By Topic

2010 First International Conference on Networking and Distributed Computing

21-24 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 96
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1413 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (282 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (170 KB)
    Freely Available from IEEE
  • Message from the General Co-chairs and Program Co-chairs

    Publication Year: 2010, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing and Program Committees

    Publication Year: 2010, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • ICNDC 2010 Sponsors

    Publication Year: 2010, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (59 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the SP2PN 2010 Workshop Chair

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (67 KB) | HTML iconHTML
    Freely Available from IEEE
  • SP2PN 2010 Workshop Committee

    Publication Year: 2010, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • Message from the SecWSN 2010 Workshop Chair

    Publication Year: 2010, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (63 KB) | HTML iconHTML
    Freely Available from IEEE
  • SecWSN 2010 Organizing Committee

    Publication Year: 2010, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Research and Implementation of Distributed Simulation and Parallel Rendering System Based on Grid

    Publication Year: 2010, Page(s):3 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1126 KB) | HTML iconHTML

    With the development of Grid technology and the extension of Grid application areas, it needs to provide core infrastructure platform and the necessary functional components for large-scale resources sharing and collaboration. Based on the previous implementation of interactive Grid visualization system, this paper extends its runtime environment layer to provide Grid supports for the existing dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DFSB: A Prototype of Distributed Storage System Based on LDPC

    Publication Year: 2010, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    In this paper we present a prototype of distributed storage system based on LDPC called Distributed File StrongBox(DFSB). DFSB is an archive-oriented system, and it is designed to guarantee high availability and security of distributed storage. This high availability is achieved through novel application of LDPC which is normally applied in communication protocols. We use LDPC to calculate redunda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Study of the Distributed Transaction in the Service Bearer Network

    Publication Year: 2010, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2846 KB) | HTML iconHTML

    The construction and the deployment of the service bearer network contain multiple network nodes. So it needs to do a unified operation. In the deployment processing, the whole service instance will fail if one operation fails. So it is a distributed transaction with ACID properties. This paper has done some research on the distributed transaction in a service bearer network. In addition to the ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovation of Chinese Input Based on Android Multimedia Mobile Device

    Publication Year: 2010, Page(s):17 - 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    The Chinese input problem is essential to multimedia mobile device. After introducing the basic concept of Android system, characteristics of Android are analyzed. A realization of Chinese input based on Android with C language is proposed in this paper, and a corresponding new method which can improve the performance of the input method is raised. The experimental results show that this new metho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel File System-surpported Server Virtual Environment in Data Center

    Publication Year: 2010, Page(s):20 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    Server virtualization is the key technology for data center. It can be used to integrate servers, reduce hardware cost, reduce space and power consumption in data center. Dynamic migration is an important feature of server virtualization technology that makes it possible for a virtual server to migrate from one PC to another at run-time. By using dynamic migration, service interruptions caused by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cluster-based Parallel Geometric Correction Algorithm for Photogrammetry

    Publication Year: 2010, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    With the rapid development of data acquiring technology, the amount of image data that need to be geometrically corrected in photogrammetry becomes huge, thus processing time is becoming unbearable, especially in some applications that require real-time processing. To solve this kind of problem, the parallel geometric correction algorithm is studied, and a new parallel algorithm based on cluster i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Method for Weighted Coverage Optimization of Occlusion-Free Surveillance in Wireless Multimedia Sensor Network

    Publication Year: 2010, Page(s):31 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (443 KB) | HTML iconHTML

    In this paper, characteristics of weighted coverage model for wireless multimedia sensor networks are analyzed, and the distribution of orientation and location of occlusion-free surveillance is discussed. Subsequently, the concept of weighted coverage for different sub-regions is provided, and a novel coverage enhancement algorithm of occlusion-free surveillance model based on genetic algorithm i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Hierarchical Threat Model of Routing Security for Wireless Ad Hoc Networks

    Publication Year: 2010, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can't reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved SPEED Protocol for Wireless Mesh Sensor Network

    Publication Year: 2010, Page(s):41 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (391 KB) | HTML iconHTML

    The mobility is an important research topic in wireless sensor network. This paper presents an improved strategy of SPEED protocol for the requirement of node mobility in Wireless Mesh Sensor Network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Location Based Service Framework of Ubiquitous Computing

    Publication Year: 2010, Page(s):43 - 47
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    Location based services (LBS) are very abundant in our society, which focus on providing users navigation information to make the travel more convenient. With the rapid development of evolving mobile technologies (3G, Wi-Fi, and IPv6), large amounts of data (infotainment, et al.) transmission comes true, which makes the sole navigation information seems tedious. Ubiquitous Computing emphasizes the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast-Tree Construction and Streaming Mechanism for Intra 802.16 Mesh Networks

    Publication Year: 2010, Page(s):48 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    This work proposes a novel two-stage scheme for constructing an effective multicast tree. The first stage applies a priority-based algorithm to find suitable multicast points and construct effective multicast sub-trees. The second stage applies an interference-aware Steiner tree to connect the source to each multicast sub-tree. Finally, an algorithm generates the final multicast tree topology. Sim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evenness Evaluation in Ad-Hoc Sensor Networks

    Publication Year: 2010, Page(s):53 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The sensor deployment is a critical step in the implementation of wireless sensor networks. During the deployment, sensors are hoped to be deployed as evenly as possible, so that the network can monitor a bigger area. The evenness is an important metric of the deployment of a network. We formulate and investigate an Evenness Measurement problem in a two-dimensional continuous space. We propose a m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.