International Journal of Networked and Distributed Computing

Volume 3, Issue 1, January 2015

1. Context-Aware Multimedia Content Adaptation for Mobile Web

Dongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut
Pages: 1 - 10
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content...

2. The Influence of Alias and References Escape on Java Program Analysis

Shengbo Chen, Dashen Sun, Huaikou Miao
Pages: 11 - 20
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis. Therefore, when analyzing Java programs, we must take the alias...

3. An Efficient Structure for LKH Key Tree on Secure Multicast Communications

Naoshi Sakamoto
Pages: 21 - 30
In order to communicate in cipher over IP multicast, each of joining and leaving participants causes renewing keys. Moreover, the number of renewed keys depends on the key management system. LKH, one of the key management systems, uses a tree structure to manage keys to share with participants. Every...

4. Parallel dynamic programming based on stage reconstruction and its application in reservoir operation

Huitao Zheng, Yadong Mei, Kai Duan, Yuru Lin
Pages: 31 - 41
We improved the serial recursion calculation process of dynamic programming and introduced parallel dynamic programming based on stage reconstruction. Through the proposed algorithm a multistage decision problem can be repeatedly reconstructed and gradually transferred to a single stage issue. This algorithm...

5. A Distributed Storage System with Dynamic Tiering for iSCSI Environment

Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama
Pages: 42 - 50
We propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In order to optimize I/O performance with slight administrative workload, our system is aimed at the realization of the following two functions; (i) Run-time construction of the storage tiers from...

6. An Introduction of Multiple P-adic Data Type and Its Parallel Implementation

Chao Lu, Xinkai Li
Pages: 51 - 59
Our research group has been working on the P-adic theory and its implementation. Based on the Chinese Remainder theorem and the Hensel code a new data type, called Multiple P-adic Data Type, has been established to realize rational calculation. With this data type all rational number operations are...

7. Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study

Dapeng Liu, Shaochun Xu
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and deemed linear probing impractical due to its...