Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops

4-7 July 2000

Filter Results

Displaying Results 1 - 25 of 84
  • Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (457 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):561 - 563
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • A generalized approach for transferring data-types with arbitrary communication libraries

    Publication Year: 2000, Page(s):83 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    We present a generalized algorithm for implementing a communications library for dynamic data structures created with heterogeneous composed data types such as multiple C structs, and where the data-types may be nested and may contain pointers. This algorithm is divided into an absolute part that is the same for all instantiations, and a relative part that is specific to the communications mechani... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrent exception handling in a distributed object-oriented computing environment

    Publication Year: 2000, Page(s):75 - 82
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    In a distributed object-oriented computing environment many exceptions would occur because many objects run concurrently on several computers connected by a network. Therefore, exceptions in distributed applications will be more complex than those in ordinary (not distributed) applications. We introduce an exception handling framework into our distributed object-oriented computing environment (DOO... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault tolerant shared-object management system with dynamic replication control strategy

    Publication Year: 2000, Page(s):524 - 529
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    This paper is based on a dynamic replication control strategy for minimizing communications costs. In dynamic environments where the access pattern to share resources cannot be predicted statically, it is required to monitor such parameter during the whole lifetime of the system so as to adapt it to new requirements. The shared-object management system is implemented in a centralized manner in whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Access control model in object-oriented systems

    Publication Year: 2000, Page(s):69 - 74
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    The authors discuss a discretionary access control model to realize secure object-oriented systems. An object is manipulated only through methods supported by the object. Classes and objects are hierarchically structured in generalization (is-a) and aggregation (part-of) relations. We discuss how to authorize and inherit access rights on classes and objects in the hierarchical structure View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteeing multiple QoSs in differentiated services Internet

    Publication Year: 2000, Page(s):233 - 238
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    In this paper, we propose a new architecture for guaranteeing the multiple Quality of Services (QoSs) in Differentiated Service Internet. We take into account the IETF's Differentiated Service (DiffServ) architecture as well as the QoS requirements of each user application. The main focus lies in the modeling and performance evaluation of the prioritized packet service scheme in the core router wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic techniques: scheduling partially ordered tasks in a multi-processor environment with tabu search and genetic algorithms

    Publication Year: 2000, Page(s):515 - 523
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    Scheduling real-time computation is an extremely important activity in real-time systems, since it is the phase in which we assign the final temporal properties of the computations. The problem of allocating the resources in real-time systems creates an additional dimension within the conventional allocation problem, that of time constraints. The scheduling problem has been extensively examined in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Domination in bounded interval tolerance graphs

    Publication Year: 2000, Page(s):29 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    We present efficient algorithms for solving the domination set problem for the class of bounded tolerance graphs. The class of bounded tolerance graphs includes interval graphs and permutation graphs as sub-classes. Our solution to the domination set problem has improved bounds for time complexity compared to the algorithm for general co-comparability graphs which can also be used for bounded tole... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The performance comparison between TCP Reno and TCP Vegas

    Publication Year: 2000, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Following the development of TCP Vegas, the performance comparison between TCP Reno and TCP Vegas has not been discussed thoroughly. The discussion of the revised TCP version, TCP Vegas, remains insufficient to decide whether or not to use it. This paper attempts to compare the performance, throughput and fairness, of Reno and Vegas in the network environments with homogeneous and heterogeneous ve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Relational Petri nets with start/stop place

    Publication Year: 2000, Page(s):509 - 514
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    We have adapted Petri nets and functional dependencies amongst objects in parallel rule languages. After this adaptation, the yielded Petri net-we will call it Relational Petri Nets (RPNs) with Start/Stop Place-is analysed in this paper. Liveness, reversibility, no conservation and boundedness in practice, consistency, strongly connected of this kind of net have been specified in this work. The pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A memory management architecture for a mobile computing environment

    Publication Year: 2000, Page(s):23 - 28
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    In recent years, the rapid progress of hardware technology has enabled people to use mobile terminals away from the office or home with the use of cellular phones. However there are remaining issues such as the narrow bandwidth of wireless communications, limited battery duration of mobile terminals, etc. The paper proposes a common memory management mechanism for mobile terminals and servers call... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A totally ordered and secure multicast protocol for distributed virtual environment

    Publication Year: 2000, Page(s):55 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Sharing a virtual space with many users, a distributed virtual reality environment (DVE) provides high level communication and cooperative design facilities. For a large-scale DVE in a wide area network, a reliable and efficient multicast protocol on the Internet is necessary. We have developed a reliable multicast protocol based on the sequence server and evaluated it using simulation. From the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet-Marks: the secure seal for WWW site authentication

    Publication Year: 2000, Page(s):393 - 398
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The paper describes a seal that is secure enough for both the seal and Web page contents to be protected against forgery. It also enables the copying of Web contents to an unauthorized site to be detected. The paper explains the Internet Marks and compares their security and speed with those of conventional seal methods View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hardware/software co-design method of ITS image processing development

    Publication Year: 2000, Page(s):415 - 420
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    A hardware and software co-design method for the image processing system of intelligent transport systems (ITS) is proposed. The objective of this method is to optimize the division of functions between hardware and software by the optimum tradeoff. In this method, the targeted overall system is first modeled by software, and then functions and structures are adjusted. The performance of each func... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visualization of vortical flow using multiple slices

    Publication Year: 2000, Page(s):201 - 204
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    In the present paper, a new technique is proposed for visualizing a vortical flow field using multiple texture-mapped slices. First, the vortex centers are identified by finding and classifying critical points in the flow field. Then the flow field is projected onto the slicing planes which pass through the critical points and are perpendicular to the vortex axes. Finally, the projected flow field... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agent-based grocery shopping system based on user's preference

    Publication Year: 2000, Page(s):499 - 505
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    We propose an agent-based grocery shopping system, which automates grocery shopping process by comparing grocery information based on user's preference. The agents gather grocery information from several store server agents and compare it with user's preferences of groceries and stores. The agents could adapt to user's up-to-date preference by learning from his/her evaluation of previous shopping ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network based genetic algorithm

    Publication Year: 2000, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Parallel genetic algorithms are effective for solving large problems. Most of them are implemented on a massive parallel computer and the efficiency depends on the parallel computing system. It is inappropriate to implement them in a distributed computing system connected by a network. The paper proposes a client-server based approach to parallel genetic algorithms with a delegate management model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process division in haptic display system

    Publication Year: 2000, Page(s):219 - 224
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper proposes a novel inter-process communication, between a virtual world manager with slow update rate and a haptic controller with fast update rate, which incorporates the integrated force given from the user to the world. High-speed refresh rate, generally 1 kHz, is required to present stiff virtual objects that have spring-damper characteristic with haptic display. On the other hand, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ADDROL: a method for on-line reorganization in a multisystem DBMS with shared disks

    Publication Year: 2000, Page(s):378 - 383
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper describes the design of a method, called ADDROL-Algorithm for Distributed Database Reorganization On-Line, which supports on-line reorganization of the distributed database. The contributions of the paper are both theoretical and experimental. We present an algorithm for maintaining the biconnected components of a graph during a sequence of edge insertions and deletions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy enhanced access control by SPKI

    Publication Year: 2000, Page(s):301 - 306
    Cited by:  Papers (3)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    In Internet and electronic commerce applications, a user may want to access servers as anonymous with an authorized certificate. In this paper, such privacy-enhanced service scheme is presented by using Simple Public Key Infrastructure (SPKI). A certificate of SPKI carries as few information on clients as possible compared to a certificate of PKIX (Public Key Infrastructure with X.509). After obta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient parallel algorithm for high resolution color image reconstruction

    Publication Year: 2000, Page(s):547 - 552
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    This paper studies the application of preconditioned conjugate gradient methods in high resolution color image reconstruction problems. The high resolution color images are reconstructed from multiple undersampled, shifted, degraded color frames with subpixel displacements. The resulting degradation matrices are spatially variant. The preconditioners are derived by taking the cosine transform appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet loss detection scheme for retransmission-based real-time data transfer

    Publication Year: 2000, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Since retransmission-based error control for real-time communication will be feasible in the future high speed network environment, we have proposed R3TP (retransmission based reliable real-time data transfer protocol). R3TP is a transport layer protocol which provides high quality real-time data transfer by adopting ATM block transfer (ABT) and retransmission-based error con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metadata representation in XML for Internet-based electronic XML application from business to government

    Publication Year: 2000, Page(s):387 - 392
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    In government-to-business Internet applications, as in business-to-business Internet commerce, XML (eXtensible Markup Language) is attracting attention as a format for encoding information and services with meaningful structure and semantics that computers can readily understand. We propose a model for representing metadata about a set of application documents in a resource description framework (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A bulk scanning method for uncared-for processes on classroom UNIX workstations

    Publication Year: 2000, Page(s):409 - 414
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    At the University of Aizu, the Information Systems and Technology Center (ISTC) has provided UNIX workstations for student classroom facilities. Students-some of whom are beginners, often logged out, unintentionally leaving processes, some of which may waste processor resources. Such aimless running processes are often found in high load averaged hosts. We have developed a tool for periodically se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.