Tentative Program

Lobby Registration
  • 15:00~17:00 , Tuesday, July 16, 2013
Day 1, 2013-07-17, Wednesday
8:30-9:00 Welcome
9:00-10:00 Keynote by H. Peter Hofstee, IBM Research
10:00-10:30 Coffee Break
10:30-11:30 Industry Session
12:00-14:00 Lunch
14:00-15:00 Session 2
Network Service
Data Center
Data & Storage System
15:00-16:00 Session 3
Virtualization
Internet & Web
Interconnect
16:00-16:30 Coffee Break
16:30-18:00 Session 1
Wireless Network
Microarchitecture
Solid State Storage
18:00-20:00 Dinner sponsored by conference
Day 2, 2013-07-18, Thursday
9:00-10:00 Keynote by Prof. Chita Das, PSU
10:00-10:30 Coffee Break
10:30-12:00 Session 4
Network on Chip
Analytical Model
" Three Musketeers "
12:00-14:00 Lunch
14:00-15:00 Short Paper Session 1
Network-1
Architecture
Storage
15:00-15:30 Coffee Break
15:30-16:30 Short Paper Session 2
Network-2
Network-3
" Four Musketeers "
16:30-18:00 Short Paper Poster Session
18:00-21:00 XJTU Research Highlights Speech + Banquet
Day 3, 2013-07-19, Friday
  • Excursion to be arranged by NAS conference

Day 1, 2013-07-17, Wednesday

Keynote Speech
9:00-10:00 The Big Deal about Big Data
Peter Hofstee, IBM Austin Research Laboratory   (pdf)
10:00-10:30 Coffee Break
Industry Session (2 presentations in this non-parallel session, 30 minutes each talk)
10:30-11:30 "The Architecture of Inspur Cloud Storage"
Dong Yuan, Inspur Technologies   (pdf)
11:30-12:00 "Big Data Storage and Mining in Huawei Scale-out NAS"
Keji Huang, Huawei Technologies
12:00-14:00 Lunch
Session 2 (3 concurrent sessions, 2 papers each, 30 minutes each paper)
14:00-15:00 Network Service A Mechanism of Maintaining the Survivability of Streaming Media Service in Overlay Networks
Bo Bai, Jihong Zhao, and Hua Qu
Xi'an Jiaotong University, China
Xi'an University of Posts and Telecommunications, China

A Specific Scheme for Rate-controlled Smooth Scheduling Based on Timeslot-iteration
Ji Li, Zheng Wan, Zhonghua Li, and Naixue Xiong
Jiangxi University of Finance and Economics, China
Data Center MCD: Overcoming the Data Download Bottleneck in Data Centers
Jurgen Kaiser, Dirk Meister, Viktor Gottfried, and Andre Brinkmann
Johannes Gutenberg University Mainz, Germany
University of Paderborn, Germany

A Congestion Control Algorithm for Datacenters
Zhengwei Zhao, Zhixiong Jiang, Chunyang Lu, Yushan Cai, and Jingping Bi
Institute of Computing Technology, Chinese Academy of Sciences, China
Graduate University of Chinese Academy of Sciences, China
Information Technology Center, China
National Petroleum Corporation, China
Data & Storage System PEAM: Predictive Energy-Aware Management for Storage Systems
Xunfei Jiang, Ji Zhang, Mohammed I. Alghamdi, Xiao Qin, Minghua Jiang, and Jifu Zhang
Auburn University, USA
Kingdom of Saudi Arabia
Wuhan Textile University, China
Taiyuan University of Science and Technology, China

DynaM: Dynamic Multiresolution Data Representation for Large-Scale Scientific Analysis
Yuan Tian, Scott Klasky, Weikuan Yu, Bin Wang, Hasan Abbasi, Norbert Podhorszki, and Ray Grout
University of Tennessee, USA
Oak Ridge National Laboratory, USA
Auburn University, USA
National Renewable Energy Laboratory, USA
Session 3 (3 concurrent sessions, 2 papers each, 30 minutes each paper)
15:00-16:00 Virtualization Comparisons of memory virtualization solutions for architectures with software-managed TLBs
Yunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang, and Wenzhi Wang
A Pre-Buffer Mechanism in Multi-channel

Chariot: A High Compatible Architecture to Improve Virtual Machine Reliability
Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Weifeng Gong, and Xingjun Zhang
Xi'an Jiaotong University, China
State Key Laboratory of High-end Server & Storage Technology, China
Internet & Web An Evolvable Locator/ID Separation Internet Architecture (ELISIA)
Haitao Zhang, Xing Li, and Congxiao Bao
Tsinghua University, China

Mining User Interests in Web Logs of an Online News Service Based on Memory Model
Wei Wang, Dongyan Zhao, Haining Luo, and Xin Wang
Key Laboratory on Information Security, Engineering University of CAPF, Xi'an, China
Peking University, Beijing, China
Computer Management Center of the Armed Police General Hospital, Beijing, China
Interconnect High-Speed Multicast Scheduling for All-Optical Packet Switches
Zhiyang Guo, and Yuanyuan Yang
Stony Brook University, USA

IX-Level Adversaries on Entry- and Exit- Transmission Paths in Tor Network
Peipeng Liu, Jinqiao Shi, Lihong Wang, Xiao Wang, and Qingfeng Tan
Institute of Computing Technology, Chinese Academy of Sciences, China
Graduate University of Chinese Academy of Sciences, China
Institute of Information Engineering, Chinese Academy of Sciences, China
National Engineering Laboratory for Information Security Technologies, China
16:00-16:30 Coffee Break
Session 1 (3 concurrent sessions, 3 papers each, 30 minutes each paper)
16:30-18:00 Wireless Network McDisc: A Reliable Neighbor Discovery Protocol in Low Duty Cycle and Multi-channel Wireless Networks
Maotian Zhang, Lei Zhang, Panlong Yang, and Yubo Yan
PLA University of Science and Technology, China

E-HiLow: Extended Hierarchical Routing Protocol in 6LoWPAN Wireless Sensor Network
Li Yue, Dongliang Xie, Jiatong Zhao, and Jie Zhang
Beijing University of Posts &Telecommunications, China
China Institute of Electronic System Engineering, China

An Energy Aware Protocol for Cyclic Monitoring Wireless Sensor Networks
Ittipong Khemapech, Ishbel Duncan, and Alan Miller
University of the Thai Chamber of Commerce, Thailand
University of St Andrews, UK
Microarchitecture A HW/SW Co-design of Execution Migration for Shared-ISA
Hongwei Liu, Bo Sang, Jing Huang, Ji Qiu, and Xiang Gao
Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences
Institute of Computing Technology, Chinese Academy of Sciences
University of Chinese Academy of Sciences
Loongson Corporation, China
Purdue University, USA

Spontaneous Reload Cache - Mimicking a Larger Cache with Minimal Hardware Requirement
Lunkai Zhang, Mingzhe Zhang, Lingjun Fan, Da Wang, and Paolo Ienne
Institute of Computing Technology, Chinese Academy of Sciences, China
University of Chinese Academy of Sciences, China
College of Computer Science, Inner Mongolia University, China
E'cole Polytechnique Fe'de'rale de Lausanne, Switzerland

BFEPM:Best Fit Energy Prediction Modeling Based on CPU Utilization
Xiao Zhang, Jianjun Lu, and Xiao Qin
Northwestern Polytechnical University, China
Auburn University, USA
Solid State Storage Improve Effective Capacity and Lifetime of Solid State Drives
Ping Huang, GuangPing Wan, Ke Zhou, Miaoqing Huang, Chunhua Li, and Hua Wang
Huazhong University of Science & Technology, China
University of Arkansas, USA

A New Metadata Update Method for Fast Recovery of SSD Cache
Jing Yang, and Qing Yang
University of Rhode Island, USA

Performance Analysis of NAND Flash Based Cache for Network Storage System
Lin Han, Hao Huang, and Changsheng Xie
Huazhong University of Science & Technology, China
18:00-20:00 Dinner sponsored by conference

Day 2, 2013-07-18, Thursday

Keynote Speech
9:00-10:00 PROM in Clouds
Chita R. Das, Director / Distinguished Professor, Pennsylvania State University  (pdf)
10:00-10:30 Coffee Break
Session 4 (3 concurrent sessions, 3 papers each, 30 minutes each paper)
10:30-12:00 Network on Chip REPAIR : A Reliable Partial-Redundancy-Based Router in NoC
Lei Xie, Kuizhi Mei, and Yuhai Li
Institute of Artificial Intelligence and Robotics , Xi'an Jiaotong University, China

Robustness Analysis of mesh-based Network-on-Chip architecture under flooding-based Denial of Service attacks
Dabin Fang, Huikai Li, Jun Han, and Xiaoyang Zeng
State-Key Laboratory of ASIC and System, Fudan University, China

SPC: An Approach to Guarantee Performance in Cost Oriented Mapping Algorithm for NoC Architectures
Qinghua Wu, Leibo Liu, Shouyi Yin, Yu Ren, Shaojun Wei
Tsinghua University, China
Analytical Model The Prediction Mathematical Model for HO Performance in LTE Networks
Xiaohui Zhao, Xinlong Luo, Tong Wu, and Dengkun Xiao
School of Science, BUPT, China
Huawei Technologies Co.LTd., China

A Novel Method for Computing Encoding Delay and Bandwidth on Network Coding Node
Yuxing Wu, Xingjun Zhang, Song Cen, Li Wang, and Xiaoshe Dong
Xi'an Jiaotong University, China
Three Musketeers Scheduling Algorithms for Handling Updates in Shingled Magnetic Recording
Kalyana Sundaram Venkataraman, Tong Zhang, Wenzhe Zhao, Hongbin Sun, Nanning Zheng
Department of ECSE, Rensselaer Polytechnic Institute (RPI), Troy, USA
School of Electrical and Information Engineering, Xi'an Jiaotong University, China

A vulnerability optimization method for security-critical real-time systems
Xia Zhang, Jinyu Zhan, Wei Jiang, and Yue Ma
University of Electronic Science and Technology of China, China

An Optimized GP-GPU Warp Scheduling Algorithm for Sparse Matrix-Vector Multiplication
Lifeng Liu, Meilin Liu, and Chong-jun Wang
Wright State University, USA
Nanjing University, China
12:00-14:00 Lunch
Short Paper Session 1 (3 concurrent sessions, 4 papers each, 15 minutes each paper)
14:00-15:00 Network-1 Multiple Channel Assignment and Recovery Algorithm for MR-MC Network
Ping Ren
China Ship Development and Design Center, China

Defence Against Botnets: A Formal Definition and a General Framework
Lei Cao, and Xiaofeng Qiu
Beijing University of Posts and Telecommunications, China

A New Interest-sensitive and Network-sensitive Method for User Recommendation
Yanmin Shang, Peng Zhang, and Yanan Cao
Institute of Computing Technology, Chinese Academy of Sciences

Research on English Learning Strategy Usage in Web-based and Conventional Environments
Zhi Wen
Guangzhou Civil Aviation College, China
Architecture Luminance and Chrominance Parallelization of H.264/AVC Decoding on a Multi-core Processor
Xiaofu Meng, Xiang Gao, Qian Yu, Shuangshuang Zhang, Xiaochun Zhang, and Jing Huang
Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences, China
Institute of Computing Technology, Chinese Academy of Sciences, China
Graduate University of Chinese Academy of Sciences, China
Loongson Technology Corporation Limited, China

Parallel Algorithm for Approximate String Matching with k Differences on CUDA
Longjiang Guo, Shufang Du, Meirui Ren, Yu Liu, Jinbao Li, Jing (Selena) He, Ning Tian, and Keqin Li
Heilongjiang University, China
Key Laboratory of Database and Parallel Computing, China
Kennesaw State University, USA
State University of New York, USA

Analysis of Sparse Matrix-Vector Multiplication Using Iterative Method in CUDA
Rashid Hassani, Amirreza Fazely, Riaz-Ul-Ahsan Choudhury, and Peter Luksch
University of Rostock, Germany

Design of a Quadruple Precision Floating-Point Fused Multiply-Add Unit Based on 4-Way SIMD Device
He Jun, Wang Biao, and Zhu Ying
Shanghai Hi-Performance IC Design Centre, China
Storage Optimize Multidimensional Arrays Queries with Heterogeneous Replica Method
Meiqi Zhu, Xiaomeng Huang, Songbin Liu, Haohuan Fu, YiFeng Geng, Qiming Fang, and Guangwen Yang
Tsinghua University, China

An FPGA-based Random Functional Verification Method for Cache
Li Tiejun, Zhang Jianmin, and Li Sikun
National University of Defense Technology, China

Evaluating memory compression and deduplication
Yuhui Deng, Liangshan Song, and Xinyu Huang
Jinan University, Guangzhou, China
Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences, China
15:00-15:30 Coffee Break
Short Paper Session 2 (3 concurrent sessions, 4 papers each, 15 minutes each paper)
15:30-16:30 Network-2 One Wide-Sense Circuit Tree Per Traffic Class based Inter- Domain Multicast
Chen Yue, Li Chaoling, Huang Kaixiang, and Zhang Xiaobo
State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China

A Pre-Buffer Mechanism in Multi-channel P2P Live Streaming
Pan Wang, Hao Huang, and Changsheng Xie
Huazhong University of Science & Technology, China

Battery-Aware MAC Analytical Modeling for Extending Lifetime of Low Duty-Cycled Wireless Sensor Network
Yulin Li, Shouyi Yin, Leibo Liu, Shaojun Wei, and Dong Wang
Tsinghua University, China
Beijing Jiaotong University, China

A Variant-Hop Algorithm in Forming Bluetooth Sensor Networks
Chih-Min Yu, and Yih-Bin Yu
Chung-Hua University
Network-3 An Effective Feature Selection Approach for Network Intrusion Detection
Fengli Zhang, and Dan Wang
University of Electronic Science and Technology of China, China

An Improved Ant Colony Clustering Method for Network Intrusion Detection
Meng Lingxi, and Sun Guang
Changchun University of Technology, China

An Optimization Algorithm for PAPR Reduction in OFDM System Based on Tabu Search
Ding Shuyan, Shu Ruo, Li Shibao, and Gu Zhaozhi
China University of Petroleum, China
Four Musketeers A Novel Web Service Composition Recommendation Approach Based on Reliable QoS
Wang Denghui, Huang Hao, and Xie Changsheng
Huazhong University of Science & Technology, China

Dynamic workflow planning on programmable infrastructure
Wenchao Jiang, Zhiming Zhao, Adianto Wibisono, Paola Grosso, and Cees de Laat
Guangdong University of Technology, China
Informatics Institute, University of Amsterdam, Netherlands

A New Approach to Multi-objective Virtual Machine Placement in Virtualized Data Center
Sinong Wang, Huaxi Gu, and Gang Wu
Xidian University, China

D-PALD: A Dynamic Power-Aware Load Dispatcher with Response Time Percentile Guarantee in Heterogeneous Clusters
Xu Zhou, Qiang Cao, Changesheng Xie, and Xubin He
Huazhong University of Science & Technology, China
Virginia Commonwealth University, USA
16:30-18:00 Short Paper Poster Session
18:00-21:00 XJTU Research Highlights Speech + Banquet