Default Cover Image

2007 IEEE International Parallel and Distributed Processing Symposium

March 26 2007 to March 30 2007

Rome

Table of Contents

Papers
Copyright pageFreely available from IEEE.pp. 2
Papers
Summary of ContentsFreely available from IEEE.pp. 4
Papers
Detailed Table of ContentsFreely available from IEEE.pp. 5
Papers
Message from the General ChairFreely available from IEEE.pp. 6
Papers
Message from the Program ChairFreely available from IEEE.pp. 7
Papers
Message from the Workshops ChairFreely available from IEEE.pp. 8
Papers
Message from the Steering Co-ChairsFreely available from IEEE.pp. 9
Papers
IPDPS 2007 OrganizationFreely available from IEEE.pp. 10
Papers
TCPP Presentation and Invited Speech Reinventing ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 11
Papers
Keynote Speech: Large-Scale Bioimaging and VisualizationFull-text access may be available. Sign in or learn about subscription options.pp. 12
Papers
Symposium Evening Tutorial: High-performance Computing Methods for Computational GenomicsFull-text access may be available. Sign in or learn about subscription options.pp. 13
Papers
Keynote Speech: Avoiding the Memory Bottleneck through Structured ArraysFull-text access may be available. Sign in or learn about subscription options.pp. 14
Papers
IPDPS Panel: Is the Multi-Core Roadmap going to Live Up to its Promises?Full-text access may be available. Sign in or learn about subscription options.pp. 15
Papers
Banquet and Invited Speech Why Peta-Scale is Different: An Ecosystem Approach to Predictive Scientific and Engineering SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 16
Papers
Keynote Speech: Quantum Physics and the Nature of ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 17
Papers
IPDPS 2007 ReviewersFreely available from IEEE.pp. 18
Papers
High-performance Computing Methods for Computational GenomicsFull-text access may be available. Sign in or learn about subscription options.pp. 19
Papers
VoroNet: A scalable object network based on Voronoi tessellationsFull-text access may be available. Sign in or learn about subscription options.pp. 20
Papers
Almost Peer-to-Peer Clock SynchronizationFull-text access may be available. Sign in or learn about subscription options.pp. 21
Papers
Locality-Aware Consistency Maintenance for Heterogeneous P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 22
Papers
Benefits of Targeting in Trusted Gossiping for Peer-to-Peer Information SharingFull-text access may be available. Sign in or learn about subscription options.pp. 23
Papers
Building the Tree of Life on Terascale SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 24
Papers
Inverse Space-Filling Curve Partitioning of a Global Ocean ModelFull-text access may be available. Sign in or learn about subscription options.pp. 25
Papers
A Parallel Workflow for Real-time Correlation and Clustering of High-Frequency Stock Market DataFull-text access may be available. Sign in or learn about subscription options.pp. 26
Papers
A Grid-enabled Branch and Bound Algorithm for Solving Challenging Combinatorial Optimization ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 27
Papers
MultiEdge: An Edge-based Communication Subsystem for Scalable Commodity ServersFull-text access may be available. Sign in or learn about subscription options.pp. 28
Papers
Efficient Block Device Sharing over Myrinet with Memory BypassFull-text access may be available. Sign in or learn about subscription options.pp. 29
Papers
Achieving Reliable Parallel Performance in a VoD Storage Server Using Randomization and ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 30
Papers
A Cost-Effective, High Bandwidth Server I/O network Architecture for Cluster SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 31
Papers
Babel Remote Method InvocationFull-text access may be available. Sign in or learn about subscription options.pp. 32
Papers
Nonuniformly Communicating Noncontiguous Data: A Case Study with PETSc and MPIFull-text access may be available. Sign in or learn about subscription options.pp. 33
Papers
CCA-LISI: On Designing A CCA Parallel Sparse Linear Solver InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 34
Papers
Optimizing Distributed Application Performance Using Dynamic Grid Topology-Aware Load BalancingFull-text access may be available. Sign in or learn about subscription options.pp. 35
Papers
On the Design of Online Scheduling Algorithms for Advance Reservations and QoS in GridsFull-text access may be available. Sign in or learn about subscription options.pp. 36
Papers
Reconfigurable Resource Scheduling with Variable Delay BoundsFull-text access may be available. Sign in or learn about subscription options.pp. 37
Papers
A Strategyproof Mechanism for Scheduling Divisible Loads in Linear NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 38
Minimum number of wavelengths equals load in a DAG without internal cycleFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Scheduling in the Z-Polyhedral ModelFull-text access may be available. Sign in or learn about subscription options.pp. 39
Papers
A Landmark-based Index Architecture for General Similarity Search in Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 40
Papers
Optimized Inverted List Assignment in Distributed Search Engine ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 41
Papers
Scalable Visual Analytics of Massive Textual DatasetsFull-text access may be available. Sign in or learn about subscription options.pp. 42
Papers
Spam-Resilient Web Rankings via Influence ThrottlingFull-text access may be available. Sign in or learn about subscription options.pp. 43
Papers
Conserving Memory Bandwidth in Chip Multiprocessors with Runahead ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 44
Papers
Simulating Red Storm: Challenges and Successes in Building a System SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 45
Papers
Architectural Support for Network Applications on Simultaneous MultiThreading ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 46
Papers
Microarchitectural Support for Speculative Register RenamingFull-text access may be available. Sign in or learn about subscription options.pp. 47
Papers
Automatic Trace-Based Performance Analysis of Metacomputing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 48
Papers
An Implementation and Evaluation of Client-Side File Caching for MPI-IOFull-text access may be available. Sign in or learn about subscription options.pp. 49
Papers
A Utility-based Approach to Cost-Aware Caching in Heterogeneous Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 50
Papers
Integrated Risk Analysis for a Commercial Computing ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 51
Papers
Max-Min Fair Bandwidth Allocation Algorithms for Packet SwitchesFull-text access may be available. Sign in or learn about subscription options.pp. 52
Papers
Network-Oblivious AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 53
Papers
A Comparison of Dag-Scheduling Strategies for Internet-Based ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 55
Papers
Power-Aware SpeedupFull-text access may be available. Sign in or learn about subscription options.pp. 56
Papers
A Near-optimal Solution for the Heterogeneous Multi-processor Single-level Voltage Setup ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 57
Papers
Optimal Energy Balanced Data Gathering in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 58
Papers
Verifiable Credit Based Transfers in Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 59
Papers
Towards A Better Understanding of Workload Dynamics on Data-Intensive Clusters and GridsFull-text access may be available. Sign in or learn about subscription options.pp. 60
Papers
Efficient Statistical Performance Modeling for Autonomic, Service-Oriented SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 61
Papers
Stack Trace Analysis for Large Scale DebuggingFull-text access may be available. Sign in or learn about subscription options.pp. 64
Papers
Single IP Address Cluster for Internet ServersFull-text access may be available. Sign in or learn about subscription options.pp. 65
Papers
RF2ID: A Reliable Middleware Framework for RFID DeploymentFull-text access may be available. Sign in or learn about subscription options.pp. 66
Papers
A WSRF-Compliant Debugger for Grid ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 67
Papers
Speculative Flow Control for High-Radix Datacenter Interconnect RoutersFull-text access may be available. Sign in or learn about subscription options.pp. 70
Papers
Scalable Compression and Replay of Communication Traces in Massively P arallel E nvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 71
Papers
Distributed, Reliable Restoration Techniques using Wireless Sensor DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 72
Papers
Topology-Transparent Duty Cycling for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 73
Papers
Average-Case Performance Evaluation of Online Algorithms for Routing and Wavelength Assignment in WDM Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 74
Energy-Aware Self-Stabilization in Mobile Ad Hoc Networks: A Multicasting Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
On the Design and Analysis of Irregular Algorithms on the Cell Processor: A Case Study of List RankingFull-text access may be available. Sign in or learn about subscription options.pp. 76
Papers
Hardware/Software Co-Design for Matrix Computations on Reconfigurable Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 78
Papers
Masked Queries for Search Accuracy in Peer-to-Peer File-Sharing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 79
Papers
Mixed-radix Twisted Torus Interconnection NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 80
Papers
Table-lookup based Crossbar Arbitration for Minimal-Routed, 2D Mesh and Torus NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 82
Papers
Power-Aware Bandwidth-Reconfigurable Optical Interconnects for High-Performance Computing (HPC) SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 83
Papers
A Performance Prediction Framework for Grid-Based Data Mining ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 84
Papers
A Performance Prediction Framework for Grid-Based Data Mining ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 85
Papers
Prediction Services for Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 86
Papers
Adaptive Predictor Integration for System Performance PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 87
Papers
Machine Bank: Own Your Virtual Personal ComputerFull-text access may be available. Sign in or learn about subscription options.pp. 88
File Creation Strategies in a Distributed Metadata File SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Online Aggregation over TreesFull-text access may be available. Sign in or learn about subscription options.pp. 90
Papers
Optimizing Multiple Distributed Stream Queries Using Hierarchical Network PartitionsFull-text access may be available. Sign in or learn about subscription options.pp. 91
Papers
A Scalable Cluster Algorithm for Internet ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 92
Papers
Making Peer-to-Peer Anonymous Routing Resilient to FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 93
Papers
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 94
Papers
Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 95
Papers
Replication Strategy in Unstructured Peer-to-Peer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 96
Papers
Packet Reordering in Network ProcessorsFull-text access may be available. Sign in or learn about subscription options.pp. 97
Papers
Deadline-based QoS Algorithms for High-performance NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 98
Papers
Design Alternatives for a High-Performance Self-Securing Ethernet Network InterfaceFull-text access may be available. Sign in or learn about subscription options.pp. 100
Showing 100 out of 498