Grid and Pervasive Computing 2013 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


8. GPC 2013: Seoul, Korea

jump to

- > Home > Conferences and Workshops > GPC
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

James J. Park, Hamid R. Arabnia, Cheonshik Kim
, Weisong Shi, Joon-Min Gil:
Grid and Pervasive Computing - 8th International Conference, GPC 2013 and Colocated Workshops, Seoul, Korea, May 9-11, 2013. Proceedings. Lecture Notes in Computer Science 7861, Springer 2013, ISBN 978-3-642-38026-6
Cloud, Cluster and Grid I

Jonas Repschlaeger:
Transparency in Cloud Business: Cluster Analysis of Software as a Service Characteristics. 1-10

Marcus Hilbrich
, René Jäkel
:
Distributed Accounting in Scope of Privacy Preserving. 11-22

Li Ruan, Jinbing Peng, Limin Xiao, Mingfa Zhu:
Distributed Virtual Machine Monitor for Distributed Cloud Computing Nodes Integration. 23-31

Shyamala Loganathan
, Saswati Mukherjee:
Differentiated Policy Based Job Scheduling with Queue Model and Advanced Reservation Technique in a Private Cloud Environment. 32-39

Lun-Chi Chen
, Ping-Jen Kuo, I-En Liao, Jyun-Yao Huang:
Scaling Out Recommender System for Digital Libraries with MapReduce. 40-47

Muhammad Imran
, Helmut Hlavacs:
Layering of the Provenance Data for Cloud Computing. 48-58

Tyng-Yeu Liang, Yu-Jie Lin:
JCL: An OpenCL Programming Toolkit for Heterogeneous Computing. 59-72

Kenn Slagter, Ching-Hsien Hsu, Yeh-Ching Chung, Jong Hyuk Park:
Network-Aware Multiway Join for MapReduce. 73-80

Ching-Chi Lin
, Jan-Jan Wu, Pangfeng Liu
, Jeng-An Lin, Li-Chung Song:
Automatic Resource Scaling for Web Applications in the Cloud. 81-90

Maxim Schnjakin, Christoph Meinel:
Implementation of Cloud-RAID: A Secure and Reliable Storage above the Clouds. 91-102

Soheil Anousha, Mahmood Ahmadi
:
An Improved Min-Min Task Scheduling Algorithm in Grid Computing. 103-113
Cloud, Cluster and Grid II

Jin-Neng Wu, Yao-Hsing Ko, Kuo-Ming Huang, Mu-Kai Huang:
Heterogeneous Diskless Remote Booting System on Cloud Operating System. 114-123

Xiaohu Bai, Hai Jin, Xiaofei Liao, Xuanhua Shi, Zhiyuan Shao:
RTRM: A Response Time-Based Replica Management Strategy for Cloud Storage System. 124-133

Seonyoung Park, Youngseok Lee
:
Secure Hadoop with Encrypted HDFS. 134-141

Daeyong Jung, Sung-Ho Chin, Kwang-Sik Chung
, Heon-Chang Yu
:
VM Migration for Fault Tolerance in Spot Instance Based Cloud Computing. 142-151

Mansura Habiba, Shamim Akhter
:
A Cloud Based Natural Disaster Management System. 152-161

Mohamed Ben Belgacem, Haithem Hafsi, Nabil Abdennadher:
A Hybrid Grid/Cloud Distributed Platform: A Case Study. 162-169

Mohammad Mahdi Kashef, Azamat Uzbekov, Jörn Altmann
, Matthias Hovestadt:
Comparison of Two Yield Management Strategies for Cloud Service Providers. 170-180

Oliver Maye, Michael Maaser:
Comparing Java Virtual Machines for Sensor Nodes - First Glance: Takatuka and Darjeeling. 181-188

Jianyong Zhang, Qihui Mi, Longji Hu, Yue Tang:
Research on Opinion Formation of Microblog in the View of Multi-agent Simulation. 189-198

Chao-Tung Yang
, Kuan-Lung Huang, William Cheng-Chung Chu, Fang-Yie Leu, Shao-Feng Wang:
Implementation of Cloud IaaS for Virtualization with Live Migration. 199-207
Middleware, Resource Management

Sang-Soo Yeo
, Jong Hyuk Park:
Security Considerations in Cloud Computing Virtualization Environment. 208-215

Shuai Li, Fei Hao
, Mei Li, Hee-Cheol Kim:
Medicine Rating Prediction and Recommendation in Mobile Social Networks. 216-223

Antero Taivalsaari
, Tommi Mikkonen, Kari Systä
:
Cloud Browser: Enhancing the Web Browser with Cloud Sessions and Downloadable User Interface. 224-233

Francisco Lepe Salazar
, Tatsuo Nakajima, Todorka Alexandrova
:
Visual Novels: An Methodology Guideline for Pervasive Educational Games that Favors Discernment. 234-243

Glaucio H. S. Carvalho, Isaac Woungang, Md. Mizanur Rahman, Alagan Anpalagan
:
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks. 244-252

Leila Abidi, Christophe Cérin, Mohamed Jemni
:
Desktop Grid Computing at the Age of the Web. 253-261

Miran Baek, Myeongbae Lee, Honggean Kim, Taehyung Kim, Namjin Bae, Yongyun Cho
, Jangwoo Park, Chang-Sun Shin:
A Novel Model for Greenhouse Control Architecture. 262-269
Mobile, Peer-to-Peer and Pervasive Computing

Chittaranjan Hota
, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, Antti Ylä-Jääski:
Enhanced Search in Unstructured Peer-to-Peer Overlay Networks. 270-279

Chulhee Cho, Jae Young Choi, Younghwa Cho, Jong Pil Jeong
:
CE-SeMMS: Cost-Effective and Secure Mobility Management Scheme Based on SIP in NEMO Environments. 280-287

Kevin I-Kai Wang, HeeJong Park, Zoran Salcic
, Panith Ratnayaka:
A System-Level Approach for Designing Context-Aware Distributed Pervasive Applications. 288-298

Md. Fazla Rabbi Opu, Emon Biswas, Mansura Habiba, Cheonshik Kim
:
Architecture of a Context Aware Framework for Automated Mobile Device Configuration. 299-308

Seung Yoon Park, Jae Young Choi, Jong Pil Jeong
:
AMM-PF: Additional Mobility Management Scheme Based on Pointer Forwarding in PMIPv6 Networks. 309-316
Multi-core and High Performance Computing

Ying Zhang, Gen Li, Yongjin Li, Caixia Sun, Pingjing Lu:
The Evaluation and Optimization of 3-D Jacobi Iteration on a Stream Processor. 317-325

Yu Zhang, Hai Jin, Xiaofei Liao:
DDASTM: Ensuring Conflict Serializability Efficiently in Distributed STM. 326-335

Lei Zhu, Jianhua Gu, Tianhai Zhao, Yunlan Wang:
Research on Log Pre-processing for Exascale System Using Sparse Representation. 336-347
Other GPC Related Topics

Truong Giang Le, Olivier Hermant
, Matthieu Manceny, Renaud Pawlak, Renaud Rioboo:
Using Event-Based Style for Developing M2M Applications. 348-357

Young-Sung Cho, Si Choon Noh, Song Chul Moon:
Weighted Mining Association Rules Based Quantity Item with RFM Score for Personalized u-Commerce Recommendation System. 367-375

Bangjie Jiang, Junmin Wu, Xiaodong Zhu, Die Hu:
Priority-Based Live Migration of Virtual Machine. 376-385

Youngguk Kim, Heung-Gyoon Ryu:
Improvement of the MCMA Blind Equalization Performance Using the Coordinate Change Method in 16-APSK. 386-392

Richelle LeMay, Sangil Choi, Jong-Hoon Youn, Jay Newstorm:
Postural Transition Detection Using a Wireless Sensor Activity Monitoring System. 393-402
Parallel and Distributed Systems

Yong Wan, Dan Feng, Fang Wang, Tingwei Zhu:
A Dedicated Serialization Scheme in Homogeneous Cluster RPC Communication. 403-412

Jinzhou Huang, Hai Jin:
Friends Based Keyword Search over Online Social Networks. 413-422

Chih-Yuan Yeh, Chung-Yao Kao, Wei-Shu Hung, Ching-Chi Lin, Pangfeng Liu
, Jan-Jan Wu, Kuang-Chih Liu:
GPU Virtualization Support in Cloud System. 423-432

Yi Chen, Zhi Qiao
, Hai Jiang, Kuan-Ching Li
, Won Woo Ro:
MGMR: Multi-GPU Based MapReduce. 433-442
Security and Privacy

Sung-ju Kim, Byung-Chul Kim, Jae Yong Lee
:
DDoS Analysis Using Correlation Coefficient Based on Kolmogorov Complexity. 443-452

Jyun-Yao Huang, Cheng-Kang Chiang, I-En Liao:
An Efficient Attribute-Based Encryption and Access Control Scheme for Cloud Storage Environment. 453-463

Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin:
Active One-Time Password Mechanism for User Authentication. 464-471

Jed Kao-Tung Chang, Chen Liu
, Jean-Luc Gaudiot:
Hardware Acceleration for Cryptography Algorithms by Hotspot Detection. 472-481

Junyeong Bok, Heung-Gyoon Ryu:
Chaotic Wireless Communication System Using Retrodirective Array Antenna for Advanced High Security. 482-490

Yuliang Shi, Zhen Jiang, Kun Zhang:
Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications. 491-500

Yao Ma, Hongwei Lu, Zaobin Gan:
QoC-Aware Access Control Based on Fuzzy Inference for Pervasive Computing Environments. 501-508

Yi Qin, Dan Feng, Wei Tong
, Jingning Liu, Yang Hu, Zhiming Zhu:
Per-File Secure Deletion Combining with Enhanced Reliability for SSDs. 509-516

Isaac Woungang, Sanjay Kumar Dhurandher, Michael Sahai:
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath. 517-525

Mi-Young Jang, Jae-Woo Chang:
A Grid-Based Approximate K-NN Query Processing Algorithm for Privacy Protection in Location-Based Services. 526-535

Hyunjo Lee
, Jae-Woo Chang:
Density-Based K-Anonymization Scheme for Preserving Users' Privacy in Location-Based Services. 536-545
Ubiquitous Communications, Sensor Networking, and RFID

Chih-Hsiao Tsai
, Kai-Ti Chang, Cheng-Han Tsai, Ying-Hong Wang:
A Routing Mechanism Using Virtual Coordination Anchor Node Apply to Wireless Sensor Networks. 546-555

Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Byung-Jun Lee, Seulbi Lee, Dae-Yong Im:
Effect of Genetic Parameters in Tour Scheduling and Recommender Services for Electric Vehicles. 556-562

Kyungkoo Jun:
Enabling Massive Machine-to-Machine Communications in LTE-Advanced. 563-569

Hyun-Ho Shin, Seungjin Lee, Byung-Seo Kim:
Enhancements for Local Repair in AODV-Based Ad-Hoc Networks. 570-576

Dong-Min Shin, Dongil Shin, Dongkyoo Shin:
Smart Watch and Monitoring System for Dementia Patients. 577-584

Daesik Kim, Seongkee Lee, Mirim Ahn:
A Lesson from the Development of Surveillance and Reconnaissance Sensor Networks Systems. 585-593

HyunJu Lee, Dongil Shin, Dongkyoo Shin, Soohan Kim:
A Classifier Algorithm Exploiting User's Environmental Context and Bio-signal for U-Home Services. 594-601

Tae-Gyu Lee, Gi-Soo Chung:
DNA-S: Dynamic Cellular Network Architecture for Smart Communications. 602-611
Ubiquitous and Multimedia Application Systems

Jaewan Shin, Dongkyoo Shin, Dongil Shin:
Predicting of Abnormal Behavior Using Hierarchical Markov Model Based on User Profile in Ubiquitous Environment. 612-622

Sunghee Lee, Seongah Chin:
Advanced Facial Skin Rendering with Actual Fresnel Refractive Index Reflecting Facial Tissue Features. 623-630

Guyoun Hwang, Heejun Cho, Dongkyoo Shin, Dongil Shin:
Emotion Recognition Technique Using Complex Biomedical Signal Analysis. 631-640

Soo Young Shin, Soo-Hyun Park:
RWA : Reduced Whole Ack Mechanism for Underwater Acoustic Sensor Network. 641-648

Phan Trung Huy, Cheonshik Kim
, Nguyen Tuan Anh, Le Quang Hoa, Ching-Nung Yang
:
Data Hiding Based on Palette Images Using Weak Bases of Z2-Modules. 649-658

Jin-Hong Kim, Seung-Cheon Kim:
Adaptive Smart Vehicle Middleware Platform for Aspect Oriented Software Engineering. 659-664
Design, Analysis and Tools for Integrated Circuits and Systems

Nan Zhang, Dejun Xie, Eng Gee Lim
, Kaiyu Wan, Ka Lok Man:
Parallel Generation of Optimal Mortgage Refinancing Threshold Rates. 665-675

Nan Zhang, Kaiyu Wan, Eng Gee Lim
, Ka Lok Man:
Pricing American Options on Dividend-Paying Stocks and Estimating the Greek Letters Using Leisen-Reimer Binomial Trees. 676-685

Kaiyu Wan, Vangalur S. Alagar:
A Resource-Centric Architecture for Service-Oriented Cyber Physical System. 686-693

Meng Zhang, Eng Gee Lim
, Zhao Wang, Tammam Tillo, Ka Lok Man, Jing Chen Wang:
RF Characteristics of Wireless Capsule Endoscopy in Human Body. 700-706

Chi-Un Lei
, J. K. Seon, Zhun Shen, Ka Lok Man, Danny Hughes, Youngmin Kim:
Building a Laboratory Surveillance System via a Wireless Sensor Network. 707-714

Danny Hughes, Nelly Bencomo, Brice Morin, Christophe Huygens
, Zhun Shen, Ka Lok Man:
S-Theory: A Unified Theory of Multi-paradigm Software Development. 715-722
Future Science Technologies and Applications

Taekyeong Kang, Namje Park
:
Design of J-VTS Middleware Based on IVEF Protocol. 723-729

Youngsook Lee, Dongho Won:
On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol. 730-736

I-Hui Li, Jyun-Yao Huang, I-En Liao, Jin-Han Lin:
A Sequence Classification Model Based on Pattern Coverage Rate. 737-745

Yeonghae Ko, Namje Park
:
Development of STEAM Program and Teaching Method for Using LEGO Line Tracer Robot in Elementary School. 746-751

Youngseok Chung, Youngsook Lee, Dongho Won:
Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks. 752-760

Mijin Kim
, Namje Park
, Dongho Won:
Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. 761-766

Jaeho An, Namje Park
:
Development of the STEAM-Based Media Education Materials for Prevention of Media Dysfunction in Elementary School. 767-772

Namje Park
, Yeonghae Ko:
Access Control Technique of Illegal Harmful Contents for Elementary Schoolchild Online Protection. 773-780

Mijin Kim
, Namje Park
:
The Concept of Delegation of Authorization and Its Expansion for Multi Domain Smart Grid System. 781-787

Hyun-Jung Lee, Youngsook Lee, Dongho Won:
Security Requirement of End Point Security Software. 788-795

Inkyung Jeun, Youngsook Lee, Dongho Won:
Collecting and Filtering Out Phishing Suspicious URLs Using SpamTrap System. 796-802

Hyunsik Yang, Qiuyan Jin, Hanwook Lee
, Kwang-Woo Lee, Dongho Won:
Improvement of a Chaotic Map Based Key Agreement Protocol That Preserves Anonymity. 803-810

Chun-Cheng Lin
, Yi-Ling Lin, Wan-Yu Liu
:
Solving Router Nodes Placement Problem with Priority Service Constraint in WMNs Using Simulated Annealing. 811-818
Green and Human Information Technology

Hoyoung Hwang, Seungcheon Kim:
Topology Information Based Spare Capacity Provisioning in WDM Networks. 819-825

Goo Yeon Lee, Hwa Jong Kim, Choong Kyo Jeong, Yong Lee:
A Contents Service Profit Model Based on the Quality of Experience and User Group Characteristics. 826-831

Jin-Hong Kim, Seung-Cheon Kim:
Toward Hybrid Model for Architecture-Oriented Semantic Schema of Self-adaptive System. 832-837

Heejung Yu:
Optimal Channel Sensing in Cognitive Radio Network with Multiple Secondary Users. 838-845

Byung Joon Oh, Ki Young Lee:
H.264 Video Delivery over Wireless Mesh Networks Based on Joint Adaptive Cross-Layer Mapping and MDCA MAC. 846-853

Xin Wang, Heung-Gyoon Ryu:
Automatic Tracking Angle of Arrival of Bandpass Sampling OFDM Signal by MUSIC Algorithm. 854-859

Jaeho Lee, Yongjin Lee, Seung-Cheon Kim:
A White-List Based Security Architecture (WLSA) for the Safe Mobile Office in the BYOD Era. 860-865

Shu Chen, Rashid Ahmad
, Byung-Gil Lee, Byung-Doo Kim, Do-Hyeun Kim:
A Study of Vessel Deviation Prevention Scheme Using a Triangulation in a Seaway. 866-872

Won-Hyuk Yang, Mohamed A. Ahmed
, Ki-Beom Lee, Young-Chon Kim:
Analysis of Energy Consumption in Edge Router with Sleep Mode for Green OBS Networks. 873-879

Le The Dung
, Seungwan Jo, Beongku An:
VLC Based Multi-hop Audio Data Transmission System. 880-885

Le The Dung
, Sue Hyung Ha, Beongku An:
A Practical Adaptive Scheme for Enhancing Network Stability in Mobile Ad-Hoc Wireless Networks. 886-892

Sue Hyung Ha, Le The Dung
, Beongku An:
A Geomulticast Routing Protocol Based on Route Stability in Mobile Ad-Hoc Wireless Networks. 893-898

Dae-Man Do, Maeng-Hwan Hyun, Young-Bok Choi:
RFID-Based Indoor Location Recognition System for Emergency Rescue Evacuation Support. 899-906

Joongjin Kook
:
A Symmetric Hierarchical Clustering Related to the Sink Position and Power Threshold for Sensor Networks. 907-913

Jun-Pill Boo, Sang-Chul Kim, Dong-Hwan Park, Hyo-Chan Bang, Do-Hyeun Kim:
A Study of Fire Refuge Guide Simulator Based on Sensor Networks. 914-919

Kee-Won Kim
, Jun-Cheol Jeon:
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array. 920-925

Jae-Wook Seol
, Kwang-Yong Jeong, Kyung-Soon Lee:
Follower Classification through Social Network Analysis in Twitter. 926-931

Yalin Wu, Sun-Woo Ko:
An Initial Quantization Parameter Decision Method Based on Frame Complexity with Multiple Objectives of GOP for Rate Control of H.264. 932-938

Seok-Pil Lee, Euiseok Nahm:
The Development of Privacy Telephone Sets in Encryption System against Eavesdropping. 939-944

Eun-Jun Yoon, Yong Soo Choi, Cheonshik Kim
:
New ID-Based Proxy Signature Scheme with Message Recovery. 945-951

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






