Proceedings 2000. International Workshop on Parallel Processing

21-24 Aug. 2000

Filter Results

Displaying Results 1 - 25 of 68
  • Proceedings of the 2000 International Workshops on Parallel Processing [front matter]

    Publication Year: 2000, Page(s):iii - xii
    Request permission for commercial reuse | PDF file iconPDF (377 KB)
    Freely Available from IEEE
  • Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cat. No.PR00728)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (736 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):583 - 584
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Active streaming in transport delay minimization

    Publication Year: 2000, Page(s):95 - 102
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    In this paper we present a technique for reducing response delay for Web systems, which is based on a proactive cache scheme. It combines predictive pre-fetching and streaming to overlap the read-time with loading time. This graph-based model analyzes the hyperlink structure to form the prediction. It also utilizes data streaming to further minimize the pre-load, without compromising the responsiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of traffic shaping in ATM networks on video quality

    Publication Year: 2000, Page(s):485 - 492
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Presents the impact of traffic shaping on enhancing interactive video quality over ATM networks. The effects of the leaky-bucket traffic shaper on the video quality is studied under different token buffer rates and token buffer sizes, and the tradeoffs involved are discussed. An enhanced traffic shaper using the early-drop mechanism is then introduced. Simulation results show that, for delay-sensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance evaluation of list scheduling heuristics for task graphs without communication costs

    Publication Year: 2000, Page(s):421 - 428
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB)

    Proposes three new static scheduling algorithms for allocating task graphs without communication costs to fully connected multiprocessors. The proposed algorithms, called MCP/ABS, MCP/CLR and MCP/CLRR, are based on the well-known MCP (modified critical path) algorithm, and all of them have the same complexity of O(v2log v), where v is the number of nodes in the task graph. A global comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in URL switching for implementing globally distributed Web sites

    Publication Year: 2000, Page(s):89 - 94
    Cited by:  Papers (7)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    URL, or layer-5, switches can be used to implement locally and globally distributed Web sites. URL switches must be able to exploit knowledge of server load and content (e.g., of reverse caches). Implementing globally distributed Web sites offers difficulties not present in local server clusters due to bandwidth and delay constraints in the Internet. With delayed load information, server selection... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heterogeneous parallelization of the Linkmap program

    Publication Year: 2000, Page(s):353 - 360
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    Sequential genetic algorithms have many successful applications in very different domains, but they have a main drawback in their utilization. Evaluations are very time-consuming, e.g., a pedigree consisting of fifty-five nodes takes about seventy minutes on a DEC-Alpha processor and about two hundred and seventy minutes on a 166 MHz Pentium for certain likelihood calculations. This time increases... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient image fusion

    Publication Year: 2000, Page(s):291 - 296
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. This concept uses replication to achieve fault tolerance, but goes further to dynamically regenerate replication in response to an attack or failu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task concurrency management experiment for power-efficient speed-up of embedded MPEG4 IM1 player

    Publication Year: 2000, Page(s):453 - 460
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Addresses the concurrent task management of complex multimedia systems, like the MPEG4 IM1 (IMplementation 1) player. Starting with a critical part of the code in the IM1 player, we extracted the concurrency hidden by implementation decisions and represented it with our “grey-box” modeling approach. Based on this “grey-box” model, high-level transformations have been made t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The parallel waveform IQMR algorithm for transient simulation of semiconductor devices

    Publication Year: 2000, Page(s):373 - 380
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    We mainly study the parallelization aspects of the accelerated waveform relaxation algorithms for the transient simulation of semiconductor devices on parallel distributed memory computers since these methods are competitive with standard pointwise methods on serial machines, but are significantly faster on parallel computers. We propose an improved version of the quasi-minimal residual (IQMR) met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network

    Publication Year: 2000, Page(s):479 - 483
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Virtual private networks (VPNs) enable companies to connect geographically dispersed offices and remote workers via secure links to the private company network, using the public Internet as a backbone. Specially, VPN service in the broadband data communication network is very important and necessary to take in users who want to specify group communication. VPN mechanisms are needed which work over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a communication optimization model in network-based parallel computing

    Publication Year: 2000, Page(s):411 - 418
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB)

    Network based distributed computing has been gaining popularity over the past decade. Many parallel programming languages and related parallel programming modes are becoming widely accepted. However, the execution of parallel applications on distributed systems has been hampered by the high communication overhead. To reduce the communication overhead and the completion time of a parallel applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timeliness of service discovery in DEAPspace

    Publication Year: 2000, Page(s):73 - 80
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    A new algorithm is presented, through which a computing device can detect the presence of neighbouring devices, share configuration and service information with those devices, and also notice when devices become unavailable. Targeted for wireless ad-hoc, single-hop networks, this solution reduces the number of transmissions required from individual devices. The effectiveness of this algorithm is d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification of a Scilab meta-computing extension

    Publication Year: 2000, Page(s):207 - 214
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Scilab is an application for numerical algebraic computations developed in the Meta-2 INRIA project. This program contains a toolbox allowing the realization of complex simulations with high transparency for the user. Nevertheless, computation times and data sizes may be quite large. Thus it seems interesting to provide an access to the power of parallel computers to the Scilab users. A parallel v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient RPC scheme in mobile CORBA environment

    Publication Year: 2000, Page(s):575 - 582
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    CORBA RPC calling in the current mobile environment is suffering from poor performance and insufficient support of disconnection. This greatly degrades the reliability of services and upsets user's expectation. To improve the reliability and performance and provide adequate support to involuntary disconnection of mobile clients, RPC Proxy is introduced in this paper. The impact of handoff and disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A jump and look all round long range image restoration and its parallelism

    Publication Year: 2000, Page(s):285 - 290
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    An image information restoration algorithm based on long-range correlation (LR-IIRA) can be efficiently applied in image interpretation, restoration and error concealment. However, this algorithm requires excessive computing time, which restricts its application to large-scale problems and real-time problems. We propose an improved LR-IIRA, named jumping and looking all round (JL-LR-IIRA). By usin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization and enhancement of dynamic mapping heuristics for heterogeneous systems

    Publication Year: 2000, Page(s):437 - 444
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB)

    Clusters of heterogeneous PCs/workstations have become attractive systems for executing a set of computationally intensive independent tasks. This paper focuses on scheduling schemes in a dynamic context - i.e. where scheduling decisions are made periodically as jobs arrive, in contrast to static scheduling where scheduling is performed after all jobs have been submitted. The paper characterizes d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of distributed algorithms for mining association rules on workstation cluster

    Publication Year: 2000, Page(s):361 - 368
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    The mining of association rules is one of the database mining techniques used to extract useful information from large quantities of data. Finding association rules, however, requires that the transaction database be scanned repeatedly, and we need to handle very large amounts of transaction data. This requires an incredibly large amount of computation time. There have therefore been many attempts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling the runtime of scientific programs on parallel computers

    Publication Year: 2000, Page(s):307 - 314
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Message passing programs for parallel machines with a distributed address space using communication operations of portable communication libraries such as PVM and MPI guarantee portability for most of the parallel machines available. But due to specific implementations of the runtime libraries on each specific platforms, the same program may have different runtimes on different machines, i.e., the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balancing Web server load for adaptable video distribution

    Publication Year: 2000, Page(s):469 - 476
    Cited by:  Papers (2)  |  Patents (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    As Web infrastructures continue to develop, the need to have network-sensitive Web servers will continue become more important. In particular, current network routers do not bias against flows that use more than their fair share of bandwidth. In the future, however, this will not be true, requiring the Web servers to be network-sensitive. In this paper, we investigate techniques for balancing Web ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor Information Networking Architecture

    Publication Year: 2000, Page(s):23 - 30
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    The advent of technology has facilitated the development of networked systems of extremely small, low-power devices that combine programmable general-purpose computing with multiple sensing and wireless communication capability. This networked system of programmable sensor nodes, which together form a sensor network, poses unique challenges on how information collected by, and stored within, the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NinjaMail: the design of a high-performance clustered, distributed e-mail system

    Publication Year: 2000, Page(s):151 - 158
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    In today's Internet era, electronic mail is replacing telephony and postal mail as the primary means of communication for hundreds of millions of individuals. Free e-mail services, such as Microsoft's Hotmail and Yahoo's Yahoo Mail, each have tens of millions of subscribers. However, these and other current e-mail systems unfortunately are nor capable of handling the scale of Internet e-mail use, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load balancing study in PCS wireless networks

    Publication Year: 2000, Page(s):513 - 520
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    Wireless networking technologies and mobile cellular communication systems are growing at an ever faster rate, and this is likely to continue in the foreseeable future. Higher reliability, better coverage and services, higher capacity, mobility management, and wireless multimedia are all parts of the potpourri. The evolution of new systems and improved designs will always depend on the ability to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient multicast in heterogeneous networks of workstations

    Publication Year: 2000, Page(s):403 - 410
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    This paper studies the problem of efficient multicast in heterogeneous networks of workstations (HNOWs) using a parameterized communication model. This model associates a sending overhead and a receiving overhead with each node as well as a network latency parameter. The problem of finding optimal multicasts in this model is known to be NP-complete in the strong sense. Nevertheless, we show that f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.