Default Cover Image

High Performance Computing and Communication & IEEE International Conference on Embedded Software and Systems, IEEE International Conference on

June 25 2009 to June 27 2009

Seoul, Korea

ISBN: 978-0-7695-3738-2

Table of Contents

Papers
Table of contentsFreely available from IEEE.pp. v-xii
Papers
Message from the Steering Committee ChairsFreely available from IEEE.pp. xvi
Papers
HPCC-09 ReviewersFreely available from IEEE.pp. xxvii
Papers
Title page iFull-text access may be available. Sign in or learn about subscription options.pp. i
A Cost Efficient Framework for Managing Distributed Resources in a Cluster EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 29-35
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Copyright PageFreely available from IEEE.pp. iv
Papers
Message from the General ChairsFreely available from IEEE.pp. xiv
Papers
Message from the Program ChairsFreely available from IEEE.pp. xv
Papers
Message from the Workshop ChairsFreely available from IEEE.pp. xvii
Papers
HPCC-09 Organizing CommitteeFreely available from IEEE.pp. xviii-xxvi
Papers
Message from the Workshop/Symposium OrganizersFreely available from IEEE.pp. xxviii-xxxi
Papers
Workshop/Symposium Organizing CommitteesFreely available from IEEE.pp. xxxii-xxxiv
A Massively Parallel Approach to Affine Transformataion in Medical Image RegistrationFull-text access may be available. Sign in or learn about subscription options.pp. 117-123
Papers
Evaluation of Coordinated Grid Scheduling StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Online Metatask Scheduling Heuristics for a Bidding-based Distributed SystemFull-text access may be available. Sign in or learn about subscription options.pp. 11-19
Papers
Graph-Based Task Replication for Workflow ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 20-28
Papers
Evaluating Provider Reliability in Grid Resource BrokeringFull-text access may be available. Sign in or learn about subscription options.pp. 36-43
Papers
A Streaming Intrusion Detection System for Grid Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 44-51
Papers
Grid Network Dimensioning by Modeling the Deadline Constrained Bulk Data TransfersFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Papers
Resource Leasing and the Art of Suspending Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 59-68
Papers
A Simple Performance Model for Multithreaded Applications Executing on Non-uniform Memory Access ComputersFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Papers
Decoupling as a Foundation for Large Scale Parallel ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 87-94
Papers
A Framework for Effective Memory Optimization of High Performance Computing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 95-102
Papers
Fast Parallel Expectation Maximization for Gaussian Mixture Models on GPUs Using CUDAFull-text access may be available. Sign in or learn about subscription options.pp. 103-109
Papers
Load Scheduling Strategies for Parallel DNA Sequencing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 124-131
Papers
Dynamic Communication-Efficient Parallel Sorting on SMPsFull-text access may be available. Sign in or learn about subscription options.pp. 132-138
A Game Theory Based Load-Balancing Routing with Cooperation Stimulation for Wireless Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 266-272
Papers
Parallel Dense Gauss-Seidel Algorithm on Many-Core ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 139-147
Papers
Matrix Inversion on the Cell/B.E. ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 148-153
Papers
Kahn Process Networks are a Flexible Alternative to MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 154-162
Papers
Performance of Triplet Based Interconnection Strategy for Multi-Core On-Chip ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
Papers
Dynamically Filtering Thread-Local Variables in Lazy-Lazy Hardware Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 171-179
Papers
On the Performance of Commit-Time-Locking Based Software Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 180-187
Papers
Balancing Locality and Parallelism on Shared-cache Multi-core SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 188-195
Papers
On Instruction-Level Method for Reducing Cache Penalties in Embedded VLIW ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 196-205
Papers
Automated Design of Logic Circuits with a Increasable Evolution ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 206-213
Papers
Priority-Based Hybrid Protocol in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Papers
Design of Structure-Free and Energy-Balanced Data Aggregation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 222-229
Papers
A High Energy Efficient Localization Algorithm for Wireless Sensor Networks Using Directional AntennaFull-text access may be available. Sign in or learn about subscription options.pp. 230-236
Papers
Localization of Wireless Sensor Networks Using a Moving Beacon with a Directional AntennaFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
Papers
A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 243-250
Papers
Dynamic Routing Layer for Data Query in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 251-257
Papers
Neighbors Investment Geographic Routing Algorithm in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 258-265
Papers
A Potential Based Routing Protocol for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 273-280
Papers
Link Quality Aware Route Discovery for Robust Routing and High Performance in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 281-288
Papers
Efficient Geo-tracking and Adaptive Routing of Mobile AssetsFull-text access may be available. Sign in or learn about subscription options.pp. 289-296
Papers
Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 297-304
Papers
6LoWPAN-SNMP: Simple Network Management Protocol for 6LoWPANFull-text access may be available. Sign in or learn about subscription options.pp. 305-313
Papers
On Achieving the Maximum Internet Capacity in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 314-321
Papers
A Frame-Based Architecture with Shared Buffers for Slotted Optical Packet SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 322-328
Papers
Efficient Java Communication Libraries over InfiniBandFull-text access may be available. Sign in or learn about subscription options.pp. 329-338
Papers
A Pattern-Based General Security Framework: An eBusiness Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 339-346
Papers
Polymorphic Worm Detection Using Signatures Based on Neighborhood RelationFull-text access may be available. Sign in or learn about subscription options.pp. 347-353
Papers
Adaptive Voice Spam Control with User Behavior AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 354-361
Papers
A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 362-368
Towards Predictive Modeling of Message-Passing CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 482-487
Papers
Reliability Optimization of Reconfigurable Computing-Based Fault-Tolerant SystemFull-text access may be available. Sign in or learn about subscription options.pp. 369-375
Papers
A Mixed Software Rejuvenation Policy for Multiple Degradations Software SystemFull-text access may be available. Sign in or learn about subscription options.pp. 376-383
Papers
N-Level Diskless CheckpointingFull-text access may be available. Sign in or learn about subscription options.pp. 384-391
Papers
Fast Live Cloning of Virtual Machine Based on XenFull-text access may be available. Sign in or learn about subscription options.pp. 392-399
Papers
Efficient Mining of Weighted Frequent Patterns over Data StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 400-406
Papers
Parallel and Distributed Frequent Pattern Mining in Large DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 407-414
Papers
Cache-aware load balancing vs. cooperative caching for distributed search enginesFull-text access may be available. Sign in or learn about subscription options.pp. 415-423
Papers
A Flexible Two-Layer Buffer Caching Scheme for Shared Storage CacheFull-text access may be available. Sign in or learn about subscription options.pp. 424-431
Papers
Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 432-437
Papers
Improving IGP Convergence through Distributed OSPF in Scalable RouterFull-text access may be available. Sign in or learn about subscription options.pp. 438-443
Papers
Double binary turbo coding for BPPM-TH and BPAM-DS UWB systemsFull-text access may be available. Sign in or learn about subscription options.pp. 444-449
Papers
packetC Language for High Performance Packet ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 450-457
Papers
Detection and location of malicious nodes based on source coding and multi-path transmission in WSNFull-text access may be available. Sign in or learn about subscription options.pp. 458-463
Papers
An ECN-Based Congestion Control Algorithm for TCP Enhancement in WLANFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Papers
A Hierarchical Localization Scheme for Large Scale Underwater Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 470-475
Papers
Adaptive Vertical Handoff Decision Algorithm for Wireless Heterogeneous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 476-481
Papers
Parallelization and Performance Analysis of an IMPES-based Oil-Water Reservoir SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 488-493
Papers
A Study of Bare PC Web Server Performance for Workloads with Dynamic and Static ContentFull-text access may be available. Sign in or learn about subscription options.pp. 494-499
A Comparison of Two Master-Worker Scheduling MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 597-602
Papers
Adjacency-Based Mesh Process Mapping for Irregular Cluster SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 500-505
Papers
A Lightweight Approach of Automatic Resource Configuration in Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 506-511
Papers
A Performance-based Dynamic Loop Partitioning on Grid Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 512-519
Papers
VL-DSC: A Dynamic Service Composition Based Model for Virtual Laboratory Platform and Its ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 520-526
Papers
General Euler Hadamard/DFT/DCT Polynomial Function for Complex Signal ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 533-538
Papers
Performance Analysis of NAND Flash-Based SSD for Designing a Hybrid FilesystemFull-text access may be available. Sign in or learn about subscription options.pp. 539-544
Papers
Orthogonal Instruction Encoding for a 16-bit Embedded Processor with Dynamic Implied Addressing ModeFull-text access may be available. Sign in or learn about subscription options.pp. 545-550
Papers
SSARC: The Short-Sighted Adaptive Replacement CacheFull-text access may be available. Sign in or learn about subscription options.pp. 551-556
Papers
On Mining Repeating Pattern with Gap ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 557-562
Papers
A Software Framework to Support Adaptive Applications in Distributed/Parallel ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 563-570
Papers
KBS-MAQAO: A Knowledge Based System for MAQAO ToolFull-text access may be available. Sign in or learn about subscription options.pp. 571-578
Papers
Networked Haptic Virtual Environments Supporting Ultra High Resolution DisplayFull-text access may be available. Sign in or learn about subscription options.pp. 579-584
Papers
A Quantitative Study of Memory System Interference in Chip Multiprocessor ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 622-629
Papers
A Case Study for Fault Tolerance Oriented Programming in Multi-core ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 630-635
Showing 100 out of 112