By Topic

Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing

11-11 Jan. 2002

Filter Results

Displaying Results 1 - 25 of 76
  • Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    The following topics are dealt with: parallel, distributed and network-based processing; performance analysis; Web computing; failure handling; Java and Jini; parallel and distributed programming tools for grids; unorthodox computing architectures; systems and applications; message passing; scheduling; algorithms; and mobile ad hoc networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 1: performance analysis [breaker page]

    Publication Year: 2002, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (289 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 1: performance analysis [breaker page]

    Publication Year: 2002, Page(s): 5
    Request permission for commercial reuse | PDF file iconPDF (289 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 2: web computing [breaker page]

    Publication Year: 2002, Page(s): 47
    Request permission for commercial reuse | PDF file iconPDF (269 KB) | HTML iconHTML
    Freely Available from IEEE
  • Meta/spl psi/: a Web-based metacomputing environment to build a computational chemistry problem solving environment

    Publication Year: 2002, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    The increasing complexity of large distributed scientific applications raises the problem of the coordination of diverse computational resources (computers, data bases, etc.). Multi-disciplinary applications often make use of coupled computational resources that cannot be replicated at a single site. There is the need for smart and user-friendly problem-solving environments that free scientists fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Session 3: failure handling [breaker page]

    Publication Year: 2002, Page(s): 79
    Request permission for commercial reuse | PDF file iconPDF (265 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 4: Java and Jini [breaker page]

    Publication Year: 2002, Page(s): 107
    Request permission for commercial reuse | PDF file iconPDF (289 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 5: parallel and distributed programming tools for grids [breaker page]

    Publication Year: 2002, Page(s): 137
    Request permission for commercial reuse | PDF file iconPDF (289 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 6: programming [breaker page]

    Publication Year: 2002, Page(s): 171
    Request permission for commercial reuse | PDF file iconPDF (262 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 7: unorthodox computing architectures [breaker page]

    Publication Year: 2002, Page(s): 209
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (288 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 8: systems and applications [breaker page]

    Publication Year: 2002, Page(s): 251
    Request permission for commercial reuse | PDF file iconPDF (262 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 9: message passing [breaker page]

    Publication Year: 2002, Page(s): 291
    Request permission for commercial reuse | PDF file iconPDF (288 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 10: scheduling [breaker page]

    Publication Year: 2002, Page(s): 317
    Request permission for commercial reuse | PDF file iconPDF (261 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 11: algorithms I [breaker page]

    Publication Year: 2002, Page(s): 351
    Request permission for commercial reuse | PDF file iconPDF (264 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 12: mobile ad hoc networks [breaker page]

    Publication Year: 2002, Page(s): 393
    Request permission for commercial reuse | PDF file iconPDF (266 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 13: algorithms 2 [breaker page]

    Publication Year: 2002, Page(s): 427
    Request permission for commercial reuse | PDF file iconPDF (288 KB) | HTML iconHTML
    Freely Available from IEEE
  • Session 14: algorithms 3 [breaker page]

    Publication Year: 2002, Page(s): 453
    Request permission for commercial reuse | PDF file iconPDF (261 KB) | HTML iconHTML
    Freely Available from IEEE
  • Author index

    Publication Year: 2002, Page(s):479 - 480
    Request permission for commercial reuse | PDF file iconPDF (207 KB)
    Freely Available from IEEE
  • Integration of legacy client-server applications in a secure multi-tier architecture

    Publication Year: 2002, Page(s):269 - 276
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Presents a CORBA-based multi-tier architecture which is capable of adding security to an existing service. We assume the legacy application is available as a compiled program consisting of a client and a server module. Under these assumptions, we show how to build a new system which re-integrates the original service and secures it. The architecture we propose is quite flexible and represents a fr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile agents in a distributed heterogeneous database system

    Publication Year: 2002, Page(s):123 - 128
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    The purpose of this paper is to present a new infrastructure for multimedia database searches based on CORBA and mobile agent technology. A new mobile agent system, called Vagabond, was implemented in pure Java using only standard CORBA facilities. The fundamental agent design and architecture is introduced. Measurements demonstrated the merits of Vagabond, namely the simple design, the implicit h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel simulated annealing for the vehicle routing problem with time windows

    Publication Year: 2002, Page(s):376 - 383
    Cited by:  Papers (33)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    A parallel simulated annealing algorithm to solve the vehicle routing problem with time windows is presented. The objective is to find the best possible solutions to some well-known instances of the problem by using parallelism. The empirical evidence indicate that parallel simulated annealing can be applied with success to bicriterion optimization problems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ambient interfaces in a Web-based theatre of work

    Publication Year: 2002, Page(s):55 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (541 KB) | HTML iconHTML

    Knowledge workers typically work in both the physical world with physical artefacts and in the electronic world with electronic artefacts. At the same time they work at a number of different places and cooperate with local or remote colleagues. In this paper we introduce ambient interfaces that capture information from real and virtual environments, present information in adequate quality and quan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An observation mechanism of distributed objects in Java

    Publication Year: 2002, Page(s):117 - 122
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    We present an observation mechanism of distributed objects in the context of irregular applications developed in distributed Java. This mechanism predicts the tendencies of the communication between these objects. To ensure a good effectiveness of the execution, the obtained predictions are integrated into a distribution mechanism for the objects of the application View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast detection and resolution of generalized distributed deadlocks

    Publication Year: 2002, Page(s):429 - 436
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    This paper presents an algorithm for detecting generalized deadlocks in distributed systems. Most of the existing algorithms use a diffusing computation technique for deadlock detection in which deadlock detection messages called probes are propagated through the wait-for graph and replies are sent backwards to the initiator of the algorithm carrying the information on wait-for relations between n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the latency of L2 misses in shared-memory multiprocessors through on-chip directory integration

    Publication Year: 2002, Page(s):368 - 375
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Recent technology improvements allow multiprocessor designers to put some key components inside the processor chip, such as the memory controller and the network interface. In this paper, we exploit such an integration scale, presenting a new three-level directory architecture aimed at reducing the long L2 miss latencies and the memory overhead that characterize cc-NUMA machines and limit their sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.