callback( { "result":{ "query":":facetid:toc:\"db/conf/gcc/gcc2010.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"186.23" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"96", "@dc":"96", "@oc":"96", "@id":"43383234", "text":":facetid:toc:db/conf/gcc/gcc2010.bht" } }, "hits":{ "@total":"96", "@computed":"96", "@sent":"96", "@first":"0", "hit":[{ "@score":"1", "@id":"4908100", "info":{"authors":{"author":[{"@pid":"77/8876","text":"Qiong-Fang Bian"},{"@pid":"295/3157","text":"Ting-Ting Hang"},{"@pid":"93/4010","text":"Hui Liu"},{"@pid":"68/8875","text":"Mu-yun Fang"}]},"title":"Research on the Diameter and Average Diameter of Undirected Double-loop Networks.","venue":"GCC","pages":"461-466","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/BianHLF10","doi":"10.1109/GCC.2010.95","ee":"https://doi.org/10.1109/GCC.2010.95","url":"https://dblp.org/rec/conf/gcc/BianHLF10"}, "url":"URL#4908100" }, { "@score":"1", "@id":"4908101", "info":{"authors":{"author":[{"@pid":"53/252","text":"Jing Cai"},{"@pid":"85/1218","text":"Zhibin Zhang"},{"@pid":"21/1048","text":"Peng Zhang"},{"@pid":"88/8876","text":"Xinbo Song"}]},"title":"Rethinking the Building Block: A Profiling Methodology for UDP Flows.","venue":"GCC","pages":"332-337","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/CaiZZS10","doi":"10.1109/GCC.2010.71","ee":"https://doi.org/10.1109/GCC.2010.71","url":"https://dblp.org/rec/conf/gcc/CaiZZS10"}, "url":"URL#4908101" }, { "@score":"1", "@id":"4908102", "info":{"authors":{"author":[{"@pid":"20/2389","text":"Jiuxin Cao"},{"@pid":"83/3266","text":"Biao Zhang"},{"@pid":"26/3849","text":"Bo Mao"},{"@pid":"58/2670-4","text":"Bo Liu 0004"}]},"title":"Constraint Rules-based Recovery for Business Transaction.","venue":"GCC","pages":"282-289","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/CaoZML10","doi":"10.1109/GCC.2010.63","ee":"https://doi.org/10.1109/GCC.2010.63","url":"https://dblp.org/rec/conf/gcc/CaoZML10"}, "url":"URL#4908102" }, { "@score":"1", "@id":"4908103", "info":{"authors":{"author":[{"@pid":"21/5521","text":"Ying Chen"},{"@pid":"10/2272","text":"Wenzhong Guo"},{"@pid":"86/2961","text":"Guolong Chen"}]},"title":"A Dynamic-alliance-based Adaptive Task Allocation Algorithm in Wireless Sensor Networks.","venue":"GCC","pages":"356-360","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ChenGC10","doi":"10.1109/GCC.2010.75","ee":"https://doi.org/10.1109/GCC.2010.75","url":"https://dblp.org/rec/conf/gcc/ChenGC10"}, "url":"URL#4908103" }, { "@score":"1", "@id":"4908104", "info":{"authors":{"author":[{"@pid":"83/3834","text":"Huacai Chen"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"92/2627","text":"Kan Hu"}]},"title":"Affinity-aware Proportional Share Scheduling for Virtual Machine System.","venue":"GCC","pages":"75-80","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ChenJH10","doi":"10.1109/GCC.2010.27","ee":"https://doi.org/10.1109/GCC.2010.27","url":"https://dblp.org/rec/conf/gcc/ChenJH10"}, "url":"URL#4908104" }, { "@score":"1", "@id":"4908105", "info":{"authors":{"author":[{"@pid":"07/3081","text":"Xiaohua Chen"},{"@pid":"43/1230","text":"Qiang Xu"}]},"title":"Military Information Grid-based Integrated Photo-electric Detector Technology.","venue":"GCC","pages":"416-419","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ChenX10","doi":"10.1109/GCC.2010.87","ee":"https://doi.org/10.1109/GCC.2010.87","url":"https://dblp.org/rec/conf/gcc/ChenX10"}, "url":"URL#4908105" }, { "@score":"1", "@id":"4908106", "info":{"authors":{"author":[{"@pid":"40/8876","text":"Yaodong Cheng"},{"@pid":"49/3800","text":"Lu Wang"},{"@pid":"71/8875","text":"Qiulan Huang"},{"@pid":"82/8876","text":"Jingyan Shi"}]},"title":"A Large Scale Data Management System for BESGrid.","venue":"GCC","pages":"521-525","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ChengWHS10","doi":"10.1109/GCC.2010.107","ee":"https://doi.org/10.1109/GCC.2010.107","url":"https://dblp.org/rec/conf/gcc/ChengWHS10"}, "url":"URL#4908106" }, { "@score":"1", "@id":"4908107", "info":{"authors":{"author":[{"@pid":"01/8876","text":"Thiago Damasceno Cordeiro"},{"@pid":"79/8875","text":"Douglas Brito Damalio"},{"@pid":"42/8876","text":"Nadilma Cintra Valenca Nunes Pereira"},{"@pid":"18/8101","text":"Patricia Takako Endo"},{"@pid":"32/7442","text":"André Vitor de Almeida Palhares"},{"@pid":"55/7441","text":"Glauco Estácio Gonçalves"},{"@pid":"s/DjamelSadok","text":"Djamel Fawzi Hadj Sadok"},{"@pid":"10/1554","text":"Judith Kelner"},{"@pid":"19/2941","text":"Bob Melander"},{"@pid":"04/1817","text":"Victor Souza"},{"@pid":"78/277","text":"Jan-Erik Mångs"}]},"title":"Open Source Cloud Computing Platforms.","venue":"GCC","pages":"366-371","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/CordeiroDPEPGSKMSM10","doi":"10.1109/GCC.2010.77","ee":"https://doi.org/10.1109/GCC.2010.77","url":"https://dblp.org/rec/conf/gcc/CordeiroDPEPGSKMSM10"}, "url":"URL#4908107" }, { "@score":"1", "@id":"4908108", "info":{"authors":{"author":[{"@pid":"79/292","text":"Bin Dai"},{"@pid":"73/7046","text":"Ying Peng"},{"@pid":"71/5780","text":"Bin Gong"}]},"title":"Parallel Option Pricing with BSDE Method on GPU.","venue":"GCC","pages":"191-195","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/DaiPG10","doi":"10.1109/GCC.2010.47","ee":"https://doi.org/10.1109/GCC.2010.47","url":"https://dblp.org/rec/conf/gcc/DaiPG10"}, "url":"URL#4908108" }, { "@score":"1", "@id":"4908109", "info":{"authors":{"author":[{"@pid":"39/8876","text":"Haipeng Deng"},{"@pid":"c/KaiChen6","text":"Kai Chen 0006"},{"@pid":"58/2670","text":"Bo Liu"},{"@pid":"29/8876","text":"Yunchao He"},{"@pid":"49/8767","text":"Kan Zhou"},{"@pid":"05/4236","text":"Yindong Yang"},{"@pid":"41/38","text":"Alei Liang"},{"@pid":"96/5680","text":"Haibing Guan"}]},"title":"Efficient Online Trace Building Using Code Replication.","venue":"GCC","pages":"70-74","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/DengCLHZYLG10","doi":"10.1109/GCC.2010.26","ee":"https://doi.org/10.1109/GCC.2010.26","url":"https://dblp.org/rec/conf/gcc/DengCLHZYLG10"}, "url":"URL#4908109" }, { "@score":"1", "@id":"4908110", "info":{"authors":{"author":[{"@pid":"58/3554","text":"Lingli Deng"},{"@pid":"92/3937","text":"Qing Yu"},{"@pid":"03/1756","text":"Jin Peng"},{"@pid":"94/830","text":"Ziyao Xu"}]},"title":"Replication-aware and Snowcrash-resistant VM Deployment for P2P Applications.","venue":"GCC","pages":"252-257","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/DengYPX10","doi":"10.1109/GCC.2010.58","ee":"https://doi.org/10.1109/GCC.2010.58","url":"https://dblp.org/rec/conf/gcc/DengYPX10"}, "url":"URL#4908110" }, { "@score":"1", "@id":"4908111", "info":{"authors":{"author":[{"@pid":"65/8876","text":"Wenjun Fan"},{"@pid":"24/2948","text":"Xudong Chen"},{"@pid":"59/3654","text":"Xuefeng Li"}]},"title":"Parallelization of RSA Algorithm Based on Compute Unified Device Architecture.","venue":"GCC","pages":"174-178","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/FanCL10","doi":"10.1109/GCC.2010.44","ee":"https://doi.org/10.1109/GCC.2010.44","url":"https://dblp.org/rec/conf/gcc/FanCL10"}, "url":"URL#4908111" }, { "@score":"1", "@id":"4908112", "info":{"authors":{"author":[{"@pid":"55/2632","text":"Jun Fang"},{"@pid":"57/2800","text":"Shoubao Yang"},{"@pid":"79/8876","text":"Wenyu Zhou"},{"@pid":"85/2210","text":"Hu Song"}]},"title":"Evaluating I/O Scheduler in Virtual Machines for Mapreduce Application.","venue":"GCC","pages":"64-69","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/FangYZS10","doi":"10.1109/GCC.2010.25","ee":"https://doi.org/10.1109/GCC.2010.25","url":"https://dblp.org/rec/conf/gcc/FangYZS10"}, "url":"URL#4908112" }, { "@score":"1", "@id":"4908113", "info":{"authors":{"author":[{"@pid":"38/8876","text":"Fangfang Wang"},{"@pid":"15/3489","text":"Tao Jun"},{"@pid":"90/8876","text":"Shao Birui"}]},"title":"An Energy-Balanced Multicast Routing Algorithm in Wireless Sensor Networks.","venue":"GCC","pages":"361-365","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/FangfangJB10","doi":"10.1109/GCC.2010.76","ee":"https://doi.org/10.1109/GCC.2010.76","url":"https://dblp.org/rec/conf/gcc/FangfangJB10"}, "url":"URL#4908113" }, { "@score":"1", "@id":"4908114", "info":{"authors":{"author":[{"@pid":"22/1485","text":"Caidong Gu"},{"@pid":"20/4544","text":"Kan Lu"},{"@pid":"82/4905","text":"Jian-Ping Wu"},{"@pid":"66/8875","text":"Ying-li Fu"},{"@pid":"27/2194","text":"Jingxiang Li"},{"@pid":"57/1041","text":"Changshui Xiao"},{"@pid":"46/7949","text":"Maoxin Si"},{"@pid":"34/5678","text":"Zhaobin Liu"}]},"title":"The Investigation of Cloud-Computing-based Image Mining Mechanism in Mobile Communication WEB on Android.","venue":"GCC","pages":"408-411","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/GuLWFLXSL10","doi":"10.1109/GCC.2010.85","ee":"https://doi.org/10.1109/GCC.2010.85","url":"https://dblp.org/rec/conf/gcc/GuLWFLXSL10"}, "url":"URL#4908114" }, { "@score":"1", "@id":"4908115", "info":{"authors":{"author":[{"@pid":"68/2180","text":"Xiao-Bing Guo"},{"@pid":"262/0620","text":"Zhiwei Xu"},{"@pid":"99/76-1","text":"Min Liu 0001"}]},"title":"New Internet Service Pattern Based on Asset Agent.","venue":"GCC","pages":"314-319","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/GuoXL10","doi":"10.1109/GCC.2010.68","ee":"https://doi.org/10.1109/GCC.2010.68","url":"https://dblp.org/rec/conf/gcc/GuoXL10"}, "url":"URL#4908115" }, { "@score":"1", "@id":"4908116", "info":{"authors":{"author":[{"@pid":"67/8876","text":"Wu Hai-Jia"},{"@pid":"47/2028","text":"Liu Peng"},{"@pid":"24/8876","text":"Chen Wei-Wei"}]},"title":"The Optimization Theory of File Partition in Network Storage Environment.","venue":"GCC","pages":"30-33","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/Hai-JiaPW10","doi":"10.1109/GCC.2010.19","ee":"https://doi.org/10.1109/GCC.2010.19","url":"https://dblp.org/rec/conf/gcc/Hai-JiaPW10"}, "url":"URL#4908116" }, { "@score":"1", "@id":"4908117", "info":{"authors":{"author":[{"@pid":"50/8876","text":"Xiangbin Han"},{"@pid":"04/6217","text":"Huadong Ma"}]},"title":"A Cloud Service for Automatic Marking of Virtual Experiment Based on Rules Engine.","venue":"GCC","pages":"394-399","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HanM10","doi":"10.1109/GCC.2010.82","ee":"https://doi.org/10.1109/GCC.2010.82","url":"https://dblp.org/rec/conf/gcc/HanM10"}, "url":"URL#4908117" }, { "@score":"1", "@id":"4908118", "info":{"authors":{"author":[{"@pid":"13/421","text":"Irfan Ul Haq"},{"@pid":"89/2040","text":"Erich Schikuta"},{"@pid":"71/2136","text":"Ivona Brandic"},{"@pid":"24/2942","text":"Adrian Paschke"},{"@pid":"08/422","text":"Harold Boley"}]},"title":"SLA Validation of Service Value Chains.","venue":"GCC","pages":"308-313","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HaqSBPB10","doi":"10.1109/GCC.2010.67","ee":"https://doi.org/10.1109/GCC.2010.67","url":"https://dblp.org/rec/conf/gcc/HaqSBPB10"}, "url":"URL#4908118" }, { "@score":"1", "@id":"4908119", "info":{"authors":{"author":[{"@pid":"94/8876","text":"Weijie He"},{"@pid":"56/5562","text":"Guoqing Li"},{"@pid":"05/3499","text":"Jing Zhang"},{"@pid":"96/1859","text":"Wenyang Yu"},{"@pid":"43/8433","text":"Jibo Xie"}]},"title":"Study on WPS Implement Framework with Shark Workflow.","venue":"GCC","pages":"511-516","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HeLZYX10","doi":"10.1109/GCC.2010.105","ee":"https://doi.org/10.1109/GCC.2010.105","url":"https://dblp.org/rec/conf/gcc/HeLZYX10"}, "url":"URL#4908119" }, { "@score":"1", "@id":"4908120", "info":{"authors":{"author":[{"@pid":"57/476","text":"Haiyan Hu"},{"@pid":"97/4626-13","text":"Yi Liu 0013"},{"@pid":"08/4002","text":"Depei Qian"}]},"title":"I/O Feature-based File Prefetching for Multi-Applications.","venue":"GCC","pages":"213-217","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HuLQ10","doi":"10.1109/GCC.2010.51","ee":"https://doi.org/10.1109/GCC.2010.51","url":"https://dblp.org/rec/conf/gcc/HuLQ10"}, "url":"URL#4908120" }, { "@score":"1", "@id":"4908121", "info":{"authors":{"author":[{"@pid":"63/7026-2","text":"Cheng Hu 0002"},{"@pid":"36/3235-2","text":"Yun Wang 0002"}]},"title":"A Novel Intelligent Traffic Light Control Scheme.","venue":"GCC","pages":"372-376","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HuW10","doi":"10.1109/GCC.2010.78","ee":"https://doi.org/10.1109/GCC.2010.78","url":"https://dblp.org/rec/conf/gcc/HuW10"}, "url":"URL#4908121" }, { "@score":"1", "@id":"4908122", "info":{"authors":{"author":[{"@pid":"65/8875","text":"Caihua Hu"},{"@pid":"73/401","text":"Ruisheng Zhang"},{"@pid":"15/8376","text":"Tongming Wei"},{"@pid":"51/7684","text":"Ruipeng Wei"},{"@pid":"52/8550","text":"Shuping Li"},{"@pid":"14/8823","text":"Yao Cheng"}]},"title":"Implementing the Compiler of UDLC.","venue":"GCC","pages":"383-387","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HuZWWLC10","doi":"10.1109/GCC.2010.80","ee":"https://doi.org/10.1109/GCC.2010.80","url":"https://dblp.org/rec/conf/gcc/HuZWWLC10"}, "url":"URL#4908122" }, { "@score":"1", "@id":"4908123", "info":{"authors":{"author":[{"@pid":"78/9998","text":"Ruwei Huang"},{"@pid":"77/8875","text":"Si Yu"},{"@pid":"89/7018","text":"Wei Zhuang"},{"@pid":"65/1767","text":"Xiaolin Gui"}]},"title":"Design of Privacy-Preserving Cloud Storage Framework.","venue":"GCC","pages":"128-132","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/HuangYZG10","doi":"10.1109/GCC.2010.36","ee":"https://doi.org/10.1109/GCC.2010.36","url":"https://dblp.org/rec/conf/gcc/HuangYZG10"}, "url":"URL#4908123" }, { "@score":"1", "@id":"4908124", "info":{"authors":{"author":[{"@pid":"37/8876","text":"Changyun Jia"},{"@pid":"98/8875","text":"Longye Tang"}]},"title":"Reliability Verification of Software Based on Cloud Service.","venue":"GCC","pages":"489-494","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/JiaT10","doi":"10.1109/GCC.2010.100","ee":"https://doi.org/10.1109/GCC.2010.100","url":"https://dblp.org/rec/conf/gcc/JiaT10"}, "url":"URL#4908124" }, { "@score":"1", "@id":"4908125", "info":{"authors":{"author":[{"@pid":"55/8875","text":"Haihua Jiang"},{"@pid":"20/8876","text":"Hai Lv"},{"@pid":"84/864","text":"Nan Wang"},{"@pid":"56/8875","text":"Rihua Di"}]},"title":"A Performance Monitoring Solution for Distributed Application System Based on JMX.","venue":"GCC","pages":"124-127","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/JiangLWD10","doi":"10.1109/GCC.2010.35","ee":"https://doi.org/10.1109/GCC.2010.35","url":"https://dblp.org/rec/conf/gcc/JiangLWD10"}, "url":"URL#4908125" }, { "@score":"1", "@id":"4908126", "info":{"authors":{"author":[{"@pid":"40/8839","text":"Xiaoyan Jiang"},{"@pid":"66/4615-51","text":"Yong Zhang 0051"},{"@pid":"04/5268","text":"Shijun Liu"}]},"title":"A Well-designed SaaS Application Platform Based on Model-driven Approach.","venue":"GCC","pages":"276-281","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/JiangZL10","doi":"10.1109/GCC.2010.62","ee":"https://doi.org/10.1109/GCC.2010.62","url":"https://dblp.org/rec/conf/gcc/JiangZL10"}, "url":"URL#4908126" }, { "@score":"1", "@id":"4908127", "info":{"authors":{"author":[{"@pid":"66/5168","text":"Lei Fang"},{"@pid":"00/8877","text":"Shen-jun Yao"},{"@pid":"52/5150","text":"Ting Liu"},{"@pid":"98/7112","text":"Ren-yi Liu"}]},"title":"A Cloud Computing Application in Land Resources Information Management.","venue":"GCC","pages":"388-393","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LeiSTR10","doi":"10.1109/GCC.2010.81","ee":"https://doi.org/10.1109/GCC.2010.81","url":"https://dblp.org/rec/conf/gcc/LeiSTR10"}, "url":"URL#4908127" }, { "@score":"1", "@id":"4908128", "info":{"authors":{"author":[{"@pid":"02/2264","text":"Lei Sun"},{"@pid":"367/3215","text":"Zishan Dai"},{"@pid":"367/3162","text":"Jindi Guo"}]},"title":"Research on Key Management Infrastructure in Cloud Computing Environment.","venue":"GCC","pages":"404-407","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LeiZJ10","doi":"10.1109/GCC.2010.84","ee":"https://doi.org/10.1109/GCC.2010.84","url":"https://dblp.org/rec/conf/gcc/LeiZJ10"}, "url":"URL#4908128" }, { "@score":"1", "@id":"4908129", "info":{"authors":{"author":[{"@pid":"72/872","text":"Qiang Li"},{"@pid":"99/2895","text":"Zhigang Huo"},{"@pid":"23/6324","text":"Ninghui Sun"}]},"title":"Building a Personal High Performance Computer with Heterogeneous Processors.","venue":"GCC","pages":"223-228","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiHS10","doi":"10.1109/GCC.2010.53","ee":"https://doi.org/10.1109/GCC.2010.53","url":"https://dblp.org/rec/conf/gcc/LiHS10"}, "url":"URL#4908129" }, { "@score":"1", "@id":"4908130", "info":{"authors":{"author":[{"@pid":"81/8501","text":"Chaoling Li"},{"@pid":"98/8495","text":"Miaomiao Song"},{"@pid":"30/1027","text":"Xia Lv"},{"@pid":"77/819","text":"Xiangang Luo"},{"@pid":"78/8875","text":"Jianqian Li"}]},"title":"The Spatial Data Sharing Mechanisms of Geological Survey Information Grid in P2P Mixed Network Systems Network Architecture Model.","venue":"GCC","pages":"258-263","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiSLLL10","doi":"10.1109/GCC.2010.59","ee":"https://doi.org/10.1109/GCC.2010.59","url":"https://dblp.org/rec/conf/gcc/LiSLLL10"}, "url":"URL#4908130" }, { "@score":"1", "@id":"4908131", "info":{"authors":{"author":[{"@pid":"09/8876","text":"Yongnan Li"},{"@pid":"31/5990","text":"Limin Xiao"},{"@pid":"07/8876","text":"Yaohui Hu"},{"@pid":"73/8875","text":"Aihua Liang"},{"@pid":"13/1467","text":"Li Tian"}]},"title":"Parallel Algorithms for Cryptosystem on Conic Curves over Finite Field Fp.","venue":"GCC","pages":"163-167","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiXHLT10","doi":"10.1109/GCC.2010.42","ee":"https://doi.org/10.1109/GCC.2010.42","url":"https://dblp.org/rec/conf/gcc/LiXHLT10"}, "url":"URL#4908131" }, { "@score":"1", "@id":"4908132", "info":{"authors":{"author":[{"@pid":"76/8876","text":"Xiao-Jian Liu"},{"@pid":"75/6568","text":"Yi Ren"},{"@pid":"61/3869","text":"Huadong Dai"}]},"title":"SPOTOS: A Safe Point Detector for Online Patching Commodity OS.","venue":"GCC","pages":"139-144","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuRD10","doi":"10.1109/GCC.2010.38","ee":"https://doi.org/10.1109/GCC.2010.38","url":"https://dblp.org/rec/conf/gcc/LiuRD10"}, "url":"URL#4908132" }, { "@score":"1", "@id":"4908133", "info":{"authors":{"author":[{"@pid":"76/8876","text":"Xiao-Jian Liu"},{"@pid":"75/6568","text":"Yi Ren"},{"@pid":"61/3869","text":"Huadong Dai"}]},"title":"Enhanced Non-Blocking Buffer: A High Performance Non-Blocking Message Communication Mechanism.","venue":"GCC","pages":"207-212","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuRD10a","doi":"10.1109/GCC.2010.50","ee":"https://doi.org/10.1109/GCC.2010.50","url":"https://dblp.org/rec/conf/gcc/LiuRD10a"}, "url":"URL#4908133" }, { "@score":"1", "@id":"4908134", "info":{"authors":{"author":[{"@pid":"21/6121-6","text":"Peng Liu 0006"},{"@pid":"47/807","text":"Xiaoying Wang"},{"@pid":"32/3484","text":"Aihua Bao"},{"@pid":"76/8875","text":"Xiaoxuan Wang"}]},"title":"Ontology Automatic Constructing Based on Relational Database.","venue":"GCC","pages":"412-415","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuWBW10","doi":"10.1109/GCC.2010.86","ee":"https://doi.org/10.1109/GCC.2010.86","url":"https://dblp.org/rec/conf/gcc/LiuWBW10"}, "url":"URL#4908134" }, { "@score":"1", "@id":"4908135", "info":{"authors":{"author":[{"@pid":"46/2375-14","text":"Hai Liu 0014"},{"@pid":"02/6143","text":"Weimin Zhang"},{"@pid":"19/1151","text":"Kaijun Ren"},{"@pid":"98/4143","text":"Zhuxi Zhang"}]},"title":"A Novel Selection Approach for Transactional Web Services Composition.","venue":"GCC","pages":"450-456","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuZRZ10","doi":"10.1109/GCC.2010.93","ee":"https://doi.org/10.1109/GCC.2010.93","url":"https://dblp.org/rec/conf/gcc/LiuZRZ10"}, "url":"URL#4908135" }, { "@score":"1", "@id":"4908136", "info":{"authors":{"author":[{"@pid":"32/8876","text":"Tiejiang Liu"},{"@pid":"74/4038","text":"Zhenyu Liu"},{"@pid":"41/2472","text":"Tun Lu"}]},"title":"A Location & Time Related Web Service Distributed Selection Approach for Composition.","venue":"GCC","pages":"296-301","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuZT10","doi":"10.1109/GCC.2010.65","ee":"https://doi.org/10.1109/GCC.2010.65","url":"https://dblp.org/rec/conf/gcc/LiuZT10"}, "url":"URL#4908136" }, { "@score":"1", "@id":"4908137", "info":{"authors":{"author":[{"@pid":"04/2118","text":"Yudong Liu"},{"@pid":"58/8875","text":"Qiwen Zhu"},{"@pid":"97/8875","text":"Wangwei Zhou"},{"@pid":"73/1149","text":"Jian Xu"},{"@pid":"83/8876","text":"Yongbing Ma"}]},"title":"EFAIoT: An Easy and Flexible Application Development System for Internet of Things.","venue":"GCC","pages":"498-500","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuZZXM10","doi":"10.1109/GCC.2010.102","ee":"https://doi.org/10.1109/GCC.2010.102","url":"https://dblp.org/rec/conf/gcc/LiuZZXM10"}, "url":"URL#4908137" }, { "@score":"1", "@id":"4908138", "info":{"authors":{"author":[{"@pid":"19/3950","text":"Huawen Liu"},{"@pid":"z/ShichaoZhang","text":"Shichao Zhang"},{"@pid":"41/6186","text":"Jianming Zhao"},{"@pid":"52/2048","text":"Xiangfu Zhao"},{"@pid":"12/2174","text":"Yuchang Mo"}]},"title":"A New Classification Algorithm Using Mutual Nearest Neighbors.","venue":"GCC","pages":"52-57","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LiuZZZM10","doi":"10.1109/GCC.2010.23","ee":"https://doi.org/10.1109/GCC.2010.23","url":"https://dblp.org/rec/conf/gcc/LiuZZZM10"}, "url":"URL#4908138" }, { "@score":"1", "@id":"4908139", "info":{"authors":{"author":[{"@pid":"52/1775","text":"Xin Lv"},{"@pid":"29/6405","text":"Congming Wang"}]},"title":"Public Verifiable Threshold Decryption Scheme without Trusted Center.","venue":"GCC","pages":"478-482","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/LvW10","doi":"10.1109/GCC.2010.98","ee":"https://doi.org/10.1109/GCC.2010.98","url":"https://dblp.org/rec/conf/gcc/LvW10"}, "url":"URL#4908139" }, { "@score":"1", "@id":"4908140", "info":{"authors":{"author":[{"@pid":"49/864","text":"Tinghuai Ma"},{"@pid":"36/8876","text":"Jian Ge"},{"@pid":"80/7648","text":"Hao Cao"},{"@pid":"01/773","text":"Yali Wang"}]},"title":"Design and Implementation of Virtual Resources Management in Meteorology Grid.","venue":"GCC","pages":"58-63","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/MaGCW10","doi":"10.1109/GCC.2010.24","ee":"https://doi.org/10.1109/GCC.2010.24","url":"https://dblp.org/rec/conf/gcc/MaGCW10"}, "url":"URL#4908140" }, { "@score":"1", "@id":"4908141", "info":{"authors":{"author":[{"@pid":"65/5142","text":"Werner Mach"},{"@pid":"89/2040","text":"Erich Schikuta"}]},"title":"A Case for the Optimization of Database Workflow Orchestration in Heterogenous Environments.","venue":"GCC","pages":"7-12","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/MachS10","doi":"10.1109/GCC.2010.15","ee":"https://doi.org/10.1109/GCC.2010.15","url":"https://dblp.org/rec/conf/gcc/MachS10"}, "url":"URL#4908141" }, { "@score":"1", "@id":"4908142", "info":{"authors":{"author":[{"@pid":"52/8558","text":"Xiang Pei"},{"@pid":"04/6728","text":"Yongjian Wang"},{"@pid":"26/2404","text":"Zhongzhi Luan"}]},"title":"Nova: A Robustness-oriented Byzantine Fault Tolerance Protocol.","venue":"GCC","pages":"151-156","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/PeiWL10","doi":"10.1109/GCC.2010.40","ee":"https://doi.org/10.1109/GCC.2010.40","url":"https://dblp.org/rec/conf/gcc/PeiWL10"}, "url":"URL#4908142" }, { "@score":"1", "@id":"4908143", "info":{"authors":{"author":[{"@pid":"q/WeizhongQiang","text":"Weizhong Qiang"},{"@pid":"49/6653","text":"Aleksandr Konstantinov"},{"@pid":"98/4156","text":"Hai Jin 0001"}]},"title":"The Interoperable Attribute-based Authorization in ARC Grid Middleware.","venue":"GCC","pages":"145-150","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/QiangKJ10","doi":"10.1109/GCC.2010.39","ee":"https://doi.org/10.1109/GCC.2010.39","url":"https://dblp.org/rec/conf/gcc/QiangKJ10"}, "url":"URL#4908143" }, { "@score":"1", "@id":"4908144", "info":{"authors":{"author":[{"@pid":"50/53","text":"Xiongpai Qin"},{"@pid":"62/8875","text":"Huijui Wang"},{"@pid":"47/3542-1","text":"Xiaoyong Du 0001"},{"@pid":"55/1254-1","text":"Shan Wang 0001"}]},"title":"Parallel Techniques for Large Data Analysis in a Futures Trading Evaluation Service System.","venue":"GCC","pages":"179-184","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/QinWDW10","doi":"10.1109/GCC.2010.45","ee":"https://doi.org/10.1109/GCC.2010.45","url":"https://dblp.org/rec/conf/gcc/QinWDW10"}, "url":"URL#4908144" }, { "@score":"1", "@id":"4908145", "info":{"authors":{"author":[{"@pid":"87/8876","text":"Keyin Ruan"},{"@pid":"73/401","text":"Ruisheng Zhang"},{"@pid":"63/6027","text":"Fan Ding"},{"@pid":"57/1586-3","text":"Lian Li 0003"},{"@pid":"59/4635","text":"Zhili Zhao"},{"@pid":"17/7776","text":"Jiazao Lin"}]},"title":"A User-Friendly Task Editor Environment for Large-scale Virtual Screening Application.","venue":"GCC","pages":"93-97","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/RuanZDLZL10","doi":"10.1109/GCC.2010.30","ee":"https://doi.org/10.1109/GCC.2010.30","url":"https://dblp.org/rec/conf/gcc/RuanZDLZL10"}, "url":"URL#4908145" }, { "@score":"1", "@id":"4908146", "info":{"authors":{"author":[{"@pid":"73/8876","text":"Birui Shao"},{"@pid":"35/5170","text":"Jun Tao"},{"@pid":"38/8876","text":"Fangfang Wang"}]},"title":"Static Channel Assignment with the Physical Interference Model for Maximum Capacity in Multi-radio Multi-channel Wireless Mesh Networks.","venue":"GCC","pages":"338-343","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ShaoTW10","doi":"10.1109/GCC.2010.72","ee":"https://doi.org/10.1109/GCC.2010.72","url":"https://dblp.org/rec/conf/gcc/ShaoTW10"}, "url":"URL#4908146" }, { "@score":"1", "@id":"4908147", "info":{"authors":{"author":[{"@pid":"72/8875","text":"Hongjie Shen"},{"@pid":"d/ZhijunDing","text":"Zhijun Ding"},{"@pid":"26/8876","text":"Hongzhong Chen"}]},"title":"Reliable Web Services Selection Using a Heuristic Algorithm.","venue":"GCC","pages":"290-295","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ShenDC10","doi":"10.1109/GCC.2010.64","ee":"https://doi.org/10.1109/GCC.2010.64","url":"https://dblp.org/rec/conf/gcc/ShenDC10"}, "url":"URL#4908147" }, { "@score":"1", "@id":"4908148", "info":{"authors":{"author":[{"@pid":"60/8875","text":"Hengliang Shi"},{"@pid":"16/2875","text":"Guangyi Bai"},{"@pid":"68/8876","text":"Wenming Gui"}]},"title":"An Implementation of Novel Cloud Computing Model - Improved Map-reduce Model.","venue":"GCC","pages":"420-425","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ShiBG10","doi":"10.1109/GCC.2010.88","ee":"https://doi.org/10.1109/GCC.2010.88","url":"https://dblp.org/rec/conf/gcc/ShiBG10"}, "url":"URL#4908148" }, { "@score":"1", "@id":"4908149", "info":{"authors":{"author":[{"@pid":"58/8876","text":"Jingshan Shi"},{"@pid":"78/8876","text":"Xinghu Wang"},{"@pid":"99/8876","text":"Songyun Wang"},{"@pid":"12/1198","text":"Jie Yang"}]},"title":"Research on the Security Problem of Mobile Agent in Grid Environment.","venue":"GCC","pages":"400-403","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ShiWWY10","doi":"10.1109/GCC.2010.83","ee":"https://doi.org/10.1109/GCC.2010.83","url":"https://dblp.org/rec/conf/gcc/ShiWWY10"}, "url":"URL#4908149" }, { "@score":"1", "@id":"4908150", "info":{"authors":{"author":[{"@pid":"56/234","text":"Zhexuan Song"},{"@pid":"73/114","text":"Jesus Molina"},{"@pid":"145/4385","text":"Christina E. Strong"}]},"title":"Trusted Anonymous Execution: A Model to Raise Trust in Cloud.","venue":"GCC","pages":"133-138","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/SongMS10","doi":"10.1109/GCC.2010.37","ee":"https://doi.org/10.1109/GCC.2010.37","url":"https://dblp.org/rec/conf/gcc/SongMS10"}, "url":"URL#4908150" }, { "@score":"1", "@id":"4908151", "info":{"authors":{"author":[{"@pid":"09/5754","text":"Zhixin Sun"},{"@pid":"75/8876","text":"Yadang Chen"}]},"title":"Research on a Multi-layered and Multi-grouped Model for P2P Networks.","venue":"GCC","pages":"246-251","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/SunC10","doi":"10.1109/GCC.2010.57","ee":"https://doi.org/10.1109/GCC.2010.57","url":"https://dblp.org/rec/conf/gcc/SunC10"}, "url":"URL#4908151" }, { "@score":"1", "@id":"4908152", "info":{"authors":{"author":[{"@pid":"67/2945","text":"Jingtai Piao"},{"@pid":"89/5901-5","text":"Jun Yan 0005"}]},"title":"A Network-aware Virtual Machine Placement and Migration Approach in Cloud Computing.","venue":"GCC","pages":"87-92","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/TaipiaoY10","doi":"10.1109/GCC.2010.29","ee":"https://doi.org/10.1109/GCC.2010.29","url":"https://dblp.org/rec/conf/gcc/TaipiaoY10"}, "url":"URL#4908152" }, { "@score":"1", "@id":"4908153", "info":{"authors":{"author":[{"@pid":"13/1467","text":"Li Tian"},{"@pid":"70/6155","text":"Huan Wang"},{"@pid":"44/3722","text":"Mingfa Zhu"},{"@pid":"31/5990","text":"Limin Xiao"},{"@pid":"75/6807","text":"Li Ruan"}]},"title":"Design and Implementation of an Efficient Communication Protocol Based on Hyper Transport.","venue":"GCC","pages":"320-325","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/TianWZXR10","doi":"10.1109/GCC.2010.69","ee":"https://doi.org/10.1109/GCC.2010.69","url":"https://dblp.org/rec/conf/gcc/TianWZXR10"}, "url":"URL#4908153" }, { "@score":"1", "@id":"4908154", "info":{"authors":{"author":{"@pid":"29/6405","text":"Congming Wang"}},"title":"Performance Evaluation of P2P Sharing Computing System Using Queuing Models.","venue":"GCC","pages":"472-477","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/Wang10","doi":"10.1109/GCC.2010.97","ee":"https://doi.org/10.1109/GCC.2010.97","url":"https://dblp.org/rec/conf/gcc/Wang10"}, "url":"URL#4908154" }, { "@score":"1", "@id":"4908155", "info":{"authors":{"author":[{"@pid":"63/4635","text":"Huiqin Wang"},{"@pid":"62/887","text":"Yongqiang Dong"}]},"title":"An Improved Header Compression Scheme for 6LoWPAN Networks.","venue":"GCC","pages":"350-355","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangD10","doi":"10.1109/GCC.2010.74","ee":"https://doi.org/10.1109/GCC.2010.74","url":"https://dblp.org/rec/conf/gcc/WangD10"}, "url":"URL#4908155" }, { "@score":"1", "@id":"4908156", "info":{"authors":{"author":[{"@pid":"w/ChongWang4","text":"Chong Wang 0004"},{"@pid":"79/2314","text":"Keqing He"},{"@pid":"51/3657","text":"Wen Zhu"},{"@pid":"24/4423","text":"Zaiwen Feng"},{"@pid":"33/4068","text":"Yuan Yan"},{"@pid":"17/8876","text":"Wenxing Yan"}]},"title":"Personalized Reuse of Business Process through the Metamodel for Process Model Registration.","venue":"GCC","pages":"438-443","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangHZFYY10","doi":"10.1109/GCC.2010.91","ee":"https://doi.org/10.1109/GCC.2010.91","url":"https://dblp.org/rec/conf/gcc/WangHZFYY10"}, "url":"URL#4908156" }, { "@score":"1", "@id":"4908157", "info":{"authors":{"author":[{"@pid":"35/7092-89","text":"Wei Wang 0089"},{"@pid":"l/JunzhouLuo","text":"Junzhou Luo"},{"@pid":"98/2604-1","text":"Ming Yang 0001"},{"@pid":"17/7579","text":"Wenjia Wu"}]},"title":"MT3-DA: Multicast Optimization Mechanism Based on Transmission Time and Interference Minimization in WMNs.","venue":"GCC","pages":"344-349","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangLYW10","doi":"10.1109/GCC.2010.73","ee":"https://doi.org/10.1109/GCC.2010.73","url":"https://dblp.org/rec/conf/gcc/WangLYW10"}, "url":"URL#4908157" }, { "@score":"1", "@id":"4908158", "info":{"authors":{"author":[{"@pid":"47/2966","text":"Yanying Wang"},{"@pid":"31/1970-1","text":"Yan Ma 0001"},{"@pid":"21/6121-24","text":"Peng Liu 0024"},{"@pid":"75/5408","text":"Dingsheng Liu"},{"@pid":"43/8433","text":"Jibo Xie"}]},"title":"An Optimized Image Mosaic Algorithm with Parallel IO and Dynamic Grouped Parallel Strategy Based on Minimal Spanning Tree.","venue":"GCC","pages":"501-506","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangMLLX10","doi":"10.1109/GCC.2010.103","ee":"https://doi.org/10.1109/GCC.2010.103","url":"https://dblp.org/rec/conf/gcc/WangMLLX10"}, "url":"URL#4908158" }, { "@score":"1", "@id":"4908159", "info":{"authors":{"author":[{"@pid":"62/1637-1","text":"Yuxiang Wang 0001"},{"@pid":"24/3937","text":"Aibo Song"},{"@pid":"l/JunzhouLuo","text":"Junzhou Luo"}]},"title":"A MapReduceMerge-based Data Cube Construction Method.","venue":"GCC","pages":"1-6","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangSL10","doi":"10.1109/GCC.2010.14","ee":"https://doi.org/10.1109/GCC.2010.14","url":"https://dblp.org/rec/conf/gcc/WangSL10"}, "url":"URL#4908159" }, { "@score":"1", "@id":"4908160", "info":{"authors":{"author":[{"@pid":"70/6155","text":"Huan Wang"},{"@pid":"13/1467","text":"Li Tian"},{"@pid":"44/3722","text":"Mingfa Zhu"},{"@pid":"31/5990","text":"Limin Xiao"},{"@pid":"75/6807","text":"Li Ruan"}]},"title":"A Mechanism Based on Netfilter for Live TCP Migration in Cluster.","venue":"GCC","pages":"218-222","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangTZXR10","doi":"10.1109/GCC.2010.52","ee":"https://doi.org/10.1109/GCC.2010.52","url":"https://dblp.org/rec/conf/gcc/WangTZXR10"}, "url":"URL#4908160" }, { "@score":"1", "@id":"4908161", "info":{"authors":{"author":[{"@pid":"70/8380","text":"Jianzong Wang"},{"@pid":"91/8380","text":"Jiguang Wan"},{"@pid":"85/1802","text":"Zhuo Liu"},{"@pid":"95/4442","text":"Peng Wang"}]},"title":"Data Mining of Mass Storage Based on Cloud Computing.","venue":"GCC","pages":"426-431","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangWLW10","doi":"10.1109/GCC.2010.89","ee":"https://doi.org/10.1109/GCC.2010.89","url":"https://dblp.org/rec/conf/gcc/WangWLW10"}, "url":"URL#4908161" }, { "@score":"1", "@id":"4908162", "info":{"authors":{"author":[{"@pid":"02/5889","text":"Yu Wang"},{"@pid":"84/8875","text":"Liu Xian-rong"},{"@pid":"46/8876","text":"Song Si Xin"}]},"title":"The Volunteer Computing Architecture Based on Role Analysis.","venue":"GCC","pages":"483-488","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangXX10","doi":"10.1109/GCC.2010.99","ee":"https://doi.org/10.1109/GCC.2010.99","url":"https://dblp.org/rec/conf/gcc/WangXX10"}, "url":"URL#4908162" }, { "@score":"1", "@id":"4908163", "info":{"authors":{"author":[{"@pid":"89/8876","text":"Ximei Wang"},{"@pid":"57/2800","text":"Shoubao Yang"},{"@pid":"97/4633","text":"Shuling Wang"},{"@pid":"16/8376","text":"Xianlong Niu"},{"@pid":"07/1951","text":"Jing Xu"}]},"title":"An Application-Based Adaptive Replica Consistency for Cloud Storage.","venue":"GCC","pages":"13-17","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WangYWNX10","doi":"10.1109/GCC.2010.16","ee":"https://doi.org/10.1109/GCC.2010.16","url":"https://dblp.org/rec/conf/gcc/WangYWNX10"}, "url":"URL#4908163" }, { "@score":"1", "@id":"4908164", "info":{"authors":{"author":[{"@pid":"09/6274","text":"Kunmei Wen"},{"@pid":"60/4429","text":"Ruixuan Li 0001"},{"@pid":"13/2692-10","text":"Bing Li 0010"}]},"title":"Searching Concepts and Association Relationships Based on Domain Ontology.","venue":"GCC","pages":"432-437","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WenLL10","doi":"10.1109/GCC.2010.90","ee":"https://doi.org/10.1109/GCC.2010.90","url":"https://dblp.org/rec/conf/gcc/WenLL10"}, "url":"URL#4908164" }, { "@score":"1", "@id":"4908165", "info":{"authors":{"author":[{"@pid":"20/3894","text":"Jun Wu"},{"@pid":"99/8875","text":"Shuang Cao"},{"@pid":"93/2334","text":"Yong Li"},{"@pid":"89/6764","text":"Bin Li"}]},"title":"Satellite Network Range Scheduling.","venue":"GCC","pages":"326-331","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WuCLL10","doi":"10.1109/GCC.2010.70","ee":"https://doi.org/10.1109/GCC.2010.70","url":"https://dblp.org/rec/conf/gcc/WuCLL10"}, "url":"URL#4908165" }, { "@score":"1", "@id":"4908166", "info":{"authors":{"author":[{"@pid":"62/3426","text":"Xiaofeng Wu"},{"@pid":"56/5843","text":"Jinlei Jiang"},{"@pid":"92/8876","text":"Jinzhe Yang"}]},"title":"PAPC: A Simple Distributed Parallel Computing Framework for Mass Legacy Code Tasks.","venue":"GCC","pages":"526-532","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WuJY10","doi":"10.1109/GCC.2010.108","ee":"https://doi.org/10.1109/GCC.2010.108","url":"https://dblp.org/rec/conf/gcc/WuJY10"}, "url":"URL#4908166" }, { "@score":"1", "@id":"4908167", "info":{"authors":{"author":[{"@pid":"19/5635-5","text":"Dan Wu 0005"},{"@pid":"w/ManHonWong","text":"Man Hon Wong 0001"}]},"title":"A Synchronization Approach for Increasing Concurrency in Software Transactional Memory.","venue":"GCC","pages":"185-190","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/WuW10","doi":"10.1109/GCC.2010.46","ee":"https://doi.org/10.1109/GCC.2010.46","url":"https://dblp.org/rec/conf/gcc/WuW10"}, "url":"URL#4908167" }, { "@score":"1", "@id":"4908168", "info":{"authors":{"author":[{"@pid":"10/137","text":"Xiaolong Xu"},{"@pid":"170/3962","text":"Jingyi Xiong"},{"@pid":"68/10245","text":"Chunling Cheng"}]},"title":"Fair Exchange Mechanism for P2P Systems.","venue":"GCC","pages":"235-239","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/Xiao-longJC10","doi":"10.1109/GCC.2010.55","ee":"https://doi.org/10.1109/GCC.2010.55","url":"https://dblp.org/rec/conf/gcc/Xiao-longJC10"}, "url":"URL#4908168" }, { "@score":"1", "@id":"4908169", "info":{"authors":{"author":[{"@pid":"71/1116","text":"Feng Xiao"},{"@pid":"26/2404","text":"Zhongzhi Luan"},{"@pid":"w/RuiWang14","text":"Rui Wang 0014"},{"@pid":"08/4002","text":"Depei Qian"}]},"title":"ORSP: An Efficient Resource Acquisition Policy for Peer-to-Peer Mesh Streaming Systems.","venue":"GCC","pages":"229-234","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/XiaoLWQ10","doi":"10.1109/GCC.2010.54","ee":"https://doi.org/10.1109/GCC.2010.54","url":"https://dblp.org/rec/conf/gcc/XiaoLWQ10"}, "url":"URL#4908169" }, { "@score":"1", "@id":"4908170", "info":{"authors":{"author":[{"@pid":"43/8433","text":"Jibo Xie"},{"@pid":"56/5562","text":"Guoqing Li"},{"@pid":"96/1859","text":"Wenyang Yu"},{"@pid":"77/349","text":"Lingjun Zhao"}]},"title":"EO Data Integration and Processing Based on Grid for Flood Monitoring.","venue":"GCC","pages":"507-510","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/XieLYZ10","doi":"10.1109/GCC.2010.104","ee":"https://doi.org/10.1109/GCC.2010.104","url":"https://dblp.org/rec/conf/gcc/XieLYZ10"}, "url":"URL#4908170" }, { "@score":"1", "@id":"4908171", "info":{"authors":{"author":[{"@pid":"71/8876","text":"Chuncong Xu"},{"@pid":"65/792","text":"Xiaomeng Huang"},{"@pid":"96/8875","text":"Nuo Wu"},{"@pid":"99/8375","text":"Pengzhi Xu"},{"@pid":"67/3001","text":"Guangwen Yang"}]},"title":"Using Memcached to Promote Read Throughput in Massive Small-File Storage System.","venue":"GCC","pages":"24-29","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/XuHWXY10","doi":"10.1109/GCC.2010.18","ee":"https://doi.org/10.1109/GCC.2010.18","url":"https://dblp.org/rec/conf/gcc/XuHWXY10"}, "url":"URL#4908171" }, { "@score":"1", "@id":"4908172", "info":{"authors":{"author":[{"@pid":"73/1149","text":"Jian Xu"},{"@pid":"86/1274","text":"Yongliang Zhang"},{"@pid":"01/8877","text":"CangYu Wang"}]},"title":"An Adaptive Cloud Image Processing Mechanism over Omnivore.","venue":"GCC","pages":"495-497","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/XuZW10","doi":"10.1109/GCC.2010.101","ee":"https://doi.org/10.1109/GCC.2010.101","url":"https://dblp.org/rec/conf/gcc/XuZW10"}, "url":"URL#4908172" }, { "@score":"1", "@id":"4908173", "info":{"authors":{"author":[{"@pid":"45/4440","text":"Wei Yan"},{"@pid":"49/1245-24","text":"Jia Liu 0024"},{"@pid":"53/2571","text":"Chuang Lin"}]},"title":"A Hybrid Modeling Approach to Microarchitecture Design Space Exploring.","venue":"GCC","pages":"110-117","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YanLL10","doi":"10.1109/GCC.2010.33","ee":"https://doi.org/10.1109/GCC.2010.33","url":"https://dblp.org/rec/conf/gcc/YanLL10"}, "url":"URL#4908173" }, { "@score":"1", "@id":"4908174", "info":{"authors":{"author":[{"@pid":"45/4440","text":"Wei Yan"},{"@pid":"53/2571","text":"Chuang Lin"},{"@pid":"72/1547","text":"Shanchen Pang"}]},"title":"The Optimized Reinforcement Learning Approach to Run-Time Scheduling in Data Center.","venue":"GCC","pages":"46-51","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YanLP10","doi":"10.1109/GCC.2010.22","ee":"https://doi.org/10.1109/GCC.2010.22","url":"https://dblp.org/rec/conf/gcc/YanLP10"}, "url":"URL#4908174" }, { "@score":"1", "@id":"4908175", "info":{"authors":{"author":[{"@pid":"78/5247","text":"Baohua Yang"},{"@pid":"90/5687","text":"Guodong Li"},{"@pid":"37/462","text":"Yaxuan Qi"},{"@pid":"65/5049","text":"Yibo Xue"},{"@pid":"l/JunLi3","text":"Jun Li 0003"}]},"title":"DFC: Towards Effective Feedback Flow Management for Datacenters.","venue":"GCC","pages":"98-103","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YangLQXL10","doi":"10.1109/GCC.2010.31","ee":"https://doi.org/10.1109/GCC.2010.31","url":"https://dblp.org/rec/conf/gcc/YangLQXL10"}, "url":"URL#4908175" }, { "@score":"1", "@id":"4908176", "info":{"authors":{"author":[{"@pid":"90/8875","text":"Yichao Yang"},{"@pid":"99/8844","text":"Yanbo Zhou"},{"@pid":"24/1476","text":"Lei Liang"},{"@pid":"58/2425","text":"Dan He 0002"},{"@pid":"89/1871","text":"Zhili Sun"}]},"title":"A Sevice-Oriented Broker for Bulk Data Transfer in Cloud Computing.","venue":"GCC","pages":"264-269","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YangZLHS10","doi":"10.1109/GCC.2010.60","ee":"https://doi.org/10.1109/GCC.2010.60","url":"https://dblp.org/rec/conf/gcc/YangZLHS10"}, "url":"URL#4908176" }, { "@score":"1", "@id":"4908177", "info":{"authors":{"author":[{"@pid":"13/7695","text":"Guohua You"},{"@pid":"00/4089","text":"Ying Zhao"}]},"title":"Dynamic Requests Scheduling Model in Multi-core Web Server.","venue":"GCC","pages":"201-206","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YouZ10","doi":"10.1109/GCC.2010.49","ee":"https://doi.org/10.1109/GCC.2010.49","url":"https://dblp.org/rec/conf/gcc/YouZ10"}, "url":"URL#4908177" }, { "@score":"1", "@id":"4908178", "info":{"authors":{"author":[{"@pid":"96/1859","text":"Wenyang Yu"},{"@pid":"56/5562","text":"Guoqing Li"},{"@pid":"43/8433","text":"Jibo Xie"}]},"title":"Key Technology of Intelligent and On-demand Data Service in Multi- Space Agency.","venue":"GCC","pages":"517-520","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YuLX10","doi":"10.1109/GCC.2010.106","ee":"https://doi.org/10.1109/GCC.2010.106","url":"https://dblp.org/rec/conf/gcc/YuLX10"}, "url":"URL#4908178" }, { "@score":"1", "@id":"4908179", "info":{"authors":{"author":[{"@pid":"70/8875","text":"Zhi-xiang Yuan"},{"@pid":"99/3847","text":"Jun Zhou"},{"@pid":"75/639","text":"Hong Ye"}]},"title":"A GSPN-based Grid Resource Schedule Algorithm.","venue":"GCC","pages":"457-460","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/YuanZY10","doi":"10.1109/GCC.2010.94","ee":"https://doi.org/10.1109/GCC.2010.94","url":"https://dblp.org/rec/conf/gcc/YuanZY10"}, "url":"URL#4908179" }, { "@score":"1", "@id":"4908180", "info":{"authors":{"author":[{"@pid":"01/6528","text":"Cheng Zeng"},{"@pid":"79/2314","text":"Keqing He"},{"@pid":"13/2692-10","text":"Bing Li 0010"},{"@pid":"w/ChongWang4","text":"Chong Wang 0004"},{"@pid":"54/3082","text":"Yangfan He"}]},"title":"On Ontology Management in Semantic Web Service Registry.","venue":"GCC","pages":"444-449","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZengHLWH10","doi":"10.1109/GCC.2010.92","ee":"https://doi.org/10.1109/GCC.2010.92","url":"https://dblp.org/rec/conf/gcc/ZengHLWH10"}, "url":"URL#4908180" }, { "@score":"1", "@id":"4908181", "info":{"authors":{"author":[{"@pid":"21/3626-3","text":"Fan Zhang 0003"},{"@pid":"14/2867","text":"Junwei Cao"},{"@pid":"66/4855","text":"Xiaolong Song"},{"@pid":"22/4111","text":"Hong Cai"},{"@pid":"49/3738","text":"Cheng Wu"}]},"title":"AMREF: An Adaptive MapReduce Framework for Real Time Applications.","venue":"GCC","pages":"157-162","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhangCSCW10","doi":"10.1109/GCC.2010.41","ee":"https://doi.org/10.1109/GCC.2010.41","url":"https://dblp.org/rec/conf/gcc/ZhangCSCW10"}, "url":"URL#4908181" }, { "@score":"1", "@id":"4908182", "info":{"authors":{"author":[{"@pid":"55/1332","text":"Xiaohui Zhang"},{"@pid":"31/2148","text":"Ruihua Di"},{"@pid":"23/6696","text":"Yi Liang"}]},"title":"Ontology Based Knowledge Modeling for Structural Engineering Experiment Information Management.","venue":"GCC","pages":"40-45","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhangDL10","doi":"10.1109/GCC.2010.21","ee":"https://doi.org/10.1109/GCC.2010.21","url":"https://dblp.org/rec/conf/gcc/ZhangDL10"}, "url":"URL#4908182" }, { "@score":"1", "@id":"4908183", "info":{"authors":{"author":[{"@pid":"73/8074","text":"Weihan Zhang"},{"@pid":"61/5938","text":"Kun Tao"},{"@pid":"68/3522-2","text":"Xuejie Zhang 0002"}]},"title":"An Incentive Framework for Supplying Differentiate Service Based on Game Model in P2P Network.","venue":"GCC","pages":"240-245","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhangTZ10","doi":"10.1109/GCC.2010.56","ee":"https://doi.org/10.1109/GCC.2010.56","url":"https://dblp.org/rec/conf/gcc/ZhangTZ10"}, "url":"URL#4908183" }, { "@score":"1", "@id":"4908184", "info":{"authors":{"author":[{"@pid":"21/1048","text":"Peng Zhang"},{"@pid":"29/2245-2","text":"Guiling Wang 0002"},{"@pid":"10/2639","text":"Chen Liu"}]},"title":"A Data-driven Approach to Internet-based Business Collaboration.","venue":"GCC","pages":"377-382","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhangWL10","doi":"10.1109/GCC.2010.79","ee":"https://doi.org/10.1109/GCC.2010.79","url":"https://dblp.org/rec/conf/gcc/ZhangWL10"}, "url":"URL#4908184" }, { "@score":"1", "@id":"4908185", "info":{"authors":{"author":[{"@pid":"73/4325","text":"Bin Zhao"},{"@pid":"96/4459","text":"Guangjun Cai"},{"@pid":"22/3510","text":"Zhi Jin"}]},"title":"From Use Case Model to Service Model: An Environment Ontology Based Approach.","venue":"GCC","pages":"302-307","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhaoCJ10","doi":"10.1109/GCC.2010.66","ee":"https://doi.org/10.1109/GCC.2010.66","url":"https://dblp.org/rec/conf/gcc/ZhaoCJ10"}, "url":"URL#4908185" }, { "@score":"1", "@id":"4908186", "info":{"authors":{"author":[{"@pid":"81/2506","text":"Zhiming Zhao"},{"@pid":"50/3218","text":"Paola Grosso"},{"@pid":"75/8875","text":"Ralph Koning"},{"@pid":"30/4433","text":"Jeroen van der Ham"},{"@pid":"d/CeesTAMdeLaat","text":"Cees de Laat"}]},"title":"An Architecture Including Network QoS in Scientific Workflows.","venue":"GCC","pages":"104-109","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhaoGKHL10","doi":"10.1109/GCC.2010.32","ee":"https://doi.org/10.1109/GCC.2010.32","url":"https://dblp.org/rec/conf/gcc/ZhaoGKHL10"}, "url":"URL#4908186" }, { "@score":"1", "@id":"4908187", "info":{"authors":{"author":[{"@pid":"71/8380","text":"Tiezhu Zhao"},{"@pid":"49/6732","text":"Jinlong Hu"}]},"title":"Performance Evaluation of Parallel File System Based on Lustre and Grey Theory.","venue":"GCC","pages":"118-123","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhaoH10","doi":"10.1109/GCC.2010.34","ee":"https://doi.org/10.1109/GCC.2010.34","url":"https://dblp.org/rec/conf/gcc/ZhaoH10"}, "url":"URL#4908187" }, { "@score":"1", "@id":"4908188", "info":{"authors":{"author":[{"@pid":"22/8876","text":"Chenyang Zhao"},{"@pid":"17/8376","text":"Shoubo Li"},{"@pid":"33/4854-17","text":"Yi Yang 0017"},{"@pid":"27/1438","text":"Junling Wang"},{"@pid":"60/1749","text":"Zhen Dong"},{"@pid":"33/4528-1","text":"Li Liu 0001"},{"@pid":"57/1586-3","text":"Lian Li 0003"}]},"title":"An Autonomic Performance-Aware Workflow Job Management for Service-Oriented Computing.","venue":"GCC","pages":"270-275","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhaoLYWDLL10","doi":"10.1109/GCC.2010.61","ee":"https://doi.org/10.1109/GCC.2010.61","url":"https://dblp.org/rec/conf/gcc/ZhaoLYWDLL10"}, "url":"URL#4908188" }, { "@score":"1", "@id":"4908189", "info":{"authors":{"author":[{"@pid":"98/8876","text":"Yuzhe Zhi"},{"@pid":"97/4626","text":"Yi Liu"},{"@pid":"48/8078","text":"Lin Jiao"},{"@pid":"21/1048","text":"Peng Zhang"}]},"title":"A Parallel Simulator for Large-Scale Parallel Computers.","venue":"GCC","pages":"196-200","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhiLJZ10","doi":"10.1109/GCC.2010.48","ee":"https://doi.org/10.1109/GCC.2010.48","url":"https://dblp.org/rec/conf/gcc/ZhiLJZ10"}, "url":"URL#4908189" }, { "@score":"1", "@id":"4908190", "info":{"authors":{"author":[{"@pid":"91/8876","text":"Hai Zhong"},{"@pid":"76/2625","text":"Zehua Zhang"},{"@pid":"68/3522-2","text":"Xuejie Zhang 0002"}]},"title":"A Dynamic Replica Management Strategy Based on Data Grid.","venue":"GCC","pages":"18-23","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhongZZ10","doi":"10.1109/GCC.2010.17","ee":"https://doi.org/10.1109/GCC.2010.17","url":"https://dblp.org/rec/conf/gcc/ZhongZZ10"}, "url":"URL#4908190" }, { "@score":"1", "@id":"4908191", "info":{"authors":{"author":{"@pid":"14/3373","text":"Juan Zhou"}},"title":"A SOA Based Domain-Specific Chinese QA System.","venue":"GCC","pages":"467-471","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/Zhou10","doi":"10.1109/GCC.2010.96","ee":"https://doi.org/10.1109/GCC.2010.96","url":"https://dblp.org/rec/conf/gcc/Zhou10"}, "url":"URL#4908191" }, { "@score":"1", "@id":"4908192", "info":{"authors":{"author":[{"@pid":"79/8876","text":"Wenyu Zhou"},{"@pid":"57/2800","text":"Shoubao Yang"},{"@pid":"55/2632","text":"Jun Fang"},{"@pid":"16/8376","text":"Xianlong Niu"},{"@pid":"85/2210","text":"Hu Song"}]},"title":"VMCTune: A Load Balancing Scheme for Virtual Machine Cluster Using Dynamic Resource Allocation.","venue":"GCC","pages":"81-86","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhouYFNS10","doi":"10.1109/GCC.2010.28","ee":"https://doi.org/10.1109/GCC.2010.28","url":"https://dblp.org/rec/conf/gcc/ZhouYFNS10"}, "url":"URL#4908192" }, { "@score":"1", "@id":"4908193", "info":{"authors":{"author":[{"@pid":"99/8844","text":"Yanbo Zhou"},{"@pid":"90/8875","text":"Yichao Yang"},{"@pid":"24/1476","text":"Lei Liang"},{"@pid":"58/2425","text":"Dan He 0002"},{"@pid":"89/1871","text":"Zhili Sun"}]},"title":"An Agent-based Scheme for Supporting Service and Resource Management in Wireless Cloud.","venue":"GCC","pages":"34-39","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhouYLHS10","doi":"10.1109/GCC.2010.20","ee":"https://doi.org/10.1109/GCC.2010.20","url":"https://dblp.org/rec/conf/gcc/ZhouYLHS10"}, "url":"URL#4908193" }, { "@score":"1", "@id":"4908194", "info":{"authors":{"author":[{"@pid":"82/8875","text":"Jinshi Zhu"},{"@pid":"08/4194","text":"Yongmei Lei"},{"@pid":"74/8875","text":"Jianchen Shan"}]},"title":"Parallel FMM Algorithm Based on Space Decomposition.","venue":"GCC","pages":"168-173","year":"2010","type":"Conference and Workshop Papers","access":"closed","key":"conf/gcc/ZhuLS10","doi":"10.1109/GCC.2010.43","ee":"https://doi.org/10.1109/GCC.2010.43","url":"https://dblp.org/rec/conf/gcc/ZhuLS10"}, "url":"URL#4908194" }, { "@score":"1", "@id":"4998236", "info":{"title":"GCC 2010, The Ninth International Conference on Grid and Cloud Computing, Nanjing, Jiangsu, China, 1-5 November 2010","venue":"GCC","publisher":"IEEE Computer Society","year":"2010","type":"Editorship","key":"conf/gcc/2010","ee":"https://ieeexplore.ieee.org/xpl/conhome/5661644/proceeding","url":"https://dblp.org/rec/conf/gcc/2010"}, "url":"URL#4998236" } ] } } } )