By Topic

2007 IEEE International Performance, Computing, and Communications Conference

April 2007

Filter Results

Displaying Results 1 - 25 of 89
  • Message from the General Chairs

    Publication Year: 2007, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (766 KB) | HTML iconHTML
    Freely Available from IEEE
  • Greetings from the Technical Program Committee Co-Chairs

    Publication Year: 2007, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (940 KB) | HTML iconHTML
    Freely Available from IEEE
  • International Performance Computing and Communications Conference (IPCCC 07)

    Publication Year: 2007, Page(s): nil3
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007, Page(s): nil4
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Workshop on Information Assurance (WIA 07)

    Publication Year: 2007, Page(s): nil5
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Workshop on eSafety and Convergence of Heterogeneous Wireless Networks (eSCo-Wi07)

    Publication Year: 2007, Page(s): nil6
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Workshop on Research Challenges in Next Generation Networks for First Responders and Critical Infrastructures (NetCri 07)

    Publication Year: 2007, Page(s): nil7
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • [Table of contents]

    Publication Year: 2007, Page(s):nil8 - nil16
    Request permission for commercial reuse | PDF file iconPDF (5286 KB)
    Freely Available from IEEE
  • A QoS Framework to Support Integrated Services in Multihop Wireless Networks with Infrastructure Support

    Publication Year: 2007, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    In this paper, we consider a multihop wireless network with infrastructure support (MWNI) which can be built upon existing IEEE 802.11 based WLANs to extend the coverage and provide more flexibility to adapt to the dynamics of the network. To support integrated services in MWNI, a QoS framework is proposed to achieve the following objectives: (1) allow more real-time flows to be admitted into the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility Support of Multi-User Services in Next Generation Wireless Systems

    Publication Year: 2007, Page(s):9 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3603 KB) | HTML iconHTML

    The substantial advancement and proliferation of wireless technologies leads to the need to efficiently manage user mobility. Furthermore, the simultaneously emerging of services like video-conference, radio and TV has emphasized the importance to deliver content to several simultaneous receivers. This way, one of the key challenges to deploy multi-user services in the next generation wireless sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Malware Signature Extraction and Detection Method Applied to Mobile Networks

    Publication Year: 2007, Page(s):19 - 26
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The rapid development of mobile phone networks has facilitated the need for better protection against malware. Malware detection is a core component of a security system protecting mobile networks. In this paper, we describe a system for detecting malware within the network traffic using malware signatures. Our system contains two key components. The first one automatically extracts a set of signa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications

    Publication Year: 2007, Page(s):27 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9158 KB) | HTML iconHTML

    Voice over IP and video applications continue to increase the amount of real-time traffic over the Internet. These applications utilize the UDP protocol because TCP is not suitable for streaming applications since its congestion control mechanism can change the connection's transmission rate drastically, affecting the user-perceived quality of the transmission. Nonetheless, the use of end-to-end f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP Vegas Performance with Streaming Media

    Publication Year: 2007, Page(s):35 - 44
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    In this paper we study the use of TCP Vegas as a transport protocol for streaming media. We also consider TCP NewReno as a transport protocol for streaming media. We find that: 1) TCP is able to transport streaming media with good performance in a wide variety of scenarios; 2) TCP Vegas performs better than TCP NewReno in many cases; and 3) for viable media streams, both TCP variants need to achie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Fair Traffic Management for Efficient and Robust IP Networking

    Publication Year: 2007, Page(s):45 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (770 KB) | HTML iconHTML

    As use of non-TCP applications such as streaming media and network games increases, the potential for unfair, misbehaving flows and the threat of congestion collapse also increases. This paper introduces a statistical traffic filtering technique, stochastic fairness guardian (SFG), that effectively regulates misbehaving flows with minimal traffic state information. SFG can be used in conjunction w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memory Performance and Scalability of Intel's and AMD's Dual-Core Processors: A Case Study

    Publication Year: 2007, Page(s):55 - 64
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    As chip multiprocessor (CMP) has become the mainstream in processor architectures, Intel and AMD have introduced their dual-core processors to the PC market. In this paper, performance studies on an Intel Core 2 Duo, an Intel Pentium D and an AMD Athlon 64times2 processor are reported. According to the design specifications, key derivations exist in the critical memory hierarchy architecture among... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Insight Through Performance Modeling

    Publication Year: 2007, Page(s):65 - 74
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (674 KB) | HTML iconHTML

    Tuning the performance of applications requires understanding the interactions between code and target architecture. This paper describes a performance modeling approach that not only makes accurate predictions about the behavior of an application on a target architecture for different inputs, but also provides guidance for tuning by high-lighting the factors that limit performance in each section... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring Performance in Activity-Based File Relocation

    Publication Year: 2007, Page(s):75 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Dynamic storage tiering (DST) is the concept of grouping storage devices into tiers based on their characteristics, and relocating files dynamically to leverage on the heterogeneity of the underlying devices. An important usage of DST is activity-based file relocation, where less active files can be stored on less expensive devices without affecting the overall perceived quality of the storage sys... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks

    Publication Year: 2007, Page(s):85 - 92
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (177 KB) | HTML iconHTML

    In this paper, we study the maximum lifetime target coverage problem (MTC), which is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Many centralized algorithms have been proposed to solve this problem. A very few distributed versions have also been presented but none of them obtains a good approximation ratio. In this paper, we propose two O(log n) lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Cluster Head Selection in the LEACH Architecture

    Publication Year: 2007, Page(s):93 - 100
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    LEACH (low energy adaptive clustering hierarchy) (W. Heinzelman et al., 2000) is one of the popular cluster-based structures, which has been widely proposed in wireless sensor networks. LEACH uses a TDMA based MAC protocol, and in order to maintain a balanced energy consumption, suggests that each node probabilistically become a cluster head. To reduce the energy consumption and to avoid the stric... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Moving Schemes for Mobile Sinks in Wireless Sensor Networks

    Publication Year: 2007, Page(s):101 - 108
    Cited by:  Papers (12)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    In a wireless sensor network for data-gathering applications, if all network data congregate to a stationary sink node hop by hop, the sensor nodes near the sink have to consume more energy on forwarding data for other nodes, which probably causes the early function loss of the sensor network. Employing a mobile sink can alleviate the hotspot problem and balance the energy consumption among the se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Guarantees for Flow-Mapping Parallel Packet Switch

    Publication Year: 2007, Page(s):109 - 116
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    Flow-mapping parallel packet switch (FM-PPS) is the class of parallel packet switch adopting flow-level load-balancing algorithms. It dispatches packets of a micro-flow into an unchanged parallel switch, thus natively guarantees intra-flow packet orders. Due to the heavy tail of flow size distribution, it is concerned that FM-PPS may suffer from unpredictable performance which prevents it from rea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Queue-based Adaptive Polling Scheme to Improve System Performance in Gigabit Ethernet Networks

    Publication Year: 2007, Page(s):117 - 124
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    Gigabit Ethernet is now finding wider deployment in computer networks. The conventional operating system suffers from the receive livelock problem in Gigabit Ethernet networks. The device hybrid (interrupt + polling) scheme has been widely used to overcome this problem in current operating systems such as GNU/Linux and FreeBSD. However, controlling the polling time without regard to the system sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives

    Publication Year: 2007, Page(s):125 - 133
    Cited by:  Papers (6)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Bloom filters are a probabilistic data structure used to evaluate set membership. A group of hash functions are used to map elements into a bloom filter and to test elements for membership. In this paper, we propose using multiple groups of hash functions and selecting the group that generates the bloom filter instance with the smallest number of bits set to I. We evaluate the performance of this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Queuing Delay in RPR Networks

    Publication Year: 2007, Page(s):134 - 141
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Resilient packet ring (RPR) that has been standardized as IEEE 802.17 is a MAC layer protocol designed for data centric metropolitan area network applications. A well-designed RPR network would be able to offer QoS guarantee for throughput and delay sensitive data classes in addition to providing other types of low cost best effort services. Careful network planning would be required to allow succ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Low Bound for Broadcast in Optical Networks of Bounded Treewidth Using Fewest Converters

    Publication Year: 2007, Page(s):142 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    Wavelengths and converters are shared by communication requests in optical networks. The usage of converters increases the utilization of wavelengths and allows more requests to succeed. The converters usage problem (CUP) is to determine the minimum number of converter so that each node can send messages to all the others (broadcasting). In this paper, we study the CUP in sparse conversion network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.