By Topic

2009 Fourth International Conference on Frontier of Computer Science and Technology

Date 17-19 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 130
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1219 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2009, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2009, Page(s):xviii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Message from the FCST 2009 Workshop Chairs

    Publication Year: 2009, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (94 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the 2009 International Workshop on Security Virtual Computing Environment

    Publication Year: 2009, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the First International Workshop on Security Engineering Environment

    Publication Year: 2009, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the 2009 International Workshop on Wireless Computing and Networking

    Publication Year: 2009, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the International Workshop on Pervasive Service Computing and Applications

    Publication Year: 2009, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (107 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Organizers of the 2009 International Workshop on Frontier of Secure Networks

    Publication Year: 2009, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (82 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop Executive and Program Committees

    Publication Year: 2009, Page(s):xxx - xxxiii
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • [Keynote Speech]

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • One Multi-level Data Acquisition Strategy for Parallel Pre-stack Kirchhoff Depth Migration

    Publication Year: 2009, Page(s):3 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (479 KB) | HTML iconHTML

    3D pre-stack Kirchhoff depth migration is one of important means for petroleum prospecting. During the imaging processing, it needs a large of ray travel time data. How to optimize the obtaining the required ray travel time data is very important to the efficiency of parallel processing the pre-stack depth migration. In this paper, in order to solve the problem of how effectively to obtain the req... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Study on the Preprocessing of MLFMA Parallel Computation

    Publication Year: 2009, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    For the efficient solution of large-scale problems in computational electromagnetics, the hierarchical parallelization of the multilevel fast multipole algorithm (MLFMA) is considered based on the data and the angular spectrum domain decomposition algorithms for each level. The decomposition and computation of the correlative data structure which includes the distributed tree, the interpolation or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systemic Strategy for Tuning Intra-node Collective Communication on Multicore Systems

    Publication Year: 2009, Page(s):14 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB) | HTML iconHTML

    In HPC domain, a majority of applications build on MPI and employ collective operations in their communication kernels. Improving the performance of collectives has been long term focused by a lot of work. Recently, in the optimization work of collectives on multi-core clusters, hierarchical algorithm designs are remark-able. This kind of algorithms can greatly reduce the inter-node traffic but in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Approach for Performance Analysis Oriented Parallel System Design

    Publication Year: 2009, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    The performance analysis of parallel system is critical for tuning, optimizing and algorithm modifying of parallel program. A formal modeling method based on TCPN is proposed in this paper, which makes it possible to organize a complicated parallel system as a set of hierarchical modules and includes a time concept to represent the time taken to execute events and further analyze the performance o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigation of Factors Impacting Thread-Level Parallelism from Desktop, Multimedia and HPC Applications

    Publication Year: 2009, Page(s):27 - 32
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Applications of different categories contain varying levels of data, instruction and thread-level parallelism inherently. It's important to explore the potential coarse-grain thread-level parallelism in different applications to guide the computing resources allocation problem in multicore chips. Up to now, lots of depth researches have been mainly concentrated in the desktop applications. In orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Program Behavior Study of Block Cryptography Algorithms on GPGPU

    Publication Year: 2009, Page(s):33 - 39
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Recently many studies have been made to map cryptography algorithms onto graphics processors (GPU), and gained great performances. This paper does not focus on the performance of a specific program exploited by using all kinds of optimization methods algorithmically, but the intrinsic reason which lies in GPU architectural features for this performance improvement. Thus we present a study of sever... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Resource-Efficient System for Measuring Flow Length Distribution

    Publication Year: 2009, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Knowing the length distributions of traffic flows passing through a network link is useful for some applications such as inferring traffic demands, characterizing source traffic, and detecting traffic anomalies. With high-speed Internet links, efficient and effective packet sampling techniques for traffic measurement are not only desirable, but increasingly becoming a necessity. Packet sampling ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Algorithm to Enumerate All Maximal Cliques in MapReduce

    Publication Year: 2009, Page(s):45 - 51
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    Structure mining plays an important part in the researches in biology, physics, Internet or telecommunications in recently emerging network science. As a main task in this area, the problem of maximal clique enumeration has attracted much interest and been studied in variant avenues in prior works. However, most of these works mainly rely on single chip computational capacity and have been constra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infiniband-Based Multi-path Mesh/Torus Interconnection Network for Massively Parallel Systems

    Publication Year: 2009, Page(s):52 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    Interconnection network plays an important role in massively parallel systems. As a high performance switched network standard, Infiniband is widely used in MPP systems. Compared to fat-tree topology which is commonly used in Infiniband networks, mesh/torus topology can achieve better performance and scalability. This paper proposes an Infiniband-based multi-path mesh/torus interconnection network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.