By Topic

Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007)

Date 3-6 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 91
  • Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (992 KB)
    Freely Available from IEEE
  • Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (249 KB)
    Freely Available from IEEE
  • Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Eighth International Conference on Parallel and Distributed Computing, Applications and Technologies - TOC

    Publication Year: 2007, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Welcome from the General Chair

    Publication Year: 2007, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (169 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Program Chair

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (163 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2007, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Message Dissemination under the Multicasting Communication Mode

    Publication Year: 2007, Page(s):3 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    We discuss algorithms, complexity issues, and applications for message dissemination problems under the multicasting communication mode. These problems arise while executing in a parallel or distributed computing environment iterative methods for solving scientific computation applications, dynamic programming procedures, sparse matrix multiplication, etc. Our message communication problems also a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • e-Science in the Cloud with CARMEN

    Publication Year: 2007, Page(s): 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    Summary form only given. Understanding how the brain works is a major scientific challenge which will benefit medicine, biology and computer science. It requires knowledge of how information is encoded, accessed, analysed, archived and decoded by networks of neurons. Globally, over 100,000 neuroscientists are working on this problem. However, the data that forms the basis for their work is rarely ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring Biocomplexity: New Challenges for High Performance Computing

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (82 KB) | HTML iconHTML

    The talk will address some of the key algorithmic and computational challenges associated with the modelling of certain classes of biological networks (e.g. biochemical, signalling). This will involve several research threads that cover a range of theoretical, software and hardware implementation issues. The theoretical modelling developments involve a variety of issues related to the numerical, p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction f based models for evaluating backfilling scheduling policies

    Publication Year: 2007, Page(s):9 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    The research on the usage of prediction techniques in HPC scheduling policies rather than user estimates has increased it relevance these recent years. In the coming scheduling architectures, like grids and very heterogeneous computational resources, such techniques are having a crucial relevance due to users in most of the cases will not have enough information or enough skills for specify for ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiprocessor Scheduling for Distance-Constrained Task Systems

    Publication Year: 2007, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    In this paper, we pay attention to the real-time multiprocessor scheduling for Distance-Constrained Tasks. By using Early-release-fair (ERfair) model, we propose two efficient algorithms to probe whether the distance constraints of every task can be guaranteed. Moreover, they gather the unfeasible tasks and inflate them with a reweighting function. The proposed algorithms are linear-time and incre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task Allocation in Distributed Embedded Systems by Genetic Programming

    Publication Year: 2007, Page(s):26 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    In this paper we describe a task allocation method, that utilizes genetic programming to find a suitable solution in an adequate time for this NP-complete combinatorial optimization problem. The underlying distributed embedded system is heterogenous, consisting of different processors with different properties such as core type, clock frequency, available memory, and I/O interfaces, interconnected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distant-Based Resource Placement in Product Networks

    Publication Year: 2007, Page(s):31 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    The utilization of the limited resources of a multiprocessor or multicomputer system is a primary performance issue crucial for the design of many scheduling algorithms. While many of the existing parallel machines benefit from a regular product network topology, almost none of the previous resource placement techniques have come to recognize and exploit this inherent regularity. This paper introd... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing IP Flow Classification Using Feature Selection

    Publication Year: 2007, Page(s):39 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB) | HTML iconHTML

    The identification of network applications is essential to numerous network activities. Unfortunately, traditional port-based classification and packet payload-based analysis exhibit a number of shortfalls. An alternative is to use Machine Learning (ML) techniques and identify network applications based on per-flow features. Since a lot of flow features can be used for flow classification and ther... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Employees' Emails without Violating Their Privacy Right

    Publication Year: 2007, Page(s):46 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    The capability of an employee to violate the policy of an organization is a concern for an employer. Monitoring is a measure taken by an employer to discourage an employee from acting inappropriately. However, current monitoring techniques tend to raise privacy issues because they violate the privacy rights of employees. Applying a monitoring technique without violating the privacy of employees is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Email Categorization Using Multi-stage Classification Technique

    Publication Year: 2007, Page(s):51 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    This paper presents an innovative email categorization using a serialized multi-stage classification ensembles technique. Many approaches are used in practice for email categorization to control the menace of spam emails in different ways. Content-based email categorization employs filtering techniques using classification algorithms to learn to predict spam e-mails given a corpus of training e-ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trap-Door Method for Subscription-Based Mobile Content

    Publication Year: 2007, Page(s):59 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Scalability design in the mobile Internet Web servers is increasing its importance. The performance improvement for scalable mobile Internet service requirement is increased as the mobile Internet penetrates into every day life. The mobile Internet enabled opportunities for subscription-based charged content for content providers. In order to cope with the scalability design issues, it is importan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Genetic Algorithms and List Scheduling Techniques for Independent Task Scheduling in Distributed Systems

    Publication Year: 2007, Page(s):67 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Given a set of tasks with certain characteristics, e.g., data size, estimated execution time and a set of processing nodes with their own parameters, the goal of task scheduling is to allocate tasks at nodes so that the total makespan is minimized. The problem has been studied under various assumptions concerning task and node parameters with the resulting problem statements usually being NP-compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Remote Memory Swapping System for Cluster Computers

    Publication Year: 2007, Page(s):75 - 81
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    This paper describes the use of remote memory for virtual memory swapping in a cluster computer. Our design uses a lightweight kernel-to-kernel communications channel for fast, efficient data transfer. Performance tests are made to compare our system to normal hard disk swapping. The tests show significantly improved performance when data access is random. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Approach for Negotiating Resource Contributions in Dynamic Collaboration

    Publication Year: 2007, Page(s):82 - 86
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    This paper first defines a format for capturing and distributing contributed resources called an eContract and then proposes an agreement protocol along with a simple distributed algorithm for negotiating the eContract in the context of dynamic collaborations. The insights gained from the analysis of the proposed negotiation algorithm lead us to the development of an efficient "message piggybackin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Evaluation of a Novel CMP Cache Structure for Hybrid Workloads

    Publication Year: 2007, Page(s):89 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    The Chip Multiprocessor (CMP) architecture offers parallel multi-thread execution and fast retrieval of shared data that is cached on-chip. In order to obtain the best possible performance with the CMP architecture, the cache architecture must be optimised to reduce time lost during remote cache and off-chip memory accesses. Many researchers proposed CMP cache architectures to improve the system p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Realistic Evaluation of Interconnection Network Performance at High Loads

    Publication Year: 2007, Page(s):97 - 104
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (618 KB) | HTML iconHTML

    Any simulation-based evaluation of an interconnection network proposal requires a good characterization of the workload. Synthetic traffic patterns based on independent traffic sources are commonly used to measure performance in terms of average latency and peak throughput. As they do not capture the level of self-throttling that occurs in most parallel applications, they can produce inaccurate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.