2016 17th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)

16-18 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 92
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for reuse | PDF file iconPDF (8374 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xii
    Request permission for reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2016, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Message from the Program Committee Chairs

    Publication Year: 2016, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2016, Page(s): xv
    Request permission for reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2016, Page(s):xvi - xvii
    Request permission for reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • External Reviewers

    Publication Year: 2016, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE
  • Keynote Speech 1: Big Data on Clouds and HPC

    Publication Year: 2016, Page(s): xix
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (122 KB)

    We review several questions at the intersection of Big Data, Clouds and HPC with the large scale simulations usually run on supercomputers and the target of the exascale initiative. We base this on an analysis of many big data and simulation problems and a set of properties -the Big Data Ogres -characterizing them where we distinguish data and model properties. We consider broad topics: What are t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 2: Big Data: Making Cities Smarter

    Publication Year: 2016, Page(s): xx
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (129 KB)

    The concept of smart city has drawn significant attention from government, industry and academia. But in the end many people do not know exactly what does “smart” mean or if “smart” can be quantified or how “smart” can be realized? Big data is a hot topic but it is still full of “mysteries”. Few of us realize its multiple applications to various domains of human endeavor. I argue that Big Data is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 3: The Era of Big Data and Cognitive Computing

    Publication Year: 2016, Page(s): xxi
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (130 KB)

    Summary form only given. Big data and cognitive computing are driving fundamental changes in technology, business, and society. With its exponentially increasing volume, velocity and variety, big data is hailed as the world's new natural resource. It promises to be for the 21st century what steam power was for the 18th, electricity for the 19th, and oil and gas for the 20th. The biggest value of b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 4: Fuzzy Transfer Learning for Decision Making

    Publication Year: 2016, Page(s): xxii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (130 KB)

    This presentation highlights the value of fuzzy transfer learning methods and related algorithms for handling complex prediction problems in rapidly-changing data distribution and data-shortage situations. It provides a framework for utilizing previously-acquired knowledge to predict new but similar problems quickly and effectively by using fuzzy set techniques. It systematically presents developm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 5: A New Approach for Linking Theories of Programming

    Publication Year: 2016, Page(s): xxiii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (130 KB)

    Formal methods advocate the crucial role played by the algebra of programs in specification and implementation of programs. Study leads to the conclusion that both the top-down approach (with denotational model as its origin) and the bottom-up approach (a journey started from operational model) can meet in the middle with a program algebra. This paper proposes a new approach on linking theories of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speech 6: China's New Key Project on High-Performance Computing

    Publication Year: 2016, Page(s): xxiv
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (130 KB)

    Summary form only given. After a brief review on the current status of HPC research and development in China, this talk will introduce the plan of HPC development under the new Key R&D Program of China in the 13th 5-year plan. The motivation of developing the exa-scale computer and the need for establishing an eco-system for high performance computing in China will be presented. The major ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runahead Cache Misses Using Bloom Filter

    Publication Year: 2016, Page(s):1 - 6
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    In order to hide long memory latency and alleviate memory bandwidth requirement, a fourth-level cache (L4) is introduced in modern high-performance multi-core systems for supporting parallel computation. However, additional cache level causes higher cache miss penalty since a request needs to go through all levels of caches to reach to the main memory. In this paper, we introduce a new way of usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Optimization for In-Memory File Systems on NUMA Machines

    Publication Year: 2016, Page(s):7 - 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    The growing demand for high-performance data processing stimulates the development of in-memory file systems, which exploit the advanced features of emerging non-volatile memory techniques for achieving high-speed file accesses. Existing in-memory file systems, however, are all designed for the systems with uniformed memory accesses. Their performance is poor on Non-Uniform Memory Access (NUMA) ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and Portability Studies with OpenACC Accelerated Version of GTC-P

    Publication Year: 2016, Page(s):13 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (915 KB) | HTML iconHTML

    Accelerator-based heterogeneous computing is of paramount importance to High Performance Computing. The increasing complexity of the cluster architectures requires more generic, high-level programming models. OpenACC is a directive-based parallel programming model, which provides performance on and portability across a wide variety of platforms, including GPU, multicore CPU, and many-core processo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outer-Loop Auto-Vectorization for SIMD Architectures Based on Open64 Compiler

    Publication Year: 2016, Page(s):19 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    SIMD (Single Instruction Multiple Data) extensions are acceleration components integrated in general processor, aiming at extracting instruction and data level parallelism of multimedia and scientific calculation programs. Currently, most of the automatic vectorization methods for SIMD architectures are based on innermost loops. Inner loop vectorization is the common approach for auto-vectorizatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Routing of Multiple Concurrent User Requests in Multi-Radio Multi-Channel Wireless Mesh Networks

    Publication Year: 2016, Page(s):24 - 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (588 KB) | HTML iconHTML

    Multiple-radio multiple-channel (MRMC) wireless mesh networks (WMNs) generally serve as wireless backbones for ubiquitous Internet access. These networks often face a challenge to satisfy multiple user traffic requests simultaneously between different source-destination pairs with different data transfer requirements. We construct analytical network models and formulate such multi-pair routing as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing Broadband Access Network with a SDN-Based System

    Publication Year: 2016, Page(s):30 - 35
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Admittedly, the broadband access network has been improved largely with the developing technologies, it is still facing challenges on managing and maintaining existed resources efficiently. In order to build up an intelligent and open network architecture, and solve the problem of heterogeneous networks consisting of devices from different vendors, we have worked out a web-based managing system im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Scheduling Strategy for Mobile Charger in Wireless Rechargeable Sensor Networks

    Publication Year: 2016, Page(s):36 - 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    With the development of wireless sensor networks, the limited battery capacity of sensor nodes has become one of energy bottleneck problem that dominates the wide application of wireless sensor networks. In recent years, wireless rechargeable sensor networks have attracted much attention due to their potential in solving the energy bottleneck problem. In this paper, we study the scheduling strateg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of User Request Algorithm in Mobile Cloud Computing Based on Improved FCM and Collaborative Filtering

    Publication Year: 2016, Page(s):40 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Improved FCM algorithm based on genetic algorithm is used to extract user needs in mobile cloud computing. By using its characteristics of fast clustering, users can be divided into the same category with similar attributes and behavior patterns, and then use the similarity recommendation algorithm, which makes the similar user requests can be quickly responded. This algorithm (GAFCM-CF) is propos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Data Retrieval Algorithm for Multi-Request in Multi-Antenna Wireless Networks

    Publication Year: 2016, Page(s):45 - 50
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    Given a set of multiple requests sent by clients, where each request contains multiple data items, multi-antenna data retrieval problem refers that finds an access pattern (to retrieve multiple requests by using multiple antennae) such that the access latency of each antenna is minimized and the total access latency in all antennae keeps balance. The problem has great value in mobile computing app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.