Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007)

18-21 Sept. 2007

Filter Results

Displaying Results 1 - 25 of 183
  • 2007 IFIP International Conference on Network and Parallel Computing Workshops - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • 2007 IFIP International Conference on Network and Parallel Computing Workshops - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • The Info-plosion Project

    Publication Year: 2007, Page(s):3 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (961 KB) | HTML iconHTML

    How much information project in California University examined the volume of information that have been produced so far, and revealed that actually very large volume of information has been produced, even if sensor information is not included in the target of this research. So, if such information is included, the amount becomes much larger. Therefore, we considered that it is a big challenge in i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2007 IFIP International Conference on Network and Parallel Computing Workshops - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • Keyword Search on Relational Databases

    Publication Year: 2007, Page(s):7 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Keyword search in relational database is a central topic in integrating database and information technologies. We briefly introduce the problem, analyze the challenges, and survey the existing work. We also highlight our research progress of the SPARK project that partially addresses the challenges. A few future research issues are also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2007 IFIP International Conference on Network and Parallel Computing Workshops - Table of contents

    Publication Year: 2007, Page(s):v - xviii
    Request permission for commercial reuse | PDF file iconPDF (206 KB)
    Freely Available from IEEE
  • Efficient Algorithms for On-line Analysis Processing On Compressed Data Warehouses

    Publication Year: 2007, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    Data compression is an effective technique to improve the performance of data warehouses. Aggregation and cube are important operations for on-line analytical processing (OLAP). It is a major challenge to develop efficient algorithms for aggregation and cube operations on compressed data warehouses. Many efficient algorithms to compute aggregation and cube for relational OLAP have been developed. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Innovating Database Technology for Advanced Applications

    Publication Year: 2007, Page(s):13 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    This paper discusses the new trends of innovative database technology for advanced applications, under the background of the research and development activities of the database group of Northeastern University, China. The brief history of around 30 years is retrospected. The ongoing research issues on the key database techniques for emerging advanced applications are presented. Finally, the experi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message from the NPC 2007 Workshop Organizers

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • Stream Data Management Based on Integration of a Stream Processing Engine and Databases

    Publication Year: 2007, Page(s):18 - 22
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (738 KB) | HTML iconHTML

    Developments in network and sensor device technologies enable us to easily obtain real-world information, such as locations of moving objects, weather information, news, and stock prices. These data are continuously supplied, and they are regarded as data streams. Because of the dramatical increase of streaming data, their management and utilization has become more and more important. This paper d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference Organization

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (215 KB)
    Freely Available from IEEE
  • Querying Graph-Structured Data

    Publication Year: 2007, Page(s):23 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Graphs have great expressive power to describe the complex relationships among data objects, and there are large graph datasets available such as Web data, semi-structured data and XML data. In this paper, we describe our work on querying graph-structured data, including graph labeling methods, reachability joins, and graph pattern matching. We show that we can base on the graph labeling of comple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Additional reviewers

    Publication Year: 2007, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (187 KB)
    Freely Available from IEEE
  • Content-based Search using Term Aggregation and Classification over Hybrid Peer-to-Peer Systems

    Publication Year: 2007, Page(s):28 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB) | HTML iconHTML

    In this paper, we propose a method to support content-based search, one of the challenges in Peer-to-Peer file sharing system. The proposed method is based on a hybrid structure, which is a combination of a Chord ring and a balanced tree. The tree is used to aggregate and classify terms while the Chord ring is used to index terms of nodes in the tree. At every node in the tree, the system classifi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Web and Mobile Data Management

    Publication Year: 2007, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The rapid prevalence of Web and mobile devices are making themselves becoming huge data sources. This new infrastructure presents tremendous challenges for data management technology, and traditional data management technologies such as query processing, transaction management, workflow etc. must all be re-evaluated in this emerging environment. Furthermore, non-traditional issues, such as Web and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collaborative Legal Information Sharing on P2P Network

    Publication Year: 2007, Page(s):41 - 47
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    Peer-to-peer (P2P) information sharing attracts much attention from both legal and IT communities. P2P architectures have the potential to accelerate communication processes and reduce collaboration costs. A prototype, named vuCRN has been developed for researchers to facilitate document sharing legally. However, some legal issues are preventing P2P to realise its real power. In this paper, the de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Quality - The Key Success Factor for Data Driven Engineering

    Publication Year: 2007, Page(s):48 - 56
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    As the scale and diversity of data grows in the digital arena, the complexities of data driven engineering grow multifold with it. The last several years have brought forth several new technologies to service this need - semantic Web, grid systems, Web service composition to mention a few. However, a fundamental underpinning of the success of these technologies resides in the quality of data that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reliable SLA-based Admission Controller for MPLS Networks

    Publication Year: 2007, Page(s):57 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    This paper introduces a reliability conscious admission controller for enterprise level data networks. It builds upon earlier work on adaptive admission controllers designed to optimize utility (often revenue) in a data network. This was generally accomplished by using service level agreements (SLAs) to describe user requirements, and developing techniques for optimally accommodating a subset of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Conceptual Framework for a SIM-based Electronic Transaction Authentication System

    Publication Year: 2007, Page(s):65 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    This paper presents a SIM-based tool for user authentication in various service areas such as financial transactions in e-commerce. Other remote services can use SIM as an authentication tool over existing GSM technology through GPRS, which is an additional packet data feature for the GSM network. It allows both packet-switched and circuit-switched traffic to exist in the GSM infrastructure. As GP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Further Cryptanalysis of a CRT-RSA Algorithm at CCS 2003

    Publication Year: 2007, Page(s):72 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    At CCS 2003, Blomer, Otto, and Seifert proposed a new CRT-RSA signature algorithm, which was claimed to be secure against hardware fault attack. Unfortunately, one year later, Wagner presented a simple and practical fault attack on the so-called BOS algorithm. In this paper, we give a further cryptanalysis of the BOS algorithm and can completely break the security of it with a probability at least... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Conceptual Incentive Mechanism of P2P File Sharing Systems Based on Game Theory

    Publication Year: 2007, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (807 KB) | HTML iconHTML

    Selfish adaptive peers are widespread in Peer to Peer(P2P) file sharing systems, whose actions greatly reduce the system's performance. So how to maintain significant levels of cooperation to encourage collaborative is an important aspect of P2P research. In this paper, the cooperation models of P2P file sharing systems are constructed based on the Prisoner's Dilemma Game (PDG) and the Snowdrift G... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Request-Driven Role Mapping for Secure Interoperation in Multi-Domain Environment

    Publication Year: 2007, Page(s):83 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    This paper proposes a request-driven role mapping framework for secure interoperation in multi-domain environment. To support flexible policy expression and inter-domain policy mapping, we propose a more convenient and effective method to complete the privilege query in a general hybrid role hierarchy for all special external requests. To describe the practical relationship between roles, we parti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Intrusion Detection Method Based on Artificial Immune System

    Publication Year: 2007, Page(s):91 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    Use the algorithm of generating variable-radius detectors to generate detectors. Analyze different effects on detection results by choosing different radii. Test samples need to compare with all detectors to detect intrusions. When the number of detectors is large, the detection speed is slow. Cluster near detectors into an area. The test samples which fall in this area only compare with the detec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A User-centric Federated Single Sign-on System

    Publication Year: 2007, Page(s):99 - 106
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    There is a lack of built-in privacy mechanisms within the current identity management systems. The guarantee a user has about their privacy is merely the 'trust' that the service providers will enforce their privacy requirements. The contribution of this paper is a proposal for the extension of existing Federated Single Sign-On (FSSO) systems to adopt the beneficial properties of the User-Centric ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Secure Ring Signcryption Scheme for Private and Anonymous Communication

    Publication Year: 2007, Page(s):107 - 111
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    We present a new model of verifiable certificateless ring signcryption schemes (VCRSS). We argue that it is an important cryptographic primitive for private and anonymous communication. We also propose an efficient VCRSS scheme based on bilinear pairing. In anonymous communications, our scheme allows the message sender to send the message anonymously, while the confidentiality and authenticity of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.