By Topic

IEEE Transactions on Parallel and Distributed Systems

Issue 3 • Date March 2011

Filter Results

Displaying Results 1 - 18 of 18
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2011, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • A Cooperative Diversity-Based Robust MAC Protocol in Wireless Ad Hoc Networks

    Publication Year: 2011, Page(s):353 - 363
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1772 KB) | HTML iconHTML

    In interference-rich and noisy environment, wireless communication is often hampered by unreliable communication links. Recently, there has been active research on cooperative communication that improves the communication reliability by having a collection of radio terminals transmit signals in a cooperative way. This paper proposes a medium access control (MAC) algorithm, called Cooperative Diver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Search and Survey Using Autonomous Underwater Vehicles (AUVs)

    Publication Year: 2011, Page(s):364 - 379
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2580 KB) | HTML iconHTML

    In this work, we study algorithms for cooperative search and survey using a fleet of Autonomous Underwater Vehicles (AUVs). Due to the limited energy, communication range/bandwidth, and sensing range of the AUVs, underwater search and survey with multiple AUVs brings about several new challenges since a large amount of data needs to be collected by each AUV, and any AUV may fail unexpectedly. To a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Resource Provisioning in Massively Multiplayer Online Games

    Publication Year: 2011, Page(s):380 - 395
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3690 KB) | HTML iconHTML

    Today's Massively Multiplayer Online Games (MMOGs) can include millions of concurrent players spread across the world and interacting with each other within a single session. Faced with high resource demand variability and with misfit resource renting policies, the current industry practice is to overprovision for each game tens of self-owned data centers, making the market entry affordable only f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictable High-Performance Computing Using Feedback Control and Admission Control

    Publication Year: 2011, Page(s):396 - 411
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2362 KB) | HTML iconHTML

    Historically, batch scheduling has dominated the management of High-Performance Computing (HPC) resources. One of the most significant limitations using this approach is an inability to predict both the start time and end time of jobs. Although existing researches such as resource reservation and queue-time prediction partially address this issue, a more predictable HPC system is needed, particula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traceback of DDoS Attacks Using Entropy Variations

    Publication Year: 2011, Page(s):412 - 425
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2883 KB) | HTML iconHTML

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memoryless feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far. In this paper, we propose a novel traceback method for DDoS attacks that is based on entrop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Capacity Identification of Multitier Websites Using Hardware Performance Counters

    Publication Year: 2011, Page(s):426 - 438
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2735 KB) | HTML iconHTML

    Understanding server capacity is crucial to system capacity planning, configuration, and QoS-aware resource management. Conventional stress testing approaches measure server capacity offline in terms of application-level performance metrics like response time and throughput. They are limited in measurement accuracy and timeliness. In a multitier website, resource bottleneck often shifts between ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS-Aware Dynamic Adaptation for Cooperative Media Streaming in Mobile Environments

    Publication Year: 2011, Page(s):439 - 450
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3746 KB) | HTML iconHTML

    Media streaming is expected to be one of the most promising services in mobile environments. Effective data streaming management techniques are, therefore, in strong demand. In an earlier paper, the ideas and benefits of two-level cooperative media streaming with headlight prefetching and dynamic chaining were demonstrated. Though complementary to each other, they operate in session-wide static an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chunk Distribution in Mesh-Based Large-Scale P2P Streaming Systems: A Fluid Approach

    Publication Year: 2011, Page(s):451 - 463
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2433 KB) | HTML iconHTML Multimedia Media

    We consider large-scale mesh-based P2P systems for the distribution of real-time video content. Our goal is to study the impact that different design choices adopted while building the overlay topology may have on the system performance. In particular, we show that the adoption of different strategies leads to overlay topologies with different macroscopic properties. Representing the possible over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems

    Publication Year: 2011, Page(s):464 - 475
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2099 KB) | HTML iconHTML

    Although anonymizing Peer-to-Peer (P2P) systems often incurs extra traffic costs, many systems try to mask the identities of their users for privacy considerations. Existing anonymity approaches are mainly path-based: peers have to pre-construct an anonymous path before transmission. The overhead of maintaining and updating such paths is significantly high. We propose Rumor Riding (RR), a lightwei... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LBMP: A Logarithm-Barrier-Based Multipath Protocol for Internet Traffic Management

    Publication Year: 2011, Page(s):476 - 488
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3407 KB) | HTML iconHTML

    Traffic management is the adaptation of source rates and routing to efficiently utilize network resources. Recently, the complicated interactions between different Internet traffic management modules have been elegantly modeled by distributed primal-dual utility maximization, which sheds new light for developing effective management protocols. For single-path routing with given routes, the dual is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks

    Publication Year: 2011, Page(s):489 - 500
    Cited by:  Papers (43)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1488 KB) | HTML iconHTML

    We propose localized, self organizing, robust, and energy-efficient data aggregation tree approaches for sensor networks, which we call Localized Power-Efficient Data Aggregation Protocols (L-PEDAPs). They are based on topologies, such as LMST and RNG, that can approximate minimum spanning tree and can be efficiently computed using only position or distance information of one-hop neighbors. The ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Fusion with Desired Reliability in Wireless Sensor Networks

    Publication Year: 2011, Page(s):501 - 513
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1947 KB) | HTML iconHTML

    Energy-efficient and reliable transmission of sensory information is a key problem in wireless sensor networks. To save more energy, in-network processing such as data fusion is a widely used technique, which, however, may often lead to unbalanced information among nodes in the data fusion tree. Traditional schemes aim at providing reliable transmission to individual data packets from source node ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Edge Self-Monitoring for Wireless Sensor Networks

    Publication Year: 2011, Page(s):514 - 527
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1843 KB) | HTML iconHTML

    Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry out monitoring operations. Such an assumption, however, is often difficult for a large-scale sensor network. In this work, we focus on designing an efficient scheme integrated with good self-monitoring capability as well... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Computer Society OnlinePlus Coming Soon [advertisement]

    Publication Year: 2011, Page(s): 528
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • TPDS Information for authors

    Publication Year: 2011, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (112 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. It publishes a range of papers, comments on previously published papers, and survey articles that deal with the parallel and distributed systems research areas of current importance to our readers. Particular areas of interest include, but are not limited to:

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David Bader
College of Computing
Georgia Institute of Technology