6 - Krzysztof Kurowski, Jarek Nabrzyski, Ariel Oleksiak, Jan Weglarz:
Grid scheduling simulations with GSSIM. 1-8 - Inès El Korbi, Leïla Azouz Saïdane:
Supporting deadline monotonic policy over 802.11 average service time analysis. 1-8 - Saad Bani-Mohammad, Mohamed Ould-Khaoua, Ismail Ababneh, Lewis M. Mackenzie:
Comparative evaluation of the non-contiguous processor allocation strategies based on a real workload and a stochastic workload on multicomputers. 1-7 - Gudmund Grov, Greg Michaelson, Andrew Ireland:
Formal verification of concurrent scheduling strategies using TLA. 1-6 - Sarbani Roy, Madhulina Sarkar, Nandini Mukherjee:
Optimizing resource allocation for multiple concurrent jobs in grid environment. 1-8 - James Wen Jun Xue, Ligang He, Stephen A. Jarvis:
A scheduling algorithm for revenue maximisation for cluster-based Internet services. 1-8 - Max Berger, Michael W. Sobolewski:
A dual-time vector clock based synchronization mechanism for key-value data in the SILENUS file system. 1-8 - Xiaoguang Liu, Meng Yu, Gang Wang, Jing Liu:
CrossTree: A new HTC architecture with high reliability and scalability. 1-7 - R. Badrinath, R. Krishnakumar, R. K. Palanivel Rajan:
Virtualization aware job schedulers for checkpoint-restart. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.