By Topic

2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)

27-30 Dec. 2011

Filter Results

Displaying Results 1 - 25 of 66
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (232 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (735 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • Session list

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):1 - 7
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Brief author index

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • Detailed author index

    Publication Year: 2011, Page(s):1 - 31
    Request permission for commercial reuse | PDF file iconPDF (93 KB)
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • [PDF Reader FAQ and support]

    Publication Year: 2011, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (460 KB)
    Freely Available from IEEE
  • Message from the AICCSA2011 general chairs

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (133 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the AICCSA2011 program chairs

    Publication Year: 2011, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (182 KB) | HTML iconHTML
    Freely Available from IEEE
  • AICCSA 2011 Conference Committees

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Keynote talk by Dr. Albert Zomaya: Environmentally sustainable large scale distributed systems

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (42 KB)

    Summary form only given. Half perimeter wire length estimation is commonly used to guide placers in positioning cells. In this paper, the shortcomings of HPWL and other post placement wire length estimation methods are presented first. It is shown that these estimations are even more inaccurate when congestion exists. Techniques to improve the accuracy of estimation are proposed. In addition, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk by Dr. Jean-Luc Gaudiot: Fighting Amdahl's law in many-core and GPU parallel architectures with value prediction

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB)

    Summary form only given. The next grail sought by HPC community is the exascale, 100 times the current scale. This target will not be reached easily as many challenges are uprising. The first challenge, the Energy consumption, has become a strict constraint now with a limit set to 20MW (twice as the current top supercomputers). Multiplying the computing elements will imply to drastically reduce th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk by Dr. Frederica Darema: New frontiers through information technologies

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (46 KB)

    Summary form only given. Today, software is being developed and maintained not just by engineers educated formally but also by people from widely different backgrounds including children, knowledge workers among many others. However, a number of studies indicate that most of these people are not equipped with enough software engineering skills leading to low-quality software. On the other hand, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AICCSA 2011 program schedule

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Economic grid fault tolerance scheduling using modified Genetic Algorithm

    Publication Year: 2011, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Computational grids allow the sharing of geographically distributed resources in an efficient way, extending the boundaries of what we perceive as distributed computing. It is a fact that the computational grid nodes are not 100% secure from failure. Here comes a problem on how to handle failing nodes and effectively schedule and distribute the required work on the participating nodes and, in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application-centric Cloud management

    Publication Year: 2011, Page(s):9 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    In recent years most of the cloud computing community adopt an infrastructure centric approach to optimize the cost of cloud resources considering both Cloud Computing Service Users(CCSU) and Cloud Computing Service Providers(CCSP). In this paper we have brought up the concept of Application-centric Cloud. With Application-centric Cloud we propose an architecture to provide a generalized framework... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of parallel programming models and CPUs clock frequency on energy consumption of HPC systems

    Publication Year: 2011, Page(s):16 - 21
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Energy consumption has become one of the greatest challenges in the field of high performance computing (HPC). The energy cost produced by supercomputers during the lifetime of the installation is similar to acquisition. Thus, besides its impact on the environment, energy is a limiting factor for the HPC. Our research aims to reduce the energy consumption of computer systems to run parallel HPC ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastically robust static resource allocation for energy minimization with a makespan constraint in a heterogeneous computing environment

    Publication Year: 2011, Page(s):22 - 31
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    In a heterogeneous environment, uncertainty in system parameters may cause performance features to degrade considerably. It then becomes necessary to design a system that is robust. Robustness can be defined as the degree to which a system can function in the presence of inputs different from those assumed. In this research, we focus on the design of robust static resource allocation heuristics su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reliable peer-to-peer protocol for mobile Ad-Hoc wireless networks

    Publication Year: 2011, Page(s):32 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Reliable, fast, and power aware communication is needed for Ad-Hoc wireless networks. Current techniques based on client-server and Publish/Subscribe communication models are not suitable in multi-robot systems and generally for mobile applications. For this we propose a reliable peer-to-peer protocol based on a UDP Broadcast and Token Passing (UBTP). The protocol is implemented on a WLAN using th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks

    Publication Year: 2011, Page(s):38 - 45
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (562 KB) | HTML iconHTML

    Wireless Sensor Networks (WSNs) are vulnerable to attacks due to their limited software and hardware capabilities. Energy efficient link layer jamming attacks have proven to be a real threat to wireless sensor networks. This type of attacks is able to prevent network communication for relatively long periods as it does not spend a lot of power while jamming. This paper proposes and evaluates two m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable distributed data fusion scheme in unsafe sensor networks

    Publication Year: 2011, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    In this paper, we deal with the problem of distributed data fusion in unsafe large-scale sensor networks. Data fusion application is the phase of processing the collected data by sensor nodes before sending it the end user. During this phase, resource failures are more likely to occur and can have an adverse effect on the application. To achieve/ensure the convergence of node states to the average... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MSR: A multipath secure reliable routing protocol for WSNs

    Publication Year: 2011, Page(s):54 - 59
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Many routing protocols have been proposed for wireless sensor networks (WSNs). However, only few of them addressed secure routing. This work contributes in solving secure and reliable routing problems by presenting a secure and reliable multipath routing protocol (MSR) for WSNs. MSR consists of three key components: on-demand multipath routing, enhanced passive acknowledgment, and erasure coding. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.