Default Cover Image

2015 23rd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)

March 4 2015 to March 6 2015

Turku, Finland

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xiii
Preface from General Co-ChairsFreely available from IEEE.pp. xiv-xiv
Preface from Program Co-ChairsFreely available from IEEE.pp. xv-xvi
Conference OrganizationFreely available from IEEE.pp. xvii-xxiv
SubreviewersFreely available from IEEE.pp. xxv-xxv
Heterogeneous Acceleration of Volumetric JPEG 2000Full-text access may be available. Sign in or learn about subscription options.pp. 1-8
Locality vs. Balance: Exploring Data Mapping Policies on NUMA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
On the Impact of Energy-Efficient Strategies in HPC ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 17-21
Row Tables: Design Choices to Exploit Bank Locality in Multiprogram WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 22-26
A Monitoring System for Runtime Adaptations of Streaming ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
Marching Band: Fault-Tolerance with Replicable Message Delivery OrderFull-text access may be available. Sign in or learn about subscription options.pp. 43-47
XORAdap: A HoL-Blocking Aware Adaptive Routing AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 48-52
Extending a Peer-Based Coordination Model with Composable Design PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 53-61
Selecting Points of Interest in Traces Using Patterns of EventsFull-text access may be available. Sign in or learn about subscription options.pp. 70-77
RaceChecker: Efficient Identification of Harmful Data RacesFull-text access may be available. Sign in or learn about subscription options.pp. 78-85
Cost Estimation of Parallel Constrained Producer-Consumer AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 86-93
On the Quality of Implementation of the C++11 Thread Support LibraryFull-text access may be available. Sign in or learn about subscription options.pp. 94-98
Energy Driven Adaptivity in Stream Parallel ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 103-110
Enhancing and Evaluating the Configuration Capability of a Skeleton for Irregular ComputationsFull-text access may be available. Sign in or learn about subscription options.pp. 119-127
Number of Tasks, not Threads, is KeyFull-text access may be available. Sign in or learn about subscription options.pp. 128-136
Performance Evaluation of Parallel HEVC StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 137-144
A Hybrid Parallel Implementation of Model Selection for Support Vector MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 145-149
Methodologies and Performance Metrics to Evaluate Multiprogram WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 150-154
pioman: A Pthread-Based Multithreaded Communication EngineFull-text access may be available. Sign in or learn about subscription options.pp. 155-162
Progression of MPI Non-blocking Collective Operations Using Hyper-ThreadingFull-text access may be available. Sign in or learn about subscription options.pp. 163-171
Optimized Core-Links for Low-Latency NoCsFull-text access may be available. Sign in or learn about subscription options.pp. 172-176
The Tag Filter Cache: An Energy-Efficient ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 182-189
TFluxSCC: Exploiting Performance on Future Many-Core Systems through Data-FlowFull-text access may be available. Sign in or learn about subscription options.pp. 190-198
Efficient Implementation of a Fast Viewshed Algorithm on SIMD ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 199-202
A High-Performance Media Streaming Architecture Based on KVMFull-text access may be available. Sign in or learn about subscription options.pp. 203-206
An Efficient Algorithm for Communication-Based Task MappingFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Bit-Flip Aware Control-Flow Error DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 215-221
I/O Optimization in the Checkpointing of OpenMP Parallel ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 222-229
Algorithms for Mapping Parallel Processes onto Grid and Torus ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 236-243
Parallel Implementations of the Particle Filter Algorithm for Android Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 244-247
Efficient Lock-Free Work-Stealing Iterators for Data-Parallel CollectionsFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
Using Active Data to Provide Smart Data Surveillance to E-Science UsersFull-text access may be available. Sign in or learn about subscription options.pp. 269-273
A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging DataFull-text access may be available. Sign in or learn about subscription options.pp. 274-278
Solutions for Processing K Nearest Neighbor Joins for Massive Data on MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 279-287
Experiences of Using Cassandra for Molecular Dynamics SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 288-295
Exploiting Local Clouds in the Internet of Everything EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 296-300
Color and Edge Directivity Descriptor on GPGPUFull-text access may be available. Sign in or learn about subscription options.pp. 301-308
Human and Fire Detection from High Altitude UAV ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 309-315
Evaluating the Performance Impact of Communication Imbalance in Sparse Matrix-Vector MultiplicationFull-text access may be available. Sign in or learn about subscription options.pp. 321-328
Parallel Implementation of Fuzzified Pattern Matching Algorithm on GPUFull-text access may be available. Sign in or learn about subscription options.pp. 341-344
DeFrag: Defragmentation for Efficient Runtime Resource Allocation in NoC-Based Many-core SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 345-352
Dynamic Guaranteed Service Communication on Best-Effort Networks-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
Concentration and Its Impact on Mesh and Torus-Based NoC PerformanceFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
A Routing-Level Solution for Fault Detection, Masking, and Tolerance in NoCsFull-text access may be available. Sign in or learn about subscription options.pp. 365-369
Fault Tolerant Routing for Hierarchically Organized Networks-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 379-386
Implementing MVC Decoding on Homogeneous NoCs: Circuit Switching or Wormhole SwitchingFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
An Adaptive, Low Restrictive and Fault Resilient Routing Algorithm for 3D Network-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 392-395
Modeling an Improved Modified Type in Metallic Quantum-Dot Fixed Cell for Nano Structure ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 412-415
Derivation of Parallel and Resilient Programs from Simulink ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 416-420
Dynamic Application Mapping Algorithm for Wireless Network-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 421-424
A Clustered GALS NoC Architecture with Communication-Aware MappingFull-text access may be available. Sign in or learn about subscription options.pp. 425-429
A Green Perspective on Structured Parallel ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 430-437
Multi-kernel Auto-Tuning on GPUs: Performance and Energy-Aware OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 438-445
Automatic Distributed Code Generation from Formal Models of Asynchronous Concurrent ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 459-466
Causal-Consistent Reversibility in a Tuple-Based LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 467-475
SyLVaaS: System Level Formal Verification as a ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 476-483
Revisiting Concurrent Separation Logic and Operational SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 484-491
pNets: An Expressive Model for Parameterised Networks of ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 492-496
A Scheduling Strategy Based on Redundancy of Service Requests on IaaS ProvidersFull-text access may be available. Sign in or learn about subscription options.pp. 497-504
Design of a Cloud Service Middleware to Utilize Free Minutes of Public Cloud ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 514-519
Optimizing OLAP Cubes Construction by Improving Data Placement on Multi-nodes ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 520-524
Accurate Energy Modelling for Many-Core Static SchedulesFull-text access may be available. Sign in or learn about subscription options.pp. 525-532
DVFS Governor for HPC: Higher, Faster, GreenerFull-text access may be available. Sign in or learn about subscription options.pp. 533-540
Energy-Efficient Task Scheduling in Manycore Processors with Frequency Scaling OverheadFull-text access may be available. Sign in or learn about subscription options.pp. 541-548
Energy-Aware Migration of Virtual Machines Driven by Predictive Data Mining ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 549-553
Energy Measurement Library (EML) Usage and Overhead AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 554-558
Design of Integrated Vulnerabilities Database for Computer Networks Security AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 559-566
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 567-574
Enabling Secure Communication over Existing Peer-to-Peer FrameworksFull-text access may be available. Sign in or learn about subscription options.pp. 575-582
Design and Development of a Facebook Application to Raise Privacy AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 583-586
A Formal Model of Policy ReconciliationFull-text access may be available. Sign in or learn about subscription options.pp. 587-594
Iterative Selection of Cost-Effective Countermeasures for Intelligent Threat AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 595-599
Review of the Mobile Malware Detection ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 600-603
A Generic and Highly Efficient Parallel Variant of Boruvka's AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 610-617
Showing 100 out of 124