By Topic

Parallel Processing Workshops (ICPPW), 2011 40th International Conference on

Date 13-16 Sept. 2011

Filter Results

Displaying Results 1 - 25 of 70
  • [Front cover]

    Publication Year: 2011 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (147 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (28 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (133 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (168 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011 , Page(s): v - x
    Save to Project icon | Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • 2011 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011) Organizing Committee

    Publication Year: 2011 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (123 KB)  
    Freely Available from IEEE
  • Third International Workshop on Security in Cloud Computing (CloudSec 2011) Organizing Committee

    Publication Year: 2011 , Page(s): xii - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (135 KB)  
    Freely Available from IEEE
  • 2011 International Workshop on Embedded Multicore Systems (EMS 2011) Organizing Committee

    Publication Year: 2011 , Page(s): xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (128 KB)  
    Freely Available from IEEE
  • Fourth International Workshop on Parallel Programming Models and Systems Software for High-End Computing (P2S2 2011) Organizing Committee

    Publication Year: 2011 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (129 KB)  
    Freely Available from IEEE
  • Seventh International Workshop on Scheduling and Resource Management for Parallel and Distributed Systems (SRMPDS 2011) Organizing Committee

    Publication Year: 2011 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Second International Workshop on Parallel Software Tools and Tool Infrastructures (PSTI 2011) Organizing Committee

    Publication Year: 2011 , Page(s): xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (129 KB)  
    Freely Available from IEEE
  • A Controller-Assisted Distributed (CAD) Load Balancing Scheme for ZigBee Networks

    Publication Year: 2011 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (398 KB) |  | HTML iconHTML  

    In this paper, we propose a controller-assisted distributed (CAD) load-balancing mechanism for the ZigBee network containing multiple personal area networks (PANs). Shifting the enforcement part from the central controller to PANs, each PAN in CAD maintains its load status whereas the central controller simply maintains node numbers of PANs and a list of switch pairs which each is formed from two ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Response Query Tree Splitting for RFID Tag Anti-collision

    Publication Year: 2011 , Page(s): 6 - 15
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (648 KB) |  | HTML iconHTML  

    In an RFID system, a tag can be identified by a reader when it moves into the interrogation zone of the reader. Collisions occur when tags using backscatter technology respond their IDs to the reader at the same carrier frequency simultaneously. The performance of tag identification is degraded by collisions, so it is important to reduce them. Several anti-collision protocols have been proposed fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End to End Security and Path Security in Network Mobility

    Publication Year: 2011 , Page(s): 16 - 21
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1155 KB) |  | HTML iconHTML  

    At RFC 3776, IP security protocol (IPsec) has been implemented in mobile IP for securing IP datagram at IP layer. Previous research only considered the traffic between mobile node (MN) and home agent (HA), but the traffic from HA to correspondent node (CN) was not considered. Network Mobility (NEMO) is based on Mobile IPv6 (MIPv6), so it inherits the same problem of only providing protection betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectivity Modeling of Vehicular Ad Hoc Networks in Signalized City Roads

    Publication Year: 2011 , Page(s): 22 - 26
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (588 KB) |  | HTML iconHTML  

    Connectivity in vehicular ad hoc networks (VANETs) exhibits stronger challenges than that in other general ad hoc networks. In this paper inter vehicular connectivity is analyzed among different length of vehicles that are running along the city roads. Considering the traffic signals, connectivity among the vehicles waiting at different intersections is analyzed taking the safe distance into accou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-Synchronized versus Self-Organized K-Coverage Configuration in WSNs

    Publication Year: 2011 , Page(s): 27 - 32
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    The K-coverage configuration is widely exploited to monitor critical applications in wireless sensor networks. A major challenge here is how to maximize the system lifetime while preserving high-quality coverage. The existing sleep scheduling algorithms, classified into time-synchronized and self-organized approaches, either generate many redundant active sensors or incur high computation cost. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Accurate GPS-Based Localization in Wireless Sensor Networks: A GM-WLS Method

    Publication Year: 2011 , Page(s): 33 - 41
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1740 KB) |  | HTML iconHTML  

    For wireless sensor networks, localization is crucial due to the dynamic nature of deployment. In absolute localization, a few nodes (called beacon nodes or anchors) need to know their absolute positions, and all the other nodes are absolutely localized in the coordinate system of the beacon nodes. Most of GPS-based localizations belong to absolute localization, and localization systems enable nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sliding-Typed Communication Range Recognition Method for Indoor Position Estimation in Passive RFID Systems

    Publication Year: 2011 , Page(s): 42 - 49
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    RFID (Radio Frequency Identification) systems have become meaningful as a new identification source that is applicable in ubiquitous environments. Each RFID tag has a unique ID, and is attached to an object. A user reads the unique ID of an RFID tag with RFID readers and obtains the information of the object. One of the most important technologies that use the RFID system is the position estimatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Barrier Coverage Constructions for Border Security Systems Using Wireless Sensors

    Publication Year: 2011 , Page(s): 50 - 56
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1187 KB) |  | HTML iconHTML  

    In this paper, we propose network construction methods of sensor nodes for Border Security Systems. A Border Security System watches intruders by using sensor nodes with communication function. The detection of some intruders and the use of a long-term operation system are required in this system. In this paper, we propose two methods to reduce the power consumption of the whole network system by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Multipath Planning for Neyman-Pearson Detection in Wireless Sensor Networks

    Publication Year: 2011 , Page(s): 57 - 62
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (373 KB) |  | HTML iconHTML  

    Target detection is one of the most important services in wireless sensor networks (WSNs) for making decisions about the presence of specified targets by collecting sensed data from geographically distributed wireless sensors nodes. In this paper, we consider designing target detection systems in WSNs on the basis of the Neyman-Pearson Detector (NPD), a statistical decision making method of which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AR-Based Positioning for Mobile Devices

    Publication Year: 2011 , Page(s): 63 - 70
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (362 KB) |  | HTML iconHTML  

    Augmented Reality (AR) that can be considered as a form of location-based services is a technique utilizing position and orientation information and a location database of POIs to enrich video or photographs by adding on graphics or text objects. The AR technique can be used to develop Pedestrian Navigation Systems (PNSs), but high-precision positioning is needed for displaying AR objects at prope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • iMace: Protecting Females from Sexual and Violent Offenders in a Community via Smartphones

    Publication Year: 2011 , Page(s): 71 - 74
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (773 KB) |  | HTML iconHTML  

    Personal safety in a community is an important issue. In particular, females and children are more vulnerable to violent and/or sexual attacks. In this project, we utilize smart phones and wireless networking techniques to provide a rescue-seeking mechanism for people under attack. When a user encounters an assault, by simply shaking the smart phone, iMace will not only produce high-pitch alarms t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Spatial Reuse to Transmission Power Control for CSMA/CA Based Wireless Ad Hoc Networks

    Publication Year: 2011 , Page(s): 75 - 80
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (392 KB) |  | HTML iconHTML  

    In this paper, we introduce the concept of ceased areas for enhancing the spatial reuse in CSMA/CA based wireless ad hoc networks. Intuitively, a ceased area is created by a transmitter-receiver pair where all other nodes are required to keep silent. The size of a ceased area depends on the transmission power and the transmitter-receiver distance. A new transmission power control (TPC) scheme that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Runtime Partitioning Technique for Mobile Web Services

    Publication Year: 2011 , Page(s): 81 - 90
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (433 KB) |  | HTML iconHTML  

    Web service (WS) technology has established itself as a key component of enterprise computing for a number of business processes. The mobile devices are expected to become primary internet devices in the near future. The popularity of mobile devices and establishment of WS technology has increased the demand of accessing and hosting web services on mobile devices. Hosting web services on such devi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing and Buffering Strategies in Delay-Tolerant Networks: Survey and Evaluation

    Publication Year: 2011 , Page(s): 91 - 100
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1280 KB) |  | HTML iconHTML  

    Delay Tolerant Networks (DTNs) have attracted considerable attention in recent years. This kind of network works in communication environments subject to delays and disruptions. Traditional end-to-end routing fails in DTNs due to intermittent connections. A variety of routing strategies for DTNs have been proposed in the past. In this paper, we present a survey of these strategies and provide a cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.