The Community for Technology Leaders
2007 International Conference on Networking, Architecture, and Storage (NAS 2007) (2007)
Guilin, China
July 29, 2007 to July 31, 2007
ISBN: 0-7695-2927-5
TABLE OF CONTENTS

Design of NIC Based on I/O Processor for Cluster Interconnect Network (Abstract)

Xiaojun Yang , Chinese Academy of Sciences, China
Dongdong Wu , Chinese Academy of Sciences, China
Ninghui Sun , Chinese Academy of Sciences, China
pp. 3-8
Introduction
Session 1A: Architecture

Design of NIC Based on I/O Processor for Cluster Interconnect Network (Abstract)

Xiaojun Yang , Chinese Academy of Sciences, China
Dongdong Wu , Chinese Academy of Sciences, China
Ninghui Sun , Chinese Academy of Sciences, China
pp. 3-8

Simplified Multi-Ported Cache in High Performance Processor (Abstract)

Hao Zhang , Chinese Academy of Sciences, China
Dongrui Fan , Chinese Academy of Sciences, China
pp. 9-14

The bi-panconnectivity of the hypercube (Abstract)

Jywe-Fei Fang , National Taichung University, Taiwan
Chien-Hung Huang , National Formosa University, Taiwan
Ko-Lin Lin , National Taichung University, Taiwan
Chen-Hsiang Liao , National Taichung University, Taiwan
Shr-Cheng Feng , National Taichung University, Taiwan
pp. 15-20

The Implementation and Design of a Low-Power Clock Distribution Microarchitecture (Abstract)

Rong Ji , National University of Defense Technology, China
Xianjun Zeng , National University of Defense Technology, China
Liang Chen , National University of Defense Technology, China
Junfeng Zhang , National University of Defense Technology, China
pp. 21-30
Session 1B: Networks I

More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer Multicast (Abstract)

Jianqun Cui , Wuhan University, China; Huazhong Normal University, China
Yanxiang He , Wuhan University, China
Libing Wu , Wuhan University, China
pp. 31-36

MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology (Abstract)

Kai Ouyang , Wuhan Univ. of Sci. & Tech., China
Xiaowen Chu , Hong Kong Baptist Univ., Hong Kong
Lijun Dong , Huazhong Univ. of Sci. & Tech., China
Hengqing Wang , Wuhan Univ. of Sci. & Tech., China
Ting Cai , Wuhan Univ. of Sci. & Tech., China
pp. 37-43

The Dynamic Endpoint-Based Access Control Model on VPN (Abstract)

Lijun Dong , Huazhong Univ. of Sci. & Tech., China
Shengsheng Yu , Huazhong Univ. of Sci. & Tech., China
Kai Ouyang , Wuhan Univ. of Sci. & Tech., China
pp. 44-54
Session 2A: Networks II

Routing Protocols Based on Double Auction for Ad Hoc Networks (Abstract)

Zhongsheng Wu , Fujian Normal University, China
Zhide Chen , Fujian Normal University, China
Li Xu , Fujian Normal University, China
Fuchun Guo , Fujian Normal University, China
pp. 55-61

A Novel Cooperative Caching Scheme for Wireless Ad Hoc Networks: GroupCaching (Abstract)

Yi-Wei Ting , National Cheng Kung University, Taiwan
Yeim-Kuan Chang , National Cheng Kung University, Taiwan
pp. 62-68

An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested Networks (Abstract)

Chengcheng Li , East Carolina University
Peng Li , East Carolina University
Tijjani Mohammed , East Carolina University
pp. 69-76
Session 2B: Network Security I

An Improved Designated-Verifier Proxy Signature Scheme (Abstract)

Jianhong Zhang , North China University of Technology, China; Chinese Academy of Sciences, China
pp. 77-82

PKI-Based Authentication Mechanisms in Grid Systems (Abstract)

Shushan Zhao , University of Windsor, Canada
Akshai Aggarwal , University of Windsor, Canada
Robert D. Kent , University of Windsor, Canada
pp. 83-90

Assessing Attack Threat by the Probability of Following Attacks (Abstract)

Zhi-tang Li , Huazhong University of Science and Technology, China
Jie Lei , Huazhong University of Science and Technology, China
Li Wang , Huazhong University of Science and Technology, China
Dong Li , Huazhong University of Science and Technology, China
pp. 91-100
Session 3A: Network Security II

Mitigating Denial of Capability with An Notification Mechanism (Abstract)

Guang Jin , Zhejiang University, China; Ningbo University, China
Jiangang Yang , Zhejiang University, China
Wei Wei , Zhejiang University, China
Yabo Dong , Zhejiang University, China
pp. 101-108

HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast (Abstract)

Lin Lin , Chongqing University, China
XueMin Li , Chongqing University, China
Yong Cheng , Chongqing Normal University, China
pp. 109-114

Discovering Novel Multistage Attack Patterns in Alert Streams (Abstract)

Ai-fang Zhang , Huazhong University of Science & Technology, China
Zhi-tang Li , Huazhong University of Science & Technology, China
Dong Li , Huazhong University of Science & Technology, China
Li Wang , Huazhong University of Science & Technology, China
pp. 115-121

Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing (Abstract)

Chittaranjan Hota , Birla Institute of Technology & Science, India
Janne Lindqvist , Helsinki University of Technology, Finland
Kristiina Karvonen , Helsinki University of Technology, Finland
Antti Yl?-J??ski , Helsinki University of Technology, Finland
Mohan C.K.J , Birla Institute of Technology & Science, India
pp. 122-132
Session 3B: Sensor Networks and Others

Mining Moving Patterns Based on Frequent Patterns Growth in Sensor Networks (Abstract)

Yuanguo Cheng , Huazhong University of Science and Technology, China; Navy Engineering University, China
Xiongwei Ren , Navy Engineering University, China
pp. 133-138

An Active Region-based Storage Mechanism in Large Wireless Sensor Networks (Abstract)

Xiongzi Ge , Huazhong University of Science and Technology, China
Dan Feng , Huazhong University of Science and Technology, China
Lei Tian , Huazhong University of Science and Technology, China
pp. 139-145

A Novel Network Management Architecture for Self-organizing Network (Abstract)

Li Jun , Nanjing University of Posts and Telecommunications, China; Zhejiang Wanli University, China
Zhang Shunyi , Nanjing University of Posts and Telecommunications, China
Zhang Zailong , Nanjing University of Posts and Telecommunications, China
Wang Pan , Nanjing University of Posts and Telecommunications, China
pp. 146-154
Session 4A: Distributed Computing and Software Testing

A Peer-To-Peer Traffic Identification Method Using Machine Learning (Abstract)

Hui Liu , Tsinghua University, China
Wenfeng Feng , Tsinghua University, China
Yongfeng Huang , Tsinghua University, China
Xing Li , Tsinghua University, China
pp. 155-160

GSM-R: A Hybrid Scheduling Approach to Dynamic Load Balancing in Hierarchical Cluster of Servers (Abstract)

Jincai Chen , Huazhong University of Science and Technology, China
Gongye Zhou , Huazhong University of Science and Technology, China
pp. 161-167

Software Fault Localization Based on Testing Requirement and Program Slice (Abstract)

Jirong Sun , Sichuan University, China; Sichuan Radio and TV University, China
Zhshu Li , Sichuan University, China
Jiancheng Ni , Sichuan University, China
Feng Yin , Southwest University for Nationalities, China
pp. 168-176
Session 4B: Storage I

An Efficient SAN-Level Caching Method Based on Chunk-Aging (Abstract)

Yang Wang , Tsinghua University, China
Wei Xue , Tsinghua University, China
Yifeng Luo , Tsinghua University, China
Jiwu Shu , Tsinghua University, China
pp. 177-184

FTRAID: A Fat-tree Based Parallel Storage Architecture for Very Large Disk Array (Abstract)

Zhikun Wang , Huazhong University of Science and Technology, China
Ke Zhou , Huazhong University of Science and Technology, China
Dan Feng , Huazhong University of Science and Technology, China
Lingfang Zeng , Huazhong University of Science and Technology, China
Junping Liu , Huazhong University of Science and Technology, China
pp. 185-192

A New Data Format and a New Error Control Scheme for Optical-Storage Systems (Abstract)

Wei Hu , Huazhong University of Science and Technology, China
Diqing Hu , Huazhong University of Science and Technology, China
Changsheng Xie , Huazhong University of Science and Technology, China
Fan Chen , Huazhong University of Science and Technology, China
pp. 193-198

iSAN: Storage Area Network Management Modeling Simulation (Abstract)

Ramani Routray , IBM Almaden Research Center
Sandeep Gopisetty , IBM Almaden Research Center
Pallavi Galgali , IBM India Systems and Technology Lab, India
Amit Modi , IBM India Systems and Technology Lab, India
Shripad Nadgowda , IBM India Systems and Technology Lab, India
pp. 199-208
Session 5A: Storage II

Dynamics Process of Long-running Allocation/Collection in Linear Storage Space (Abstract)

Cao Qiang , Huazhong University of Science and Technology, China
Guo Tian-jie , Huazhong University of Science and Technology, China
Xie Chang-sheng , Huazhong University of Science and Technology, China
pp. 209-216

A New Method of Pefetching I/O Requests (Abstract)

Huai Yang Li , Huazhong University of Science and Technology, China
Chang Shen Xie , Huazhong University of Science and Technology, China
Yan Liu , Huazhong University of Science and Technology, China
pp. 217-224

Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Synthetic Workload Simulation (Abstract)

Bin Cai , Huazhong University of Science and Technology, China
Changsheng Xie , Huazhong University of Science and Technology, China
Guangxi Zhu , Huazhong University of Science and Technology, China
pp. 225-232

DiskGroup: Energy Efficient Disk Layout for RAID1 Systems (Abstract)

Lanyue Lu , Rice University, USA
Peter Varman , Rice University, USA
Jun Wang , University of Central of Florida, USA
pp. 233-242
Session 5B: Short Papers I: Architecture and Storage

M^{2}SI: An Improved Coherency Protocol in CMP (PDF)

Pengyong Ma , National University of Defense Technology, China
Shuming Chen , National University of Defense Technology, China
pp. 243-244

An Adaptive Arbitration Algorithm for SoC Bus (PDF)

Haishan Li , Zhejiang University, China
Ming Zhang , Zhejiang University, China
Wei Zheng , Zhejiang University, China
Dongxiao Li , Zhejiang University, China
pp. 245-246

The System Design and Performance Analysis of WiMAX Base Station MAC Based on Intel Network Processor (PDF)

Ming Wu , Huazhong University of Science and Technology, China
Changsheng Xie , Huazhong University of Science and Technology, China
Qingdong Wang , Huazhong University of Science and Technology, China
pp. 247-248

Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems (PDF)

Lei Miao , Xi'an Jiaotong University, China
Yong Qi , Xi'an Jiaotong University, China
Di Hou , Xi'an Jiaotong University, China
Chang-li Wu , Chinese Society of Astronautics, China
Yue-hua Dai , Xi'an Jiaotong University, China
pp. 249-250

Research and Implementation of RAID Algorithm base on RAID Controller (PDF)

Jiang Guo-song , Huazhong University of Science and Technology, China
Xie Chang-sheng , Huazhong University of Science and Technology, China
Wang Bo , Huazhong University of Science and Technology, China
pp. 251-252

B+ Tree Management Method of Object Attributes for Object-Based Storage (PDF)

Gongye Zhou , Huazhong University of Science and Technology, China
Lanlan Yuan , Huazhong University of Science and Technology, China
Jincai Chen , Huazhong University of Science and Technology, China
pp. 253-254
Session 6A: Short Papers II: Networks

An analytical model for evaluating utilization of TCP TAHOE using markovian model (PDF)

Mohammad Mehdi Hassani , Islamic Azad University, Iran
Reza Berangi , Islamic Azad University, Iran
Hamid Tavakolaie , Islamic Azad University, Iran
pp. 257-258

Sliding Window Based Security Event Correlation (PDF)

Jiafu Hu , Information Engineering University, China
Yongliang Dong , Henan Normal University, China
pp. 259-260

Safety Critical Network Based on Fibre Channel (PDF)

BeiZhan Wang , Xiamen University, China
Yue Wang , Northwestern Polytechnical University, China
Fei Cheng , Northwestern Polytechnical University, China
Qi Duan , Northwestern Polytechnical University, China
pp. 261-262

Distributed Fault Monitoring Scheme Based on Optical Power for Optical Burst Switching Network (PDF)

Ruyan Wang , Chongqing Univ. of Posts and Telecom., China; Univ. of Electronic Science and Technology of China, China
Jiaofa Chang , Chongqing Univ. of Posts and Telecom., China
Keping Long , Chongqing Univ. of Posts and Telecom., China
Xiaolong Yang , Chongqing Univ. of Posts and Telecom., China; Chongqing Univ. of Posts and Telecom., China
Dan Liu , Chongqing Univ. of Posts and Telecom., China
pp. 263-264

A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS (PDF)

Ma Xiaojing , Huazhong University of Science and Technology, China
Li Zhitang , Huazhong University of Science and Technology, China
Li Yao , Huazhong University of Science and Technology, China
Zhang Jiping , Huazhong University of Science and Technology, China
pp. 265-266
Session 6B: Short Papers III

RH-SCSI: A Reliable HyperSCSI Protocol for Networking Storage (PDF)

Gongye Zhou , Huazhong University of Science and Technology, China
Peng Chen , Huazhong University of Science and Technology, China
pp. 269-270

A New Method for RAID Consistency Initialization (PDF)

Zhihu Tan , Huazhong University of Science and Technology, China
Changsheng Xie , Huazhong University of Science and Technology, China
Jiguang Wan , Huazhong University of Science and Technology, China
pp. 271-272

Implementation and performance evaluation of an iSCSI-Based Storage Virtualization (PDF)

Guang Yang , Huazhong University of Science and Technology, China
Jingli Zhou , Huazhong University of Science and Technology, China
Chao Liu , Huazhong University of Science and Technology, China
pp. 273-274

An Object-based Storage Controller Based on Switch Fabric (PDF)

Shuibing He , Huazhong University of Science and Technology, China
Dan Feng , Huazhong University of Science and Technology, China
pp. 275-276

Design and Implementation of an Efficient Multi-version File System (PDF)

Xiao-Jia Xiang , Tsinghua University, China
Ji-Wu Shu , Tsinghua University, China
Wei Xue , Tsinghua University, China
Wei-Min Zheng , Tsinghua University, China
pp. 277-278
Author Index

Author Index (PDF)

pp. 279
91 ms
(Ver 3.3 (11022016))