By Topic

Networking, Architecture, and Storage, 2009. NAS 2009. IEEE International Conference on

Date 9-11 July 2009

Filter Results

Displaying Results 1 - 25 of 82
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Messages from the Program Co-chairs

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (98 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing and Program Committee

    Publication Year: 2009, Page(s):xiii - xvi
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • An Energy-efficient Broadcast Control Protocol for Wireless Sensor Networks

    Publication Year: 2009, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    Compared with fixed networks, broadcasting from base station to nodes is very important for the wireless networks in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient broadcast in wireless sensor networks. An energy-efficient broadcast control protocol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Transmission Mechanism for Survivable Sensor Networks

    Publication Year: 2009, Page(s):9 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    In wireless sensor networks (WSN), packets being sent over the transmission channel could get lost or corrupted due to factors such as channel noises, interferences, and node failures. Using the traditional retransmission mechanism to recover the lost/erroneous packets is costly or even impossible for WSN because sensor nodes are severely resource constrained and data transmission is the most ener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving Relay Connectivity and Coverage in Heterogeneous Wireless Sensor Networks

    Publication Year: 2009, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    To achieve scalability, a few resource-rich heterogeneous nodes are scattered in a wireless sensor network consisting of a large number of energy-constrained sensor nodes. Heterogeneous nodes are equipped with powerful radio transceiver and their main task is to organize a backbone communication network and to relay data to the sink. For the scenario, this paper proposes a coverage problem which m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TinyBee: Mobile-Agent-Based Data Gathering System in Wireless Sensor Networks

    Publication Year: 2009, Page(s):24 - 31
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    This paper proposes a mobile-agent-based data gathering system (called TinyBee) in wireless sensor networks. Most existing mobile-agent-based systems consider only static sinks/servers. In this paper, we consider both mobile servers and lightweight mobile agents. We aim to design a data gathering system using a special kind of mobile agent called TinyBee to collect data all over a network. TinyBee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Performance Isolation Algorithm for Shared Virtualization Storage System

    Publication Year: 2009, Page(s):35 - 42
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    It is a challenging task that enables performance isolation while providing performance guarantees among applications that share storage infrastructure. This paper presents admission-control-based proportional allocation (APA), a novel I/O request scheduler that combines the admission control of worst-case resources reserved with the proportional resources allocation to manage the bandwidth resour... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Disk Image Reclamation for Software Updates in Virtual Machine Environments

    Publication Year: 2009, Page(s):43 - 50
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    Virtual disks (VD) are the main form of storage in today's virtual machine (VM) environments for they have many attractive features, such as encapsulation, mobility, isolation, etc. A typical virtual disk image usually has a large size of at least several gigabytes, a disadvantage that may limit its usage in many situations, such as fast software deployment in large-scale virtual machine environme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection

    Publication Year: 2009, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (453 KB) | HTML iconHTML

    Hash tree based disk storage integrity protection suffers from performance penalty and possible losing of consistency. FI-Tree deploys a fixed-structure tree and applies incremental-hash to tree node updating to solve the difficulties of performance and consistency. The biggest advantage of FI-Tree comes from that: to allow tree nodes to be cached to optimize performance, it can maintain consisten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Currency in Replicated Distributed Storage System

    Publication Year: 2009, Page(s):57 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    Application-level storage aggregation provides a massive storage capacity with high scalability and low cost. However, these systems usually only support their special sites, which ignores the legacy storage systems. So we developed a distributed storage system to aggregate these popular storages and provide a uniform access and management interface for these sites. To ensure high data availabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Grid Resource Scheduling Model Using Learning Agent

    Publication Year: 2009, Page(s):67 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB) | HTML iconHTML

    Grid scheduling is a key problem for grid to improve the resource management and application performance. It has been proven to be a NP-hard problem for the computation of optimal grid schedules, which is responsible to allocate resources to user jobs with the objective such as minimizing the completion time or cost. Therefore, it is more difficult for Grid scheduling system to cope with the dynam... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Effect of Huge Page on Large Scale Applications

    Publication Year: 2009, Page(s):74 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    The ever-increasing memory footprint in large scale applications not only requires efficient computation, but also needs efficient communication. Traditionally huge page is used to reduce CPUpsilas TLB miss, but how huge page impacts communication performance, and how HPC applications in large scale benefit from huge page are still not clear. In this paper, we support huge page in our D5000A platf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Group-by Query Process in Middleware of Large Scale Data Intensive Systems

    Publication Year: 2009, Page(s):82 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Large scale data intensive systems are available in many fields in recent years, and itpsilas a severe challenge for group-by query of large volume of data in a cluster based on shared-nothing architecture. This paper proposes a design of a parallel query engine (PQE) and its asynchronous improvement (APQE) for group-by queries. PQE and APQE support for pipelined query processing and develop maxim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual Machine Scalability on Multi-Core Processors Based Servers for Cloud Computing Workloads

    Publication Year: 2009, Page(s):90 - 97
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (549 KB) | HTML iconHTML

    In this paper, we analyze virtual machine (VM) scalability on multi-core systems for compute-, memory-, and network I/O-intensive workloads. The VM scalability evaluation under these three workloads will help cloud users to understand the performance impact of underlying system and network architectures. We demonstrate that VMs on the state-of-the-art multi-core processor based systems scale as we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An HTTP Extension for Secure Transfer of Confidential Data

    Publication Year: 2009, Page(s):101 - 108
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    Users' confidential data in transit on the WWW are protected by the HTTP's authentication scheme or the SSL protocol. However, the former has several weak points in terms of security, while the latter has a few problems against its wide deplotmemt. To alleviate the problems, we propose a scheme for user-initiated server authentication and two schemes for protecting against the cross-site-scripting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Aggregation-Based Raw Reputation Generation Approach

    Publication Year: 2009, Page(s):109 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (483 KB) | HTML iconHTML

    In the anti-spam area, distributed spam processing technology that based on reputation mechanism is a currently main focus in research. The raw reputation plays an important role in computing the finial reputation of the target node. In this paper, we analyze the ratio-based raw reputation generation approach in detail, point out its problems, and propose an aggregation-based raw reputation genera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Lightpath Routing in Optical Mesh Networks under Multiple Link Failures

    Publication Year: 2009, Page(s):114 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    In this work, we study the problem of maximizing lightpath reliability in optical mesh networks against simultaneous failures of multiple fiber links without using protection schemes. The fiber links belong to shared risk link groups (SRLGs) that have arbitrary failure probabilities. This problem is NP-hard and we propose heuristic algorithms for networks with large numbers of SRLGs as well as opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community-base Fault Diagnosis Using Incremental Belief Revision

    Publication Year: 2009, Page(s):121 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (455 KB) | HTML iconHTML

    Overlay networks have emerged as a powerful and flexible platform for developing new disruptive network applications. The attractive characteristics of overlay networks such as planetary-scale distributions, user-level flexibility (e.g., overlay routing) and manageability bring to overlay fault diagnosis new challenges, which include inaccessible underlying network information, incomplete and inac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.