By Topic

2009 Sixth IFIP International Conference on Network and Parallel Computing

19-21 Oct. 2009

Filter Results

Displaying Results 1 - 25 of 46
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (410 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • NPC 2009 Committees

    Publication Year: 2009, Page(s):ix - xi
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Keynote 1: Using Clouds for Science

    Publication Year: 2009, Page(s): xii
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (63 KB)

    We examine clouds in both their Virtual Machine based formulations and for new programming models/technologies such as MapReduce, Hadoop(Yahoo) and Dryad (Microsoft). We describe why clouds will either complement or replace Grids in future scientific environments and lead to more attractive computing environments for a broad range of users. We compare in detail Hadoop and Dryad with MPI noting the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2: The Intercloud: Cloud Interoperability at Internet Scale

    Publication Year: 2009, Page(s): xiii
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (66 KB)

    Today, cloud computing is seen largely as isolated providers or enterprise instances of a special kind of hosting or application container. Virtual machines, or managed code executing against cloud API's, are limited to that provider or that enterprise in terms of direct context or reach. This reminds us very much of the state of networking before the Internet where LANs of various domains and pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Nornir Run-time System for Parallel Programs Using Kahn Process Networks

    Publication Year: 2009, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Shared-memory concurrency is the prevalent paradigm used for developing parallel applications targeted towards small- and middle-sized machines, but experience has shown that it is hard to use. This is largely caused by synchronization primitives which are low-level, inherently nondeterministic, and, consequently, non-intuitive to use. In this paper, we present the Nornir run-time system. Nornir i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Performance of Pruned Hierarchical Torus Network

    Publication Year: 2009, Page(s):9 - 15
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    The complexity of an interconnection network often determines the size of the parallel computer and thus the attainable performance of a parallel computer is limited by the characteristics of the interconnection network. Pruning technique reduces the complexity and hence increases the performance. In this paper, we apply the pruning technique on hierarchical torus network (HTN) and study the archi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Aware Loop Scheduling for High Performance Multi-Module Memory

    Publication Year: 2009, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    The speed gap between processor and memory is the major bottleneck for modern computing systems. Many modern processors, such as the CELL processor, employ multi-core, multimodule architecture to hide memory access latency. However, making effective use of multiple memory modules remains difficult, considering the combined effect of performance and energy requirements. This paper studies the sched... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Super-Peer Availability Prediction Strategy in Unstructured P2P Network

    Publication Year: 2009, Page(s):23 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (692 KB) | HTML iconHTML

    For the last few years, there has been a large volume of research on Peer-to-Peer (P2P) system, resulting in many hybrid P2P models. This model is important to keep a high available SP because all P2P overlay traffic will be routed via the SP. Main purpose of this paper is to improve SP's availability for OPs so that the system selects the peer with the potential to go the longest without needing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of Fragmentation Strategy on Ethernet Performance

    Publication Year: 2009, Page(s):30 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    Network fragmentation is the process of splitting a large amount of communication data into smaller fragments that comply with the Maximum Transmission Unit supported by the interconnect. We present a novel fragmentation approach which optimises communication fragmentation based on the amount of data remaining to be exchanged. Our fragmentation approach has up to 30% lower latency when exchanging ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VirtualNet: Mapping Distributed Communication on a Single Node

    Publication Year: 2009, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    During the development of a distributed application, programmers usually involve many programs. These programs have different IP addresses and different ports. Sometimes, they even have a same port. For instance, in P2P environment, peers usually use the same port to communicate with each other. We often need tens of computers to develop such a distributed application. Unfortunately, not each one ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Virtual Machine Replay System Based on Para-virtualized Xen

    Publication Year: 2009, Page(s):44 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (466 KB) | HTML iconHTML

    Operating system debugging and system security are two important issues which are attracted more and more attentions. However, traditional solutions of software debugging can not make an integrated replay towards the status of operating system. Moreover, most intrusion detection methods all depend on the operating system excessively, but operating system ex-poses so many interfaces to outside that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Live Migration of Virtual Machines in SMP Clusters for HPC Applications

    Publication Year: 2009, Page(s):51 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Live migration is one of the most useful features provided by todays' virtual machine monitors (VMM). It enables seamless hardware upgrades, provides fault tolerance, achieves load balancing and saves power through server consolidation. These features can also be beneficial in HPC environments. This paper presents a comprehensive study of the migration facility of the Xen VMM, specifically targeti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DPM: A Demand-driven Virtual Disk Prefetch Mechanism for Mobile Personal Computing Environments

    Publication Year: 2009, Page(s):59 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (471 KB) | HTML iconHTML

    In this paper, we propose a demand-driven virtual disk (VD) prefetch mechanism-DPM to improve the performance of virtual machine (VM) at destination site for mobile personal computing environments. DPM uses an optimized COW (Copy-on-Write) virtual block device to split the traditional one-piece large-sized VD image into multiple small-sized SVDs (Software Virtual Disk) at a basic granularity of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Transmission in Multi-Flow Streaming Overlay Networks

    Publication Year: 2009, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Aiming at improving the performance of relay transmission in multi-flow streaming overlay networks, a performance evaluation model to optimize the global weighted average latency was proposed. This model supports multiple senders and multiple receivers. A distributed heuristic allocation algorithm was proposed to optimize the transmission performance. In this algorithm, the bottleneck bandwidth sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Explorations of Honeycomb Topologies for Network-on-Chip

    Publication Year: 2009, Page(s):73 - 79
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Rectangular mesh and torus are the mostly used topologies in network-on-chip (NoC) based systems. In this paper, we quantitatively illustrate that the honeycomb topology is an advantageous design alternative in terms of network cost which is one of the most important parameters that reflects both network performance and implementation cost. Comparing with the rectangular mesh and torus, honeycomb ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Self-configuration of User QoS for Next Generation Network

    Publication Year: 2009, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Traditional network configuration managements for users' QoS can achieve well performance to some extent, but all of them could not be applied to the next generation network (NGN) directly, such as integrated services (Intserv) and differentiated services (Diffserv) typically. To solve this issue, we propose a framework of dynamic QoS self-configuration (FDQS) in this paper. Utility function and i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Energy-Efficient Packet Transmission for Voice Delivering in Wireless Sensor Networks

    Publication Year: 2009, Page(s):86 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (346 KB) | HTML iconHTML

    It is challenging to deal with the tradeoff between energy efficiency and quality of service (QoS) for multimedia applications in wireless sensor networks (WSNs). The packet aggregation scheme is widely applied to reduce overhead for high throughput and energy saving in wireless sensor networks. However, it may cause unacceptable delay in WSNs. In order to solve the problem for voice delivering wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Accelerator-Oriented Algorithm Transformation for Temporal Data Mining

    Publication Year: 2009, Page(s):93 - 100
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1180 KB) | HTML iconHTML

    Temporal data mining algorithms are becoming increasingly important in many application domains including computational neuroscience, especially the analysis of spike train data. While application scientists have been able to readily gather multi-neuronal datasets, analysis capabilities have lagged behind, due to both lack of powerful algorithms and inaccessibility to powerful hardware platforms. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sleep Scheduling and Gradient Query in Sensor Networks for Target Monitoring

    Publication Year: 2009, Page(s):101 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB) | HTML iconHTML

    Duty cycling is an important method for energy constrained sensor networks to prolong its lifetime. Current researches on duty cycling are often based on such assumption that all the sensory coverage should be maintained while some nodes are sleeping. For the applications of target monitoring, however, it is not necessary anymore to keep the whole sensory coverage of the sensor networks. It only n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bag-of-Tasks Self-Scheduling over Range-Queriable Search Overlays

    Publication Year: 2009, Page(s):109 - 116
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The opportunistic computing paradigm is extremely valuable to modern technical and scientific endeavors, as it can support the demand for large and steady amounts of computing capacity. The applications of opportunistic computing environments often require independent and intensive processing over different data sets, characterizing themselves as BoT applications. Opportunistic computing systems, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.