26th IEEE |
International Performance Computing and Communications Conference |
|
IPCCC 2007 - April 11-13, 2007 - New Orleans, Louisiana, USARenaissance Pere Marquette Hotel |
| |||||||||
    |
IPCCC 2007 Program: IEEE International Performance Computing and Communications Conference
Day 1 Wednesday, April 11 |
|||
|
|||
|
|||
Prof. Taieb
Znati, |
|||
|
|||
|
|||
Session 1A: Wireless Networks I
Chair:
Nidal Nasser ( A QoS Framework to Support
Integrated Services in Multihop Wireless Networks with Infrastructure Support Huiqing
Wang, Kin Choong Yow (Nanyang Technological
University) Mobility Support of Multi-User Services in Next Generation Wireless Systems Luis Veloso, Eduardo Cerqueira, Augusto Neto, A Malware Signature Extraction
and Detection Method Applied to Guoning Hu,
Deepak Venugopal (SMobile
Systems Inc.) |
Session 1B: Transport Layer
Chair:
Golden G. Richard III ( An Additive Increase Smooth Decrease (AISD) Strategy for Data and
Streaming Applications Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, Miguel Labrador ( TCP Vegas Performance with Streaming Media Sean Boyden, Anirban Mahanti,
Carey Williamson ( Stochastic Fair Traffic Management for Efficient and Robust IP
Networking Jae Chung (Airvana, Inc.); Mark Claypool,
Robert Kinicki (Worcester Polytechnic Institute) |
Session 1C: Architecture Modeling &
Performance Chair: Richard Oliver (New Mexico State
Univ.) Memory Performance and Scalability of Intel's and AMD's
Dual-Core Processors: A Case Study Lu Peng (Louisiana State Univ.);
Jih-Kwon Peir (Univ. of Florida);
Tribuvan Kumar Prakash
(Louisiana State Univ.); Yen-Kuang Chen (Intel);
David Koppelman(Louisiana State Univ.) Application Insight Through Performance Modeling Gabriel Marin, John Mellor-Crummey
( Ensuring Performance in Activity-Based File Relocation Joel Wu ( |
|
|
|||
|
|||
Session 2A: Sensor Networks I
Chair:
Jun Peng ( O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous
Sensor Networks Optimal Cluster Heads Selection in LEACH Architecture Moving Schemes for Yanzhong Bi
(Institute of Software, Chinese Academy of Sciences); Jianwei
Niu (Beihang University);
Limin Sun, Wei Huangfu,
(Institute of Software, Chinese Academy of Sciences); Yi Sun (Graduate Univ.
of Academy of Sciences) |
Session 2B: Networks System Design
Chair:
Scott Midkiff (Virginia Tech) Performance Guarantees for Flow-Mapping Parallel Packet Switch Lei Shi, Gao Xia, Bin Liu ( A Queue-based Adaptive Polling Scheme to Improve System Performance in
Gigabit Ethernet Networks Xiaolin Chang (RedFlag
Software Company); Jogesh K. Muppala
(HKUST) A Power Management Proxy with a New Best-of-N Bloom Filter Design to
Reduce False Positives Ken Christensen ( |
Session 2C: Network Modeling &
Performance
Chair:
Chao Chen (Indiana Univ.-Purdue Univ.) Analysis of Queueing Delay in RPR Networks Behnoosh Hariri,
Mohammad Reza Pakravan ( A Low Bound for Broadcast in Optical Networks of Bounded Treewidth Using Fewest Converters Tong Yi ( Performance Evaluation of Tomoya Takenaka,
Hiroshi Mineno (Shizuoka University); Yuich Tokunaga, Naoto Miyauchi
(Mitsubishi Electric Corp.); Tadanori Mizuno (Shizuoka University) |
|
|
|||
|
|||
Session 3A: Ad Hoc Networks I
Chair:
Yingshu Li ( Rerouting Time and Queueing in Proactive Ad
Hoc Networks Erlend Larsen (UniK Univ. Graduate Center at Kjeller);
Vinh Pham (Unik); Knut Ovsthus (Univ.y of Bergen); Paal Engelstad (Univ. of Oslo /
Telenor R&D); Oivind Kure (NTNU) Priority-Ensured Medium Access in Ad Hoc Networks Jun Peng (UTPA); Liang Cheng ( Streaming in MANET: Proactive Link Protection and Receiver Oriented
Adaptation Ge Xu,
Ying Cai ( |
Session 3B: Networks Management &
Application Layer Chair: Xiao Qin
(New Mexico Institute of Mining and Technology) Understanding Localized-Scanning Zesheng Chen
(Georgia Inst. of Tech.); Chao Chen (Indiana Univ.-Purdue Univ. Fort Wayne); Chuanyi Ji (Georgia Inst. of
Tech.) An Application Layer
Extension for Brian Thorp, Scott Midkiff
(Virginia Tech) Scalable and Decentralized Content-Aware Dispatching in
Web Clusters Zhiyong Xu ( |
||
|
|||
IPCCC 2007 Program: IEEE
International Performance Computing and Communications Conference
Day 2 Thursday, April 12 |
|||
|
|||
|
|||
Prof. Nitin
Vaidya, |
|||
|
|||
|
|||
Session 4A: Wireless Networks II
Chair:
Kin Choong Yow (Nanyang
Technological University) Scheduling of Periodic Packets in Energy-Aware Wireless
Networks Xiao Qin, Mohammed Alghamdi, Mais Nijim, Ziliang
Zong (New Mexico Institute of Mining and
Technology) Adaptive Transmission Scheme in the IEEE 802.16 WMAN with
Error Prone Channel Haitang Wang,
Dharma Agrawal, Qing-An Zeng
( A Model-Based Admission Control for 802.11e EDCA using
Delay Predictions Aleksander Bai (Telenor R&D / |
Session 4B: Storage
Chair:
Jeanine Cook ( A Hybrid Disk-Aware Spin-Down Algorithm with I/O Subsystem
Support Timothy Bisson, Scott Brandt,
Darrell Long ( Self-Adaptive Two-Dimensional RAID Arrays Jehan-Francois
Paris ( Hierarchical Policy-Based Replication Cormac Doherty, Neil Hurley ( |
||
|
|||
|
|||
Session 5A: Sensor Networks II Chair: Yu Wang ( Composite Event Detection in Wireless Sensor Networks Chinh Vu, Raheem Beyah, Yingshu Li ( Detecting Misused Keys in Wireless Sensor Networks Donggang Liu, Qi Dong ( Coverage-aware and Connectivity-Constrained Actor Positioning in
Wireless Sensor and Actor Networks Kemal Akkaya
(Southern |
Session 5B: Ad Hoc Networks II
Chair:
Miguel Labrador ( How to Assign Traffic Sources to Nodes in Disaster Area
Scenarios Nils Aschenbruck, Peter Martini
( On Frugality of Control Packets in Multi-Hop Wireless
Networks Noun Choi, Subbarayan
Venkatesan ( Performance Evaluation of Energy Efficient Ad Hoc Routing Protocols Lijuan Cao,
Teresa Dahlberg, Yu Wang ( |
||
|
|||
|
|||
Session 6A: Multimedia Networking Chair: Zhiyong Xu ( Workload Characterization for News-on-Demand Streaming
Services Frank Johnsen, Trude Hafsoe, Carsten Griwodz, Pal Halvorsen ( Automatic Generation of User-Centric Multimedia
Communication Services Raju Rangaswami, Seyed Masoud Sadjadi, Nagarajan Prabakar, Yi Deng ( On Network Coding Based Multirate Video
Streaming in Directed Networks Chenguang Xu , Yinlong Xu ( Peer-to-Peer Multimedia Streaming using BitTorrent Purvi Shah, Jehan-Francois
Paris ( |
Session 6B: Network Processing & Low-Power
Architectures
Chair:
Lu Peng (Louisiana State Univ.) Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM
Decomposition Approach Zhibin Zhang, Li Guo, Binxing Fang, Xiaojun Chen (ICT, Scheduling Divisible Loads on Bus Networks with Arbitrary Processors
Release Time and Start-Up Costs: XRMI Jie Hu,
Raymond Klefstad ( Reducing ALU and Register File Energy by Dynamic Zero Detection Compiler-Directed Functional Unit Shutdown for
Microarchitecture Power Optimization Santosh Talli, Ram Srinivasan, Jeanine
Cook ( |
Workshop Session : eSCoWi
Chair:
Nidal Nasser ( Dynamic and User-Centric
Network Selection in Heterogeneous Networks Xuejun Cai, Ling Chen, Rute Sofia (
Corporate Technology, Siemens Ltd);; Yanqi Wu ( The Interworking
between EDCA 802.11e and DiffServ Asma
A. Elmangosh, Majdi A Ashibani, and Fathi Ben Shatwan (Higher Coverage-based Common
Radio Resource Management in Heterogeneous CDMA/TDMA Cellular Systems L. Wang, H. Aghvami, Nima Nafisi (Kings College A New Channel Allocation
Scheme for Real-Time Traffic in Wireless Cellular Networks Vineet Chaudhary, Rajeev Tripathi, N.K.Shukla, Nidal Nasser ( |
|
IPCCC 2007 Program: IEEE
International Performance Computing and Communications Conference
Day 3 Friday, April 13 |
|||
|
|||
WIA |
MalWare |
NetCri |
|
8:15 8:30 Welcome Remark
Chair:
TBD Components and Analysis of Disaster Tolerant Computing A Method of Fraud & Intrusion Detection for E-payment
Systems in Pallapa
Venkataram, Sathish Babu, Naveen K, Samyama Gunjal (Indian
Institute of Science) Threats Analysis of the Session Initiation Protocol
Regarding Spam Stelios Dritsas, John Mallios, Marianthi Theoharidou, Giannis Marias, Dimitris Gritzalis ( |
A New Generation of MalWare
Agents Mr. Andrew Lee, Chief Research Officer, ESET LLC Chair: TBD Optimising Networks
Against Malware Pierre-Marc Bureau and
Josι Fernandez PID: A Queue Management
Scheme for Improving Network Resilience Under Worm Attacks Jintao Xiong Applying Formal Evaluation
to Worm Defense Design Raman Sharykin and Phillip A Porras Using Byzantine Agreement
in the Design Of Intrusion Detection, Prevention & Counter Measure Systems Fernando C. Colon Osorio |
Using IP-Based Applications for
Improving Disaster Response Prof. Henning Schulzrinne,
Chair:
TBD First Responders' Crystal Ball: How to Scry
the Emergency from a Remote Vehicle Marco Roccetti (University of Bologna);
Mario Gerla, Claudio Palazzi
(University of California, Los Angeles); Stefano Ferretti
(University of Bologna); Giovanni Pau (University of California Los Angeles) ACM: A Transmission Mechanism for Urgent Sensor
Information Tetsuya Kawai, Naoki Wakamiya, Masayuki
Murata ( QoS
Provisioning in Public Safety Radio and Commercial Cellular Integrated
Networks for First Responders and Critical Infrastructures Fei Richard Yu ( |
|
|
10:15 10:30 Break |
10:15 10:30 Break |
|
Chair:
TBD An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks Danilo Bruschi, Lorenzo Cavallaro (Universita` degli studi di
Milano), Andrea Lanzi ( Profiling Database
Applications to Detect SQL Injection Attacks Elisa Bertino, Ashish Kamra, James P. Early ( Diversified Process Replicae for Defeating Memory Error Exploits Danilo Bruschi,
Lorenzo Cavallaro
(Universita` degli
studi di Milano), Andrea Lanzi ( |
Next generation strategies for
defending against emerging Malware Panelist: Andrew Lee (CRO, ESET
LLC), Jose Fernandez (Ιcole Polytechnique
de Montrιal), Amit Sinha
(CIO AirDefense, Inc.), Noam Rathaus
(CTO, BeyodSecurity, Inc), Golden G. Richard III
(University of New Orleans) Moderator: Dr. Fernando C. Colon Osorio Birds
of a Feather Flock Together Short papers, work in progress |
Architectures for Next
generation Networks for Critical Infrastructures Moderated by Prof. Ashok Agrawala,
Chair:
TBD Traffic Chaos Reduction Scheme in Emergency Scenarios Syed Rizvi,
Stephan Olariu ( A Reliable Wireless Mesh Infrastructure Deployment at Crisis
Site Raheleh Dilmaghani, Ramesh Rao ( |
|
|
|
|
|
Chair:
TBD Towards Survivable and
Secure Wireless Sensor Networks Yi Qian
, Kejie Lu ( GKM: A Group Dynamics Aware Key
Management Scheme for Multicast Communications in ASNs Hui Ling, Taieb Znati ( Towards a
Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving
Association Rule Mining in Vertically Partitioned Data Dragos Trinca,
Sanguthevar Rajasekaran ( |
Automatic Vulnerability Assessment in the year 2013 Myth
or Reality Mr. Noam Rathaus, CTO, Beyond
Security, Inc. Ethical Hacking & Malware A Panelist: TBD Moderator: Dr. Fernando C. Colon Osorio |
Chair:
TBD Rover: An Integration and Fusion Platform to Enhance
Situational Awareness Christian Almazan, Moustafa Youssef, Ashok K. Agrawala ( Opportunistic Networks for Emergency Applications and
Their Standard Implementation Framework
Leszek Lilien, Ajay Gupta, Zijiang
Yang ( Intelligent Highway Infrastructure for Planned Evacuations Michele Weigle, Stephan Olariu ( A Gossip-Style Crash Faults Detector for MANETs and Wireless Mesh Networks Azzedine Boukerche ( |
|
|
|
3:10 3:30 Break |
|
Chair:
TBD Applications of the
Oriented Permission Role-Based Access Control Model Liang Chen, Jason Crampton ( Classification Model for
Access Control Constraints Mathias Kohler, Christian Liesegang, Andreas Schaad (SAP
AG) CT-RBAC: A Temporal RBAC
Model with Conditional Periodic Time Kai Ouyang
( |
Chair:
TBD Epidemics of Mobile Yury Bulygin Inverse Geolocation: Randal Acton , Nathan Friess and John Aycock SpyCon:
Emulating User Activities to Detect Evasive Spyware Madhusudhanan Chandrasekaran , Vidyaraman Sankaranarayanan and Shambhu Upadhyaya d-ACTM: Distributed
Anomaly Connection Tree Method to detect Silent Nobutaka
Kawaguchi , ,Hiroshi Shigeno and Kenichi Okada |
Chair:
TBD LoST: A Protocol for Mapping
Geographic Locations to Public Safety Answering Points Henning Schulzrinne (Columbia
University); Hannes Tschofenig
(Siemens AG); Andrew Newton (SunRocket, Inc.); Ted Hardie (Qualcomm) Adaptive Probabilistic Scheduling for a Cellular Emergency
Network Jiazhen Zhou,
Cory Beard (University of Missouri-Kansas City) IMPACT - A Family of Cross-Layer Transmission Protocols
for Wireless Sensor Networks Marcin Brzozowski (IHP, Protecting First-Level Responder Resources in an IP-based
Emergency Services Architecture Hannes Tschofenig (Siemens AG); Henning Schulzrinne
(Columbia University); Andrew Newton (SunRocket,
Inc.); Murugaraj Shanmugam
(Siemens Networks) |
| ||
For questions, suggestions, or problems with the IPCCC website, please email the webmaster. |