By Topic

2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06)

Date 4-7 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 118
  • Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies [Cover]

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (218 KB)
    Freely Available from IEEE
  • Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies - TOC

    Publication Year: 2006, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Welcome from the General Chair

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Program Chair

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (37 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Notice of Violation of IEEE Publication Principles
    An Intrusion Detection Architecture for Ad Hoc Network Based on Artificial Immune System

    Publication Year: 2006, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Notice of Violation of IEEE Publication Principles

    "An Intrusion Detection Architecture for Ad hoc Network Based on Artificial Immune System"
    by Hongxia Xie and Zhengyun Hui
    in the Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), Taipei, Taiwan, Dec. 2006

    After careful and considered review of the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional Fault-Tolerant Hamiltonicity of Twisted Cubes

    Publication Year: 2006, Page(s):5 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    The n-dimensional twisted cube, denoted by TQn , a variation of the hypercube, possesses some properties superior to the hypercube. In this paper, assuming that each vertex is incident with at least two fault-free links, we show that TQn can tolerate up to 2n - 5 edge faults, while retaining a fault-free Hamiltonian cycle. The result is optimal with respect to the number of e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional Fault-Tolerant Hamiltonicity of Star Graphs

    Publication Year: 2006, Page(s):11 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    The star graph possesses many nice topological properties. In this study, we show that for any n dimensional star graph (n ges 4) with les 2n - 7 edge faults in which each node is incident to at least two non-faulty edges, there exists a fault-free Hamiltonian cycle. Compare with the corresponding study in hypercube, our method is rather succinct View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mixed Preservation of Conditionally Nonblocking Switches under 2-stage Interconnection

    Publication Year: 2006, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    The 2-stage interconnection network is conceivably the most compact design for interconnecting small switches into a large switch. When a certain class of switches is preserved under 2-stage interconnection, recursive application of 2-stage interconnection then builds indefinitely large switches in this class from atomic ones. The present paper studies switches that are not preserved under 2-stage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Merging Source and Shared Trees Multicast in MPLS Networks

    Publication Year: 2006, Page(s):23 - 28
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Multicast and MPLS are two complementary technologies. Merging MPLS and multicast technologies can acquire two advantages: multicast saving bandwidth and MPLS supporting high-speed, QoS and traffic engineering, VPN. Implementation of MPLS multicast has two key expectations: how to construct multicast tree over MPLS domain and how to enhance multicast scalability. In this paper, we design a scalabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Link Adaptation Solution to IEEE 802.16d WMAN

    Publication Year: 2006, Page(s):29 - 32
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    IEEE 802.16d adopts HARQ (hybrid automatic retransmission request) and AMC (automatic modulation and coding) as link adaptive mechanism. This paper proposes a link adaptive solution based on a simple but effective sliding window mechanism. Also a signal constellation rearrangement strategy is present to average out reliabilities of bits carried by repeatedly transmitted symbols over retransmission... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Power Lines Communications Channels' Characteristics of Markov

    Publication Year: 2006, Page(s):33 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Impulse noise is one of the important facts impairing the performance of the power line communications systems (PLC). The partitioned Markov chain was proposed to evaluate the impairments caused by the impulse noise and to model the power communications channels. The Baulm-Welch algorithm was employed to calculate the basic transition matrix to avoid the less robust computation with the nonlinear ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Java Annotated Concurrency Based on the Concurrent Package

    Publication Year: 2006, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    JAC is an extended Java that introduces a higher level of concurrency, hiding threads and separating thread synchronization from application logic in a declarative fashion, java.util.concurrent package provides some excellent and powerful concurrent components. This paper introduces how to reconstruct the JAC precompiler to improve the JAC using concurrent package. The new precompiler can create J... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High-Efficiency Vector Interpolator Using Redundant CORDIC Arithmetic in Power-Aware 3-D Graphics Rendering

    Publication Year: 2006, Page(s):44 - 49
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    High performance architectures can be designed for data intensive and latency tolerant applications by maximizing the parallelism and pipelining of the algorithm. The hardware primitives for 3D rotation for high throughput 3D vector interpolation are presented in this paper. The primitives are based on the CORDIC algorithm. The proposed architecture of the 3D vector interpolator using redundant CO... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error-Diffusion Kernel Estimation Using Least Squares

    Publication Year: 2006, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    In this paper, we propose a method called the iterated estimation of kernel and error (KE estimation) to find the maximum-likelihood (ML) estimate of the error-diffusion (ED) kernel for halftones. The KE estimation consists mainly of iterated bound-constrained least squares (BLS). The KE-estimated kernel avoids the difficulty of regulating the control parameter in the previous least-mean-square (L... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote Sensing Images Classification/Data Fusion Using Distance Weighted Multiple Classifiers Systems

    Publication Year: 2006, Page(s):56 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    For a multiple classifiers system, a weighting policy is applied to fuse knowledge acquired by classifiers to arrive at an overall decision that is supposedly superior to that attainable by any one of them acting alone. The distance measured between the classifier output and its desired output can be used as a classifier performance indicator. By adopting this performance indicator, the rms and av... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Encryption and Decryption Using SCAN Methodology

    Publication Year: 2006, Page(s):61 - 66
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (449 KB) | HTML iconHTML

    This paper proposed an image encryption and decryption process. Its encryption method is based on SCAN patterns generated by the SCAN methodology. The SCAN is a language-based two-dimensional spatial-accessing methodology which can efficiently specify and generate a wide range of scanning paths. Then scanning paths sequence fill in original image. Note that the scanning paths with random code gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Groups Mutual Exclusion Based on Clients/Servers Model

    Publication Year: 2006, Page(s):67 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    In this paper we present a new distributed group mutual exclusion (DGME) based on clients/servers model, and uses a dynamic data structures. Several processes (clients) can access simultaneously to a same opened session (server). The algorithm ensures that, at any time, at most one session is opened, and any requested session will be opened in a finite time. The number of messages is between 0 and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Attribute-Based Access Control Model for Web Services

    Publication Year: 2006, Page(s):74 - 79
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Web service is a new service-oriented computing paradigm which poses the unique security challenges due to its inherent heterogeneity, multi-domain characteristic and highly dynamic nature. A key challenge in Web services security is the design of effective access control schemes. However, most current access control systems base authorization decisions on subject's identity. Administrative scalab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic TXOP Assignment for Fairness (DTAF) in IEEE 802.11e WLAN under Heavy Load Conditions

    Publication Year: 2006, Page(s):80 - 85
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (767 KB) | HTML iconHTML

    The IEEE 802.11e is an extension of the IEEE 802.11 to provide quality of service (QoS) for applications requiring real time services. However, when used with the multi-rate scheme, they suffer unfairness problem. On the other hand, the traditional contention window size (CW) update method actually depends on the collision times of the investigated station, which would possibly causes more content... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Administrative Usage Control Model for Secure Interoperability

    Publication Year: 2006, Page(s):86 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    The secure interaction between two or more administrative domains is a major concern. IRBAC2000 is a model that quickly establishes a flexible policy for dynamic role translation from foreign domains to local. A-IRBAC2000 mode utilizes RBAC to manage dynamic role translation between foreign and local domains. We will see that these mechanisms have significant shortcomings. We propose an improved a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conditional Fault-Tolerant Cycle-Embedding of Crossed Cube

    Publication Year: 2006, Page(s):90 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The crossed cube, which is a variation of the hypercube, possesses some properties superior to the hypercube. In this paper, assuming that each node is incident with at least two fault-free links, we show that an n-dimensional crossed cube can tolerate up to 2n - 5 link faults, while retaining a fault-free Hamiltonian cycle. The result is optimal with respect to the number of link faults tolerated... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.