A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication (Englisch)
- Neue Suche nach: Wan, Yong
- Neue Suche nach: Feng, Dan
- Neue Suche nach: Wang, Fang
- Neue Suche nach: Zhu, Tingwei
- Neue Suche nach: Wan, Yong
- Neue Suche nach: Feng, Dan
- Neue Suche nach: Wang, Fang
- Neue Suche nach: Zhu, Tingwei
In:
Grid and Pervasive Computing
7
;
403-412
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication
-
Beteiligte:Wan, Yong ( Autor:in ) / Feng, Dan ( Autor:in ) / Wang, Fang ( Autor:in ) / Zhu, Tingwei ( Autor:in )
-
Erschienen in:Grid and Pervasive Computing , 7 ; 403-412Lecture Notes in Computer Science ; 7861, 7 ; 403-412
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Transparency in Cloud Business: Cluster Analysis of Software as a Service CharacteristicsRepschlaeger, Jonas et al. | 2013
- 11
-
Distributed Accounting in Scope of Privacy PreservingHilbrich, Marcus / Jäkel, René et al. | 2013
- 23
-
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes IntegrationRuan, Li / Peng, Jinbing / Xiao, Limin / Zhu, Mingfa et al. | 2013
- 32
-
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud EnvironmentLoganathan, Shyamala / Mukherjee, Saswati et al. | 2013
- 40
-
Scaling Out Recommender System for Digital Libraries with MapReduceChen, Lun-Chi / Kuo, Ping-Jen / Liao, I-En / Huang, Jyun-Yao et al. | 2013
- 48
-
Layering of the Provenance Data for Cloud ComputingImran, Muhammad / Hlavacs, Helmut et al. | 2013
- 59
-
JCL: An OpenCL Programming Toolkit for Heterogeneous ComputingLiang, Tyng-Yeu / Lin, Yu-Jie et al. | 2013
- 73
-
Network-Aware Multiway Join for MapReduceSlagter, Kenn / Hsu, Ching-Hsien / Chung, Yeh-Ching / Park, Jong Hyuk et al. | 2013
- 81
-
Automatic Resource Scaling for Web Applications in the CloudLin, Ching-Chi / Wu, Jan-Jan / Liu, Pangfeng / Lin, Jeng-An / Song, Li-Chung et al. | 2013
- 91
-
Implementation of Cloud-RAID: A Secure and Reliable Storage above the CloudsSchnjakin, Maxim / Meinel, Christoph et al. | 2013
- 103
-
An Improved Min-Min Task Scheduling Algorithm in Grid ComputingAnousha, Soheil / Ahmadi, Mahmoud et al. | 2013
- 114
-
Heterogeneous Diskless Remote Booting System on Cloud Operating SystemWu, Jin-Neng / Ko, Yao-Hsing / Huang, Kuo-Ming / Huang, Mu-Kai et al. | 2013
- 124
-
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage SystemBai, Xiaohu / Jin, Hai / Liao, Xiaofei / Shi, Xuanhua / Shao, Zhiyuan et al. | 2013
- 134
-
Secure Hadoop with Encrypted HDFSPark, Seonyoung / Lee, Youngseok et al. | 2013
- 142
-
VM Migration for Fault Tolerance in Spot Instance Based Cloud ComputingJung, Daeyong / Chin, SungHo / Chung, Kwang Sik / Yu, HeonChang et al. | 2013
- 152
-
A Cloud Based Natural Disaster Management SystemHabiba, Mansura / Akhter, Shamim et al. | 2013
- 162
-
A Hybrid Grid/Cloud Distributed Platform: A Case StudyBen Belgacem, Mohamed / Hafsi, Haithem / Abdennadher, Nabil et al. | 2013
- 170
-
Comparison of Two Yield Management Strategies for Cloud Service ProvidersKashef, Mohammad Mahdi / Uzbekov, Azamat / Altmann, Jörn / Hovestadt, Matthias et al. | 2013
- 181
-
Comparing Java Virtual Machines for Sensor NodesMaye, Oliver / Maaser, Michael et al. | 2013
- 189
-
Research on Opinion Formation of Microblog in the View of Multi-agent SimulationZhang, Jianyong / Mi, Qihui / Hu, Longji / Tang, Yue et al. | 2013
- 199
-
Implementation of Cloud IaaS for Virtualization with Live MigrationYang, Chao-Tung / Huang, Kuan-Lung / Chu, William Cheng-Chung / Leu, Fang-Yi / Wang, Shao-Feng et al. | 2013
- 208
-
Security Considerations in Cloud Computing Virtualization EnvironmentYeo, Sang-Soo / Park, Jong Hyuk et al. | 2013
- 216
-
Medicine Rating Prediction and Recommendation in Mobile Social NetworksLi, Shuai / Hao, Fei / Li, Mei / Kim, Hee-Cheol et al. | 2013
- 224
-
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User InterfaceTaivalsaari, Antero / Mikkonen, Tommi / Systä, Kari et al. | 2013
- 234
-
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors DiscernmentSalazar, Francisco Lepe / Nakajima, Tatsuo / Alexandrova, Todorka et al. | 2013
- 244
-
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless NetworksCarvalho, Glaucio H. S. / Woungang, Isaac / Rahman, Md Mizanur / Anpalagan, Alagan et al. | 2013
- 253
-
Desktop Grid Computing at the Age of the WebAbidi, Leila / Cerin, Christophe / Jemni, Mohamed et al. | 2013
- 262
-
A Novel Model for Greenhouse Control ArchitectureBaek, Miran / Lee, Myeongbae / Kim, Honggean / Kim, Taehyung / Bae, Namjin / Cho, Yongyun / Park, Jangwoo / Shin, Changsun et al. | 2013
- 270
-
Enhanced Search in Unstructured Peer-to-Peer Overlay NetworksHota, Chittaranjan / Nunia, Vikram / Francesco, Mario / Nurminen, Jukka K. / Ylä-Jääski, Antti et al. | 2013
- 280
-
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO EnvironmentsCho, Chulhee / Choi, Jae Young / Cho, Younghwa / Jeong, Jong Pil et al. | 2013
- 288
-
A System-Level Approach for Designing Context-Aware Distributed Pervasive ApplicationsWang, Kevin I-Kai / Park, HeeJong / Salcic, Zoran / Ratnayaka, Panith et al. | 2013
- 299
-
Architecture of a Context Aware Framework for Automated Mobile Device ConfigurationOpu, Md. Fazla Rabbi / Biswas, Emon / Habiba, Mansura / Kim, Cheonshik et al. | 2013
- 309
-
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 NetworksPark, Seung Yoon / Choi, Jae Young / Jeong, Jong Pil et al. | 2013
- 317
-
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream ProcessorZhang, Ying / Li, Gen / Li, Yongjin / Sun, Caixia / Lu, Pingjing et al. | 2013
- 326
-
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STMZhang, Yu / Jin, Hai / Liao, Xiaofei et al. | 2013
- 336
-
Research on Log Pre-processing for Exascale System Using Sparse RepresentationZhu, Lei / Gu, Jianhua / Zhao, Tianhai / Wang, Yunlan et al. | 2013
- 348
-
Using Event-Based Style for Developing M2M ApplicationsLe, Truong-Giang / Hermant, Olivier / Manceny, Matthieu / Pawlak, Renaud / Rioboo, Renaud et al. | 2013
- 367
-
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation SystemCho, Young Sung / Noh, Si Choon / Moon, Song Chul et al. | 2013
- 376
-
Priority-Based Live Migration of Virtual MachineJiang, Bangjie / Wu, Junmin / Zhu, Xiaodong / Hu, Die et al. | 2013
- 386
-
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSKKim, Youngguk / Ryu, Heung-Gyoon et al. | 2013
- 393
-
Postural Transition Detection Using a Wireless Sensor Activity Monitoring SystemLeMay, Richelle / Choi, Sangil / Youn, Jong-Hoon / Newstorm, Jay et al. | 2013
- 403
-
A Dedicated Serialization Scheme in Homogeneous Cluster RPC CommunicationWan, Yong / Feng, Dan / Wang, Fang / Zhu, Tingwei et al. | 2013
- 413
-
Friends Based Keyword Search over Online Social NetworksHuang, Jinzhou / Jin, Hai et al. | 2013
- 423
-
GPU Virtualization Support in Cloud SystemYeh, Chih-Yuan / Kao, Chung-Yao / Hung, Wei-Shu / Lin, Ching-Chi / Liu, Pangfeng / Wu, Jan-Jan / Liu, Kuang-Chih et al. | 2013
- 433
-
MGMR: Multi-GPU Based MapReduceChen, Yi / Qiao, Zhi / Jiang, Hai / Li, Kuan-Ching / Ro, Won Woo et al. | 2013
- 443
-
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov ComplexityKim, Sung-ju / Kim, Byung Chul / Lee, Jae Yong et al. | 2013
- 453
-
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage EnvironmentHuang, Jyun-Yao / Chiang, Chen-Kang / Liao, I-En et al. | 2013
- 464
-
Active One-Time Password Mechanism for User AuthenticationFan, Chun-I / Wu, Chien-Nan / Weng, Chi-Yao / Lin, Chung-Yu et al. | 2013
- 472
-
Hardware Acceleration for Cryptography Algorithms by Hotspot DetectionChang, Jed Kao-Tung / Liu, Chen / Gaudiot, Jean-Luc et al. | 2013
- 482
-
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High SecurityBok, Junyeong / Ryu, Heung-Gyoon et al. | 2013
- 491
-
Policy-Based Customized Privacy Preserving Mechanism for SaaS ApplicationsShi, Yuliang / Jiang, Zhen / Zhang, Kun et al. | 2013
- 501
-
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing EnvironmentsMa, Yao / Lu, Hongwei / Gan, Zaobin et al. | 2013
- 509
-
Per-File Secure Deletion Combining with Enhanced Reliability for SSDsQin, Yi / Feng, Dan / Tong, Wei / Liu, Jingning / Hu, Yang / Zhu, Zhiming et al. | 2013
- 517
-
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based MultipathWoungang, Isaac / Dhurandher, Sanjay Kumar / Sahai, Michael et al. | 2013
- 526
-
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based ServicesJang, Miyoung / Chang, Jae-Woo et al. | 2013
- 536
-
Density-Based K-Anonymization Scheme for Preserving Users’ Privacy in Location-Based ServicesLee, Hyunjo / Chang, Jae-Woo et al. | 2013
- 546
-
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor NetworksTsai, Chih-Hsiao / Chang, Kai-Ti / Tsai, Cheng-Han / Wang, Ying-Hong et al. | 2013
- 556
-
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric VehiclesLee, Junghoon / Park, Gyung-Leen / Kim, Hye-Jin / Lee, Byung-Jun / Lee, Seulbi / Im, Dae-Yong et al. | 2013
- 563
-
Enabling Massive Machine-to-Machine Communications in LTE-AdvancedJun, Kyungkoo et al. | 2013
- 570
-
Enhancements for Local Repair in AODV-Based Ad-Hoc NetworksShin, Hyun-Ho / Lee, Seungjin / Kim, Byung-Seo et al. | 2013
- 577
-
Smart Watch and Monitoring System for Dementia PatientsShin, Dong-Min / Shin, DongIl / Shin, Dongkyoo et al. | 2013
- 585
-
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks SystemsKim, Daesik / Lee, Seongkee / Ahn, Mirim et al. | 2013
- 594
-
A Classifier Algorithm Exploiting User’s Environmental Context and Bio-signal for U-Home ServicesLee, HyunJu / Shin, DongIl / Shin, Dongkyoo / Kim, SooHan et al. | 2013
- 602
-
DNA-S: Dynamic Cellular Network Architecture for Smart CommunicationsLee, Taegyu / Chung, Gi-Soo et al. | 2013
- 612
-
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous EnvironmentShin, Jaewan / Shin, Dongkyoo / Shin, DongIl et al. | 2013
- 623
-
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue FeaturesLee, Sunghee / Chin, Seongah et al. | 2013
- 631
-
Emotion Recognition Technique Using Complex Biomedical Signal AnalysisHwang, Guyoun / Cho, Heejun / Shin, Dongkyoo / Shin, DongIl et al. | 2013
- 641
-
RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor NetworkShin, Soo Young / Park, Soo Hyun et al. | 2013
- 649
-
Data Hiding Based on Palette Images Using Weak Bases of Z2-ModulesHuy, Phan Trung / Kim, Cheonshik / Anh, Nguyen Tuan / Hoa, Le Quang / Yang, Ching-Nung et al. | 2013
- 659
-
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software EngineeringKim, Jin-Hong / Kim, Seung-Cheon et al. | 2013
- 665
-
Parallel Generation of Optimal Mortgage Refinancing Threshold RatesZhang, Nan / Xie, Dejun / Lim, Eng Gee / Wan, Kaiyu / Man, Ka Lok et al. | 2013
- 676
-
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial TreesZhang, Nan / Wan, Kaiyu / Lim, Eng Gee / Man, Ka Lok et al. | 2013
- 686
-
A Resource-Centric Architecture for Service-Oriented Cyber Physical SystemWan, Kaiyu / Alagar, Vangalur et al. | 2013
- 694
-
Implied Volatilities of S&P 100 Index with Applications to Financial MarketZheng, Jin / Zhang, Nan / Xie, Dejun et al. | 2013
- 700
-
RF Characteristics of Wireless Capsule Endoscopy in Human BodyZhang, Meng / Lim, Eng Gee / Wang, Zhao / Tillo, Tammam / Man, Ka Lok / Wang, Jing Chen et al. | 2013
- 707
-
Building a Laboratory Surveillance System via a Wireless Sensor NetworkLei, Chi-Un / Seon, J. K. / Shen, Zhun / LokMan, Ka / Hughes, Danny / Kim, Youngmin et al. | 2013
- 715
-
S-Theory: A Unified Theory of Multi-paradigm Software DevelopmentHughes, Danny / Bencomo, Nelly / Morin, Brice / Huygens, Christophe / Shen, Zhun / Man, Ka Lok et al. | 2013
- 723
-
Design of J-VTS Middleware Based on IVEF ProtocolKang, Taekyeong / Park, Namje et al. | 2013
- 730
-
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange ProtocolLee, Youngsook / Won, Dongho et al. | 2013
- 737
-
A Sequence Classification Model Based on Pattern Coverage RateLi, I-Hui / Huang, Jyun-Yao / Liao, I-En / Lin, Jin-Han et al. | 2013
- 746
-
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary SchoolKo, Yeonghae / Park, Namje et al. | 2013
- 752
-
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility NetworksChung, Youngseok / Lee, Youngsook / Won, Dongho et al. | 2013
- 761
-
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret SharingKim, Mijin / Park, Namje / Won, Dongho et al. | 2013
- 767
-
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary SchoolAn, Jaeho / Park, Namje et al. | 2013
- 773
-
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online ProtectionPark, Namje / Ko, Yeonghae et al. | 2013
- 781
-
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid SystemKim, Mijin / Park, Namje et al. | 2013
- 788
-
Security Requirement of End Point Security SoftwareLee, Hyun-Jung / Lee, Youngsook / Won, Dongho et al. | 2013
- 796
-
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap SystemJeun, Inkyung / Lee, Youngsook / Won, Dongho et al. | 2013
- 803
-
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves AnonymityYang, Hyunsik / Qiuyan, Jin / Lee, Hanwook / Lee, Kwangwoo / Won, Dongho et al. | 2013
- 811
-
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated AnnealingLin, Chun-Cheng / Lin, Yi-Ling / Liu, Wan-Yu et al. | 2013
- 819
-
Topology Information Based Spare Capacity Provisioning in WDM NetworksHwang, Hoyoung / Kim, Seungcheon et al. | 2013
- 826
-
A Contents Service Profit Model Based on the Quality of Experience and User Group CharacteristicsLee, Goo Yeon / Kim, Hwa Jong / Jeong, Choong Kyo / Lee, Yong et al. | 2013
- 832
-
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive SystemKim, Jin-Hong / Kim, Seung-Cheon et al. | 2013
- 838
-
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary UsersYu, Heejung et al. | 2013
- 846
-
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MACOh, Byung Joon / Lee, Ki Young et al. | 2013
- 854
-
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC AlgorithmWang, Xin / Ryu, Heung-Gyoon et al. | 2013
- 860
-
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD EraLee, Jaeho / Lee, Yongjin / Kim, Seung-Cheon et al. | 2013
- 866
-
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a SeawayChen, Shu / Ahmad, Rashid / Lee, Byung-Gil / Kim, Byung-Doo / Kim, Do-Hyeun et al. | 2013
- 873
-
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS NetworksYang, Wonhyuk / Ahmed, Mohamed A. / Lee, Ki-Beom / Kim, Young-Chon et al. | 2013
- 880
-
VLC Based Multi-hop Audio Data Transmission SystemDung, Le The / Jo, Seungwan / An, Beongku et al. | 2013
- 886
-
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless NetworksDung, Le The / Ha, Sue Hyung / An, Beongku et al. | 2013
- 893
-
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless NetworksHa, Sue Hyung / Dung, Le The / An, Beongku et al. | 2013
- 899
-
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation SupportDo, Dae-Man / Hyun, Maeng-Hwan / Choi, Young-Bok et al. | 2013
- 907
-
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor NetworksKook, Joongjin et al. | 2013
- 914
-
A Study of Fire Refuge Guide Simulator Based on Sensor NetworksBoo, Jun-Pill / Kim, Sang-Chul / Park, Dong-Hwan / Bang, Hyo-Chan / Kim, Do-Hyeun et al. | 2013
- 920
-
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular ArrayKim, Kee-Won / Jeon, Jun-Cheol et al. | 2013
- 926
-
Follower Classification through Social Network Analysis in TwitterSeol, Jae-Wook / Jeong, Kwang-Yong / Lee, Kyung-Soon et al. | 2013
- 932
-
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264Wu, Yalin / Ko, Sun-Woo et al. | 2013
- 939
-
The Development of Privacy Telephone Sets in Encryption System against EavesdroppingLee, Seok-Pil / Nahm, Eui-seok et al. | 2013
- 945
-
New ID-Based Proxy Signature Scheme with Message RecoveryYoon, Eun-Jun / Choi, YongSoo / Kim, Cheonshik et al. | 2013
- E1
-
Erratum: Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic AlgorithmWu, Xiaoling / Fu, Huawei / He, Xiaomin / Liu, Guangcong / Li, Jianjun / Chen, Hainan / Wang, Qianqiu / He, Qing et al. | 2013