


default search action
ISPA Workshops 2005: Nanjing, China
- Guihai Chen, Yi Pan, Minyi Guo, Jian Lu:

Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings. Lecture Notes in Computer Science 3759, Springer 2005, ISBN 3-540-29770-7
International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 2005)
- Di Wu, Ye Tian, Kam-Wing Ng:

Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments. 1-8 - Sanfeng Zhang, Guoxin Wu, Gang Chen, Libo Xu:

On Building and Updating Distributed LSI for P2P Systems. 9-16 - Yin Li, Fanyuan Ma, Liang Zhang:

Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network. 17-26 - Hanyu Liu, Yu Peng, Mao Yang, Yafei Dai:

Characterization of P2P File-Sharing System. 27-34 - Liu Fang, Ruonan Rao:

Analysis of GHT in Mobile Ad Hoc Networks. 35-44 - Xinli Huang, Fanyuan Ma, Yin Li:

Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization. 45-53 - Dario Catalano, Giancarlo Ruffo

, Rossano Schifanella
:
A P2P Market Place Based on Aggregate Signatures. 54-63 - Jun Li, Xun Kang:

Proof of Service in a Hybrid P2P Environment. 64-73 - Qiang Ding, Ke Xu, Hui-shan Liu:

Construct Optimal Diameter Network and d-partition Routing Algorithm. 74-81 - Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth:

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System. 82-90
International Workshop on Advanced Storage Technology and Autonomic Distributed Data (ASTD 2005)
- Hongcan Zhang, Jiwu Shu, Wei Xue, Dingxing Wang:

VTarget: An Improved Software Target Emulator for SANs. 91-100 - Jun Luo, Jiwu Shu, Wei Xue:

Design and Implementation of an Efficient Multipath for a SAN Environment. 101-110 - Tao Cai

, Shiguang Ju, JuenJie Zhao, DeJiao Niu:
Research of Hot-Spot Selection Algorithm in Virtual Address Switch. 111-119 - Yulin Wang, Guangjun Li, Xiaojun Wu, Shuisheng Lin:

An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays. 120-129 - Xiangguo Li, Jianhua Yang, Zhaohui Wu:

An NFSv4-Based Security Scheme for NAS. 130-139 - Changsheng Xie, Zhen Zhao, Jian Liu, Wei Wu:

Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System. 140-148 - Bigang Li, Jiwu Shu, Fei Mu, Weimin Zheng:

A Cluster LVM for SAN Environments. 149-158
International Workshop on Bioinformatics (BIOS 2005)
- Roy Varshavsky, Michal Linial

, David Horn
:
COMPACT: A Comparative Package for Clustering Assessment. 159-167 - Xiao-hua Xu, Ling Chen, Ping He:

Fast Sequence Similarity Computing with LCS on LARPBS. 168-175 - Ling Chen, Juan Chen, Yi Pan:

Fast Scalable Algorithm on LARPBS for Sequence Alignment. 176-185 - David B. Bracewell, Scott Russell, Annie S. Wu:

Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts. 186-195 - Chengyong Yang, Erliang Zeng, Tao Li, Giri Narasimhan

:
A Knowledge-Driven Method to Evaluate Multi-source Clustering. 196-202 - Jieyue He, Hae-Jin Hu, Robert W. Harrison, Phang C. Tai, Yisheng Dong, Yi Pan:

Understanding Protein Structure Prediction Using SVM_DT. 203-212 - Budi Ongkowijaya, Shilin Ding, Xiaoyan Zhu:

Various Features with Integrated Strategies for Protein Name Classification. 213-222
International Workshop on Grid Computing in China (GCIC 2005)
- Hai Jin, Chuanjiang Yi, Song Wu, Li Qi, Deqing Zou:

Uniform Authorization Management in ChinaGrid Support Platform. 223-231 - Yongwei Wu, Song Wu, Huashan Yu, Chunming Hu:

Introduction to ChinaGrid Support Platform. 232-240 - Xingwei Wang, Nan Jiang, Jialin Wang, Min Huang:

A Microeconomics-Based Resource Assignment Model for Grid Computing. 241-248 - Xiaoshe Dong

, Yinfeng Wang, Xiuqiang He, Hua Guo, Fang Zheng, Weiguo Wu:
The Campus Resource Management Based on Constellation Model in the ChinaGrid. 249-256 - Shoubin Dong, Pengfei Liu, Yicheng Cao, Zhengping Du:

Grid Computing Methodology for Protein Structure Prediction and Analysis. 257-266 - Xiangxu Meng, Shijun Liu, Rui Wang, Chenglei Yang, Hai Guo:

Applying Service Composition in Digital Museum Grid. 267-275 - Junzhou Luo, Aibo Song, Ye Zhu, Xiaopeng Wang, Teng Ma, Zhiang Wu, Yaobin Xu, Liang Ge:

Grid Supporting Platform for AMS Data Processing. 276-285 - Xiaowu Chen, Xixi Luo, Zhangsheng Pan, Qinping Zhao:

A CGSP-Based Grid Application for University Digital Museums. 286-296 - Weimin Zheng, Meizhi Hu, Lin Liu, Yongwei Wu, Jing Tie:

FleMA: A Flexible Measurement Architecture for ChinaGrid. 297-304 - Minglu Li, Chuliang Weng, Xinda Lu, Yong Yin, Qianni Deng:

A Resource Scheduling Strategy for the CFD Application on the Grid. 305-314
International Workshop on Information Assurance in Distributed Systems (IADS 2005)
- Mingwen Wang, Qingxin Zhu, Li Qing:

A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. 315-322 - Haifeng Qian, Zhenfu Cao

:
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. 323-331 - Yuan Zhou, Zhenfu Cao

, Zhenchuan Chai:
An Efficient Proxy-Protected Signature Scheme Based on Factoring. 332-341 - Shengbao Wang, Zhenfu Cao

, Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. 342-349 - Zhenchuan Chai, Zhenfu Cao

, Yuan Zhou:
Encryption Based on Reversible Second-Order Cellular Automata. 350-358 - Jing Xu, Zhenfeng Zhang, Dengguo Feng:

ID-Based Proxy Signature Using Bilinear Pairings. 359-367 - Zhenfeng Zhang, Dengguo Feng:

Efficient Fair Certified E-Mail Delivery Based on RSA. 368-377 - Liwu Zhang, Dengguo Feng:

Intrusion Tolerant CA Scheme with Cheaters Detection Ability. 378-386 - Zheng Qin, Na Li, Dafang Zhang, Nai-Zheng Bian:

Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. 387-396 - Dingsheng Wan, Qing Li, Guihai Chen

:
Research and Implementation of Workflow Interoperability Crossing Organizations. 397-402
International Workshop on Mobile Ad-Hoc and Ubiquitous Sensor Networks (MASN 2005)
- Peng Han, Haiguang Chen, Bo Yu, Dan Xu, Chuanshan Gao:

LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks. 403-411 - Panlong Yang, Chang Tian:

Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks. 412-421 - Amer Filipovic, Amitava Datta

, Chris McDonald:
Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. 422-433 - Kennie H. Jones, Kenneth N. Lodding, Stephan Olariu, Larry Wilson, Chunsheng Xin:

Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks. 434-443 - Xunxue Cui, Zhan Zhao, Qing Tao:

Probabilistic Behavior of Sensor Network Localization. 444-453 - Xiaomei Cao, Mao Lin Huang

, YueQuan Chen, Guihai Chen
:
Hybrid Authentication and Key Management Scheme for WSANs. 454-465 - Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen

:
Storage-Optimal Key Sharing with Authentication in Sensor Networks. 466-474
International Workshop on Service Grid Computing and Applications (SGCA 2005)
- Jiafu Hu, Nong Xiao, Yingjie Zhao, Wei Fu:

An Asynchronous Replica Consistency Model in Data Grid. 475-484 - Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen:

Distributed Access Control for Grid Environments Using Trust Management Approach. 485-495 - Zhangsheng Pan, Xiaowu Chen, Xiangyu Ji:

Research on Database Access and Integration in UDMGrid. 496-505 - Jiadi Yu, Minglu Li, Feng Hong

:
Resource Allocation Based on Pricing for Grid Computing Environments. 506-513 - Lixin Han, Guihai Chen

, Linping Sun, Li Xie:
CMSA: A Method for Construction and Maintenance of Semantic Annotations. 514-519 - Kun Wu, Han Dai, Yang Zhang, Sanglu Lu, Daoxu Chen, Li Xie:

NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations. 520-529 - Yaojun Han, Changjun Jiang, Xuemei Luo:

Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis. 530-539 - Hongbo Wan, Qianni Deng, Xinhua Lin, Xinda Lu, Minglu Li:

The Design and Implementation of Service Adapter in ShanghaiGrid Core. 540-548 - Yutong Lu, Zhiyu Shen, Enqiang Zhou, Min Zhu:

MCRM System: CIM-Based Multiple Clusters Manager. 549-558
International Workshop on Web Information Systems and Applications (WISA 2005)
- Lei Cao, Minglu Li, Jian Cao, Yi Wang:

Introduction to an Agent-Based Grid Workflow Management System. 559-568 - Heping Chen, Jinguang Gu, Xiaohui Li, Hongping Fang:

An XML Query Mechanism with Ontology Integration. 569-578 - Wan-Chun Dou, Guihai Chen

, Feng Su, Shijie Cai:
Implementation of Cooperative Cognition Under Web Environment. 579-588 - Sun-Moon Jo, Ki-Tae Kim, Hoon-Joon Kouh, Weon-Hee Yoo:

Access Authorization Policy for XML Document Security. 589-598 - Jing Mei, Elena Paslaru Bontas, Zuoquan Lin:

OWL2Jess: A Transformational Implementation of the OWL Semantics. 599-608 - Kiyoung Moon, Namje Park

, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou
:
Security Frameworks for Open LBS Based on Web Services Security Mechanism. 609-618 - Lei Xu, Baowen Xu, Changhai Nie:

Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method. 619-626 - Xiaochun Yang, Xiangyu Liu, Bin Wang, Ge Yu:

A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing. 627-636 - Yanping Yang, QingPing Tan, Yong Xiao:

Transformation-Driven Development of Composite Web Services. 637-646 - Fei Yu, Huang Huang, Cheng Xu, Xiao-peng Dai, Miaoliang Zhu:

Badness Information Audit Based on Image Character Filtering. 647-656 - Weifeng Zhang, Baowen Xu, Guoqiang Zhou:

User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache. 657-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














