Scheduled Maintenance on March 25th, 2017:
Single article purchases and IEEE account management will be unavailable from 4:00 AM until 6:30 PM (ET). We apologize for the inconvenience.
By Topic

Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210)

4-6 April 2001

Filter Results

Displaying Results 1 - 25 of 50
  • Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (414 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 387
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Message passing architectures for stochastic and dynamic distributed real time systems

    Publication Year: 2001, Page(s):367 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Distributed real time systems have recently evolved that are based on commodity computers and networking technologies. In these systems, critical system resources and functionality are distributed over many different computers and networks. The operational modes of these systems include the integration of heterogeneous event driven information flows from multiple sensor platforms that dynamically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of CPU reservation on end-to-end media data transmission

    Publication Year: 2001, Page(s):354 - 361
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Current distributed multimedia applications usually use either best-effort or reservation-based network bandwidth allocation for media data transmission. We argue that end-system CPU reservation also plays an important role in media data transport. We present an analysis of the impact of CPU reservation on media data transmission tasks and its integration with the network bandwidth reservation mec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Configuration of distributed message converter systems using performance modeling

    Publication Year: 2001, Page(s):57 - 67
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (936 KB) | HTML iconHTML

    To find a configuration of a distributed system satisfying performance goals is a complex search problem that involves many design parameters, like hardware selection, job distribution and process configuration. Performance models are a powerful tool to analyse potential system configurations, however, their evaluation is expensive, such that only a limited number of possible configurations can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet marking strategies for Explicit Congestion Notification (ECN)

    Publication Year: 2001, Page(s):17 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    The Transmission Control Protocol (TCP) has congestion control mechanisms built into the protocol which reacts to congestion within the network by appropriately adjusting the sending rate of the TCP source. The congestion control mechanisms use packet drops as a means to detect congestion occurring in the network. Unnecessary packet drops lead to poor performance for low-bandwidth delay-sensitive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Arizona ecosystem for embedded systems

    Publication Year: 2001, Page(s):131 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Motorola, Intel, and Arizona State University are in the process of establishing a not-for-profit consortium with the long-term goal to create an ecosystem to support a vibrant embedded systems activity in the Phoenix area. This paper describes the business case and the approach used to launch the collaboration. The first phase has concentrated on creating the infrastructure to greatly enhance the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An interactive broadcasting protocol for video-on-demand

    Publication Year: 2001, Page(s):347 - 353
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Broadcasting protocols reduce the cost of video-on-demand services by distributing more efficiently videos that are likely to be simultaneously watched by several viewers. Unfortunately, they do not allow the customer to pause, move fast forward or backward while watching a video. We present an interactive pagoda broadcasting protocol that provides these functions at a very reasonable cost. Our pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of some numerical methods for QBD-M processes via analysis of an ATM concentrator

    Publication Year: 2001, Page(s):253 - 254
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    The paper focuses on the numerical efficiency of computational methods for solving QBD-M processes through a performance analysis for an ATM concentrator View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frame-based periodic broadcast and fundamental resource tradeoffs

    Publication Year: 2001, Page(s):77 - 83
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    Multimedia streaming applications consume significant amounts of server and network resources due to the high bandwidth requirements and long durations of audio and video clips. For popular videos, periodic broadcast techniques exploit the client's buffer space and network reception bandwidth capabilities to reduce server and network transmission bandwidth requirements. We study the fundamental tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong security for distributed file systems

    Publication Year: 2001, Page(s):34 - 40
    Cited by:  Papers (11)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    We have developed a scheme to secure network-attached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without allowing the super-user access to unencrypted data. While denial-of-service attacks cannot be prevented,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication delay in circuit-switched interconnection networks

    Publication Year: 2001, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Interconnection network design plays a central role in the design of parallel systems. The paper presents an analytical model to predict communication delay in circuit-switched k-ary n-cube interconnection networks augmented with virtual channel support. The main feature of the proposed model is the use of Markov chains to compute the path set-up time and to capture the effects of using virtual ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Just how accurate are performance counters?

    Publication Year: 2001, Page(s):303 - 310
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    The wide use of performance counters by application developers and benchmarking teams gives evidence that performance counters are well worth the silicon and design time required to include them on modern microprocessors. These counters provide rudimentary performance measurements that may or may not be accurate. This paper presents our methodology for determining the accuracy of these counters as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-aware hierarchical multicast routing on next generation internetworks

    Publication Year: 2001, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Quality of service (QoS) based routing and scalability are two key features of multicast routing for next generation internetworks. The paper proposes a new protocol called QoS-aware hierarchical multicast routing protocol (QHMRP) that achieves scalability by organizing the network as a hierarchy of domains using the full-mesh aggregation technique. The protocol uses a novel reverse flooding appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Set-top box software architectures for digital video broadcast and interactive services

    Publication Year: 2001, Page(s):287 - 292
    Cited by:  Papers (3)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    Consumer and business demand for multimedia services has led to a proliferation of solutions that provide a wide range of services such as digital television, Internet connectivity and others. Set-top boxes (STB), the consumer device employed in digital video broadcasting networks, are mainly used for digital television reception and also for interactive services such as Internet access or home sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving call admission control in ATM networks using case-based reasoning

    Publication Year: 2001, Page(s):120 - 127
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    This paper presents a framework for call admission control (CAC) in ATM networks based on case-based reasoning (CBR). CBR is used to correct the error estimation of the required bandwidth computed by conventional call admission control schemes, which were shown to overestimate the required bandwidth. This leads to bandwidth wastage and increased call rejection. A CBR-based system is proposed to ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technique for managing mirrored disks

    Publication Year: 2001, Page(s):272 - 277
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Disk mirroring is a highly effective technique for improving the fault tolerance and performance of storage systems. Mirroring requires that those disks holding the current data must be determined when recovering from total system failure. In a two disk system, this is only a minor problem since the operator can indicate which disk is current. The complexity increases when more disks are introduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic characteristics of bulk data transfer using TCP/IP over gigabit Ethernet

    Publication Year: 2001, Page(s):103 - 111
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB) | HTML iconHTML

    As network data rates scale-up, an understanding of how and why traffic characteristics change is needed. We study the characteristics of bulk data transfer TCP/IP flows in a fully-switched Gigabit Ethernet network. Both disk-to-disk and memory-to-memory transfers are studied. We investigate flow characteristics as a function of link speed, server load, operating system (Linux and WindowsNT), and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cluster-based smoothing for MPEG-based video-on-demand systems

    Publication Year: 2001, Page(s):339 - 346
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    This paper proposes a new technique called cluster-based smoothing to reduce the average per-stream effective bandwidth for the transmission of MPEG compressed video streams. By rearranging the transmission order of frames within windows, the technique exploits the periodic structure of an MPEG video stream, and the bit rate fluctuations across scenes. Trace-driven simulation with empirical MPEG v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of adaptive routing strategies in wavelength-routed networks

    Publication Year: 2001, Page(s):163 - 170
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    As the trend of increased reconfigurability emerges in wavelength division multiplexing (WDM) networks, lightpath establishment would be moved from static toward dynamic regimes. Therefore our interest is in real-time traffic where connection requests arrive dynamically and last for a random holding time if granted. We are concerned with the performance of adaptive routing algorithms in wavelength... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client-transparent fault-tolerant Web service

    Publication Year: 2001, Page(s):209 - 216
    Cited by:  Papers (18)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    Most of the existing fault tolerance schemes for Web servers detect server failure and route future client requests to backup servers. These techniques typically do not provide transparent handling of requests whose processing was in progress when the failure occurred. Thus, the system may fail to provide the user with confirmation for a requested transaction or clear indication that the transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimising thin clients for wireless computing via localization of keyboard activity

    Publication Year: 2001, Page(s):249 - 252
    Cited by:  Papers (3)  |  Patents (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    The thin client model is based on the classic client-server model with all client activity processed at the server. This model can be exploited for providing an application-independent solution for mobile computing where powerful fixed servers serve mobile thin client devices with poor computing resources. However high latency in the wireless connection can lead to delay in display of keyboard and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive scheduling via feedback control for dynamic real-time systems

    Publication Year: 2001, Page(s):373 - 378
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    This paper presents an approach to adaptive CPU scheduling for dynamic real-time systems using control-theoretic methods. Mathematical models are developed that form the basis for the design of controllers that optimize a certain performance measure. Simulation results are presented to show the efficacy of our approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards scalable VoD distribution on the Internet

    Publication Year: 2001, Page(s):71 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Recent advances in the construction of broadcast schedules allow the bandwidth-efficient distribution of Variable Bit Rate (VBR) encoded video. Furthermore, most users are no longer severely limited by their local storage requirements, but are still limited in terms of available bandwidth. We examine an architecture that allows scalable video-on-demand (VoD) delivery, given bandwidth restrictions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noah: low-cost file access prediction through pairs

    Publication Year: 2001, Page(s):27 - 33
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    Prediction is a powerful tool for performance and usability. It can reduce access latency for I/O systems, and can improve usability for mobile computing systems by automating the file hoarding process. We present recent research that has resulted in a file successor predictor that matches the performance of state-of-the-art context-modeling predictors, while requiring a small fraction of their sp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.