Muutke küpsiste eelistusi

E-raamat: Grid and Pervasive Computing: 8th International Conference, GPC 2013, and Colocated Workshops, Seoul, Korea, May 9-11, 2013, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2013, held in Seoul, Korea, in May 2013 and the following colocated workshops: International Workshop on Ubiquitous and Multimedia Application Systems, UMAS 2013; International Workshop DATICS-GPC 2013: Design, Analysis and Tools for Integrated Circuits and Systems; and International Workshop on Future Science Technologies and Applications, FSTA 2013. The 111 revised papers were carefully reviewed and selected from numerous submissions. They have been organized in the following topical sections: cloud, cluster and grid; middleware resource management; mobile peer-to-peer and pervasive computing; multi-core and high-performance computing; parallel and distributed systems; security and privacy; ubiquitous communications, sensor networking, and RFID; ubiquitous and multimedia application systems; design, analysis and tools for integrated circuits and systems; future science technologies and applications; and green and human information technology.
Cloud, Cluster and Grid I
Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics
1(10)
Jonas Repschlaeger
Distributed Accounting in Scope of Privacy Preserving
11(12)
Marcus Hilbrich
Rene Jakel
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration
23(9)
Li Ruan
Jinbing Peng
Limin Xiao
Mingfa Zhu
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment
32(8)
Shyamala Loganathan
Saswati Mukherjee
Scaling Out Recommender System for Digital Libraries with MapReduce
40(8)
Lun-Chi Chen
Ping-J en Kuo
I-En Liao
Jyun-Yao Huang
Layering of the Provenance Data for Cloud Computing
48(11)
Muhammad Imran
Helmut Hlavacs
JCL: An OpenCL Programming Toolkit for Heterogeneous Computing
59(14)
Tyng-Yeu Liang
Yu-Jie Lin
Network-Aware Multiway Join for MapReduce
73(8)
Kenn Slagter
Ching-Hsien Hsu
Yeh-Ching Chung
Jong Hyuk Park
Automatic Resource Scaling for Web Applications in the Cloud
81(10)
Ching-Chi Lin
Jan-Jan Wu
Pangfeng Liu
Jeng-An Lin
Li-Chung Song
Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds
91(12)
Maxim Schnjakin
Christoph Meinel
An Improved Min-Min Task Scheduling Algorithm in Grid Computing
103(11)
Soheil Anousha
Mahmoud Ahmadi
Cloud, Cluster and Grid II
Heterogeneous Diskless Remote Booting System on Cloud Operating System
114(10)
Jin-Neng Wu
Yao-Hsing Ko
Kuo-Ming Huang
Mu-Kai Huang
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System
124(10)
Xiaohu Bai
Hai Jin
Xiaofei Liao
Xuanhua Shi
Zhiyuan Shao
Secure Hadoop with Encrypted HDFS
134(8)
Seonyoung Park
Youngseok Lee
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing
142(10)
Daeyong Jung
SungHo Chin
Kwang Sik Chung
HeonChang Yu
A Cloud Based Natural Disaster Management System
152(10)
Mansura Habiba
Shamim Akhter
A Hybrid Grid/Cloud Distributed Platform: A Case Study
162(8)
Mohamed Ben Belgacem
Haithem Hafsi
Nabil Abdennadher
Comparison of Two Yield Management Strategies for Cloud Service Providers
170(11)
Mohammad Mahdi Kashef
Azamat Uzbekov
Jorn Altmann
Matthias Hovestadt
Comparing Java Virtual Machines for Sensor Nodes -- First Glance: Takatuka and Darjeeling
181(8)
Oliver Maye
Michael Maaser
Research on Opinion Formation of Microblog in the View of Multi-agent Simulation
189(10)
Jianyong Zhang
Qihui Mi
Longji Hu
Yue Tang
Implementation of Cloud IaaS for Virtualization with Live Migration
199(9)
Chao-Tung Yang
Kuan-Lung Huang
William Cheng-Chung Chu
Fang-Yi Leu
Shao-Feng Wang
Middleware, Resource Management
Security Considerations in Cloud Computing Virtualization Environment
208(8)
Sang-Soo Yeo
Jong Hyuk Park
Medicine Rating Prediction and Recommendation in Mobile Social Networks
216(8)
Shuai Li
Fei Hao
Mei Li
Hee-Cheol Kim
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface
224(10)
Antero Taivalsaari
Tommi Mikkonen
Kari Systa
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment
234(10)
Francisco Lepe Salazar
Tatsuo Nakajima
Todorka Alexandrova
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks
244(9)
Glaucio H.S. Carvalho
Isaac Woungang
Md. Mizanur Rahman
Alagan Anpalagan
Desktop Grid Computing at the Age of the Web
253(9)
Leila Abidi
Christophe Cerin
Mohamed Jemni
A Novel Model for Greenhouse Control Architecture
262(8)
Miran Back
Myeongbae Lee
Honggean Kim
Taehyung Kim
Namjin Bae
Yongyun Cho
Jangwoo Park
Changsun Shin
Mobile, Peer-to-Peer and Pervasive Computing
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks
270(10)
Chittaranjan Hota
Vikram Nunia
Mario Di Francesco
Jukka K. Nurminen
Antti Yla-Jaaski
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments
280(8)
Chulhee Cho
Jae Young Choi
Younghwa Cho
Jong Pil Jeong
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications
288(11)
Kevin I-Kai Wang
Hee Jong Park
Zoran Salcic
Panith Ratnayaka
Architecture of a Context Aware Framework for Automated Mobile Device Configuration
299(10)
Md. Fazla Rabbi Opu
Emon Biswas
Mansura Habiba
Cheonshik Kim
AMM-PF: Additional Mobility Management Scheme Based on Pointer
Forwarding in PMIPv6 Networks
309(8)
Seung Yoon Park
Jae Young Choi
Jong Pil Jeong
Multi-core and High Performance Computing
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor
317(9)
Ying Zhang
Gen Li
Yongjin Li
Caixia Sun
Pingjing Lu
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM
326(10)
Yu Zhang
Hai Jin
Xiaofei Liao
Research on Log Pre-processing for Exascale System Using Sparse Representation
336(12)
Lei Zhu
Jianhua Gu
Tianhai Zhao
Yunlan Wang
Other GPC Related Topics
Using Event-Based Style for Developing M2M Applications
348(10)
Truong-Giang Le
Olivier Hermant
Matthieu Manceny
Renaud Pawlak
Renaud Rioboo
Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic Algorithm
358(9)
Xiaoling Wu
Huawei Fu
Xiaomin He
Guangcong Liu
Jianjun Li
Hainan Chen
Qianqiu Wang
Qing He
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System
367(9)
Young Sung Cho
Si Choon Noh
Song Chul Moon
Priority-Based Live Migration of Virtual Machine
376(10)
Bangjie Jiang
Junmin Wu
Xiaodong Zhu
Die Hu
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK
386(7)
Youngguk Kim
Heung-Gyoon Ryu
Postural Transition Detection Using a Wireless Sensor Activity Monitoring System
393(10)
Richelle LeMay
Sangil Choi
Jong-Hoon Youn
Jay Newstorm
Parallel and Distributed Systems
A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication
403(10)
Yong Wan
Dan Feng
Fang Wang
Tingwei Zhu
Friends Based Keyword Search over Online Social Networks
413(10)
Jinzhou Huang
Hai Jin
GPU Virtualization Support in Cloud System
423(10)
Chih-Yuan Yeh
Chung-Yao Kao
Wei-Shu Hung
Ching-Chi Lin
Pangfeng Liu
Jan-Jan Wu
Kuang-Chih Liu
MGMR: Multi-GPU Based MapReduce
433(10)
Yi Chen
Zhi Qiao
Hai Jiang
Kuan-Ching Li
Won Woo Ro
Security and Privacy
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity
443(10)
Sung-ju Kim
Byung Chul Kim
Jae Yong Lee
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment
453(11)
Jyun-Yao Huang
Chen-Kang Chiang
I-En Liao
Active One-Time Password Mechanism for User Authentication
464(8)
Chun-I Fan
Chien-Nan Wu
Chi-Yao Weng
Chung-Yu Lin
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection
472(10)
Jed Kao-Tung Chang
Chen Liu
Jean-Luc Gaudiot
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security
482(9)
Junyeong Bok
Heung-Gyoon Ryu
Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications
491(10)
Yuliang Shi
Zhen Jiang
Kun Zhang
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments
501(8)
Yao Ma
Hongwei Lu
Zaobin Gan
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs
509(8)
Yi Qin
Dan Feng
Wei Tong
Jingning Liu
Yang Hu
Zhiming Zhu
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath
517(9)
Isaac Woungang
Sanjay Kumar Dhurandher
Michael Sahai
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services
526(10)
Miyoung Jang
Jae-Woo Chang
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based Services
536(10)
Hyunjo Lee
Jae-Woo Chang
Ubiquitous Communications, Sensor Networking, and RFID
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks
546(10)
Chih-Hsiao Tsai
Kai-Ti Chang
Cheng-Han Tsai
Ying-Hong Wang
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles
556(7)
Junghoon Lee
Gyung-Leen Park
Hye-Jin Kim
Byung-Jun Lee
Seulbi Lee
Dae-Yong Im
Enabling Massive Machine-to-Machine Communications in LTE-Advanced
563(7)
Kyungkoo Jun
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks
570(7)
Hyun-Ho Shin
Seungjin Lee
Byung-Seo Kim
Smart Watch and Monitoring System for Dementia Patients
577(8)
Dong-Min Shin
DongIl Shin
Dongkyoo Shin
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems
585(9)
Daesik Kim
Seongkee Lee
Mirim Ahn
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services
594(8)
Hyun Ju Lee
Dongll Shin
Dongkyoo Shin
SooHan Kim
DNA-S: Dynamic Cellular Network Architecture for Smart Communications
602(10)
Taegyu Lee
Gi-Soo Chung
Ubiquitous and Multimedia Application Systems
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment
612(11)
Jaewan Shin
Dongkyoo Shin
Dongll Shin
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features
623(8)
Sunghee Lee
Seongah Chin
Emotion Recognition Technique Using Complex Biomedical Signal Analysis
631(10)
Guyoun Hwang
Heejun Cho
Dongkyoo Shin
Dongll Shin
RWA: Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network
641(8)
Soo Young Shin
Soo Hyun Park
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules
649(10)
Phan Trung Huy
Cheonshik Kim
Nguyen Tuan Anh
Le Quang Hoa
Ching-Nung Yang
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering
659(6)
Jin-Hong Kim
Seung-Cheon Kim
Design, Analysis and Tools for Integrated Circuits and Systems
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates
665(11)
Nan Zhang
Dejun Xie
Eng Gee Lim
Kaiyu Wan
Ka Lok Man
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees
676(10)
Nan Zhang
Kaiyu Wan
Eng Gee Lim
Ka Lok Man
A Resource-Centric Architecture for Service-Oriented Cyber Physical System
686(8)
Kaiyu Wan
Vangalur Alagar
Implied Volatilities of S&P 100 Index with Applications to Financial Market
694(6)
Jin Zheng
Nan Zhang
Dejun Xie
RF Characteristics of Wireless Capsule Endoscopy in Human Body
700(7)
Meng Zhang
Eng Gee Lim
Zhao Wang
Tammam Tillo
Ka Lok Man
Jing Chen Wang
Building a Laboratory Surveillance System via a Wireless Sensor Network
707(8)
Chi-Un Lei
J.J.C. Seon
Zhun Shen
Ka Lok Man
Danny Hughes
Youngmin Kim
S-Theory: A Unified Theory of Multi-paradigm Software Development
715(8)
Danny Hughes
Nelly Bencomo
Brice Morin
Christophe Huygens
Zhun Shen
Ka Lok Man
Future Science Technologies and Applications
Design of J-VTS Middleware Based on IVEF Protocol
723(7)
Taekyeong Kang
Namje Park
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol
730(7)
Youngsook Lee
Dongho Won
A Sequence Classification Model Based on Pattern Coverage Rate
737(9)
I-Hui Li
Jyun-Yao Huang
I-En Liao
Jin-Han Lin
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School
746(6)
Yeonghae Ko
Namje Park
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
752(9)
Youngseok Chung
Youngsook Lee
Dongho Won
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
761(6)
Mijin Kim
Namje Park
Dongho Won
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School
767(6)
Jaeho An
Namje Park
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection
773(8)
Namje Park
Yeonghae Ko
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System
781(7)
Mijin Kim
Namje Park
Security Requirement of End Point Security Software
788(8)
Hyun-Jung Lee
Youngsook Lee
Dongho Won
Collecting and Filtering Out Phishing Suspicious URLs Using Spam Trap System
796(7)
Inkyung Jeun
Youngsook Lee
Dongho Won
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity
803(8)
Hyunsik Yang
Jin Qiuyan
Hanwook Lee
Kwangwoo Lee
Dongho Won
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing
811(8)
Chun-Cheng Lin
Yi-Ling Lin
Wan-Yu Liu
Green and Human Information Technology
Topology Information Based Spare Capacity Provisioning in WDM Networks
819(7)
Hoyoung Hwang
Seung-Cheon Kim
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics
826(6)
Goo Yeon Lee
Hwa Jong Kim
Choong Kyo Jeong
Yong Lee
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System
832(6)
Jin-Hong Kim
Seung-Cheon Kim
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users
838(8)
Heejung Yu
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC
846(8)
Byung Joon Oh
Ki Young Lee
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm
854(6)
Xin Wang
Heung-Gyoon Ryu
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era
860(6)
Jaeho Lee
Yongjin Lee
Seung-Cheon Kim
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway
866(7)
Shu Chen
Rashid Ahmad
Byung-Gil Lee
Byung-Doo Kim
Do-Hyeun Kim
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks
873(7)
Wonhyuk Yang
Mohamed A. Ahmed
Ki-Beom Lee
Young-Chon Kim
VLC Based Multi-hop Audio Data Transmission System
880(6)
Le The Dung
Seungwan Jo
Beongku An
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless Networks
886(7)
Le The Dung
Sue Hyung Ha
Beongku An
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless Networks
893(6)
Sue Hyung Ha
Le The Dung
Beongku An
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation Support
899(8)
Dae-Man Do
Maeng-Hwan Hyun
Young-Bok Choi
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor Networks
907(7)
Joongjin Kook
A Study of Fire Refuge Guide Simulator Based on Sensor Networks
914(6)
Jun-Pill Boo
Sang-Chul Kim
Dong-Hwan Park
Hyo-Chan Bang
Do-Hyeun Kim
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array
920(6)
Kee-Won Kim
Jun-Cheol Jeon
Follower Classification Through Social Network Analysis in Twitter
926(6)
Jae-Wook Seol
Kwang-Yong Jeong
Kyung-Soon Lee
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264
932(7)
Yalin Wu
Sun-Woo Ko
The Development of Privacy Telephone Sets in Encryption System against Eavesdropping
939(6)
Seok-Pil Lee
Eui-seok Nahm
New ID-Based Proxy Signature Scheme with Message Recovery
945(8)
Eun-Jun Yoon
YongSoo Choi
Cheonshik Kim
Author Index 953