Parallel and Distributed Processing and Applications: Second International Symposium, ISPA 2004, Hong Kong, China, December 13-15, 2004, Proceedings

Overview

This book constitutes the refereed proceedings of the Second International Symposium on Parallel and Distributed Processing and Applications, ISPA 2004, held in Hong Kong, China in December 2004.

The 78 revised full papers and 38 revised short papers presented were carefully reviewed and selected from 361 submissions. The papers are organized in topical sections on parallel algorithms and systems, data mining and management, distributed algorithms and systems, fault tolerance ...

See more details below
Paperback (2005)
$193.17
BN.com price
(Save 7%)$209.00 List Price
Other sellers (Paperback)
  • All (10) from $1.99   
  • New (5) from $1.99   
  • Used (5) from $20.00   
Sending request ...

Overview

This book constitutes the refereed proceedings of the Second International Symposium on Parallel and Distributed Processing and Applications, ISPA 2004, held in Hong Kong, China in December 2004.

The 78 revised full papers and 38 revised short papers presented were carefully reviewed and selected from 361 submissions. The papers are organized in topical sections on parallel algorithms and systems, data mining and management, distributed algorithms and systems, fault tolerance prools and systems, sensor networks and prools, cluster systems, grid applications and systems, peer-to-peer and ad hoc networking, grid scheduling and algorithms, data replication and caching, software engineering and testing, grid prools, context-aware and mobile computing, distributed routing and switching prools, cluster resource scheduling and algorithms, security, high performance processing, networking and prools, artificial intelligence systems, hardware architecture and implementations, high performance computing architecture, and distributed systems architecture.

Read More Show Less

Product Details

Table of Contents

Keynote Speech.- Present and Future Supercomputer Architectures.- Challenges in P2P Computing.- Multihop Wireless Ad Hoc Networking: Current Challenges and Future Opportunities.- Session 1A: Parallel Algorithms and Systems I.- An Inspector-Executor Algorithm for Irregular Assignment Parallelization.- Multi-grain Parallel Processing of Data-Clustering on Programmable Graphics Hardware.- A Parallel Reed-Solomon Decoder on the Imagine Stream Processor.- Effective Nonblocking MPI-I/O in Remote I/O Operations Using a Multithreaded Mechanism.- Session 1B: Data Mining and Management.- Asynchronous Document Dissemination in Dynamic Ad Hoc Networks.- Location-Dependent Query Results Retrieval in a Multi-cell Wireless Environment.- An Efficient Mobile Data Mining Model.- An Integration Approach of Data Mining with Web Cache Pre-fetching.- Session 1C: Distributed Algorithms and Systems.- Towards Correct Distributed Simulation of High-Level Petri Nets with Fine-Grained Partitioning.- M-Guard: A New Distributed Deadlock Detection Algorithm Based on Mobile Agent Technology.- Meta-based Distributed Computing Framework.- Locality Optimizations for Jacobi Iteration on Distributed Parallel Systems.- Session 2A: Fault Tolerance Prools and Systems.- Fault-Tolerant Cycle Embedding in the WK-Recursive Network.- RAIDb: Redundant Array of Inexpensive Databases.- A Fault-Tolerant Multi-agent Development Framework.- A Fault Tolerance Prool for Uploads: Design and Evaluation.- Topological Adaptability for the Distributed Token Circulation Paradigm in Faulty Environment.- Session 2B: Sensor Networks and Prools.- Adaptive Data Dissemination in Wireless Sensor Networks.- Continuous Residual Energy Monitoring in Wireless Sensor Networks.- Design and Analysis of a k-Connected Topology Control Algorithm for Ad Hoc Networks.- On Using Temporal Consistency for Parallel Execution of Real-Time Queries in Wireless Sensor Systems.- Session 2C: Cluster Systems and Applications.- Cluster-Based Parallel Simulation for Large Scale Molecular Dynamics in Microscale Thermophysics.- Parallel Checkpoint/Recovery on Cluster of IA-64 Computers.- Highly Reliable Linux HPC Clusters: Self-Awareness Approach.- An Enhanced Message Exchange Mechanism in Cluster-Based Mobile Ad Hoc Networks,.- Session 3A: Parallel Algorithms and Systems II.- Algorithmic-Parameter Optimization of a Parallelized Split-Step Fourier Transform Using a Modified BSP Cost Model.- Parallel Volume Rendering with Early Ray Termination for Visualizing Large-Scale Datasets.- A Scalable Low Discrepancy Point Generator for Parallel Computing.- Generalized Trellis Stereo Matching with Systolic Array.- Optimal Processor Mapping Scheme for Efficient Communication of Data Realignment.- Session 3B: Grid Applications and Systems.- MCCF: A Distributed Grid Job Workflow Execution Framework.- Gamelet: A Mobile Service Component for Building Multi-server Distributed Virtual Environment on Grid.- The Application of Grid Computing to Real-Time Functional MRI Analysis.- Building and Accessing Grid Services.- DRPS: A Simple Model for Locating the Tightest Link.- Session 3C: Peer-to-Peer and Ad-Hoc Networking.- A Congestion-Aware Search Prool for Unstructured Peer-to-Peer Networks.- Honeycomb: A Peer-to-Peer Substrate for On-Demand Media Streaming Service.- An Improved Distributed Algorithm for Connected Dominating Sets in Wireless Ad Hoc Networks.- A New Distributed Approximation Algorithm for Constructing Minimum Connected Dominating Set in Wireless Ad Hoc Networks.- An Adaptive Routing Strategy Based on Dynamic Cache in Mobile Ad Hoc Networks.- Session 4A: Grid Scheduling and Algorithms I.- On the Job Distribution in Random Brokering for Computational Grids.- Dividing Grid Service Discovery into 2-Stage Matchmaking.- Performance Evaluation of a Grid Computing Architecture Using Realtime Network Monitoring.- Quartet-Based Phylogenetic Inference: A Grid Approach.- Scheduling BoT Applications in Grids Using a Slave Oriented Adaptive Algorithm.- Session 4B: Data Replication and Caching.- A Clustering-Based Data Replication Algorithm in Mobile Ad Hoc Networks for Improving Data Availability.- CACHERP: A Novel Dynamic Cache Size Tuning Model Working with Relative Object Popularity for Fast Web Information Retrieval.- Implementation of a New Cache and Schedule Scheme for Distributed VOD Servers.- Session 4C: Software Engineering and Testing.- UML Based Statistical Testing Acceleration of Distributed Safety-Critical Software.- A Metamodel for the CMM Software Process.- Performance Tuning for Application Server OnceAS.- Systematic Robustness-Testing RI-Pro of BGP.- Session 5A: Grid Prools.- MPICH-GP: A Private-IP-Enabled MPI Over Grid Environments.- Paradigm of Multiparty Joint Authentication: Evolving Towards Trust Aware Grid Computing.- Design and Implementation of a 3A Accessing Paradigm Supported Grid Application and Programming Environment.- VAST: A Service Based Resource Integration System for Grid Society.- Petri-Net-Based Coordination Algorithms for Grid Transactions.- Session 5B: Context- ware and Mobile Computing.- Building Infrastructure Support for Ubiquitous Context-Aware Systems.- Context-Awareness in Mobile Web Services.- CRL: A Context-Aware Request Language for Mobile Computing.- A Resource Reservation Prool for Mobile Cellular Networks.- Session 5C: Distributed Routing and Switching Prools I.- Using the Linking Model to Understand the Performance of DHT Routing Algorithms.- Packet-Mode Priority Scheduling for Terabit Core Routers.- Node-to-Set Disjoint Paths Problem in Bi-rotator Graphs.- QoSRHMM: A QoS-Aware Ring-Based Hierarchical Multi-path Multicast Routing Prool.- Session 6A : Grid Scheduling and Algorithms II.- A Dynamic Task Scheduling Algorithm forGrid Computing System.- Replica Selection on Co-allocation Data Grids.- A Novel Checkpoint Mechanism Based on Job Progress Description for Computational Grid.- A Peer-to-Peer Mechanism for Resource Location and Allocation Over the Grid.- The Model, Architecture and Mechanism Behind Realcourse.- Session 6B: Cluster Resource Scheduling and Algorithms.- Managing Irregular Workloads of Cooperatively Shared Computing Clusters.- Performance-Aware Load Balancing for Multiclusters.- Scheduling of a Parallel Computation-Bound Application and Sequential Applications Executing Concurrently on a Cluster – A Case Study.- Sequential and Parallel Ant Colony Strategies for Cluster Scheduling in Spatial Databases.- Session 6C: Distributed Routing and Switching Prools I.- Cost-Effective Buffered Wormhole Routing.- Efficient Routing and Broadcasting Algorithms in de Bruijn Networks.- Fault-Tolerant Wormhole Routing Algorithm in 2D Meshes Without Virtual Channels.- Fault Tolerant Routing Algorithm in Hypercube Networks with Load Balancing Support.- Session 7A: Security I.- Proxy Structured Multisignature Scheme from Bilinear Pairings.- A Threshold Proxy Signature Scheme Using Self-Certified Public Keys.- The Authentication and Processing Performance of Session Initiation Prool (SIP) Based Multi-party Secure Closed Conference System.- Session 7B: High Performance Processing and Applications.- A Method for Authenticating Based on ZKp in Distributed Environment.- A Load-Balanced Parallel Algorithm for 2D Image Warping.- A Parallel Algorithm for Helix Mapping Between 3D and 1D Protein Structure Using the Length Constraints.- A New Scalable Parallel Method for Molecular Dynamics Based on Cell-Block Data Structure.- Parallel Transient Stability Simulation for National Power Grid of China.- HPL Performance Prevision to Intending System Improvement.- Session 7C: Networking and Prools I.- A Novel Fuzzy-PID Dynamic Buffer Tuning Model to Eliminate Overflow and Shorten the End-to-End Roundtrip Time for TCP Channels.- Communication Using a Reconfigurable and Reliable Transport Layer Prool.- Minicast: A Multicast-Anycast Prool for Message Delivery.- Dependable WDM Networks with Edge-Disjoint P-Cycles.- An Efficient Fault-Tolerant Approach for MPLS Network Systems.- Session 8A: Security II.- A Novel Technique for Detecting DDoS Attacks at Its Early Stage.- Probabilistic Inference Strategy in Distributed Intrusion Detection Systems.- An Authorization Framework Based on Constrained Delegation.- A Novel Hierarchical Key Management Scheme Based on Quadratic Residues.- Session 8B: Artificial Intelligence Systems and Applications.- Soft-Computing-Based Intelligent Multi-constrained Wavelength Assignment Algorithms in IP/DWDM Optical Internet.- Data Transmission Rate Control in Computer Networks Using Neural Predictive Networks.- Optimal Genetic Query Algorithm for Information Retrieval.- A Genetic Algorithm for Dynamic Routing and Wavelength Assignment in WDM Networks.- Session 8C: Networking and Prools II.- Ensuring E-Transaction Through a Lightweight Prool for Centralized Back-End Database.- Cayley DHTs — A Group-Theoretic Framework for Analyzing DHTs Based on Cayley Graphs.- BR-WRR Scheduling Algorithm in PFTS.- VIOLIN: Virtual Internetworking on Overlay Infrastructure.- Session 9A: Hardware Architectures and Implementations.- Increasing Software-Pipelined Loops in the Itanium-Like Architecture.- A Space-Efficient On-Chip Compressed Cache Organization for High Performance Computing.- A Real Time MPEG-4 Parallel Encoder on Software Distributed Shared Memory Systems.- A Case of SCMP with TLS.- Session 9B: High Performance Computing and Architecture.- SuperPAS: A Parallel Architectural Skeleton Model Supporting Extensibility and Skeleton Composition.- Optimizing I/O Server Placement for Parallel I/O on Switch-Based Irregular Networks.- Designing a High Performance and Fault Tolerant Multistage Interconnection Network with Easy Dynamic Rerouting.- Evaluating Performance of BLAST on Intel Xeon and Itanium2 Processors.- Session 9C: Distributed Processing and Architecture.- PEZW-ID: An Algorithm for Distributed Parallel Embedded Zerotree Wavelet Encoder.- Enhanced-Star: A New Topology Based on the Star Graph.- An RFID-Based Distributed Control System for Mass Customization Manufacturing.- Event Chain Clocks for Performance Debugging in Parallel and Distributed Systems.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)