By Topic

Proceedings 2000. International Workshop on Parallel Processing

21-24 Aug. 2000

Filter Results

Displaying Results 1 - 25 of 68
  • Proceedings of the 2000 International Workshops on Parallel Processing [front matter]

    Publication Year: 2000, Page(s):iii - xii
    Request permission for commercial reuse | PDF file iconPDF (377 KB)
    Freely Available from IEEE
  • Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (736 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):583 - 584
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Load balancing study in PCS wireless networks

    Publication Year: 2000, Page(s):513 - 520
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Wireless networking technologies and mobile cellular communication systems are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Higher reliability, better coverage and services, higher capacity, mobility management, and wireless multimedia are all parts of the potpourri. The evolution of new systems and improved designs will always depend on the ability to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A cell ID assignment scheme and its applications

    Publication Year: 2000, Page(s):507 - 512
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    Location management is one of the most important issues in the design of future cellular systems. It consists of two basic operations: location update and paging. The paging operation is dependent on the corresponding location update operation. The time based, movement based, and distance based location update schemes are three of the most popular dynamic location update schemes. It has been shown... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing and evaluating an efficient dynamic load-balancer for distributed molecular dynamics simulation

    Publication Year: 2000, Page(s):277 - 283
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Introduces and evaluates a new efficient dynamic load-balancing scheme for parallel molecular dynamics simulation on distributed memory machines. It decomposes a spatial domain of particles into disjoint parts, each of which corresponds with a processor and dynamically changes its shape to keep almost the same number of particles throughout simulation. In contrast to other similar schemes, ours re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A practical realization of parallel disks

    Publication Year: 2000, Page(s):337 - 344
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    Several models of parallel disks are found in the literature. These models have been proposed to alleviate the I/O bottleneck arising in handling voluminous data. These models have the general theme of assuming multiple disks. For instance the parallel disk systems (PDS) model assumes D disks and a single computer. It is also assumed that a block of data from each of the D disks can be fetched int... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance evaluation of list scheduling heuristics for task graphs without communication costs

    Publication Year: 2000, Page(s):421 - 428
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    Proposes three new static scheduling algorithms for allocating task graphs without communication costs to fully connected multiprocessors. The proposed algorithms, called MCP/ABS, MCP/CLR and MCP/CLRR, are based on the well-known MCP (modified critical path) algorithm, and all of them have the same complexity of O(v2log v), where v is the number of nodes in the task graph. A global comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient RPC scheme in mobile CORBA environment

    Publication Year: 2000, Page(s):575 - 582
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    CORBA RPC calling in the current mobile environment is suffering from poor performance and insufficient support of disconnection. This greatly degrades the reliability of services and upsets user's expectation. To improve the reliability and performance and provide adequate support to involuntary disconnection of mobile clients, RPC Proxy is introduced in this paper. The impact of handoff and disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight version vectors for pervasive computing devices

    Publication Year: 2000, Page(s):43 - 48
    Cited by:  Papers (3)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    Traditional version vectors can be used to optimize peer-to-peer synchronization for pervasive computing devices. However, their storage overhead may be a prohibitive factor in scalability in an environment with a typically low communication bandwidth and a relatively small storage memory. We present a dynamic version vector design that allows small data sizes for version vector items. We call it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A service interworking unit for accommodating multimedia communications with quality of service between ATM and Internet

    Publication Year: 2000, Page(s):493 - 497
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Much has been written about the potential of quality of service (QoS) and the Internet. The integration of voice, data and video services modified the target of networking technologies. Networks must have some capabilities for integration of various services and also for QoS support as required by each of those services. The EAGIS (Efficient ATM Gateway for real time Internet Service) consists of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel computing aided design of earthing systems for electrical substations in non-homogeneous soil models

    Publication Year: 2000, Page(s):381 - 388
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Accurate design of grounding systems is essential to assure the safety of people, protect the equipment and avoid interruptions in the power supply. In order to attain these targets, the equivalent electrical resistance of the system and the potential distribution on the earth surface in fault conditions need to be computed. The authors present a numerical approach for grounding analysis embedded ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable stock Web service

    Publication Year: 2000, Page(s):145 - 150
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    We built an Internet stock service and focused on its scaling characteristics. This service allows a person to request email notification when a specified stock reaches a price. For example, one could request to be emailed when IBM reaches or exceeds $150. We decided to leverage the capabilities of an underlying publication/subscription (pub/sub) system which has a JMS interface. We explored ways ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant adaptive and shortest routing in 2-D extended meshes using faulty-block-information

    Publication Year: 2000, Page(s):267 - 274
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    In this paper, I first discuss the adaptive minimal routing algorithm in 2D extended meshes without faulty blocks. Then, a sufficient condition for the existence of a minimal path from the source to the destination is presented. After that, I propose the shortest fault-tolerant routing algorithm with one faulty block, with the guidance of faulty block information, and I extend the algorithm with o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exact location identification in a mobile computing network

    Publication Year: 2000, Page(s):551 - 558
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    In a mobile communication environment, whenever there is a call request, the network must know where the intended recipient of the call is currently located. This gives rise to the problem of location management. Different location management schemes for mobile networks have been proposed so far, but whatever be the scheme, it can only identify a location area comprised of a number of cells, or at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor Information Networking Architecture

    Publication Year: 2000, Page(s):23 - 30
    Cited by:  Papers (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The advent of technology has facilitated the development of networked systems of extremely small, low-power devices that combine programmable general-purpose computing with multiple sensing and wireless communication capability. This networked system of programmable sensor nodes, which together form a sensor network, poses unique challenges on how information collected by, and stored within, the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective file migration algorithm in cluster file systems

    Publication Year: 2000, Page(s):329 - 335
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    I/O balancing is an attractive problem in distributed systems. With the fast growth of high-speed network technology, file migration is becoming an effective way to solve the problem. We present an effective file migration algorithm in our cluster file system - TH-CluFS. Our algorithm moves files from congested nodes to relatively uncongested nodes according to the information of current system st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balancing Web server load for adaptable video distribution

    Publication Year: 2000, Page(s):469 - 476
    Cited by:  Papers (2)  |  Patents (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    As Web infrastructures continue to develop, the need to have network-sensitive Web servers will continue become more important. In particular, current network routers do not bias against flows that use more than their fair share of bandwidth. In the future, however, this will not be true, requiring the Web servers to be network-sensitive. In this paper, we investigate techniques for balancing Web ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a communication optimization model in network-based parallel computing

    Publication Year: 2000, Page(s):411 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Network based distributed computing has been gaining popularity over the past decade. Many parallel programming languages and related parallel programming modes are becoming widely accepted. However, the execution of parallel applications on distributed systems has been hampered by the high communication overhead. To reduce the communication overhead and the completion time of a parallel applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient image fusion

    Publication Year: 2000, Page(s):291 - 296
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. This concept uses replication to achieve fault tolerance, but goes further to dynamically regenerate replication in response to an attack or failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient remote data access in a mobile computing environment

    Publication Year: 2000, Page(s):57 - 64
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    Considers the problem of remote data access for multiple clients in mobile computing environments. In this environment, a base station provides a wireless communication link between the mobile clients and remote servers that reside on a fixed network. Clients send requests to the base station for objects which reside on the remote servers. The base station downloads these objects from the remote s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A QoS-ensured transmission scheme with content-based priority for mobile cluster users

    Publication Year: 2000, Page(s):567 - 574
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Due to the increasing number of mobile hosts and hand sets, communications between mobile users becomes popular and important. Using a mobile cluster network we could realize cooperation and resource sharing among mobile users. We propose a QoS-ensured transmission scheme with content-based priority for mobile cluster users. In our scheme some mobile hosts form a mobile cluster network, which is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ambient computational environments

    Publication Year: 2000, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    The cost of computational resources is expected to continue to decrease. This allows us to consider embedding these resources in our environment for use as needed. Ambient computational environments (ACEs) represent a computer architecture in which computational resources, sensors and actuators, in their widest sense, are available in our offices, conference rooms, hallways and other places. Users... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of traffic shaping in ATM networks on video quality

    Publication Year: 2000, Page(s):485 - 492
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Presents the impact of traffic shaping on enhancing interactive video quality over ATM networks. The effects of the leaky-bucket traffic shaper on the video quality is studied under different token buffer rates and token buffer sizes, and the tradeoffs involved are discussed. An enhanced traffic shaper using the early-drop mechanism is then introduced. Simulation results show that, for delay-sensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timeliness of service discovery in DEAPspace

    Publication Year: 2000, Page(s):73 - 80
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    A new algorithm is presented, through which a computing device can detect the presence of neighbouring devices, share configuration and service information with those devices, and also notice when devices become unavailable. Targeted for wireless ad-hoc, single-hop networks, this solution reduces the number of transmissions required from individual devices. The effectiveness of this algorithm is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.