By Topic

2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing

6-8 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 175
  • [Front cover]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (459 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • General chairs

    Publication Year: 2012, Page(s):iv - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (2104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):xxxv - xli
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2012, Page(s):xlii - lii
    Request permission for commercial reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • An energy efficient scheduling scheme for Intrusion Detection System in Mobile Ad-hoc Networks

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (952 KB) | HTML iconHTML

    MANET is a self-configuring network of mobile nodes connected by wireless links and driven by battery power. Security and Energy are the two prime concerns in Mobile Ad hoc Networks (MANET). Intrusion Detection System (IDS) is one of the ways to provide security in MANET. Due to energy crisis, it is not possible to run an IDS throughout the life-time of MANET. Therefore IDS should be run in time s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing the low cost patient monitoring device (LCPMD) & Ubiquitous based Remote Health Monitoring and Health Management System using Tablet PC

    Publication Year: 2012, Page(s):7 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1226 KB) | HTML iconHTML

    At the current point of time, health is the important concern for all the peoples all over the world. So, it is very important aspect that how to deal with the diseases effectively and efficiently. In this paper, we provide a system that is effective in remote monitoring of the patient and full management of the medical resources like assigning duties to the doctors, nurses etc. Our aim is to desi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BFT-r: A proactive Byzantine Fault-Tolerant agreement with rotating coordinator and mutable blacklist mechanism

    Publication Year: 2012, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    With the advent of replication-based approach for a distributed environment, a major coordination problem i.e., Consensus can be solved in the presence of some malicious replicas. Therefore, we attempt to design an agreement algorithm with proactive detection of such malicious replicas. The paper presents an algorithm BFT-r i.e., Byzantine Fault Tolerance with rotating coordinator. The basic idea ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cost optimized K-fault tolerant channel assignment in wireless network

    Publication Year: 2012, Page(s):18 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    The paper addresses the problem of disruption of services of any wireless network due to failure of a radio channel. This can be achieved by providing more than one disjoint route between any pair of node. Though higher redundancy ensures better reliability of the network but it also increases the network cost. In this paper, we propose a technique to design a cost optimal wireless network layout ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-Cloud: The Cloud of Clouds

    Publication Year: 2012, Page(s):22 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    Advances in e-Government oriented technologies and services are taking place with a considerable speed around the world. Recent attention has shifted away from traditional e-Government to a new initiative Cloud Government (C-Government). Cloud is the fusion of Virtualization, Grid computing, Utility computing and Web technologies resulting to a new IT service delivery mechanism that inherits the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel algorithms for load balancing using hybrid approach in distributed systems

    Publication Year: 2012, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (646 KB) | HTML iconHTML

    With ever increasing network traffic, dynamic load balancing can achieve improved performance in a typical distributed system to cope with the fluctuating workload. The hybrid dynamic load balancing algorithm stays away from the drawbacks of centralized and decentralized load balancing approaches. In this paper, first we address the two imperative design issues that are crucial to the hybrid algor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Competent routing protocol in Wireless Sensor Networks

    Publication Year: 2012, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1248 KB) | HTML iconHTML

    Wireless Sensor Networks (WSN) consist of spatially distributed sensor to monitor physical or environmental conditions and cooperatively pass their data to a central location. Such networks become importance due to its potential to transform many segments of our life from ecological monitoring and maintenance to computerization in traffic surveillance and healthcare commerce. The design, implement... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A weighted approach for MPR selection in OLSR protocol

    Publication Year: 2012, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB) | HTML iconHTML

    Next generation of mobile communications will include combination of both infrastructure based network and infrastructure less. These types of networks are termed as hybrid wireless networks. Hybrid wireless network have emerged as a promising solution for bandwidth intensive services. These networks offer the advantage of spectrum reusability due to multi-hop relaying. However routing is a major ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role of G-Cloud in citizen centric governance

    Publication Year: 2012, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    ICT plays a big role in the accountability and transparency in the functioning of Government machinery. Socio-economic developmental and behavioral decisions of a country now a days rests on the accessability, and utilization of information and knowledge. ICT is the conduit that transmits information to individual to widen their choices for economic and social empowerment. This paper is a study on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WINGS: A weighted incentives based algorithm for allocation of research grant - Equitability and meritocracy tradeoff

    Publication Year: 2012, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1790 KB) | HTML iconHTML

    Devising a scheme for allocation of research grant is a challenging task. In this paper, we discuss how one can compute the research grant to be allocated to either a faculty member or a research student. Our scheme makes weighted incentives to compute the meritocratic portion of the research grant. The weights are computed using the number of earned points of a contender which are based on the im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploration of automatic optimization for CUDA programming

    Publication Year: 2012, Page(s):55 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    Graphic processing Units (GPUs) are gaining ground in high-performance computing. CUDA (an extension to C) is most widely used parallel programming framework for general purpose GPU computations. However, the task of writing optimized CUDA program is complex even for experts. We present a method for restructuring loops into an optimized CUDA kernels based on a 3-step algorithm which are loop tilin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource pricing strategy in wireless grid using non-cooperative bargaining game

    Publication Year: 2012, Page(s):61 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1042 KB) | HTML iconHTML

    The consumers in a wireless grid will prefer reliable and cost optimal resources for job execution, while the grid service providers prefer efficient utilization of their resources. Hence brokering of resources that meet the requirements of consumers and providers is a challenging task in presence of unstable (wireless) network connections, market dynamics and rational users. This paper models a r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using host criticalities for fault tolerance in mobile agent systems

    Publication Year: 2012, Page(s):67 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1016 KB) | HTML iconHTML

    Monitoring is a crucial factor for smooth run of distributed systems such as mobile agent based system. Various activities in such systems require monitoring such as performance analysis and tuning, scheduling strategies and fault detection. In this paper we present monitoring and fault tolerance technique for mobile agent based systems. We present mobile agent based fault prevention and detection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics improvement of MANET using reactive protocols approach

    Publication Year: 2012, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1498 KB) | HTML iconHTML

    Mobile ad hoc networks (MANETs) are a collection of wireless nodes that dynamically create a wireless network among themselves without any infrastructure. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. The objective of this paper is to evaluate the simulation of MANET reactive routing protocols that are Ad Hoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task scheduling with Load balancing for computational grid using NSGA II with fuzzy mutation

    Publication Year: 2012, Page(s):79 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1480 KB) | HTML iconHTML

    The resources management in a grid computing is a complicated problem. Scheduling algorithms play important role in the parallel distributed computing systems for scheduling jobs, and dispatching them to appropriate resources. An efficient task scheduling algorithm is needed to reduce the total Time and Cost for job execution and improve the Load balancing between resources in the grid. In grid co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of process distribution in HPC cluster using HPL

    Publication Year: 2012, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (626 KB) | HTML iconHTML

    Computing using parallel programming techniques running on High Performance Computing Clusters (HPCC) has become very popular for scientific applications. Evaluation of cluster performance is carried out in many different ways. Memory, interconnect bandwidth, number of cores per processor/ node and job complexity are the major parameters which affect and govern the peak computing power delivered b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimized Elliptic Curve Cryptography for wireless sensor networks

    Publication Year: 2012, Page(s):89 - 94
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (322 KB) | HTML iconHTML

    Recent technical advances have made it possible to develop such devices, which are small in size, cheap and capable of wireless communication using radio interfaces and provide pervasive services to the user. Sensor networks are the extreme examples of such ubiquous and pervasive computer paradigm. The constraints imposed on the wireless sensor networks make it more prone to cost of computation. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Lagrangean Clustering Protocol

    Publication Year: 2012, Page(s):95 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    A Wireless Sensor Network is a distributed network of sensor nodes deployed in order to monitor physical or environmental conditions. One of the major challenges in the deployment of wireless sensor networks is the efficient usage of the sensor nodes' limited energy. In this paper we propose a novel clustering protocol for homogeneous wireless sensor networks. The clustering protocol, Adaptive Lag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient parallel searching algorithm on Hypercube Interconnection network

    Publication Year: 2012, Page(s):101 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1678 KB) | HTML iconHTML

    In the information age, the huge amount of data and information are exchanged which requires fast and efficient searching mechanisms for effective use of this information. There are various sequential searching algorithms to search an element in an unsorted array or sorted array of elements. A number of researchers have explored methods for improving the efficiency and speedup of search using para... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.