8:30-9:00 | Welcome |
9:00-10:00 | Keynote by Prof. Yutong Lu, NUDT |
10:00-10:30 | Coffee Break |
10:30-11:30 | Industry Speeches |
11:30-13:30 | Lunch |
13:30-15:10 | Session 1A & 1B (4 full papers each, 25-minute presentation) |
Network Architecture
Storage System Design
|
|
15:10-15:40 | Coffee/Tea Break |
15:40-17:40 | Session 2A & 2B (Short paper presentation) |
18:00-20:00 | Dinner sponsored by conference |
9:00-10:00 | Keynote by Prof. Ahmed Louri, University of Arizona |
10:00-10:30 | Coffee Break |
10:30-12:10 | Session 3A & 3B (4 full papers each, 25-minute presentation) |
Distributed and Arrayed Storage
Overlay and Ad Hoc Networks
|
|
12:10-14:00 | Lunch |
14:00-15:15 | Session 4A & 4B (3 full papers each, 25-minute presentation) |
Cloud Computing
Chip Multiprocessing
|
|
15:15-15:45 | Coffee Break |
15:45-17:00 | Sessions 5A & 5B (3 and 2 full papers, respective, 25 minute) |
Architectural Simulation, Modeling and Management
Internet Infrastructure and Service
|
|
17:30-20:30 | Banquet and Award |
20:30-22:00 | Excursion |
9:00-12:00 | Visiting NSCC-TJ |
12:00-14:00 | Lunch |
Welcome | ||
8:30-09:00 | Welcome Speech | |
9:00-10:00 | Keynote speech, Scalable computing for HPC Prof. Yutong Lu, NUDT |
10:00-10:30 | Coffee Break |
10:30-11:30 | Industry Speeches | |
11:30-13:30 | Lunch | |
Session 1 (2 concurrent sessions, 4 papers each, 25 minutes each paper) | ||
Session Chair 1A: Qiang Cao (Huazhong Univ. of Science and Technology) Session Chair 1B: Hong Jiang (University of Nebraska-Lincoln) | ||
13:30-15:10 | Network Architecture |
1. Analysis of the Energy Efficiency and Packet Error Rate in Amplify-and-Forward MIMO Relay Networks
Manar Al-Kali, Li Yu, and Ali A. Mohammed (Huazhong University of Science and Technology) 2. SFTB: Scheduling Flows to Quickly Fit Burst in Data Center Networks Gang Deng, Zhenghu Gong, and Hong Wang (National National University of Defense Technology) 3. Provide IPv4 service using pure IPv6 server with stateless NAT64 translator Rong Jin, Congxiao Bao, and Xing Li (Tsinghua University) 4. A Mathematical Model of Three-Dimensional Optical Interconnection Network Chao Peng, Jia Lu, Lewen Zhou, Chen Qin, Longfei Guo and Wenhua Dou (National University of Defense Technology) |
Storage System Design |
1. RAFlow: Read Ahead Accelerated I/O Flow through Multiple Virtual Layers
Zhaoning Zhang, Kui Wu, Huiba Li, Jinghua Feng, Yuxing Peng, and Xicheng Lu (National University of Defense Technology, China; University of Victoria, B.C., Canada; National Super Computing Center in Tianjin, China) 2. Fema: A Fairness and Efficiency Caching Management algorithm in Shared Cache Yong Li, Dan Feng, Lingfang Zeng, and Zhan Shi (Huazhong University of Science and Technology; Wuhan National Lab for Optoelectronics) 3. sJournal: A New Design of Journaling for File Systems to Provide Crash Consistency (Best Paper Award) Jie Chen, Zhihu Tan, and Changsheng Xie (Huazhong University of Science and Technology; Wuhan National Laboratory for Optoelectronics) 4. DCS5: Diagonal Coding Scheme for Enhancing the Endurance of SSD-based RAID-5 Systems Yubiao Pan, Yongkun Li, Yinlong Xu, and Weitao Zhang (University of Science & Technology of China). |
|
15:10-15:40 | Coffee Break | |
Session 2 (Short Papers) | ||
Session Chair 2A: Dan Feng (Huazhong University of Science and Technology) Session Chair 2B: Jie Chen (Jefferson Lab) | ||
15:40-17:40 | Storage & Networking |
1. Establishing a PKI in an Open Adversarial Environment
Jiangyi Hu and Mike Burmester (DeVry University; Florida State University) 2. Forum-oriented Research on Water army Detection for Bursty topics Huijie Xu, Wandong Cai, and Guirong Chen (Northwestern Polytechnical University) 3. An Enhanced Kad Protocol Resistant to Eclipse Attacks Qiang Li, Jie Yu, and Zhoujun Li (Beihang University; National University of Defense Technology) 4. SDVC:A Scalable Deduplication Cluster for Virtual Machine Images in Cloud Lin Chuan, Cao Qiang, Zhang Hongliang, Huang Guoqiang and Xie Changsheng (Huazhong University of Science and Technology; Wuhan National Lab for Optoelectronics) 5. MMD: An Approach to Improve Reading Performance in Deduplication Systems Chao Li, Shupeng Wang, Xiaochun Yun, Xiaoyang Zhou and Guangjun Wu (Institute of Computing Technology/Chinese Academy of Sciences; Institute of Information Engineering/Chinese Academy of Sciences; National Computer network Emergency Response technical Team/Coordination Center) 6. Virtual Machine Migration across L3 Network Zhangfeng Hu, Shanzhi Chen, Bo Hu, Jing Jin, Junyu Lai, and Yong Jiang (Beijing University of Posts and Telecommunications; China Academy of Telecommunication and Technology; NEC Labs China; Tsinghua University) 7. Design and Implementation of a Virtualized Storage Fabric for Cloud Server Hua Nie, Xue Zhou, Yalu Ni, Xiaojun Yang, and Keping Long (University of Science and Technology Beijing; Dawning Information Industry Co., Ltd.) 8. Design and Implementation of GeoFS: a Wide-area File System Guo-Liang Liu, Liuying Ma, Pengfei Yan, Shuai Zhang and Liu Liu (Institute of Computing Technology/Chinese Academy of Sciences; University of Chinese Academy of Sciences) |
Storage |
1. Efficient GCD Computation for Big Integers on Xeon Phi Coprocessor
Jie Chen, William Watson, and Mayee Chen (Jefferson Lab, USA; Jamestown High School, Williamsburg, VA, USA) 2. Optimal Task Scheduling In MapReduce Changjian Wang, Yuxing Peng, Junyi Liu, Mingxing Tang, Guangming Liu, and Jinghua Feng (National University of Defense Technology, China; National Supercomputer Center in Tianjin, China) 3. A mapping method for application customized reconfigurable pipeline Guanwu Wang and Sikun Li (National University of Defense Technology, China) 4. Symbolic Execution of Network Software Based on Unit Testing Zhou Lin, Gan Shuitao, and Qin Xiaojun (Jiang Nan Computer Technique Institute) 5. Balanced P-Code: A RAID-6 Code to Support Highly Balanced I/Os for Disk Arrays Ping Xie, Jianzhong Huang, Cao Qiang, and Changsheng Xie (Huazhong University of Science & Technology; Qinghai Normal University) 6. Design and Evaluation for a Multi-Cloud Based Storage System with Privacy Preserving Yijie Fan, Zhen Qiao, and Mingzhong Xiao (Beijing Normal University) 7. Optimizing Memory Access with Fast Address Computation on a MIPS Architecture Qi Ao, Guojie Jin, Songsong Cai, and Shuai Chen (Institute of Computing Technology/Chinese Academy of Sciences; University of Chinese Academy of Sciences; Loongson Corporation) |
|
18:00-20:00 | Dinner sponsoered by NAS'14 |
Keynote Speech | ||
9:00-10:00 | Keynote speech, Title TBD Prof. Yutong Lu, NUDT |
|
10:00-10:30 | Coffee Break | |
Session 3 (2 concurrent sessions, 4 papers each, 25 minutes each paper) | ||
Session Chair 3A: Qiang Cao (Huazhong Univ. of Science and Technology) Session Chair 3B: Jizhong Han (Chinese Adacademy of Science) | ||
10:30-12:10 | Distributed and Arrayed Storage |
1. Reliability Analysis on Shifted and Random Declustering Block Layouts in Scale-out Storage Architectures
Jun Wang, Ruijun Wang, Jianglin Yin, Huijun Zhu (University of Central Florida) 2. MCRTREE: A Mutually Cooperative Recovery Scheme for Multiple Losses in Distributed Storage Systems Based on Tree Structure Xiaoqiang Pei, Yijie Wang, Xingkong Ma, Yongquan Fu, and Fangliang Xu (National University of Defense Technology, China) 3. LaRS: A Load-aware Recovery Scheme for Heterogeneous Erasure-Coded Storage Clusters Haibing Luo, Jianzhong Huang, Qiang Cao, and Changsheng Xie (Huazhong University of Science and Technology) 4. LoneStar Stack: Architecture of a Disk-Based Archival System Matthias Grawinkel, Gregor Best, Malte Splietker and André Brinkmann. (Johannes-Gutenberg University Mainz; University of Paderborn) |
Overlay and Ad Hoc Networks |
1. Longest Prefix Lookup in Named Data Networking: How Fast Can It Be?
Fu Li, Fuyu Chen, Jianming Wu, and Haiyong Xie (Liangziyun; Brocade; Facebook; Tsinghua University) 2. DR-SNBot: A Social Network-based Botnet with strong Destroy-Resistance Tao Yin, Yongzheng Zhang, and Shuhao Li (Institute of Information Engineering/University of Chinese Academy of Sciences; Institute of Information Engineering/Chinese Academy of Sciences) 3. An Improved Distance Based Scheme for Broadcast Storm Suppression in VANETs Pei-Hsuan Lee, and Tsung-Chuan Huang (National Sun Yat-sen University) |
|
12:10-14:00 | Lunch | |
Session 4 (2 concurrent sessions, 3 papers each, 25 minutes each paper) | ||
Session Chair 4A: Ziliang Zong (Texas Station University) Session Chair 4B: Weihua Zhang (Fudan University) | ||
14:00-15:15 | Cloud Computing |
1. Performance Characterization of Hadoop and DataMPI Based on Amdahl's Second Law
Fan Liang, Chen Feng, Xiaoyi Lu, and Zhiwei Xu (Institute of Computing Technology/Chinese Academy of Sciences; The Ohio State University) 2. Clique Migration: Affinity Grouping of Virtual Machines for Inter-Cloud Live Migration (Best Student Paper Award) Tao Lu, Morgan Stuart, Kun Tang, and Xubin He. (Virginia Commonwealth University) 3. Energy Efficient Mobile Cloud Computing and Its Applications Qiang Fu, Weiwen Zhang, and Baihua Wang (Inspur Group Co. Ltd.; Nanyang Technological University) |
Chip Multiprocessing |
1. Performance and Energy Modeling for Cooperative Hybrid Computing
Rong Ge, Xizhou Feng, Martin Burtscher, and Ziliang Zong (Marquette University; Texas State University) 2. iCHAT: Inter-Cache Hardware-Assistant Data Transfer for Heterogeneous Chip Multiprocessors (Best Paper Award) Junli Gu, Bradford Beckmann, Ting Cao, and Yu Hu (AMD Research; Australian National University; Chinese Academy of Sciences) 3. A Floorplan Optimized for Concurrent Multiple Applications on Network-on-Chip Chao Lu, Shaoli Liu, and Longbing Zhang (State Key Laboratory of Computer Architecture/Chinese Academy of Sciences; Institute of Computing Technology/Chinese Academy of Sciences; University of Chinese Academy of Sciences; Loongson Technology Corporation Limited) |
|
15:15-15:45 | Coffee Break | |
Session 5 (3 and 2 full papers, respective, 25 minute) | ||
Session Chair 5A : Zhao Zhang (Iowa State University) Session Chair 5B : Xubin He (Virginia Commonwealth University) | ||
15:45-17:00 | Architectural Simulation, Modeling and Management |
1. RPSim: a Rapid Prototyping Full-system Simulator for SoC Software Development
Haojun Wang, Qinghao Min, and Weihua Zhang (Fudan University) 2. Access-Aware Memory Thermal Management Suyu Zhang and Zhichun Zhu (University of Illinois at Chicago) 3. An Availability Approached Task Scheduling Algorithm in Heterogeneous Fault-Tolerant System Jian Sun, Xiaoshe Dong, and Xingjun Zhang (Xi'an Jiaotong University) |
Internet Infrastructure and Service |
1. A Moving Target Framework to Improve Network Service Accessibility
Jinqiao Shi, Xiao Wang, Binxing Fang, and Li Guo (Institute of Information Engineering/Chinese Academy of Sciences; Institute of Computing Technology/Chinese Academy of Sciences; National Engineering Laboratory for Information Security Technologies, China) 2. Variable Hierarchy Based Location Management for Future Internet Zhangfeng Hu, Shanzhi Chen, Bo Hu, Jing Jin, Junyu Lai, and Yong Jiang (Beijing University of Posts and Telecommunications; China Academy of Telecommunication and Technology; NEC Labs China; Tsinghua University) |
|
17:30-20:30 | Banquet and Award | |
20:30-22:00 | Excursion |