By Topic

Proceedings 2000. International Workshop on Parallel Processing

21-24 Aug. 2000

Filter Results

Displaying Results 1 - 25 of 68
  • Proceedings of the 2000 International Workshops on Parallel Processing [front matter]

    Publication Year: 2000, Page(s):iii - xii
    Request permission for commercial reuse | PDF file iconPDF (377 KB)
    Freely Available from IEEE
  • Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (736 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):583 - 584
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • SND-MAC: an efficient media access control method for integrated services in high speed wireless networks

    Publication Year: 2000, Page(s):541 - 547
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    With the development of wireless communication technology a wide range of services such as voice, video, and data communication should be provided to users. To support integrated services, efficient medium access control (MAC) methods should be developed. In this paper a new MAC, reservation-scheme and contention-scheme combined, termed the Sequence Number based Dynamic MAC (SND-MAC), is proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interoperation of Mobile IPv6 and protocol independent multicast dense mode

    Publication Year: 2000, Page(s):531 - 539
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB)

    We discuss different approaches of providing multicast traffic for mobile hosts. Mobile IPvd is used for mobility support. The network employs protocol independent multicast dense mode (PIM-DM) for multicast routing and multicast listener discovery (MLD) to collect multicast group membership information. We identify and analyze interoperation problems concerning membership control for mobile hosts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timeliness of service discovery in DEAPspace

    Publication Year: 2000, Page(s):73 - 80
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    A new algorithm is presented, through which a computing device can detect the presence of neighbouring devices, share configuration and service information with those devices, and also notice when devices become unavailable. Targeted for wireless ad-hoc, single-hop networks, this solution reduces the number of transmissions required from individual devices. The effectiveness of this algorithm is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analytical modeling of handoff for integrated voice/data wireless networks with priority reservation and preemptive priority procedures

    Publication Year: 2000, Page(s):523 - 529
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (548 KB)

    We propose an analytical modeling for integrated voice/data wireless networks with priority reservation and preemptive priority procedures. In our scheme, calls are separated into three different classes: originating calls (including originating voice and data calls), voice handoff and data handoff request calls. In the proposed scheme, there is a queue for data handoff request calls. Some channel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Web latency with hierarchical cache-based prefetching

    Publication Year: 2000, Page(s):103 - 108
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Proxy caches have become a central mechanism for reducing the latency of Web document retrieval. While caching alone reduces latency for previously requested documents, Web document prefetching could mask latency for previously unseen, but correctly predicted requests. We describe a prefetching algorithm suitable for use in a network of hierarchical Web caches; this algorithm observes requests to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A conceptual model for pervasive computing

    Publication Year: 2000, Page(s):9 - 15
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    As an emerging field, pervasive computing has not had the opportunity to develop a conceptual model similar to the OSI Reference Model that is used to describe computer networks. Such a model would be useful in properly classifying design issues and providing needed context. Inspired by the layers of abstraction provided by the OSI Reference Model, we present our Layered Pervasive Computing (LPC) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ambient computational environments

    Publication Year: 2000, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The cost of computational resources is expected to continue to decrease. This allows us to consider embedding these resources in our environment for use as needed. Ambient computational environments (ACEs) represent a computer architecture in which computational resources, sensors and actuators, in their widest sense, are available in our offices, conference rooms, hallways and other places. Users... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A component based architecture for mobile information access

    Publication Year: 2000, Page(s):65 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    Implicit in today's mobile information access scenarios is the assumption that the information required by the mobile host is readily available on the network and that its location is “known” in a static fashion. There is a significant ongoing research on ways to overcome the problems (such as low-bandwidth or mobile networks) existing in delivering available information to mobile syst... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load balancing study in PCS wireless networks

    Publication Year: 2000, Page(s):513 - 520
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Wireless networking technologies and mobile cellular communication systems are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Higher reliability, better coverage and services, higher capacity, mobility management, and wireless multimedia are all parts of the potpourri. The evolution of new systems and improved designs will always depend on the ability to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel computation of configuration space on reconfigurable mesh with faults

    Publication Year: 2000, Page(s):259 - 266
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    A reconfigurable mesh (RMESH) can be used to compute robotic paths in the presence of obstacles, where the robot and obstacle images are represented and processed in mesh processors. For a non-point-like robot, we can compute the so-called “configuration space” to expand the obstacles, so that the robot can be reduced to a reference point to facilitate the robot's motion planning. In t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network

    Publication Year: 2000, Page(s):479 - 483
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Virtual private networks (VPNs) enable companies to connect geographically dispersed offices and remote workers via secure links to the private company network, using the public Internet as a backbone. Specially, VPN service in the broadband data communication network is very important and necessary to take in users who want to specify group communication. VPN mechanisms are needed which work over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active streaming in transport delay minimization

    Publication Year: 2000, Page(s):95 - 102
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    In this paper we present a technique for reducing response delay for Web systems, which is based on a proactive cache scheme. It combines predictive pre-fetching and streaming to overlap the read-time with loading time. This graph-based model analyzes the hyperlink structure to form the prediction. It also utilizes data streaming to further minimize the pre-load, without compromising the responsiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing and evaluating an efficient dynamic load-balancer for distributed molecular dynamics simulation

    Publication Year: 2000, Page(s):277 - 283
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Introduces and evaluates a new efficient dynamic load-balancing scheme for parallel molecular dynamics simulation on distributed memory machines. It decomposes a spatial domain of particles into disjoint parts, each of which corresponds with a processor and dynamically changes its shape to keep almost the same number of particles throughout simulation. In contrast to other similar schemes, ours re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient image fusion

    Publication Year: 2000, Page(s):291 - 296
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. This concept uses replication to achieve fault tolerance, but goes further to dynamically regenerate replication in response to an attack or failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling the runtime of scientific programs on parallel computers

    Publication Year: 2000, Page(s):307 - 314
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Message passing programs for parallel machines with a distributed address space using communication operations of portable communication libraries such as PVM and MPI guarantee portability for most of the parallel machines available. But due to specific implementations of the runtime libraries on each specific platforms, the same program may have different runtimes on different machines, i.e., the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS-ensured transmission scheme with content-based priority for mobile cluster users

    Publication Year: 2000, Page(s):567 - 574
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Due to the increasing number of mobile hosts and hand sets, communications between mobile users becomes popular and important. Using a mobile cluster network we could realize cooperation and resource sharing among mobile users. We propose a QoS-ensured transmission scheme with content-based priority for mobile cluster users. In our scheme some mobile hosts form a mobile cluster network, which is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flits: pervasive computing for processor and memory constrained systems

    Publication Year: 2000, Page(s):31 - 38
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Many pervasive computing software technologies are targeted for 32-bit desktop platforms. However, there are innumerable 8-, 16- and 32-bit microcontroller- and microprocessor-based embedded systems that do not support the resource requirements of these technologies. We describe ongoing research that explores the feasibility of creating a portable runtime environment that is capable of executing a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient remote data access in a mobile computing environment

    Publication Year: 2000, Page(s):57 - 64
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    Considers the problem of remote data access for multiple clients in mobile computing environments. In this environment, a base station provides a wireless communication link between the mobile clients and remote servers that reside on a fixed network. Clients send requests to the base station for objects which reside on the remote servers. The base station downloads these objects from the remote s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel computing aided design of earthing systems for electrical substations in non-homogeneous soil models

    Publication Year: 2000, Page(s):381 - 388
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Accurate design of grounding systems is essential to assure the safety of people, protect the equipment and avoid interruptions in the power supply. In order to attain these targets, the equivalent electrical resistance of the system and the potential distribution on the earth surface in fault conditions need to be computed. The authors present a numerical approach for grounding analysis embedded ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cell ID assignment scheme and its applications

    Publication Year: 2000, Page(s):507 - 512
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Location management is one of the most important issues in the design of future cellular systems. It consists of two basic operations: location update and paging. The paging operation is dependent on the corresponding location update operation. The time based, movement based, and distance based location update schemes are three of the most popular dynamic location update schemes. It has been shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heterogeneous parallelization of the Linkmap program

    Publication Year: 2000, Page(s):353 - 360
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Sequential genetic algorithms have many successful applications in very different domains, but they have a main drawback in their utilization. Evaluations are very time-consuming, e.g., a pedigree consisting of fifty-five nodes takes about seventy minutes on a DEC-Alpha processor and about two hundred and seventy minutes on a 166 MHz Pentium for certain likelihood calculations. This time increases... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel checkpoint/restart without message logging

    Publication Year: 2000, Page(s):253 - 258
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    We describe a parallel checkpoint/restart mechanism. The checkpoint is performed among the participating parallel tasks using a new algorithm that we call “Stop and Discard”. Tasks may be checkpointed without waiting for previously sent messages to be received. Specific message logging is not required. Message data that may be in transit is saved in the checkpoint files View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.