Default Cover Image

2003 International Conference on Parallel Processing Workshops, 2003. Proceedings.

Oct. 6 2003 to Oct. 9 2003

Kaohsiung, Taiwan

ISSN: 1530-2016

ISBN: 0-7695-2018-9

Table of Contents

Proceedings 2003 International Conference on Parallel Processing WorkshopsFull-text access may be available. Sign in or learn about subscription options.
An energy efficient data reaccess scheme for data broadcast in mobile computing environmentsFull-text access may be available. Sign in or learn about subscription options.pp. 5,6,7,8,9,10,11,12
Load balancing on PC clusters with the super-programming modelFull-text access may be available. Sign in or learn about subscription options.pp. 63,64,65,66,67,68,69,70
Message from the Workshops ChairsFreely available from IEEE.pp. x
Program CommitteesFreely available from IEEE.pp. xi
Applications of Ad Hoc Networks (AANET)
Message from the ChairsFreely available from IEEE.pp. 3
Applications of Ad Hoc Networks (AANET)
An Energy Efficient Data Reaccess Scheme for Data Broadcast in Mobile Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 5
Applications of Ad Hoc Networks (AANET)
A Hierarchical Proxy Architecture with Load-based Scheduling Scheme to Support Network MobilityFull-text access may be available. Sign in or learn about subscription options.pp. 13
Applications of Ad Hoc Networks (AANET)
Hierarchical Protocol for Broadcast-Type Group CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 21
Applications of Ad Hoc Networks (AANET)
An Indoor Geolocation System for Wireless LANsFull-text access may be available. Sign in or learn about subscription options.pp. 29
Applications of Ad Hoc Networks (AANET)
A Simple Protocol for Dominating Set Construction in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 35
Applications of Ad Hoc Networks (AANET)
Resource Management Schemes for Bluetooth ScatternetsFull-text access may be available. Sign in or learn about subscription options.pp. 42
Applications of Ad Hoc Networks (AANET)
A Bluetooth Group-Scatternet Formation Algorithm for Efficient RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 50
Compile/Runtime Techniques for Parallel Computing (CRTPC)
Message from the Co-ChairsFreely available from IEEE.pp. 59
Session 1: Clusters
Load Balancing on PC Clusters with the Super-Programming ModelFull-text access may be available. Sign in or learn about subscription options.pp. 63
Session 1: Clusters
Memory Resource Considerations in the Load Balancing of Software DSM SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 71
Session 1: Clusters
A Dynamic Load Balancing Scheme for I/O-Intensive Applications in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 79
Session 2: Scheduling
A Scalable Task Duplication Based Algorithm for Improving the Schedulability of Real-Time Heterogeneous Multiprocessor SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 89
Session 2: Scheduling
Scheduling Directed A-cyclic Task Graphs on Heterogeneous Network of Workstations to Minimize Schedule LengthFull-text access may be available. Sign in or learn about subscription options.pp. 97
Session 2: Scheduling
A Fast Branch-and-Bound Scheme for the Multiprocessor Scheduling Problem with Communication TimeFull-text access may be available. Sign in or learn about subscription options.pp. 104
Session 3: Synchronization, Coteries, and Data Structures
Software Queue-Based Algorithms for Pipelined Synchronization on MultiprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 115
Session 3: Synchronization, Coteries, and Data Structures
Constructing Nondominated Local Coteries for Distributed Resource AllocationFull-text access may be available. Sign in or learn about subscription options.pp. 123
Session 3: Synchronization, Coteries, and Data Structures
Type-based Primitives for Distributed Data Structures: A Functional ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 131
High Performance Scientific and Engineering Computing with Applications (HPSECA)
Message from the ChairsFreely available from IEEE.pp. 141
High Performance Scientific and Engineering Computing with Applications (HPSECA)
Towards a Single System Image for High-Performance JavaFull-text access may be available. Sign in or learn about subscription options.pp. 143
Session: Scheduling
A High Performance, Low Complexity Algorithm for Compile-Time Job Scheduling in Homogeneous Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 149
Session: Scheduling
Loop-Synthesizing Transformation for Maintaining Parallelism and Enhancing LocalityFull-text access may be available. Sign in or learn about subscription options.pp. 156
Session: Scheduling
An O(p + log p) Algorithm of Discrete FGDLSFull-text access may be available. Sign in or learn about subscription options.pp. 164
Session: Parallel Applications
Performance Analysis of Approximate String Searching Implementations for Heterogeneous Computing PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 173
Session: Parallel Applications
A Computational-Grid Based System for Continental Drainage Network Extraction Using SRTM Digital Elevation ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 181
Session: Parallel Applications
Parallelization of Cellular Neural Networks for Image Processing on Cluster ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 191
Session: Biological Computing
Parallel Multi-Scale Computation Using the Message Passing InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 199
Session: Biological Computing
Molecular Fast Solution for Set-basis Problem on Sticker-based ModelFull-text access may be available. Sign in or learn about subscription options.pp. 205
Session: Biological Computing
Parallel Differential Evolutionary Algorithms for Physique States Characterization in BioengineeringFull-text access may be available. Sign in or learn about subscription options.pp. 213
Session: Parallel Algorithms
The Parallel Communication of Time-Dependent Monte Carlo TransportFull-text access may be available. Sign in or learn about subscription options.pp. 223
Session: Parallel Algorithms
A Parallel Tabu Search Heuristic for Clustering Data SetsFull-text access may be available. Sign in or learn about subscription options.pp. 230
Session: Parallel Algorithms
Neural Network Training Algorithms on Parallel Architectures for Finance ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 236
Session: Parallel Algorithms
Using a Distributed Active Tree in Java for the Parallel and Distributed Implementation of a Nested Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 244
Session: Computing Environment Support
From Distributed Sequential Computing to Distributed Parallel ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 255
Session: Computing Environment Support
A Visual Approach to Specifying Message-Passing OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 263
Session: Computing Environment Support
Grid Computing Pool and Its FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 271
Session: Distributed Applications
Adaptive Materialization in a Hierarchical Mediator SystemFull-text access may be available. Sign in or learn about subscription options.pp. 281
Session: Distributed Applications
A Self-determinant Scatternet Formation Algorithm for Multi-hop Bluetooth NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 289
Session: Distributed Applications
Automatic Detection of Multi-Level Deadlocks in Distributed Transaction Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 297
Session: Distributed Applications
A Fault-tolerant Routing Strategy for Gaussian Cube Using Gaussian TreeFull-text access may be available. Sign in or learn about subscription options.pp. 305
Optical Networks Control and Management (ONCM)
Message from the ChairsFreely available from IEEE.pp. 315
Optical Networks Control and Management (ONCM)
A Two-level TDM Access Protocol for IP Support in WDM Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 317
Optical Networks Control and Management (ONCM)
Practical Considerations of Using Tunable Lasers for Packet Routing in Multiwavelength Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 325
Optical Networks Control and Management (ONCM)
Toward Optimal Routing of Lightpaths in Dynamic WDM NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 332
Optical Networks Control and Management (ONCM)
Architecture Design of a Switching Chip inside Optical Ethernet SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 338
Wireless Security and Privacy (WiSPr)
Message from the Co-ChairsFreely available from IEEE.pp. 347
Session 1: Secure Routing
Trusting Routers and Relays in Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 351
Session 1: Secure Routing
Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 359
Session 1: Secure Routing
A Novel Mobile IP Registration Scheme for Hierarchical Mobility ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 367
Session 1: Secure Routing
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 375
Session 2: Group Key Management and Secure Multicasting
Group Keys and the Multicast Security in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 385
Session 2: Group Key Management and Secure Multicasting
An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function TreesFull-text access may be available. Sign in or learn about subscription options.pp. 391
Session 2: Group Key Management and Secure Multicasting
LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 397
Session 3: Future Applications
Perfect Secrecy in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 409
Session 3: Future Applications
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 417
Session 3: Future Applications
Countering Rogues in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 425
Session 3: Future Applications
Author IndexFreely available from IEEE.pp. 441
Showing 63 out of 63