Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops

4-7 July 2000

Filter Results

Displaying Results 1 - 25 of 84
  • Proceedings Seventh International Conference on Parallel and Distributed Systems: Workshops

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (457 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):561 - 563
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • An adaptive object storage system for mobile computers

    Publication Year: 2000, Page(s):335 - 342
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    This paper describes an adaptive object storage system for mobile computing environments. The object storage system adopts the object graph framework and changes the configuration of its structure according to computing environments. The object graph framework that is proposed in the paper is a useful technique for building adaptive software View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy enhanced access control by SPKI

    Publication Year: 2000, Page(s):301 - 306
    Cited by:  Papers (3)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    In Internet and electronic commerce applications, a user may want to access servers as anonymous with an authorized certificate. In this paper, such privacy-enhanced service scheme is presented by using Simple Public Key Infrastructure (SPKI). A certificate of SPKI carries as few information on clients as possible compared to a certificate of PKIX (Public Key Infrastructure with X.509). After obta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • “Web-CALL”: a language learning support system using Internet

    Publication Year: 2000, Page(s):326 - 331
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB)

    The online language learning support system, “Web-CALL” is the software that enables language teachers to produce web-based teaching materials and enables students to study them online. It is the user-friendly software which even beginners in computers can use easily. Teachers can produce Web-page materials without knowledge of HTML or any computer programming. Students can study at th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An advanced Internet XML/EDI model based on secure XML documents

    Publication Year: 2000, Page(s):295 - 300
    Cited by:  Papers (1)  |  Patents (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    In this paper, we propose an advanced Internet XML/EDI model that allows an Application Service Provider (ASP) to provide purchasing application services over the Internet. The model allows trading partners (buyers and suppliers) to securely exchange XML-based business documents over the Internet via the ASP, instead of traditional Electronic Data Interchange (EDI)-based messages via value-added n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A presetting location strategy for personal communication using hierarchical location database

    Publication Year: 2000, Page(s):349 - 354
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    We propose a new strategy of location management, presetting approach, for hierarchical database architecture in the mobile computing environment. When a called receiver leaves its old registration area, our strategy is to store its new registration address to its previous caller's location database. Our presetting strategy will only need one more database updating than the caching strategy. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Process division in haptic display system

    Publication Year: 2000, Page(s):219 - 224
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    This paper proposes a novel inter-process communication, between a virtual world manager with slow update rate and a haptic controller with fast update rate, which incorporates the integrated force given from the user to the world. High-speed refresh rate, generally 1 kHz, is required to present stiff virtual objects that have spring-damper characteristic with haptic display. On the other hand, th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tracking frequent traversal areas in a Web site via log analysis

    Publication Year: 2000, Page(s):321 - 325
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    In this paper, we explore the problem of analyzing frequently traversed spots in a Web site. We first construct a support knowledge base from Web logs and formulate the problem of tracking frequent traversal areas as a problem of finding strongly connected components in a digraph. We successfully incorporated the tracking features into our test Web site. Our experiments show that our approach can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual simulation of snowfall, snow cover and snowmelt

    Publication Year: 2000, Page(s):187 - 194
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    Creation of seasonal scenery images by computer graphics is an attractive theme with many problems to be solved. This paper presents a method of expressing snow to create natural scenery image in winter. We describe a method of automatically creating the behavior of snowflakes in a field of air currents with respect to snowfall, a method of automatically creating shapes of snow accumulation by usi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hierarchical model of mobile agents and its multimedia applications

    Publication Year: 2000, Page(s):103 - 108
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    This paper presents a new framework for constructing networked applications, including multimedia ones. The framework is based on a hierarchical mobile agent system for allowing more than one mobile agent to be dynamically assembled into a single mobile agent. Networked applications constructed in the framework can be implemented as a collection of mobile agents and can dynamically change and evol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating the parallel performance of IQMR method for unsymmetric large and sparse linear systems

    Publication Year: 2000, Page(s):539 - 546
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    For the solutions of linear systems of equations with unsymmetric coefficient matrices, we have proposed an improved version of the quasi-minimal residual (IQMR) method by using the Lanczos process as a major component combining elements of numerical stability and parallel algorithm design. The algorithm is derived such that all inner products and matrix-vector multiplications of a single iteratio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visual simulation of crack pattern based on 3D surface cellular automaton

    Publication Year: 2000, Page(s):181 - 186
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (688 KB)

    This article describes a method for modeling the propagation of cracks on any 3D surface. Taking a previous cellular automata model as basis, this method allows any type of cracks on any type of triangulated 3D object. Our model's main advantage is that it proposes a semi-physical solution, making it at the same time user controllable and easily extensible. After summarizing works in the literatur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Theoretic framework of network feedback control with long delays

    Publication Year: 2000, Page(s):275 - 280
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    It is well known that feedback control may be difficult in a network with long propagation delays (with large bandwidth-delay products). The focus of this article is to provide a theoretical framework of various feedback-based congestion control techniques. Two broad classes of control algorithms are presented: source- and switch (network)-intelligence models. In a source-intelligence model, traff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet loss detection scheme for retransmission-based real-time data transfer

    Publication Year: 2000, Page(s):49 - 54
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Since retransmission-based error control for real-time communication will be feasible in the future high speed network environment, we have proposed R3TP (retransmission based reliable real-time data transfer protocol). R3TP is a transport layer protocol which provides high quality real-time data transfer by adopting ATM block transfer (ABT) and retransmission-based error con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of two rate punctured convolutional code scheme for wireless ATM networks

    Publication Year: 2000, Page(s):97 - 102
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    In wireless asynchronous transfer mode (ATM), the affect of a channel bit error varies significantly from the header to various payloads of a cell. Hence, to make the best available use of the limited channel coding redundancy, the paper proposes a two-rate punctured convolutional code (PCC) scheme with flexible unequal error protection (UEP) to apply to wireless ATM cell. In this paper, their per... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence of the dynamic page aggregation on the speedup of Nautilus DSM system

    Publication Year: 2000, Page(s):530 - 535
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    This paper introduces the dynamic aggregation of pages in Nautilus, which main features are: lock-based scope consistency, multithreaded and page-based DSM system. The dynamic aggregation consists in considering a larger granularity's unit than a page, in a page-based DSM system. The first results show that this technique can improve the Nautilus's speedup up to 29%. The benchmarks evaluated in th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A minimal infrastructure shell for supporting cooperative agents in heterogeneous distributed environments

    Publication Year: 2000, Page(s):453 - 458
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (572 KB)

    As the Internet grows in both physical size as well as social and economic importance it also becomes far more complex and difficult to manage the vast amounts of information present. This has over recent years resulted in an effort to utilise agent technologies to support our human activities in this very complex distributed environment. While the architectural aspects of agents and their operati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LC-RTP (loss collection RTP): reliability for video caching in the Internet

    Publication Year: 2000, Page(s):281 - 286
    Cited by:  Papers (7)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    The increasing amount of audio-visual (AV) content that is offered by web sites leads to a network bandwidth and storage capacity problem. Caching is one of the techniques that can ease this problem. But even in a caching system the distribution of data (i.e. the AV content) should be bandwidth-efficient. Furthermore the delivery to the end-user must regard the restrictions implied by real-time da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A world wide supermarket scheme using rights trading system

    Publication Year: 2000, Page(s):289 - 294
    Cited by:  Papers (2)  |  Patents (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    This paper presents a new electronic commerce scheme that provides consumers with a one stop check-out service for the purchase of a set of items from multiple autonomous shops. In this scheme, a consumer collects a transaction ticket, a specific form of digital-right, from each shop for each purchase representing the right to said purchase, and transfers the collected tickets to a check-out agent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet scheduling in a combined input and output queued switch using virtual time reference system

    Publication Year: 2000, Page(s):239 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (948 KB)

    There is an increasing demand for Internet core nodes to have (1) quality-of-service (QoS) guarantees and (2) higher switching capacity. The combined input and output queued (CIOQ) switching has been shown to be a promising solution to meet such demand. However, many of the proposed scheduling algorithms for a CIOQ switch cannot be practically implemented due to problems from scalability and compl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework to support alternative paths to provide the better end-to-end performance on the Internet

    Publication Year: 2000, Page(s):269 - 274
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    A common requirement to improve the end-to-end performance on the Internet is critical because the Internet becomes an infrastructure of our daily life. There have been many research studies to understand characteristics of the inside of the Internet and to try to improve the end-to-end performance with caching technologies in application programs. This paper proposes a new framework to improve th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determining WWW user agents from server access log

    Publication Year: 2000, Page(s):173 - 178
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    It is a common practice to analyze an access log of an WWW server to obtain data, such as user agent vendor percentage, supplying information more suitably, or to measure information exposure rate (mainly for advertisement effectiveness). HTTP does have an “User-Agent” header to let user agents supply their product names for these kinds of use, but in fact relying solely on this tends ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteeing multiple QoSs in differentiated services Internet

    Publication Year: 2000, Page(s):233 - 238
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    In this paper, we propose a new architecture for guaranteeing the multiple Quality of Services (QoSs) in Differentiated Service Internet. We take into account the IETF's Differentiated Service (DiffServ) architecture as well as the QoS requirements of each user application. The main focus lies in the modeling and performance evaluation of the prioritized packet service scheme in the core router wh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network based genetic algorithm

    Publication Year: 2000, Page(s):15 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Parallel genetic algorithms are effective for solving large problems. Most of them are implemented on a massive parallel computer and the efficiency depends on the parallel computing system. It is inappropriate to implement them in a distributed computing system connected by a network. The paper proposes a client-server based approach to parallel genetic algorithms with a delegate management model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.