Mobile ad hoc networks are organized by a collection of wireless devices. Any pre-established wired or wireless infrastructure or centralized administration is unnecessary. thus, ad hoc wireless networks are particula...
详细信息
Withthe emergence of large mobile ad hoc networks, the ability of existing routing protocols to scale well and function satisfactorily comes into question. Clustering has been proposed as a means to divide large netw...
详细信息
this paper presents a comparative study to examine the relationship between autonomic computing and persistent computing from the various aspects including motivation problems, ideas, purposes, goals, underlying princ...
详细信息
this paper presents a comparative study to examine the relationship between autonomic computing and persistent computing from the various aspects including motivation problems, ideas, purposes, goals, underlying principles, design methodologies, and architectures
In this paper we study multi-installment divisible load processing in heterogeneous distributed systems. Divisible loads axe computations which can be divided into parts of arbitrary sizes, and these parts can be proc...
详细信息
ISBN:
(纸本)3540287000
In this paper we study multi-installment divisible load processing in heterogeneous distributed systems. Divisible loads axe computations which can be divided into parts of arbitrary sizes, and these parts can be processed independently in parallel. In order to reduce the waiting time during the parallel computation initialization phase, load is sent to the processors in multiple small installments. In a heterogeneous system the sizes of the installments should be adjusted to the communication, and computation capabilities of the processors. We propose two algorithms that gear the load chunk sizes to different communication and computation speeds. the first one is an optimization branch and bound algorithm. the second algorithm is based on genetic search. the running times of both methods and the quality of the genetic algorithm solutions are compared. then, we use these algorithms to analyze features of the scheduling problem solutions.
the proceedings contain 99 papers. the special focus in this conference is on Bioinformatics and Networks. the topics include: Completeness for parity problems;monotony and surprise;smoothed analysis of algorithms and...
ISBN:
(纸本)9783540280613
the proceedings contain 99 papers. the special focus in this conference is on Bioinformatics and Networks. the topics include: Completeness for parity problems;monotony and surprise;smoothed analysis of algorithms and heuristics;model, dynamics and simulation;conserved interval distance computation between non-trivial genomes;RNA multiple structural alignment with longest common subsequences;perfect sorting by reversals;genome rearrangements with partially ordered chromosomes;quartet-based phylogeny reconstruction from gene orders;algorithmic and complexity issues of three clustering methods in microarray data analysis;a fast and accurate heuristic for reconstructing horizontal gene transfer;a new pseudoknots folding algorithm for RNA structure prediction;rapid homology search with two-stage extension and daughter seeds;on the approximation of computing evolutionary trees;theoretically good distributed CDMA/OVSF code assignment for wireless ad hoc networks;improved approximation algorithms for the capacitated multicast routing problem;construction of scale-free networks with partial information;radio networks with reliable communication;geometric network design with selfish agents;bicriteria network design via iterative rounding;the minimum membership set cover problem;routing and coloring for maximal number of trees;share the multicast payment fairly;on packing and coloring hyperedges in a cycle;fault-tolerant relay node placement in wireless sensor networks;best fitting fixed-length substring patterns for a set of strings;string coding of trees with locality and heritability;finding longest increasing and common subsequences in streaming data;min-energy voltage allocation for tree-structured tasks and semi-online problems on identical machines with inexact partial information.
SYN flooding attacks are a common type of distributed Denial-of-Service (DDoS) attack. Early detection is desirable but traditional passive detection methods are inaccurate in the early stages due to their reliance on...
详细信息
the following topics are dealt with: embedded and real-time computing systems and applications; scheduling; operating systems; communications; QoS support; sensor networks and information systems; energy aware design;...
the following topics are dealt with: embedded and real-time computing systems and applications; scheduling; operating systems; communications; QoS support; sensor networks and information systems; energy aware design; data services; distributed/multiprocessor systems; hardware/software co-design and mobile and ubiquitous computing.
the data diffusion space (DDS) is an all-software shared address space for parallel computing on distributed memory platforms. It is an extra address space to that of each process running a parallel application under ...
详细信息
ISBN:
(纸本)3540287000
the data diffusion space (DDS) is an all-software shared address space for parallel computing on distributed memory platforms. It is an extra address space to that of each process running a parallel application under the SPMD (Single Program Multiple Data) model. the size of DDS can be up to 2 64 bytes, either on 32- or on 64-bit architectures. Data laid on DDS diffuses, or migrates and replicates, in the memory of each processor using the data. this data is used through an interface similar to that used to access data in files. We have implemented DDS for PC clusters with Linux. However, being all-software, DDS should require little change to make it immediately usable in other distributed memory platforms and operating systems. We present experimental results on the performance of two applications both under DDS and under MPI (Message Passing Interface). DDS tends to perform better in larger processor counts, and is simpler to use than MPI for both in-core and out-of-core computation.
Broadcasting has many important uses and several Mobile Ad hoc Networks (MANETs) protocols assume the availability of an underlying broadcast service. Applications, which make use of broadcasting, include LAN emulatio...
详细信息
the In-VIGO approach to Grid-computing relies on the dynamic establishment of virtual grids on which application services are instantiated. In-VIGO was conceived to enable computational science to take place In Virtua...
详细信息
暂无评论