


default search action
NAS 2008: Chongqing, China
- Proceedings of The 2008 IEEE International Conference on Networking, Architecture, and Storage, NAS 2008, June 12-14, 2008, Chongqing, China. IEEE Computer Society 2008, ISBN 978-0-7695-3187-8

Storage Security and Reliability
- Fangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang:

Secure Remote Storage through Authenticated Encryption. 3-9 - Ilias Iliadis

, Xiao-Yu Hu:
Reliability Assurance of RAID Storage Systems for a Wide Range of Latent Sector Errors. 10-19 - Jianzhong Huang, Changsheng Xie, Haifeng Zhong:

Design and Analysis of a Scalable Third-Party Storage Security Protocol. 20-27 - Xu Li, Changsheng Xie, Qing Yang:

Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel. 28-35 - Connor L. C. Gray, Michael Hobbs

:
Fault Surviving Optimisation within Brick Based Storage System. 36-43
Mobile Ad Hoc Network
- Heming Cui, Cong Lin, Yong Xiang:

EBEM: An Event-driven Bandwidth Estimation Method for Mobile Ad Hoc Network. 47-52 - Yao Hua Ho

, Kien A. Hua, Ning Jiang, Fei Xie:
Dynamic Route Diversion in Connectionless Mobile Ad Hoc Networks. 53-61 - Yang He, Zhenyong Chen, Yuheng Liu, Zhang Xiong:

A Dynamic Congestion Control Based Multipath Routing Protocol for Video Transmission over Ad Hoc Networks. 62-69 - Yi-Sheng Su, Szu-Lin Su, Jung-Shian Li:

Joint Topology-Transparent Scheduling and QoS Routing in Mobile Ad Hoc Networks. 70-77
P2P and Replication Service
- Zhiyong Xu, Jizhong Han

, Laxmi N. Bhuyan:
POND: The Power of Zone Overlapping in DHT Networks. 81-88 - Yijun Lu, Ying Lu, Hong Jiang:

Adaptive Consistency Guarantees for Large-Scale Replicated Services. 89-96 - Hailong Cai, Ping Ge, Jun Wang

:
Applications of Bloom Filters in Peer-to-peer Systems: Issues and Questions. 97-103 - Yong Sun, Zhibin Zhang, Li Guo, Shuo Bai, Jianlong Tan:

A Effective Algorithm for Counting Active Flows Based on Loop Bloom Filter. 104-109
Network Routing and Message Authentication
- Long-Sheng Li, Yong-Yu Yang, Jhu-Shyuan Mei:

The Mobile Router Forwarding Scheme for Multicast in the NEMO. 113-120 - Minghu Zhang, Jian Shi, Ting Zhang, Yong Hu:

Hard Real-Time Communication over Multi-hop Switched Ethernet. 121-128 - Xiangfeng Guo, Jun Wei, Dongli Han:

Efficient Event Matching in Publish/subscribe: Based on Routing Destination and Matching History. 129-136 - Yong Feng, Zhongfu Wu, Jiang Zhong, Chunxiao Ye, Kaigui Wu:

A Novel Authentication Mechanism Based on CGA for BU Message Disposal in Mobile IPv6. 137-143
Short Papers I: Network
- Hong Jiang, Yu Qing Huang, Guo Ying Yang:

Formation and Network Chain Control in Sparse Robot ad hoc Networks based on Potential Field. 147-148 - Yu Liu, Hao Yin, Guangxi Zhu, Xuening Liu:

Peer-assisted Content Delivery Network for Live Streaming: Architecture and Practice. 149-150 - Ge He, Shangbo Zhou, Shan Liu:

A K-hop Based Clustering Algorithm in Ad Hoc Networks. 151-152 - Libing Wu

, Yanxiang He, Dan Wu, Jianqun Cui:
A Novel Interoperable Model of Distributed UDDI. 153-154 - Dafan Dong, Jianzhong Zhang, Ying Wu, Hongbo Lu, Gongyi Wu:

A Spam Filter System Based on P2P Architecture. 155-156 - Qingyang Song, Xingwei Wang, Zhongfeng Wen, Yao Lv, Feifei Xu:

A Dynamic Interface Activation Scheme for Vertical Handoffs. 157-158 - Fengna Gu, Zhibin Zhang, Lihong Wang:

A Trace-Driven Simulation Study of Load Balancing on Distributed NIDS. 159-160 - Yingjiu Guo, Chuang Lin, Hao Yin:

Formal Proof of the IDOP_SP Protocol Based on the Petri Net. 161-162 - Min Gao

, Lily Sun, Zhongfu Wu, Feng Jiang:
An EPN-based Method for Web Service Composition. 163-164 - Yuhua Liu, Jingju Gao, Yongcan Jia, Longquan Zhu:

A Cluster Maintenance Algorithm Based on LEACH-DCHS Protoclol. 165-166 - Imad Jawhar, Zouheir Trabelsi, Jameela Al-Jaroodi:

Towards More Reliable Source Routing in Wireless Networks. 167-168
Short Papers II: Storage and Architecture
- Chunxiao Ye, Zhongfu Wu, Jiang Zhong, Yong Feng:

Revocation in an Attribute-Based Delegation Model. 171-172 - Jiang Zhong, Luosheng Wen, Yong Feng, Chunxiao Ye:

Intrusion Detection Based on Density Level Sets Estimation. 173-174 - Jianzhong Huang, Changsheng Xie, Haifeng Zhong:

Design of a Secure Network Mirroring System for Data Sharing. 175-176 - Li Liu, Mingyu Chen, Yungang Bao, Jianwei Xu, Jianping Fan:

A Network Memory Architecture Model and Performance Analysis. 177-178 - Wen Zhang, Junwei Cao, Yisheng Zhong, Lianchen Liu, Cheng Wu:

Storage Aware Resource Allocation for Grid Data Streaming Pipelines. 179-180 - Jun Zhang, Xiao-Ya Fan, Song-He Liu:

A Precise Interrupts Mechanism Based on Micro-Operation Tracing of Instruction Boundary for Embedded Processor. 181-182 - Huaiyang Li, Changsheng Xie, Yan Liu, Qiang Cao:

Design and Implement of Snapshots in Linux Block Level. 183-184 - Zhaobin Liu, Haitao Li:

An Ontology-based Virtual Storage System. 185-186 - Wan Huang, Jizhong Han

, Jin He, Lisheng Zhang, Yao Lin:
Enabling RDMA Capability of InfiniBand Network for Java Applications. 187-188 - Tianzhou Chen, Mingteng Cao, Qingsong Shi:

Component-based Network Protocol Architecture for Multi-core. 189-190
System Reliability
- Yijun Lu, Xueming Li, Hong Jiang:

Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework. 193-200 - Qiang Zou, Dan Feng:

Characterization of Behavior Anomalies in a Representative File System. 201-206 - Weifeng Chen, Huan Li:

Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks. 207-214 - Dong Tian, Kaigui Wu, Xueming Li:

A Novel Adaptive Failure Detector for Distributed Systems. 215-221
Network Performance Evaluation
- Mikkel Hagen, Elizabeth Varki:

Fibre Channel Arbitrated Loop - Performance Analysis of Loop Tenancy Overhead. 225-232 - Weikuan Yu

, Nageswara S. V. Rao
, Jeffrey S. Vetter:
Experimental Analysis of InfiniBand Transport Services on WAN. 233-240 - Jeng-Yuh Chang, Xiao Su

:
An Evaluation of Transport Protocols in Peer-to-Peer Media Streaming. 241-247 - Guan Xin, Wang YongXin, Liu Fang:

An Energy-Efficient Clustering Technique for Wireless Sensor Networks. 248-252
Networked Storage Systems and Data Management
- Min Wang, Liu Liu, Wei Xu, Lu Xu:

An Analytical Performance Model of IP-SAN. 255-262 - Pei Yan, Song Jiang:

Spatial-Locality-Aware Virtual Storage Devices with Tangible QoS Expressions. 263-270 - Hua Wang

, Ke Zhou:
Goal-based Dependability Analysis and Improvement Framework for Network Storage Systems. 271-277 - Xuhui Liu, Shubin Zhang, Jin He, Jizhong Han

, Chengde Han, Zhiyong Xu:
VDMS: A Vector Data Management System for GIS Applications. 278-284
Distributed and Multi-Core Systems
- Haiying Shen, Yingwu Zhu, Wing-Ning Li:

Efficient and Locality-aware Resource Management in Wide-area Distributed Systems. 287-294 - Abdul Waheed, Jianxun Jason Ding, Jingnan Yao, Laxmi N. Bhuyan:

Performance Characterization of a Dual Quad-Core Based Application Oriented Networking System. 295-302 - Jie Chen, William A. Watson III:

Software Barrier Performance on Dual Quad-Core Opterons. 303-309 - Jun Zhang, Xiao-Ya Fan, Song-He Liu:

A Pollution Alleviative L2 Cache Replacement Policy for Chip Multiprocessor Architecture. 310-316
Memory and Parallel I/O
- Xiaojun Yang, Tao Liu, Fei Chen, Hailiang Cheng:

MemoryIO: An Extended I/O Technology in Embedded Systems. 319-325 - Richard A. Dutton, Weizhen Mao, Jie Chen, William A. Watson III:

Parallel Job Scheduling with Overhead: A Benchmark Study. 326-333 - Jinbo Xu, Yong Dou, Jie Zhou:

Rectangularly Multi-Module Memory System with Table-Based Dynamic Addressing Scheme. 334-341 - Zheng-Zhou Zhu, Zhongfu Wu, Shangbo Zhou:

An e-Learning Services Discovery Algorithm Based on User Satisfaction. 342-348
Network Security
- Jianhong Zhang, Qin Geng:

On the Security of Group Signature Scheme and Designated Verifier Signature Scheme. 351-358 - Haiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Gao:

Event-based Trust Framework Model in Wireless Sensor Networks. 359-364 - Hao Chen, Yu Chen:

A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks. 365-372 - Xiaohua Dong, Zhongfu Wu:

Research on Trust Evaluation Model of Grid Services. 373-380

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














