Management of Event Domains - The MEDiator-Approach (Englisch)
- Neue Suche nach: Aleksy, M.
- Neue Suche nach: Koblitz, L.
- Neue Suche nach: Schader, M.
- Neue Suche nach: Aleksy, M.
- Neue Suche nach: Koblitz, L.
- Neue Suche nach: Schader, M.
In:
11th International Conference on Parallel and Distributed Systems (ICPADS'05)
;
2
;
438-442
;
2005
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:Management of Event Domains - The MEDiator-Approach
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.01.2005
-
Format / Umfang:181017 byte
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2
-
Overlay network topologies for gossip-based multicastIgarashi, D. / Tsuchiya, T. / Kikuno, T. et al. | 2005
- 2
-
Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded SystemsYing Chen, / Zili Shao, / Zhuge, Q. / Chun Xue, / Bin Xiao, / Sha, E.H.-M. et al. | 2005
- 7
-
A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc NetworksYi-Cheng Huang, / Sheng-Yan Chuang, / Sheng-De Wang, et al. | 2005
- 8
-
An efficient multi-source multicast routing protocol in mobile ad hoc networksYi-Yu Su, / Shiow-Fen Hwang, / Chyi-Ren Dow, et al. | 2005
- 12
-
A Hierarchical Approach for Energy-Aware Distributed Embedded Intelligent Video SurveillanceMaier, A. / Rinner, B. / Schwabach, H. et al. | 2005
- 15
-
A scalable multimedia streaming model based-on multi-source streaming conceptItaya, S. / Enokido, T. / Takizawa, M. / Yamada, A. et al. | 2005
- 17
-
A Code Generation Algorithm for Affine Partitioning FrameworkShih-wei Liao, / Zhaohui Du, / Gansha Wu, / Lueh, G. et al. | 2005
- 22
-
Dynamic scheduling methods for computational grid environmentsSheng-De Wang, / I-Tar Hsu, / Zheng-Yi Huang, et al. | 2005
- 22
-
Constructing a Memory-Based Distributed Code Storage on Networked Diskless Embedded SystemsTai-Yi Huang, / Tsung-Yen Chen, / Po-Yu Chuang, / Tsung-Hao Li, et al. | 2005
- 27
-
Design of a Configurable Embedded Processor Architecture for DSP FunctionsHong Yue, / Ming-che Lai, / Kui Dai, / Zhi-ying Wang, et al. | 2005
- 29
-
A scalable semantic routing architecture for grid resource discoveryLi, J. / Son Vuong, et al. | 2005
- 32
-
Cramer-Rao Bound Analysis of Quantized RSSI Based Localization in Wireless Sensor NetworksHongchi Shi, / Xiaoli Li, / Yi Shang, / Dianfu Ma, et al. | 2005
- 36
-
Resource Co-Allocation : A Complementary Technique that Enhances Performance in Grid Computing EnvironmentAzougagh, D. / Jung-Lok Yu, / Seung Ryoul Maeng, et al. | 2005
- 37
-
Partitioning and Pipelined Scheduling of Embedded System Using Integer Linear ProgrammingShiann-Rong Kuang, / Chin-Yang Chen, / Ren-Zheng Liao, et al. | 2005
- 42
-
Design and Integration of Parallel Hough-Transform Chips for High-speed Line DetectionMing-Yang Chern, / Yi-Hsiang Lu, et al. | 2005
- 43
-
An adaptive multiparty protocol for secure data protectionQingkai Ma, / Liangliang Xiao, / I-Ling Yen, / Manghui Tu, / Bastani, F. et al. | 2005
- 47
-
Hardware-based Packet Classification Made Fast and EfficientPi-Chung Wang, / Chun-Liang Lee, / Chia-Tai Chan, / Hung-Yi Chang, et al. | 2005
- 50
-
Message authentication scheme for mobile ad hoc networksSato, F. / Takahira, H. / Mizuno, T. et al. | 2005
- 52
-
Embedded Fingerprint Verification SystemGwo-Cheng Chao, / Shung-Shing Lee, / Hung-Chuan Lai, / Shi-Jinn Horng, et al. | 2005
- 57
-
Using covert channels to evaluate the effectiveness of flow confidentiality measuresGraham, B. / Ye Zhu, / Xinwen Fu, / Bettati, R. et al. | 2005
- 58
-
Pulse Position Modulation for Active RFID SystemBin Zhen, / Mizuno, K. / Kobayashi, M. / Shimiz, M. et al. | 2005
- 63
-
Novel Anti-collision Algorithms for Fast Object Identification in RFID SystemJae-Ryong Cha, / Jae-Hyun Kim, et al. | 2005
- 64
-
Byzantine agreement protocol using hierarchical groupsYoshino, H. / Hayashibara, N. / Enokido, T. et al. | 2005
- 68
-
A node-based available bandwidth evaluation in IEEE 802.11 ad hoc networksSarr, C. / Chaudet, C. / Chelius, G. / Lassous, I. et al. | 2005
- 71
-
Adaptive box-based efficient fault-tolerant routing in 3D torusYamin Li, / Shietung Peng, / Wanming Chu, et al. | 2005
- 73
-
More Efficient and Secure Remote User Authentication Scheme using Smart CardsEun-Jun Yoon, / Kee-Young Yoo, et al. | 2005
- 78
-
Parallel self-diagnosis of large multiprocessor systems under the generalized comparison modelAbrougui, K. / Elhadef, M. et al. | 2005
- 78
-
An Efficient Authentication and Access Control Scheme Using Smart CardsYen-Cheng Chen, / Lo-Yao Yeh, et al. | 2005
- 83
-
Secure extensible type system for efficient embedded operating system by using metatypesGrimaud, G. / Hodique, Y. / Simplot-Ryl, I. et al. | 2005
- 85
-
A broadband P2P MoD system: its implementation and applicationShyh Chang Liu, / Tsung Hung Chen, / Ciyi Huang, et al. | 2005
- 88
-
Lower and Upper Bounds for Minimum Energy Broadcast and Sensing Problems in Sensor NetworksChelius, G. / Fleury, E. / Mignon, T. et al. | 2005
- 91
-
Synchronous transmission of real-time multimedia data in group communicationTojo, T. / Takizawa, M. et al. | 2005
- 93
-
Multicast Scaling Properties in Massively Dense Ad Hoc NetworksJacquet, P. / Rodolakis, G. et al. | 2005
- 98
-
An application-level multicast framework for large scale VOD servicesChen-Lung Chan, / Shih-Yu Huang, / Hung-Hsuan Chen, / Wei-Hao Tung, / Jia-Shung Wang, et al. | 2005
- 100
-
Choosing an Accurate Network Model using Domain AnalysisKonrad, A. / Zhao, B.Y. / Joseph, A.D. et al. | 2005
- 105
-
An Analytical Model for Performance Evaluation of Network Traffic Analysis SystemsFerro, A. / Delgado, I. / Munoz, A. / Liberal, F. et al. | 2005
- 105
-
I/O processor allocation for mesh cluster computersPangfeng Liu, / Chun-Chen Hsu, / Jan-Jan Wu, et al. | 2005
- 110
-
ModellingWeb transfer Performance over Asymmetric NetworksGuang Tan, / A, S. / Ligang He, / Xinuo Chen, / Spooner, D.P. et al. | 2005
- 112
-
GA-based automated task assignment on network processorsYan Shoumeng, / Zhou Xingshe, / Wang Lingmin, / Wang Haipeng, et al. | 2005
- 115
-
Analysis of Discrete-Time Queues with Space and Service Priorities for Arbitrary Arrival ProcessesAwan, I. / Fretwell, R. et al. | 2005
- 119
-
Performance improvement techniques for software distributed shared memoryByung-Hyun Yu, / Werstein, P. / Purvis, M. / Cranefield, S. et al. | 2005
- 120
-
Systematic Performance Modeling and Characterization of Heterogeneous IP NetworksBotta, A. / Emma, D. / Pescape, A. / Ventre, G. et al. | 2005
- 125
-
On the Performance of Probabilistic Flooding in Mobile Ad Hoc NetworksYassein, M.B. / Ould-Khaoua, M. / Papanastasiou, S. et al. | 2005
- 126
-
Network-aware data mapping on parallel molecular dynamicsHourai, Y. / Nishida, A. / Oyanagi, Y. et al. | 2005
- 130
-
Clustering Overhead and Convergence Time Analysis of the Mobility-based Multi-Hop Clustering Algorithm for Mobile Ad Hoc NetworksSeah, W.K.G. / Er, I.I. et al. | 2005
- 133
-
A novel micro-mobility management method in wireless communication networkYing-Hong Wang, / Chien-Wen Wang, / Hui-Min Huang, et al. | 2005
- 135
-
Performance Evaluation for Self-Healing Distributed ServicesGrishikashvili, E. / Pereira, R. / Taleb-Bendiab, A. et al. | 2005
- 140
-
Variants of multidimensional scaling for node localizationAhmed, A.A. / Yi Shang, / Hongchi Shi, et al. | 2005
- 140
-
The Impact of Random Waypoint Mobility on Infrastructure Wireless NetworksDennis Pong, / Moors, T. et al. | 2005
- 145
-
Performance Modeling of Hand Off calls in 4G NetworksLi, Y. / Awan, I. / Kouvatsos, D.D. et al. | 2005
- 147
-
Strategies for data location management in mobile ad hoc networksHara, T. et al. | 2005
- 150
-
An Evaluation Mechanism for QoS Management in Wireless SystemsBordbar, B. / Anane, R. / Okano, K. et al. | 2005
- 154
-
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networksNing Jiang, / Sheu, S. / Hua, K.A. / Onur Ozyer, et al. | 2005
- 155
-
Experimental Performance Modeling of MANET InterconnectivityZhi-Ang Ang Eu, / Winston Khoon-Guan Seah, / Kean-Soon Tan, et al. | 2005
- 161
-
Activities awareness in a cache networkShen-Tat Goh, / Kian-Lee Tan, et al. | 2005
- 162
-
Collaborative Virtual Traditional Japanese Crafting System over the Japan Gigabit Network IIIshida, T. / Miyakawa, A. / Shibata, Y. et al. | 2005
- 167
-
Interactive Controller for 3D Contents with Omni-directional DisplayYasuhara, Y. / Sakamoto, N. / Kukimoto, N. / Ebara, Y. / Koyamada, K. et al. | 2005
- 168
-
Relationship-aware content adaptation of structured Web documents for mobile computingWai Yip Lum, / Lau, F.C.M. et al. | 2005
- 172
-
Constructing real time simulation using by familiar PCMatsuura, H. / Abe, N. / Tanaka, K. / Taki, H. et al. | 2005
- 175
-
Modeling e-marketplaces with multi-agents Web servicesYinsheng Li, / Kuo-Ming Chao, / Younas, M. / Ying Huang, / Xiaohua Lu, et al. | 2005
- 177
-
Proposing Internet Analysis for Improvement of Usability on the 3D virtaul shared SpaceNakai, Y. / Shibata, Y. et al. | 2005
- 182
-
A hybrid Web server architecture for e-commerce applicationsCarrera, D. / Beltran, V. / Torres, J. / Ayguade, E. et al. | 2005
- 182
-
Position-Based Keyframe Selection for Human Motion AnimationTogawa, H. / Okuda, M. et al. | 2005
- 186
-
The Method to Evaluate a Similarity of Two Dimensional Data Using Critical Point GraphMinami, T. / Sakai, K. / Koyamada, K. et al. | 2005
- 189
-
Design of consistent SMIL documents for distributed multimedia presentation using temporal algebraChang, A.Y. et al. | 2005
- 191
-
Verbal/Nonverbal Communication Permitting User to Communicate with Virtual Environment without Special InstrumentYoshikawa, T. / Abe, N. / Tanaka, K. / Taki, H. / Yagi, T. / Shoujie He, et al. | 2005
- 196
-
Concurrency control based on significancy on rolesTomoya Enokido, / Makoto Takizawa, et al. | 2005
- 196
-
Peer Collaboration Modes and Private Room Services in TOMSCOPNakanishi, K. / Aonuma, T. / Jianhua Ma, / Jeneung Lee, et al. | 2005
- 201
-
GeDA-3D Agent ArchitectureZuniga, F. / Ramos, F.F. / Piza, I. et al. | 2005
- 203
-
A model for distributing and querying a data warehouse on a computing gridWehrle, P. / Miquel, M. / Tchounikine, A. et al. | 2005
- 206
-
Level of Detail Control for Texture on 3D MapsInatsuka, H. / Uchino, M. / Okuda, M. et al. | 2005
- 210
-
Performance analysis of an adaptive medium access control protocol for robot communicationJunpei Arai, / Akio Koyama, / Barolli, L. et al. | 2005
- 210
-
A Study of data reduction method with data accuracy for triangle dataFurukawa, T. / Akio Doi, et al. | 2005
- 214
-
Virtual Object Reconstruction in Real WorldSakai, K. / Sakamoto, N. / Koyamada, K. / Hasegawa, T. et al. | 2005
- 217
-
A sniff scheduling policy for power saving in Bluetooth piconetLi Xiang, / Yang Xiaozong, et al. | 2005
- 219
-
3D visualization techniques and its usefulness of eyeground images data sets generated by Optical Coherence TomographyIto, F. / Akio Doi, / Tokuda, M. et al. | 2005
- 223
-
Anycast extensions to OSPFv3Yue Wang, / Li Zhang, / Zhinan Han, / Wei Yan, et al. | 2005
- 224
-
Using a Declarative Language to Describe the Interactions in Virtual ScenesPiza, H.I. / Zuniga, F. / Ramos, F.F. et al. | 2005
- 230
-
Peer-to-peer based social interaction tools in ubiquitous learning environmentGuozhen Zhang, / Qun Jin, / Shih, T.K. et al. | 2005
- 230
-
Generating authentication data without keeping a private key for MobilityJong-Phil Yang, / Kyung-Hyune Rhee, et al. | 2005
- 235
-
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnetTatara, K. / Hori, Y. / Sakurai, K. et al. | 2005
- 237
-
An e-learning system for improving learner study efficiency by stimulating learner volitionTakahama, S. / Nakamura, N. / Barolli, L. / Koyama, A. / Durresi, A. / Sugita, K. et al. | 2005
- 240
-
Supporting E.cient Authorization in Delegation with SupervisionLui, RichardW.C. / Chow, S.S.M. / Hui, L.C.K. / Yiu, S.M. et al. | 2005
- 244
-
Game theory as a tool to strategize as well as predict nodes' behavior in peer-to-peer networksGupta, R. / Somani, A.K. et al. | 2005
- 245
-
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet AccessUuzunay, Y. / Bicakci, K. et al. | 2005
- 250
-
Path Analysis: Detection of Triangle Routing Attacks in IPv6Su-Kit Tang, / Kin-Yeung Wong, / Kai-Hau Yeung, et al. | 2005
- 250
-
Fair and scalable peer-to-peer games of turnsWierzbicki, A. / Kucharski, T. et al. | 2005
- 255
-
A Differentiated Message Delivery Architecture to Control SpamZhenhai Duan, / Yingfei Dong, / Gopalan, K. et al. | 2005
- 257
-
An efficient partition-based parallel PageRank algorithmBundit Manaskasemsak, / Arnon Rungsawang, et al. | 2005
- 260
-
The Security Requirement for off-line E-cash system based on IC CardHaeryong Park, / Kilsoo Chun, / Seungho Ahn, et al. | 2005
- 264
-
On the cooperation of Web clients and proxy cachesYiu Fai Sit, / Lau, F.C.M. / Cho-Li Wang, et al. | 2005
- 265
-
An Efficient and Practical Defense Method Against DDoS Attack at the Source-EndYanxiang He, / Wei Chen, / Wenling Peng, / Bin Xiao, et al. | 2005
- 270
-
Delegatable Access Control for Fine-Grained XMLJing Wu, / Seberry, J. / Yi Mu, / Chun Ruan, et al. | 2005
- 271
-
Performance evaluation of WWW conference system for supporting remote mental health care educationKaoru Sugita, / Noriki Uchida, / Akihiro Miyakawa, / De Marco, G. / Arjan Durresi, / Barolli, L. et al. | 2005
- 275
-
Separable and Anonymous Identity-Based Key IssuingSui, A. / Chow, S.S.M. / Hui, L.C.K. / Yiu, S.M. / Chow, K.P. / Tsang, W.W. / Chong, C.F. / Pun, K.H. / Chan, H.W. et al. | 2005
- 278
-
A three-layer architecture for reconciling compound actions in collaborative editing systemsHaifeng Shen, / Suiping Zhou, et al. | 2005
- 280
-
Group key distribution scheme for reducing required rekey message sizeNishi, R. / Sakurai, K. et al. | 2005
- 285
-
An Efficient Distributed Key Generation Protocol for Secure Communications with Causal OrderingCaimu Tang, / Chronopoulos, A.T. et al. | 2005
- 285
-
Integrated multimedia understanding for sensor and actor networks based on mental image directed semantic theoryYokota, M. / Hironaka, D. / Barolli, V. / Capi, G. et al. | 2005
- 290
-
Key Agreement for Heterogeneous Mobile Ad-Hoc GroupsManulis, M. et al. | 2005
- 292
-
Delay-energy aware routing protocol for sensor and actor networksDurresi, A. / Paruchuri, V. / Barolli, L. et al. | 2005
- 295
-
REAL TIME DIGITAL VIDEO WATERMARKING FOR DIGITAL RIGHTS MANAGEMENT VIA MODIFICATION OF VLCSHung-Hsun Liu, / Long-Wen Chang, et al. | 2005
- 299
-
A localization scheme for sensor networks based on wireless communication with anchor groupsOchi, H. / Tagashira, S. / Fujita, S. et al. | 2005
- 300
-
Sharing a Secret Two-Tone Image in Two Gray-Level ImagesChin-Chen Chang, / Jun-Chou Chuang, / Pei-Yu Lin, et al. | 2005
- 305
-
Universal Designated Multi Verifier Signature SchemesChing Yu Ng Willy, / Susilo, W. / Yi Mu, et al. | 2005
- 306
-
Process Migration for MPI Applications Based on Coordinated CheckpointingLi, Y. / Cao, J. / Guo, M. et al. | 2005
- 306
-
Process migration for MPI applications based on coordinated checkpointJiannong Cao, / Yinghao Li, / Minyi Guo, et al. | 2005
- 310
-
GBR: Grid Based Random Key Predistribution for Wireless Sensor NetworkSadi, M.G. / Dong Seong Kim, / Jong Sou Park, et al. | 2005
- 313
-
Performance evaluation of the concurrent execution of NAS parallel benchmarks with BYTE sequential benchmarks on a clusterGoscinski, A.M. / Wong, A.K.L. et al. | 2005
- 316
-
A Parallel Implementation of 2-D/3-D Image Registration for Computer-Assisted SurgeryIno, F. / Kawasaki, Y. / Tashiro, T. / Nakajima, Y. / Sato, Y. / Tamura, S. / Hagihara, K. et al. | 2005
- 320
-
A mechanism for tracking mobile agents in a cluster topologyTing-Yuan Yeh, / Wang, T.I. et al. | 2005
- 321
-
Rotational and Translational Alignment Errors in 3D Reconstruction of Virus Structures at High ResolutionYongchang Ji, / Marinescu, D.C. et al. | 2005
- 326
-
Multiple Sequence Alignment on an FPGAOliver, T. / Schmidt, B. / Maskell, D. / Nathan, D. / Clemens, R. et al. | 2005
- 328
-
Design and implementation of advanced multicast router based on cluster computingInoue, T. / Tani, S. / Takahashi, H. / Minato, S. / Miyazaki, T. / Toyoshima, K. et al. | 2005
- 331
-
Exploiting Multi-level Parallelism for Homology Search using General Purpose ProcessorsXiandong Meng, / Chaudhary, V. et al. | 2005
- 335
-
An efficient location-aided routing protocol for mobile ad hoc networksNen-Chung Wang, / Si-Ming Wang, et al. | 2005
- 336
-
Concurrent Numerical Simulation of Flow and Blood Clotting using the Lattice Boltzmann TechniqueBernsdorf, J. / Harrison, S.E. / Smith, S.M. / Lawford, P.V. / Hose, D.R. et al. | 2005
- 341
-
Protein Fold Recognition by Mixed Environment-Specific Amino Acid Substitution Mapping Using Neural NetworksNan Jiang, / Wu, W.X. / Mitchell, I. et al. | 2005
- 342
-
Efficient distributed QoS routing protocol for MPLS networksMan-Ching Yuen, / Weijia Jia, / Chi-Chung Cheung, et al. | 2005
- 346
-
PRec-I-DCM3: A Parallel Framework for Fast and Accurate Large Scale Phylogeny ReconstructionCoarfa, C. / Dotsenko, Y. / Mellor-Crummey, J. / Nakhleh, L. / Roshan, U. et al. | 2005
- 349
-
WIN: an efficient data placement strategy for parallel XML databasesNan Tang, / Guoren Wang, / Jeffrey Xu Yu, / Kam-Fai Wong, / Ge Yu, et al. | 2005
- 351
-
Numerical Solutions of Master Equation for Protein Folding KineticsYiming Li, et al. | 2005
- 356
-
Increasing resiliency through priority scheduling of asynchronous data replicationAdams, K.P. / Gracanin, D. / Hinchey, M.G. et al. | 2005
- 358
-
A Two-Level Strategy for Topology Control in Wireless Sensor NetworksBolian Yin, / Hongchi Shi, / Yi Shang, et al. | 2005
- 363
-
Distributed integrity checking for systems with replicated dataZiwich, R.P. / Duarte, E.P. / Albini, L.C.P. et al. | 2005
- 363
-
Avoiding the Bottlenecks in the MAC Layer in 802.15.4 Low Rate WPAN| 2005
- 368
-
A Configurable Time-Controlled Clustering Algorithm for Wireless Sensor NetworksSelvakennedy, S. / Sinnappan Sinnappan, S. et al. | 2005
- 370
-
A walkthrough from smart spaces to smart hyperspaces towards a smart world with ubiquitous intelligenceJianhua Ma, / Yang, L.T. / Apduhan, B.O. / Runhe Huang, / Barolli, L. / Takizawa, M. / Shih, T.K. et al. | 2005
- 373
-
Learning patterns in wireless sensor networks based on wavelet neural networksKulakov, A. / Davcev, D. / Stojanov, G. et al. | 2005
- 377
-
An architecture for observing physical world eventsBauer, M. / Rothermel, K. et al. | 2005
- 378
-
Evolution of Learning Parameters in a Team of Mobile AgentsCapi, G. / Yokota, M. et al. | 2005
- 383
-
A Simple Two-Dimensional Coded Detection Scheme in Wireless Sensor NetworksHung-Ta Pai, / Jing-Tian Sung, / Yunghsiang S. Han, et al. | 2005
- 384
-
A context based architecture for ubiquitous kid's safety care using space-oriented modelTakata, K. / Jianhua Ma, / Apduhan, B.O. et al. | 2005
- 388
-
WISER: Cooperative Sensing Using Mobile RobotsTobe, Y. / Suzuki, T. et al. | 2005
- 391
-
Verifying large numbers of cooperating adaptive agentsRouff, C. / Hinchey, M. / Truszkowski, W. / Rash, J. et al. | 2005
- 393
-
A Hybrid Wireless Network Approach to Support QoS Data TransmissionYing-Hong Wang, / Hung-Jen Mao, / Chih-Hsiao Tsai, / Jeang-You Lai, et al. | 2005
- 397
-
Routing through Backbone Structures in Sensor NetworksParuchuri, V. / Durresi, A. / Durresi, M. / Barolli, L. et al. | 2005
- 398
-
Study on enhanced strategies for TCP/IP offload enginesWen-Fong Wang, / Jun-Yau Wang, / Jin-Jie Li, et al. | 2005
- 402
-
Emergency Broadcast Protocol for Inter-Vehicle CommunicationsDurresi, M. / Durresi, A. / Barolli, L. et al. | 2005
- 405
-
An enhanced slow-start mechanism for TCP VegasCheng-Yuan Ho, / Yi-Cheng Chan, / Yaw-Chung Chen, et al. | 2005
- 407
-
Sensor Network Design and Implementation for Health Telecare and Diagnosis Assistance ApplicationsMing-Hui Jin, / Ren-Guey Lee, / Cheng-Yan Kao, / You-Rui Wu, / Hsu, D.F. / Tse-Ping Dong, / Kuan-Tsae Huang, et al. | 2005
- 412
-
RED tuning for TCP performance on the mobile ad hoc networksShin-Jer Yang, / Yung-Chieh Lin, et al. | 2005
- 412
-
A Smart Ambient Sound Aware Environment for Be Quiet RemindingJianhua Ma, / Jeneung Lee, / Yamanouchi, K. / Nishizono, A. et al. | 2005
- 417
-
Low Power Platform for Wireless Sensor NetworkShyi, C. / Wei-Feng Weng, / Hsien-Tsai Wu, et al. | 2005
- 419
-
Performance analysis of unstructured peer-to-peer schemes in integrated wired and wireless network environmentsLan Quan, / Kyung Geun Lee, / Pinkston, T.M. et al. | 2005
- 422
-
A Security Solution of WLAN Based on Public Key CryptosystemZhang Longjun, / Han Wei, / Zheng Dong, / Chen Kefei, et al. | 2005
- 426
-
Dynamic resource allocation for handoff in WATM networksBih-Hwang Lee, / Hsin-Pei Chen, / Su-Shun Huang, et al. | 2005
- 428
-
Comparing Persistent Computing with Autonomic ComputingJingde Cheng, et al. | 2005
- 432
-
A hint-based probabilistic protocol for unicast communications in MANETsBeraldi, R. / Querzoni, L. / Baldoni, R. et al. | 2005
- 433
-
A Simulation-Based Framework for Autonomic Web ServicesMancini, E. / Villano, U. / Rak, M. / Torella, R. et al. | 2005
- 438
-
Management of Event Domains - The MEDiator-ApproachAleksy, M. / Koblitz, L. / Schader, M. et al. | 2005
- 439
-
A distributed IP address assignment scheme for ad hoc networksJang-Ping Sheu, / Shin-Chih Tu, / Li-Hsiang Chan, et al. | 2005
- 443
-
Group Communication Protocol for Autonomic ComputingEnokido, T. / Takizawa, M. et al. | 2005
- 446
-
An MAC Protocol for Wireless Ad-hoc Networks Using Smart AntennasChen, W.-T. / Ho, T.-W. / Chen, Y.-C. et al. | 2005
- 446
-
An MAC protocol for wireless ad-hoc networks using smart antennas [an read a]Wen-Tsuen Chen, / Te-Wei Ho, / Yen-Cheng Chen, et al. | 2005
- 448
-
Secure Group Communication Based Scheme for Differential Access Control in Dynamic EnvironmentsKarandikar, Y. / Xukai Zou, / Yuanshun Dai, et al. | 2005
- 453
-
Distributed spanning tree algorithms for large scale traversalsDahan, S. et al. | 2005
- 453
-
Distributed Computer Systems Reliability Considering Imperfect Coverage and Common-Cause FailuresLiudong Xing, / Shrestha, A. et al. | 2005
- 458
-
Fault Tolerance Mechanisms for SLA-aware Resource ManagementHovestadt, M. et al. | 2005
- 460
-
Efficient distributed algorithms for parallel I/O schedulingJan-Jan Wu, / Yih-Fang Lin, / Pangfeng Liu, et al. | 2005
- 463
-
Challenges of Developing New Classes of NASA Self-Managing MissionsHinchey, M.G. / Rash, J.L. / Truszkowski, W.F. / Rouff, C.A. / Sterritt, R. et al. | 2005
- 467
-
A fair and space-efficient mutual exclusionSheng-Hsiung Chen, / Ting-Lu Huang, et al. | 2005
- 468
-
Reliability Improvement and Models in Autonomic ComputingMarshall, T. / Dai, Y.S. et al. | 2005
- 473
-
Towards Autonomic Management of NASA MissionsRouff, C.A. / Hinchey, M.G. / Rash, J.L. / Truszkowski, W.F. / Sterritt, R. et al. | 2005
- 474
-
On the connectedness of peer-to-peer overlay networksWeisheng Si, / MingChu Li, et al. | 2005
- 478
-
Towards an Autonomic Cluster Management System (ACMS) with Reflex AutonomicityTruszkowski, W. / Hinchey, M. / Sterritt, R. et al. | 2005
- 481
-
Charge-based flooding algorithm for looking up multimedia objects in peer-to-peer overlay networksWatanabe, K. / Enokido, T. / Takizawa, M. / Kim, K. et al. | 2005
- 483
-
Optimality of Control-Limit Type of Software Rejuvenation PolicyIto, H. / Dohi, T. et al. | 2005
- 488
-
Comparison of Software Reliability Assessment Methods for Open Source SoftwareTamura, Y. / Yamada, S. et al. | 2005
- 488
-
Autonomous topology optimization for unstructured peer-to-peer networksWan, H. / Ishikawa, N. / Hjelm, J. et al. | 2005
- 493
-
A Dynamic Programming Algorithm for Software Rejuvenation Scheduling under Distributed Computation CircumstanceOkamura, H. / Iwamoto, K. / Dohi, T. et al. | 2005
- 495
-
A highly efficient transport protocol for large capacity data files non-ordered block transfer on XCASTSumida, T. / Ito, K. et al. | 2005
- 500
-
What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case StudyKelly, W. / Sumitomo, J. et al. | 2005
- 502
-
F-TCP: light-weight TCP for file transfer in high bandwidth-delay product networksYongJae Chuh, / JaeSub Kim, / YongJoo Song, / Daeyeon Park, et al. | 2005
- 505
-
Performance Evaluation of Flooding in MANETs in the Presence of Multi-Broadcast TrafficYassein, M.B. / Khaoua, O. / Papanastasiou, S. et al. | 2005
- 509
-
Delay propagation properties with self-similarityNakashima, T. et al. | 2005
- 510
-
Performance evaluation of fully adaptive routing under different workloads and constant node buffer sizeRezazad, M. / Sarbazi-Azad, H. et al. | 2005
- 515
-
On the performance of routing algorithms in wormhole-switched multicomputer networksShahrabi, A. / Ould-Khaoua, M. et al. | 2005
- 516
-
Adaptive bandwidth sharing to support QoS in infrastructure wireless networksWei Kuang Lai, / Yuh-Chung Lin, et al. | 2005
- 520
-
BET: a hybrid bandwidth estimation toolBotta, A. / D'Antonio, S. / Pescape, A. / Ventret, G. et al. | 2005
- 523
-
Sharing and multiplexing of downlink traffic resources in mobile packet data networksChen-Nien Tsai, et al. | 2005
- 525
-
On the use of fuzzy logic to enhance mobile agents in distributed e-commercePreti, J.P.D. / de Castilho, F.M.B.M. / Sobral, J.B.M. / Juca, K. / Notare, M.M.A.N. / Boukerche, A. et al. | 2005
- 529
-
Efficient polynomial root finding using SIMD extensionsMoslemi, M. / Ahmadi, H. / Sarbazi-Azad, H. et al. | 2005
- 530
-
A traffic shedding algorithm for soft-handoff in MC-CDMA systemsBih-Hwang Lee, / Hsin-Pei Chen, / Su-Shun Huang, et al. | 2005
- 534
-
BECP: the scheduling policy based on best-effort in clustered VOD serversJunwei Wang, / Jun Liu, / Yuxing Peng, / Shiyao Jin, et al. | 2005
- 536
-
Parallel AI Game Playing Approach for Fast Processor Allocation in Hypercube Systems Using Veitch diagramSrinivasan, T. / Srikanth, P. / Praveen, K. / Subramaniam, H. et al. | 2005
- 536
-
Parallel AI game playing approach for faster processor allocation in hypercube systems using Veitch diagramSrinivasan, T. / Srikanth, P.J.S. / Praveen, K. / Subramaniam, L.H. et al. | 2005
- 540
-
The security analyses of RosettaNet in gridJingwei Liu, / Weidong Kou, / Rong Sun, / Yuxia Xiao, et al. | 2005
- 543
-
Efficient task scheduling with duplication for bounded number of processorsPasham, S. / Wei-Ming Lin, et al. | 2005
- 545
-
Dynamic RWA mechanism for group-based protection on IP over WDM networksChen-Shie Ho, / Zu-Yu Lee, / Chien-Huang Chang, / Jyunn-Yao Liao, et al. | 2005
- 550
-
A novel dynamic allocation and scheduling scheme with CPNA and FCF algorithms in distributed real-time systemsHai Jin, / Pengliu Tan, et al. | 2005
- 550
-
Automated discovery of brand piracy on the InternetPinsdorf, U. / Ebinger, P. et al. | 2005
- 555
-
Universal routing in distributed networksChen, K.F. / Sha, E.H.-M. / Bin Xiao, et al. | 2005
- 557
-
A sorted RSSI quantization based algorithm for sensor network localizationXiaoli Li, / Hongchi Shi, / Yi Shang, et al. | 2005
- 560
-
Causally ordered delivery with global clock in hierarchical groupNishimura, T. / Hayashibara, N. / Enokido, T. / Takizawa, M. et al. | 2005
- 564
-
Coverage and energy tradeoff in density control on sensor networksYi Shang, / Hongchi Shi, et al. | 2005
- 565
-
MeshTree: reliable low delay degree-bounded multicast overlaysTan, S.-W. / Waters, G. / Crawford, J. et al. | 2005
- 570
-
Enabling requirements-based programming for highly-dependable complex parallel and distributed systemsHinchey, M.G. / Rash, J.L. / Rouff, C.A. et al. | 2005
- 571
-
Tracking irregularly moving objects based on alert-enabling sensor model in sensor networksChao-Chun Chen, / Yu-Chi Chung, et al. | 2005
- 575
-
A route secure parallel dispatch model for mobile agents securitySarje, A. / Choudhari, D. / Rayanchu, S. et al. | 2005
- 578
-
HON-P2P: a cluster-based hybrid overlay network for multimedia object managementKacimi, M. / Yetongnon, K. / Yinghua Ma, / Chbeir, R. et al. | 2005
- 580
-
An architecture for multi-agent COTS software integration systemsGuo-Ming Fang, / Zeng-Wei Hong, / Jim-Min Lin, et al. | 2005
- 585
-
P-Hera: scalable fine-grained access control for P2P infrastructuresCrispo, B. / Sivasubramanian, S. / Mazzoleni, P. / Bertino, E. et al. | 2005
- 585
-
An image refining method using digital watermark via vector quantizationChin-Chen Chang, / Ju-Yuan Hsiao, / Po-Wen Lu, et al. | 2005
- 590
-
Zone-based traffic load balancing to ensure quality of service (QoS) in distributed systemsAhmed, A.U. / Saito, S. / Cheng, Z. et al. | 2005
- 592
-
A service discovery mechanism with load balance issue in decentralized peer-to-peer networkChing-Wen Chen, / Phui-Si Gan, / Chao-Hsiang Yang, et al. | 2005
- 595
-
A technique to analyse session initiation protocol trafficDe Marco, G. / Iacovoni, G. / Barolli, L. et al. | 2005
- 599
-
Efficient implementation of 3G-324M protocol stack for multimedia communicationWeijia Jia, / Bo Han, / Ji Shen, / Haohuan Fu, / Man-Ching Yuen, et al. | 2005
- 600
-
Two hops backup routing protocol in mobile ad hoc networksHsing-Lung Chen, / Chein-Hsin Lee, et al. | 2005
- 605
-
A dynamic caching mechanism for mobile ad hoc networksYing-Hong Wang, / Jenhui Chen, / Chih-Feng Chao, / Tai-Hong Yueh, et al. | 2005
- 606
-
Dynamic packet video rate control over wireless networkTakahata, K. / Uchida, N. / Shibata, Y. et al. | 2005
- 610
-
An application layer protocol interoperability design model for content evolution in the mobile InternetYamakami, T. et al. | 2005
- 613
-
A content-aware multimedia accessing model in ad hoc networksBo Yang, / Hurson, A.R. et al. | 2005
- 615
-
Parity placement schemes with generalized fault-tolerant technique in disk array systemsChih-Shing Tau, / Tzone-I Wang, et al. | 2005
- 620
-
An area-efficient architecture of Reed-Solomon codec for advanced RAID systemsMin-An Song, / I-Feng Lan, / Sy-Yen Kuo, et al. | 2005
- 620
-
Cycle Embedding on the M¨obius Cube with Both Faulty Nodes and Faulty EdgesSun-Yuan Hsieh, / Nai-Wen Chang, et al. | 2005
- 625
-
A declustering scheme with guaranteed worst-case additive error O(k/sup 1/(d-1)/) for d-dimensional range queriesChedid, F.B. et al. | 2005
- 627
-
Dependable networked RAID for the open source communityBreuer, P.T. / Wiebalck, A. et al. | 2005
- 629
-
A GPS-less self-positioning method for sensor networksHung-Chi Chu, / Rong-Hong Jan, et al. | 2005
- 634
-
Efficient allocation algorithms for flash file systemsLi-Fu Chou, / Pangfeng Liu, et al. | 2005
- 634
-
The development of the adaptive traffic signal control systemDeng, L.Y. / Hsu Chun Liang, / Chin-Thin Wang, / Ching-Sheng Wang, / Lun-Ping Hung, et al. | 2005
- 639
-
Static scheduling of periodic tasks in a decentralized real-time control system using an ILPThanikesavan, S. / Killat, U. et al. | 2005
- 641
-
Dynamic dispersion framework for router load balancingYunhuai Liu, / Ni, L.M. et al. | 2005
- 644
-
Transactional agent on distributed objectsTanaka, Y. / Hayashibara, N. / Enokido, T. / Takizawa, M. et al. | 2005
- 648
-
A CAC and routing framework for multimedia applications in broadband networks using fuzzy logic and genetic algorithmIkeda, M. / Barolli, L. / Ohba, S. / Capi, G. / Koyama, A. / Durresi, M. et al. | 2005
- 649
-
An efficient long-lived adaptive collect algorithmEnglert, B. et al. | 2005
- 654
-
A middleware for distributed system in heterogeneous wireless networksGowrishankar, / Varaprasad, G. / Raju, G.T. / Kahandige, S. / Venkataram, P. / Wahida Banu, R.S.D. et al. | 2005
- 655
-
A new quality of service multicast routing protocol based on genetic algorithmKoyama, A. / Nishie, T. / Arai, J. / Barolli, L. et al. | 2005
- 659
-
A distributed computing approach for marketable quality and profitability of corporationsBarolli, V. / Fukuda, H. et al. | 2005
- 661
-
Semantic access control in grid computingWang Xiaopeng, / Luo Junzhou, / Song Aibo, / Ma Teng, et al. | 2005
- 664
-
A simple quorum reconfiguration for open distributed environmentsLawi, A. / Oda, K. / Yoshida, T. et al. | 2005
- 668
-
A user-friendly platform for developing grid services over Globus Toolkit 3Morohoshi, H. / Runhe Huang, et al. | 2005
- 669
-
An on-line page-structure approximation scheme for Web proxiesJiunn-Jye Lee, / Pan-Lung Tsai, / Chin-Laung Lei, et al. | 2005
- 674
-
On-demand service in grid: architecture, design and implementationZhen Chun Huang, / Chuan He, / Lei Gu, / Jian Feng Wu, et al. | 2005
- 675
-
Enhanced collective communication functions using factorization and pairwise-exchange communicationDongyoung Kim, / Dongseung Kim, et al. | 2005
- 679
-
Design and implementation of mobile grid middleware for handsetsOhta, K. / Yoshikawa, T. / Nakagawa, T. / Inamura, H. et al. | 2005
- 682
-
MidGate: middleware platform for service gateway based distributed systemsPakkala, D. / Koivukoski, A. / Latvakoski, J. et al. | 2005
- 684
-
Validating the distributed ontology framework for deployment onto the semantic grid environmentFlahive, A. / Apduhan, B.O. / Rahayu, W. / Taniar, D. et al. | 2005
- 689
-
An efficient algorithm for solving distributed state estimator and laboratory implementationLin, S.-S. / Huay Chang, et al. | 2005
- 689
-
Towards a service-based collaborative framework for data-intensive grid applicationsHsi-Min Chen, / Chao-Chin Chang, / Jan-Jan Wu, / Chien-Min Wang, / Chun-Chen Hsu, et al. | 2005
- 694
-
MPI-I/O operations to a remote computer using JavaTsujita, Y. et al. | 2005
- 695
-
Application-oriented communication for networked systemsKarrer, R. / Gross, T. et al. | 2005
- 699
-
POERS: a performance-oriented energy reduction scheduling technique for a high-performance MPSoC architectureSlo-Li Chu, et al. | 2005
- 702
-
A visualization method of relations among knowledge-information for research activitiesNakamura, S. / Hayashi, N. / Yokoyama, S. / Miyadera, Y. et al. | 2005
- 703
-
An optimized algorithm of high spatial-temporal efficiency for MegablastGuangming Tan, / Lin Xu, / Yishan Jiao, / Shengzhong Feng, / Dongbo Bu, / Ninghui Sun, et al. | 2005
- 709
-
An active detecting method against SYN flooding attackBin Xiao, / Wei Chen, / Yanxiang He, / Sha, E.H.-M. et al. | 2005
- 709
-
Author index| 2005
- 716
-
IFTS: intrusion forecast and traceback based on union defense environmentFang-Yie Leu, / Wei-Jie Yang, / Wen-Kui Chang, et al. | 2005
- 723
-
Protecting IEEE 802.11 wireless LANs against the FCS false blocking attackShih-Tsung Liang, / Ming-Yi Weng, et al. | 2005
- 730
-
An approach to provide mobile agents with planning capability for P2P environmentJin-Wook Baek, / Yeom, H.Y. et al. | 2005
- 737
-
An intelligent agent-based mobile resource reservation schemeJui-Tang Wang, / Jen-Shun Yang, / Chien-Chao Tseng, et al. | 2005
- 743
-
AMUSE: an agent-based middleware for context-aware ubiquitous servicesTakahashi, H. / Suganuma, T. / Shiratori, N. et al. | 2005
- 750
-
Adaptive calculation of scores for fresh information retrievalUehara, M. / Sato, N. / Sakai, Y. et al. | 2005
- 756
-
Information retrieval based on temporal attributes in WWW archivesUehara, M. / Sato, N. et al. | 2005
- 762
-
A search scheme resulting in mixing compressed text filesKuo-Feng Hwang, / Chin-Chen Chang, / Chao-Wen Chan, et al. | 2005
- 769
-
A high performance implementation of an OAI-based federation serviceMaly, K. / Zubair, M. / Li Xuemei, et al. | 2005
- 775
-
System throughput maximization subject to delay and time fairness constraints in 802.11 WLANsYean-Fu Wen, / Lin, F.Y.-S. / Kun-Wei Lai, et al. | 2005
- 782
-
Efficient barrier synchronization on wireless computing systemsTzeng, N.-T. / Kasula, B. / Hongyi Wu, et al. | 2005
- 789
-
Access delay of efficient media access schemes for wireless LAN with smart antennaChangle Li, / Jiandong Li, / Xuelian Cai, et al. | 2005
- 795
-
An adaptive consistency maintenance approach for replicated continuous applicationsLing Chen, et al. | 2005
- 802
-
A pure lazy technique for scalable transaction processing in replicated databasesDaudjee, K. / Salem, K. et al. | 2005
- 809
-
Consistency management for partial replication in a high performance database clusterCoulon, C. / Pacitti, E. / Valduriez, P. et al. | 2005
- c1
-
11th International Conference on Parallel and Distributed Systems Workshops - Cover| 2005
- i
-
11th International Conference on Parallel and Distributed Systems - Title| 2005
- i
-
11th International Conference on Parallel and Distributed Systems Workshops - Title| 2005
- iv
-
11th International Conference on Parallel and Distributed Systems - Copyright| 2005
- iv
-
11th International Conference on Parallel and Distributed Systems Workshops - Copyright| 2005
- l
-
PMAC-PDG’05 Reviewers| 2005
- li
-
Message from the DPNA-2005 Chairs| 2005
- lii
-
DPNA-2005 Organizing Committee| 2005
- liii
-
DPNA-2005 Reviewers| 2005
- v
-
11th International Conference on Parallel and Distributed Systems Workshops - Table of Contents| 2005
- v
-
11th International Conference on Parallel and Distributed Systems - Table of Contents| 2005
- xiv
-
Message from the General Co-Chairs| 2005
- xl
-
HiPCoMB-2005 Reviewers| 2005
- xli
-
Message from the HWISE-2005 Chairs| 2005
- xlii
-
HWISE-2005 Organizing Committee| 2005
- xliii
-
HWISE-2005 Reviewers| 2005
- xliv
-
Message from the RAMPDS-2005 Chairs| 2005
- xlix
-
PMAC-PDG’05 Organizing Committee| 2005
- xlv
-
RAMPDS-2005 Organizing Committee| 2005
- xlvii
-
RAMPDS-2005 Reviewers| 2005
- xlviii
-
Message from the PMAC-PDG’05 Co-Chairs| 2005
- xv
-
Welcome from the Program Committee Chair| 2005
- xvi
-
Organizing Committee| 2005
- xxiii
-
Message from the PDES-2005 Chairs| 2005
- xxiv
-
PDES-2005 Organizing Committee| 2005
- xxix
-
Message from the PMWMNC-2005 Chairs| 2005
- xxv
-
PDES-2005 Reviewers| 2005
- xxvi
-
SaNSO 2005 Foreword| 2005
- xxvii
-
SaNSO-2005 Program Committee| 2005
- xxviii
-
SaNSO-2005 Reviewers| 2005
- xxx
-
PMWMNC-2005 Workshop Organizers| 2005
- xxxi
-
PMWMCN-2005 Reviewers| 2005
- xxxii
-
Message from the INVITE-2005 Chairs| 2005
- xxxiii
-
INVITE 2005 Organizing Committee| 2005
- xxxiv
-
INVITE 2005 Reviewers| 2005
- xxxix
-
HiPCoMB-2005 Organizing Committee| 2005
- xxxv
-
Message from the SNDS05 Chairs| 2005
- xxxvi
-
SNDS05 Organizing Committee| 2005
- xxxvii
-
SNDS05 reviewers| 2005
- xxxviii
-
Message from the HiPCoMB-2005 Chairs| 2005
-
Proceedings. 11th International Conference on Parallel and Distributed Systems| 2005