Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210)

4-6 April 2001

Filter Results

Displaying Results 1 - 25 of 50
  • Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210)

    Publication Year: 2001
    Request permission for commercial reuse | |PDF file iconPDF (414 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 387
    Request permission for commercial reuse | |PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • TaBLA: a client-based scheduling algorithm for Web proxy clusters

    Publication Year: 2001, Page(s):217 - 227
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (944 KB) | HTML iconHTML

    As client populations in ISPs continue to rise, it becomes necessary far ISP proxy caches to efficiently handle large numbers of Web requests. We examine the performance of client-side load balancing schemes that help select a proxy from an array of proxies that are equidistant from the client. The current most popular solutions include choosing a random proxy based on either the URL requested, or... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client-transparent fault-tolerant Web service

    Publication Year: 2001, Page(s):209 - 216
    Cited by:  Papers (18)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (720 KB) | HTML iconHTML

    Most of the existing fault tolerance schemes for Web servers detect server failure and route future client requests to backup servers. These techniques typically do not provide transparent handling of requests whose processing was in progress when the failure occurred. Thus, the system may fail to provide the user with confirmation for a requested transaction or clear indication that the transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded path routing: a new approach to broadcasting in 3-D meshes

    Publication Year: 2001, Page(s):155 - 162
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (628 KB) | HTML iconHTML

    Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the coded path routing (or CPR for short) as a new approach for designing efficient broadcast algorithms for wormhole-switched multicomputer networks. A unique feature of the CPR is that a message can be delivered to an arbitrary number of destination nodes with singl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing the accuracy of statistical simulation for modeling superscalar processors

    Publication Year: 2001, Page(s):196 - 204
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (832 KB) | HTML iconHTML

    Statistical simulation is known to be a useful technique to efficiently cull huge design spaces in limited time due to its fast simulation property. Statistical simulation consists of modeling the execution of a computer program by a statistical profile and generating a synthetic trace from it. Current statistical simulation techniques use simple cache statistics producing a flat cache miss behavi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded software for a space interferometry system: automated analysis of a software product line architecture

    Publication Year: 2001, Page(s):145 - 150
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (468 KB) | HTML iconHTML

    This paper describes the analysis of the embedded software for an interferometry system using model checking as a means for achieving various analysis goals. The contribution of this paper is to demonstrate how the use of lightweight formal methods can be applied to software for an embedded system via analysis of the behavior of a software architecture View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real time TCP QoS monitoring in wireless ATM CDMA networks using aggregative large deviation principle

    Publication Year: 2001, Page(s):112 - 119
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB) | HTML iconHTML

    We present a buffer management scheme called dynamic resource allocation (DRA) that provides TCP traffic control guarantees to virtual channels (VCs) carrying multiple dynamic discard thresholds (MDT) over a wireless ATM network. A major task related to these systems addresses the call admission control and resource management. It is assumed that we have TCP wireless ATM networks integrating the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconfigurable embedded media processors

    Publication Year: 2001, Page(s):293 - 298
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (588 KB) | HTML iconHTML

    The rapid proliferation of embedded multimedia applications necessitates efficient implementations which satisfy the computing demands of the various media processing algorithms. Several hardware and software solutions for media processing have appeared in the recent literature. The complexity, variety of techniques and tools associated with multimedia processing points to the opportunities for re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of a CORBA-based approach to accessing geospatial information via the Internet

    Publication Year: 2001, Page(s):236 - 243
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (780 KB) | HTML iconHTML

    Access to the National Imagery and Mapping Agency's (NIMA's) Vector Product Format data is essential to the evolution of digital mapping products. Currently, users of NIMA data must have software to view the data resident on their own computer systems, and must obtain the data on CD-ROM or other storage media. This paper examines the design of an object-oriented (OO) digital mapping database proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison and analysis of ad hoc routing algorithms

    Publication Year: 2001, Page(s):171 - 178
    Cited by:  Papers (15)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (664 KB) | HTML iconHTML

    A mobile ad-hoc network (Manet) is a system of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies. People and vehicles can thus be internetworked in areas without a pre-existing communication infrastructure, or when the use of such infrastructure requires wireless extension. Therefore, such networks are designed to operate in widely varying environments... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Arizona ecosystem for embedded systems

    Publication Year: 2001, Page(s):131 - 134
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (288 KB) | HTML iconHTML

    Motorola, Intel, and Arizona State University are in the process of establishing a not-for-profit consortium with the long-term goal to create an ecosystem to support a vibrant embedded systems activity in the Phoenix area. This paper describes the business case and the approach used to launch the collaboration. The first phase has concentrated on creating the infrastructure to greatly enhance the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal analysis of cache prefetching strategies for multimedia applications

    Publication Year: 2001, Page(s):311 - 318
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (640 KB) | HTML iconHTML

    Prefetching is a widely adopted technique for improving performance of cache memories. Performances are typically affected by the design parameters, such as cache size and associativity, but also by the type of locality embodied in the programs. In particular multimedia tools and programs handling images and video are characterized by a bi-dimensional spatial locality that could be greatly exploit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP Reno with random losses: latency, throughput and sensitivity analysis

    Publication Year: 2001, Page(s):188 - 195
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (644 KB) | HTML iconHTML

    Current models for TCP performance focus mainly on the steady-state throughput of infinite flows, making them inappropriate for the short TCP flows which dominate the transfers over the Internet. We present a model for the latency of finite TCP Reno flows with independent losses for which currently no models exist. The proposed model can also estimate the steady-state throughput of long flows. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless optical ad-hoc networks for embedded systems

    Publication Year: 2001, Page(s):140 - 144
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (308 KB)

    We explore the technologies available to build wireless ad-hoc networks, using embedded systems that operate at Gb/s transmission speed. Various applications are described. A wireless optical storage area network (WOSAN) is being implemented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic characteristics of bulk data transfer using TCP/IP over gigabit Ethernet

    Publication Year: 2001, Page(s):103 - 111
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (772 KB) | HTML iconHTML

    As network data rates scale-up, an understanding of how and why traffic characteristics change is needed. We study the characteristics of bulk data transfer TCP/IP flows in a fully-switched Gigabit Ethernet network. Both disk-to-disk and memory-to-memory transfers are studied. We investigate flow characteristics as a function of link speed, server load, operating system (Linux and WindowsNT), and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A better dynamic broadcasting protocol for video-on-demand

    Publication Year: 2001, Page(s):84 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (476 KB) | HTML iconHTML

    Dynamic broadcasting protocols for video-on-demand combine features of reactive and proactive distribution protocols to offer good performance over a wide range of request arrival rates. We present a new dynamic broadcasting protocol based upon the fast broadcasting and the new pagoda broadcasting protocols. At low to medium arrival rates, our dynamic fast-pagoda broadcasting protocol performs as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards scalable VoD distribution on the Internet

    Publication Year: 2001, Page(s):71 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (476 KB) | HTML iconHTML

    Recent advances in the construction of broadcast schedules allow the bandwidth-efficient distribution of Variable Bit Rate (VBR) encoded video. Furthermore, most users are no longer severely limited by their local storage requirements, but are still limited in terms of available bandwidth. We examine an architecture that allows scalable video-on-demand (VoD) delivery, given bandwidth restrictions ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Communication delay in circuit-switched interconnection networks

    Publication Year: 2001, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (412 KB) | HTML iconHTML

    Interconnection network design plays a central role in the design of parallel systems. The paper presents an analytical model to predict communication delay in circuit-switched k-ary n-cube interconnection networks augmented with virtual channel support. The main feature of the proposed model is the use of Markov chains to compute the path set-up time and to capture the effects of using virtual ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Set-top box software architectures for digital video broadcast and interactive services

    Publication Year: 2001, Page(s):287 - 292
    Cited by:  Papers (3)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB) | HTML iconHTML

    Consumer and business demand for multimedia services has led to a proliferation of solutions that provide a wide range of services such as digital television, Internet connectivity and others. Set-top boxes (STB), the consumer device employed in digital video broadcasting networks, are mainly used for digital television reception and also for interactive services such as Internet access or home sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-aware hierarchical multicast routing on next generation internetworks

    Publication Year: 2001, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (568 KB) | HTML iconHTML

    Quality of service (QoS) based routing and scalability are two key features of multicast routing for next generation internetworks. The paper proposes a new protocol called QoS-aware hierarchical multicast routing protocol (QHMRP) that achieves scalability by organizing the network as a hierarchy of domains using the full-mesh aggregation technique. The protocol uses a novel reverse flooding appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong security for distributed file systems

    Publication Year: 2001, Page(s):34 - 40
    Cited by:  Papers (11)  |  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (584 KB) | HTML iconHTML

    We have developed a scheme to secure network-attached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without allowing the super-user access to unencrypted data. While denial-of-service attacks cannot be prevented,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technique for managing mirrored disks

    Publication Year: 2001, Page(s):272 - 277
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (496 KB) | HTML iconHTML

    Disk mirroring is a highly effective technique for improving the fault tolerance and performance of storage systems. Mirroring requires that those disks holding the current data must be determined when recovering from total system failure. In a two disk system, this is only a minor problem since the operator can indicate which disk is current. The complexity increases when more disks are introduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of dynamic soft real-time systems

    Publication Year: 2001, Page(s):379 - 386
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (720 KB) | HTML iconHTML

    Soft real-time processing is real-time processing in which some or all applications are allowed to miss deadlines, particularly in situations of system overload. Resource allocation decisions in such systems are often based in part on specifications of application utility or benefit and directly affect which applications will miss deadlines and by how much. A feedback mechanism is often provided t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal self-stabilizing phase clock protocol with bounded memory

    Publication Year: 2001, Page(s):228 - 235
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB) | HTML iconHTML

    We propose a self-stabilizing K-phase clock protocol which works on uniform tree networks (i.e. without any root). The protocol is self-stabilizing because it guarantees that eventually all clock valve variables will be synchronized and advance in the same value, no matter what the initial state is. It requires (Degu+1)K states by processor u, where Degu is the degree of u; i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.