Network and Parallel Computing

9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6-8, 2012. Proceedings

Editors:

ISBN: 978-3-642-35605-6 (Print) 978-3-642-35606-3 (Online)

Table of contents (75 chapters)

previous Page of 4
  1. Front Matter

    Pages -

  2. Algorithms, Scheduling, Analysis, and Data Mining

    1. No Access

      Book Chapter

      Pages 1-13

      An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments

    2. No Access

      Book Chapter

      Pages 14-21

      DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph

    3. No Access

      Book Chapter

      Pages 22-32

      Knowledge-Based Adaptive Self-Scheduling

    4. No Access

      Book Chapter

      Pages 33-41

      Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor

    5. No Access

      Book Chapter

      Pages 42-47

      A Scoring System for Short Answers on the Test in a Large Group

  3. Network Architecture and Protocol Design

    1. No Access

      Book Chapter

      Pages 48-60

      Reference Variables for Dynamic, Reliable Packet Operations

    2. No Access

      Book Chapter

      Pages 61-68

      Are Heterogeneous Cellular Networks Superior to Homogeneous Ones?

    3. No Access

      Book Chapter

      Pages 69-76

      Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks

    4. No Access

      Book Chapter

      Pages 77-84

      A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems

    5. No Access

      Book Chapter

      Pages 85-93

      NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation

  4. Network Security

    1. No Access

      Book Chapter

      Pages 94-100

      Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network

    2. No Access

      Book Chapter

      Pages 101-109

      MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis

    3. No Access

      Book Chapter

      Pages 110-118

      Breaking a Robust Remote User Authentication Scheme Using Smart Cards

    4. No Access

      Book Chapter

      Pages 119-128

      An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs

    5. No Access

      Book Chapter

      Pages 129-137

      Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites

    6. No Access

      Book Chapter

      Pages 138-144

      Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing

  5. Parallel, Distributed, and Virtualization Techniques

    1. No Access

      Book Chapter

      Pages 145-155

      Small World Asynchronous Parallel Model for Genome Assembly

    2. No Access

      Book Chapter

      Pages 156-163

      UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines

    3. No Access

      Book Chapter

      Pages 164-171

      Fast Parallel Garner Algorithm for Chinese Remainder Theorem

    4. No Access

      Book Chapter

      Pages 172-179

      dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing

previous Page of 4