Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:577927689:9250 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:577927689:9250?format=raw |
LEADER: 09250nam a22006255a 4500
001 013529581-5
005 20130208190600.0
008 121207s2012 gw | s ||0| 0|eng d
020 $a9783642356063
020 $a9783642356063
020 $a9783642356056
024 7 $a10.1007/978-3-642-35606-3$2doi
035 $a(Springer)9783642356063
040 $aSpringer
050 4 $aQA76.7-76.73
050 4 $aQA76.76.C65
072 7 $aUMX$2bicssc
072 7 $aUMC$2bicssc
072 7 $aCOM051010$2bisacsh
072 7 $aCOM010000$2bisacsh
082 04 $a005.13$223
100 1 $aPark, James J.
245 10 $aNetwork and Parallel Computing :$b9th IFIP International Conference, NPC 2012, Gwangju, Korea, September 6-8, 2012. Proceedings /$cedited by James J. Park, Albert Zomaya, Sang-Soo Yeo, Sartaj Sahni.
260 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg :$bImprint: Springer,$c2012.
300 $aXX, 647 p. 253 illus.$bdigital.
490 0 $aLecture Notes in Computer Science,$x0302-9743 ;$v7513
505 0 $aAn Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments -- DGraph: Algorithms for Shortgun Reads Assembly Using De Bruijn Graph -- Knowledge-Based Adaptive Self-Scheduling -- Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor -- A Scoring System for Short Answers on the Test in a Large Group -- Reference Variables for Dynamic, Reliable Packet Operations -- Are Heterogeneous Cellular Networks Superior to Homogeneous Ones? -- Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks -- A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems -- NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation -- Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network -- MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis --
505 0 $aBreaking a Robust Remote User Authentication Scheme Using Smart Cards -- An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs -- Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites -- Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing -- Small World Asynchronous Parallel Model for Genome Assembly -- UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines -- Fast Parallel Garner Algorithm for Chinese Remainder Theorem -- dMPI: Facilitating Debugging of MPI Programs via Deterministic Message Passing -- On Dynamic Communication Performance of a Hierarchical 3D-Mesh Network -- An Elastic Architecture Adaptable to Millions of Application Scenarios -- Demystifying Performance Predictions of Distributed FFT3D Implementations -- MAP-numa: Access Patterns Used to Characterize the NUMA Memory Access Optimization Techniques and Algorithms --
505 0 $amHLogGP: A Parallel Computation Model for CPU/GPU Heterogeneous Computing Cluster -- Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks -- Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method -- Improving the Performances of Internet-Based Marketplace for Technology: A Korean Case Study -- The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples -- An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records Design and Deployment of Testbed for Experimental Sensor Network Research -- Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device -- Smart Ring: A Model of Node Failure Detection in High Available Cloud Data Center -- EaSync: A Transparent File Synchronization Service across Multiple Machines -- Relationship between Correcting Code and Module Technique in Hiding Secret Data --
505 0 $aDifferent Characteristics of Radio Modules in Wireless Body Sensor Network Systems -- The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services -- Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education -- The Performances Study of EDCF with Block Ack in WLANs -- A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System -- A New Approach for Detecting SMTPFA Based on Entropy Measurement -- A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services -- The Effects of Governmental Subsidy on the Quality of Education in Taiwan’s Private Universities and Colleges -- Use of Patient Safety and Reporting Law and Ethics as Example -- The Instructional Design of a Web-Based Self-reflective Learning Portfolio for Skill Training --
505 0 $aThe Difference Analysis between Demographic Variables and Personal Attributes – The Case of Internal Auditors in Taiwan -- Success Factors and Problems Encountered in the Workplace Learning of University/College of Technology Students in Taiwan: A Five-Star Hotel as an Example -- Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness -- Soft Power: A Critical Factor for the Effectiveness and Development of a School -- Merging Grid into Clustering-Based Routing Protocol for Wireless Sensor Networks -- A Termination Detection Technique Using Gossip in Cloud Computing Environments -- OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science -- Using PCI Pass-Through for GPU Virtualization with CUDA -- Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options -- Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems --
505 0 $aPricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model -- Evolving Linear Discriminant in Continuously Growing Dimensional Space for Incremental Attribute Learning -- Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem -- Space Exploration of Multi-agent Robotics via Genetic Algorithm -- Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems -- Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units -- New Electronic Acupuncture System Using Intelligence -- A Runtime Environment for Distributed Mashups in Multi-device Scenarios -- A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks -- Nibble-CRC for Underwater Acoustic Communication -- An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations -- Research on a Smart Input Device Using Multimodal Bio-signal Interface --
505 0 $aCryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader -- Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme -- Energy-Efficiency Protocol for Securing the Wireless Sensor Networks -- A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI -- SNR-Based Partial Relay Selection Scheme over Multiple Relay Network -- Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency -- Algorithms Based on Finite Automata for Testing of Z-codes -- Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor.
520 $aThis book constitutes the refereed post-proceedings of the 9th IFIP International Conference on Network and Parallel Computing, NPC 2012, held in Gwangju, Korea, in September 2012. The 38 papers presented were carefully reviewed and selected from 136 submissions. The papers are organized in the following topical sections: algorithms, scheduling, analysis, and data mining; network architecture and protocol design; network security; paralel, distributed, and virtualization techniques; performance modeling, prediction, and tuning; resource management; ubiquitous communications and networks; and web, communication, and cloud computing. In addition, a total of 37 papers selected from five satellite workshops (ATIMCN, ATSME, Cloud&Grid, DATICS, and UMAS 2012) are included.
650 20 $aInformation retrieval.
650 20 $aInformation organization.
650 10 $aComputer science.
650 0 $aOperating systems (Computers)
650 0 $aComputer science.
650 0 $aComputer Communication Networks.
650 0 $aSoftware engineering.
650 0 $aComputer software.
650 0 $aInformation storage and retrieval systems.
650 24 $aProgramming Languages, Compilers, Interpreters.
650 24 $aComputer Communication Networks.
650 24 $aAlgorithm Analysis and Problem Complexity.
650 24 $aSoftware Engineering/Programming and Operating Systems.
650 24 $aOperating Systems.
700 1 $aZomaya, Albert.
700 1 $aYeo, Sang-Soo.
700 1 $aSahni, Sartaj.
776 08 $iPrinted edition:$z9783642356056
830 0 $aLecture notes in computer science ;$v7513.
988 $a20130104
906 $0VEN