default search action
8. GPC 2013: Seoul, Korea
- James J. Park, Hamid R. Arabnia, Cheonshik Kim, Weisong Shi, Joon-Min Gil:
Grid and Pervasive Computing - 8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings. Lecture Notes in Computer Science 7861, Springer 2013, ISBN 978-3-642-38026-6
Cloud, Cluster and Grid I
- Jonas Repschlaeger:
Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics. 1-10 - Marcus Hilbrich, René Jäkel:
Distributed Accounting in Scope of Privacy Preserving. 11-22 - Li Ruan, Jinbing Peng, Limin Xiao, Mingfa Zhu:
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration. 23-31 - Shyamala Loganathan, Saswati Mukherjee:
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment. 32-39 - Lun-Chi Chen, Ping-Jen Kuo, I-En Liao, Jyun-Yao Huang:
Scaling Out Recommender System for Digital Libraries with MapReduce. 40-47 - Muhammad Imran, Helmut Hlavacs:
Layering of the Provenance Data for Cloud Computing. 48-58 - Tyng-Yeu Liang, Yu-Jie Lin:
JCL: An OpenCL Programming Toolkit for Heterogeneous Computing. 59-72 - Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, Jong Hyuk Park:
Network-Aware Multiway Join for MapReduce. 73-80 - Ching-Chi Lin, Jan-Jan Wu, Pangfeng Liu, Jeng-An Lin, Li-Chung Song:
Automatic Resource Scaling for Web Applications in the Cloud. 81-90 - Maxim Schnjakin, Christoph Meinel:
Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. 91-102 - Soheil Anousha, Mahmood Ahmadi:
An Improved Min-Min Task Scheduling Algorithm in Grid Computing. 103-113
Cloud, Cluster and Grid II
- Jin-Neng Wu, Yao-Hsing Ko, Kuo-Ming Huang, Mu-Kai Huang:
Heterogeneous Diskless Remote Booting System on Cloud Operating System. 114-123 - Xiaohu Bai, Hai Jin, Xiaofei Liao, Xuanhua Shi, Zhiyuan Shao:
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System. 124-133 - Seonyoung Park, Youngseok Lee:
Secure Hadoop with Encrypted HDFS. 134-141 - Daeyong Jung, Sung-Ho Chin, Kwang-Sik Chung, Heon-Chang Yu:
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing. 142-151 - Mansura Habiba, Shamim Akhter:
A Cloud Based Natural Disaster Management System. 152-161 - Mohamed Ben Belgacem, Haithem Hafsi, Nabil Abdennadher:
A Hybrid Grid/Cloud Distributed Platform: A Case Study. 162-169 - Mohammad Mahdi Kashef, Azamat Uzbekov, Jörn Altmann, Matthias Hovestadt:
Comparison of Two Yield Management Strategies for Cloud Service Providers. 170-180 - Oliver Maye, Michael Maaser:
Comparing Java Virtual Machines for Sensor Nodes - First Glance: Takatuka and Darjeeling. 181-188 - Jianyong Zhang, Qihui Mi, Longji Hu, Yue Tang:
Research on Opinion Formation of Microblog in the View of Multi-agent Simulation. 189-198 - Chao-Tung Yang, Kuan-Lung Huang, William Cheng-Chung Chu, Fang-Yie Leu, Shao-Feng Wang:
Implementation of Cloud IaaS for Virtualization with Live Migration. 199-207
Middleware, Resource Management
- Sang-Soo Yeo, Jong Hyuk Park:
Security Considerations in Cloud Computing Virtualization Environment. 208-215 - Shuai Li, Fei Hao, Mei Li, Hee-Cheol Kim:
Medicine Rating Prediction and Recommendation in Mobile Social Networks. 216-223 - Antero Taivalsaari, Tommi Mikkonen, Kari Systä:
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface. 224-233 - Francisco Lepe Salazar, Tatsuo Nakajima, Todorka Alexandrova:
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment. 234-243 - Glaucio H. S. Carvalho, Isaac Woungang, Md. Mizanur Rahman, Alagan Anpalagan:
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks. 244-252 - Leila Abidi, Christophe Cérin, Mohamed Jemni:
Desktop Grid Computing at the Age of the Web. 253-261 - Miran Baek, Myeongbae Lee, Honggean Kim, Taehyung Kim, Namjin Bae, Yongyun Cho, Jangwoo Park, Chang-Sun Shin:
A Novel Model for Greenhouse Control Architecture. 262-269
Mobile, Peer-to-Peer and Pervasive Computing
- Chittaranjan Hota, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, Antti Ylä-Jääski:
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks. 270-279 - Chulhee Cho, Jae Young Choi, Younghwa Cho, Jong Pil Jeong:
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments. 280-287 - Kevin I-Kai Wang, HeeJong Park, Zoran Salcic, Panith Ratnayaka:
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications. 288-298 - Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba, Cheonshik Kim:
Architecture of a Context Aware Framework for Automated Mobile Device Configuration. 299-308 - Seung Yoon Park, Jae Young Choi, Jong Pil Jeong:
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 Networks. 309-316
Multi-core and High Performance Computing
- Ying Zhang, Gen Li, Yongjin Li, Caixia Sun, Pingjing Lu:
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor. 317-325 - Yu Zhang, Hai Jin, Xiaofei Liao:
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM. 326-335 - Lei Zhu, Jianhua Gu, Tianhai Zhao, Yunlan Wang:
Research on Log Pre-processing for Exascale System Using Sparse Representation. 336-347
Other GPC Related Topics
- Truong Giang Le, Olivier Hermant, Matthieu Manceny, Renaud Pawlak, Renaud Rioboo:
Using Event-Based Style for Developing M2M Applications. 348-357 - (Withdrawn) Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic Algorithm. 358-366
- Erratum: Scheduling Optimization of the RFID Tagged Explosive Storage Based on Genetic Algorithm.
- Young-Sung Cho, Si Choon Noh, Song Chul Moon:
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System. 367-375 - Bangjie Jiang, Junmin Wu, Xiaodong Zhu, Die Hu:
Priority-Based Live Migration of Virtual Machine. 376-385 - Youngguk Kim, Heung-Gyoon Ryu:
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK. 386-392 - Richelle LeMay, Sangil Choi, Jong-Hoon Youn, Jay Newstorm:
Postural Transition Detection Using a Wireless Sensor Activity Monitoring System. 393-402
Parallel and Distributed Systems
- Yong Wan, Dan Feng, Fang Wang, Tingwei Zhu:
A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication. 403-412 - Jinzhou Huang, Hai Jin:
Friends Based Keyword Search over Online Social Networks. 413-422 - Chih-Yuan Yeh, Chung-Yao Kao, Wei-Shu Hung, Ching-Chi Lin, Pangfeng Liu, Jan-Jan Wu, Kuang-Chih Liu:
GPU Virtualization Support in Cloud System. 423-432 - Yi Chen, Zhi Qiao, Hai Jiang, Kuan-Ching Li, Won Woo Ro:
MGMR: Multi-GPU Based MapReduce. 433-442
Security and Privacy
- Sung-ju Kim, Byung-Chul Kim, Jae Yong Lee:
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity. 443-452 - Jyun-Yao Huang, Cheng-Kang Chiang, I-En Liao:
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment. 453-463 - Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin:
Active One-Time Password Mechanism for User Authentication. 464-471 - Jed Kao-Tung Chang, Chen Liu, Jean-Luc Gaudiot:
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection. 472-481 - Junyeong Bok, Heung-Gyoon Ryu:
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security. 482-490 - Yuliang Shi, Zhen Jiang, Kun Zhang:
Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications. 491-500 - Yao Ma, Hongwei Lu, Zaobin Gan:
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments. 501-508 - Yi Qin, Dan Feng, Wei Tong, Jingning Liu, Yang Hu, Zhiming Zhu:
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs. 509-516 - Isaac Woungang, Sanjay Kumar Dhurandher, Michael Sahai:
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath. 517-525 - Mi-Young Jang, Jae-Woo Chang:
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services. 526-535 - Hyunjo Lee, Jae-Woo Chang:
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based Services. 536-545
Ubiquitous Communications, Sensor Networking, and RFID
- Chih-Hsiao Tsai, Kai-Ti Chang, Cheng-Han Tsai, Ying-Hong Wang:
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks. 546-555 - Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Byung-Jun Lee, Seulbi Lee, Dae-Yong Im:
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles. 556-562 - Kyungkoo Jun:
Enabling Massive Machine-to-Machine Communications in LTE-Advanced. 563-569 - Hyun-Ho Shin, Seungjin Lee, Byung-Seo Kim:
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks. 570-576 - Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Smart Watch and Monitoring System for Dementia Patients. 577-584 - Daesik Kim, Seongkee Lee, Mirim Ahn:
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems. 585-593 - HyunJu Lee, Dongil Shin, Dongkyoo Shin, Soohan Kim:
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services. 594-601 - Tae-Gyu Lee, Gi-Soo Chung:
DNA-S: Dynamic Cellular Network Architecture for Smart Communications. 602-611
Ubiquitous and Multimedia Application Systems
- Jaewan Shin, Dongkyoo Shin, Dongil Shin:
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment. 612-622 - Sunghee Lee, Seongah Chin:
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features. 623-630 - Guyoun Hwang, Heejun Cho, Dongkyoo Shin, Dongil Shin:
Emotion Recognition Technique Using Complex Biomedical Signal Analysis. 631-640 - Soo Young Shin, Soo-Hyun Park:
RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network. 641-648 - Phan Trung Huy, Cheonshik Kim, Nguyen Tuan Anh, Le Quang Hoa, Ching-Nung Yang:
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules. 649-658 - Jin-Hong Kim, Seung-Cheon Kim:
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering. 659-664
Design, Analysis and Tools for Integrated Circuits and Systems
- Nan Zhang, Dejun Xie, Eng Gee Lim, Kaiyu Wan, Ka Lok Man:
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates. 665-675 - Nan Zhang, Kaiyu Wan, Eng Gee Lim, Ka Lok Man:
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees. 676-685 - Kaiyu Wan, Vangalur S. Alagar:
A Resource-Centric Architecture for Service-Oriented Cyber Physical System. 686-693 - Jin Zheng, Nan Zhang, Dejun Xie:
Implied Volatilities of S&P 100 Index with Applications to Financial Market. 694-699 - Meng Zhang, Eng Gee Lim, Zhao Wang, Tammam Tillo, Ka Lok Man, Jing Chen Wang:
RF Characteristics of Wireless Capsule Endoscopy in Human Body. 700-706 - Chi-Un Lei, J. K. Seon, Zhun Shen, Ka Lok Man, Danny Hughes, Youngmin Kim:
Building a Laboratory Surveillance System via a Wireless Sensor Network. 707-714 - Danny Hughes, Nelly Bencomo, Brice Morin, Christophe Huygens, Zhun Shen, Ka Lok Man:
S-Theory: A Unified Theory of Multi-paradigm Software Development. 715-722
Future Science Technologies and Applications
- Taekyeong Kang, Namje Park:
Design of J-VTS Middleware Based on IVEF Protocol. 723-729 - Youngsook Lee, Dongho Won:
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol. 730-736 - I-Hui Li, Jyun-Yao Huang, I-En Liao, Jin-Han Lin:
A Sequence Classification Model Based on Pattern Coverage Rate. 737-745 - Yeonghae Ko, Namje Park:
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School. 746-751 - Youngseok Chung, Youngsook Lee, Dongho Won:
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. 752-760 - Mijin Kim, Namje Park, Dongho Won:
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. 761-766 - Jaeho An, Namje Park:
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School. 767-772 - Namje Park, Yeonghae Ko:
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection. 773-780 - Mijin Kim, Namje Park:
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System. 781-787 - Hyun-Jung Lee, Youngsook Lee, Dongho Won:
Security Requirement of End Point Security Software. 788-795 - Inkyung Jeun, Youngsook Lee, Dongho Won:
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. 796-802 - Hyunsik Yang, Qiuyan Jin, Hanwook Lee, Kwang-Woo Lee, Dongho Won:
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity. 803-810 - Chun-Cheng Lin, Yi-Ling Lin, Wan-Yu Liu:
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing. 811-818
Green and Human Information Technology
- Hoyoung Hwang, Seungcheon Kim:
Topology Information Based Spare Capacity Provisioning in WDM Networks. 819-825 - Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong, Yong Lee:
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics. 826-831 - Jin-Hong Kim, Seung-Cheon Kim:
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System. 832-837 - Heejung Yu:
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users. 838-845 - Byung Joon Oh, Ki Young Lee:
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC. 846-853 - Xin Wang, Heung-Gyoon Ryu:
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm. 854-859 - Jaeho Lee, Yongjin Lee, Seung-Cheon Kim:
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. 860-865 - Shu Chen, Rashid Ahmad, Byung-Gil Lee, Byung-Doo Kim, Do-Hyeun Kim:
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway. 866-872 - Won-Hyuk Yang, Mohamed A. Ahmed, Ki-Beom Lee, Young-Chon Kim:
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks. 873-879 - Le The Dung, Seungwan Jo, Beongku An:
VLC Based Multi-hop Audio Data Transmission System. 880-885 - Le The Dung, Sue Hyung Ha, Beongku An:
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless Networks. 886-892 - Sue Hyung Ha, Le The Dung, Beongku An:
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless Networks. 893-898 - Dae-Man Do, Maeng-Hwan Hyun, Young-Bok Choi:
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation Support. 899-906 - Joongjin Kook:
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor Networks. 907-913 - Jun-Pill Boo, Sang-Chul Kim, Dong-Hwan Park, Hyo-Chan Bang, Do-Hyeun Kim:
A Study of Fire Refuge Guide Simulator Based on Sensor Networks. 914-919 - Kee-Won Kim, Jun-Cheol Jeon:
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array. 920-925 - Jae-Wook Seol, Kwang-Yong Jeong, Kyung-Soon Lee:
Follower Classification through Social Network Analysis in Twitter. 926-931 - Yalin Wu, Sun-Woo Ko:
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264. 932-938 - Seok-Pil Lee, Euiseok Nahm:
The Development of Privacy Telephone Sets in Encryption System against Eavesdropping. 939-944 - Eun-Jun Yoon, Yong Soo Choi, Cheonshik Kim:
New ID-Based Proxy Signature Scheme with Message Recovery. 945-951
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.