8:30-9:00 | Welcome |
9:00-10:00 | Keynote by H. Peter Hofstee, IBM Research |
10:00-10:30 | Coffee Break |
10:30-11:30 | Industry Session |
12:00-14:00 | Lunch |
14:00-15:00 | Session 2 |
Network Service
Data Center
Data & Storage System
|
|
15:00-16:00 | Session 3 |
Virtualization
Internet & Web
Interconnect
|
|
16:00-16:30 | Coffee Break |
16:30-18:00 | Session 1 |
Wireless Network
Microarchitecture
Solid State Storage
|
|
18:00-20:00 | Dinner sponsored by conference |
9:00-10:00 | Keynote by Prof. Chita Das, PSU |
10:00-10:30 | Coffee Break |
10:30-12:00 | Session 4 |
Network on Chip
Analytical Model
" Three Musketeers "
|
|
12:00-14:00 | Lunch |
14:00-15:00 | Short Paper Session 1 |
Network-1
Architecture
Storage
|
|
15:00-15:30 | Coffee Break |
15:30-16:30 | Short Paper Session 2 |
Network-2
Network-3
" Four Musketeers "
|
|
16:30-18:00 | Short Paper Poster Session |
18:00-21:00 | XJTU Research Highlights Speech + Banquet |
Keynote Speech | ||
9:00-10:00 | The Big Deal about Big Data Peter Hofstee, IBM Austin Research Laboratory (pdf) |
|
10:00-10:30 | Coffee Break | |
Industry Session (2 presentations in this non-parallel session, 30 minutes each talk) | ||
10:30-11:30 |
"The Architecture of Inspur Cloud Storage" Dong Yuan, Inspur Technologies (pdf) |
|
11:30-12:00 | "Big Data Storage and Mining in Huawei Scale-out NAS" Keji Huang, Huawei Technologies |
|
12:00-14:00 | Lunch | |
Session 2 (3 concurrent sessions, 2 papers each, 30 minutes each paper) | ||
14:00-15:00 | Network Service | A Mechanism of Maintaining the Survivability of Streaming Media Service in Overlay Networks Bo Bai, Jihong Zhao, and Hua Qu Xi'an Jiaotong University, China Xi'an University of Posts and Telecommunications, China A Specific Scheme for Rate-controlled Smooth Scheduling Based on Timeslot-iteration Ji Li, Zheng Wan, Zhonghua Li, and Naixue Xiong Jiangxi University of Finance and Economics, China |
Data Center | MCD: Overcoming the Data Download Bottleneck in Data Centers Jurgen Kaiser, Dirk Meister, Viktor Gottfried, and Andre Brinkmann Johannes Gutenberg University Mainz, Germany University of Paderborn, Germany A Congestion Control Algorithm for Datacenters Zhengwei Zhao, Zhixiong Jiang, Chunyang Lu, Yushan Cai, and Jingping Bi Institute of Computing Technology, Chinese Academy of Sciences, China Graduate University of Chinese Academy of Sciences, China Information Technology Center, China National Petroleum Corporation, China |
|
Data & Storage System | PEAM: Predictive Energy-Aware Management for Storage Systems Xunfei Jiang, Ji Zhang, Mohammed I. Alghamdi, Xiao Qin, Minghua Jiang, and Jifu Zhang Auburn University, USA Kingdom of Saudi Arabia Wuhan Textile University, China Taiyuan University of Science and Technology, China DynaM: Dynamic Multiresolution Data Representation for Large-Scale Scientific Analysis Yuan Tian, Scott Klasky, Weikuan Yu, Bin Wang, Hasan Abbasi, Norbert Podhorszki, and Ray Grout University of Tennessee, USA Oak Ridge National Laboratory, USA Auburn University, USA National Renewable Energy Laboratory, USA |
|
Session 3 (3 concurrent sessions, 2 papers each, 30 minutes each paper) | ||
15:00-16:00 | Virtualization | Comparisons of memory virtualization solutions for architectures with software-managed TLBs Yunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang, and Wenzhi Wang A Pre-Buffer Mechanism in Multi-channel Chariot: A High Compatible Architecture to Improve Virtual Machine Reliability Hao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Weifeng Gong, and Xingjun Zhang Xi'an Jiaotong University, China State Key Laboratory of High-end Server & Storage Technology, China |
Internet & Web | An Evolvable Locator/ID Separation Internet Architecture (ELISIA) Haitao Zhang, Xing Li, and Congxiao Bao Tsinghua University, China Mining User Interests in Web Logs of an Online News Service Based on Memory Model Wei Wang, Dongyan Zhao, Haining Luo, and Xin Wang Key Laboratory on Information Security, Engineering University of CAPF, Xi'an, China Peking University, Beijing, China Computer Management Center of the Armed Police General Hospital, Beijing, China |
|
Interconnect | High-Speed Multicast Scheduling for All-Optical Packet Switches Zhiyang Guo, and Yuanyuan Yang Stony Brook University, USA IX-Level Adversaries on Entry- and Exit- Transmission Paths in Tor Network Peipeng Liu, Jinqiao Shi, Lihong Wang, Xiao Wang, and Qingfeng Tan Institute of Computing Technology, Chinese Academy of Sciences, China Graduate University of Chinese Academy of Sciences, China Institute of Information Engineering, Chinese Academy of Sciences, China National Engineering Laboratory for Information Security Technologies, China |
|
16:00-16:30 | Coffee Break | |
Session 1 (3 concurrent sessions, 3 papers each, 30 minutes each paper) | ||
16:30-18:00 | Wireless Network | McDisc: A Reliable Neighbor Discovery Protocol in Low Duty Cycle and Multi-channel Wireless Networks Maotian Zhang, Lei Zhang, Panlong Yang, and Yubo Yan PLA University of Science and Technology, China E-HiLow: Extended Hierarchical Routing Protocol in 6LoWPAN Wireless Sensor Network Li Yue, Dongliang Xie, Jiatong Zhao, and Jie Zhang Beijing University of Posts &Telecommunications, China China Institute of Electronic System Engineering, China An Energy Aware Protocol for Cyclic Monitoring Wireless Sensor Networks Ittipong Khemapech, Ishbel Duncan, and Alan Miller University of the Thai Chamber of Commerce, Thailand University of St Andrews, UK |
Microarchitecture | A HW/SW Co-design of Execution Migration for Shared-ISA Hongwei Liu, Bo Sang, Jing Huang, Ji Qiu, and Xiang Gao Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences Institute of Computing Technology, Chinese Academy of Sciences University of Chinese Academy of Sciences Loongson Corporation, China Purdue University, USA Spontaneous Reload Cache - Mimicking a Larger Cache with Minimal Hardware Requirement Lunkai Zhang, Mingzhe Zhang, Lingjun Fan, Da Wang, and Paolo Ienne Institute of Computing Technology, Chinese Academy of Sciences, China University of Chinese Academy of Sciences, China College of Computer Science, Inner Mongolia University, China E'cole Polytechnique Fe'de'rale de Lausanne, Switzerland BFEPM:Best Fit Energy Prediction Modeling Based on CPU Utilization Xiao Zhang, Jianjun Lu, and Xiao Qin Northwestern Polytechnical University, China Auburn University, USA |
|
Solid State Storage | Improve Effective Capacity and Lifetime of Solid State Drives Ping Huang, GuangPing Wan, Ke Zhou, Miaoqing Huang, Chunhua Li, and Hua Wang Huazhong University of Science & Technology, China University of Arkansas, USA A New Metadata Update Method for Fast Recovery of SSD Cache Jing Yang, and Qing Yang University of Rhode Island, USA Performance Analysis of NAND Flash Based Cache for Network Storage System Lin Han, Hao Huang, and Changsheng Xie Huazhong University of Science & Technology, China |
|
18:00-20:00 | Dinner sponsored by conference | |
Keynote Speech | ||
9:00-10:00 | PROM in Clouds Chita R. Das, Director / Distinguished Professor, Pennsylvania State University (pdf) |
|
10:00-10:30 | Coffee Break | |
Session 4 (3 concurrent sessions, 3 papers each, 30 minutes each paper) | ||
10:30-12:00 | Network on Chip | REPAIR : A Reliable Partial-Redundancy-Based Router in NoC Lei Xie, Kuizhi Mei, and Yuhai Li Institute of Artificial Intelligence and Robotics , Xi'an Jiaotong University, China Robustness Analysis of mesh-based Network-on-Chip architecture under flooding-based Denial of Service attacks Dabin Fang, Huikai Li, Jun Han, and Xiaoyang Zeng State-Key Laboratory of ASIC and System, Fudan University, China SPC: An Approach to Guarantee Performance in Cost Oriented Mapping Algorithm for NoC Architectures Qinghua Wu, Leibo Liu, Shouyi Yin, Yu Ren, Shaojun Wei Tsinghua University, China |
Analytical Model | The Prediction Mathematical Model for HO Performance in LTE Networks Xiaohui Zhao, Xinlong Luo, Tong Wu, and Dengkun Xiao School of Science, BUPT, China Huawei Technologies Co.LTd., China A Novel Method for Computing Encoding Delay and Bandwidth on Network Coding Node Yuxing Wu, Xingjun Zhang, Song Cen, Li Wang, and Xiaoshe Dong Xi'an Jiaotong University, China |
|
Three Musketeers | Scheduling Algorithms for Handling Updates in Shingled Magnetic Recording Kalyana Sundaram Venkataraman, Tong Zhang, Wenzhe Zhao, Hongbin Sun, Nanning Zheng Department of ECSE, Rensselaer Polytechnic Institute (RPI), Troy, USA School of Electrical and Information Engineering, Xi'an Jiaotong University, China A vulnerability optimization method for security-critical real-time systems Xia Zhang, Jinyu Zhan, Wei Jiang, and Yue Ma University of Electronic Science and Technology of China, China An Optimized GP-GPU Warp Scheduling Algorithm for Sparse Matrix-Vector Multiplication Lifeng Liu, Meilin Liu, and Chong-jun Wang Wright State University, USA Nanjing University, China |
|
12:00-14:00 | Lunch | |
Short Paper Session 1 (3 concurrent sessions, 4 papers each, 15 minutes each paper) | ||
14:00-15:00 | Network-1 | Multiple Channel Assignment and Recovery Algorithm for MR-MC Network Ping Ren China Ship Development and Design Center, China Defence Against Botnets: A Formal Definition and a General Framework Lei Cao, and Xiaofeng Qiu Beijing University of Posts and Telecommunications, China A New Interest-sensitive and Network-sensitive Method for User Recommendation Yanmin Shang, Peng Zhang, and Yanan Cao Institute of Computing Technology, Chinese Academy of Sciences Research on English Learning Strategy Usage in Web-based and Conventional Environments Zhi Wen Guangzhou Civil Aviation College, China |
Architecture | Luminance and Chrominance Parallelization of H.264/AVC Decoding on a Multi-core Processor Xiaofu Meng, Xiang Gao, Qian Yu, Shuangshuang Zhang, Xiaochun Zhang, and Jing Huang Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences, China Institute of Computing Technology, Chinese Academy of Sciences, China Graduate University of Chinese Academy of Sciences, China Loongson Technology Corporation Limited, China Parallel Algorithm for Approximate String Matching with k Differences on CUDA Longjiang Guo, Shufang Du, Meirui Ren, Yu Liu, Jinbao Li, Jing (Selena) He, Ning Tian, and Keqin Li Heilongjiang University, China Key Laboratory of Database and Parallel Computing, China Kennesaw State University, USA State University of New York, USA Analysis of Sparse Matrix-Vector Multiplication Using Iterative Method in CUDA Rashid Hassani, Amirreza Fazely, Riaz-Ul-Ahsan Choudhury, and Peter Luksch University of Rostock, Germany Design of a Quadruple Precision Floating-Point Fused Multiply-Add Unit Based on 4-Way SIMD Device He Jun, Wang Biao, and Zhu Ying Shanghai Hi-Performance IC Design Centre, China |
|
Storage | Optimize Multidimensional Arrays Queries with Heterogeneous Replica Method Meiqi Zhu, Xiaomeng Huang, Songbin Liu, Haohuan Fu, YiFeng Geng, Qiming Fang, and Guangwen Yang Tsinghua University, China An FPGA-based Random Functional Verification Method for Cache Li Tiejun, Zhang Jianmin, and Li Sikun National University of Defense Technology, China Evaluating memory compression and deduplication Yuhui Deng, Liangshan Song, and Xinyu Huang Jinan University, Guangzhou, China Key Laboratory of Computer System and Architecture, Chinese Academy of Sciences, China |
|
15:00-15:30 | Coffee Break | |
Short Paper Session 2 (3 concurrent sessions, 4 papers each, 15 minutes each paper) | ||
15:30-16:30 | Network-2 | One Wide-Sense Circuit Tree Per Traffic Class based Inter- Domain Multicast Chen Yue, Li Chaoling, Huang Kaixiang, and Zhang Xiaobo State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China A Pre-Buffer Mechanism in Multi-channel P2P Live Streaming Pan Wang, Hao Huang, and Changsheng Xie Huazhong University of Science & Technology, China Battery-Aware MAC Analytical Modeling for Extending Lifetime of Low Duty-Cycled Wireless Sensor Network Yulin Li, Shouyi Yin, Leibo Liu, Shaojun Wei, and Dong Wang Tsinghua University, China Beijing Jiaotong University, China A Variant-Hop Algorithm in Forming Bluetooth Sensor Networks Chih-Min Yu, and Yih-Bin Yu Chung-Hua University |
Network-3 | An Effective Feature Selection Approach for Network Intrusion Detection
Fengli Zhang, and Dan Wang University of Electronic Science and Technology of China, China An Improved Ant Colony Clustering Method for Network Intrusion Detection Meng Lingxi, and Sun Guang Changchun University of Technology, China An Optimization Algorithm for PAPR Reduction in OFDM System Based on Tabu Search Ding Shuyan, Shu Ruo, Li Shibao, and Gu Zhaozhi China University of Petroleum, China |
|
Four Musketeers | A Novel Web Service Composition Recommendation Approach Based on Reliable QoS Wang Denghui, Huang Hao, and Xie Changsheng Huazhong University of Science & Technology, China Dynamic workflow planning on programmable infrastructure Wenchao Jiang, Zhiming Zhao, Adianto Wibisono, Paola Grosso, and Cees de Laat Guangdong University of Technology, China Informatics Institute, University of Amsterdam, Netherlands A New Approach to Multi-objective Virtual Machine Placement in Virtualized Data Center Sinong Wang, Huaxi Gu, and Gang Wu Xidian University, China D-PALD: A Dynamic Power-Aware Load Dispatcher with Response Time Percentile Guarantee in Heterogeneous Clusters Xu Zhou, Qiang Cao, Changesheng Xie, and Xubin He Huazhong University of Science & Technology, China Virginia Commonwealth University, USA |
|
16:30-18:00 | Short Paper Poster Session | |
18:00-21:00 | XJTU Research Highlights Speech + Banquet |