By Topic

Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210)

4-6 April 2001

Filter Results

Displaying Results 1 - 25 of 50
  • Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210)

    Publication Year: 2001
    Request permission for commercial reuse | PDF file iconPDF (414 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2001, Page(s): 387
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Increasing the accuracy of statistical simulation for modeling superscalar processors

    Publication Year: 2001, Page(s):196 - 204
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB) | HTML iconHTML

    Statistical simulation is known to be a useful technique to efficiently cull huge design spaces in limited time due to its fast simulation property. Statistical simulation consists of modeling the execution of a computer program by a statistical profile and generating a synthetic trace from it. Current statistical simulation techniques use simple cache statistics producing a flat cache miss behavi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message passing architectures for stochastic and dynamic distributed real time systems

    Publication Year: 2001, Page(s):367 - 372
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    Distributed real time systems have recently evolved that are based on commodity computers and networking technologies. In these systems, critical system resources and functionality are distributed over many different computers and networks. The operational modes of these systems include the integration of heterogeneous event driven information flows from multiple sensor platforms that dynamically ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP Reno with random losses: latency, throughput and sensitivity analysis

    Publication Year: 2001, Page(s):188 - 195
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    Current models for TCP performance focus mainly on the steady-state throughput of infinite flows, making them inappropriate for the short TCP flows which dominate the transfers over the Internet. We present a model for the latency of finite TCP Reno flows with independent losses for which currently no models exist. The proposed model can also estimate the steady-state throughput of long flows. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet marking strategies for Explicit Congestion Notification (ECN)

    Publication Year: 2001, Page(s):17 - 23
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    The Transmission Control Protocol (TCP) has congestion control mechanisms built into the protocol which reacts to congestion within the network by appropriately adjusting the sending rate of the TCP source. The congestion control mechanisms use packet drops as a means to detect congestion occurring in the network. Unnecessary packet drops lead to poor performance for low-bandwidth delay-sensitive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mamba-a programmable broadband multimedia interface board

    Publication Year: 2001, Page(s):281 - 286
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB) | HTML iconHTML

    The article describes a design approach and hardware implementation for a high speed interface card, capable of transmitting and receiving 216 MBit/sec raw DVB/ATSC data via an asynchronous serial or synchronous parallel interface (ASI/SPI). The local side interface is CompactPCI (CPCI). On-board performance bottlenecks will be largely avoided by utilising the new zero bus turnaround RAM technolog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of CPU reservation on end-to-end media data transmission

    Publication Year: 2001, Page(s):354 - 361
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB) | HTML iconHTML

    Current distributed multimedia applications usually use either best-effort or reservation-based network bandwidth allocation for media data transmission. We argue that end-system CPU reservation also plays an important role in media data transport. We present an analysis of the impact of CPU reservation on media data transmission tasks and its integration with the network bandwidth reservation mec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair, efficient and scalable scheduling without per-flow state

    Publication Year: 2001, Page(s):181 - 187
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    In recent years, parallel computer systems are being increasingly used in multi-user environments, with several users sharing the interconnection network at the same time. As a result a large number frequently contend for link bandwidth at the core switches in the network. Traditional fair scheduling disciplines need to maintain per-flow states and perform packet scheduling on a per-flow basis, wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient instruction cache scheme for object-oriented languages

    Publication Year: 2001, Page(s):329 - 336
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    We present an efficient cache scheme, which can considerably reduce instruction cache misses caused by procedure call/returns. This scheme employs N-way banks and XOR mapping functions. The main function of this scheme is to place a group of instructions separated by a call instruction into a bank according to the initial and final bank selection mechanisms. After the initial bank selection mechan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-aware hierarchical multicast routing on next generation internetworks

    Publication Year: 2001, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    Quality of service (QoS) based routing and scalability are two key features of multicast routing for next generation internetworks. The paper proposes a new protocol called QoS-aware hierarchical multicast routing protocol (QHMRP) that achieves scalability by organizing the network as a hierarchy of domains using the full-mesh aggregation technique. The protocol uses a novel reverse flooding appro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trusted objects

    Publication Year: 2001, Page(s):247 - 248
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    A trusted object is a collection of data and programs that is designed to run properly even on an adversary's machine. We believe that network-based agents in high-consequence and in highly reliable applications will depend on this approach, and that the basis for such objects is what we term “faithful execution” View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A technique for managing mirrored disks

    Publication Year: 2001, Page(s):272 - 277
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB) | HTML iconHTML

    Disk mirroring is a highly effective technique for improving the fault tolerance and performance of storage systems. Mirroring requires that those disks holding the current data must be determined when recovering from total system failure. In a two disk system, this is only a minor problem since the operator can indicate which disk is current. The complexity increases when more disks are introduce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coded path routing: a new approach to broadcasting in 3-D meshes

    Publication Year: 2001, Page(s):155 - 162
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    Broadcast is an important collective communication operation required by many real-world parallel applications. This paper proposes the coded path routing (or CPR for short) as a new approach for designing efficient broadcast algorithms for wormhole-switched multicomputer networks. A unique feature of the CPR is that a message can be delivered to an arbitrary number of destination nodes with singl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strong security for distributed file systems

    Publication Year: 2001, Page(s):34 - 40
    Cited by:  Papers (11)  |  Patents (32)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    We have developed a scheme to secure network-attached storage systems against many types of attacks. Our system uses strong cryptography to hide data from unauthorized users; someone gaining complete access to a disk cannot obtain any useful data from the system, and backups can be done without allowing the super-user access to unencrypted data. While denial-of-service attacks cannot be prevented,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An interactive broadcasting protocol for video-on-demand

    Publication Year: 2001, Page(s):347 - 353
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    Broadcasting protocols reduce the cost of video-on-demand services by distributing more efficiently videos that are likely to be simultaneously watched by several viewers. Unfortunately, they do not allow the customer to pause, move fast forward or backward while watching a video. We present an interactive pagoda broadcasting protocol that provides these functions at a very reasonable cost. Our pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance comparison and analysis of ad hoc routing algorithms

    Publication Year: 2001, Page(s):171 - 178
    Cited by:  Papers (15)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    A mobile ad-hoc network (Manet) is a system of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies. People and vehicles can thus be internetworked in areas without a pre-existing communication infrastructure, or when the use of such infrastructure requires wireless extension. Therefore, such networks are designed to operate in widely varying environments... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Inexpensive throughput enhancement in small-scale embedded microprocessors with block multithreading: extensions, characterization, and tradeoffs

    Publication Year: 2001, Page(s):319 - 328
    Cited by:  Papers (3)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    This paper examines differential multithreading (DMT) as an attractive organization for coping with pipeline stalls in small-scale processors like those used in embedded environments. The paper proposes extensions to block multithreading to cope with data- and instruction-cache misses, and then explores some of the design tradeoffs that this enables. Results show that DMT boosts throughput substan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing contention in multiple multicasts

    Publication Year: 2001, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB) | HTML iconHTML

    Multicast operation plays a significant role in parallel computing. Most multicast algorithms that have been proposed for single multicast deliver poor performance when applied to multiple multicasts, because the destination sets of different multicasts often overlap, which leads to node contention in multiple multicasts. The paper presents two algorithms, SPTBM (Source Partitioned Tree-Based Mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Just how accurate are performance counters?

    Publication Year: 2001, Page(s):303 - 310
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (868 KB) | HTML iconHTML

    The wide use of performance counters by application developers and benchmarking teams gives evidence that performance counters are well worth the silicon and design time required to include them on modern microprocessors. These counters provide rudimentary performance measurements that may or may not be accurate. This paper presents our methodology for determining the accuracy of these counters as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of a CORBA-based approach to accessing geospatial information via the Internet

    Publication Year: 2001, Page(s):236 - 243
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (780 KB) | HTML iconHTML

    Access to the National Imagery and Mapping Agency's (NIMA's) Vector Product Format data is essential to the evolution of digital mapping products. Currently, users of NIMA data must have software to view the data resident on their own computer systems, and must obtain the data on CD-ROM or other storage media. This paper examines the design of an object-oriented (OO) digital mapping database proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When local becomes global: an application study of data consistency in a networked world

    Publication Year: 2001, Page(s):266 - 271
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    As users and companies depend increasingly on shared, networked information services, and as companies and customers become more international, computer systems will need to keep pace with a global scale. We believe that we will continue to see growth in large data centers and service providers as new information services arise and existing services are consolidated on one hand (for ease of manage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A better dynamic broadcasting protocol for video-on-demand

    Publication Year: 2001, Page(s):84 - 89
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Dynamic broadcasting protocols for video-on-demand combine features of reactive and proactive distribution protocols to offer good performance over a wide range of request arrival rates. We present a new dynamic broadcasting protocol based upon the fast broadcasting and the new pagoda broadcasting protocols. At low to medium arrival rates, our dynamic fast-pagoda broadcasting protocol performs as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded software for a space interferometry system: automated analysis of a software product line architecture

    Publication Year: 2001, Page(s):145 - 150
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    This paper describes the analysis of the embedded software for an interferometry system using model checking as a means for achieving various analysis goals. The contribution of this paper is to demonstrate how the use of lightweight formal methods can be applied to software for an embedded system via analysis of the behavior of a software architecture View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Client-transparent fault-tolerant Web service

    Publication Year: 2001, Page(s):209 - 216
    Cited by:  Papers (18)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    Most of the existing fault tolerance schemes for Web servers detect server failure and route future client requests to backup servers. These techniques typically do not provide transparent handling of requests whose processing was in progress when the failure occurred. Thus, the system may fail to provide the user with confirmation for a requested transaction or clear indication that the transacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.