Default Cover Image

Grid and Cloud Computing, International Conference on

Nov. 1 2010 to Nov. 5 2010

Nanjang, Jiangsu China

ISBN: 978-0-7695-4313-0

Table of Contents

Papers
[Keynote speeches - 3 abstracts]Full-text access may be available. Sign in or learn about subscription options.pp. xxii-xxiv
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xi
Papers
Message from the General ChairsFreely available from IEEE.pp. xii
Papers
Organizing CommitteeFreely available from IEEE.pp. xiii
Papers
Program CommitteeFreely available from IEEE.pp. xiv-xv
Papers
list-reviewerFreely available from IEEE.pp. xvi-xvii
Papers
GCCPA 2010 Workshop CommitteeFreely available from IEEE.pp. xviii
Papers
HPGC 2010 Workshop CommitteeFreely available from IEEE.pp. xix
Papers
PGSC 2010 Workshop CommitteeFreely available from IEEE.pp. xx-xx
Papers
VCI 2010 Workshop CommitteeFreely available from IEEE.pp. xxi
Papers
A MapReduceMerge-based Data Cube Construction MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
A Case for the Optimization of Database Workflow Orchestration in Heterogenous EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Papers
An Application-Based Adaptive Replica Consistency for Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 13-17
Papers
A Dynamic Replica Management Strategy Based on Data GridFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
Papers
Using Memcached to Promote Read Throughput in Massive Small-File Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Papers
The Optimization Theory of File Partition in Network Storage EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 30-33
Papers
An Agent-based Scheme for Supporting Service and Resource Management in Wireless CloudFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
Papers
Ontology Based Knowledge Modeling for Structural Engineering Experiment Information ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
Papers
The Optimized Reinforcement Learning Approach to Run-Time Scheduling in Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 46-51
Papers
A New Classification Algorithm Using Mutual Nearest NeighborsFull-text access may be available. Sign in or learn about subscription options.pp. 52-57
Papers
Design and Implementation of Virtual Resources Management in Meteorology GridFull-text access may be available. Sign in or learn about subscription options.pp. 58-63
Papers
Evaluating I/O Scheduler in Virtual Machines for Mapreduce ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 64-69
Papers
Efficient Online Trace Building Using Code ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 70-74
Papers
Affinity-aware Proportional Share Scheduling for Virtual Machine SystemFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Papers
VMCTune: A Load Balancing Scheme for Virtual Machine Cluster Using Dynamic Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 81-86
Papers
A Network-aware Virtual Machine Placement and Migration Approach in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Papers
A User-Friendly Task Editor Environment for Large-scale Virtual Screening ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 93-97
Papers
DFC: Towards Effective Feedback Flow Management for DatacentersFull-text access may be available. Sign in or learn about subscription options.pp. 98-103
Papers
An Architecture Including Network QoS in Scientific WorkflowsFull-text access may be available. Sign in or learn about subscription options.pp. 104-109
Papers
A Hybrid Modeling Approach to Microarchitecture Design Space ExploringFull-text access may be available. Sign in or learn about subscription options.pp. 110-117
Papers
Performance Evaluation of Parallel File System Based on Lustre and Grey TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Papers
A Performance Monitoring Solution for Distributed Application System Based on JMXFull-text access may be available. Sign in or learn about subscription options.pp. 124-127
Papers
Design of Privacy-Preserving Cloud Storage FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 128-132
Papers
Trusted Anonymous Execution: A Model to Raise Trust in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 133-138
Papers
SPOTOS: A Safe Point Detector for Online Patching Commodity OSFull-text access may be available. Sign in or learn about subscription options.pp. 139-144
Papers
The Interoperable Attribute-based Authorization in ARC Grid MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Papers
Nova: A Robustness-oriented Byzantine Fault Tolerance ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 151-156
Papers
AMREF: An Adaptive MapReduce Framework for Real Time ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 157-162
Papers
Parallel Algorithms for Cryptosystem on Conic Curves over Finite Field FpFull-text access may be available. Sign in or learn about subscription options.pp. 163-167
Papers
Parallel FMM Algorithm Based on Space DecompositionFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
Papers
Parallelization of RSA Algorithm Based on Compute Unified Device ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 174-178
Papers
Parallel Techniques for Large Data Analysis in a Futures Trading Evaluation Service SystemFull-text access may be available. Sign in or learn about subscription options.pp. 179-184
Papers
A Synchronization Approach for Increasing Concurrency in Software Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 185-190
Papers
Parallel Option Pricing with BSDE Method on GPUFull-text access may be available. Sign in or learn about subscription options.pp. 191-195
Papers
A Parallel Simulator for Large-Scale Parallel ComputersFull-text access may be available. Sign in or learn about subscription options.pp. 196-200
Papers
Dynamic Requests Scheduling Model in Multi-core Web ServerFull-text access may be available. Sign in or learn about subscription options.pp. 201-206
Papers
Enhanced Non-Blocking Buffer: A High Performance Non-Blocking Message Communication MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Papers
I/O Feature-based File Prefetching for Multi-ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
A Mechanism Based on Netfilter for Live TCP Migration in ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Papers
Building a Personal High Performance Computer with Heterogeneous ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 223-228
Papers
ORSP: An Efficient Resource Acquisition Policy for Peer-to-Peer Mesh Streaming SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Papers
Fair Exchange Mechanism for P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 235-239
Papers
An Incentive Framework for Supplying Differentiate Service Based on Game Model in P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Papers
Research on a Multi-layered and Multi-grouped Model for P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Papers
Replication-aware and Snowcrash-resistant VM Deployment for P2P ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
Papers
A Sevice-Oriented Broker for Bulk Data Transfer in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 264-269
Papers
An Autonomic Performance-Aware Workflow Job Management for Service-Oriented ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 270-275
Papers
A Well-designed SaaS Application Platform Based on Model-driven ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 276-281
Papers
Constraint Rules-based Recovery for Business TransactionFull-text access may be available. Sign in or learn about subscription options.pp. 282-289
Papers
Reliable Web Services Selection Using a Heuristic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Papers
A Location & Time Related Web Service Distributed Selection Approach for CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Papers
From Use Case Model to Service Model: An Environment Ontology Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 302-307
Papers
SLA Validation of Service Value ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 308-313
Papers
New Internet Service Pattern Based on Asset AgentFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Papers
Design and Implementation of an Efficient Communication Protocol Based on Hyper TransportFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
Satellite Network Range SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Papers
Rethinking the Building Block: A Profiling Methodology for UDP FlowsFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
Papers
MT3-DA: Multicast Optimization Mechanism Based on Transmission Time and Interference Minimization in WMNsFull-text access may be available. Sign in or learn about subscription options.pp. 344-349
Papers
An Improved Header Compression Scheme for 6LoWPAN NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Papers
A Dynamic-alliance-based Adaptive Task Allocation Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 356-360
Papers
An Energy-Balanced Multicast Routing Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 361-365
Papers
A Novel Intelligent Traffic Light Control SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 372-376
Papers
A Data-driven Approach to Internet-based Business CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 377-382
Papers
Implementing the Compiler of UDLCFull-text access may be available. Sign in or learn about subscription options.pp. 383-387
Papers
A Cloud Computing Application in Land Resources Information ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
Papers
A Cloud Service for Automatic Marking of Virtual Experiment Based on Rules EngineFull-text access may be available. Sign in or learn about subscription options.pp. 394-399
Papers
Research on the Security Problem of Mobile Agent in Grid EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 400-403
Papers
Research on Key Management Infrastructure in Cloud Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 404-407
Papers
Ontology Automatic Constructing Based on Relational DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 412-415
Papers
Military Information Grid-based Integrated Photo-electric Detector TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 416-419
Papers
An Implementation of Novel Cloud Computing Model - Improved Map-reduce ModelFull-text access may be available. Sign in or learn about subscription options.pp. 420-425
Papers
Data Mining of Mass Storage Based on Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Papers
Searching Concepts and Association Relationships Based on Domain OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 432-437
Papers
Personalized Reuse of Business Process through the Metamodel for Process Model RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 438-443
Papers
On Ontology Management in Semantic Web Service RegistryFull-text access may be available. Sign in or learn about subscription options.pp. 444-449
Papers
A Novel Selection Approach for Transactional Web Services CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 450-456
Papers
A GSPN-based Grid Resource Schedule AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 457-460
Papers
Research on the Diameter and Average Diameter of Undirected Double-loop NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 461-466
Papers
A SOA Based Domain-Specific Chinese QA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 467-471
Papers
Performance Evaluation of P2P Sharing Computing System Using Queuing ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 472-477
Papers
Public Verifiable Threshold Decryption Scheme without Trusted CenterFull-text access may be available. Sign in or learn about subscription options.pp. 478-482
Papers
The Volunteer Computing Architecture Based on Role AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 483-488
Papers
Reliability Verification of Software Based on Cloud ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 489-494
Showing 100 out of 110