By Topic

1998 IEEE International Performance, Computing and Communications Conference. Proceedings (Cat. No.98CH36191)

16-18 Feb. 1998

Filter Results

Displaying Results 1 - 25 of 60
  • 1998 IEEE International Performance, Computing and Communications Conference. Proceedings (Cat. No.98CH36191)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (493 KB)
    Freely Available from IEEE
  • A fault-tolerant distributed sorting algorithm in tree networks

    Publication Year: 1998, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (759 KB)

    The paper presents a distributed sorting algorithm for a network with a tree topology. The distributed sorting problem can be informally described as follows: nodes cooperate to reach a global configuration where every node, depending on its identifier, is assigned a specific final value taken from a set of input values distributed across all nodes; the input values may change in time. In our solu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 1998, Page(s): 0_20
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • A fault-tolerant token passing algorithm on tree networks

    Publication Year: 1998, Page(s):44 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    We present a self stabilizing token passing algorithm for a tree network. The algorithm is based on the 4 state mutual exclusion algorithm of E.W. Dijkstra (1974) and works under the distributed daemon model of execution. Although our algorithm relies upon an underlying tree network topology, it is not less general than the protocol by S. Huang and N. Chen (1993) since a spanning tree of a network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance prediction based on semi-formal software architectural description

    Publication Year: 1998, Page(s):193 - 199
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    Mature engineering includes systematic quantified architectural design. Software engineering lacks engineering methodologies in architectural design and the evaluation of the design in terms of performance. This paper presents a methodology and its accompanying toolset, Workflow-to-SDL Direct Simulation (W2S), for generating a simulator from a semi-formal architecture description. We have used thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a multicast routing algorithm

    Publication Year: 1998, Page(s):442 - 447
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Multicast communication can support wide range of applications such as digital video distribution. In multicast communication, routing paths are established in terms of minimizing the total cost of the multicast tree or minimizing the distances of each connection from source to the destinations. In this paper, we are also concerned about the number of copies in one switching fabric and propose a n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple hierarchical traffic model for VBR MPEG video

    Publication Year: 1998, Page(s):147 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB)

    A hierarchical model is derived for MPEG video. This model is developed so as to represent the bit-rate variations of MPEG video at two different time scales/levels: scene level and frame level. Various evaluations show that the proposed model not only matches very good the statistical characteristics with the real MPEG video but also predicts accurately the network performance of an ATM multiplex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data network analysis using NOVA

    Publication Year: 1998, Page(s):124 - 130
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    A flexible, model-based tool is presented for use in the analysis of telecommunication networks. The tool was designed and implemented using object-oriented principles. Through the use of software models, which can be modified or added, NOVA allows the analysis of data networks with arbitrary characteristics and topologies. We discuss specific models for a network node and a link, which are the ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview and application of model reduction techniques in formal verification

    Publication Year: 1998, Page(s):165 - 171
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    Formal verification methods are becoming increasingly popular in the verification of digital systems and protocol checking of communication systems due to their inherent exhaustive nature. Model checking in particular has become quite extensively used in verifying the performance and functional specification of sequential logic. One characteristic of model checking is the state space explosion pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing multimedia protocol performance through knowledge based modeling

    Publication Year: 1998, Page(s):140 - 146
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Multimedia transmission protocols take advantage of video compression coders. The core of video sequence compression coders is the motion estimation task. Unfortunately video sequence coders cannot be implemented effectively on desktop workstations because of the high computing requirements of the motion estimation task. It is possible to reduce the computing power required penalizing the compress... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS guarantees for long-range dependent traffic

    Publication Year: 1998, Page(s):314 - 320
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    In this paper we study resource management on self-similar traffic to guarantee QoS. At first, we investigate a local ATM network. Then a queuing process with the real ATM network traffic is established to explore the tail distribution under different conditions. We have found the following results: 1. The long-range dependent correlations are the dominate factors of the queuing performance. When ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accurate measurement of system call service times for trace-driven simulation of memory hierarchy designs

    Publication Year: 1998, Page(s):239 - 244
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    This paper presents a methodology for accurately measuring system call service times and process blocking times in a UNIX-like computing environment. Problems that may cause inaccurate measurements stem from the method used to charge processes for execution time, the difference in the time consumed during a system call and a time quantum or dispatch interval, and the instrumentation overhead inclu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the TES stitching function merely stich?

    Publication Year: 1998, Page(s):117 - 123
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    TES (transform-expand-sample) is among the younger traffic modeling techniques. Its basic scheme consists of creating a randomly governed (background) sequence, smoothing it by a so-called stitching function and adapting it to a given marginal distribution. It is demonstrated that the stitching function in fact is much more powerful as its shape has crucial influence on the visual appearance of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel reification: a reflective model for distributed computation

    Publication Year: 1998, Page(s):32 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The paper presents a new reflective model, called Channel Reification, which can be used in distributed computations to overcome difficulties experienced by other models in the literature when monitoring communication among objects. The channel is an extension of the message reification model. A channel is a communication manager incarnating successive messages exchanges by two objects: its applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum-cost solutions for testing protocols with timers

    Publication Year: 1998, Page(s):346 - 354
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    A method to generate a minimum-cost test sequence for a protocol with timers is presented. The protocol timers limit the number of consecutive self-loops that can be realized in a given state. The solution presented is applicable to test sequences that use any state identification method such as UIO sequences, distinguishing sequences, and characterizing sequences. If valid and inopportune transit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance measurements of a small-scale VOD server based on the UNIX

    Publication Year: 1998, Page(s):200 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Recent progress in network technologies has made it possible to integrate digital video and audio into distributed computing environments. Among the various distributed multimedia applications, video-on-demand (VOD) services are the most typical application area. However, interest in large-scale VOD systems is gradually transferring to small and low-cost VOD systems because of the excess investmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of representative traces for performance evaluation of computer architectures

    Publication Year: 1998, Page(s):233 - 238
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1160 KB)

    Trace-driven simulation is common technique to accurately estimate the performance of computer systems. Accuracy of the estimated performance greatly depends on the traces as well as the system model itself. The trace based performance evaluation, however, suffers from the high cost of trace generation and execution. This has, provided the necessary impetus towards the development of accurate trac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research issues in mobile computing

    Publication Year: 1998, Page(s):209 - 215
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    We are on the verge of a new computing paradigm that is now widely known as “mobile” or “nomadic” computing. The communication capabilities of high performance portable computers is advancing at a rapid rate with the availability of powerful wireless communication interfaces. In this paper, we present research issues in mobile computing and survey approaches that address th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of distributed database application models using Java RMI

    Publication Year: 1998, Page(s):187 - 192
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (552 KB)

    Java RMITM (remote method invocation) technology provides programmers with clean abstractions and simplified semantics for implementing parallel distributed programs on networks of heterogenous computing machines. This technology is being applied to many classes of applications in both the scientific/technical and business domains. From a performance perspective, is Java RMI technology ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ATM admission control based on measurements and reservations

    Publication Year: 1998, Page(s):298 - 304
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (712 KB)

    We propose an innovative control architecture for ATM that allows users to reserve in advance complex connection patterns in the network. It offers control over the resources via schedules but alleviates the potential over-conservative nature of the resource allocation by coupling it with real-time measurement of actual use of the resources View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic algorithms for priority assignment in flow shops

    Publication Year: 1998, Page(s):15 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (880 KB)

    An end to end approach for scheduling hard real time periodic transactions in a multiprocessor or distributed system is considered. Each transaction consists of a chain of tasks, where each task is allocated to a processor based on its resource requirements. Assuming fixed priority scheduling on processors, the problem is to determine the priority of each task such that the end to end deadline for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of service guarantees at end-to-end transport protocols

    Publication Year: 1998, Page(s):321 - 327
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Emerging high-speed networks provide support for a wide range of applications with different traffic characteristics and quality of service (QoS) requirements. For example, real time applications require guaranteed services such as minimum bandwidth and bounded end-to-end delay. Network resources should be allocated in order to provide the guaranteed services required by applications. Networks emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delta service in a mobile file system client cache

    Publication Year: 1998, Page(s):222 - 228
    Cited by:  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB)

    This paper evaluates a delta service extension to a mobile file system cache developed in order to minimize the amount of data transferred over wireless communications links. Network bandwidth stands as one of the resource limitations impacting the design of mobile computer applications. At the mobile file system service level, caching provides resource conservation in distributed applications. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The counter-based congestion avoidance scheme for ABR traffic in ATM networks

    Publication Year: 1998, Page(s):284 - 290
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    Congestion control plays an important role in the effective and stable operation of ATM networks. Many congestion control schemes for ABR traffic in ATM networks have been developed. However, conventional feedback schemes are very sensitive to network parameter settings and perform poorly when measured by throughput or queue length metrics. To solve these problems, a counter-based congestion avoid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance optimisation evaluation of TCP/IP over wireless networks

    Publication Year: 1998, Page(s):395 - 401
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    The transmission control protocol (TCP) is a large extended transport protocol, mainly used in fixed networks. It works well in those networks in which the main cause of packet loss is congestion. Some mechanisms included in the TCP optimise their use in this kind of networks. Today, Internet users need access it over wireless links in order to get this service anywhere they are. However, the TCP ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.