Park, J.J., Zomaya, A.Y., Yeo, S.-S., Sahni, S. (Eds.)
2012, XX, 647 p. 253 illus.
Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
This book constitutes the refereed post-proceedings of the 9th IFIP International Conference on Network and Parallel Computing, NPC 2012, held in Gwangju, Korea, in September 2012. The 38 papers presented were carefully reviewed and selected from 136 submissions. The papers are organized in the following topical sections: algorithms, scheduling, analysis, and data mining; network architecture and protocol design; network security; paralel, distributed, and virtualization techniques; performance modeling, prediction, and tuning; resource management; ubiquitous communications and networks; and web, communication, and cloud computing. In addition, a total of 37 papers selected from five satellite workshops (ATIMCN, ATSME, Cloud&Grid, DATICS, and UMAS 2012) are included.
An Application-Level Scheduling with Task Bundling Approach for Many-Task Computing in Heterogeneous Environments.- DGraph: Algorithms for
Shortgun Reads Assembly Using De Bruijn Graph.- Knowledge-Based Adaptive Self-Scheduling.- Communication Locality Analysis of Triplet-Based Hierarchical Interconnection Network in Chip Multiprocessor.- A Scoring System for Short Answers on the Test in a Large Group.- Reference Variables for Dynamic, Reliable Packet Operations.- Are Heterogeneous Cellular Networks Superior to Homogeneous Ones?.- Dynamic Spray and Wait Routing Protocol for Delay Tolerant Networks.- A Dynamic Popularity-Aware Load Balancing Algorithm for Structured P2P Systems.- NCCPIS: A Co-simulation Tool for Networked Control and Cyber-Physical System Evaluation.- Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network.- MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis.- Breaking a Robust Remote User Authentication Scheme Using Smart Cards.- An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs.- Hybrid
Sensor Networks.- A Termination Detection Technique Using Gossip in Cloud Computing Environments.- OEIRM: An Open Distributed Processing Based Interoperability Reference Model for e-Science.- Using PCI Pass-Through for GPU Virtualization with CUDA.- Parallel Valuation of the Lower and Upper Bound Prices for Multi-asset Bermudan Options.- Insight of Direct Search Methods and Module-Integrated Algorithms for Maximum Power Point Tracking (MPPT) of Stand-Alone Photovoltaic Systems.- Pricing Bermudan Interest Rate Swaptions via Parallel Simulation under the Extended Multi-factor LIBOR Market Model.- Evolving Linear Discriminant in Continuously Growing Dimensional Space for Incremental Attribute Learning.- Compact Multiplicative Inverter for Hardware Elliptic Curve Cryptosystem.- Space Exploration of Multi-agent Robotics via Genetic Algorithm.- Weightless Swarm Algorithm (WSA) for Dynamic Optimization Problems.- Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units.- New Electronic Acupuncture System Using Intelligence.- A Runtime Environment for Distributed Mashups in Multi-device Scenarios.- A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks.- Nibble-CRC for Underwater Acoustic Communication.- An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations.- Research on a Smart Input Device Using Multimodal Bio-signal Interface.- Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader.- Cryptanalysis of Goriparthi et al.’s Bilinear Pairing Based Remote User Authentication Scheme.- Energy-Efficiency Protocol for Securing the Wireless Sensor Networks.- A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI.- SNR-Based Partial Relay Selection Scheme over Multiple Relay Network.- Robust Face Recognition in Low Resolution and Blurred Image Using Joint Information in Space and Frequency.- Algorithms Based on Finite Automata for Testing of Z-codes.- Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor.