Default Cover Image

Third IEEE International Conference on Cluster Computing (CLUSTER'01)

Oct. 8 2001 to Oct. 11 2001

Newport Beach, CA

ISBN: 0-7695-1116-3

Table of Contents

2001 IEEE International Conference On Cluster Computing [front matter]Freely available from IEEE.pp. i,ii,iii,iv,v,vi,vii,viii,ix,x
Game theory and mathematical economics: a theoretical computer scientist's introductionFull-text access may be available. Sign in or learn about subscription options.pp. 4-8
Algorithmic applications of low-distortion geometric embeddingsFull-text access may be available. Sign in or learn about subscription options.pp. 10-33
Coding theory: Tutorial & surveyFull-text access may be available. Sign in or learn about subscription options.pp. 36-53
Almost tight upper bounds for vertical decompositions in four dimensionsFull-text access may be available. Sign in or learn about subscription options.pp. 56-65
Approximate shape fitting via linearizationFull-text access may be available. Sign in or learn about subscription options.pp. 66-73
On the complexity of many faces in arrangements of circlesFull-text access may be available. Sign in or learn about subscription options.pp. 74-83
Clustering motionFull-text access may be available. Sign in or learn about subscription options.pp. 84-93
A replacement for Voronoi diagrams of near linear sizeFull-text access may be available. Sign in or learn about subscription options.pp. 94-103
How to go beyond the black-box simulation barrierFull-text access may be available. Sign in or learn about subscription options.pp. 106-115
Resettably-sound zero-knowledge and its applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 116-125
On the impossibility of basing trapdoor functions on trapdoor predicatesFull-text access may be available. Sign in or learn about subscription options.pp. 126-135
Universally composable security: a new paradigm for cryptographic protocolsFull-text access may be available. Sign in or learn about subscription options.pp. 136-145
Traveling with a Pez dispenser (or, routing issues in MPLS)Full-text access may be available. Sign in or learn about subscription options.pp. 148-157
Simple routing strategies for adversarial systemsFull-text access may be available. Sign in or learn about subscription options.pp. 158-167
Source routing and scheduling in packet networksFull-text access may be available. Sign in or learn about subscription options.pp. 168-177
The natural work-stealing algorithm is stableFull-text access may be available. Sign in or learn about subscription options.pp. 178-187
Message from the Task Force Co-ChairsFreely available from IEEE.pp. xi
Lower bounds for polynomial calculus: non-binomial caseFull-text access may be available. Sign in or learn about subscription options.pp. 190-199
Message from the Conference General Co-ChairsFreely available from IEEE.pp. xiii
Message from the Program ChairsFreely available from IEEE.pp. xv
Counting axioms do not polynomially simulate counting gatesFull-text access may be available. Sign in or learn about subscription options.pp. 200-209
IEEE Cluster 2001 Conference Organization CommitteeFreely available from IEEE.pp. xvii
Resolution is not automatizable unless W[P] is tractableFull-text access may be available. Sign in or learn about subscription options.pp. 210-219
"Planar" tautologies hard for resolutionFull-text access may be available. Sign in or learn about subscription options.pp. 220-229
Cluster 2001 Technical Program CommitteeFreely available from IEEE.pp. xix
Keynote
"Architecture Recapitulates Phylogeny": How Scalability Requires SpecializationFull-text access may be available. Sign in or learn about subscription options.pp. 3
Planar graphs, negative weight edges, shortest paths, and near linear timeFull-text access may be available. Sign in or learn about subscription options.pp. 232-241
Compact oracles for reachability and approximate distances in planar digraphsFull-text access may be available. Sign in or learn about subscription options.pp. 242-251
Networking I
Early Experiences with the Myricom 2000 Switch on an SMP Beowulf-Class Cluster for Unstructured Adaptive MeshingFull-text access may be available. Sign in or learn about subscription options.pp. 7
Networking I
Using Multirail Networks in High-Performance ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 15
Vickrey prices and shortest paths: what is an edge worth?Full-text access may be available. Sign in or learn about subscription options.pp. 252-259
Fully dynamic all pairs shortest paths with real edge weightsFull-text access may be available. Sign in or learn about subscription options.pp. 260-267
I/O
Next Generation Parallel Virtual File System (invited)Full-text access may be available. Sign in or learn about subscription options.pp. 27
I/O
Experiences with Oasis+: A Fault Tolerant Storage SystemFull-text access may be available. Sign in or learn about subscription options.pp. 29
Informational complexity and the direct sum problem for simultaneous message complexityFull-text access may be available. Sign in or learn about subscription options.pp. 270-278
I/O
Clusterfile: A Flexible Physical Layout Parallel File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 37
How powerful is adiabatic quantum computation?Full-text access may be available. Sign in or learn about subscription options.pp. 279-287
Cluster Management I
High Performance Computing with Microsoft Windows 2000Full-text access may be available. Sign in or learn about subscription options.pp. 47
Lower bounds for quantum communication complexityFull-text access may be available. Sign in or learn about subscription options.pp. 288-297
Cluster Management I
GulfStream - a System for Dynamic Topology Management in Multi-domain Server FarmsFull-text access may be available. Sign in or learn about subscription options.pp. 55
The confluence of ground term rewrite systems is decidable in polynomial timeFull-text access may be available. Sign in or learn about subscription options.pp. 298-307
Cluster Management I
Cluster Rolling Upgrade using Multiple Version SupportFull-text access may be available. Sign in or learn about subscription options.pp. 63
On the average-case hardness of CVPFull-text access may be available. Sign in or learn about subscription options.pp. 308-317
Alternative Hardware
Dense Computing with Transmeta's Crusoe (invited)Full-text access may be available. Sign in or learn about subscription options.pp. 73
Approximating directed multicutsFull-text access may be available. Sign in or learn about subscription options.pp. 320-328
Facility location with nonuniform hard capacitiesFull-text access may be available. Sign in or learn about subscription options.pp. 329-338
Alternative Hardware
PVL: An Object Oriented Software Library for Parallel Signal Processing (invited)Full-text access may be available. Sign in or learn about subscription options.pp. 74
An iterative rounding 2-approximation algorithm for the element connectivity problemFull-text access may be available. Sign in or learn about subscription options.pp. 339-347
Alternative Hardware
Numerically-Intensive "Plug-and-Play" Parallel ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 75
Approximation algorithms for the job interval selection problem and related scheduling problemsFull-text access may be available. Sign in or learn about subscription options.pp. 348-356
Applications I
Parallel Standard Cell Placement on a Cluster of WorkstationsFull-text access may be available. Sign in or learn about subscription options.pp. 85
Lower bounds for matrix productFull-text access may be available. Sign in or learn about subscription options.pp. 358-367
Applications I
Stingray: Cone tracing using a software DSM for SCI clustersFull-text access may be available. Sign in or learn about subscription options.pp. 95
Deterministic computation of the Frobenius formFull-text access may be available. Sign in or learn about subscription options.pp. 368-377
Applications I
Parallel and Adaptive Reduction of Hyperspectral Data to Intrinsic DimensionalityFull-text access may be available. Sign in or learn about subscription options.pp. 102
The complexity of factors of multivariate polynomialsFull-text access may be available. Sign in or learn about subscription options.pp. 378-385
Scheduling
Workload Management: More Than Just Job SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 113
Linear-time recognition of circular-arc graphsFull-text access may be available. Sign in or learn about subscription options.pp. 386-394
Scheduling
Scheduling parallel adaptive applications in networks of workstations and clusters of processorsFull-text access may be available. Sign in or learn about subscription options.pp. 116
A Ramsey-type theorem for metric spaces and its applications for metrical task systems and related problemsFull-text access may be available. Sign in or learn about subscription options.pp. 396-405
Scheduling
Sharing Partitionable Workloads in Heterogeneous NOWs: Greedier Is Not BetterFull-text access may be available. Sign in or learn about subscription options.pp. 124
Designing networks incrementallyFull-text access may be available. Sign in or learn about subscription options.pp. 406-415
Plenary Talks
High Performance Computing and Trends: Connected Computational Requirements with Computing ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 135
Sorting and selection with structured costsFull-text access may be available. Sign in or learn about subscription options.pp. 416-425
Plenary Talks
Future Directions for the Scyld Advanced Beowulf Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 136
Online facility locationFull-text access may be available. Sign in or learn about subscription options.pp. 426-431
Plenary Talks
OSCAR and the Beowulf Arms Race for the "Cluster Standard"Full-text access may be available. Sign in or learn about subscription options.pp. 137
Testing subgraphs in large graphsFull-text access may be available. Sign in or learn about subscription options.pp. 434-441
Posters
CPPvm - Parallel Programming in C++Full-text access may be available. Sign in or learn about subscription options.pp. 141
Testing random variables for independence and identityFull-text access may be available. Sign in or learn about subscription options.pp. 442-451
Posters
Dynamic Cluster Configuration and Management using JavaSpacesFull-text access may be available. Sign in or learn about subscription options.pp. 145
Fast Monte-Carlo algorithms for approximate matrix multiplicationFull-text access may be available. Sign in or learn about subscription options.pp. 452-459
Posters
Communication with Threads in Software DSMsFull-text access may be available. Sign in or learn about subscription options.pp. 149
Posters
IEEE 1394 and RFC 2734; a viable HSI for hypercubesFull-text access may be available. Sign in or learn about subscription options.pp. 155
Three theorems regarding testing graph propertiesFull-text access may be available. Sign in or learn about subscription options.pp. 460-469
Posters
Hierarchical Cluster for Scalable Web ServersFull-text access may be available. Sign in or learn about subscription options.pp. 156
Designing networks for selfish users is hardFull-text access may be available. Sign in or learn about subscription options.pp. 472-481
Posters
A Low-Cost, High-Density Mounting System for Computer ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 157
Truthful mechanisms for one-parameter agentsFull-text access may be available. Sign in or learn about subscription options.pp. 482-491
Building low-diameter P2P networksFull-text access may be available. Sign in or learn about subscription options.pp. 492-499
Posters
Table-Comparison Prefetching in VIA-based Parallel File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 163
Web search via hub synthesisFull-text access may be available. Sign in or learn about subscription options.pp. 500-509
Posters
Cluster Trend: DataSpeakingFull-text access may be available. Sign in or learn about subscription options.pp. 168
Random evolution in massive graphsFull-text access may be available. Sign in or learn about subscription options.pp. 510-519
Posters
Performance Evaluation of Parallel File Systems for PC Clusters and ASCI RedFull-text access may be available. Sign in or learn about subscription options.pp. 172
Posters
A High-Availability Clustering Architecture with Data Integrity GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 178
Tight approximation results for general covering integer programsFull-text access may be available. Sign in or learn about subscription options.pp. 522-528
Spectral partitioning of random graphsFull-text access may be available. Sign in or learn about subscription options.pp. 529-537
Posters
PVM Support for ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 183
Sequential and parallel algorithms for mixed packing and coveringFull-text access may be available. Sign in or learn about subscription options.pp. 538-546
Posters
A Distributed Object Model for Solving Irregularly Structured Problems on ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 187
Unique sink orientations of cubesFull-text access may be available. Sign in or learn about subscription options.pp. 547-555
Keynote
Towards High-Level Programming Support for Scientific Computing on ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 193
Networking II
Performance and Analysis of the PCI-DDC Remote-Write ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 197
Arc-disjoint paths in expander digraphsFull-text access may be available. Sign in or learn about subscription options.pp. 558-567
Networking II
GMSOCKS - A Direct Sockets Implementation on MyrinetFull-text access may be available. Sign in or learn about subscription options.pp. 204
Glauber dynamics on trees and hyperbolic graphsFull-text access may be available. Sign in or learn about subscription options.pp. 568-578
Networking II
A Reconfigurable Extension to the Network Interface of Beowulf ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 212
Showing 100 out of 147