By Topic

2011 Second International Conference on Networking and Distributed Computing

Date 21-24 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 81
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (408 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Message from the General Co-chairs and Program Co-chairs

    Publication Year: 2011, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICNDC 2011 Organizing and Program Committees

    Publication Year: 2011, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Message from the SP2PN 2011 Workshop Chair

    Publication Year: 2011, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • UAP: A New UDP-Based Application Level Transport Protocol

    Publication Year: 2011, Page(s):3 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    In this paper, we propose a new UDP-based and rate-based application layer protocol, named UAP. The main objective of UAP is to meet the needs of the applications to have all the following merits: reliability, real time, fairness, file-transport, P2P-friendliness and TCP-friendliness. However, the previous studies of UDP-based application layer protocol have only focuses on certain parts of the ab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of Embedded RUDP

    Publication Year: 2011, Page(s):7 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Introduces the ideas and methods of design and implementing of RUDP in embedded system based on UDP protocol. By testing and practical application, it shows that the design is very effective for the high-speed transmission of data in embedded systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on QoS for DVB-RCS Satellite Networks

    Publication Year: 2011, Page(s):10 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    With the development of the multimedia technology, such as voice and video, it is very necessary to supply a certain level of quality of service (QoS) because they are sensitive to delay. To address this issue, a QoS mechanism which works in layer II called Time Division Multiple Access-Demand Assignment Multiple Access (TDMA-DAMA) is proposed. The goal of the algorithm is to compute the request f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart-Lab, LAN Based Application for Effective Lab Supervision

    Publication Year: 2011, Page(s):15 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    A general problem while coducting lab sessions is inability to correctly assess students' progress of the taught material. The main reason is that generally the lab layout does not provide access to view every student's computer screen. Application of science and technology in the field of education can solve this and numerous other issues. For this specific problem, class and lab monitoring syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Lexicographical Sort Algorithm of Copy-move Forgery Detection

    Publication Year: 2011, Page(s):23 - 27
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (207 KB) | HTML iconHTML

    As a technique for digital image tampering, copy-move forgery is frequently used. In this paper, an improved lexicographical sort algorithm based on discrete cosine transform (DCT) is developed to detect copy-move forgery. Firstly, the image is split into 8*8 blocks, and the image data undergoes a DCT. Then the DCT coefficients were grouped to reduce the dimension according to the frequency proper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Steganography Scheme Based on Fractal Images

    Publication Year: 2011, Page(s):28 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on their initial condition, information are embedded during creating fractal images by secret information and initial parameters. The receiver can ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Genetic Algorithm for 0-1 Knapsack Problems

    Publication Year: 2011, Page(s):32 - 35
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    The 0-1 knapsack problems is a problem in combinatorial optimization, which is NP-complete to solve exactly. A genetic algorithm is a kind of heuristic that mimics the process of natural evolution. We derived an improved solution for 0-1 knapsack problem based on the dual population genetic algorithm, which can overcome the defect of precocious and local convergence in iterative processes. The per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Botnet Size Measurement

    Publication Year: 2011, Page(s):36 - 40
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    Botnet size is one of the most important characteristics to evaluate the threat of botnet. Previous studies of botnet size basically focus on details and concreteness instead of nature of problem due to polymorphic, versatile, complex behavior of botnet and partial observation on network. This paper investigates the nature of botnet size, upon which four issues are introduced. The paper summarizes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiency Evaluation Method of Simulation System Based on BP Neural Network

    Publication Year: 2011, Page(s):41 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    At the present time, it is difficult to find some good solutions to evaluate the efficiency of the simulation system yet. According to the Command & Control Simulation System (C2SS), this paper brought forward an evaluation method based on BP neural network to evalutate their efficiency. We built a neural network's model and described the construction of the swatch and the training process, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Errors of Utilized Bandwidth Measured by NetFlow

    Publication Year: 2011, Page(s):45 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    NetFlow is a popular technology in network management nowadays. It supports administrators to get various performance metrics. But metric values estimated from NetFlow records may inaccurate in some circumstance. This paper aims at studying the errors of utilized bandwidth measured by NetFlow. At first, packet streams with a specific format were collected from the backbone by passive measurement a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JSERNET UDP53 Port Traffic Analysis

    Publication Year: 2011, Page(s):50 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    As the well known port for DNS service, the 53 port won't be shielded by most of firewalls or network services. This defect can be used to send packets through firewalls without being detected. For comprehensive understanding of this phenomenon, a program was designed to inspect UDP flows going through the port 53. With the help of this program, we conducted traffic analysis on the 53 port of JSER... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of an Application Model Based on Vertical Search Engine

    Publication Year: 2011, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    This paper introduces the definition and characteristics of vertical search engine briefly, designs an application model of vertical search engine to improve the efficiency for users' searches and describes the algorithm of the key module of the model in detail. The experiment, using the advanced algorithm to compare the traditional search engine and vertical search engine, proves the feasibility ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TIFA: Enabling Real-Time Querying and Storage of Massive Stream Data

    Publication Year: 2011, Page(s):61 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    With the proliferation of network applications and user groups, the network stream data scale are getting larger and larger. To manage and analyze the massive data to get better service for end users (a.k.a. network optimization) or understanding of impacts of new network applications are attracting many researchers. This paper focuses on the storage and real-time retrieval of network traffic for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Document-Based Information Retrieval Model Vector Space

    Publication Year: 2011, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Based on the study of traditional retrieval models, an improved model of vector space information retrieval has been proposed in the paper. The model has fully considered the effect of file structure on the importance of words. It can avoid the disadvantages of low recall and precision in the vector space model if the improved model is selected to calculate the similarity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • License Plate Locating Based on CRI Reasoning Scheme

    Publication Year: 2011, Page(s):69 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    According to the characteristics of the texture on a car license plate (CLP), and the characteristics of the color on the CLP. A new location method based on CRI reasoning scheme is proposed in this paper. First separating the image based on color information and gray information, respectively. Then incorporate these two images and selecting the candidate location plates by using the method of sli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Large-scale Storage and High-performance Processing Environment for Remote Sensor Images

    Publication Year: 2011, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    Remote sensor data are widely used in ecological, geographical and military applications. But nowadays, it is difficult to store and process the massive remote sensing images whose volume is still continually increasing. In order to facilitate these GIS related data-intensive applications, a scalable and high performance environment for remote sensor data storage and processing is required. In thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Parallelized Random Linear Network Coding Algorithm on GPU

    Publication Year: 2011, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Network coding has been used widely in various networks for improved throughput and robustness. However, the computational overhead introduced by the network coding operations has become the obstacle for practical deployment of network coding. In this paper, we exploit the parallel computing power of GPU (graphics processing unit) to accelerate the network coding operations. In the INVIDIA's CUDA ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.