By Topic

2007 International Conference on Networking, Architecture, and Storage (NAS 2007)

Date 29-31 July 2007

Filter Results

Displaying Results 1 - 25 of 55
  • International Conference on Networking, Architecture, and Storage - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • International Conference on Networking, Architecture, and Storage-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • International Conference on Networking, Architecture, and Storage-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • International Conference on Networking, Architecture, and Storage - TOC

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • Messages from the General Co-Chairs

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • Messages from the Program Co-Chairs

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Design of NIC Based on I/O Processor for Cluster Interconnect Network

    Publication Year: 2007, Page(s):3 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    An effective interconnect network interface card (NIC) is critical to the achievement of a high-performance cluster system. An original NIC architecture based on the Intel IOP310 I/O processor chipset is presented in this paper. The NIC is a part of DCNet, which is the cluster interconnect network developed by NCIC. The I/O processor makes it powerful for the NIC to offload the processing of commu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simplified Multi-Ported Cache in High Performance Processor

    Publication Year: 2007, Page(s):9 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    The memory bandwidth demands of modern microprocessors require the use of a multi-ported cache to achieve peak performance. However, multi- ported caches are costly to implement. In this paper we propose technique for using a simplified dual-ported cache instead, which is mostly composed of single- ported SRAMs, without decreasing the performance of the processor apparently. We evaluate this techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The bi-panconnectivity of the hypercube

    Publication Year: 2007, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    A bipartite graph is bi-panconnected if an arbitrary pair of vertices x, y are connected by the bi-panconnected paths that include a path of each length s satisfying N-1 ges s ges dist(x, y) and s-dist(x, y) is even, where N is the number of vertices, and dist(x, y) denotes the shortest distance between x and y. Li et al. [Information Processing Letters 87 (2003) 107-110] have shown that the hyper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implementation and Design of a Low-Power Clock Distribution Microarchitecture

    Publication Year: 2007, Page(s):21 - 30
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    The high clock frequency of current high-performance microprocessors brings the significant challenge for the microprocessors' power. The multiple clock domain (MCD) technique is a new clock distribution technique, which retains the benefits of synchronous designs and avoids the problems due to global clock to reduce the power of the clock distribution. Most present studies of MCD are only based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer Multicast

    Publication Year: 2007, Page(s):31 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Application-layer multicast (ALM) can easily address most of the problems of IP-based multicast such as forwarding state scalability, full router dependence and so on. The topology-aware approach of ALM is more attractive because it exploits underlying network topology data to construct multicast overlay networks. In this paper, a more efficient mechanism of overlay construction called subnet topo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology

    Publication Year: 2007, Page(s):37 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    The security model is the key component in the security of network topology research. Especially in the virtual private network (VPN) topology, with the emergence of the tunneling, private routing and cipher technology in VPN, there are two embarrassments for the protection of the entire VPN topology. One is that internal services will be uncovered in the Internet by the tunneling, which can be co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Dynamic Endpoint-Based Access Control Model on VPN

    Publication Year: 2007, Page(s):44 - 54
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Today more and more organizations use Virtual Private Network (VPN) to implement their private communication. By tunneling, a dynamic virtual topology is constituted. Users can access various resources far and near through VPN. Sophisticated environments and behaviors bring the new challenge to access control for VPN. Traditionally access control models for VPN focus on the content of workflow, ig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Protocols Based on Double Auction for Ad Hoc Networks

    Publication Year: 2007, Page(s):55 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    We introduce a game-theoretic setting for routing in mobile ad hoc networks in this paper. We implement the continuous double auction (CDA), a double auctioning mechanism in ad hoc networks and propose our routing protocols based on it. This mechanism can stimulate nodes to cooperate with each other and the aim to allocate routes in communication would be achieved. It is the first time that double... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Cooperative Caching Scheme for Wireless Ad Hoc Networks: GroupCaching

    Publication Year: 2007, Page(s):62 - 68
    Cited by:  Papers (21)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    In the mobile ad hoc network, a mobile host can communicate with others anywhere and anytime. Cooperative caching scheme can improve the accessibility of data objects. However, the cache hit ratio is reduced and access latency becomes longer significantly due to the mobility of MHs, energy consumption in battery, and limited wireless bandwidth. In this paper, we propose a novel cooperative caching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested Networks

    Publication Year: 2007, Page(s):69 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    In the MPLS network domains, packet forwarding decisions are based on labels instead of layer three address used in the IP network. MPLS LSP tunnels are created for the labeled traffic and used to transmit the traffic in the predetermined routes set by the label switching routers (LSR) on the network boarders. This packet forwarding mechanism makes unequal path load balance and the optimal bandwid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Designated-Verifier Proxy Signature Scheme

    Publication Year: 2007, Page(s):77 - 82
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    As a special signature, proxy signature allows a entity called original signer to delegate his signing capability to another entity to produce signature on behalf of him. By combining the ideas of proxy signatures and designated-verifier signatures, G.L.Wang et.al. proposed a strong designated-verifier proxy signature scheme (for short DVP) and claimed that the security of their scheme was based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PKI-Based Authentication Mechanisms in Grid Systems

    Publication Year: 2007, Page(s):83 - 90
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    Grids have emerged as the basic infrastructure for high performance distributed computing and data collaborations. Although they depict an attractive new world of computing, security is the biggest barrier against wide adoption of Grids. Authentication is the basis of security in grids. GSI uses X.509 PKI and proxy certificates as authentication foundation, and uses gateway for mapping certificate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing Attack Threat by the Probability of Following Attacks

    Publication Year: 2007, Page(s):91 - 100
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (497 KB) | HTML iconHTML

    In this paper a novel approach to assessing the threat of network intrusions is proposed. Unlike the present approaches which assess the attack threat either from a backward perspective (how probable a security state can be reached) or from the perspective of the attacks themselves (how much an attack would cause damage to the network), this approach assesses the attack threat from a forwarding pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating Denial of Capability with An Notification Mechanism

    Publication Year: 2007, Page(s):101 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Denial-of-service (DoS) attacks is a major threat to Internet security. Among numerous defense techniques, recently architecture-level capabilities scheme is a promising one. As a typical and comprehensive capabilities scheme, traffic validation architecture (TVA) tries to limit DoS attacks essentially and completely. Yet its effectiveness suffers from a new kind of DoS attacks, denial-of-capabili... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast

    Publication Year: 2007, Page(s):109 - 114
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    For successfully deploying multicast services in the mobile environment, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, a hybrid key management (HKM) tree with topology matching (TM) subtrees and topology independent (TI) subtrees has been proposed. In order to reduce the communication burden of rekeying caused by handoff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discovering Novel Multistage Attack Patterns in Alert Streams

    Publication Year: 2007, Page(s):115 - 121
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    With the growing deployment of network security devices, the large volume of alerts gathered from these devices often overwhelm the administrator, and make it almost impossible to discover complicated multistage attacks in time. It is necessary to develop a real-time system to detect the ongoing attacks and predict the upcoming next step of a multistage attack in alert streams, using known attack ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing

    Publication Year: 2007, Page(s):122 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Peer-to-peer (P2P) overlay networks are currently being used to build large scale distributed systems running various decentralized applications like distributed storage, content distribution, collaborative scheduling, and leader election. Although we have protocols like Byzantine agreement, voting schemes etc. for building resilient distributed applications; we have very few solutions available f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Moving Patterns Based on Frequent Patterns Growth in Sensor Networks

    Publication Year: 2007, Page(s):133 - 138
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    A novel algorithm named FP-mine (FP: Frequent Pattern) is proposed in this paper to mine frequent moving patterns with two dimensional attributes including locations and time in sensor networks. FP- mine is based on a novel data structure named P-tree and an algorithm of frequent pattern growth named FP-growth. The P-tree can efficiently store large numbers of original moving patterns compactly. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.