By Topic

2012 Third International Conference on Networking and Distributed Computing

Date 21-24 Oct. 2012

Filter Results

Displaying Results 1 - 25 of 60
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (2359 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Message from General Co-chairs and Program Co-chairs

    Publication Year: 2012, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (79 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICNDC 2012 Organizing Committee

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • ICNDC 2012 Steering Committees

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • ICNDC 2012 Program Committees

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Live Streaming with Content Centric Networking

    Publication Year: 2012, Page(s):1 - 5
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    Media streaming is the killer application in current Internet. There are a variety of media streaming techniques in today's Internet, such as RTSP, HTTP live streaming and Adobe Flash etc. HTTP live streaming (HLS) is a popular and most promising technique as the protocol is based on the Internet workhorse protocol i.e. HTTP, and supported by HTML5 and mobile platform. Most of these media streamin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelizing FIB Lookup in Content Centric Networking

    Publication Year: 2012, Page(s):6 - 10
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1217 KB) | HTML iconHTML

    As a promising future Internet architecture, CCN(Content Centric Networking) is a pragmatic shift from host-to-host to named content model. Providing each piece of content with a specified name, CCN can either directly route a user's Interest for a specific piece of content to the content server, or simply pick the right piece of content from the in network cache and send it back to the user. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Data Structure for Content Cache Management in Content-Centric Networking

    Publication Year: 2012, Page(s):11 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (315 KB) | HTML iconHTML

    Content-Centric Networking (CCN) is a new network architecture that rethinks the model of network communication. In this architecture all the network sources will be looked as content and routed by name. In this paper, we describe a scheme about the memory management in CCN and explore the impact of this management. We hope to design a solution for the in-network cache. To this purpose, we set up ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reality Check of CCN Routing Using Search Processor

    Publication Year: 2012, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (329 KB) | HTML iconHTML

    Content Centric Network (CCN), a typical incarnation of the Information Centric Network (ICN), which is an active research topic of Future Internet Architecture. Naming the content's chunks, retrieving and forwarding the content chunks according to their names are the core ideas of CCN. But the length of the content's name is variable length, which is an obvious difference from the IP address in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reformat Named Data Networking with Cryptographic Message Syntax

    Publication Year: 2012, Page(s):21 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB) | HTML iconHTML

    The CCNx reference implementation uses XML and ccnb to describe and encode the Interest and Data packet, but currently most security communication uses CMS based on ASN.1 and BER to characterize the protocol packet. Therefore, in order to be compatible with these existing crypto technology and products, we propose to reformat the Interest and Data packet with CMS. In addition, BER encoding causes ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Method of Accelerating LDA Program with GPU

    Publication Year: 2012, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    LDA (Latent Dirichlet Allocation) is a text modeling algorithm based on a generative probabilistic model. It is widely used to discover latent topics among a set of documents. Mahout has implemented LDA algorithm, however, the execution time of the LDA program is very long when processing a large amount of documents, because the documents are processed in sequence. This paper introduces a method t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Implementation of High Performance Parallel KNN Algorithm Based on GPU

    Publication Year: 2012, Page(s): 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB)

    Summary form only given, as follows. Tremendous data will be generated in ERP system of an enterprise. Those data are very valuable for the enterprise. Therefore, Business Intelligent (BI) is used to help companies. Business Intelligent often uses data mining technologies. One of the methods in data mining is k-nearest neighbor (KNN). The time complexity of KNN is a bottleneck in the practical app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Parallel Computing on Large Scale Atmospheric Nucleation

    Publication Year: 2012, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    During the process of atmospheric nucleation, harmful substances may be generated, thus, it is with significant to conduct research on the process. In our previous work, some tools for visualization have already been developed. However, while the data set becomes larger, the computing time also increases accordingly. To make things worse, sometimes the visualization tool may become unstable due to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Easy Matrix Computation Based Simulator of NDN

    Publication Year: 2012, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    This paper presents an easy matrix computation based simulator of NDN network architecture. This simulator is just like Newtonian mechanics in some way, once given the system initial state, routing table, content distribution, initial data requesting information of NDN network, the simulator can figure out all of the subsequent network state based on matrix operation. This simulator turns packet p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Evaluation of Network Virtualization in Cloud Computing Environment

    Publication Year: 2012, Page(s):40 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (722 KB) | HTML iconHTML

    Network virtualization in cloud computing environment has attracted many attentions recently. With the help of network virtualization, VMM is able to provide fine-grained isolation among different VMs. However, the performance and overhead introduced by network virtualization is also important concerns when applying network virtualization to the cloud computing environment. In this paper, we evalu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Education Reform of Negative Feedback Teaching Process Based on Cloudy Computing

    Publication Year: 2012, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    In order to improve the quality of teaching, this paper presents a model of a negative feedback process of teaching reform. The model can be developed to improve the teaching program to develop students' ability. The paper discusses the system of two types of indicators to measure teaching effectiveness, as well as a corresponding meaning. Also we propose how to conduct data fusion algorithms and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Distributed Computing Systems with ElopTM

    Publication Year: 2012, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    In the era of Internet, one of the most ultimate goals is that users can seamlessly access to any computing application or service at anywhere anytime. Computing infrastructuralization is the path to gradually address the challenge. In this work, elop computing is proposed that encapsulates and integrates various computing elements as services, benefiting from existing advanced computing technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Algorithm for Constructing Extremal Graphs Based on MapReduce

    Publication Year: 2012, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (410 KB) | HTML iconHTML

    MapReduce is a common programming model for processing and generating large datasets at present. Using the model, the programming for distributed computing can be easier than others. The extremal graph is a graph with the maximum number of edges such that it does not contain given sub graph. The method of constructing extremal graphs is an important research content in Graph Theory. The algorithm ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Hadoop Cloud Computing Model and its Applications

    Publication Year: 2012, Page(s):59 - 63
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    Hadoop is an open-source software platform for distributed computing dealing with a parallel processing of large data sets. It has been widely used in the field of cloud computing. This paper describes the three most crucial parts of Hadoop, including HDFS, the distributed file system, MapReduce, the data processing model, and HBase, the distributed structured data table. The application status, m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Reform of Three-Dimensional to the Practice of Telecommunication System for the Applications of Internet of Things

    Publication Year: 2012, Page(s):64 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Internet of Things (IOT) which is a rapidly emerging industry is setting off the third wave in the world's information industries, and it will become both the representative of emerging productive forces and the major point of economic growth. In the context of Internet of Things, the colleges and universities have set up the course of Practice of Telecommunication System. This article tries to an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A strategy for mesh client mobility support in wireless mesh networks

    Publication Year: 2012, Page(s):69 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Mesh Client (MC) may be frequently move from the current SMAP to another SMAP in the Wireless Mesh Networks (WMN). The most of the present research papers on WMN assume that the MC is static or quasi static. However, MC may constantly move actually, which connection interruption and packet loss may occur. To solve these problems this paper presents a mobility support strategy for WMN, which consis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.