default search action
NAS 2008: Chongqing, China
- Proceedings of The 2008 IEEE International Conference on Networking, Architecture, and Storage, NAS 2008, June 12-14, 2008, Chongqing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3187-8
Storage Security and Reliability
- Fangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang:
Secure Remote Storage through Authenticated Encryption. 3-9 - Ilias Iliadis, Xiao-Yu Hu:
Reliability Assurance of RAID Storage Systems for a Wide Range of Latent Sector Errors. 10-19 - Jianzhong Huang, Changsheng Xie, Haifeng Zhong:
Design and Analysis of a Scalable Third-Party Storage Security Protocol. 20-27 - Xu Li, Changsheng Xie, Qing Yang:
Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel. 28-35 - Connor L. C. Gray, Michael Hobbs:
Fault Surviving Optimisation within Brick Based Storage System. 36-43
Mobile Ad Hoc Network
- Heming Cui, Cong Lin, Yong Xiang:
EBEM: An Event-driven Bandwidth Estimation Method for Mobile Ad Hoc Network. 47-52 - Yao Hua Ho, Kien A. Hua, Ning Jiang, Fei Xie:
Dynamic Route Diversion in Connectionless Mobile Ad Hoc Networks. 53-61 - Yang He, Zhenyong Chen, Yuheng Liu, Zhang Xiong:
A Dynamic Congestion Control Based Multipath Routing Protocol for Video Transmission over Ad Hoc Networks. 62-69 - Yi-Sheng Su, Szu-Lin Su, Jung-Shian Li:
Joint Topology-Transparent Scheduling and QoS Routing in Mobile Ad Hoc Networks. 70-77
P2P and Replication Service
- Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan:
POND: The Power of Zone Overlapping in DHT Networks. 81-88 - Yijun Lu, Ying Lu, Hong Jiang:
Adaptive Consistency Guarantees for Large-Scale Replicated Services. 89-96 - Hailong Cai, Ping Ge, Jun Wang:
Applications of Bloom Filters in Peer-to-peer Systems: Issues and Questions. 97-103 - Yong Sun, Zhibin Zhang, Li Guo, Shuo Bai, Jianlong Tan:
A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter. 104-109
Network Routing and Message Authentication
- Long-Sheng Li, Yong-Yu Yang, Jhu-Shyuan Mei:
The Mobile Router Forwarding Scheme for Multicast in the NEMO. 113-120 - Minghu Zhang, Jian Shi, Ting Zhang, Yong Hu:
Hard Real-Time Communication over Multi-hop Switched Ethernet. 121-128 - Xiangfeng Guo, Jun Wei, Dongli Han:
Efficient Event Matching in Publish/subscribe: Based on Routing Destination and Matching History. 129-136 - Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:
A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6. 137-143
Short Papers I: Network
- Hong Jiang, Yu Qing Huang, Guo Ying Yang:
Formation and Network Chain Control in Sparse Robot ad hoc Networks based on Potential Field. 147-148 - Yu Liu, Hao Yin, Guangxi Zhu, Xuening Liu:
Peer-assisted Content Delivery Network for Live Streaming: Architecture and Practice. 149-150 - Ge He, Shangbo Zhou, Shan Liu:
A K-hop Based Clustering Algorithm in Ad Hoc Networks. 151-152 - Libing Wu, Yanxiang He, Dan Wu, Jianqun Cui:
A Novel Interoperable Model of Distributed UDDI. 153-154 - Dafan Dong, Jianzhong Zhang, Ying Wu, Hongbo Lu, Gongyi Wu:
A Spam Filter System Based on P2P Architecture. 155-156 - Qingyang Song, Xingwei Wang, Zhongfeng Wen, Yao Lv, Feifei Xu:
A Dynamic Interface Activation Scheme for Vertical Handoffs. 157-158 - Fengna Gu, Zhibin Zhang, Lihong Wang:
A Trace-Driven Simulation Study of Load Balancing on Distributed NIDS. 159-160 - Yingjiu Guo, Chuang Lin, Hao Yin:
Formal Proof of the IDOP_SP Protocol Based on the Petri Net. 161-162 - Min Gao, Lily Sun, Zhongfu Wu, Feng Jiang:
An EPN-based Method for Web Service Composition. 163-164 - Yuhua Liu, Jingju Gao, Yongcan Jia, Longquan Zhu:
A Cluster Maintenance Algorithm Based on LEACH-DCHS Protoclol. 165-166 - Imad Jawhar, Zouheir Trabelsi, Jameela Al-Jaroodi:
Towards More Reliable Source Routing in Wireless Networks. 167-168
Short Papers II: Storage and Architecture
- Chunxiao Ye, Zhongfu Wu, Jiang Zhong, Yong Feng:
Revocation in an Attribute-Based Delegation Model. 171-172 - Jiang Zhong, Luosheng Wen, Yong Feng, Chunxiao Ye:
Intrusion Detection Based on Density Level Sets Estimation. 173-174 - Jianzhong Huang, Changsheng Xie, Haifeng Zhong:
Design of a Secure Network Mirroring System for Data Sharing. 175-176 - Li Liu, Mingyu Chen, Yungang Bao, Jianwei Xu, Jianping Fan:
A Network Memory Architecture Model and Performance Analysis. 177-178 - Wen Zhang, Junwei Cao, Yisheng Zhong, Lianchen Liu, Cheng Wu:
Storage Aware Resource Allocation for Grid Data Streaming Pipelines. 179-180 - Jun Zhang, Xiao-Ya Fan, Song-He Liu:
A Precise Interrupts Mechanism Based on Micro-Operation Tracing of Instruction Boundary for Embedded Processor. 181-182 - Huaiyang Li, Changsheng Xie, Yan Liu, Qiang Cao:
Design and Implement of Snapshots in Linux Block Level. 183-184 - Zhaobin Liu, Haitao Li:
An Ontology-based Virtual Storage System. 185-186 - Wan Huang, Jizhong Han, Jin He, Lisheng Zhang, Yao Lin:
Enabling RDMA Capability of InfiniBand Network for Java Applications. 187-188 - Tianzhou Chen, Mingteng Cao, Qingsong Shi:
Component-based Network Protocol Architecture for Multi-core. 189-190
System Reliability
- Yijun Lu, Xueming Li, Hong Jiang:
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework. 193-200 - Qiang Zou, Dan Feng:
Characterization of Behavior Anomalies in a Representative File System. 201-206 - Weifeng Chen, Huan Li:
Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks. 207-214 - Dong Tian, Kaigui Wu, Xueming Li:
A Novel Adaptive Failure Detector for Distributed Systems. 215-221
Network Performance Evaluation
- Mikkel Hagen, Elizabeth Varki:
Fibre Channel Arbitrated Loop - Performance Analysis of Loop Tenancy Overhead. 225-232 - Weikuan Yu, Nageswara S. V. Rao, Jeffrey S. Vetter:
Experimental Analysis of InfiniBand Transport Services on WAN. 233-240 - Jeng-Yuh Chang, Xiao Su:
An Evaluation of Transport Protocols in Peer-to-Peer Media Streaming. 241-247 - Guan Xin, Wang YongXin, Liu Fang:
An Energy-Efficient Clustering Technique for Wireless Sensor Networks. 248-252
Networked Storage Systems and Data Management
- Min Wang, Liu Liu, Wei Xu, Lu Xu:
An Analytical Performance Model of IP-SAN. 255-262 - Pei Yan, Song Jiang:
Spatial-Locality-Aware Virtual Storage Devices with Tangible QoS Expressions. 263-270 - Hua Wang, Ke Zhou:
Goal-based Dependability Analysis and Improvement Framework for Network Storage Systems. 271-277 - Xuhui Liu, Shubin Zhang, Jin He, Jizhong Han, Chengde Han, Zhiyong Xu:
VDMS: A Vector Data Management System for GIS Applications. 278-284
Distributed and Multi-Core Systems
- Haiying Shen, Yingwu Zhu, Wing-Ning Li:
Efficient and Locality-aware Resource Management in Wide-area Distributed Systems. 287-294 - Abdul Waheed, Jianxun Jason Ding, Jingnan Yao, Laxmi N. Bhuyan:
Performance Characterization of a Dual Quad-Core Based Application Oriented Networking System. 295-302 - Jie Chen, William A. Watson III:
Software Barrier Performance on Dual Quad-Core Opterons. 303-309 - Jun Zhang, Xiao-Ya Fan, Song-He Liu:
A Pollution Alleviative L2 Cache Replacement Policy for Chip Multiprocessor Architecture. 310-316
Memory and Parallel I/O
- Xiaojun Yang, Tao Liu, Fei Chen, Hailiang Cheng:
MemoryIO: An Extended I/O Technology in Embedded Systems. 319-325 - Richard A. Dutton, Weizhen Mao, Jie Chen, William A. Watson III:
Parallel Job Scheduling with Overhead: A Benchmark Study. 326-333 - Jinbo Xu, Yong Dou, Jie Zhou:
Rectangularly Multi-Module Memory System with Table-Based Dynamic Addressing Scheme. 334-341 - Zheng-Zhou Zhu, Zhongfu Wu, Shangbo Zhou:
An e-Learning Services Discovery Algorithm Based on User Satisfaction. 342-348
Network Security
- Jianhong Zhang, Qin Geng:
On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. 351-358 - Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Gao:
Event-based Trust Framework Model in Wireless Sensor Networks. 359-364 - Hao Chen, Yu Chen:
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. 365-372 - Xiaohua Dong, Zhongfu Wu:
Research on Trust Evaluation Model of Grid Services. 373-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.