By Topic

11th International Conference on Parallel and Distributed Systems (ICPADS'05)

20-22 July 2005

Go

Filter Results

Displaying Results 1 - 25 of 175
  • 11th International Conference on Parallel and Distributed Systems Workshops - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1014 KB)
    Freely Available from IEEE
  • 11th International Conference on Parallel and Distributed Systems Workshops - Title

    Publication Year: 2005, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • 11th International Conference on Parallel and Distributed Systems Workshops - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • 11th International Conference on Parallel and Distributed Systems Workshops - Table of contents

    Publication Year: 2005, Page(s):v - xxii
    Request permission for commercial reuse | PDF file iconPDF (360 KB)
    Freely Available from IEEE
  • Message from the PDES-2005 Chairs

    Publication Year: 2005, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (69 KB) | HTML iconHTML
    Freely Available from IEEE
  • PDES-2005 Organizing Committee

    Publication Year: 2005, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • PDES-2005 Reviewers

    Publication Year: 2005, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded Systems

    Publication Year: 2005, Page(s):2 - 6
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Low energy consumptions are extremely important in real-time embedded systems, and scheduling is one of the techniques used to obtain lower energy consumptions. In this paper, we propose loop scheduling algorithms for minimizing energy based on rotation scheduling and DVS (dynamic voltage and frequency scaling) for real-time multi-core embedded systems. The experimental results show that our algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc Networks

    Publication Year: 2005, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    In mobile devices, the battery-based power is a precious resource. To maximize the network lifetime becomes a challenge issue in MANETs. We found that transmission collision is a problem which affects the energy saving much. If we can reduce the numbers of the transmission collision, we save more power. In this paper, we propose a new mechanism to address this problem and hence prolong network lif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Approach for Energy-Aware Distributed Embedded Intelligent Video Surveillance

    Publication Year: 2005, Page(s):12 - 16
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Intelligent video surveillance (IVS) offers a large spectrum of different applications that have strict requirements on quality of service (QoS) and energy-efficiency. Recent embedded IVS systems need to deliver compressed video data in high quality while using devices that are partly solar- or battery-powered. In this paper we present PoQoS, a novel hierarchical approach for combined power- and Q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Code Generation Algorithm for Affine Partitioning Framework

    Publication Year: 2005, Page(s):17 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Multiprocessors are about to become prevalent in the PC world. Major CPU vendors such as Intel and Advanced Micro Devices have recently announced their imminent migration to multicore processors. Affine partitioning provides a systematic framework to find asymptotically optimal computation and data decomposition for multiprocessors, including multicore processors. This affine framework uniformly m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing a Memory-Based Distributed Code Storage on Networked Diskless Embedded Systems

    Publication Year: 2005, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    Advances in networking and microprocessor technology have enabled the development of a variety of small, low-cost, and resource-limited embedded systems. Such an embedded system is often diskless due to the weight, size, and cost of a disk. Because of the availability of inexpensive high-speed network cards, most embedded systems are networked, wired or wireless. We propose and implement a memory-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a Configurable Embedded Processor Architecture for DSP Functions

    Publication Year: 2005, Page(s):27 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    Most of the embedded applications are served today by general-purpose processors or special-purpose ASIC processors containing hundreds to thousands of ALUs. While such solutions are efficient, they lack flexibility and are not feasible for certain embedded applications. ASIP(application specific instruction processor) design methodology can not only satisfy the functionality and performance requi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cramer-Rao Bound Analysis of Quantized RSSI Based Localization in Wireless Sensor Networks

    Publication Year: 2005, Page(s):32 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Localizing sensor nodes in a distributed system of wireless sensors is an essential process for self-organizing wireless sensor networks. Localization is a fundamental problem in wireless sensor networks, and the behavior of localization has not been thoroughly studied. In this paper, we formulate the quantized received signal strength indicator based localization as a parameter estimation problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partitioning and Pipelined Scheduling of Embedded System Using Integer Linear Programming

    Publication Year: 2005, Page(s):37 - 41
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    In this paper, an integer linear programming (ILP) based approach is proposed for integrated hardware/software (HW/SW) partitioning and pipelined scheduling of embedded systems for multimedia applications. The ILP approach not only partitions and maps each computation task of a particular multimedia application onto a component of the heterogeneous multiprocessor architecture, but also schedules a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Integration of Parallel Hough-Transform Chips for High-speed Line Detection

    Publication Year: 2005, Page(s):42 - 46
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Line detection is often needed in computer vision applications. The Hough transform processing of image data for line detection is robust but time-consuming. With the use of multiple processors, the processing time for Hough transform can be much reduced. In our research, we design an array processor for line-detection based on Hough transform that performs the line-parameter calculation and accum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware-based Packet Classification Made Fast and Efficient

    Publication Year: 2005, Page(s):47 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    To achieve fast packet classification, a hardware-based scheme, cross-producting recurrence (CPR), based on a formerly proposed cross-producting scheme is proposed. This scheme simplifies the classification procedure and decrease the distinct combinations of fields by hierarchically decomposing the multi-dimensional space. In the new scheme, the multi-dimensional space is endowed with a hierarchic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded Fingerprint Verification System

    Publication Year: 2005, Page(s):52 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    Fingerprint verification is one of the most reliable personal identification methods in biometrics. In this paper, an effective fingerprint verification system is presented. We describe an enhanced fingerprint verification system consisting of image pre-processing, feature extraction and matching processes. Improved image pre-processing and broken ridge reconnection methods are proposed. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SaNSO 2005 Foreword

    Publication Year: 2005, Page(s): xxvi
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • SaNSO-2005 Program Committee

    Publication Year: 2005, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • SaNSO-2005 Reviewers

    Publication Year: 2005, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Pulse Position Modulation for Active RFID System

    Publication Year: 2005, Page(s):58 - 62
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Radio frequency identification (RFID) enables everyday objects to be identified, tracked, and recorded. This paper presents a design of N-ary pulse position modulation transmission-only active RFID system for monitoring of large number and high density objects. A burst frame from tag consists of multiple duplicated blink units and the interval between them is randomly selected from predefined inte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Anti-collision Algorithms for Fast Object Identification in RFID System

    Publication Year: 2005, Page(s):63 - 67
    Cited by:  Papers (79)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    We propose two ALOHA-based Dynamic Framed Slotted ALOHA algorithms (DFSA) using tag estimation method (TEM), which estimates the number of tags around the reader, and dynamic slot allocation (DSA), which dynamically allocates the frame size for the number of tags. We compare the performance of the proposed DFSA with the conventional Framed Slotted ALOHA algorithm (FSA) using simulation. According ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A node-based available bandwidth evaluation in IEEE 802.11 ad hoc networks

    Publication Year: 2005, Page(s):68 - 72
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    We propose a new technique to estimate the available bandwidth of wireless nodes and by extension of one-hop links in IEEE 802.11-based ad hoc networks. Our technique exploits the fact that a node can estimate the channel occupancy by monitoring its environment. It provides a non-intrusive estimation meaning that it doesn't generate additional traffic to perform the evaluation. We show by simulati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More Efficient and Secure Remote User Authentication Scheme using Smart Cards

    Publication Year: 2005, Page(s):73 - 77
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    In 2004, Lee et al. proposed an improvement to Chien et al's scheme to prevent parallel session attack and in which any legal users could choose and change their passwords freely. This paper, however, demonstrates that Lee et al.'s scheme is vulnerable to masquerading server attack. Additionally, we point out to the system's secret key forward secrecy problem and insecure password change. Furtherm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.