By Topic

IEEE Transactions on Parallel and Distributed Systems

Issue 10 • Date Oct. 2008

Filter Results

Displaying Results 1 - 16 of 16
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2008, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Anonymous Geo-Forwarding in MANETs through Location Cloaking

    Publication Year: 2008, Page(s):1297 - 1309
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1192 KB) | HTML iconHTML

    In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and Internet services. Geographic forwarding becomes a lightweight routing protocol in favor of the scenarios. Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking

    Publication Year: 2008, Page(s):1310 - 1324
    Cited by:  Papers (25)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1793 KB) | HTML iconHTML

    Tracing IP packets to their origins is an important step in defending Internet against denial-of-service attacks. Two kinds of IP traceback techniques have been proposed as packet marking and packet logging. In packet marking, routers probabilistically write their identification information into forwarded packets. This approach incurs little overhead but requires large flow of packets to collect t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps

    Publication Year: 2008, Page(s):1325 - 1337
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1079 KB) | HTML iconHTML

    Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inherent tradeoff between trust and anonymity. To the best of our knowledge, there is currently no P2P protocol that provides complete mutual anonymity as well as authentication and trust manag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Collaboration in a Mediator-Free Distributed Environment

    Publication Year: 2008, Page(s):1338 - 1351
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3084 KB) | HTML iconHTML

    The Internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several security and privacy challenges. Managing security in the absence of a central mediator is even more challenging. In this paper, we propose a distributed secure interoperability framework for mediator-free collaboration en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Policy Evaluation Tool for Multisite Resource Management

    Publication Year: 2008, Page(s):1352 - 1366
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2207 KB) | HTML iconHTML

    An enterprise typically operates multiple data center sites, each handling workloads according to an enterprise-level strategy. Sharing resources across multiple sites (or enterprises) brings up several important problems. Each site may have its own policies that govern its interactions with other remote sites. Different policies impact the system performance in different ways. The site administra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Choose a Timing Model

    Publication Year: 2008, Page(s):1367 - 1380
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1440 KB) | HTML iconHTML

    When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely or for fewer timely links? Does optimizing a protocol for better message complexity hamper the time complexity? In this paper, we investigate these types of questions using mathematical analysis as well as experiments over PlanetLab (WAN) and a LAN. W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Breadth-First Search on the Cell/BE Processor

    Publication Year: 2008, Page(s):1381 - 1395
    Cited by:  Papers (28)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3254 KB) | HTML iconHTML

    Multi-core processors are a shift of paradigm in computer architecture that promises a dramatic increase in performance. But they also bring an unprecedented level of complexity in algorithmic design and software development. In this paper we describe the challenges involved in designing a breadth-first search (BFS) algorithm for the Cell/B.E. processor. The proposed methodology combines a high-le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction-Based Power-Performance Adaptation of Multithreaded Scientific Codes

    Publication Year: 2008, Page(s):1396 - 1410
    Cited by:  Papers (24)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2667 KB) | HTML iconHTML

    Computing has recently reached an inflection point with the introduction of multi-core processors. On-chip thread-level parallelism is doubling approximately every other year. Concurrency lends itself naturally to allowing a program to trade performance for power savings by regulating the number of active cores, however in several domains users are unwilling to sacrifice performance to save power.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks

    Publication Year: 2008, Page(s):1411 - 1425
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1776 KB) | HTML iconHTML

    Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. In this paper, we propose a novel key manageme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks

    Publication Year: 2008, Page(s):1426 - 1438
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1658 KB) | HTML iconHTML

    Wireless sensor networks have been widely used in many surveillance applications. Due to the importance of sensor nodes in such applications, certain level of protection need to be provided to them. We study the self protection problem for static wireless sensor networks in this paper. Self protection problem focuses on using sensor nodes to provide protection to themselves instead of the target o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Silver Bullet Security Podcasts

    Publication Year: 2008, Page(s): 1439
    Request permission for commercial reuse | PDF file iconPDF (1077 KB)
    Freely Available from IEEE
  • Build Your Career in Computing [advertisement]

    Publication Year: 2008, Page(s): 1440
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • TPDS Information for authors

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. It publishes a range of papers, comments on previously published papers, and survey articles that deal with the parallel and distributed systems research areas of current importance to our readers. Particular areas of interest include, but are not limited to:

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David Bader
College of Computing
Georgia Institute of Technology