By Topic

IEEE Transactions on Parallel and Distributed Systems

Issue 9 • Sept. 2010

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks

    Publication Year: 2010, Page(s):1227 - 1239
    Cited by:  Papers (89)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (878 KB) | HTML iconHTML

    Vehicular ad hoc network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehavior, in order to ensure correct and smooth operations of the network. In this p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource Scheduling in Wireless Networks Using Directional Antennas

    Publication Year: 2010, Page(s):1240 - 1253
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3247 KB) | HTML iconHTML

    Due to a continued increase in the speed and capacities of computing devices, combined with our society's growing need for mobile communication capabilities, multihop wireless networks (MWNs), such as wireless mesh networks (WMNs), have gained a lot of interest from the research community. Quality of service (QoS) provisioning in these networks is an essential component that is needed to support m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks

    Publication Year: 2010, Page(s):1254 - 1266
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2499 KB) | HTML iconHTML

    This paper proposes a novel and efficient distributed flow control scheme for multirate multicast (MR-M), based on the well-known Proportional Integral and Derivative (PID) controllers. The PID controller at each router computes its expected incoming rate and feed backs this rate to its upstream router, such that the local buffer occupancy can be stabilized at an appropriate value. We give the the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High-Performance Heterogeneous Computing Platform for Biological Sequence Analysis

    Publication Year: 2010, Page(s):1267 - 1280
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4107 KB) | HTML iconHTML

    Advances in bioinformatics research continue to add complexity to the analyses and interpretation of biological data. Certain sequence database searches may take weeks to complete due to complicated data dependencies by dynamic programming. A reconfigurable coprocessor can remove this computational bottleneck and accelerate the operation. This paper presents a heterogeneous computing platform thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast and Message-Efficient Global Snapshot Algorithms for Large-Scale Distributed Systems

    Publication Year: 2010, Page(s):1281 - 1289
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1266 KB) | HTML iconHTML

    Large-scale distributed systems such as supercomputers and peer-to-peer systems typically have a fully connected logical topology over a large number of processors. Existing snapshot algorithms in such systems have high response time and/or require a large number of messages, typically O(n2), where n is the number of processes. In this paper, we present a suite of two algorithms: simple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From an Asynchronous Intermittent Rotating Star to an Eventual Leader

    Publication Year: 2010, Page(s):1290 - 1303
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1704 KB) | HTML iconHTML

    Considering an asynchronous system made up of n processes and where up to t of them can crash, finding the weakest assumption that such a system has to satisfy for a common leader to be eventually elected is one of the holy grail quests of fault-tolerant asynchronous computing. This paper is a step in that direction. It has two contributions. Considering a simple and general asynchronous system mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Load Delegation in Service Grid Environments

    Publication Year: 2010, Page(s):1304 - 1316
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2807 KB) | HTML iconHTML

    In this paper, we address the problem of finding well-performing workload exchange policies for decentralized Computational Grids using an Evolutionary Fuzzy System. To this end, we establish a noninvasive collaboration model on the Grid layer which requires minimal information about the participating High Performance and High Throughput Computing (HPC/HTC) centers and which leaves the local resou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation

    Publication Year: 2010, Page(s):1317 - 1329
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1370 KB) | HTML iconHTML

    In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This creates significant problems to Internet Service Providers (ISPs), not only because of the added complexity in traffic engineering, but the increase of traffic, in particular on the cross-ISP links, implies congestion and a higher operat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Data Reallocation in Hybrid Disk Arrays

    Publication Year: 2010, Page(s):1330 - 1341
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3949 KB) | HTML iconHTML

    Current disk arrays consist purely of hard disk drives, which normally provide huge storage capacities with low cost and high throughput for data-intensive applications. Nevertheless, they have some inherent disadvantages such as long access latencies and energy inefficiency due to their build-in mechanical mechanisms. Flash-memory-based solid state disks, on the other hand, although currently mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimal Sets of Turns for Breaking Cycles in Graphs Modeling Networks

    Publication Year: 2010, Page(s):1342 - 1353
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1811 KB) | HTML iconHTML

    The problem of preventing deadlocks and livelocks in computer communication networks, in particular, those with wormhole routing, is considered. The method to prevent deadlocks is to prohibit certain turns (i.e., the use of certain pairs of connected edges) in the routing process, in such a way that eliminates all cycles in the graph. We propose a new algorithm that constructs a minimal (irreducib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incentivized Peer-Assisted Streaming for On-Demand Services

    Publication Year: 2010, Page(s):1354 - 1367
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1835 KB) | HTML iconHTML

    As an efficient distribution mechanism, Peer-to-Peer (P2P) technology has become a tremendously attractive solution to offload servers in large-scale video streaming applications. However, in providing on-demand asynchronous streaming services, P2P streaming design faces two major challenges: how to schedule efficient video sharing between peers with asynchronous playback progresses? how to provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Representation of a Stochastic Traffic Bound

    Publication Year: 2010, Page(s):1368 - 1372
    Cited by:  Papers (63)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    This paper presents a theoretical representation of a stochastic traffic bound (σ',ρ') that consists of two items, the burstiness bound σ' and the bound of long-term average rate ρ'. The novelty of the suggested representation is that the burstiness bound and the bound of long-term average rate are separately connected to the fractal dimension D that is the measure of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks

    Publication Year: 2010, Page(s):1373 - 1385
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1379 KB) | HTML iconHTML

    Wireless sensor networks can be used for event warning applications. Till date, in most of the proposed schemes, the raw or aggregated sensed data are periodically sent to a data consuming center. However, with those schemes, the occurrence of an emergency event such as a fire is hardly reported timely, which is a strict requirement for event warning applications. In wireless sensor networks, it i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 7 Great Reasons for Joining the IEEE Computer Society [advertisement]

    Publication Year: 2010, Page(s): 1386
    Request permission for commercial reuse | PDF file iconPDF (590 KB)
    Freely Available from IEEE
  • TPDS Information for authors

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. It publishes a range of papers, comments on previously published papers, and survey articles that deal with the parallel and distributed systems research areas of current importance to our readers.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David Bader
College of Computing
Georgia Institute of Technology