Parallel and Distributed Processing and Applications: Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings

Overview

This book constitutes the refereed proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005, held in Nanjing, China in November 2005. The 90 revised full papers and 19 revised short papers presented together with 3 keynote speeches and 2 tutorials were carefully reviewed and selected from 645 submissions. The papers are organized in topical sections on cluster systems and applications, performance evaluation and measurements, distributed algorithms and ...

See more details below
Paperback (2005)
$219.00
BN.com price
Other sellers (Paperback)
  • All (13) from $3.99   
  • New (9) from $78.63   
  • Used (4) from $3.99   
Sending request ...

Overview

This book constitutes the refereed proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications, ISPA 2005, held in Nanjing, China in November 2005. The 90 revised full papers and 19 revised short papers presented together with 3 keynote speeches and 2 tutorials were carefully reviewed and selected from 645 submissions. The papers are organized in topical sections on cluster systems and applications, performance evaluation and measurements, distributed algorithms and systems, fault tolerance and reliability, high-performance computing and architecture, parallel algorithms and systems, network routing and communication algorithms, security algorithms and systems, grid applications and systems, database applications and data mining, distributed processing and architecture, sensor networks and protocols, peer-to-peer algorithms and systems, internet computing and Web technologies, network protocols and switching, and ad hoc and wireless networks.

Read More Show Less

Product Details

Table of Contents

Keynote Speech.- Data Structures and Algorithms for Packet Forwarding and Classification.- Using Speculative Multithreading for General-Purpose Applications.- Towards Peta-Bit Photonic Networks.- Tutorial.- Technologies and Considerations for Developing Internet and Multiplayer Computer Games: A Tutorial.- Routing in 2-D Meshes: A Tutorial.- Session 1A: Cluster Systems and Applications.- RDIM: A Self-adaptive and Balanced Distribution for Replicated Data in Scalable Storage Clusters.- Modeling and Analysis of a Parallel Nested Loop Join on Cluster Architectures.- Scheduling Efficiently for Irregular Load Distributions in a Large-scale Cluster.- A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems.- Reducing the Overhead of Intra-Node Communication in Clusters of SMPs.- Session 1B: Performance Evaluation and Measurements.- On Service-Oriented Network Measurement Architecture with Mobile Agent.- Pathtrait: A Tool for Tight Link Location and End-to-End Available Bandwidth Measurement.- Performance Evaluation of a Self-organized Hierarchical Topology for Update of Replicas in a Large Distributed System.- A Proposal of Reconfigurable MPI Collective Communication Functions.- Session 1C: Distributed Algorithms and Systems.- Design and Evaluation of Network-Bandwidth-Based Parallel Replication Algorithm.- A Quorum Based Group k-Mutual Exclusion Algorithm for Open Distributed Environments.- An Efficient Implementation of the Backtesting of Trading Strategies.- Reconfigurable Object Consistency Model for Distributed Shared Memory.- Session 1D: Fault Tolerance and Reliability.- ER-TCP: An Efficient Fault-Tolerance Scheme for TCP Connections.- Online Adaptive Fault-Tolerant Routing in 2D Torus.- Replicating Multithreaded Web Services.- Design Schemes and Performance Analysis of Dynamic Rerouting Interconnection Networks for Tolerating Faults and Preventing Collisions.- RRBS: A Fault Tolerance Model for Cluster/Grid Parallel File System.- Session 2A: High-Performance Computing and Architecture I.- Fast Parallel FFT on CTaiJi: A Coarse-Grained Reconfigurable Computation Platform.- Integrating Local Job Scheduler – LSF TM with Gfarm TM .- Cache Management for Discrete Processor Architectures.- Enhancing DCache Warn Fetch Policy for SMT Processors.- Aggressive Loop Fusion for Improving Locality and Parallelism.- Session 2B: Parallel Algorithms and Systems I.- An Upper Bound on Blocking Probability of Vertical Stacked Optical Benes Networks.- It’s Elementary, My Dear Watson: Time-Optimal Sorting Algorithms on a Completely Overlapping Network.- Lock-Free Parallel Garbage Collection.- Adaptive Parallel Ant Colony Optimization.- Collective Communications for Scalable Programming.- Session 2C: Network Routing and Communication Algorithms I.- A Fast and Scalable Conflict Detection Algorithm for Packet Classifiers.- Loss Rate Aware Preferential Treamtment Scheme at the Congested Router.- A Heuristic Routing Algorithm for Degree-Constrained Minimum Overall Latency Application Layer Multicast.- DIRA: Distributed Insertion and Relocation Routing Algorithm for Overlay Multicast in Diffserv Domain.- Load Balancing Based on Similarity Multi-paths Routing.- Session 2D: Security Algorithms and Systems I.- Secure Real-Time Transaction Processing with Timeliness Guarantees in Mobile Distributed Real-Time Database Systems.- A New Data Fusion Model of Intrusion Detection-IDSFP.- The Application of Collaborative Filtering for Trust Management in P2P Communities.- Intelligent DDoS Packet Filtering in High-Speed Networks.- Session 3A: High-Performance Computing and Architecture II.- 2L-MuRR: A Compact Register Renaming Scheme for SMT Processors.- Scheduling Convex Bipartite Communications Toward Efficient GEN_BLOCK Transformations.- A Chronological History-Based Execution Time Estimation Model for Embarrassingly Parallel Applications on Grids.- Developing High-Performance Parallel Applications Using EPAS.- On Utilization of the Grid Computing Technology for Video Conversion and 3D Rendering.- Session 3B: Parallel Algorithms and Systems II.- Communication-Free Data Alignment for Arrays with Exponential References Using Elementary Linear Algebra.- Parallel Unstructured Quadrilateral Mesh Generation.- Container Problem in Burnt Pancake Graphs.- A Cost Optimal Parallel Quicksorting and Its Implementation on a Shared Memory Parallel Computer.- Session 3C: Network Routing and Communication Algorithms II.- Near Optimal Routing in a Small-World Network with Augmented Local Awareness.- Systolic Routing in an Optical Fat Tree.- Fast Total-Exchange Algorithm.- MFLWQ: A Fair and Adaptive Queue Management Algorithm for Scavenger Service.- Session 3D: Security Algorithms and Systems II.- CBTM: A Trust Model with Uncertainty Quantification and Reasoning for Pervasive Computing.- An Authentication Prool for Pervasive Computing.- A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection.- Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack.- Session 4A: Grid Applications and Systems.- Study on Equipment Interoperation Chain Model in Grid Environment.- Grid Accounting Information Service with End-to-End User Identity.- Performance Analysis and Prediction on VEGA Grid.- An Accounting Services Model for ShanghaiGrid.- An Agent-Based Grid Computing Infrastructure.- Session 4B: Database Applications and Data Mining.- Dynamically Mining Frequent Patterns over Online Data Streams.- Clustering Mixed Type Attributes in Large Dataset.- Mining Association Rules from Multi-stream Time Series Data on Multiprocessor Systems.- Mining Frequent Closed Itemsets Without Candidate Generation.- Distribution Design in Distributed Databases Using Clustering to Solve Large Instances.- Session 4C: Distributed Processing and Architecture.- Modeling Real-Time Wormhole Networks by Queuing Theory.- A Discrete Event System Model for Simulating Mobile Agent.- A Holistic Approach to Survivable Distributed Information System for Critical Applications.- A Personalized and Scalable Service Broker for the Global Computing Environment.- Distributed Network Computing on Transient Stability Analysis and Control.- Session 4D: Sensor Networks and Prools.- A Distributed Power-Efficient Data Gathering and Aggregation Prool for Wireless Sensor Networks.- A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks.- A Clustering Mechanism with Various Cluster Sizes for the Sensor Network.- Percentage Coverage Configuration in Wireless Sensor Networks.- Session 5A: Peer-to-Peer Algorithms and Systems I.- A Fault-Tolerant Content Addressable Network.- Effective Resource Allocation in a JXTA-Based Grid Computing Platform JXTPIA.- A Generic Approach to Make Structured Peer-to-Peer Systems Topology-Aware.- A Workflow Management Mechanism for Peer-to-Peer Computing Platforms.- Session 5B: Internet Computing and Web Technologies I.- DDSQP: A WSRF-Based Distributed Data Stream Query System.- Quantitative Analysis of Zipf’s Law on Web Cache.- An Adaptive Web Caching Method Based on the Heterogeneity of Web Object.- Supporting Wireless Web Page Access in Mobile Environments Using Mobile Agents.- Session 5C: Network Prools and Switching I.- TCP and ICMP in Network Measurement: An Experimental Evaluation.- Fuzzy Congestion Avoidance in Communication Networks.- A New Method of Network Data Link Troubleshooting.- Ethernet as a Lossless Deadlock Free System Area Network.- Session 5D: Ad Hoc and Wireless Networks I.- An Anycast-Based Geocasting Prool for Mobile Ad Hoc Networks.- A Mesh Based Anycast Routing Prool for Ad Hoc Networks.- Research of Power-Aware Dynamic Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks.- GCPM: A Model for Efficient Call Admission Control in Wireless Cellular Networks.- Session 6A: Peer-to-Peer Algorithms and Systems II.- Cross-Layer Flow Control Based on Path Capacity Prediction for Multi-hop Ad Hoc Network.- Constructing the Robust and Efficient Small World Overlay Network for P2P Systems.- Transparent Java Threads Migration Prool over Peer2Peer.- Analytic Performance Modeling of a Fully Adaptive Routing Algorithm in the Torus.- Redundancy Schemes for High Availability in DHTs.- VIP: A P2P Communication Platform for NAT Traversal.- Session 6B: Internet Computing and Web Technologies II.- Hyper-Erlang Based Model for Network Traffic Approximation.- Prediction-Based Multicast Mobility Management in Mobile Internet.- A Rule-Based Workflow Approach for Service Composition.- Manage Distributed Ontologies on the Semantic Web.- Session 6C: Network Prools and Switching II.- Next Generation Networks Architecture and Layered End-to-End QoS Control.- FairOM: Enforcing Proportional Contributions Among Peers in Internet-Scale Distributed Systems.- An Efficient QoS Framework with Distributed Adaptive Resource Management in IPv6 Networks.- Scheduling Latency Insensitive Computer Vision Tasks.- Session 6D: Ad Hoc and Wireless Networks II.- Throughput Analysis for Fully-Connected Ad Hoc Network with Multiuser Detection.- Dynamic Traffic Grooming for Survivable Mobile Networks – Fairness Control.- An Efficient Cache Access Prool in a Mobile Computing Environment.- Implementation and Performance Study of Route Caching Mechanisms in DSR and HER Routing Algorithms for MANET.- An Effective Cluster-Based Slot Allocation Mechanism in Ad Hoc Networks.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)