The SCEAS System
Navigation Menu

Conferences in DBLP

International Symposium on Parallel and Distributed Processing and Applications (ispa)
2005 (conf/ispa/2005w)

  1. Di Wu, Ye Tian, Kam-Wing Ng
    Aurelia: Building Locality-Preserving Overlay Network over Heterogeneous P2P Environments. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:1-8 [Conf]
  2. Sanfeng Zhang, Guoxin Wu, Gang Chen, Libo Xu
    On Building and Updating Distributed LSI for P2P Systems. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:9-16 [Conf]
  3. Yin Li, Fanyuan Ma, Liang Zhang
    Performing Efficient Keyword Search by Keyword Grouping in DHT Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:17-26 [Conf]
  4. Hanyu Liu, Yu Peng, Mao Yang, Yafei Dai
    Characterization of P2P File-Sharing System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:27-34 [Conf]
  5. Liu Fang, Rao Ruonan
    Analysis of GHT in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:35-44 [Conf]
  6. Xinli Huang, Fanyuan Ma, Yin Li
    Attack Vulnerability of Peer-to-Peer Networks and Cost-Effective Immunization. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:45-53 [Conf]
  7. Dario Catalano, Giancarlo Ruffo, Rossano Schifanella
    A P2P Market Place Based on Aggregate Signatures. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:54-63 [Conf]
  8. Jun Li, Xun Kang
    Proof of Service in a Hybrid P2P Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:64-73 [Conf]
  9. Qiang Ding, Ke Xu, Hui-shan Liu
    Construct Optimal Diameter Network and d-partition Routing Algorithm. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:74-81 [Conf]
  10. Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth
    Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:82-90 [Conf]
  11. Hongcan Zhang, Jiwu Shu, Wei Xue, Dingxing Wang
    VTarget: An Improved Software Target Emulator for SANs. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:91-100 [Conf]
  12. Jun Luo, Jiwu Shu, Wei Xue
    Design and Implementation of an Efficient Multipath for a SAN Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:101-110 [Conf]
  13. Tao Cai, Shiguang Ju, JuenJie Zhao, DeJiao Niu
    Research of Hot-Spot Selection Algorithm in Virtual Address Switch. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:111-119 [Conf]
  14. Yulin Wang, Guangjun Li, Xiaojun Wu, Shuisheng Lin
    An Efficient Cache Replacement Policy with Distinguishing Write Blocks from Read Blocks in Disk Arrays. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:120-129 [Conf]
  15. Xiangguo Li, Jianhua Yang, Zhaohui Wu
    An NFSv4-Based Security Scheme for NAS. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:130-139 [Conf]
  16. Changsheng Xie, Zhen Zhao, Jian Liu, Wei Wu
    Using Blocks Correlations to Improve the I/O Performance of Large Network Storage System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:140-148 [Conf]
  17. Bigang Li, Jiwu Shu, Fei Mu, Weimin Zheng
    A Cluster LVM for SAN Environments. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:149-158 [Conf]
  18. Roy Varshavsky, Michal Linial, David Horn
    COMPACT: A Comparative Package for Clustering Assessment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:159-167 [Conf]
  19. Xiao-hua Xu, Ling Chen, Ping He
    Fast Sequence Similarity Computing with LCS on LARPBS. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:168-175 [Conf]
  20. Ling Chen, Juan Chen, Yi Pan
    Fast Scalable Algorithm on LARPBS for Sequence Alignment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:176-185 [Conf]
  21. David B. Bracewell, Scott Russell, Annie S. Wu
    Identification, Expansion, and Disambiguation of Acronyms in Biomedical Texts. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:186-195 [Conf]
  22. Chengyong Yang, Erliang Zeng, Tao Li, Giri Narasimhan
    A Knowledge-Driven Method to Evaluate Multi-source Clustering. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:196-202 [Conf]
  23. Jieyue He, Hae-Jin Hu, Robert W. Harrison, Phang C. Tai, Yisheng Dong, Yi Pan
    Understanding Protein Structure Prediction Using SVM_DT. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:203-212 [Conf]
  24. Budi Ongkowijaya, Shilin Ding, Xiaoyan Zhu
    Various Features with Integrated Strategies for Protein Name Classification. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:213-222 [Conf]
  25. Hai Jin, Chuanjiang Yi, Song Wu, Li Qi, Deqing Zou
    Uniform Authorization Management in ChinaGrid Support Platform. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:223-231 [Conf]
  26. Yongwei Wu, Song Wu, Huashan Yu, Chunming Hu
    Introduction to ChinaGrid Support Platform. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:232-240 [Conf]
  27. Xingwei Wang, Nan Jiang, Jialin Wang, Min Huang
    A Microeconomics-Based Resource Assignment Model for Grid Computing. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:241-248 [Conf]
  28. Xiaoshe Dong, Yinfeng Wang, Xiuqiang He, Hua Guo, Fang Zheng, Weiguo Wu
    The Campus Resource Management Based on Constellation Model in the ChinaGrid. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:249-256 [Conf]
  29. Shoubin Dong, Pengfei Liu, Yicheng Cao, Zhengping Du
    Grid Computing Methodology for Protein Structure Prediction and Analysis. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:257-266 [Conf]
  30. Xiangxu Meng, Shijun Liu, Rui Wang, Chenglei Yang, Hai Guo
    Applying Service Composition in Digital Museum Grid. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:267-275 [Conf]
  31. Junzhou Luo, Aibo Song, Ye Zhu, Xiaopeng Wang, Teng Ma, Zhiang Wu, Yaobin Xu, Liang Ge
    Grid Supporting Platform for AMS Data Processing. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:276-285 [Conf]
  32. Xiaowu Chen, Xixi Luo, Zhangsheng Pan, Qinping Zhao
    A CGSP-Based Grid Application for University Digital Museums. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:286-296 [Conf]
  33. Weimin Zheng, Meizhi Hu, Lin Liu, Yongwei Wu, Jing Tie
    FleMA: A Flexible Measurement Architecture for ChinaGrid. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:297-304 [Conf]
  34. Minglu Li, Chuliang Weng, Xinda Lu, Yong Yin, Qianni Deng
    A Resource Scheduling Strategy for the CFD Application on the Grid. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:305-314 [Conf]
  35. Mingwen Wang, Qingxin Zhu, Li Qing
    A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:315-322 [Conf]
  36. Haifeng Qian, Zhenfu Cao
    A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:323-331 [Conf]
  37. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    An Efficient Proxy-Protected Signature Scheme Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:332-341 [Conf]
  38. Shengbao Wang, Zhenfu Cao, Haiyong Bao
    Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:342-349 [Conf]
  39. Zhenchuan Chai, Zhenfu Cao, Yuan Zhou
    Encryption Based on Reversible Second-Order Cellular Automata. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:350-358 [Conf]
  40. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    ID-Based Proxy Signature Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:359-367 [Conf]
  41. Zhenfeng Zhang, Dengguo Feng
    Efficient Fair Certified E-Mail Delivery Based on RSA. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:368-377 [Conf]
  42. Liwu Zhang, Dengguo Feng
    Intrusion Tolerant CA Scheme with Cheaters Detection Ability. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:378-386 [Conf]
  43. Zheng Qin, Na Li, Da-Fang Zhang, Nai-Zheng Bian
    Improvement of Protocol Anomaly Detection Based on Markov Chain and Its Application. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:387-396 [Conf]
  44. Dingsheng Wan, Qing Li, Guihai Chen
    Research and Implementation of Workflow Interoperability Crossing Organizations. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:397-402 [Conf]
  45. Peng Han, Haiguang Chen, Bo Yu, Dan Xu, Chuanshan Gao
    LSBE: A Localization Scheme Based on Events for Wireless Sensor and Actor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:403-411 [Conf]
  46. Panlong Yang, Chang Tian
    Crossing Effects Analysis Between Routing and MAC Protocol in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:412-421 [Conf]
  47. Amer Filipovic, Amitava Datta, Chris McDonald
    Low-Latency Routing in Ad Hoc Wireless Networks Using Finite Horizons. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:422-433 [Conf]
  48. Kennie H. Jones, Kenneth N. Lodding, Stephan Olariu, Larry Wilson, Chunsheng Xin
    Energy Usage in Biomimetic Models for Massively-Deployed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:434-443 [Conf]
  49. Xunxue Cui, Zhan Zhao, Qing Tao
    Probabilistic Behavior of Sensor Network Localization. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:444-453 [Conf]
  50. Xiaomei Cao, Maolin Huang, YueQuan Chen, Guihai Chen
    Hybrid Authentication and Key Management Scheme for WSANs. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:454-465 [Conf]
  51. Jian Wang, Zhengyou Xia, Lein Harn, Guihai Chen
    Storage-Optimal Key Sharing with Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:466-474 [Conf]
  52. Jiafu Hu, Nong Xiao, Yingjie Zhao, Wei Fu
    An Asynchronous Replica Consistency Model in Data Grid. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:475-484 [Conf]
  53. Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen
    Distributed Access Control for Grid Environments Using Trust Management Approach. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:485-495 [Conf]
  54. Zhangsheng Pan, Xiaowu Chen, Xiangyu Ji
    Research on Database Access and Integration in UDMGrid. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:496-505 [Conf]
  55. Jiadi Yu, Minglu Li, Feng Hong
    Resource Allocation Based on Pricing for Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:506-513 [Conf]
  56. Lixin Han, Guihai Chen, Linping Sun, Li Xie
    CMSA: A Method for Construction and Maintenance of Semantic Annotations. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:514-519 [Conf]
  57. Kun Wu, Dai Han, Yang Zhang, Sanglu Lu, Daoxu Chen, Li Xie
    NDP2PSim: A NS2-Based Platform for Peer-to-Peer Network Simulations. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:520-529 [Conf]
  58. Yaojun Han, Changjun Jiang, Xuemei Luo
    Resource Scheduling Scheme for Grid Computing and Its Petri Net Model and Analysis. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:530-539 [Conf]
  59. Hongbo Wan, Qianni Deng, Xinhua Lin, Xinda Lu, Minglu Li
    The Design and Implementation of Service Adapter in ShanghaiGrid Core. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:540-548 [Conf]
  60. Yutong Lu, Zhiyu Shen, Enqiang Zhou, Min Zhu
    MCRM System: CIM-Based Multiple Clusters Manager. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:549-558 [Conf]
  61. Lei Cao, Minglu Li, Jian Cao, Yi Wang
    Introduction to an Agent-Based Grid Workflow Management System. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:559-568 [Conf]
  62. Heping Chen, Jinguang Gu, Xiaohui Li, Hongping Fang
    An XML Query Mechanism with Ontology Integration. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:569-578 [Conf]
  63. Wan-Chun Dou, Guihai Chen, Feng Su, Shijie Cai
    Implementation of Cooperative Cognition Under Web Environment. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:579-588 [Conf]
  64. Sun-Moon Jo, Ki-Tae Kim, Hoon-Joon Kouh, Weon-Hee Yoo
    Access Authorization Policy for XML Document Security. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:589-598 [Conf]
  65. Jing Mei, Elena Paslaru Bontas, Zuoquan Lin
    OWL2Jess: A Transformational Implementation of the OWL Semantics. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:599-608 [Conf]
  66. Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou
    Security Frameworks for Open LBS Based on Web Services Security Mechanism. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:609-618 [Conf]
  67. Lei Xu, Baowen Xu, Changhai Nie
    Testing and Fault Diagnosis for Web Application Compatibility Based on Combinatorial Method. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:619-626 [Conf]
  68. Xiaochun Yang, Xiangyu Liu, Bin Wang, Ge Yu
    A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:627-636 [Conf]
  69. Yanping Yang, QingPing Tan, Yong Xiao
    Transformation-Driven Development of Composite Web Services. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:637-646 [Conf]
  70. Fei Yu, Huang Huang, Cheng Xu, Xiao-peng Dai, Miaoliang Zhu
    Badness Information Audit Based on Image Character Filtering. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:647-656 [Conf]
  71. Weifeng Zhang, Baowen Xu, Guoqiang Zhou
    User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2005, pp:657-665 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002