The Community for Technology Leaders
2013 IEEE Eighth International Conference on Networking, Architecture and Storage (2007)
Guilin, China
July 29, 2007 to July 31, 2007
ISBN: 0-7695-2927-5
TABLE OF CONTENTS
Introduction
Session 1A: Architecture

Design of NIC Based on I/O Processor for Cluster Interconnect Network (Abstract)

Xiaojun Yang , Chinese Academy of Sciences, China
Dongdong Wu , Chinese Academy of Sciences, China
Ninghui Sun , Chinese Academy of Sciences, China
pp. 3-8

Simplified Multi-Ported Cache in High Performance Processor (Abstract)

Dongrui Fan , Chinese Academy of Sciences, China
Hao Zhang , Chinese Academy of Sciences, China
pp. 9-14

The bi-panconnectivity of the hypercube (Abstract)

Jywe-Fei Fang , National Taichung University, Taiwan
Chen-Hsiang Liao , National Taichung University, Taiwan
Shr-Cheng Feng , National Taichung University, Taiwan
Chien-Hung Huang , National Formosa University, Taiwan
Ko-Lin Lin , National Taichung University, Taiwan
pp. 15-20

The Implementation and Design of a Low-Power Clock Distribution Microarchitecture (Abstract)

Xianjun Zeng , National University of Defense Technology, China
Junfeng Zhang , National University of Defense Technology, China
Liang Chen , National University of Defense Technology, China
Rong Ji , National University of Defense Technology, China
pp. 21-30
Session 1B: Networks I

More Efficient Mechanism of Topology-Aware Overlay Construction in Application-Layer Multicast (Abstract)

Libing Wu , Wuhan University, China
Yanxiang He , Wuhan University, China
Jianqun Cui , Wuhan University, China; Huazhong Normal University, China
pp. 31-36

MLCC: A Multi Layered Correlative Control Mechanism for the VPN Topology (Abstract)

Ting Cai , Wuhan Univ. of Sci. & Tech., China
Lijun Dong , Huazhong Univ. of Sci. & Tech., China
Xiaowen Chu , Hong Kong Baptist Univ., Hong Kong
Hengqing Wang , Wuhan Univ. of Sci. & Tech., China
Kai Ouyang , Wuhan Univ. of Sci. & Tech., China
pp. 37-43

The Dynamic Endpoint-Based Access Control Model on VPN (Abstract)

Kai Ouyang , Wuhan Univ. of Sci. & Tech., China
Shengsheng Yu , Huazhong Univ. of Sci. & Tech., China
Lijun Dong , Huazhong Univ. of Sci. & Tech., China
pp. 44-54
Session 2A: Networks II

Routing Protocols Based on Double Auction for Ad Hoc Networks (Abstract)

Li Xu , Fujian Normal University, China
Zhongsheng Wu , Fujian Normal University, China
Zhide Chen , Fujian Normal University, China
Fuchun Guo , Fujian Normal University, China
pp. 55-61

A Novel Cooperative Caching Scheme for Wireless Ad Hoc Networks: GroupCaching (Abstract)

Yeim-Kuan Chang , National Cheng Kung University, Taiwan
Yi-Wei Ting , National Cheng Kung University, Taiwan
pp. 62-68

An Optimal MPLS-TE Solution to Route Selection and Redistribution on Congested Networks (Abstract)

Peng Li , East Carolina University
Tijjani Mohammed , East Carolina University
Chengcheng Li , East Carolina University
pp. 69-76
Session 2B: Network Security I

An Improved Designated-Verifier Proxy Signature Scheme (Abstract)

Jianhong Zhang , North China University of Technology, China; Chinese Academy of Sciences, China
pp. 77-82

PKI-Based Authentication Mechanisms in Grid Systems (Abstract)

Robert D. Kent , University of Windsor, Canada
Akshai Aggarwal , University of Windsor, Canada
Shushan Zhao , University of Windsor, Canada
pp. 83-90

Assessing Attack Threat by the Probability of Following Attacks (Abstract)

Dong Li , Huazhong University of Science and Technology, China
Jie Lei , Huazhong University of Science and Technology, China
Li Wang , Huazhong University of Science and Technology, China
Zhi-tang Li , Huazhong University of Science and Technology, China
pp. 91-100
Session 3A: Network Security II

Mitigating Denial of Capability with An Notification Mechanism (Abstract)

Yabo Dong , Zhejiang University, China
Guang Jin , Zhejiang University, China; Ningbo University, China
Wei Wei , Zhejiang University, China
Jiangang Yang , Zhejiang University, China
pp. 101-108

HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast (Abstract)

Yong Cheng , Chongqing Normal University, China
XueMin Li , Chongqing University, China
Lin Lin , Chongqing University, China
pp. 109-114

Discovering Novel Multistage Attack Patterns in Alert Streams (Abstract)

Li Wang , Huazhong University of Science & Technology, China
Zhi-tang Li , Huazhong University of Science & Technology, China
Dong Li , Huazhong University of Science & Technology, China
Ai-fang Zhang , Huazhong University of Science & Technology, China
pp. 115-121

Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing (Abstract)

Janne Lindqvist , Helsinki University of Technology, Finland
Kristiina Karvonen , Helsinki University of Technology, Finland
Chittaranjan Hota , Birla Institute of Technology & Science, India
Mohan C.K.J , Birla Institute of Technology & Science, India
Antti Yl?-J??ski , Helsinki University of Technology, Finland
pp. 122-132
Session 3B: Sensor Networks and Others

Mining Moving Patterns Based on Frequent Patterns Growth in Sensor Networks (Abstract)

Xiongwei Ren , Navy Engineering University, China
Yuanguo Cheng , Huazhong University of Science and Technology, China; Navy Engineering University, China
pp. 133-138

An Active Region-based Storage Mechanism in Large Wireless Sensor Networks (Abstract)

Xiongzi Ge , Huazhong University of Science and Technology, China
Lei Tian , Huazhong University of Science and Technology, China
Dan Feng , Huazhong University of Science and Technology, China
pp. 139-145

A Novel Network Management Architecture for Self-organizing Network (Abstract)

Wang Pan , Nanjing University of Posts and Telecommunications, China
Zhang Shunyi , Nanjing University of Posts and Telecommunications, China
Zhang Zailong , Nanjing University of Posts and Telecommunications, China
Li Jun , Nanjing University of Posts and Telecommunications, China; Zhejiang Wanli University, China
pp. 146-154
Session 4A: Distributed Computing and Software Testing

A Peer-To-Peer Traffic Identification Method Using Machine Learning (Abstract)

Wenfeng Feng , Tsinghua University, China
Hui Liu , Tsinghua University, China
Yongfeng Huang , Tsinghua University, China
Xing Li , Tsinghua University, China
pp. 155-160

GSM-R: A Hybrid Scheduling Approach to Dynamic Load Balancing in Hierarchical Cluster of Servers (Abstract)

Jincai Chen , Huazhong University of Science and Technology, China
Gongye Zhou , Huazhong University of Science and Technology, China
pp. 161-167

Software Fault Localization Based on Testing Requirement and Program Slice (Abstract)

Jiancheng Ni , Sichuan University, China
Jirong Sun , Sichuan University, China; Sichuan Radio and TV University, China
Zhshu Li , Sichuan University, China
Feng Yin , Southwest University for Nationalities, China
pp. 168-176
Session 4B: Storage I

An Efficient SAN-Level Caching Method Based on Chunk-Aging (Abstract)

Yifeng Luo , Tsinghua University, China
Wei Xue , Tsinghua University, China
Yang Wang , Tsinghua University, China
Jiwu Shu , Tsinghua University, China
pp. 177-184

FTRAID: A Fat-tree Based Parallel Storage Architecture for Very Large Disk Array (Abstract)

Ke Zhou , Huazhong University of Science and Technology, China
Zhikun Wang , Huazhong University of Science and Technology, China
Lingfang Zeng , Huazhong University of Science and Technology, China
Dan Feng , Huazhong University of Science and Technology, China
Junping Liu , Huazhong University of Science and Technology, China
pp. 185-192

A New Data Format and a New Error Control Scheme for Optical-Storage Systems (Abstract)

Wei Hu , Huazhong University of Science and Technology, China
Changsheng Xie , Huazhong University of Science and Technology, China
Diqing Hu , Huazhong University of Science and Technology, China
Fan Chen , Huazhong University of Science and Technology, China
pp. 193-198

iSAN: Storage Area Network Management Modeling Simulation (Abstract)

Amit Modi , IBM India Systems and Technology Lab, India
Ramani Routray , IBM Almaden Research Center
Shripad Nadgowda , IBM India Systems and Technology Lab, India
Sandeep Gopisetty , IBM Almaden Research Center
Pallavi Galgali , IBM India Systems and Technology Lab, India
pp. 199-208
Session 5A: Storage II

Dynamics Process of Long-running Allocation/Collection in Linear Storage Space (Abstract)

Xie Chang-sheng , Huazhong University of Science and Technology, China
Cao Qiang , Huazhong University of Science and Technology, China
Guo Tian-jie , Huazhong University of Science and Technology, China
pp. 209-216

A New Method of Pefetching I/O Requests (Abstract)

Huai Yang Li , Huazhong University of Science and Technology, China
Chang Shen Xie , Huazhong University of Science and Technology, China
Yan Liu , Huazhong University of Science and Technology, China
pp. 217-224

Performance Evaluation of A Load Self-Balancing Method for Heterogeneous Metadata Server Cluster Using Trace-Driven and Synthetic Workload Simulation (Abstract)

Guangxi Zhu , Huazhong University of Science and Technology, China
Bin Cai , Huazhong University of Science and Technology, China
Changsheng Xie , Huazhong University of Science and Technology, China
pp. 225-232

DiskGroup: Energy Efficient Disk Layout for RAID1 Systems (Abstract)

Jun Wang , University of Central of Florida, USA
Lanyue Lu , Rice University, USA
Peter Varman , Rice University, USA
pp. 233-242
Session 5B: Short Papers I: Architecture and Storage

M^{2}SI: An Improved Coherency Protocol in CMP (PDF)

Pengyong Ma , National University of Defense Technology, China
Shuming Chen , National University of Defense Technology, China
pp. 243-244

An Adaptive Arbitration Algorithm for SoC Bus (PDF)

Wei Zheng , Zhejiang University, China
Ming Zhang , Zhejiang University, China
Dongxiao Li , Zhejiang University, China
Haishan Li , Zhejiang University, China
pp. 245-246

The System Design and Performance Analysis of WiMAX Base Station MAC Based on Intel Network Processor (PDF)

Changsheng Xie , Huazhong University of Science and Technology, China
Qingdong Wang , Huazhong University of Science and Technology, China
Ming Wu , Huazhong University of Science and Technology, China
pp. 247-248

Dynamic Power Management and Dynamic Voltage Scaling in Real-time CMP Systems (PDF)

Di Hou , Xi'an Jiaotong University, China
Lei Miao , Xi'an Jiaotong University, China
Yue-hua Dai , Xi'an Jiaotong University, China
Yong Qi , Xi'an Jiaotong University, China
Chang-li Wu , Chinese Society of Astronautics, China
pp. 249-250

Research and Implementation of RAID Algorithm base on RAID Controller (PDF)

Xie Chang-sheng , Huazhong University of Science and Technology, China
Wang Bo , Huazhong University of Science and Technology, China
Jiang Guo-song , Huazhong University of Science and Technology, China
pp. 251-252

B+ Tree Management Method of Object Attributes for Object-Based Storage (PDF)

Gongye Zhou , Huazhong University of Science and Technology, China
Jincai Chen , Huazhong University of Science and Technology, China
Lanlan Yuan , Huazhong University of Science and Technology, China
pp. 253-254
Session 6A: Short Papers II: Networks

An analytical model for evaluating utilization of TCP TAHOE using markovian model (PDF)

Mohammad Mehdi Hassani , Islamic Azad University, Iran
Reza Berangi , Islamic Azad University, Iran
Hamid Tavakolaie , Islamic Azad University, Iran
pp. 257-258

Sliding Window Based Security Event Correlation (PDF)

Jiafu Hu , Information Engineering University, China
Yongliang Dong , Henan Normal University, China
pp. 259-260

Safety Critical Network Based on Fibre Channel (PDF)

Yue Wang , Northwestern Polytechnical University, China
Fei Cheng , Northwestern Polytechnical University, China
BeiZhan Wang , Xiamen University, China
Qi Duan , Northwestern Polytechnical University, China
pp. 261-262

Distributed Fault Monitoring Scheme Based on Optical Power for Optical Burst Switching Network (PDF)

Dan Liu , Chongqing Univ. of Posts and Telecom., China
Ruyan Wang , Chongqing Univ. of Posts and Telecom., China; Univ. of Electronic Science and Technology of China, China
Jiaofa Chang , Chongqing Univ. of Posts and Telecom., China
Keping Long , Chongqing Univ. of Posts and Telecom., China
Xiaolong Yang , Chongqing Univ. of Posts and Telecom., China; Chongqing Univ. of Posts and Telecom., China
pp. 263-264

A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS (PDF)

Ma Xiaojing , Huazhong University of Science and Technology, China
Zhang Jiping , Huazhong University of Science and Technology, China
Li Zhitang , Huazhong University of Science and Technology, China
Li Yao , Huazhong University of Science and Technology, China
pp. 265-266
Session 6B: Short Papers III

RH-SCSI: A Reliable HyperSCSI Protocol for Networking Storage (PDF)

Gongye Zhou , Huazhong University of Science and Technology, China
Peng Chen , Huazhong University of Science and Technology, China
pp. 269-270

A New Method for RAID Consistency Initialization (PDF)

Changsheng Xie , Huazhong University of Science and Technology, China
Zhihu Tan , Huazhong University of Science and Technology, China
Jiguang Wan , Huazhong University of Science and Technology, China
pp. 271-272

Implementation and performance evaluation of an iSCSI-Based Storage Virtualization (PDF)

Chao Liu , Huazhong University of Science and Technology, China
Guang Yang , Huazhong University of Science and Technology, China
Jingli Zhou , Huazhong University of Science and Technology, China
pp. 273-274

An Object-based Storage Controller Based on Switch Fabric (PDF)

Dan Feng , Huazhong University of Science and Technology, China
Shuibing He , Huazhong University of Science and Technology, China
pp. 275-276

Design and Implementation of an Efficient Multi-version File System (PDF)

Ji-Wu Shu , Tsinghua University, China
Xiao-Jia Xiang , Tsinghua University, China
Wei-Min Zheng , Tsinghua University, China
Wei Xue , Tsinghua University, China
pp. 277-278
Author Index

Author Index (PDF)

pp. 279
101 ms
(Ver )